Sei sulla pagina 1di 321

Cognome: VISCONTI

Nome: Giulia

La versione accessibile di questo file è stata realizzata


dalla Biblioteca Digitale dell’ Associazione Italiana Dislessia.

Copia concessa per uso personale di studio su concessione


del Gruppo Editoriale Zanichelli
Tutti i diritti sono riservati.

Ad uso esclusivo e temporaneo per soggetti con D.S.A. o che


rientrano nella legge 104/92
VIETATA LA DUPLICAZIONE

Codice Fiscale: VSCGLI00H42C351O


Cognome: VISCONTI
Nome: Giulia

0DU]LD0HQFKHWWL
&DUOD0DWDVVL

1HZ7RWDOO\
&RQQHFWHG

Per sapere quali risorse digitali integrano il tuo libro,


e come fare ad averle, vai su:

http://my.zanichelli.it/risorsedigitali
e segui le istruzioni. Tieni il tuo libro a portata di mano:
avrai bisogno del codice ISBN*, che trovi nell’ultima
pagina della copertina, in basso a sinistra.

t L’accesso alle risorse digitali protette è personale: se ne fai uso,


non potrai poi condividerlo o cederlo.
t L’accesso a eventuali risorse digitali online protette è limitato
nel tempo: alla pagina http://my.zanichelli.it/risorsedigitali
trovi informazioni sulla durata della licenza.

* Se questo libro fa parte di una confezione, l’ISBN si trova nella quarta di copertina
dell’ultimo libro nella confezione.

Codice Fiscale: VSCGLI00H42C351O


Cognome: VISCONTI
Nome: Giulia

Copyright © 2010, 2014 Clitt, via Pietro Cossa 41, 00193 Roma
www.clitt.it
I diritti di elaborazione in qualsiasi forma o opera, di memorizzazione anche digitale su supporti di qualsiasi tipo (inclusi magnetici e ottici),
di riproduzione e di adattamento totale o parziale con qualsiasi mezzo (compresi i microfilm e le copie fotostatiche), i diritti di noleggio,
di prestito e di traduzione sono riservati per tutti i paesi. L’acquisto della presente copia dell’opera non implica il trasferimento
dei suddetti diritti né li esaurisce.

Le fotocopie per uso personale (cioè privato e individuale, con esclusione quindi di strumenti di uso collettivo) possono essere effettuate,
nei limiti del 15% di ciascun volume, dietro pagamento alla S.I.A.E del compenso previsto dall’art. 68, commi 4 e 5, della legge 22 aprile 1941
n. 633. Tali fotocopie possono essere effettuate negli esercizi commerciali convenzionati S.I.A.E. o con altre modalità indicate da S.I.A.E.

Per le riproduzioni ad uso non personale (ad esempio: professionale, economico, commerciale, strumenti di studio collettivi,
come dispense e simili) l’editore potrà concedere a pagamento l’autorizzazione a riprodurre un numero di pagine non superiore
al 15% delle pagine del presente volume. Le richieste per tale tipo di riproduzione vanno inoltrate a
Centro Licenze e Autorizzazioni per le Riproduzioni Editoriali (CLEARedi)
Corso di Porta Romana, n.108
20122 Milano
e-mail autorizzazioni@clearedi.org e sito web www.clearedi.org

L’editore, per quanto di propria spettanza, considera rare le opere fuori del proprio catalogo editoriale, consultabile al sito
www.zanichelli.it/f_catalog.html. La fotocopia dei soli esemplari esistenti nelle biblioteche di tali opere è consentita, oltre il limite del 15%,
non essendo concorrenziale all’opera. Non possono considerarsi rare le opere di cui esiste, nel catalogo dell’editore, una successiva edizione,
le opere presenti in cataloghi di altri editori o le opere antologiche. Nei contratti di cessione è esclusa, per biblioteche, istituti di istruzione,
musei ed archivi, la facoltà di cui all’art. 71 - ter legge diritto d’autore. Maggiori informazioni sul nostro sito: www.zanichelli.it/fotocopie/

Realizzazione editoriale:
- Progetto grafico: Francesco Bufardeci
- Impaginazione: Emanuela Baldini
- Ricerca iconografica: Bianca&Volta

Copertina:
- Progetto grafico e realizzazione: Catia Mancarella

Prima edizione: marzo 2014

Ristampa:
5 4 3 2 1 2014 2015 2016 2017 2018

In questo libro sono state utilizzate alcune immagini di prodotti in commercio. In nessun caso tali immagini
vanno interpretate come una scelta di merito da parte dell’editore né, tanto meno, come un invito al consumo
di determinati prodotti.
Le immagini dei prodotti e i messaggi pubblicitari contenuti nel testo sono presenti esclusivamente per finalità
didattica, senza scopo di lucro.

Zanichelli garantisce che le risorse digitali di questo volume sotto il suo controllo saranno
accessibili, a partire dall’acquisto dell’esemplare nuovo, per tutta la durata della normale
utilizzazione didattica dell’opera. Passato questo periodo, alcune o tutte le risorse potrebbero
non essere più accessibili o disponibili: per maggiori informazioni, leggi
my.zanichelli.it/fuoricatalogo

File per sintesi vocale


L’editore mette a disposizione degli studenti non vedenti, ipovedenti, disabili motori
o con disturbi specifici di apprendimento i file pdf in cui sono memorizzate le pagine
di questo libro. Il formato del file permette l’ingrandimento dei caratteri del testo e la lettura mediante
software screen reader. Le informazioni su come ottenere i file sono sul sito
www.scuola.zanichelli.it/bisogni-educativi-speciali

Suggerimenti e segnalazione degli errori


Realizzare un libro è un’operazione complessa, che richiede numerosi controlli: sul testo, sulle immagini
e sulle relazioni che si stabiliscono tra essi. L’esperienza suggerisce che è praticamente impossibile
pubblicare un libro privo di errori. Saremo quindi grati ai lettori che vorranno segnalarceli.
Per segnalazioni o suggerimenti relativi a questo libro scrivere al seguente indirizzo:
lineazeta@zanichelli.it
Le correzioni di eventuali errori presenti nel testo sono pubblicate nel sito www.zanichelli.it/aggiornamenti

Zanichelli editore S.p.A. opera con sistema qualità


certificato CertiCarGraf n. 477
secondo la norma UNI EN ISO 9001:2008

Questo libro è stampato su carta che rispetta le foreste.


www.zanichelli.it/la-casa-editrice/carta-e-ambiente/

Stampa: Grafica Ragno


Via Lombardia 25, 40064 Tolara di Sotto, Ozzano Emilia (Bologna)
per conto di Zanichelli Editore S.p.A.
Via Irnerio 34, 40126 Bologna

Codice Fiscale: VSCGLI00H42C351O


Cognome: VISCONTI
Nome: Giulia

Presentazione

Questa nuova edizione di Totally Connected è rivolta agli ISI (ITIS) - Indirizzo Informatico/
Elettronico, ma la sua collocazione naturale si situa anche nell’importante campo della
Formazione professionale che oggi riguarda un ampio settore della moderna società mul-
tietnica.

Perché “NEW”? Prima di tutto, il testo si presenta nella duplice veste di libro cartaceo e di
e-book, in versione più snella e con l’aggiunta di materiali digitali integrativi. Inoltre, è stata
fatta una revisione completa dell’opera con l’inserimento di nuovi contenuti ad arricchire
le basi fondamentali del testo e delle pagine CLIL, di carattere informatico ed elettronico.
Un’ulteriore opportunità di ampliamento e approfondimento delle tematiche svolte è offerta
dai collegamenti online (links) che corredano l’apparato modulare.

Particolare attenzione è stata data all’incremento del numero degli esercizi: oltre alle attività
che accompagnano lo sviluppo degli argomenti e alla molteplicità degli esercizi interattivi
ZTE, alla fine di ogni modulo vi sono due sezioni specifiche: Revise & check, per ripassare
lessico e argomenti studiati, e Test your competence che, sulla base delle indicazioni dello
European Framework, offre prove di maggiore complessità volte a testare il grado di com-
petenza linguistica acquisita dagli studenti.

Il libro contiene, infine, una ricca sezione dedicata al ripasso delle principali strutture morfo-
sintattiche della lingua inglese (Language Study).

I contenuti digitali ad integrazione sono costituiti da un elevato numero di esercizi ZTE di


carattere interattivo, ascolti audio online e link ad ulteriore ampliamento o approfondimento
degli argomenti specifici trattati.

La Guida per l’Insegnante, oltre a fornire le soluzioni degli esercizi proposti, contiene le tra-
scrizioni dei testi di ascolto online, nonché suggerimenti per meglio sfruttare il testo, letture
aggiuntive e prove sommative di modulo.

3
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
7DEOHRI FRQWHQWV
$ZRUOGRI $SSV-DYDDEULJKWVWDU

Module 0 - My computer: old passion new satisfaction 7


From Hardware to Software: What is a computer? ........................................................ 7
Bits and Bytes ............................................................................................................... 16
Revise & Check ............................................................................................................. 19
Test your Competence ..................................................................................................20

Module 1 - Computer basics 21


Computers take many forms .........................................................................................21
Analogue to Digital and viceversa .................................................................................25
General-purpose vs. Special-purpose computers ..........................................................28
Revise & Check .............................................................................................................30
Test your Competence ..................................................................................................32

Module 2 - Boot-up process 33


Input devices .................................................................................................................33
Output devices ..............................................................................................................37
Revise & Check .............................................................................................................42
Test your Competence ..................................................................................................44

Module 3 - The information superhighway 45


Interconnected Networks ..............................................................................................45
All’s hot! ........................................................................................................................49
From newsgroups to Twitter...........................................................................................56
Revise & Check .............................................................................................................62
Test your Competence ..................................................................................................64

Module 4 - The brain of every computer 65


The processing unit ...................................................................................................... 65
Storage ......................................................................................................................... 70
Magnetic Media ........................................................................................................... 78
Revise & Check ............................................................................................................ 85
Test your Competence ................................................................................................. 87

Module 5 - Operating systems 89


Main functions of Operating Systems .......................................................................... 89
Application packages ................................................................................................... 100
Revise & Check ........................................................................................................... 109
Test your Competence .................................................................................................111

Module 6 - Languages 113


Programming languages: low level languages ............................................................ 113
Programming languages: high-level languages ........................................................... 119
Special languages ........................................................................................................ 125
Revise & Check ........................................................................................................... 131
Test your Competence ................................................................................................ 133

Module 7 - Program development 135


Computer programming .............................................................................................. 135
Building a program ...................................................................................................... 140
System flowcharts ....................................................................................................... 146
Basic control structures ............................................................................................... 151
Revise & Check ........................................................................................................... 155
Test your Competence ................................................................................................ 157

4
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Module 8 - A world of apps. Java: a bright star 159


A world of APPS .......................................................................................................... 159
Java: a software system for online multimedia ........................................................... 165
Java programming language ....................................................................................... 169
How to build applications and applets ......................................................................... 176
Security - cryptography ............................................................................................... 179
Revise & Check ........................................................................................................... 181
Test your Competence ................................................................................................ 183

Module 9 - It’s a wired world 185


Understanding networks ............................................................................................. 185
Networking devices .................................................................................................... 190
Topologies ................................................................................................................... 192
Long distance communications .................................................................................. 194
Properties of transmission .......................................................................................... 199
Revise & Check ...........................................................................................................203
Test your Competence ................................................................................................205

Module 10 - OSI and TCP/IP models 207


Bandwidth ...................................................................................................................207
The OSI and the TCP/IP models .................................................................................. 211
Revise & Check ...........................................................................................................222
Test your Competence ................................................................................................225

Module 11 - Graphics 227


Graphics technique ..................................................................................................... 227
Visual media: manipulating images .............................................................................230
Special software ..........................................................................................................237
Revise & Check ...........................................................................................................243
Test your Competence ................................................................................................245

Module 12 - Finding the right career path 247


IT in our lives ...............................................................................................................247
ICT in commerce and at work .....................................................................................255
Career opportunities for IT specialists .........................................................................257
Test your Competence ................................................................................................263

Clil 265

Glossary 296

Language Study 301

5
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Codice Fiscale: VSCGLI00H42C351O


Cognome: VISCONTI
Nome: Giulia

PRGXOH 0\FRPSXWHU
ROGSDVVLRQ
 QHZVDWLVIDWLRQ

In this module you will learn to:


t define what cloud computing is
t talk about data and information
t explain what a computer is
t define a system
t explain bits and bytes

From hardware to software:


what is a computer?
1. Activity | Explain
Cover the text and, using your own words and knowledge describe the
picture on this page; then read the text and explain to your partner what
“cloud” means. Swap roles.

Everything in a cloud

Today the word “cloud” appears in the field of computer


science with the name of “cloud computing”.
But what is it? In a very simple way we can say that it
is a service given to end-recipients on the Internet; the
service is represented by data and applications that are
stored on a cloud of computers.

Instead of going into a physical megastore you go into


a virtual one which has a lot of virtual shelves full of
e-books, films, papers, etc. in a word: megabyte, where
all the items remain on a server and cloud users access
the software from cloud clients.
(See Module 3)

7
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 0\FRPSXWHU ROG SDVVLRQQHZVDWLVIDWLRQ

2. Reading | Answer questions


©Jelle-vd-Wolf / shutterstock.com

Read the text about the definition of computer and then


answer the questions.

Is Facebook the Avatar of my computer?


Without the computer, Facebook, Youtube, Twitter and other
social networks wouldn’t exist. (See Module 3)
Personal computers are powerful creations that often seem to
have a life of their own. They respond to a seemingly magical
incantation typed at a C:›prompt or to a wave of a mouse by
performing tasks we couldn’t imagine doing ourselves without
some sort of preternatural help. But what is a computer? It is
an electronic device that takes data in one form, processes it,
and transforms it into information that is more useful than the
original data. And this being ICT, you have to make sure you know what” data” is and what
a computer does with it.
We can say that data is “information” that has no meaning. Suppose someone walks up
to you and gives you a piece of paper with 123987 written on it. The number could mean
absolutely anything. They might be telling you their birthday, or how much money you owe
them, or they might be giving you their phone number.
Data only becomes information when you know the context of the data. In conclusion:
Information=Data+Meaning.
Computers are machines that process data but don’t understand the data they process. If
you get a computer to process data that is incorrect, the results will be meaningless.
Computers only do what they are told to do. We often use the saying “garbage in, garbage out”
(Gigo for short) to say that if incorrect data is put into a computer, the computer will not realise
that it is incorrect so it will produce a strange answer. Some people call this “computer error”;
they are wrong: it is a human error. Computers hardly ever make mistakes. They just do what
they are programmed to do.

Answer the following questions:


1. What is a computer?
2. What is “data”?
3. When can we speak of“information”?
4. Can we say that computers are “stupid”?
Why? Why not?
5. Do computers make mistakes? What do you understand for
6. Who makes mistakes? “processing data”?
7. Explain the saying “garbage in, garbage out”. What we mean by “processing” is
8. Can computers be compared with robots? doing something to the data.
Why? Why not? Processing includes
1. doing calculations;
2. sorting things, objects, people etc;
data data is processed information
3. searching and selecting;
4. storing and/or rearranging data;
5. Drawing.

8
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

From hardware to software: what is a computer?

2 .................
1 .................

3. Activity | Label and speak


After labelling the objects in the following pictures using the
words below, choose your favourite “computer” and speak about
it for about two minutes explaining its advantages. Then explain
the disadvantages of the other computers.
Mainframe
Desktop 3 .................
4 .................
Portable
Laptop
Smartphone
5 .................

4. Activity | Speak and discuss


In pairs ask and answer the following
questions, then look at the picture below B

and discuss it with your partner explaining
how computers work. B 



1. Do you have a computer?


2. What kind of computer is it?
3. How often do you use it?


4. Can you imagine your life without one?





Why? Why not?




5. Do you use it for studying and/or playing?




6. Are you a computer and/or a videogame addict?

1 2
5. Activity | Match
Match the following words
to the right number in the
picture.
3
a. mouse
b. computer case
c. modem 7
d. printer
e. numeric keypad
f. monitor
g. speaker
6 5 4

a .... b .... c .... d .... e .... f .... g ....

9
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 0\FRPSXWHU ROG SDVVLRQQHZVDWLVIDWLRQ

6. Activity | Match
Match the first half of a sentence in column A with a second half in column B.

A B
a. the most widely used method of
1. The mouse is used
input
b. storage device that rotates, reads
2. The printer is
from and writes to disks

3. The keyboard is c. an output device

d. to move the cursor around the


4. The disk drive is
screen
e. the screen which is also called the
5. The editing keys are used
VDU

6. The monitor is f. to make changes to a document

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 ....

7. Writing | Complete
Complete the following sentences with words given in scrambled order.

output | screen | storage | system | keys | VDU | device

1. What is a monitor? It is the (1) .................. on which data is displayed.


2. A monitor is also called (2) ..................
3. A printer is a common output device that you use for printing the (3) .................. of
a computer on paper.
4. A (4) .................. for key data entry is called keyboard.
5. The set of (5) .................. used for moving around the screen and making changes
to a document are called editing keys.
6. A disk drive is a (6).................. device that rotates, reads from and writes to disks.
7. Hardware and software are the main parts of the (7).................. that work together.

8. Activity | Discuss
Have you ever seen the pictures below? Speak about them discussing
their pros and cons with your partner and with the help of your teacher.

10
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

From hardware to software: what is a computer?

9. Reading | Oral description


Read the passage about hardware and software and then describe the
components of a computer system and their purposes.You may start like this:
“A computer system consists of five basic components:
the …………… is used to ……………” etc.

Some technical terms: Hardware-and Software


All computers consist of five basic components. Four of these make up the computer’s
tangible equipment and are known as hardware. We can say that hardware is the term
used for the tangible elements or devices that make up a computer system. Basically these
devices may be split into:
- input devices, which are used to get the data into the computer;
- central processing unit or CPU, which has several functions;
- the ( backing ) storage ( memory ), which consists of the disk drives used to store data;
- the output devices, which include such units as printers and VDUs, which are used to
provide output in the form of printouts, screen displays etc.
These hardware components, however, cannot perform any function without the fifth
component, software. Software is more abstract in nature; it is a set of instructions that
directs the hardware to perform a specific task. Software is the word used for the actual
programs that allow the hardware to do a useful job. Software is the general name given to
all the programs that can be run on a computer hardware. There are two main categories of
software: operating systems and applications software.
Without software, hardware is useless. The arrangement of these devices in a typical
computer system is shown in the following figure:

Backing store

Central
Processing
Output device
Unit
CPU

Input device
(a simple computer system)

11
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 0\FRPSXWHU ROG SDVVLRQQHZVDWLVIDWLRQ

10. Reading | Put in order


While reading the information about “a system”, put the paragraphs in order.
A SYSTEM

A computer is a system, containing a number of subsystem. Computers in


...
use are always part of large systems

1 A computer is often referred to as a computer system

Those of you who play team sports will find the idea of a system easy to
... understand in these terms – a well-trained team is a system, a poorly trained
team is not

Essentially, a system is a collection of parts working together towards some


...
common goal

... Just as goals have sub-goals, so do systems have subsystems

A subsystem is a part of a system which accomplishes a part of the goals of


...
the system

... For example the braking system of a motor car is a subsystem of the car

11. Activity | Put in order


Put in order the letters and write the correct words.
1. yestsm................................................ 6. bsemustsys ........................................
2. liclncetoo ............................................ 7. rpta .....................................................
3. aglo ..................................................... 8. agibknr ................................................
4. edai ..................................................... 9. oacmortr (twowords) ..........................
5. atme ................................................... 10. garelr ..................................................

12. Writing | Find synonyms


Find synonyms in the previous information about a system that mean.
1. A set of similar things that you keep together ........................................................
2. Something that you hope to achieve in the future ...................................................
3. To prepare for a sport event .......................................................................................
4. Tosucceedindoingsomething...................................................................................
5. To make a vehicle go more slowly or stop ................................................................

13. Writing | Summary


Write a short summary of the information about “a system” following
these guidelines.
a. definition of a system
b. example of the idea of a system
c. definition of a subsystem
d. example of a subsystem

Begin like this:


A system is very often mentioned in connection with computers…

12
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

From hardware to software: what is a computer?

14. Reading | Answer questions


Read the passage about “computer systems” and then answer the questions
below.

Computer systems
A computer system is an integrated system of hardware and software that enables data to be
input, then processed and the results communicated to the user.
What happens at each stage can be summarized like this:
a. Data is entered at the input stage. At this point, information is converted into data before
it is entered into the computer. This might mean having to convert information into a code. For
example the date “26th September 1964” might be converted into 260964. In Microsoft’s Excel
program this date is given the code 23646, this is because it is 23646 days from January 1st, 1900.
The data that has been entered should be validated (checked) to make sure it is of the right type.
(e.g. a percentage should be between 0 and 100).The data should also be verified – in other words
it should be correct. (e.g. if the examination mark was 67% then 67 should have been entered.)
b. The computer then processes the data. Processing involves turning the input data into
something else.For example a set of examination results could be put into a computer which then
calculates the average score. Processing is carried out using the computer’s Central Processing
Unit (CPU).
c.The results are then shown at the output stage. Output is when the computer communicates
the results of the data processing to the user.The two most common ways are a screen display and
printed paper. At this point the data becomes information again.The information obtained at the
output stage might then be used as feedback to input more data.This turns the system into a cycle.

Answer the following questions:


1. What are the three stages in the processing of data called?
2. What happens when data is entered at the input stage?
3. Why should data be verified?
4. What does “processing” mean?
5. What happen at the output stage?

15. Speaking | Oral report


Study the diagram, memorise it and explain what happens at each stage.

FEEDBACK

DATA

input process output

INFORMATION

13
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 0\FRPSXWHU ROG SDVVLRQQHZVDWLVIDWLRQ

16. Reading | Answer questions and discuss


Read the text about manual information systems and answer the questions
below. Then discuss with your partner, about their pros and cons.

Manual information systems


Paper-based systems,also called:manual information systems,are getting more and more obsolete
because of their disadvantages.An example of manual information system is a telephone directory
where there are several hundred thousand entries, but if we know the surname and address of
the person we are trying to contact, we can find the number provided that it is in the directory. For
example:
Suppose you have a friend whose surname and phone number you know (Smith, 567-987654) but
you need to find his address. Unfortunately you know only his parents’surname, Smith, you don’t
know their first names.You could find the address following these steps:
a. look up the section for Smith,
b. start from the beginning and work through the phone numbers, looking for the area code, e.g.
look for 567 and see if the rest of the number coincides,
c. when the number has been found you can read off the address.
The conclusion is: to find the address would prove an immense and time-consuming task.
Here are some of the problems that a paper-based system has:
a. it takes up a lot of space - lots of gray filing cabinets,
b. searching for records can take a long time,
c. only one person can access the data at a time,
d. the data might get misfiled or even lost,
e. reports can be written - but only after looking at each relevant record and transferring
information by hand employing clerical staff to look after the filing system. So there is a good
chance of human error and time consuming.

Answer the following questions:


1. Is manual information system a time-consuming task?
2. How many people can access the data at a time in a paper-based system?
3. What about the data in such a system?
4. Is there a chance of human error?
5. Have manual information systems advantages or not? Why? Why not?

14
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

From hardware to software: what is a computer?

17. Reading | Answer questions and summarize


Read the text about computerized information systems and answer the
questions below. Then summarize it orally.

Computerized information systems


Computerized information systems are much more flexible and faster than manual ones. For
example: with a computerized system you can type in a phone number and, if the number was
stored in the system, the name and address are provided immediately so we can say that a
computerized information system is better than a paper-based one.
Let’s consider your school; in the secretaries’ office there will be a computer containing
information on all the students in the school. Here are some of the tasks that the system would
need to deal with:
a. the system must list a pupil’s personal details that includes: name, address, date of birth, name
of parents, daytime contact numbers, medical problems, mode of travel to school etc.,
b. the system must record the attendance details daily for all the pupils; it must be able to identify
pupils who have poor attendance records so that they may be investigated,
c. it must be possible to get information from the system to send letters to certain pupils,
d. it should be able to help organize a timetable,
e. it should cope with all the financial aspects of running a school, etc.
As we can see from the above list, a lot of work goes on behind the scenes in a school but the use
of a computerized information system gives the following advantages:
a. there is no need for gray filing cabinets,
b. searching for records is very quick,
c. more than one person at a time can access the same data from their network PC
d. the data stays within the computer’s memory, it will not get lost or misfiled,
e. fewer staff are needed to look after the computer system,
f. reports can be generated very quickly, often by an automated processing routine,
g. some information can be transferred to the system without using the keyboard but using an
optical mark reader.

Answer the following questions:


1. Are there any advantages in a computerized
system? Name them (if any).
2. Where does data stay?
3. Will it get lost?
4. How many people can access the data at a time?
5. Why can reports be generated quickly?
6. Can we use an optical mark reader instead of a
keyboard? What for?

15
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 0\FRPSXWHU ROG SDVVLRQQHZVDWLVIDWLRQ

Bits and Bytes

1. Reading | Find out


While reading the passage about“how transistors manipulate data”, underline:
- the definition of bit
- the definition of byte
- the meaning of “0” and “1”.

How transistors manipulate data


The transistor is the basic building block from which all microchips are built. A transistor is
essentially a vacuum tube on a microscopic scale; it requires less power to generate a flow of
electrons because it is a small device. Using less power, a transistor generates less heat making
computers more dependable.The microscopic scale of transistors means that a computer that once
took up an entire room now fits neatly on your lap.
The transistor can only create binary information: a 1 if current passes through, or a 0 if current doesn’t
pass through. From these 1s and 0s, called bits, a computer can create any number as long as it has
enough transistors grouped together to hold all the 1s and 0s. Binary notation starts off simply enough:

Decimal Number Binary Number Decimal Number Binary Number


0 0 6 110
1 1 7 111
2 10 8 1000
3 11 9 1001
4 100 10 1010

Personal computers, such as the original IBM PC and AT systems based on the Intel 8088 and
80286 microprocessors, are 16-bit PCs. That means they can work directly with binary numbers
of up to 16 places, or bits. That translates to the decimal number 65,535. If an operation requires
numbers larger than that, the PC must first break those numbers into smaller components,
perform the operation on each component, and then recombine the results into a single answer.
More powerful PCs, such as those based on the Intel 80386, 80486, and Pentium, are 32-bit
computers, which means they can manipulate binary numbers up to 32 bits wide (the equivalent
in decimal notation of 4,294,967,295). The capability to work with 32 bits at a time helps make
these PCs much faster and capable of directly using more memory.
Transistors are not used simply to record and manipulate numbers. The bits can just as easily
stand for true (1) or not true (0), which allows computers to deal with Boolean logic. (“Select
this AND this but NOT this”). Combinations of transistors in various configurations are called
“logic gates”, which are combined into arrays called “half adders”, which in turn are combined
into “full adders”. More than 260 transistors are needed to create a full adder that can handle
mathematical operations for 16-bit numbers.

16
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Bits and Bytes

Computers use a binary code (only 2 digits) to represent data. Usually a circuit that is switched on
represents the digit 1, and one that is switched off represents the digit 0.
Through these values you get binary logic, which allows a computer to actually “compute”. Bits are
grouped together to form a byte; this creates a series of on/off switches that tell the computer what
to do. We can say that the smallest unit of data that people handle is a byte, also called character; for
example: a letter (A), a digit (3), a pound sign (£).
Characters can be represented by an 8-bit (i.e.1 byte) ASCII code. For example a letter or number
could be represented by 01000100.

2. Writing | Answer questions


Read the previous passage on ”how transistors manipulate data” again
and then answer the questions below:
1. What is a transistor?
2. What does it generate?
3. Did a computer take up an entire room once?
4. The transistor can only create binary information; what does it mean?
5. What does it mean that Personal Computers are 16-bit PCs?
6. More powerful PCs are 32-bit computers; what is the advantage of such
computers?
7. Are transistors used simply to record and manipulate numbers?
8. What are “logic gates”?
9. How many bits are in a byte?
10. What is a character?

17
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 0\FRPSXWHU ROG SDVVLRQQHZVDWLVIDWLRQ

3. Reading | Fill in
Read the passage about “characters” and fill in the blanks with words
given in scrambled order.

characters | sets | numeric | special | code | combinations | IBM | both | pronounced

Characters
So (1) .................. characters are the digits 0 through 9;
Alphabetic (2) .................. are the letters of the alphabet and (3) .................. characters
are symbols and punctuation marks.
Two characters (4) .................. have become standardized:
ASCII (pronounced: ask-ee; the short form for American Standard Code for Information
Interchange) used on most personal computers and for data communications. It is a
numeric (5) .................. for representing symbols.
EBCDIC (6) ( .................. : ebb-suh-dick; the short form for Extended Binary Coded
Decimal Interchange Code). It is a numeric code for representing symbolic information
in computers. It is used primarily in (7) .................. mainframe computers. EBCDIC uses
patterns (8) .................. of eight bits per character, while ASCII generally uses seven
bits per character.
These standards are so widely used that many computers are designed to handle
(9) .................. of them.

4. Activity | True/False
After reading the previous passages and according to your information,
check if the following statements are true or false. Correct those that
are false.
T F
1. A bit can be used to represent two different things
2. Bits are too small for computers to handle conveniently
3. A dollar sign ($) is considered a numeric character
4. A byte is a pattern of bits used to represent a character
5. The ASCII code uses eight bits
6. EBCDIC isn’t used in IBM mainframe computers
7. ASCII and EBCDIC are standardized codes
8. Information must first be transformed into a binary representation of that
information before it can be stored in the computer’s memory
9. The standard EBCDIC codes and the standard ASCII codes are identical.
10. A character set is a list of all the characters that can be used with a
particular computer

Glossary
Character set is a list of all the characters that can be used with a particular
computer and the bit patterns that correspond to each of those characters.

18
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Revise & Check

5HYLVH &KHFN

1. Tick the right translation.


1. Paper - based system 4. To look after
□ a. carta basata su un sistema □ a. guardare
□ b. sistema basato su carta □ b. cercare
□ c. sistema di carta □ c. avere cura di …
2. Filing cabinets 5. Clerical staff
□ a. schedari □ a. personale impiegatizio
□ b. armadietti □ b. personale ecclesiastico
□ c. vetrinette □ c. personale di ricerca
3. Misfiled 6. Time consuming
□ a. registrato □ a. che consuma il tempo
□ b. archiviato male □ b. che il tempo consuma
□ c. perduto nella registrazione □ c. che richiede molto tempo

2. Fill in the gaps in the following sentences with words given in


scrambled order.

user | cursor | VDU | disk drive | keyboard | output | editing keys

1. The (1) .................. is the most widely used method of input.


2. The printer is an (2) .................. device.
3. The monitor is the screen which is also called the (3) ..................
4. The mouse is used to move the (4) .................. around the screen.
5. The (5) .................. are used to make changes to a document.
6. The (6) .................. is a storage device that rotates, reads from and writes to disks.
7. The (7) .................. clicks a button on the mouse to indicate that the application
or operation pointed to on the screen is selected.

3. Write questions to the following answers.


1. Q: ....................................
A: It’s the basic building block from which all microchips are built.
2. Q: ....................................
A: A flow of electrons.
3. Q: ....................................
A: Yes, it took an entire room.
4. Q: ....................................
A: It means that it has only two digits.
5. Q: ....................................
A: It’s the word used for the actual programs

19
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 0\FRPSXWHU ROG SDVVLRQQHZVDWLVIDWLRQ

7HVW\RXUFRPSHWHQFH

1. Fill in this passage about a brief history of computers with the


following words given in scrambled order.

circuits | capabilities | store | heat | smaller | ENIAC | tubes |


reliable | to program | large | Army | transistors

A brief history of computers


The first computer had limited (1) .................. it was (2) .................. , heavy and
produced considerable (3) .................. .
In 1945/46, the first machine to calculate at electronic speed was built by U.S.
(4) .................. ; it was called (5) .................. (Electrical Numerical Integrator And
Computer). While the first generation of computers used vacuum (6) .................. ,
which were bulky, the second generation, during the mid-1950s, used (7) .................. ,
which were (8) .................. and much more (9) .................. .
The third generation came along in the mid-1960’s; computers were developed with
equipment featuring microminiaturised (10) .................. improving internal (11) ..................
Another advance was the introduction of high-level languages (12) .................. the
computer.

2. Look at the pictures below and write a short report on the evolution of
the computer adding any personal comment and for further information
surf the net (allaboutstevejobs.com). Remember to name:
- People (person) who invented something;
- Things (thing) invented;
- Period (year) of invention.

Bill Gates: some important details


In 1968, seventh grader Bill Gates and ninth grader Paul Allen
were teaching the computer to play monopoly and commanding
it to play millions of games to discover gaming strategies.
Seven years later, in 1975, they were to set a course that would
revolutionize the computer industry.While at Harvard, Gates and
Allen developed a BASIC programming language for the first
commercially available microcomputer, the MITS Altair.

Steve Jobs:
“think different”
“stay hungry, stay foolish”

20
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

PRGXOH &RPSXWHU
%DVLFV

In this module you will learn to:
t talk about various types of computers
t understand the difference between
digital and analog computers
t discern the differences between special-
purpose and general-purpose computers

Computers take
many forms
Track
1. Listening | True/False 01
Keith Salvi is the Director of Product Marketing for Cloud
Solutions for a leading company in the area of business and
consumer networking hardware. Listen to what he says and do
the exercise. Correct the false statements.

1. There are not many forms of computers.


2. Only the PC on your table can be called a computer.
3. Smartphones are becoming more and more popular.
4. Mobile phones can only be used for phone calls.
5. Technology is making rapid progress.

Do you agree with Mr Salvi when he says that computers are


everywhere and take many forms? What is your personal view
about how far this technology goes? Discuss with your partner.

You can find useful to use these hints:


I think (that) ... My opinion is ... I’ve read that ...
Do you agree with me? ... I agree/disagree with ...

21
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 &RPSXWHUEDVLFV

2. Vocabulary | Useful words


When we speak of computers we use some special language. See what words
are familiar to you. Match the words with the appropriate definition.

WORDS DEFINITIONS
a. A special type of memory that can be erased and
1. Microprocessor
reprogrammed in blocks instead of one byte at a time.
b. The mechanism that reads and writes data on a hard
2. Storage
disk.
c. A type of display screen that has a touch-sensitive
transparent panel covering the screen. Instead of
3. Display
using a mouse or light pen, you can use your finger to
point directly to objects on the screen.
d. An area that holds materials going to /coming from the
4. Memory
computer.
e. A computer or device on a network that manages
5. Hard drive
network resources.
6. Battery-operated f. A silicon chip that contains a CPU
7. Flash memory g. Short for monitor.
h. A group of two or more computer systems linked
8. Touch screen
together.
9. 3D graphics i. Cellular (mobile) phone.
j. The section of the computer system that temporarily
10. Network
holds data and program instructions.
11. Server k. Working thanks to a battery.

l. The field of computer graphics concerned with


12. Cell phone generating and displaying three-dimensional objects in
a two-dimensional space (e.g., the display screen).

3. Reading | Activities
Read about the various types of computer
and do the activities at the end of the text.

Classification of computer
This is the broadly accepted classification of computer.
Computers are classified into four categories:

1. Mainframe Computers
2. Mini Computers
3. Micro Computers
4. Super Computers

22
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Computers take many forms

1. Mainframe Computers.
- They are big computer systems sensitive to temperature,
humidity, dust etc.
- Qualified & trained operators are required to operate them.
- They have wide range of peripherals attached.
- They have large storage capacity.
- They can use wide variety of software.
- They are not user friendly.
- They can be used for more mathematical calculations.
- They are installed in large commercial places or
government organizations.

2. Mini Computers.
- They have less memory & storage capacity than mainframe computers.
- They offer limited range of peripherals.
- Limited range of software can be used.
- The end users can directly operate it.
- They are not very sensitive to the external environment and hence are more generalised.
- They are used for data processing.

3. Micro Computers (or Personal Computers).


- They are cheap and user friendly.
- They are having limited peripherals attached to them.
- This type of computers can use wide range of software.
- They are used as desktops either in offices or even homes.
- Their operation can be easily learnt by anyone having logical aptitude.
- Children enjoy playing games & watching movies in these computers.
- Most popular micro computer’s processing chip manufacturing company is Intel.

23
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 &RPSXWHUEDVLFV

4. Super Computers.
- They are huge computers installed in space centres,
nuclear power stations etc.
- They are used for performing complex mathematical
calculations.
- Only scientists and mathematicians can operate them.
- They are having huge memories & tremendous processing
speed.
- They are used for whether forecasting, animation
graphics etc.

a. Answer the questions.


1. How are computers classified on the basis of their size, capacity and speed?
2. Write a brief note on mainframe computers.
3. What do you know about minicomputers?
4. Describe the main features and characteristics of microcomputers.
5. Write a brief note on supercomputers.
6. Distinguish between mainframe, mini, micro and supercomputers.
7. Mention the places where micro computers are used.

b. Tick as appropriate.
STATEMENTS MAINFRAME MINI MICRO SUPER
1. They brought revolution
in the history of
computers.
2. They are used for data
processing
3. Their range of
peripherals is not very
much extended.
4. You can find them in a
space centre.

5. Qualified operators can


operate them.

6. Scientists can operate


them.

7. You can find them in


offices.

8. Their weak point can be


dust and humidity.

24
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Analogue to digital and viceversa

Analogue to digital
and viceversa
1. Activity | Read, write & speak.
a. Read the text and do the exercise.
b. Then cover the text and just look at the picture.Tell your partner how analog/
digital/analog converters work. Your partner will help you with questions.
Then swap roles.

Computers extract information from the world around them by using


devices such as microphones and photosensitive diodes to detect
changes in energy levels.
In both devices the energy (from sound waves or light) converts into an
electrical current. The current is in an analog form, made of continuous
changing voltages.
Computers are designed to manipulate digital data - specific values are
expressed in real numbers. A computer must convert all analog input
it receives into digital values before the PC can use it. Viceversa, many
of the results of the computer’s digital manipulation must be converted
back to analog when it becomes output.

Write the appropriate questions to these answers.


1. By using devices such as microphones and photosensitive diodes
2. To detect changes in energy levels.
3. An electrical current.
4. Because it is made of continuous changing voltages.
5. Because computers are designed to manipulate digital data.
6. When it becomes output.

25
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 &RPSXWHUEDVLFV

2. Reading | Activities
Read the text to understand the difference between analogue and digital
signals, then do the activities.

Analogue1 to digital conversion


and digital to analogue.
An electronic device is digital if data in it is represented as electrical
“on” and “off” signals that correspond to binary digits and can be stored
in computer memory. The data is therefore represented as a succession
of 1s and 0s.
A device is analogue where data is represented as signals that vary
within a predefined range. Traditional watch faces are analogue. The
hands move continuously round a dial, within the predefined range of
set seconds (0 to 60), minutes (0 to 60) and hours (12 or 24 in total). Time
is represented by the position of the hands on the dial.
Many modern watches have a digital display, in which time is represented
by the digits shown on a small display screen.
Digital signals have two advantages:
r they can be copied exactly, without even the slightest loss of quality
r they can be further processed by computer.

All modern, general-purpose computers are digital,


but analogue computer circuits are used in industrial control
equipment.
A digital computer is more accurate than an analogue computer because
it only needs to sense the difference between clearly distinguishable
states. For example, a slight fluctuation in electrical voltage would affect
the result in an analogue computer but would not affect a digital computer
because it could still easily distinguish the 1 state from the 0 state of any
circuit element. For the same reason digital music reproduction (as on a
CD) is more accurate than analogue reproduction (on a traditional vinyl
record or cassette tape).
Digital is the wave of the future because it gives us an accurate way to
represent data and an easy way to store and manipulate that data. Two
other advantages of digital technology are the recording does not degrade
over time and the digitized information can often be compressed. To
conclude, we can only say that the move into a digital world is inevitable.

1
analog (AmE), analogue (BrE)

a. Write the English words in the text corresponding to the Italian ones.

lancette distinguibile
quadrante influire su
lieve predefinito
perdita gamma

26
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Analogue to digital and viceversa

b. Complete the sentences with words in the text.

1. A signal is ......................... if data in it is represented as electrical ‘on’ and ‘off’


......................... that correspond to ......................... digits.
2. The data is represented as a ......................... of 1s and 0s.
3. ......................... signals are represented as ......................... that vary within a
predefined ......................... .
4. Traditional watch faces are ......................... .
5. ......................... signals can be copied exactly with no ......................... of quality.
6. Digital signals can be further ......................... by computer.
7. A ......................... computer is more accurate than an ......................... computer.
8. A digital computer can easily ......................... the 1 state from the 0 .........................
of any circuit ......................... .
9. ......................... is the wave of the future because it gives us an accurate way to
represent ......................... and an easy way to ......................... and manipulate that
data.
10. The advantages of ......................... technology are the recording does not
......................... over time and the digitized ......................... can often be compressed.

c. Oral work. In pairs, ask and answer about the difference between analogue
and digital signals.

3. Activity | Read & talk


Read the text. Then in a small group exchange your ideas about smartphones
and tablets. Which is your favourite? If you use both, when or where do you
use them?

What is a smartphone ...


A smartphone is a device that lets you
make telephone calls, but also adds in
features that, in the past, you would
have found only on a personal digital
assistant or a computer--such as the
ability to send and receive e-mail and
edit Office documents, for example.
To understand what a smartphone
is (and is not), we should start from
the beginning when there were cell
phones and personal digital assistants
(or PDAs). Cell phones were used for
making calls--and not much else--while PDAs were used as personal,
portable organizers. A PDA could store your contact info and a to-do list,
and could sync with your computer.
Eventually, PDAs gained wireless connectivity and were able to send and
receive e-mail. Cell phones, meanwhile, gained messaging capabilities, too.
PDAs then added cellular phone features, while cell phones added more
PDA-like (and even computer-like) features.The result was the smartphone.

27
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 &RPSXWHUEDVLFV

... and a tablet?


A tablet computer, or simply tablet, is a one-
piece mobile computer. Devices typically have
a touchscreen, with finger or stylus gestures
replacing the conventional computer mouse.
It is often supplemented by physical buttons
or input from sensors such as accelerometers.
An on-screen, hideable virtual keyboard is
usually used for typing. Tablets differentiate
themselves by being larger than smart phones
or personal digital assistants.

General-purpose
vs. Special-purpose computers
1. Reading | Activities
Let’s consider what computers can do. Read the text and do the activities.

General-purpose
vs. Special-purpose computers
Most special-purpose computers are used to
control things. They exist as tiny chips, embedded
in some device, which help the device to operate
smoothly. Frequently, they control timing (alarms
and spark plugs), temperature (thermostats,
dishwashers), digital readouts (speedometers,
scales, and watches), various sensors (car door
closed or seat belt fastened), and diagnostic
Grape - 4 devices (echocardiogram machines and fuel level indicators). Each
is a special special-purpose computer performs only the task it was built to do in
purpose that specific device.
computer for
astrophysical
simulations A general-purpose computer, on the other hand, can do many things.
For example, the same general-purpose computer that performs word
processing can be used to control an assembly line or to perform
statistical analysis of numerical information. The desktop or laptop
computer we use today is a general-purpose computer of extraordinary
flexibility, capable of performing numerous different tasks, often
simultaneously. Its computational power might be compared to that
of larger commercially available machines, lacking only the multiple
processors that give supercomputers their legendary speed and
power. Today, personal computers and workstations can do anything
supercomputers do, only more slowly.

28
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

General purpose vs. Special purpose computers

a. Match the English words with the Italian equivalents given in scrambled order.

eseguire | schermo | minuscolo | carburante | mancare


spina di scintilla | incorporato | disponibile

tiny .......................................................... spark plugs ..............................................


fuel .......................................................... available ..................................................
embedded ............................................... readout ....................................................
performs ................................................. lacking .....................................................

b. Decide if the statements are true (T) or false (F). If false, provide the
right version.
T/F Right version
1. A special-purpose computer is
designed to be used in a limited
way
2. An example of special-purpose
computer is a PC

3. Speedometer is a sensor
4. Each general-purpose computer
performs only the task it was built
to do in that specific device.
5. The difference between a desktop
computer and a supercomputer is
simply that the first can be easily
found on the market.
6. A PC can do the same things as a
supercomputer.

c. Work in pairs. Ask and answer on general-purpose vs special-purpose


computers. Then swap roles.

2. Speaking | Just to laugh


Do you think that reading has
more to do with special-purpose
or general-purpose computers?
Discuss with your partner.

29
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 &RPSXWHUEDVLFV

5HYLVH &KHFN
1. Read and insert the appropriate words.
keyboard | calculations | code | abacus | user | programmers | input | hardware
automatic | electronic | hand | instructions | output | information | software

A computer is a machine that is able to take information ( ................. ), do some


work on or make changes to the information, to make new information ( ................. ).
Computers have existed for much of human history. Examples of early computers are
the astrolabe and the ................. .
Modern computers are very different from early computers. They are now very
powerful machines that are able to do billions of ................. every second. Most
people have used a personal computer in their home or at work. Computers are
useful for many different jobs where ................. functions are useful. Some examples
are controlling traffic lights, vehicle computers, security systems, Washing machines
and Digital Televisions.
A person (called a ................. ) can control a computer by telling it to do things.
Some ways of controlling a computer are with a ................. , mouse, buttons,
touch screen. Some very new computers can also be controlled with voice
commands or hand gestures.
Computers can be designed to do anything with ................. . Computers are
used to control factories, which in the past were controlled by humans. They
are also in homes, where they are used for things such as listening to music,
reading the news, and writing.
Modern computers are ................. machines. A computer is only useful if it has both
hardware and software. ................. is the physical parts the computer is made of -
for example keyboard, mouse, screen, tower, and the circuits inside it. ................. is
the computer programs (mathematical ................. ). Software uses the hardware by
taking input and changing it in to useful output.
Computers are able to do billions of calculations each second. They can do
mathematical arithmetic very quickly but computers do not really “think”. They only
follow the instructions in their software programs.
Computer programs are designed or written by computer ................. . Computer
programs can be written in the computer’s own language called machine code.
Machine Code has only a few instructions and is based on logic and Mathematical
arithmetic. Using machine ................. is difficult for most human programmers.

2. In pairs, ask and answer about the four categories of computers.


Then swap roles.

30
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Revise & check

3. Underline the correct answer.


1. A computer must convert all analog/digital input it receives into analog/digital
values before the PC can use it.
2. Most results of the computer’s analog/digital manipulation must be converted to
analog/digital when it becomes output.
3. Analog/digital signals can be further processed by computer.
4. Traditional watch faces are analog/digital.
5. Analog/digital music reproduction, as on a CD, is more accurate then analog/digital
reproduction as on a traditional vinyl.
6. Analog/digital is the wave of the future because it permits to represent data
accurately and that data can be stored and manipulated in an easy way.
7. Thanks to analog/digital technology the recording does not deteriorate over time.
8. General-purpose/special-purpose computers perform exclusively the task that
were built to do in a certain device.
9. A laptop computer is a general-purpose/special-purpose computer.
10. General-purpose/special-purpose computers come in the form of tiny chips
inserted in some device.

4. Work in pairs. For each picture say if it is (or has) a special-purpose


computer and explain why. Swap roles.

Example: a speedometer
It is a special-purpose computer because it can only be used to inform about speed,
but it cannot be used to make coffee or to send e-mail.

31
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 &RPSXWHUEDVLFV

7HVW\RXUFRPSHWHQFH

1. You are asked by one of your friends to summarize the content of this
module. Send him/her an email with three paragraphs that contain the
following information:

t the four categories of computer and their most important characteristics


t the difference between analogue and digital converters
t the difference between general-purpose and special-purpose computers

Be clear and concise.

2. In pairs, first identify the type of computer, then describe each type
of computer and its characteristics. Remember to swap roles.

1 2

32
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

PRGXOH %RRWXS
SURFHVV

In this module you will learn to:
t understand the concept of the von Neumann
computer
t describe types of input and output devices
t describe key features of keyboards, scanner,
printers and other input and output devices, as
well as some of the differences among them

Input devices
1. Approach | Read
The diagram introduces some basic concepts of computer
hardware.

Primary Memory

Input device CPU Output device


Central Processing Unit

The majority of digital computers are based on this model, often called the von
Neumann-type computer, after the mathematician John von Neumann. The diagram
illustrates two key points about this model: (a) programs and data are stored in the
same location, called the primary memory; (b) the computer can perform only one
instruction at a time.

The parts of the computer receiving information or programs to be used are called
the input units. The computation is performed in the central processing unit. Other
parts of the computer provide the results of computation to the person using the
computer: these are called output units. The input/output of a computer is often
referred to as I/O.

Can you name some input hardware devices?

33
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 %RRWXSSURFHVV

2. Writing | Complete
Complete the sentences with words taken from activity 1.

1. The Von Neumann-type computer is a .................... so called after the ....................


John Von Neumann.
2. According to the model .................... and .................... are stored in the primary
.................... .
3. Another important point is that the computer can perform only one ....................
at a time.
4. The input units are the parts of the computer receiving .................... or ....................
to be used.
5. The .................... takes place in the .................... .................... unit.
6. The output units are the parts of the computer providing the .................... of
computation.

3. Writing | Identify & match


Write the names of the various components of
the keyboard in the provided spaces with the
help of the list in scrambled order.

Cursor control keys | Keyboard cable


Keyboard feet underneath | Function keys
Numeric keypad | Alphanumeric keys | Space bar
Caps lock key | Page up and Page down keys
Return or Enter key | Shift key

The most popular input


devices are the keyboard
and the mouse.

34
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Input devices

Track
4. Listening | Complete 02
Before listening try to complete the text. Then check your answers.

Mice and the like ...

optical | clicked | surface | buttons | pointer | drag


command | speed | ball | touch-sensitive pads

Most people find using a mouse easy. A mouse has


two main parts:

1. There are usually two or three .................... When


the pointer is over an icon, menu item or the edge of a
picture, the mouse buttons can be .................... or double-
clicked. This gives the computer a .................... . A button
can also be held down to ....................
something across the screen.

2. Mice record the .................... and


direction in which they are pushed.This is used to move the ....................
on the screen. .................... mice have an optical sensor underneath
and work out their movement by watching how the .................... below
them moves. Older mice use a .................... . Laptops have ....................
or tracker balls.

5. Activity | Read & Match


After reading the text do the activity.

Scanner
A scanner is a device used to examine methodically, or scan,
pictures, text, or other information and send them to the computer
as accessible data.The data can then be manipulated in some way
before being printed.
There are two main types of scanner:
r )BOEIFME EFWJDFT that are moved across the source material
being scanned.
r 'MBUCFE TDBOOFST that look and work like a photocopier, except
that they produce a computer file instead of paper output.

OCR (Optical Character Recognition)


OCR software takes the scanned digital information and looks for
familiar patterns that might make up letters or numbers. Each recognised letter or number
is encoded in a format that means it can be edited using word-processing software. This
makes it quick and easy to enter large blocks of text. But the software is not perfect, so the
result needs to be proofread.

35
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 %RRWXSSURFHVV

Match the definitions with some of the terms in the previous activity.
1. convert an object or image into a digital image
2. model, form
3. put data into a digital form
4. prepare for publication
5. read and correct mistakes

6. Writing | Complete
See if you recognise these input devices. Place the appropriate headings
in the spaces.

a. magnetic data entry d. voice input device


b. light pen e. digitizer tablet
c. bar code f. touch screen

1. It is a monitor screen that allows users to interact with a computer system by


touching an area of the display.
2. It is a device used by pointing it at the display
surface.
3. It is a drawing device used to sketch new images
or trace old drawing or photograph.
4. It is represented by sets of parallel bars of varying
thickness and separation. This is used for fast
identification of items with an optical scanner.
5. There are two technologies in it. A magnetic ink
character recognition (MICR) technology reads iron
oxide ink pre-printed or encoded on cheques or on
Modern bar code
documents. Another form is the magnetic stripe
technology that makes computers read credit
cards.
6. It uses a voice recognition technology that converts a user’s speech into a digital code.

1 .... 2 .... 3 .... 4 .... 5 .... 6 ....

7. Speaking | Oral report


Prepare an oral report on input hardware devices with the help of the
activities on the previous pages.

8. Mini-project | Design a poster


Design a poster illustrating the various types of input hardware devices.
You may add any further devices you have learnt.

36
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Output devices

Output devices
1. Approach | Read

An Output Device is any device that allows


the results of a PC’s processing activity to be
seen or heard. Typical examples are the VDU
(visual display unit or monitor), printer, plotter,
speakers and speech synthesisers.

2. Activity | Read & Complete


Read and complete the text below with the
appropriate words provided.

A monitor or a display (also called screen or visual display unit) is an electronic


visual display for computers. The monitor comprises the display device, circuitry
and an enclosure. The display device in modern monitors is typically
a thin film transistor liquid crystal display (TFT-LCD) thin panel,
while older monitors use a cathode ray tube (CRT) about as
deep as the screen size.
A monitor’s picture quality or resolution varies
depending on the number of pixels (i.e., picture
elements, dots of light on the screen). The higher the
resolution the better the picture.
For display screens used with computers and other
electronic devices there are a number of technologies
designed to create displays that are more visible, while
using less energy. Some of these technologies are based
on organic light emitting diode (OLED) technology.
OLED displays are made from organic (carbon based)
materials that emit light when electricity is applied.
Because OLEDs do not require a backlight and filters
(unlike LCD displays),they are more efficient,simpler to make,
and much thinner. OLEDs have a great picture quality - brilliant
colours, fast response rate and a wide viewing angle.

Complete the text. Two elements are intruders.

smaller | pixels | light | resolution | organic


text and images | CRT | picture | pixel | LCD

A monitor displays .................... on the screen. In notebooks you can generally find an
.................... monitor, while .................... monitors are almost as large as TV screens.
Resolution is measured by the number of horizontal and vertical .................... .
A .................... is the smallest element on the screen: It is short for ....................
element. OLED displays use a layer of .................... material which emits a visible
.................... when electric current is applied.

37
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 %RRWXSSURFHVV

3. Reading | True/False
Read about printers, then do the activity at the end of the reading.

Printers (1)
Monitors have two major limitations as output devices: (1) only a small
amount of data can be shown on the screen at one time, and (2) output,
being in soft-copy form, is not portable. You must be physically present
at a monitor to get any results. Printers overcome these limitations by
producing hard copy - a permanent record of output.
Printers are either impact or non-impact. Impact printers print by
hitting an inked printer ribbon against the paper. Non-impact printers
press ink onto the paper.

Laser (BDSPOZN PG -JHIU "NQMJàDBUJPO CZ 4UJNVMBUFE


&NJTTJPO PG 3BEJBUJPO) Printers are especially popular
in business because of their speed and quality of text
output. They form images in the same way as copying
machines. They use a laser beam (an intense beam of
electrical power, or charge) on a roller called a drum.
Toner sticks to the dots of charge, and the toner-covered
drum is then pressed against the paper. The fusing
system fixes the toner permanently.

ink-jet printers work by spraying thousands of small


droplets of electrically charged ink onto a page to
form images. For the past several y ears, ink-jet printing has been the
technology of choice for those who want to produce affordable colour
with a PC. The principal advantage of ink-jet printing is cost. There are
also disadvantages. Texts can take
longer to output than on a laser
printer and cartridges have a cost
that can constitute a problem if you
use a lot of colour in your work.

The all-in-one device: Print,


Fax, Scan and Copy. These
multifunction devices which
include both input and output
are popular in the small office/
home office environments and in
other settings where the space is
reduced. The popularity of the all-
in-one device has exploded since
the print/scan/copy quality and the
speeds of the all-in-one are now
comparable to that of the separate
devices.

38
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Output devices

Decide if the statements are true or false. If they are false, provide the
appropriate version.

T/F Right version

1. Monitors are more advantageous


than printers as monitors produce
permanent records of output.

2. Impact printers press ink onto the paper.

3. If you need speed and quality of text


output your choice is a laser printer.

4. Laser printers use cartridges.

5. Ink-jet printers are more expensive


than laser printers.

6. Texts take longer to output on a laser


printer than on an ink-jet printer.

7. The major problem with ink-jet


printers is the cost of cartridges.

8. All-in-one printers are becoming


more and more popular.

4. Speaking | Describe and comment


With your partner discuss the pros and cons of the printers as illustrated
in the picture ‘Printer Summary’.

3ULQWHU 6XPPDU\

39
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 %RRWXSSURFHVV

5. Reading | Activities
Read something more about printers and do the activities

Printers (2)
Another output device is the Plotter which is primarily used to produce
charts, drawings, maps, three-dimensional illustrations, and other forms
of graphics-oriented hard copy. The two most common types of plotters
are ink-jet and electrostatic plotters. An ink-jet plotter, the prevalent
type, uses ink-jet technology to create images, while electrostatic plotters
work in a similar way to copying machines. Electrostatic plotters are much
faster, but more flat bed plotter expensive than ink-jet plotters.

3d Printers create a three dimensional object by building it layer


by successive layer, until the entire object is complete. Each of these
layers is a thinly sliced, horizontal cross-section of the eventual object.
Imagine a multi-layer cake, with the baker laying down each layer
one at a time until the entire cake is formed. Each 3D-printed object
begins with a digital Computer Aided Design (CAD) file, software then
slices the design into hundreds or thousands of horizontal layers. The
3D printer reads this file, and proceeds to create each layer exactly to
specification. As the layers are created, they blend together with no
hint of the layering visible, resulting in one three dimensional object.

Dot-Matrix Printers create characters by striking pins against ink ribbons. Each pin makes
a dot and combinations of dots from characters and illustrations.This is much like a typewriter.
Each character is made from a matrix of dots. Today, dot matrix printers are not used by many
people anymore.They are still in use where forms with multiple copies need to be filled out.

Thermal Transfer Printing is a digital printing process in


which material is applied to paper (or some other material)
by melting a coati ng of ribbon so that it stays glued to the
material on which the print is applied. It contrasts with direct
thermal printing where no ribbon is present in the process.
Usage of TT printers in industry includes:
- barcode labels (as labels printed with thermal printer tend
not to last long), or for marking clothing labels (shirt size etc.)
- printing plastic labels for chemical containers (because the
cheaper types of plastic would melt in a laser printer)

An Imagesetter is an ultra-high resolution large-format computer output device. It


exposes rolls or sheets of either photographic film or bromide paper to a laser light source.
Once the film or paper is developed, a very high quality black
and white image is revealed. Development (processing) usually
occurs in a unit separate to the imagesetter, as does raster
image processing.
What is a raster image processor?
A Platesetter is a machine which receives a raster image from
a raster image processor and, in turn, creates a lithographic It is a device or piece of software
plate suitable for use on an offset press. that changes text and images to a
form in which they can be printed.

40
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Output devices

Activities
a. Find which type of printer each person of the activity is talking about.
1. Please order some more toner for the printer on the second floor.
2. We’re almost out of bar codes, can you print some more?
3. As soon as the client approves this version, you need to print a high-colour copy
for them to check.
4. The plans for the new office building are almost ready. Shall I print a copy for the
meeting tomorrow?
5. I was in the middle of printing my report when I ran out of ink.
6. Print off another set of address labels for me, would you?
7. This job is ready to go. Can you output it directly to the printing plates for me?
8. If you want to turn your ideas into real objects, from shoes to jewellery, you must
absolutely use it.

1 ......................... 2 ......................... 3 ......................... 4 .........................

5 ......................... 6 ......................... 7 ......................... 8 .........................

b. Use the comparative form of the adjectives in brackets to complete the


description of the various types of printers.
1. Dot-matrix printers are (noisy) than laser printers.
2. Inkjets are (small) than imagesetters.
3. Imagesetters are (convenient) than platesetters, as you still need to print a film
before making the printing plates.
4. Laser printers are (expensive) than inkjets.
5. Thermal transfer printers are (good) for printing bar codes than dot-matrix printers.
6. Ink-jet plotters are (fast) than electrostatic plotters.
7. 3D printers are much (sophisticated) than dot-matrix printers.

1 ......................... 2 ......................... 3 ......................... 4 .........................

5 ......................... 6 ......................... 7 .........................

c. Fill in the spaces with the words provided. Be careful: there are two
intruders.

consumables | papers | temporary | inks | running


dots | durables | pages | speed | permanent

Printers provide output in the form of .................... copy. Printers are chosen because
of their purchase and .................... cost alongside their printing .................... and
resolution. Printing speeds are usually expressed as the number of .................... per
minute. Resolution is often expressed in terms of the number of .................... per
inch (dpi). The larger the number of dots the higher the resolution. All printers use
.................... that need replacing.These can take the form of the paper, card or acetate
they print on and the ...................., ribbons or toner they use to form the printed
image. Some printers, such as ink-jet printers need special coated .................... to
achieve the best results. These are more expensive and add to the running costs.

41
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 %RRWXSSURFHVV

5HYLVH &KHFN
1. Circle the appropriate answer
a. alphanumeric keys
1. These components of a keyboard can be
b. function keys
programmed to do special jobs
c. cursor control keys
a. moves a document up and down
2. The shift key b. puts a space between characters
c. changes the functions of other keys
a. joystick
3. This pointing device is often preferred to a mouse
b. trackball
because it requires little space to use.
c. light pen
a. stores images
4. A mouse b. shows data
c. moves a pointer
a. flatbed
5. The scanner that works like a photocopier is b. drum
c. handheld
a. magnetic reader
6. This device provides a quick method of recording
b. smart card
the sale of items in supermarkets
c. bar code
a. magnetic reader
7. This stores phone numbers in cellular phones b. smart card
c. voice data entry
a. MICR
8. Banks use it to process cheques. b. credit card
c. magnetic reader
a. digital camera
9. With this device, a paralysed person can operate a
b. voice data entry
wheelchair or control heating and lighting
c. MICR
a. keyboard
10. The QWERTY pattern is typically found in a b. mouse
c. magnetic reader
a. direct entry
11. A POS terminal is an example of? b. keyboard entry
c. a and b
a. scanning device
12. A mouse, touch screen, and a trackball are all
b. pointing device
examples of …
c. output device
a. digitizer tablet
13. This makes computers read credit cards b. hand-held device
c. magnetic stripe technology
a. mark recognition device
14. The device that would be used to read a mark-sense
b. bar-code reader
answer sheet for an online interactive test would be
c. image scanner

42
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Revise & check

2. Choose the appropriate answer.


1. The most suitable output device to quickly produce a large amount of high quality printout is
a. an inkjet printer b. a laser printer c. a dot matrix printer d. a plotter
2. The most suitable output device for an architect to produce large plans would be
a. an inkjet printer b. a laser printer c. a dot matrix printer d. a plotter
3. The most suitable input device for highlighting/selecting an object on the screen is
a. joystick b. mouse c. keyboard d. touch screen
4. Magnetic Ink Character Recognition is often used on
a. till receipts b. photographs c. cheques d. barcodes
5. Multiple choice answers on a test paper can be input using
a. a Barcode Reader b. an Optical Mark Reader
c. Magnetic Ink Character Recognition d. Magnetic Stripe Reader
6. The most suitable input device for inputting a short report would be a
a. mouse b. scanner c. keyboard d. concept keyboard
7. The most suitable output device for producing a wage slip printed on a carbonised paper is
a. an inkjet printer b. a laser printer c. a dot matrix printer d. a plotter
8. The most suitable output device for producing a few colour brochures cheaply would be
a. an inkjet printer b. a laser printer c. a dot matrix printer d. a plotter
9. In order to create a digital image from a paper photo you’d first need to input it using a
a. scanner b. joystick c. digital camera d. touch screen

3. Read the text and insert the appropriate words given below.

expanding | translate | playing | processes


understand | communicate | analyze | translates

We normally .................... directly or


indirectly with computers through input/
output devices. Input devices ....................
our data and communications into a form
that the computer can .................... . The
computer then .................... these data,
and an output device .................... them
back into a form we can understand.
Input/output devices are quietly
.................... an increasingly significant
role in our lives. Their number and variety
are .................... . Did you know that there
is an electronic nose that can measure
and digitally record smells? It’s used to
.................... aroma in the food, drink, and
perfume industries. Another example is
the ATM (Automatic Teller Machine). Do
you need money? With the help of the
ATM’s keyboard and monitor you will
have an interactive conversation with the
bank’s computer.

43
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 %RRWXSSURFHVV

7HVW\RXUFRPSHWHQFH

1. For each definition find out the right device and indicate if it is input
or output.

Device Definition Input/Output

produces charts, drawings, maps, three-dimensional illustrations


and other forms of graphics-oriented hard copy.

converts information generated by the computer into visual


information.

a pointing device composed of a lever that moves in multiple


directions to navigate a cursor or other graphical object on a
computer screen

provides audio output for multimedia applications

uses light-sensing equipment to convert images such as a picture or


text into electronic signals that can be manipulated by a computer.

a device for converting sound into signals that can then be stored,
manipulated, and played back by the computer
a device that connects a computer to a telephone line or cable
television network and allows information to be transmitted to or
received from another computer.

take text and image from a computer and print them on paper.

a typewriter-like device that allows the user to type in text and


commands to the computer.

a pointing device designed to be gripped by one hand. It enables


the user to control the motion of a cursor, by moving it on a flat
surface.

2. Mini-project:
a Power Point presentation.
Prepare a Power Point presentation on input
and output hardware devices.
You may add any further devices you have
learnt.

44
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

PRGXOH
7KHLQIRUPDWLRQ
 VXSHUKLJKZD\

In this module you will learn to:


t talk about the Internet and its historical
beginnings
t identify the resources available on the Internet
explain the particular prominence of the World
Wide Web
t talk about cloud computing
t name and describe a variety of tools available on the
Internet including Tumblr, Facebook and Twitter

Interconnected networks
Track
1. Listening | Complete 03
Before listening, try to complete the passage with the words given in
scrambled order. Then listen to an expert talking about the Internet.

village | computers | Net | access | organisations


wired | networks | connected

The Internet is a worldwide collection of interconnected networks.


It’s actually composed of millions of independent ......................... at
academic institutions, military installations, government agencies, What can you do on the
Internet?
commercial enterprises, Internet support companies and many other
You can talk to your relations in
types of ......................... . Just how big is the Internet? The number of
Australia, send your friends a
people using the Internet is now in the billions. The ......................... links
photo, play games with people
over a million networks with Internet host server ......................... in every you’ve never met, conduct
country in the world. Each host computer, an Internet server computer, research for a school report,
is ......................... to the Internet 24 hours a day. Thousands more link up find friends on Face book. The
to the global network each month. In America, over 99% of the schools possibilities are endless.
have Internet ......................... that is made available to students. The
Internet has created a global ......................... in which nations around
the world are taking steps to increase Internet access. In a few years the
whole world will be ......................... .

45
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHLQIRUPDWLRQVXSHUKLJKZD\

2. Activity | Match & speak


Here’s a series of opinions on the Internet. Read and match each text with
the appropriate title.
Titles
a. A collection of services d. A network of computers
b. An information resource e. A communication system
c. A community of uses

a. ....................................................................................................
The Internet is the world’s biggest network, linking every continent. People who meet on the Net
are said to meet in cyberspace – a non-physical ‘space’ created by computer systems.
b. ....................................................................................................
The Internet contains information on an enormous range of topics of interest, and huge amounts
of data are constantly being transferred between computers on the Internet. For this reason it is
sometimes called the information superhighway, especially in the media. The World Wide Web
is the main source of information on the Net.
c. ....................................................................................................
Many services, such as the World Wide Web, FTP, e-mail and Usenet run on the Internet, using
different protocols.
d. ....................................................................................................
The Internet links users all over the world using fast and relatively cheap forms of communication.
Electronic mail (or, more commonly e-mail) is the most widely used service on the Internet, but
people also use other forms of communication on the Internet such as newsgroups, chat rooms
and online forums.
e. ...................................................................................................
The Internet can be understood as a kind of community of people all over the world. People often
make friends on the Net with people in distant countries, and there are thousands of special
interest groups whose members use the Internet to keep in touch with each other.

Which of these five aspects do you prefer? Why? Exchange ideas with your
partner.

3. Activity | A Net crossword


Solve the crossword puzzle using the words that the definitions suggest.
If the terms are correct, you will find a really secret word!

1. V
2. C
3. E
4. H
5. O
6. K
7. C
8. E

46
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Interconnected network

1. You can access the Net by paying this company.


2. To find information on a computer.
3. A computer that serves other computers on a network.
4. Any computer that is connected to the Internet.
5. A program like Netscape Navigator.
6. People who work together using a computer network.
7. You have to use it if you want to transmit data over the Net.
8. It allows to send computer data down a telephone line.

What is the secret word?

4. Reading | Take note & answer


How was the Internet originated? Read the passage
and do the activities.

A Brief History of the Internet

The Internet may be a recent media phenomenon but as a concept it’s actually older than
most of its users.

It was 1957, at the height of the Cold War. The Soviet had just launched the first Sputnik,
thus beating the USA into space. In response, the US Department of Defence formed the
Advanced Research Projects Agency (ARPA), a project to develop a military research
network to keep military units connected in case of atomic attack. In those days, no one
had PCs. The computer world consisted of a computer linked to another to share the
information.

Twelve years later, a lot happened, including the first landing on the moon and Woodstock.
A small group of computer scientists on both coasts of the United States was busy creating
a national network that would permit the scientific community to share ideas over
communication links. ARPA developed into ARPANET, a project to use technology to
unite a community of geographically dispersed scientists.

Over the next decade, research agencies and universities joined the network. In 1973 the
network crossed the Atlantic to include University College London and Norway’s Royal
Radar Establishment. The 1970s also saw the introduction of electronic mail and what
would become the Usenet newsgroups.

In 1981, the ARPANET linked 200 sites. In 1986 an important development took place, when
the US National Science Foundation established NSFnet by linking five university super-
computers at the speed of 56 Kbps. This opened the gateway for external universities to
make use of superior processing power and share resources.
In the three years between 1984 and 1988, the number of host computers on the Internet
(as it was now being called) grew from about 1000 to over 60,000. NSFnet increased its
capacity to 1544 Kbps.

Over the next few years, more and more countries joined the network, from Australia and
New Zealand, to Iceland, Israel, Brazil, India and Argentina.

47
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHLQIRUPDWLRQVXSHUKLJKZD\

In 1989, CERN, the Swiss physics institute, proposed the basis of the
World Wide Web to share research. By 1994, the Web’s traffic was 25
times greater, and domain names for commercial organisations (.com)
began to outnumber those of educational institutions (.edu). As the Web
grew, so too did the global village. Almost every country in the world
joined the Net. Even the White House was online.

Today, reports say that very soon the whole world will be wired.

a. Note down the events that are connected with the following dates.

1957

1969

1970s

1980s

1986

1984-88

1989

1994

Today

b. Answer the questions

1. What was the Cold War and what did it have to


The Internet and the Web are do with the origins of the Internet?
the same thing, right? 2. Why was ARPA created?
3. What was ARPA’s evolution?
No. The World Wide Web is the 4. What sort of connection is there between the man on
popular face of the Internet. It is an the moon, Woodstock and ARPANET?
Internet facility that provides a simple (Do you know what Woodstock is?)
way to navigate the vast amount of 5. Which institutions began to use the net after
information stored online. But the the military department?
Internet is much more than the Web. 6. In which period did the Internet develop and why?
7. Why was the World Wide Web proposed?
8. What’s the difference between .com and .edu?
9. Could you explain the expression “global village”?
10. What do reports say for the future?
11. What do you think of the development of the Net?

48
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

All’s hot!

All’s hot!
1. Reading | Match
Read and match each key word of the passage to its correct definition.

The World Wide Web


The World Wide Web (WWW or Web) is the most popular way for
people to access information on the Internet, in fact, it is a system based
on technology that organizes information into pages called Web pages,
or “documents”. Web pages are connected by hyperlinks. Hyperlinks in
a form of hypertext (usually a coloured, underlined word or phrase), hot
images, or hot icons, permit navigation between pages and between other
resources on the Internet. Click on a hyperlink to jump (link) to another
place in the same page or to another Web site. All hyperlinks are hot;
that is, when you click
on one with your
mouse, the linked page
is retrieved for viewing.
An image or icon is hot
if the cursor pointer
turns into a hand image
when positioned over it.

One or more related


Web pages belonging
to an individual or an
organization is called a
Web site. Today, most
companies maintain
one or more Web
sites, and million of
individuals and small
firms have them too.
A computer that hosts
one or more Web sites is called a Web server. Servers run specialized
software for each type of Internet application, including the Web, e-mail,
and so on.
Your visit to a Web site often begins at the site’s home page. A home
page usually presents a table of contents with hyperlinks to other pages
on the site. The Web lets you free to navigate among such pages and
others by selecting any of the hyperlinks, in any order you wish.
You need a piece of software called a Web browser to see pages on the
Web and to navigate (or surf) between Web sites.

49
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHLQIRUPDWLRQVXSHUKLJKZD\

Word Definition
1. WWW a. An icon, image or specially marked text located on a WWW
page that brings new information on the screen when the
user selects it.
2. Hyperlink b. A computer that stores and distributes Web pages on
request.
3. Web site c. A program that makes it easy for users to find and display
Web pages
4. Web server d. A collection of related Web pages belonging to an individual
or organization.
5. Home page e. A network within the Internet consisting of data organized
as pages with hyperlinks to other data.
6. Web browser f. The starting page for a Web site.

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 ....

2. Activity | Read & speak


Read and prepare an oral comment on the offers of Internet service
providers. Also provide examples of Italian ISPs. What is yours?

ISP (Internet service provider)


Unless you are from a large company or organisation which can have a
file server permanently connected to the Internet, you will have to use
the services of an Internet service provider (ISP). The ISP provides a
permanent connection to the Internet. When you log on, your modem
dials the number of
the ISP and when
your password has
been validated you
are allowed access
to their file server.
As well as providing
a connection to
the Internet, ISPs
provide a lot of
content of their own.

50
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

All’s hot!

3. Reading | Ask questions


Read and ask questions for the answers provided.

HTML (Hyper Text Mark-up Language)


Is the language used to compose and format most of the
content you see when cruising the Net. It tells the client
computer how the Web page is to be formatted. An Internet
browser such as Mozilla Firefox (the client program on your
PC) interprets the HTML instructions and then interacts with
the server program in accordance with those instructions to
download the necessary elements (text, graphics and so on)
and display the Web page.
HTML documents are text (ASCII) files that can be created
with any text editor or word processing package. A single
HTML element, with its brackets, is called a tag. In HTML, each
element in the electronic document is tagged and described
(for example, left or right justification or centred). Elements
include title, headings, tables, paragraphs, lists and so on.
Tags always come in pairs, with the last one including a
forward slash (/). Tags can include attributes, which further
describe the presentation of the element. The HTML
language also permits the identification of graphic images
to be inserted in the document. At present, XHTML is
becoming the new standard, in fact, its more strict syntax rules has many benefits. It also
makes the website easier to maintain, edit, convert and format in the long run.

Ask questions
1. ....................................................................................................................................................................
It’s a system used to mark text for WWW pages in order to obtain colours, style, pictures, etc.
2. ....................................................................................................................................................................
An Internet browser such as Internet Explorer.
3. ....................................................................................................................................................................
They are ASCII files.
4. ....................................................................................................................................................................
A tag.
5. ....................................................................................................................................................................
Title, headings, tables and so on.
6. ....................................................................................................................................................................
In pairs.
7. ....................................................................................................................................................................
A forward slash.
8. ....................................................................................................................................................................
They describe the presentation of the element to a greater degree.
9. ....................................................................................................................................................................
The identification of graphic images to be inserted in the document.
10. ....................................................................................................................................................................
Because it makes the website easier to maintain, edit, convert and format in the long run.

51
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHLQIRUPDWLRQVXSHUKLJKZD\

Track
04
4. Listening | Put in order
While listening put the steps in the right order.

Downloading software
It’s true that different people use the WWW in different ways, but most users
find it a useful source of software. Many software companies advertise on the
Web and make their products available electronically. What you have to do is
copy software to your own computer. This process is called downloading.

Free downloads (freeware) are exactly that – free! However, you must do all
the work and take the responsibility for getting your copy. Here are the steps:

Downloaded software is usually accompanied by a readme file containing


licensing and instructions for installation. Take the time to read these files. They
can be very useful.
When you have found the program you want, click on it to begin the download
process. Be sure you select the one set up for your computer and operating
system.
Be sure you are connected to your ISP.
Be aware of any time and usage limitations of free downloads. Some versions
limit your use of the programs to 60 or 90 days. Some leave off key segments
so you can explore these samples but cannot do any work on them. Read the
limitations of your license.
Downloading may require the use of FTP (File Transfer Protocol), which is
often included with most Web browsers.
For speed and efficiency, many downloads are transferred in compressed
format, so you have to decompress it. Sometimes the file is self-decompressing,
but other downloads may require you to perform the decompression. In this
case be sure you have the suitable program, such as WinZip (Windows) or
StuffIt Expander (Macintosh).
Search the WWW to find the free download you want or go to the sites
specializing in freeware, such as www.download.com.

After the download begins, it may take from several seconds to hours. The time
needed depends on the size of the item you are downloading, the density of
network traffic at that time, and the speed of the two modems involved in the
transaction.

Shareware writers request payment for their products. The receiver is allowed
to try the shareware for a limited period of time. If you decide to keep it, you
must pay the royalty to the author.

Pay attention:
- Software downloads is no guarantee of quality
- Viruses may be distributed along with free downloads and shareware. Protect
yourself with a good virus checker.

52
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

All’s hot!

5. Activity | Match
Match the terms referring to downloading with their definitions.

Terms Definition
1. Downloading a. The file has been made smaller by condensing its space-
wasting features.
2. Freeware b. A protocol used for transferring files between computers.
3. Compressed c. It is the process of receiving a program or file via a network
format from another computer.
4. Shareware d. Programs are available over the Internet at no cost to the user.
5. FTP e. It is software that is legal to distribute and copy but is not free.

Solution 1 .... 2 .... 3 .... 4 .... 5 ....

6. Writing | Label
Label the information with the appropriate title. Be careful: there are two
intruders.

query | download | spider | shareware | keywords | search engine

1. A ....................................... is a program available


through WWW browsers that enables the user
to search the Internet for information on specific
topics.
2. A ....................................... is a piece of Web
software that constantly searches for new Web
pages and follows any links found on them. It
enters Web addresses, page titles, and significant
words and topics into a huge database that is
accessed by search engines.
3. A ....................................... is a request specifying
what information is to be sought in a search
operation.
4. The ....................................... are criteria selected to identify and narrow the
specific information desired in a search. Queries generally contain one or
more of them.

53
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHLQIRUPDWLRQVXSHUKLJKZD\

7. Reading | Answer
Read the texts and answer the questions.

E-mail
You can send and receive e-mail with anyone who has an Internet
e-mail address. There are two ways to send/receive e-mail – via e-mail
client software or via Web-based e-mail. E-mail client software, such as
Microsoft Outlook, enables e-mail through a program running on your
computer.

Web-based e-mail is handled through interaction with a Web site, such


as Yahoo or Hotmail. The big advantage of Web-based e-mail is that it is
easily accessible from any Internet-connected computer in the world –
at a coffe house in Tokyo, a public library, a friend’s house and so on.

Email is an effective means of communication for business and


personal use but it also has some disadvantages.

Advantages Disadvantages
t Email is effective in providing quick t Email can become time consuming
answers to yes and no type questions. for answering complicated questions.
(e.g., Do you do international delivery?) Misunderstandings can arise because of
t Email is effective in finding the right cultural differences in the interpretation
person in an organisation or company of certain words. The telephone is much
to answer your question. better for providing detailed answers
t Email is good to make appointments or if you feel that the question is not
for busy people. absolutely clear.
t Email can distribute information t Email can compromise the security
quickly to many people for the time it of an organisation because sensitive
takes to email one person. information can be easily distributed
accidentally or deliberately. Email should
be entrusted to well trained and trusted
staff members.
t Email can become impersonal or
misunderstood.

Answer the questions.


1. What are the two types of e-mail?
2. Which type seems to be more useful?
3. Can you provide examples of effectiveness of e-mail?
4. When is it that email can become time consuming?
5. Can you name other forms of company communication (e.g., meetings)?
6. Can you think of the advantages and disadvantages of each medium, including
e-mail? (e.g., face-to-face meetings are good if you need to discuss important
issues or resolve difficult situations).

54
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

All’s hot!

8. Activity | Read & discuss


After reading, in pairs, discuss the pros and cons of cloud computing.

Cloud computing
Since the advent of the Internet, businesses have been n
introduced to a whole new avenue in their day-to-day
interactions. With the instant ability to access files and
information in real time and anywhere in the world, people
across the globe are implementing cloud computing into
their organisations.
Cloud computing can basically be defined as doing work on
your local computer, but storing the data on a server at another location.
Before entrusting your data to someone else, there are 5 advantages and
disadvantages you should consider.

Advantages of Cloud Disadvantages of Cloud


Computing Computing
t Convenience. You can access your t Security breaches. Your personal
data anywhere you can connect to information may be exposed to the world.
the Internet. t Outages. There may be temporary
t Security. Most companies use suspension of operation.
industrial level security software and t Storage limits. While your local hard
practices which make it harder, but drive may be able to hold 500GB or more
not impossible, for hackers to get at of data, unfortunately a remote server
your data. may only allow you to freely store about
t Backups. You have a backup of your 5GB. If you want more room, you’ll have
data in case your local computer to pay. There also may be a limit on the
crashes. size of the data that can be stored.
t Collaboration. With your t Slow speeds. Uploading and downloading
permission, others can access, view, of large documents may take a long time.
and modify your documents. t Limited features. If you use remote
t Environmentally friendly. It software that’s provided by the storage
takes fewer resources to cloud service to manipulate and modify your
compute, thus saving energy. Some data, it usually lacks the features of a
businesses take it a step further and program running locally.
incorporate cloud computing into
their telecommuting strategies.

9. Writing | A report
Write a short report on the results of your discussion in the previous
activity. The last paragraph should contain your personal point of view.

55
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHLQIRUPDWLRQVXSHUKLJKZD\

From newsgroups to twitter


1. Reading | Activity
In addition to e-mail people often use the Internet to distribute
information, as in the case of mailing lists and newsgroups, or to have
conversation (chat), or to shop online (Electronic commerce).
Read about all this and then do the activities.

Newsgroup
A newsgroup is the cyberspace version of a bulletin board. Tens of
thousands of newsgroups entertain global discussions on thousands
of topics. For example, alt.fan.letterman is one of the David Letterman
newsgroups. Newsgroups are organised by topics. To participate in a
newsgroup, you’ll need newsreader client software or similar that is built
into most Internet browser clients. Some newsgroups are maintained
within the WWW and the software is not required. Newsgroups are
generally public. The software lets you read previous messages or
add your own or respond to previous postings. People who frequent
newsgroups refer to the original message as a thread.

a. Answer the questions


1. In what sense is a newsgroup the cyberspace version of a bulletin board.?
2. What do people do in a newsgroup?
3. Is special software necessary to take part in a newsgroup?
4. What is a thread?

What do you know of Cybertalk and Netiquette?


People who frequent chat rooms, do instant messaging, send e-mail and participate in newsgroups
have invented keyboard shortcuts and emoticons (emotion icons), which are sometimes called
smileys, to speed up the written interaction and convey emotions. In cyberspace there is no eye
contact or voice inflexion, so cybernauts use smileys to express emotions. There are some basic
rules of netiquette, Internet etiquette.

t "WPJE VTJOH BMM DBQJUBM MFUUFST VOMFTT ZPV XJTI UP TIPVU


t /FWFS TFOE TQBN VOXBOUFE FNBJM
t #F DBSFGVM XJUI KPLFT
t /FWFS TFOE FNBJM DPOUBJOJOH UIF QFSTPOBM JOGPSNBUJPO PG PUIFST XJUIPVU UIFJS QFSNJTTJPO
t 6TF UIF iSFUVSOFE SFDFJQU SFRVFTUFEw PQUJPO DBVUJPVTMZ
t "WPJE NBLJOH DPNNFOUT BCPVU LFZCPBSEJOH TUZMF TQFMMJOH PS HSBNNBS .BOZ QFPQMF MJLF B
casual style of communication.
t 5IJOL UXJDF CFGPSF BUUBDIJOH B MBSHF åMF UP FNBJM .BOZ QFPQMF IBWF TMPX EJBMVQ TFSWJDF
t 6TF BOUJWJSVT TPGUXBSF UP NBJOUBJO B WJSVT GSFF FOWJSPONFOU BT NPTU WJSVTFT BSF QBTTFE WJB
e-mail.

56
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

From newsgroups to twitter

Mailing list, IRC, IM and Internet Telephone


The Internet mailing list is a cross between a newsgroup and e-mail. Participants
typically focus their discussions on specific subjects, such as the Beatles, classical movies,
or diabetes. Generally, there is no subscription fee. Once on the list, you receive every
e-mail message sent out by the sponsor of the mailing list. Subscribing to a mailing list can
be very stimulating. But remember, each message posted is broadcast to all on the list. If
you subscribe to a couple of active mailing lists, your Internet mailbox could be filled with
dozens if not hundreds of messages – each day!

At any given time, the Internet is filled with virtual chat sessions where people talk about
anything from cars to yoga. The Internet Relay Chat (IRC) protocol allows users to
join and participate in group chat sessions. Chatting is a favourite pastime of millions of
cybernauts who use their IRC client software to establish a link with a chat server. Chat
servers let users join chat sessions called channels.

Instant Messaging is a cross between


chat and e-mail. IM is a convenient
way to know when your friends, family
and colleagues are online so you can
communicate with them in real time. To
participate in IM you must first sign up
with one of the IM services and install
its client software. Then you must create
a contact list that contains the online
identities of the people you wish to
contact. You can send instant messages,
images or you can initiate a telephone-
type conversation rather than key in the
words.

A very popular application is the Internet Telephone, often mixed with IM. How does it
work? When you open your Internet telephone software, it notifies the host server that you
are available for calls. If you want to communicate with your friend in Australia you both
have to be online with the software running and be registered with the same server.

b. Cover the text above and complete the phrases with the missing word.
1. Each Email message is ....................................... to all the participants in the list.
2. The IRC ................................ users to participate in group chat sessions.
3. Chat servers ................................. users join channels.
4. IM is a .............................. way to communicate in real time.
5. You must ............................ with one of the IM services if you want to participate.
6. When you open your Internet telephone software, it ........................ the host server
that you are ............................... for calls.

57
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHLQIRUPDWLRQVXSHUKLJKZD\

e-commerce and eBay


People enjoy shopping online, either directly from large companies at
their Web sites, or at e-malls where thousands of smaller companies
display their goods. Electronic commerce (e-commerce) benefits both
businesses and consumers, because businesses don’t need salespeople
to sell online and some of the savings in labour costs can be passed on
to consumers. Today, the most popular
online-shopping categories are PC
hardware, travel, books, music, flowers
and gifts. The Internet has also made
possible an exciting new twist to buying
– the cyberauction. It enables people to
make their offers (place bids) on goods
and services from their home PCs, in
the hope of making a bargain.

eBay Inc. is an American multinational


internet consumer-to-consumer
corporation, headquartered in San Jose,
California. It was founded in 1995, and
became a notable success story of the dot-com bubble; it is now a multi-
billion dollar business with operations localized in over thirty countries.
The company manages eBay.com, an online auction and shopping
website in which people and businesses buy and sell a broad variety of
goods and services worldwide. In addition to its auction-style sellings,
the website has since expanded to include “Buy It Now” standard
shopping; online classified advertisements; online event ticket trading;
online money transfers and other services.

c. For each statement indicate if they are true or false. If they are false, correct
them orally.
1. People do not like using the Internet to make their purchases.
2. E-commerce is disadvantageous to businesses.
3. Gifts and flowers are some of the most popular online shopping categories.
4. People like cyber auction as they hope to make a bargain.
5. eBay was founded in the late 20th century.
6. Its success is confined to the North American area.
7. eBay.com is exclusively a shopping website.
8. eBay.com offers a wide range of services.

58
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

From newsgroups to twitter

2. Reading | Answer
Read the text about blogging and do the activity.

A blog is a kind of hybrid diary/guide site. There are as many unique types of blogs as
there are people Blogs became trendy with the introduction of certain automated systems.
Blogs are easy to set up and manage. New data is entered into a simple form and then
submitted. Only the author can create new subjects for discussion on a blog. Some popular
software packages eliminate the need for bloggers to manage the software. A good program
combines a user-friendly interface with format flexibility. Server-based systems make
blogs possible. A blogroll is a list of links that create a context for a blog. The TrackBack
feature enables multiple blogs to be automatically notified when certain changes are made
to one blog.

Answer the questions


1. What is a blog? What is a blog?
2. When were blogs created? A blog is a website that has many dated entries. The word is
3. When did they become trendy? Why? a combination of web and log. Authoring a blog, maintaining
4. What technological supports help bloggers? a blog or adding an article to an existing blog is called
5. What do bloggers talk about? iCMPHHJOHw *OEJWJEVBM BSUJDMFT PO B CMPH BSF DBMMFE iCMPH
6. What would you discuss if you maintained QPTUT w iQPTUT w PS iFOUSJFTw 5IF QFSTPO XIP QPTUT UIFTF
a blog? FOUSJFT JT DBMMFE B iCMPHHFSw 5IF UPUBM HSPVQ PG XFC MPHT JT
7. Do you blog or do you chat? Describe your the blogosphere. A blogstorm occurs when there are many
experience briefly. people using blogs about the same topic.

3. Reading | Tumblr

A tumblelog is a blog that supports short-form mixed


media content. Tumblelog posts are brief comments that
may contain audio, quotes, links, images or video. Because
the word tumblelog is so closely associated with the free
social networking site Tumblr, the term has generally
been replaced in the media by its synonym, microblog.
Facebook and Twitter are examples of other free social
network tumblelogging platforms for registered users.
Tumblelog posts on Twitter are called tweets and on
Facebook they are called status updates. On Tumblr, they
are just called posts, like on a blog.

Do you use it? Do you like it? Talk with your partner.

59
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHLQIRUPDWLRQVXSHUKLJKZD\

Track
4. Listening | Take notes 05
You will hear people talking about Facebook. Listen and take notes.

5. Activity| Read & speak


Read these opinions on Facebook and Twitter. Then with your partner exchange your
points of view. You may find helpful to use the notes of the previous activity (Activity 4).

© lev radin / Shutterstock.com


Whenever anyone wants to join a social
networking website, majority opt for
Facebook. The primary reason for this is
that, when compared to other websites of
the same nature, Facebook is more user-friendly and
engaging too. The features offered by Facebook stand
out. It not only connects you with your friends circle but
gives you an opportunity to know more people from the
infinite communities that are created in this website.
Facebook keeps you aware of the various updates by your
friends. If you have a certain interest or hobby, you can
create your own community. If you have a business idea
you can share it with like minded people and discuss further
– how to start and promote it on this website. Facebook
offers plenty of games and applications. You can activate
Facebook on your mobile so that you stay connected with
your friends, wherever you are.

60
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

From newsgroups to twitter

Twitter has become a powerful news and marketing


channel. More often than not, eyewitnesses are
breaking news around the world on Twitter before
international media outlets can arrive at the scene to
report it. But I believe that Twitter isn’t as popular as Facebook or other
social media websites because most people don’t understand the power
of short, timely messages that catch our attention like powerful media
headlines or interesting email subject lines. Twitter is a great tool to
interrupt someone’s thought process and grab their attention. Whether
you are a Twitter fan or not, you can’t ignore the fact that it has become
an integral part of our lives. You see Twitter hashtags everywhere. You
see them in all major advertising campaigns, whether in print, online
and in TV ads. Twitter is here to stay!

6. Writing | A short text


Write a short text to express your opinions on Facebook and Twitter. Also
explain why and how you use/don’t use them.

7. Speaking | Discuss
This is the dark side of social networking sites. Have you ever thought of
these aspects? Discuss in a small group of 3 or 4.
The Cons Of Social Networking Sites
t The most glaring disadvantage of social networking sites is the risk of identity
theft and fraud. The personal information of users can be used by dubious people
for illegal activities. Information like the e-mail address, name, location, and age
can be used to commit online crimes.
t Also, many people pretend to be someone else and prepare their online profiles
with false information, so as to dupe unsuspecting users. So, if you do not know
the person face to face then it will be very hard for you to find the real identity.
t Another cause of concern is cases of online harassment and stalking. Since
the social networking sites are very poorly regulated, so it can be a very fertile
ground for people trying to get even with you. They can spread malicious humour
among your friends and also download and morph your photos.

8. Writing | A report
Write a short report on the discussion of the previous activity. The last
paragraph should contain your own opinions.

61
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHLQIRUPDWLRQVXSHUKLJKZD\

5HYLVH FKHFN
1. Write a short essay on the World Wide Web. Your text should contain
ALL the following words:
hiperlinks | website | homepage | server | browser

2. Complete the sentences by matching the beginning with the


appropriate ending.

Beginnings
1. FTP is a protocol that allows…
2. You must sign up with an ISP…
3. WWW is a communications protocol that allows…
4. You must use HTML…
5. HTML is a computer language that consists of…
6. Search engines often use a program called a spider…
7. A spider is a piece of Web software that…
8. E-commerce includes…

Endings
a. multimedia information to be accessed and transmitted via the Internet
b. constantly searches for new Web pages and follows any links found on them
c. in order to use the Web
d. all phases of doing business over the Internet
e. the transfer of files between two computers over the Internet
f. in order to develop documents readable by Web browsers
g. in order to keep their indexes updated
h. special codes intended to design the layout of a Web page
1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 .... 8 ....

3. Complete the text with the words given.


payment tools installing available
expand files activate trials

Downloading software applications from the WWW can add useful ................. and
resources to your computer. From adding software that will compress ............ so
they take up less space on your computer to accessing tools for improving the search
capabilities of your Web browser, you should become familiar with the procedures
for downloading and ....................... software from the WWW. This will allow you to
......................... your use of the computer as a tool for learning. There are five types of
software that you are likely to download, as a student:
Updates – to improve the performance of your software.
Plug-ins (or add-ons) that automatically ..................... themselves when required.

62
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Revise & check

Apps – including dictionaries and calendars


Trials – Potential clients often want the opportunity to try out software before buying
it, so many software developers offer 30-, 60- and even 90-day ..................... .
Shareware/ Freeware - Individual software developers commonly make their
applications ..................... on the WWW: They may request a small ..................... for
their product (shareware) or the product is offered without expectation of payment
(freeware).

4. Decide if the statements are true (T) or false (F). Correct the false
ones.

Statements
T F
1. All newsgroups need a special software.
2. There is generally no need to subscribe to get mailing list messages.
3. Thread is a term used in mailing list.
4. Mailing lists and newsgroups are the same thing.
5. Two or several people can take part in IRC.
6. A channel is when people carry on an online conversation.
7. IM is the same as IRC.
8. You can communicate with friends through IM even if they aren’t online.
9. Internet Telephone lets you call people at other computers on the Internet.
10. E-commerce is an advantage for both merchants and customers.
11. Cyberauctions are dangerous forms of e-commerce and are avoided by people.
12.Netiquette sets the rules of behaviour online.
13.Writing an e-message in capital letters is nice and friendly.
14.It’s not a problem to attach a large file to e-mail.
15.It’s important to have an efficient antivirus system.
16.Smileys and emoticons are the same.
17. Today eBay is exclusively an online auction website.
18.Most people like shopping online.
19.Cyberauction is not particularly popular.
20.eBay.com offers plenty of services.

Write here your corrections:

63
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHLQIRUPDWLRQVXSHUKLJKZD\

7HVW\RXUFRPSHWHQFH
1. Write about the history of the Internet.
t Briefly describe the historical scenery in which ARPA an later ARPAnet
developed.
t Illustrate the characteristic of Internet services before the WWW.
t Explain the difference between the Internet and the WWW.

2. Read and complete this article about the resources on the Internet.

The Internet has become one of the biggest worldwide systems for
......................... and receiving information. Even though everybody knows
about the Internet there are many people still unaware of how the
Internet actually works.The biggest portion of all the Internet .....................
is E-mail. Many people now use ......................... instead of writing letters.
Another very popular feature of the Internet is the Newsgroups. Many of
these newsgroups offer access to group discussions around the world on
specific topics. There are actually thousands of ......................... on the web
that you can sign up for. Just going to www.abc.com, and clicking on the
news tab will get you the latest news and the latest weather .........................
. The original purpose of the Internet was for global .........................
exchange. It is also a great source of information for children. You no
longer need to take the trip to the Library. Now you can have the Library
right in your own .................... . Just by typing in a simple word phrase in
the search box will get you tons of information that you may need.
The web supports the ......................... and retrieval of photographs,
graphics, animations, videos and sounds. Moreover, the greatest benefit
of the Internet has been to businesses and other organizations. It is a
great way to ......................... your product or business, as well as various
services that you may offer. Once you make your web .........................
known you will be amazed at how much your ......................... and your
profits will increase. Another very popular ......................... is the Chatting
feature. Instead of using the telephone you can just ......................... with
another person over the Internet. Although when it comes to chatting
you will have to be careful. Make sure that you only chat with those
people that you know.

3. One of your friends needs information on blogging and Tumblr for an


exam paper. Send him/her an email in which you

t CSJFýZ EFåOF CPUI


t FYQMBJO IPX UIFZ XPSL BOE XIZ UIFZ BSF QPQVMBS
t FYQMBJO XIBU ZPV DBO åOE BOE XIBU UIFZ UBML BCPVU
t BEE ZPVS PXO QFSTPOBM FYQFSJFODF

64
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

The processing unit

PRGXOH
7KHEUDLQRI HYHU\
 FRPSXWHU

In this module you will learn to:


t talk about CPU
t examine main functions of the computer system
t outline the history of the microprocessor
t analyse different types of “memory”
t outline the main ideas of optical laser discs
t talk about holographic storage

The processing unit


1. Approach | Describe.
Look at the picture representing the inside of a computer. You
should be able to label some important components giving a short
description of their characteristics.

65
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHEUDLQRI HYHU\FRPSXWHU

2. Reading | Answer questions


Read the passage about how a computer wakes up and answer the
questions below.

How a computer wakes up


When you hit your PC’s on switch, nothing much seems to happen for
several seconds. But actually, your computer is going through a complex
set of operations to make sure all its components are working properly
and to warn you if something is amiss. The operation is the first step in
an even more complicated process called the boot-up, or simply, the boot.
The term comes from the idea of lifting yourself up by your own bootstraps.
In a PC, bootstrapping is necessary because the PC must have some way
of bringing all its components to life long enough to load an operating
system. The operating system then takes on more complicated tasks that
the boot code alone can’t manage, such as making the PC’s hardware
interact with software.
But before your PC can even attempt to load an operating system, it has
to make sure that all the hardware components are running and that
the CPU (central processing unit) and memory are functioning properly.
This is the job of the power-on self-test, or POST.
The microprocessor that makes up your personal computer’s central
processing unit, or CPU, is the ultimate computer brain, messenger,
ringmaster, and boss. All the other components, that we can call “the
brains” – RAM, disk drives, the monitor – exist only to bridge the gap
between you and the processor. They take your data and turn it over
to the processor to manipulate; then they display the results. The CPU
isn’t the only microprocessor in PCs. Coprocessors on graphics, 3D
accelerators, and sound cards organize display and sound data to relieve
the CPU of part of its burden.
And special processors, such as the one inside your keyboard that handles
the signals generated whenever you press a key, perform specialized
tasks designed to get data into or out of the CPU.

Answer the following questions.


1. What happens when you hit your PC’s
on switch?
2. Using your own words, explain what
bootstrapping is.
3. What is the first task your PC performs
when you turn it on?
4. What is the POST?
5. What are “the other brains” inside your PC?
6. Why are they called “the brains”?
7. What is the function of“special processors”?

66
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

The processing unit

3. Reading True | False and summary


Read the passage about the Central Processing Unit. Tick the appropriate box
and correct the false sentences. Then summarize the text orally.

The central processing unit


The Central Processing Unit, often called CPU or simply the processing
unit is the heart of every computer. The CPU is another name for the
processor of a computer – the bit that does the actual work; it processes
the raw data and turns it into information. The CPU is responsible for
running computer programs, responding to the user input and pretty
much everything else that makes a computer what it is.
CPUs are designed to be completely general-purpose – they need to be able
to cope with any sort of computer program that you might want to run.
There are three main elements of the CPU:
- The CU (Control Unit), which is responsible for coordinating the
input and output devices.
- The ALU (Arithmetic Logic Unit), in which all the calculations and
logical decisions are made.
- The IAS (Immediate Access Store) which provides immediate memory
for holding data and programs. The Ias is on a chip or a series of chips
inside the computer. Data held here can be accessed immediately,
unlike data held on disk, which can take some time to load.
The CPU follows instructions, that is to say, a computer program is just
a list of instructions for the CPU to carry out. The CPU goes through
the instructions, performing each of them in sequence. Two kinds of
instructions are particularly important: load/store instructions and
arithmetic instructions.
Load/Store Instructions tell the CPU to move a piece of data from one
place to another. Most CPUs can only work with a small amount of data at
a time. Programs that need to use more data use load/store instructions
to move data from memory to the CPU and back as needed.
Arithmetic Instructions tell the CPU to perform a mathematical operation
such as x, :, +, or -. Even programs that don’t seem to be doing anything
mathematical need to use arithmetic instructions all the time.

T F
1. The CPU is the central part of the computer
2. CU is the short form for Central Unit
3. The C.U. controls data movements throughout the computer system
4. The ALU performs only calculations such as: addition, substraction,
multiplication and division.
5. The CPU and the CU make up the ALU
6. Data held on disk can be accessed faster than data held on a chip.
7. The CPU follows a list of instructions to carry out.
8. Only two instructions are important for the CPU to carry out.
9. Programs always use arithmetic instructions.

67
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHEUDLQRI HYHU\FRPSXWHU

4. Reading | Answer questions


Read the passage about how the CPU executes program instructions and
answer the questions below.

How the CPU executes program instructions


Let us examine the way the central processing unit, in association with
memory, executes a computer program. Many personal computers can execute
instructions in less than one-millionth of a second, whereas supercomputers
can execute instructions in less than one-billionth of a second.
Before an instruction can be executed, program instructions and data must be
placed into memory from an input device or a secondary storage device. The
data will probably make a temporary stop in a register.
Once the necessary data and instruction are in memory, the central processing
unit performs the following four steps for each instruction:
1. the control unit fetches the instruction from memory;
2. the control unit decodes
the instruction and directs
that the necessary data be
moved from memory to the
arithmetic/logic unit. These
first two steps together are
called instruction time, or
I-time;
3. the arithmetic/logic unit
executes the arithmetic or
logical instruction. That is,
the ALU is given control and
performs the actual operation
on the data;
4. the arithmetic/logic unit
stores the result of this operation in memory or in a register.
Steps 3 and 4 together are called execution time, or E-time. The control unit
eventually directs memory to release the result to an output device or a
secondary storage device. The combination of I-time and E-time is called the
machine cycle.

Glossary
Register is a storage device, having a specific storage capacity such as a bit,
a byte or a computer word, and usually intended for a special purpose

1. Does the central processing unit execute a computer program by itself?


2. Where must program instructions and data be placed, before an instruction can
be executed?
3. What is a register?
4. What does the C.P.U. do when data and instructions are in memory?
5. What does I-time stand for? What does it mean?
6. What does E-time stand for? What does it mean?

68
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

The processing unit

5. Reading | Match and discuss


Read the passage about the computer on a chip and match each verb with
its preposition, then discuss with your partner about the evolution of the
“chip”.

The computer on a chip


The invention of the light bulb in 1879 symbolized the beginning of
electronics. Electronics then evolved into the use of vacuum tubes, then
transistors, and now integrated circuits.The increased speed and capability
of computers influence all the many services we may take for granted.
Current chip technology permits the placement of hundreds of thousands
of transistors and electronic switches on a single chip. Chips already fit
into wristwatches and credit cards, but electrical and computer engineers
are working to make them even smaller. In electronics, smaller is better.
Chip designers think in terms of nanoseconds (one
billionth of second) and microns (one millionth of a
meter). They want to pack as many circuit elements
as they can into the structure of a chip. This is called
scalling, or making the transistor, and the technology
that connects it, smaller. Circuit lines on early 1980s PC
processors were 10 microns wide. Today’s circuit lines
are .09 microns or 90 nanometers (one billionth of a
meter). The reduced size of the circuit lines enables
chips to hold over 100 million transistors and provide
thousands of times the power of earlier processors. As
transistors become smaller, the chip becomes faster,
conducts more electricity, and uses less power. Also, it
costs less to produce as more transistors are packed
on a chip. Each year, researchers have developed radically new techniques
for manufacturing chips. For example, IBM recently began developing a
logic chip and processor using silicon-on-insulator (SOI) technology, an
innovative approach to the chip-making process.
Chips are designed and manufactured to perform a particular function.
Microprocessors, memory, and logic chips are three of the most common
kinds of chips. A microprocessor is the “brain” of a PC. A memory chip
might be for temporary random-access storage (RAM). Logic chips are
used in beverage vending machines, televisions, refrigerators, cell phones,
and thousands more devices.

Verb Preposition
1. to evolve a. in
2. to take b. into
3. to fit c. over
4. to hold d. into
5. to pack e. for
6. to be used f. into/on

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 ....

69
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHEUDLQRI HYHU\FRPSXWHU

Storage
1. Reading | Answer questions
Read the text about memory and answer the questions below.

Memory
Computers store data either in chips inside the main processor, in what is called the memory
(main store), or on other media such as magnetic disk, in what is called the backing store. All
memories share two organizational features:
a. each information unit is the same size;
b. an information unit has a numbered address associated with it by which it can be
uniquely referenced.
Memory can be viewed as a large one-dimensional array, where each element of the array
contains one unit (word) of information while the index is the address of the unit. Using its
address, we can determine the contents of any unit.
When a computer is designed, the size of its information units is chosen according to the
applications for which the computer is intended. On many machines, each information unit
is known as a word. Word sizes typically range from 8 bits on microprocessors to 64 bits on
large computers. A word is usually divided into a number of bytes; each byte can represent
one character.
Machines designed for administrative data processing, where information to be processed
includes names and English letters as well as numbers, are often byte addressable. In these
machines the byte is the basic information unit, and each byte has a unique address by
which it can be accessed.
The number of instructions and amount of data a computer can store in its memory is
measured in bytes. One byte contains 8 bits; in most cases 8 bits are needed to store one
character; a single character can be stored in one byte.We refer to storage capacities in terms
of kilobytes (KB) or megabytes (MB). Look at the following table:

Terms Value
1 byte 8 bits
1 kylobyte (KB) 1,024 bytes
1 megabyte (MB) 1,048,576 bytes
1 gigabyte (GB) 1,073,741,824 bytes
1 terabyte (TB) 1,099,511,627,776 bytes

Adapted from Computer Programming and Architecture.

Answer questions
1. Where do computers store data?
2. What are the characteristics shared by all
memories.
3. What does “information unit” refer to?
4. What do you understand for “index”?
5. What does a byte addressable represent?
6. How is the number of instructions and amount
of data measured?
7. What is the smallest unit of storage?
8. What is the name of a group of 8 bits?

70
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Storage

2. Reading | Answer questions and summarize


Read the text about Primary Memory (RAM) and answer the questions
below. Then summarize the text orally.

Primary memory (RAM)


The primary memory of the computer is where we store information
currently in use, whereas the secondary memory stores information that
will be used at some future time.
RAM (random access memory) is a part of the primary storage, or
memory, of the computer. Its contents are not permanent and can be
changed. This characteristic is necessary so that different programs and
data can be stored there. If the power plug to a computer is accidentally
pulled, all of the data in the RAM (nonpermanent memory) disappear.
RAM is essentially a high-speed holding area for data and programs. All
programs and data must be transferred to RAM from an input device
(such as a keyboard) or from disk before programs can be executed and
data can be processed. In fact, nothing really happens in a computer
system until the program instructions and data are moved from RAM to
the processor. RAM enables data to be both read and written to solid-
state memory. It is volatile memory because when the electrical current
is turned off or interrupted, the data are lost. In contrast to permanent
storage on disk, RAM provides the processor with only temporary storage
for programs and data. Once a program is no longer in use, the storage
space it occupied is assigned to another program awaiting execution.
The processor, according to program instructions, manipulates the data
in RAM. A program instruction is stored in a specific RAM location called
an “address”, and each byte in RAM has an address. Addresses permit
program instructions and data to be located, accessed, and processed.
The content of each address changes frequently as different programs
are executed and new data are processed. RAM is attached to the
motherboard and therefore to the system bus. Over the past two decades,
researchers have given us a succession of RAM technologies, each
designed to keep pace with ever-faster processors. Most new PCs are
being equipped with DDR SDRAM, a newer “double data rate” SDRAM
(synchronous dynamic RAM). Physically, memory chips are installed on
“single in-line memory modules”, or SIMMs, and on the newer “dual in-
line memory modules”, or DIMMs. SIMMs are less expensive but have
only a 32-bit data path to the processor, whereas DIMMs have a 64-bit
data path.

What is “ system bus”? It’s an electrical pathway through which the


processor sends data and commands to RAM and all peripheral devices.

71
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHEUDLQRI HYHU\FRPSXWHU

Answer questions
1. What do you understand for Primary Memory?
2. Give a concise explanation of RAM.
3. What does it mean that RAM is “volatile memory”?
4. What happens when a program is no longer in use?
5. What is an “address”?
6. What is the function of addresses?
7. Where is RAM attached?
8. What have researchers given us over the past two decades?
9. What is SIMM?
10. What is DIMM?

3. Activity | Match
Match the beginnings in column A with the endings in column B.
Be careful, because two items in column B are not necessary.

A B
1. RAM contents are not a. 64 million bits of fast electronic circuit
memory
2. RAM is b. a high-speed holding area
3. All programs and data must be c. data to be both read and written
4. RAM enables d. transferred to RAM
5. When a program is no longer e. electronic circuits
in use, the storage space it
occupied is assigned
6. The processor manipulates f. permanent
7. Each byte in RAM has g. an address
8. Most new PCS are PCS are h. with DDR SDRAM
being equipped
i. to another program
j. the data in RAM

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 .... 8 .... .... ....
not necessary

72
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Storage

4. Reading | Match
Read the passage about virtual memory and then match the first half of a
sentence in column A with a second half in column B. Be careful, because two
in column B are not necessary.

Virtual memory: disk imitating RAM


RAM is a critical factor in determining a computer system’s performance
because all data and programs must be resident in RAM to be processed.
Once RAM is full, no more programs can be executed until a portion
of RAM is made available. Virtual memory effectively expands the
capacity of RAM through the use of software and hard disk storage. The
amount of virtual memory (hard disk capacity) you set aside as virtual
memory is a user option in the Windows environment.
In most personal computing situations, increasing the amount of
disk space allocated for virtual memory can improve overall system
performance, especially when running multiple applications.
The principle behind virtual memory is quite simple. Remember: a
program is executed sequentially – one instruction after another. The
operating system breaks programs into “pages” so only those pages of the
program being executed are resident in RAM. The rest of the program is
on disk storage. The pages are transferred into RAM from disk storage as
they are needed to continue execution of the program.

A B
1. Virtual Memory expands a. resident in RAM to be processed
2. Increasing the amount of disk b. a user option in the Windows
space can environment
3. Once RAM is full, no more c. improve overall system performance
programs can be
4. The amount of virtual memory you d. quite simple
set aside is
5. A program is e. executed until a portion of RAM is
made available
6. The principle behind virtual f. executed sequentially
memory is
7. All data and programs must be g. the capacity of RAM
8. Only those pages of the program h. transferred into RAM
being executed are
9. The pages are i. recordable and rewritable
10. The operating system breaks j. resident in RAM
k. erased or changed
l. programs into pages

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 .... 8 .... 9 .... 10 .... .... ....
not necessary

73
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHEUDLQRI HYHU\FRPSXWHU

Track
5. Listening | Fill in and discuss 06
You are going to listen to Mr Parker giving more details about primary
memory. While listening fill in the text with the missing words given in
scrambled order. Then discuss with your partner about the importance of
Primary Memory.

keyboard | method | turn on | permanent | PROM | version |


ROM | memory | instructions | capabilities

Primary memory (ROM and flash memory)


ROM is a part of the primary storage, or memory, of the computer. It is (1) .........…..
memory; it keeps its contents forever and can never be changed, unless you unplug
and replace it. The contents of (2) ..………. are “hard-wired” (designed into the logic of
the memory chip) by the manufacturer and can be “read only”. When you (3) .………….
a microcomputer system, a program in ROM automatically readies the computer
system for use and produces the initial display-screen prompt.
A variation of ROM is (4) ..……… (programmable ROM). PROM is ROM into which
you, the user, can load read-only programs and data.
Flash memory is a type of PROM that can be altered easily by the user. Flash
(5) ....……… can be found on all new PCs, I/O devices, and storage devices. It is

nonvolatile memory that retains its contents after an electrical interruption. The logic
(6) ………… of these devices can be upgraded by simply downloading new software

from the Internet or a vendor-supplied disk to flash memory. Upgrades to early PCs
and peripheral devices required the user to replace the old circuit board or chip with
a new one. The emergence of flash memory has eliminated this time-consuming and
costly (7) ………..... of upgrade.
The PC’s BIOS (Basic Input Output System) is stored in flash memory. The built-in
BIOS software contains the (8) ………… needed to boot (start up) the PC and load
the operating system to RAM. It also contains specific instructions on the operation
of the (9) ……………., monitor, disk drives, and other devices. A PC’s BIOS software
should be periodically upgraded to the most recent (10) …………… so that the PC can
recognize new innovations in I/O and disk/disc storage.

6. Writing | Answer questions


Now read the previous passage about primary memory (ROM and Flash
Memory) and answer the following questions.
1. What does permanent memory mean?
2. What happens when you turn on a microcomputer system?
3. What is PROM?
4. What is Flash Memory?
5. What is the characteristic of the PC’s BIOS?

74
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Storage

7. Reading | True/False and summary


Read the text about cache memory. Tick the appropriate box and correct
the false sentences. Then summarize the text orally.

Cache memory
Computer designers use very high-speed memory to increase computer
system throughput. Data and programs are being continually moved
in and out of RAM at electronic speed – but that’s not fast enough. To
achieve even faster transfer of instructions and data to the processor,
and, therefore, greater throughput, computers are designed with cache
memory. Like RAM, cache memory is a high-speed holding area for
program instructions and data. However, cache memory uses internal
storage technologies that are much faster than conventional RAM. With
only a fraction of the capacity of RAM, cache memory holds only those
instructions and data that are likely to be needed next by the processor.
Cache memory is effective because, in a typical session, the same data or
instructions are accessed over and over. The processor first checks cache
memory for needed data and instructions, thereby reducing the number
of accesses to the slower RAM.
When you purchase a PC, you will see references to level 1 (L1) and
level 2 (L2) cache. Level 1 cache is built into the processor, whereas
level 2 cache is on another chip, sitting between the processor and RAM.
L2 cache is ultra –fast memory that buffers the transfer of information
between the processor and RAM, thereby accelerating internal data
movement.

75
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHEUDLQRI HYHU\FRPSXWHU

T F
1. Computer designers use high-speed memory to increase computer
system throughput
2. Data and programs are being continually moved in and out of ROM
3. Cache is a high-speed memory
4. RAM is much faster than cache memory
5. Cache memory holds only those instructions and data that are likely
to be needed next by the processor.
6. There are two types of cache memory: L1 and L2
7. L1 cache accelerates internal data movement.
8. L1 cache is on another chip.
9. L2 cache is built into the processor
10. L2 cache is ultra-fast memory.

8. Reading | Answer questions


Read the passage about secondary memory and answer the questions
below.

Secondary memory or storage


Secondary Memory is used to store information that must later be transferred to the main
memory. Without Secondary Memory you couldn’t use the computer to do most of the
computing done today. It’s the place where all of the programs are kept when they are not
in use. Secondary Storage is on media external to the computer and commonly consists of
floppy disks (today they are obsolete), hard disk drives, or CD-ROMs.
Each Secondary Memory device has unique features and satisfies certain computer storage
needs. Their four most important characteristics are:
1. speed and access time;
2. cost/removable versus nonremovable;
3. capacity;
4. type of access.
The speed of a device is sometimes referred to as its access time; the access time of a
storage device is either (1) the time it takes to get information from the device (read time)
or (2) the time it takes to put information into the device (write time). The fastest devices
for holding binary information are certain types of electronic circuits. At the other extreme
are floppy disks.
Cost is another way to characterize secondary storage devices. In many secondary storage
devices the actual medium or place where the binary information is stored is removable.
With removable storage media there are actually two parts to the cost. The first part is the
cost of the actual medium used to store the bits. The second cost is the price of the drive
unit that accesses data on the medium.
The capacity of a secondary storage device ranges from the slow, cheap, and removable
1.4 megabyte floppy disk to the more expensive, fast, and nonremovable hard drive. The
hard drive capacities range from hundreds of megabytes to several gigabytes.
Type of access. There are two types of access that a computer’s storage or memory uses:
random access and sequential access. Random access to storage allows information to be

76
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Storage

obtained directly rather than by sifting through other


information to reach it.
Hard disks are considered random access, although a
short wait may be necessary to allow the disk to rotate What is megabyte? And gigabyte?
to where the information is located. Sequential access to The term megabyte means a million
storage allows the desired information to be obtained by bytes. Gigabyte refers to a billion bytes.
starting at the beginning of a list of information and then
proceeding item by item until it is reached. Magnetic
tapes are examples of sequential access storage.

Answer questions
1. What is Secondary Memory?
2. What does Secondary Memory consist of?
3. Is “access time” one of the unique feature of S. M.?
4. What is it?
5. Using your own words, explain the meaning of cost/removable versus
nonremovable.
6. When referring to the capacities in bytes or other numbers in binary, is a
megabyte 1 million bytes? (Support your answer).
7. Explain the two types of “access”.

9. Activity | Wtite definitions


Using your own words and knowledge, give a definition for the following:
1. Primary storage …………………………………………………………........................
2. Secondary storage ……………………………..………………………........................
3. RAM ……………………………………………………………………..........................
4. ROM ……………………………………………………………………..........................
5. Cache memory ………………………………………………………….........................

10. Activity | Put in order


Read the previous text again and then put in order the sentences below.
Add the necessary language.
1. Where/kept/Secondary Memory/all of the programs/the place/
Solution: ................................................................................................................
2. Certain computer/storage needs/each/unique features/device/Secondary
Memory/satisfies/and
Solution: ................................................................................................................
3. Certain types/the fastest devices/electronic circuits/for holding binary
information/
Solution: ................................................................................................................
4. Secondary storage devices/removable/actual medium/in many/
Solution: ................................................................................................................

11. Speaking | Summary


Now, with the help of all the passages about Primary, Cache and Secondary
Memory, summarize the texts orally.

77
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHEUDLQRI HYHU\FRPSXWHU

Magnetic Media
1. Reading | Fill in and summarize
Read the passage about making the connection to the system unit; while
reading fill in the blanks with the following words given in scrambled
order; then summarize it orally.

extra | data | devices | hardware | primary | system |


peripheral | additional | need | connected

A great step forward:


“Making the connection to the system unit.” - universal
serial bus.
The USB (Universal Serial Bus) is the (1)………………standard for
connecting peripheral devices to a PC. Multiple USB (2)…………….can
be connected to a single USB port with the use of a USB hub, a device
that connects to a USB port and offer three, four, or five (3)………………..
USB ports. Hubs can be connected in a “tree” to provide more USB ports
than any single user will ever need. Most modern PC (4)…………..devices
provide from 4 to 8 USB ports, enough to meet the (5)……………of the
typical user.
The USB hot plug feature allows peripheral devices to be (6)…………….to
or removed from the USB port while the PC is running. This is especially
helpful to gamers who like to switch types of controllers when they
begin a new game. Newer (7)……………is based on USB 2.0, a standard
that permits data transfer at 480 M bps, about 40 times faster than the
original USB standard.

PCI Local Bus


The PCI local bus (Peripheral Component Interconnect) enables circuit
board with (8)…………..features to be linked to the common system bus.
Modern motherboards include several PCI local bus expansion slots into
which expansion boards (also called expansion cards) can be inserted,
thus connecting them to the (9)…………..bus.

1394 or FireWire Bus


The 1394 or FireWire bus supports (10)………………transfer rates
of 400M bps for the original standard and 800M bps for the current
standard. In the Apple world, this type of bus is called FireWire.
1394, or FireWire, is supported by some peripheral devices and by
many audio/video (A/V) appliances, such as digital camcorders. Up to
63 external devices can be daisy-chained to a 1394 port. Like USB, 1394
supports hot plugging.

78
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Magnetic media

2. Reading | Put in order


Read the passage about specific storage technologies and then put in
order the sentences below.
An evolving optical
laser disc
Specific storage technologies technology: FMD
Within a computer system, programs ROM. A single
and information in all forms (text, image, FMD-ROM disc, an
audio, and video) are stored in both RAM and emerging new
optical storage
permanent mass storage, such as magnetic
technology, can
disk and rewritable optical laser disc. Programs store an amount of
and information are retrieved from mass storage and stored temporarily printed
in high-speed RAM for processing. documentation that,
Over the years, manufacturers have developed a variety of permanent if stacked, would
mass storage devices and media. Today the various types of magnetic stretch almost two
miles into the sky.
disk drives and their respective storage media are the state of the art for
permanent storage. Optical laser disc, such as CD-ROM and DVD+RW,
continues to emerge as a means of mass storage. Note that disk is spelled
with a “k” for magnetic disk media and with a “c” for optical disc media.
Magnetic tape drives complement disk/disc storage by providing
inexpensive backup capability and archival storage, primarily for the
business environment. The tape “data cartridge” is similar in appearance
to the audio cassette tape.

1. are stored/ both RAM/ and permanent/ in/ mass storage/ programs and
information/
Solution: ......................................................................................................
2. from/ programs/ mass storage/ retrieved/ and information/ are/
Solution: ......................................................................................................
3. are stored/ RAM/ temporarily/ for processing/ they/ in high-speed/
Solution: ......................................................................................................
4. are the/ art for/ disk drives/ state of the/ permanent storage/ magnetic/
Solution: ......................................................................................................
5. mass storage/ laser disc/ of/ as a/ optical/ means/ continues to emerge/
Solution: ......................................................................................................
6. complement/ storage/ tape drives/ disk/ magnetic/
Solution: ......................................................................................................

Glossary - Back-up
What are magnetic tapes? It is a duplicate safety copy of
Tapes in cartridge are becoming much more the data stored on a disk; but
common, they are similar to audio cassettes, it is also a second computer
except they are larger. Their main use is for component or system for
making backup (security) copies of hard disks. emergency use.
Back-up copy – back up system.

79
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHEUDLQRI HYHU\FRPSXWHU

3. Reading | Answer questions


Read the passage about optical laser discs and then answer the questions
below.

Optical laser discs


Optical laser disc technology complements hard disk storage in that it provides a compact,
interchangeable, high-capacity alternative for the permanent storage of programs and
data.
The tremendous amount of low-cost direct-access storage made possible by optical laser
discs has opened the door to many new applications. The most visible application for
optical discs is the DVD movie that you can buy or rent and play on your DVD player or
your PC.
Another very visible application is that they have emerged as the media-of-choice for the
distribution of software. Many of the thousands of commercially produced CD-ROM/DVD
discs contain reference material, such as encyclopedias and dictionaries.
The books that traditionally lined the walls of attorneys have given way to disk-based
law libraries that can be easily updated as laws change in cases are added. Businesses
periodically back up their data to DVD+RW discs. Companies produce their own CD-
ROM-based procedures manuals and individuals burn their own audio and video discs.
Optical laser disc technology continues to evolve and may never slow down long enough
for a standard to emerge. The read-only audio CD, the data CD-ROM, and the DVD movie
were our only options 10 years ago. Now, we have many more optical laser disc options,
including rewritable discs.

Optical laser disc


organization. A
laser beam detector
interprets pits
and lands, which
represet bits (1s and
0s), located within
the sectors in the
spiraling track on the
CD-ROM reflective
surface. Next to
the illustration is a
microscopic view of
the pits and lands on
the surface of a CD-
ROM.
Answer questions
1. What is the function of optical laser discs?
2. What does optical laser disc provide?
3. What have the consequences of optical laser discs been?
4. What is the most visible application for optical discs?
5. Why have CD-ROM/DVD discs emerged as the media-of-choice for
the distribution of software?
6. Does optical laser disc technology continue to evolve?
7. Do we have many optical laser disc options?
8. Do RW discs exist?

80
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Magnetic media

Track
4. Listening | Fill in and summarize 07
You are going to listen to Mr Parker speaking about optical disk technology.
While listening fill in the text with the missing words given in scrambled
order (one word is not necessary); then summarize it orally.

burn | store | disadvantage | beam | optical disk | binary |


tape | surface | advantage | microfilm | magnetic disks

Optical disk technology


A laser device store data at densities much greater than those of (1) ....………. .
There are two basic ways in which information is placed on an (2) ....……….... .
The most common way is by using a small laser to (3) ....……… permanent pits into
the surface of the plastic optical disk. The resulting pattern of pits and clear surface
is used to define a single bit of information. A pit can be defined as a “0” and a clear
area as a “1”. A small reading laser is used to read the pattern of bits.
Massive quantities of data can be stored in a highly compact form. For example, a
5-1/4 -inch optical disk can (4) ....……… over 250,000 pages of text. Consequently,
optical disks are most appropriate for problems requiring enormous quantities of data
to be stored compactly for easy retrieval.
The second technique, used for rewritable optical
disks, employs a laser and a magnetic field to melt
and magnetize tiny areas on the (5) ....……… of an
optical disk. The magneto-optical disk consists of
layers of magnetic film deposited on a rotating disk
substrate. A strong laser (6) ....……… strikes the
disk as it rotates, heating a microscopic spot and
causing atoms in the recording layer of the disk to
form into a magnetized zone representing one bit
of data. The size of each spot determines whether it represents a 0 or a 1. To read
the disk, a weak laser beam scans the magnetized spots. This beam is reflected to a
photo-detector that converts the variations in spot size into (7) ....……… data.
The optical disk system most often used with microcomputers is called CD-ROM
(Compact Disk/Read-Only Memory).
WORM (Write Once, Read Many) optical disk systems allow users to record data only
once on an optical disk. Once written, the data cannot be erased, but they can be
read indefinitely. WORM has been used as an alternative to (8) ....……… for archiving
digitized document images. Rewritable optical disk storage is becoming faster and
cheaper than (9) ....……… storage.
There is another (10) ....……… of optical disk technology: it makes information more
accessible for problem solving. In seconds, one can wade through vast amounts of
data to find the right quotation or zip code or the correct meaning of a term.

From K. J. Laudon, Business Information Systems

81
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHEUDLQRI HYHU\FRPSXWHU

5. Reading | Answer questions


Read the passage about how PCs use light to remember data and then answer the questions
below.

How PCs use light to remember data


Computer storage will be writing with light in some form of optical drive.We are already doing
this with recordable and rewritable CDs and DVDs, which use a finely focused laser beam
to both write and read data. They sound like the same things, but there’s a difference. Data
recorded on a CD recordable (CD-R) drive cannot be erased or changed. A CD-rewritable
(CD-RW) drive lets you reuse the same disc.
Each plastic-encased CD holds up to 700MB
of information The capacity comes from
being able to focus a laser beam so tightly
that it packs data using a surface area that is
smaller than a pinpoint.The relatively clumsy
magnetic read/write heads in a conventional
drive don’t have the precision needed to jam-
pack the data.
As capacious as compact discs are, they’re
pikers compared to DVD, or digital versatile
discs. DVDs use a two-level storage system
that holds at least 8.6 gigabytes of information. And that’s using only one side of the disc. As
revolutionary as both the CD and DVD have been, they pale in comparison to the potential
of two new high-capacity optical disc formats: Blue-Ray and HD-DVD.
Both of these formats, which look no different than any other CD or DVD, hold an enormous
amount of data.
A single layer HD-DVD disc can hold 15GB of data, while a single layer Blue-Ray disc holds
between 23GB and 27GB of data, and both can hold multiple layers of data. No wonder their
primary application has been for holding feature films in high-definition video.
Waiting in the wings are storage methods, such as holograms, that expand the capacity of
PC storage into the scale of the terabyte-a thousand billion bytes, a thousand gigabytes, or
20,000 four-drawer filing cabinets filled with text.

Answer questions
1. Is light used to remember data today?
2. What is the difference between CD-R and CD-RW?
3. Where does the capacity of a CD which holds up to 700MB of information come from?
4. What was the first use of DVDs?
5. What are the two new high-capacity optical disc formats?
6. Are there any new frontiers to expand capacity?

82
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Magnetic media

6. Reading | Tick the right translation


Read the text about holographic storage and then tick the right translation.

Holographic storage.
Holograms are those flat pictures
that seem to move or pop out in three
dimensions;they are created by recording
light in a different way. Instead of making
a record of light hitting the surface of
the hologram, the technology makes a
record of the interference patterns that
is created when the ordered light waves
of one laser beam is turned on and off to
represent data bits as they pass through
the waves of a second laser beam.
While reading is still ongoing, the
reaction of the reference laser beam
and the stored interference pattern
in the medium recreates the original data beam, which is then detected by an array of
photosensitive cells. These records are stored within the material itself, adding a third
dimension to data storage, and changing the angle at which the laser beams cross paths
changes the interference patterns.Using holographic storage,different pages of information
are allowed, by the different patterns, to exist together within the same 3D space and so
there is the possibility that storage will abandon the platter configuration in the place of
record data within a cube of optically sensitive crystal.
Even if holographic storage is still under consideration, IBM has already demonstrated the
technique, recording 1GB of data in a crystal the size of a sugar cube, with data access rates
of one trillion bits a second.
But there’s a problem: it’s not rewritable. Any data written to holographic storage is
permanent; it can’t be erased or changed.While research is under way to make holographic
storage rewritable, the permanence of holography isn’t a problem.
As storage is capacious enough and cheap
enough software can keep track of new
versions of a same file so that previous
versions are accessed only when there’s a
need to.
With holographic storage media offering 100
times the capacity of magnetic media, there
is really no competition. It may become the
technology of memory devices of the rising
generation. Large-scale storage used to be
measured in terabytes but the industry is
now demanding petabytes and exabytes and
so systems containing up to 540 discs in a
cabinet are going to become the norm.

83
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHEUDLQRI HYHU\FRPSXWHU

Tick the right translation of the following.

1. to pop out a. saltare su b. rendere popolare c. colpire


2. to hit a. spostare b. colpire c. saltare su
3. pattern a. articolo b. schema c. soluzione
4. waves a. saluti b. onde c. lunghezze di onde
5. beam a. raggio b. faro c. candela
6. to detect a. determinare b. destinare c. investigare

7. Writing | Answer questions


Read the text about holographic storage again and then answer the following questions.
1. What are “holograms”?
2. What are their features?
3. Where are records stored?
4. Why is there the possibility to abandon the platter configuration using holographic storage?
5. What are the problems with holographic storage? (if any).
6. Can we say that it will be the technique of the future?

8. Activity | Match
Match the first half of a sentence in column A with the second half in column B. Be careful
because two items in column A are not necessary.

A B
1. the technology a. is not rewritable
2. during reading b. makes a record of the interference patterns
3. while research c. are not stored on the surface of a material
4. these records d. may become the technology of the future
5. holographic storage e. the reaction of the reference laser beam and the stored
interference pattern creates the original laser beam again
6. with holographic storage media
7. IBM has demonstrated

Solution 1 .... 2 .... 3 .... 4 .... 5 .... .... ....


not necessary

84
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Revise & check

5HYLVH FKHFN
1. Match the technical terms in the box with their definitions. There are
two intruders.
transistor | data | program | ALU | input unit | IAS | printer |
control unit | memory unit | output unit

Definitions
The component of the CPU which is used for executing the actual
arithmetic and logical functions called for by the program
Pieces of information that are prepared for the computer, e.g.
numbers, characters etc.
A device used for storing data
The device used for receiving results
The component of the CPU that controls the operations
The device used for entering data (e.g. a keyboard)
A set of instructions for the computer
Acronym for: Immediate Access Store which provides immediate
memory for holding data and programs

2. Read the text about hard drives again and then put in order the
sentences below.
1. several disks / hard drives / single spindle / consist of / on a
Solution: .................................................................................................................
2. is able to / surface / store data / a disk
Solution: ................................................................................................................
3. can have / head / each surface / its own / read-write
Solution: .................................................................................................................
4. has/several/a hard drive/heads/and record data/that/read-write/read/disks/on the
Solution: .................................................................................................................
5. of sizes / disks / all sorts / hard / in / are available
Solution: .................................................................................................................

3. Read the passage about DVD and fill in the gaps with suitable words.
DVDs (Digital versatile disks)
Like CD-ROMs, DVDs can be used to store computer application (1) .............., multimedia
programs (encyclopaedies) and full length movies. Any application software that needs six
to seven CD ROMs for installation could be (2) .............. by a single DVD. This is because CD
ROMs store 650 MB of data where as a DVD stores between 4700 and 17.000 MB.
The latest generation of DVDs allows users to write data to the (3) .............. so they may be
used in much the same way as a normal hard disk. DVD drives (the hardware you need to
read the DVD disk) look the same as CD-ROM drives. Eventually all (4) .............. will come
with a DVD drive.
DVDs also are used to store movies since they produce much better quality pictures and
sound compared to a normal (5) .............. tape. A film stored on DVD can even give the viewer
a choice of several languages in which it can be played back.

85
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHEUDLQRI HYHU\FRPSXWHU

4. Fill in the gaps with the words given in scrambled order.


CD-ROM drivers
clip art | alter | drivers | players | light | the data |
read-only | capacity | music | digitally | the disk | multimedia

CD-ROM DRIVERS
CD-ROM (1) …..……..... use the same technology as (2) …………….... CDs and CD
(3) ...………… The data is stored on the disk (4) ………….. and a laser beam is used

to read (5) ………… off the disk. Because (6) …..…….. is used on (7) …………., the
data may be packed closely and the disk has a huge (8) ………… CD-ROM drives
are included in (9) ……………..systems. A CD-ROM can be filled with (10) …………
(pictures you can use in your documents), encyclopaedias, photographs. CD-ROM.
Are (11) ……………. disks, which means that you can read the data off the disk but
not (12) ………….. it or store new data.

5. Put in order the following sentences used in this module.


1. the boot-up/ process/ the first step/ in a complicated/ is/
Solution: .................................................................................................................

2. heart/ every computer/ is/ the CPU/ the/ of/


Solution: ................................................................................................................

3. drive/ CD-rewritable/ the same disc/ a/ reuse/ lets you/


Solution: .................................................................................................................

4. random access/ disks/ are considered/ hard/


Solution: .................................................................................................................

5. smaller/ in electronics/ better/ is/


Solution: .................................................................................................................

6. QWERTY keyboard/ input/ the standard/ was mostly/ via/


Solution: .................................................................................................................

7. holding area/ and programs/ RAM is/ a high- speed/ for data/
Solution: .................................................................................................................

8. is called/ of I-time/ the machine cycle/ the combination/ and E-time/


Solution: .................................................................................................................

9. the use of software/ virtual memory/ and hard disk storage/ of RAM through/
expands the capacity/
Solution: .................................................................................................................

10. forever/ keeps/ its contents/ ROM


Solution: .................................................................................................................

86
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Test your competence

7HVW\RXUFRPSHWHQFH
1. Fill in the chart below and then write a report explaining:
- what the chart represents;
- the sequence of events

C.P.U.

Unit

Main storage unit

2. After reading the following information about chips answer the


questions below. Then discuss your answers with your partner.

Something more about chips


Let’s consider the definition of a microchip like that: it is a sheet of silicon
dioxide on which microscopic electrical circuits have been etched using
a system of light, light-sensitive films, and acid baths.
As you certainly know, the transistor is the main building block from
which all microchips are built. The transistor can create binary
information, that is to say: a 1 if current passes through or a 0 if current
does not. Thousands of transistors are connected on a single slice of
silicon; the slice is embedded in a piece of plastic or ceramic material
and the ends of the circuitry are attached to metal leads that expand in
order to connect the chip to other parts of a computer circuit board. The
leads carry signals into the chip and send signals from the chip to other
computer components.

Answer questions
1. What is a chip?
2. What is the function of the transistor?
3. Do you think chips will always work in the same way?
4. Are there any limits to the capacity of microchips?

87
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 7KHEUDLQRI HYHU\FRPSXWHU

3. Using your knowledge, fill in the following grid about hardware and
software, with the missing information.

Name Fuction Part of the system


RAM to store information hardware
to perform arithmetic hardware
operations
Video
to make the computer work
Printer hardware
to enter instructions hardware
to store extra information hardware

4. Tick the appropriate box and correct the false sentences. T F

1. The C.P.U. executes a computer program together with memory


2. Personal computers are faster than supercomputers
3. An instruction is executed immediately
4. A storage device for a special purpose is represented by a register
5. The C.P.U. always performs four steps for each instruction

5. Match the words and expressions in column A with their synonyms


and/or definitions in column B.

A B
1. fetches a. performs
2. decodes the instruction b. is a storage device
3. in association with c. deliver
4. release d. decides what it means
5. executes e. is the combination of I-time and E-time
6. a register f. together with
7. machine cycle g. gets

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 ....

6. Mini Project.
Now, organize a logical process to
describe the information provided
by your completed table (in ex. 3)
and report it to your teacher and
classmates; use Power Point, your
PC and then a video projector that
may be connected to an interactive
whiteboard or may project onto a
traditional reflective projection screen
or on the wall of your classroom.
88
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

The processing unit

PRGXOH

 2SHUDWLQJV\VWHPV

In this module you will learn to:


t talk about operating systems
t analyse main types of O.S. and O.S.
for mobile devices
t describe Unix
t examine different types of application software
t talk about database, SQL, Query
t explain advantages and disadvantages of
integrated packages

Main functions of operating systems


1. Approach | Read and write equivalents
After reading the quotation about operating system, write the Italian
equivalent next to the English words.

The operating system acts as a “shell” around the hardware. For programs to
work, they need an operating system. For users to get useful work out of the
computer, they have to use application programs and the operating system to
communicate with the hardware.

Application
USER
HARDWARE
Opening System

Application
USER

utenti | conchiglia/guscio | agire | nei confronti di/per | funzionare |

1. shell ............................................ 4. users .............................................


2. to work ....................................... 5. to act .............................................
3. for ...............................................

89
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH


 2SHUDWLQJ V\VWHPV
7KHEUDLQRI HYHU\FRPSXWHU

2. Reading | Answer questions


Read the passage about what an operating system is and answer the questions
below.

What is an operating system?


For a computer to run a particular program, many tasks must be
performed, ranging from simple tasks such as loading the program into
RAM or printing a document to complex ongoing tasks such as virtual
memory management. The program that takes care of these details is
called the operating system. We can say that the operating system is a
collection of programs that manages and controls applications and other
software, and coordinates the various hardware components to perform
tasks requested by the user. As the definition of the operating system
(O.S.) indicates, many parts of it act as a helper to anyone using the
computer. On most computers, the O.S. resides on the hard drive when
the computer is off, and then on starting up the computer, a copy of the
O.S. is transferred to the RAM.
As stated in the definition, an O.S. consists of a collection of programs
that helps you communicate with the computer’s hardware. It not only
makes a computer easier to use, but it also allows the computer to run
efficiently. It acts like a smart proactive assistant that moves information
around the computer and performs other odd jobs as needed.
Here’s a partial list of the numerous activities that the O.S. performs:
1. using the mouse;
2. using the keyboard;
3. printing to a printer;
4. choosing different printers on a network;
5. starting up programs;
6. using modems for communications;
7. finding things for the user;
8. changing colors on the screen, and so on.
The O.S. is the traffic cop of the computer.

Answer questions.
1. What is an operating system?
2. Where does the O.S. reside on most computers?
3. Does the O.S. help only you or also the computer? (Give reasons).
4. Do you remember three or four activities performed by the O.S.?
5. How can you explain that the O.S. is the traffic cop of the computer?

3. Speaking | Oral report


Read the previous passage again and prepare a short oral report on operating
system following the guidelines below:
- definition of operating system and its function(s).
- where it resides when the computer is off.
- what happens on starting up the computer.
- the reason why it acts like a smart proactive assistance.
- list some of its numerous activities.

90
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Main functions of operating systems

4. Reading | True/False & Summary


Read the text about how an operating system controls hardware and say if the sentences are true
or false. Correct the false statements, then summarize the text orally.

How an operating system controls hardware


A platform is defined by two key elements:
- the processor (for example, Intel Pentium 4)
- the operating system (for example Windows)
Generally, software created to run on one platform is not compatible
with another platform.
The first operating systems (created in the late 1940s) were originally
developed to handle one of the most complex input/output operations:
communicating with a lot of disk drives. This is evidenced by the names
given to early operating systems, which often contained the acronym
DOS, for “disk operating system”. Eventually, the O.S. (operating system)
evolved into an all-encompassing bridge between your PC and the
software you run on it.
Without an O.S., such as Windows, each programmer would have to invent
from scratch the way a program displays text or graphics onscreen, how
it sends data to the printer, how it reads or writes disk files, and how it
implements other functions that mesh software with hardware.
An O.S. creates a common platform for all the software you use. Without
an O.S., you might not be able to save files created by two different
programs to the same disk because each might have its own storage
format. An O.S. also gives you a tool for all the tasks you want to perform
outside an application program: deleting and copying files to disk,
printing, and running a collection of commands in a batch file.
The O.S. does not work alone. It depends not only on the cooperation
of other programs, but also on meshing smoothly with the BIOS and
software drivers.The BIOS is made of code contained on chips in a PC. It
acts as the intermediary among the hardware, processor, and O.S. Device
drivers are like a specialized BIOS; drivers translate commands from
the O.S. and BIOS into instructions for a specific piece of hardware, such
as printer, scanner, or DVD-ROM drive. When some parts of the O.S.
are loaded from disk, they are added to the BIOS and then joined by
device drivers, and all of them carry out routine hardware functions. The
O.S. is composed of all three of these components, plus scores of other
programs, common code, and data files.

What do we mean by “platform”?


“Platform” defines a standard by which software is developed and
hardware is designed.

91
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 2SHUDWLQJ V\VWHPV

T F
1. The first operating systems appeared in the early 1940s.
2. DOS is the acronym for “disk operating system”.
3. “Windows” is an operating system.
4. Without an O.S. the programmer would have to invent only a part of the
program that displays text or graphics onscreen.
5. With an O.S. you can save files created by two different programs to the
same disk.
6. If you want to perform some tasks outside an application program an
O.S. isn’t necessary.
7. The O.S. works together with the BIOS and software drivers.
8. When some parts of the O.S. are loaded from disk, they are added to
the device drivers.

What is BIOS? It’s the acronym for: basic input/output system. It’s a collection of programs
that has the capability of communicating with peripheral devices such as keyboards, disk drives,
printers, display/monitor, and other I/O devices. The most important task it performs is to load the
operating system into RAM and turn control of the computer over it.

5. Activity | Match
Match the first half of a sentence in column A with a second half in column B. Be
careful because two in column B are not necessary.

A B
1. the first O.S.s were developed a. they are added to the BIOS
2. the O.S. evolved into a bridge b. because there is an O.S
3. a common platform for all the c. the O.S. does not work alone
software you use
4. you are able to save files d. to handle one of the most
complex I/O operations
5. the BIOS acts as the intermediary e. among the hardware, processor
and O.S.
6. when some parts of the O.S. are f. between a PC and the software
loaded from disk
g. is created by an O.S.
h. is not compatible with another
platform

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... .... ....


not necessary

92
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Main functions of operating systems

6. Reading | True/False
Read the passage about who directs the action in a computer and say if
the sentences are true or false. Correct the false ones.

Who directs the action in a computer? Relationship


between the
As software users, we tend to shower our praise on helpful application operating system
software. However, system software, like a film director, stays in the and applications
background and ties it all together. software.
The operating system
The most prominent of these behind-the-scenes players is the operating
coordinates all
system, the software that controls everything that happens in a computer. software activity
Its graphical user interface (GUI; pronounced “G-U-I” or “gooey”), within a computer
provides a user-friendly interface to the operating system. system. Our
Modern O.S.s offer a graphical user interface that let’s you “point and interfaction
click” with a mouse to enter commands. GUI users interact with their with the operating
system is through the
computers by using a pointing device, such as a mouse on desktop PCs graphical user
or a touchpad on notebook PCs. You can also issue commands on a interface, the GUI.
keyboard. Rather than enter a command directly,
you choose from by pointing to and choosing one
or more options from menus or by pointing to and
choosing a graphics image, called an icon. An icon
is a picture that represents a processing activity or
file.
System software also includes a variety of utility
programs that are available to help you with
the day-to-day chores associated with personal
computing (such as disk and file maintenance,
system recovery, security, backup, virus protection
and so on) and to keep your system running at
peak performance.
Just as the processor is the nucleus of the computer
system, the operating system is the nucleus of all software activity. The
operating system is actually a family of system software programs that
monitor and control all I/O and processing activities within a computer
system. One of the operating system programs loads other operating
system and applications programs to RAM as they are needed.
The program, called a kernel, is loaded to RAM on system startup and
remains in RAM until the system is turned off.

T F
1. System software is like the film director.
2. Hardware is the most prominent of the behind-the scenes players.
3. The operating system is the software that controls everything.
4. GUI users interact with their computers by using a touchpad on
desktop PCs or a mouse on notebook PCs.
5. Software that provides detailed information with regard to available
memory and disk space would be considered utility software.
6. The kernel is loaded to RAM on system start-up.

93
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 2SHUDWLQJ V\VWHPV

Track
7. Listening | Complete and summarize 08
You are going to listen to Mr Parker, an expert on IT, explaining the most
important types of operating systems.While listening, complete the passage
with the words given in scrambled order. Then summarize it orally.
latest | to share | advantage | humans | on-line | terminals | networks | CPU
Types of operating system
Let’s consider the following types of operating system:
- Multitasking (or multiprogramming); it allows several application programs
to be in RAM at one time. Each of them will be allowed (1) ................ time
as needed, even though only one of them is currently being used by the
person at the keyboard. All of this is controlled by the operating system.
We can say that multitasking means the ability of a computer to run two or
more programs at the same time. For (2) ................ it would be difficult to do
more than one task at once. The computer can, however, for example, print
out, a document of 30 pages while continuing to use the word processor to
type in a new letter. The operating system takes care of the printing and the
word processing simultaneously.
- Multiuser (or multi-access); it permits several users to access the same
data at the same time. A multiuser operating system needs to be used with
most (3) ................ ; so the technique that allows many users (4) ................
computer resources at the same time is called “time-sharing”.
- Real-time processing; it is a system which is automatically updated when
a change is made due to a transaction. In the fast world we now live in, it
is important that data is kept bang up-to-date so real-time systems have to
be used. Since in a real-time system the (5) ................ must be connected
to the computer, you can see that a real-time system must also be an
(6).................. system.
- Real-time processing is essential for computer control that may include
traffic lights, robots, process control (e.g. steel works and chemical
processes) and flight simulators. Real-time processing in the business
world is computing that involves humans interacting with the computer
in a situation in which quick or timely return of results is important. One
example from the business world is the automated teller machine (ATM).
- Batch processing; it is a system of collecting all the inputs together and
putting them into the computer in one go or “batch”. The main (7) ................
with batch processing
is that the computer
operator can load the data
in only one operation; the
programs in the computer
go through the various
processes and the final
result (for example: for the
production of electricity
bills) is a pile of bills to
be sent out to costumers
and an updated master
file with the (8)..............
information added.

94
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Main functions of operating systems

8. Reading | True/False
Read the passage about UNIX, Linux, and LindowsOS and say if the
sentences are true or false. Correct the false sentences.

UNIX, Linux, and LindowsOS


UNIX, a multiuser operating system
created in the 1970s, was one of the first
operating systems. It became very popular
in universities; the UNIX movement to PCs
has been slow until recently. Its popularity is
due to its flexibility (to be used on almost any
computer) in doing computing jobs and the
fact that it is extremely well written. It doesn’t
fail or crash very often. Even more compelling,
some versions, such as Linux, are free.
The UNIX operating system can have either a
command-line or GUI type of user interface.
However, it has its roots in the command-
line type of user interface. Popular command-line interfaces to UNIX
include: Korn shell; C shell; Bourne shell.
The word shell is another way of describing the interface between the
user and the computer. An example of a GUI (graphical user interface)
to UNIX is called X Window; X Window was designed with networking
in mind. However, most UNIX users use it as a GUI to UNIX; it is much
easier to use than the command-line version of UNIX.
Linux, a UNIX spin-off, is gaining momentum as an alternative to
Windows; it can be used with both command-line and graphical user
interfaces. Linux is an “open source” operating system that was developed
over the last decade via a worldwide consortium of developers, all
working with the same programs.
LindowsOS is a commercial Linux-based operating system for PCs; it
has a Windows-like interface and offers file-level compatibility with
many popular Windows-based applications, such as Word and Excel.
That is, a Windows-base Word or Excel file can run on a LindowsOS
system.
Operating systems of the future will be more powerful but easier to use
than current operating systems. Eventually, special intelligent programs
called “agents” will most likely assist the user. It would be like having a
human expert sitting with you and telling you what to do.

What is open source? Open source software is software for which the actual source programming
code (the instructions) is made available to users for review and modifications. The significance of the
rapid growth of this operating system is that it has the potential to become a competitor to Microsoft
Windows client and server programs.

95
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 2SHUDWLQJ V\VWHPV

T F
1. UNIX was developed in the 1970s.
2. It became popular in high schools.
3. The UNIX movement to PCs was fast.
4. UNIX is flexible.
5. UNIX has its roots in the command-line type.
6. Linux has its roots in UNIX.
7. Linux can be used with GUI.
8. Linux is free and the original program is available.
9. Open source software means that anyone can make changes to suit
his/her computing needs.
10. A Windows-base Word file can’t run on a LindowsOS system.

9. Writing | Answer questions


Read the previous passage again and then
answer the following questions:
1. What is UNIX?
2. Is it popular? Why? Why not?
3. How is its user interface?
4. What is meant by “shell”?
5. What is Linux?
6. How can you define “open source software”?
7. Why can “open source software” become a
competitor to Microsoft Windows client and
server programs?
8. What is LindowsOS?
Linux. 9. How is its interface?
10. What about operating systems of the future?
11. What is meant by “agents”?
12. What will the agents do?

10. Activity | Match


Match the following English words with their Italian equivalents.

1. Eventually a. essere dovuto


2. to emerge b. guastarsi
3. to be due c. guscio, conchiglia, struttura
4. to fail d. mediante, per mezzo di
5. compelling e. alla fine
6. roots f. crescita
7. shell g. effettivo, reale
8. spin-off h. apparire, venire fuori
9. via i. odierni, attuali
10. consortium j. consorzio
11. actual k. convincente, persuasivo
12.growth l. sottoprodotto
13.current m. radici

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 .... 8 .... 9 .... 10 .... 11 .... 12 .... 13 ....

96
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Main functions of operating systems

11. Reading | Discuss


Read the information about operating systems for
mobile devices and then, using your own words
and knowledge, discuss the ideas given below
explaining them to your partner. Then swap roles.

Operating systems for mobile devices


A mobile operating system is the O.S. that controls
a mobile device such as a smartphone, a tablet
computer or a notebook. Today, the most important
are: Windows Phone, Android and iOS.
- Windows Phone is a mobile operating system
developed by Microsoft for smartphones. It is a compact operating system combined
with a suite of basic applications and features for mobile devices. Features include
multitouch screen, a user interface with a new modern design, social networking
services, e-mails and a mobile version of Microsoft Office programs.
- Android, which was developed by Google, is a software stack for mobile
devices that includes an operating system, middleware and applications.
Android relies on Linux for core system services such as network stack, process
management, memory management, security, driver model. The kernel acts as an
abstraction layer between the hardware and the rest of the software stack.
- iOS is Apple’s mobile operating system for iPhone, iPod Touch, iPad. This operating
system manages the device hardware and provides various system applications, such
as notifications, mail, Safari browser, camera, photos, message services, newsstand for
books and magazines, social networks and other standard system services. The user
interface is based on touch controls.

Explain and discuss the following ideas:

a. a mobile operating system; b. a core system;


c. a network stack; d. a suite of basic application.

12. Writing | Write questions and answers


Write questions with the prompts given below. Be careful: you have to add the
necessary language. Then answer your questions.

1. O.S. / what / mobile?


Solution: ......................................................................................................................
2. Windows Phone / be / kind / O.S. / what?
Solution: .....................................................................................................................
3. features / what / these / include?
Solution: ......................................................................................................................
4. on / rely / Android / what?
Solution: ......................................................................................................................
5. the / hardware / manage / device / iOS?
Solution: ......................................................................................................................

97
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 2SHUDWLQJ V\VWHPV

Track
13. Listening | Fill in and discuss 09
You are going to listen to Mr Parker speaking about a new O.S. “Android”.
While listening, fill in the blanks with words given in scrambled order
then discuss, with your partner, the importance of Android. Swap roles.

scores | upgradable | platform | developed | released |


freely | mobile | customized

Android
Android is a newly created, Linux-based Operating System. It has been (1)…….........
by Android Inc. which Google (a technology company) first backed from a financial
point of view and then bought. In 2007 Google and a group of hardware and software
specialists and technology companies, called the Open Handset Alliance (OHA) have
created open standards for mobile devices promising a flexible, (2)….......... system.
In that year, Android was unveiled as a mobile device platform built on the Linux
kernel version. Android is an open source which means that it allows the software to
be (3)….......… modified, without having to
pay a penny; as a result of this, developers,
device manufacturers and wireless carriers
can develop and distribute their own
modified versions of the operating system.
A lot of these developers write applications
(“apps” that are available for Android and
downloaded from Google Play) that make
wider the functionality of devices because
they write in a (4)….......…. version of the
Java programming language; a very recent
survey found that Android is a very popular
(5)….......…. used by mobile developers.

Android was first designed for touchscreen (6)….......… devices, specially


smartphones and tablets, but then a lot of applications have been used on televisions,
games consoles, digital cameras etc., because its open nature encourages to add new
features in order to satisfy modern human being’s needs. In 2010, Google launched its
Nexus series which included smartphones and tablets running the Android O.S.; HTC
(a device manufacturer) together with Google (7)….......…. the Nexus One (the first
Nexus smartphone). The series has been updated over and over as Google provides
a lot of updates which are received over the air by most devices every six to nine
months. Android’s share of the global smartphone market, led by Samsung products in
March 2013 was about 64%. In July 2013 there were 11,868 different Android devices,
(8)…......... of screen sizes and eight O.S. versions in use at the same time: a real

smartphone war.

98
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Main functions of operating systems

14. Writing | Answer questions


Read the previous passage and then answer the following questions:
1. What is Android?
2. What are its main features?
3. What did Google do initially?
4. What is OHA?
5. What are “apps”?
6. Who writes “apps”?
7. Why are “apps” written?
8. How often are updates provided?
9. What do you understand for “smartphone war”?

15. Reading | Answer questions


Read the text about iOS 7’s new look and then answer the questions below.

iOS 7’s new look


The crisp and new look of Apple iOS 7 gives the mobile operating system
a real new look together with some of its first Apple features for iPhone
and iPad fans, such as: automatic app updates, quick access system
controls and Apple’s AirDrop file sharing system.
It seems that, within a very short period of time, a complete visual revision
will take place in order to change, for example, the color schemes, the
typography, the typical icon, and the button shape across the entire
platform.
With all these new features, the old interface elements disappear, so in
the place of apps and icons that look like paper or felt, we will have flat
graphics and pastel color scheme that bring an elegant look.
Apple promises a 3D effect, too; for example, such an effect makes your
wallpaper appear some distance behind the icons, when you move the
phone or tablet. The most important part of any deep design work is that
it feels smooth and connected from screen to screen.
The look is totally different across the board, from the apps we saw
to minor interface elements, for example: animated transitions when
we open and close apps. It’s important to note that, even if everything
looks different, it’s still easy to pick up and use right because the core
functionality is the same; now , there are extra tools on hand for sharing
via AirDrop, and a smooth tab-browsing interface.

Answer questions.
1. Can we say that iOS 7’s look is new?
2. Why? Why not?
3. Where will a visual revision take place?
4. What happens with the “new look”?
5. Does everything look completely different?
6. Explain your idea(s) about the text

99
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 2SHUDWLQJ V\VWHPV

“Illustrated here is
the hierarchy of data
organization and its
relationship to a typical
employee record.”

Application Packages
1. Reading | True/False | Summary
Read the text about “Database managers” and say if the sentences are
true or false. Correct the false ones. Then summarize the text orally.

Database managers
A database is an organized collection of information or data structured in such a way that
it can be used in different applications
A database is used to store information so that it can be searched and sorted in various
ways.
Software’s reason for being is juggling. Whether the data are words, facts, or numbers,
software finds new ways to compare, sort, order, merge, separate, and connect it- all an
impressive juggling act. Collect a lot of data in some organized way, and you have a database.
The software used most often to do that is called a database manager.
Database software lets you enter, organize, and retrieve stored data.
If you have visited a library that still uses card files, you have worked with one type of non-
computerized database: one that illustrates perfectly the advantages of a computerized
database. (Remember that the box of filing cards is the computer’s file which is usually
stored on a magnetic or optical disk).
Many programs that we don’t think of as databases actually involve some form of database
management. One reason why electronic spreadsheets such as Lotus 1-2-3 and Excel
have become so popular is that, in addition to being capable of calculating complicated
mathematical formulas, they can sort and extract both mathematical and textual data.
Accounting and inventory programs are specialized databases Even word processors use
database features in their spelling checkers and mail-merge operations.

100
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Application packages

T F
1. A database is used to store information.
2. Database manager is a software.
3. Database managers collect a lot of data.
4. Data collected by database managers aren’t organized.
5. A computer’s file is the box of filing cards in a non computerized
database.
6. Lotus 1-2-3 and Excel are capable of calculating mathematical formulas.

2. Reading | Match
Read the passage about what database
managers can do and then match the
first half of a sentence in column A with
a second half in column B.

What can database managers do?


The range of tasks a database manager
can perform varies with the complexity
of the program, but in general, they all do
these jobs:
1. database managers let you define a “data type” t ” for
f the
th information
i f ti you wantt to
t store;
t
alphanumeric or numeric, for example. They also define a data format that aids in
retrieving and organizing the data. For example, a single piece of data might be limited
to a certain length or to specific values;
2. database managers store data in records. A record is a collection of data about a
particular person, place, or thing. Most databases display (on the screen) one record
at a time, just as if you were browsing through the cards in a card box. The individual
items are contained in fields, similar to the blank areas on a paper form. A field consists
of two parts: the field name and the field data. The field names are the words ‘Title’,
‘Author’, ‘Publisher’, or ‘ISBN’. They are the same on each record and indicate what the
field data represents. A record, for example, could include fields for information on one
person’s name, address, and phone number. The records are displayed in an onscreen
form, where field data is entered, edited, deleted, and viewed. Several records with the
same fields of information for entries constitute a table;
3. database managers carry out queries, which are searches for data that meet specified
criteria, to allow you to retrieve certain subsets of the data. These queries sort and filter
the data to let you see it from different angles. For example, a typical query would ask
the database to display all records for bills that are more than 60 days overdue;
4. database managers perform calculations on the data. Not only they do mathematical
calculations, they also perform “if true” logic tests and parse text data, allowing you to
perform operations such as combining a person’s first and last names from two pieces
of data into one;
5. database managers present the data in a formatted, easy-to-read report, which can
include calculations on the data, such as the total value of sales orders taken from
several store locations.

101
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 2SHUDWLQJ V\VWHPV

A B
1. Database Managers let you a. data in records
2. Database Managers define b. a collection of data
3. The individual items are c. a data format
4. The field names are d. limited to a certain length or to specific
values
5. A record is e. searches for data that meet specified
criteria
6. Database Managers store f. the data in a formatted, easy-to-read
report
7. Queries are g. and filter the data to let you see it
from different angles
8. Queries sort h. the words “Title”, “Author”, “Publisher”,
or “ISBN”.
9. Database Managers present i. define a “data type”
10. A single piece of data might be j. contained in fields

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 .... 8 .... 9 .... 10 ....

3. Writing | Write questions and answers


Write questions with the prompts given below. Add the necessary
language. Then answer your questions.
1. What / a record / to be?
Solution: ......................................................................................................................
2. Where / the individual items / be / to contain?
Solution: .....................................................................................................................
3. How many parts / a field / to consist of?
Solution: ......................................................................................................................
4. Where / the records / to display in?
Solution: ......................................................................................................................
5. What / queries / to do?
Solution: ......................................................................................................................

4. Speaking | Oral report


Prepare a short oral report on what database managers can do following
the guidelines below:
a. definition of database;
b. what operations database managers perform;
c. what a record is;
d. what a field is;
e. what queries are;
f. what a report is.

102
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Application packages

5. Reading | True/False
Read the passage about record design and say if the sentences are true or
false. Correct the false sentences.

Record design
Modern databases give you freedom to design your own records. They
give you an empty screen on which you can add the field names, fields
and other background text such as the title. On some databases you can
even put boxes around headings and even change the colour of the text.

Some databases require you to create a different type of field for different
information. You usually have to specify the type of data to go into the
field. This can be:
1. numeric, which means it contains only numbers. Make sure that a
number does not have any starting zeros or dashes.
2. character text, which means that numbers, letters and other symbols
can be entered.
3. data, which means that the data is entered.
4. logical, which allows Y/N (for Yes/No) or T/F (for True/false)

As well as selecting the field names and the type of data to be entered,
some of the more sophisticated databases allow you to specify some
validation checks to the field.

Database software allows you to create customized reports and to


design their layout. This design capability allows you to change spacing
and to include titles, subtitles, column headings, separation lines, and
other elements that make a report more readable. Managers often use
this capability to generate periodic reports.

What is validation?
Validation is the process of detecting any data that is inaccurate, incomplete, or unreasonable.
Validation is performed by a computer program.

T F
1. You can design your own records.
2. Modern databases give you a full screen on which you can add the
field names.
3. On some databases you may even change the colour of the text.
4. If you want to go into a field you have to specify the type of data.
5. A field is only numeric.

103
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 2SHUDWLQJ V\VWHPV

6. Activity | Match
Match the sentences in column A with the logical endings in column B.

A B
1. you can add the field names a. boxes around headings, on some
databases
2. modern databases b. freedom to design your own records
3. an empty sceen c. on an empty sceen
4. you can put d. is given by modern databases
5. modern database give you e. give you an empty screen
6. a numeric field f. can form a character text
7. numbers, letters and other symbols g. contains only numbers

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 ....

7. Writing | Write questions


Write suitable questions to the following answers.
1. Q: ............................................................................................................................
A: The most important advantage is represented by the freedom to design own
records.

2. Q: ............................................................................................................................
A: We can add the field names, fields and other background text such as the title

3. Q: ............................................................................................................................
A: A different type of field for different information.

4. Q: ............................................................................................................................
A: You have to specify the type of data.

5. Q: ............................................................................................................................
A: It contains only numbers.

6. Q: ............................................................................................................................
A: It is called character text.

7. Q: ............................................................................................................................
A: “Logical” means that we have two alternatives: Yes/no or True/False.

8. Q: ............................................................................................................................
A: They allow us to specify some validation checks as well as selecting the field
names.

9. Q: ...........................................................................................................................
A: Customized reports.

10. Q: ............................................................................................................................
A: To generate periodic reports.

104
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Application packages

8. Reading | Match
Read the passage below and match the first half of a sentence in column
A with a second half in column B. Be careful, because one in column be
is not necessary.

Reviewing the foundations of SQL


You need a database application language to create tables and specify
the fields the tables contain, to establish relations beetween tables, and
to manipulate the data in database. The first language that Dr. Codd and
his associates at the IBM San Jose laboratory defined was Structured
English Query Language (SEQUEL), which was designed for use with a
prototype relational database that IBM called System R.
The second version of SEQUEL was called SEQUEL/2, which was later
renamed SQL.Technically, SQL is the name of an IBM data manipulation,
not an abbreviation for structured Query Language.

Query
A query is an expression in any dialect
of SQL that defines an operation to be
performed by a database management
system. A Query usually contains at
least the following three elements:
1. a verb (such as SELECT) that
determines the type of operation;
2. a predicate object that specifies one
or more field names of one or more
table object(s), such as to specify all
of the fields of a table;
3. a prepositional clause that
determines the object(s) in the
database or which the verb acts
(such as FROM Tablename)
The simplest SQL query that you can
construct is:
SELECT + FROM Tablename, which returns the entire content of
Tablename as the query result set.
Queries are classified as “select queries” which return data (query result
set), or “action queries”, which modify the data contained in a database
without returning any data.
All the dialects of SQL are fourth-generation languages (4 GLs).

105
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 2SHUDWLQJ V\VWHPV

A B
1. It is necessary a database a. was of 1970
application language
2. Dr. Codd’s database model b. was designed for use with a prototype
relational database
3. SEQUEL was the first language c. was renamed SQL
which
4. His relational model d. to create tables and specify the fields
the tables contain
5. SEQUEL/2 e. was a theoretical description
6. All dialects of SQL f. containts three elements
7. A query g. is used for creating text documents
h. are 4GLs

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 .... ....


not necessary

9. Activity | Tick the right translation


Go through the passage on SQL and tick the right translation for each
word.
1. relational database a. database relazionale b. relazione di dati base
2. to manipulate a. dare b. gestire
3. query a. domanda b. ricerca
4. at least a. come massimo b. come minimo
5. the entire content a. l’intero contenuto b. l’intero contesto
6. fourth generation a. linguaggio di quarta b. quarto linguaggio di
language generazione generazione

10. Writing | Answer questions


Answer the following questions:
1. How can you define Dr. Cod’s relational database model of 1970?
2. What is necessary to create tables and specify the fields the tables contain?
3. What is SEQUEL?
4. What was SEQUEL designed for?
5. What is a query?
6. What does a query define?
7. What are the three elements contained in a query?
8. What does the verb determine?
9. What does the predicate object specify
10. What does the prepositional clause determine?
11. Explain the simplest SQL query that you can construct.
12.How are queries classified?
13.What is the function of select queries?
14.What is the function of action queries?

106
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Application packages

11. Reading | Answer questions


Read the passage about database inquiries and then answer the questions
below.

Database inquiries
Relational database software lets you retrieve, view, and print records
based on query by example.
In query by example (QBE), you set conditions for the selection of records
by composing a relational expression (one or more examples) containing
relational operators, that reflects the desired conditions.
A relational expression normally compares one or more field names or
character strings using the relational operators (= [equal to],>[greater
than], <[less than], and combinations of these operators).
Several conditions can be combined into a single condition with logical
operators (AND, OR, and NOT).
In “query by example”, you point and click within dialog boxes to set
criteria; however, the actual information retrieval is done with a query
language program.
A query language is a user-friendly programming language for requesting
information from a database.
When you enter criteria for a query, Microsoft Access generates a SQL
(Structured Query Language) program which is executed to retrieve the
requested information. SQL, pronounced “sequel”, is the standard query
language for relational databases and is supported by all commercial
RDBMSs. This broad support means that SQL can be used to permit the
sharing of data between dissimilar software packages and DBMSs, such as
you might find in intercompany and intercompany networking. Although
SQL is not especially difficult to learn, complex queries could require the
attention of an expert. Fortunately, major databases often include tools or
utilities called query wizards which help the user to frame requests for
retrieving specific data from a database.

Answer questions:
1. What does relational database software allow you?
2. Explain what a QBE is.
3. What does a relational expression compare?
4. Are “relational operators” and “logical operators” the same thing? Explain
your idea(s).
5. What is a query language?
6. How does query language work?
7. What does SQL permit?

107
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 2SHUDWLQJ V\VWHPV

Track
12. Listening | Fill in and Summarize 10
You are going to listen to Mr Parker explaining the advantages and
disadvantages of integrated packages. While listening fill in the text with
the missing words given in scrambled order. Then summarize it.

several | easier | one | cheaper | price | specific | database | strong |


share | transfer | pakage | available

Integrated software
Integrated software consists of a collection of application packages which
(1)……..………. a common set of commands. We can say that an integrated
package may be a wordprocessor, spreadsheet, database and graphic package, all in
(2)………..……….

There are some advantages of having such a (3)………..……., for example:


- the commands are common throughout so it is easier to get used to than
(4)………..………. different packages;
- moving data from one program to another is (5) ….……….; for instance, if
you wanted to print out details of amounts outstanding from your database
you could (6)……….…. the data to your wordprocessor. This would be easier
to do with the integrated package than with the two separate programs;
- integrated packages tend to be much (7)………..………. than separate
packages and this is a major reason for their popularity.
But there are also some disadvantages, for example some integrated packages tend
to be (8)……………. in one area and weak in others (in other words a package may
have a good database but a poor wordprocessor). If you want the best wordprocessor,
database, etc. and can pay a higher (9)……………., then it is best to buy the separate
packages.
An organization may write its own software or employ an outside company to write it.
This “tailor-made” software can be very expensive and is used only by companies with
large computer departments, or when application packages are not (10)………..………..
Much applications software is not (11)……………. to a particular type of business;
for instance, a wordprocessing package can be used by any business. Some
(12)………..………. packages such as Microsoft Access can be used to develop tailor-

made software. General purpose packages are very popular because documentation
such as: manuals, tutorials, etc., tends to be very good, the programs are well tested
and they are relatively cheap; sometimes this type of general purpose software is
called “content free software”.

108
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Revise & Check

5HYLVH FKHFN
1. Using the words in the box below, copy out and complete sentences
A to G, underlining the words you have inserted. The words may be
used more than once.
timesharing | control | multi-access | real-time | multiprogramming | on | batch |
a. If a device is …………..........-line it means that it is under the control of the central
processing unit.
b. The type of processing where changes are immediately acted upon and any files
are immediately updated, is called a ……………….......... system.
c. ……………….........… systems must always be real-time systems.
d. ……………….........… processing is used where a job is done all at once rather
than in parts.
e. …………….............…… allows the computer to work on several programs
apparently at the same time.
f. A ………………. system allows many terminals to access the CPU.
g. Each terminal has a certain amount of time allocated to it. This is called ……….....

2. Specify which system, each of the following statements, refers to.


1. The computer can be accessed at the same time by many interactive
users. ......................................................................................................................
2. With this system, the computer works on several users’ programs at the same
time. ........................................................................................................................
3. With this system all the inputs are collected and put into the computer all at once.
.................................................................................................................................
4. When a change (due to a transaction) is made, the system is automatically updated.
.................................................................................................................................

3. Match the sentences in column A with the logical endings in


column B.

A B
1. a database is a. the software used to collect a lot of data
in some organized way
2. a database is used b. the computer’s file
3. database manager is c. stored on a magnetic or optical disk
4. the box of filing cards is d. an organized collection of information or
data structured
5. the computer’s file is e. to store information
6. many programs involve f. specialized databases
7. accounting and inventory g. some form of database management

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 ....

109
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 2SHUDWLQJ V\VWHPV

4. Read the passage about record design again and answer the following questions.
1. What is the most important advantage that modern databases give you?
2. What can you add on the empty screen that modern databases give you?
3. What do databases require you to create?
4. Explain the different types of fields you know.
5. Is it possible to specify some validation checks to the field?

5. Match the first half of a sentence in column A with a second half in column B. Be
careful, because two in column B are not necessary.

A B
1. a relational expression normally a. lets you retrieve, view and print records based on QBE
2. when you enter criteria for a query, b. could require the attention of an expert
Microsoft Access
3. in QBE c. can be combined into a single condition with logical
operators
4. a query language d. include tools or utilities
5. relational database software e. compares one or more field names
6. complex queries f. help the user to frame requests
7. several conditions g. generates a SQL
h. is a user-friendly programming language for
requesting information from a database
i. you set conditions

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 .... .... ....
not necessary

6. Write suitable questions to the following answers.


1. Q. ............................................................................................................................................................ ?
A. They share a common set of commands.
2. Q. ............................................................................................................................................................ ?
A. Yes, there are some advantages.
3. Q. ............................................................................................................................................................ ?
A. I could transfer the data to my wordprocessor
4. Q. ............................................................................................................................................................ ?
A. They tend to be much cheaper than separate packages
5. Q. ............................................................................................................................................................ ?
A. Yes, some integrated packages tend to be strong in one area and weak in others
6. Q. ............................................................................................................................................................ ?
A. I buy the separate packages
7. Q. ............................................................................................................................................................ ?
A. Yes, it may write its own software
8. Q. ............................................................................................................................................................ ?
A. It means that a company may write its own software or employ an outside company
9. Q. ............................................................................................................................................................ ?
A. Yes, they are very popular
10. Q. ............................................................................................................................................................ ?
A. It is content free software

110
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Test your competence

7HVW\RXUFRPSHWHQFH
1. Using the information in the text about ‘DBMS’, complete the
statements below.

DBMS
Today, organizations are using database management systems (DBMSs), a software
tool that integrates data management and information flow within an organization.
Data redundancy can be minimized by designing an integrated database to serve the
organization as a whole, not just one specific department. The tool for creating an
integrated database is database management system software. The benefits of an
integrated database include greater access to information, better control, and more
efficient software development.
A database management system (DBMS) is a set of programs that allows the creation
of datafiles, the alteration of the data in these files and the extraction of data from the
files. The idea with a DBMS is that all the data is kept centrally and only authorised
users can access data via the DBMS.
All database management systems allow the following:
- the data files to be set up by creating tables (or datafiles) which may be
linked together;
- the user to ask questions (called queries), of the data;
- the addition of more data (appending), the deletion and editing of existing
data;
- alternation to the structure of the datafiles or tables;
- some security, by allowing only certain people access to each of the
datafiles or tables;
- the user to import data into the database from other packages and data to
be transferred to another package (exporting).

a. A database management system is a


.................................................................................................................................
.................................................................................................................................
b. The idea with a DBMS is that
................................................................................................................................
.................................................................................................................................
c. All database management systems allow
................................................................................................................................
.................................................................................................................................

2. Read the text about ‘DBMS’ again and answer the following
questions:

1. What does DBMS stand for?


2. How is data kept in a DBMS?
3. Who can access data via DBMS?
4. What are the functions of a DBMS?

111
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 2SHUDWLQJ V\VWHPV

3. Find the right translation of the following.


1. The comands are common throughout
a. i comandi sono comuni in ogni parte
b. i comandi comuni sono in ogni parte
c. i comandi sono uguali in ogni parte

2. Integrated packages tend to be much cheaper than separate packages


a. pacchetti integrati tendono ad essere più costosi dei pacchetti separati
b. pacchetti integrati tendono ad essere più economici dei pacchetti separati
c. pacchetti integrati tendono ad essere molto più economici dei pacchetti separati

3. An organisation may write its own software or employ an outside company


to write it
a. una società può scrivere il suo software o impiegare una azienda esterna per
scriverlo
b. una società può scrivere il proprio software o impiegare una azienda esterna per
scriverlo
c. una società può scrivere il proprio software o impiegare una azienda estera per
scriverlo.

4. This tailor-made software can be very expensive


a. questo software su misura può essere molto costoso
b. questo software fatto su misura può essere molto costoso
c. questo software già pronto può essere molto costoso

4. Look at the pie-chart below about the most popular browsers in


Italy and explain its meaning, the distribution of percentages, and the
information it shows.
Browsers
9%
Safari

42% 22% Firefox

Internet Explorer
27%
Chrome

5. Now transform the pie-chart above into a bar-chart following the


scheme below. While creating the new chart explain all the steps which
are necessary to develop the process and add the right logos.

112
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

The processing unit

PRGXOH
/DQJXDJHV

In this module you will learn to:
t explain main classification of programming
languages
t analyze low and high-level languages
t illustrate basic aspects of generations of languages
t talk about “translators”, “OOP”
t describe: Visual Basic, COM, HTML5, CSS3, XML

´
´ Communication is the
activity or process of expressing
ideas and feelings or of giving
people information

Programming languages:
low level languages
1. Approach | Discuss
Discuss the picture and the quotation above expressing your own ideas
and feelings about communication, languages, and the different media.

113
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH


 /DQJXDJHV
7KHEUDLQRI HYHU\FRPSXWHU

Track
2. Listening | Fill in 11
You are going to listen to Mr Parker speaking about communicating with a
computer. While listening fill in the blanks with the words given in scrambled
order. Be careful, because two words are not necessary.

participants | media | similar | code | translate | round |


means | binary | response | instructions

Communicating with a computer


The process of communicating with a computer appears (1)............................ to that
of conversing with people. Both require the same activities: we must plan out what
we want to say, figure out how to phrase it clearly, and then actually say it. Then
we wait for response from the other party. If the other party is a computer, the
(2)............................ may be in the form of a printout or some symbols appearing on

the monitor screen. Whatever form the response takes (lights, symbols, or spoken
words) we must understand the response before we begin a new (3)............................
of communication.
Good communication requires that every step in the process be completed
successfully.
A breakdown can occur any place along the cycle, causing communication to halt.
Communication success is even more tenuous when the (4)............................
are one person and one computer. Computer hardware is susceptible to failure.
Communication would be interrupted, for example, if any of the following occurred:
a. the power supply was suddenly interrupted;
b. an internal wire or transistor burned out or was disconnected;
c. a keyboard, mouse, or printer malfunctioned.
When we are trying to communicate (5)............................ to computers, the areas of
greatest difficulty are not the hardware and technology but the encoding and decoding
processes. Thus, our problem of communicating with computers is this: “How
can we (6)............................

our human thoughts, usually


expressed as words, into
computer “thoughts”, which
must be expressed as
(7)............................ numbers?”

Translating instructions into


binary (8)............................ one
by one is a time-consuming
task because people don’t think
in numbers like computers do.
The need to facilitate this task
has led to the development
of an amazing number of
programming languages.

114
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Programming languages: low level languages

3. Speaking | Answer questions


After reading the previous passage, answer the following questions.

1. What are the activities requested by the process of conversing with people?
2. Are those activities similar to the process of communicating with a computer?
3. What about response?
4. How is communication success when the participants are one person and one
computer?
5. When might communication be interrupted (when the participants are one person
and one computer)?

4. Activity | True/False
Read the passage about communicating with a computer again and decide
whether these statements are true or false. Correct the false ones.
T F
1. The process of conversing with people is different to that of
communicating with a computer.
2. The two processes require the same activities.
3. Before we begin a new round of communication, we have to ask
our friend a question.
4. In the process of communicating, every step must be completed
successfully to have a good communication.
5. Encoding and decoding processes are the areas of greatest difficulty.
6. Translating instructions into binary code one by one happens in a
short time.

5. Activity | Translation
Go through the passage and tick the right translation for each word.

1. to plan out a. planare b. programmare c. provare


2. to figure out a. capire b. percepire c. cogliere
3. to phrase a. frasare b. formulare c. copiare
4. round a. tondo b. turno c. giro
5. breakdown a. avaria b. rottura c. interruzione
6. to halt a. alzarsi b. fermarsi c. proseguire
7. tenuous a. sottile b. spesso c. piccolo
8. failure a. successo b. guasto c. fatto reale
9. to occur a. occorrere b. apparire c. accadere
10. amazing a. sorprendente b. soddisfacente c. piacevole

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 .... 8 .... 9 .... 10 ....

115
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 /DQJXDJHV

6. Reading | Write questions


Read the passage about the first generation: Machine Code and write
appropriate questions to the answers below.

What’s The first generation: machine code


this, A programming language is a series of
then?
specifically defined commands designed
by human programmers to give directions
to digital computers. The commands
are written as sets of instructions called
programs. Each program enables a
computer to solve a particular problem or
perform a specific task.
All programming language instructions
Ah, that’s
much must be expressed in binary code before
beer! the computer can perform them because
the computer never uses anything but
binary code, that is, 1s and 0s.
In the beginning (in the 1940s), computers
consisted of special-purpose computing
hardware; each different computer was
designed to perform a particular arithmetic
task or set of tasks. To get a computer to function, a skilled engineer had to manipulate
some parts of the computer’s hardware directly.
Sometimes this was done by using human fingers to position electrical relay switches in
either off or on position, representing the binary digits 1 and 0. Other computers required
programs to be hardwired into the computer, using a soldering iron and other tools to
create the needed circuits to perform desired tasks.
The first computer language, machine language, was only a small step beyond the hard-
wired programs of the earliest machines.
Machine language programs were made up of binary code, the 1s and 0s of the computer’s
“native language”. Each instruction consisted of two parts: an operation code, which
specified the action to be carried out, and an operand, or memory address relevant to that
instruction. Both parts were represented in binary digits.
A typical program looked like two or three columns of 1s and 0s, unintelligible to all but a
few computer experts.
The machine language program was easily executed by the computer but was difficult for
people to decipher and extremely error-prone. In addition, if the programmer wanted a
different computer to perform the same task, the program had to be completely rewritten
using the machine code peculiar to the new computer.
Computer languages that could be performed by only one type of computer with a particular
CPU are often referred to as low-level languages and said to be hardware dependent.

116
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Programming languages: low level languages

Answer questions.
1. Q: ............................................................................................................................
A: Of special-purpose computing hardware.
2. Q: ............................................................................................................................
A: A skilled engineer.
3. Q:.............................................................................................................................
A: He had to manipulate some parts of the computer’s hardware directly.
4. Q: ............................................................................................................................
A: Machine language.
5. Q: ............................................................................................................................
A: They were made up of binary code, the 1s and 0s of the computer’s “native
language”.
6. Q: ............................................................................................................................
A: Two parts: an operation code and an operand.
7. Q: ............................................................................................................................
A: Yes, by the binary representation of the memory address.
8. Q: .............................................................................................................................
A: Two or three columns of 1s and 0s, unintelligible to all but a few computer
experts.
9. Q: ............................................................................................................................
A: No, the program had to be completely rewritten using the machine code
peculiar to the new computer.
10. Q: ............................................................................................................................
A: Low level languages.

7. Activity | Match
Match the sentences in column A with the logical endings in column B.

A B
1. the first computer language was a. programs to be hardwired into the
computer
2. machine language programs were b. easily executed by the computer
3. some computers required c. made up of binary code
4. both parts were represented d. only a small step beyond the hard-wired
programs of the earliest machines
5. computers consisted of e. two parts
6. the machine language program was f. in binary digits
7. each instruction consisted of g. special-purpose computing hardware

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 ....

8. Activity | Comment
Make an oral comment on the columns shown in the table (on the previous
page) with the help of the previous text and your knowledge.

117
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 /DQJXDJHV

9. Reading | Fill in
Read the passage about the second generation: Assembly Language and fill
in the gaps with the words given in scrambled order.

popular | storage | language | native | easier | abbreviations | difficult |


program | communication | programmer

The second generation: Assembly Language


Assembly Language, or simply Assembly, appared in the 1950s;
assembly language programming with macroinstructions represented a
big leap forward; in fact assembly is on a slightly higher level than machine
language. Although assembly (1)……............ is more intelligible to human
than machine language codes, assembly is still more (2)……............to use
than are higher-level languages.
Rather than forcing the (3)……............to write in the binary code (4)……............
to the computer, assembly allows the use of convenient alphabetic
abbreviations of English words called mnemonics (also called memory
aids) to represent operation codes and abstract symbols to represent
operands (memory addresses and data items). The resulting (5)……............
is still in two or three columns but is somewhat more intelligible to
programmers and less error-prone.Assembly remains (6)……............ among
programmers, however, because it creates compact, fast code.
Because the program is no longer written in 1s and 0s, the computer
“Alphabetic
cannot directly understand it. Assembly language made programming
mnemonic opcodes
(7)……............for us but one step harder at the computer’s end of
and symbolic
operands make the (8)……............cycle. In fact, before the computer can execute an
assembly language assembly language program, the program must first be translated
easier than into binary code. Look at this example:
machine code for You can notice how alphabetic (9)……............that are easier to decipher and
programmers”
remember are used in the opcode column rather than binary numbers.
More significant, alphabetic symbols are used in place
of actual memory addresses in the operand column. This
greatly simplifies programming because the programmer
has no need to know or remember exact (10)……............
locations of data and instructions.
Like machine code, however, assembly languages are written
for specific computers and cannot easily be transported from one type of
computer to another.

10. Writing | Answer questions


Read the passage about Assembly Language again and then answer the
following questions:
1. What is the difference between Assembly Language and Machine Language?
2. What are “mnemonics”?
3. Is Assembly popular among programmers? Why? Why not?
4. Can the computer understand “assembly” directly?
5. What happens to an assembly language program before the computer can execute
it?

118
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Programming languages: high-level languages

Programming languages: high-level languages


1. Reading | True/False
Read the passage about the third generation: People-Oriented Programs
and decide whether the statements are True or False. Correct the false ones.

The third generation: people-oriented program


High level languages have been developed with the programmer
in mind rather than the computer. Such languages have the
advantage that they are not as machine-dependent, as machine
codes or assembly language, so once a program has been
written it can be used on different computers with very little
alteration and therefore we can say that they are independent
of any specific computer hardware. Before programs written in
these languages can be executed by a computer, they must be
translated using a compiler or interpreter. High level
The third generation in program language development produced languages,
the first programming languages that are people oriented rather than such as this
machine oriented. Instructions in these languages are called statements. sample of Pascal,
The third-generation statements resemble English phrases combined brought computer
programming
with the mathematical terms needed to express the problem or task closer to human
being programmed. The syntax (grammatical form) and semantics thought processes.
(meanings) of such statements do not reflect the internal machine code
or instruction set of any one particular computer. They are said to be
machine independent and are often referred to as high-level languages.
Programs written in a high-level language require very little programming
when transferred to a different computer.
Procedure-Oriented Languages. The introduction of
more user-friendly programming languages (in 1955)
resulted in a quantum leap in programmer convenience.
Programmers could write a single instruction instead of
several cumbersome machine language instructions. These What is “procedure”? and
early languages were procedure-oriented languages, which “procedural language”?
require programmers to solve programming problems using
traditional programming logic. Instructions are coded, or A procedure is a precise sequence
written, sequentially and processed according to program of steps that, when performed in a
specifications. particular order, will accomplish
Procedure-oriented languages are classified as “ business, a specific programming
scientific, or multipurpose”. COBOL is a good example of a task.
procedure-oriented language designed for use in creating A procedural language is one that
business systems. FORTRAN (Formula Translator), the expresses a computer problem as
first procedure-oriented language, was developed in 1955 a series of discrete tasks and the
and remains a popular scientific language. instructions needed to accomplish
Multipurpose languages, such as PASCAL, are equally those tasks.
effective for both business and scientific applications. The
programming example (represented in figure on this page)
is written in Pascal; it illustrates how close to the English
language a high-level program statement can be.

119
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 /DQJXDJHV

T F
1. High-level languages have been developed to help programmers.
2. Compilers or interpreters are the “translators” of programs written
in high-level languages (before programs can be executed by a computer).
3. The third generation produced programming languages that are machine
oriented.
4. Programs written in a high-level language require no programming when
transferred to a different computer.
5. In 1955 there was a leap forward in programmer convenience.
6. Early languages don’t require programmers to solve programming
problems using programming logic.
7. COBOL is used in creating business systems.
8. FORTRAN is a scientific language.
9. PASCAL is a multipurpose language.
10. Multipurpose languages are effective for business.

2. Writing | Answer questions


Read the passage about the third generation again and then answer the
following questions.

1. What is meant by “High-Level Languages”?


2. What does it mean that the first programming languages are “people-oriented”?
3. What about the instructions in these languages?
4. It is said that the syntax and semantics of such statements do not reflect the
internal machine code; what might the consequence be?
5. Are procedure-oriented languages easier for users? Why? Why not?

3. Activity | Multiple choice


Choose the right translation.

1. mind a. mente b. testa c. cuore


2. once a. un tempo b. una volta c. ieri
3. alteration a. alterabilità b. alternate c. modifica
4. therefore a. così b. perciò c. comunque
5. to resemble a. assomigliare b. sembrare c. riassemblare
6. needed a. voluto b. necessitati c. richiesti
7. to require a. richiedere b. chiedere c. domandare
8. user friendly a. favorevole b. amichevolmente c. utile
all’utente
9. quantum leap a. alto passo b. passo notevole c. grande passo
in avanti
10. cumbersome a. buffo b. voluminoso c. gigantesco

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 .... 8 .... 9 .... 10 ....

120
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Programming languages: high-level languages

Track
4. Listening | Fill in 12
You are going to listen to a computer programmer who explains the features
of the fourth generation: Nonprocedural Languages. While listening, fill in
the blanks with words given in scrambled order.

task | packages | writers | database | popular | inquiries | development |


microcomputer | programmer | instructions

The fourth generation: nonprocedural languages (4GLS)


As computers became more (1)…....……... for personal, business,
and at-home use, people wanted to be able to control them without
the difficulty of learning complex programming languages. This led to
the (2)…....……... of many categories of programming language-like
systems, each of which aimed at simplifying the programmer’s task
of imparting (3)…....……... to a computer.
Many of these systems are associated with specific applications
(4)…....……... and enable people unfamiliar with programming to

describe (5)…....……... to be performed by the computer.


Fourth-generation languages (4GLs) use high-level English-
like instructions to retrieve and format data for (6)…....……... and
reporting. In 4GLs, the (7)…....……... specifies what to do, not how to
do it. Common fourth-generation languages include query languages,
report writers, and application generators.
- Query languages. Usually embedded within (8)…....……...
. management programs, query languages enable users to
specify and request information directly from a database.
- Report writers. These take the information retrieved from a
database and format it into attractive, usable output. Many
report (9)…....……... can perform a limited number of calculations, including
totals, subtotals, averages, and counts. Some also enable the user to enter
custom calculation formulas.
- Application generators. These enable the user to specify a problem and
describe the desired results. When the user is done, the application generator
creates the program (usually in assembly language or binary code). Many
powerful (10)…....……... programs today include specialized application
generators called macrolanguages.

5. Writing | Answer questions


Read the passage about 4GLs again and answer the following questions.

1. Why did people want to be able to control computers?


2. And what was its consequence? (question 1 and question 2 are connected).
3. What was the goal of these programming language-like systems?
4. What does the programmer do in 4GLs?
5. Do you remember the function of query languages? What is it?
6. Describe, using your own words, Report writers and Application generators.

121
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 /DQJXDJHV

6. Reading | True/False
Read the passage about OOP and Object-Oriented Languages and say if
the sentences are true or false. Correct the false ones.

Oop and object-oriented languages


In procedure-oriented languages, the focus is on what is done (the
procedure), while in object-oriented languages, the focus is on the object
of the action.
Although most of the languages examined earlier are concerned with
defining procedures (sequences of instructions for performing tasks),
object-oriented programming is concerned with defining objects.
An object is a representation of whatever you need to model or manipulate
in the development of a program. So an object is a self-contained module
that encapsulates, or describes, data and the methods for manipulating
the data. The module includes programming code, as well. Objects are
grouped hierarchically into classes and subclasses. For example, an
object class might be Personal Computer with subclass objects called
Notebook PC and Desktop PC. Subclasses, by definition, have the same
attributes and methods of the object class. This OOP principle is called
inheritance.
The attributes are facts that describe the object and the methods that
describe possible behaviours or operations for the object. The hierarchy
can be extended to specific notebook and desktop computers.
OOP techniques and languages offer an advantage of procedure-oriented
languages, that is, programs are more easily created and modified to meet
changing system requirements. Programmers using OOP languages,
such as C++, often create programs from existing objects. Once an object
is created, it can be recycled into many different applications. These
reusable objects might enable logon to secure sites, handle the customer
database, maintain the product/inventory database, keep track of the
“shopping cart”, and complete the checkout procedure.
OOP techniques make it possible to add new objects easily because
they inherit the properties of an existing class of objects. With OOP,
the programmer no longer is required to start from scratch to create a
program; instead, programmers have the option to choose from available
objects that are applicable to the programming problem.
Several object-oriented programming languages have been developed
and are in use today. Some of the most popular include Smalltalk (one of
the first OOP languages), Eiffel, C++ (a popular language for developing
graphical applications, for example, Windows applications), and Java
(which is similar to C++).
The language of choice for many object-oriented applications is C++.
This is because C++ is derived from an earlier language, C, and therefore
has a heritage of success performing real tasks on real computer systems.

122
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Programming languages: high-level languages

T F
1. OOL is based on the procedure.
2. OOP is the acronym for Object-Oriented
Languages.
3. An object is a module.
4. An object doesn’t include the programming
code.
5. Objects are divided into classes and subclasses.
6. There is a hierarchy in the subdivision among
objects.
7. C++ is part of OOP languages.
8. Programmers can create programs using
existing objects.
9. Using OOP, a programmer has to start from
scratch to create a program.
Object-oriented
programming: OOP.
The object class,
7. Writing | Write questions
Personal Computer,
Write questions with the prompts given below, add the necessary language. contains attributes
Then answer your questions. and methods that
are inherited by
1. OOP / be / concerned / with / defining / objects /? subclasses,
Solution: ...................................................................................................................... Notebook PC
2. What / object / be/? and Desktop PC.
Solution: .....................................................................................................................

3. An object / be / a / self-contained / module /?


Solution: ......................................................................................................................

4. The / module / include / programming code /?


Solution: ......................................................................................................................

5. How / object / be / grouped /?


Solution: ......................................................................................................................

6. What / “the attributes”/ be /?


Solution: ......................................................................................................................

7. OOP techniques / and languages / offer / an advantage /?


Solution: ......................................................................................................................

8. Where / an object / can / be / recycled /?


Solution: ......................................................................................................................

9. OOP techniques / it / make / possible / to add / easily / new objects /?


Solution: ......................................................................................................................

10.What / the language / be / of choice / for many / object-oriented applications /?


Solution: ......................................................................................................................

123
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 /DQJXDJHV

8. Reading | Match synonyms and discuss


Match the underlined words with the synonyms listed below and then
discuss, with your partner, the importance of natural languages. Swap roles.

Is there a fifth generation?


Many more computer languages are being developed and will be introduced during the next
several years. Someone foresees that such languages will make computer programming
effortless. Communicating with a computer via natural language would be as easy as
ordinary conversation in one’s native language. Unfamiliar syntax and special meanings
would be eliminated, making error-free programs much easier to achieve.
Much research and experimentation towards this goal are being done in the area of
natural languages. Programs called intelligent compilers are now being developed to
translate natural language programs into structured machine-coded instructions that can
be executed by computers.
Progress is being made, but so far we are a long way from speaking any but the most trivial
programs directly into the computer.
Producing worthwhile programs is still one of the most complex intellectual tasks we
have. Although a natural language compiler might save programmers the task of typing
thousands of lines of program instructions on a keyboard, it cannot save us the involved
planning and thought processes that produce useful programs.
On the horizon fifth generation languages are supposed to have the following features:
- knowledge base for area of interest (science, medicine etc.)
- programs are based on rules
- processing is deductive and aims at finding every kind of solution to a problem
- artificial intelligence orientation, that is, such programs will have the ability to associate
facts, rules and conditions to determine a suitable action.
Effortless, error-free natural language programs are still some distance into the future.

Generation Class Dates


First Machine language 1940s
Second Assembly language 1950s to 1960s
Third High level languages 1960s to present
Fourth Nonprocedural languages 1980s to 1990s
Fifth Natural languages 1990s to 21st century

1. not important 5. though


2. predicts 6. tries
3. to attain 7. right/
appropriate
4. needing little or 8. important/
no effort interesting

9. Speaking | Summary
Read the previous texts again and prepare an oral summary on the different
generations of programming languages. (Be concise but precise)

124
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Special languages

Special languages
1. Reading | True/False and summary
Read the text about computer language translators and tick the appropriate
box; correct the false sentences. Then summarize the text orally.

Computer language translators


All programs, ultimately, must be translated before their instructions can
be executed.
There are three types of translators
- Assembled languages.The translation program used with an assembly
language is called an assembler (revise the second generation in
this module). In the translation process, each assembly language
statement yields a single line of binary (machine) code. The entire
program is assembled before the program is sent to the computer for
execution.
- Interpreted languages. An interpreter translates the high-level
program statements one at a time. Each programming language
statement (called source code) may yield several lines of object code
(instructions in binary) as a result of the interpretation process. As
each statement is translated, it is checked for errors. If there none,
the object (binary) code is sent to the computer’s central processing
unit for execution. Once executed, the binary coded instruction is
discarded before the next statement is translated. As a result, the
program must be reinterpreted each and every time it is run. This
slow process is helpful if you are trying to locate errors in the original
program.
- Compiled Languages. A compiler reads and translates the entire
high-level language program before anything is sent to the CPU for
execution. As each line is translated, it is set aside until the entire
program translation is complete.The whole program in object (binary)
code form is then saved to disk. If the compiler has detected no errors
during compilation, the whole program is ready to be executed. Like
the interpreter, the compiler may produce several lines of objects
code for each statement in the original language. After a program
has been correctly compiled, its binary coded form (already stored on
disk) can be reused as often as desired without recompilation.

T F
1. Machine code is a high-level language
2. All programs must be translated before their instructions can be executed
3. In assembly language the whole program is assembled before the
program is sent to the computer for execution
4. An interpreter translates each statement at a time
5. When the statement is translated, it is checked for errors
6. The slow process with interpreted languages isn’t helpful
7. A compiler translates each statement at a time
8. Each line is translated and set aside until the entire program translation
is complete

125
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 /DQJXDJHV

2. Reading | True/False
Read the passage about visual languages: icons for words and say if the
sentences are true or false. Correct the false sentences.

Visual languages: icons for words


Microsoft’s Visual BASIC is one of the most
popular visual languages for both the casual
user and the professional software developer.
As they say, a picture is worth a thousand
words, and so it is in programming.
Visual programming takes object-oriented
programming to the next level, replacing
text-based instructions with symbolic icons,
each of which represents an object or a common programming function.
In 1990s, Microsoft’s original objective forVisual BASIC was to expand the
market for Windows 3.x by providing a means for fledgling programmers
to create their own Windows applications without having to learn the C
programming language.
Microsoft enriched Visual BASIC 2.0 with object variables, MDI forms
and other enhancements and added a limited set of database connectivity
features.
Visual BASIC 4.0 makes extensive use of object-oriented programming
terminology to describe the components of applications. Visual BASIC
4.0 classifies forms, controls on forms, databases, and tables as objects
(you can revise the reading on OOP in this module).
Visual BASIC, which permits object-oriented programming, allows
programmers to drag and drop objects onto a screen and make links
between these objects within the context of a visual interface. Because it
is easy to learn and use, novice programmers are creating sophisticated
Windows-based programs. Visual C# is gaining popularity for Internet-
based applications.

T F
1. Visual programming replaces text-based instructions with icons.
2. Visual BASIC for Windows was a success in 1990s.
3. Microsoft’s objective was to provide a means to learn the C
programming language.
4. Visual BASIC 4.0 is based on object-oriented programming terminology.
5. Visual BASIC is gaining popularity for Internet- based applications.

Glossary
Source code.The readable form of code that you create in a high-level
language. Source code is converted to machine language object code by a
compiler or interpreter.

126
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Special languages

3. Reading | Match
Read the passage about “What is COM?” and match the first half of a
sentence in column A with the second half in column B. Be careful because
two in column B are not necessary.

What is com?
COM is a model based on binary reuse. This
means that software (components) adhering to
COM can be reused without any dependencies
on source code. Developers can ship their
work as binary files without revealing their
proprietary algorithms.
The reuse of code in a binary form also
eliminates many compile-time problems that
occur when systems are assembled according to
a development style based on source code reuse.
Binary reuse makes it far easier to incorporate small changes into a system.
The principles of binary reuse allow you to construct COM-based
applications using language-independent components.
When several teams are building components for a single system, each
team can choose its programming language independently.
Today’s list of COM-enabled languages includes C++, Visual Basic, Java,
Delph, and even COBOL. Each team can select a language that matches
its programming expertise and that gives it the best mix of flexibility,
performance, and productivity.
For instance, if one team requires low-level systems code, it can use C++
for the flexibility of the language. Another team writing and extending
business logic for the same application can elect to use Visual Basic for
its high levels of productivity.
The ability to mix and match languages makes it easier for companies to
make the best possible use of their existing pools of programming talent.
COM is based an object-oriented programming (OOP). This means that
COM is a story about clients communicating with objects. COM clients
and COM classes live in separate binary files.
COM is interprocess-capable. This means that clients can create objects
in separate processes and remote computers. Thus COM serves as core
technology in Microsoft’s strategy for distributed computing. While both
OOP and distributed programming have existed for well over a decade,
the synergy of the two has produced a powerful new programming
paradigm. It has never been easier to write a distributed application.
Of all the COM-enabled development tools on the market, Visual Basic
offers the highest levels of productivity. Visual Basic 3 and Visual Basic
4 both offered modest advancements in the product’s COM-awareness,
but Visual Basic 5 really opened the door to make this development
tool a viable option for building components for use in COM-based
systems. Visual Basic 6 continues to add to the COM capabilities of this
development tool.

127
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 /DQJXDJHV

A B
1. The reuse of code in a binary form a. a model based on binary reuse
2. COM is based b. to construct COM-based applications
using language independent
components
3. Clients can create c. to the COM capabilities of
development tool
4. COM servers d. the highest levels of productivity
5. COM is e. understanding COM is a prerequisite
6. Visual Basic 6 continues to add f. on object-oriented programming
7. Visual Basic offers g. you to benefit from COM
8. The principles of binary reuse allow h. as core technology in Microsoft’s
strategy for distributed computing
i. eliminate many compile-time problems
j. objects in separate processes and
remote computers

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 .... 8 .... .... ....
not necessary

4. Activity | True/False
Read the passage about: What is COM? again and say if the sentences are
true or false. Correct the false statements.
T F
1. COM stands for component Object Model.
2. Software components, when reused, are dependent on source code.
3. Source code is the readable form of code created in a high-level
language.
4. To incorporate small changes into a system is very easy using ‘binary
reuse’.
5. With binary reuse you don’t have to construct COM-based applications
using language independent components.
6. Each team can choose a language that matches its programming
expertise.
7. The combined effect of OOP and distributed programming has
produced a new programming example.
8. Visual Basic 6 offers modest advancements.

128
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Special languages

5. Reading | Match
Read the text below and match the first half of a sentence in column A
with a second half in column B. Be careful, because one item in column B
is not necessary.

HTML 5
As you certainly know, Hyper Text Markup Language, (HTML) was designed as a language
for semantically describing scientific documents, but because of its general design and the
adaptations occurred over the years, HTML is used to describe a lot of different documents.
HTML5 defines the fifth major revision of the core language of the World Wide Web, that
is to say: HTML. In this version we can see that:
- some new features are introduced in order to assist Web application authors,
- some new elements are introduced and they are based on research into prevailing
authoring practices, and
- special attention has been given to defining a clear conformance criteria for user agents
in an effort to improve interoperability.
HTML5 provides a semantic-level markup language for authoring accessible pages on the
Web.
HTML documents consist of a tree of elements and text. Each element is represented in
the source by a start tag, such as <body >, and an end tag, such as <slash/body>. Certain
end tags can occasionally be omitted and are implied by other tags.

A B
1. HTML is used a. and they are based on research
2. Its general dasign was b. to describe a variety of document
types
3. HTML5 defines c. can be omitted
4. New elements are introduced d. or describing scientific documents
5. A start tag denotes e. each element in the source
f. the major revision of the core language
Solution 1 .... 2 .... 3 .... 4 .... 5 .... ....
not necessary

129
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 /DQJXDJHV

6. Reading | True/False
Read the text about CSS3 and XML and decide if the following sentences
are true (T) or false (F). If they are false, provide the right version orally.

CSS3 and XML: an overview


The acronym for: Cascading Style Sheet is CSS which is a language used
to describe the on screen rendering of HTML and XML documents. This
language is used to control the style and layout of Web pages.
CSS3 is the latest standard for CSS. It gives web browsers all the necessary
information to control the visual aspect of a web page, for example: the
position of HTML elements, colors and images, backgrounds, text style,
etc.
Today there are some advanced CSS techniques that give website
authors the ability to tailor layouts and designs for mobile web browsers
in addition to the skills they need to create websites for regular desktop
browsers.
An important CSS rule consists of two main parts:selector and declaration,
where selectors can be HTML tags or CSS defined selectors, such as
a “class”. External style sheets can be used for multiple Web pages; to
apply styles, the external CSS file is referenced by adding a link tag in
HTML head section.
The acronym for: eXtensible Markup Language is XML which is a
language designed not to display but to carry and store data.
It is a markup language like HTML but it isn’t a replacement for HTML;
there is a very important difference between them, that is to say, that
using XML you have to define the tags, while in HTML the tags are
predefined.
XML aims at emphasizing simplicity and usefulness on the Internet.
Even if its design focuses on documents, it is used for the representation
of data structure.
In addition to the several scheme systems which exist to assist in the
definition of XML-based languages, a lot of application programming
interfaces (APIs) have been developed to be of help to software
developers with processing XML data.

T F
1. CSS describes a translation of HTML and XML documents
2. CSS techniques provide website authors with the ability to tailor layouts.
3. CSS rule is based on selector, declaration, external style sheets
4. XML is a language to display data.
5. XML goal is only simplicity
6. A lot of APIs have been developed to improve XLM

130
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Revise & check

5HYLVH FKHFN
1. Answer the following questions:
1. Is it possible to translate our human thoughts into computer thoughts?
2. What is the language that a processor can understand?
3. When did Assembly Language appear?
4. Did macro instructions represent a great step in the evolutionary process of computer languages?
5. How did assembly languages evolve from machine languages?
6. What are the main advantages of high-level languages over assembly languages?
7. Does a query language allow non-specialist users to enquire into the content of a database?

2. Write questions to the following answers.


1. Q: ...........................................................................................................................................................
A: Machine code.
2. Q: ...........................................................................................................................................................
A: They are memory aids.
3. Q:............................................................................................................................................................
A: They brought computer programming closer to human thought.
4. Q: ...........................................................................................................................................................
A: They are embedded within database.

3. Match the first half of a sentence in column A with a second half in column B. Be
careful because one in column B is not necessary.
A B
1. communicating with a computer via a. will be introduced during the next several years
natural language
2. error-free programs b. might save programmers the task of typing thousands
of lines of program instructions on a keyboard
3. special meanings c. are still some distance into the future
4. a natural language compiler d. will make computer programming effortless
5. many more computer languages e. are supposed to have programs based on rules
6. error-free natural language programs f. would be much easier to achieve
7. somebody foresees that such languages g. would be eliminated
h. would be as easy as ordinary conversation in one’s
native language
Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 .... ....
not necessary

4. Tick the right translation for each word.


1. is worth a. vale b. è meritevole c. è simile
2. casual a. comodo b. occasionale c. informale
3. professional a. con professione b. di professione c. perfezionista
4. by providing a. provando b. fornendo c. rilevando
5. a means a. un mezzo b. una occasione c. una opportunità
6. fledgling a. esperto b. abile c. principiante
7. enhancements a. formale b. miglioramenti c. lanci
8. novice a. primino b. nuovo c. principiante

131
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 /DQJXDJHV

5. Write questions with the prompts given below, add the necessary
language. Then answer your questions.

1. What / OOP / stand / for ?/


Solution: ......................................................................................................................
2. Where / the focus / of the action ?/
Solution: .....................................................................................................................
3. An object / be / a rapresentation / whatever you need / development / of / program ?/
Solution: ......................................................................................................................
4. Objects / be / grouped / hierarchically ?/
Solution: ......................................................................................................................
5. What / inheritance / be ?/
Solution: ......................................................................................................................
6. The hierarchy / can / extend / something specific ?/
Solution: ......................................................................................................................
7. What / OOP / techniques and languages / offer ?/
Solution: ......................................................................................................................
8. What / reusable / objects / might / enable ?/
Solution: ......................................................................................................................
9. Programmer / be / required / start / scratch / to create / program ?/
Solution: ......................................................................................................................
10.Why / C++ / the language / choice / for many / object-oriented applications ?/
Solution: ......................................................................................................................

6. Answer the following questions:


1. What is the meaning of “Visual” in Visual Basic?
2. What was Microsoft’s original objective in 1990s?
3. What did Microsoft’s provide? Who for? Why?
4. Did Microsoft enrich Visual Basic 2.0? What with?
5. Why does Visual Basic make use of object-oriented programming terminology?
6. What does Visual Basic 4.0 classify?
7. What does Visual Basic permit?
8. What does Visual Basic allow programmers?
9. Is Visual Basic difficult?
10. What is Visual C#?

7. Write questions with the prompts given below. Add the necessary
language. Then answer your questions.
1. What / COM / based ?/
Solution: ......................................................................................................................
2. Developers / can / ship / work / binary / files ?/
Solution: .....................................................................................................................
3. What / reuse / code / eliminate ?/
Solution: ......................................................................................................................
4. Where / COM Clients / COM classes / live ?/
Solution: ......................................................................................................................
5. What / mean / that / Com / interprocess-capable ?/
Solution: ......................................................................................................................

132
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Test your competence

7HVW\RXUFRPSHWHQFH
1. Read the text on the impact of ICT in terms of jobs and then answer
the questions below.

The impact of ICT in terms of jobs


Today there is an increase in the number of jobs in certain sectors because of the
growth of computer use. While jobs have been lost in manufacturing, the number
of jobs in service industries such as shops, leisure and catering has increased. This
is partly due to an increase in wealth generated by industries which use advanced
technology. Also, ways of working are changing.
The call center, for example, where many operators sit at computer terminals
and answer customer queries on incoming phone lines, did not exist before the
widespread introduction of computers.
Many new jobs that are directly related to ICT and computing have also been created.
Computer specialists are required in both manufacturing and service industries.
Many people have had to retrain in new areas of work as computerized systems have
replaced traditional ways of working.
Before the introduction of computers on a large scale, it was normal to expect to train
for a job and to stay in a similar sort of job throughout your working life.
The focus today is on flexibility. Jobs in every discipline are being redefined.
For example, ten years ago sales representatives carried manuals and products
to the customer site. Today, they still knock on doors, but less often because now
they use more electronic interaction than personal one. Many customers don’t deal
with reps at all. They get information by browsing the Internet and place their orders
electronically.
Radical changes in jobs are not limited to the business community. Poets, the clergy,
politicians, music composers and others are continually evaluating what they do
and how they do it within the context of emerging technology and highly refined
computer programs.

Answer questions
1. Explain the difference between manufacturing and service industries in terms of
jobs.
2. Why has the number of jobs in service industries increased?
3. Using your own words, explain what a call center is.
4. Why have many people had the need to retrain?
5. What is “flexibility”?
6. What is the reason why radical changes in jobs are not limited to the business
community?

2. Now, referring back to the previous text again, to your own ideas and
opinions, prepare an oral report on the impact of ICT in terms of jobs
following these guidelines:
- the growth of computer use all over the world
- the applications of computer technology can be seen everywhere
- computer and computer-based automation.

133
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 /DQJXDJHV

3. Read the previous text again and then circle the correct answer.
a. Call center is:
1. an office where many people work using telephones
2. an office where many people work using telephones,arranging insurance for people
3. an office where many people work using telephones, arranging insurance for
people and/or taking orders
4. an office where many people work using telephones, arranging insurance for
people and/or taking customer’s orders and answering questions

b. ICT means:
1. Information, Communications, Technologies
2. Information, Computing, Technologies
3. Internet, Communications, Technologies
4. Internet, Controls, Technologies

c. Flexible means:
1. reacting quickly and in a positive way
2. reacting quickly and in a positive way to change
3. reacting quickly and in a positive way to change, and/or adaptable
4. reacting with enthusiasm

d. Incoming means:
1. arriving somewhere
2. being received
3. arriving somewhere and/or being received
4. recently chosen

4. The phone is ringing at Susan Brown’s and her sister is going to answer
it. Susan isn’t in; she lost her mobile yesterday and now she is in the city
center to buy a new one.
Here is the message taken by Mary (Susan’s sister), during her telephone
conversation with Mrs. Smith, her sister’s computing support assistant
who has to repair Susan’s P.C. because the computer screen freezes and
it’s impossible to move any of the images. Pay attention to the message
and reconstruct the telephone conversation with your partner. Then swap
roles.
Susan
Mrs Smith called.
your Pc’s OK
she’ll call again in the afernoon.

5. Now image there isn’t anybody at Susan Brown’s; transform your


telephone conversation into a message left by Mrs. Smith on the Browns’
answerphone; add all the necessary information to make clear the
message.
“This is the Browns’answerphone. Please, leave a message or your name and
phone number. I’ll call you back as soon as possible. Speak now.”

134
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

The processing unit

PRGXOH
3URJUDP
 GHYHORSPHQW

In this module you will learn to:


t describe a computer program
t build up definitions about algorithm, input and
output data, and logic
t analyse and discuss all the steps in the program
development process
t define “flowchart” and “pseudocode”
t talk about basic control structures.

Steps in writing a program

Computer Programming
1. Activity | Speak and read
Work in pairs.Look at the picture above and first,cover the explanations
on the right next to the numbers and describe the picture using your
own words and knowledge. Then read the explanations on the right
next to the numbers and check your answers.

135
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 3URJUDPGHYHORSPHQW

2. Reading | Match synonyms


Match the underlined words with the synonyms listed below.

What is a computer program?


A program is a list of instructions arranged in a logical order that can be obeyed by a
computer. Listing the instructions, which are to be performed, and indicating their
sequence, is very important because inserting an unnecessary instruction or omitting a
single one can make a program malfunction.
Computer programmers write instructions that allow us to use computers to solve
computational problems and to prepare documents and spreadsheets.
Some computer problems fit into the traditional mold of mathematical problems. For
example, you may have to solve the following problem at your job:
“Calculate the weekly salaries of all the employees in the Corporation”.
Other problems may not seem at all like math problems in the traditional sense: for
example, “Access information, music, or a video clip from a CD-ROM disc”.
The programmer’s challenge is to translate the system design and specifications created
during the prototyping process (which is an approach to applications) into instructions
that can be interpreted and executed by the computer. To do so, they follow these steps:
1. System Specifications Review
2. Program Identification and Description
3. Program design, Coding, Testing, and Documentation.
(These steps will be explained later in this module).

1. set 4. set of events/


actions/numbers
2. organized 5. to fail to work
correctly
3. carried out 6. a new or difficult
task that tests sb’s
ability and skill

3. Activity | True/False & Not Mentioned


Read the previous text again and say if the sentences are true, false or not
mentioned (NM). Correct the false sentences, orally.
T F NM
1. A program is a set of instructions organized in scrambled order
2. It’s important to list the instructions and indicate their sequence
3. Instructions are written by users
4. Some computer problems may seem like math problems
5. This is a gradual process
6. The programmer’s goal is to translate the system design and
specifications into instructions

136
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Computer Programming

Track
4. Listening | Fill in 13
You are going to listen to an expert who explains the concept of software
in perspective. While listening, fill in the blanks with words given in
scrambled order.

end | program | ice | procedure | glass | request | write |


cabinet | computer | brick

Software in perspective
Suppose you are sick in bed and you ask a friend to get you a glass of ice water.
Your friend then instinctively goes to the kitchen, opens the (1)……….......... door and
selects a glass, opens the freezer, gets some (2)……….........., turns on the tap, fills
the (3)……….......... with water, returns to your bedside, and hands you the water.
Now imagine making the same (4)……….......... to a computer. You would have to
tell the computer not only where to get the water but also how to get there, which
(5)……….......... of the glass to fill, when to shut off the water, how to grasp the ice,

and much, much, more.


A single program addresses a particular problem: to compute grades, to monitor a
patient’s heart rate, and so on. In effect, when you (6)……….......... a program, you
are solving a problem, which requires you to use your powers of logic to develop a
(7)……….......... for solving the problem.

Creating a program is like constructing a building. Much of the brain-work involved in


the construction goes into the blueprint. The location, appearance, and function of a
building are determined long before the first (8)……….......... is laid.
With programming, the design of a program, or its programming logic (the blueprint),
is completed before the (9)……….......... is written.
Each programming language has an instruction set with a variety of instructions.
For example, input/output instructions direct the (10)……….......... to “read from”
or “write to” a peripheral device. Computation instructions direct the computer to
perform arithmetic operations while control instructions can alter the sequence of the
program’s execution.
With these and a few other types of instructions, you can create software to model
almost any business or scientific procedure.

5. Writing | Answer questions


Read the passage about software in perspective again and answer the
following questions:

1. What is meant by “software in perspective”?


2. What do you do when you write a program?
3. What does it (writing a program) require you?
4. Can you explain the simile expressed in the passage?
5. How many types of instructions are necessary to create software?

137
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 3URJUDPGHYHORSPHQW

6. Reading | Fill in
Read the text about understanding the problem and fill in the blanks with
the following words given in scrambled order. Be careful, because two
words are not necessary.

paragraph | computer | problems | monitor | form | solution |


program | questions | task | simple | information | names

The first step: understanding the problem


Writing a computer (1)……….......... to accomplish even the simplest
(2)……….......... involves the skills of analyzing (3)……….......... and devising
plans for their solutions.
As programs are written to solve problems, a precise understanding of
the problem will result in the development of a good plan or algorithm
for a solution.
You must first state the problem clearly and precisely. Suppose we wanted
to perform this task: “Print out the names of the students in your class”.
That sounds like an easy task, but it isn’t at all; in fact we don’t know:
- enough about the problem to be able to solve it;
- how many (4)……….......... are on the list;
- if the names have to appear one after the other in paragraph
(5)……….......... or each on a separate line in a list;
- where we can find the names;
- if they have to appear on a (6)……….......... or on paper.

None of this information appears in the simple statement of our problem


and until these (7)……….......... and others like them have been answered, we
cannot begin to work on a solution. So the problem must first be restated,
providing all the (8)……….......... we need to proceed. Let’s try again:
“Write a program that will instruct the (9)……….......... to accept the names
of 30 students, one at a time, as we type them in on a keyboard, and print
them out in the same order on paper in a numbered list”.
That’s better! The new problem statement contains the answers to all
those troublesome questions and now we can move on to devising a
(10)……….......... We have to remember that the more complex the problem,
the more time and care must be spent producing an accurate statement
of the tasks required.

Building a program requires the following steps:


1. developing an algorithm;
2. writing the program;
3. documenting the program;
4. testing and debugging the program.

Glossary
An algorithm is a detailed description of the exact methods used for solving
a particular problem.

138
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Computer Programming

7. Writing | True/False
Decide if the following statements are true (T) or false (F).
If they are false, write the correct version.
T F
1. the skills of analyzing problems and devising plans for their solutions
are necessary to write a computer program
2. it is necessary you first state the problem
3. you need a lot of detailed information to proceed
4. you can move on to devising a solution when all your questions have
an answer
5. if the problem is complex we need more time and less care to produce
an accurate statement of the tasks required

8. Activity | Translation
Match each of these words with the right translation.

1. even a. abilità
2. print out b. eseguire
3. devising c. richiedere/implica
4. restated d. stampa
5. involves e. ideare/trovare
6. troublesome f. affatto
7. skills g. formulato in modo diverso
8. that sounds h. perfino
9. at all i. difficili/fastidiose
10. to perform j. sembra

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 .... 8 .... 9 .... 10 ....

9. Writing | Write questions and answers


Write questions with the prompts given below. Add the necessary language. Then
answer your questions.

1. What / a computer program / the necessary skills / to write /?


Solution: ......................................................................................................................
2. To print out / in your class / an easy task / the names of the students / it /?
Solution: .....................................................................................................................
3. Not /?
Solution: ......................................................................................................................
4. Is / to proceed / the most important thing /?
Solution: ......................................................................................................................
5. We move on / can / to devising a solution /?
Solution: ......................................................................................................................
6. Necessary / steps / to build a program / what /?
Solution: ......................................................................................................................

139
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 3URJUDPGHYHORSPHQW

Building a program
1. Reading | Answer questions
Read the passage about developing the algorithm and then answer the
questions below.

Developing the algorithm


After the problem to be solved has been stated, the next step is to devise a
plan of attack for writing the program. Computer programmers call a plan
such as this an algorithm.
To develop an algorithm, the programmer must first analyze which data
users need. Two questions should be asked. First, “What data have to be
fed into the computer?” These are called the input data. For our class-list
program, the input data consist of the names of the 30 students in the class.
The second question is, “What information do I want to get out of the
computer?” For the class-list problem, we want to get out the same data that
we put in: the students’ names, numbered consecutively from 1 to 30. This
printed list of the students’ names will be the output data of our program.
Now that we know our data needs, we must plan the processing that will
cause our input data to become our output data. The processing part of
the program algorithm is called the logic of the program. For the class-
list program, our processing will consist of generating the numbers from
1 to 30, one at a time, so that they can be printed with the names. Our
algorithm contains only one processing step, because our problem is easy.
Although we have now identified the input data, the output data, and the
processing steps needed for the class-list program, we are still not ready
to begin writing in a programming language. We must produce a more
detailed, step-by-step plan of everything we want the computer to do.
For example, for our class-list program, the computer must follow these
steps:
- start a name-counter at 0
- get a name from the keyboard
- add 1 to the name-counter
- print the value of the name-counter and the name
- go and get a new name, unless all 30 are done
- when all 30 are done, stop processing.
We can write out a step-by-step program plan in many ways. Nothing
is wrong, for example, with a straightforward sentence outline such as
the preceding one. Programmers often use one of these major notations
for planning a detailed algorithm, that is to say: flowcharts, Nassi-
Schneidermann charts, pseudocode, and new wave approaches, such as
extreme programming.

Glossary
Logic is the processing part of the program algorithm. It contains the
instructions that cause the input data to be turned into the desired output data.

140
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Building a program

Answer questions:
1. What is an algorithm?
2. What must the programmer first analyze?
3. What is meant by “input data”?
4. And “output data?
5. Explain the meaning of “logic” of the program.
6. Is it necessary to produce a step-by-step plan of everything we want
the computer to do?

2. Activity | Match
Read the previous text again and then match the first half of a sentence
in column A with a second half in column B. Be careful, because two in
column A are not necessary.

A B
1. computer programmers a. will cause our input data to become
our output data
2. the programmer must analyze b. one processing step because our
problem is easy
3. now that we know our data needs c. which data users need
we must plan the processing data
4. our algorithm contains only d. call a plan such as that an algorithm
5. we are still not ready e. a more detailed plan of everything
6. we must produce f. to begin writing in a programming
language
7. the next step is
8. the input data consist of

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... .... ....


not necessary

3. Writing | Definitions
Referring back to the previous exercises, but using your own words as far
as possible, write a short definition for each of the following words:
- algorithm
- input data
- output data
- logic

141
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 3URJUDPGHYHORSPHQW

4. Reading | Match and Summarize


Programmers follow three important steps for writing the program.
Read the following texts. Match each text with the correct title and then
summarize the text orally.
Titles
a. Program Identification and Description;
b. Program Design, Coding, Testing, and Documentation;
c. System Specifications Review

Writing the program


1. ....................................................................................................................................................
The system specifications completed during the systems analysis and design are all that
is necessary for programmers to write, or code, the programs to implement the target
information system. But before getting started, programmers should review and study the
system specifications (layouts, design,Web-based interfaces, and so on) until they thoroughly
understand what needs to be accomplished.

2. ....................................................................................................................................................
An information system needs an array of programs and program modules (programs within
programs) to create and update the database, print reports, enable Internet-based inquiry,
etc.. Depending on the scope of the system and how many programs can be generated using
applications development tools, as few as three or four or as many as several thousand
programs may need to be written before the system can be implemented. At this point, all
programs necessary to make the system operational are identified and described (tasks to be
performed, input, output, interactivity, etc.)

3. ....................................................................................................................................................
Armed with system specifications and program descriptions, programmers can begin
the actual design and coding of programs. The development of a program is actually a
project within a project. Just as there are certain steps the project team takes to develop an
information system, there are certain steps a programmer takes to write a program. (These
seven steps are summarized in figure on the first page of this module). Programmers use
a variety of techniques to help them analyze a problem and design the program. These
include traditional approaches, such as flowcharting and pseudocode, and new wave
approaches, such as extreme programming. (These approaches will be explained later in
this module).
By this point in the programming process, the difficult tasks of analysis and planning have
been completed. If the analysis and planning have been done thoroughly, translating our
detailed plan into a programming language should be a quick and easy task. The following
table illustrates the
resultsofthisstepasthey
would appear in three
different programming
languages.

A flowchart is one method


of notation for describing
a detailed algorithm

142
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Building a program

5. Reading| True/False
Read the passage about documenting the program and say if the sentences
are true or false. Correct the false ones.

Documenting the program


Documentation is represented by the explanations added to the code
during both the algorithm development and the program writing stages
of programming.
Such documentation helps users as well as programmers understand
the exact processes to be performed by the computer.
Documentation is carried on throughout all phases of program
development, but once a program is put into regular use (that is to say,
when it becomes a production program) it is important to have complete
and accurate documentation.
Documentation usually includes technical notes for programmers, such as
explanations of variable definition and usage. It often includes notes for
the end user, such as instructions for installation and program execution.
Documentation helps other people understand the program and facilitates
program modification.
The final step in building a program is correcting its flow.

T F
1. Explanations are sometimes added to the code
2. Explanations are called documentation
3. Such documentation help programmers understand the exact
processes to be performed by the computer
4. A “production program” is a program that is put into regular use
5. Technical notes are written in documentation
6. Instructions for installation and program execution are included
in documentation
7. Documentation should be provided for every phase of program
development
8. It isn’t important to have accurate documentation

143
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 3URJUDPGHYHORSPHQW

6. Reading | Answer questions


Read the passage about testing and debugging the program and answer
the questions below.

Testing and debugging the program


Testing and debugging the program means that a program is tested to
determine if it meets its specification; if it does not, debugging involves
determining what is wrong and making the appropriate corrections, a
process that continues until the program functions properly.
During this phase, the programmer tries to discover and eliminate any
errors (called bugs) in the finished product. Debugging simply means
removing the errors from a program, but the process of debugging a
program may not be simple at all.
Bugs may appear in a program before, during, or after the program is
executed. So the program must be executed many times using different
data sets. The purpose of extensive testing and debugging is to establish
some important elements that determine the program’s quality. A good
program must be:
a. reliable; d. free of logic errors;
b. robust; e. free of run-time errors.
c. free of syntax errors;
A program is considered reliable if it correctly performs the task(s)
defined by the statement of the problem.
It must be able to produce correct results with every possible combination
of appropriate data. Reliability errors are usually caused by flaws in the
logic or plan of the processing.
The program must be robust. That means it should be able to detect
execution errors such as improperly typed data or insufficient memory,
warn the user, and allow the error to be corrected or terminate the run.
Suppose a name were missing in the input data of our list program,
leaving a blank line someplace in the middle of the list.
A robust program would detect the absence of input, print an appropriate
message, then continue with the processing until the list was complete.
A less robust program would simply crash in the middle.

Answer questions:
1. What do you understand for testing?
2. What does “debugging” mean?
3. When do you do “testing and debugging”?
4. When can you say that a program is a good
one?
5. What does it mean that a program is reliable?
6. What should a “robust” program be able to
do?

144
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Building a program

7. Writing | Put in order and Summarize


Read the text about errors and then put in order the words in the sentences
below. Then summarize the text orally.

Errors
A syntax error is a mistake that appears before execution; it is an error in the form or
grammar of the program statements; (for example, you might have omitted a comma
or semicolon at the end of a statement; such an error would make that statement
unrecognizable to the compiler). Eliminating syntax errors is easy and must be
completed early in the testing activities. If there is a syntax error a program cannot be
translated into machine language, and the computer cannot execute it until translation
has been completed.
A logic error is a mistake the programmer introduces into the algorithm or processing
plan of the program. Logic errors can be the most difficult errors to find because
the program would still run as there would be no syntax errors, but incorrect output
would result. Sometimes only a sharp-eyed user may spot an error in the output
reports. Worse yet, the error could go undetected. An example of a logic error is a
mailing list program that prints addresses without zip codes. Such an error can be
very costly to a mail-order company that has printed, sealed, and stamped a million
catalogs. Organizations designate certain people as output controllers to help spot
these problems as early as possible.
A run-time error, or execution error, occurs while a program is executing. It can occur
because of invalid or insufficient data read at execution time. Invalid data might, for
example, cause a program to attempt to divide by zero, an operation that is forbidden
on most computer systems. When a program requests data and none is available,
possibly because the user failed to provide it, an insufficient-data error occurs.

1. in building / its flows / step / a program / is / the final / correcting /


Solution:.......................................................................................................................

2. often / sets / the program / executed / of data / must / different / be / using /


Solution: .....................................................................................................................

3. a program / be translated / are / if / cannot / there / syntax / machine language /


errors / into /
Solution: ......................................................................................................................

4. can be / and / errors / difficult / logic / to find /correct /


Solution: ......................................................................................................................

5. are caused / in the / errors / logic or / of the / plan / processing / reliability /by flows /
Solution: ......................................................................................................................

6. program / in the middle / a less / processing / robust / of the / crash / would /


Solution: ......................................................................................................................

145
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 3URJUDPGHYHORSPHQW

System flowcharts
1. Reading | Answer questions
Read the passage about flowcharting and then answer the questions below.

Flowcharting
In flowcharting, flowcharts are used to illustrate data, information, and work flow by the
interconnection of specialized symbols with flow lines.
A flowchart consists of a series of visual symbols representing the logical flow of a program;
the flow is always indicated by arrows. Each type of programming instruction (input/
output, control etc.) is represented by a differently shaped symbol.
The combination of symbols and flow lines portrays the logic of the program or system.
The more commonly used flowchart symbols are shown below.

Although flowcharting was initially a program design tool, it is also a common business
tool for analyzing and documenting work flow, procedures, and decision processes.
Through the 1970s, many programmers unknowingly wrote what is now referred to as
“spaghetti code”. It was so named because their program flowcharts appeared more like a
plate of spaghetti than like logical analyses of programming problems. The unnecessary
branching (jumps from one portion of the program to another) of a spaghetti-style program
resulted in confusing logic, even to the person who wrote it.
IT specialists overcame this dead-end approach to developing program logic by identifying
three basic control structures into which any program or subroutine can be segmented.
By conceptualizing the logic of a program in these three structures: sequence, selection,
and loop, programmers can produce programs that are easy to understand and maintain.
(Control structures will be explained later in this module).

Answer questions:
1. What does a flowchart consist of?
2. What do visual symbols represent?
3. How is each type of programming instruction represented?
4. What do you understand for “spaghetti code”?
5. What about logic in “spaghetti code”?

146
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

System flowcharts

Track
2. Listening | Fill in 14
You are going to listen to Mr Parker explaining the concept of pseudocode.
While listening, fill in the blanks with the following words given in
scrambled order.

level | method | programmer | design | language | algorithms |


pseudocode | programming | syntax | logic
Pseudocode
Another program (1)……......…. technique is pseudocode. While the other techniques
graphically represent the (2)……......…. of the program, pseudocode represents the
logic in program-like statements written in plain English.
Pseudocode is a verbal shorthand (3)……......…. of detailing the steps of a program; it
consists of statements that closely resemble those of a programming (4)……......….
but do not have to follow a rigid (5)……......…. structure. In fact, because pseudocode
does not have any syntax guidelines (rules for formulating instructions), you can
concentrate solely on developing the logic of your program.
Once you feel that the logic is sound, the (6)……......…. is easily translated into a
procedure-oriented language such as COBOL or BASIC that can be run on a computer.
We have to remember that the (7)……......…. can pattern his pseudocode after any
(8)……......…. language. Using pseudocode you start at the highest (9)……......…. by

writing a list of the tasks that the program must perform. You can then refine the
program by making it more structured.
Nassi-Schneidermann Chart. Two research programmers working in the field of
psychology, developed another method of visualizing program (10)……......….
Nassi-Schneidermann charts use specific shapes and symbols to represent types of
program statements.

3. Activity | True/False
Tick the appropriate box and correct the false sentences.
T F
1. Pseudocode is an approach
2. Pseudocode represents the logic of the program
3. Statements are written in simple English (in pseudocode)
4. It (pseudocode) is a method of detailing the steps of a program
5. Pseudocode is a programming language
6. Pseudocode is a computer language translator

147
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 3URJUDPGHYHORSPHQW

4. Speaking | Discuss
Study these major notations for planning a detailed algorithm and discuss
them with your partner. Use the following guide lines: «I think a flowchart
is………..»; «I don’t know if a Nassi-Schneidermann chart…………..»; «maybe
a pseudocode version………………»

BEGIN

Start a name-couter at zero


CT=0 Name-couter <30?
FALSE TRUE
Do Get a name from the keyboard
Nothing Add 1 to the name-counter
GET NAME Print name-counter, name
(a Nassi-Schneidermann chat)

ADD 1 TO CT Start
FALSE

Namecount=0
Repeat until name count=30
PRINT CT NAME Read name
Namecount=namecount+1
Print namecount, name
End repeat
Stop
CT=30 (a pseudocode)

TRUE

END

(a flawchart)

5. Writing | Definitions
Referring back to the previous texts and activities, but using your own words
as far as possible, write a short report about the importance of:
- flowcharting
- pseudocode
- Nassi-Schneidermann Chart

148
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

System flowcharts

Track
6. Listening | Underline and summarize 15
You are going to listen to Mr Newman, an expert on IT, explaining extreme
programming. While listening underline:
- the definition of XP;
- what XP is based on;
- what XP employs;
- what “Pair Programming” is;
- why you need to upgrade your hardware with the latest technology.
Then summarize the text orally.
Extreme programming
Extreme Programming (XP) is a collaborative team approach in which the programming
team works together to write programs in iterative cycles, beginning with the design
and coding of the smallest useful feature of the system.
Each iteration introduces another feature and gets the team that much closer to an
operational system.
XP, as much a culture of programming as it is a technique, is based on a group of time-
honored core programming practices. For example, extreme programming begins
with users stories written out on 4 by 6 cards that describe desired features. XP
employs the simplest possible design to get the job done.
Pair programming is an XP practice; that is, two programmers sit at one workstation
so that each program is reviewed as it is written. The team “owns” the code, not a
particular programmer; therefore, any programmer can work on any part of the code
at any time. And, one of the most important XP principles is that the 40-hour work
week is in force – programmers go home on time.
Programming and you. As you continue to gain experience with PCs and PC
software, you, like so many before you, will probably begin to seek greater speed,
power, and efficiency from your PC and its software.
To gain speed and power, you will need to upgrade your hardware with the latest
technology. To improve efficiency, you might wish to consider learning to write
programs. You do not have to be a professional programmer – most people who
program are not. They are users who write programs to accomplish personal
processing objectives, often freeing up valuable time that can be used for other
important tasks.

7. Activity | Complete and answer


Read the previous passage again; complete the questions below and then
answer them orally.
1. What……….XP?
2. What……….each iteration introduce?
3. What……….XP……….on?
4. Can you say that XP……….the simplest……….design to get the job done?
5. ……….owns the code?
6. When……….any programmer……….on any part of the code?
7. ……….it necessary……….a professional programmer to write programs?

149
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 3URJUDPGHYHORSPHQW

8. Reading | Answer questions


Read the passage about a subprogram and then answer the questions
below.

A subprogram
Even with trivial tasks,
program development is
both time consuming and
exacting.
The larger and more
complex the problem, the more difficult the job of developing an
algorithm to solve it.
Many computer catastrophes have shown that as programs grow in
size and complexity, we must be careful and prepared for failure. A
sophisticated operating system may be well over several million lines
of code with very complex logic. In a project of such vast size, no one
can possibly predict how safe and reliable the program will be until it
has been extensively tested. Even then, testing every single eventuality
in a complex system is virtually impossible. There are no guarantees
that some unexpected condition will not cause the program to fail at
some point in the future. To understand these problems, let’s look at how
commercial software is created.
Usually the project is broken down into small segments called
subprograms.
A subprogram is a small but logically independent module of a large
programming project. Each subprogram is analyzed, written, and tested
individually. Then, when the complete program has been designed and
coded (that is, put into some computer language), the final testing begins.
At this point, the program is at the alpha testing point. This is normally
done within the company that created the program. The process will
uncover any major problems, which the programmers identify and
correct.
Because it is impossible to check all possible conditions that could occur
in a large program, it makes sense to subject it to testing that involves an
even wider number of conditions. This is referred to as beta testing. The
program is sent out to possibly hundreds of sophisticated users outside
the company who will test the program under an
enormous number of conditions. After both alpha and
beta testing problems have been resolved, software is
Is it useful to break
usually ready for the commercial market.
a large project into
subprograms?Yes, it is.
Breaking a large project into
Answer questions:
subprograms allows each to be
designed, written, and tested 1. What is a subprogram?
individually before the finished 2. What happens to each subprogram?
product is reassembled and 3. When does the final testing begin?
tested as a whole. 4. Explain what alpha testing is.
5. Explain what beta testing is.

150
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Basic control structures

Basic control structures


1. Reading | Multiple choice
Read the passage about the most important control structures and choose the best answer.

Control Structures Sequence Control


Structure
Loop Control Structures

The three basic control structures are very


simple but they could be used to express even
the most complex program logic. They are:
sequence, selection, and loop (or repetition)
control structures.
- Sequence control structure. In the sequence DOWHILE DOUNTIL
structure,the processing steps are performed
in sequence, one after another.
- Selection control structure. In the selection, Selection Control Structures

a decision, or test-on-condition, is made as


to which sequence of instructions is to be 2 Opinions (IF-THEN-ELSE) 4 Opinions

executed next. The two options selection in


our picture is an IF-THEN-ELSE structure:
IF a condition is met THEN one process
is performed, ELSE (condition not met)
another process is performed. In the other example, any one of four of processing options
can be performed depending on which condition is met.
- Loop (repetition) control structure. The loop structure is used to represent the program
logic when a portion of the program is to be executed repeatedly until a particular
condition is met (or satisfied). There are two variations of the loop structure. When the
decision is placed at the beginning of the statement sequence, it becomes a DOWHILE
loop. When the decision is placed at the end, it becomes a DOUNTIL loop (pronounced
doo while and doo until).
The suitable use of these basic control structures permits the so called structured programming.

1. basic control structures


a. are used to express the most complex program logic
b. could be used to show the most complex program logic
c. could be used to express a very simple program logic

2. the selection structure


a. indicates the choice of a number of options
b. shows the choice of a number of options
c. shows a choice from a number of options

3. the repetition structure


a. executes a lot of instructions until some condition is satisfied
b. executes some instructions a lot of times until some condition is satisfied
c. executes a set of instructions to satisfy some condition.

4. the right use of basic control structures


a. allows for structured programming
b. permits the structure of a program
c. permits structural programming

151
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 3URJUDPGHYHORSPHQW

2. Reading | Answer questions


Read the text about Structured Programming and then answer the
questions below.

Structured programming
In structured programming, each program has a driver module, sometimes called the main
program, which causes other program modules to be executed as they are needed. The
driver module in the payroll program (of the picture below) is a loop that “calls” each of the
subordinate modules, or subroutines, as needed for the processing of each employee.
The program is designed so that when the payroll program is initiated, the Input Data
Module (1.1) is executed first. That portion of the Input Data Module (1,1) that reads an
employee record is illustrated in a
DOUNTIL loop. That is, do the loop
until the end of the file is reached.
After execution of Module 1.1, control
is returned to the driver module unless
there are no more employees to be
processed, in which case execution
is terminated (the “Finish” terminal
point). For each hourly or commission
employee, Module 1.2, 1.3, and 1.4
are performed (a sequence control
structure embedded in a loop), and
at the completion of each subroutine,
control is passed back to the driver
module.

Program flowchart.
This flowchart Answer questions:
presents the logic
1. What is a module?
of a payroll program
to compute and 2. What is a driver module?
print payroll checks 3. What does the driver module do (in the payroll program of the picture)?
for hourly and 4. When is Input Data Module (1.1) executed?
commission 5. What happens after execution of Module 1.1?
employees.
The logic is
designed so that
a driver module 3. Speaking | Oral report
calls subroutines Now that you are at the end of the module, referring back to the previous
as they are texts, prepare an oral report on how to write a good program following
needed to process
these steps:
each employee.
Only the “Input
Data” subroutine - study the problem
is shown here. - identify the details
- develop the solution (by using flowcharts and/or pseudocode)
- write the program (by using a suitable programming language)
- documentation
- testing and debugging

152
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Basic control structures

4. Reading | Tick the right translation


Read the text about other programming tools, and then tick the right
translation for the words below.

Structure diagrams
Structure diagrams are programming tools which can be used to describe information
systems. An overall task is broken down into smaller more manageable tasks; these may
then be broken down further into smaller tasks. This way of describing tasks is called (as
you already know) “top down approach” and the “tasks” may be defined “modules” because
each of them consists of one or more control structures. The top-down design shows that
modules are conceptualized first at the highest levels of the pyramid and then at lower
levels. Look at the following example;
Consider the:

Overall task Do weekly shopping

this task is divided up into a series of tasks:

Prepare list Do weekly Put shopping


shopping away

This second set of tasks may be split up as follows:

Check Look in Write Drive to Select Pay for Unpack Put some Put some
down items food in food in
cupboards fridge needed shops items items shopping fridge cupboard

We write these in the order in which they are performed

Now we can put all the stages together to produce the following final structure chart.
A structure diagram Overall task
Do weekly
for doing the weekly shopping
shopping

Prepare Do weekly Put


list shopping shopping
away

Check Look in Write Drive to Select Pay for Unpack Put some Put some
cupboards fridge down items shops items items shopping food in food in
needed fridge cupboard
We write these in the order in which they are performed

1. tools a. strumenti b. dispositivi c. trucchi


2. overall a. sopratutto b. al di sopra c. globale
3. to break down a. dividere b. rompere c. frantumare
4. manageable a. malleabili b. gestibile c. fattibili
5. further a. ulteriore b. più lontano c. ulteriormente
6. to split up a. riassumere b. suddividere c. analizzare

153
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 3URJUDPGHYHORSPHQW

5. Activity | Match
Match the sentences in column A with the logical endings in column B. Be
careful, because two sentences in column B are not necessary.

A B
1. programming tools a. are programming tools
2. smaller tasks b. is broker down into smaller tasks
3. structure diagrams c. may be defined modules
4. the top down design d. are conceptualized then at lower levels
5. the tasks e. should be used
6. an overall task f. can be used to describe information
systems
7. the top down design shows that g. shows that modules are conceptualized
modules first at the highest levels
8. each module h. is known in advance
i. may be broken down further into
smaller tasks
l. consists of one or more control
structures

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 .... 8 .... .... ....
not necessary

6. Activity | True/False
Tick the appropriate box and correct the false sentences.
T F
1. Structure diagrams are programming tools
2. Programming tools can be used to describe information systems
3. An overall task in broken down into bigger tasks
4. Smaller tasks may be put together
5. Top down design shows that modules are conceptualized
6. Modules are conceptualized only at the highest levels

7. Writing | Answer questions


Answer the questions below.
1. What is a structure diagram?
2. Define “overall task”
3. What is a module?
4. What is the advantage of a top-down design?
5. What do the lines connecting the boxes indicate?

8. Speaking | Oral report


Prepare a short oral report on structure diagrams following the guidelines
below.
a. definition of structure diagrams b. their function(s)
c. definition of an overall task d. way of describing tasks

154
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Revise & check

5HYLVH FKHFN
1. Tick the right translation for each word.
1. sick a. secco b. malato c. stanco
2. cabinet a. armadietto b. cabina c. scatola
3. tap a. tappo b. colpetto c. rubinetto
4. to grasp a. afferrare b. aggiustare c. versare
5. brain-work a. lavoro mentale b. lavoro artigianale c. lavoro stagionale
6. blueprint a. messa in opera b. progetto c. costruzione
7. appearance a. applicabilità b. somiglianza c. aspetto
8. brick a. bricco b. lastra c. mattone
9. set a. insieme b. luogo cinematografico c. partita
10. alter a. altare b. alterare c. guidare

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 .... 8 .... 9 .... 10 ....

2. Put in order the following sentences:


1. hands you / your friend / the water /
Solution: .........................................................................................................................
2. addresses / a / program / a particular problem /
Solution: .........................................................................................................................
3. an instruction set / has /each programming language /
Solution: .........................................................................................................................
4. of the program’s execution / by control instructions / the sequence / can be altered /
Solution: .........................................................................................................................

3. Match the first half of a sentence in column A with a second half in


column B. Be careful, because two in column B are not necessary.

A B
1. all programs necessary to make the a. are all that is necessary for
system operational programmers to write, or code
2. an information system b. include traditional approaches
3. programmers c. depending on the scope of the system
4. the development of a program d. should review and study the system
specifications
5. the system specifications e. are identified and described
6. there are certain steps a programmer f. needs an array of programs and
program modules
g. is a project within a project
h. takes to write a program

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... .... ....


not necessary
155
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 3URJUDPGHYHORSPHQW

4. Tick the correct meaning for each word


1. to discover a. to find out b. to look for c. to uncover
2. a bug a. an insect b. a germ c. a mistake
3. sets a. sections b. group c. configuration
4. incorrect a. faulty b. wrong c. improper
5. reliable a. dependable b. true c. certain
6. processing a. course b. operation c. elaboration
7. to warn a. to tell b. to caution c. to say
8. to miss a. to leave out b. to fail c. to pass

5. Put in order the following sentences


1. be careful / for failure / we must / and prepared /
Solution: ......................................................................................................................
2. will be / no one can / the program / possibly predict / how safe and reliable /
Solution: ......................................................................................................................
3. but logically independent / is / module / a small / a subprogram
Solution: ......................................................................................................................
4. within / is done / the company / alpha testing /
Solution: ......................................................................................................................
5. outside / is done / the company / beta testing /
Solution: ......................................................................................................................

6. Answer the following questions.


1. When can we say that a program is “a good program”?
2. Does a debugged or error – free program exist?
3. What does the symbol <> mean?
4. What are the hardest errors to detect?
5. Can you explain the origin of the word “bug”?
6. What are the major Control Structures? Explain their functions.
7. What other control structures are used?

7. Write questions to the following answers


1. Q: ...........................................................................................................................
A. They can be used to describe information systems
2. Q: ...........................................................................................................................
A. Yes, it can be broken down into smaller tasks
3. Q: ............................................................................................................................
A. They may be called modules
4. Q: ............................................................................................................................
A. It’s a method of software design
5. Q: ............................................................................................................................
A. They are first defined at a high level of hierarchy and then detailed at lower levels.

156
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Test your competence

7HVW\RXUFRPSHWHQFH
1. Discuss.
With the help of the explanations and diagram below, discuss with your
partner, all the steps that are necessary to identify and solve a problem.

The system life cycle IDENTIFY


problems with the existing system
is a summary of what
needs to be done. Look EVALUATE Carry out a
the new system FEASIBILITY STUDY
at this diagram: it’s
worth learning. ANALYSE
MAINTAIN the new system’s requirements
the new system

IMPLEMENT DESIGN
The diagram is a really the new system the new system
good summary of
the systems analyst’s Produce DOCUMENTATION BUILD
for the users the new system
job; it also makes the TEST
important point that the the new system
systems analyst’s job
isn’t finished when the
new system has been
implemented.

2. Pair work, Give advice.


You are a software vendor. In pairs, build and practice a dialogue between
you and a person who wants to buy a new program. Use the information
studied in this module and add all your knowledge on the subject giving
important advice to understand the program.
Repeat the dialogue but remember to swap roles.

3. Mini-project. Prepare a list. You have been asked by Mr Ross the


owner of a video library to investigate its present manual system because
they are thinking of computerising it.
The video library has only one shop and about 1800 customers and 2000
videos.
Prepare a list of questions in order to perform an initial fact finding prior
to a feasibility study.Then, using your list of questions, prepare a dialogue
between you and Mr Ross.

Glossary
Fact finding – the investigation of a system prior to performing a
feasibility study

157
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 3URJUDPGHYHORSPHQW

4. You want to look up a word in your “Glossary”; here is a wrong


flowchart; correct it and write it in the right way; be careful because three
steps are right.

START

Open your book roughly where


you think the word is

Have you found it?

Close your “New Totally Connected”

Take Scan through


YES NO Read
“New Totally the alphabetically the meaning
Connected” listed words

Check
END the spelling

5. Write an algorithm – If you look at the back of a famous reinforcing


shampoo bottle you will read something like the following:
«the new Lipoprotein compound fixes and goes into the structure of the hair. It makes
it more flexible, resistant and shiny. Its special formula is specially recommended for
greasy hair». And then you will see the following algorithm:
use:
- Massage into wet hair
- Leave to act
- Rinse thoroughly
- Repeat as necessary.

The above algorithm is “poor”, “ambiguous” and it is not “finite”. Rewrite it by making
it “well-defined”, “unambiguous”, “effective” and “finite”.

(Remember that the above algorithm is “poor” because it does not specify that
shampoo should be applied before massaging and how much shampoo should be
applied; it is “ambiguous” because it does not say how long we should massage and
how long we should leave to act; when it says “repeat as necessary”, does it mean
rinse again or does it mean massage again?The algorithm is not “finite” because it
doesn’t tell us when to stop; perhaps, once we start applying the above algorithm, we
could continue until we run out of shampoo).

158
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

The processing unit

PRGXOH
$ZRUOGRI $SSV-DYD
 DEULJKWVWDU

In this module you will learn to:


t talk about Apps
t explain Java script and Java programming Language
t briefly outline Java platform
t describe building applications and applets
t list the advantages of cryptography
t talk about the importance of encryption

A world of Apps
1. Approach | Discuss
Look at the picture above and, using your own words and knowledge,
discuss what you see with your partner. Then swap roles.

159
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 $ZRUOGRI $SSV-DYDDEULJKWVWDU
$SSV-DYDD EULJKWVWDU

Track
2. Listening | Fill in 16
Mr Ross, an expert of platforms, is explaining some of them.While listening,
fill in the blanks with the following words given in scrambled order.
people | description | webpage | software | video | profile |
Platforms
In computing “Platform” is a definition of the standards by which (1) .........................
is developed and hardware is designed. Let’s have a look at some important platforms
bearing in mind that any (2) ......................... of social media runs the risk of going out
of date, but considering that at the time of writing, the descriptions mentioned below
were true: (regarding Facebook and Twitter).
Facebook and Google+ are used for a wide circle of friends;
Linkedln is used for professional contacts;
Twitter is used for everyone, people you know and people you don’t know.
Here are some details:
On Fb (Facebook) you create your profile; it is like a (3) ......................... with your
name, photo and information about yourself. To connect with other people you first
have to become “friends” with each other. A lot of people have profiles on FB, so it is
often the easiest way to find and contact a friend.
On G+ (Google +) you create a (4) ......................... with your name, photo and basic
information (where you live, where you went to school etc.). To connect with people,
you add them to one of your “circles” and if they belong to G+ they may receive a
notification without having to consent to be added to one of your circles.
“Hangouts” is a popular feature of G+; they are “places” where you can start a
(5) ................. conference with people who have indicated that they are online and

available for that.


Ll (Linkedln) is a social networking site for professional people who want to increase
their visibility.You build an online CV using the given Ll format and then build your
“connections” starting with (6) ......................... you know and inviting the new ones
to join. Twitter is a website where you can post messages (tweets) of up to 140
characters long. Once you have sent a tweet, there are a lot of possible responses
from other Twitter users. With Twitter you can find information about a topic using the
hashtag sign ≠.

3. Writing | Write questions


Write questions with the prompts given below. Add the necessary language
and then answer your questions.

1. platform / how / define / can /?


Solution: ......................................................................................................................
2. risk / social media / of going out of / any description / date / run /?
Solution: .....................................................................................................................
3. G+ / popular / what / feature /?
Solution: ......................................................................................................................
4. what / people / site / social / professional / networking /?
Solution: ......................................................................................................................
5. Linkedln / used / why /?
Solution: ......................................................................................................................

160
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

A world of Apps

4. Reading | True/False and Summary


Read the text about the app Instagram and say if the sentences are true
or false.
Correct the false ones, orally and then summarize the text.

Instagram
“App” is the abbreviation for “application” and an application
software is a small programme that you can download to your
smartphone. So the app Instagram is a programme that gives
you the possibility to take pictures, apply special effects to
them and share them with the other instagram users, called
instagramers, and receive comments on them.
Instagram is also a social network, just like Facebook or Twitter:
you can have friends, you can follow people and people can
follow you. From this point of view, we can say that the social
network may encourage people who have never used a camera
to become photographers.
The app was developed by Kevin Systrom and Mike Krieger
who were working on a project on mobile photography. Later
Instagram added hashtags to help users discover pictures
that they could find interesting and discover other users with
similar interests and tastes.
Instagram was first used for Apple phones and devices such as:
iPods and iPads but now it is possible to have this app also on
Android phones.
Even if Instagram does not claim any ownership rights in the texts, photos,
videos or any other materials that users post, there are “terms of use”
that users must respect; for example: you must be 13 years old or older,
you can’t post suggestive photos; in a word: you must be responsible.

T F
1. An app is a programme.
2. With Instagram you can add special effects to your photos.
3. You can’t share your photos with instagramers.
4. Instagramers are those who use Instagram.
5. Instagram doesn’t encourage to become photographers.
6. Hashtags help users discover pictures.
7. Instagram was first used for Android phones.
8. Users must respect some rules.

161
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 $ZRUOGRI $SSV-DYDD EULJKWVWDU

5. Reading | Match and Discuss


Read the text about the best travel apps and then match the first half of a
sentence in column A with a second half in column B; then discuss, with your
partner, the importance of travel apps.

The best travel Apps


Today a lot of people book their holidays through the Internet; low cost airlines work
almost exclusively online; the Internet also offers photographs and information about any
destination in the world. In the past a computer was necessary, it isn’t anymore today,
because smart phones are revolutionizing the way we travel. Smart phones have touch
screens and a wireless connection to the Internet, so you can use all those online travel
services without a computer. It is very expensive to surf the Internet with a mobile phone
so you can use Apps. An App gives you instant connection to a particular service such
as Wikipanion; simply press its icon on your mobile’s touch
screen and Wikipanion will give you information about your
location. Here are some example of the best travel apps:
- begin with “iFlight”; it tells you if your flight is on time,
the gate number and boarding time. On your arrival you
need a taxi, so
- use “Taxi Magic”; it gives you the nearest taxi service and
calls it for you. If you can’t understand the taxi driver
- use “Lonely Planet Phrasebooks” for translations.
Other important apps are: “Urbanspoon” that helps you find
good restaurants, clubs and hotels; “Convert Me” that helps
you change the local currency to euros; and “Big Tipper” that calculates how much money
to tip your waiter.
Today, Apple’s iPhone and Google’s Nexus are some of the most popular smart phones and
they are good alternatives giving us the best of the modern technology such as the use of
image recognition and GPS technology.
What about traditional travel guidebooks? Is this their end? Guidebooks focus on detail;
some of them are exclusive guides which list the best hotels, first-class restaurants and
exclusive shops; while other guides concentrate on ethical and ecological details. Their
advantages are numerous, for example, they don’t need fast connections to the Internet,
they don’t need batteries. I don’t think this is their end.

A B
1. a lot of people a. offers both photos and information
2. you can b. isn’t necessary to book our holiday
3. today a computer c. will give you information
4. an App d. list the best places
5. press the icon on your mobile and e. use online travel services without a
the App computer
6. guidebooks f. book their holiday through the Internet
7. the Internet g. gives you connection to a service
immediately

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 ....

162
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

A world of Apps

6. Reading | Just for fun | Fill in


Here is a short summary on Candy Crush Saga, a famous videogame; while
reading fill in the blanks with the following words given in scrambled order.

pieces | risky | App | candies | Italian | variation | game |


chain | shares | smartphones

Candy Crash Saga


One of the latest videogame sensation
is Candy Crush Saga an (1) …...………
that was created and produced by the
European videogame company, King.com,
whose chief executive and co-founder is
an (2) ……...……, Riccardo Zacconi.
The App was originally a Facebook game
but later a version for (3) …….…… was
released and, in a very short period of
time, it has already surpassed FarmVille 2,
which was the most popular (4) ……...……
on Facebook.
At this point Mr Zacconi announced that
the company was preparing for a possible
IPO (Initial Public Offering) in 2013; that is to say, the company wanted to sell (5) ……....…...
on the American stock market, like Google and Facebook.
We don’t know if it will be a good investment; it could be (6) ……….....… because users
sometimes get bored, stop playing and as a result they stop downloading games and a lot
of employees could be fired.
But now, let’s play! Candy Crush is a (7) …....……… of “match three” games; each level has
a different game board. The boards are filled with (8) …….....…… of different colours: you
need to move your candy around, horizontally or vertically, so that you get sets of three
pieces of the same colour. When you have three (9) ………....… of the same colour, one next
to the other, they disappear and, as a consequence, all the other pieces left on the board
move, too. All this creates a (10) ……...…… effect; the aim is to get rid of all the candies, so
you can move to the next level. Candy Crush Saga is free except for some extra, like extra
lives etc, which require payment.

7. Vocabulary | Find the meaning


Use your dictionary to find the meaning of the following words; then compare
what you found with your partner and decide which is the best translation
according to the context.
1. chief executive = 8. a chain effect =
2. co-founder = 9. aim =
3. to release = 10. to get rid of =
4. shares = 11. to require =
5. stock market = 12. to get bored =
6. to fill with = 13. employees =
7. sets = 14. to fire =

163
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 $ZRUOGRI $SSV-DYDD EULJKWVWDU

8. Reading | Answer questions


Read the text about the app Vine and then answer the questions below.

The App VINE


A new app called Vine was
founded by Dom Hofmann
and Rus Yusupov and later,
at the beginning of 2013, it
was acquired by Twitter.
As Twitter’s feature is to
keep things direct and
simple, Vine reflects this
characteristic letting you
upload 6-second videos so that its fans are calling it: the Instagram
for videos.
At first Twitter launched Vine as a free app for Apple devices only but
now it is working on a version for Android phones and other platforms.
It is very easy to use this new creation; here are some useful tips:
after downloading and installing Vine on your device, you have to launch
the app for the first time and at this point you have two alternatives:
1. you can use your email address or
2. you can log in by using your Twitter account;
now you will be able to see a list of videos, which people you follow
uploaded, and videos which are recommended by the editors.
When you scroll through videos on the main page, they autoplay using
sound, and when you want to pause videos you can do that by tapping
on them. You will find the comments and the “like” button below each
picture.
There is also the option called “explore” that you can use to find videos
of your interest and to browse by topic. From the activity menu you can
see things like: who is following you, who is commenting on your videos.
You can tap on the icon in the top right corner of the screen if you want to
add people, and if you want to start sharing your videos, you can link your
Vine to your social networks.
As there are no privacy settings, at this point a warning is necessary: be
careful because anyone can watch your videos.

Answer questions:
1. When was Vine acquired?
2. Who acquired Vine?
3. Why is Vine called: the Instagram for videos?
4. What do you have to do after downloading and installing Vine?
5. Are there any videos recommended by the editors?
6. What happens when you scroll through videos on the main page?
7. What do you do when you want to pause a video?
8. Where are the comments and the “like”?
9. Can you browse videos by topic?
10. What do you have to do if you want to share your videos?

164
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Java: a software system for online multimedia

Java: a software system for online multimedia


Track
1. Listening | Fill in 17
You are going to listen to Mr Ross, an expert on IT, explaining what Java
is. While listening, fill in the blanks with the following words given in
scrambled order. Be careful, because one word is not necessary.

online | seclusion | development | programming | compatible |


team | dynamic | devices | introduced | central | approach

What is Java?
JavaSoft, parent company of the Java (1)........................
language, gives this description of its product: Java is a
simple, object-oriented, interpreted, robust, portable, and
dynamic language; but that’s not how it began.
In 1991, a special project (2)........................ of six software
developers from Sun Microsystems went into self-imposed
(3)........................ to attack a difficult hardware problem:

Computerized/electronic devices such as VCRs, Nintendo


Game Boys, stereos, and TV set-top control boxes were all made with different
(4)........................ processing units. Because of their difference in microprocessor chips,

the (5)........................ could not communicate with one another. The Sun team, code-
named Green, went to work on a fresh (6)........................ to software programming and
developed a new object-oriented programming language that Gosling called Oak, after
the tree outside his window. Based loosely on C++, Oak was a spare, stripped-down
language (7)........................ with small, handheld electronic devices and designed to
enable programmers to more easily support dynamic, changeable hardware.
After extensive development and several explorations into marketable products based
on the Green team’s research, Oak might have fizzled into oblivion. In 1991, however,
Mosaic was (8)........................ by the National Center for Supercomputing Applications
(NCSA). The World Wide Web was born. More Web technology soon followed, and the
Internet, used formerly only by scientists and educators, exploded with additional
traffic.
Within a year, Oak’s development team refocused its resources, developing what
they called a “language-based operating system” for (9)........................ multimedia
applications. The language they produced, renamed Java because of a trademark
conflict, was given away free on the Internet. With Java in the hands of the Internet
community at large, Netscape began to support it as a Web (10)........................ tool.
The result? Millions are developing Java applications (called applets) that reside on
centralized servers and can be called on as needed. A new generation of exciting
interactive Web sites has been born.

165
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 $ZRUOGRI $SSV-DYDD EULJKWVWDU

2. Activity | Multiple choice


Read the text and then choose the best answer.

1. Six software developers went into a. for pleasure;


self-imposed seclusion b. to solve a problem;
c. to develop a new programming
language;

2. Electronic devices such as a. because they were made with


Nintendo Game Boys, stereos etc. changeable hardware;
could not communicate with one b. owing to their difference in
another microprocessor chips;
c. owing to wrong software;

3. Oak language was a. based strictly on C++;


b. not based on C++;
c. based vaguely on C++;

4. A lot of Web technology followed a. the introduction of Mosaic;


b. the introduction of Oak;
c. the introduction of Java;

5. Oak’s development team developed a. approximately before 1991;


a “language based operating b. in 1991;
system” for online multimedia c. approximately after 1991;
applications.

3. Activity | Find synonyms


Find synonyms in the previous reading that mean:
1. Easy to move. ..........................................................................................................
2. Group of people who work together or play a game together. ................................
3. Far from where people live. .....................................................................................
4. For example. ............................................................................................................
5. Be used together without difficulty or danger. ........................................................
6. End in nothing after a good start. ............................................................................
7. A special mark on a product (to show that it is made by a particular producer).
.................................................................................................................................
8. As a whole. .............................................................................................................

4. Writing | Answer questions


Read the previous passage again and answer the following questions.
1. How did Java Soft describe its product?
2. What happened in 1991?
3. What is meant by “Green” in the text?
4. When was World Wide Web born?
5. Did the Internet already exist?
6. What is the result with Java in the hands of the Internet community?

166
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Java: a software system for online multimedia

5. Reading | Fill in
Read the short passage about the definition of a “script” and fill in the gaps
with the following words given in scrambled order.
language | commands | page| codes | concept | created |
purpose | use | writing | application

Definition of “script”
A script is a series of (1)............................... written to accomplish some task. It is very similar
to the (2)............................... of a program, but it is not as large or comprehensive.
The (3)................................ of a script is to extend the capabilities of the (4)..........................
...... where it is used.
Scripting is the process of (5)............................... a script.
JavaScript is a scripting (6)............................... that allows the Web (7)..............................
designer to add functional features to a formatted Web page (8)............................... with
HTML.
What a Web page looks like is determined by the (9)..............................of a special language
called Hyper Text Markup Language (HTML).
Technically speaking,HTML is not a programming language at all but a formatting language.
It contains special (10)............................... that allow you to determine the layout-markup-of
your Web page as it is viewed in a Web browser which is a program that interprets and
displays information from the Internet, especially the World Wide Web.

6. Writing | Write questions


Write questions with the prompts given below. Add the necessary
language. Then answer your questions.

1. What / script / be? /


Solution: ......................................................................................................................
2. What / the purpose / be / a script? /
Solution: .....................................................................................................................
3. What /JavaScript / allow / Web page designer? /
Solution: ......................................................................................................................
4. HTML / be / programming language? /
Solution: ......................................................................................................................
5. What / Web browser / be? /
Solution: ......................................................................................................................

7. Activity | Find synonyms


In the previous text find synonyms that mean:

1. a series of instructions
2. to achieve
3. complete
4. aim
5. characteristics

167
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 $ZRUOGRI $SSV-DYDD EULJKWVWDU

8. Reading | Match and Discuss


Read the text about JavaScript and then match the first half of a sentence in
column A with a second half in column B. Be careful, because two in column
B are not necessary. Then discuss about “Scripting” with your teacher.

JavaScript
We will use the term scripting to indicate a means by which the programmers add extensions
or additional capabilities to an application. Many word processors, database programs, and
operating systems have scripting capability. A list of several scripting languages is shown
in the Table below.
These languages range from Perl and C++, which are general-purpose, full-scale
programming languages, to Vbscript, a subset of Microsoft’s powerful Visual Basic, to
JavaScript, a scripting language designed for enhancing the functionality of Web pages.
Many people think that JavaScript is derived from the programming language Java. Not
so. JavaScript is related to Java in name only. Java is a full-featured programming language
beyond the realm of our discussion. JavaScript is a special scripting language used to
enhance an existing Web page. To write a JavaScript routine, you must know the commands
of the language and how they work. To use such routines, however, you have only to find
them and copy them into your own Web pages. The WWW has thousands of JavaScript
routines that you can use without knowing much about how they work but considering that
tasks in programming often require many statements. JavaScript can be long and create
complex design features. A lot of long and involved Java Scripts creating attractive and
exciting effects have already been written and are available, free over the WWW.

Same scripting
languages

A B
1. these languages a. have scripting capability
2. many people think that JavaScript b. is related to Java in name only
3. the WWW c. can be much more complex
4. we will use the term scripting d. is derived from the programming
language Java
5. many word processors, database e. have already been written
programs and O.S.s.
6. JavaScript f. to indicate a means by which the
programmers add extensions
g. range from Perl and C++ to Vbscript,
to JavaScript
h. has thousands of JavaScript routines

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... .... ....


not necessary

168
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Java programming Language

Java programming language

1. Reading | True/False
Read the text about the Java language.
Tick the appropriate box and correct the false sentences.

The Java Language


In the Java language there are some
specific terms that an user should learn
as they represent the fondamentals of
programming in the Java programming
language. It is important to remember
the following terms:
- “Object Oriented Programming
Concepts”explains the main concepts
which are behind object-oriented
programming: objects, messages,
classes, and inheritance.
- “Language Basics” describes the traditional characteristics of the language, including
variables, data types, operators, and control flow.
- “Object Basics and Simple Data Objects” describes the general principles for creating
and using objects of any type.
- “Classes and Inheritance” teaches how to write the classes from which objects are
created.
- “Interfaces and Packages” are characteristics of the Java programming language that
help to organize and structure classes and their relationships to one another.
- “Common Problems” describes the solutions to some problems.

Moreover, it is important to bear in mind that:

- An object is a software heap of related variables and methods. An instance is an


executable copy of a class so another name for instance is “object”.
- In a general way, a message is a spoken or written piece of information that you send
to another person. Here the concept is that software objects interact and communicate
with each other using messages.
- A class is a structure that defines the data and the methods to work on that data. All
program data is wrapped in a class.
- Inheritance provides a powerful and natural mechanism for organizing and structuring
software programs. Inheritance defines relationships among classes in an object-
oriented language.
- An interface is a kind of contract in the form of a collection of method and constant
declarations. When a class implements an interface, it promises to implement all of the
methods declared in that interface.
- All these concepts translate into code using a small applet which is a small application
module.

169
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 $ZRUOGRI $SSV-DYDD EULJKWVWDU

T F
1. It is not important you know some specific terms.
2. The term “Object-Oriented Programming” concepts teaches you how
to write a program.
3. The term “Language Basics” speaks about the features of the language.
4. The term “Object Basics and Simple Data Objects” gives you the idea
for creating and using objects.
5. The term “Classes and Inheritance” describes the objects.
6. The term “Interfaces and Packages” helps you to organize and
structure your classes.
7. An object is a collection of related variables and methods.
8. A message is an interaction among software objects.
9. A class is a prototype that varies according to the methods common
to all objects.
10. A natural mechanism which is useful to organize and structure software
programs is provided by Inheritance.
11. An interface can be considered a contract.
12.A class implements only the interface.

2. Activity | Match
Read the previous text again and match the words and expressions in
column A with their synonyms and/or definitions in column B.

A B
1. core concept a. characteristic part of a thing
2. fundamentals b. connection
3. feature c. bump into
4. relationship d. bases
5. run into e. a term used to describe a set of
computer programming instructions
6. code f. the central part of a notion
7. bundle g. detailed plan of work to be done
8. blueprint h. a small Java program
9. a small applet i. collection

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 .... 8 .... 9 ....

3. Activity | Put in order


Put in order the letters and write the correct words.

1. mrets....................... 8. owfl............................. 15. gsesema........................


2. jbocte...................... 9. taad............................. 16. cipee..............................
3. esptcnoc................. 10.esscsla........................ 17. wteasrof.........................
4. rceo......................... 11. haronte........................ 18. retotopyp.......................
5. cassbi...................... 12.elspmobr..................... 19. iratecnhine.....................
6. utsafeer................... 13.eterdal......................... 20. ncateerif.........................
7. bslvairae................... 14.dnbelu.........................

170
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Java programming Language

4. Reading | True/False and Summary


Read the text and decide whether the statements are True or False. Correct
the false ones. Then summarize the text orally.

Java platform
When you want a computer to perform tasks, you write a program. A program is a sequence
of instructions that define tasks for the computer to execute. Before explaining how to
write, compile, and run a simple program written in the Java language (Java program) that
tells your computer to print one-line string of text on the console, you need to understand
what Java platform is, and set your computer up to run the programs.
The Java platform consists
Glossary of the Java application
The terms “Java Virtual Machine” programming interfaces
or “JVM” mean a virtual machine for the Java platform (APIs) and the Java Virtual
machine (JVM).
Java APIs are libraries of compiled code that you can use in your programs.They let you add
ready – made and costomizable functionality to save you programming time. Java programs
are run (or interpreted) by another program called the Java VM. If you are familiar with
Visual Basic or another interpreted language, this concept is probably familiar to you.
Rather than running directly on the native operating system, the program is interpreted
by the Java VM for the native operating system. This means
that any computer system with the Java VM installed can run Java Program
Java programs regardless of the computer system on which the Java APIs
applications were originally developed.
For example, a Java program developed on a Personal computer Java Virtual Machine
with the Windows NT operating system should run equally well
without modification on a Sun Ultra Workstation with the Solaris Your Computer System
operating system, and vice versa.

T F
1. A program is a series of instructions that define tasks
2. Java platform consists of APIs and JVM
3. APIs let you save programming time
4. Java programs run directly on the native operating system
5. Any computer system can run Java programs

5. Activity | Find synonyms


Find synonyms in the previous reading that mean
1. piece of work............................................................................................................
2. a series.....................................................................................................................
3. personalizable...........................................................................................................
4. notion........................................................................................................................
5. natural.......................................................................................................................
6. without consideration...............................................................................................
7. change......................................................................................................................
8. with the order of terms changed..............................................................................

171
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 $ZRUOGRI $SSV-DYDD EULJKWVWDU

6. Reading | Match
Writing a program may be simple. Read the following texts. Match each
text with the correct title.

Glossary
Text – Editor. A software program that creates and manages text files.
Unlike word processors, text editors do not have to elaborate formatting
and printing features

Titles
Compiling the program | Writing a program |
Interpreting and running the program

1. ................................................................................................................................................
With the Java platform installed and configured, the easiest way to write a simple
program is with a text editor. Using the text editor of your choice you can create a text
file with the following text but be sure to name the text file
ExampleProgram.java
As Java programs are case sensitive, if you type the code in yourself, be careful about
the capitalization:

//A very Simple Example


class ExampleProgram {
public static void main (String [ ] args) {
System.out.println (“I’m a Simple Program”);
}
}

2...........................................................................................................................................
A program has to be converted to a form understood by Java VM so any computer
with a Java VM can interpret and run the program. Compiling a Java program means
taking the programmer-readable text in your program file (also called source code) and
converting it to bytecodes, which are platform-independent instructions for the Java
VM. In conclusion, a compiled Java code can run on most computers because of Java
interpreters which are known as Java Virtual Machines.

3...........................................................................................................................................
Once your program successfully compiles into Java bytecodes, you can interpret and
run applications on any Java VM, or interpret and run applet in any Web browser with a
Java VM built in such as Netscape or Internet Explorer. Interpreting and running a Java
program means calling on the Java VM byte code interpreter, which converts the Java
byte codes to platform-dependent machine codes so your computer can understand
and run the program.

172
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Java programming Language

7. Activity | Match
Read the previous texts and then match the first half of a sentence in
column A with a second half in column B. Be careful, because two in
column B are not necessary.

A B
1. Java programs a. pay attention to the capitalization
2. a text editor is a software program b. is with a text editor
that
3. bytecodes c. means invoking the Java VM byte code
interpreter
4. compiling a Java program d. are case sensitive
5. the easiest way to write a simple e. are related
program
6. if you type the code in yourself f. using the text editor of your choice
7. you can write a text file g. means taking the programmer-
readable text in your program file and
converting it to bytecodes
8. interpreting and running a Java h. are platform-independent instructions
program for the Java VM
i. are often used
j. creates and manages text files

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 .... 8 .... .... ....
not necessary

8. Writing | Answer questions


Answer the following questions:
1. When is it possible to write a simple program?
2. What is the easiest way to write a simple program?
3. Why do you have to pay particular attention to the capitalization?
4. Why does a program have to be converted to a form that Java VM can understand?
5. What does compiling a Java program mean?
6. What is the other name of program file?
7. What are bytecodes?
8. When can you interpret and run applications on any Java VM?
9. What does interpreting and running a Java program mean?
10. What is the function of the Java VM byte code interpreter?

173
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 $ZRUOGRI $SSV-DYDD EULJKWVWDU

9. Reading | Fill in
Here are some useful details about code comments, double slashes,
C-Style Comments, Doc Comments. Read the texts below and fill in the
blanks with the following words given in scrambled order.
API | source | code | compiler | language | kinds | problem | class |
documentation | lines

Code comments
Code comments are placed in (1) ................................ files to explain what is happening
in the (2) ................................ to a person who might be reading the file, to comment-out
lines of code to isolate the source of a (3) ................................ for debugging purposes, or to
generate (4) ................................ documentation. To these ends, the Java language supports
three (5) .............................. of comments: double slashes, C-style, and doc comments.

Double slashes
Double slashes (//) are used in the C++ programming (6) ................................ , and tell the
(7) ................................ to treat everything from the slashes to the end of the line as text.

//A Very Simple Example


class ExampleProgram {
public static void main (String [ ] args) { Glossary
System.out.println (“I’m a Simple Program”); Api means.
} Application Programming Interface
}

C-Style comments
In place of double slashes, you can use C-style comments (/**/) to enclose one or more
(8) ................................ of code to be treated as text.

/* These are
C-style comments
*/
class ExampleProgram {
public static void main (String [ ] args) {
System.out.println (“I’m a Simple Program”);
}
}

Doc comments
To create (9) ................................ for your program, use the doc comments (/** */) to enclose lines of
text for the Javadoc tool to find. The javadoc tool locates the doc comments embedded in source
files and uses those comments to create API documentation.
Answer questions:
/** This class displays a text string at
* the console. 1. What is a subprogram?
*/ 2. What happens to each subprogram?
3. When does the final testing begin?
class Example Program {
4. Explain what alpha testing is.
public static5.void mainwhat
Explain (String
beta[ testing
] args)is.{
System.out.println (“I’m a Simple Program”);
}

174
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Java programming Language

If you have one simple (10) ................................, there is no reason to


create API documentation. API documentation makes sense when
you have an application made up of several complex classes that need
documentation.
The tool creates HTML files (Web pages) that describe the class
structures and contain the text enclosed by doc comments.

10. Activity | Match


Read the previous text again and then match the first half of a sentence
in column A with a second half in column B. Be careful, because two in
column B are not necessary.

A B
1. double slashes tell the compiler a. are placed in source files
2. C-style comments b. use the doc comments
3. to enclose lines of text c. are placed in text files
4. Java language d. are used in the C++ programming
language
5. C-style comments can be used e. can be used instead of double slashes
6. double slashes f. to generate API documentation with
one simple class
7. Code Comments g. to select everything
8. it is not necessary h. supports three kinds of comments
i. to treat everything
j. to enclose one or more lines of code

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 .... 8 .... .... ....
not necessary

11. Activity | Find the meaning


Use your dictionary to find the meaning of the following words; then
compare what you found with your classmates and decide which is the
best translation according to the context.

1. to isolate ............................................ 6. to treat ...............................................


2. ends ................................................... 7. to enclose ..........................................
3. to support .......................................... 8. tool ....................................................
4. double ................................................ 9. to embed ...........................................
5. slashes ............................................... 10. to make sense ..................................

175
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 $ZRUOGRI $SSV-DYDD EULJKWVWDU

How to build applications and applets


Track
1. Listening | Fill in 18
Read the first part of the passage on how an application is created; while
reading fill in the blanks with the following words given in scrambled order.

similar | c. language | integer | method | elements | different | class | classes

Application structure (First part)


As you certainly know, applications may run on a single computer or be distributed
among servers and clients in a network.
All programs written in the Java language are built from (1).......................... . Because
all classes have the same structure and share common (2).........................., all Java
programs are very similar.
An application is generated from classes. A class is (3).......................... to a record in
the Pascal language or a struct in the (4).......................... as it stores related data in
fields, where the fields can be (5).......................... types. You could, for example, store
a text string in one field, an (6).......................... in another field, and a floating point in
a third field. The difference between a (7).......................... and a record or struct is that
a class also defines the methods to work on the data.
For example, a very simple class might store a string of text and define one
(8).......................... to set the string and another method to get the string and print it.

Methods that work on the data are called accessor methods.

2. Activity | Match
Match the first half of a sentence in column A with a second half in column
B. Be careful, because two in column B are not necessary.

A B
1. all the classes a. are built from classes
2. a record in the Pascal language b. are similar
3. an application c. work on the data
4. the difference between a class and d. share common elements
a record or struct
5. all programs written in the Java e. is similar to a class in the Java language
language
6. accessor methods f. have the same structure
7. all the classes g. sare different
8. all Java programs h. is that a class also defines the
methods to work on the data
i. have the same architecture
j. is created from classes

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 .... 8 .... .... ....
not necessary

176
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

How to build applications and applets

3. Reading | Fill in and summarize


Read the second part of the passage on how an application is created; while
reading fill in the blanks with the following words given in scrambled
order. Then summarize “application structure” first and second part.

instance | methods | interpreter | program | wonder | empty |


static | class | run | created

Application structure (Second part)


Every application needs one (1)........................... with a main method. This class is the entry
point for the program, and is the class name passed to the java interpreter command to
(2)........................... the application.
The code in the main method performs first when the program starts, and is the control
point from which the controller class accessor (3)........................... are called to work on the
data.
Consider again the example program from Reading – Fill in “Code Comments, Double
Slashes, …”, as it is the only class in the (4)..........................., it has a main method, but it has
no fields or accessor methods.

Class ExampleProgram {
public static void main (String [ ] args) {
System.out.println (“I’m a Simple Program”);
}
}

The public static void keywords mean the Java virtual machine (5)........................... can call
the program’s main method to start the program without creating an instance of the class,
and the program does not return data to the Java VM interpreter when it ends.
You need a class instance to acquire and work on data, while the class describes the data
and behavior.
The main method is (6)........................... to give the Java VM interpreter a way to start the
class without generating an instance of the control class first. Instances of the control class
are (7)........................... in the main method after the program starts.
The Java platform lets you perform a class without generating an instance of that class as
long as its static methods do not call any non-static methods or fields.
However, a program must generate an (8)........................... of a class to access its non-static
fields and methods which are called instance methods and fields.
Static methods and fields are called class methods and fields; so , class methods can work
only on class fields, and instance methods can operate on class and instance fields.
If you (9)........................... what the difference is we can say there is only one copy of the data
stored or set in a class field but each instance has its own copy of the data stored or set in
an instance field.
Classes have a special method called a constructor that is called when a class instance is
generated.The class constructor always has the same name as the class and no return type.
Remember that if you do not write your own constructor, the compiler adds an
(10)........................... constructor, which calls the no-arguments constructor of its parent
class. The empty constructor is called the default constructor.

177
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 $ZRUOGRI $SSV-DYDD EULJKWVWDU

Track
4. Listening | True/False 19
Mr Gordon, an expert of Java language, is explaining how applets are
created. While listening, you should be able to tick the true statements;
then, at the end of the listening, with the help of the tapescript and your
knowledge, you should be able to correct the false ones.

Building applets
Java programming language can be used to create applications and to build applets
(small application modules or programs) which are used as part of a Web page.
Applets let you play music, watch animated drawings and moving texts and let you
interact with information on the screen.
Applets are created from classes like applications, but applets do not have a main
method as an entry point; on the contrary, they have several methods to control
specific aspect of applet execution.

Applet structure
The Java API applet class gives you what you need to design the appearance and
manage the behaviour of an applet. This class supplies a GUI component called a Panel
and a lot of methods.
To create an applet you extend the Applet class and implement the appearance and
behaviour you want. The applet’s appearance is obtained by drawing on the panel or by
attaching other GUI components (scrollbars, push buttons, check boxes) to the Panel.
The applet’s behaviour is specified by implementing the methods.

T F
1. Java programming language can be used to built programs
2. Applets don’t allow you to interact with information on the screen
3. Like applications, applets are created from classes
4. Applets have a lot of methods
5. You extend the applet class to create implementation

5. Speaking | Oral report


Prepare a short speech following the guidelines below:

1. how applets are created;


2. their importance;
3. how applet’s appearance is obtained.

178
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Security - Cryptography

Security - Cryptography
1. Reading | Complete
Read the following short text about computer security. While reading
complete the text with the words in the box.

natural | data | damage | care | physical | software | programs | several

Computer security
Computer security is concerned with taking (1)....................... of hardware,
(2)....................... and data. The cost of creating (3)....................... again from
scratch can outweigh the cost of any hardware or (4)....................... lost.
Loss of data can have (5)....................... consequences, some of which are
shown in the figure below.
Computer equipment and its data need to be protected from
(6)....................... harm. Hazards could include (7)....................... ones such
as fire, lightning, water damage etc. and can also include deliberate
(8)....................... or theft.

2. Writing | Answer questions


Answer the following questions
1. What do you understand for “computer security”?
2. Will you have to spend a lot of money for creating data again from scratch?
3. What are the consequences of loss of data?
4. Is it necessary to protect computer equipment and its data?
5. What could natural hazards be?

3. Speaking | Summary
Read the previous text again and look at
pictures; prepare a summary on computer
security and speak to your partner about:

a. meaning of computer security


b. its importance
c. its possible advantages
d. consequences of loss of data

Then swap roles.

179
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 $ZRUOGRI $SSV-DYDD EULJKWVWDU

4. Reading | True/False
Read the passage about encryption and say if the sentences are true or
false. Correct the false ones.

Encryption
A stolen credit card number with other personal information can give a
thief all he needs to create serious trouble in someone’s life.
Files which contain sensitive data are encrypted so if a disk or tape
containing sensitive files is stolen, it would then be impossible to read
the data without the decoder.
We can say that encryption is the process of applying a key to plain text
which is transformed into unintelligible text.
Only programs with the key to return the cipher text back to original text
can decrypt the protected information.
Encryption is often used when important data is transmitted from one
place to another.The data is coded before being sent and then decoded at
the other end; both processes are performed automatically by computers.
If the data is intercepted, then it will be impossible to understand or
alter.
When people are making payments for goods bought over the Internet
using a credit card the details are always encrypted.
The encrypt method creates a cipher and session key and uses the
session key with the cipher to encrypt the credit card number.

T F
1. “To encrypt” means: to put information into a special code, especially
in order to prevent people from looking at it without authority.
2. Sensitive files are files that you have to treat with great care.
3. Files which are encrypted can be read easily.
4. The data is coded after being sent and then decoded at the other end.
5. When people buy goods over the Internet and use a credit card, all the
details are sometimes encrypted.

5. Speaking | Oral report


Prepare a short report (about 2 minutes) on
“Encryption” following these guidelines:

- definition of encryption
- why encryption is used
- who uses encryption
- importance of encryption

180
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Revise & check

5HYLVH FKHFN
1. Put in order the following sentences. Add the necessary language.
1. Your smartphone / install / app / you can / onto /
Solution: ......................................................................................................................
2. Like / network / Instagram / Twitter / Facebook / social /
Solution: ......................................................................................................................
3. Working / project / they / mobile photography /
Solution: ......................................................................................................................
4. Phones / first / Instagram / Apple / used /
Solution: ......................................................................................................................
5. Responsible / you / be /
Solution: ......................................................................................................................

2. Write a suitable translation for each of the following words.


1. A means ..................................................................................................................
2. Several .....................................................................................................................
3. To range from…to ....................................................................................................
4. To enhance ..............................................................................................................
5. To relate to ...............................................................................................................
6. Beyond ....................................................................................................................

3. Write questions with the prompts given below. Add the necessary
language. Then answer your questions.

1. What / be / a / program? /
Solution: ......................................................................................................................
2. What / Java / platform / consist? /
Solution: ......................................................................................................................
3. You / can / use / Java / APIs / in / programs? /
Solution: ......................................................................................................................
4. What / be / advantage / APIs? /
Solution: ......................................................................................................................
5. The program / run / directly / native O.S.? /
Solution: ......................................................................................................................

4. Read the passage about application structure (first part) and say
if the sentences are true or false. Correct the false statements.
T F
1. All classes have common elements
2. “Classes” are the feature of all programs written in the Java language
3. Classes create an application
4. A class sometimes defines the methods to work on the data
5. A class might define two methods

181
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 $ZRUOGRI $SSV-DYDD EULJKWVWDU

5. Prepare an oral report (about two/three minutes) on JavaScript


following these guidelines:
a. what the term “scripting” indicates;
b. function of JavaScript;
c. what is necessary to write a JavaScript routine.

6. Put in order the words in the following sentences.


1. way / a simple / editor / the easiest / a text / program / is / to write / with /
Solution: ......................................................................................................................
2. can / a text / you / file / create /
Solution: ......................................................................................................................
3. attention / to the / pay / capitalization / particular /
Solution: ......................................................................................................................
4. has / can / a / converted / Java VM / to be / understand / form / program / that / to / a /
Solution: ......................................................................................................................
5. interpret / in any / can / Java VM / and / browers / run / with / you / applet / web / a /
Solution: ......................................................................................................................
6. a Java / interpreter / means / interpreting / invoking / and / byte code / running /
program / Java VM / the /
Solution: ......................................................................................................................

7. Write questions with the prompts given below. Add the necessary
language. Then answer your questions.

1. Where / code comments / placed? /


.................................................................................................................................
2. Why / code comments /placed / source files? /
.................................................................................................................................
3. How many / kinds / comments / the Java language / have? /
.................................................................................................................................
4. C++ / programming language / use / double slashes? /
.................................................................................................................................
5. What / double slashes / tell / compiler? /
.................................................................................................................................
6. What / you / can / use / instead / double slashes? /
.................................................................................................................................
7. Where / javadoc tool / locate / doc comments / embedded? /
.................................................................................................................................
8. There / be / any / reason / generate / API documentation / with one / simple class? /
.................................................................................................................................

8. Prepare an oral report about code comments… using the following


guidelines:
1. definition of Code comments and their importance.
2. importance of Double Slashes
3. importance of C-Style Comments
4. function (s) of Doc Comments.

182
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Test your competence

7HVW\RXUFRPSHWHQFH
1. Write questions with the prompts given below. Add the necessary
language. Then answer your questions.

1. One class / with a main method / be / necessary / every application? /


.................................................................................................................................
2. What / be / the control point / from which / the controller class / accessor
method / be / call / to work / the data? /
.................................................................................................................................
3. What / public static void / keywords / mean? /
.................................................................................................................................
4. Where / instances / the control class / be / create? /
.................................................................................................................................
5. When / instances / the control class / be / create? /
.................................................................................................................................
6. What / program / must / create? /
.................................................................................................................................

2. Traslate into English the following sentences:


1. Instagram è un programma che ti dà la possibilità di fare foto, applicarci effetti
speciali e condividerle con altri utenti.
2. Instagram è un social network che può incoraggiare le persone che non hanno mai
usato una macchina fotografica a diventare fotografi.
3. Anche se Instagram fu usato all’inizio per dispositivi come: iPods e iPads, oggi è
possibile avere questa applicazione anche per telefoni Android.
4. Cosa significa JVM? E’ l’acronimo di Java Virtual Machine e significa che è una
macchina virtuale per la piattaforma Java.
5. Ci sono molte conseguenze negative quando si perdono i nostri “dati”.
6. I files che contengono dati sensibili sono protetti mediante codifica così che è
impossibile leggere le informazioni senza il decodificatore.

3. Write questions with the prompts given below. Add the necessary
language and then answer your questions.

1. Why / files / be / encrypt / with sensitive data? /


.................................................................................................................................
2. What / necessary / be / read / the data? /
.................................................................................................................................
3. What / encryption / be? /
.................................................................................................................................
4. All programs / can / decrypt / protected information? /
.................................................................................................................................
5. When / encryption / be / use? /
.................................................................................................................................

183
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 $ZRUOGRI $SSV-DYDD EULJKWVWDU

4. Find the right translation.


1. Files which contain sensitive data are encrypted.
a. I files che contengono dati sensibili sono decodificati.
b. I files che contengono dati sensitivi sono codificati.
c. I files che contengono dati sensibili sono codificati.

2. With encryption, a plain text is transformed into cipher text.


a. Con la codifica, un testo facile da capire è trasformato in un testo cifrato.
b. Con la codifica, un testo facile da capire si trasforma in un testo incomprensibile.
c. Con la codifica, un testo facile da capire si trasforma in un testo cifrato.

3. Only special programs can decrypt the protected information.


a. Soltanto programmi speciali di codifica possono proteggere le informazioni.
b. Soltanto programmi speciali sono protetti da informazioni decriptate.
c. Soltanto programmi speciali possono decriptare le informazioni protette.

4. Encryption is often used when important data is transmitted from one place
to another.
a. La codifica spesso è usata quando importanti informazioni sono trasmesse in un
posto.
b. La codifica è spesso usata quando le informazioni sono trasmesse da un posto
all’altro.
c. La codifica è sempre usata quando importanti informazioni sono trasmesse da un
posto all’altro.

5. The data is coded before being sent and then decoded at the other end.
a. Le informazioni sono decodificate prima di essere spedite e poi codificate dall’altra
parte.
b. Le informazioni sono codificate prima di essere spedite e poi decodificate al punto
di arrivo.
c. Le informazioni sono codificate prima di essere spedite e poi decodificate dalla
prima parte.

6. If the data is intercepted, it will be impossible to understand or alter.


a. Se le informazioni sono intercettate, sarà impossibile capirle o alterarle.
b. Se le informazioni sono intercettate, saranno capite o alterate.
c. Se intercetterai le informazioni, sarà impossibile capirle o alterarle.

5. Using your words and knowledge prepare an oral report on Vine


explaining the following steps:

- definition of “App”
- what Vine is
- what is its main feature
- how you use it
- your own ideas on the app.

184
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

The processing unit

PRGXOH
,W·VDZLUHGZRUOG

In this module you will learn to:
t identify types of network
t know different ways of connecting computers
in a networkge
t talk about telecommunications
t identify the various types of physical connections
possible in a network
t know the five basic properties of a network link
and how each contributes to the link

Understanding networks
1. Reading | Match
Read an introduction to networks and answer the questions.

Most of us would be lost without data networks. Just a few years ago, when computers were
first starting to make their way into the business world, data sharing would normally have
to be done by copying and then carrying the data from one PC to the next. Today, the data is
transferred from one user to the next in a fraction of a second. The growth that networking
has undergone is remarkable. And it doesn’t stop there. Every day there are new standards
being proposed, new innovations being developed, and updates and changes to these being
addressed.

Advances in technology are a fact of life – any advance that requires the movement of data
from one point to the next will need the services of a network to do so.This is why the world
of networking has grown so much – and will continue to do so.With users transferring large
amounts of data and the amount of that data growing at an exponential rate, there seems to
be no end to the opportunities networks offer.

185
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH


 ,W·VDZLUHGZRUOG
$ZRUOGRI $SSV-DYDDEULJKWVWDU

But what is a network?


A data network is a group of computers connected to one another by communication
paths, as well as the standards that allow communication. A network can connect to other
networks, allowing virtually worldwide communication between two endpoints. Many
networks share information among one another, creating larger networks.

1. ‘Most of us would be lost without data


networks’ – why? Give your opinion.
2. How was data shared in a not distant past?
And today?
3. Explain why the growth that networking has
experienced is remarkable.
4. Will the opportunities networks offer have an
end, as far as we can observe now?
5. Can you give your own definition of a network?

2. Reading | Activities
Read about the types of networks and the technologies they use. Do the activities.

Local-area networks (LANs)


LANs are designed to:
r operate within a limited geographic area
(usually the same building)
r allow multi-access to high-bandwidth media
r control the network privately under local
administration
r provide full-time connectivity to local services
r connect physically adjacent devices.

Metropolitan-area networks (MANs)


A MAN is a network that spans a metropolitan
area such as a city or suburban area. It usually
consists of two or more LANs in a common
geographic area. An example of the use of a MAN
is a bank with multiple branches. Typically, a
service provider is used to connect two or more
LAN sites using private communication lines or
optical services. A MAN can also be created using
wireless bridge technology by beaming signals
across public areas.

186
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Understanding networks

Wide-area networks (WANs)


What are WANs designed to do?
r Operate over a large geographically
separated areas
r Allow users to have real-time
communication capabilities with
other users
r Provide full-time remote resources
connected to local services
r Provide e-mail, WWW, file transfer
and e-commerce services.
This type of networking has created
a new class of workers called
telecommuters, people who never have
to leave their homes to go to work.

A SAN is a dedicated, high-performance network used to move data between servers and
storage resources. Because it is a separate, dedicated network, it avoids any traffic conflict
between clients and servers. It permits high-speed server-to-storage, storage-to-storage
or server-to-server connectivity. This method uses a separate network infrastructure that
relieves any problems associated with existing network connectivity.

What features do
Storage Area Network
SANs offer?

- Performance - in
fact, they enable
concurrent access
of disk or tape
arrays by two or
more servers at high
speeds, providing
enhanced system
performance.

- Availability -
SANs have disaster
tolerance built in,
because data can
be mirrored using
a SAN up to 10
kilometres or 6.2
miles away.

- Scalability – Like a
LAN/WAN, it can use a variety
i off technologies.
h l i Thi This allows
ll easy relocation
l i off b
backup
k data,
d
operations, file migration and data replication between systems.

187
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 ,W·VDZLUHGZRUOG

Personal area networks (PANs) Bluetooth was named after a tenth-century


Danish king named Harald Bluetooth.
It is a new concept made possible
by the introduction of Bluetooth
technology, the short-range, low-
cost, low-speed wireless technology.
A PAN is the interconnection of
information technology devices
within the range of an individual
person, typically within a range of
10 metres. For example, a person
travelling with a laptop, a personal
digital assistant (PDA), and a
portable printer could interconnect
them without having to plug
anything in, using some form of
wireless technology.

Activities.
A. Decide if the statements about MANs, WANs, LANs, SANs and PANs are true (T) or false (F).
If false, provide the right version orally.
T F
1. MANs operate within a limited geographic area.
2. WANs are dedicated, high performance networks.
3. LANs connect devices that are physically near.
4. SANs are used to move data between servers.
5. PANs operate at a long distance range.
6. LANs provide e-mail and WWW services.
7. WANs have created workers called telecommuters.
8. MANs have disaster tolerance built in.
9. SANs are used to connect a bank with its branches.
10. PANs extend the individual personal world of electronics.

B. Match the definition or synonym with the appropriate word underlined in the texts about
MANs and SANs. One of the words belongs to the text about VPNs in the following page.

Words in the text Definition/Synonim


1. span a. characteristic, quality
2. beam b. stay away from
3. storage c. extend across
4. avoid d. economical in terms of the goods or services received for the money spent.
5. relieve e. how much a system can be expanded
6. feature f. the semi-permanent or permanent holding place for digital data
7. array g. an ordered arrangement of data elements
8. mirror h. replacement, rearrangement
9. scalability i. reflect
10. relocation j. ease, alleviate
11. cost-effective k. transmit

188
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Understanding networks

Virtual private network (VPN)


It is a private network that is constructed within a public network
infrastructure such as the Internet. Using VPN, telecommuters
can access the network of the company headquarters through the
Internet by building a secure tunnel between their PCs and a VPN
router in the headquarters. So, it is a service that offers secure,
reliable connectivity. VPNs are the most cost-effective method of
establishing a point-to-point connection between remote users and
an enterprise customer’s network. These are the three main types of
VPNs:

– Access VPNs – They provide remote access to a mobile worker and


small office/home office (SOHO) to the headquarters of the Intranet
or Extranet over a shared infrastructure. Access VPNs use analog,
dialup, ISDN, DSL, mobile IP and cable technologies to securely
connect mobile users, telecommuters and branch offices.

– Intranet VPNs – These link regional and remote offices to the headquarters of the
internal network over a shared infrastructure using dedicated connections. They differ
from Extranet VPNs in that they allow access only to the employees of the enterprise.

– Extranet VPNs – They link business partners to the headquarters of the network
over a shared infrastructure using dedicated connections. Extranet VPNs differ from
the Intranet in that they allow access to users outside the enterprise.

C. Answer questions.

1. What is the advantage of a VPN for the


relationship between telecommuters and
an enterprise?
2. In what sense are VPNs the most cost-
effective method of establishing a point-
to-point connection between remote users
and an enterprise customer’s network?
3. Can you briefly name and describe the three
types of a VPN?
4. What is the difference between Intranet
Web servers and public Web servers?
5. What are Intranets designed for?
6. What is the main difference between
Intranets and Extranets?

Track
3. Listening | Identify 20
Listen to the two dialogues and find out which types of network they are
referring to. Give reasons for your answers.

189
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 ,W·VDZLUHGZRUOG

Networking devices
1. Reading | Activities
Read about the two types of networking devices and do the activities.

A. Before reading match the English verbs taken from the text with their Italian
equivalents. There are a couple of intruders in the Italian list.
permettere | collegare | raggiungere | compiere | fornire |
portare | consentire | andare

provide carry
allow perform
plug enable

B. Read.
Networking devices are divided into end-user devices and network devices.

End-user devices (also called host devices)


These include computers, printers, scanners and all the devices that provide services
directly to the user.They allow users to share, create and obtain information. Obviously
host devices can exist without a network, but without a network their capabilities are
greatly reduced.
Host devices are physically connected to the network media using a network interface
card (NIC). This connection is used to perform various tasks, such as sending e-mails,
printing reports, scanning pictures or accessing databases.
A NIC is a printed circuit board that plugs into an expansion slot within the system
unit. It is also called a network adapter. Each NIC carries a unique code, called a Media
Access Control (MAC) address. This address is used to control data communication
for the host on the network.

Network devices
They provide transport for the data that needs to be transferred between end-
user devices. Examples of devices performing these functions are repeaters, hubs,
bridges, switches and routers.

190
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Networking devices

Repeaters amplify and regenerate signals along a


network.
Hubs allow the network to see a group of hosts as a
single unit, so they concentrate connections.
A bridge is a collection of hardware and software What are packets?
When you send information
resources that enables devices on one network to
over a network, like the
communicate with devices on another, similar network.
Internet, the information is
Bridges also perform a check on the data to determine
broken down into smaller
whether it should cross the bridge or not. This makes
pieces, called packets. Each
each part of the network more efficient. packet travels independently
Workgroup switches add even more intelligence to data over the network and may
transfer management. In fact, they can transfer the data take a different path to arrive
only to the connection that needs that data. Another at the intended destination.
difference between a bridge and a switch is that a switch The packets are reassembled
does not convert data transmission formats. when information arrives at its
Routers have all the capabilities – they can regenerate destination.
signals, concentrate multiple connections, convert data
transmission formats and manage data transfers. A
router regulates traffic on the network and takes the
most efficient route for each packet. A packet may pass
through many routers before reaching its intended destination.

C. Decide if the following information


is true or false. If you think it is false
provide the correction.
1. Computers, printers and scanners are
network devices.
2. Host devices provide services to the user.
3. Host devices only exist in networking.
4. NIC and MAC are both codes.
5. A NIC connects host devices to the
network media.
6. A MAC can be called a network adapter.
7. Each NIC carries a MAC address.
8. Repeaters are network devices.
9. Repeaters are not as intelligent as bridges
or routers.
10. Hubs are useful as they concentrate
connections.
11. Bridges and switches are practically the same thing.
12. Routers decide the paths along which to send messages.
13. Routers are the most powerful of all the network devices.
14. We always know which path information will take on a network.
15. Packets travel all together to reach their destinations.

D. Act out a dialogue with your partner.


A. Is the teacher who interviews a student
B. Is the student that answers questions about end-user and network devices .

Then swap roles.

191
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 ,W·VDZLUHGZRUOG

Topologies
1. Reading | Activities
A network topology is a description of the possible physical connections
within a network. The topology is the configuration of the hardware and
shows which pairs of nodes can communicate. Read and do the activities.

A. Find where the following sentences belong.


a. the system is linked to a computer that controls the
traffic on the topology
b. connects all cables to a central point of concentration What is a node?
c. connects one host to the next and the last host to A node is the generic
the first name given to all devices
d. all nodes are connected to a central cable along linked to a network (e.g.,
which data is passed. a computer, terminal or
e. refers to the shape of a network printer). Each one must
have a unique address
Topology assigned to it by the
........................................................................... , or the network.
network’s layout. How different nodes in a network are
connected to each other and how they communicate
are determined by the network’s topology. Topologies
are either physical or logical.

192
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Topologies

Physical topology
It is the actual layout of the wire or media. The physical technologies that are commonly used are the
following:

□ In a bus topology ...................................................................................................


□ A ring topology .............................................................................. . This creates a physical ring of
cable
□ A star topology ......................................................................................................
□ An extended star topology connects individual star topologies together at the centre of the star
there is a hub or a switch. This topology can extend the length and size of the network.
□ A hierarchical topology is similar to an extended star. However, instead of linking the hubs and/or
switches together, ....................................................................... .
□ In a mesh topology devices are connected with many interconnections between network nodes. It
is used to provide as much protection as possible from interruption of service (e.g., in a nuclear power
plant).

B. Which topology is described in the sentences below?


1. This type of network is cheap and reliable – if one terminal is not working correctly, the others are not
affected.
2. As the central machine controls the whole system, the system will be affected if it breaks down.
3. In this network one or more computers is more powerful than the rest. The relationship between the
nodes is called a client-server relationship.
4. If there is a fault in any part of the circle, all the nodes will be affected.

C. Read
Logical topology
It is how the hosts communicate across the medium. The two most common types of logical
topologies are broadcast and token passing.
Broadcast topology simply means that each host sends its data to all other hosts on the network
medium. It is based on the principle ‘first come, first serve’, so there is no order that the stations must
follow to use the network. Ethernet works this way.
Token passing controls network access by passing an electronic token sequentially to each host.
When a host receives the token, the host can send data on the network. If the host has no data to
send, it passes the token to the next host and the process repeats itself. Token Ring and FDDI ( Fibre
Distributed Data Interface) are two examples of networks that use token passing.

D. Indicate if the statements are true or false. If false, provide the right
version orally without looking at the text.
T F
1. A ring topology creates a physical ring of cable.
2. In a star network all nodes are connected to a central point of concentration.
3. In a bus topology all the hosts are linked to a central cable.
4. An extended star topology is linked to a computer that controls the traffic
on the system.
5. A hierarchical topology links hubs and switches together.
6. A mesh topology offers high protections to big plants.
7. Network topology and logical topology are the same.
8. Broadcast topology ensures that data are sent according to a precise order.
9. In token passing the electronic token reaches hosts at random.
10. Both Token Ring and FDDI use token passing.

193
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 ,W·VDZLUHGZRUOG

Introduction
Long distance communications
1. Reading | Match synonyms
Match the highlighted words or expressions with the synonyms listed
below.

Telecommunications
Think of telecommunications as
the world’s biggest machine. Strung
together by complex networks,
telephones, mobile phones and
internet-linked PCs, the global
system touches nearly all of us. It
allows us to speak, share thoughts
and do business with nearly anyone,
regardless of where in the world
they might be. Telecom operating
companies make all this happen.

Not long ago,the telecommunications


industry was comprised of a club of
big national and regional operators.
Over the past decade, the industry
has been swept up in rapid deregulation and innovation. In many
countries around the world, government monopolies are now privatized
and they face a plethora of new competitors. Traditional markets have
been turned upside down, as the growth in mobile services out paces the
fixed line and the internet starts to replace voice as the staple business.
Plain old telephone calls continue to be the industry’s biggest revenue
generator, but thanks to advances in network technology, this is changing.
Telecom is less about voice and increasingly about text and images. High-
speed internet access, which delivers computer-based data applications
such as broadband information services and interactive entertainment,
is rapidly making its way into homes and businesses around the world.

an excess of to tie, fasten


to move or get to cause large
somewhere changes and
confusion
income, gains principal, main
without thinking to force into some
about kind of situation

2. Speaking | Discuss
Exchange opinions about the content of the reading with your partner.

194
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Type of connections - Wire and wireless media

Type of connections - Wire and wireless media


1. Reading | Activities
Check your level of comprehension with the help of the various activities.

Wire Media
The three most common physical links used to create networks are:
□ twisted pair
□ coaxial cable
□ fibre-optic cable

Of the three, the easiest to visualize is the twisted


pair. It consists of two wires twisted together to make
them less susceptible to acting like an antenna and
picking up radio frequency information, such as
radio station signals or appliance electrical noise.
The telephone system uses twisted-pair copper
wires to link telephones.

Coaxial cable also uses two wires. One is


woven of fine strands of copper wire, forming a
tube that is electrically grounded.
The other is a solid copper wire running down
the centre of the tube, and the space between
is filled with a special nonconducting material.
It is widely used in various types of
communications applications, such as linking
computers in office networks.

One of the most successful developments in


transmission media in recent years has been fibre
optics. Fibre-optic cables often consist of hundreds of
clear glass or plastic fibre strands, each approximately
the thickness of a human hair. This cable is more
economical and its other advantages are: speed, size,
weight, security and longevity. Both cable TV and
telephone companies are now using it.

195
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 ,W·VDZLUHGZRUOG

A. Read the text on Wire Media and choose the appropriate definition.

1. Twisted a. The size of sth between opposite


surfaces or sides
2. Picking up b. To receive an electronic signal, sound
or picture
3. Visualize c. One of the threads growing on
people’s heads
4. Copper d. Extra electrical or electronic signals
that are not part of the signal that is
being broadcast or transmitted and
which may damage it.
5. Woven e. (Past participle of weave) to make sth
by crossing threads across, over and
under each other
6. Strands f. Electrically safe
7. Thickness g. A single thin piece of thread, wire, hair,
etc.
8. Hair h. Soft reddish-brown metal used for
making electric wires, pipes and coins
9. Grounded i. To form a picture of sb/sth in your
mind
10. Noise j. Bent or turned so that the original
shape is lost

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 .... 8 .... 9 .... 10 ....

a.
B. When you read Wireless Media on the following page you will see underlined
words. Match them with their Italian corresponding words in the grid below.

Italian English Italian English


punteggiare guadagnare
piovosità trasmittente
telecomando a gran distanza
gruppo area di parcheggio
interferire stabilire

b.
C. After reading Wireless
Media describe the
picture aside.

196
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Type of connections - Wire and wireless media

Wireless media
Another form of equally useful links is
wireless, that is, the connections are made
using electromagnetic energy that goes
through space instead of travelling along
wires or cables.
Three widely used media for wireless
communications are:
t infrared
t radio frequency
t microwave
Infrared communication is commonly used in
TV and VCR remote controls. It sends data as
light rays. In the computing world, keyboards
and mice can use infrared for the link so that
you are not restricted by wires. It has gained
popularity in recent years as a way to set up
wireless links between office PCs.

Radio frequency communication uses radio frequencies of electromagnetic radiation


so that it can function even if the line of sight is interrupted. For example, you park your
car in a huge parking lot and you don’t remember where. You can use your electronic
key to flash the car lights. Cellular phones also use radio frequencies but at a different
wavelengths so that they don’t interfere with car usage. This form of communication
between computers is not commonly
used because of the cost. Also, other
sources of electromagnetic radiation
(e.g., electric drill motors) can interfere
with this type of communication.

Microwave frequencies and satellite


links are quite useful to establish
communication with distant locations.
The obvious advantage is that neither
wires nor cables are needed. In today’s
communication world, microwave towers
and dish antennas dot the landscape.
One of the main disadvantages is that
microwaves can only be used in the
line of sight. So, for example, heavy
rainfall can have deleterious effects on
communication.

The picture shows a cluster of towers with microwave antennae. We cannot see the
towers they communicate with, because they are very far apart.

197
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 ,W·VDZLUHGZRUOG

Communications satellites also use microwaves,


but a satellite has its own receiving and transmitting
antennas and links together two or more Earth stations.
The satellite acts as a relay station between one Earth-
based microwave station and one or many others.

D. Circle the correct answer.

1. The communications medium consisting of


a centre wire inside a cylindrical shield is called
a. twisted-pair wire
b. coaxial cable
c. fibre-optic cable

2. Fibre-optic cable is composed of … of fibres.


a. hundreds
b. thousands
c. millions

3. The cheapest cable is


a. twisted pair
b. coaxial
c. fibre optic

4. Wireless media consist of


a. wires
b. waves
c. wives

5. Which signals can only travel a short distance ?


a. radiowaves
b. microwaves
c. infra-red

6. Which signals are ideal for transmitting over large distances?


a. radiowaves
b. microwaves
c. infra-red

7. Which signals work even if there is a violent storm?


a. radiowaves
b. microwaves
c. infra-red
8. Which signals are used for television remote control?
a. radiowaves
b. microwaves
c. infra-red

Attribute 2 points to each correct answer. If your score is 10 or more, your level
of comprehension of the text is adequate or good.

198
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Properties of transmission

Properties of transmission
1. Approach | Match
Both the wire and wireless links have five basic properties. Match each property with the
appropriate expressions.

Properties Expressions
1. Type of signal a. how fast the data travel
2. Speed of signal b. baseband and broadband
3. Type of data movement on the link c. asynchronous or synchronous transmission
4. Method of transmission d. analog / digital
5. Single-channel vs. multichannel e. one-way, two-way, taking turns, two-way
transmission simultaneously

2. Reading | Answer questions


A modem is a piece of computer hardware. It is
used to communicate between distant computers.
Two modems, one on each computer, are required
to make a connection, and each modem can send
and receive data to and from the other modem. The
word modem stands for modulator - demodulator.
Modulation is changing the digital data from a
computer to analogue data (audio tones or sounds)
to be sent over telephone lines.
Demodulation is changing the analogue data which
is received over the telephone lines to digital data to
be used by the computer.
Modems are classified by the amount of data they can send in a given time, normally
measured in bits per second (bit/s, or bps). They are also classified by their connection
method. Dial-up modems were the usual kind in the 20th century, and DSL modems and
Cable TV modems are now more used.
Modems that connect to the computer by a cable are called external modems. Modems
that go inside the computer are internal modems. Some internal modems are part of the
motherboard; others are inserted into the computer on a PC card.
Many modems are used to connect to the Internet through telephone service or cable
television service. Slow telephone service is called dial-up (maximum 56,000 bits per
second). Faster telephone service is called DSL and is usually more than ten times faster.
Cable modems connect through cable television, and are similarly fast. Most DSL and
cable modems are internal.

Answer the following questions:


1. How does a modem work?
2. How are modems classified?
3. What is the difference between dial-up and DSL modems? Which of the two is faster?
4. Can you explain what a motherboard is?
5. Where are internal modems placed?

199
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 ,W·VDZLUHGZRUOG

Track
3. Listening | Fill in 21
This is an extract from a radio program dealing with computing
themes. Read and try to fill in the blanks. Then listen to check your
answers.
(I= interviewer; E=expert)

I. How many types of data movement can occur


on the link?
send receive
(a) simplex E. The basic types are three. The most basic
is simplex transmission. This is a one-way
transmission of .................. .
send receive I. Can you give us an example of ..................
transmission?
receive send E. Well, an example is the display of flight arrivals
(b) full-duplex and departures on TV ..................found at most
airports. The observer cannot make changes or send
.................. back to the source.
send receive I. I suppose there must also be duplex transmission.
E. You’re right. It means a modem can carry data in
receive send two .................. – both to and from your computer.
(c) half-duplex There is also half-duplex transmission, in which
data can flow one way or the .................. way on the
channel, but not in both directions at the same time. And full-duplex transmission
that allows .................. in both directions at the same time.The most familiar examples
of full-duplex transmission are the telephone and the computer.
I. Now let’s speak about speed. How do you measure the .................. of a modem?
E. In bits per second (bps). A traditional modem, for example, sends data at about
56,000 bits per second.
I. What exactly is DSL?
E. Digital Subscriber Line. More .................. is devoted to data travelling downstream,
that is, from the Internet to your PC.
I. What about data travelling from the PC to the Internet?
E. Certainly there’s a difference, but the reason is that .................. traffic tends to be
limited to a few words at a time, a URL, for example, while .................. traffic carries
graphics, multimedia, shareware program downloads – so downstream data requires
extra capacity.

4. Writing | Choose
Simplex, half-duplex or full-duplex transmission? Indicate which is
appropriate.

1. Which one of the data transmission links can operate in both directions at the
same time?
2. Which one of the data transmission links can only operate in one direction?
3. Local telephone calls use which of the transmission types?
4. Radio receiver/transmitter uses which of the transmission types?

200
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Properties of transmission

5. Speaking | Read & comment


Read the text, then make an oral comment on methods of transmission
with the help of the text, the figure and your knowledge.

Method of transmission
There are two methods of data transmission, asynchronous and synchronous. In
asynchronous transmission, information is sent one byte at a time. As each byte is
sent, it is preceded by a start bit, which alerts the receiving computer that the byte is
being sent.Transmission of a message consisting of several bytes may take some time
because the bytes are not connected together. In the end, the message is reassembled
before it can be read. This type of transmission is cheaper than synchronous and is
commonly used in communication between computers and devices as well as in
Internet interaction.
In synchronous transmission >Instant Messaging >Phone Conferencing
> Chat > Audio/Video >Virtual Classroom
the source and destination Conferencing
operate in timed synchronization
to enable high-speed data Synchronous (real-time) Integrated
Learning
transfer. The message is Environment
Asynchronous (not real-time)
typically a block of characters.
Data transmission between >SMS Messaging >Threaded Discussion >Document Mgt System
> Email > Forums (upload / approval / publish;
computers and hardware that > Bulletin Boards version check-in & out)
facilitates high-speed data
communications is normally
synchronous. Simple Complex
Methods of Online Collaboration

6. Writing | True/False
Decide if the statements are true or false. Then correct the false ones orally.
T F
1. An example of simplex communication is the use of walkie-talkies,
where each person communicating must indicate when they have
finished speaking.
2. With asynchronous transmission signal timing is not required; signals
are sent in an agreed pattern of bits and if both ends are agreed on the
pattern then communication can take place.
3. In full-duplex communication data can travel in both directions but not at
the same time.
4. In asynchronous transmission there are no gaps in transmission; each
bit is sent one after the other.
5. In full-duplex communication data can travel in both directions
simultaneously.
6. Synchronous transmission is faster than asynchronous because fewer
bits have to be transmitted.
7. The simplex communication can only take place in one direction and it
is not possible for the receiver to send data back.
8. In synchronous transmission synchronisation happens when requested.

201
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 ,W·VDZLUHGZRUOG

7. Writing | Fill in
Complete the text that sums up some of the main concepts of the module.The
terms are given in scrambled order. You can just insert the corresponding
number in the text.

1. LANs 2. bps, baud 3. single, multichannel


ves
4. infrared, radio frequency and microwa
full duplex 6. MANs and WANs
5. simplex, half duplex,
7. asynchronous or synchronous
8. twisted pair wires, coaxial cable and fibre-optic cable
9. bus, ring, star and tree 10. analog or digital
The nodes of a network can be linked with either physical connections or wireless
connections. The physical connections consist mainly of ...................... .
The wireless links between the network nodes are made with ...................... . In both the
wire and wireless links there are five basic properties of transmission in common: type
of signal (......................), speed (......................), type of movement (......................),
method of transport (......................), and channel size (......................).These basic
concepts about the links between nodes provide the basis for hooking together
networks into various configurations.

The nodes of a network


can be connected in many
different ways. There are
several unique geometries
that the networks
can use. They have
suggestive names such as
...................... . There are
two major concepts in how
communication takes place
on networks. One concept
is the direct link in which a
definite connection is made from one computer to another, or from point to point.
These networks are categorized by function, from the smaller, such as ......................,
to larger conglomerations often connected to each other through gateways. The larger
collections of networks are called ...................... .

202
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Revise & check

5HYLVH FKHFN
1. MANs, WANs, LANs, SANs or PANs? Insert the right answer.
1. The term ........................ doesn’t imply that the network is small, in fact it can contain
hundreds of computers.
2. A ........................ avoids traffic conflicts between clients and servers.
3. A ..................... is a network that is smaller than a typical WAN but larger than a .................... .
4. The reach of a ........................ is typically a few metres.
5. Usually a ........................ is contained in a single building.
6. A ........................ may connect an office in San Francisco with an office in New York.
7. It is the geographic distance that makes a network a ........................ not the numbers of
computers involved.
8. A ........................ is used for communication among computer devices close to an individual.
9. A ........................ permits high-speed connectivity, for example between servers.
........................ are typically used to connect two or more ........................ .

2. Label as appropriate.

203
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 ,W·VDZLUHGZRUOG

3. Read and match the description with the appropriate type.


WAN | extranet | MAN | LAN | intranet

1. .......................... It is a network which covers a small physical area, for example a building. They allow
users to have common access to data and equipment such as printers, in addition to being able to
communicate with each other using e-mail.
2. .......................... It is a network which covers, for example, a city; may be used in contexts such as
education.
3. .......................... It is a network which covers an even wider area, in which machines are usually
connected via telephone lines or radio. It can be as big as the Internet, the ultimate wide area network,
covering the whole planet.
4. .......................... It is a network which uses the same technology as the Internet. The difference is that
this one is private, and can only be accessed by a particular group of people, who are authorized to
use it. It is often protected from outsiders with a firewall, a system which makes it secure. They are
often used in business and educational contexts. They may cover a geographically small area or may
be available to users over a large territory, and may even be global.
5. .......................... It is a network which lies between an intranet and the Internet. It is like an intranet,
in the sense that it is a private network, but it allows different degrees of access to different groups
or individuals, using passwords. For example, a company may have an intranet which their own
employees can access fully, but which their business partners can only access partially. The parts that
these authorized outsiders can access constitute the ..........................

4. Activity | Label
Revise the types of transmissions and label the pictures with the right type of
transmission.

204
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Test your competence

7HVW\RXUFRPSHWHQFH
1. See how much you have learnt in this module. Choose and attribute 2 points to
every right answer. If your score is equal to or higher than 18 you can be satisfied.

1. It is a private network that allows a. Intranet


different types of access to different b. Extranet
groups or individuals using passwords. c. Internet
2. This topology is quite expensive and not a. ring
very easy to set up but it can cover large b. bus
distances. c. tree
3. This topology is cheap and easy to a. ring
install and is particularly good for small b. bus
networks. c. tree
4. This topology consists of an optical fibre a. bus
or twisted-pair wire to which all the b. ring
nodes are attached. c. star
5. Telecom a. indicates the name of a telephone company
b. refers to communications over a distance
c. mentions the internal system of an enterprise
6. This physical link is quite cheap and has a a. twisted pair
lot of qualities (speed, security, etc) b. coaxial cable
c. fibre-optic cable
7. This physical link is very much used a. twisted pair
for connecting computers in office b. coaxial cable
networks. c. fibre-optic cable
8. This physical link consists of two wires, a. twisted pair
one of which runs down the centre of b. coaxial cable
the tube. c. fibre-optic cable
9. This type of wireless media has become a. infrared
largely popular for keyboards and mice. b. radio frequency
c. microwave
10. The key with which you flash the car a. infrared
lights works with b. radio frequency
c. microwave
11. This form of communication functions a. infrared
even if the line of sight is interrupted. b. radio frequency
c. microwave
12.In this method of transmission a. asymmetrical
information is sent one byte at a time. b. synchronous
c. asynchronous
13.This method of transmission is quite a. asymmetrical
cheap and is used in data entry via b. synchronous
the keyboard to the CPU or the main c. asynchronous
memory.
14.This method of transmission permits a. asymmetrical
high-speed data transfer. b. synchronous
c. asynchronous

205
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 ,W·VDZLUHGZRUOG

2. Match terms with their definitions. There are two terms that have
no matching definitions.

Baud rate Half-duplex Network links Bandwidth


transmission
ISDN Infrared Asynchronous Dial-up line
transmission
Analog signal Full-duplex DSL Synchronous
transmission transmission

Wireless communication used to connect keyboards and


mice.
Connections between computers and other electronic
devices.
Electronic signal that is continuously changing.
Indicates the number of times a signal on a channel changes
per second.
Method of transmission that sends information more quickly
and is more expensive.
Data movement that can go in only one direction at a time,
such as that used by a fax machine.
Digital phone service offering high-speed transmissions over
ordinary phone lines.
Indicates the number of bits per second that can be sent over
a link.
The most common type of telephone connections.
Transmits data in one direction (from the network) faster than
it does in the other direction (to the network).

3. With the help of the initial letter decide which word is more
appropriate in the context.
The human need to communicate – to (1) c………...... with others – has motivated
humanity’s creativity from the most ancient times throughout history.
Today we use visual images and electronic pulses, but the need for one human being
to connect and pass (2) i………...... to another continues on. In fact, technology has
been developed to increase (3) c………...... . There is no doubt that we can today (4)
s………...... more information more quickly than ever before by using computer (5)
n………...... . A few (6) m………...... clicks and people can pay bills with a credit card,
plan and book holiday travel, send messages, participate in discussions or buy anything
from flowers to houses.
With the Internet and the World Wide Web (7) c………...... communication has reached
a new plateau. They are growing rapidly and are at the centre of a (8) c………......
revolution. As more and more (9) l………...... are added, and more and more services
are accessible, we move inexorably closer to the (10) t………...... predicted by John
F. Akers, when he was president of IBM, a time when “everything is connected to
everything”.

206
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

The processing unit

PRGXOH
26,DQG7&3,3PRGHOV

In this module you will learn to:
t FYQMBJO UIF JNQPSUBODF PG CBOEXJEUI JO OFUXPSLJOH
t MJTU UIF BEWBOUBHFT PG B MBZFSFE BQQSPBDI
t FYQMBJO UIF EFWFMPQNFOU PG UIF 0QFO 4ZTUFN
*OUFSDPOOFDUJPO NPEFM 04*

t JEFOUJGZ FBDI PG UIF TFWFO MBZFST PG UIF 04* NPEFM


t JEFOUJGZ UIF GPVS MBZFST PG UIF 5$1*1 NPEFM
t EFTDSJCF UIF TJNJMBSJUJFT BOE EJGGFSFODFT CFUXFFO UIF
UXP NPEFMT
t VOEFSTUBOE UIF QFFSUPQFFS DPNNVOJDBUJPO

Bandwidth
1. Approach | Ask questions
Read the text on bandwidth and do the activity.

" WBSJFUZ PG DPNNVOJDBUJPO DIBOOFMT XJSFE BOE XJSFMFTT DBSSZ EJHJUBM TJHOBMT
CFUXFFO DPNQVUFST BOE PWFS UIF *OUFSOFU &BDI JT SBUFE CZ JUT channel capacity PS
bandwidth XIJDI SFGFST UP UIF BNPVOU PG EJHJUBM JOGPSNBUJPO UIBU DBO CF QVTIFE
UISPVHI UIF DIBOOFM Bandwidth is the number of bits a line can transmit per
second. %PNFTUJD DIBOOFM DBQBDJUJFT WBSZ GSPN   CJUT QFS TFDPOE CQT
PS 
, CQT LJMPCJUT QFS TFDPOE
UP  . CQT NFHBCJUT QFS TFDPOE
 $PNNFSDJBM DIBOOFMT
DBSSZ VQ UP  . CQT
$IBOOFMT XJUI IJHI CBOEXJEUI BSF DBMMFE broadband " DIBOOFM XJUI B MPX CBOEXJEUI
JT DBMMFE narrowband #SPBECBOE BOE OBSSPXCBOE DIBOOFMT BSF TJNJMBS UP IJHIXBZT
BOE DPVOUSZ SPBET SFTQFDUJWFMZ )JHIXBZT MJLF CSPBECBOE DBSSZ NVDI NPSF USBGåD
BVUPNPCJMFT PS CJUT 5IF HFOFSJD UFSN GPS IJHITQFFE *OUFSOFU BDDFTT JT broadband
access.

207
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH


 26,DQG7&3,3PRGHOV
$ZRUOGRI $SSV-DYDDEULJKWVWDU

Write questions appropriate to these answers.


 " WBSJFUZ PG DPNNVOJDBUJPO DIBOOFMT XJSFE BOE XJSFMFTT
 *U SFGFST UP UIF BNPVOU PG EJHJUBM JOGPSNBUJPO UIBU DBO CF QVTIFE UISPVHI
UIF DIBOOFM
 #Z UIF OVNCFS PG CJUT B MJOF DBO USBOTNJU QFS TFDPOE
 5IFZ WBSZ GSPN   CJUT QFS TFDPOE CQT
PS  , CQT LJMPCJUT QFS TFDPOE

UP  . CQT NFHBCJUT QFS TFDPOE

 6Q UP  . CQT
 #SPBECBOE JT SFGFSSFE UP DIBOOFMT XJUI IJHI CBOEXJEUI XIJMF OBSSPXCBOE JT
SFGFSSFE UP DIBOOFMT XJUI MPX CBOEXJEUI

Track
2. Listening | Fill in 22
Professor Graham is explaining the characteristics of bandwidth to his
students. First, read and try to insert the sentences correctly. Then listen
and check your answers.
B B TJHOJåDBOU BNPVOU PG NPOFZ
C HSFBUFS CBOEXJEUI
D CZ CPUI UIF QIZTJDBM QSPQFSUJFT PG UXJTUFEQBJS QIPOF XJSFT
E NBTTJWF BNPVOUT PG JOGPSNBUJPO
F CVZ CBOEXJEUI GSPN B TFSWJDF QSPWJEFS
G USFNFOEPVT JNQBDU PG CBOEXJEUI
H USFNFOEPVT BNPVOUT PG CBOEXJEUI
I CZ UIF MBXT PG QIZTJDT

8IFO ZPV TUVEZ OFUXPSLJOH JU JT FTTFOUJBM UP VOEFSTUBOE UIF DPODFQU PG


CBOEXJEUI GPS GPVS SFBTPOT

What does throughput 5IF åSTU JT UIBU bandwidth is finite UIBU JT SFHBSEMFTT PG UIF NFEJB VTFE UP
mean? CVJME UIF OFUXPSL UIFSF BSF MJNJUT PO UIF DBQBDJUZ PG UIBU OFUXPSL UP DBSSZ
The speed with which JOGPSNBUJPO #BOEXJEUI JT MJNJUFE  BOE CZ UIF UFDIOPMPHJFT
a computer processes VTFE 'PS FYBNQMF UIF CBOEXJEUI PG B DPOWFOUJPOBM NPEFN JT MJNJUFE UP
data. It is a combination of BCPVU  LCQT  BOE CZ NPEFN UFDIOPMPHZ #VU XF IBWF UP
internal processing speed, TBZ UIBU TPNFUJNFT JU JT RVJUF EJGåDVMU UP EFåOF UIFTF MJNJUT +VTU UIJOL UIBU
peripheral speeds (I/O)
%4- VTFT UIF TBNF UXJTUFEQBJS QIPOF XJSFT ZFU JU QSPWJEFT NVDI HSFBUFS
and the efficiency of the
CBOEXJEUI UIBO DPOWFOUJPOBM NPEFNT EP 0QUJDBM åCSF IBT UIF QIZTJDBM
operating system and other
QPUFOUJBM UP QSPWJEF WJSUVBMMZ MJNJUMFTT CBOEXJEUI #VU UIF CBOEXJEUI PG PQUJDBM
system software all working
together.
åCSF DBOOPU CF GVMMZ SFBMJTFE VOUJM UFDIOPMPHJFT BSF EFWFMPQFE UP UBLF GVMM
BEWBOUBHF PG JUT QPUFOUJBM

5IF TFDPOE JT UIBU bandwidth is not free " OFUXPSL NBOBHFS OFFET UP
NBLF UIF SJHIU EFDJTJPOT BCPVU UIF LJOET PG FRVJQNFOU BOE TFSWJDFT UP CVZ
*U JT QPTTJCMF UP CVZ FRVJQNFOU GPS B -"/ UIBU XJMM QSPWJEF OFBSMZ VOMJNJUFE
CBOEXJEUI GPS B MPOH QFSJPE PG UJNF #VU GPS 8"/ DPOOFDUJPOT JU JT BMNPTU
BMXBZT OFDFTTBSZ UP   *O FJUIFS DBTF BO VOEFSTUBOEJOH PG
CBOEXJEUI BOE DIBOHFT JO EFNBOE GPS CBOEXJEUI PWFS B HJWFO UJNF DBO TBWF
BO JOEJWJEVBM PS B CVTJOFTT  

208
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Bandwidth

" UIJSE GBDUPS JT UIBU bandwidth is


a key factor in analysing network
performance, designing new networks
and understanding the Internet.
" OFUXPSLJOH QSPGFTTJPOBM NVTU
VOEFSTUBOE UIF  BOE
UISPVHIQVU PO OFUXPSL QFSGPSNBODF
BOE EFTJHO *OGPSNBUJPO ýPXT BT B TUSJOH
PG CJUT GSPN DPNQVUFS UP DPNQVUFS
UISPVHIPVU UIF XPSME 5IFTF CJUT SFQSFTFOU
 ýPXJOH CBDL BOE GPSUI
BDSPTT UIF HMPCF JO TFDPOET PS MFTT *U DPVME
CF BQQSPQSJBUF UP TBZ UIBU UIF *OUFSOFU JT
CBOEXJEUI

"OE UIF MBTU DPODFQU JT UIBU the demand


for bandwidth is ever increasing.
"T TPPO BT OFX OFUXPSL UFDIOPMPHJFT BOE JOGSBTUSVDUVSFT BSF CVJMU UP QSPWJEF
 OFX BQQMJDBUJPOT BSF DSFBUFE UP UBLF BEWBOUBHF PG UIF HSFBUFS
DBQBDJUZ 5IF EFMJWFSZ PWFS UIF OFUXPSL PG SJDI NFEJB DPOUFOU JODMVEJOH TUSFBNJOH
WJEFP BOE BVEJP SFRVJSFT   *1 UFMFQIPOZ TZTUFNT BSF OPX
DPNNPOMZ JOTUBMMFE JO QMBDF PG USBEJUJPOBM WPJDF TZTUFNT XIJDI GVSUIFS BEET UP UIF
OFFE GPS CBOEXJEUI 5IF TVDDFTTGVM OFUXPSLJOH QSPGFTTJPOBM NVTU BOUJDJQBUF UIF OFFE
GPS JODSFBTFE CBOEXJEUI BOE BDU BDDPSEJOHMZ

3. Writing | True/False
Decide if the following statements are true (T) or false (F). If they are
false, provide the right version orally.
T F
 5IF MJNJUT PG CBOEXJEUI EFQFOE PO UIF NFEJB VTFE UP CVJME UIF OFUXPSL
 0OF PG UIF MJNJUT PG CBOEXJEUI DPNFT GSPN UIF MBXT PG QIZTJDT
 5IF  LCQT PG B DPOWFOUJPOBM NPEFN BSF UIF SFTVMU PG QIZTJDBM
QSPQFSUJFT BOE NPEFN UFDIOPMPHZ
 %4- QSPWJEFT HSFBUFS CBOEXJEUI UIBO B DPOWFOUJPOBM NPEFN BT JU VTFT
PQUJDBM åCSF
 .PEFSO UFDIOPMPHJFT QSPWJEF WJSUVBMMZ MJNJUMFTT CBOEXJEUI GPS PQUJDBM åCSF
 " OFUXPSLJOH QSPGFTTJPOBM DBO DIPPTF BOZ UZQF PG FRVJQNFOU BOE
TFSWJDFT XJUIPVU QSPCMFNT PG NPOFZ
 #BOEXJEUI BOE UISPVHIQVU BSF TZOPOZNT
 *U JT WFSZ JNQPSUBOU GPS B OFUXPSL EFTJHOFS BOE BENJOJTUSBUPS UP DPOTJEFS
UIF GBDUPST UIBU NBZ BGGFDU BDUVBM UISPVHIQVU
 *OGPSNBUJPO ýPXT BDSPTT UIF VOJWFSTF JO UFSNT PG TFDPOET PS MFTT
 5IFSF JT B USFNFOEPVT OFFE GPS CBOEXJEUI
 *U JT JNQPSUBOU GPS UIF OFUXPSLJOH QSPGFTTJPOBM UP SFBMJ[F JO BEWBODF UIF
OFFE GPS JODSFBTFE CBOEXJEUI
#BOEXJEUI JT NFBTVSFE JO CJUT QFS TFDPOE PS UIPVTBOET PG CJUT QFS
TFDPOE LCQT
BOE TP PO VQ UP USJMMJPOT PG CJUT QFS TFDPOE 5CQT


209
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 26,DQG7&3,3PRGHOV

4. Reading | Choose
Read accurately. Then do the activity at the end of the text.

Analog vs. Digital Bandwidth


Radio, television, and telephone
transmissions have, until recently,
been sent through the air and over
wires using electromagnetic waves.
These waves are called analog
because they have the same shape as
the light and sound waves produced
by the transmitters.

Analog bandwidth is measured by


how much of the electromagnetic
spectrum is occupied by each signal.
The basic unit of analog bandwidth
is hertz (Hz), or cycles per second.
Often multiples are used, such as
kilohertz (KHz), megahertz (MHz)
and gigahertz (GHz). These are
the units used to describe the
bandwidths of cordless telephones,
which usually operate at either 900
MHz or 2.4 GHz.

In digital signalling all information is


sent as bits. This type of transmission
gives digital bandwidth an important
advantage over analog. It is true that
analog signals are capable to carry
a variety of information, but they
require a wide frequency range for
transmission that cannot be squeezed
into a smaller band. On the contrary,
unlimited amounts of information
can be sent over the smallest or
lowest bandwidth digital channel.

Underline the right answer without looking at the text.


 &MFDUSPNBHOFUJD XBWFT BSF DBMMFE BOBMPHEJHJUBM
 3BEJP UFMFWJTJPO BOE UFMFQIPOF USBOTNJTTJPOT VTF BOBMPHEJHJUBM CBOEXJEUI
 "OBMPH%JHJUBM CBOEXJEUI JT NFBTVSFE CZ IPX NVDI PG UIF FMFDUSPNBHOFUJD
TQFDUSVN JT PDDVQJFE CZ FBDI TJHOBM
 5IF CBTJD VOJU PG BOBMPHEJHJUBM CBOEXJEUI JT IFSU[
 5IF CBOEXJEUIT PG DPSEMFTT UFMFQIPOFT HFOFSBMMZTPNFUJNFT PQFSBUF BU FJUIFS
 .)[ PS   ()[
 5IF CBTJD VOJU PG BOBMPHEJHJUBM CBOEXJEUI JT CJUT
 "OBMPH%JHJUBM TJHOBMT SFRVJSF B XJEF GSFRVFODZ SBOHF GPS USBOTNJTTJPO
 5IF MPXFTU BOBMPHEJHJUBM DIBOOFM DBO DBSSZ BO JOåOJUF SBOHF PG JOGPSNBUJPO

210
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

5IF 04* BOE UIF 5$1*1 NPEFMT

5IF 04* BOE UIF 5$1*1 NPEFMT


1. Reading | Activities
Before speaking of the OSI or the TCP/IP model it can be useful to introduce
some key concepts like layering or flowing. Read the text and do the activities.

A. Complete the text with the right words listed below.

flow | information | packet | layers | layer | layer | information | data |


communication | layering

Using layers to analyse problems in a flow of materials.


5IF DPODFQU PG layers JT VTFE UP EFTDSJCF  GSPN
POF DPNQVUFS UP BOPUIFS #FMPX ZPV DBO TFF B TFU PG RVFTUJPOT
UIBU BSF SFMBUFE UP flow BOE UIBU TIPX IPX UIF DPODFQU PG MBZFST
IFMQT EFTDSJCF UIF EFUBJMT PG UIF ýPX QSPDFTT XIJDI DPVME CF
BOZ LJOE PG ýPX GSPN UIF ýPX PG USBGåD PO B IJHIXBZ TZTUFN UP
What do we mean by
UIF  PG EBUB UISPVHI B OFUXPSL
flow?
'PS FYBNQMF JO B DPOWFSTBUJPO FBDI QFSTPO CFHJOT CZ DSFBUJOH BO
The motion through a
JEFB 5IFO B EFDJTJPO JT NBEF PO IPX UP QSPQFSMZ DPNNVOJDBUF system of either physical
UIF JEFB " QFSTPO DPVME EFDJEF UP TQFBL TJOH PS TIPVU BOE XIBU or logical objects.
MBOHVBHF UP VTF 'JOBMMZ UIF JEFB JT EFMJWFSFE 5IJT QSPDFTT DBO
CF CSPLFO JOUP MBZFST UIBU NBZ CF BQQMJFE UP BMM DPOWFSTBUJPOT
5IF UPQ MBZFS JT UIF JEFB UIBU XJMM CF DPNNVOJDBUFE 5IF NJEEMF
MBZFS JT UIF EFDJTJPO PO IPX UIF JEFB JT UP CF DPNNVOJDBUFE
5IF CPUUPN  JT UIF DSFBUJPO PG TPVOE UP DBSSZ UIF
DPNNVOJDBUJPO
5IF TBNF NFUIPE PG  FYQMBJOT IPX B DPNQVUFS What is flowing?
OFUXPSL EJTUSJCVUFT JOGPSNBUJPO GSPN B TPVSDF UP B EFTUJOBUJPO
8IFO DPNQVUFST TFOE  UISPVHI B OFUXPSL BMM
DPNNVOJDBUJPOT PSJHJOBUF BU B TPVSDF UIFO USBWFM UP B EFTUJOBUJPO
5IF JOGPSNBUJPO UIBU USBWFMT PO B OFUXPSL JT HFOFSBMMZ SFGFSSFE UP What objects flow?
BT EBUB PS B   "T UIF EBUB QBTTFT CFUXFFO
MBZFST FBDI MBZFS BEET BEEJUJPOBM JOGPSNBUJPO UIBU FOBCMFT FGGFDUJWF
DPNNVOJDBUJPO XJUI UIF DPSSFTQPOEJOH  PO UIF
PUIFS DPNQVUFS
What rules govern flow?
5IF 04* BOE 5$1*1 NPEFMT IBWF MBZFST UIBU FYQMBJO IPX
 JT DPNNVOJDBUFE GSPN POF DPNQVUFS UP
BOPUIFS 5IF NPEFMT EJGGFS JO UIF OVNCFS BOE GVODUJPO PG UIF
  )PXFWFS FBDI NPEFM DBO CF VTFE UP IFMQ
EFTDSJCF BOE QSPWJEF EFUBJMT BCPVU UIF ýPX PG  Where does the flow occur?
GSPN B TPVSDF UP B EFTUJOBUJPO

211
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 26,DQG7&3,3PRGHOV

B. Answer the questions without looking at the text.


 8IBU JT UIF SFMBUJPOTIJQ CFUXFFO MBZFST BOE ýPX
 8IBU EPFT UIF QJDUVSF JMMVTUSBUF
 %P MBZFST BOE ýPX POMZ SFGFS UP UIF XPSME PG DPNQVUFST &YQMBJO
 8IBU UZQF PG QSPCMFNT DBO MBZFSJOH IFMQ UP TPMWF
 8IBU IBQQFOT XIFO JOGPSNBUJPO QBTTFT UISPVHI B OFUXPSL %PFT UIF EBUB
SFNBJO UIF TBNF GSPN UIF CFHJOOJOH UP UIF FOE
 8IBU NPEFMT BSF RVPUFE JO UIF UFYU
 8IBU JT UIFJS GVODUJPO

2. Speaking | Describe
Read the text again, then describe the key
concepts using your own words and knowledge
as much as possible.

- Layers/Flow
- Data or packet
- OSI and TCP/IP models
- TCP/IP

Track
3. Listening | Put in order 23
How are layers used to describe data
communication? While listening, put sentences
in sequential order (1 and 5 have already been
given.You may need to listen twice to perform the
task).

1 *U JT OFDFTTBSZ UIBU BMM UIF OFUXPSL EFWJDFT TQFBL UIF TBNF MBOHVBHF
5IF QSPUPDPM BMTP EFUFSNJOFT UIF GPSNBU BOE UIF USBOTNJTTJPO PG EBUB
5IF QSPUPDPMT GPS FBDI MBZFS PO UIF EFTUJOBUJPO SFUVSO UIF JOGPSNBUJPO
UP JUT PSJHJOBM GPSN TP UIF EBUB DBO CF QSPQFSMZ SFBE
" QSPUPDPM JT B TFSJFT PG SVMFT UIBU NBLF DPNNVOJDBUJPO PO B OFUXPSL
NPSF FGåDJFOU
5 &BDI MBZFS PO UIF TPVSDF DPNQVUFS DPNNVOJDBUFT XJUI UIF TBNF
MBZFS PO UIF EFTUJOBUJPO DPNQVUFS
8IFO UIF QBDLFU SFBDIFT UIF EFTUJOBUJPO DPNQVUFS UIF QSPUPDPMT
VOEP UIF DPOTUSVDUJPO PG UIF PSJHJOBM QBDLFU JO SFWFSTF PSEFS
8IJMF ýZJOH BO BJSQMBOF QJMPUT BSF PCMJHFE UP GPMMPX TQFDJåD SVMFT UP
DPNNVOJDBUF XJUI PUIFS BJSQMBOFT BOE USBGåD DPOUSPM
&BDI MBZFS QFSGPSNT B HJWFO TFU PG PQFSBUJPOT

212
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

5IF 04* BOE UIF 5$1*1 NPEFMT

4. Reading | Activities
Read about the origins of the OSI model. Then do the activities.

How the ISO created the OSI


The early 1980s saw tremendous increases in the number
and size of networks. But the early development of networks
was disorganized in many ways. As companies realized the
advantages of using networking technology,networks were added
or expanded almost as rapidly as new network technologies What is the ISO?
were introduced. An organization, the
International Organization
By the mid-1980s, these companies began to experience for Standardization, that
problems from the rapid expansion. Just as people who do not sets standards in many
speak the same language have difficulty communicating with businesses and technologies,
each other, it was difficult for networks that used different including computing and
specifications and implementations to exchange information. communications.
The same problem occurred with the companies that developed
private or proprietary networking technologies.

Networking technologies strictly following proprietary rules


could not communicate with technologies that followed different
proprietary rules. What does proprietary
mean?
To address the problem of network incompatibility, the Proprietary means that one or
ISO researched networking models like Digital Equipment a small group of companies
Corporation net (DECnet), Systems Network Architecture controls all usage of the
(SNA), and TCP/IP in order to find a generally applicable set technology.
of rules for all networks. Using this research, the ISO created
a network model that helps vendors create networks that are
compatible with other networks.

The Open System Interconnection (OSI)


reference model released in 1984 was the
descriptive network model that the ISO
created. It provided vendors with a set of
standards that ensured greater compatibility
and interoperability among various network
technologies produced by companies around
the world.

The OSI reference model has become the


primary model for network communications.
Although there are other models in existence,
most network vendors relate their products
OSI model
to the OSI reference model. This is especially true when they want to
educate users on the use of their products. It is considered the best tool
available for teaching people about sending and receiving data on a
network.

213
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 26,DQG7&3,3PRGHOV

A. Choose the option that means the same:

1. The early 1980s saw tremendous increases in the number and size of networks
B "VNFOUP OPUFWPMF
C $SFTDJUB ESBNNBUJDB
D $BMP TQBWFOUPTP

2. Networks were added or expanded almost as rapidly as new network technologies


were introduced.
B -F SFUJ FCCFSP VOB DSFTDJUB JOGFSJPSF BMMF OVPWF UFDOPMPHJF
C -F SFUJ FCCFSP VOB DSFTDJUB TVQFSJPSF BMMF OVPWF UFDOPMPHJF
D -F SFUJ FCCFSP VOB DSFTDJUB QBSJ BMMF OVPWF UFDOPMPHJF

3. Just as people who do not speak the same language have difficulty communicating
with each other…
B 1SPQSJP DPNF MF QFSTPOF DIF QBSMBOP MB TUFTTB MJOHVB USPWBOP VHVBMNFOUF EJGåDPMUË
B DPNVOJDBSF USB MPSP
C 1SPQSJP DPNF MF QFSTPOF DIF OPO QBSMBOP MB TUFTTB MJOHVB USPWBOP EJGåDPMUË B
DPNVOJDBSF USB MPSP
D 1SPQSJP DPNF MF QFSTPOF DIF OPO QBSMBOP MB TUFTTB MJOHVB USPWBOP EJGåDPMUË B
DPNVOJDBSF DPO HMJ BMUSJ

4. Networking technologies strictly following proprietary rules could not communicate


with technologies that followed different proprietary rules.
B $FSB EJGåDPMUË EJ DPNVOJDB[JPOF USB UFDOPMPHJF QVCCMJDIF F QSJWBUF
C -F SFUJ QSJWBUF OPO QPUFWBOP BDDFEFSF B DFSUJ UJQJ EJ UFDOPMPHJB
D $IJ TJ BUUFOFWB SJHPSPTBNFOUF BMMF SFHPMF OPO DPNVOJDBWB DPO DIJ TFHVJWB SFHPMF
EJWFSTF

5. Although there are other models in existence, …


B $PNVORVF FTJTUPOP BMUSJ NPEFMMJ
C 4FCCFOF FTJTUBOP BMUSJ NPEFMMJ
D .FOUSF FTJTUPOP BMUSJ NPEFMMJ

B. Write briefly what the networking situation was and what happened in the
years listed.
The early
1980s

The mid-
1980s

1984

C. Now make an oral comment on what you have written.

214
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

5IF 04* BOE UIF 5$1*1 NPEFMT

5. Reading | Choose
After reading about the OSI layers choose the right option in the activity
at the end of the text.

Let’s examine the OSI layers:

Upper Layers
Layers 7 through 4 comprise the upper layers of
the OSI protocol stack. They are more geared to
the type of application than the lower layers, which
are designed to move packets, no matter what they
contain, from one place to another.

Application Layer 7
This top layer defines the language and syntax that
programs use to communicate with other programs.
The application layer represents the purpose of
communicating in the first place. For example, a
program in a client workstation uses commands to
request data from a program in the server. Common
functions at this layer are opening, closing, reading
and writing files, transferring files and e-mail
messages, executing remote jobs and obtaining
directory information about network resources.

Presentation Layer 6
When data are transmitted between different
types of computer systems, the presentation
layer negotiates and manages the way data are
represented and encoded.

Session Layer 5
Provides coordination of the communications in an
orderly manner. In practice, this layer is often not
used or services within this layer are sometimes
incorporated into the transport layer.

Transport Layer 4
This layer is responsible for overall end to end validity and integrity of
the transmission. The lower layers may drop packets, but the transport
layer performs a sequence check on the data and ensures that if a 12MB
file is sent, the full 12MB is received.

Lower Layers
Layers 3 through 1 are responsible for moving packets from the sending
station to the receiving station.

Network Layer 3
The network layer establishes the route between the sender and receiver
across switching points, which are typically routers. The most universal

215
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 26,DQG7&3,3PRGHOV

example of this layer is the IP protocol in TCP/IP. This layer is also the
switching function of the dial-up telephone system. If all stations are
contained within a single network segment, then the routing capability
in this layer is not required.

Data Link Layer 2


The data link is responsible for node to node validity and integrity of the
transmission. The transmitted bits are divided into frames; for example,
an Ethernet, Token Ring or FDDI frame in local area networks (LANs).

Physical Layer 1
The physical layer is responsible for passing bits onto and receiving
them from the connecting medium. This layer has no understanding of
the meaning of the bits, but deals with the electrical and mechanical
characteristics of the signals and signalling methods.

Note One of the many ways to remember the seven layers is the sentence i 1MFBTF
%P /PU 5ISPX 4BVTBHF 1J[[B "XBZ i The beginning letter of each word corresponds
to a layer.

Underline the right answer without looking at the text.


 -BZFST  UISPVHI MBZFST  UISPVHI  BSF SFTQPOTJCMF GPS UIF UZQF PG BQQMJDBUJPO
 $PNNPO GVODUJPOT BU UIF BQQMJDBUJPOQSFTFOUBUJPO MBZFS BSF FODSZQUJPO BOE EBUB
DPOWFSTJPO
 5SBOTGFSSJOH åMFT BOE FNBJM NFTTBHFT JT B UZQJDBM GVODUJPO PG UIF BQQMJDBUJPO
QSFTFOUBUJPO MBZFS
 5IF QSFTFOUBUJPOTFTTJPO MBZFS JT HFBSFE UP NBJOUBJOJOH PSEFS JO UIF DPNNVOJDBUJPOT
 5IF TFSWJDFT PG UIF USBOTQPSUTFTTJPO MBZFS BSF PDDBTJPOBMMZ JODMVEFE JO UIF
TVDDFTTJWF MBZFS
 5IF USBOTQPSUBQQMJDBUJPO MBZFS JT SFTQPOTJCMF GPS UIF EFMJWFSZ PG UIF XIPMF åMF
 5IF USBOTQPSUOFUXPSL MBZFS SPVUFT EBUB UP EJGGFSFOU -"/T BOE 8"/T CBTFE PO
UIF OFUXPSL BEESFTT
 5IF EBUB MJOLOFUXPSL MBZFS USBOTNJUT QBDLFUT GSPN OPEF UP OPEF CBTFE PO UIF
TUBUJPO BEESFTT
 5IF USBOTQPSUQIZTJDBM MBZFS IBT UP EP XJUI FMFDUSJDBM TJHOBMT BOE DBCMJOH
 5IF MBOHVBHF BOE TZOUBY UIBU QSPHSBNT VTF UP DPNNVOJDBUF XJUI PUIFS QSPHSBNT
BSF EFåOFE CZ UIF QIZTJDBMBQQMJDBUJPO MBZFS
 -BZFST  UISPVHI MBZFST  UISPVHI  BSF SFTQPOTJCMF GPS UIF NPWFNFOU PG QBDLFUT
GSPN TUBUJPO UP TUBUJPO

216
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

5IF 04* BOE UIF 5$1*1 NPEFMT

6. Reading | Activities
Read the text, then do the activities on the following page.

Host A Host B
Peer-to-Peer
Data
Application Application Communication
Presentation Data
Presentation In order for data to travel
from the source to the
Data
Session Session destination, each layer
of the OSI model at the
Segments
Transport Transport source must communicate
Packets with its peer layer at the
Network Network destination. This form
Frames of communication is
Data Link Data Link
referred to as peer-to-
Bits peer. During this process,
Physical Physical
the protocols of each
layer exchange information, called protocol data units (PDUs). Each
layer of communication on the source computer communicates with a
layer-specific PDU, and with its peer layer on the destination computer
as illustrated in the picture.
Data packets on a network originate at a source and then
travel to a destination. Each layer depends on the service
function of the OSI layer below it. To provide this service,
the lower layer uses encapsulation to put the PDU from the
upper layer into its data field. Then it adds what the layer
needs to perform its function. What is encapsulation?
Next, as the data moves down through the layers of the OSI Encapsulation wraps data
model, additional headers and trailers are added.After Layers with the necessary protocol
7, 6, and 5 have added their information, Layer 4 adds more information before network
information. This grouping of data, the Layer 4 PDU, is called transit. Therefore, as the data
a segment. packet moves down through
The network layer provides a service to the transport layer, the layers of the OSI model,
and the transport layer presents data to the internetwork it receives all necessary
subsystem. The network layer has the task of moving the information.
data through the internetwork. It accomplishes this task by
encapsulating the data and attaching a header creating a
packet (the Layer 3 PDU). The header contains information
required to complete the transfer, such as source and
destination logical addresses.
The data link layer provides a service to the network layer. It What is internetwork?
encapsulates the network layer information in a frame (the An interconnected system of
Layer 2 PDU). The frame header contains information (for networks, especially computer
example, physical addresses) required to complete the data networks.
link functions. The data link layer provides a service to the
network layer by encapsulating the network layer information
in a frame. The physical layer also provides a service to the
data link layer.The physical layer encodes the data link frame
into a pattern of 1s and 0s (bits) for transmission on the
medium (usually a wire) at Layer 1.

217
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 26,DQG7&3,3PRGHOV

A. Answer questions
 8IBU JT UIF NFBOJOH PG QFFSUPQFFS DPNNVOJDBUJPO
 8IBU EPFT UIF BDSPOZN 1%6 TUBOE GPS 8IBU JT JU FYBDUMZ
 )PX EPFT DPNNVOJDBUJPO CFUXFFO TPVSDF MBZFST BOE EFTUJOBUJPO MBZFST UBLF
QMBDF
 )PX EPFT FODBQTVMBUJPO PDDVS
 8IBU JT B TFHNFOU -BZFS 
BOE IPX JT JU PCUBJOFE
 8IBU JT UIF GVODUJPO PG UIF OFUXPSL MBZFS
 $BO ZPV FYQMBJO UIF NFBOJOH PG JOUFSOFUXPSL
 )PX EPFT UIF OFUXPSL MBZFS DBSSZ PVU JUT UBTL
 8IBU EPFT UIF EBUB MJOL MBZFS EP GPS UIF OFUXPSL MBZFS
 8IBU BCPVU UIF QIZTJDBM MBZFS
B
B. Find the missing words, then describe the model orally.

OSI Model
DATA LAYER

Data Application
________Process to Application

Data Presentation
Host Layers

Data__________and Encryption

Session
Interhost_____________

Transport
End-to-End_________and Reliability

Network
Packets Path_____and IP (Logical Addressing)
Media Layers

Data Link
Mac and LLC (__________addressing)

Physical
_______Signal and Binary______

218
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

5IF 04* BOE UIF 5$1*1 NPEFMT

7. Speaking | A dialogue
Act out a dialogue with your partner with the support of the picture below.

A JT B TUVEFOU UIBU JT TUVEZJOH UIF 04* NPEFM BOE OFFET FYQMBOBUJPOT


B JT B TUVEFOU UIBU IBT BMSFBEZ BDRVJSFE HPPE LOPXMFEHF PO UIF NPEFM

Remember to include the peer-to-peer communication in the dialogue.


Then swap roles.

The 7 layers of OSI

PDU (Protocol Data Unit)


/units of data passed between layers)
Header Data

TRANSMIT RECEIVE

Term for a Term for a


unit of data DATA USER DATA unit of data
at this layer (sometimes called “Layer 8” at this layer

Data 7 Application layer 7 Data

Data 6 Presentation layer 6 Data

Data 5 Session layer 5 Data

Segment 4 Transport layer 4 Segment

Packet, Datagram 3 Network layer 3 Packet, Datagram

Frame, Cell 2 Data link layer 2 Frame, Cell

Frame, Bit 1 Physical layer 1 Frame, Bit

Phisical Link, or Medium - sometimes called “Layer 0” - data unit is a “bit”

219
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 26,DQG7&3,3PRGHOV

Track
8. Listening | Insert 24
This is a dialogue about the TCP/IP Model. Below you will find some questions and
answers that have been extracted from the text. While listening insert them in the right
place of the dialogue.
(A= answer, Q= question)
B 5P EJWJEF 5$1 TFHNFOUT JOUP QBDLFUT BOE TFOE UIFN GSPN BOZ OFUXPSL 5IF QBDLFUT BSSJWF BU UIF
EFTUJOBUJPO OFUXPSL JOEFQFOEFOU PG UIF QBUI UIFZ UPPL UP HFU UIFSF 5IF TQFDJåD QSPUPDPM UIBU
HPWFSOT UIJT MBZFS JT DBMMFE UIF *OUFSOFU 1SPUPDPM *1
 #FTU QBUI EFUFSNJOBUJPO BOE QBDLFU TXJUDIJOH
PDDVS BU UIJT MBZFS
C /P UIFZ EP OPU DPSSFTQPOE FYBDUMZ CVU UIFZ IBWF TPNF DPNNPO OBNFT 'PS FYBNQMF
BQQMJDBUJPO BOE USBOTQPSU
D )PX XBT 5$1*1 EFWFMPQFE
E 8IBU JT UIF GVODUJPO PG UIF OFUXPSL BDDFTT MBZFS
F 8IZ
G 5IF 64 %FQBSUNFOU PG %FGFOTF %P%

H 8IBU BCPVU UIF USBOTQPSU MBZFS


I 5IF 5$1*1 NPEFM IBT GPVS MBZFST

Q. Who created the TCP/IP reference model?


A. ……………...............................................................................................................................................
Q. ……………..............................................................................................................................................
A. #FDBVTF JU XBOUFE UP EFTJHO B OFUXPSL UIBU DPVME TVSWJWF BOZ DPOEJUJPOT JODMVEJOH B OVDMFBS XBS *O B
XPSME DPOOFDUFE CZ EJGGFSFOU UZQFT PG DPNNVOJDBUJPO NFEJB TVDI BT DPQQFS XJSFT NJDSPXBWFT PQUJDBM
åCFST BOE TBUFMMJUF MJOLT UIF %P% XBOUFE USBOTNJTTJPO PG QBDLFUT FWFSZ UJNF BOE VOEFS BOZ DPOEJUJPOT
5IJT WFSZ EJGåDVMU EFTJHO QSPCMFN CSPVHIU BCPVU UIF DSFBUJPO PG UIF 5$1*1 NPEFM
Q. ……………..............................................................................................................................................
A. 6OMJLF UIF QSPQSJFUBSZ OFUXPSLJOH UFDIOPMPHJFT NFOUJPOFE FBSMJFS 5$1*1 XBT EFWFMPQFE BT BO PQFO
TUBOEBSE 5IJT NFBOU UIBU BOZPOF XBT GSFF UP VTF 5$1*1 5IJT IFMQFE TQFFE VQ UIF EFWFMPQNFOU PG 5$1
*1 BT B TUBOEBSE
Q. How many layers does the TCP/IP model have?
A. …………….................................................................................................................
Q. Do the layers of the TCP/IP and OSI models correspond? "11-*$"5*0/
A. …………….................................................................................................................
Q. What is the function of application in TCP/IP?
A. 5IF EFTJHOFST PG 5$1*1 DSFBUFE BO BQQMJDBUJPO MBZFS UIBU IBOEMFT JTTVFT PG
SFQSFTFOUBUJPO FODPEJOH BOE EJBMPH DPOUSPM 53"/41035
Q. ……………................................................................................................................
A. *U EFBMT XJUI UIF RVBMJUZ PG TFSWJDF JTTVFT PG SFMJBCJMJUZ ýPX DPOUSPM BOE FSSPS */5&3/&5
DPSSFDUJPO 0OF PG JUT QSPUPDPMT UIF USBOTNJTTJPO DPOUSPM QSPUPDPM 5$1
QSPWJEFT
FYDFMMFOU BOE ýFYJCMF XBZT UP DSFBUF SFMJBCMF XFMMýPXJOH MPXFSSPS OFUXPSL
/&5803,
DPNNVOJDBUJPOT
"$$&44
Q. What is the purpose of the Internet layer?
A. …………….................................................................................................................
Q. What is the relationship between TCP and IP?
A. *UT BO JNQPSUBOU SFMBUJPOTIJQ :PV DBO TBZ UIBU *1 QPJOUT UIF XBZ GPS UIF QBDLFUT XIJMF 5$1 QSPWJEFT B
SFMJBCMF USBOTQPSU
Q. ……………..............................................................................................................................................
A. 5IF OBNF PG UIJT MBZFS JT WFSZ CSPBE BOE TPNFXIBU DPOGVTJOH *U JT BMTP LOPXO BT UIF IPTUUPOFUXPSL
MBZFS 5IJT MBZFS JT DPODFSOFE XJUI BMM PG UIF DPNQPOFOUT CPUI QIZTJDBM BOE MPHJDBM UIBU BSF SFRVJSFE UP
NBLF B QIZTJDBM MJOL *U JODMVEFT UIF OFUXPSLJOH UFDIOPMPHZ EFUBJMT JODMVEJOH BMM UIF EFUBJMT JO UIF 04*
QIZTJDBM BOE EBUB MJOL MBZFST

220
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

5IF 04* BOE UIF 5$1*1 NPEFMT

9. Reading | Activity
A comparison of the OSI model and the TCP/IP model will point out some
similarities and differences.
$PNQMFUF UIF UFYU XJUI UIF IFMQ PG UIF åHVSF

OSI Model TCP/IP Model

Application

Presentation Application

Session

Transport Transport

Network Internet

Data Link
Network
Access
Physical

Similarities include:
□ #PUI IBWF MBZFST
□ #PUI IBWF BQQMJDBUJPO  UIPVHI UIFZ JODMVEF WFSZ EJGGFSFOU TFSWJDFT
□ #PUI IBWF DPNQBSBCMF  BOE OFUXPSL MBZFST
□ #PUI NPEFMT OFFE UP CF LOPXO CZ  QSPGFTTJPOBMT
□ #PUI BTTVNF  BSF TXJUDIFE 5IJT NFBOT UIBU JOEJWJEVBM QBDLFUT NBZ
UBLF EJGGFSFOU QBUIT UP SFBDI UIF TBNF EFTUJOBUJPO 5IJT JT DPOUSBTUFE XJUI DJSDVJU
TXJUDIFE OFUXPSLT XIFSF BMM UIF QBDLFUT UBLF UIF TBNF QBUI

Differences include:
□ 5$1*1 DPNCJOFT UIF QSFTFOUBUJPO BOE  MBZFS JTTVFT JOUP JUT
BQQMJDBUJPO MBZFS
□ 5$1*1 DPNCJOFT UIF 04* EBUB MJOL BOE  MBZFST JOUP UIF OFUXPSL
BDDFTT MBZFS
□ 5$1*1 BQQFBST TJNQMFS CFDBVTF JU IBT  MBZFST
□ 5$1*1 QSPUPDPMT BSF UIF TUBOEBSET BSPVOE XIJDI UIF *OUFSOFU EFWFMPQFE TP UIF
5$1*1 NPEFM HBJOT DSFEJCJMJUZ KVTU CFDBVTF PG JUT   *O DPOUSBTU
OFUXPSLT BSF OPU VTVBMMZ CVJMU PO UIF 04*  FWFO UIPVHI UIF 04*
NPEFM JT VTFE BT B HVJEF

10. Mini | Project


Prepare an oral report on the differences between the OSI model and the
TCP/IP model. Use a Power Point presentation or design a poster.

221
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 26,DQG7&3,3PRGHOV

5HYLVH FKHFN
1. Decide if statements ate true or false and correct the false ones.
T F
 5IF DBQBDJUZ PG DPNNVOJDBUJPO DIBOOFMT JT DBMMFE CBOEXJEUI
 #BOEXJEUI JT UIF OVNCFS PG CZUFT QFS TFDPOE
 $PNNFSDJBM DIBOOFMT IBWF NPSF DBQBDJUZ UIBO EPNFTUJD DIBOOFMT
 $PNNFSDJBM DIBOOFMT DBO DBSSZ MFTT UIBO  . CQT
 #SPBECBOE DBO CF UIPVHIU BT TJNJMBS UP B NBKPS SPBE
 /BSSPXCBOE JT B XBZ PG DPOOFDUJOH B DPNQVUFS UP UIF *OUFSOFU

2. What do these acronyms stand for?


t *40 
t 04* 
t %&$OFU 
t 4/" 
t 5$1*1 

3. Complete the text with the verbs below.


breaks | allows | illustrates | divides | provides | standardizes |
explains | prevents |

The OSI Model


5IF 04* SFGFSFODF NPEFM JT B GSBNFXPSL UIBU JT VTFE UP VOEFSTUBOE IPX JOGPSNBUJPO
USBWFMT UISPVHIPVU B OFUXPSL 5IF 04* SFGFSFODF NPEFM  IPX QBDLFUT
USBWFM UISPVHI UIF WBSJPVT MBZFST UP BOPUIFS EFWJDF PO B OFUXPSL FWFO JG UIF TFOEFS
BOE EFTUJOBUJPO IBWF EJGGFSFOU UZQFT PG OFUXPSL NFEJB
*O UIF 04* SFGFSFODF NPEFM UIFSF BSF seven numbered layers FBDI PG XIJDI
 B QBSUJDVMBS OFUXPSL GVODUJPO
%JWJEJOH UIF OFUXPSL JOUP TFWFO MBZFST  UIF GPMMPXJOH BEWBOUBHFT

t It  OFUXPSL DPNNVOJDBUJPO JOUP TNBMMFS NPSF NBOBHFBCMF QBSUT


t It  OFUXPSL DPNQPOFOUT UP BMMPX NVMUJQMF WFOEPS EFWFMPQNFOU
BOE TVQQPSU
t It  EJGGFSFOU UZQFT PG OFUXPSL IBSEXBSF BOE TPGUXBSF UP
DPNNVOJDBUF XJUI FBDI PUIFS
t It  DIBOHFT JO POF MBZFS GSPN BGGFDUJOH PUIFS MBZFST
t It  OFUXPSL DPNNVOJDBUJPO JOUP TNBMMFS QBSUT UP NBLF MFBSOJOH
FBTJFS UP VOEFSTUBOE

222
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

3FWJTF  DIFDL

4. With the help of the picture and what Application layer


you have studied in this module insert the Sending
parts that have been extracted from the Application
text in order to form complete sentences.

Data (record, message, etc.)


B BEET TPVSDF BOE EFTUJOBUJPO EBUB JO JUT IFBEFS
C SFBET BOE QSPDFTTFT UIF IFBEFST BOE EJTDBSET Transport layer
UIFN
4 3 2 1
D XIJDI CSFBLT JU VQ JOUP UIF QBDLFUT SFRVJSFE CZ
UIF OFUXPSL Data broker into packets
E TUPSFT UIF TFRVFODF OVNCFS BOE PUIFS EBUB JO TCP or 2
JUT IFBEFS UDP
F BEET TUBUJPO EBUB JO JUT IFBEFS Network layer
IP TCP or 2
6TJOH 5$1*1 BT B NPEFM UIF TFOEJOH BQQMJDBUJPO UDP
IBOET EBUB UP UIF USBOTQPSU MBZFS (1) Data Link layer
*U (2) 5IF OFUXPSL MBZFS (3) BOE UIF EBUB MJOL MBZFS Ethernet IP TCP or 2
UDP
(4) 0O UIF PUIFS TJEF UIF DPSSFTQPOEJOH MBZFS (5)
Physical layer
1  3 4  LAN
Data Link layer
/PX XSJUF UIF DPNQMFUF UFYU TCP or
Ethernet IP 2
UDP
Network layer
IP TCP or 2
UDP
Transport layer
Packets TCP or 2
reassembled UDP
into original structure
2 1

Data (record, message, etc.)

Receving
Application
Application layer

What is UDP?
(User Datagram Protocol) A protocol within the TCP/IP protocol suite that is used in place of TCP when a reliable delivery
is not required. There is less processing of UDP packets than there is for TCP. UDP is widely used for streaming audio and
video, voice over IP (VoIP) and videoconferencing, because there is no time to retransmit erroneous or dropped packets.

223
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 26,DQG7&3,3PRGHOV

5. Circle the right answer.


 04* NFBOT B 0QFO 4ZTUFN *OUFSDPOOFDUJWJUZ
C 0QFO 4ZTUFN *OUFSDPOOFDUJOH
D 0QFO 4ZTUFN *OUFSDPOOFDUJPO
 5IJT MBZFS EFåOFT UIF UZQF PG B BQQMJDBUJPO
DPNNVOJDBUJPO &NBJM FUD
 C QSFTFOUBUJPO
D USBOTQPSU
 5IJT MBZFS XPSLT UP USBOTGPSN EBUB JOUP B BQQMJDBUJPO
UIF GPSN UIBU UIF BQQMJDBUJPO MBZFS DBO C QSFTFOUBUJPO
BDDFQU D TFTTJPO
 5IJT MBZFS GPSNBUT BOE FODSZQUT EBUB UP B BQQMJDBUJPO
CF TFOU BDSPTT B OFUXPSL C QSFTFOUBUJPO
D USBOTQPSU
 "U UIJT MFWFM DPNNVOJDBUJPO QBSUOFST B BQQMJDBUJPO
BSF JEFOUJåFE BT XFMM BT RVBMJUZ PG C QSFTFOUBUJPO
TFSWJDF D TFTTJPO
 5IJT MBZFS FTUBCMJTIFT NBOBHFT BOE B QSFTFOUBUJPO
UFSNJOBUFT DPOOFDUJPOT CFUXFFO C TFTTJPO
BQQMJDBUJPOT D USBOTQPSU
 5IJT MBZFS QSPWJEFT USBOTQBSFOU USBOTGFS B TFTTJPO
PG EBUB CFUXFFO FOE TZTUFNT C USBOTQPSU
D OFUXPSL
 5IJT MBZFS TFUT VQ DPPSEJOBUFT BOE B TFTTJPO
UFSNJOBUFT DPOWFSTBUJPOT FYDIBOHFT C USBOTQPSU
BOE EJBMPHVFT CFUXFFO UIF BQQMJDBUJPOT D OFUXPSL
BU FBDI FOE
 5IJT MBZFS QSPWJEFT TXJUDIJOH BOE B TFTTJPO
SPVUJOH UFDIOPMPHJFT DSFBUJOH MPHJDBM C USBOTQPSU
QBUIT GPS USBOTNJUUJOH EBUB GSPN OPEF UP D OFUXPSL
OPEF
 5IJT MBZFS DPOWFZT UIF CJU TUSFBN B OFUXPSL
UISPVHI UIF OFUXPSL BU UIF FMFDUSJDBM BOE C EBUB MJOL
NFDIBOJDBM MFWFM D QIZTJDBM
 5IJT MBZFS QSPWJEFT UIF IBSEXBSF NFBOT B OFUXPSL
PG TFOEJOH BOE SFDFJWJOH EBUB PO B C EBUB MJOL
DBSSJFS D QIZTJDBM
5IJT MBZFS IBT UIF GVODUJPO PG B OFUXPSL
BEESFTTJOH JOUFSOFUXPSLJOH FSSPS C EBUB MJOL
IBOEMJOH DPOHFTUJPO DPOUSPM BOE QBDLFU D QIZTJDBM
TFRVFODJOH
"U UIJT MBZFS EBUB QBDLFUT BSF FODPEFE B OFUXPSL
BOE EFDPEFE JOUP CJUT C EBUB MJOL
D QIZTJDBM
5IJT MBZFS GVSOJTIFT USBOTNJTTJPO B OFUXPSL
QSPUPDPM LOPXMFEHF BOE NBOBHFNFOU C EBUB MJOL
BOE IBOEMFT FSSPST JO UIF OFYU MBZFS D QIZTJDBM
ýPX DPOUSPM BOE GSBNF TZODISPOJ[BUJPO

224
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

5FTU ZPVS DPNQFUFODF

7HVW\RXUFRPSHWHQFH
1. Which OSI layer corresponds to the definition? Label as appropriate.
5IF QVSQPTF PG UIJT MBZFS JT UP QSPWJEF USBOTQBSFOU USBOTGFS PG
EBUB CFUXFFO FOE VTFST *U DPOUSPMT UIF SFMJBCJMJUZ PG B HJWFO
MJOL *U DBO LFFQ USBDL PG UIF QBDLFUT BOE SFUSBOTNJU UIPTF UIBU
GBJM 5IF CFTU LOPXO FYBNQMF PG UIJT MBZFS QSPUPDPM JT 5$1

5IJT MBZFS SFMJFWFT UIF "QQMJDBUJPO MBZFS PG DPODFSO SFHBSEJOH


TZOUBDUJDBM EJGGFSFODFT JO EBUB SFQSFTFOUBUJPO XJUIJO UIF
FOEVTFS TZTUFNT .*.& FODPEJOH FODSZQUJPO BOE TJNJMBS
NBOJQVMBUJPO PG UIF QSFTFOUBUJPO PG EBUB JT EPOF BU UIJT MBZFS

5IJT MBZFS EFåOFT BMM FMFDUSJDBM BOE QIZTJDBM TQFDJåDBUJPOT GPS


EFWJDFT 5IJT JODMVEFT UIF MBZPVU PG QJOT WPMUBHFT BOE DBCMF
TQFDJåDBUJPOT )VCT BOE SFQFBUFST BSF EFWJDFT UZQJDBM PG UIJT
MBZFS

5IJT MBZFS QSPWJEFT UIF GVODUJPOBM BOE QSPDFEVSBM NFBOT PG


USBOTGFSSJOH WBSJBCMF MFOHUI EBUB TFRVFODFT GSPN B TPVSDF
UP B EFTUJOBUJPO WJB POF PS NPSF OFUXPSLT XIJMF NBJOUBJOJOH
UIF RVBMJUZ PG TFSWJDF SFRVFTUFE CZ UIF BCPWF MBZFS 5IJT
MBZFS QFSGPSNT OFUXPSL SPVUJOH ýPX DPOUSPM TFHNFOUBUJPO
EFTFHNFOUBUJPO BOE FSSPS DPOUSPM GVODUJPOT 5IF SPVUFS
PQFSBUFT BU UIJT MBZFS  TFOEJOH EBUB UISPVHIPVU UIF FYUFOEFE
OFUXPSL BOE NBLJOH UIF *OUFSOFU QPTTJCMF

5IJT MBZFS JOUFSGBDFT EJSFDUMZ UP BOE QFSGPSNT DPNNPO


TFSWJDFT QSPWJEJOH TFNBOUJD DPOWFSTJPO CFUXFFO BTTPDJBUFE
QSPDFTTFT &YBNQMFT PG DPNNPO TFSWJDFT JODMVEF UIF WJSUVBM
UFSNJOBM GPS FYBNQMF 5FMOFU


5IJT MBZFS QSPWJEFT UIF NFDIBOJTN GPS NBOBHJOH UIF EJBMPHVF


CFUXFFO FOEVTFS BQQMJDBUJPO QSPDFTTFT *U QSPWJEFT GPS
FJUIFS EVQMFY PS IBMGEVQMFY PQFSBUJPO BOE FTUBCMJTIFT DIFDL
QPJOUJOH BEKPVSONFOU UFSNJOBUJPO BOE SFTUBSU QSPDFEVSFT
5IJT MBZFS JT SFTQPOTJCMF GPS TFUUJOH VQ BOE UFBSJOH EPXO 5$1
*1 TFTTJPOT

5IJT MBZFS QSPWJEFT UIF GVODUJPOBM BOE QSPDFEVSBM NFBOT UP


USBOTGFS EBUB CFUXFFO OFUXPSL FOUJUJFT BOE UP EFUFDU BOE
QPTTJCMZ DPSSFDU FSSPST UIBU NBZ PDDVS JO UIF MBZFS CFMPX
5IF BEESFTTJOH TDIFNF JT QIZTJDBM XIJDI NFBOT UIBU UIF
BEESFTTFT BSF IBSEDPEFE JOUP UIF OFUXPSL DBSET BU UIF UJNF
PG NBOVGBDUVSF 5IF BEESFTTJOH TDIFNF JT ýBU /PUF 5IF CFTU
LOPXO FYBNQMF PG UIJT JT &UIFSOFU

225
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 26,DQG7&3,3PRGHOV

2. See if you master the concepts and the language relating to


protocols. Complete the text with the appropriate words.

5IF Open Systems  Reference Model OSI Model or OSI Reference
Model GPS TIPSU
JT B MBZFSFE BCTUSBDU EFTDSJQUJPO GPS DPNNVOJDBUJPOT BOE DPNQVUFS
OFUXPSL QSPUPDPM EFTJHO *U JT BMTP DBMMFE UIF OSI  layer model
5IF 04* NPEFM EJWJEFT UIF GVODUJPOT PG B QSPUPDPM JOUP B TFSJFT PG   &BDI
MBZFS IBT UIF QSPQFSUZ UIBU JU POMZ VTFT UIF  PG UIF MBZFS CFMPX BOE POMZ
FYQPSUT GVODUJPOBMJUZ UP UIF MBZFS   5ZQJDBMMZ POMZ UIF MPXFS MBZFST BSF
JNQMFNFOUFE JO  XJUI UIF IJHIFS MBZFST CFJOH JNQMFNFOUFE JO TPGUXBSF
5IF DPNQVUJOH BOE OFUXPSLJOH  SPVHIMZ GPMMPX UIF 04* NPEFM *UT NBJO
GFBUVSF JT JO UIF KVODUJPO CFUXFFO MBZFST XIJDI EJDUBUFT UIF TQFDJåDBUJPOT PO IPX POF
MBZFS JOUFSBDUT XJUI   5IJT NFBOT UIBU B  XSJUUFO CZ POF
NBOVGBDUVSFS DBO PQFSBUF XJUI B MBZFS GSPN BOPUIFS BTTVNJOH UIBU UIF TQFDJåDBUJPO
JT JOUFSQSFUFE DPSSFDUMZ
5IFTF TQFDJåDBUJPOT BSF *40  JO UIF 04*
DPNNVOJUZ
&BDI MBZFS QFSGPSNT  GPS UIF OFYU IJHIFS MBZFS BOE NBLFT SFRVFTUT PG UIF
OFYU MPXFS MBZFS "O JNQMFNFOUBUJPO PG TFWFSBM  MBZFST JT PGUFO SFGFSSFE
UP BT B stack BT JO 5$1*1 TUBDL

5IF 04* SFGFSFODF NPEFM JT B IJFSBSDIJDBM TUSVDUVSF PG TFWFO MBZFST UIBU EFåOFT UIF
SFRVJSFNFOUT GPS DPNNVOJDBUJPOT CFUXFFO UXP   5IF NPEFM XBT
EFåOFE CZ UIF   *U XBT DPODFJWFE UP BMMPX JOUFSPQFSBCJMJUZ BDSPTT UIF
WBSJPVT QMBUGPSNT PGGFSFE CZ WFOEPST 5IF NPEFM BMMPXT BMM  FMFNFOUT
UP PQFSBUF UPHFUIFS SFHBSEMFTT PG XIP CVJMU UIFN #Z UIF MBUF T *40 XBT
SFDPNNFOEJOH UIF JNQMFNFOUBUJPO PG UIF 04* NPEFM BT B OFUXPSLJOH 
VOGPSUVOBUFMZ  IBE CFFO JO VTF GPS ZFBST 5$1*1 XBT GVOEBNFOUBM UP
"31"/&5 BOE UIF PUIFS  UIBU FWPMWFE JOUP UIF *OUFSOFU 0OMZ B TVCTFU PG
UIF XIPMF 04* NPEFM JT VTFE UPEBZ *U JT XJEFMZ CFMJFWFE UIBU NVDI PG UIF TQFDJåDBUJPO
JT UPP DPNQMJDBUFE BOE JUT GVMM GVODUJPOBMJUZ IBT UBLFO UPP MPOH UP JNQMFNFOU BMUIPVHI
UIFSF BSF NBOZ QFPQMF UIBU TUSPOHMZ TVQQPSU UIF 04* NPEFM 

3. A friend of yours asks you for help with bandwidth. Write an email
(10-12 lines) to him/her to explain bandwidth in a clear, concise way.

226
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

The processing unit

PRGXOH
*UDSKLFV

In this module you will learn to:
t understand how graphic techniques can
help users
t illustrate Visual Media
t explain: Shading, Morphing, Digital Mapping
t talk about some important graphic “standards”
t describe basic aspects of CAD/CAM

Graphics technique
1. Approach | Fill in What does graphics
Fill in the blanks with the following words given in scrambled mean?
order. The word “graphics” means:
G.U.I. | icons | menus | windows | menus | pull-down | pictures designs, drawings or pictures
that are used especially in
WIMP stands for (1) ……......……… , (2) ……......……… , (3) ……...……… the production of books,
and pointing devices. The term describes the features of a graphical magazines, etc., while
user interface (4) ……......……… which make it easier for the user to get “computer graphics” means
things done. text and graphics that are
GUI stands for graphical user interface; it gives a way for the user prepared separately and then
to communicate with the computer through (5) ……......……… , also combined.(Oxford Dictionary).
called icons and through
(6) ……......……….............

(7) ……......………..............

“Windows” is an example
of a GUI; it provides a
common way of using
programs, which makes
them easier to learn.

227
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH


 *UDSKLFV
$ZRUOGRI $SSV-DYDDEULJKWVWDU

2. Reading | Answer questions


Read the passage about graphics software and then answer the questions
below.

Graphics software
Graphics software enables the creation, manipulation, and management
of computer-based images. It helps you create line drawings, company
logos, maps, clip art, blueprints, flowcharts, or just about any image you
can visualize. You can even touch up red eyes in photographs.

Graphics images can be maintained as bit-mapped graphics, vector


graphics, or in a metafile format.

In bit-mapped graphics (or raster graphics), the image is composed


of patterns of dots called pixels that are black or white. The pixels can
each be shades of gray or colored for photographic-looking image. Bit-
mapped graphics are created by graphics paint software, digital cameras,
fax machines, and scanners, and when you capture an image on a screen.
Images are stored according to a file format that specifies how the
information is organized in the file; a few of the many commonly used
graphics formats are:
- JPEG, or, JPG. It is commonly used on Web pages and in digital
photography.
- BMP. It is a common format used in the Microsoft Windows
environment.
- GIF. It is a patented format used in Web pages and for downloadable
online images.
- TIFF or TIF. It is the industry standard for high-resolution bit-mapped
images used in print publishing.
- PCX. It was introduced for PC Paintbrush (distributed with Windows)
but is supported by many graphics packages and by scanners and
faxes.

In vector graphics, the image is composed of patterns of lines, points,


curves and other geometric shapes (vectors). Formulas are used to
indicate what to draw and the term “object graphics” is sometimes used.
The vector graphics display, in contrast to the bit-mapped graphics
display, permits the user to work with objects, such as a drawing of a
Ferrari.
A metafile is a collection of commands that can be used by the “graphic
device interface”(GDI) in Windows to re-create the image. Metafiles
are resolution-independent; that is, they aren’t locked into a specific
array of pixels, as a bitmap is. This lets metafiles take advantage of all
the resolution your display or printer can provide, and it lets you resize
images without distorting them.(A metafile is often called an object-
oriented graphic because it is stored as a series of distinct objects-lines,
rectangles, arcs, rather than as a map of pixels).
A popular metafile format, WMF, is used for exchanging graphics
between Windows applications.

228
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Graphics technique

Answer questions:
1. What is graphics software?
2. What is the image composed of in bit-
mapped graphics?
3. How are images stored?
4. What is the image composed of in
vector graphics?
5. What is the most important difference
between the vector graphics display
and the bit-mapped graphics display?
6. What is “metafile”?
7. What does it mean that metafiles are
resolution-independent?
8. Why is a metafile often called “object-
oriented graphic”?

Paint: a paint program

3. Activity | Choose
Circle the right translation:

1. blueprints: a. progetti 5. shapes: a. ombre


b. stampe azzurre b. forme
c. stampe fotografiche c. figure
2. flowchart: a. regolazione di 6. to resize: a. mettere insieme
flusso b. riformare
b. diagramma di flusso c. ridisporre
c. breccia di flusso
3. to touch up a. aggiungere 7. without a. senza distoglierle
b. sfiorare distorting b. senza alterarle
c. ritoccare them c. senza individuarle
4. shades: a. ombre
b. sfumature
c. veli

4. Speaking | Oral report


Prepare an oral report (about two/three minutes) on graphics software
following these guidelines:
- functions of graphics software;
- how graphics images can be maintained (explain details);
- definition of a file format.

229
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 *UDSKLFV

Visual media: manipulating images


Track
1. Listening | Fill in 25
While listening to Mr.Gordon,a computer specialist,speaking about processing
existing digital images, fill in the blanks with words given in scrambled order.

pictures | earth | tools | news | goal | techniques | miles |


camera | computer | satellite

Processing existing digital images


Modifying or processing images that already exist is less difficult than creating
images when starting with a blank display screen. The process can be very creative
and complex, but the proper (1)............................ make manipulating images relatively
easy. There are three types of (2)............................ you can use to manipulate images:
a) minor processing techniques; b) enhancement; c) restoration.
A lot of examples of digitized images are available, but none are more commonly seen
than the (3)............................ weather maps appearing on television (4)............................
broadcasts; they are the result of many minor processing techniques that can be
best explained by example.
A close look at the weather maps used in most TV weather reports reveals outlines
of the continental United States and coastline. When the satellite was digitizing the
image from several (5)............................ above Earth, these outlines weren’t there but
they became part of the weather picture because they are the result of a computer
program. By knowing the location of the satellite and the direction it is pointing, the
(6)............................ program calculates where the continental boundaries lie. The

outlines are then made by changing the tiny areas of the picture associated with
these boundaries to a contrasting color.
Another series of satellites called the Landsat satellites is continuously circling Earth.
They have sent back to (7)............................ millions of pictures since the program first
began. These pictures are not typical. They consist of up to seven different pictures
of the same area taken at different frequencies, including infrared. It is like having
a special (8)............................ with different filters, each of which lets only a certain
Restoration
of licence frequency range through.
plate image. Image enhancement technique is a type of digital image processing whose
(9)............................ is to highlight or enhance

particular aspects of an image or even change the


structure of the image itself. This is referred to
as false-coloring, or pseudocoloring which is an
enhancement technique that consists of changing
the colors of an image, or assigns certain colors
to the various aspects of an image.
Image restoration technique is the process of
eliminating known but unwanted image flaws or
degradations. Imagine obtaining clear (10)............
................ where only a blur formerly existed, or
being able to see something where previously no
image existed.

230
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Visual media: manipulating images

2. Activity | Translation
Go through the passage processing existing digital images and tick the right
translation for each word.
1. blank a. bianco b. nero c. vuoto
2. proper a. giusti b. propri c. poveri
3. close a. attento b. chiuso c. vicino
4. boundaries a. confini b. bandiere c. territori
5. tiny a. leggero b. piccolo c. minuto
6. goal a. rete b. obiettivo c. calcio
7. flaws a. errori b. difetti c. luci
8. blur a. sporcizia b. sbaglio c. macchia indistinta

3. Activity | Put in order


Put in order the letters and write the correct words.

1. measgi ..........................................................................................................................................
2. enecsr.............................................................................................................................................
3. pmsa .............................................................................................................................................
4. rimon ............................................................................................................................................
5. okol ...............................................................................................................................................
6. usrtel ...........................................................................................................................................
7. aesar ............................................................................................................................................
8. ridnafer ........................................................................................................................................
9. lsitfre ...........................................................................................................................................
10. agrne ...........................................................................................................................................

4. Speaking | Answer questions


Answer the following questions on processing existing digital images.
1. Is modifying images that already exist less difficult than creating new ones?
Why? Why not?
2. What are the three techniques used in manipulating images?
3. Explain: “minor processing technique”.
4. What is the aim of “image enhancement technique”?
5. What is “image restoration technique”?

5. Activity | True/False
Place either T or F on the line provided with each of the following statements. If a
statement is false, you should be able to explain what changes would make it true.
T F
1. Digitized pictures only have black and white pixels.
2. Outlines depicted in maps (satellite images) are placed there by computer
programs.
3. Satellites locate boundaries of countries by locating beacons on the ground.
4. False-coloring means to change the colours of an image.

231
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 *UDSKLFV

6. Writing | Write questions and answers


Read the text about creating images and write
questions with the prompts given below. Add the
necessary language and then answer your questions.

Creating images
Creating images can be done by using drawing programs,
such as Adobe Illustrator, that exist for almost every type
of computer. These programs have many drawing-related
features that help the user create images.
There is usually a set of tools for drawing circles, ellipses, rectangles, squares, and curves through several
points. Other tools usually available allow the artist to draw freehand, fill in with colors or patterns, outline
objects, and perform other techniques.
Although flat, two-dimensional line drawings are quite useful, three-dimensional line pictures drawn in
two dimensions involve more complex concepts that are quite familiar to art students. These concepts
include curved surfaces, color, texture, and shading. The first two are probably familiar to you, but texture
and shading may not be.
The texture of a surface can be explain by example. The surface that looks like wood has a much different
appearance than one that looks like fur. So, we can say that texture is a property of a surface. It is
observed and identified by humans through the reflection of the light off the surface. A shiny surface
reflects light, for example, in a way that sometimes has a mirror like quality. Rough surfaces, on the other
hand, reveal an unevenness.
Shading is a little more difficult. It is used to make the image more realistic. Shading is a technique used
to give the appearance of illumination by some combination of light sources. It is used to make created
images look like images humans are used to seeing or to take advantage of these effects. Artists have
worked with shading techniques to produce an endless variety of effects. Proper shading, for example,
can make a scene look as if it is in direct sunlight or like a cloudy day.
There are a lot of graphics programs to the professional illustrator; with these powerful programs, images
of very high quality can be created. To display these images on a computer, knowledge of how computers
represent visual images is necessary. The object or vector graphic representation has many advantages
over the bitmapped or raster graphics form, especially when manipulating 3D images and making changes.

Write questions and then answer :


1. What / the function / be / of drawing / programs? /
Solution: .................................................................................
2. The artist / can / draw / freehand? /
Solution: ................................................................................
3. What / three-dimensional / line pictures drawn / involve /
two dimensions? /
Solution: .................................................................................
4. What / mean / be / “texture”? /
Solution: .................................................................................
5. How / people / observe and identify / texture? /
Solution: .................................................................................
6. What / shading / be? /
Solution: .................................................................................
7. What / the professional illustrator / can / create / with /
powerful programs? /
Solution: .................................................................................

232
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Visual media: manipulating images

7. Reading | Answer questions and Summarize


Read the text about photo illustration software: morphing and answer the
questions below then summarize the text orally.

Photo illustration software: morphing


Photo illustration software lets you create original images as well as
dress up existing digitized images, such as photographs, scanned images,
and electronic paintings. Images can be retouched with special effects
to alter the way they appear. Photo illustration software is to an image
as word processing software is to text. Photo illustration software allows
you to do about anything imaginable to digitized photos.
The result of a photo illustrator’s effort is a composite image with stunning
special effects. You can show, for example, the changes that take place as
one image is modified to become an entirely different image.This process
is called morphing, a term derived from the word “metamorphosis”.
Morphing is a special graphics technique used in animation. Starting
with a beginning image, the technique will distort and change it frame by
frame to the predetermined final image with a predetermined number
of frames in between.
Morphing is currently being used in advertising with great effect.
The morphing technique is available to personal computer users
in a program called “Morph” from Gryphon Software Corporation.
The sample shown in figure is a morph from the face of Michelangelo’s
statue “David” to a second image of his Madonna from “The Pietà”. It
then continues with Leonardo da Vinci’s “The Virgin of the Rocks”, and
then to the final form of “ Mona Lisa” also by Leonardo da Vinci.
An interesting application of what photo illustration software can do
is the electronic aging of missing children. Artists combine a child’s
snapshot with a database of measurements showing how human facial
dimensions change in a fairly predictable way over time. Such retouched
snapshots have helped find hundreds of children since the mid-1980s.

Answer questions.
1. What does photo illustration software
allow you?
2. What is morphing?
3. Are you able to give an example of
morphing? (Use your own words).
4. Where is morphing being used with great
effect?
5. What is the “electronic aging” of missing
children?

A morph of image from


David to Mona Lisa

233
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 *UDSKLFV

8. Reading | Answer questions


Read the text about special effects (iPhoneography) and then answer the
questions below.

What about special effects? (iPhoneography)


Have you ever dreamt of becoming a great
artist, without picking up a paintbrush? Well,
now it is possible because there are special
apps for iOs.
Today smartphones have not only changed
the way we communicate with each other,
but they have made all of us potential
photographers.
It is quite likely that we are not using the
built-in camera to its full potential but luckily,
now Mr. Richard Gray, a photographer, runs a
course in iPhoneography at the Kensington
and Chelsea College in London.
The course is of five weeks for a total of 15
hours of lessons with a cost of about £ 115
and is open to everyone. Students need to bring their iPhone and allow an extra £20 to
buy a variety of apps such Snapseed and Filterstorm that are used to manipulate images
and obtain special effects. Richard Gray doesn’t claim that the course will turn you into a
professional photographer, but he believes that it can teach some useful skills which will
enable you to make the best of your Apple gadget and enjoy it.
More than half of the population owns a smartphone and social network platforms such
as Facebook and Twitter are driving not only the use of camera phones but are also giving
smartphone photography a social value. In fact, if you take a good photo, edit it and create
a stunning image, you can publish it quickly and immediately get recognition for what
you have done. The market is promoting iPhoneography by creating accessories such as
Fisheye and wide angle lenses.
For most mobile photographers, taking the photo is just the start of a much bigger creative
process. Thanks to the ever-growing number of editing apps, the possibilities are endless.
For example with “Glaze” it is simple;
use your smartphone to take a landscape
photo, open the photo with Glaze (that
is free at the moment) and choose 36
painting styles that will transform your
snap into a masterpiece, or failing that,
an image that you can share with your
friends on Facebook, Twitter or via
email.
So camera phones are replacing digital
cameras and are adding something
extra; if you see something interesting
while you are walking from your school
to the tube, you can take the photo, but you can also start editing it, start being creative with
the processing while you are on the tube and then, when the tube comes above ground you
have already published it.

234
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Visual media: manipulating images

Answer questions:
1. Why have smartphones changed the way we communicate?
2. Is the iPhone used only to communicate each other?
3. Are you able to use the built-in camera to its full potential?
4. What is “iPhoneography”?
5. What does Mr. Richard Gray teach? Where does he teach?
6. What’s Mr. Richard Gray’s goal?
7. Why is it said that smartphone photography has a social value?
8. Who are mobile photographers?
9. What are editing apps?
10. What can you do after taking a photo?

9. Activity | Suitable translation


Give a suitable translation for the following words by guessing their
meaning from the previous text.

1. To pick up 11. To turn into


2. Paint brush 12.Skills
3. Each other 13.Stunning
4. Potential 14.Recognition
5. Field 15.Ever-growing
6. Build-in 16.Endless
7. Luckily 17. Landscape
8. To run 18.Snap
9. To need 19.Tube
10. He doesn’t claim 20.Ground

10. Writing | Put in order


Put in order the following sentences. Add the necessary language.
1. special apps / because / there / possible / it /
Solution: ......................................................................................................................
2. impact / iPhone / a large / is / photography / the field /
Solution: .....................................................................................................................
3. a total / the course / 15 hours / five weeks / is of /
Solution: ......................................................................................................................
4. to manipulate / a lot / images / used / apps /
Solution: ......................................................................................................................
5. social value / social network platforms / smartphone / giving / photography /
Solution: ......................................................................................................................
6. and / adding / are / something extra / camera phones / digital cameras /
Solution: ......................................................................................................................

235
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 *UDSKLFV

11. Reading | True/False


Read the text about digital mapping and say if the sentences are true or
false. Correct the false ones.

Digital Mapping
The digital revolution has created a lot of problems for many business.
The consequences for the music industry have been dramatic, the future
of newspapers and magazines is uncertain, but on the other hand, some
sectors have benefited, for example in the field of mapping.
The history of map-making or cartography, dates back thousands of years:
Babylonian, Greek, Roman, Chinese cultures made some of the earliest
maps which were centred on religions, rulers, empires; their accuracy
was approximate until the 18th century when in Britain, modern-day
mapping developed as a consequence of the fear of invasion following
the French Revolution. In that period time, Britain was mapped in detail,
but now there is a new, modern revolution underway, that is to say, digital
mapping.
Today anyone can use online maps to check for detailed address or to
build information by location such as: schools, local services, risk of
flooding, chemical hazards, supermarkets etc. It is very easy to locate
yourself; GPS, online maps, travel maps help us find people and places.
The combination of apps and maps is a very recent innovation; now we
can pinpoint everything. With modern mobile phones, GPS-enabled
phones, we know where everybody is, where phones and people are,
where places are.
Accuracy is very important and the Ordnance Survey (OS), which is
the UK mapping agency, produces maps using a combination of aerial
photography, 100 base stations across the country and a team of more
than 300 surveyors who update information all the time. Surveyors record
the changes in roads and buildings with the use of satellite technology,
laptops, and special lasers to get accurate measurement of distances.

T F
1. Digital revolution has created problems in every field of our life.
2. Cartography is the art or process of drawing or making maps.
3. Modern-day mapping developed in Britain in the 18th century.
4. Britain wasn’t in fear of being invaded.
5. In the 18th century Britain was mapped approximately.
6. Digital revolution is over.
7. Nowadays, it’s easy to locate people and things.
8. People take digital mapping technology for granted.
9. OS is the UK mapping agency.
10. OS surveyors update information constantly.

12. Speaking | Oral report


After reading the text again, prepare an oral report on digital mapping
explaining its definition, its “origin”, its function and its importance.
236
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Special software

Special software
1. Reading | Complete and discuss
Read the passage about DTP software and complete the table below. Then
on the basis of your completed table, discuss the importance of DTP with
your partner.

DTP
DTP (the acronym for Desktop Publishing) is a
specialized computer software that allows users to
combine text and pictures to produce high quality
documents, posters, brochures without having to go
to a typesetter so that you can save time and money.
You can use different fonts to add interest while
diagrams can be added with the text that flows
around them.

Photos can be scanned in and you can adjust their


size in order to give them a particular position on a
page.

To work with DTP packages you need a computer


with the largest amount of RAM and the highest
capacity hard disk that can be afforded; to avoid
eyestrain, you should have a large monitor (for
example: a 17, 19 or 21 inch screen). To output DTP
documents you need either an ink-jet printer or a
colour laser printer. You will need to use a scanner
to import photos and a video digitizer to capture
video images.

Today there is a variety of software available on the market; you can buy not only a
wordprocessing package which contains simple features, but a DTP software as integrated
wordprocessing and graphics, with additional features to enable pages to be placed in
columns and pictures to be inserted.

Many DTP packages use a frame-based system of layout which means that text and
graphics are placed in boxes called frames; these frames can be moved and repositioned
around the pages.

Equipment needed Reason


Computer with

High quality, fast printout

237
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 *UDSKLFV

2. Reading | Match
Read the following texts about basic techniques used in DTP. Match each
text with the correct title.

Title
“Placing text” “Placing graphics”
“Drawing lines and boxes” “Sizing and cropping graphics”
“Page set up” “Typing text”

1. ...........................................................................................
The first step in preparing a DTP document is often to
Landscape format specify the size of the pages and whether they are to be in
portrait or landscape format.
The second step in setting up the page is to decide on the
number of columns.
The column guides make the text word-wrap to the columns automatically with
“snaking”, once one column is filled, the text automatically flows to the top of the
next column.

2. ................................................................................................
Most DTP packages allow you to type text directly into them; Potrait format
you may find it easier to use a wordprocessor to do your typing
and then import the files into the DTP package.

3. ..................................................................................................................................
When you import text you can decide in which of the columns the text should be
placed.

4. ..................................................................................................................................
When you import graphics you need to decide on the graphics you will be using and
their position on the page. You can place a blank area around a graphic so that the text
cannot flow too close to the drawing or photograph.

5. ..................................................................................................................................
Cropping means selecting part of an image and discarding the rest. In a photograph
of a group of people scanned in with a scanner, you might want to include only one
of the people. You could crop the picture and leave the required part. This part could
then be resized to fit the space available.

6. ..................................................................................................................................
You can make your text stand out more by placing it in a box. It is possible to choose
different designs for the box and to have, for instance, shading around the box.

238
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Special software

3. Activity | Match
Match the following words with their Italian equivalents.

1. Potrait a. Struttura
2. Landscape b. Serpeggiare
3. Format c. Scorrere
4. ...word-wrap d. Vicino
5. Snaking e. Quadro, paesaggio
6. Blank f. Portare
7. Flow g. Ritagliare la parte più
importante
8. Close h. Sfumatura, ombra
9. To Crop i. Eliminare
10. To discard j. Adattarsi, adeguarsi
11. To fit k. Ritratto
12.Shading l. Spazio vuoto

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 .... 8 .... 9 .... 10 .... 11 .... 12 ....

4. Activity | True/False
Read the previous texts again. Tick the appropriate box and correct the
false statements.
T F
1. When you prepare a DTP document, the first thing you have to do
is to decide on the number of columns.
2. DTP packages allow you to type text directly into them.
3. You cannot import text.
4. You can place a blank area around a graphic.
5. Cropping means removing part of a picture by cutting off and
discarding the part that is not needed.
6. It isn’t possible to have shading around the box.

239
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 *UDSKLFV

5. Reading | Complete
Is the work displayed attractively? Read the passage about presentation
software and complete the gaps choosing the right alternative.

Presentation software
Pictures are able to communicate (1)......................... and concepts to (2)......................... much
better than the written or spoken word alone. Presentations are used to sell (3)................... ,
services, or just ideas to someone else.
Many studies confirm that people who use “presentation software” to create presentations
are (4)........................... as being better prepared and more professional than those who do not.
(5).........................use of this software can help you persuade people to adopt a particular point
of (6)......................... ; along with descriptive text, a good (7)......................... presentation will
include some of the following:
“photo images”, “charts and
graphs”, “original drawings”, a
variety of eye-catching “clip art”,
“audio clips”, and “full-motion
video” captured with a digital
camera. Typically, presentation
software is used in conjunction
with an LCD (8).........................
that projects images onto a
screen for all to see.
Presentation software lets you
create (9)......................... stylized
images for group presentations
of any kind; you can create self-
running slide shows for PC-
based information displays at Powerpoint tri-pane view
trade shows, for class lectures,
and any other situation that requires the presentation of organized, visual information.
The software, for example, PowerPoint gives you a lot of tools to help you create a variety
of charts, graphs, and images for presentation; you can use many special effects, for
example, the current graph or image can be made to fade out (dissolve to a blank screen)
while the text is fading in. An applause sound can be played when a particular image is
(10)......................... PowerPoint offers a lot of transitions and sounds, each of which adds an
aura of professionalism while helping to hold the audience’s attention.

1. a. Ideas b. Words c. Images


2. a. A lot of people b. An audience c. A crowd
3. a. Things b. Materials c. Products
4. a. Perceived b. Viewed c. Noticed
5. a. Functional b. Sensible c. Sensitive
6. a. Sight b. Position c. View
7. a. Slide b. Film c. DVD
8. a. Camera b. Projector c. Screen
9. a. Very high b. Widely c. Highly
10. a. Screen b. Displayed c. Demonstrated

240
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Special software

6. Activity | Suitable translation


Give a suitable translation for the following words by guessing their
meaning from context.

1. Audience .................................................................................................................
2. To perceive ..............................................................................................................
3. Sensible ...................................................................................................................
4. Point of view ............................................................................................................
5. Slide ........................................................................................................................
6. Highly ......................................................................................................................
7. Is displayed ..............................................................................................................
8. Charts and graphs ....................................................................................................
9. Eye-catching clipart ..................................................................................................
10. In conjunction with ..................................................................................................
11. Trade ........................................................................................................................
12.Lecture ....................................................................................................................

7. Activity | Speaking
Using the previous text, the figures and your knowledge, explain:

- how “presentation” used to be done


- how “presentation” is usually done

Remember: Presentation software is being used more and more to give talks
and display ideas. You need to know what is suitable for and what the main
features are.

241
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 *UDSKLFV

8. Reading | Complete
Read the text about CAD. After reading complete the list on the
advantages of using CAD.

Glossary CAD
CAD (Computer Aided Design);
It is used by engineers, architects, etc. to
use of graphics software in design,
produce technical drawings drawn to scale.
drafting and documentation in
For example, diagrams produced by these
product and manufacturing process.
packages include plans of houses, maps,
circuit diagrams, engineering drawings and
three – dimensional plans of kitchens.
It is no longer necessary to use drawing
boards for planning, for example, new stores
and re-designing existing ones. Instead CAD
What is CAM? What does it mean?
is used and this has reduced the time taken to
That’s the short form of: Computer Aided
plan new stores. A data-bank holds designs
Manufacturing; it’s the use of computers to control
and plans from many stores and these may
the manufacturing process in CNC (Computer
be adapted for new stores. With the use of
– numerically controlled) machines and other
CAD software modifications can be made at
automated machine tools such as industrial robots.
the press of a button (you can delete, insert,
copy and move things easily).
Architects can produce a plan view of our
store and then immediately view it in three
What is CAE?
dimensions and even rotate it to see what it
CAE (Computer aided engineering). Engineers,
looks like from different angles. The most
using computer-aided methods, employ CAE that
popular CAD package is AutoCAD which is
is software for designing, analyzing, testing and
quite expensive.
modelling parts and components.

Complete the Advantages of using CAD.


1. It saves a lot of ……….....….................................. .
2. It produces accurate............................................... .
3. You can easily manipulate ..................... on the
diagrams of kitchens, gardens, .................... etc.
4. You can produce drawings in................. , which is
especially useful ……….……......... .
5. .................... can be saved …………….......... disk
and retrieved at a later date.
6. …………. can easily be scaled up and ............... .

9. Writing | Answer questions


Answer the following questions:
1. Who uses CAD?
2. Why is CAD used?
3. What is the main advantage of using CAD?
4. How can CAD software modifications be made?
5. Can a plan view of a house be produced in 3Ds?
6. Can a plan view of a house rotate? Give your opinion.

242
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Revise & check

5HYLVH FKHFN
1. Put in order the following sentences.
1. a / paint / graphics / mean / package / simple / packages / can /
Solution: ....................................................................................................................................................
2. variety / can / of / you / shadings / produce / a /
Solution: ...................................................................................................................................................
3. is scanned / drawn / being / into / professional artwork / hand / some / graphics / package / after /
Solution: ....................................................................................................................................................
4. a photograph / graphics packages / can / directly / scan / the / you / using some / into / computer /
Solution: ....................................................................................................................................................
5. pictures / is / from / possible / camera / to capture / a video / it /
Solution: ....................................................................................................................................................
6. are / need / popular / digital cameras / a film / you don’t / very / because /
Solution: ....................................................................................................................................................

2. Match the first half of a sentence in column A with a second half in column B. Be
careful, because one item in column B is not necessary.

A B
1. The result of a photo illustrator’s effort. a. Allows you to do about anything imaginable to
digitized photos.
2. Morphing. b. A special graphics technique used in animation.
3. Photo illustration software. c. Will distort and change the image frame by
frame to the predetermined final image with a
predetermined number of frames in between.
4. The technique. d. Is the electronic aging of missing children.
5. A very important application of what photo e. Is a term derived from the word
illustration software can do. “metamorphosis”.
6. Morphing is. f. Is a composite image with stunning special
effects.
g. From the face of Michelangelo’s statue “David”.

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... ....


not necessary

3. Guided project. Produce a school magazine.


You and your school-mates are producing a school magazine. This month you plan to advertise your
Industrial School and for this reason you decide to use a desktop-publishing package. Compare all possible
alternative methods used to obtain pictures for inclusion in the magazine.

243
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 *UDSKLFV

4. Read the text about DTP again and then match the first half of a sentence in
column A with a second half in column B. Be careful, because two in column B are not
necessary.
A B
1. You need. a. To add interest.
2. In order to have. b. A mouse.
3. People can produce. c. Eyestrain you should use a large monitor.
4. You will need to use. d. To add movement.
5. Diagrams can be added. e. A computer with high specification.
6. Several DTP packages use. f. High quality you should use a colour laser
printer.
7. Different fonts cn be used. g. A frame-based system of layout.
8. In order to avoid. h. High quality documents with the aid of DTP
software.
i. With the text flowing around them.
j. A video digitiser to capture video images.

Solution 1 .... 2 .... 3 .... 4 .... 5 .... 6 .... 7 .... 8 .... .... ....
not necessary

5. Match each definition (1-5) with the correct feature (a-e).


a. CAM | b. CAD | c. Data-bank | d. Autocad | e. CNC |

1. It uses the computer for designing a wide variety of things, from electronic
circuits to car bodies and skyscrapers.
2. It uses the computer to assist in the manufacturing of components or
products.
3. It is a way of controlling a machine or process by using commands that are coded in
to a numerical format.
4. It is very popular but it isn’t cheap.
5. It keeps a lot of designs and plans which may be re-adapted.

6. Prepare an oral report (about two minutes) on computer aided methods following
these guidelines:
a. definition of CAD d. advantages of CAD
b. who uses it e. how modifications can be made
c. why it is used

7. Look through a selection of clip art for any connected with transport, using a drawing,
painting or graphics package. The clip art should be grouped into the following:
a. Road: car, bicycles, vans, lorries and motorbikes
b. Rail: locomotives and carriages
c. Air: balloons, gliders, spacecraft, jets and helicopters
d. Water: pleasure craft, ferries, tankers, yachts and freight ships

Produce an attractive display of clip art images under each of the above headings. A small piece of text
should be added (about each one).

244
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Test your competence

7HVW\RXUFRPSHWHQFH
1. Read the passage about graphics packages and then choose the
best alternative for the statements below.

Graphics packages
For most of us, graphics packages can mean a
simple paint package where you can draw line
diagrams and produce a variety of shadings.
You can also produce text in a variety of fonts
and typefaces.
Producing diagrams is difficult using a mouse
so some professional artwork is hand drawn
and then scanned into a graphics package.
Some graphics packages allow you to scan a
photograph directly into the computer so that
you can manipulate it in some way.
Using special equipment and software it is possible to capture pictures from a A digital
television screen or from a video camera.The extra equipment needed to do this video camera
is called a video grabber. Digital cameras are very popular because you don’t records video
in a format you
need a film and there are no developing costs.You can capture the photographs can save on a
from the camera and then manipulate the images on the computer screen. computer.

1. Graphics packages allow you


a. To draw only line diagrams.
b. To produce a variety of shadings.
c. To draw line diagrams, to produce a variety of shadings and texts.

2. Some professional artwork is


a. Hand drawn.
b. Scanned into a graphics package.
c. First, hand drawn, second, scanned into a graphics package.

3. It is possible to capture pictures from a television screen if


a. You use a video camera.
b. You use special software.
c. You use special software and equipment.

4. Digital cameras are very popular because


a. There aren’t any developing costs.
b. There aren’t any developing costs and don’t need a film.
c. They don’t need a film.
5. You capture the photographs from the camera
a. And manipulate the images on the computer screen.
b. And manipulate the images inside the camera.
c. After manipulating images on the computer screen.

2. Prepare an oral report on the importance of application of what


photo illustration software (morphing) can do about the electronic
aging of missing children.

245
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 *UDSKLFV

3. In pairs act out a dialogue between an Information Technology


teacher and a student of his. Use the diagram below to illustrate two/
three documents you can produce using DTP. Add your opinions and
experiences. You may start like this:

Student: How can people produce high quality documents?


I.T. Teacher: ..................................................................................................................................

Forms Manuals Newsletters Magazines

Desktop
publishing
Reports Brochures Advertisements Posters

4. Project | Problem-solving.
Read the information below and then create
a website.

(Everyone knows cosplayers often dress up as video


game characters; they often wear wigs in conjunction
with their outfits in order to further improve the
resemblance to the character; this is especially
necessary for anime and manga characters who often
have unnaturally coloured and uniquely styled hair).
Imagine you are a website designer. Mr. White, the
owner of a newly created company (start-up), sells
wigs and outfits for cosplayers; he wants you to
create a website to advertise his goods and provide
information to his possible customers.
You must first find out what detailed information you
want to provide on the website and the target audience you are designing for. The first
page should be simple and tell the reader who the website owner is.
The webpages have to be created using HTML, the individual pages have to be linked
together using hyperlinks and each page might contain a combination of text, graphics,
animation and other multimedia elements.
Navigation icons may be displayed on each webpage to make it easier for users to move
to different parts of the website
and every page must have a link to
let users move to another page.

Remember:
a. pages should be short so that
the user does not have to do a
lot of scrolling;
b. pages should look nice and
interesting;
c. the website should be kept up
to date.

246
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

The processing unit

PRGXOH
)LQGLQJWKHULJKW
 FDUHHU SDWK

In this module you will learn to:


t PVUMJOF *5 JO PVS MJWFT ZFTUFSEBZ UPEBZ
BOE UPNPSSPX
t VOEFSTUBOE UIF DPODFQU PG %JHJUBM $POWFSHFODF
t FYBNJOF *$5 JO DPNNFSDF BOE BU XPSL
t BOBMZTF DBSFFS PQQPSUVOJUJFT GPS *5 TQFDJBMJTUT
t TFBSDI GPS SFTPVSDFT PO UIF *OUFSOFU
t VOEFSTUBOE UIF EJGGFSFODF CFUXFFO B DVSSJDVMVN
WJUBF BOE B SÏTVNÏ
t XSJUF ZPVS PXO $7 VTJOH &VSPQBTT $7

A world without
computers.
The industrial
society
evolved in a
world without
computers.
The advent of
computer and
automation has
changed and
will continue to
change the way
we do our jobs.

247
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH


 )LQGLQJ WKHULJKWFDUHHUSDWK
$ZRUOGRI $SSV-DYDDEULJKWVWDU

*5 JO PVS MJWFT
1. Approach | Read
Read the text that paints a picture of the past of IT.
" TUSFBN PG FYDJUJOH OFX JOOPWBUJPOT JO *OGPSNBUJPO 5FDIOPMPHZ *5
DPOUJOVFT UP
DIBOHF XIBU XF EP BOE IPX XF UIJOL 8IFSF XJMM ZPV CF BOE XIBU XJMM ZPV CF EPJOH
JO UIF ZFBS  5IJT JT B UPVHI RVFTUJPO FWFO GPS *5 GVUVSJTUT XIP BSF SFMVDUBOU UP
TQFDVMBUF NPSF UIBO B ZFBS PS TP JOUP UIF GVUVSF 5IJOHT BSF DIBOHJOH UPP RVJDLMZ #VU
XIBU BCPVU PVS QBTU

IT in our lives yesterday


To put the emerging information society into perspective, let’s flash back
a half century or so and look briefly at the evolution of computing and
get a feel for how far we have come in this relatively short period of time.

r About 60 years ago, our parents and grandparents built ships, kept
financial records and performed surgery, all without the aid of
computers. Why? Well, there were no computers!
r In the 1960s enormous multimillion-dollar computers processed data
for those large companies that could afford them. These computers,
the domain of highly specialised technical gurus, remained behind
locked doors.
r In the mid-1970s computers became smaller, less expensive and
more accessible to smaller companies and even individuals. This
trend resulted in the introduction of personal computers.
r During the 1980s millions of people from all lifestyles bought
computers. Suddenly computers were for everyone!
r Today most families in the western world (and not only) have at least
one computer at home or work that is more powerful than those
that processed data for multinational companies during the 1960s;
moreover, their computers can reach around the world to interact
with millions of other computers.

2. Speaking | A dialogue
With the help of Reading 1 and the picture in the previous page, in pairs
act out a dialogue on the following points:

- IT yesterday, decade by decade

- Your personal memories and experiences: do your family have one or


more computers? How long have they had a computer? How do they
use IT? What about you personally?

248
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

*5 JO PVS MJWFT

3. Reading | Activities
Read the text and do the activities.

The cornerstone of the technology revolution, the computer, is


transforming the way we communicate, do business and learn. Today
PCs offer a vast range of enabling technologies that help us do all kind
of things at home, at play, at work and
at school.

At home
Millions of people now depend on their
PCs to help them with many everyday
jobs around the house: communicating
with relatives, preparing holidays, doing
homework, managing the financial
part of the family, sending greeting
cards and much, much more. The home
PC is a family’s link to the Internet
with its extraordinary resources and
applications. People link to the Internet
to learn about what banks offer, to order
theatre tickets, to learn about history,
to buy clothes or books or simply to
browse the day away. A third of the
population looks to the Internet first for
their news.
A home may have several PCs. Many of
these can be specifically programmed,
for example to record a movie or a
VCR. Then we have a lot of small
computers in our cars, dishwashers,
air-conditioning systems, and in many
more devices and appliances, including
pet food dispensing devices. Computers
are all around us at home.

A. Match the Italian words with the English ones underlined in the text.
Italian words English words
%JTUSJCVUPSJ
&MFUUSPEPNFTUJDJ
1JFUSB BOHPMBSF CBTF GPOEBNFOUBMF
-BTDJBS QBTTBSF MB HJPSOBUB QJHSBNFOUF
"NNJOJTUSBSF
5FDOPMPHJF DIF PGGSPOP NPMUF QPTTJCJMJUË

249
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 )LQGLQJ WKHULJKWFDUHHUSDWK

At play
Our leisure activities are changing almost as rapidly as the technology.
Increasingly, we communicate with our friends and relatives via the
Internet through e-mail and IM. Millions
of people spend hours chatting with other
people from around the globe on any subject
from rap music to films or gossip.
Playing games is another major application
of computers. The software enables virtual
worlds to be created within computers
where gamers engage in mortal combat,
immerse themselves in a virtual city or
work through a labyrinth for clues to save
the world.
Today’s PCs have sophisticated audiovisual
systems that allow you to listen to audio
CDs or play the latest hit
C i song directly off the Internet or view the music
video. Many people watch DVD movies on their PCs.
Sports fanatics often go to the Internet to view information and statistics
on their PCs while watching the game on television. Most major radio
stations broadcast over the Internet as well as the airwaves, making their
signal available worldwide.

B. Discuss with your partner about your leisure activities. Do you


constantly use your PC? What happens if your PC doesn’t work?

At work
Knowledge workers in all areas of
endeavour depend on their computers
to do their jobs. Millions of people
can be at work wherever they are as
long as they have their portable PCs
– at a client’s office, in an airplane
or at home. The mobile worker’s PC
provides electronic links to timely and
critical information and to clients and
colleagues, across town or across the
country.
Tasks that used to take a great amount
of time now can be completed in
minutes with the aid of IT. Managers
can dictate messages directly to
their computers, marketing reps can
prepare presentations complete with
sound, video and visual effects in a
tenth the time it took a generation ago.

250
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

*5 JO PVS MJWFT

At school
IT opens new doors for education.
Millions of people now learn everything
from agriculture to zoology via self-
paced, interactive, computer-based
courses. The computer is an effective
tool in enhancing traditional methods
in kindergarten through higher
education to continuing education for
professionals. Many universities offer
degrees to students who never set foot
on the physical university building.This
alternative to traditional education is
blending well in our information society
because it gives people the flexibility to
pursue education at their own pace on
their own schedule.

C. Choose one of the following discussion points and exchange your point
of view with your partner or in a small group (four people is the best).

 8IBU JT ZPVS DPODFQU PG *5 *O XIBU XBZ EP ZPV UIJOL BDIJFWJOH *5 DPNQFUFODZ


XJMM IBWF BO FGGFDU PO ZPVS QFSTPOBM FEVDBUJPOBM BOEPS CVTJOFTT MJGF
 "U XIBU BHF TIPVME *5 DPNQFUFODZ FEVDBUJPO CFHJO *T TPDJFUZ QSFQBSFE UP
QSPWJEF *5 FEVDBUJPO BU UIJT BHF
*G OPU XIZ
 *5 JT UPVDIJOH BMM BTQFDUT PG ZPVS MJGF "SF ZPV QSFQBSFE GPS JU &YQMBJO
 $PNNFOU PO IPX DPNQVUFST BSF DIBOHJOH PVS USBEJUJPOBM NPEFMT PG SFDSFBUJPO
 %JTDVTT IPX UIF NJY PG KPCT XJMM DIBOHF BT XF FWPMWF GSPN BO JOEVTUSJBM TPDJFUZ
JOUP BO JOGPSNBUJPO TPDJFUZ (JWF FYBNQMFT

D. What does the image


aside suggest according
to you? Exchange
opinions with your
partner.

251
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 )LQGLQJ WKHULJKWFDUHHUSDWK

4. Reading | Match
After reading the text do the activity of matching.

5PNPSSPX UIF OFYU XBWF PG UFDIOPMPHJFT XJMM DPOUJOVF UP DBVTF SBEJDBM DIBOHFT JO
PVS MJWFT &BDI EBZ OFX BQQMJDBUJPOT BSF DSFBUFE NBOZ PG XIJDI ZPV NBZ OFWFS IBWF
JNBHJOFE QPTTJCMF

Digital Convergence
We are going through a period of digital convergence; that is, we are
converting whatever we can in the physical and communications worlds
to binary on/off signals. TVs, radios, PCs, telephones, movies, textbooks,
newspapers and much, much more are converging toward digital
compatibility. Digital convergence, combined with an ever-expanding
worldwide network of computers, is enabling our society to take giant
leaps into the future. Already, digitized movies are being transmitted
to cinemas where they are shown via high-definition projection units.
Most movies still go to cinemas as frames of cellulose, but these, too, are
in the process of digital convergence. The 200,000 frames required for
a full-length movie will
converge to 16 billion
bits. The printed pages
of a book may converge
to a x-million bit
electronic book, called
an e-book. Millions of
printed pages in the file
cabinets of thousands
of companies are being
converted to more easily
accessible digital images
via image processing.
Digital convergence is
more than a convergence
of technologies. IT is the
enabling technology
for the convergence of
industries, as well. For
example, the financial industries – banking, insurance and securities –
are rapidly converging. Health care establishments – clinics, hospitals,
medical schools – are converging. Government agencies, including the
air traffic control agencies, are consolidating their efforts through digital
convergence.
With half the industrial world (and many governments) racing
toward digital convergence, there is no question that our information
society is going digital. This digital convergence is the foundation for the
many exciting technology-based applications coming our way.

What about the future? Go to the end of the module if you want to deepen
your knowledge about convergence.

252
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

*5 JO PVS MJWFT

Match the three pieces (A, B and C) so that you get a complete sentence.

A B C
 5IF DPNQVUFS B IBWF " UP CJUT
SFWPMVUJPO
 5PEBZ NJMMJPOT PG C JT OPX BWBJMBCMF # XF DPNNVOJDBUF EP
QFPQMF CVTJOFTT BOE MFBSO
 8F BSF HPJOH UISPVHI D JT USBOTGPSNJOH UIF $ UFMFNFEJDJOF BOE
B QFSJPE PG EJHJUBM XBZ POMJOF WPUJOH
DPOWFSHFODF
 " XJEF SBOHF PG E UIF USFOE UPXBSE % GPS UIF *OUFSOFU
JOGPSNBUJPO BOE
UFMFDPN TFSWJDFT
 *OUFSOFU BQQMJDBUJPOT F JT B EFWFMPQNFOU PG & UIF DPNQVUFS OFUXPSL
 *5 UFDIOPMPHZ BOE UIF G DPOWFSUJOH XIBUFWFS ' B 1$
*OUFSOFU IBWF GVFMMFE XF DBO
 5IF HMPCBM WJMMBHF H JODMVEF ( 5FMFDPNNVUJOH

Solution 1 ..............  .............. 3 .............. 4 .............. 5 .............. 6 .............. 7 ..............

Track
5. Listening | Take notes 26
Professor Hawkins is taking a lecture on the applications of IT today and in a near future.
Listen and take notes.

Applications Your notes


5IF DBTIMFTT TPDJFUZ

4IPQQJOH BOZXIFSF BOZUJNF GPS BOZUIJOH

5FMFNFEJDJOF

)JHIUFDI WPUJOH

5IF FEVDBUJPO SFWPMVUJPO

5FMFDPNNVUJOH

253
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 )LQGLQJ WKHULJKWFDUHHUSDWK

6. Speaking | Discuss
With the help of the notes in the previous
exercise discuss in a small group of 3
or 4 on the advantages/disadvantages
represented by the new applications of
IT.

7. Writing | A report
Write a short account of the discussion
including your personal point of view.

8. Writing | Choose
This multiple choice activity refers to what you studied in the previous
section. Choose the correct answer.

1. Information technology is the integration of computer technology and:


a. JOGPSNBUJPO QSPDFTTJOH b. TPDJBM USFOET c. 1$T d. LOPXMFEHF XPSLFST

2. Which of these is not a means of personal communication on the Internet:


a. FNBJM b. *. c. FCPPL d. DIBU

3. A metaphor frequently used as a reference to the wired world is:


a. DZCFSXBZ b. WJSUVBM XBZ c. JOGPSNBUJPO TVQFSIJHIXBZ d. 0$3

4. In a cashless society we would use:


a. POMZ CBOLOPUFT b. POMZ DPJOT c. FNPOFZ d. 71/T

5. In what decade did computers become me more


accessible to small companies and
individuals:
a. T b. T c. T d. T
T

6. We communicate with our friends over ver


the Internet via e-mail and:
a. JOTUBOU NFTTBHJOH b. DZCFSUBML c.
WJEFP SFMBZ d. FUBML
motely
7. When health care is administered remotely
over communication links, we call it:
a. UFMFIFBMUI b. IFBMUIDBSF NBHJD
c. UFMFNFEJDJOF d. DZCFSNFEJDJOF
ital:
8. We are going through a period of digital:
a. TFQBSBUJPO b. VOJåDBUJPO c.
DPOWFSHFODF d. VOJPO

254
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

*$5 JO DPNNFSDF BOE BU XPSL

*$5 JO DPNNFSDF BOE BU XPSL


1. Reading | Fill in
This is part of a talk about the impact of ICT in a commercial context.
Read and complete the text.

DFOUSBMMZ MPDBUFE FDPOPNZ DPNQVUFS IVNBO VTFST SFNPUF


NPOJUPST
TUBOEBSET PG MJWJOH DBNFSBT JOGPSNBUJPO EBUB TUPDLFE
TZTUFNT
888 FMFDUSPOJD QSPDFTT FNBJM DSFEJU
DPNNVOJDBUJPOT

Most commercial operations now employ ................................ . We have computer systems


in our homes, schools, colleges and in any other place where there is a need to ..................
.............. data and transmit the information gained between ................................ . We take it
for granted that it is possible to send ................................ to the other side of the world in a
few minutes or to process quantities of ................................ received from ................................
sources to obtain results from a ............................... unit.
Computer use affects our daily lives in many ways. For example, the millions of phone calls
made every day could not be handled without computers, nor could the millions of debit
and ................................ card payments that we make.
The entire ................................ of our countries is governed by the use of computers and,
without them, ................................ would fall. It would not be possible for supermarkets to
keep their shelves well ...............................with fresh food without computers. Some people
say they would like to go back to old-fashioned methods, but this would be likely to cause
price rises and all kinds of supply difficulties.
E-mail communication and access to information via the ............................... is having a great
effect on our lives. It is enabling more and more people to work from home, and still keep in
visual contact with other colleagues via ................................ mounted on ................................ .
The traditional office to which people travel every weekday may soon be a thing of the past.

Track
2. Listening | Activities 27
The introduction of computers has not only had positive effects. There
are also problematic areas. (A) Before listening exchange ideas with your
partner on what you think may be a problem. (B) Listen and compare
your ideas with the opinions expressed in the listening. Then answer the
questions.

 )BT UIF JOUSPEVDUJPO PG DPNQVUFST MFE UP B HSFBU SFEVDUJPO JO UIF VTF PG QBQFS *G
OPU XIZ
 8IBU JT UIF QSPCMFN XJUI IJHIMZ DPOåEFOUJBM QFSTPOBM EBUB
 8IP MPTU UIFJS KPCT XIFO DPNQVUFST XFSF JOUSPEVDFE "OE OPX
 8IBU JT UIF EJMFNNB UIF MJTUFOJOH TQFBLT BCPVU 8IBU JT ZPVS PQJOJPO )PX XPVME
ZPV TPMWF UIF QSPCMFN

255
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 )LQGLQJ WKHULJKWFDUHHUSDWK

3. Reading | Match
This is a further contribution on the impact of ICT in terms of jobs. Read and match
the sentences with the jobs in the box. (For example: Programmers i).

Areas where jobs have been created Areas where jobs have been lost

1. Network Managers and Technicians 1. Manual Repetitive Jobs


2. Web Design 2. Shop Work
3. Systems Analyst 3. Bank Cashiers
4. Programmers i 4. Office Work
5. Computer Engineers 5. Telephone Exchange
6. Library Work

B 0OMJOF TIPQQJOH (like Amazon) IBT DBVTFE B reduction in the number of shops GPVOE
PO PVS IJHI TUSFFUT .PSF BOE NPSF QFPQMF BSF TIPQQJOH POMJOF CFDBVTF JT JU HFOFSBMMZ
cheaper BOE UIFZ DBO HFU goods delivered
C 8JUI UIF MBVODI PG FCPPLT FMFDUSPOJD CPPLT
UIF GVUVSF PG USBEJUJPOBM MJCSBSJFT DPVME CF BU
SJTL 1FPQMF DPVME FBTJMZ EPXOMPBE BO FMFDUSPOJD CPPL JOTUFBE PG IBWJOH UP WJTJU B MJCSBSZ
D 6TF PG ATM’s IBWF SFEVDFE UIF OFFE GPS CBOL DBTIJFST
E 5IFTF XPSLFST BSF SFTQPOTJCMF GPS EFTJHOJOH new ICT systems
F 5IFTF KPCT IBWF CFFO DSFBUFE EVF UP UIF OFFE GPS CJH computer networks within
companies /FUXPSL NBOBHFST NBLF TVSF UIBU DPNQVUFST PO UIF OFUXPSL run smoothly
BOE BSF secure
G Factory manufacturing spraying welding packing BOE assembling IBWF TFFO robots
replacing humans 3PCPUT BSF SFQMBDJOH QFPQMF CFDBVTF UIFZ DBO EP UIF TBNF KPC NVDI
faster UIFZ DBO work 24/7 BOE UIFZ do not require wages
H &OHJOFFST BSF OFFEFE UP build the high-tech computers UIBU XF VTF UPEBZ
I 5FMFQIPOF PQFSBUPST IBWF CFFO SFQMBDFE CZ DPNQVUFS TZTUFNT UIBU NBLF telephone
connections automatically
J 1SPHSBNNFST DSFBUF BMM UIF software that can be used on a computer 5IJT JT B IVHF
JOEVTUSZ BOE QSPEVDFT UIJOHT MJLF operating systems applications XPSE FYDFM FUD
BOE
computer games
K 5SBEJUJPOBM PGåDF XPSL TVDI BT typists BOE filers IBWF CFFO SFQMBDFE CZ DPNQVUFST 0OF
QFSTPO XIP LOPXT IPX UP VTF Word Processors BOE Databases DBO SFQMBDF NBOZ UZQJTUT
BOE åMFST
L 5IF *OUFSOFU IBT TFFO B IVHF EFNBOE GPS CPUI commercial (business) and personal web
sites. 8FC EFTJHOFST DSFBUF UIFTF TJUFT BOE LFFQ UIFN VQ UP EBUF

256
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

$BSFFS PQQPSUVOJUJFT GPS *5 TQFDJBMJTUT

$BSFFS PQQPSUVOJUJFT GPS *5 TQFDJBMJTUT


1. Reading | Match & speak
While reading, complete the list of IT jobs inserting the right title in the
correct place. Then in a small group (3 or 4) discuss which of the jobs
would most suit you and why. Also say which of these jobs you would
never take in consideration and explain why.

%BUBCBTF 4ZTUFNT BOBMZTU 6TFS MJBJTPO 8FC BQQMJDBUJPO $IJFG JOGPSNBUJPO


BENJOJTUSBUPS EFWFMPQFS PGåDFS
8FCNBTUFS 1SPHSBNNFS $PNQVUFS 4ZTUFNT /FUXPSL
PQFSBUPS QSPHSBNNFS BENJOJTUSBUPS

The number of people attracted to the booming IT field is increasing.


One of the main reasons is that IT careers are considered among the
most desirable jobs. A recent article appeared on Money magazine said
that computer system analyst was the best job in America, followed by
physician, physical therapist, electrical engineer and civil engineer. The
system analyst is only one of dozens of IT specialist careers. These are
some of the most popular.

....................................... This person is


responsible for all the information services
activity in an organization. This person, often
a vice-president, must be somewhat futuristic,
predicting which information technologies
will become reality so the company can
position itself to use them as they become
available.

....................................... They analyze, design


and implement information systems. They
work closely with people user groups to
design information systems that meet their
information processing needs.These “problem
solvers” are assigned a variety of support
tasks, including feasibility studies, system
reviews, security assessments, long-range
planning and hardware/software selection.

....................................... They translate analyst-prepared system and


input/output specifications into programs. They design the logic, then
code, debug, test and document the programs.

.......................................They design and maintain networks: LANs, MANs


and WANs. This work involves selecting and installing appropriate
system software and appropriate hardware, such as modems and routers,
and selecting the transmission media.

257
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 )LQGLQJ WKHULJKWFDUHHUSDWK

....................................... They design, develop, maintain and implement


system software. System software is fundamental to the general operation
of the computer; that is, it does not deal with a specific business or
scientific problem.

....................................... This person designs, creates and maintains the


integrated database. This specialist coordinates discussions between
user groups to determine the content and format of the database so that
data redundancy is kept to a minimum. The integrity and the security of
the database are also their responsibilities.

....................................... This person is responsible for


creating and maintaining one or more Internet sites. This
specialist uses Internet development tools and source
material from the whole organization to create and
maintain WWW sites and pages. Occasionally, people in
this job function also are responsible for the hardware
required at the server site.

....................................... This Internet specialist has the


responsibility for the Web server and its software. This
person monitors Internet traffic on the server computer
and responds to external inquiries regarding Web site
operations. Some are actively involved in the design and
update of Web site pages.

....................................... This person performs the


hardware-based activities to keep enterprise-wide systems
operational. This person is in constant communication
with the computer(s) while monitoring the progress of
online systems, a number of simultaneous production runs, initiating
one-time jobs and troubleshooting1.

....................................... Computer and information processing activity is


very intense in companies that seek to exploit the full potential of IT.This
person coordinates all computer-related activities within a particular
functional area (e.g., the marketing department) in order to look for ways
to take advantage of available IT resources.

The variety and types of IT specialist jobs are ever changing. For
example, there’s the information detective, that can be very helpful for
companies and individuals in order to make investigation on various
matters, or the Internet researcher, a specialist that knows his or her way
around the Internet so a research can be carried on in a very short time.
Some artistic careers, such as animator or video production editor, have
become so heavily filled with technology that they are, too, considered IT
specialists careers.

1
BOBMZTF BOE TPMWF QSPCMFNT GPS BO PSHBOJ[BUJPO

258
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

$BSFFS PQQPSUVOJUJFT GPS *5 TQFDJBMJTUT

2. Reading | Activities
Read the text about getting a job. Then do the activities at the end of the
reading.

Whether you are entering the job market for the first time or seeking
alternative employment, resources on the Internet can help you land the
position you want.

Comprehensive career/employment Web sites. The Internet now has


a number of comprehensive career/employment Web sites designed
to help employer and candidate find one another, such as infojobs.it,
monster.it, cercolavoro.it and ec.europa.eu (Eures).

Industry-specific or professional career/employment Web sites.These sites


offer similar services to the comprehensive sites, but their orientation is to
a specific industry or to specific professionals. For people in professional
occupations Linkedin, a social networking website, is of great utility.

Company job opening pages. Most


company Web sites now have a
page called something like “career
opportunities” or “job seekers”. This
page and its links will contain detailed
information about available openings,
often by geographical location, division
or job function.

The career/employment Web sites offer


these types of resources and services.

Jobs database. Potential employers


post job openings to a searchable job-
openings database.

Candidates database. You can post a résumé to the site’s candidates


database. The database is made available to potential employers.

Job search. A comprehensive site may have hundreds of thousands of job


openings in its database. You can search the job-openings database by
keyword, industry type, job type and geographic locale to get a listing of
jobs that meet your criteria.

Candidate search. Employers continuously search the candidates


database, which contains the résumés of those seeking jobs, to find
candidate who can fill their job openings.

259
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 )LQGLQJ WKHULJKWFDUHHUSDWK

Career resources. Major career sites have extensive resources for those people who
are contemplating a job or career change or are seeking employment for the first time.
These could include interactive tools that help people prepare a résumé and cover letter
templates, tips on preparing for an interview, tips on salary negotiation, information on
employers and much more.

The online jobs search has revolutionised the manner in which those seeking employment
find jobs and those companies seeking employees find candidates.The tradition of sending
a mail résumé in response to a help-wanted in a newspaper or magazine may have lost its
effectiveness in our connected information society. In this new era, the job search process
is made easier for both employer and candidate. Also, some say that the online process
results in a better match for both employee and employer.

A. Match the words/phrases underlined in the text with their definitions:

" QJFDF PG JOGPSNBUJPO


1MBDF
1VCMJTI B OBNF
PO B MJTU
*U JT BO BDDPNQBOZJOH MFUUFS UIBU JOUSPEVDFT ZPV BOE ZPVS
SÏTVNÏ UP B QPUFOUJBM FNQMPZFS
+PC PQQPSUVOJUJFT
" EPDVNFOU PS åMF IBWJOH B QSFTFU GPSNBU VTFE BT B
TUBSUJOH QPJOU GPS B QBSUJDVMBS BQQMJDBUJPO TP UIBU UIF
GPSNBU EPFT OPU IBWF UP CF SFDSFBUFE FBDI UJNF JU JT
VTFE
" CSJFG BDDPVOU PG POFT QSPGFTTJPOBM PS XPSL FYQFSJFODF
BOE RVBMJåDBUJPOT PGUFO TVCNJUUFE XJUI BO FNQMPZNFOU
BQQMJDBUJPO BMTP DBMMFE $7 DVSSJDVMVN WJUBF


B. (Individually or in a small group) The


article mainly refers to English-speaking
countries. Make a research to find 1. if the
resources on the Internet help you in the
same way in the Italian context and 2. if the
career/employment Web sites in the Italian
context offer the same types of resources
and services. Consider the similarities and
the differences.

C. (In pairs) Do you think that the mail résumé


has lost its effectiveness in comparison with
the online opportunities? Give reasons. If
you find it difficult to answer this question
go to the following page and read.

260
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

$BSFFS PQQPSUVOJUJFT GPS *5 TQFDJBMJTUT

3. Reading | True/False
Read the text and decide if the statements are true (T) or false (F). If
they are false, correct them orally.

8IBU JT UIF EJGGFSFODF CFUXFFO SÏTVNÏ BOE $7

Résumé is French meaning ‘summary’. Curriculum


Vitae (CV) is Latin meaning ‘course of life’. For
general job seekers, a CV and résumé are the
same thing. However, what you call the document
changes depending on the country. Résumé is the
common name in the US and English-speaking
Canada. CV is used in the United Kingdom.
Both résumé and CV can be used in North America
and Australia. However, if you are looking for an
academic, education, scientific or research job,
you use the term CV. In this situation, a CV goes
into a great amount of detail about educational
background, including academic publications.
This amount of detail is not required when you are
applying for a job in the public sector or private
sector.

Some useful tips.


Research!
Before you begin writing your résumé, research the b
business
i or iindustry
d t
that you are sending your résumé to. You need to show that you have the
skills and experience needed for that company or industry.
Be honest!
Some people lie in their résumés. Studies show that 40% of job seekers
lie about their employment, 20-30% lie about their education, and 25-
30% give false references. Employers know this happens so they often
check the information. It is easy to find information on the Internet. Only
write the truth or you might find yourself in trouble!

Page layout
Keep it simple - fonts like 10-11 point ‘Times New Roman’ or ‘Arial’ are
easy to read.
Include page numbers.

Attaching a photograph
This is a no-no in English-speaking countries. It is strange to see a
photograph on a résumé. Again, it usually indicates the person has not
worked in an English-speaking country before.

261
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 )LQGLQJ WKHULJKWFDUHHUSDWK

How long should my résumé be?


If you are a new graduate or have not worked for a long time, 1-2 pages
is acceptable. For everyone else, 2-5 pages is normal. However, many
employers prefer ‘short and sweet’ résumés. Your résumé shows how
your career has developed and lists your achievements, but keep it short
and interesting.

T F
 3ÏTVNÏ JT B -BUJO XPSE UIBU NFBOT ATVNNBSZ
 *O UIF 6, UIFZ QSFGFS UP VTF UIF UFSN $7
 *O "VTUSBMJB UIF UFSN $7 JT OPU VOEFSTUPPE
 *G ZPV BSF JOUFSFTUFE JO B TDJFOUJåD KPC ZPV DBO VTF CPUI SÏTVNÏ BOE $7
 " SÏTVNÏ DPOUBJOT NBOZ NPSF EFUBJMT UIBO B $7
 -JFT BSF WFSZ GSFRVFOU JO SÏTVNÏT
 *U JT WFSZ JNQPSUBOU UP BUUBDI B QIPUP UP ZPVS SÏTVNÏ
 " SÏTVNÏ JT HFOFSBMMZ DPNQPTFE PG  PS  QBHFT 
 &NQMPZFST MJLF SFDFJWJOH MPOH EFUBJMFE SÏTVNÏT

4. Writing | Your CV
According to an initiative of the European Commission you can use the
Europass CV that can be downloaded so you can generate your CV in
your computer. Go to

http://europass.cedefop.europa.eu/europass/home/vernav/
Europasss+Documents/Europass+CV.csp

and follow the instructions.

262
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

5FTU ZPVS DPNQFUFODF

7HVW\RXUFRPSHWHQFH
Read and do the activities.

IT implications of convergence
Convergence is well known to everyone in IT. When computing and telecoms converged
into a single industry, there were two main effects. The first was that previously different
companies were suddenly competing in the same areas. The second was that the global
size of the IT market increased vastly.

But convergence is far from over. The next two decades will see much more of it, as
the whole of IT starts to converge with the fields of biotechnology, nanotechnology and
cognitive technology. This convergence will have the same effects all over again. Since the
web is now in a critical mass phase where lots of business models are suddenly becoming
possible, change within IT is far from over too.
The result is that companies in every industry sector will see enormous changes in the
opportunities and threats facing them.They will find that they will quickly gain competitors,
but also that many opportunities
are emerging. If they survive, there
are potentially rich rewards to be
obtained. While competition may
badly erode income in established
areas, companies can capture new
markets by moving into adjacent
territory.

IT systems have been widely utilized


in most companies to give them
more competitiveness and efficiency.
Some of these systems are aimed at
providing a basis for the long term
future of the company. However, most companies find it difficult to identify the competitive
landscape in the future. For example, it is hard for many IT people to recognise the long
term convergence of IT with biotech. Worse still, efficiency and adaptability cannot both
be optimised simultaneously. The history of evolution shows that in a fast changing
environment, adaptability is far more important to survival than efficiency. If an IT system
is well adapted to match the working conditions of today’s company, it will not work so
well for the environment in a few years time. And especially so if that IT system has to be
expanded into quite different market areas, while other parts of it are becoming obsolete
or dead weight.

So, it is clear that the long term IT investment plan is becoming a problem. Companies
must learn to sacrifice optimisation of costs and efficiency in order to stay adaptable.
Adaptability is the main survival characteristic, while going for efficiency today can lead
to death tomorrow. Learn to think in the very short term for investment strategy and keep
options open as far as possible, while looking far ahead to recognize market changes that
that flexibility will enable your company to capture.

(adapted from an article by Ian Pearson, Futurologist)

263
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
PRGXOH

 )LQGLQJ WKHULJKWFDUHHUSDWK

1. Match.
Find the underlined English phrases in the text that correspond to
the Italian ones.

 Ò CFO MPOUBOB EBMMB åOF B

 DPNQFOTJ SJDPNQFOTF C

 QFHHJP BODPSB D

 FSBOP JNQSPWWJTBNFOUF FOUSBUF JO E


DPODPSSFO[B OFMMF TUFTTF BSFF
 NFOUSF TJ MBODJB MP THVBSEP BM GVUVSP F

 TPOP NJSBUJ B GPSOJSF G

 QFTP NPSUP H

 NJOBDDF I

2. Take notes.
Write in the form of concise notes what the text says about the
following.

5IF FGGFDUT SFTVMUJOH GSPN UIF


DPOWFSHFODF CFUXFFO DPNQVUJOH BOE
UFMFDPNT
$POWFSHFODF IBT KVTU TUBSUFE

1SPT BOE DPOT PG DPOWFSHFODF JO


UIF MJGF PG JOEVTUSJFT

-POH UFSN EFWFMPQNFOU JO JOEVTUSJFT


PQQPSUVOJUJFT PS UISFBUT

"EBQUBCJMJUZ WT FGåDJFODZ

3. With the help of the notes in the previous activity write a short
essay on convergence. Remember to conclude your text with personal
ideas.

264
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

&OLO

265
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
&OLO
$ZRUOGRI $SSV-DYDDEULJKWVWDU

Prehistory and history of computers


Prehistory
It would be interesting to know how man, since the dawn of civilization, has come
to devise aids which helped him solve problems relative to doing calculations and
keeping track of the results, at first through what nature could offer him (his own
fingers, pebbles, sticks, by notching up tallies on animal bones, ivory, and stone, etc.)
and then by gradually exploiting his mental faculties.
In fact, the very first forms of communication, expression, and language used by
Paleolithic peoples 30,000 years B.C., can be considered the “prehistory” of the
computer. Then, throughout the centuries, the increasing need to reckon and store
information led man to look for suitable ways to help him, to think up convenient
ways of recording and doing calculations; so the exceptional human mind has come
to “create” calculating and recording aids, till in the early 1940’s the computer was
invented.
The very first calculating device appeared in 3000 B.C. when the Chinese introduced
the abacus which was used in China for calculating the census as recently as A.D.1982.

History
In 1500 A.D. Leonardo da Vinci invented the mechanical calculator, while
in 1621 William Oughtred introduced the slide rule, which did not become
obsolete for nearly 350 years. In 1642 the French mathematician Blaise Pascal
invented the first automatic mechanical calculator called the Pascaline. It
could only perform addition and subtraction, and its gears had to be turned by
hand. In 1670 Gottfried Leibniz improved upon Pascal’s arithmetic machine by
adding multiplication, division, and square root capabilities and seven years
later, Leibniz introduced binary arithmetic. In 1822 Charles Babbage invented
the Difference Engine, a large mechanical calculator capable of addition and
subtraction. In 1904 John Ambrose Fleming developed vacuum tubes and
in 1926 the first semiconductor transistor appeared. The transistor allowed
electrical current to flow through a computer, allowing data to be passed
through the machine.
In 1943-45 U.S. Army built ENIAC computer to calculate weapons’ trajectories,
while in 1944 Harvard University and IBM developed the Mark 1, which used
computers IBM punched cards.
In 1945 John von Neumann described a general purpose electronic digital
computer which became the basis for most computers that followed. In 1947
William Shockley invented the transistor, a solid state, reliable version of the
vacuum tube, and in 1954 Texas Instruments announced the start of commercial
production of silicon transistors.
In 1969 Intel’s Ted Hoff designed a chip that could follow instructions and
perform simple functions on data. In 1981 IBM introduced its Personal
Computer, which used Intel’s 16-bit 8086 processor, and in 1984 Apple
introduced the Macintosh, a computer using a mouse and a graphic interface.

266
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Activities
1. Tick the right translation for each word.
1. pebbles a. persone b. sassi c. pietre
2. sticks a. bastoncini b. steccati c. staccionate
3. to notch a. intaccare b. incastrare c. incollare
4. tally a. racconto b. tacco c. tacca
5. ivory a. iva b. avorio c. ivoriano
6. need a. bisogno b. richiesta c. offerta
7. to reckon a. calcolare b. richiamare c. ricalcare
8. to store a. sistemare b. memorizzare c. collocare
9. device a. macchinario b. calcolatore c. dispositivo
10. census a. incenso b. censimento c. censura
11. slider rule a. regolo b. regola c. dispositivo
12.gears a. ruote b. ingranaggi c. calcolatori
13.weapons a. fucili b. pistole c. armi
14.silicon a. silicone b. silicio c. selva

2. Answer the following questions:


1. What appeared in 3000 BC?
2. Where was the abacus used?
3. Who invented the mechanical calculator?
4. Why was the Pascaline called “mechanical“ calculator?
5. What happened in 1670?
6. When did the first semiconductor transistor appear?
7. What was the importance of the transistor?
8. What happened in 1945?
9. When did the first commercial production of silicon transistors appear?
10. What was the importance of “Apple” in 1984?

3. Fill in the table below using the most important facts about the
evolution of the computer.
WHO WHAT WHEN
Paleolithic peoples First forms of 30,000 years B.C.
communication

Mechanical calculator

In 1642

4. Now, working with your partner, and starting from your table,
make as many mini dialogues as you can.
Example:
Q. Who recorded numbers by notching up tallies on animal bones?
A. Paleolithic peoples (did)

267
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

&OLO

Robots and industrial robots


Robots entered the English vocabulary with the translation of Karel Capek’s
play: Rossum’s Universal Robots (R.U.R.) in 1923. Capek was a Czech, and in his
native language the word robot – robota – simply meant a worker. In the play,
robots were the humanoid creations of Rossum and his son, constructed in the
hope that they would perform obediently in the service of man.Thanks to Capek
and a generation of science fiction writers, everyone knows what a robot is.
We have all seen robots in science fiction films.The robots can talk, walk, reason
with humans and occasionally go berserk. The robots in these films are very
different from the ones we can see in factories.
Robots are used in factories because they can reduce labour costs and improve
the quality of the finished products; in this regard an industrial robot is a
reprogrammable, multi-functional manipulator designed to move material,
spare parts, tools or specialised devices through various programmed motions
for the performance of many tasks.
Robots can work continuously for 24 hours a day, 365 days per year; they don’t
become ill, they don’t take lunch breaks or tea breaks; they don’t go on strike.
Computer-based automation will not erode the total number of jobs but the
distribution of jobs will change dramatically.
An industrial robot can be used in several ways, for example it could be used to
spray paint or for welding body panels, while a washing machine is restricted to
washing clothes even if it has different programs. An industrial robot consists of
three parts, that is:
1. The manipulator: that is the moving part which resembles a moving arm on
a stand. Different tools can be mounted on the ‘hand’ of the arm.
2. The power supply: for robots that need a lot of power this will come from a
compressor that will work the hydraulic system. For lightweight robots that
use stepper motors, the power supply would be electrical.
3. The controlling computer which gives instructions about the kind of
movement that is required. The controller (basically a special-purpose
computer) has all the parts commonly found in a computer. It has a CPU,
memory and input and output
devices. The instructions which
determine how the robots move
along wires in the form of electric
signals are transmitted from the
controller. The electonic memory y
stores programs which can be
changed by the operator to switch
the robot from painting to welding
to picking things up etc.

(From J.F. Engelberger, Robotics in Practice – Adopted


from Information Systems for you by S. Doyle)

268
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Activities
1. Choose the best answers.
1. The word “robot” is
a. a word translated from another language
b. an English word
c. a Latin word

2. “Robots occasionally go berserk” means


a. they keep calm
b. they get angry
c. they grow furious

3. Robots are used in factories because


a. they improve the quality of the finished products
b. they reduce labour costs and improve the quality of products
c. they reduce labour costs

4. A washing machine
a. is an industrial robot
b. isn’t an industrial robot
c. is a safety appliance

2. Write appropriate questions to the following answers.


1. .................................................... ? He was a Czech
2. ................................................... ? Yes, they are very different.
3. ................................................... ? They are used in factories.
4. ................................................... ? It consists of three parts
5. ................................................... ? Different tools can be mounted on the ‘hand’ of the arm.
6. ................................................... ? The electronic memory stores programs.

3. Discuss. (Student/Teacher)
Student A (Sheila) prepares some notes according to advantages (pros) and disadvantages
(cons) of using robots. After filling in the chart below (also with her own ideas), Sheila starts the
discussion on the topic keeping in mind her notes and ideas.
In case of pauses or uncertainties, the teacher can help keep the track, ask questions, and resume
the discussion.
Robots and Industrial Robots
PROS CONS
Reduce labour costs Create unemployment

4. Discuss. (Student/Teacher)
Use the same chart of the previous exercise, but now the discussion includes you and your
partner, Bob, who acts as a teacher to supply the right word at the right moment, to ask questions
and to resume the discussion. Then swap roles.

269
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

&OLO

How will microchips work in the 21st century?


Advancement in chip design is progressing so rapidly that computing power
continues to grow exponentially every few years.
In the ‘60s of the late century, Intel scientist Gordon Moore, making a prediction
that the number of transistors that can fit on a single chip would double every
18 months, first observed that the growth in complexity of integrated circuits
follows a trend; this observation has been called Moore’s Law.Then Moore went
on to co-found the microchip giant Intel and for the most part, his prediction
has come true. The Intel 8088 chip, which came on the first IBM PC, contained
29,000 transistors.
But in 1997 Moore made a revision in his law; he predicted that transistor
miniaturization would hit a wall about in 2020. Of course, the wall is a literal
one, that is to say, the atoms stacked between adjacent traces in a microchip.
IBM introduced its silicon-on insulator (SOI) technology that protects the
transistors from stray electro-magnetism, but there are limits with silicon
because we associate the purified form of sand with microelectronics that they
seem inseparable.
There are other ways to build microchips, and a step forward is represented
by the quantum computer that takes us into the subatomic world where a
subatomic particle can be thought of as existing in several different states at
the same time. Instead of using voltage levels, scientists wanted to find out if
quantum states, could be used to encode and process information. Observing
the wave behavior of quantum particles they found two waves that could
correspond to two quantum states, so establishing the binary on/off computing
uses with a difference from the usual binary concept:
The state of a quantum bit, or “qubit”, is determined only when its value is
observed; that means during a computation, each of the qubits in a string has
either a 0 or 1 value. Physically, they exist in an ambiguous “superposition of
states” so a string of processor operations has the potential to represent all
possible strings of bits at the same time. Only when the calculation’s value is
observed, or read, the string of bits takes on a specific value.
If Moore’s law runs out in 2020, by that time a single chip will have in the
neighborhood of 19 trillion transistors, twenty times the number of neurons in
the human brain.
Today, any description of microchips runs the risk of going out of date. But at
the time of writing, we can say that the latest chips contain a billion transistors.
This means you can store and watch the latest Hollywood blockbusters on an
iPod-sized gadget.
Microscopic chips capable of storing vast amounts of information are being
embedded into passports and credit cards as a security precaution.
Manufacturers are slipping tiny chips, known as RFID tags, into their products
to track the flow of how many shirts, cereal boxes and handbags they sell. The
same chips can also track stolen products – shoplifters are warned.

270
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Activities
1. Answer the following questions.
1. What did Gordon Moore observe in the ‘60s?
2. Did Moore’s prediction come true?
3. Explain Moore’s revision to his prediction using your own words.
4. What is SOI?
5. What do you understand for “quantum computer”?
6. When is the state of a “qubit” determined?
7. Why are manufacturers slipping RFID tags into their products?

2. The general structure of the previous text is visualized, selecting


the relevant information, by means of the following graph (algorithm/
flow chart). By using your knowledge and information also from other
texts, try to describe the evolution of chips.
(A very simple Algorithm/flow Chart on the evolution of chips)
Start

Scientist Gordon Moore

Moore’s Law

Moore’s revision

SOI
Quantum computer

RFIDT tags

3. Translate into English the following sentences:


1. Il microchip è la prova dell’immensa capacità delle cose minuscole.
2. Il chip, che è più piccolo di un penny, è il cervello di ogni dispositivo digitale.
3. Alimenta i computers, i cellulari, le lavatrici e le macchine.
4. Molte persone considerano l’espansione del microchip come una delle conquiste
più grandi dell’umanità.
5. Il chip tipico è una meraviglia dell’ingegneria.
6. Il circuito integrato contiene milioni di transistors interconnessi.
7. Tali transistors interconnessi sono stipati in un wafer di silicio che ha di regola
un’area di un centimetro quadrato e spessa meno di un millimetro.
8. I chips più moderni sono in grado di calcolare milioni di istruzioni nella frazione di
un secondo.

271
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

&OLO

Google
Search engines are internet directories like virtual address books and Google is a search engine
that began to operate in 1998 thanks to two students: Sergey Brin and Larry Page of Stanford
University.
At first, the Internet was a mass of information with no reliable way to find what you wanted,
but then Google’s computers have catalogued a lot of internet pages and now it is the world’s top
search engine by pioneering:

a. a simple page style,


b. page rankings, ordering results in order of relevance and popularity,
c. associated website functions developed by employees.

Google, not only, can search for words, find videos and images, but it can do a lot of other things
that are almost all free for users; for example: Google Earth zooms in on interactive satellite
pictures of the planet; Google scholar helps you study, Froogle helps you shop while today the
new generation of Google software operates phones, MP3/4 players and mobile computers. But,
how does Google pay for it? The answer is: advertising.
Advertising in newspapers, billboards and TV is very important, but the Internet is much more
powerful than this kind of ads because you can buy things and services with a click of your
mouse. So, if you look up “restaurants”, it makes sense for restaurants to advertise on that page;
that is the reason why companies spend more on internet advertising than television. But not
everyone loves Google, in fact someone says that they should restrict information.
Google earns money giving users detailed statistics about who is searching for what and how
many people see that ad. or the other one; Google has a lot of databanks that are precious for
advertisers and at this point some questions should have an answer:
- when does freedom of information become invasion of our privacy?
- will our needs be predicted?
- will our desires be dictated?

272
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Activities
1. Read the text above and find out the advantages of Google and fill
in the chart below.
ADVANTAGES
Powerful search engine

2. Read the text again and write the practical applications of Google
software in the chart below.
PRACTICAL APPLICATIONS

Mobile computers

3. Answer the following questions:


1. What is the function of a search engine?
2. When did Google start?
3. Explain the meaning of: “Google is the world’s top search engine by
pioneering...”
4. Why is advertising very important?
5. Does everyone love Google? Why? / Why not?

4. Discuss. Students/Teacher.
The topic is: Google. Five students sit round in a circle together with their
teacher, and their discussion should focus on the three questions which
are at the end of the previous text (1.When does freedom of information
become invasion of our privacy? 2. Will our needs be predicted? 3. Will
our desires be dictated?) Each student, in turn, should speak for about 2/3
minutes adding personal feelings, too. The rest of the students will listen
and take notes, in order to have written materials on which to add new
ideas and personal opinions later. Then, the teacher will choose five other
students, who will deal with the same topic trying to avoid repetitions and
supplying their own opinions (written before as notes). The teacher acts
as a director intervening in case of difficulty.

273
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

&OLO

The first bug


1. In the summer of 1945 a research group headed by Commander Howard
Aiken of United States National Research, was building and testing the
famous early computer, that is Mark II, at Harvard University.

2. The building that housed the computer was unair-conditioned and, as


September was a particularly hot month that year, all the windows were
open.

3. Unfortunately one afternoon Mark II halted; after checking a number of the


relays, an operator found the one that had jammed and, to his great surprise
he saw that inside the relay device there was a dead moth. Using a pair
of tweezers, the operator lifted out the moth and tapped it in the logbook.
Commnder Aiken often looked in on his staff and asked: “Are you making
any numbers?” and staff members invented excuses when they weren’t
“making numbers”.

4. After the incident of the moth the research group of people would tell Aiken
they were “debugging” the computer whenever they needed an excuse.
According to Captain Grace Murray Hopper of United States National
Research, that was the origin of the term “bug” and “debugging” to denote a
computer error and the process of correcting it which involves discovering,
locating, and correcting all errors that cause a program to produce either
incorrect results or no results at all. A beginner programmer does not
realize that program debugging is the single most time-consuming phase in
the overall program development process.

5. Studies on the development of large programming systems indicate that


it is common for 50 to 75% of the overall programming time to be spent on
finding and correcting errors.
(adapted from Luedtke and Luedtke “Your first business computer”, Digital Press)

274
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Activities
1. Find out which paragraph develops the points below.
a. Time spent on finding and correcting errors.
b. A short description of the building where Mark II was.
c. Debugging is the most time-consuming phase.
d. A research team was building and testing Mark II.
e. A description of the origin of the term “bug”.

Solution A .... B .... C .... D .... E ....

2. Find synonyms in the previous reading that mean:


1. team ........................................................................................................................
2. provided house for ...................................................................................................
3. stopped ...................................................................................................................
4. several .....................................................................................................................
5. a small pair of tongs for taking up small objects, plucking out hairs etc.
................................................................................................................................
6. body of persons carrying on work under manager etc.
.................................................................................................................................
7. are you working? .....................................................................................................
8. total, inclusive of all, taking into account all aspects
.................................................................................................................................

3. In pairs act out a dialogue between you and your partner. Ask the
questions below and answer them. Swap roles. Then prepare a short
oral report.
1. What is Mark II?
2. Who is Commander Howard Aiken?
3. Where does the scene take place?
4. Why is it important to the story that September was particularly hot that year?
5. Why did Mark II stop?
6. What happened after the incident of the moth?
7. What does the acronym USNR stand for?
8. What is meant by “bug” and “debugging” in computerese?

4. Translate into English the following sentences:


1. Nel linguaggio del computer “bug” significa errore.
2. La parola “debugging” indica un errore nel programma e tutto il processo per
correggerlo.
3. Un principiante non si rende conto che il programma di “debugging” è la fase
che richiede molto tempo nel processo di sviluppo del programma generale.

275
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

&OLO

Pinterest
First Facebook, then Twitter and now
Pinterest. Pinterest is one of the world’s
most popular social networks.
But what is Pinterest? It’s a virtual pinboard
which is a board on the wall in a house or
in an office where people put notes and
photos. They use a pin and so they “pin” the
notes and photos to the board. So the word
“pinterest” is a combination of “pin” and
“interest”.
Pinterest also contains images and notes.
There are so many pictures on so many topics that you will be surprised.
Pictures are divided into categories and boards. Examples include: music, books, events, interests,
hobbies, fashion and food. Pinterest’s mission is to “connect everyone in the world through the
things” they find interesting.
You don’t need to have an account to see the images, but you need to register.
Once you have registered, the fun begins!
You can create “boards” on any subject you like. You can upload images from your computer or
smartphone, and you can also save and categorise images you find on the web. You can check
other people’s pinboards for inspiration and discover new images and information on topics you
find interesting.
As with Facebook and other popular social networks, you can “like” photos you find on other
websites. The difference with Pinterest is that you use the “Pin It” button. Each pin added using
the “Pin It” button creates a link to the site it came from.
You can connect your Pinterest account to your Facebook profile, Twitter account, Instagram and
so on.
Everyone is pinning everything everywhere. Users include students and teachers, stars and fans,
first ladies and housewives.

Activities
1. Answer the following questions:
a. What is the text about?
b. What is Pinterest’s goal?
c. What does Pinterest contain?
d. Explain the meaning of “board”
e. What is the “Pin it” button?
f. How is a link created?

2. Prepare an oral report on


Pinterest and discuss your ideas with
your partner. Swap roles. Follow
these guidelines:
- the importance of a social network
- how Pinterest works
- advantages and/or disadvantages
of Pinterest.

276
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

3. Choose the right definition


a. A pinboard is
- a board made of cork
- a board made of cork that is fixed to an indoor wall
- a board made of cork that is fixed to an indoor wall on which you
can display messages, notes, etc.
- a game played on a pinball machine

b. Topics means
- the highest part or point of something
- a person or thing of the best quality
- a subject that you talk, write or learn about
- the highest or most important rank or position

c. A pin is
- the abbreviation for “personal identification number”
- a short thin piece of stiff wire with a sharp point at one end and a
round head at the other
- a small piece of metal
- a wooden or plastic object

d. Pinterest is
- a site
- a game
- a logo
- a LAN
(PAY ATTENTION: everything is in relation to the previous reading
comprehension: Pinterest)

4. Pair work. Translation. You and your partner translate into Italian
the following parts taken from the previous text and read them aloud
to your teacher. Compare the possible different translations and
discuss which is the best. Give reasons for your choice.
1. So the word “pinterest” is a
combination of “pin” and “interest”.
2. Pictures are divided into categories
and boards.
3. Once you have registered, the fun
begins.
4. You can connect your Pinterest
account to your Facebook profile,
Twitter account, Instagram, and so
on.
5. Everyone is pinning everything
everywhere.

277
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

&OLO

What is multimedia?
If you wish to add some pizzazz to output and your PC sessions, it means that you will want to
familiarize yourself with graphics software and multimedia.
That pizzazz could be anything from colorful illustrations for a cyber greeting card to full
multimedia class presentations involving sound, animation, and motion video.
Multimedia is an umbrella term that refers to the capability that allows the integration of
computer-based text, still graphics, motion visuals, animation, and sound. We can say that
Multimedia involves the communication of several different types of information, such as texts,
sound, graphics, and video animation, simultaneously over several different communication
media.
The concept of multimedia is not new. In fact, silent films became multimedia with the inclusion
of sound.
The so called multimedia revolution is not due to the inclusion of more media but the fact
it has become interactive. The key ingredients are hypertext and hypermedia, the links
that make interactive use of media feasible. So, interactive multimedia is the use of media such
as text, graphics, animation, video, and audio in an interactive way that allows a participant to
control it; the images may be controlled either using a mouse or a keyboard.
More and more, we are living in a multimedia world full of sound, colorful images, and motions.
Your multimedia experience is enhanced when you understand the scope of the software used
to create, view, and modify multimedia sounds, images, and video which may be considered aids
to communication.
A popular multimedia encyclopedia program created by the Microsoft Corporation is called
Microsoft Encarta. The text displayed on the screen contains hyperlinks, for example, words that
are linked to other texts.When the user clicks on a link, the linked text is displayed on the screen.
Encarta also has icons for displaying maps, charts, tables, pictures, sounds, animation, videos,
and interactive activities.

In hypertext, you follow


the links to additional
related information.

What is hypertext?
It is any word or phrase in an electronic document, which Columbus sailed west
can be used as a pointer, or link. Hypertext links are any text under the auspices of
or image that has been designated as a means of accessing Queen Isabella of Spain.
She commissioned...
related material.

Queen Isabella’s
husband was
King Ferdinand.

What is hypermedia?
It is the concept of using hypertext linking with other A biography of
King Ferdinand,
communication media, such as pictures and sound he reigned from...
Hypermedia links are often referred to as hyperlinks.

278
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Activities
1. Put in order the following sentences but be careful: you have to
add the necessary verbs.
1. graphics software / to familiarize / you / yourself / want / and multimedia / with /.
Solution: ......................................................................................................................
2. the communication / of information / different types / multimedia / of several /.
Solution: .....................................................................................................................
3. the / new / multimedia / concept / not / of /.
Solution: ......................................................................................................................
4. in / the use / interactive multimedia / interactive way / of media / an /.
Solution: ......................................................................................................................
5. a / are / multimedia / we / world / in /.
Solution: ......................................................................................................................
6. on the / hyperlinks / the / screen / displayed / text /.
Solution: ......................................................................................................................

2. Write questions with the prompts below. Add the necessary


language.
1. What / “pizzazz” / be / in this text? /
Solution: ......................................................................................................................
2. What / “multimedia” / refer to? /
Solution: .....................................................................................................................
3. How / silent films / become / multimedia? /
Solution: ......................................................................................................................
4. The so-called / multimedia revolution / be / due to / the inclusion / more media? /
Solution: ......................................................................................................................
5. What / key ingredients / be / make / interactive use / media / feasible? /
Solution: ......................................................................................................................
6. What / to communication / be / aids? /
Solution: ......................................................................................................................
7. There / a multimedia encyclopedia / be / program / created by /
Microsoft Corporation? /
Solution: ......................................................................................................................

3. Fill in the gaps in the following sentences with suitable words:


1. Multimedia is a term that refers to the capability that (1)............................ the
integration of computer-based text, still graphics, animation and sound.
2. The concept of (2)............................ dates back to silent films with the
(3)............................ of sound.
3. The concept of using (4)............................ is called hypermedia.
4. We are living in a (5)............................ world full of sounds, images and motions.
5. Microsoft Encarta is a popular (6)............................ .

279
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

&OLO

Big brother is watching you


Before the industrial revolution nearly everyone worked in agriculture;
communication was by word of mouth or paper.When the industrial revolution
came, life became more complicated: people started to work in factories and
factories needed offices to deal with administration. The amount of paperwork
needed for trade started to increase. As time went on, technology was used to
develop machines such as the typerwriter, telephone and telex machines and
eventually, the computer.
We are now in an “information age” and our
society is very dependent on information storage
and communication. Many people are now using
some form of information technology to help
themselves. Let’s consider the following example.
There is a new, revolutionary system making
use of cameras and computers to recognise
criminals and to alert the police. Although many
people see it as another important weapon in
the fight against crime, civil liberty groups are
alarmed that states could misuse the system and
adopt a ‘Big Brother’ attitude.
The idea is to have cameras constantly scanning
railway stations, shopping centres, car parks,
etc. The cameras pick out people as they pass
and the image is then compared with a database
of known criminals stored on the main computer. The scheme is to be operated
by local councils and if the system recognises someone wanted by the police,
a council officer is alerted and a code given relating to the suspect. The officer
then contacts the police who will know from the code who the person is.
If the person tries to disguise himself or herself by wearing a wig, a beard, or
sunglasses, the system may still be able to recognise them. The system gives a
percentage, which represents how near the image from the camera resembles
the photograph stored in the database.

280
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Activities
1. Examine this list of words and find their equivalents in the
previous text.
quasi lotta
trattare con fare un cattivo uso di
commercio, scambio riprendere
mettere in guardia parrucca
arma barba

2. Circle the right answer:


1. Before the industrial revolution
a. a lot of people worked in agriculture
b. some people worked in agriculture
c. nobody worked in agriculture

2. After the industrial revolution people started to work


a. in offices
b. on farms
c. in factories

3. Technology
a. was created after the industrial revolution
b. already existed before the industrial revolution
c. was created some years ago

4. Our privacy
a. is not controlled
b. may be controlled
c. is controlled

5. Big Brother is
a. an adult person
b. a camera
c. a talk show

3. Read the previous passage again and find out the following
information:
1. How life was before the industrial revolution
2. How communication was before the industrial revolution
3. Why paperwork started to increase after the industrial revolution
4. Why our society is dependent on information technology
5. What social and economic effects information technology has on our society

4. Translate into English the following sentences:


1. Viviamo nell’età dell’informazione e la nostra società dipende dalla custodia delle
informazioni e dalla comunicazione.
2. Telecamere e computers sono usati per riconoscere criminali e allertare la polizia;
essi sono un’arma importante nella lotta contro il crimine.
3. Ma dov’è la nostra riservatezza se le telecamere sono ovunque e riconoscono le
persone mentre passano?

281
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
&OLO
$ZRUOGRI $SSV-DYDDEULJKWVWDU

Programmable logic
controller
A Programmable Logic Controller,
PLC or Programmable Controller
is a digital computer used for
automation of electromechanical
processes, such as control of
machinery on factory assembly
lines, amusement rides, or light
fixtures. The abbreviation “PLC”
and the term “Programmable
Logic Controller” are registered
trademarks of the Allen-Bradley
Company (Rockwell Automation).
PLCs are used in many industries
and machines.

Unlike general-purpose computers,


the PLC is designed for multiple
input and output arrangements, extended temperature ranges, immunity to
electrical noise, and resistance to vibration and impact. Programs to control
machine operation are typically stored in battery-backed-up or non-volatile
memory. A PLC is an example of a hard real time system since output results
must be produced in response to input conditions within a limited time,
otherwise unintended operation will result.

The PLC’s purpose in life


The PLC is primarily used to control
machinery. A program is written for the
PLC which turns on and off outputs based
on input conditions and the internal
program. In this aspect, a PLC is similar to
a computer. However, a PLC is designed to
be programmed once, and run repeatedly
as needed. In fact, a crafty programmer
could use a PLC to control not only
simple devices such as a garage door
opener, but their whole house, including
switching lights on and off at certain
times, monitoring a custom built security
system, etc.
Most commonly, a PLC is found inside of
a machine in an industrial environment.
A PLC can run an automatic machine
for years with little human intervention.
They are designed to withstand most
harsh environments.

282
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Activities
1. Match the definitions with words in the text.
Memory which stores data even after the electrical current has been
stopped.
Rough, unpleasant.
Production method where products are manufactured by several people
in a row and each person performs a specific job.
Resist.
An electrical device used to create artificial light by use of an electric
lamp.
Clever at getting what you want.
Large mechanical devices that move people to create enjoyment. They
are frequently found at amusement parks and funfairs.

2. Read & complete with the provided words.


What is a PLC (Programmable Logic Controller)?
language computer relays system
logic lines events sensors

A Programmable Logic Controller, or PLC, is more or less a small computer with a built-
in operating system (OS). This OS is highly specialized to handle incoming events in real
time, i.e. at the time of their occurrence.

The PLC has input lines where sensors are connected to notify upon events (e.g.
temperature above/below a certain level, liquid level reached, etc.), and output lines to
signal any reaction to the incoming events (e.g. start an engine, open/close a valve, etc.).

The system is user programmable. It uses a language called “Relay Ladder” or RLL (Relay
Ladder Logic). The name of this language implies that the control logic of the earlier days,
which was built from relays, is being simulated.

3. Transform the Italian text into an English text with the help of the reading and the
exercise above. It does not necessarily have to be a literal translation.
Il controllore logico programmabile è un controllore per industria specializzato in origine
nella gestione o controllo dei processi industriali.
Il PLC esegue un programma ed elabora i segnali digitali ed analogici provenienti da sensori
e diretti agli attuatori presenti in un impianto industriale. Nel tempo, con la progressiva
miniaturizzazione della componentistica elettronica e la diminuzione dei costi, è entrato anche
nell’uso domestico; l’installazione di un PLC nel quadro elettrico di un’abitazione, a valle degli
interruttori magnetotermico e differenziale (salvavita), permette la gestione automatica dei
molteplici sistemi e impianti installati nella casa: impianto di riscaldamento, antifurto, irrigazione,
LAN, luci, ecc.

283
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

&OLO

Passive electronic components: transducers, capacitors


and resistors
Transducers
A transducer is a device that converts a signal in one
form of energy to another form of energy. Energy types
include (but are not limited to) electrical, mechanical,
electromagnetic (including light), chemical, acoustic or
thermal energy. While the term transducer commonly
implies the use of a sensor/detector, any device which
converts energy can be considered a transducer.
Transducers are widely used in measuring instruments.

Sensors and Actuators


There are many different types of transducers, but at
their most basic, they can be divided into two groups:
input (sensor) and output (actuator). Input transducers
take some sort of physical energy — such as sound waves,
temperature, or pressure — and converts it into a signal
that can be read. A microphone, for example, converts sound waves that strike its diaphragm into
an electrical signal that can be transmitted over wires. A pressure sensor turns the physical force
being exerted on it into a number or reading that can be easily understood.
Actuators take an electronic signal and convert it into physical energy. A stereo speaker works
by transforming the electronic signal of a recording into physical sound waves. Electric motors
are another common form of electromechanical transducer, converting electrical energy into
mechanical energy to perform a task.

Combining Transducers
Many devices work by combining sensors and actuators to convert energy from one form to
another and then back again. Audio cassettes, for example, are created by using a transducer to
turn the electrical signal from the microphone pick-up — which converted the sound waves into
an electrical signal — into magnetic fluctuations on the tape head.These magnetic fluctuations are
then read and converted by another transducer — in this case, the stereo system — to be turned
back into an electrical signal. This signal is then fed by wire to speakers, which turn the electrical
signal back into audio waves.
Ultrasound imaging also works by converting energy multiple
times. A piezoelectric transducer is used to convert electricity into
high frequency sound waves (ultrasound), which are focused by
the machine and aimed at body tissues. These waves bounce back
to the machine, where a transducer converts them into electrical
signals again. The signals are processed and sent to a monitor to
produce an image of the body tissues.
Other everyday tasks are possible through the use of energy that is
transformed multiple times. Turning on an electric light requires
electrical energy to be converted into visible light. That electrical
energy first had to be generated, however; an electrical generator
is a type of transducer that turns mechanical (or kinetic) energy
into electricity that can then be used by other devices.

284
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Activities
1. What are transducers? Why are they passive components? Explain the concept in
three lines.
......................................................................................................................................
......................................................................................................................................
......................................................................................................................................

2. Decide if the statements are true or false. If they are false, provide the correction.
T F
1. Transducers are devices used to transform one kind of energy to another.
2. When the transducer converts an electrical signal into another form of energy,
such as sound, light, mechanical movement, it is called a sensor.
3. When a transducer converts a measurable quantity (sound pressure level, optical
intensity, magnetic field, etc) to an electrical voltage or an electrical current we
call it a sensor.
4. Electric motors are an example of sensors.
5. Ultrasonography (an ultrasound-based diagnostic imaging technique used for
visualizing subcutaneous body structures including tendons, muscles, joints,
vessels and internal organs for possible pathology or lesions) is a typical example
of actuators.
3. Insert the appropriate words in the text.
switches gauge rotating detect
create produces converting convert
A sensor is used to .......................... a parameter in one form and report it in another form of energy,
often an electrical signal. For example, a pressure sensor might detect pressure (a mechanical
form of energy) and .......................... it to electricity for display at a remote .......................... .
An actuator accepts energy and .......................... movement (action). The energy supplied to an
actuator might be electrical or mechanical (pneumatic, hydraulic, etc.). An electric motor and a
loudspeaker are both actuators, .......................... electrical energy into motion for different purposes.
Combination transducers have both functions; they both detect and .......................... action. For
example, a typical ultrasonic transducer .......................... back and forth many times a second
between acting as an actuator to produce ultrasonic waves and acting as a sensor to detect
ultrasonic waves. .......................... a DC electric motor’s rotor will produce electricity and voice-coil
speakers can also act as microphones.

4. Transform the Italian text into an English text with the help of the reading and the
lexis you have learnt. It does not necessarily have to be a literal translation.
Un trasduttore (o sensore) è un dispositivo in grado di rilevare una grandezza fisica di qualsiasi
tipo (termico, luminoso, magnetico, meccanico, chimico, eccetera) e di trasformarla in una
grandezza di altro tipo, generalmente elettrica (tensione o corrente).
Ad esempio, un altoparlante stereo converte i segnali elettrici di una musica registrata in suono.
Molte persone pensano che un trasduttore sia un complicato dispositivo tecnico progettato per
raccogliere e trasferire informazioni. In realtà, tuttavia, tutto ciò che converte energia può essere
considerato un trasduttore.

285
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

&OLO

Capacitors
A capacitor is a passive electronic component that stores energy in the
form of an electrostatic field. In its simplest form, a capacitor consists
of two conducting plates separated by an insulating material called
the dielectric. The capacitance is directly proportional to the surface
areas of the plates, and is inversely proportional to the separation
between the plates. Capacitance also depends on the dielectric
constant of the substance separating the plates.

The standard unit of capacitance is the farad, abbreviated F. This is a


large unit; more common units are the microfarad, abbreviated μF (1
μF =10-6F) and the picofarad abbreviated pF (1 pF = 10-12 F).

Capacitors can be fabricated onto integrated circuit (IC) chips. They


are commonly used in conjunction with transistors in dynamic random
access memory (DRAM). The capacitors help maintain the contents
of memory. Because of their tiny physical size, these components have low
capacitance. They must be recharged thousands of times per second or the
DRAM will lose its data.
Large capacitors are used in the power supplies of electronic equipment,
including computers and their peripherals. In these systems, the capacitors
smooth out the rectified utility AC, providing pure, battery-like DC.

Activities
1. Answer the questions.
1. What is the difference between
capacitor and capacitance? Give
the respective definitions.
2. What are the characteristics of
capacitance?
3. What is the unit of capacitance
and how is it measured?
4. Look at the figures: what is the
difference between these two
types of capacitors?
5. What is the function of capacitors
in DRAM?
6. How high is the capacitance
of capacitors in DRAM? What
manoeuvre must be performed so that these components are really effective?
7. Where are large capacitors used?
8. What do you think ‘smooth out’ means?

2. Write a short text (130-150 words) on capacitors: their definition,


their functions, how they are used. Also add what you already knew
about capacitors.

286
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Resistors
A resistor is an electrical component that
limits or regulates the flow of electrical
current in an electronic circuit. Resistors
can also be used to provide a specific voltage
for an active device such as a transistor.

All other factors being equal, in a direct-


current (DC) circuit, the current through
a resistor is inversely proportional to its
resistance, and directly proportional to the
voltage across it. This is the well-known
Ohm’s Law. In alternating-current (AC)
circuits, this rule also applies as long as
the resistor does not contain inductance or
capacitance.

Resistors can be fabricated in a variety of


ways. The most common type in electronic
devices and systems is the carbon-composition resistor. Fine granulated carbon
(graphite) is mixed with clay and hardened. The resistance depends on the
proportion of carbon to clay; the higher this ratio, the lower the resistance.

Another type of resistor is made from winding Nichrome or similar wire on an


insulating form. This component, called a wire wound resistor, is able to handle
higher currents than a carbon-composition resistor of the same physical size.
However, because the wire is wound into a coil, the component acts as an
inductors as well as exhibiting resistance. This does not affect performance in
DC circuits, but can have an adverse effect in AC circuits because inductance
renders the device sensitive to changes in frequency.

Activities
1. Answer the questions.
1. What is the difference between resistor and resistance? Give the respective
definitions.
2. Explain Ohm’s Law.
3. What are the most common types of resistors? And what are their characteristics?
4. What does the figure below suggest? Can you explain
in what it represents?

2. See if you can calculate the value of each


of the colour codes in this resistor.
If you need help to calculate resistance values of resistors
essistors
you may find this site quite useful

http://www.hobby-hour.com/electronics/resistorcalculator.php

287
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

&OLO

Inductors
Inductor Basics
In a circuit diagram, an inductor is shown like this:
To understand how an inductor can work in a
circuit, this figure is helpful:
What you see here is a battery, a light bulb, a coil of
wire around a piece of iron (yellow) and a switch.
The coil of wire is an inductor. The inductor is an
electromagnet. If you were to take the inductor out
of this circuit, what you would have is a normal
flashlight. You close the switch and the bulb lights
up. With the inductor in the circuit as shown, the
behaviour is completely different.
The light bulb is a resistor. The wire in the coil has much lower resistance (it’s just wire), so
what you would expect when you turn on the switch is for the bulb to glow very dimly. Most of
the current should follow the low-resistance path through the loop.What happens instead is that
when you close the switch, the bulb burns brightly and then gets dimmer. When you open the
switch, the bulb burns very brightly and then quickly goes out.
The reason for this strange behaviour is the inductor. When current first starts flowing in the
coil, the coil wants to build up a magnetic field. While the field is building, the coil inhibits the
flow of current. Once the field is built, current can flow normally through the wire. When the
switch gets opened, the magnetic field around the coil keeps current flowing in the coil until the
field collapses.This current keeps the bulb lit for a period of time even though the switch is open.
In other words, an inductor can store energy in its magnetic field, and an inductor tends to resist
any change in the amount of current flowing through it.

Henries
The capacity of an inductor is controlled by four factors:
The number of coils - More coils means more inductance.
The material that the coils are wrapped around (the core)
The cross-sectional area of the coil - More area means more inductance.
The length of the coil - A short coil means narrower (or overlapping) coils, which means more
inductance.

Putting iron in the core of an inductor gives it much more inductance than air or any non-
magnetic core would.

The standard unit of inductance is the henry. The equation for calculating the number of henries
in an inductor is:
H = (4 * Pi * #Turns * #Turns * coil Area * mu) / (coil Length * 10,000,000)
The area and length of the coil are in meters. The term mu is the permeability of the core. Air
has a permeability of 1, while steel might have a permeability of 2,000.

288
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Activities
1. Match the highlighted words in the text with their definition.
1. (Or torch in British English) is a hand-held portable electric-powered light source.
2. Covering a part of something.
3. Radiate, shine.
4. A series of circles formed by winding up a length of wire, rope, etc.
5. A shape like a curve or circle made by a line curving right round and crossing itself.
6. Capability of a circuit to generate an electromotive force.
7. Vaguely, faintly.
8. Suddenly falls apart.

2. Answer questions.
1. What happens if you take the inductor out of the circuit represented in the figure in the previous page?
2. And if the inductor is present in the same circuit?
3. With the inductor in the circuit, describe what happens by switching on and off.
4. Describe the function of the inductor in a circuit.
5. How many factors control the capacity of an inductor? What are they?
6. What is the standard unit of inductance?

3. Choose the right answer.


1. A winding of wire can be called …
a. an inductor
b. a coil
c. a choke
d. all of the above

2. Which represents a true equivalent of an inductor?


a. an inductance in series with a resistance and a capacitance
b. a capacitance in parallel with the series combination of a resistance and an inductance
c. an inductance in parallel with the series combination of a resistance and a capacitance
d. the only quality of a real inductor is inductance

3. What are the properties that determine the inductance of a coil?


a. length of wire, number of turns, type of core material, length of core
b. number of turns, type of wire, length of core and cross-sectional area of core
c. type of core material, number of turns, cross-sectional area of core and length of core
d. type of core material, type of wire, number of turns and cross-sectional area of core

4. An inductor is in series with a voltage source, an open switch and a resistor.


The instant the switch is closed the inductor acts like
a. a short c. a resistor
b. an open d. a voltage source

5. When used as a filter, an inductor is


a. placed in series with the load and aids any current changes
b. placed in parallel with the load and aids any current changes
c. placed in parallel with the load and opposes any current changes
d. placed in series with the load and opposes any current changes

6. Which of the following is NOT one of the three major types of fixed inductor?
a. air core c. magnesium core
b. ferrite core d. iron core

289
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

&OLO

Diodes
A diode is a two-terminal electronic component with
asymmetric conductance, it has low (ideally zero) resistance
to current flow in one direction, and high (ideally infinite)
resistance in the other. Diodes were the first semiconductor
electronic devices.
The most common function of a diode is to allow an electric
current to pass in one direction (called the diode’s forward
direction), while blocking current in the opposite direction
(the reverse direction). Thus, the diode can be viewed as an
electronic version of a check valve ( that normally allows
fluid to flow through it in only one direction).
Diodes can be used in a number of ways. For example, a device
that uses batteries often contains a diode that protects the
device if you insert the batteries backward. The diode simply
blocks any current from leaving the battery if it is reversed -
this protects the sensitive electronics in the device.

Another monumental technology that’s related to the diode is


the transistor. Transistors and diodes have a lot in common.

Transistors
A transistor is created by using three layers
rather than the two layers used in a diode. A
transistor can act as a switch or an amplifier.
A transistor looks like two diodes back-to-
back. You would imagine that no current
could flow through a transistor because
back-to-back diodes would block current
both ways. And this is true. However, when
you apply a small current to the centre layer
of the sandwich, a much larger current can
flow through the sandwich as a whole. This
gives a transistor its switching behaviour. A
small current can turn a larger current on
and off.
A silicon chip is a piece of silicon that can hold thousands of transistors. With transistors acting
as switches, you can create Boolean gates, and with Boolean gates you can create microprocessor
chips.
The natural progression from silicon to transistors to chips is what has made microprocessors
and other electronic devices so inexpensive and ubiquitous in today’s society. The fundamental
principles are surprisingly simple.The miracle is the constant refinement of those principles to the
point where, today, tens of millions of transistors can be inexpensively formed onto a single chip.

290
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Activities
1. Decide if the following statements are true or false. Correct the false ones.
T F
1. A diode can act as a switch or an amplifier.
2. A diode is made by using two layers.
3. A transistor has three layers.
4. The first semiconductor electronic devices were the transistors.
5. The transistor is a sort of electronic version of a one-way valve .
6. A transistor looks like two diodes back-to-back.
7. A silicon chip can contain hundreds of transistors.
8. A reverse biased diode will act as an open switch.
9. A device is protected by a transistor against a backward insertion of batteries.
10. Transistors and diodes cost too much.
11. Asymmetric conductance is typical of diodes.
12.A diode can be tested with an ohmmeter.

2. Insert the right word.


1. A device that blocks current in one direction while letting current flow in another direction is called a
………........................ .
2. When ………........................ biased, an ideal diode would block all current.
3. A transistor looks like two diodes ………........................ .
4. A diode consists of a piece of semiconductor ………........................ , generally silicon or germanium.
This is divided into ………........................ distinct regions.
5. In a transistor, the ………........................ flow through the middle layer controls the flow through the
other two layers.
6. With transistors acting as switches, you can create Boolean ………........................ which allow to
create microprocessor ………........................ .
7. Some of the many uses of diodes are as ………........................ , current regulators or for conversion
of AC current to DC current. Transistors are used as switches or ………........................ .
8. Power supplies, lighting devices, scientific instruments, surge protectors, TVs, speakers, radios, cell
phones, computers and microwaves are just a few of the ………........................ where diodes and
transistors may be found.

3. Transform the Italian text into an English one with the help of the reading and the
lexis you have learnt. It does not necessarily have to be a literal translation.

Un diodo è un componente elettronico che permette il passaggio della corrente in una sola
direzione. Poiché il diodo lascia passare la corrente che circola in un senso, viene usato per
raddrizzare la corrente alternata degli impianti elettrici (che scorre periodicamente in un senso
e nell’altro del circuito) e trasformarla in corrente continua (che scorre invece in un solo senso).

Il transistor è essenzialmente costituito da una doppia giunzione p-n-p o n-p-n e viene usato
come amplificatore del segnale elettrico. È costituito da una piastrina di germanio o di silicio.
La regione mediana, più sottile, è detta base e le regioni da essa separate prendono il nome di
emettitore e di collettore. L’emettitore può inviare cariche al collettore attraverso la base e il
collettore invia la corrente al terminale in uscita.

291
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

&OLO

Other examples of electronic devices


We have already considered diodes and transistors. The following are some more types of
electronic active components.

An electronic amplifier, amplifier, or (informally) amp is an electronic device that increases the
power of a signal. It does this by taking energy from a power supply and controlling the output to
match the input signal shape but with a larger amplitude. In this sense, an amplifier modulates
the output of the power supply. Numerous types of electronic amplifiers are specialized to various
applications. An amplifier can refer to anything from an electrical circuit that uses a single active
component, to a complete system such as a packaged audio hi-fi amplifier.

A rectifier is an electrical device that converts alternating current (AC), which periodically
reverses direction, to direct current (DC), which flows in only one direction. The process is
known as rectification. Physically, rectifiers take a number of forms, including vacuum tube
diodes, mercury-arc valves, copper and selenium oxide rectifiers, semiconductor diodes, silicon-
controlled rectifiers and other silicon-based semiconductor switches.

An electronic oscillator is an electronic circuit that produces a repetitive, oscillating electronic


signal, often a sine wave or a square wave. Oscillators convert direct current (DC) from a power
supply to an alternating current signal.They are widely used in many electronic devices. Common
examples of signals generated by oscillators include signals broadcast by radio and television
transmitters, clock signals that regulate computers and quartz clocks, and the sounds produced
by electronic beepers and video games.

A light-emitting diode (LED) is a semiconductor light source. LEDs are used as indicator lamps
in many devices and are increasingly used for general lighting.

A thyristor is a solid-state semiconductor device with four layers of alternating N and P-type
material.They act as bistable switches, conducting when their gate receives a current trigger, and
continue to conduct while they are forward biased (that is, while the voltage across the device is
not reversed). A thyristor is not a proportional device like a transistor. It operates only fully on or
fully off, making it unsuitable as an analogue amplifier.

Activities
1. Find out the right type of electronic device.
1. They have the special property of producing light when current flows through them.
2. It is an electronic circuit that produces a repetitive signal.
3. This type of device changes AC inputs to DC inputs.
4. It is an electronic device that makes sounds or radio signals louder.
5. It is used for producing AC current from a DC power supply.
6. While this device can be turned on or off, it can also regulate power using something called phase
angle control. This allows the amount of power output to be controlled by adjusting the angle of the
current input. An example of this is a dimmer switch for a light.
7. It is a device that produces a light on electrical and electronic equipment.
8. This electronic device is a four-layer semiconductor that is often used for handling large amounts of
power.

292
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

N a n o t e c h n o l o g y (sometimes
shortened to “nanotech”) is the manipulation
of matter on an atomic and molecular scale.
The earliest, widespread description of
nanotechnology referred to the particular
technological goal of precisely manipulating
atoms and molecules for fabrication of
macro scale products, also now referred
to as molecular nanotechnology. A more
generalized description of nanotechnology
was subsequently established by the National
Nanotechnology Initiative, which defines
nanotechnology as the manipulation of matter
with at least one dimension sized from 1 to 100
nanometres. This definition reflects the fact that
quantum mechanical effects are important at
this quantum-realm scale, and so the definition
shifted from a particular technological goal to a research category inclusive of all types of research
and technologies that deal with the special properties of matter that occur below the given size
threshold. It is therefore common to see the plural form “nanotechnologies” as well as “nanoscale
technologies” to refer to the broad range of research and applications whose common trait is size.
Because of the variety of potential applications (including industrial and military), governments
have invested billions of dollars in nanotechnology research.Through its National Nanotechnology
Initiative, the USA has invested 3.7 billion dollars. The European Union has invested 1.2 billion
and Japan 750 million dollars.
Nanotechnology as defined by size is naturally
very broad, including fields of science as
diverse as surface science, organic chemistry,
molecular biology, semiconductor physics,
micro fabrication, etc. The associated research
and applications are equally diverse, ranging
from extensions of conventional device physics
to completely new approaches based upon
molecular self-assembly, from developing new
materials with dimensions on the nanoscale to
direct control of matter on the atomic scale.
Scientists currently debate the future
implications of nanotechnology.
Nanotechnology may be able to create many
new materials and devices with a vast range
of applications, such as in medicine, electronics, biomaterials and energy production. On the
other hand, nanotechnology raises many of the same issues as any new technology, including
concerns about the toxicity and environmental impact of nanomaterials, and their potential
effects on global economics, as well as speculation about various doomsday scenarios. These
concerns have led to a debate among advocacy groups and governments on whether special
regulation of nanotechnology is warranted.

293
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

&OLO

Activities
1. Match the highlighted words in the text with their definitions.
worry, interest = judgment day; end of the world =
move, transfer = defence, support =
authorize = doorstep, entrance =

2. Answer questions.
1. In the text there are two definitions of nanotechnology. Write both. Which of the
two is clearer for you?
2. Why did the National Nanotechnology Initiative propose a broader definition?
3. What are the implications of the definition made by the National Nanotechnology
Initiative?
4. Is there a difference between nanatechnologies and nanoscale technologies?
Explain.
5. Why have governments invested billions of dollars in nanotechnology research?
6. What fields of science does nanotechnology include?
7. What can you say about research and applications of nanotechnology?
8. What are the future implications of nanotechnology?
9. What types of problems are raised by nanotechnology?
10. What do governments do in order to try to solve problems?

3. With the help of the answers to the previous exercise write a text
containing the following paragraphs:

t Definition/s of nanotechnology.
t What the definitions imply.
t The interest of the governments.
t The fields of science.
t The fields of research and applications.
t The future: pros and cons.
t The future: what governments do.

4. What do the various


figures in this page and
in the previous ones
suggest?
Share your opinions
with your partner.

294
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

On the nanoscale
Macro photograph of Ferrofluid flowing
from one magnet to another. Ferrofluid
is a colloidal liquid of nanoscale
particles in a carrier fluid that becomes
magnetized by approaching a magnet.
On the nanoscale, we can potentially put these
atoms together to make almost anything.
In a lecture called “Small Wonders: The World
of Nanoscience,” Nobel Prize winner Dr. Horst
Störmer said that the nanoscale is more
interesting than the atomic scale because
the nanoscale is the first point where we can
assemble something - it’s not until we start
putting atoms together that we can make
anything useful.
One of the exciting and challenging aspects
of the nanoscale is the role that quantum
mechanics plays in it. The rules of quantum mechanics are very different from classical physics,
which means that the behavior of substances at the nanoscale can sometimes contradict common
sense by behaving erratically. You can’t walk up to a wall and immediately teleport to the other
side of it, but at the nanoscale an electron can - it’s called electron tunneling. Substances that are
insulators, meaning they can’t carry an electric charge, in bulk form might become semiconductors
when reduced to the nanoscale. Melting points can change due to an increase in surface area.
Much of nanoscience requires that you forget what you know and start learning all over again.
So what does this all mean? Right now, it means that scientists are experimenting with substances
at the nanoscale to learn about their properties and how we might be able to take advantage
of them in various applications. Engineers are trying to use nano-size wires to create smaller,
more powerful microprocessors. Doctors are searching for ways to use nanoparticles in medical
applications. Still, we’ve got a long way to go before nanotechnology dominates the technology and
medical markets.

Activities
1. Take notes on the following. Then write a text that explains the nanoscale, its
implications and what the future may be.

What Dr. Stormer says

The challenge coming from the role of


quantum mechanics in the nanoscale
Electron tunnelling, insulators becoming
semiconductors etc.
Scientists’ experiments and researches

295
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

*ORVVDU\

A programmer to use English like abbreviations for machine


Abacus: Pallottoliere. language instructions.
A calculating device that only holds information. Asynchronous transmission: trasmissione asincrona.
Access: Accesso. Transmission in which time intervals between transmitted
The ability to read data from storage or write data into storage characters may be of unequal length. Transmission is
Accumulator: Accumulatore. controlled by start and stop elements at the beginning and the
A register in the arithmetic-logic unit of the CPU that is end of each character. Also called start-stop transmission.
used as a working area for computations. Also known as B
accumulator register. BACKBONE:
The main traffic route of a network, which is usually the
Action diagram.
fastest
A CASE tool used to develop application programs rapidly
and composed of brackets into which statement with Back-up: rimpiazzo, riserva.
pseudocode like instructions are written. A duplicate safety copy of the data stored on a diskette
or disk; also a second computer component or system for
Ada:
FNFSHFODZVTFrCBDLVQDPQZ CBDLVQTZTUFN
A high-level programming language named after Lady Ada
Byron who was Charles Babbage’s assistant. Bandwidth: larghezza di banda.
The range of frequencies assigned to a channel system; the
Address: indirizzo.
difference expressed in Hertz between the highest and lowest
The number or name that identifies a memory location.
frequencies of a band.
Address register.
BASIC Beginner’s All purpose Symbolic Instruction Code.
Register in the control unit of the CPU that is used to hold the
An easy to learn interactive high-level programming language
address of the memory location currently being referenced by
developed by John Kemeny and Thomas Kurtz at Dartmouth
the CPU. Usually abbreviated as AR.
College in the mid-1960s.
Address space: spazio indirizzabile.
Batch processing: elaborazione a lotti, elaborazione a
The set of all possible addresses available to a program.
blocchi.
Algorithm: algoritmo. A form of data processing in which data is collected entered
A sequence of steps to be followed for performing a task. into the computer and processed in groups called batches.
Analog computer: elaboratore analogico. Binary digit: cifra binaria.
A computer in which quantities are represented by physical One of the two possible digits (0 and 1) in binary notation.
variables. A binary digit is the smallest unit of information that can be
ANSI: American National Standard Institute. used in a digital computer. Usually abbreviated as bit
A government agency in the USA that sets uniform standards BIOS:
for various industries. An acronym for Basic Input/Output System, this is the part of
APPLET: an operative system that deals with peripheral devices such
A short application program, usually written in Java, which as keyboards, displays, and disk driver.
adds enhancement or functionality to a Web page. BIT (Binary digIT):
Applications programs : programmi applicativi. The smallest unit of information that a computer can
Programs that solve various users’ computing needs. recognize, can be either a 1 or a 0.

Architecture: architettura. Bit map.


A special memory used to represent dots or pixels on a
The design of a computer system.
monitor and their associated intensity of colour.
Arithmetic and Logic Unit (ALU): unità logica ed
Block: blocco.
aritmetica.
A subdivision of a track on magnetic medium that can store
Component of the CPU that performs arithmetic calculations
hundreds of words of information. Also called sector.
and logical tests.
Bootstrapping: partenza a freddo.
ARPA (Advanced Research Projects Agency): A technique permitting a system to bring itself into an
A federal government research branch that influenced the operational state by means of its own action.
formation of the Internet. Buffer.
ARPAnet: A temporary storage area for data, often used to hold data
The early network formed by ARPA to connect researchers. It moving between devices such as the CPU and the screen or
was the backbone of early Internet development. printer.
Array: schiera; insieme. Bug: malfunzionamento.
A way of organizing pieces of information. There are two “baco” A Computerese term for an error.
types of array: the vector and the matrix. The vector is a one-
Bus: canale comune.
dimensional array, whereas the matrix is two-dimensional.
A flat, flexible cable containing many individual transmission
Artificial intelligence (AI): intelligenza artificiale. lines, or wires. Used to interconnect computer system
A growing set of computer problem-solving techniques that components and provide communication paths for addresses,
are being developed to imitate human thought or decision- data, and control information to be transferred between
making processes. components.
ASCII code : American Standard Code for Information Bus network. rete a bus.
Interchange codice ASCII A single multidrop line shared by many nodes.
ASCII is a 6, 7 or 8 bit code used to represent letters, decimal Byte.
numbers, special symbols and certain control functions. A unit of data storage used to hold a set of bits (usually 8, 16,
Assembler: assemblatore. or 32, depending on the computer). A byte can hold the binary
A program that translates assembly language programs into code for a letter, a digit, or a special character.
machine language programs. C
Assembly language: linguaggio assemblatore. A structured high-level programming language resembling
A machine-dependent programming language that allows a Pascal; C was developed at Bell Laboratories and used to

296
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

program the UNIX operating system. visit and interact.


Cache memory: memoria cache D
A very high speed memory that acts as a buffer between the DATA: DATI
slower main memory and the CPU of a computer. A given thing, a fact. Often used to mean the facts that will
CAD Computer Aided Design be given to the computer to be processed. Technically, data is
Using the computer for designing a wide variety of things, plural, and the singular is datum. However, data is often used
from electronic circuits to car bodies and skyscrapers. as a singular noun.
Cathode ray tube: tubo catodico. DBMS (DATABASE MANAGEMENT SYSTEM):
A type of vacuum tube in which electron rays are projected A set of computer programs that controls the creation,
on a fluorescent screen; the principal part of a television or maintenance, and utilization of databases.
computer display unit. Abbreviated CRT. Debugging.
Central Processor Unit (CPU): unità centrale. Removing errors from a program.
That part of every digital computer system that contains the Digit. Cifra.
circuits required to guide the computer through the various A character used to represent one of the nonnegative integers
steps it takes to solve problems. smaller than the base of a system of positional notation. Also
CGA Colour Graphic Adapter. known as numeric character. In a decimal system any of the
A graphic standard. numbers from 0 to 9.
Character set: set di caratteri. Direct access: Accesso diretto.
The set of characters (letters, numbers and special symbols) The process of reading or writing information without the
which are found on a typewriter keyboard. They differ from need for reading everything that comes before it; this process
country to country. requires random access devices. Also called random access.
CHAT ROOM: Disk drive. Unità a disco.
A place on the Internet where users can communicate with The storage device that rotates, reads from, and writes to a
others in real-time. recording medium, normally a disk or diskette.
Chip: microcircuito DOCUMENTATION: DOCUMENTAZIONE
An integrated circuit on a very small slice of semiconducting The manual, description, and instructions that accompany
material, such as silicon. software programs and hardware.
Client. DOMAIN NAME: NOME DEL DOMINIO/CAMPO
In a distributed computer environment, a process that issues a The name assigned to a computer on the Internet.
request for a service; for example a request to print a file. The
request is processed by a server. DRIVER:
The name given to the program that allows communication
CLIP-ART: between the operating system and a peripheral device.
Computerized images available for inclusion in documents.
Duplex
CMOS processor. Simultaneous two-way independent transmission in both
Processor built according to the CMOS technology (CMOS is directions. Also referred to as full-duplex.
the acronym of Complementary Metal-Oxide Semiconductor).
DVD (DIGITAL VERSATILE DISC):
Coaxial cable : Cavo coassiale. A CD-sized disk that can contain up to 16 gigabytes of data,
A single wire cable with a very high capacity (large
which is commonly used for video.
bandwidth); commonly used in local area networks.
E
COBOL Common Business Oriented Language.
EBCDIC
A high-level programming language developed for business
Extended Binary Coded Decimal Interchange Code codice
data processing applications in 1959.
EBCDIC An 8-bit character code used primarily on large IBM
Code : codice. computers. The code provides for 256 different bit patterns.
A term used to describe a set of computer programming
ELECTRONIC COMMERCE (E-COMMERCE): COMMERCIO
instructions or it may also refer to a bit pattern used to
ELETTRONICO
represent characters of data.
The online ability to buy, sell, and advertise goods and
Control unit: unità di controllo. services.
The part of the CPU responsible for retrieving and decoding
instructions and for controlling data movements throughout Electronic mail: posta elettronica.
the computer system. Abbreviated as CU. Messages sent between subscribers electronically via a public
or private data communication system. It involves the use of
Control structures: strutture di controllo. computer systems, network and terminals. Messages for each
Features of programming languages that enable programmers recipient are allocated in storage areas called mailbox.
to specify the sequencing, selection, and repetition of
operations; programmers use these structures as building Encryption.
blocks to construct neat, understandable, and debuggable The operation of enciphering or scrambling data according
programs. to specific rules so that it cannot be read without knowledge
of these rules, as used in the transmission of data over
CRACKERS:
communication lines.
Persons who break into other people’s systems for either fun
or profit, or with malicious intent. ENIAC
A digital computer built in 1944, programmed by using wires
CRYPTOGRAPHY: CRITTOGRAFIA
to connect relay switches.
The science of making messages unintelligible to all except
those for whom they are intended. ETHERNET:
A very fast local area network protocol.
Cursor Cursore.
A pointer or marker displayed on the computer monitor that Expansion slot. Slot di espansione.
indicates where the next character will appear. A slot where you can mount additional circuit boards to
CYBERSPACE: SPAZIO DI REALTÀ VIRTUALE expand the features of a computer system.
A virtual place where millions of people can simultaneously

297
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

*ORVVDU\

F HUB: CENTRO/PERNO
FETCH/EXECUTE CYCLE: CICLO DI ESECUZIONE A device that connects several computers within a local area.
The operation in which an instruction is moved from internal I
storage to a special register for decoding, then executed. IMAGE ENHANCEMENT: MIGLIORAMENTO
FIBER-OPTIC CABLE: CAVO A FIBRA OTTICA DELL’IMMAGINE
A cable made of fine strands of glass fiber that carries digital Processing a digital image to highlight or enhance particular
signals using pulses of light instead of electricity. informational aspects.
Field: campo. IMAGE RESTORATION: RESTAURO/RICOSTRUZIONE
A group of related characters. DELL’IMMAGINE
File. Processing an image to eliminate known flaws or
A collection of related data treated as a simple item. degradations.

Flowchart: diagramma di flusso. Information system: sistema informativo.


A series of standard symbols that represent the steps of an The whole of technologies, business procedures, practices and
algorithm pictorially. policies that generate information, as well as the people who
work with that information.
Font
A complete set of letters, numerals, and symbols of the same Ink-jet printer: stampante a getto d’inchiostro.
type style of a given typeface. Examples of typefaces are A non impact type printer which operates on the principle of
Baskerville, Century, and Helvetica… Examples of fonts are a jet of quick drying ink sprayed from a print head forming
Baskerville Italic, Baskerville Bold, and Baskerville Bold Italic characters on the surface of the paper.

Format: Formato. Input device: dispositivo di ingresso.


The way in which data or information is structured or The hardware device that receives instructions and data to be
arranged in a specific device (disk, tape, display, printout). entered into the computer.
It can also refer to the operation of setting up a disk before Interface: interfaccia.
recording data on it. An electronic assembly that connects an external device, such
FORMATTING A DISK: FORMATTARE UN DISCO as a printer, to a computer.
Also called initializing a disk. Setting up a disk to be used by Interpreter
a particular operating system. Note: formatting a disk erases It is a translator program that runs a source program directly
everything currently on that disk. without first translating it into machine language.

FREE DOWNLOADS: PROGRAMMI, IMMAGINI ECC. IP (INTERNET PROTOCOL):


SCARICATI GRATIS The protocol suite used by the Internet. IP along with TCP
Programs, images, sound, or video clips that can be (Transport Control Protocol) consists of more than 100
downloaded from the Internet and used freely, without cost. protocols.

FTP (FILE TRANSFER PROTOCOL): IRC (INTERNET RELAY CHAT):


An Internet service used to transfer files from one computer Internet chat rooms where people communicate in real time
to another. by typing messages, which are displayed to anyone currently
logged into the chat room.
G
General-purpose computer: elaboratore di uso generale. ISP (INTERNET SERVICE PROVIDER):
A computer capable of performing whatever tasks it can be A company or organization that offers connections to the
programmed to do. Internet.

Graphic standard K
a standard which defines graphic display capability like (KILOBYTE):
resolution, colour etc. A unit of storage holding 1,024 bytes.

GUI Graphical User Interface. Keyboard: tastiera.


Generically the windowing environment and its related A device similar to a typewriter keyboard, used to input data.
graphic capability. KEYWORD SEARCH:
H This kind of search uses a technique called an inverted index,
HACKERS: which indexes every words in every document it finds on
Persons who use their considerable self-taught expertise to the Web. To initiate this search, you type in some keywords
solve computer problems, extracting needed information and relevant to your topic.
improving system performance. KNOWLEDGE ACQUISITION: ACQUISIZIONE DI
Hard copy: copia permanente. CONOSCENZA
Information printed on paper. Using input (human’s senses, computer’s input units) to
collect a base of information.
Hard disk: disco fisso.
A disk, such as a Winchester disk, which is not flexible. It is L
more expensive than a diskette but capable of storing much LASER:
more data. It is the acronym for: Light Amplification by Stimulated
Emission of Radiation. A device capable of producine a tightly
Hardware packed, narrow beam of high-intensity light.
the physical equipment that makes up a computer system.
Laser printer: stampante a laser.
HARDWIRING: The fastest nonimpact printer; it uses the precise light of laser
A process of using a soldering iron to create electronic circuit beams to guide crisp dots of light to exact locations on a page.
boards with the connections needed to perform specific tasks.
LINK: COLLEGAMENTO
High-level language: linguaggio ad alto livello. A physical connection between nodes of a network.
A programming language in which programmers write
statements that appear similar to everyday English and use Local Area Network: rete locale.
familiar mathematical notations, e.g. Basic, Fortran. The linking of several computers, often minicomputers so
that they are able to communicate with each other to form an
HOST: inter-office or inter-site network within a limited area.
A computer that accepts remote logins.

298
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

LOOP: ANELLO/CICLO Open system


A sequence of instructions repeated one or more times when A system that implements specifications for interfaces
the program is executed. servicing and supporting formats to enable proper application
Low-level language linguaggio a basso livello. software to be ported across a wide range of systems with
A computer language that uses mnemonics. Each instruction minimal changes.
is translated into a machine code instruction that the Operating system sistema operativo
computer directly understands. It can also refer to machine The software system that manages the computer hardware
code itself. and makes it more “friendly” and usable to authorized com-
M puter users; the set of system programs on a computer.
Machine code: codice macchina. Optical Character Recognition (OCR) riconoscimento
The code that corresponds to the machine language and ottico di caratteri
therefore is immediately understood by the computer. An input technology in which handwritten or typewritten
Machine language: linguaggio macchina. characters and symbols are read, using computerized photo-
Language consisting of strings of 0’s and 1’s that a computer optical techniques, and converted into computer codes.
can directly understand. Optical disk. disco ottico
Mainframe: grosso elaboratore, mainframe. A disk that stores data in a digital form for use with audio disk
A computer that is physically large and has the capability to players, video disk players and computer systems. Disks are
perform applications requiring large amounts of data. ‘written to’ by a laser beam which produces tiny pits in the
disk surface. Another type of laser ‘reads’ the disk.
Mass storage: memoria di massa.
A device capable of storing large amounts of data. Output device dispositivo di uscita.
The hardware device that transfers information to peripheral
Memory: memoria. devices for display or auxiliary storage.
The part of the computer used to store, or “remember”,
information. All computers have some internal memory, P
located within the system, close to the central processor. To Packet pacchetto.
supplement internal memory, external memory can be added A group of bits including data and control elements which is
in the form of mass storage devices. switched and transmitted as a composite whole. The data and
control elements and possibly error control information are
Monitor arranged in a specified format.
An operating system or section of it that is capable of
examining and controlling a computer system and taking Peripheral periferica
action in the event of fault or failure. The word is also used to A device such as a printer or disk drive, that is electronically
describe a video display unit of high quality definition. but not physically connected to the processor or main
memory.
MULTIMEDIA:
The use of more than one medium or means to communicate Personal computer
information. A complete computer system that can fit on a desk top and is
economical enough to be dedicated to the use of one person.
N
NASSI-SCHNEIDERMANN CHART: PIRATED SOFTWARE:
A schematic representation of the organization of a computer Software that a user does not have a legal right to have or use.
program. Pixel.
Natural language. Contraction of picture element. One of thousands of dots or
Natural language systems attempt to make computers capable picture elements used to form characters or images on a video
of processing language the way people normally speak it, display screen.
instead of requiring specialized programming languages. PLATTER:
NETWORK: RETE A rigid metal disk on which data is stored in a hard drive”
Communication channels connecting a collection of Plotter.
computers, terminals, printers switches, and other devices. A device that draws charts and graphs from computer stored
Node: nodo. data.
An end point of any branch of a network, or a junction POINT-TO-POINT NETWORK: RETE PUNTO A PUNTO
common to two or more branches. A network whose connection is direct rather than indirect.
Numeric pad. PORT: PORTA
A special set of number keys, similar to those found on A connecting path into and out of a computer; examples on a
a calculator, usually located on the right side of terminal PC are the serial and parallel ports.
keyboards. PROTOCOL: PROTOCOLLO
O Pertaining to networks, a protocol is a set of rules that must be
Object code codice oggetto followed by computers for them to communicate.
The form of a program produced by a relocatable assembler Q
or compiler, and distinguished by having relative addresses QUERY LANGUAGE:
instead of symbolic ones. A fourth-generation computer language developed specifically
Object oriented method to request information from batabases.
A method that combines description of data and behaviour in QUICK TIME:
a single entity called an object. It is becoming very popular A software technique used to convert standard video to a
because it provides abstraction mechanisms that deal with the format that can be edited and played back on a PC.
complexity of large systems.
R
OPCODE (OPERATION CODE): RAM Random Access Memory memoria ad accesso casuale.
The part of an instruction that tells what operation is to be A form of memory from which data can be read or written
performed. to randomly, i.e. nonsequentially. It is commonly used as
OPEN- SOURCE SOFTWARE: internal memory and is volatile.
Software that reveals the complete , original source program Random access Accesso casuale.
so that knowledgeable users can customize it. An access method by which units of information are directly

299
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

*ORVVDU\

accessed by means of their known address. Topdown design


Real-time system: Sistema in tempo reale. A method of software design in which program modules are
A type of computer system in which the most important goal first defined at a high level of hierarchy and then detailed at
is responsiveness; an example is an air traffic control system, lower levels.
where avoiding a collision might require immediate action on Transistor.
the part of the computer system. An electronic circuit element developed by Bell Laboratories
Record. in 1948; it spawned the second generation of computers.
A group of related fields. Translator program programma di trasposizione
RELATION: A program that translates programs from one language, called
A two-dimensional table made up of columns and rows of the source language, to another language, called the object
data. Each column stores the data in one field; each row stores language; compilers and assemblers are translator programs.
the information in one record. TROJAN HORSE:
Repetition structure struttura a ripetizione Involves the insertion of false information into a program in
Indicates that certain operations are to be repeated until some order to profit from the outcome.
terminating condition is met. TWISTED PAIR: UN PAIO DI FILI INTRECCIATI
Resolution risoluzione. A pair of connecting wires that are twisted together to help
The quality and intensity at which a monitor can display reduce electrical interference.
graphics. Resolution is measured horizontally and vertically U
in pixels. UNIX
ROM Read-Only Memory A popular operating system developed by Bell Laboratories;
Memory from which data or programs can be read but not it is a multi-user, multitasking system originally used with
written. 16-bit minicomputers; it is evolving into a possible standard
ROUTER: operating system for personal computers.
A network node, connected to two or more networks, that USB (UNIVERSAL SERIAL BUS):
forwards packets from one network to another. A serial electronic interface used for connecting peripheral
Run time error errore di esecuzione devices to a program.
Errors that occur while a program is executing. Utility program
S Standard useful programs that perform common routine tasks
Scanner. and general housekeeping operations in a computer system
A device able to capture an image and input it to a computer. such as sorting data and copying files.

Soft copy copia temporanea. V


The output of a display unit that produces transient data (such Vacuum tube valvola (termo ionica)
as an image on a screen), as opposed to a permanent record. A now obsolete electronic component housed in a glass
casing and used to modify the state of electronic signals in
Software. computers.
The set of instructions that tell the central processing unit
what data to process, how to process it, and where to put it VALIDATION: CONVALIDA/CONFERMA
when processing is complete. The process of checking out a software/hardware model to
make sure it results in correct answers.
Source program. programma sorgente
The form of a program as it is originally written by the Virtual memory: memoria virtuale.
programmer. The set of storage locations in physical memory and on disk
that are referred to by the operating system as a unique main
Special purpose computer. elaboratore dedicato memory.
A computer designed to solve a closely related group of tasks.
VIRUS:
Spreadsheet. foglio elettronico. An unwanted program that spreads by attaching itself to other
A program in which data is held on a large “ sheet “ in legitimate programs.
computers’ memory. The “sheet” consists of columns and rows
and the user can enter text, numbers or formulas as required. VOICE RECOGNITION DATA ENTRY:
It is used mostly for financial applications. The collection and recording of data by speaking into a
microphone of a terminal.
STATISTICAL ANALYSIS:
Manipulating data using numerical methods to make the data W
more meaningful as information. WEB BROWSER:
A program that allows the user to browse or navigate to World
SUBDOMAINS: SOTTODOMINI Wide Web.
Segments of a domain. They are separated by periods. The
leftmost segment(s) identify the Web server for that computer. WEB SITE: SITO WEB
The rightmost segment is the top-level domain. A group of related Web pages.

T Window
Tape. nastro A graphic feature of some operating systems that allows to
Magnetic tape made of plastic and covered on one side with a draw a window on a part of the screen that contains a specific
thin coating of metal oxide, on which data is recorded in the applications.
form of magnetic polarized spots representing 1’s and O’s. Word parola
Telecommuting. A basic unit of data that consists of a predetermined number
The ability to work at home with the help of a personal of bits that are treated as an entity.
computer, a modem and a data communications network. Word processor sistema di gestione testi
Template. Sagoma. A computer dedicated to, or an application program that
A plastic guide consisting of cut-out symbols used as an aid provides capabilities for, entering, editing, manipulating, and
for preparing flowcharts. storing texts.

Timesharing. Partizione del tempo. WORM: BACO


A method of sharing a computer in which several users can A piece of programming code that can infiltrate a legitimate
access the central processor through different terminals. file and alter or destroy data.

300
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Language study
Present simple
Form

POSITIVE NEGATIVE INTERROGATIVE


I I I
you work you don’t work Where do you
he he he
she she doesn’t Where does she
works
it here it works here it work?
we we we
you work you don’t work Where do you
they they they

Example:
I work in London
Bob works in New York
They come from Toronto
We teach maths
My sister teaches I.T.
I don’t work in New York
She doesn’t teach maths
Do you work in London? Yes, I do.
Does your sister teach I.T.? No, she doesn’t

Use
We use the Present Simple to express:
a. A habit. They get up at 7.
Mary drinks tea every day.
b. A fact which is always true. The earth goes round the sun.
I come from the U.S.A.
c. A fact which is true for a long time. He works in a factory.
We live in London.
d. How often we do things. How often does Mary go to the dentist?
Bob usually goes to the cinema twice a week.

Some verbs are usually used in the Present Simple only. They express a state, not an activity.
They are: like – think – agree – love – hate – understand.

Practice
1. Complete the sentences using the following verbs go(es) – speak(s) – live(s) –
take(s) – drive(s) – drink(s).
1. The earth goes round the sun
2. Julie .......................... French very well.
3. My grandparents .......................... in a cottage.
4. The Olympic Games .......................... place every four years.
5. Bob is a bus driver. He .......................... a bus.
6. I don’t often .......................... tea.

2. Put the verb into the correct form.


1. I don’t (not/drink) coffee very often
2. What time .......................... (the supermarket / open)?
3. Mary’s got a computer, but she .......................... (not/use) it much.
4. “What .......................... (you/do)?” “I am a programmer”.
5. Vegetarians .......................... (not / eat) meat.
6. An interpreter .......................... (translate) from one language into another.

301
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia
/DQJXDJHVWXG\
$ZRUOGRI $SSV-DYDDEULJKWVWDU

Present continuous
Form: am / are / is + ing

POSITIVE NEGATIVE INTERROGATIVE


I am (I’m) I Am I
am (I’m)
you are (‘re) you are (‘re) Are you
he he he
she is (‘s) she Is she
is (‘s)
It working not working it working?
it
we we we
you are (‘re) you are (‘re) Are you
they they they

Example:
Bob is playing tennis
I’m reading a book
It isn’t raining now
Are the boys playing?
What are you doing?

Use
We use the Present Continuous to express:
1. An activity happening now.
The water is boiling. Can you turn it off?
The boys are playing tennis now.
2. An activity happening at or around the time of speaking.
My sister is studying IT at university.
They want to work in England, so they are learning English.
3. Temporary situations.
Paul is living with me until he finds a place of his own.
“You’re studying hard today”. “Yes, I have a lot of things to revise”.
4. A planned future arrangement.
I’m meeting Mr Parker at 3,30 tomorrow
What are you doing this evening?

Practice
1. Put the verb into the correct form (present continuous).
1. “What .......................... (you/do)?” “I .......................... (write) a letter.
2. She .......................... (type) the last line of the letter.
3. He .......................... (read) an English novel at the moment.
4. What language .......................... (they/speak)?
5. Let’s go out. It .......................... (not/rain) now.

2. Are the underlined verbs right or wrong? Correct the wrong ones.
1. The water boils. Can you turn it off? .......................... (is boiling) ..........................
2. That man is trying to open the door of your house. ..........................
3. I must go home now. It gets late. ..........................
4. “Booob! Come down! It’s time to leave”. “O.K., I come” ..........................
5. She usually goes to work by car ..........................
6. Water boils at 100 degrees. ..........................
7. I’m getting hungry. Let’s go and have a pizza. ..........................

3. Put the verb into the correct form. (present simple or continuous).
1. Bob is very good at languages. He .......................... (speak) three languages fluently.
2. “How is your English?” “Oh! I think it .......................... (improve)
3. What .......................... (your sister/do)? She is a teacher, but she .......................... (not/work) at the moment.
4. What .......................... (you/think) about my plan?
5. Sara .......................... (play/cards) with Bob?

302
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

4. Read the sentences and write PS (Present Simple) or PC (Present Continuous).


1. .......................... I have a piano lesson on Mondays.
2. .......................... Bob works for a bank.
3. .......................... She is staying in Paris for a few days.
4. .......................... Rome is the capital of Italy.
5. .......................... Are you listening to me?

Noun phrases
In technical English there are groups of words used to define one concept that can contain either nouns only or
nouns plus adjectives, such as Computer System, Computer Processing Unit, I/O Computer terminal interface,
etc. They can cause confusion due to their word order, but remember: the most important word in English
comes last, the other words take the function of adjectives which define the main word in detail.
1. A computer system = a system of computers
2. Computer aided design = design which is aided by the computer
3. A high-speed memory system = a system of memory which has a high speed

Practice
Find noun groups for the following:
t diagrams of circuit .................................................................................................
t drawings for engineering .......................................................................................
t bank of data ...........................................................................................................
t modifications of software ......................................................................................
t package for CAD ....................................................................................................
t a program in Pascal ...............................................................................................
t instructions used for the control of the program ...................................................
t development of the software for microprocessor .................................................
t introduction to the components of the memory ...................................................
t systems for controlling which are based on microprocessors ...............................

To (purpose) – in order to
1. We use to… to say why somebody does something. (= the purpose of an action).
“Why is Mary going out?” “to post a postcard”.
2. We use to… to say why something exists (= its purpose).
“The president has a team of bodyguards to protect him”.
3. We use to… to say what can be done or must be done with something.
Have you got much work to do? (= work that you must do).
4. In order to is more formal than to.
The programmer is working at weekends in order to complete the program on time.
5. You can use the negative in order not to. Ex: Bob was hurrying in order not to miss his bus.

Practice
1. Choose from box A and box B to make a new sentence with to.

A B
1. I shouted a. I want to go to Brasil
2. He had to go to the bank b. I needed to get some money
3. I’m saving money c. She wants to keep warm
4. She went into hospital d. I wanted to report that my computer had been stolen
5. Mary’s wearing two sweaters e. She had to have an operation
6. I phoned the police f. I wanted to warn people of the danger

1. I shouted to warn people of the danger .................................................................................


2. He had to ................................................................................................................................
3. I ..............................................................................................................................................
4. ................................................................................................................................................
5. ................................................................................................................................................
6. ................................................................................................................................................

303
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

/DQJXDJHVWXG\

2. Say what Paul intends to do. Use in order to


ACTION PURPOSE
1. Take regular exercise ---------> keep fit and alert
2. Study magazines on IT ---------> be more successful
3. Get to work early ---------> impress the director
4. Work hard ---------> achieve more
5. Think positively ---------> not miss any opportunities

1. Paul is going to take regular exercise in order to keep fit and alert
2. ................................................................................................................................................
3. ................................................................................................................................................
4. ................................................................................................................................................
5. ................................................................................................................................................

3. Complete the sentences using a suitable verb.


1. The President has a team of bodyguards (to protect) him.
2. Mary came home by taxi. She didn’t have the energy ..........................
3. I didn’t have enough time .......................... the paper today.
4. I need a bag .......................... all these CDs in.
5. Paul has just passed his ECDL test. He is having a party ..........................

Adverbs of Frequency
A. Definite Frequency. Look at the examples:
The following are common adverbs of definite frequency: She often uses the computer.
- once We always play videogames.
- twice We sometimes write letters or postcards.
- five times - a day/week/month/year
- several times When we use them with tenses like the Present
Perfect we put them between the auxiliary verb and
and: every day/week/month year/ the past participle. Look at the examples:
every morning/afternoon/evening We have rarely seen such a bad film!
She has always liked to have a walk at dawn.
We generally put these adverbs at the end of the
sentence: Frequency adverbs follow the auxiliary or the modal
I use the computer twice a week. verbs. Look at the example:
I read two newspapers every day. I’m always on the phone talking with friends.

B) Indefinite Frequency Notice that ever means at any time and we use it in
The main adverbs indicating indefinite frequency are: affirmative or interrogative sentences. Never means at
always - often - usually - generally - seldom/rarely no time, so we never use it with don’t, doesn’t or didn’t.
sometimes - never - ever Look at the examples:
When we use them with the Present Simple or the Past I never send faxes.
Simple we put the adverbs in front of the verbs. It’s the best message I’ve ever received.

Practice
A. Put in the frequency adverb in brackets in the right place:
1. I chat after dinner until late at night. (at least three times a week)
2. She has blogged because she says it’s a waste of energy. (never)
3. Have you heard of that new virus protection? (ever)
4. My friends read newspapers or magazines. (rarely)
5. The technician revises his work. (once a day)
6. John speaks German at work. (often)
7. I could drive to go to work. The traffic is chaotic at that time. (never)
8. You can find the technician in his office after lunch break. (often)
9. She writes e-mail messages. (several times a week)
10. This is the fastest printer I’ve had. (ever)

304
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Interrogative pronouns Subject / object questions


Compare these sentences:
subject. Who telephoned Bob? = (Somebody telephoned Bob)
object. Who did Bob telephone? = (Bob telephoned somebody)
Who and what can be the subject of a sentence; in this case we do not use do/does/did and the word order is
the same as in a statement.
Who wants something to eat?
What happened to you yesterday?
Who and what can be the object; in this case the word order is different from a statement; it is necessary an
auxiliary (do/did/will). The auxiliary is put before the subject.
Who did Bob telephone?
What will you do next?
Which and whose can be subject of a sentence.
Which computer program can draw lines?
Whose cat is sleeping.
Which and whose can be object of a sentence
Which computers can the students use?
Whose cat is Bob looking for?

Note
Note the position of prepositions in questions beginning:
who – what – which – where ……?
Who do you want to speak to?
Where are you from?
What is the weather like?
Which job has Bob applied for?

Practice
1. Make questions with who or what.
1. Somebody phoned Bob. .............................. Who phoned you? ............................................................................
2. Bob telephoned somebody........................... Who did Bob telephone? ................................................................
3. Somebody paid the bill. ............................................................................................................................................
4. This computer belongs to somebody. ......................................................................................................................
5. Something fell on the table. .....................................................................................................................................
6. This word means something. ...................................................................................................................................
7. Somebody lives in that flat. ......................................................................................................................................
8. I went to the concert with Bob last night. ................................................................................................................
2. Put the words in brackets in the correct order.
1. Where / your friend / was / born/? = Where was your friend born?
2. When / was / built / this cottage/? = ............................................. ?
3. When / the computer / invented / was/? = ................................... ?
4. How /circuits / are / made/? = ...................................................... ?
5. What time / your friend / coming / is/? = ..................................... ?
6. Why / to my birthday party / you / come / didn’t/? = .................... ?
7. What / do / your wife / does/? = ................................................... ?
8. Why / cancelled / the flight / was/? = ........................................... ?
9. How / happen / the accident / did/? = .......................................... ?
10. Why / work / this printer / doesn’t/? = .......................................... ?

305
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

/DQJXDJHVWXG\

Quantifiers – much – many – a lot of


1. A noun can be “countable” or “uncountable”.
Compare the two columns.
Countable Uncountable
nouns nouns - Countable nouns can be singular or plural.
There is a computer in this room.
There are three computers in this room.
a computer time - Uncountable nouns have only one form.
a printer money Do you like music?
an icon music

2. We use “much” with uncountable nou nouns in interrogative and negative sentences.
How much money did you spend?
We didn’t spend much money.
3. We use “many” with countable nouns in interrogative and negative sentences.
Do you know many people?
There aren’t many computers in this school.
4. We use “a lot of /lots of” with both countable and uncountable nouns in positive sentences.
There are a lot of computers in my school.
We spent a lot of money.
5. “a lot of/lots of” can be used in interrogative and negative sentences.
Are there lots of tourists in your town?
There aren’t a lot of tourists in my town.
I didn’t spend a lot of money.

Note: “much” and “many” in positive sentences are more formal than “a lot of” and less usual in
conversation.

Practice
1. In some of these sentences “much” is incorrect or unnatural. Change “much” to “many” or “a lot (of)”
where necessary. Put a tick if the sentence is correct.
1. Mary didn’t spend much money √
2. Sheila has got much money
3. I don’t know much people in this office
4. You need much money to update your computer
5. There wasn’t much traffic on the Web last night.
6. You’ll have to hurry. You haven’t got much time
7. There aren’t a lot of icons on the screen

2. Put in “much”, “many”, “a lot of”.


1. There are .......................... mice in this shop.
2. Unfortunately I haven’t got .......................... time for playing with my computer.
3. Are there .......................... chips in a computer?
4. .......................... people surf the net at the moment.
5. I heard the cheapest printer is £ 50. That’s too .......................... in my opinion.

Some – any - no
A. Some and any go before a plural and uncountable noun. In general we use some in positive sentences and
any in negative and interrogative sentences.
1. There are some CDs on your desk.
2. I’ve got some milk in the fridge.
3. We didn’t buy any DVDs.
4. There aren’t any flowers in my garden.
5. Have you got any brothers and sisters?
6. Is there any water in the bottle?
7. “Has Mary got any luggage?” “No, she hasn’t”.

306
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

B. We use some in questions when we offer or ask for things.


8. Can I have some coffee, please?
9. Would you like some brandy?

C. We often use any after if.


10. If there are any postcards for me, can you phone me?

D. We use no + noun or not any. None is used without a noun.


11. There are no supermarkets open
or
There are not any supermarkets open.
12. I haven’t got any milk
or
I have got no milk
13. “How much money does Bob have?” “ None” (= no money)

Practice
1. Complete the following sentences with some, any, no, none.
1. I didn’t buy .......................... flowers.
2. This afternoon I’m going out with .......................... friends of mine.
3. It is Sunday; there are .......................... shops open.
4. I took several photographs, but .......................... of them were good.
5. Can you give me .......................... information about Java language?
6. I tried to phone Bob, but there was .......................... answer.
7. There was .......................... bus, so I walked home.
8. Can I have .......................... lemon in my tea, please?
9. Would you like .......................... tea?
10. I didn’t buy .......................... CDs.
11. I bought .......................... CDs because I was broke.
12. Can I have .......................... salt, please?

Somebody – anybody – nobody


The rules about some, any, no, are the same for the compounds somebody, anybody, nobody,etc.

someone anyone no one Example:


People There is somebody in the garden
somebody anybody nobody
Is there anybody in the garden?
Places somewhere anywhere nowhere There isn’t anybody in the
garden
There is nobody in the garden
Things something anything nothing
Can I have something to eat?

Practice
1. Complete the sentences with the compounds of some, any, no.
1. I’m not thirsty. I don’t want .......................... to drink.
2. What’s in that wallet? .......................... . It is empty.
3. Mary is thirsty. She wants .......................... to drink.
4. Can we go .......................... quiet?
5. I’ve never been .......................... more beautiful than Wales.
6. Did .......................... phone me while I was at the cinema?
7. Bob left the party without saying ..........................
8. There is .......................... at the front door.
9. There’s .......................... interesting on television this afternoon. .......................... told me about it yesterday.
10. Look, .......................... has spilt all this coffee on the carpet.
11. Has .......................... seen Sheila lately?
12. Come on! Let’s go .......................... .

307
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

/DQJXDJHVWXG\

2. Choose the right compound.


1. Have you seen my book nowhere/anywhere? .....................................................
2. Anybody/Somebody phoned for you two minutes ago. .......................................
3. I’m hungry. I’ve eaten something/nothing this morning. ......................................
4. I haven’t got anything/something to write with: ...................................................
5. Are you going somewhere/anywhere nice on holiday this year? .........................

As well (as sb/sth)


It means ‘in addition to sb/sth; also; too’.
Look at the examples:
Are they coming as well?
The early 1980s saw the growth of TCP/IP, the Domain Name System, Network News Transfer Protocol and the
European networks EUnet, MiniTel and JANET as well as the Japanese UNIX Network.
As well as providing a connection to the Internet, ISPs provide a lot of content of their own
You should use firewall software as well as install virus protection.

Practice
A. Rewrite the sentences using as well as.
1. You may like to describe the key features of the various input and output devices, in addition to some of the
differences among them.
2. Governments should introduce policies aimed at stimulating creativity and innovation. They also should improve
collective decision-making at local, national and global levels.
3. It is possible that in the future human cloning will be well accepted. Any other innovative technology may be
well accepted, too.
4. At application layer, communication partners are identified. The quality of service is identified as well.
5. The point was to find a way for information to move efficiently and quickly not only within a company but also
from one business to another.
6. A bridge enables devices on one network to communicate with devices on another network. Bridges also perform
a check on the data to determine whether it should cross the bridge or not.
7. End-user devices include computers, printers, scanners. They also include all the devices that provide services
directly to the user.
8. Host devices allow users to share information. They permit to create and obtain information as well.

Comparatives & Superlatives


a. Comparatives: study the grid.

PCs are smaller than mainframes


Adjectives
adjective+er+than (1 or 2 syllables ending –y, -er, -e,
A desktop computer is heavier than a
-ow)
notebook computer.

Workstation has a more powerful


Adjectives processor than a desktop computer
more+adjective+than
(3 or more syllables) PCs now have more popular prices
than in the past.

b. Superlatives: study the grid


in
It is the biggest PC Discount
Adjectives shop in Turin.
the+adjective+est
(1 or 2 syllables ending –y, -er, -ow,-le)
It is the smallest PC of all
of
in That PC store is the most
expensive in Rome
Adjectives
the most+adjective
(3 or more syllables)
Supercomputers are the
of most powerful of all.

308
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Practice
A. Write sentences with the prompts given using the comparative:
1. Most desktops / powerful / their portable versions.
2. A notebook / slightly large / an average hardcover book.
3. The handheld computer / slightly heavy / the palmtop.
4. Enterprise servers / modern / mainframes.
5. The first computers / much big / the modern ones.

B. Write sentences with the prompts given using the superlative:


1. Supercomputers / expensive / all the other types.
2. Wearable / late / trend / computing.
3. These / digital cameras / good / all.
4. Today the big / computers / mainframes.
5. The / good / known supercomputers are built by Cray.

Past simple
We use the Past Simple to talk about past events, Exceptions:
usually with reference to finished periods. Verbs ending with –e

Regular verbs +d: live --> lived like --> liked


Verb+ed
Walk --> walked watch --> watched Verbs ending with a consonant +y
Open --> opened ask --> asked
-y --> ied: apply --> applied try --> tried

Irregular verbs
They have to be studied. Some examples: Most verbs ending with one vowel + one consonant
do --> did say --> said -p --> pped: stop --> stopped
be --> was,were buy --> bought -n --> nned: plan --> planned
have --> had sell --> sold
find --> found take --> took
The interrogative and negative forms are formed with did and the base form (infinitive without to).
Did you study physics?
I didn’t study at all today. I played videogames.
Didn’t is a colloquial form, in formal writing we use did not.
People did not communicate as much as we do today.

Practice
A. Find the Simple Past (active) of the following verbs.
1. be 5. use
2. build 6. think
3. become 7. know
4. note 8. weigh

B. Complete the sentences using the correct form of the Past Simple.
Example: When / you / leave / school? (= when did you leave school?)
1. Why / they / take / so much time to build Stonehenge?
2. In 1679 Leibitz / introduce / binary arithmetic.
3. I / not / know / that Leonardo / invent / the mechanical calculator.
4. What / Shockley / invent? He / invent / the transistor.
5. Egyptians / develop / a symbol for the number 10.
6. Von Neumann computer / become / the basis for most computers to follow.
7. What / British / build / in 1943? They / build / Colossus.
8. Microcomputers/ be/ complete computers but on a smaller scale than the huge systems in use by most businesses.

309
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

/DQJXDJHVWXG\

Past simple passive


It means ‘in addition to sb/sth; also; too’.
When we say what people and things do, we use the active form; when we say what happens to people and
things, we use the passive form. Also the Past Simple Passive talks about finished past events.
It is composed of the past of the verb be + past participle.

was / were + past participle

Regular past participles are formed like the Past simple


simple, tha
that is, –ed + base form.
Irregular past participles have to be studied. When you look at grammar tables or in dictionaries, you find, for
example, take, took, taken.
Take is the base form. Took is the Past Simple. Taken is the past participle.
Look at these sentences:
ACTIVE: They sell technical books.
PASSIVE: Technical books are sold.
Notice that the object in the active sentence (technical books) becomes the subject in the passive sentence.
We mainly use the passive when it is not important who does the action or when we don’t know who does the
action. This is the reason why it is so commonly used in technical writing.
Modern computers were used to retrace the positions of objects in the sky. (We don’t need to know who used
the computers) Stonehenge was constructed in stages over a period of 300 years. (We don’t know who built
Stonehenge)
….stones were moved to the present location, ….other stones were quarried miles away. (Who did all that? Do
we need to know in this article?)
When we know who does the action we put by in front of the author.
The transistor was invented by Shockley.
We put our attention more on the transistor than on its inventor.

Practice
A. Change the active sentences into passive sentences.
1. Fleming developed vacuum tubes.
2. Shockley created the transistor.
3. The Chinese used the abacus for calculating the census.
4. Palaeolithic peoples knew a system for recording numbers.
5. In 1943-45 U.S. Army built ENIAC.
6. In 1984 Apple introduced the Macintosh.

B. Underline the correct active or passive form. Notice that the Simple Present Passive is formed with
am, is, are + past participle.
Computers (play/are played) an enormously important role in our society. General-purpose computers (use/are
used) widely in business and industry and (find/are found) in an increasing number of homes. Special-purpose
computers (find/are found) in everything from automobile engines to microwave ovens.
General-purpose computers (possess/are possessed) the amazing property that a single piece of hardware can (do/
be done) any computation imaginable. Before general-purpose computers (created/were created), special-purpose
computers (performed/were performed) arithmetic calculations, which had to (manually reconfigure/be manually
reconfigured) to carry out different calculations. A general-purpose computer, on the other hand, (contains/
is contained) the configuration information for the calculation in the computer memory itself, in the form of a
program. The designers (realized/were realized) that if they (equipped/were equipped) the computer with the right
program instructions and the ability to perform basic arithmetic, then any computation they (desired/were desired)
to perform was possible within the limits of how much memory, and patience waiting for the result, they had.

Ing with prepositions


Look at these examples:
Instead of using a mouse…
The field of computer graphics concerned with generating and displaying three-dimensional objects…
…capability for performing…
When a preposition is followed by a verb, we use the –ing form in English. Notice that in Italian we use the
infinitive: “invece di usare..”.
We use by + -ing (e.g., by doing) to describe how we do or did something:
She became successful in business by working very hard.
You start your computer by pressing the on/off digit.

310
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

We use without + -ing (e.g., without doing) to say that a particular action is not done or was not done:
They left without turning off the computer.
He did the work without making any mistakes.

Practice
A. Complete with the –ing form.
1. From .......................... (control) hurricanes to .......................... (observe) biological contamination, scientists and
engineers are using supercomputers.
2. The average digital clock shows the time by .......................... (flash) the hour and the minute.
3. Computers simulate analog events by .......................... (combine) many of on-off sequences in complex ways.
4. Scales is a piece of equipment used for .......................... (weigh) things, for example ingredients for a recipe.
5. The biological computer will be able to reach correct answer with only partial information by .......................... (fill)
in the gaps by itself.
6. Individual and collective aspirations will play a fundamental role in .......................... (shape) public policy and
.......................... (motivate) individuals to take the necessary risks.
B. Rewrite the following sentences using by or without.
Example: She left. She didn’t say anything.
(=she left without saying anything)

1. He repaired the engine. He changed some of the parts.


2. He went out of his office but he didn’t lock the door.
3. She got the money because she sold her new computer.
4. He passed the test on computing. He studied very hard.
5. I threw the instructions away. I didn’t read them.
6. Researchers were successful. They worked day and night.
7. Students referred about Stonehenge quite well. They read
some books in the school library.
8. She answered the question but she didn’t listen to it
carefully.

Present Perfect Simple


The Present Perfect in English is essentially a present tense but it also expresses the effect of past actions and
activities on the present. It means “before now”. It does not say when an action happened. When we say the
exact time we have to use the Past Simple.

Present Present Past


Simple Perfect Simple

Look at the example:


I’ve read that book before. (before now)
but: I read that book last year. (exact time when the action happened)

We use the Present Perfect to express:


t an action which began in the past and still continues
t an experience that has happened at some time in one’s life.
t a past action that has a present result.

I’ve read that book before. I don’t want to read it again now.
She’s left the secondary school. Now she works in a shop.

We often use the Present Perfect with ever (=at any time) and never (=at no time)

Have you ever met a famous person? (In Italian: hai mai…?)
I’ve never worked in a factory. (In Italian: Non ho mai…)

311
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

/DQJXDJHVWXG\

We form the Present Perfect Simple like this:

Have / has + past participle

I have finished
She has finished

Study the grid:


Positive Negative Questions
I/you/they have (‘ve) arrived I/you/they have not (haven’t) arrived Have you/they arrived?
He/she/it has(‘s) arrived He/she/it has not (hasn’t) arrived Has he/she arrived?

Notice that the past participle can be regular or irregular:

Past Simple Past participle

regular (+ed) played played


play
travel travelled travelled

irregular read read


read
did done
do
take took taken

Practice
A. Complete the sentences using the Present Perfect form of the verbs given.
1. What’s the film about? I don’t know. I ............................ (not/see) it.
2. I don’t understand what the problem with the computer is. It’s ............................ (never/happen) before.
3. Telecommunications ............................ (extend) the usefulness of the PC in the workplace.
4. The biggest telecom happening in recent years ............................ (be) the exceptional popularity of the Internet
and World Wide Web.
5. Check what you ............................ (learn) in this section.
6. I ............................ (see) the future and it is a beautiful thing.

Past Simple (I saw) or Present Perfect (I have seen)?


Compare the Past Simple and the Present Perfect:

We use the Past Simple to talk about something that We use the Present Perfect to talk about the past, but
happened at a particular time in the past: not about when things happened:
I met my friends at 8 o’ clock. I’ve met her children. They’re nice.
When did you have your exam? In July. Have you ever been in Australia?
She bought a new printer last month. I’ve bought a new car. It’s really fast!

We use the Past Simple for situations or actions during a We use the Present Perfect for situations or actions during
period of time that ended in the past: a period of time from the past to now:
I worked there for two years. I left one month ago She has worked here for two years.
(She still works here)
We lived in Paris for a long time, we live in Rome now.
We’ve lived in Paris for two years and we are happy to live
here.

312
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Practice
A. Complete the paragraph about networks by putting in the Present Perfect or Past Simple. Notice that in
one case you have to use the passive form.
The first computer network ...................... (invent) when ancient mathematicians ...................... (connect) their
abacuses together with string so they instantly ...................... (share) their abacus answers with each other and
...................... (get) their work done faster. Over the years, computer networks ...................... (become) more and
more sophisticated. In the past networks ...................... (use) string. Today networks use electrical cables, fiber-
optic cables, or wireless radio signals to connect computers to each other. The purpose, however, ......................
(remain) the same: sharing information and getting work done faster.
B. Complete by choosing the correct verb form.
Although several types of cable ...................... (be) popular over the years, the most commonly used cable today is
called twisted pair.
Years ago mainframe computers ...................... (require) staffs of programmers and operators.
Historically speaking, personal computers ...................... (take) the computing power out of the big computer room
and ...................... (put) it on the user’s desktop.
Since their creation networks ...................... (change) everything all around.
She ...................... (not/arrive) at work yet: please turn on her computer.
Last night I ...................... (see) a program about wirefree technology.

Can, could May, might


We use can or could with a base form (an infinitive We use may or might with a base form (an infinitive
without to). without to).
I can use a computer. I may stay at home tonight.
Look at these examples with can. Look at these examples with may and might.

ABILITY POSSIBILITY
A PC can perform many tasks A PC may perform new tasks in the future
(=A PC is able to perform many tasks) (=It’s possible that a PC will perform new tasks in
the future)
Can you name some input hardware devices?
(=Are you able to name some input hardware Ask him. He might know the answer.
devices?) (=Perhaps he knows the answer)

W use may or might


We use can to talk about what people or things are We i ht to
t ttalk
lk about
b t thi th t are
things that
able to do. possible, now or in the future.

In the negative we use cannot (or can’t in a friendly The negative is may not or might not.
context) to talk about what people or things are not I’ll buy that printer, but it may not be the cheapest one
able to do. (=It’s possible that it is not the cheapest printer on the
You cannot communicate with your computer market)
shouting. (=you are not able to communicate with I might not be ready for the test tomorrow. (=Perhaps I
your computer shouting) won’t be ready for the test tomorrow)
The computer cannot understand if you do not type
anything to it on the board. The difference between may and might is that might
usually refers to situations which are less probable.
We use could and could not (couldn’t) to talk about
what people and things were able to do in the past.
When John was little, he could not use a computer.
I couldn’t go to the party. I was ill.

Practice
A. Complete the sentences using can, can’t or couldn’t and the verbs in brackets ( ).
Example: You don’t have to shout. I ...................... (hear) you very well
(= You don’t have to shout. I can hear you very well).

1. He always asks his secretary to input data because he ...................... (use) a PC.
2. We ...................... (buy) a new printer because we ...................... (afford) it. It was too expensive.
3. Digital images ...................... (be downloaded) to a computer.
4. I didn’t have a good seat in the room so I ...................... (see) the slides very well.
5. I ...................... ( let) you use my laptop because it isn’t working at the moment.
6. I’m afraid that I ...................... (study) with you now. I’m in a hurry. My friends are waiting for me.

313
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

/DQJXDJHVWXG\

B. Insert may or might. Give reasons for your choice.


Example: In this case I prefer may/might because…
1. This image is not very clear. You ............................ need a higher resolution.
2. I ............................ find it difficult to download that programme. It’s too heavy.
3. The teacher ............................ want to ask you for some details on your project.
4. What type of computer will you buy? I don’t know. I ............................ buy a laptop.
I like them!
5. Accept that job offer. You ............................ not get a better opportunity.

C. Complete the dialogue using can, could, may, might or their negative forms.
Jim: Are you coming to the Computer Discount with me tomorrow?
You: Well, I ............................ come, but I’ll be in a hurry. Tomorrow morning I ...................... have a test on input
and output devices. I’m not sure, the teacher has been a bit vague about it.
Jim: ............................ you concentrate when you’re under pressure?
You: When I was a child, I ............................ , but now I feel more confident. What about you?
Jim: I ............................ concentrate quite easily, I do better when I’m stressed!
You: Then, ............................ you help me now? Tomorrow we ............................ go shopping together.
Jim: Why not? All right, take your book and let’s begin.

Must - Have
Form: Must + infinitive without to

POSITIVE AND NEGATIVE INTERROGATIVE

I * Must I…….? is possible


you Must I do what you say?
he, she, it must be careful
we mustn’t make any noise BUT
you question forms with have to are more common.
they Do I have to do what you say?

Use
1. Must is used to express an obligation that involves the speaker’s opinion, it is personal.
I must wash my hair (this is me talking to me).

2. Because must expresses the authority of the speaker, “You must…” sounds bossy.
You must do this homework (a teacher’s giving his /her students an order).

3. Mustn’t expresses negative obligation. It is important not to do something.


You mustn’t steal other people’s things.

Has/have+to+infinitive
Form

POSITIVE AND NEGATIVE INTERROGATIVE

I I
you have you
we Do we
you don’t have you
they to study they have to study?
he has he
she Does she
it doesn’t have it

314
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Use
1. Have to expresses a general obligation based, perhaps, on a rule or law, or based on the authority of another
person.
Ex: children have to go to school until they are sixteen. (a law).
The teacher says you have to study modal verbs. (teacher’s order).
2. Don’t / doesn’t have to expresses the absence of obligation (you can if you want to, but it isn’t necessary).
When you go into a department store, you don’t have to buy something; you can just look.
3. The simple past of have to is:
I, you, we, he…had to …… (positive)
Did I, you, we, he, …have to….? (interrogative)
I, you, we, he, …..didn’t have to… (negative)

Practice
1. Put in must and /or have to.
1. We haven’t got much time. We ............................ hurry.
2. I ............................ go to the station. I’m meeting someone.
3. You ............................ tell anybody. That’s a secret.
4. Bob ............................ work on Friday. It’s his day off.
5. ............................ you ............................ wear a uniform when you were at school?
6. Sheila ............................ go to work yesterday.
7. You ............................ lock the front door when you go out.
8. Mum ............................ go to the bank. She hasn’t any money.
9. The baby is sleeping. You ............................ make any noise.
10. You ............................ drive on the left; you ............................ drive on the right when
you are in England.
11. Bob gave me a letter to post. I ............................ remember to post it.
12. She ............................ wear glasses for reading.

Should – shouldn’t
Should + infinitive without to
1. The forms of should are the same for all subjects.
I should study more.
Mary should study more.
You shouldn’t eat many cakes.
Should I take an aspirin?
2. Should is used to say what is the best thing or the right thing to do. It is also used to give
advice or to give an opinion.
Mary looks tired. She should go to bed.
Should I invite Bob to my birthday party?
3. We often use should with I think / I don’t think / Do you think…?
I think you should study hard.
I don’t think you should work ten hours a day.
4. Shouldn’t is used to express negative advice.
You shouldn’t believe everything is in the papers.

Practice
1. For each situation, write a sentence with should or shouldn’t + one of the following.

use his car so much | look for another job | go to bed so late |
put some pictures on the walls | go away for ten days.

1. Your room isn’t very interesting = ............................ you should put some pictures on the walls ...........................
2. You need a change = you ............................
3. Your salary is very low = you ............................
4. Bob drives everywhere. He never walks = he ............................
5. Mary has difficulty getting up = she ............................

315
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

/DQJXDJHVWXG\

2. Complete the sentences with should/shouldn’t.


1. You ............................ write your CV.
2. Mary ............................ stay up too late. She will be very tired tomorrow morning.
3. There are several B and Bs in this village. It ............................ be difficult to find a room.
4. You’re not well, you ............................ see a doctor.
5. I’m in trouble. What ............................ I do?
6. You ............................ tell the truth; you ............................ tell lies.
7. ............................ I try to eat less?

The imperative
1. The imperative is the same as the base form of a verb. You don’t use a pronoun in front of the imperative.
Stand up! Write this formula!
2. You form a negative imperative by putting “do not / don’t” in front of the verb.
Don’t write in my book!
Don’t smoke!
Use
You use the imperative when you are:
t telling or asking someone to do something
Hurry up!
t giving advice or a warning
Take care!
t giving instructions on how to do something
Turn left off Oak Road into Watford Street.
t The imperative is used in written instructions on how to do something (for example on notices and packets
of food) or to give warnings.
Store in a dry place.
Reduce speed.

Practice
1. Rewrite the underlined suggestions and requests.
1. It is a secret. you mustn’t tell anyone ......................................................................................................................
2. You should put on another sweater; it’s very cold ...................................................................................................
3. You shouldn’t touch that pot; it’s very hot ................................................................................................................
4. Mary’s in bed. I hope you won’t wake her up. .........................................................................................................
5. You shouldn’t smoke; it’s bad for you .......................................................................................................................
6. I think you should eat less; you’re too fat. ...............................................................................................................

2. Transform the following direct commands into indirect ones.


(e.g. He said, “Go away” – he told me to go away)
1. “Shut the door, Tim” she said.
2. “don’t hurry”, I called to them.
3. “Help your mother, Bob”, Mr Ross said.
4. “Don’t make too much noise, children”, he said.
5. “Make a list of what you want”, she told us.
6. “Don’t argue with me”, the teacher said to the boy.

The passive
Form
The passive is be (am, is, was, etc.) + past participle (seen, cleaned etc.)

}
Am /are/is
Was/were
Has/have been
Is being
Will be + Past Participle
Must be
Is going to be
Can be
To be

316
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Use
1. When we use an active verb, we say what the subject does.
My granfather was a builder. He built this house in 1930.
2. When we use a passive verb, we say what happens to the subject.
My house is old. It was built in 1930.

C. When we use the passive, who or what causes the action is often unknown or unimportant:
Ex. a lot of computers were stolen (somebody stole them, but we don’t know who).
If we want to say who does or what causes the action, we use by…..
Ex: this house was built by my grandfather

We choose the active or the passive depending on what we are more interested in.
Ex True love was written for Valentine’s Day , February 14. (we are more interested in true love).
Isaac Asimov wrote several science fiction stories; one of these was “True love”. (we are more interested in
Asimov).

Note:
We use the passive both in speech and writing but it is more common in writing. We see it especially in
textbooks and reports. We use it to describe activities in science, technology, industry and for official rules.
Example:
1. Bananas are exported to Italy.
2. Payment can be made at any bank.
3. These doors will be locked at 10 p.m.
4. Wine should be opened about three hours before it is used.
5. This room is used only on special occasions.

Practice
1. Write questions using the passive. Some are present and some are past.
1. Ask about chip. (how/make?) ............................ How is chip made? ............................
2. Ask about computer. (when /invented?) ............................
3. Ask about hills. (how / form?) ............................
4. Ask about Venus. (the planet). (when / discover?) ............................
5. Ask about copper. (what / use for?) ............................

2. Put the verb into the correct form, present simple or past simple, active or passive.
1. Did somebody clean (somebody / clean ) this computer yesterday?
2. It’s a big supermarket. One hundred people ............................ (employ) there.
3. The zoo gates ............................ (lock) at 7,30 p.m. every evening.
4. The postcard ............................ (post) two weeks ago and it ............................ (arrive) yesterday.
5. The ship hit a rock and ............................ (sink) quickly. Fortunately everybody ............................ (rescue).
6. Bob’s parents ............................ (die) when he was three. He and his brother ............................ (bring up) by
their grandparents.
7. While I was on holiday, my laptop ............................ (steal) from my hotel room.
8. The telephone ............................ (invent) in 1876.

3. Change the following sentences from active to passive: do not mention the agent if it is not specified.
1. A. Somebody built this house in 1930 =
P. This house was built in 1930.
2. A. Documentation includes technical notes for the programmers =
P. ...........................................................................................................................................................................
3. A. Mr Ross bought a wireless mouse yesterday =
P. ............................................................................................................................................................................
4. A. The technician is adding memory to my P.C. =
P. ............................................................................................................................................................................
5. A. We will send you an e-mail =
P. ............................................................................................................................................................................
6. A. Somebody warned us not to use this computer =
P. ............................................................................................................................................................................
7. A. People don’t use this road much =
P. .........................................................................................................................................................................

317
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

/DQJXDJHVWXG\

Relative clauses with who, which or that


Look at the example. Now look at this:
The teacher met a student Jack is the student who the teacher met.
The teacher met a student who asked him for In this case, who is the object of the verb (the teacher
explanations. met..)
We use who or that after a person (e.g., a student) to In some grammar books they give whom for the
indicate who we are talking about. object, but this is very uncommon now.
We call who asked him for explanations a relative
clause. When who, which or that are the object, we can leave
them out.
Another example: Jack is the student the teacher met.
I’ve met Mr Moore. He’s the professor who gave us
the lecture on output devices. (Which professor? – The same happens when who, which or that are
The professor who gave them that lecture). accompanied by prepositions:
This is the computer I told you about.
But if we are talking about a thing or an animal, we use (It is very unusual or too formal to say This is the
which or that. computer about which I told you.)
These are some input devices which are very I’ll give you the explanation you asked for.
commonly used.
It is a pointing device that enables the user to Pay attention to this mistake:
interact with the computer by touching the screen. Jack is the student the teacher met him.
I’ll give you the explanation you asked for it.
Pay attention to this common mistake:
…… a student who he asked for explanations.
…… some input devices which they are very
commonly used.

Practice
A. Use who or which as appropriate.
1. Stonehenge, .............. dates back before 1500 B.C., is a computer.
2. Ink-jet printing has been the technology of choice for those .............. want to produce affordable colour with a PC.
3. The ball turns two rollers, .............. turn wheels called encoders.
4. Another output device is the plotter .............. is used to produce various forms of graphics-oriented hard copy.
5. It was the brilliant physicist Richard Feynman .............. first suggested the idea of quantum computers in 1982.
6. A general-purpose computer is a computer .............. can be used in many different situations.

B. Link the sentences using who, which or that, as in the example.


Example: She chose the books. She wanted to buy them.
(=She chose the books that she wanted to buy)
1. He’s a good technician. A lot of people call him for repairs.
2. I’m doing some work. I have to finish it today.
3. Cartridges for ink-jet printers have a high cost. It can constitute a problem.
4. Palmtops can do many tasks. You would do them with a portable PC.
5. She’s a lovely girl. I often see her at school.
6. Printers are output devices. They print out data, usually onto paper.

C. Leave out who, which or that where possible.


Example: The man for whom she works is Mr Shine
(=The man she works for is Mr Shine)
1. Where is the copy that I left here a minute ago?
2. The cartridges for which we were waiting have arrived.
3. Mr Hugh, who is a professor at the Denver University, is now in Rome.
4. The video camera which my friends saw at the fair was too expensive.
5. That is the digital camera for which I am looking.
6. How Computers Work, which is an excellent book, was published in 1999.

-ing form and relative clauses


Look at the example.
The parts of the computer receiving information to be used are called the input units.
(=The parts of the computer which receives information….)

318
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

Output units provide the results of computation to the person using the computer.
(=…. the person who uses the computer)
–ing form clauses (or participle clauses) are very like relative clauses, except that they have the participle (-ing
form) instead of complete verbs.

Practice
A. Use who, which, that + complete verbs instead of the participle.
1. The input units are the parts of the computer receiving information or programs to be used.
2. A trackball consists of a sphere resting on rollers.
3. A magnetic reader provides quick identification of people entering buildings.
4. Design a poster illustrating the various types of devices.
5. There are many universities and research laboratories working on the problem of building quantum computers.

B. Now use the participle instead of who, which, that + complete verbs.
1. Anyone who touches that wire will get a shock.
2. I’d like to buy a book which covers all the basic information on computers.
3. Who’s the boy who is playing videogames?
4. At the moment I see many people that are using the computer.
5. A computer which performs different tasks is general purpose.

If clauses (First and second conditional)


1. Compare these examples:
Mary has lost her new CD player. She tells Betty:
Mary: I’ve lost my new CD palyer. Have you seen it anywhere?
Betty: No, but if I find it, I’ll tell you.
In this situation, Betty feels there is a real possibility that she will find the CD player. So she says:
if I find ……, I’ll

2. John says:
If I found a laptop in the park, I’d take it to the police station.
This is a different type of situation. Here, John doesn’t expect to find a laptop in the park; he is imagining a
situation that will probably not happen. So he says:
If I found…, I’d (= I would)

First conditional
A sentence with if has an if-clause (e.g. if I find it) and a main clause (e.g. I’ll tell you). Other conjunctions of time are:
When, as soon as, after, before, while, until. They are not usually followed by a future form even if they refer to
future time.
Example: Wait here until I get back.
Form
IF+ Present Simple, WILL+ infinitive without to. The forms of will are the same for all persons.

POSITIVE AND NEGATIVE


I study hard I pass my exams
IF he doesn’t study hard he ‘ll (will) pass his exams
we study hard we won’t (will not) pass our exams

INTERROGATIVE
What you pass your exams?
will you do
IF you don’t pass your
What will you do
exams?

Use
The first conditional is used to express a possible condition and a probable result in the future.
IF I find your CD palyer, I’ll tell you.

Note
The if-clause can come at the beginning of the sentence or at the end.

319
Codice Fiscale: VSCGLI00H42C351O
Cognome: VISCONTI
Nome: Giulia

/DQJXDJHVWXG\

Second conditional
A sentence with the past tense in the if-clause often refers to something imaginary. If I found a laptop means
that I haven’t found a laptop, but I am imagining it.

Form
IF + Past Simple, WOULD + infinitive without to.

The forms of would are the same for all persons.

POSITIVE AND NEGATIVE


I found a laptop I take it to the police station
IF he didn’t have many debts he ‘d (would) buy a second hand laptop
I were you I wouldn’t (would not) study IT

INTERROGATIVE
What you do you had a wearable computer?
would IF
Where you live you were richer than Bill Gates?

Use
The second conditional is used to express improbable or unreal condition and its probable result in the present or
future.
IF I found a laptop in the park, I’d take it to the police station.

Note
The condition clause can come at the beginning or the end of the sentence.
Were is often used instead of was.

Practice
1. Complete the sentences using the verbs in brackets (first conditional).
a. If you ............................ information into a computer, database ............................ you more flexibility. (put, give)
b. If Mr Rossi ............................ a spreadsheet program, it ............................ him manage and analyze financial
information. (buy, let)
c. If Mr Rossi ............................ to spend much money he ............................ programs as part of an application
suite. (want, buy)
d. The user ............................ texts displayed on the monitor if he ............................ a word-processor program.
(manipulae, use)
e. If an organisation ............................ its own software, it ............................ a lot of money. (write, spend)

2. Complete the sentences using the verbs in brackets. (second conditional).


a. If you sold your old computer, you ............................ much money for it. (not/get)
b. They would be offended if I ............................ them an e-mail for their wedding anniversary. (not/send)
c. I’d be very angry if somebody ............................ my printer. (steal)
d. It ............................ awful if you lost your laptop.
e. If I had enough money, I ............................ all special-purpose output devices. (probably/buy)

3. Put the verb into the correct form. (first and second conditional).
1. I’d buy it if it ............................ so expensive. (not/be)
2. If you update one of the files, all the others ............................ automatically. (be/updated)
3. If Bob ............................ his ECDL test, he’d fail it. (take)
4. What ............................ if there was/were a logic error in your program? (you/do)
5. If you don’t update one of the files, all the others ............................ automatically. (not be/ updated)
6. I’ll send you an e-mail if I ............................ any news. (hear)
7. Would you mind if I ............................ your computer? (use)
8. I’ll pay you back as soon as I ............................ some money. (get)

320
Codice Fiscale: VSCGLI00H42C351O

Potrebbero piacerti anche