the main electronic memory of a personal computer and used for storing the programs and data being used 9.. If it finds the data in the cache then this ___ 4 ___ as a ‘cache hit’ and th
IT TOPICS
LANGUAGE KNOWLEDGE
1.1 Match the terms with their corresponding meanings
1 RAM A the most powerful type of mainframe computer
2 processor B an optical input device that uses the reflection of light to copy text or graphics into a computer
3 ROM C the electronic processor at the centre of a computer
4 supercomputer D the main electronic input device that has keys arranged in a similar layout to a typewriter
5 CPU E a common output device used for printing the output of a computer on paper
6 scanner F a type of memory that holds instructions which are needed to start up the computer
7 monitor G the largest and most powerful type of computer It is operated by a team of professionals
8 keyboard H the main electronic memory of a personal computer and used for storing the programs and data being used
9 mainframe I the main output device used to display the output from a computer on a screen
10 printer J the part of a computer that processes the data
1.2 Choose the correct option for each question
1 In this groceteria, you just choose the products, scan the and pay by yourself
2 Since the same indirection operator is often used repeatedly, we these pre- images for later re-use
3 The collected from user interactions with the mobile app was analyzed to identify trends and enhance the overall user experience
4 While navigating through the spreadsheet, the user moved the to a specific cell to input the updated data
5 In the early 2000s, were widely used for tasks such as scheduling, note- taking, and contact management before smartphones became the dominant mobile devices
6 In the office, employees use to gain access to secure areas, ensuring a controlled and monitored entry system
7 The IT technician troubleshooted the connectivity issue with the external hard drive, a vital for storing large amounts of data on the user's computer
8 During the debugging process, the programmer inserted a in the code to mark a specific point for further analysis, helping to identify and address potential issues
9 The company implemented a robust infrastructure to ensure seamless communication and data transfer between various departments, enhancing overall efficiency and collaboration
10 The new software application is designed to be compatible with multiple , including Windows, macOS, and Linux, providing a versatile solution for users across different platforms
Passage 1 Read the passage and fill in the numbered blanks with the correct words given in the box There are two extra words counts processor bottleneck output logic buffer memory reflected techniques modem
Most PCs are held back not by the speed of their main _ (1) _, but by the time it takes to move data in and out of memory One of the most important techniques for getting around this _ (2) _ is the memory cache
The idea is to use a small number of very fast memory chips as a _ (3) _ or cache between main memory and the processor Whenever the processor needs to read data, it looks in this cache area first If it finds the data in the cache then this _ (4) _ as a ‘cache hit’ and the processor need not go through the more laborious process of reading data from the main memory Only if the data is not in the cache, does it need to access main _ (5) _, but in the process it copies whatever it finds into the cache so that it is there ready for the next time it is needed The whole process is controlled by a group of _ (6) _ circuits called the cache controller
One of the cache controller’s main jobs is to look after ‘cache coherency’ which means ensuring that any changes written to main memory are _ (7) _ within the cache and vice versa There are several _ (8) _ for achieving this, the most obvious being for the processor to write directly to both the cache and main memory at the same time
Passage 2 Read the passage and fill in the numbered blanks with the correct words given in the box There are two extra words cache modem storing telephone output compatible input server referred processor
Note that the term PC usually refers to an IBM _ (1) _ personal computer, i.e an Apple Mac personal computer is not referred to as a PC A computer that provides a service on a network, e.g _ (2) _ files, sharing a printer, is known as a server computer _ (3) _ computers usually have a UPS (uninterruptible power supply) attached to them This is a battery that automatically provides an electricity supply to allow the server to shut itself down properly if the main supply fails
The combination of the processor and memory is sometimes referred to as the CPU (central processing unit), although sometimes the processor itself is _ (4) _ to as the CPU The other parts connected to the CPU are known as peripherals These can include input devices, output devices, storage devices and communications devices
_ (5) _ devices include: keyboards, scanners, barcode readers, digital cameras, microphones and video cameras e.g webcams (small digital video cameras used on the Web) _ (6) _ devices include: monitors (VDU display screens), printers, plotters, loudspeakers, headphones Storage devices include: magnetic tape, floppy disks (diskettes), hard disks, CD-ROMs, CD-R disks, CD-RW disks, DVDs and MO disks A common communications device is a _ (7) _ (a modulator/demodulator used for converting digital signals to analogue signals and vice versa to allow a computer to be connected to the ordinary _ (8) _ system)
Passage 3 Read the passage and fill in the numbered blanks with the correct words given in the box There are two extra words parts connectors desktop disk processed provide synchronised cables expensive consists
A set of _ (1) _ used for carrying signals between the different _ (2) _ of a computer is known as a bus Data is transferred constantly between the processor and memory along the system bus Each part of memory has its own memory address and the processor determines where _ (3) _ data is stored by sending an address signal along an address bus and data along a data bus This is _ (4) _ by an electronic clock in the CPU that determines the operating speed of the processor Transferring data between the processor and RAM can slow up the computer; therefore, some very _ (5) _ , extremely fast memory is usually used as a cache to hold the most frequently used data
In a _ (6) _ computer, the CPU (central processing unit) and storage devices (pieces of equipment used for reading from and writing to a storage medium) are normally built inside a system unit which _ (7) _ of a metal chassis enclosed in a flat desktop or a tower shaped case Other peripherals are attached to the system unit by _ (8) _ Each peripheral uses its own driver card or controller (an expansion card that is plugged into special expansion slots in the system unit)
(https://studfile.net/preview/1582975/page:2/)
Passage 4 Read the passage and fill in the numbered blanks with the correct words given in the box There are two extra words. plugged RAM disks special provide consist used light capacity sectors
Hard disks _ (1) _ of a set of magnetic coated metal disks that are vacuum- sealed inside a case to keep out the dust The magnetic surfaces of the _ (2) _ are formatted using a read/write head to provide magnetic storage areas These storage areas form concentric circles called tracks and each track is subdivided into sections called
_ (3) _ The disks are rotated at high speed and read from or written to by the read/write head that moves across the surface of the disks In server computers, hard disks can be connected together and made to operate as one unit using RAID (a redundant array of inexpensive disks) This can speed up the system and _ (4) _ a way of recovering data if the system crashes (fails suddenly and completely, usually referring to the failure of a hard disk) There is a variety of optical storage devices that use laser _ (5) _ to read or write to a disk
An input device called a barcode reader is a _ (6) _ type of scanner for reading barcodes (a set of printed bars of varying thickness that are _ (7) _ to identify a product e.g used to price items in supermarkets)
When comparing computers, the power of the computer is important This is mainly determined by the speed and _ (8) _ (size) of each part of the computer
(https://studfile.net/preview/1582975/page:2/)
Passage 1 Choose the correct option to answer each question
THE STRUCTURE OF COMPUTER ARCHITECTURE
While computer architectures can differ greatly depending on the purpose of the computer, several key components generally contribute to the structure of computer architecture:
LANGUAGE USE
Translate the following sentences into Vietnamese
1 There are different types of computers of varying size and power, including the following: supercomputer, mainframe, minicomputer, and personal computer
2 A computer that provides a service on a network e.g., storing files, sharing a printer is known as a server computer
3 Server computers usually have a UPS (uninterruptible power supply) attached to them This is a battery that automatically provides an electricity supply to allow the server to shut itself down properly if the main supply fails
4 There are two main types of memory: RAM (random access memory) holds the program instructions and the data that is being used by the processor, and ROM (read only memory) holds the program instructions and settings required to start up the computer
5 A set of connectors used for carrying signals between the different parts of a computer is known as a bus
6 Each part of memory has its own memory address and the processor determines where processed data is stored by sending an address signal along an address bus and data along a data bus
7 Transferring data between the processor and RAM can slow up the computer; therefore, some very expensive, extremely fast memory is usually used as a cache to hold the most frequently used data
8 ln a desktop computer, the CPU (central processing unit) and storage devices (pieces of equipment used for reading from and writing to a storage medium) are normally built inside a system unit which consists of a metal chassis enclosed in a flat desktop or a tower shaped case
9 A portable computer that does not have enough space inside to fit expansion cards may use an external device called a port replicator to provide connections for peripherals
10 Hard disks consist of a set of magnetic coated metal disks that are vacuum-sealed inside a case to keep out the dust
11 There is a variety of optical storage devices that use laser light to read or write to a disk, including: CD-ROMs (compact disk read only memory), CD-R (recordable compact disk), CD-RW (rewritable compact disk), DVD (digital versatile disk - previously known as digital video disk)
12 An input device called a barcode reader is a special type of scanner for reading barcodes (a set of printed bars of varying thickness that are used to identify a product e.g., used to price items in supermarkets)
13 When comparing computers, the power of the computer which is mainly determined by the speed and capacity (size) of each part of the computer is important
14 Two different number systems are used in computer specifications: the decimal system consisting of ten digits from 0 to 9, and the binary system only having two digits (1 and 0) for measuring capacity
15 Communication is provided between applications programs (word processors, drawing programs, etc.) and the computer hardware (the physical components of a computer system) by a set of programs collectively known as the operating system e.g., Microsoft Windows, MacOS
Make meaningful sentences by adding between 8 and 15 words to the given phrases
2 The function of flash memory key is to
5 Most PCs are held back by
6 Looking after ‘cache coherency’ means
7 The ‘write-back’ cache allows the processor to
8 ‘Dirty catche’ tells the cache controller to
9 Disk caching works in essentially the same way whether
10 If the requested information isn't in the cache,
11 The CPU is the heart of the computer, a micro processor chip which
12 At the back of a computer, there are ports into which
OPERATING SYSTEM
1.1 Match these terms with their corresponding meanings
1 kernel A to convert for use in another operating system or computer platform
2 port B a program included with an operating system that can perform useful common routine tasks or housekeeping operations
3 log on C kept in the computer's memory
4 resident D a main computer that provides a service on a network
5 hardware E the hardware or software that connects two systems and allows them to communicate with each other
6 server F the process of typing and editing text using a word processor
G the physical components of a computer system
8 utility H the lowest level layer at the core of an operating system It deals with allocating hardware resources to the rest of the operating system and the application programs
9 text editor I to connect to a network system account normally using a password
10 interface J a computer program for editing basic data or program text, i.e., like a basic word processor
1.2 Choose the correct option for each question
1 The computer successfully established a secure connection to the server, allowing users to access and retrieve files from the central database
2 The simplifies data analysis by providing a user-friendly interface for visualizing and interpreting complex information
3 The software developer identified and resolved a critical in the code, ensuring a smoother user experience and preventing potential system crashes
4 After making code modifications, the programmer needs to the source files to create an executable program for testing and deployment
5 Penetration testing involves authorized individuals deliberately trying to into a system to identify vulnerabilities and improve its overall security
6 The quickly retrieved relevant results based on the user's query, displaying a list of websites, articles, and images related to the specified search terms
7 Before deploying the new feature, the development team carefully examined the
to ensure it adhered to coding standards and didn't introduce any security vulnerabilities
8 When accepting user input, the program validates that the entered value is a before processing, ensuring it meets the expected text format
9 The computer program will the specified commands once the user initiates the application, carrying out the designated tasks
10 The development team decided to use software for the project, leveraging the benefits of community collaboration and transparency in code accessibility
Passage 1 Read the passage and fill in the numbered blanks with the correct words/ phrases given in the box There are two extra words roots identify design devices software component core commercial scanner handles
Linux has its _ (1) _ in a student project In 1992, an undergraduate called Linus Torvalds was studying computer science in Helsinki, Finland Like most computer science courses, a big _ (2) _ of it was taught on (and about) Unix Unix was the wonder operating system of the 1970s and 1980s: both a textbook example of the principles of operating system _ (3) _, and sufficiently robust to be the standard OS in engineering and scientific computing But Unix was a _ (4) _ product (licensed by AT&T to a number of resellers), and cost more than a student could pay
Annoyed by the shortcomings of Minix (a compact Unix clone written as a teaching aid by Professor Andy Tannenbaum) Linus set out to write his own ‘kernel’ - the _ (5) _ of an operating system that _ (6) _ memory allocation, talks to hardware _ (7) _, and makes sure everything keeps running He used the GNU programming tools developed by Richard Stallman’s Free Software Foundation, an organisation of volunteers dedicated to fulfilling Stallman’s ideal of making good _
(8) _ that anyone could use without paying When he'd written a basic kernel, he released the source code to the Linux kernel on the Internet
(https://studfile.net/preview/8835687/page:6/)
Passage 2 Read the passage and fill in the numbered blanks with the correct words/ phrases given in the box There are two extra words contribute modify features conventional fixes fulfilling allocation revenue improvements development
Source code is important It’s the original from which compiled programs are generated If you don't have the source code to a program, you can’t _ (1) _ it to fix bugs or add new _ (2) _ Most software companies won’t sell you their source code, or will only do so for an eye watering price, because they believe that if they make it available, it will destroy their _ (3) _ stream
What happened next was astounding, from the _ (4) _ , commercial software industry point of view - and utterly predictable to anyone who knew about the Free Software Foundation Programmers (mostly academics and students) began using Linux They found that it didn’t do things they wanted it to do - so they fixed it And where they improved it, they sent the _ (5) _ to Linus, who rolled them into the kernel And Linux began to grow
There’s a term for this model of software _ (6) _ ; it’s called Open Source (see www.opensource.org/ for more information), so Anyone can have the source code
- it’s free (in the sense of free speech, not free beer) Anyone can _ (7) _ to it If you use it heavily you may want to extend or develop or fix bugs in it - and it is so easy to give your _ (8) _ back to the community that most people do so
(https://studfile.net/preview/8835687/page:6/)
Passage 3 Read the passage and fill in the numbered blanks with the correct words/ phrases given in the box There are two extra words symbol fix applications supervisor conventional interface tasks communicates non-resident displayed
The OS (operating system) is the set of computer programs that allow the user to perform basic _ (1) _ like copying, moving, saving and printing files It also provides an _ (2) _ between (i.e provides communication between) _ (3) _ programs (e.g word processors or spreadsheets) and the computer hardware As a user interacts with an applications program on the screen, the applications program _ (4) _ with the operating system and the operating system communicates with the computer hardware The work of the operating system takes place in the background and is not always obvious to the user
The most important program in an OS is the _ (5) _ program It remains in memory all the time that the computer is operating, and manages the OS It loads other parts of the OS into memory when they are needed Programs that remain in memory while the computer is in use are known as resident programs Programs that only stay in memory while they are being used are known as _ (6) _ programs
Some operating systems are command driven (i.e the user runs a program by typing a command) The screen is usually blank except for a _ (7) _ (e.g $) which acts as a command prompt When the command is typed at the prompt and the Enter key is pressed, the command is processed and the output is _ (8) _ on the screen OS commands are usually short words or abbreviations (e.g., date, logout, password, Is)
Passage 1 Read the passage then answer the questions below
1 Where is SuperSocial Pty Ltd based in?
2 What are SuperSocial ESN’s main selling points?
3 What kind of companies is the Basic system designed for?
4 What can users of the Basic Plus system do?
5 Which system has the high level of security?
SuperSocial ESN is an Enterprise Social Networking system produced by
SuperSocial Pty Ltd, a company based in Melbourne, Australia Its main selling points are that it helps clients’ employees to communicate more efficiently and gives them better access to digital data It provides a wide range of functions and because of
SuperSocial’s tiered pricing, clients can choose not to pay for the features that they don’t actually need
Plans start with the Basic system, which is designed for a small business at one location This has instant messaging as well as file sharing
The next level up, only slightly more expensive, is the Basic Plus system This has OCR and a document management system with tagging so that the user can scan documents and keep track of the electronic versions There is also a document archiving feature
The highest-level system is the Premium system, which has all the capabilities of the first two levels, plus some additional features With it, users can give and record webinars, and there is a speech-to-text capability so that users can create documents without typing Many users like to be able to write and send messages even when driving Users of the Premium system can access data wherever they are, whether in the office, visiting a client or at home And it comes with a high level of security, including a VPN and encryption so that access to the server is very secure
(https://www.studocu.com/es-ar/document/universidad-siglo-21/ingles/assignment-2- trabajo-practico-de-ingles/37728049)
Passage 2 Read the passage then answer the questions below
1 What is the role of an operating system in a computer?
2 How do application programs interact with the operating system?
3 Why is an operating system essential for software development?
4 What purpose does system software serve in relation to applications?
5 How does the operating system contribute to reducing coding efforts in software development?
OPERATING SYSTEM What is an operating system?
An operating system (OS) is the program that, after being initially loaded into the computer by a boot program, manages all of the other application programs in a computer The application programs make use of the operating system by making requests for services through a defined application program interface (API) In addition, users can interact directly with the operating system through a user interface, such as a command-line interface (CLI) or a graphical UI (GUI)
Why use an operating system?
APPLICATION PROGRAMMES
1.1 Match these terms with their corresponding meanings
1 bandwidth A a dialog box component that is used to switch between different sets of data
2 LAN B able to carry signals transmitted over a wide range of frequencies
3 office application suite C a dialog box component that is used to switch between different sets of data
4 data centre D a computer program or set of programs that are used in a typical office, e.g a word processor, spreadsheet and database
5 broadband E a company that offers individuals or enterprises access to applications and related services over the internet
6 SAP F the common name for an electronic mail message, i.e a text message sent electronically using a computer
7 email G computers connected together over a small area such as a company department
8 website H a set of related pages on the World Wide Web
9 ASP I a widely used enterprise resource planning tool program
10 tab J a facility for storing large amounts of information
1.2 Choose the correct option for each question
1 The email attachment carried a hidden that, when opened, infected the system and compromised sensitive data, highlighting the importance of email security measures
2 The graphic designer used a powerful to enhance the resolution and add creative effects to the digital illustrations for the marketing campaign
3 The e-commerce platform relies on a robust to efficiently manage and organize customer information, order details, and inventory data for seamless operations
4 The vintage although outdated by modern standards, is still in use for printing multipart forms and invoices in environments requiring continuous stationery
5 I rely on a to organize my schedule, contacts, and tasks, helping me stay productive and on top of my daily activities
6 The implementation of the new enterprise resource tool significantly improved the company's efficiency by integrating various business processes, including finance, human resources, and supply chain management
7 The team communicated project updates and collaborated on tasks through , using the company's secure server for confidential discussions
8 The company opted for a to ensure a dedicated and high-speed internet connection, meeting the demands of their data-intensive operations and providing a reliable link between their offices
9 The company expanded its business by establishing an platform, allowing customers to browse, purchase, and track orders online for a more convenient shopping experience
10 Users can the latest software update from the company's website to access new features and improvements in functionality
Passage 1 Read the passage and fill in the numbered blanks with the correct words given in the box There are two extra words bandwidth afford bursting battling flexibility spreadsheets installing hardware command viruses
If your hard disk is packed to _ (1) _ point, the IT department is far too busy to fix your email problems, and your business can't _ (2) _ to buy the tools that you'd like to develop the company website, then it's time to think about using an application service provider (ASP) Rather than _ (3) _ software on each machine or server within your organisation, you rent applications from the ASP, which provides remote access to the software and manages the _ (4) _ required to run the applications
There are a lot of advantages to this approach The havoc caused by _ (5) _ makes the idea of outsourcing your email and office suite services an attractive option
It also gives you more _ (6) _ you pay for applications as and when you need them, rather than investing in a lot of costly software which you're then tied to for years Not having to worry about upgrading to the latest version of your office suite or about _
(7) _ with the complexities of managing an email system, leaves businesses with more time Time to focus on what they do best
However, there are some potential pitfalls To use applications remotely requires a lot of _ (8) _ , which is only really available from a broadband connection or a leased line to the ASP itself It is also important to ensure that the ASP will be able to provide a secure, reliable service which will be available whenever you need it
Passage 2 Read the passage and fill in the numbered blanks with the correct words given in the box There are two extra words variety requires confident generic discrete space graphic software package beneficial
Providing applications and storage _ (1) _ for vast numbers of users _
(2) _ some powerful technology on the part of the ASP This includes security controls and data storage as well as providing the physical links to customers For the most part, ASPs don't own the data centres that store the information Instead, they lease space from data storage specialists In this way, they can be _ (3) _ of meeting customers' increasing storage requirements by buying more space as it's needed
There's a wide _ (4) _ of applications available for use via ASPs Office suite applications and email services are two of the most _ (5) _ applications available through ASPs Large, complex business applications such as enterprise resource planning tools like SAP are another popular candidate for delivery through an ASP Other business services, such as payroll and accounting systems are also available This is particularly _ (6) _ to small businesses which are likely to grow quickly and don't want to deal with the problems caused by outgrowing their existing system and having to move to a high-end _ (7) _ ASPs also offer a means of using specialist tools that would otherwise prove prohibitively expensive Small businesses have the opportunity to use such tools for short periods of time as and when they need them, rather than having to buy the _ (8) _ as a permanent investment
Passage 1 Read the passage then answer the questions below
1 What kind of equipment does Bluetooth work with?
3 What devices can Bluetooth create a secure 1 Mbit/s link between them?
4 What does Bluetooth radiate less than most national and international standards?
5 Does Bluetooth allow the technology to operate on aircraft?
As portable computing devices get smarter and more capable, connectivity frustrations increase This is where Bluetooth comes in The brainchild of Ericsson, IBM, Intel, Nokia and Toshiba, Bluetooth is a microwave high-speed wireless link system that’s designed to work with portable equipment To that end, it’s low power, very small and very low cost It uses the same frequencies as existing radio LANs (and, incidentally, microwave ovens) to create a secure 1 Mbit/s link between devices within 10m of each other These devices can be laptops, PDAs, cellphones, wired telephone access points, even wristwatch devices, headphones, digital cameras and so on With them, your notebook PC will be able to access your cellular phone and thus the Internet without your having to take the phone out of your pocket Files can be exchanged and communications set up for voice and data between just about any device capable of handling the information
Bluetooth operates in the unlicensed SM (Industrial, Scientific and Medical) band at 2.45GHz, which is globally available for products There’s 89MHz of bandwidth allocated here, and since Bluetooth is very low power, it actually radiates less than most national and international standards that allow non-transmitting devices to leak as part of their normal operation This is key, as it allows the technology to operate without restriction on aircraft
Passage 2 Read the passage then answer the questions below
1 In order to improve your marketability to potential employers, what can you do?
2 What kind of things do people need to consider if they are going to train themselves up?
3 Which organization offers the range of certification programmes?
4 Who does Microsoft offer certification programmes?
5 What do you need to consider before you choose a type of training?
Suppose you're a support engineer You’re stuck in a job you don’t like and you want to make a change One way of making that change is to improve your marketability to potential employers by upgrading your skill-set If you’re going to train yourself up however, whose training should you undertake? If you need certificates, whose certificates should they be? Even if you get those certificates, how certain can you be that your salary will rise as a result? One solution is the range of certifications on offer from Microsoft
Microsoft offers a large array of certification programmes aimed at anyone from the user of a single program such as Microsoft Word, to someone who wants to become a certified support engineer There are a myriad of certificates to study for too If you’re the proud holder of any of those qualifications, then you’re entitled to call yourself a Microsoft Certified Professional (MCP)
Once you’ve decided which track you want to take, you should consider just how qualified you already are in terms of experience and knowledge Will you need to go and take some courses with a training company, or are you the type who can make good use of self-study materials? How much time do you genuinely have to devote towards this? Will your employer pay for your course? Will it grant you leave to go and do the course - assuming you can find one - on either a full-time or part-time basis?
(https://translatedby.com/you/becoming-certified/into-ru/trans/)
A database has several parts These are called objects The simplest of these is a table; most databases have at least two Tables look like a spreadsheet Each row in the table is a record, containing information about one item, such as a person or something that the company sells Each of these contains several fields with information about the item For example, in a company’s employee database, these might be family name, given name, phone number and so on One important point is that one field in each record must be unique - the same data must not be in any other record We call this field the primary key It can be a staff ID number, for example, it can’t be a given name because many people have the same given name
Another type of object is a form, which is used for entering data into tables A third object type is a report This can show data from more than one table at the same time, looks good and is suitable for printing
These are several ways to get data out of a database One is simply to retrieve a record - for example, if we want to check the data in a single record, such as an employee’s hone number If we want to combine information from several tables or to do something with the data such as add up financial information from several records, we can query the database
(Hill & Bonamy, 2012) Answer the questions below
1 How many types of objects are mentioned in the passage?
2 Can the same data be in any other record?
3 What is an example of the primary key?
4 What is a simple way to get data out of a database?
5 If we want to combine information from several tables, what can we do?
Complete the summary, using ONE word from the above reading passage
NETWORK
1.1 Match these terms with their corresponding meanings
1 backbone A a network terminal or point where a computer is connected to a network
2 bridge B an interface that enables dissimilar networks to communicate such as two LANs based on different topologies or network operating systems
3 gateway C a fixed size unit of data prepared for transmission across a network Messages are normally divided into packets before transmission
4 hub D an electronic device that links different networks or parts of a network It determines the path that a signal should take to reach its destination
5 router E able to transfer data in both directions but only in one direction at a time, i.e data can be transmitted or received but not at the same time
6 traffic F an electronic device at the centre of a star network topology
7 half-duplex G a hardware and software combination used to connect the same type of networks or to partition a large network into two smaller ones
8 full-duplex H the main transmission path handling the major data traffic connecting different LANs together
9 node I the volume of signals or data that passes through a network system
10 packet J able to transfer data in both directions simultaneously, i.e data can be transmitted and received at the same time
1.2 Choose the correct option for each question
1 The cloud storage service allows users to files across multiple devices, ensuring that the latest version is accessible and consistent on all platforms
2 The office provides free for employees, enabling them to connect their devices to the internet without the need for physical cables
3 is the part of a network communications system that protects the data being sent It subdivides the data into segments and creates checksum tests It can also make backup copies of the data
A presentation layer B data-link layer
4 The network infrastructure was upgraded with high-quality to enhance data transmission speed and reduce electromagnetic interference in the office environment
5 I rely on a create visually appealing documents, such as brochures, magazines, newsletters, and other printed materials
6 It's crucial to perform regular of important data to prevent data loss in case of system failures or unforeseen events, such as hardware malfunctions or cyberattacks
7 Before transmitting sensitive information over the internet, it is essential to the data to ensure that it remains secure and protected from unauthorized access
8 The software installation requires a , as the setup files are provided on a compact disc for users to easily access and install the program on their computers
A CD-ROM drive B hard disk drive
C optical drive D solid-state drive
9 communication in programming allows tasks to operate independently, enhancing the overall efficiency of the system by avoiding unnecessary waiting periods
10 The storage system divides large files into smaller data , improving efficiency in data retrieval and enabling more streamlined management of information
Passage 1 Read the passage and fill in the numbered blanks with the correct words given in the box There are two extra words transmit access portable developing technologies expanded data traffic converging technology fundamentally
Firms in the past used two _ (1) _ different types of networks: telephone networks and computer networks Telephone networks historically handled voice communication, and computer networks handled _ (2) _ Telephone companies built telephone networks throughout the twentieth century by using voice transmission
_ (3) _ (hardware and software), and these companies almost always operated as regulated monopolies throughout the world Computer companies originally built computer networks to _ (4) _ data between computers in different locations
Thanks to continuing telecommunications deregulation and information technology innovation, telephone and computer networks are _ (5) _ into a single digital network using shared Internet-based standards and technology Telecommunications providers today, such as AT&T and Verizon, offer data transmission, Internet _ (6) _, mobile phone service, and television programming as well as voice service Cable companies, such as Cablevision and Comcast, offer voice service and Internet access Computer networks have _ (7) _ to include Internet telephone and video services Both voice and data communication networks have also become more powerful (faster), more _ (8) _ (smaller and mobile), and less expensive
Passage 2 Read the passage and fill in the numbered blanks with the correct words/ phrases given in the box There are two extra words circuits errors communication routers remote bundles capacity reassembling message point-to-point
Packet switching is a method of slicing digital messages into parcels called packets, sending the packets along different communication paths as they become available, and then _ (1) _ the packets once they arrive at their destinations Prior to the development of packet switching, computer networks used leased, dedicated telephone _ (2) _ to communicate with other computers in remote locations In circuit-switched networks, such as the telephone system, a complete _ (3) _ circuit is assembled, and then communication can proceed These dedicated circuit-switching techniques were expensive and wasted available communications _ (4) _ - the circuit was maintained regardless of whether any data were being sent
Packet switching is more efficient Messages are first broken down into small fixed _ (5) _ of data called packets The packets include information for directing the packet to the right address and for checking transmission _ (6) _ along with the data The packets are transmitted over various communications channels by using
_ (7) _, each packet traveling independently Packets of data originating at one source will be routed through many paths and networks before being reassembled into the original _ (8) _ when they reach their destinations
Passage 1 Read the passage then answer the questions below
1 What are two kinds of networks that are in common use?
2 What are the four types of wired networks mentioned in paragraph 2?
3 What is a big advantage for some large networks using a mesh?
4 What are the functions of special computers?
5 What will the browser do when you type a web address into it?
A network is a group of linked computers or other devices There are two kinds of networks that are in common use In local Area Networks (LANs) computers are close together - perhaps in the same building They might be connected directly to each other by cable or through a wireless network such as wi-fi In contrast, wide area networks (WANs) cover a larger area and usually use telephone lines or a mobile phone system to connect A LAN can be a part of WAN
There are different types of wired networks One is a star system In this, each computer (or other device) is connected to a central server Another type is a ring system This is a network that has each computer linked to two others In a bus system, there is a central cable which is called a bus, and each computer is linked to it Some large networks use a mesh In this, each computer is linked to several others This has one big advantage: if one connection breaks, the data can use other connections Therefore, it is difficult to break a mesh network
Many networks work on a client-server system In this, servers are special computers that store data, serve websites and have other similar functions Generally, a client program will ask the server for data and the server will then send the data back to the client For example, when you type a web address into a browser, the browser (the client) will ask the server for a web page, which then sends the web page back
Passage 2 Read the passage then answer the questions below
1 Does the company have locations in one country or more than one?
2 What problem do they have with communication?
3 Why are internet sales going down?
4 What kind of system do they need?
5 What two steps does the company want to take next?
CURRENT ISSUES FOR BDL LIMITED AND POSSIBLE IT SOLUTIOND Introduction
Our last year has been good The new overseas office is doing well and our B2B and B2C sales are increasing quickly Our sales team is working hard and our four bricks-and-mortar shops are also doing well However, there are some issues that we need to deal with so that we can continue to do well in the future Some new technology might help with these
Problems: communication and internet sales
We have found two problems that the IT Department could help use with These are:
+ Communication between our different country offices and departments in different locations isn’t very efficient, especially for our international locations We are collaborating more and more between different locations, so it’s important to make this easy for people
+ Internet sales are going down There are several reasons for this The main one is that customers don’t like using the current online shopping systems We need a system that’s easier to use so that customers don’t give up before they finish their transactions
The first step should be to find out whether technology can help with these problems and, if so, how it can help If this is successful, next we should find out about prices and features of appropriate systems
Passage 3 Read the passage then answer the questions below
1 What is Andrea Pinheiro da Silva’s job?
2 Why was it important that a new site looked exciting and dynamic?
3 What are the two areas that the customer wanted their new site to have?
4 What sources did they decide to use?
5 Were their customers happy with the website?
Andrea Pinheiro da Silva is a web developer who is well known for the websites she has developed Her websites have won several awards Here, she describes a recent project
MORE PRACTICE
PASSAGE COMPLETION
Passage 1 Read the passage and fill in the numbered blanks with the correct words given in the box There are two extra words systems computers expert I-frame security enhances devices decompressed efficiency multimedia
Not only is computing equipment getting smaller, it is getting more sophisticated
_ (1) _ are part of many machines and _ (2) _ that once required continual human supervision and control Today, computers in (3) _ systems result in safer environments, computers in cars improve energy _ (4) _, and computers in phones provide features such as call forwarding, call monitoring, and call answering
Multimedia _ (5) _ are known for their educational and entertainment value
- which we call edutainment _ (6) _ combines text with sound, video, animation, and graphics, which greatly _ (7) _ the interaction between user and machine and can make information more interesting and appealing to people _ (8) _ systems software enables computers to 'think' like experts Medical diagnosis expert systems, for example, can help doctors pinpoint a patient's illness, suggest further tests, and prescribe appropriate drugs
Passage 2 Read the passage and fill in the numbered blanks with the correct words given in the box There are two extra words format digital minutes smaller interaction browse compressing brains inaudible frequency
MP3 is a set of standards for _ (1) _ and storing _ (2) _ audio and video
Whereas CDs and WAV files require about 11 MB for one minute of sound, MP3 files give you the same sound quality in a _ (3) _ which requires only about 1MB for each minute, so a single track takes only three to five _ (4) _ Computers store sound as digital information They do this by sampling - taking a sample of the sound thousands of times per second CDs store information in a format called CD-DA This samples 44,000 times per second and is broadly similar to WAV
MP3 files depend on the fact that our _ (5) _ do not detect all sounds An
MP3 encoder removes from a WAV file all but the parts we don't hear Sounds above 16kHz are _ (6) _ for most people, so these can be removed Quieter sounds masked by loud sounds of a similar _ (7) _ are also removed The result is an MP3 file which is much _ (8) _ than the WAV original
Passage 3 Read the passage and fill in the numbered blanks with the correct words given in the box There are two extra words site linked indexes search combination material tools facilities document database
No search engine covers the entire Web The scale is too enormous Meta search
_ (1) _ may cover forty per cent at best When you use a search engine, you are searching a _ (2) _ Keyword search engines build their own database of search items They depend on search robots which search the Web stopping at each _ (3) _ to find keywords to add to their indexes Most of them index every word they find in a _ (4) _ These search engines can produce a huge number of hits for any keyword you enter but many may have no relevance to your search
Because search engines can only find Web pages that are _ (5) _ to other websites or Usenet news articles, they cannot find sites which stand alone In addition, they cannot evaluate in any way the _ (6) _ they find The result can be that you have a large amount of irrelevant and inappropriate hits and may miss the most helpful site
Searching for phrases or a _ (7) _ of key words is more effective than searching for single words Most search engines offer advanced search _ (8) _ which can be used to combine and exclude words and phrases from your search
Passage 4 Read the passage and fill in the numbered blanks with the correct words given in the box There are two extra words divide macro language types boot infected malicious software switch networks current
Your computer could be _ (1) _ by many different viruses There are probably more than 30,000 in existence but only about 200 to 300 are present in sufficient numbers to be a threat to your PC We can _ (2) _ viruses into a small number of basic _ (3) _ Boot sector viruses infect a computer when you _ (4)
_ it File viruses infect executable files and the system when the files are run These are less common now that PCs mainly run Windows
The most common viruses now work in the Windows environment and are spread using _ (5) _, including the Internet Most are macro viruses Melissa is an example Melissa spread using email It operated by using the Visual Basic for Applications (VBA) _ (6) _ to automate the Microsoft Outlook mail client to send itself to the first fifty addresses in the Outlook address book In this way, it infected millions of computers in a few days
A worm is not a virus but it is a _ (7) _ program It infiltrates your system's network _ (8) _ and from there infects other systems
Passage 5 Read the passage and fill in the numbered blanks with the correct words given in the box There are two extra words prediction piece computing switch designers current chip alternatives infected executable
A chip is basically millions of switches on a tiny _ (1) _ of silicon Each
_ (2) _ is a transistor Gordon Moore, the co-founder of Intel, was the first person to predict that the number of transistors on a standard size of silicon would double every eighteen months This _ (3) _ became known as Moore's Law It's not a law of physics but developments have shown it to be broadly true With the number of transistors on a _ (4) _ now approaching fifty million, even the most optimistic processor designers are beginning to realise that limits will soon be reached
READING PASSAGE
A Read the passage then answer the questions below
1 What is the aim behind the Robot cup?
2 What sport is used to test the co-operation of a team?
3 When will a humanoid league start?
4 What do players have to do in the Robot Volley Ball?
5 Is constructing single robots designed for one task only costly?
Each year teams take part in an international football competition The teams are organised into five leagues and the prize is a cup Not just any cup, but the Robocup, for the players are all robots They don’t play on turf but the objective is the same, to hit a ball into a goal The aim behind the Robocup is to promote the development of robots which can work together Football is a good test of co-operation for any team and the robots are no exception Although robot footballers are poor competition for a human team, each year their performance gets better and each year the standards expected are raised so that competitors must constantly develop better hardware and software
The top league is the Sony legged robot division They use modified versions of the well- known Sony robodog AIBO A humanoid league will start as soon as there are sufficient two-legged players The organiser of the Robocup is confident in the future of robotics, ‘By mid-21st century, a team of fully autonomous humanoid soccer players will win a soccer game, complying with the official rules of FIFA, against the winner of the most recent World Cup.’
Other sporting events for robots exist For example, The British Association for the Advancement of Science organises a two-a-side event called Robot Volley Ball The players’ task is simply to return a ball within 60 seconds of its being served The objective again, is to promote the development of robots which can work co-operatively The advantages of having robots which can tackle a range of tasks together rather than constructing single expensive robots designed for one task only are obvious
B Decide whether the following statements are TRUE or FALSE
1 The Robocup is an international football competition where human players compete against each other
2 The primary goal of the Robocup is to promote the development of robots that can work together through cooperative tasks like football
3 Robot footballers consistently outperform human teams in the competition
4 The top league in the Robocup is the Sony legged robot division, which uses modified versions of the Sony robodog AIBO
5 The humanoid league will start when there are enough three-legged players
6 The organizer of the Robocup is confident that by the mid-21st century, a team of fully autonomous humanoid soccer players will win a soccer game against the winner of the most recent World Cup
7 Apart from football, The British Association for the Advancement of Science organizes a robot volleyball event called Robot Volley Ball
8 In Robot Volley Ball, players' task is to score goals by hitting a ball into a goal
9 The main objective of having robots that can tackle a range of tasks together is to avoid the construction of single expensive robots designed for one task only
10 The Robocup is a yearly event where standards remain constant, allowing competitors to focus on refining existing technology rather than developing new hardware and software
A Read the passage then answer the questions below
1 What could happen if EVAs live up to the developers’ claims?
2 What are EVAs’ initial targets?
3 What is the best experience EVA offers?
4 What is EVA’s search engine used for?
5 How is an EVA run?
Stratumsoft are developing the first electronic virtual assistant, or EVA If EVAs live up to the developers’ claims, they could provide the illusion of personal service without the cost Call centres, online advertisers and Internet service providers are among the initial targets Eighty per cent of call centre requests could, Stratumsoft argues, be dealt with by an EVA E-commerce is another application ‘The best experience you can have as a shopper is personal contact, and EVA is designed to give that’, says Stratumsoffs director of marketing
The technology behind EVA combines two global trends in website design One, developed out of the computer animation and gaming industry, is the ability to give Web images the impression of three dimensions The other is the use of dynamic database skills and artificial intelligence-style searching to retrieve information from data banks
Each EVA can be programmed with information such as a product catalogue, answers to frequently asked questions or an online encyclopedia It is also equipped with a search engine to interpret customer requests made in colloquial language Queries are typed in and answered via on-screen text boxes
If the EVA does not have an answer, it will interrogate the questioner, record the response, and add the answer to its database for future enquiries EVAs are not fully animated to imitate human features but they can be programmed to gesture and imitate different moods An EVA is run via a Java applet - a small, self-contained program coded to download on to any type of personal computer rather than being transmitted over the Internet
B Decide whether the following statements are TRUE or FALSE
1 Stratumsoft is developing the first electronic virtual assistant, known as EVA
2 The primary targets for EVAs include call centers, online advertisers, and internet service providers
3 According to Stratumsoft, 100% of call center requests can be handled by an EVA
4 E-commerce is not mentioned as an application for EVAs in the text
5 The technology behind EVA combines computer animation and gaming industry trends, providing web images with three-dimensional impressions
6 EVAs are fully animated to imitate human features
7 Each EVA can be programmed with information such as a product catalog, answers to frequently asked questions, or an online encyclopedia
8 Queries made in colloquial language can be interpreted by EVAs using a search engine
9 If an EVA does not have an answer, it will not record the response for future inquiries
10 EVAs are run via a Java applet, a self-contained program coded to download onto any type of personal computer transmitted over the Internet
A Read the passage then answer the questions below
1 What will replace barcodes in the packaging of groceries?
2 What information do the data in the tags include?
3 If you tell the fridge the menu you require, how does it help you?
4 Where is a touch-sensitive panel placed?
5 Can the fridge be used to look for information on the Internet?
Barcodes in the packaging of groceries will soon be replaced with radio- frequency tags that can be read at a distance and with greater reliability As well as indicating what the product is, the data in the tags will include additional information such as the ‘best before’ date and even nutritional data Now, imagine that a fridge could read these tags and keep track of the items placed there
If an item is about to exceed its ‘use by’ date, the fridge tells you, and you can either use it or throw it out Fancy something different for dinner? No problem, ask the fridge to suggest some menus based on the ingredients it knows you have in stock Or tell the fridge the menu you require and it will provide you with a shopping list of the items you don’t have or order the items via email This is the Screenfridge from Electrolux
But why ‘Screenfridge’? On the door is a touch-sensitive panel or screen that provides a means of communicating with the users
For many households, life revolves around the kitchen This is the assumption Electrolux made in designing the Screenfridge The same screen is a messaging centre Since the fridge is equipped with a microphone, speaker and video-camera, you’re not limited to textual information The fridge is connected to the Internet, so it can be used to send and receive email or you could surf the Web to find a new recipe
B Decide whether the following statements are TRUE or FALSE
1 Barcodes in grocery packaging will continue to be used alongside radio-frequency tags
2 Radio-frequency tags in groceries can provide additional information such as the 'best before' date and nutritional data
3 The text suggests that a fridge with radio-frequency tags can notify users when items are about to exceed their 'use by' date
4 According to the text, the Screenfridge from Electrolux does not have a touch- sensitive panel on the door
5 The Screenfridge can suggest menus based on the ingredients it knows are in stock
6 The Screenfridge cannot generate a shopping list or order items via email based on the user's menu requirements
7 The Screenfridge's touch-sensitive panel serves as a messaging center, allowing users to communicate with the fridge
8 The fridge's connectivity to the Internet allows users to send and receive emails
9 The Screenfridge does not have a microphone, speaker, or video camera
10 The assumption behind designing the Screenfridge is that for many households, life revolves around the kitchen
A Read the passage then answer the questions below
1 What kind of knowledge must an IT manager have?
2 How many years’ experience will an IT manager typically have in the industry?
3 What are IT managers responsible for?
4 What is the best qualification for being a manager?
5 What personalities do you need to have to be an IT manager?
HOW TO BECOME AN IT MANAGER
Medium to large companies are also likely to have an IT systems manager They are responsible for developing and implementing computer software that supports the operations of the business They’re responsible for multiple development projects and oversee the implementation and support of the systems Companies will have two or three major systems that are probably bought off the shelf and then tailored by an in- house development team
Apart from basic hardware and software expertise, an IT manager will typically have over five years’ experience in the industry Most are between 30 and 45 Since IT managers have to take responsibility for budgets and for staff, employers look for both of these factors in any potential recruit
Nearly all IT managers have at least a first degree if not a second one as well Interestingly, many of them don’t have degrees in computing science In any case, the best qualification for becoming a manager is experience If your personality is such that you’re unlikely to be asked to take responsibility for a small team or a project, then you can forget being an IT manager You need to be bright, communicative and be able to earn the trust of your teams Most of this can't be taught, so if you don’t have these skills then divert your career elsewhere
B Decide whether the following statements are TRUE or FALSE
1 IT systems managers in medium to large companies are responsible for developing and implementing computer hardware
2 IT systems managers oversee the implementation and support of only one major system in companies
3 Companies typically have multiple major systems that are bought off the shelf and then customized by an in-house development team
4 Basic hardware and software expertise is the only requirement for an IT manager, and experience is not a significant factor
5 IT managers are usually between the ages of 30 and 45
6 Employers look for IT managers with over five years of industry experience and the ability to take responsibility for budgets and staff
7 Nearly all IT managers have at least a first degree and, in many cases, a second degree
8 Many IT managers have degrees in computing science
9 The text suggests that experience is considered the best qualification for becoming an IT manager
10 According to the text, if an individual lacks certain personality traits like being bright and communicative, they can still become an IT manager with the right qualifications
A Read the passage then answer the questions below
2 How many workers do they employ?
3 Are clients happy with the company’s service?
4 What do they give advice on?
5 How many staff do they need to recruit for their Sydney office?
OUR COMPANY AND WHAT WE DO
PDS (Pacific Digital Solutions Limited) is an international technology company which supplies software, training and support services We employ over 6,000 people across 27 service centres, serving clients in 46 countries Clients tell us that we provide excellent customer service Our products include office software such as spreadsheet and database applications We have recently launched a range of cloud computing services Our consulting services help client companies to work more efficiently and to make more money We provide advice on which systems to buy and how to set them up
We can even carry out the installation for clients if they request this
TRANSLATION
Exercise 1: Translate the sentences into Vietnamese
1 Expert systems model human knowledge as a set of rules that collectively are called the knowledge base
2 The knowledge base can become chaotic as the number of rules can reach into the thousands
3 Expert systems do not scale well to the kinds of very large datasets produced by the Internet and the Internet of Things (IoT), and they are expensive to build
4 The strategy used to search through the collection of rules and formulate conclusions is called the inference engine
5 Expert systems are not useful for dealing with unstructured problems that managers and employees typically encounter, and do not use real-time data to guide their decisions
Exercise 2: Translate the sentences into Vietnamese
1 Human language is not always precise It is often ambiguous, and meanings of words can depend on complex variables such as slang, regional dialects, and social context
2 Natural language processing makes it possible for a computer to understand and analyze natural language - language that human beings instinctively use, not language specially formatted to be understood by computers
3 Natural language processing algorithms are typically based on machine learning, including deep learning, which can learn how to identify a speaker’s intent from many examples
4 The system learns more and more from each customer interaction so that it can eventually infer the customer’s specific needs or goals at each point of the conversation
5 Tokyo-based Mizuho Bank employs advanced speech recognition technology, IBM® Watson™ content analytics software, and a cloud services infrastructure to improve contact center agents’ interactions with customers
Exercise 3: Translate the sentences into Vietnamese
1 Intelligent agents are software programs that work in the background without direct human intervention to carry out specific tasks for an individual user, business process, or software application
2 The agent uses a limited built-in or learned knowledge base to accomplish tasks or make decisions on the user’s behalf, such as deleting junk email, scheduling appointments, or finding the cheapest airfare
3 Although some software agents are programmed to follow a simple set of rules, others are capable of learning from experience and adjusting their behavior using machine learning and natural language processing
4 Siri uses natural language processing to answer questions, make recommendations, and perform actions
5 The software adapts to the user’s individual preferences over time and personalizes results, performing tasks such as getting directions, scheduling appointments, and sending messages
Exercise 4: Translate the sentences into Vietnamese
1 Companies need ways to keep track of and manage employee learning and to integrate it more fully into their knowledge management and other corporate systems
2 Contemporary learning management systems support multiple modes of learning, including CD-ROM, downloadable videos, web-based classes, live instruction in classes or online, and group learning in online forums and chat sessions
3 The learning management system consolidates mixed-media training, automates the selection and administration of courses, assembles and delivers learning content, and measures learning effectiveness
4 Businesses run their own learning management systems, but they are also turning to publicly available massive open online courses to educate their employees
5 Companies view massive open online courses as a new way to design and deliver online learning where learners can collaborate with each other, watch short videos, and participate in threaded discussion groups
Exercise 5: Translate the sentences into Vietnamese
1 Business intelligence is a term used by hardware and software vendors and information technology consultants to describe the infrastructure for warehousing, integrating, reporting, and analyzing data that come from the business environment, including big data
2 Foundation infrastructure collects, stores, cleans, and makes relevant information available to managers
3 Business analytics is also a vendor-defined term that focuses more on tools and techniques for analyzing and understanding data
4 Business intelligence and analytics are essentially about integrating all the information streams produced by a firm into a single, coherent, enterprise-wide set of data and then using modeling, statistical analysis tools, and data mining tools to make sense out of all these data so managers can make better decisions and plans
5 A number of business intelligence and business analytics products now have cloud and mobile versions
Exercise 6: Translate the sentences into Vietnamese
1 Business intelligence analytics include location analytics, the ability to gain business insight from the location (geographic) component of data, including location data from mobile phones, output from sensors or scanning devices, and data from maps
2 Location analytics might help a marketer determine which people to target with mobile ads about nearby restaurants and stores or quantify the impact of mobile ads on in-store visits
3 Location analytics would help a utility company view and measure outages and their associated costs as related to customer location to help prioritize marketing, system upgrades, and customer service efforts
4 UPS’s package tracking and delivery-routing systems use location analytics, as does an application used by Starbucks to determine where to open new stores
5 The Starbucks system analyzes very large amounts of location-based data and demographic data to determine the best places to open more stores without harming sales at other Starbucks locations
Exercise 7: Translate the sentences into Vietnamese
6 A user can see on a map local trade area, retail clusters, demographics, traffic and transportation nodes, and locations with new offices that might be important sources of customers
7 The Starbucks application is an example of a geographic information system
8 Geographic information systems provide tools to help decision makers visualize problems that benefit from mapping
9 Geographic information systems might be used to help state and local governments calculate response times to natural disasters and other emergencies, to help banks identify the best location for new branches or ATM terminals, or to help police forces pinpoint locations with the highest incidence of crime
10 Some geographic information systems have modeling capabilities for changing the data and automatically revising business scenarios
Exercise 8: Translate the sentences into Vietnamese
1 Supply chain software is classified as either software to help businesses plan their supply chains (supply chain planning) or software to help them execute the supply chain steps (supply chain execution)
2 Supply chain planning systems enable the firm to model its existing supply chain, generate demand forecasts for products, and develop optimal sourcing and manufacturing plans
3 Supply chain management systems help companies make better decisions, such as determining how much of a specific product to manufacture in a given time period; establishing inventory levels for raw materials, intermediate products, and finished goods; determining where to store finished goods; and identifying the transportation mode to use for product delivery
4 If a large customer places a larger order than usual or changes that order on short notice, it can have a widespread impact throughout the supply chain
5 Demand planning determines how much product a business needs to make to satisfy all its customers' demands
Exercise 9: Translate the sentences into Vietnamese
1 Acting on shipping plans for customer orders, the Warehouse Management System directs the movement of goods based on immediate conditions for space, equipment, inventory, and personnel
2 Supply chain execution systems manage the flow of products through distribution centers and warehouses to ensure that products are delivered to the right locations in the most efficient manner
3 Supply chain planning software makes the necessary adjustments to production and distribution plans
94 Information about changes is shared among the relevant supply chain members so that their work can be coordinated
5 One of the most important—and complex—supply chain planning functions is demand planning, which determines how much product a business needs to make to satisfy all its customers’ demands
Exercise 10: Translate the sentences into Vietnamese
1 Midsize and large companies have complex information technology infrastructures and many systems, each with its own set of users
2 Identity management software automates the process of keeping track of all these users and their system privileges, assigning each user a unique digital identity for accessing each system
3 It also includes tools for authenticating users, protecting user identities, and controlling access to system resources
4 Passwords can be sniffed if transmitted over a network or stolen through social engineering
5 New authentication technologies, such as tokens, smart cards, and biometric authentication, overcome some of these problems
Exercise 11: Translate the sentences into Vietnamese
1 A smart card is a device about the size of a credit card that contains a chip formatted with access permission and other data
2 Biometric authentication uses systems that read and interpret individual human traits, such as fingerprints, irises, and voices to grant or deny access
3 Two-factor authentication increases security by validating users through a multistep process
4 Password systems that are too rigorous hinder employee productivity
5 When employees must change complex passwords frequently, they often take shortcuts, such as choosing passwords that are easy to guess or keeping their passwords at their workstations in plain view
Exercise 12: Translate the sentences into Vietnamese
1 At its essence, game design is the practice of applying art and design to gameplay such as the creation of game environments, characters, pieces, and user interfaces, as well as outlining and mapping the rules of gameplay in tandem with its aesthetic design
2 A person who enjoys coding or playing video, app or computer games may want to start learning the most common computer languages used for game design While almost any programming language could be used to build a game, some offer more flexibility, visual effects and depth than others
3 Learning several computer languages is essential to someone who wants to program and design games as a professional or for a hobby
4 Successful game designers will have played a lot of games, ranging from simple to complex In their heads, they will not only carry logical and strategical modes of thought, but they will have assessed games that didn’t work from a design or strategy perspective as well as they could have and will usually have thought about how these games could be improved