2023 Corr. Special - English - For - Computer - Science - VSZ
2023 Corr. Special - English - For - Computer - Science - VSZ
2023 Corr. Special - English - For - Computer - Science - VSZ
EFOP-3.6.1-16-2016-00006
Kecskemét
2021
UNIT 1 TYPES OF COMPUTERS
Contents
UNIT 1 TYPES OF COMPUTERS ................................................................................................................ 3
1.1. Vocabulary — Types of computers .............................................................................................. 3
1.2. Reading comprehension — Smart watches ................................................................................. 4
UNIT 2 COMPUTER HARDWARE AND THE PERIPHERALS ........................................................................ 5
2.1. Vocabulary —CPU......................................................................................................................... 5
2.2. Reading and speaking — CPU....................................................................................................... 5
2.3. Speaking — Discussion ............................................................................................................... 5
2.4. Use of English - Motherboard ...................................................................................................... 6
2.5. Reading and writing — CPU ......................................................................................................... 6
2.6. Vocabulary – Input and output devices ....................................................................................... 7
2.7. Reading and writing — Input and output devices ........................................................................ 8
2.8. Definitions .................................................................................................................................... 8
UNIT 3 MODERN TECHNOLOGY .............................................................................................................. 9
3.1. Vocabulary — Bitcoin ................................................................................................................... 9
3.2. Reading comprehension. - NextFest .......................................................................................... 10
3.3. Use of English — Smart fridge .................................................................................................... 12
3.4. Reading Skills — Future inventions ........................................................................................... 12
UNIT 4 HISTORY OF COMPUTERS .......................................................................................................... 15
4.1. Use of English — History of computers ...................................................................................... 15
4.2. Vocabulary practice - synonyms................................................................................................. 16
4.3. Writing skills ............................................................................................................................... 16
4.4. Reading comprehension — John von Neumann ........................................................................ 17
4.5. Reading skills – History of the Internet ...................................................................................... 17
UNIT 5 PROGRAMMING ........................................................................................................................ 19
5.1. Reading comprehension – Programming skills .......................................................................... 19
5.2. Vocabulary — Programming ...................................................................................................... 20
5.3. Reading skills —Top programming languages............................................................................ 20
5.4. Vocabulary — Defintions ............................................................................................................ 21
5.5. Reading and Speaking — Programming skills............................................................................ 21
UNIT 6 NETWORKS ................................................................................................................................ 23
6.1. Vocabulary — Networks ............................................................................................................. 23
6.2. Vocabulary — the Internet ......................................................................................................... 23
6.3. Reading Skills — Internet marketing .......................................................................................... 24
6.4. Use of English — Google ............................................................................................................ 24
1
Sz. Varga. Special English for Computer Science
2
UNIT 1 TYPES OF COMPUTERS
Fill in the blanks with words from the box below. If there is more than one blank in a
passage, the same words must be used in each blank. The first one is done for you as an
example.
1.________________ are the fastest, and most expensive computers. They are used for
scientific applications. The aerospace, car, chemical, electronics industries use them. HCP is
used for weather forecasting and seismic analysis. They can be found in several research
centres and universities.
2.______________ are the most widely used type of computer in medium and large
companies. They require a special environment that includes a cooling system, an air
filtration system and a protected power source. ____________ are able to support several
hundred users simultaneously at remote terminals. They cost considerably less than
supercomputers but they are slower.
3 ____________ appeared in the early 1970’s. They have a central processor, called the
microprocessor, which is a single chip. The most common type is a desktop computer - a
non-portable personal computer that fits on the top of a desk.
4. For people on the move ____________________ were developed in the 1990’s. The first
___________________ weighed 28 pounds. Before long, miniaturisation enabled creation of
the laptop computer, a more compact unit weighing 10 to12 pounds. At first these
computers were underpowered and did not have adequate storage. Today, new models
offer as much processing power and storage as many desktop computers.
5.__________________ are portable computers that are small enough to fit into an average
sized briefcase.
6_____________ look like ordinary credit cards but they include a microprocessor and
memory chips. They were developed in France in the 1970’s. They are used to pay highway
tolls, to pay bills, and to purchase merchandise.
7. Perhaps you have not realized that you have several computers at home. These
computers are called _______________________. They are built into special-purpose
devices such as video game consoles, microwave ovens, DVD players, wristwatches and
alarm clocks. Today cars use tiny computers to control functions of their engines.
8. A _____________ computer: a very thin, portable computer, usually battery-powered,
having a touchscreen as the primary interface and input device and lacking a physical
keyboard and lid (Glendinning & McEvan, 2014).
Glossary
aerospace (n) the technology involved in making aircraft
research (n) careful study in order to discover facts
fit into (v) to be the right size to go somewhere
underpowered (adj) not provided with enough power
reduce (v) to make it smaller in size, quantity, number, degree, price
3
Sz. Varga. Special English for Computer Science
A businessman carrying a bag and a briefcase is hurrying down a Chicago street, looking at
his watch. This is an ordinary event except that his watch is giving him a traffic report instead
of the time. An accident has occurred on the main route to the airport and the watch
displays alternate routes. When the man touches a corner of the watch face he brings up his
daily schedule. When he rotates a tiny wheel on the watch he displays the Flights Home
option and sends this information by email to his secretary in St. Louis.
A few blocks later, the watch vibrates, indicating that a new email has arrived from his
son. It says, “Don’t forget my Chicago Cubs cap.” He also has a message from his secretary
who has reserved a seat for him on the 12:20 p.m. flight and has rescheduled his afternoon
meeting with the marketing director to 4:00 p.m. He sends a message to his wife’s cell
phone by speaking into his watch, Flight delay. Can’t pick up Rob after baseball. At the
airport newsstand, the watch vibrates again, this time with a text message saying that his
son will get a ride home with a friend.
IBM research team developed this new communication device. Over a period of nearly
four years they have seen this idea turn into a reality. The IBM Linux watch is a complete
computer system that runs Linux, displays X11 graphics, and has wireless connectivity. There
are two versions of the watch, one with an organic light-emitting diode (OLED) display, and
the other with a liquid crystal display (LCD). The watch fits in a case that looks like a slightly
unusual timepiece, with a somewhat odd shape and an extraordinarily brilliant face.
The watch interface has a touch screen with symbols in each of the four corners for
different options. The top left is for the start menu, the bottom left, for Web browsing, the
top right, for setting alarms, and the bottom right for a list of phone numbers. The dial on
the top right lets users navigate between applications (Pothitos, 2016).
1. What is unusual about this watch?
2. Why does the businessman need to use an alternative route to the airport?
3. Where does the businessman have to take his son in the afternoon?
4. On which flight did his secretary reserve a seat for him?
5. When does he have to meet the marketing director?
6. What are the advantages of the new Linux watch?
7. Why does he send a voice message to his wife?
8. How does his son get home from the match?
9. What are the differences between the two versions of the watch?
10. Describe the watch interface.
11. How can the user access the start menu?
4
UNIT 2 COMPUTER HARDWARE AND THE PERIPHERALS
The CPU coordinates all the activities of the various components of a computer. It
determines which operations should be carried out and in what order. It can retrieve
information from memory. It can store processed information in the memory unit. Its main
parts are the control unit (CU) and the arithmetic-logic unit (ALU). The CU transmits
coordinating control signals and commands. It directs the sequence of step-by-step
operations of the system. It selects instructions and data from the memory and interprets
program instructions. It controls the flow between the main storage unit and the ALU.
The ALU is the part of a computer where the actual arithmetic operations of addition,
subtraction, multiplication, and division are carried out. The ALU uses binary arithmetic.
Binary means consisting of two things”; a binary number is made up of 0s and 1s. The
binary number system is the only system the computer understands. It enables the
computer to perform logical operations such as making comparisons or selecting
information. https://techterms.com/definition/cpu
a. The _________ 1. is the main printed circuit board that holds the CPU and memory.
b. The CPU is the heart of a computer where the processing is done. Nowadays CPUs reach
speeds of 4000MHz.
c. There are two types of main or primary _________2. , random access memory (RAM)
and read only memory (ROM). RAM is temporary whereas ROM is permanent.
Information stored in RAM is lost when a computer loses power. Information stored in
ROM remains in storage indefinitely. DDR RAM is common today.
d. CPUs produce a lot of heat when operating and require a _________3. fan for safe
operation. Overheating can damage components. Nowadays the motherboard chipset,
the video card, RAM and hard drives also require cooling.
e. In order to display graphics in three dimensions, computers require _________ 4. Today
there are video cards with up to 256 MB RAM or more. Some also have TV tuners that
enable television shows to be displayed on a monitor.
f. Multimedia computers with _________5.became available decades ago. Nowadays their
sound quality is excellent and they can be used with a home theatre system.
The main magnetic storage device in a computer is a _________6. Early hard drives were big
and slow. Nowadays they are much smaller and faster and have greater storage capacity
(200 GB or more). https://techterms.com/definition/cpu
Glossary
6
UNIT 2 COMPUTER HARDWARE AND THE PERIPHERALS
coordinate (v) to make things, people, parts etc function together efficiently and in
an organised way.
operation (n) an act performed by a machine
retrieve (v) to find or extract stored information
transmit (v) to produce a signal by electronic means
audio, CPU, bar code readers, scanning device, input device, joystick, keyboard, mouse,
monitor, output device, plotter, printed output, robot, 3D printing
7
Sz. Varga. Special English for Computer Science
(m) A/an _______________ moves according to instructions received from a computer. They
usually consist of a single arm that can perform one or more programmed tasks.
(n) _______________ or additive manufacturing is a process of making three dimensional
solid objects from a digital file. In an additive process an object is created by laying down
successive layers of material until the object is created. Each of these layers can be seen
as a thinly sliced cross-section of the object (Glendinning & McEvan, 2014).
Glossary
unique (adj) unlike anything else being the only one of this type
task (n) a piece of work that has to be done
smooth (adj) having an even surface, opposite of rough
roll (n) to turn over and over and move in a particular direction
gear shift (n) a handle used to change the setting of a vehicle’s gear mechanism
lever (n) a handle used to operate or control machinery
2.8. Definitions
What are the following definitions for?
EXAMPLE:
An input device that scans parallel lines printed on products and converts these codes into a
number on the screen. b………… barcode
11. To recognize someone and be able to say who they are; understand exactly what it is.
i…......
12. A short period when the electricity supply to a building or a district is stopped. b.…….
13. An area on the computer screen that drops down for selecting what you want to do in a
particular program. s…..-d….. m…….
14. A conversation about something; a website, where people can express and exchange
ideas on a particular subject. discussion. f…..
15.The amount of something that can be put in a container, the amount of information that
can be stored on a computer disk. c………
16. An occasion when a machine (printer, photocopier) doesn’t work because paper
prevents its parts from moving. p. …. j….
17. Information explaining how to use or do something. i ………
18. Sequence of computer program instructions for a certain task. f……
19. Electronic system that records and stores spoken messages from people. v……
8
UNIT 3 MODERN TECHNOLOGY
The definition of bitcoin — Bitcoin is a new currency that was created in 2009 by an
unknown person using the alias Satoshi Nakamoto. Transactions are made with no middle
men – meaning, no banks! There are no transaction fees and no need to give your real
name. More merchants are beginning to accept them: You can buy webhosting services,
pizza or even manicures. Bitcoins can be used to buy merchandise anonymously. In addition,
international payments are easy and cheap because bitcoins are not tied to any country or
subject to regulation. Small businesses may like them because there are no credit card fees.
Some people just buy bitcoins as an investment, hoping that they’ll go up in value.
Acquiring Bitcoins — Buy bitcoin on an the Exchange. Several marketplaces called “bitcoin
exchanges” allow people to buy or sell bitcoins using different currencies. Mt. Gox is the
largest bitcoin exchange.
Transfers — People can send bitcoins to each other using mobile apps or their computers.
It’s similar to sending cash digitally.
Mining — People compete to “mine” bitcoins using computers to solve complex math
puzzles. This is how bitcoins are created. Currently, a winner is rewarded with 25 bitcoins
roughly every 10 minutes.
Owning Bitcoins — Bitcoins are stored in a “digital wallet,” which exists either in the cloud
or on a user’s computer. The wallet is a kind of virtual bank account that allows users to send
or receive bitcoins, pay for goods or save their money. Unlike bank accounts, bitcoin wallets
are not insured by the FDIC. Wallet in cloud: Servers have been hacked. Companies have fled
with clients’ Bitcoins. Wallet on computer: You can accidentally delete them. Viruses could
destroy them.
Anonymity —Though each bitcoin transaction is recorded in a public log, names of buyers
and sellers are never revealed – only their wallet IDs. While that keeps bitcoin users’
transactions private, it also lets them buy or sell anything without easily tracing it back to
them. That’s why it has become the currency of choice for people online buying drugs or
other illicit activities.
Future in question —No one knows what will become of bitcoin. It is mostly unregulated, but
that could change. Governments are concerned about taxation and their lack of control over
the currency (Yellin et al., 2009).
What is Bitcoin? When was it created? Who created it? What can you buy for bitcoins?
Why do merchants like bitcoins?
9
Sz. Varga. Special English for Computer Science
Flying cars, transparent cloaks, technology which can read minds and games played by
brain waves - not long ago these inventions existed only in films, but by now they have
become reality.
Thousands of visitors can see what future technology offers at NextFest, an expo in San
Francisco organised by the technology magazine, Wired. According to Chris Anderson, these
inventions will change the way people live, work and play in the future. The 110 exhibitors
were chosen from 2,500 research and development projects at universities and corporations
worldwide.
Some inventions exhibited here show a new way of thinking. Others take an existing
project and turn it on its head, such as the computer game Brainball. It measures your alpha
waves and the person who is the most relaxed can push the ball to the other side and win.
Co-inventor, Thomas Broome, of Sweden’s Interactive Institute, says that it’s anti-game.
A gleaming car which would look good in a Hollywood film set is one of the most popular
attractions. The flying car is the brainchild of Paul Moller, who has spent $200 million on his
invention. It needs 35 feet to take off, but thanks to its 770 hp engine it can climb at 6,400
feet a minute and reach speeds of 365mph. Mr Moller says that in 10 years, 25 % of the
American population will have access to the Skycar, and in 25 years, 90% of people will be
using it. The only problem with the vehicle is that it is very expensive. The initial cost is about
$500,000 – but with a fuel consumption of 20 miles per gallon, it’s almost eco-friendly
compared to gas-guzzling four-wheel drives.
At Nextfest visitors can see fabrics, which the wearer can change by downloading
patterns from the Internet, and outfits which monitor health and well-being. On the catwalk,
a model walks past in a biometric bodysuit which monitors vital signs, prepares medicine
and administers it to the wearer.
On the battlefield, an invisibility cloak could be just the ticket. Straight out of a Harry
Potter adventure, the cloak is covered with tiny, light-reflective beads. It appears to be
transparent as it’s fitted with cameras which project what is in front of the wearer onto the
back of the cloak, and vice versa. The material can also cover objects so it could be used to
help pilots see through the floor of the cockpit at a runway below.
Brain fingerprinting reads minds by measuring brain waves. The inventor, Dr Lawrence
Farwell, states: “We need something that is humane, not harmful to the people who are
being tested. Brain fingerprinting provides a scientific solution to a very difficult problem,
and that is the determination of who is a terrorist and who is not, who has committed a
specific crime and who hasn’t.
Another hit is Asimo, a humanoid robot, which can walk, turn, climb up and down stairs
– even dance. Its maker, Honda, believes it will be useful for the bedridden, elderly, blind
10
UNIT 3 MODERN TECHNOLOGY
and disabled. Asimo was designed to be cute and friendly- looking, because the inventors
believe that people will like the robot if it’s familiar to them. Although the show was a
success, people will still have to wait for a long time to see these inventions in shops or to
use them in every day life (Shiels, 2004).
Glossary
11
Sz. Varga. Special English for Computer Science
Fill in the gap with the given words. 25 words are given, but you have to choose only 20. You
can one word once only.
Scientists at the University of Central Lancashire and online supermarket Ocado in Britain,
have __________ 1. the 'fridge of the future,' which tells you what to cook with your left-
overs and ______________ 2. re-orders fresh food based on your needs, reports SiFy News.
Not only is it a ______________ 3. refrigerator,' it will scan the shelves to see what is
available, plan meals, automatically place supermarket home _____________4. orders and
monitor gasses released by degrading foods and move them (based on use-by dates) to the
front shelves. Researchers also hope it will ___________ 5. on wasted food and offer
______________ 6. (tailored to different countries, cuisines and seasons ______________
7. on whether people want to whip up something Italian or ______________ 8. a curry.
With the British (and Americans as well) putting in 36 million hours ______________9. year
of free overtime - leaving little time for household ______________ 10, the
______________ 11. could help save precious time during hectic modern-day lives, the Daily
Mail reports.
The smart fridge uses 'nano-articulated technology' ______________ 12. surfaces,
______________ 13. although smooth to touch, they will have millions of independently
controlled micro-tiles to ______________ 14. products that need to be ______________ 15.
soon to the fridge's front. Built into the door, ultrasound-scanning ______________ 16.
allows the fridge to 'swipe and capture' the food on a plate ______________ 17. and after
mealtime, meaning it can assess what type and ______________ 18. of food is wasted.
Simon Somerville, a future forecasting ______________ 19. from the University of Central
Lancashire, said that ______________ 20. feeling lazy could use the proposed fridge to whip
up a recipe for them.
If you want one, you'll have to wait awhile. No word on when it will be available.
https://www.dailymail.co.uk/sciencetech/article-1341190/Revealed-The-hi-tech-fridge-
future-tell-dinner.html
12
UNIT 3 MODERN TECHNOLOGY
an appropriate response from the beetle so that it flies according to its handler. The insect
can be made to take-off, land, hover, or follow a given flight path. Previous research
concentrated on moths but giant flower beetles were easier to operate and could carry
larger payloads because of their size. Further advances with nanobots and miniaturization
will allow heat sensors and cameras to be embedded into the bugs. The insect could then be
used for surveillance or search and rescue missions (Ackerman, 2017).
How are these beetles controlled?
What is the aim of the experiment?
Do you consider this experiment ethically justified?
Electrical clothing
One of the future inventions that could greatly impact our lives are nanoribbons. Rubber
films developed by engineers at Princeton University could power mobile devices and other
electronic devices. The silicone sheets are embedded with ceramic nanoribbons
(piezoelectric ribbons) that generate electricity when flexed, converting mechanical energy
to electrical energy. Materials made of this material, such as shoes, would harvest electrical
energy created from walking and power everything from an ipod to a pacemaker. The
nanoribbon strips are so narrow that 100 strips fit side-by-side in a space of a millimetre. The
strips are then embedded into clear sheets of silicone rubber to create a chip. These sheets
could be woven into fabric and placed against any moving area on the body to create
electricity. For example, a vest made from this material could take advantage of breathing
motions to generate energy. Nanoribbons are highly efficient in converting about 80% of
mechanical power into electricity (Blanche, 2014).
Needle-less injection
This future invention is a device for delivering medication and vaccinations through the skin.
As an alternative to injecting a needle, micro-poration is a painless method of transferring
medication (intraepidermal) into the body using laser technology. A handheld laser creates
micro pores in the epidermis of the skin for the transfer of molecules. It has a familiar
comparison to the "needle-less" device used by Dr. "Bones" McCoy on Star Trek. The popular
sci-fi series has inspired more than a few new inventions including the "laser" and the cell
phone. This new micro-poration technology is painless to use and requires no supervision to
administer. The interfaced controls regulate the dosage (Ravi et al., 2015)
How does needless injection work?
Which science fiction film inspired the invention?
T-Shirt Gadgets
13
Sz. Varga. Special English for Computer Science
Scientists at Standford University are developing future inventions using e-Texiles. This new
class of flexible, stretchable and lightweight clothing would function as rechargeable
batteries. Cotton and polyester fabrics are dyed with an ink made from carbon nanotubes,
which are electrically conductive carbon fibers that are 1/50,000th the width of a human
hair. The electronic properties of the fabric are maintained even when the clothing is
washed. Researchers believe that the e-Textiles will eventually allow us to use our clothing
as gadgets - talking to a friend through our shirt sleeve or surfing the web on a pant leg
(Mondal, 2018).
What advantages do T-shirt gadgets offer?
Where can these T-shirt gadgets be useful?
Tissue regeneration
The University of Pittsburgh's McGowan Institute for Regenerative Medicine will join a
consortium of 30 institutes in regenerative research. One of the future inventions in health
care may be the development of a spray gun for regenerating skin tissue. The Armed Forces
Institute of Regenerative Medicine (AFIRM), recently established by the U.S. Department of
Defense, is funding research into the regrowth of bones, muscles, tendons, nerves and blood
vessels. Last year, a pathologist at the McGowan Institute regrew the severed fingertips of
two patients in their mid sixties. Existing scar tissue was removed by an enzyme. Scarring
inhibits regrowth, however cells derived from pig bladders can override the scarring process
and attract cells and proteins needed for growth.
Another researcher with Wayne Forest University, is developing an inkjet device with
cartridges containing tissue cells with growth factors. The device would dispense layers of
tissue onto deep flesh wounds for healing and regrowth. For surface wounds, a hand-held
sprayer is in development, which sprays immature skin cells (called keratinocytes) onto the
skin. Clinical trials with burn victims have been promising. The advantages of this technology
compared to "grafting" is that it eliminates patchwork scarring and uses less skin.
"Conventional methods cannot return people to the way they were before" says biochemist
Alan Russell, but it's within the grasp of science (Gurtner et al., 2016).
14
UNIT 4 HISTORY OF COMPUTERS
and, as, at, being, beads, company, first, for, greatly, late, in, invented, on, of, so, solve,
than, that, the (2x), was, were, who, which, vacuum
It has always been difficult for people to remember numbers (1) they have used objects to
help them. In ancient times, people used their fingers (2) calculating. This is, in fact, why we
still count in tens and multiple of tens.
More than five thousand years ago (3) abacus, the first counting machine (4) invented. An
abacus has two columns of beads. To make calculations the (5) are moved toward the centre
divider. The Japanese modified the abacus. This model is known (6) a soraban. They are still
being used in some parts of the world.
During the 17th and 18th century J. Napier (7) a device consisting of bars or strips of bone on
which numbers were printed. His invention was called “Napier’s bones”. The first real
calculating machine was produced (8) 1820 as a result of experiments carried out by several
people. It could add, subtract, divide and multiply accurately. In 1830 Charles Babbage, a
British mathematician, designed a machine called the “Analytical Engine”. This machine was
an attempt to eliminate (9) human element altogether, except for entering the necessary
information which the computer could use to (10) the problem. Babbage never finished his
work, but many of his ideas were used in the design of modern computers.
In the (11) 1800’s, Herman Hollerith, an American inventor, developed the first machine
capable (12) processing data read from punched cards. The Hollerith system was used to
process data from the 1890 census which was completed in one-quarter of the time it took
to process the data from the 1880 census. Hollerith organized a (13) to manufacture and sell
his system. This company later became known as the International Business Machines
Corporation (IBM).
15
Sz. Varga. Special English for Computer Science
In 1930 the (14) analogue computer was built in America. During World War II the first
digital computer was developed (15) Harvard University. It was the first machine that
combined memory and processing functions (16) it could calculate the solutions for long lists
of mathematical problems quickly. Eckert and Mauchly built the first digital computer; it
contained (17) tubes. A significant advancement in computers came in 1947 when John von
Neumann developed the idea to store instructions for the computer in its memory.
Since 1960 computers have used transistors instead of vacuum tubes (18) makes them
run faster (19) their predecessors. These are called second generation computers. Since
1965 computers have used tiny little circuits called microchips. Since then integrated circuits
have become progressively smaller and are now (20) reduced in size. Computers are
becoming smaller and smaller because of microminiaturization.
https://www.britannica.com/technology/computer/History-of-computing
Glossary
bead (n) a small piece of usually hard material with a hole through it
indicate (v) to show something
adapt (v) to modify
invent (v) to make or design something which hasn’t existed before
develop (v) to grow or to cause something to grow gradually
combine (v) to do two or more things at the same time
to join or make things join together
figure out (v) to understand something by thinking about it
significant (adj) important
16
UNIT 4 HISTORY OF COMPUTERS
Some thirty years ago, the RAND Corporation, America’s most important Cold War think-
tank, faced a puzzling strategic problem. How could the US authorities successfully
communicate after a nuclear war? Post-nuclear America would need a network to link city
to city, state to state, and base to base. However, no matter how thoroughly that network
was sheltered or protected, its switches and wiring would always be vulnerable to the
impact of atomic bombs.
That was the reason why RAND decided that the network should not be dependent on
a central location. The principles were simple. All the nodes on the network would be equal
in status to all other nodes; each node would have the ability to originate, pass and receive
messages. The messages would be divided into packets and each packet would be
separately addressed. Each packet would be sent from some specified source node, and
arrive at some other specified destination node. It simply would not matter if large parts of
the network were destroyed; the packets would still end up in the proper place.
This concept was first made in public in 1964. In the 1960s the Pentagon‘s Advanced
Research Projects Agency decided to finance a larger, more ambitious project in the US. The
nodes of the network were to be high-speed supercomputers (or what passed for
supercomputers at the time). In the fall 1969, the first such node was installed in UCLA. By
December 1969, there were four nodes on the network, which was named ARPANET after
17
Sz. Varga. Special English for Computer Science
its Pentagon sponsor. The four computers could transfer data on dedicated high-speed
transmission lines. By the second year of operation, however, an odd fact became clear.
ARPANET’s users had changed the computer-sharing network into a dedicated, high-speed,
federally subsidized post-office. The main traffic on ARPANET was not long-distance
computing. Instead, it was news and personal messages. Researchers were using ARPANET
to collaborate on projects and to exchange notes on work. Throughout the seventies,
ARPA’s network grew quickly because its decentralized structure made expansion easy. In
1983, ARPANET changed its name; its military segment broke off, and became MILNET.
ARPA’s original standard for communication was known as Network Control Protocol (NCP)
but as time passed and the technique advanced, NCP was replaced by a higher-level, more
sophisticated standard known as TCP/IP. Transmission Control Protocol (TCP) converts
messages into streams of packets at the source and then assembles them back into
messages at the destination point. Internet Protocol (IP) handles the addressing and makes
sure that packets are routed across multiple standards.
As the seventies and eighties advanced, many different social groups could afford to
buy powerful computers, the use of TCP/IP became common, and other networks joined
the Internet. Since the software called TCP/IP was public domain, and the basic technology
was decentralized and rather anarchic by its very nature, it was difficult to stop anybody
from joining this branching complex of networks. This ever-growing network came to be
known as the Internet in 1992 (Leiner et al., 2009).
18
UNIT 5 PROGRAMMING
UNIT 5 PROGRAMMING
19
Sz. Varga. Special English for Computer Science
20
UNIT 5 PROGRAMMING
languages have entered the rankings. We seem to have entered a period of consolidation in
coding as programmers digest the tools created to cater to the explosion of cloud, mobile,
and big data applications. Speaking of stabilized programming tools and languages, it’s worth
noting Fortran’s continued presence right in the middle of the rankings (sitting still in 28th
place), along with Lisp in 35th place and Cobol hanging in at 40th. Looking at the preset
weighting option for open source projects, where we might expect a bias toward newer
projects versus decades-old legacy systems, we see that HTML has entered the Top Ten
there, rising from 11th place to 8th. (This is a great moment for us to reiterate our response
to the complaint of some in years past of “HTML isn’t a programming language, it’s just
markup.” At Spectrum, we have a very pragmatic view about what is, and isn’t, a
recognizable programming language. HTML is used by coders to instruct computers to do
things, so we include it.
Finally, one last technical detail: We’ve made some tweaks under the hood to improve
the robustness of the results, especially for less popular languages where the signals in the
metrics are weaker and so more prone to statistical noise. So that users who look at
historical data can make consistent comparisons, we’ve recalculated the previous year’s
rankings with the new system (Cass, 2017).
21
Sz. Varga. Special English for Computer Science
Read the following text. Name the five most important features of a good programmer.
Discuss in pairs.
If you’re the type who finds the idea of making a program (such as a video game) more
exciting than actually using it, you already have everything you need to program a computer.
If you want to learn computer programming, you need a healthy dose of the following three
qualities:
Desire: If you want something badly enough, you tend to get it (although you may serve
time in prison afterward if you do something illegal to get it). If you have the desire to learn
how to program a computer, your desire helps you learn programming, no matter what
obstacles may get in your way.
Curiosity: A healthy dose of curiosity can encourage you to experiment and continue
learning about programming long after you finish reading this book. With curiosity behind
you, learning to program seems less a chore and more fun. And as long as you’re having fun,
you tend to learn and retain more information than does someone without any curiosity
whatsoever (such as your boss).
Imagination: Computer programming is a skill, but imagination can give your skill direction
and guidance. A mediocre programmer with lots of imagination always creates more
interesting and useful programs than a great programmer with no imagination. If you don’t
know what to do with your programming skill, your talent goes to waste without imagination
prodding you onward.
Desire, curiosity, and imagination are three crucial ingredients that every programmer
needs. If you possess these qualities, you can worry about trivial details such as learning a
specific programming language (such as C++), studying advanced math, or attending a
university where you can buy a college degree that you can just as easily make with your
computer and a desktop publishing program instead. Learning to program a computer may
(initially) seem an impossible task, but don’t worry. Computer programming is relatively
simple to understand; everything just tends to fall apart after you try to put a program into
actual use. (Abraham et al., 2017).
22
UNIT 6 NETWORKS
UNIT 6 NETWORKS
Choose a word from the box to replace the numbers in the following passage. Write the
word in the table at the end of the passage.
The Internet is a national (1) switching network, sometimes referred to as the (2). It is the
largest computer network in the world. It began in 1969 as a government-sponsored
research network for the Department of Defence in the US. Scientists working on it
developed the (3) (IP). These are standards that enable users to exchange data across the
Internet.
As it was (4) designed with no central control, anyone could join. This leads to its (5) growth
as well as to its becoming a source of unlimited resources. The Internet can be (6) with a PC
and a router or by direct Internet access. The Internet can be accessed using (7) software
such as Microsoft Explorer.
The World Wide Web (WWW) is a worldwide (8) system. By clicking on an underlined word,
you can access data from another (9) or another computer on the Internet. If you want to
allow others to access computer you can create your own (10) and connect it to an online
server. (11) is a collection of unwritten rules developed to enhance the quality of
communication on the Internet.
23
Sz. Varga. Special English for Computer Science
If you have wireless Internet access at home, you probably have a little box called a (12) that
plugs into your telephone socket. This kind of router is a bit like a sophisticated (13) it's a
standalone computer whose job is to relay connections to and from the Internet. At home,
you might use a router to connect (14) computers to the Internet at once. In other words,
the router does two jobs: it creates a wireless computer network, (15) all your computers
together, and it also gives all your machines a shared gateway to the Internet (Russell, 2013)
On the web we are constantly being bombarded with information - so much in fact
that people can be overwhelmed when they go online. Some analysts have reported that
over the holiday season many people choose not to shop online, not only because of their
fears about security and privacy, but also because of their confusion. There is so much
information, competition and choice on the Internet that everything seems to be one great
mass of the same kinds of things.
Research shows that the marketplace is becoming more and more fragmented. With
TV for example, the number of channels has skyrocketed to include numerous speciality
channels. Nowadays people simply have too much choice and many of them end up feeling
lost as a result. However, with the help of standard search engines, surfers can find
information, sites and resources that meet their specific needs. If you want to buy
something through the Internet, you must provide some personal information. After you
have chosen the right website, you will have to register. Once you are registered you can
place an order. A representative of the company may contact you to finalize the details of
the order and the delivery date.
24
UNIT 6 NETWORKS
Residents of a new housing development in Virginia will be able to monitor their homes
and control lighting, heating, and security systems from any Web browser as part of an
offering developed by IBM and several partners, IBM announced on Monday. “As wireless
networks advance, the system could even allow police in a patrol car to watch a burglar in
the house via a Web camera as they speed to the scene after receiving an automatic alarm”,
said Eugene Cox of IBM. Homes in the development will be equipped with gateways that
handle Internet connectivity, security, and home automation. Developer Commonwealth
Builders will join with service providers to offer Internet access, security and fire response
services. Residents will be able to keep up to date with community news and events via a
personal Web portal as well as monitor their homes.
One example of using a smart home feature might be that of a resident who just drove to
work checking a Web camera at home to find out whether or not the garage door had been
closed. If it was open the resident could close it remotely using the same Web portal,
according to IBM (Culinane, 2016).
25
Sz. Varga. Special English for Computer Science
A computer virus is an unwanted program that has entered a computer system without
anyone knowing about it. It has two parts, which I will call the infector and the detonator.
They have two different jobs. One of the features of a computer virus that differentiates it
from other kinds of computer programs is that it replicates itself. This way it can spread via
memory sticks transported from computer to computer or across a network to other
computers. Once a virus has infected a computer, the detonator performs the virus’s main
work. Generally, that work is either to damage data on a disk, or to do something that
interferes with the normal operation of the computer.
Many viruses have been spread through sharing pirated (illegally copied) games. This
problem is easy to avoid - be honest and pay for games. If a PC is shared or is one to which
the public has access, a virus-checking program should be used to scan the PC before letting
it write data on a memory stick.
You should be aware how your computer can become infected. Sources of viruses are
software that has already been infected, pirated games and emails. Information posted on
the website of the Helsinki-based security company, Fsecure, explains how one particular
virus is transmitted by email. The worm W32/Lirva spreads itself by retrieving email
addresses from a variety of files stored on a computer’s hard drive and then sending copies
of itself to those addresses in the form of an e-mail attachment. The subject lines of an
infected email may include Avril Lavigne is the best. The virus is capable of spreading
across computer networks by copying itself to shared folders on other computers or tricking
users into downloading and opening the attachment (Gregory, 2004).
Finish the following sentences.
A computer virus is an unwanted programme …
Virus has two main ……
Viruses differ from other programme because ….
Viruses spread through …..
Fsecure explains ………
a. infector
b. detonator
c. interfere
d. virus
e. victim
f. password
g. vendor
h. antivirus software
i. pirated games
j. fair and square
26
UNIT 7 COMPUTER SECURITY
Give synonyms to following words: unwanted adj, enter v, feature n, via prep, be aware of v
The tool to launch a denial-of-service (DoS) attack, which has crippled large retail and
news web sites this week, is one of the simplest and most common applications in an illicit
hacker’s toolbox. It works by preventing other users from accessing Internet services and
sites by overwhelming the sites with more hits than they can handle. Some years ago it took
good organizational skills to launch an effective DoS attack. Using one machine to flood
another did not always work. Network managers and their monitoring software could tell
when one machine sent a flood of data to their server and they could block that system as
easily as a plumber tightens a leaky pipe.
However, hackers today are not so easily stopped. They know that if enough different
machines from the entire Internet swamp a victim with data, administrators cannot block
them all quickly enough to prevent a server from freezing or crashing. Hackers take
advantage of freely available programs that they use to create distributed-denial-of-service
(DDoS) attacks.
The earliest of these programs, named Smurf, took advantage of a loophole in the
configuration of operating systems that allowed flooding a machine with pings. The ping is
a sort of network Yoo-hoo that is built into the infrastructure of the Internet. Malicious
hackers could exploit any networks with this loophole by sending a massive amount of data
to a target. Fortunately, network administrators fixed this problem soon after it was
discovered.
Other methods for flooding networks have been developed over time. For example,
SYN attacks by programming a computer to send hundreds of requests to a server on the
Internet. In an ICMP Echo, or ping attack, the attacker sends large volumes of a common
network probe to the victim. In all cases the results are the same; a server, unable to cope
with the overload, ceases to function (Weisman, 2020).
a. launch
b. cripple
c. plumber
d. toolbox
e. password
f. malicious
g. flood
h. freeze
27
Sz. Varga. Special English for Computer Science
i. cease
j. leaky pipe
affected, affect, a, an, breach, bleach, holes, hole, immediately, is own, to, this, were, who,
A computer hacker breached the security of SalesGate and Other Web sites,
stealing credit card numbers and posting them on the Internet. The company has confirmed
that a hacker accessed their server. Not all accounts were (1). The staff has identified those
that were and they notified those customers and the issuing bank (2) after confirmation of
the security breach. It was announced that more information about the security (3) would be
released at a future date.
According (4) the company’s website, SalesGate has been popular for a long time. It
is (5) online website used by small and large businesses to protect users’ personal
information. The breach is the work of a hacker (6) claims to have hit nearly a dozen e-
commerce sites, stealing credit card numbers and posting them on his (7) website. The
hacker, whose website (8) titled Curador - The Saint Of E-Commerce, has posted some
6000 credit card numbers and claims to have more than 23,000 of them
Among other sites Curador hit were Feelgoodfall.com and Shoppingthailand. com.The
website, paid for with a stolen credit card, was shut down (9) week. Some experts say that
Curador is exploiting security (10) in Microsoft software that has not been fixed.
Investigators in Canada, Thailand and the US are pursuing him.
Glossary
breach (n) an opening or a gap made in a wall, barrier etc.
confirm (v) to provide an evidence that a report is true
notify (v) to inform somebody of something
release (v) to allow information to be made known
immediately (adv) at once
28
UNIT 7 COMPUTER SECURITY
29
Sz. Varga. Special English for Computer Science
30
8. ADDITIONAL EXERCISES
8. ADDITIONAL EXERCISES
8.1. E-waste
Fill in the gap with the given words. 20 words are given, but you have to choose only 15. You
can one word once only.
8.2 Robots
Fill in the gap with the given words. 25 words are given, but you have to choose only 20. You
can one word once only.
31
Sz. Varga. Special English for Computer Science
When I first met Gita the robot, it was a bit banged up. An accident in Central Park a day
prior left a small jagged hole in its plastic frame, and only one wheel was lighting up as it
should. Two hours later, the poor thing also busted its front camera sensor in a crash with
my office glass door. But hey, that's all part of testing a prototype, right?
Gita is an extremely nimble cargo bot, designed to follow its owner for miles, carrying 40
pounds of stuff inside its 2-foot-tall body. It doesn't have the features you'd expect of a
companion robot. There are no arms. It doesn't make small talk. There's not even a smiley
face programmed into the screen to ease your trepidation over having a robot follow your
every move. It has more in common with a scooter than a robot pet -- and with good reason.
It's made by Piaggio, the Italian company behind the Vespa. There are currently four
prototype Gita vehicles. There's nothing cooler than having your own rolling robot buddy
32
8. ADDITIONAL EXERCISES
follow you around the city. That is, until you have to strap on this massive, blocky white belt
over your coat to make it work. Camera sensors are packed into what looks like a
Stormtrooper costume accessory. Data gathered by the belt syncs up with camera sensors
surrounding Gita robot. That way, it can map out where I'm going, turn a corner to follow
me, and not run into walls or people walking between us. But don't be too distracted by the
belt. The creators say the final version won't require the owner to wear something so bulky.
In fact, it could just be something small you clip to a pocket.
Gita has many tricks that my demo wasn't set up to show off. It can travel up to 22 miles
per hour so it can keep up with someone running or riding a bike. It's able to stay close your
side when you need to keep it on a tight leash -- such as when entering an elevator.
The company is also working on a mode to have it park outside a store and wait for you.
If you're worried about someone rolling away with your Gita, it's cumbersome to move,
weighing in at around 50 pounds. The door latch is locked by a fingerprint scanner. And
alarms will go off if someone starts messing with your bot.
It also can map an area to memorize it for future trips, so it doesn't always need to follow
someone to know where to go. For now, the team behind the Gita is shopping it around to
different businesses to test it out in office and customer-service environments. Later this
year, you could see Gita trailing nurses in hospitals, or assisting bellhops in hotels. It may be
another two years before we can use Gita ourselves to carry our groceries home, lug those
heavy college textbooks -- or better yet, follow you around a tailgate party as your personal
beer cooler (Carey, 2017).
What happened to Gita in an accident?
How much cargo can Gita carry inside?
How tall is Gita?
Does Gita have limbs?
Which company produced Gita?
How many prototypes were made?
What speed can it reach?
How can the owner control Gita?
Why is it difficult to steal Gita? (2 reasons)
In which other areas will Gita be used in the future?
Discussion topic:
How much do you agree with the ideas of the following text?
33
Sz. Varga. Special English for Computer Science
changes in behaviour. Attention spans are shorter; personal communication skills are
reduced; and there is a marked reduction in the ability to think abstractly.
This games-driven generation interprets the world through screen-shaped eyes. Many
parents will notice how addictive some video games can be and how the young can waste
the whole day gaming until their eyes are red and tired. We could be raising a hedonistic
generation who live only in the thrill of the computer-generated moment, and are in distinct
danger of detaching themselves from the real world. The brain is like any other muscle in
the body and you need to exercise it and use it in lots of different ways to keep it growing,
stimulated and healthy. Alzheimer’s research has shown that there is some truth in the
adage “use it or lose it.” Chinese researchers have found that our grey matter— the part of
the brain responsible for processing of speech, memory, motor control, emotion, sensory,
and other information— is shrinking or atrophying. Constant Web use often replaces
exercise, and face-to-face contact which can lead to loneliness, and depression. It is
important as with all things in life to have balance. It is important that even after leaving
school or college we go on learning new skills to keep our brains bright, sharp and active.
Children should be encouraged to use their brains in a variety of different areas such as
sport, learning to play an instrument, mathematics, and writing. And to constantly stretch
their brains by acquiring new skills. In a world where we are living ever-longer it is important
not to take our brains for granted and to use them to become lifelong learners. Limits
should be put on time spent on technology and you should control your time.
Meal times are important family time and all technology should be switched off.
I hope this article will make you reflect on your use of technology and look at is as a tool in
life that should be used wisely and in moderation; and that you should also intentionally
make your brain work in other ways too (Carpenter, 2013).
Alva [email protected]
34
8. ADDITIONAL EXERCISES
Self-Driving Cars Many industry players are treating self-driving cars much like you
would a feature such as cruise control: a nice-to-have option that will make driving much
easier and safer. There are a lot of industries that will be impacted by this, though, both
positively and negatively -- not the least of which is the car industry itself, which could find
the majority of car companies either vastly changed or out of the market entirely.
Replacement Parts for Humans
This is perhaps the least obvious change, but with 35K deaths attributed to them each
year in the U.S., car accidents have been a huge source of organs for those who need them.
Self-driving cars will massively reduce those deaths to near zero, and that could result in a
huge imbalance between those who need organs and the available supply. It could lead to a
sharp price increase for organs and likely a huge increase in illegal harvesting, particularly in
regions where this is already a problem.
Efforts to create a cloned alternative in the U.S. have been hampered by the religious
right. That could result in a distinct and massive spike in illegal organ harvesting in the U.S.,
and a huge push for people who need them to go to countries that don't have these
restrictions in order to save their lives. This is big enough that it could have a massive impact
on which party is in power.
Used Cars : There recently have been reports that the used car market is beginning to
collapse, which is having an adverse impact on car lease and car payment rates because
residuals on cars appear to be dropping rapidly. The cause is thought to be Uber (though
part of it could be a hot stock market which may be pushing some typical used car buyers to
new cars). Uber plans to massively increase its service coverage once it can use autonomous
cars.
This massive increase should reduce the demand for cars massively, on top of the massive
reduction in demand for cars that can't do self-driving (which are expected to be banned in a
few years on many roads). That means not only that there will be an increasing inability to
resell cars that don't have self-driving capabilities, but also that large numbers of people will
feel they don't need cars at all.
New Cars: If you think about it, fully self-driving cars are like rolling elevators, and in
areas covered by services like Uber the cost will be very low and the availability very high.
They come without insurance, without parking or fuel charges, and without the need to
garage or pay for parking.The cost reduction for going to a service like Uber, which may
provide subscription services -- a monthly fee for all you can ride -- should be massive. What
that suggests is that the market for new cars should collapse in favor of Cars as a Service.
Only the very rich will own cars, as a sign of status. I am surprised that the car companies
aren't all joining Toyota in an IBM-like strategy to create cars that use an autonomous car
approach called "Guardian Angel," which enhances the driver's capabilities but does not
completely eliminate the driver like the Uber and Google approaches do. It's one possible
way to preserve their market.
Litigation/Insurance: The massive reduction in accidents should eliminate much of the
need for litigation, both civil and criminal. That change also will impact insurance. I've seen
models that suggest car insurance revenues will decrease in the 90 percent range, largely
because much of the risk will be mitigated. The need to have car insurance -- outside of firms
35
Sz. Varga. Special English for Computer Science
like Uber, which either will buy in volume or self-insure -- should evaporate. If most folks
don't own cars, they won't need to insure them.
Media Consumption: Media consumption should increase dramatically, because folks
who currently are driving to work and unable to consume visual media or read books during
their commute will be able to do so. Many will choose to work either coming or going, but
most likely will use at least some of the time to watch movies, play video games, or read
books and magazines.
Law Enforcement: With the combination of cars with massive numbers of sensors
(including cameras), centralized tracking, and near constant oversight, traffic cops should
become redundant. Both on-car and in- street tracking systems will report folks who are
misbehaving in real time, and folks who are behaving badly and overriding or not using self-
driving will receive tickets in the mail or have law enforcement waiting for them at their next
stop or home.
The need to put police on the roads should evaporate, except for extreme measures
like catching terrorists or robbers. This need likely could be met with weaponized drones
designed to eliminate the related threat from the air, and that could respond quickly from
centralized depots.
Automated On-Site Car Repair: Given that many of these cars will be operating 24
hours a day and 7 days a week, the likelihood of an on-road failure will go up, needing a
service that can repair the autonomous car where it failed. Much like support for other
technology products is outsourced to firms specializing in that service, this too could lend
itself to service companies that can span service providers, allowing higher economies of
scale, better coverage and lower costs.
The easiest system would be an automated service that retrieved the car and delivered it to
a regionalized repair depot. You wouldn't be abandoned -- a replacement car likely would
pick you up long before the repair vehicle arrived. In fact, given an early warning, it likely
would be dispatched before you were stuck.
Wrapping Up: Autonomous cars represent a massive game change for the car
industry. The biggest driver is that this technology could save nearly one and a half million
lives worldwide each year. Basically, the long-term plan is to change cars from what they are
today into four-wheeled elevators. On the positive side, this will save a massive number of
lives and free time up for folks to be more productive or enjoy media. However, it also will
lead to massive reductions in industries that make their living off the older model. Self-
driving cars are just one aspect of what many are calling "the second industrial revolution,"
and likely only the tip of the iceberg when it comes to the changes robotics and artificial
intelligence are likely to bring (Enderle, 2017).
36
8. ADDITIONAL EXERCISES
technology are the 'now'. Although, they will play a part in the future, four years ago the
iPad didn't even exist. We don't know what will be the current technology in another four.
Perhaps it will be wearable devices such as Google Glass, although I suspect that tablets will
still be used in education. The future is about access, anywhere learning and collaboration,
both locally and globally. Teaching and learning is going to be social. Schools of the future
could have a traditional cohort of students, as well as online only students who live across
the country or even the world. Things are already starting to move this way with the
emergence of massive open online courses (MOOCs).
For me the future of technology in education is the cloud. Technology can often be a
barrier to teaching and learning. I think the cloud will go a long way to removing this barrier.
Why? By removing the number of things that can go wrong. Schools, will only need one
major thing to be prepared for the future. They will not need software installed, servers or
local file storage. Schools will need a fast robust internet connection. Infrastructure is
paramount to the future of technology in education. We don't know what the new 'in'
device will be in the future. What we do know, is that it will need the cloud. Schools and
other educational institutions will need to futureproof their infrastructure the best they can.
If you want to start to use mobile technology in your school, whether it is an iPad program or
a bring your own device (BYOD) program your connectivity must be fast and reliable. If the
network is slow and things are not working properly students and teachers will not want to
use the devices. Make the sure the infrastructure is there before the devices. Teachers can
use the cloud to set, collect and grade work online. Students will have instant access to
grades, comments and work via a computer, smartphone or tablet. Many schools are already
doing this.
School classrooms are going to change. Thanks to the cloud and mobile devices,
technology will be integrated into every part of school. In fact, it won't just be the
classrooms that will change. Games fields, gyms and school trips will all change. Whether
offsite or on site the school, teachers, students and support staff will all be connected. In my
ideal world, all classrooms will be paperless. With the cloud, the world will be our classroom.
E-learning will change teaching and learning. Students can learn from anywhere and
teachers can teach from anywhere.
The cloud can also encourage independent learning. Teachers could adopt a flipped
classroom approach more often. Students will take ownership of their own learning.
Teachers can put resources for students online for students to use. These could be videos,
documents, audio podcasts or interactive images. All of these resources can be accessed via
a student's computer, smartphone or tablet. As long as they have an internet connection
either via Wifi, 3G or 4G they are good to go. Rather than being 'taught' students can learn
independently and in their own way. There is also a massive amount of resources online that
students can find and use themselves, without the help of the teacher. This of course means
the role of the teacher will change. Shared applications and documents on the cloud, such as
Google Apps will allow for more social lessons. How often do students get an opportunity to
collaborate productively using technology in the classroom? It isn't always easy. However,
students working on documents together using Google Apps is easy. They could be in the
same room or in different countries. These are all good skills for students to have. Of course,
these collaborative tools are also very useful for teachers. I for one have worked on several
37
Sz. Varga. Special English for Computer Science
projects where these tools have lets me work with people across the country. Some of which
I have never met.
What we must remember is that when schools adopt new technology and services,
they must be evaluated. This way, as a school, you know if they are successful and what
improvements are needed. Staff will also need training, you can't expect staff to use new
technology if it they are not confident users or creators. Any initiative is doomed to failure
without well trained, confident staff who can see how technology can support and benefit
teaching and learning.Plenty of schools have already embraced this, but there's still a way to
go to ensure all schools are ready for the future of technology. It is time for all schools to
embrace the cloud (Britland, 2013).
What is the future? Is it the iPad?
Why will be access to Internet important in education?
What does the author say about the cloud?
What is the most important technical facility for schools to provide knowledge transfer?
How should the classrooms change?
How can cloud encourage independent learning?
What advantages can flipped classroom offer?
How will the role of the teacher change?
These friendly helpers were the trend this year at the Consumer Electronics Show in
Las Vega. If you’re a parent, you probably know how expensive hiring a nanny can be. To
help out, companies are coming out with high-tech alternatives. At this year’s Consumer
Electronics Show in Las Vegas, Kuri, Aristotle, and other gadgets were on display.
Kuri is a roving robot that roams around the home to assist with tasks such as waking up the
kids when it’s time to get ready for school, telling bedtime stories, and singing the children’s
favorite songs. When parents are not home, they can view their children through the robot’s
built-in cameras, which they can monitor via a mobile app.
Aristotle, which I consider to be a baby monitor on steroids, is similar to the Amazon
Echo digital assistant, only the voice-activation technology is designed to communicate with
your child. For example, Aristotle automatically recognizes when a baby wakes up when it
makes a sound and can soothe it to sleep with a lullaby or turn on a night-light. The device
also can alert you when the supply of diapers is low. What’s more, Aristotle can play games
with toddlers, such as having them guess which animal noise it is making or the shape
displayed on its screen. Those are just two of the dozens of robot helpers that appeared on
the CES showroom floor.
But such devices beg the question of whether having technology help raise children is
beneficial, or can it have unintended consequences? To provide some insight into this
trend, The Institute interviewed IEEE Life Senior Member Jim Isaak, vice president of the IEEE
Society on Social Implications of Technology. These technologies could be designed to help
children develop independence and critical-thinking skills, as well as explore their own
unique talents. And more likely than not, parents are going to use these devices to mirror
their own intentions, such as having the device remind kids to practice the piano or help
38
8. ADDITIONAL EXERCISES
them with their homework. Furthermore, the robot might notice that the child is particularly
gifted at quantum mechanics, and notify the parents of her skills.
Of course, kids could also become so enthralled by their robots that they prefer
interaction with them over their parents, and may find it more difficult to develop human
connections. The children may even become dependent on the robot, especially since it will
know them better than others could. These devices come with obvious hacking risks, such as
people listening in or watching your child, whether a neighbour or a government agency. But
some vulnerabilities are subtler than that. For example, a device like the Aristotle could
potentially sell or promote products to young children, either explicitly or implicitly, when
telling stories or making recommendations. It may also be difficult to wean children away
from a robot as they get older. Children already have a difficult time giving up their favourite
dolls, blankets, or even imaginary friends. What parents will do to disconnect their kids from
their robot nannies is an open question.
It will be some time before human observation and judgment can be replaced by
artificial intelligence. Robots cannot protect children from all possible dangerous situations.
The potential to have a robot watch over a child raises ethical concerns as well. If a robot
accidently hurts a child, how will this be handled in court? Conversely, how should the robot
respond if it witnesses child abuse in the home? Should it be programmed to call the
authorities? These and many other questions have yet to be answered.
https://robotic-fanatic.myshopify.com/blogs/news/robot-nannies-should-gadgets-raise-
your-kids
Who are Kuri and Aristotle?
What can robot nannies do?
As a parent, do you think bringing robot nannies into the home can be helpful?
What aspects of the technology should parents be wary of?
What are the advantages and disadvantages of robot nannies?
Will it be possible to replace nannies altogether with robots?
What are the advantages and disadvantages of robot nannies?
Will it be possible to replace nannies altogether with robots?
Google “glucose” right now, and you’ll find a slew of results with Google itself in the
header. This is because Google is getting into a new market: Diabetes. The company has just
revealed a new method for monitoring glucose, in a classically Google-clever way: Smart
contact lenses with tiny glucose-tracking technology will monitor wearers’ glucose levels not
by measuring the sugar in their blood, but by tracking it in their tears.
“It doesn’t look like much, but it was a crazy amount of work to get everything so very
small,” said Google researcher Brian Otis in a statement. The research, by the company
that’s also brought us Glass and driverless cars, was kept under wraps until yesterday.
The contact lenses will monitor glucose with a tiny sensor once per second, and then
transmit the data through a wireless transmitter. According to Otis, the sensor is the
smallest ever made, and took years of affixing tiny wires to tiny electronics to produce it.
39
Sz. Varga. Special English for Computer Science
The blood sugar monitoring industry will reach $16 billion this year, and the devices
available now – whether needle-based or wristband-based – are not particularly convenient
or comfortable for users. “Smart” blood sugar monitoring has been in the works for many
years, but no one has revealed a reliable fix for the problem. Some academic institutions
have also been working on glucose-monitoring contacts, but as Otis says, “You can take it to
a certain level in an academic setting, but at Google we were given the latitude to invest in
this project.”
The electronics in the contacts lie on the periphery, so don’t obstruct the wearer’s
vision. To power the lenses, developers designed a method of pulling energy from
surrounding radio frequency waves. The company is testing the possibility of adding a tiny
LED light to indicate when the wearer’s glucose exceeds a certain level. Over 380 million
people are affected by diabetes globally. Many have to prick their fingers up to 10 times per
day to keep track of their blood sugar and adjust insulin accordingly. The concept could be a
game-changer, for sure, but the details still have to be worked out. Among them will be how
to actually calculate blood sugar from tear sugar, and how the technology might be affected
under various weather conditions and various emotional conditions. And, of course, the FDA
will have to approve it before it goes to market (Walton, 2014).
40
8. ADDITIONAL EXERCISES
A major computer security vulnerability has been discovered - with experts cautiously
warning it could potentially affect hundreds of thousands of devices, apps and services.
However, due to the nature of the bug, it is extremely difficult to know how serious the
problem is. Google engineers, working with security engineers at Red Hat, have released a
patch to fix the problem. It is now up to manufacturers, and the community behind the Linux
operating system, to issue the patch to affected software and devices as soon as possible.
41
Sz. Varga. Special English for Computer Science
In a blog post explaining the discovery, Google's team detailed how a flaw in some
commonly-used code could be exploited in a way that allows remote access to a devices - be
it a computer, internet router, or other connected piece of equipment. The code can also be
within many of the so-called "building blocks" of the web - programming languages such as
PHP and Python are affected, as well as systems used when logging in to sites or accessing
email. "But it's true there's a very real prospect that a sizable portion of internet-facing
services are at risk for hackers to crash, or worse, run remote code to attack others." He said
that while there is no publicly known attack code using the flaw, it's a "near certainty"
hackers would try to exploit the weakness.
The bug is found in glibc - a open-source library of code that is widely used in internet-
connected devices. One particular function is domain look-up. This happens when the
devices converts a typical web domain, say bbc.com, and finds its corresponding IP address
so it can access whatever website or service is needed. The domain look-up code in glibc
contains a bug that could allow hackers to maliciously implant code within a device's
memory. From here, attacks such as remote execution - controlling the device over the
internet - could take place. However, Google said it is very hard to exploit the flaw although
their engineers have worked out how. For obvious security reasons they are not making that
public. The scale of the problem is difficult to determine because it is unclear how many
devices and systems make use of the glibc code (Lee, 2016).
What did Google engineers do to help users to tackle the security problem?
Which operating system is affected?
How does the bug work?
Which programming languages are involved?
What is glibc? How can the bug affect is glibc?
42
8. ADDITIONAL EXERCISES
References
Abraham et al. (2017). Coding All-in-One For Dummies. New Jersey, John Wiley & Sons.
Ackerman, E. (2017). Controllable Cyborg Beetles for Swarming Search and Rescue.
https://spectrum.ieee.org. [Retrieved on 21 May 2021]
Blanche, A. (2014). New Electrical Clothing Can Charge Your Cell Phone.
https://www.techandfacts.com/new-electrical-clothing-can-charge-your-cell-phone/.
[Retrieved on 21 May 2021]
Briggs, J. (2012). Python for Kids: A Playful Introduction to Programming. No Starch Press.
ebook. [Retrieved on 23 May 2021].
Culinane, S.(2016).The IoT and smart home security systems that revolutionised 2016.
https://www.ibm.com/blogs/internet-of-things/smart-home-security/
[Retrieved on 23 May 2021]
Daily Mail Reporter (2010). Revealed: The hi-tech fridge of the future that will tell you what
to have for dinner. https://www.dailymail.co.uk/sciencetech/article-1341190/Revealed-The-
hi-tech-fridge-future-tell-dinner.html [Retrieved on 22 May 2021]
Glendinning, E, & McEvan, E. (2014). Oxford English for Information Technology, Second
Edition,Oxford University Press, ISBN: 019457492X
Noni Rizopoulou (2019). Academic English for Computer Science ISBN:9786182020401
43
Sz. Varga. Special English for Computer Science
Gregory, P. (2004). Computer Viruses For Dummies. Indianapolis, Indiana, Wiley Publishing.
Gurtner, G. C., & Chapman, M. A. (2016). Regenerative Medicine: Charting a New Course in
Wound Healing. Advances in wound care, 5(7), 314–328. [Retrieved on 22 May 2021]
Lee, D. (2016). Glibc: Mega bug may hit thousands of devices. BBC News.
http://www.bbc.com/news/technology-35592916. [Retrieved on 22 May 2021]
Leiner et al., (2009). A Brief History of the Internet. ACM SIGCOMM Computer.
Communication Review. [Retrieved on 22 May 2021]
Mondal, K. (2018). Recent Advances in Soft E-Textiles. Inventions, 3(2), 23. MDPI AG.
Retrieved from http://dx.doi.org/10.3390/inventions3020023. [Retrieved on 22 May 2021]
Ravi, A. D., Sadhna, D., Nagpaal, D., & Chawla, L. (2015). Needle free injection technology: A
complete insight. International journal of pharmaceutical investigation, 5(4), 192–199.
https://doi.org/10.4103/2230-973X.167662. [Retrieved on 22 May 2021]
44
8. ADDITIONAL EXERCISES
Small, G. W., Lee, J., Kaufman, A., Jalil, J., Siddarth, P., Gaddipati, H., Moody, T. D., &
Bookheimer, S. Y. (2020). Brain health consequences of digital technology use. Dialogues in
clinical neuroscience, 22(2), 179–187. https://doi.org/10.31887/DCNS.2020.22.2/gsmall.
[Retrieved on 23 May 2021]
Walton, A. G. (2014). All Eyes On Google's New 'Smart' Contact Lenses. Forbes.
https://www.forbes.com/sites/alicegwalton/2014/01/17/smart-contact-lenses-
glucoseproduct-leave-it-to-google/?sh=2a03774d5f20. [Retrieved on 22 May 2021]
Weisman, S. (2020). What are Denial of Service (DoS) attacks? DoS attacks explained.
NortonLifeLock.https://us.norton.com/internetsecurity-emerging-threats-dos-attacks-
explained.html. [Retrieved on 22 May 2021]
45