0% found this document useful (0 votes)
313 views270 pages

اللغة الانجليزية للتكنولوجيا

Reading 1 introduces vocabulary related to app development, including terms like app, component, computer, data, database, hardware, internet, network, peripheral, and software. It also provides a short example discussing the importance of having the right hardware and following rules like storing data in a relational database when building a new app.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
313 views270 pages

اللغة الانجليزية للتكنولوجيا

Reading 1 introduces vocabulary related to app development, including terms like app, component, computer, data, database, hardware, internet, network, peripheral, and software. It also provides a short example discussing the importance of having the right hardware and following rules like storing data in a relational database when building a new app.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 270

English for Technology

Authors
Ryan T. Miller and Enrico Gandolfi

Al Quds Open University


All Rights Reserved
English for Technology
Table of Contents
Preface
Unit 1: Welcome to English for Technology ..................................... 1
Unit 2: Introduction to Computer Software ..................................... 14
Unit 3: Operating Systems & Software Applications ....................... 32
Unit 4: Computer Hardware ............................................................ 55
Unit 5: The Internet......................................................................... 78
Unit 6: English for Electronics ...................................................... 101
Unit 7: Social Media ..................................................................... 120
Unit 8: Programming Languages ................................................... 142
Unit 9: Presentation Skills ............................................................. 158
Unit 10: Computer Ethics.............................................................. 176
Unit 11: Innovative Technologies ................................................. 195
Unit 12: Business Communication ................................................ 211
Unit 13: IT Careers ....................................................................... 235
Preface

Dear Students,

Welcome to English for Technology! This book focuses on English


language for work and study in areas relating to information
technology fields. You will read about and discuss a variety of topics
that are important in today’s technology-driven world, from hardware
and software fundamentals to networking and gaming. This book, like
the IT field in general, has a strong focus on vocabulary. You will have
opportunities to use the new vocabulary you learn through various
exercises and conversation topics presented. You will also read a
number of case studies of Palestinian IT professionals, Palestinian IT
companies, and the other Palestinian companies with IT needs. We
hope these will help you to understand concrete applications of what
you learn in this textbook in the Palestinian context.

The most important thing to remember as you use this book is to try to
use the English you learn as much as possible. Remember that English,
like any language, has a lot of variation among speakers. Even within
the so-called standards for English (British, North American, or
Australian English, among others) there are many different varieties,
which may cause confusion and even miscommunication. So, when
you have a misunderstanding, use your negotiation skills, request
clarification, and perhaps confirm in writing. Think of English as a
communication tool. The most important thing is to communicate your
ideas, even if there are some small mistakes.

We are thankful to many individuals who assisted us in writing this


textbook. We thank Dr. Waleed Salos and his colleagues, who provided
us feedback and advice as we developed the book. We thank Mr. Adam
Brodsky for his contributions, found in units 10 and 12, and Mr.
Cameron Camp for his contributions to unit 9.

We also thank the authors of the case studies, which help to


contextualize many of the units in the textbook. Reading passages in
units 1, 2, 3, 4, 5, 6, 8, 10, and 13 are used under license from English
4 Work AB. We thank Mr. Larry Zoumas for his assistance with these.
Finally, we thank graduate students in TESL (Teaching English as a
Second/Foreign Language) from Kent State University, who
contributed voice recordings and activity ideas to include in this book,
including:
Abdulaziz Alansari Jesse Aronhalt
Keragen Corpening Jason Gearin
Kelsey Raabe Kathryn Ryan
Isin Sezer

Additional voices for the dialogues come from:


Zainab Al Shareef Ryan Miller
Sarah Rilling

Help on recordings comes from:


Kelsey Raabe

None of the speakers are professional actors, and not all of the speakers
are native speakers of English, but please listen for our voices from the
Midwest of the U.S. speaking to you in Palestine. Any errors in this
book remain the errors of the authors.

Learning a foreign language involves slow but steady progress. We


wish you all the best in achieving your English learning goals, your
academic goals in your field of technology, and, most of all, your
professional goals.

Sincerely,

Ryan T. Miller, PhD, Second Language Acquisition


Enrico Gandolfi, PhD, Social and Media Studies
We gratefully acknowledge funding from the U.S. Department of
State Grant number SIS40018GR0029.
English for Technology
Unit 1: Welcome to English for Technology

Table of Contents

Introduction
Warm-up: What is technology?
Reading 1: App Development Basics
SAQ
Reading 2: Technology in our Lives
SAQ
Discussion
Matching: How do you use technology?
Discussion
Fill in the Blank
Listening: Explaining technology to grandpa
SAQ
Role Play: Explaining technology to a novice
Vocabulary Quiz
Discussion: Expectations for this course
Writing: A Testimony from the Future

1
Preface
This unit introduces students to the English for Technology
textbook. Students will read and discuss about what ‘technology’
means, basics of app development, and the role of technology in our
lives now and in the future.

Goals of the Unit


 To discuss the meaning of ‘technology’
 To learn vocabulary related to app development
 To discuss how technology is a part of our lives
 To explain technology to other people
 To think about how technology will affect our lives in the future

Learning Outcomes
After studying this unit, students should be able to:
 Explain what technology is
 Express how technology affects our lives
 Use the new vocabulary words to describe aspects of
technology and their functions
 Discuss how technology has changed our lives and might
change our lives in the future

2
Unit 1: Welcome to English for Technology

Introduction
Hello and welcome to English for Technology!

In this course, you will learn to understand, speak, and write in ways
required to function in an English speaking IT job or university
program of study. The course is organized into units covering a wide
variety of IT topics. In each unit, you will learn new vocabulary, read
about ideas and situations in IT, have discussions with classmates, and
complete activities alone or with your peers that will help you develop
new skills and practice what you’ve learned.

In this first unit, we will guide you through the basic format of the units
in the course and the kinds of activities you will do.

Warm-up: What is technology?

Each unit in the course has a number of opportunities to have


discussions with classmates. One of the best ways to learn a language
is by using it, so it is important for you to participate actively in the

3
discussions. Many of the discussions ask you for your opinion, so there
might not be a right or wrong answer. You should share what you think.

Now, discuss the following questions with a partner or a small group.

1. What makes something ‘technology’?


2. What are some examples of technology?
3. Is technology a good or a bad thing? Why?

Next, watch this video and answer the questions below:


https://www.youtube.com/watch?v=Giiz81_uzK8

1. How is ‘technology’ defined in the video?


2. What are some examples of technology in the video?
3. Do you agree or disagree with this definition?

Reading 1: App Development Basics

In this first unit, there are not very many vocabulary words you need to
learn. Read through the vocabulary below, which are related to some
basic technology concepts and terms. You might know some of the
words already. Which words are you familiar with, and which are new?
Put a check mark (✔) next to the ones you need to learn (that is, the
ones that you don’t know yet).

1. app (application): a software program which allows a user to


perform specific tasks such as word processing, email, accounting,
database management.
2. component: any device internal to the computer, such as a primary
hard disk drive or motherboard.
3. computer: an electronic, digital device that stores and processes
information
4. data: raw information of any kind
5. database: an organized, electronic collection of information,
typically consisting of rows, columns, indexes, and keys. A
relational database is a database that includes relationships
between the pieces of information.

4
6. hardware: physical things that make up a computer, such as a
component or a peripheral
7. internet: the largest known public network in the world,
connecting millions of computers around the world
8. network: a group of connected computers
9. peripheral: an external computer add-on, such as a printer or a
scanner; also known as an 'accessory'
10. software: any program designed to run on a computer

The vocabulary words are normally presented in a short reading or


dialogue format. Here is a short reading as an example:

Good morning students!


Today I’ll talk about application
development. As you know, to
begin you need a fast computer
with good components. Having the
right hardware will help you to
develop quality software that
works without crashing.

I always follow certain rules when I build a new app:

1. The data for the application should be stored in a relational database


2. Customers should be able to buy my application on the Internet
3. The software should work without any extra peripherals
4. The program should be designed to work with or without a reliable
network connection.

By following these simple rules, you can write great


applications that work for everyone.

SAQ
1. What will help you to develop software that works without
crashing?
2. What are the author’s four rules when building a new app?
3. Do you agree with these rules? Which do you think are most
important?

5
Reading 2: Technology in our Lives

Here are some vocabulary words that will be useful in the next reading.
Put a check mark (✔) next to the ones you need to learn.

1. adopt: to choose to use


2. expertise: skill or knowledge in a certain topic or field
3. innovation: a useful creation resulting from study and
experimentation
4. take a foothold: to get a position that will allow more progress in
the future

After reading, you will have discussions and complete some activities.

Technology is a broad concept


that changes over time. It refers to Search activity
tools and instruments that allow us to
perform certain tasks and actions, Together with a peer or
solve problems, and make life easier. a small group try to find
We live in a world where new what the word
innovations are introduced every “lifestyle” means. You
year; an innovation is a technology can use online search
that sets novel standards and engines like Google or
expectations, modifying our lifestyle Yahoo if you want.
and habits. Sometimes, an innovation
is not a brand-new device but rather a
different way to use an old one. Some technologies spread in some
fields (for instance, entertainment) before others (for instance,
education), and their adoption relies on final users as well.
We depend on technology in different ways, from job duties to
daily chores. Think about how smartphones have changed our lives, or
about how information is spreading across the globe because of the
Internet. Moreover, computers are becoming more and more accessible
and free software is taking a foothold all around the world, reducing
costs and improving technological expertise. We are becoming more
active as technology consumers.

6
SAQ
1. What is an innovation?
2. What is making people become more active as technology
consumers?

Discussion

Together with a partner or in a small group, discuss the following


questions about your experiences with technology.
1. What is a technology that changed your life? Were you an early
adopter or a late adopter?
2. What are some new technologies right now? Why are they
different from older ones?
3. How do you use technology to gather information (news,
learning materials, etc.)?

7
Matching: How do you use technology?

How do you use technology? Look at the list of technologies below,


and match each technology with the tasks you use it for. You can have
more than one task assigned to each technology.

Technologies Tasks

Fun

Smart phone (Mobile phone)

Learn new things

Laptop (Computer)
Work

Tablet
Stay updated
and informed

TV (Television)
Stay healthy.

Video game system


Communicate with others

iPod / Portable media player

8
Discussion

Many technologies have a wide range of applications. Some


technologies can be used for fun, some may be adopted for work.
Together with a partner or in a small group, discuss your matching
activity results, reflecting on differences and similarities with your
peers. You might find that the same device can be used for different
things even by a single user (that is you!).

Fill in the Blank

Use the vocabulary introduced in this chapter to complete the sentences


below.
1) Examples of popular __________ include Microsoft Word, Adobe
Photoshop, and Mozilla Firefox.
2) A __________ needs to be replaced or upgraded regularly or it will
become obsolete.
3) The international company stored their customer information in a
central __________ in Brussels.
4) __________ today has become such a commodity that it's often
more expensive to repair it than to replace it.
5) Some people refer to the __________ as an information
superhighway.
6) The woman hated the look of all the tangled wires behind her desk,
which were caused by so many __________.

Listening: Explaining technology to grandpa

Next, you’ll listen to a dialogue between two people, a young woman


explaining a technology to her grandfather. Have you ever had to
explain a technology to someone? How did you make the technology
clear to the person?

Next, listen to the dialogue and fill in the blanks with words from the
box below. Some of the words are used multiple times.

9
hardware internet peripheral
computer phone software
app application

Listening Link

Granddaughter: “Ok grandpa, click on the 1) __________ to open


it.”

Grandpa: “What is an 2) __________? Do you mean an


appetizer? I don’t see any food! How do I use this
phone?!?”

Granddaughter: “Grandpa, don’t be silly! 3)__________stands for


4) __________, not appetizer. There are many
5)__________6) __________that your phone can
use. Like this 7) __________that checks the
weather.”

Grandpa: 8) __________, what is that?

Granddaughter: 9) __________ is anything designed to run on a


10)_______, like this weather 11) __________or
news 12) __________.

Grandpa: So, is this phone 13) __________?

Granddaughter: No, the phone runs 14)__________, but the phone


is 15) __________. 16)__________is anything
that you can touch, like the 17) __________ itself
or a 18)__________like a keyboard or printer.

Grandpa: So, the phone is 19) __________ because I can


touch it… it runs 20) __________, like the news
app… it uses the 21) __________… but is can’t
make appetizers?”

Granddaughter: “No, it can’t make appetizers, but there is an 22)


__________for that. Let’s order some pizza.”

10
Grandpa: “As long as it’s 23)‘__________’ and not 24)‘
__________’ pizza.”

SAQ
1. What is the grandpa learning?
2. What difficulty does the grandpa have?
3. Have you ever had to explain technology to a technology
novice? Was it easy or difficult? Why?

Role Play: Explaining a technology to a novice

Work in a pair with another student.


One of you is a technology expert
(pick a technology that you like and
know well), while the other is a
novice, or someone new to something.
The expert should explain to the
novice why that technology is so
important and relevant. Try to use at
least 4 terms from this unit’s vocabulary. Before you begin your
discussion, make some notes of ideas to support your claims. The
student who is the novice should ask questions about the technology,
putting the expert to the test.

11
Vocabulary Quiz

Vocabulary Quiz
Choose the best definition for each of the words below.

1. Internet
a. the largest known public network in the world,
connecting millions of computers around the world
b. physical things that make up a computer, such as a
component or a peripheral
c. an electronic, digital device that stores and processes
information
2. data
a. any program designed to run on a computer
b. any device internal to the computer, such as a primary
hard disk drive or motherboard
c. raw information of any kind
3. component
a. an electronic, digital device that stores and processes
information
b. any device internal to the computer, such as a primary
hard disk drive or motherboard
c. any program designed to run on a computer
4. database
a. any device internal to the computer, such as a primary
hard disk drive or motherboard
b. an organized, electronic collection of information
optimized for fast access and typically consisting of
rows, columns, indexes, and keys
c. an electronic, digital device that stores and processes
information

12
5. hardware
a. an organized, electronic collection of information
optimized for fast access and typically consisting of
rows, columns, indexes, and keys
b. any device internal to the computer, such as a primary
hard disk drive or motherboard
c. physical things that make up a computer, such as a
component or a peripheral

Discussion: Expectations for this course

Together with a partner or in a small group, discuss the following


questions:

1. What are your expectations and goals for this course?


2. What topics you would like to cover and explore?
3. What are you planning to do with the knowledge acquired
through this course?

Writing: A Testimony from the Future

It is important to understand that


technology evolves, and we evolve
with it. Now, let’s use our
imagination.

Pretend you are a time traveler. You


came from 30 years ago, and spent
the last few weeks in the current
present. Now, you have to go back to 30 years ago and explain to your
people what the future is like in terms of technology.

What would be difficult to describe? What would be easy to


communicate? Do you think they will believe you? Think about a
younger yourself and how s/he would react to such news.

Use at least 6 words from the vocabulary in this chapter.

13
English for Technology
Unit 2: Introduction to Computer Software

Table of Contents

Warm-up: Software discussion


Reading: Software features and bugs
Vocabulary
SAQ
Matching: Features and Bugs
Dialogue: Software comparison
Think and Share: Experiences with software
Reading: Open-source and Closed-source Software
Vocabulary
SAQ
Discussion: Open-source and closed-source software
Fill in the blank
Role Play: Software supporter
Vocabulary Quiz
Listening: Software bugs
Case Study: Sunbula
SAQ
Writing: Software Heuristic Evaluation

14
Preface
This unit introduces students to the vocabulary and concepts for
discussing software features and bugs and open-source and closed-
source software models. Students will also learn about Sunbula and the
challenges encountered when building a web site. Lastly, students will
learn to write a software heuristic evaluation to evaluate the
functionality and usability of a piece of software.

Goals of the Unit


 To discuss software bugs and features
 To learn vocabulary related to computer software
 To describe personal experiences with software
 To understand differences between open-source and closed-
source software models
 To write a software heuristic evaluation

Learning Outcomes
After studying this unit, students should be able to:
 Recognize and use vocabulary related to software
 Discuss personal experiences with software
 Explain open-source and closed-source software models
 Argue for their opinion about open-source and closed-source
software models
 Write a software heuristic evaluation

15
Unit 2: Introduction to Computer Software

Warm-up: Software discussion


Before starting with this unit content, let’s do a little warm-up. Discuss
the following questions with a partner or a small group.

1. Have you ever written or modified any software? If so, what were
the challenges you faced? If not, why not?
2. Name three pieces of software you use frequently. Why do you use
them? What would you change about them?
3. What was the worst technical problem you have ever had with
software? How did you solve it?

Reading 1: Software features and bugs

Read through the vocabulary below, which are related to some basic
concepts and terms about software. You might know some of the words
already. Which words are you familiar with, and which are new? Put
a check mark (✔) next to the ones you need to learn (that is, the ones
that you don’t know yet).

16
1. abort: to end a program or a process before its completion
2. bug: an error in a computer program
3. compatible: capable of being used without modification
4. crash: a computer failure due to faulty hardware or a serious
software bug
5. documentation: text that explains how the software operates or
how to use it
6. end user: a person who uses a product or service on a computer
7. error: an incorrect action attributable to poor judgment, ignorance,
or inattention
8. execute: to start a program on a computer
9. feature: something a computer program is "supposed" to do; these
are often reasons to use a particular program or upgrade to a more
recent version
10. programmer: a person who writes or modifies computer programs
or applications
11. usability: a measure of how easy or efficient a program is to use

Listening Link 1

For as long as there has been computer hardware, there has also
been computer software. But what is software? Software is just
instructions written by a programmer which tells the computer what
to do. Programmers are also known as 'software developers', or just
'developers'.
Nothing much is simple about software. Software programs can
have millions of lines of code. If one line doesn't work, the whole
program could break! Even the process of starting software goes by
many different names in English. Perhaps the most correct technical
term is 'execute', as in "the man executed the computer program." Be
careful, because the term 'execute' also means (in another context) to
put someone to death! Some other common verbs that refer to starting
a software program are 'run', 'launch’, and even 'boot' (when the
software in question is an operating system).
Software normally has both features and bugs. Hopefully more of
the former than the latter! When software has a bug there are a few
things that can happen. The program can crash and terminate with a

17
confusing message. This is not good. End users do not like
confusing error messages such as:
Site error: the file
/home7/businfc6/public_html/blog/wordpress/wp-
content/plugins/seo-blog/core.php requires the
ionCube PHP Loader ioncube_loader_lin_5.2.so to be
installed by the site administrator.

Sometimes when software stops responding you are forced to


manually abort the program by yourself by pressing some strange
combination of keys such as ctrl-alt-delete.
Because of poor usability, documentation, and strange error
messages, programming still seems very mysterious to most people.
That's too bad, because it can be quite fun and rewarding to write
software. To succeed, you just have to take everything in small steps,
think very hard, and never give up.
Many people studying Information Technology should learn at
least one programming language and write at least one program. Why?
Programming forces you to think like a computer. This can be very
rewarding when dealing with a wide range of IT-related issues from
tech support to setting up PPC (pay-per-click) advertising campaigns
for a client's web site. Also, as an IT professional, you will be dealing
with programmers on a daily basis. Having some understanding of the
work they do will help you get along with them better.
Software programs are normally written and compiled for certain
hardware platforms. It is very important that the software
is compatible with all the components of the computer. For instance,
you cannot run software written for a Windows computer on a
Macintosh computer or a Linux computer. Actually, you can, but you
need to have special emulation software or a virtual machine installed.
Even with this special software installed, it is still normally best to run
a program on the kind of computer for which it was intended.

SAQ
1. What is software?
2. How is software not simple?
3. Why does programming seem mysterious to most people?
4. Why should people studying IT learn a programming language?

18
Matching: Features and Bugs

Label the situations on the left with the “feature” or “bug” categories
on the right. In essence, are they useful or a problem to solve?

Situations Category
Bug
When I change the font
color, the program crashes

When I click the green


arrow button, the
software sends my message

When I click “next”, I go Feature


backwards.

When I start program A and


program B at the same time,
program A terminates.

When I click “save”, the


software stores what I did.

19
Dialogue: Software comparison

Read the dialog below between two friends discussing software.


Complete the dialogue by choosing words from the vocabulary in
Reading 1 and putting them into the dialogue.

Listening Link 2

Omar: I’ve been looking for a new piece of


software for editing photos. Do you know
a good one, Fatima?
Fatima: Well, I’ve tried a few before. My favorites
are PicMaster Pro, Image Magic, and
PhotoMagic Express. Have you ever tried
them?
Omar: No, I haven’t. What _________ do they
have?
Fatima: PicMaster Pro is really good at processing
many different picture file formats. Image
Magic is has the best __________. I think
anyone could use it!
Omar: How about PhotoMagic Express?
Fatima: The best thing about PhotoMagic Express
is its ___________. I can use it on my
Windows PC at home and also my iPad.
Omar: OK, that information is really helpful.
But, have you ever found any _________
when using them?
Fatima: Well, just the other day when I was using
PhotoMagic Express, I was in the middle
of editing a photo when the software
__________ and I lost all of my work!
Omar: Oh no, I don’t think I’ll get that one then!

20
Think and Share: Experiences with software

Think of a piece of software you use often, and answer the following
questions about it:
1. What is the name of the software?
2. What does the software do?
3. What are the key (most important) features of the software that make
it better than other, similar software?
4. Have you ever encountered any bugs in the software? Has the
software ever crashed?
5. Have you ever used the software’s documentation? Was it easy to
use?
6. How is the software’s usability? Is it easy for the end user to use for
the first time?

Now, share your ideas about the software with a partner or small group.

Reading 2: Open-source and Closed-source Software


Here are some vocabulary words that will be useful in the next reading.
Put a check mark (✔) next to the ones you need to learn.

1. closed source: software in which the license says that the user
cannot see, edit, or manipulate the source code
2. compiler: a program that converts computer code into a machine
code that can be read and executed by a computer
3. debugger: a computer program that assists in finding and
correcting errors in software
4. IDE (integrated development environment): an application
normally consisting of a source code editor, a compiler and/or
interpreter, build-automation tools, and a debugger
5. open source: software in which the code is distributed allowing
programmers to alter and change the original software as much as
they like
6. operating system: the software link between the computer and user
(for example, Microsoft Windows, Apple OSX, or Linux)
7. proprietary: privately developed and owned technology
8. restriction: a rule or law which limits or controls something

21
There are two basic kinds of software you need to learn about as
an IT professional. The first is closed source or proprietary software,
which you are not free to modify and improve. An example of this kind
of software is Microsoft Windows or Adobe Photoshop. This software
type is so popular that some people believe it's the only type there is.
But there's a whole other world of software out there.
The other kind of software is called open source software,
which is normally free to use and modify (with some restrictions of
course). Examples of this type of software include most popular
programming languages, some operating systems such as Linux, and
thousands of applications such as Mozilla Firefox and Open Office.
But what is the real difference between open source and closed
source software? Is open source software just about saving money?
Let's investigate. Let's say for instance you find a bug in the latest
version of Mozilla Firefox. The bug is causing a major project to fail
and you need to fix it right away. This is not very likely to happen, but
it's just an example. You could take the following steps:
Step 1. Download and unzip (or uncompress) the source code from
Mozilla.
Step 2. Use an IDE and a debugger to find and fix the bug in the
source code. You would need to know a little C++ to debug
applications such as this.
Step 3. Test the fix and then use a compiler to turn the source code
into a binary file. This can take a long time for big
programs. Once the source code is compiled then the
program should work!
Step 4. You are almost done. Now send the bug fix back to the
Mozilla Firefox team. They may even use your bug fix in
the next release!
Now imagine you find a bug in a proprietary code base such as
Microsoft Word. What can you do? Not much, just file a bug report
and hope someone fixes it at some point.
This is a rather extreme example, but it illustrates why
programmers generally prefer open source software to closed source
alternatives. Good programmers love code and they want access to it.
Hiding the code from a programmer is like hiding the car engine from
an auto mechanic. We don't like it!

22
SAQ
1. What does ‘closed-source’ mean? What does ‘open-source’ mean?
2. What are differences between closed-source and open-source
software?
3. If a programmer finds a bug in a piece of closed-source software,
what can they do? What about if they find a bug in open-source
software?

Discussion: Open-source and closed-source software

Together with a partner or in a small group, discuss the following


questions about your experiences with software.
1. Describe your experiences with closed source software. Have you
ever had to deal with errors and bugs that you were not able to fix?
2. Describe your experiences with open source software. Have you
ever changed or modified open source programs? Why/why not?
3. Is there a closed source software that you would like to be open
source? Why? What features would you want to add?
4. Do you think all software should be open source? Do you think bugs
are better handled by an open-source or closed-source software
model? Why?

Fill in the blank

Use the vocabulary introduced in this chapter to complete the sentences


below.
1. When the word processor application crashed, the user had to
__________ the program and lose all his unsaved changes.
2. I wanted to develop a new feature for the program, but I couldn't
because it was __________.
3. The user was advised to reboot the computer after a serious
__________ in which the computer no longer responded.
4. Developers must maintain a close relationship with __________ if
they want to have a successful career.
5. The program was set to __________every night at midnight.
6. The man upgraded his copy of Word because of a new __________
that allowed him to spell-check documents in Spanish.

23
Role Play: Software supporter

Work in a pair with another student. One of


you is an open source software supporter,
while the other believes that closed source
programs work better. Before you begin
your discussion, make some notes of ideas
to support your claims. You can make
examples of software and applications that
support your opinion against the other.

Vocabulary Quiz

Choose the best definition for each of the words below.


1. compatible
a) capable of being used without modification
b) the largest known public network in the world, connecting
millions of computers around the world
c) an electronic, digital device that stores and processes
information

2. closed source
a) something a computer program is "supposed" to do; these are
often reasons to use a particular program or upgrade to a more
recent version
b) software in which the license stipulates that the user cannot see,
edit, or manipulate the source code of a software program
c) a measure of how easy or efficient a program is to use

24
3. crash
a) privately developed and owned technology
b) a computer failure due to faulty hardware or a serious software
bug
c) to start a program on a computer

4. end user
a) a person who uses a product or service on a computer
b) a person who writes or modifies computer programs or
applications
c) an electronic, digital device that stores and processes
information

5. restriction
a) a rule or law which limits or controls something
b) an application normally consisting of a source code editor, a
compiler and/or interpreter, build-automation tools, and a
debugger
c) a computer failure due to faulty hardware or a serious software
bug

Listening: Software bugs

Next, you’re going to listen to a


conversation between two people, Mahir
and Rami, who are employees at a
company that sells microphones. Rami,
who a customer support engineer, asks
for help from Mahir, an IT engineer,
because the replacement microphone at Rami’s desk is not working and
he can’t call his customers.

Before you listen, answer the following questions:


1. Have you ever had a problem with a peripheral (a device you attach
to your computer) before? If so, what caused the problem?
2. What do you think is the problem with Rami’s microphone?

25
Next, listen to the dialogue and answer the following questions. Listen
once without reading the script and see if you can answer the questions.
Then, listen again and follow along with the transcript to check your
answers.
1. What kind of a problem does Rami have?
2. According to Mahir, what kind of an error is it?
3. Why doesn’t microphone connect to the computer?
4. Is the company’s software “open source”?
5. When is a software called a “closed source”?

Listening Link 3

Rami: Hey Mahir do you have a minute to help me with something?


Mahir: Sure. What’s the problem?
Rami: My microphone at my computer broke, and the IT department
gave me a new microphone as a replacement, but I haven’t been
able to get it to connect it to my computer and I’m getting frustrated
because I have a bunch of important calls that I need to answer.
Mahir: Are you sure you read the documentation on how to connect it
to your computer? You’re supposed to go to our company website
and download some files that allow the computer to work with your
microphone model.
Rami: Yes, I did everything it said and it still does not work.
Mahir: Wow one of OUR microphones that WE made doesn’t work?
*Sigh*, I’m not surprised at all, ninety percent of my job involves
trying to clear up bugs that our programmers miss. I see you
brought your computer, may I take a look?
Rami: Of course. Okay, so I connect the microphone, and I execute
this program that installs the software that runs the microphone, but
before it finishes installing the “drivers”, it gives me a pop-up
saying the drivers failed to install and the microphone software
crashes.
Mahir: Okay I’ve seen this before, it looks like a compatibility error,
this usually happens when the drivers you are installing aren’t for
the right model. Are you sure you downloaded the most recent
drivers?
Rami: Yes, I’ve checked the model number on my microphone
multiple times and I’m sure I’m downloading the right stuff

26
Mahir: Here let me look into it with my Integrated Development
Environment toolkit
Rami: That sounds fancy, what is that?
Mahir: Normally if a program aborts itself and gives an error, it will
just give you a pop up saying it doesn’t work, but with this tool I
can look into the source code and see a more detailed log of what’s
happening.
Rami: Do you think you can fix it?
Mahir: Yes, it’s actually very simple. The error it’s giving is because
the model identification number on the microphone does not match
the same number the computer is looking for. When you put the
microphone in the first time, the computer reads the code inside the
microphone to determine what model it is, and then installs the rest
of the code, which are the drivers, that allows the microphone and
computer to exchange information. It looks like the programmers
wrote the ID line of the code wrong so when the computer looks
for the device it can’t find it and connect.
Rami: So our department of highly paid intelligent people misnamed
the device in their own code, and now our computers don’t know
that our microphones are plugged into them?
Mahir: Yes, I can edit it right now for you so you can get to work
Rami: Doesn’t this mean that it won’t be working for the end users as
well, I got this microphone off of our shelves!
Mahir: You’re right, the customers will also be having this problem,
but our software is open source so that our customers have access
to it, and they usually either fix it themselves or give us suggestions
on how to get rid of some bugs and make the product work better.
Rami: I would rather have the company I’m buying from deal with all
of that tech stuff, I just want my microphone to work.
Mahir: That’s called closed-source-software, most of the time the
responsibility of coding only falls on the programmers at the
company, and they make it so that nobody but them can edit their
code. We have to make our products open-source so that everyone
can change it since we advertise our microphones as highly
customizable.
Rami: I guess that makes sense, those music professionals that we sell
to really want to tweak and customize everything they can.

27
Mahir: Yeah that doesn’t excuse the lazy mistakes the programmers
make though, I’m going to have to talk to them. Here you go it
looks like it’s working now
Rami: Well thanks a lot for your help, I’m glad I know a little bit more
about what we’re selling, good luck with the rest of your day
Mahir: No problem, I’ll see you around Rami.

Case Study: Sunbula


The vocabulary below will be useful for reading the case study about
Sunbula.

General vocabulary:
1. empowerment: giving people skills and resources to be successful
2. fair trade organization: a company that sells products from
developing countries, and buys those products from local producers
for a higher wage and makes sure they have good working
conditions
3. freight: the transportation or shipping of goods
4. social justice: fair relationships in a society, especially in terms of
money, opportunities, and privileges

IT vocabulary:
5. (user) account: the place on a computer or server where a person’s
username, password, and other information about the person is
stored
6. admin: the person who is responsible for configuring and
administering a computer system
7. launch: to begin something
8. responsive design: web design that makes sure web pages look
good on different kinds of devices (such as computers, tablets, and
smartphones)
9. user friendly: easy for the end user to use or understand

Sunbula is a Jerusalem based not-for-profit, fair trade


organization committed to promoting social justice and economic
empowerment for the marginalized in Palestine. Sunbula supports
local artisans and traditional handicrafts. It was established in 1988 as
a small project called “Craftaid” during the first Palestinian Intifada

28
(uprising) inside St. Andrews Guest House in Jerusalem. In 1996,
Sunbula was officially established as a nonprofit organization. In April
of 2010, Sunbula opened its second shop, “House of Palestinian
Crafts,” in the East Jerusalem neighborhood of Sheikh Jarrah. Sunbula
is a member of the WFTO (World Fair Trade Organization) and
upholds fair trade principles and practices. It currently works with 24
producer groups across Palestine who produce a range of local,
traditional crafts such as embroidery, jewelry, olive oil soap,
olivewood and mother-of-pearl carvings, Bedouin weaving, basketry,
ceramic, felt-wool items, and silk-screen printed garments. Since being
founded, Sunbula has become Palestine’s leading fair trade craft
organization, and is regarded as a trusted provider of the finest quality
traditional crafts while directly supporting hundreds of women and
their families.
Sunbula’s two fair trade stores in Jerusalem are important
means of selling and displaying the work of artisans, and have acted as
an economical support for them and their families. However, the
numbers of customers visiting the stores decreased substantially in
2000 and 2001, and like most Jerusalem establishments depending on
tourism, Sunbula was facing hard times. In 2001 Sunbula reached out
to internet users and launched their first website with an online
catalogue.
The website was programmed using basic HTML programming
language. The catalogue displayed the products and allowed users to
choose the quantities, add the address for the shipment, and checkout.
For security measures Sunbula did not accept payment via its website
at that point; the website would transmit the order via email to Sunbula
admins where they later contacted the customer to arrange for the
order’s payments. Freight information was only displayed on the
website but the catalogue did not automatically add the freight charges
when checking out and finalizing the order. Due to using HTML
programming language, it was not easy for the admins to change and
add information about products on the website without the help of an
IT expert.
The website was redesigned in 2005 and programmed using
Secured HTML Programming Language and PHP language. The
catalogue was programmed using PHP language allowing the
customers to create an account entering their own usernames and
password. The customers were able to add products to the cart, the new

29
system allowed them to make changes and delete items from the cart.
The website was not easy to use, and hard to update for the admins.
Since 2010 Sunbula partnered with Intertech Co. a Palestinian
information technology company that specializes in portal, web, and
mobile application development. A fully dynamic website using
Intertech’s web content management system was custom designed and
programmed to meet Sunbula’s needs. The admins were able to add
and adjust content on the website, adjust information and images, and
add product and quantities. The system automatically calculated freight
fees according to countries and weights and added to the final cart
visible to the customer. In 2015 using responsive design to
accommodate smart phone and tablets, Sunbula and Intertech launched
the current Sunbula website and online shop with a more secure store
and a more user friendly design. http://www.sunbula.org/

SAQ
1. What does Sunbula do?
2. What features did Sunbula’s first web site have?
3. What were problems with their first web site? How was its
usability?
4. What features were added in the second web site?
5. What features were added in the third web site?

Writing: Software Heuristic Evaluation


A software heuristic evaluation is a
report that describes and evaluates
the usability of a piece of software.
A ‘heuristic’ is a set of rules that
helps you to examine something. In
this case, the software heuristic
evaluation is a set of rules that will
help you examine the usability of a
piece of software. Software heuristic evaluations are often used by user
interface (UI) or user experience (UX) engineers and designers.

To start your software heuristic evaluation, pick a program that you use
and know well. Then, describe it by following the outline below, which
is adapted from Nielson’s (1994) usability heuristic guide. In your

30
evaluation, you should refer to your personal experience as an end user
of the software. You might need to use the software a bit in order to
answer some of the questions.

Software Name:

Publisher/developer:

Features: What are the main features of the program?

Bugs: Are there any technical issues related to the program?

Error messages: Are they expressed in plain language that tells the
end user what the problem and the solution are? Do error messages use
error codes or other confusing language?

Open vs. closed source: Is the program open or closed source? Would
you change it? Is it easy to report possible bugs to the developers?

Visibility of system status: Does the software keep the user informed
about what is going on? Is there appropriate feedback from the
software?

Match between system and the real world: Does the software use
language that is user friendly, with words, phrases and concepts
familiar to the user, rather than language only understandable by a
programmer?

Help and documentation: Even though it is better if the software can


be used without documentation, sometimes help and documentation are
necessary. Are the help and documentation easy to search, easy for an
end user to understand, not too large, and generally helpful?

Once you are finished with your software heuristic evaluation, present
your findings to a small group or to your class.

Reference: Nielsen, J. (1994). 10 Usability Heuristics for User


Interface Design. Retrieved from
<https://www.nngroup.com/articles/ten-usability-heuristics/>

31
English for Technology

Unit 3: Operating Systems & Software Applications

Table of Contents

Preface
Goals of the Unit
Learning Outcomes
Warm-up Activity: Discussion
Reading: Operating Systems
Vocabulary
SAQ
Fill in the Blank
The Most Popular OSs
Role Play: OS Supporter
Reading: CLI and GUI
SAQ
Discussion
Fill in the Blank
Vocabulary Quiz
Reading: The Software Development Life Cycle (SDLC)
Before you read
Vocabulary
SAQ
Fill in the Blank
Vocabulary practice: Crossword
Case Study: Events.ps
Vocabulary
SAQ
Writing: Software Development Project Report

32
Preface
This unit introduces students to vocabulary and concepts
related to operating systems, graphical user interface-based OSs and
command line-based OSs, and the software development life cycle.
Students will read a case study about Events.ps, a web site for finding
cultural, social, musical, and other events in Palestine. Lastly, students
will learn to write a software development project report.

Goals of the Unit


 To remember and actively use vocabulary related to operating
systems, command line and graphical user interfaces, and the
software development life cycle.
 To understand the phases of the software development life
cycle
 To write a software development report using information from
the Events.ps case study as well as students’ own ideas

Learning Outcomes
After studying this unit, students should be able to:
 Actively use the presented vocabulary in conversations
 Identify and discuss the stages of the software development life
cycle
 Write a software development report

33
Unit 3: Operating Systems & Software
Applications

Warm-up Activity: Discussion

Discuss the following questions with a partner or a small group.

1. What do you typically use a computer for?


2. What is a computer program that you would like to use but does
not exist yet?
3. Why do you want such a program? What problem does it solve?

34
Reading: Operating Systems

Read through the vocabulary below, which are


related to operating systems. You might know
some of the words already. Which words are
you familiar with, and which are new? Put a
check mark (✔) next to the ones you need to
learn.

IT Vocabulary
1. Device driver: software which converts the data from a component
or peripheral into data that an operating system can use
2. File permissions: a set of strict rules for controlling read, write,
and execute access to a file or directory
3. Format: prepare a device to store data, erasing any existing data
4. Hidden file: a file which does not appear by default in a directory
listing; normally for security reasons or to spare confusion in end
users
5. Kernel: the fundamental part of an operating system responsible
for providing access to the machine's hardware
6. Launch: to start (or execute) an application
7. Multitasking: execution of two or more tasks at the same time
8. OS (operating system): a GUI or CLI software link between the
computer and operator; also provides a framework for productivity
software such as an office suite, web browser, or programming
languages
9. Sign in: to enter information related to an account name and its
password in order to access a computer resource
10. Sign out: to end a session with computer or network resource
11. VM (virtual machine): a software program which mimics the
performance of one or more hardware devices in order to run
software independently of the actual hardware

35
An operating system is a generic term for the multitasking software
layer that lets you perform a wide array of 'lower-level tasks' with your
computer. By lower-level tasks we mean:
● the ability to sign in with a username and password
● sign out the system and switch users
● format storage devices
● install and upgrade device drivers for new hardware
● install and launch applications such as word processors, games,
etc
● set file permissions and hidden files
● terminate misbehaving applications

A computer would be fairly useless without an OS, so today almost


all computers come with an OS pre-installed. Before 1960, every
computer model would normally have its own OS custom programmed
for the specific architecture of the machine's components. Now it is
common for an OS to run on many different hardware configurations.
At the heart of an OS is the kernel, which is the lowest level, or
core, of the operating system. The kernel is responsible for all the most
basic tasks of an OS such as controlling the file systems and device
drivers. The only software that is lower than the kernel would be the
BIOS, which isn't really a part of the operating system.
The most popular OS today is
Microsoft Windows, which has about
85% of the market share for PCs and
about 30% of the market share for Search activity
servers. But there are different types of Together with a peer
Windows OSs as well, such as Windows or a small group try to
XP, Windows Vista, Windows 7, find what the word
Windows 8, and Windows 10. Each “geek” means. You
Windows OS is optimized for different can use online search
users, hardware configurations, and engines like Google
tasks. For instance Windows XP would or Yahoo if you want.
still run on a brand new PC you might
buy today, but it's unlikely Windows 10
would run on PC hardware originally
designed to run Windows XP.
There are many more operating systems out there besides the
various versions of Windows, and each one is optimized to perform

36
some tasks better than others. Free BSD, Solaris, Linux, and Mac OS
X are some good examples of non-Windows operating systems
Geeks often install and run more than one OS on a single computer.
This is possible with dual-booting or by using a virtual machine.
Why? The reasons for this are varied and may include preferring one
OS for programming, and another OS for music production, gaming,
or accounting work.

SAQ
1. What are some lower-level tasks that an operating system allows
you to perform?
2. What is the difference between the first operating systems (before
1960) and those now?
3. What is the kernel of an operating system responsible for?
4. Can you name at least 3 operating systems?

Fill in the Blank

Fill in the vocabulary words that best fit in the sentences below.
1. Hala tested her Java code on many __________ including:
Windows, Linux, and Macintosh.
2. Rashid could not __________ to his Windows computer because
he forgot his username and password.
3. My computer has lots of RAM and can handle __________ very
well. I can switch quickly between Google Chrome, Outlook, and
other programs I have open.
4. The server was set to automatically __________ users after 10
minutes of inactivity.
5. One must __________ a flash memory drive or a hard disk drive
before it can be used to store data.
6. The lowest level of an OS is the __________.

37
The Most Popular OSs

Over time, the popularity of different OSs changes.

Before watching the below video, discuss the following questions with
a partner or small group: “What do you think was the most popular OS
in 2005? How about in 2012? In 2019?”

Next, watch the following video about changes in OS market share over
time (from 2003-2019).
<https://www.youtube.com/watch?v=eJuvKn5j_kE>

After watching, discuss the following questions with a partner or in a


small group.
1. Was there anything that surprised you? What?
2. Using what you know about various OSs, why do you think the
graph changed as it did?
3. What OSs have you tried? What did you like or dislike about them?

Role Play: OS Supporter

Work in a pair with another


student. One of you is a fan of
Microsoft (the company that
produces Windows), while the
other does not like Microsoft at
all. Each of you should support
and justify your opinion. Before
you begin your discussion, make
some notes of ideas to support
your position. For instance, the
supporter can list all the strengths that Windows has, while the
opponent may want to point to all the problems that characterize
Microsoft products suggesting alternatives.

38
Reading: CLI and GUI

Read through the vocabulary below. Which words are you familiar
with, and which are new? Put a check mark (✔) next to the ones you
need to learn.

General Vocabulary
1. diehard: very determined or loyal
2. market share: the percentage that a company has of the total sales
for a particular product or service

IT Vocabulary
1. CLI (command line interface): a text-only link between a
computer and the user
2. GUI (graphical user interface): a graphical, icon-based link
between a computer and the user
3. interface: a program is the link between a computer and the user
4. office suite: a collection of integrated productivity programs
normally including at least: spreadsheet, word processor, database,
and presentation maker.
5. power user: a user of a computer whose skills are more advanced
than most other users
6. system administrator: a person who maintains a computer server
network, including patches, upgrades, and security related duties

Listening Link 1

39
An OS must have at least one
kind of user interface. Today
there are two major kinds of user
interfaces in use, the command
line interface (CLI) and the
graphical user interface (GUI).
Right now you are most likely
using a GUI interface, but your
system probably also contains a
command line interface as well.
Typically speaking, GUIs are
intended for general use and CLIs are intended for use by computer
engineers and system administrators. However, some engineers only
use GUIs and some diehard geeks still use a CLI even to type an email
or a letter.
Examples of popular operating systems with GUI interfaces
include Windows and Mac OS X. Unix systems have two popular GUIs
as well, known as KDE and Gnome, which run on top of X-Windows.
All three of the above mentioned operating systems also have built-in
CLI interfaces as well for power users and software engineers. The
CLI in Windows is known as MS-DOS. The CLI in Mac OS X is
known as the Terminal. There are many CLIs for Unix and Linux
operating systems, but the most popular one is called Bash.
In recent years, more and more features are being included in the
basic GUI OS install, including notepads, sound recorders, and even
web browsers and games.
A great example of an up and coming OS is Ubuntu. Ubuntu is a
Linux operating system which is totally free, and ships with nearly
every application you will ever need already installed. Even a
professional quality office suite is included by default. What's more,
thousands of free, ready-to-use applications can be downloaded and
installed with a few clicks of the mouse. This is a revolutionary feature
in an OS and can save lots of time, not to mention hundreds or even
thousands of dollars on a single PC. Not surprisingly, Ubuntu's OS
market share is growing very quickly around the world.
As an IT professional, you will probably have to learn and master
several, if not all, the popular operating systems. If you think this sort
of thing is fun and interesting, then you have definitely chosen the right
career.

40
We have learned a little about operating systems in this
introduction and you are ready to do more research on your own. The
operating system is the lowest software layer that a typical user will
deal with every day. That is what makes it special and worth studying
in detail.

SAQ
1. What does CLI mean? What does GUI mean?
2. Who typically uses a CLI and who typically uses a GUI?
3. Why is Ubuntu’s market share growing around the world?

Discussion

Discuss the following questions with a partner or


in a small group.
1. Do you use a GUI or CLI more often?
2. What tasks do you use a GUI for, and which
tasks do you use a CLI for?
3. Do you prefer to use a GUI or CLI?

Fill in the Blank

Write the vocabulary words that best fit in the sentences below.
1. For the final consumer, ________ is a better and easier user
interface than ________ .
2. With a ________ , it is possible to have two OSs on a single
computer at the same time.
3. The ________ is at the core of any OS.
4. I’ve been using computers for many years and I know a lot about
them. I am a ________.
5. You can use an ________ to get work done, such as writing
documents, presentations, or spreadsheets.

41
Vocabulary Quiz

Choose the best definition for each of the words below.


1. multitasking
a) a software program which mimics the performance of one or
more hardware devices in order to run software independently
of the actual hardware
b) a text-only link between a computer and its operator
c) concurrent execution of two or more tasks by a processor
2. compression
a) a method of packing data in order to save disk storage space or
download time
b) t of strict rules for controlling read, write, and execute access to
a file or directory
c) a file which does not appear by default in a directory listing;
normally for security reasons or to spare confusion in end users
3. kernel
a) a set of strict rules for controlling read, write, and execute
access to a file or directory
b) the fundamental part of an operating system responsible for
providing access to the machine's hardware
c) a text-only link between a computer and its operator

4. OS or operating system
a) prepare a device to store data, erasing any existing data
b) a GUI or CLI software link between the computer and operator;
also provides a framework for productivity software such as an
office suite, web browser, or programming languages
c) a file which does not appear by default in a directory listing;
normally for security reasons or to spare confusion in end users
5. VM or virtual machine
a) a software program which mimics the performance of one or
more hardware devices in order to run software independently
of the actual hardware
b) concurrent execution of two or more tasks by a processor
c) an icon based link between a computer and its operator

42
Reading: The Software Development Life Cycle (SDLC)

Before you read


Make a small group and discuss the following questions:
1. What applications do you use in your everyday life? Do you
software for work, for fun, or for both?
2. Have you ever tried to program a new software application? Do you
think it is easy? Why?
3. If you had the financial resources to develop any application you
wanted to, what would you develop? Why?

Vocabulary
Read through the vocabulary below, which are related to the software
development life cycle. Which words are you familiar with, and which
are new? Put a check mark (✔) next to the ones you need to learn.

General Vocabulary
1. Evaluate: to test or assess
2. Meaningful: having real importance or value
3. Productive: working hard and getting good results
4. Stability: the state of being not easily changed or likely to change

IT Vocabulary
1. Alpha : the first version of a software application that is "feature
ready" but still very far from "production ready"
2. Beta: a software version which is feature-ready, has passed early
testing, and ready for more widespread testing
3. Debugging: the process of identifying and removing errors from
computer hardware or software
4. Freeware: software distributed without cost by the developer
which normally cannot be modified or sold without permission
5. Help file: electronic documentation included with a program
6. Iterative: ongoing, involving repetition of a process
7. Patch: a software update intended to fix bugs or security holes in a
software release
8. Proof of concept: an experiment that demonstrates that something
is possible
9. Prototype: a draft version of a product

43
10. RC (release candidate): a piece of software that has passed its
testing stages and is close to release
11. Shareware: closed source software distributed freely for a limited
time until a full version must be purchased
12. SDLC (software development life cycle): a formalized approach
to creating and maintaining software
13. Trial version: a piece of software which is available for evaluation
by customers free of charge, normally for a limited amount of time
14. Upgrade: to replace an older version of software or hardware with
a newer version

Without software applications, it would be very hard to actually


perform any meaningful task on a computer unless one was a very
talented, fast, and patient programmer. Applications are meant to make
users more productive and get work done faster. Their goal should be
flexibility, efficiency, and user-friendliness.
Today there are thousands of
applications for almost every purpose,
from writing letters to playing games.
Producing software is no longer the
lonely profession it once was, with a few
random geeks hacking away in the
middle of the night. Software is a big
business and the software development
life cycle (or SDLC) goes through
certain stages and versions before it is released.
Applications are released in different versions, including alpha
versions, beta versions, release candidates, trial versions, full
versions, and upgrade versions. Even an application's instructions are
often included in the form of another application called a help file.
1. Alpha versions of software are normally not released to the public
and have known bugs. They are often seen internally as a 'proof of
concept'. Avoid alphas unless you are desperate or else being paid
as a 'tester'.
2. Beta versions, sometimes just called 'betas' for short, are a little
better. It is common practice nowadays for companies to release
public beta versions of software in order to get free, real-world
testing and feedback. Betas are very popular and can be
downloaded all over the Internet, normally for free. In general you

44
should be wary of beta versions, especially if program stability is
important to you. There are exceptions to this rule as well. For
instance, Google has a history of excellent beta versions which are
more stable than most company's releases.
3. After the beta stage of software development comes the release
candidates (abbreviated RC). There can be one or more of these
candidates, and they are normally called RC 1, RC 2, RC 3, etc.
The release candidate is very close to what will actually go out as
a feature complete 'release'.
4. The final stage is a 'release'. The release is the real program that
you buy in a shop or download. Because of the complexity in
writing PC software, it is likely that bugs will still find their way
into the final release. For this reason, software companies will offer
patches to fix any major problems that end users complain loudly
about.
Applications are distributed in
many ways today. In the past most
software has been bought in stores in
versions called retail boxes. More and
more, software is being distributed
over the Internet, as open source,
shareware, freeware, or traditional
proprietary and upgrade versions.
A common technique used in
software development is so-called
rapid prototyping, which means to constantly evaluate increasingly
refined prototypes for improving design and programming in a quick
and straightforward way. Another term used to describe this approach
is “the rule of loop”, stressing the importance of iterative testing and
improvement. A related concept is debugging, which describes the
process to fix issues and bugs when the software is close to be released.

SAQ:
1. What is the software development life cycle?
2. What is an alpha version? How is a beta version different?
3. How has distribution of software changed?
4. What is rapid prototyping?

45
Fill in the Blank

Write the vocabulary words that best fit in the sentences below.
1. ___________ versions are rarely released to the public and
frequently contain serious bugs.
2. The ___________ version of the new program was released
yesterday, but final release is still months away.
3. Sometimes a company will make a ___________ of a program that
offers fewer features than the full version.
4. The man needed to ___________ his office suite so he could export
his document files in the newest format.
5. The ___________ often contains useful information about how to
use a program.
6. Office suites such as MS Office or Google Docs are designed to
make users more ___________ at their jobs.

46
Vocabulary practice: Crossword

Across
3. to prepare a device to store data, erasing any existing data
6. working hard and getting good results
7. very determined or loyal
9. the first version of a software application that is "feature ready" but
still very far from "production ready"
12. closed source software distributed freely for a limited time until a
full version must be purchased
13. a text-only link between a computer and the user
14. a graphical, icon-based link between a computer and the user

Down
1. the state of being not easily changed or likely to change

47
2. to replace an older version of software or hardware with a newer
version
4. execution of two or more tasks at the same time
5. software distributed without cost
8. a software version which is feature-ready, has passed early testing,
and ready for more widespread testing
10. a software update intended to fix bugs or security holes in a
software release
11. the fundamental part of an operating system

Case Study: Events.ps

Read through the vocabulary below, which will help you when you
read the case study. You might know some of the words already.
Which words are you familiar with, and which are new? Put a check
mark (✔) next to the ones you need to learn.

General Vocabulary
1. take to the next level: to make something better
2. venue: the place where an event takes place

IT Vocabulary
1. content management system (CMS): a user interface that allows
a user to add, modify, and remove content from a website without
the need for an admin
2. functionality: the particular use that something is designed for
3. platform: a program that controls the way a computer or web site
works

In August 2016, the events.ps website was launched and introduced


to the Palestinian audience by the founders Anas Aghbar and Yasmin
Attoun. Events.ps is the first Palestinian platform that contains events
in Palestine. The idea was to have a platform that gathers information
about all the current and upcoming cultural, social, musical and other
events in Palestine. The website was very successful and got positive
feedback from the crowd.

48
In 2017 the founders felt the need to take the platform to the next
level. The web site was built using WordPress, a free and open-source
content management system based on PHP & MySQL.
Due to the technology used, the website faced limitations and
restrictions on the possibility of expanding the platform's services and
functionalities.
At that point, the user was able to enter the website and browse the
events. Users explained that they needed reminders, an easier way to
search the events, and there were no functionalities to accommodate
organizers and venues.
Users had to purchase paper tickets for the events from points of
sale.
Organizers had to contact the admins to add their events, which
increased the effort and time of the admins of the website.
In July 2017, Events.ps contracted InterTech co., a Palestinian IT
company that specializes in portal, web, and mobile application
development, to re-design and develop the Events.ps platform. The
solution was to use InterTech’s customizable web content management
system for the development of the new platform using PHP & MySQL.
The new platform was designed to be more interactive with the addition
of new features, functionalities, and services.
The user’s profiles were divided into 5 types: Visitor, User,
Organizer, Assistant and Admin. Some of the accounts types are free
with no expiration dates, whereas pre-paid accounts are active for a
specific amount of time. Each type has different functionalities and
authorities. For example, an Organizer account can create, add events
with photos and videos, see available venues, send invitations, and
many other functions including viewing event attendance confirmation
list. The Admin account is the main account that controls every aspect
of the platform, including approving and managing published events.
The Admin account also generates analytical reports from the database
of events and users.
An E-ticketing system was added to the new system, which
replaces paper tickets and eliminates all problems associated with
them. The system allowed users to buy their tickets and get a QR code
that will be scanned by the organizers at the entrance of the event.
A mobile application (Android and IOS) was also developed
featuring all the new functionalities in the platform, in addition to
allowing organizers to scan the QR code for tickets. The mobile

49
application supports offline browsing and caching, and supports
mobile, tablets, and iPad.
Now with the motto "You will never miss an event" the new
platform gathers all events in Palestine enabling the users to browse
events by categories, cities or calendar, add the event to their favorite
list and personal calendar, and receive a reminder by email, which
encourages them to meet people and share their experience.

SAQ
1. What was the goal of Events.ps?
2. What were the limitations of the first version of the web site?
3. What are the five user types in the new CMS? What can an
Organizer do? What can an Admin do?
4. What are some of the functionalities of the new web site?

Writing: Software Development Project Report

An important part of any software


development project is
documentation. Documentation
occurs throughout the software
development life cycle and is a
way for a development team to
record what they have
accomplished in each phase of a
project, and also to make plans for the next steps of the development
process.

Although some approaches to software development, such as Agile


software development, try to have less documentation, documentation
is still very important. All software developers need to be able to write
documentation.

One common kind of documentation is a software development


project report. A project report is written in order to communicate
information about the software design and implementation to various
stakeholders (the people who have an interest in the software
development, such as a client or perhaps a manager or boss).

50
Here is some information that is usually included in a software
development project report:

1. Name of the software and the authors


2. Description of the software: What is the software and what does
it do?
3. Rationale: Why is the software needed? What problem does it
solve, and how does it solve the problem?
4. Stakeholders: This section describes the people will be affected
by the software, either directly or indirectly. Stakeholders can be
humans or companies (or other organizations). Some examples are
the client, a help desk employee, the business managers of the
software development company, the software developers, etc.
5. User Stories: These are descriptions of the people who will use
the software and how they will use it. These include multiple
types of users, such as an end user or an administrator. User stories
are usually written from the user’s point of view and in the
following format: “As a <type of user>, I want <a feature> so that
<I get some kind of benefit>.” For example, two users of a blog
software might be the author and a reader. A user story for the
author might be: “As a blog author, I want to include photos in my
blog posts so that they are attractive to readers.” and a user story
for the reader might be: “As a blog reader, I want to filter blog
posts by category so that I can quickly find information I am
interested in.”
6. Work plan: This describes your plan for developing the software.
Which features will you develop first? When will you release your
alpha version? Who will be your beta testers?

Activity 1: Writing a software development project report about


Events.ps

Next, we are going to write a software development project report using


the information from the Events.ps case study you read earlier. Fill in
the template below. You might need to re-read the case study to find
the information. Some parts have been filled in for you. (Note: Part 6,
Work plan, is not included here because the software has already been
developed.)

51
1. Name of the software and the authors

The web site is named Events.ps, and is owned by Anas Aghbar and
Yasmin Attoun. The web site’s CMS was developed by InterTech co.

2. Description of the software

3. Rationale

4. Stakeholders

One of the stakeholders is the owners of Events.ps. Their role is


important because they are the clients and will be paying for the
development of the new web site, so the programmers need to know
what functionalities the clients want the web site to have.

Another stakeholder is InterTech co. InterTech, as a company, is


responsible for delivering a product that the clients are happy with.
InterTech is also responsible for finding the right programmers and
project manager to work on the project.

5. User Stories

As an Organizer, I want to add events with photos and videos so that


my event is noticeable and attractive to people viewing the site.

52
Activity 2: Writing your own software development project report

Next, you’re going to write your own report based on a piece of


software that you think of.

First, think of a piece of software that you would like to use but does
not exist yet. This could be the software you thought of in the
discussion at the beginning of this unit, or it could be something
different. Think of what you would like the piece software to be able
to do, what problem it solves, and who would use it.

Next, we’re going to write a software development project report about


the software you thought of. Since the software doesn’t exist, you’ll
need to think carefully about what the software would do, who would
use it, how they would use it, and how you would go about developing
the software.

1. Name of the software and the authors

2. Description of the software

3. Rationale

53
4. Stakeholders

5. User Stories

6. Work plan

54
English for Technology

Unit 4: Computer Hardware

Table of Contents

Preface
Goals of the Unit
Learning Outcomes
Warm-up Activity: Discussion
Reading 1: Personal Computers
Vocabulary
SAQ
Your PC Use
Hardware Components
Fill in the Blanks
Ranking Activity
Reading 2: Peripherals
Vocabulary
SAQ
Discussion
Reading 3: Computer Memory and Storage
Vocabulary
SAQ
Dialogue
Discussion
Role Play
Vocabulary Quiz
Crossword Puzzle
Activity: Build your own computer
Writing Assignment: Evaluating Your Computer

55
Preface
In this unit, you will learn vocabulary, have discussions, and
write about personal computer components, peripherals, and input
devices.

Goals of the Unit


 To remember use vocabulary related to PC hardware
components, peripherals, and input devices
 To use new vocabulary in discussions with peers
 To search for and evaluate information on PC hardware
supplier web sites
 To write an evaluation of a computer

Learning Outcomes
After studying this unit, students should be able to:
 Remember vocabulary related to PC hardware components,
peripherals, and input devices
 Use the new vocabulary in oral discussions and in writing
 Evaluate information found on web sites of computer hardware
sales companies both in Palestine and in other countries
 Evaluate their own computer

56
Unit 4: Computer Hardware

Warm-up Activity: Discussion


Before starting with this unit content, let’s do a little warm-up. Discuss
the following questions with a partner or a small group.

1. Do you have a computer? Do you know how it works and what its
components are? Name as many components as you can.
2. If you buy a new computer, how do you choose? Why?
3. Have you ever opened a computer and changed its parts? If so, what
did you change and why? If not, why not?

Reading: Personal Computers

Read through the vocabulary below, which are related to some basic
concepts and terms about computer hardware. You might know some
of the words already. Which words are you familiar with, and which

57
are new? Put a check mark (✔) next to the ones you need to learn (that
is, the ones that you don’t know yet).

General Vocabulary
1. Augment: to add to something in order to improve or complete it
2. Emerge: to become known or apparent
3. Synonymous: having the same meaning

IT Vocabulary
1. Convergence: the evolution of devices towards common
functionality
2. Desktop computer: a personal computer typically in the shape of
a tower or box with a connected keyboard, mouse, and monitor
3. Embedded system: a computer using a relatively slow and
specialized processor and ROM chip, normally used to control a
particular device such as a washing machine or an MP3 player
4. Form factor: the size, configuration, or physical arrangement of a
computing device
5. Laptop: a portable computer with a built-in screen, integrated
keyboard, and battery power
6. PC (personal computer): a computer designed for use by one
person at a time
7. Server: a type of computer intended primarily for central
distribution of data to other computers Sn the same network
8. Smartphone: a hand-held multimedia computer optimized for
communication and featuring a touch screen and internet
connection
9. Smartwatch: a portable computer that is work on the wrist, like a
watch
10. Supercomputer: a computer designed to perform intensive tasks
such as weather prediction, big data calculations, or space research
11. Tablet: a portable computer shaped in the form of a notebook and
capable of advanced handwriting recognition via use of a stylus or
on-screen keyboard
12. Wearables: computers designed to be worn on the wrist, head, or
other places on the body often to improve mobility
13. Workstation: a high-quality computer, typically with lots of
RAM, plenty of CPU power, and a high quality video card

58
PCs are everywhere you look today. At home, at the office, and
everywhere in between. The term PC used to be synonymous with
a desktop computer running Windows, but this is not really true.
Really, any computer you use by yourself for general purposes and is
characterized by a small form factor could be called a PC. When
people think of a PC, they might think of a laptop, desktop computer,
or a workstation, but a smartphone can also be considered a kind of
PC.
Besides PCs, there are other types of computers you probably see
at work or school. These include servers, such as file servers, print
servers, web servers, and supercomputers.
But not all types of computers are as obvious as these. There are
still other kinds of computers that fit inside of other devices and control
them. These computers are known as embedded systems. Embedded
systems can be found in traffic lights, TV sets, refrigerators, coffee
machines and many more devices. Embedded systems are typically
controlled by inexpensive, specialized processors which can only
handle very specific tasks. New types of computers are always coming
out and replacing or augmenting existing computer types. Examples
of new types of computers emerging would be netbooks, tablets, and
even wearables, like smartwatches.

Keep in mind that the lines between computer types are constantly
being blurred. This phenomenon is known as convergence.

SAQ
1. What is a PC?
2. What are embedded systems?
3. What are some emerging types of computers?
4. What is convergence?

59
Your PC Use

What kinds of PCs do you use? How do you use different kinds of PCs
differently?

Some common tasks that people use PCs for are: watching movies/TV,
playing games, doing school work, doing work for your job, reading
news, communicating with friends, or communicating with co-
workers. Which kind of PC do you use for which tasks?

PC What you use it for

Laptop

Desktop

Smartphone

Tablet

Smartwatch

Workstation

60
Next, share your answers with a partner or a small group. Make sure to
give reasons for your answers. What differences do you see between
how you use PCs and how your classmates use PCs?

Hardware Components

Below is a list of common hardware components. Some of them you


might know already. Put a check mark (✔) next to the ones you need
to learn.
Computer Hardware Components
1. BIOS (basic input output system): This is normally a ROM
program that controls the base functionality of the computer such
as video, hard drives, optical drives, and keyboard
2. Coprocessor: Any computer processor or portion of the CPU
which assists the main processor by performing a highly
specialized task
3. Graphics card: a component of a computer which is designed to
convert a binary image stored in memory to a display medium. A
graphics card has a GPU (Graphics Processing Unit), a specialized
coprocessor designed to handle graphics.
4. Hard disk drive (HDD): A type of data storage that can transfer
data at about 100-200 MB/s
5. Microprocessor: an electronic device constructed from
microscopic transistors and other circuit elements on a single
integrated circuit; popular manufactures of these devices include
Intel, AMD, and IBM
6. Motherboard: The main printed circuit board in a computer that
carries the system buses, sockets for processors, memory modules,
etc.
7. NIC (network interface card): a wired or wireless device that
connects a computer to a network
8. Power supply: A separate unit or part of a circuit that supplies the
correct amount of electrical current to a computer system.
9. SSD (Solid-State Drive): A hard drive that has no moving parts
and can transfer data at over 500 MB/s
10. Sound card: a component which allows a computer to play and
record audio

61
11. USB (Universal Serial Bus): A relatively fast and convenient
computer technology allowing the connection of many peripherals
such as digital cameras, scanners, external hard drives, etc.; this is
a much faster replacement for the old serial bus technology

Fill in the Blanks


Choose the word from the box that best fits each blank.

1. The iPhone is a good example of _________, because it has all the


features of a PDA, mobile phone, and an MP3 player in one package.
2. Many electronics you can buy today are controlled by _________
systems.
3. A _________ may have up to 100 processors and speeds are
measured in tens of gigaflops.
4. The technician needed to upgrade the _________ before installing a
faster processor in the workstation.
5. The processor, RAM, and PCI cards plug directly into the
_________

BIOS form factor supercomputer


convergence laptop SSHD
desktop computer motherboard tablet
embedded server wearable

62
Ranking Activity

Which computer hardware components are the most important? Rank


the components below from 1 (the most important) to 6 (the least
important). Then, discuss your choices with a partner or in a small
group.

Components

Graphics card _____ Sound card _____

BIOS _____ Power supply _____

USB _____ Hard drive _____

Reading: Peripherals

Vocabulary

Here are some vocabulary words that will be useful in the next reading,
about peripherals. Put a check mark (✔) next to the ones you need to
learn.

1. barcode reader: a hardware peripheral designed to 'scan' products


into an inventory tracking system.
2. click: To press and release the primary (left-side) mouse button
3. daisy chain: The man daisy chained 3 portable USB drives to
increase the storage on his laptop to 3 TB.
4. display: an output screen which contains visual information; some
variants include: LED lights, CRT or LCD monitors, and virtual
reality goggles
5. dongle: a hardware device that plugs into a parallel or a USB port,
acting as copy protection for a particular software application.
6. double-click: To depress and release the left mouse button twice
in quick succession
7. fingerprint reader: a device which forms a digitised image of a
human finger print for the purpose of biometric authentication.

63
8. graphics tablet: an input device or mouse alternative using a
sensitive rectangular surface and a stylus
9. input device: any peripheral used primarily to enter data into a
computer
10. microphone: a hardware device plugged into a computer's sound
card optimized for voice commands or other audio recording
11. modem: a device which converts digital signals into analog
signals, and back again when needed
12. monitor: a visual interface display between the computer and the
operator; normally a large rectangular LCD, LED, or CRT device
13. mouse: a handheld input device used to move an onscreen pointer
by means of sliding on a flat surface
14. mouse pointer: A special icon (normally an arrow) which indicates
the current location of the mouse on the desktop screen.
15. OCR (optical character recognition): the ability of a computer to
determine standard letters and numbers based on fuzzy logic
16. plug and play: a term used to describe the technology where a
peripheral device is automatically recognized and configured when
it is detected
17. printer: a peripheral device that produces a hard copy, normally
paper, from data stored in a computer
18. right-click: to press the right-side mouse button
19. scanner: a device for capturing a binary digital image from a hard
copy
20. speaker: An internal or external device which converts electrical
impulses into audible sound.
21. speech recognition: the ability of a computer to convert spoken
words from a user into usable data.
22. stylus: a part of an input device resembling a pen used to draw on
the surface of a graphics tablet
23. touchpad: an input device consisting of a sensitive rectangular area
in which one uses a finger to move a cursor on a display.
24. touchscreen: a display that also acts as an input device by allowing
a user to navigate a program by pressing specific locations of the
screen.
25. trackball: a pointing device consisting of a ball on top of a base
that is rotated to move a cursor on the computer screen
26. webcam: any specialized video camera designed to transmit video
over the internet

64
Peripherals are a generic name for any device external to a
computer, but still normally associated with its extended functionality.
The purpose of a peripheral is to extend and enhance what a computer
is capable of doing without modifying the core components of the
system. A printer is a good example of a peripheral. It is connected to
a computer, extends its functionality, but is not actually part of the core
machine.
Do not confuse computer peripherals with computer
accessories. An accessory can be any device associated with a
computer, such as a printer or a mousepad. A printer is a peripheral,
but a mousepad is definitely not one. A mousepad does not extend the
functionality of a computer, it only enhances the user experience.
Peripherals are meant to be easily interchangeable, although
you may need to install new drivers to get all the functionality you
expect out of a new peripheral device. The technology which allows
peripherals to work automatically when they are plugged in is called
plug and play. A plug and play device is meant to function properly
without configuration as soon as it is connected. This isn't always the
case however. For this reason some people sarcastically refer to the
technology as 'plug and pray'.
Still, plug and play was a big deal when it was introduced in the
1990's. Before then, installing a new peripheral could take hours, and
could even require changing some jumper settings, DIP switches, or
even hacking away at drivers or config files. It was not a fun time
except for real hardware geeks. With plug and play technology, all the
nasty jumpers and DIP switches moved inside the peripheral and were
virtualized into firmware. This was a clear victory for the common,
nontechnical person!
The most common peripheral linking device is probably USB
technology. Why? USB is good because you can daisy chain a lot of
peripherals together quickly, it is quite fast and growing ever faster in
recent editions, and it even provides enough power to supply some
smaller peripheral devices like webcams and flash drives.
Here is a list of common peripherals you should be familiar
with as an IT professional. Keep in mind the list is always changing
due to changing technologies:
- monitors or displays
- scanners
- printers

65
- external modems
- dongles
- speakers
- webcams
- external microphones
- external storage devices such as USB-based flash drives and portable
hard disk drives
- input devices such as keyboards, mice, etc. are normally considered
peripherals as well
Input devices are a further category of peripherals. We use
input devices every time we use a computer. Simply speaking, it is
these devices which allow us to enter information. Without them, the
computer would not know what we want it to do.
Some of the things we do with input devices are: move a cursor
around the screen, enter alphanumeric text, draw pictures, and even
enter binary data in the form of graphics or audio wave forms.
Input devices have a history as long as computers themselves.
Perhaps the first input device was the simple electronic switch (similar
to a light switch) which turned bits on or off. There were hundreds or
even thousands of these switches on larger computers. It used to take a
team of programmers hours or even days to set up a computer to
perform a single calculation.
Switches are still used today on computers. For instance the power
button on the computer is a switch which is also an input device telling
the computer to power on or power off.
Most likely in front of you right now are two of the most
popular input devices: the keyboard and the mouse. And instead of a
mouse on a laptop computer you normally have a touchpad.
As computers evolved throughout the late 20th century,
computers became more and more interactive. Input devices came and
went. Sufferers of carpal tunnel syndrome (a medical condition that
causes pain, numbness, and tingling in the hand and arm) often prefer
a trackball or stylus to a mouse. Computer users with disabilities have
invented a wide array of input devices designed to replace the mouse,
including devices controlled by foot or even eye movement.
Not only PCs and mainframes use input devices. Almost all
computers feature some kind of input device. Special scanners are used
in many stores and warehouses called barcode readers to enter stock
and sell items at the cashier. These are input devices as well. Even

66
microphones can technically be called input devices as a computer can
respond to them and interpret them as incoming data.
Corporations and especially government institutions are
already implementing the second generation of input devices to
improve security. These include retina scanners and/or fingerprint
readers to replace or improve accuracy of username and password
authentication. You will be seeing more of this kind of biometric
authentication in the coming years as a general remedy for weak
passwords or leaked passwords.

SAQ:
1. How is a peripheral different from a computer accessory?
2. What is a plug and play device?
3. Why is USB technology useful?
4. What is an input device?
5. What is carpal tunnel syndrome?

Discussion

Together with a partner or in a small group, discuss the following


questions about your experiences with computer peripherals.
1. Which inputs devices do you tend to use? Do you prefer to use a
mouse, touchpad, or another input device? Why?
2. Have you ever had problems with a scanner or a printer? If yes,
how did you fix them?
3. What do you think about biometric authentication devices? What
are possible advantages and disadvantages of such devices?

67
Reading: Computer Memory and Storage

Here are some vocabulary words that will be useful in the next reading.
Put a check mark (✔) next to the ones you need to learn.

1. BD (Blu-Ray Disc): an optical read-only disc storage media format


used for data or movie storage with same dimensions as a standard
DVD or CD; holds up to 50 GB or 6 times the storage of a DVD.
2. CD-ROM (compact disc read only memory): an optical storage
medium which can store approximately 650 MB of read-only data
3. DVD (digital versatile disc): a portable storage medium which can
hold between 4.7 and 17 gigabytes of data, often used for storing
movies, games, and operating systems
4. flash drive: A USB device used for portable data storage, typically
between 1 gigabyte and 1 terabyte in size; also known as a USB
drive, jump drive, and even a key drive
5. floppy disk drive: a legacy storage device which can read and
write data slowly from a removable magnetic medium (normally
3.5" in diameter and holding 1.44 MB of data)
6. hard disk drive: a storage device using rotating magnetic platters
to quickly store and retrieve digital data
7. magnetic storage: A storage technique using patterns of charged
particles on a metallic surface to store data; examples include hard
disk drives, tape drives, floppy disk drives
8. non-volatile: long-term, persistent, does not require power to
retain its state
9. optical storage: a data storage technique using a pattern of
markings on a disc that can be read by a laser; examples include
CD-ROM, and DVD-ROM technology
10. What about the future? Expect a gradual convergence where there
is no longer a need for both storage and memory in PCs. Some new
technology such as quantum memory may arrive which has the
advantages of both memory and storage.
11. quantum memory: an interface between light and matter that
allows for the storage and retrieval of entangled photonic qubits
12. RAM (random access memory): a type of computer memory
known for being volatile (temporary) and fast.
13. ROM (read-only memory): a type of memory which is known for
being non-volatile (permanent) and fast

68
14. semiconductor storage: a type of storage using integrated circuits
to store data; examples include RAM, ROM, and flash memory
15. SAN (storage area network): a cluster of storage devices working
together to provide shared network storage.
16. video memory: This is dedicated or shared memory set aside
specifically for the graphics processor
17. volatile: temporary, requires power to retain its state

Memory and storage are important concepts to master in


Information Technology. The two terms are often used
interchangeably, so it is important to understand the key differences.
Computer memory needs to be quick. It is constantly feeding the CPU
with data to process. Since nobody likes to wait for a computer, high-
quality computers will have fast processors with lots of quick memory.
This type of memory is commonly known as RAM, or random access
memory. This type of memory is volatile which means that the actual
data disappears when the computer loses power.
Because memory needs to be much faster than storage, it is
rather more expensive than storage per GB. A typical desktop computer
today has between 2GB and 32GB of memory running at speeds of
anywhere from 1.2 GHZ to 3.2 GHZ. Speeds tend to go up about 10%
every two years.
If you are a gamer, video editor, or physics geek, you may be
aware of video memory. Video memory is special type of RAM which
is even faster and more expensive than normal system RAM. This
RAM is reserved only for the graphics and is thus kept separate from
the main system RAM, which sits on the motherboard close to the CPU.
A typical dedicated video card will have anywhere between 2GB and
12 GB of dedicated RAM.
But of course computers do not process all the data they have
at once. They also need to save some data for long term use. This is
where storage comes in. Think of all the video files, mp3s, photos, and
documents on your PC. These files are not always being processed by
the CPU. They are mostly just hanging around waiting to be used at
some point. Storage does not need to be as quick as memory, but there
does need to be a lot more of it. And storage of course needs to be non-
volatile, meaning it will not get erased when you power off or restart
your computer. These are the two key differences between memory and
storage.... speed and volatility.

69
Storage today comes in many different types
including semiconductor storage, magnetic storage, and optical
storage. A typical computer today comes with anywhere between
128GB to 2TB of storage. Low end computers normally come with a
magnetic hard disk drive which reads data at around 75 to 200
MB/sec. These devices use rotating, magnetically-charged platters to
store data. Hard disk drives are still popular because they can store a
lot of data with relatively quick access times very cheaply.
Another type of storage is network storage, typically referred to
as a SAN. This storage is usually found in a datacenter. This type of
storage goes by other names such as "cloud storage" or "network
drive." It is of course highly limited by network speeds. If you are
offline and need a file then you are out of luck. That is why it's always
a good idea to get as much storage on your PC as you can afford.
In the future all magnetic storage types will become obsolete.
They will soon all be replaced by SSDs using semiconductor
technology. SSDs have three key advantages over magnetic storage
devices: speed, lack of moving parts, and low power consumption. This
makes them ideal for laptops where battery life and durability are huge
issues.
A last type of memory is ROMs, which are somewhere in
between memory and storage. Embedded systems, BIOSs and older
video game machines used these for various reasons, mainly copy
protection and cost.
In recent years, you are much more likely to see optical storage
devices such as CD-ROM, CD-R, DVD-ROM, and DVD-R devices
being used to store larger software and data archives. These devices
can store between 650 MB and 50 GB of data.
Because of the need for ever greater capacity and performance
for removable storage, a new device called the flash drive has taken
over the industry by storm. Based on semiconductor storage
technology, these devices are small, can store a large amount of data,
and can read and write data very fast.
What about the future? Expect a gradual convergence where
there is no longer a need for both storage and memory in PCs. Some
new technology such as quantum memory may arrive which has the
advantages of both memory and storage.

70
SAQ
1. What are the main differences between memory and storage?
2. What are advantages of SSDs?
3. How are ROMs different from other memory or storage?
4. What are advantages of a flash drive?

Dialogue
In the following dialogue, Maryam is a customer and Faisal is a
computer store owner.

Listening Link 1

Maryam: Good morning!


Faisal: Good morning, how can I help you today?
Maryam: I need a new hard disk drive but I am a
little bit lost.
Faisal: Sure thing, I’d be happy to help you! First
of all, do you need it for a desktop or a laptop?
Maryam: It’s for a laptop.
Faisal: OK, great. Since it’s for a laptop, we’re
going to look for a smaller form factor...so, how big do you want
the storage?
Maryam: Hmm… I’m not sure. What do you recommend?
Faisal: Well, what do you usually do with your laptop?
Maryam: Lots of things...I keep a lot of files like pictures and
databases for work. And I play some videogames also.
Faisal: OK, that helps. I would say that 1 terabyte would work nicely.
I’d recommend an SSD because it has a fast data transfer rate of
200 megabytes per second.
Maryam: Oh, wow, that’s great but it’s pretty expensive. I think it’s a
little bit too much for me…
Faisal: What about this other option? It has the same data transfer
speed but less storage, 500 gigabytes. You can rely on cloud
storage if you need more room, like Dropbox or Google Drive.
Maryam: That seems like a good compromise. I’ll take it. Thanks for
your help!
Faisal: No problem!

71
Discussion

With a partner or in a small group, discuss the following questions:


1. Would you rather have a larger magnetic storage drive or a smaller
SSD? Explain your reasons.
2. Do you think cloud storage is a good replacement for local storage
(i.e., storage on your computer)? Why? What are advantages and
disadvantages of cloud and local storage?

Role Play

Work in a pair with another student. You are


two siblings who are going to buy a new
computer. However, you have different needs.
One of you loves videogames and wants to
purchase a machine that will run the latest hits.
The other loves photography and wants a
computer for storing but also editing all the
pictures s/he takes. What are the
components/peripherals that you both want? What are specific to your
preferences instead? Before you begin your discussion, make some
notes of ideas to support your claims.

Vocabulary Quiz

Choose the best definition for each of the words below.


1. smartphone
a. hand-held multimedia computer optimized for communication
and featuring a touch screen and internet connection
b. a computer designed for use by one person at a time
c. a high-quality computer, typically with lots of RAM, plenty of
CPU power, and a high quality video card

2. GPU or Graphics Processing Unit


a. a specialized coprocessor designed to handle graphical
calculations such as 3D modeling and games
b. a standard 32-bit bus running at 132 MB/s
c. a clear set of technical or quantitative requirements

72
3. dongle
a. a peripheral device that produces a hard copy, normally paper,
from data stored in a computer
b. a hardware device that plugs into a parallel or a USB port,
acting as copy protection for a particular software application.
c. an output screen which contains visual information; some
variants include: LED lights, CRT or LCD monitors, and virtual
reality goggles

4. optical storage
a. a data storage technique using a pattern of markings on a disc
that can be read by a laser; examples include CD-ROM, and
DVD-ROM technology
b. a type of storage using integrated circuits to store data;
examples include RAM, ROM, and flash memory
c. a cluster of storage devices working together to provide shared
network storage.

5. right-click
a. a device which forms a digitized image of a human finger print
for the purpose of biometric authentication.
b. a pointing device consisting of a ball on top of a base that is
rotated to move a cursor on the computer screen
c. to press the right-side mouse button

73
Crossword Puzzle

Read the clues below, and fill in the correct words in the crossword
puzzle.

Across
2. a type of memory which is known for being non-volatile (permanent)
and fast
5. a handheld input device used to move an onscreen pointer by means
of sliding on a flat surface
6. a part of an input device resembling a pen used to draw on the surface
of a graphics tablet
7. a portable computer with a built-in screen, integrated keyboard, and
battery power

74
8. a portable computer shaped in the form of a notebook and capable
of advanced handwriting recognition via use of a stylus or on-screen
keyboard
9. to press and release the primary (left-side) mouse button
10. a hardware device that plugs into a parallel or a USB port, acting
as copy protection for a particular software application.
11. the ability of a computer to determine standard letters and numbers
based on fuzzy logic
14. a computer designed to be worn on the wrist, head, or other places
on the body often to improve mobility
15. an input device consisting of a sensitive rectangular area in which
one uses a finger to move a cursor on a display.
16. an output screen which contains visual information; some variants
include: LED lights, CRT or LCD monitors, and virtual reality
goggles
17. any specialized video camera designed to transmit video over the
internet

Down
1. to depress and release a mouse button twice in quick succession
3. any peripheral used primarily to enter data into a computer
4. temporary, requires power to retain its state
5. a visual interface display between the computer and the operator;
normally a large rectangular LCD, LED, or CRT device
12. a type of computer memory known for being volatile and fast.
13. a term used to describe the technology where a peripheral device is
automatically recognized and configured when it is detected

Activity: Build your own computer

Next, you’re going to think about what


you would get if you were to build your
own computer. For this activity, you’ll
need to search on the Internet and find
how much some hardware components
and peripherals cost. Some basic
components you’ll need are a
motherboard and RAM, so search for

75
those first. Then, on the blank lines, write other components and
peripherals you would get, and check their prices too.
Some sites where you can start your search are:

Palestinian companies:
● Carmel Computers: https://www.carmel-pal.com
● PDX Information Technology: https://pdx.ps

American companies:
● Amazon: http://www.amazon.com
● EBay: http://www.ebay.com
● TigerDirect: http://www.tigerdirect.com
● NewEgg: http://www.newegg.com
● BestBuy: http://www.bestbuy.com

Component Description Price

Motherboard ___________________ ______________

RAM ___________________ ______________

________________ ___________________ ______________

________________ ___________________ ______________

________________ ___________________ ______________

________________ ___________________ ______________

________________ ___________________ ______________

________________ ___________________ ______________

Next, discuss your choices with a partner or small group. Share your
reasons for picking some components and peripherals rather than
others.

76
Writing Assignment: Evaluating Your Computer

For this writing assignment, you are asked to write a report about the
computer you use for work and/or study (it could be yours or owned by
your employer/university). Please follow the outline below for
structuring your analysis:

• List of components: Describe the components (refer to the


hardware components list earlier in the unit)

• List of peripherals: Describe the peripherals (refer to the


peripherals list earlier in the unit)

• List of memory/storage units: Describe all the memory/storage


units (refer to the list of memory/storage units earlier in the unit)

• Alternatives: describe which of the parts above should be replaced


for improving your working/learning performance. How much
would it cost for better parts? Include prices, and decide whether it
is worth the money to upgrade any of the components or
peripherals.

77
English for Technology

Unit 5: The Internet

Table of Contents

Preface
Goals of the Unit
Learning Outcomes
Warm-up Activity: Discussion
Reading: The World Wide Web
Vocabulary
SAQ
Ordering Activity
Matching: Web Site Uses
Fill in the Blanks
Dialogue
Discussion
Case Study: Alkamandjati: Giving foreign exposure to Palestine
SAQ
Discussion
Reading: Networking & Internet of Things
Vocabulary
SAQ
Discussion
Video Activity: Internet of Things
Activity: Build your own internet of things!
Fill in the Blanks
Role Play
Search activity
Vocabulary Quiz
Writing: Web site evaluation

78
Preface
In this unit, you will learn about the history of the development
of the World Wide Web, as well as vocabulary related to the Internet.
You will have discussions about how the Internet is used in our daily
lives and how the Internet may impact our lives in the future. You will
also read a case study about an organization, Alkamandjati Association,
and its needs and challenges as it established its web presence. Lastly, you
will complete a written evaluation of a web site.

Goals of the Unit


 To understand the history of the development of the World
Wide Web
 To learn vocabulary about the Internet and networking
 To use appropriate vocabulary to discuss topics such as
differences in how people use web sites, the Web 2.0, and the
Internet of Things
 To analyze and evaluate a web site

Learning Outcomes
After studying this unit, students should be able to:
 Understand and explain some of the history of the World Wide
Web
 Use vocabulary relating to the Internet and networking
appropriately to discuss issues such as common uses of web
sites, the Web 2.0, and the Internet of Things
 Analyze and evaluate a website through areas such as security
and content, as well as propose any suggestions for
improvement

79
Unit 5: The Internet

Warm-up Activity: Discussion

Before starting with this unit content, let’s do a little warm-up. Discuss
the following questions with a partner or a small group.

1. Do you go online? What do you do on the internet?


2. What are your favorite websites? Are there any websites that you
do not like?
3. Have you ever developed a website? If yes, can you explain how
and for which purpose?

80
Reading: The World Wide Web

Read through the vocabulary below, which are related to some basic
concepts and terms about the World Wide Web. You might know some
of the words already. Which words are you familiar with, and which
are new? Put a check mark (✔) next to the ones you need to learn (that
is, the ones that you don’t know yet).

General Vocabulary
1. attempt: a try, an effort
2. cutting-edge: something new and innovative
3. fad: something that is very popular for only a short time
4. obnoxious: unpleasant, disturbing

IT Vocabulary
1. ARPANET (Advanced Projects Research Agency Network):
developed by the US military for defense purposes, this was first
global network with packet switching
2. backbone: a central high speed network that connects smaller,
independent networks
3. cookie: a text file created by web sites which contains personal
information about an end user
4. domain name: the characters (such as qou.edu, al-ayyam.ps, or
state.gov) that form the main part of an Internet address
5. download: to transfer data from a remote computer to a local
computer
6. e-commerce (electronic commerce): the term for buying and
selling goods and services over the world wide web
7. emoticon: a symbol that uses the characters on a computer
keyboard to convey emotion an email or instant message, such as
the smiley face :)
8. hyperlink: a document cross-reference technique enabling the
retrieval of a related document or resource simply by clicking on
an underlined word or image.
9. hypertext: any electronic cross-referencing document first
envisioned by Vannevar Bush in 1945
10. HTML (Hypertext Markup Language): the coding or tagging
syntax used to write documents for web browsers

81
11. upload: to transfer a file from a local computer to a remote
computer
12. URL (Uniform Resource Locator): the address which specifies
the location of a file on the Internet
13. WWW (World Wide Web): a global hypertext system operating
on the Internet that enables electronic communication of text and
multimedia.

By the early 1990's, people were using computers in many


different ways. Computers were already installed in most schools,
offices, and homes. They were commonly used for writing papers,
playing games, financial accounting, and business productivity
applications. But very few people used them for communication,
research, and shopping the way we do now. A man named Tim
Berners-Lee changed all that. In 1990, Lee added an
exciting hypertext and multimedia layer to the Internet and called it
the World Wide Web. The rest, as they say, is history.
Believe it or not, the Web was not the first attempt at building
a worldwide online community. Cutting edge geeks have been using
online services all the way back to the early 1980's. There were
thousands of privately run Bulletin Board Systems (BBS), which were
early online communities that users could connect to using a modem.
These served the general interest of curious nerds and researchers from
around the world. However, experiences on these BBSs were poor by
today's standards. There were no graphics or even colors, and there was
no sound except for the obnoxious beeps and gurgles a modem makes
when it initiates a dial-up connection to a server. Bandwidth was also
very slow compared to today's speeds. Typical operating speeds were
between 300 and 1200 baud (bits per second). Today, a typical
broadband connection is thousands of times faster than this.
The Web was not built just for geeks. It was built for everyone.
It was built with very high ideals. No single company, government, or
organization controlled it. It was new and exciting. New ideas and
words appeared almost daily. Obscure technical terms became
household terms overnight. First it was email. Then it
was URL and domain name. Then rather quickly came spam,
homepage, hyperlink, bookmark, download, upload, cookie, e-
commerce, emoticon, ISP, search engine, and so on. Years later we
are still making up new words to describe our online world. Now we

82
"google" for information. We "tweet" what's happening around us to
others. The new words never seem to stop!
Just because the web seems so chaotic and unorganized
compared to more structured companies and governments, doesn't
mean its total anarchy. In 1994, Tim Berners-Lee started the W3C, a
worldwide organization dedicated to setting standards for the Web.
This group is probably the most respected authority for what should
and should not be Web standards. W3C's mission is to lead the Web to
its full potential.
As a student of English and Technology, you will hear people
use the words 'Internet' and 'World Wide Web' almost interchangeably.
They are, of course, not the same thing. So what is the difference
between the two? Perhaps a simple answer is that the Internet is the
biggest network in the world, and the World Wide Web is a collection
of software and protocols on that network. A more simple way to put
it is that the World Wide Web is an application that runs on the Internet.
The original backbone of the Internet is based on an old
military network called ARPANET which was built by DARPA (the
Defense Advanced Research Projects Agency of the United States
government) in the late 1960s. ARPANET was built so information
could withstand a nuclear war. The idea was to not have a single point
of failure. This means if part of the ARPANET was blown up in a
nuclear war, the rest of it will still work! What made ARPANET so
successful was its packet-switching technology, invented by Lawrence
Roberts. The idea is that "packets" of information have a "from"
address and a "to" address. How they get from point "a" to point "b"
depends on what roads are open to them. Packet switching is a very
elegant thing. Without it, the Internet would simply not work.
People view the World Wide Web through a software
application called a web browser or simply a "browser" for short. Some
popular examples of web browsers include Microsoft Internet
Explorer, Google Chrome, Mozilla Firefox, and Apple Safari.
Browsers allow people to search, view, and even add and edit data on
the World Wide Web.
The Web is not supposed to be a passive experience. Creating
new pages for the Web is getting easier all the time. Web editing
software is specially designed to work with hypertext languages such
as HTML, which is the original specification for the Web. Web editing
software normally allows for the WYSIWYG (What You See Is What

83
You Get) creation of text, images, and hyperlinks between related
documents. With web applications such as wikis, Twitter, and
Facebook, a typical user can create his or her first online presence in a
matter of hours.
At first, many people thought the Internet was "just a passing
fad". But we know now that the Internet is not a fad. So what
happened? Web 2.0 happened!
What is Web 2.0? It's very hard to say. It's just a phrase to
describe a transition from the pre-existing state of 'Web 1.0', which was
slow, static, and unusable, to a new, 'second web', which was faster,
more dynamic, and more usable for the average person. How did these
things happen? Easy. Broadband modems enabled sites like video-
streaming YouTube to become possible. Better design and
development practices enabled social media sites like Twitter and then
Facebook to attract hundreds of millions of users. Finally, search
engine technology improved on sites like Google where people could
actually find the information they were looking for.
What will be the future of the Web? Easy. More speed and more
power. In the future, digital distribution on the Internet is likely to
replace all other forms of media distribution including CDs, DVDs, and
even radio and television broadcasts.

SAQ:
1. What is the World Wide Web?
2. What is a hyperlink?
3. What is Web 2.0?
4. What is the difference between Web 1.0 and Web 2.0?

Ordering Activity
Which online tools and events came first? Order them below from 1
(the oldest) to 5 (the newest). Then, discuss your choices with a partner
or in a small group.

Web Browsers _____ Facebook _____

ARPANET _____ Dot Com Bubble _____

Google _____

84
Matching: Web Site Uses

What online spaces do you access and why? Match the different types
of web sites on the left with what you would use them for on the right.
Each online space can have more than one use!

Having fun

Personal Website

Learning something new

Social media

Staying updated on things


happening in the world

Search engines

Doing work for your job

Blogs

Staying updated on
friends’ lives
News web sites

Solving a problem
YouTube or other
video-based portal

85
Next, share your answers with a partner or a small group. What
differences do you see between how you use web sites and how your
classmates do? What other activities do you use Internet for?

Fill in the Blanks

Choose the word from the box that best fits each blank.

1. The web's use of _________ is quite controversial because most


users have no idea that their information is being collected and
stored on their computer.
2. One of the most popular _________ is perhaps the wink and smile
;) which is used to convey irony or satire.
3. A good web developer will know most _________ tags without
looking in a book.
4. The man made a _________ from his personal homepage to his
friend's business.
5. The _________ of Microsoft Corporation is microsoft.com
ARPANET domain name backbone
cookies emoticons hyperlink
upload download W3C
BBS e-commerce HTML

Dialogue

In the following dialogue, Ghada and Ashraf are two friends talking
about the Internet.

Listening Link 1

Ghada: Good evening Ashraf! How are you?


Ashraf: Hi Ghada, not bad at all. How about you? What have you been
up to today?
Ghada: Well, I’ve been in front of my computer all day. I got a lot
done though – I was really productive! For a while now, I’ve been
wanting to increase and streamline my presence online. I have
profiles on a few different social media sites, but I’ve been wanting
to find a way to unify my identity in one place. So, for the last

86
couple weeks, I’ve been working on my personal web site, and I
finally finished it today!
Ashraf: Wow, that’s cool! I’m impressed! How did you do it?
Ghada: First, I had to choose a CMS to run the site, which took a while.
Once I chose a CMS, I needed to customize it a bit using HTML
and CSS. I wanted to find a style that really represents me. Oh, and
I bought a domain name, too!
Ashraf: Impressive! I’m curious, what are you going to include on your
website?
Ghada: Good question. I’ll definitely include information about
myself, and then some hyperlinks to interesting content and my
social media profiles.
Ashraf: Are you going to use it for work, too?
Ghada: Not right now, but I enjoy doing art and recently I’ve had a
few people ask to buy my art, so I’m thinking of adding a gallery
and an e-commerce section to my site in the future. I could show
my artwork and people would be able to buy it right there on my
site. I’m a bit worried about the security of it though. I don’t want
anyone’s private information like their credit card number to be
compromised because of my site. What do you think?
Ashraf: I think it’s a great idea! As long as you make sure the e-
commerce site uses encryption to keep the data secure, you should
be fine. Oh, don’t forget to allow your users to leave comments and
feedback.
Ghada: That’s a good point! It is the Web 2.0 era, right?
Ashraf: You bet it is!

Discuss the following questions with a partner or small group:


1. Do you have a personal web site? If so, why did you get one? If
not, why not?
2. Do you think it is important to have a unified online identity
through a personal web site? Why/why not?
3. How did you / would you customize your personal web site? What
Web 2.0 features would you want it to have?

87
Case Study: Alkamandjati Association

This case study focuses on the experience of Alkamandjati Association


in managing and developing its web presence. As you read, try to
understand what the problems were that Alkamandjati Association
encountered, and how they were solved.

Alkamandjati Association ("the


violinist" in Arabic) was founded in 2002
in France, by the internationally-
renowned viola and bouzouq player
Ramzi Aburedwan. In September 2004,
another branch of Alkamandjati was
created, under Palestinian law, in
Ramallah, with Ramzi as president.
Alkamandjati’s mission is to teach music
to Palestinian children, to make music
accessible to the entire Palestinian
community, strengthening their
appreciation of the Palestinian identity as
Ramzi Aburedwan on Bouzouq, by
well as of other Arab and international Michael Coghlan (CC BY-SA)
cultures. Now Alkamandjati Association
has branches in France, Palestine, and Lebanon and is working in many
refugee camps, villages, and cities of the West Bank as well in refugee
camps in Lebanon.
Since the Association was founded in France, its first website
was created in French, English, Arabic and Italian. In 2010, the website
was launched with the domain name Alkamanndjati.com. It was
maintained and supported by an IT company in France. However, since
the Association’s main activities are in Palestine, there was a need for
a faster way to update and upload content on the website, without the
need to go back and forth with the IT company in France. In 2015, a
new domain name was registered, Alkamandjati.org, in order to create
a new website that is maintained and supported in Palestine. Due to
communication obstacles with the Palestinian company hired at the
time, the website was not user friendly, there was missing data, and the
web content management system was not easy to use.
In 2017, Intertech Co. a Palestinian IT company that specializes
in portal, web, and mobile application development, was hired by

88
Alkamandjati to recreate the new website with a user-friendly interface
and that has a responsive design that works on all platforms including
smart phones and tablets. Alkamandjati decided to join the two
websites and their domain names, Alkamandjati.com and
Alkamandjati.org, to become one identity and one website that displays
information to the user in English, Arabic, and French in order to
expose Palestinian culture and music internationally.
The Alkamandjati team worked on gathering all the content
they wanted to display in a friendly way. In early 2018, the new website
was launched using the domain name alkamndjati.org. The new site
uses the bootstrap framework, an open-source framework that
combines HTML, CSS, and JavaScript code to help developers build
web applications. The new website utilized new trends in web design;
for example, a slider was incorporated in the main page to display
images or videos. The main page displayed information such as “who
we are,” Alkamandjati’s programs, upcoming events, news and media
coverage, the Alkamandjati team, and finally contact information
including subscription to the weekly newsletter. This made the website
simple and easy to use, improving the user experience by minimizing
the number of clicks to reach information. Delays on the website were
also solved to be less than several seconds to make sure users will not
leave the website. Forms including a volunteer form and ‘join our team’
form were programmed in English, French, and Arabic.
Alkamandjati’s Testimonial: “We are very happy to have
collaborated with Intertech for the conception and development of
Alkamandjati’s new website. Their involvement, support, advice and
time enabled us to reach the result we were aiming at: a beautiful,
efficient, and interactive website that reflects the association between
work and dynamic.”

SAQ
1. What does Alkamandjati Association do?
2. What were the problems with the previous versions of
Alkamandjati’s web site?
3. What is the bootstrap framework?

89
Discussion
Read the below questions, and discuss your answers with a partner or
in a small group.
1. For a while, Alkamandjati Association had two online presences at
two different URLs. Do you think it is important for a company to
have a single online identity using a single domain name? Why?
2. Alkamandjati Association change from working with a French IT
company to working with a Palestinian IT company. Why was this?
What do you think are some advantages of working with a local
company? Can you think of any disadvantages?
3. What ‘Web 2.0’ characteristics does the new Alkamandjati.org
website have? You can use the description of the new web site and
CMS in the case study, or you can visit the website at
http://www.alkamandjati.org and see for yourself.
4. The Alkamandjati Association focuses on music education in
Palestine as a way of strengthening Palestinian culture and identity.
What other aspects of Palestinian culture and identity could be
strengthened using online tools like web sites?

Reading: Networking & Internet of Things

Here are some vocabulary words that will be useful in the next reading,
about networking and internet of things. Put a check mark (✔) next to
the ones you need to learn.

General Vocabulary
1. authenticate: to verify that a process is true or genuine
2. jeopardize: to put something or someone in danger

IT Vocabulary
1. Bluetooth: an open wireless protocol for exchanging data;
primarily used for connecting mobile devices to computers
2. client-server: a networking model in which the functions are
divided between "child" computers and a single "parent" computer
which stores and controls access to data
3. distributed computing: a type of computing in which a
computational task is divided into subtasks that execute on a
collection of networked computers

90
4. domain: a named group of networked computers that are
administered as a unit with common rules and procedures
5. encryption: the process of making information 'more secure' by
rendering it unreadable to anyone but the intended recipient
6. ethernet: A wired local-area network normally running between
10 Mbps and 1,000 Mbps
7. firewall: a device or software program designed to prevent
unauthorized access to a network
8. groupware: software applications that facilitate shared work on
documents and information
9. IP address: a unique string of numbers that identifies a computer
or server on the Internet
10. LAN (local area network): a small computer network normally
contained within one room or building
11. node: any computer or other device connected to network
12. packet: a collection of bits normally sent through a network that
contains data surrounded by error correction information
13. P2P (peer-to-peer): a networking model where computers
seamlessly share data; used primarily to reduce sever bottlenecks
and reduce costs
14. protocol: a set of standards or rules which govern communication
15. user agreement: agreement between an user and a website/app
provider that addresses rights, duties, and obligation of both.
16. VPN (virtual private network): a relatively high security
connection to a private network
17. Wi-Fi: a trademarked, nontechnical term used to describe a certain
quality of wireless networking compatibility
18. WAN (wide area network): a network which covers more than
one building or area

91
In the simplest explanation, networking is just computers
talking to each other. They do this by sending data packets using
various protocols and transmission mediums such as ethernet cable
or Wi-Fi connections. Computers must also know how to find other
computers on the network. To put it briefly, every computer on the
network needs a unique address so messages know where to go after
they are sent.
Networks exist for many reasons including:
● distributed computing in a client-server or peer-to-
peer networking architecture
● centralized data security and authentication
● elimination of risk of computer downtime.
● combining computers into a single domain to
facilitate groupware applications and system administration tasks
● communication and fun!

The types of networks you deal with on a daily basis


include local area networks (LANs) and wide area
networks (WANs).
Many people today have LANs in their schools, offices, and
even their homes. LANs are especially good for sharing Internet access
and commonly used files and databases.
Users can also connect to wide area networks (WANS) as well,
which are just large LANS spread out over several physical locations.
The Internet itself is basically a large WAN, with each node on the
network having its own unique IP address.
As you may have read in books or seen in movies, security
considerations play a large role when designing networks. Technology
such as firewalls can both block and filter unwanted network traffic.
Virtual private networks (VPNs) are used to connect remote users to
office networks without jeopardizing security. VPNs use strong
data encryption to hide data as it is moving between routers over the
Internet.
Networking is not something you can master in a week or even
a month. Hundreds of books have been written about the subject and
many more hundreds will come in the future as technologies mature
and evolve. If you work on networks for a living, you are called a
network engineer, and you will probably take certification exams by
networking companies such as Cisco.

92
There are other kinds of networking as well which are not
always between PCs and servers. An example
is Bluetooth technology, which is optimized for networking between
common consumer electronics such as mobile phones, mp3 players,
and similar devices.
The technological and media convergence we mentioned in
previous units is happening even here, with the so-called Internet of
Things. This term refers to the increasing inter-connection between
different devices (computers, smartphones, smart-homes, etc.) that can
automatically interact with each other without the need for user
intervention. The potential of such an innovation is glaring; however,
there are also concerns in terms of security and privacy. In other words,
personal information may be exposed and utilized without our consent.
Therefore, it is very important to read the user agreement (or terms of
use agreement) that websites or social apps may ask you to agree to.

SAQ
1. Why do we need networks?
2. What is the goal of data encryption?
3. What is Bluetooth technology?
4. What is the Internet of Things?

Discussion

Together with a partner or in a small group, discuss the following


questions about your experiences with networking.
1. Do you use a virtual private network (VPNs) in your job/education
setting? Do you feel that your information is secure?
2. Do you have firewalls installed on your computer? If yes, which
and why? If not, why not?
3. Do you use Bluetooth technology and on which devices? Do you
have your own Internet of Things?

93
Video Activity: Internet of Things

The Internet of Things refers to how various devices can be


interconnected. Watch the video and complete the following chart
about how the Internet of Things is used in this family’s home.
<https://www.youtube.com/watch?v=NjYTzvAVozo>

Action Reaction
Example: Mom and Dad return The garage door opens.
home on their bicycles.
The outlets turn on and the oven
begins to pre-heat.

Dad enters the bathroom.

Dad turns the car on but forgets


to open the garage doors.

The son receives a notification


that the refrigerator door is
open.
The sprinkler repair man uses a
QR code to request access to the
house’s WiFi.
The refrigerator detects that rice
and eggs are out of stock.

The sprinklers are delayed


because the lawn is occupied.

Grandma and Grandpa are


identified at the front door.

The doors lock and the lights


turn off.

94
Activity: Build your own internet of things!

With the Internet of Things, our devices are becoming increasingly


connected to each other. For example, nowadays it’s possible to control
home lights, temperature, and even a coffee machine in a house using
a smartphone or other device (often referred to as a ‘smart home’).
Some cars can get real-time traffic or weather data, and in the future
cars might be able to drive themselves by communicating with other
cars on the road. What devices do you think could be improved by
connecting to each other to be part of the Internet of Things?
Next, you’re going to think about how different devices could be
connected. You should think about how the exchange of information
between devices can help you (such as for work or learning), but can
also create problems, such as in terms of privacy and security.
In each table below, write two devices that might connect with each
other in the Internet of Things. Then, think about what advantages and
disadvantages are entailed by their interplay. The first one has an
example.

95
Device 1: Device 2:
smartphone coffee machine
Advantages of connecting
I can save time by starting the coffee while I’m getting
dressed in the morning.
I can monitor my supply of coffee beans and immediately
order more when the machine is empty.
Disadvantages of connecting
I usually read the news while I wait in the kitchen for the
coffee to brew. Maybe I’ll stop reading the news?
Internet marketing companies will get my coffee bean
preferences and try to sell me more (so I might not get to
try other kinds).

Device 1: Device 2:

Advantages of connecting

Disadvantages of connecting

Device 1: Device 2:

Advantages of connecting

Disadvantages of connecting

Next, discuss your choices with a partner or small group. Share your
reasons for picking some specific connections and explain related pros
and cons.

96
Fill in the Blanks

Fill in the blank in each sentence using one of the vocabulary words
from this unit.

1. The computer was very slow and took nearly 10 seconds to


______ a user.
2. A standard protocol such at TCP/IP or IPX is used to define
______ interactions.
3. System administrators in large organizations use a ______ to
save time on common administration tasks.
4. When the ______ was deactivated, the hacker found it easy to
penetrate the system and upload a rootkit virus.
5. BitTorrent is a popular and controversial ______ networking
program used by millions of people to distribute data.
peer-to-peer protocol WAN
firewall client-server authenticate
node VPN LAN
IP address Groupware user-agreement

Role Play

Work in a pair with another student. One of


you is a data security expert in an IT
company while the other is a client who is
worried about possible data leaks. The
former should assure that his/her company
is providing effective firewalls and a
secure VPN against external intrusions.
The latter should share his/her concerns
about possible attacks from hackers and hostile competitors. Before
you begin your discussion, make some notes of ideas to support your
claims.

97
Search activity

Work in small groups and try to define the


terms “hacker” and “data leak”. You can
use search engines like Google and Yahoo.
When you search for these online, what
other information do you find? What
topics come up, and what other related
words do you see?

Vocabulary Quiz

Choose the best definition for each of the words below.


1) 'node'
a. any computer or other device connected to network
b. a type of computing in which a computational task is divided
into subtasks that execute on a collection of networked
computers
c. a unique string of numbers that identifies a computer or server
on the Internet
2) 'client-server'
a. A baseband local-area network originally developed by Xerox
Corp. Normally running between 10 Mbps and 1,000 Mbps
b. a networking model in which the functions are divided between
"child" computers and a single "parent" computer which stores
and controls access to data
c. a device or software program designed to prevent unauthorized
access to a network
3) 'WAN' or 'wide area network'
a. a relatively high security connection to a private network
b. software applications that facilitate shared work on documents
and information
c. a network which covers more than one building or area

98
4) 'upload'
a. The transfer a file or files from a remote computer to the user's
computer
b. to transfer a file from a local computer to a remote computer
c. an electronic, digital device that stores and processes
information
5) 'cookie'
a. a text file created by web sites which contains personal
information about an end user
b. The term for buying and selling goods and services over the
world wide web
c. any electronic cross-referencing document first prophesized by
Vannevar Bush in 1945

Writing: Web site evaluation

Next, you will write a report about a website that you often use (it could
be your personal one, a social media platform like Facebook or Twitter,
and so on; the choice is up to you).

Follow the form below for structuring your analysis. You can be either
specific in terms of details (e.g., pointing to better firewalls) or more
broad in your answers.

Name of the website:

Owner:

URL: Is it a good domain name? Is it easy to remember and use?


Security: Do you think that the website is secure enough? Is there data
encryption that protects personal information? Are there any user-
agreements? If yes, what do they state?

Content: is its content engaging? Are there any hyperlinks to


additional resources and references? Is there a search engine for
exploring website materials and elements?

99
E-commerce: Does the site have an e-commerce section? If so, what
is it for? Do you think it is clear and accessible? What about security
and privacy? If it does not have e-commerce, do you think it could?

Openness: Do you think that the website allows users to intervene,


contribute, upload content, and be active? Is there any room for
discussion and exchange? Do you see any tie to what we said about the
Internet of Things?

Improvements: What would you change in terms of data security and


Web 2.0 likeness standards?

100
English for Technology

Unit 6: English for Electronics

Table of Contents

Preface
Goals of the Unit
Learning Outcomes
Warm-up Activity: Discussion
Reading: IT acronyms and measurements
Vocabulary
SAQ
Ranking Activity
Fill in the Blanks
Measurement matching
Activity: Compare different technologies by using measurement unit
Pair work: Computer Needs
Internet Search: Acronyms
Reading: English for Electronics
Vocabulary
SAQ
Discussion
Dialogue
Fill in the Blanks
Role Play
Vocabulary Quiz

101
Preface
In this unit, you will learn about acronyms and measurement
terms used in IT contexts and the kind of electronic devices they are
used with. You will have discussions about the varying needs of
different computer users. You will also learn terms used to describe
electronics and electrical circuits.

Goals of the Unit


 To remember and be able to use common acronyms and
measurements
 To discuss computer hardware specifications and make
recommendations to others
 To remember and be able to use terms commonly used to
describe electrical circuits.

Learning Outcomes
After studying this unit, students should be able to:
 Remember, write, and use in conversation acronyms and
measurement units used to describe computer hardware
 Evaluate the needs of a computer use and make
recommendations about computer specifications
 Remember terms used to describe electronic circuits

102
Unit 6: English for Electronics

Warm-up Activity: Discussion

Before starting with this unit content, let’s do a little warm-up. Discuss
the following questions with a partner or a small group.

1. What do you know about electronics measurements in English?


What units of measurement are commonly used?
2. Do you know what a benchmark is? If you don’t, what do you think
it might mean?
3. When looking for a new computer, have you ever considered terms
like giga, tera, or hertz?

Reading: IT acronyms and measurements

Read through the vocabulary below, which are related to some basic
concepts and terms about IT measurements. You might know some of
the words already. Which words are you familiar with, and which are
new? Put a check mark (✔) next to the ones you need to learn (that is,
the ones that you don’t know yet).

103
General Vocabulary
1. acronym: an abbreviation; a way of writing a longer string of
words more concisely

IT Vocabulary
1. bandwidth: a measurement of the capacity of data which can be
moved between two points in a given period of time
2. benchmark: a measurement or standard that serves as a point of
reference for measuring performance
3. bit (binary digit): the smallest unit of storage; normally referred
to as a '1' or '0'
4. byte (binary term): 8 bits
5. fault tolerance: The ability of a system component to fail without
causing the entire system to shut down; this is often accomplished
with redundancy
6. FLOPS (floating point operations per second): a common
measurement of computer speed dealing with decimal calculations
in a given amount of time
7. frequency: the number of cycles per unit time of a sound wave,
most often measured in hertz
8. G (giga): one billion
9. Hz (hertz): an internationally used frequency unit; equals one
cycle per second
10. IPS (instructions per second): a very raw measurement of
computer processor speed
11. K (kilo): one thousand
12. M (mega): one million
13. µ (micro): one millionth
14. m (milli): a prefix meaning one thousandth
15. n (nano): one billionth
16. T (tera): one trillion

104
The world of IT is full of acronyms and abbreviations, as is the
world of measurements. So, working with IT measurements can get
quite confusing. For example, what is the difference between an MB
and an Mbit? What does ERP or CMS stand for? The above are
examples of standard acronyms we hear all the time. Inside every
organization there is likely to be a whole range of industry-specific
acronyms as well. For instance, in my company we often talk of LMS,
CAT, SEO, SL20, and many, many more.
If someone mentions an unfamiliar acronym in your presence, you
should ask the person to clarify and explain it. Most likely you will not
be the only person in the room who feels lost. Asking questions is not
seen as a sign of weakness in a modern IT department. It is a sign of
curiosity and seeking to better oneself and one's knowledge about a
subject. But let's not kid ourselves... in your IT career, you will have
acronyms for everything. Soon it will be you confusing newbies with
acronyms of your own.
IT needs acronyms because information is constantly expanding
out of control. Here are some examples of information explosion:
 The CPU at the heart of Apple's iPhone 4 is more powerful than a
Cray supercomputer costing millions of dollars from the 1970's.
 The software that powers the space shuttle runs on a single MB of
RAM. The minimum RAM requirement for Windows 7 is 1 GB
( or 1,000 times as much).
 If automobiles had improved their performance at the same rate as
computers over the past 50 years, we might all be driving $500 cars
that go 5,000 kilometers per hour, and get 500 kilometers per liter
of fuel. They would probably fly too. Cool.
 In 1980, a 10MB hard drive cost over $4,000 and was considered
to be a lot of storage. Today, you can't even buy a 10MB hard drive.
It would be worthless and pointless. Even Windows 95, released
way back in April 1995, required a 55MB minimum hard drive.
Now you can get a TB drive for under a hundred dollars.
 Did you know that in 2010 Youtube transferred more data in one
day than the entire Internet did in the year 2000?
Acronyms and abbreviations are essential to IT. Learning them is
easier than you think. Computers tend to get more powerful on an order
of magnitude over previous generations. Some people have even tried
to quantify this phenomenon. One example is Moore's Law. A simple

105
way to explain Moore's Law is that a brand new computer is completely
outdated in five years.
How do you remember the difference between a kilobyte,
megabyte, gigabyte, and a terabyte without going crazy?
This is how: Break the terms down into their components. The word
"megabyte" consists of two different words... "mega" and "byte".
"Mega" is a multiplier prefix found at the start of measurement words
which means 1,000,000 (or a million times). One "byte" is (normally)
equal to 8 "bits". A "bit" is equal to 1 switch "on" or "off" (either a 1
or 0). It takes between 1 and 3 bytes to hold a letter, depending on what
kind of character encoding you are using. So a megabyte is equal to
8,000,000 bits.... or roughly equivalent to 500,000 letters of the
alphabet. This is about the length of a short novel. The
prefix giga means 1,000,000,000 or one billion times.
So how many bits are in a gigabyte? That's right... 8,000,000,000.
Enough to store 1,000 novels.
Once you learn the prefixes and basic units of measure, it's all very
easy.
kilo (K) = 1,000
mega (M) = 1,000,000
giga (G) = 1,000,000,000
tera (T) = 1,000,000,000,000
peta (P) = 1,000,000,000,000,000
exa (E) = 1,000,000,000,000,000,000
There are bigger units of measurement than an exabyte, such as a
zettabyte and a yottabyte, but we will not discuss them in this course at
this time. But your children and grandchildren may have to know them!
How big is an exabyte? For instance, every word ever spoken by
every member of mankind would fill about 5 exabytes of storage space.
The Internet transfers around 21 exabytes of data every month.
Now those are the "big number" multipliers. In IT however, things
are not always big. They can also be very small. Unfortunately the
"small multipliers" are often used inaccurately. For example the words
"microprocessor" and "nanotechnology" use the mathematical prefixes
“micro” and “nano,”, but not accurately. What they really mean in
general is "really small".
milli = .001
micro = .000 001

106
nano = .000 000 001
pico = .000 000 000 0001
Now that we know the prefixes... it's time to learn the units. We
have already discussed byte and bit. These are common measurements
in computing. Although computers are much faster now than they were
in 1940 (around the time they were invented), they are still digital,
meaning that they can only understand zeros and ones (0 and 1).
You can put all the prefixes you learned (especially the big ones)
onto any the following units of measurement related to IT:
bit (b)
byte (B)
bps
Hz (hertz)
FLOPS
IPS
What can you do with these measurements? Almost everything!
Compute bandwidth, measure processor speed in TFLOPs with
a benchmarking program, compare quality of digital cameras or
monitors, and much, much more.
Have fun, and don't fear IT acronyms and measurements. They are
only here to help us.

SAQ
1. Why do we need acronyms in IT?
2. What does “mega” mean? What does “micro” mean?
3. How are the following pronounced?
MB, GB, mb, GHz, TFLOPS
4. What are the measurements that you know the most and when do
you refer to them (e.g., at work)?

107
Ranking Activity

Rank the following measurement units from 1 (the smallest) to 6 (the


biggest). Then, discuss your choices with a partner or in a small group.

Giga _____

Kilo _____

Tera _____

Nano _____

Mega _____

Micro _____

Fill in the Blanks

Choose the word from the box that best fits each blank.

1. The new processor ran at much higher _________ than the one it
replaced, going from 1.8 GHz up to 4.0 GHz
2. Although _________ means "one-millionth", many people use it to
express simply "very small."
3. The ________ of my internet connection is really high! I can
download a lot of data very quickly!
4. A _________ is 1024 bytes.
5. _________ is a base measurement of computer speed often
expressed in millions (MIPS).

tera bit bandwidth


IPS gigabyte frequency
Hz nano FLOP
kilobyte benchmark micro

108
Measurement matching

Different units of measurement are used for different technologies. For


each technology below, choose the appropriate measurement from the
box by combining a prefix and a unit of measure. Some measurements
may be used for more than one technology, and some technologies
might use more than one measurement!

prefixes units of measure


pico- kilo- bits bits per second
micro- mega- bytes bytes per
nano- giga- hertz second
milli- tera- pixels FLOPS

RAM Hard drive Processor

________________ ________________ ______________

Digital camera WiFi internet DVD

________________ ________________ ________________

109
Pair work: Computer Needs

People use computers for many


different purposes, and not
everyone needs a computer that has
the fastest processor, the largest
hard drive, and the most RAM.
Think about the computer needs for
the following people and purposes,
and make some suggestions for
each. Then, compare your answers
with a partner.

Example: A computer for an office worker


An office worker mainly uses their computer for word processing and
email, so I don’t think they need a very large hard drive or a very fast
processor. Maybe a 500 GB hard drive and a 2 GHz processor are
enough. They work at their desk and don’t usually need to take it with
them, so a desktop would work better than a laptop.

1. A computer for a university student


2. A computer for a photographer/videographer
3. A computer for a teenage gamer
4. A server for a small company
5. A laptop for a sales person

110
Dialogue

In the following dialogue, Hakeem and Hala are two friends talking
about a new computer Hala bought.

Here are a couple phrases that are useful to know:


1. future-proof: To make a product unlikely to become obsolete
2. to be up to the task: Being able to perform a task or job

Listening Link 1

Hakeem: Hey Hala! Did you get all the components for your new
computer?
Hala: I sure did! I just got the last parts yesterday. Would you like to
see what I bought?
Hakeem: Sure!
Hala: Look at this, my new processor has a clock speed of over 4
GHz! That’s so much faster than my old one that was only 2.4
GHz. I’ll be able to use it for all of the newest games other
software.
Hakeem: That’s great! How much RAM did you get?
Hala: Well, first I was going to just get 8 GB of RAM, but I wanted
to future-proof my computer a bit, and new apps are requiring
more and more RAM all the time, so I ended up getting 32 GB
instead.
Hakeem: Wow! I am sure you can run a lot of different applications
at the same time with that much RAM.
Hala: I also got a new hard disk to make sure my computer is up to
the task. Apps are taking more and more space all the time.
Not too long ago, just a few gigs was enough, but not anymore.
Hakeem: Yeah, some programs are really demanding in terms of
storage nowadays. You can never have too much disk space.
And you do a lot of video editing too, don’t you?
Hala: Yeah, I do. That’s why I bought two 4 terabyte hard drives.
That should give me enough space for all of my apps and also
all of my video files I’m working on.
Hakeem: That’s great. I see you did your homework.
Hala: Well, knowing measurements and parameters is the key to
picking what you really need for your computer.

111
Internet Search: Acronyms

So far in this unit, we’ve covered a number of different acronyms and


abbreviations. However, there are many more that are commonly used
in IT. Use the web site https://www.acronymfinder.com to find out the
meanings of the following acronyms.

ASCII ________________________________________

PCMCIA ________________________________________

USB ________________________________________

RAM ________________________________________

MP3 ________________________________________

HTML ________________________________________

URL ________________________________________

Reading: English for Electronics

Here are some vocabulary words that will be useful in the next reading,
about electronics. Put a check mark (✔) next to the ones you need to
learn.

1. capacitor: an electrical component which stores energy for a short


time
2. current: a flow of electric charge (such as electrons or ions)
3. electrical circuit: a network or interconnection of electrical
components in a closed loop
4. EMF (electromotive force): an energy measured in volts; refers to
the potential which causes the flow of electrons (and ions) in a
conductor
5. IC (integrated circuit): a set of electronic interconnections in a
small "chip" or plate where all the elements are inseparable

112
6. light bulb: a source of electric light which uses a filament stored
in a glass enclosure
7. LED (light-emitting diode): a semiconductor source of light
8. path: a continuous trace or wire in electric circuit which connects
various components
9. PCB (printed circuit board): a laminate board which supports
electric components in the circuit
10. resistor: an electrical component, which restricts the flow of
electrons in the circuit.
11. solar cell: an electrical device which converts the energy from light
into electricity
12. soldering iron: a handy tool used to assemble the electrical
components on a PCB (printed circuit board).
13. voltage: also known as "electric tension", is a difference between
electric potential between two points
14. voltaic cell: A device that derives energy from chemical reaction,
such as in a battery

Listening Link 2

Nowadays most of us cannot imagine life without the electronic


devices which surround us. They are everywhere, and often we even
forget about their existence: mobile phones, TV sets, mp3 players,
electronic watches or even alarm clocks. Most people do not reflect on
how and why these everyday appliances work. But being a geek
requires at least some basic technical knowledge about the surrounding
world.
As you probably remember from early science lessons, the
electric current is an organized flow of electrons and ions in a
conductor. But to make those tiny particles move, there must be some
kind of force.
In electronics, this force is called an electromotive force or EMF,
which may be also described as voltage. For some, the definition of
voltage as the difference of potential in the conductor may be a bit hard
to imagine.
So to visualize this process, you may think of the difference in the
number of electrons in the conductor. If there are fewer electrons in one
part of a wire than another part, then there is a difference of electrons
between points A and B of the electrical circuit.

113
Nature is organized in such a way that it aims at making this
potential equal in both points of the circuit. So to make it equal, there
is a need to move some of the electrons from one place to another.
Current is exactly what we call this movement.
Of course we need to take our voltage from some electric source.
One common source of power in smaller home appliances is batteries,
or voltaic cells. The energy stored in batteries comes from chemical
reactions that take place inside. But quite often we may replace the
batteries with another source of energy, such as a solar cell, which may
be found in simple calculators or electronic watches.
So, right now our circuit consists of a source (battery) and a path (a
conductor in which the electrons flow). We need one more element that
will consume the energy stored in the source of voltage. This element,
called a load, could be a light bulb. Light bulbs contain a filament
inside. The more electrons that flow through the bulb, the hotter the
filament gets. At some point, the filament starts to glow with light. But
sometimes this light might be too bright for us and we would like to
dim it.
To dim the light, it is enough to add an additional element that will
take away some energy from our circuit - a resistor. The greater the
value (resistance) of this element, the bigger drop in voltage we
experience. So, our first electrical circuit is done.
To assemble it we may use a printed circuit board or PCB, a
laminate board with paths printed on it and the holes drilled to make
place for electronic components. To attach the elements to the PCB we
need a hand tool called a soldering iron or a soldering gun. This device
heats the solder and enables us to attach our elements to the path.
Everyday appliances consist of much more sophisticated electronic
components than our circuit, like for example capacitors which can
store energy for a short time. Capacitors are used for example in photo
cameras as a source of energy for flash bulbs. Capacitors store voltage
from batteries, and when needed the load is discharged rapidly so you
can see the burst of light. There are also light-emitting diodes (LEDs)
which are more and more common sources of light in homes.
Due to the vast development in technology, electronic circuits get
smaller and smaller every year. Usually they can be found
as integrated circuits or IC - small chips that consist of various
components that are inseparable. However, to fully understand the way
electronic devices work, it is perhaps best to learn the basics of

114
electronics with simpler and larger models. There is no substitute for
manual practice under the supervision of experienced users of the
soldering gun.
[Written by Aleksandra Mietus, an English teacher in Poland]

SAQ
1. What does EMF stand for?
2. How does a light bulb work?
3. What is a printed circuit board?
4. What does a capacitor do?

Discussion
Together with a partner or in a small group, discuss the following
questions about your experiences with electronics.

1. Have you ever created or fixed an electronic circuit? If yes, can you
explain more?
2. Have you ever planned to use electronics for teaching or for work?
3. Think about possible capacitors that you use in everyday life. Can
you give some examples?

115
Fill in the Blanks

Fill in the blank in each sentence using one of the vocabulary words
from this chapter.

1. Car batteries are a good example of _________: there are electrodes


which are submerged in a solution, and due to some chemical
reaction which takes place in the solution, the energy is derived.
2. If there is a _________ between two points of a circuit, and you
connect these points with a wire, then the current will flow.
3. There is a small _________ in my watch. Thanks to that, it was
working even after the battery died.
4. We order ready-made _________s without any components, so our
students can practice their soldering skills.
5. _________s are an increasingly popular source of light in homes
nowadays because they consume much less energy than the older
style incandescent light bulbs.
6. I need a larger _______ in my table lamp - it is too dark for me
when I study at night.
7. After a long investigation I found a break in the _______ which
connected the bulb and the battery - that is why the circuit didn't
work

LED PCB current


IC light Bulb voltaic cell
resistor voltage solar cell
EMF soldering iron path

116
Role Play

Work in a pair with another student. One of


you is a parent who wants to explain how a
light bulb work to his/her child (the other
student). The former has to describe the
light bulb functioning using the terms
mentioned in reading 2, while the latter
should ask simple questions about how its
components (load, filament) work
together. Before you begin your discussion, look at reading 2 again and
make some notes of ideas to support your role-playing.

Vocabulary Quiz

Choose the best definition for each of the words below.


1. µ or micro
a. an internationally used frequency unit; equals one cycle per
second
b. a prefix meaning one thousandth
c. one millionth

2. acronym
a. one million
b. an abbreviation; a way of writing a longer string of words more
concisely
c. one trillion

3. Hz or hertz
a. The ability of a system component to fail without causing the
entire system to shut down; this is often accomplished with
redundancy
b. an internationally used frequency unit; equals one cycle per
second
c. a measurement of the capacity of data which can be moved
between two points in a given period of time

117
4. soldering iron
a. a set of electronic interconnections in a small "chip" or plate
where all the elements are inseparable
b. an electrical component which uses electrostatics to store
energy
c. a handy tool used to assemble the electrical components on a
PCB (printed circuit board).

5. path
a. a continuous trace or wire in electric circuit which connects
various components
b. a flow of electric charge (such as electrons or ions)
c. an electrical component which uses electrostatics to store
energy

Electronic Circuit Diagrams


For those interested in the electrical engineering side of IT, it is
important to understand electronic circuit diagrams. A circuit diagram
(also called an electrical diagram or an electronic diagram) is a
graphical representation of an electric circuit. It uses simple images and
symbols to represent the parts of an electric circuit, such as capacitors,
resistors, batteries, LEDs, etc. as well as the path of the flow of
electricity. Circuit diagrams are used for the design and construction of
electronic equipment, such as PCBs. In computer science, they are also
used to visualize Boolean algebra.
Electronic circuit diagrams use special symbols to represent
the parts of a circuit. For example, these symbols represent a resistor:

And these symbols are used to represent a capacitor:

The web site Gadgetronicx has many circuit diagrams for


common (and uncommon!) circuits, such as a radio, a metal detector,

118
a headphone amplifier, an EMF sensor, and an electromagnetic glove!
Visit the Gadgetronicx web site and check out a few of the electronic
diagrams and see if you can understand how they work.
 Gadgetronicx: <http://www.gadgetronicx.com>

If you are interested in designing your own electronic circuits, a


useful site is Circuit-Diagram.Org. You can create circuit diagrams on
the web site or using a downloadable tool.
 Circuit-Diagram: <http://www.circuit-diagram.org>

119
English for Technology

Unit 7: Social Media

Table of Contents

Preface
Goals of the Unit
Learning Outcomes
Warm-up Activity: Discussion
Reading: The Web 2.0
Vocabulary
SAQ
Fill in the Blanks
Matching: Social Media Uses
Discussion: Social Media Use
Case Study: Gamiphy
Vocabulary
SAQ
Reading: Privacy and copyright
Vocabulary
SAQ
Discussion: Social Media and Risk
Dialogue: Online Toxicity
Discussion
Pair activity: Creative Commons Licenses
Debate: Should children have access to social media?
Vocabulary Quiz
Writing Assignment: Online Business Proposal

120
Preface
In this unit, you will learn vocabulary and have discussions
about social media and related topics such as the various uses of social
media sites, online toxicity, netiquette, gamification, online privacy,
and copyright issues. You will also have a debate and write a business
proposal for a social media-based business.

Goals of the Unit


 To learn vocabulary relating to social media, online privacy,
and copyright
 To have discussions about social media issues, such as online
toxicity, netiquette, privacy, and copyright
 To have a debate about online safety
 To write a proposal for an online business

Learning Outcomes
After studying this unit, students should be able to:
 Remember and use vocabulary relating to social media, online
privacy, and copyright
 Discuss social media issues, such as online toxicity, netiquette,
privacy, and copyright
 Argue for a position on online safety
 Write a business proposal

121
Unit 7: Social Media

Warm-up Activity: Discussion

Before starting with this unit content, let’s do a little warm-up. Discuss
the following questions with a partner or a small group.

1. What do you know about social media?


2. On which social media (e.g., Facebook, Twitter) are you active?
3. What are positive and negatives of social media? Can you give
some examples?

122
Reading: The Web 2.0

Read through the vocabulary below, which are related to some basic
concepts and terms about social media. You might know some of the
words already. Which words are you familiar with, and which are new?
Put a check mark (✔) next to the ones you need to learn (that is, the
ones that you don’t know yet).

General Vocabulary
1. feature: an interesting or important part, quality, ability, etc.; a trait
or characteristic
2. flagship: the best, largest, or most important one of a group of
things
3. social network: a group of individuals who are connected by and
through social ties and associations
4. synchronous: happening at the same time

IT Vocabulary
1. blog: a website where a person, group, or company writes (usually
with an informal style) about activities and experiences, with
content added periodically. Originally a shortened version of “web
log.”
2. bookmark: to save the location of online content you want to
return to later
3. forum: an open online space where users can discuss and exchange
opinions
4. gamification: the application of game mechanics to processes that
are not related to gaming
5. hybridization: convergence between different social media in
terms of features and characteristics
6. learning management system (LMS): an online system
developed for organizing and delivering educational materials

123
7. live streaming: a video that is taken and shown in real time with
other users
8. mobile: related to smartphone use and experience
9. newsfeed: news from different sources that are aggregated in just
one informative flow
10. really simple syndication (RSS): the gathering of content from
different online sources
11. thread: discussion posted in a forum
12. user generated content (UGC): content created by users

Social media can be described as online environments that allow


users to connect, interact, and share information between each other.
You are probably aware of social media sites like Facebook, Twitter,
Instagram, or Snapchat. Social media are the flagship of the passage
from Web 1.0 to Web 2.0. Social media sites rely on bi-directional
communication between users, something that we can define as a social
network empowered by digital capacities. There is an ongoing
turnover of new features added to social media (e.g., live streaming).
However, social media sites differ in a number of ways. Let’s look
at some examples:
● Facebook has a horizontal system, whose users tend to be
equally compared (i.e., being “friends”).
● Twitter is characterized by a more vertical and hierarchical
approach, with a few users followed by the many (i.e., followed
- followers).
● LinkedIn has a leading corporate orientation focused on
professional development, team building, and human
resources.
● Instagram relies on images and pictures rather than text,
supporting visual storytelling and communication.
● Quora is based on a Questions/Answers mechanic with users
replying to others’ prompts and doubts.
● Wikipedia (like other wikis) has an emphasis on a shared
knowledge construction and editing.
● Learning Management Systems (LMS) such as Moodle,
Blackboard, Canvas, and Edmodo are designed to manage,
organize, and deliver instruction at any level and grade.
Regardless, before the advent of Facebook there were already
instances of online interaction between users.

124
● Blogs are websites characterized by 1) a chronological order of
posts (diary-style); and 2) an informal/immediate style. They
were one of the first examples of Web 2.0, and today they are a
widespread internet phenomenon.
● Forums are online spaces where users can log in, leave
messages, and reply to others’ threads. They are still popular
despite the increasing use of live chats.
There are several trends characterizing social media at large despite
their own peculiarities and differences.
● Bookmarking is the ability to save the content you want when
and where you prefer.
● Really simple syndication (RSS) allows users to collect and
organize content from different online sources (e.g., newsfeed).
● User Generated Content (UGC) refers to pictures, audio,
video, animation, text, and so on that is created by users. It is
implied that UGCs are designed and created to be shared with
others.
● Synchronous interaction means that users are increasingly able
to communicate in real time, such as live streaming and instant
messaging.
● Clouding is the ability to store your content online so that you
can access it anytime and anywhere with a connection.
Dropbox is a famous clouding platform, but also Google Drive
includes this feature.
● Gamification can be described as the application of game
mechanics and dynamics to non-recreational processes and
activities (for instance, working). Virtual badges (see Khan
Academy) are a good example of how social media is becoming
more engaging. Moreover, the simple “thumb up” of Facebook
can be seen in this light as well, referring to a point system.
Hybridization is the convergence between different social media,
which share features which each other. For instance, the ability to
comment content is widespread across the Web 2.0. Otherwise, on
Blackboard Learn is possible to embed videos from YouTube. Mobile
social media are taking a foothold because social media are
increasingly experienced on mobile devices. Therefore, related content
becomes shorter (mobile consumption tends to be quicker) and more
visual than textual.

125
SAQ
1. What is a blog?
2. Are social media getting similar to each other?
3. What are some examples of gamification that come to your mind?

Fill in the Blanks


Choose the word from the box that best fits each blank.

1. With a good _________ you can stay updated about what is going
on all around the world!
2. _________ makes boring tasks more exciting.
3. I often comment and discuss my viewpoints on my favorite ______
4. I would like to open a _________ for sharing my ideas and
thoughts.
5. _________is so engaging, you feel to be part of the video itself.

RSS mobile social network


feature LMS thread
UGC gamification flagship
blog forum live-streaming

126
Matching: Social Media Uses

Associate the features on the left with the social media that include
them on the right. One social media can have more than one feature,
and each feature might be in more than one social media site.

Live streaming

Facebook
Gamification

Twitter
Interacting with other people

Instagram
Creating content

WhatsApp
Getting news

Wikipedia
Learning new information

Reddit

Then, comment and discuss your choices in pairs or small groups.

127
Discussion: Social Media Use

People use social media for many different purposes, from leisure and
fun to learning new things. Some social media are very visual (e.g.,
pictures, memes, gifs), others are more about discussion and exchange
of views. Some social media are designed to work on mobile (e.g.,
Instagram, WhatsApp), while others run also on personal computers.
Some social media can have influencers followed by millions of people
and specific trending topics (perhaps associated with popular
#hashtags) widely debated by their community. Now, look at the
prompts below and try to answer them with a partner.

1. What is an influencer? Can you give some examples for Twitter


and YouTube?
2. Pick a social media of your choice. What are its leading trending
topics right now?
3. What is a hashtag? Have you ever used a hashtag? If so, why? If
not, why not?
4. Have you ever thought of using social media to make money?
Why?
5. What is your favorite social media and why? Has it changed over
time?

128
Case Study: Gamiphy

Below is a case study of Gamiphy, a Palestinian company that uses


gamification in marketing. Before you read the case study, watch this
short video about Gamiphy to understand what the company does:
<https://vimeo.com/279439368>

Check the vocabulary below, and then read the case study. Then,
answer the questions.

Vocabulary
1. digital badge: an indicator of accomplishment, skill, quality, or
interest that can be earned in an online environment
2. digital marketing: the marketing of products or services using the
Internet, mobile phones, display advertising, and other digital
media
3. e-commerce: activities that relate to the buying and selling of
goods and services over the Internet
4. gain traction: to get the support, interest, etc. that is needed for
something to succeed or make progress
5. infrastructure: the basic equipment needed for something to
function properly
6. loyalty program: a marketing strategy designed to encourage
customers to continue to shop at or use the services of a business,
often by giving the customer a reward
7. optimization: making something as good or as effective as
possible
8. startup: a new business, often one started by an entrepreneur to
demonstrate a business model
9. user engagement: a user’s response to some type of offering, such
as a product, a service or a website
10. user retention: the ability of a company, product, app, etc. to keep
its users over a specific period of time.
Gamification is a rapidly growing trend in digital marketing,
and many companies are using gamification to make activities that are
usually thought of as nuisances (such as watching advertisements)
more interesting, interactive, and engaging. However, gamification can
be quite expensive and it can be difficult for small companies to
implement.

129
To address this problem, Palestinian entrepreneur Aws
Alnabulsi founded the company Gamiphy in 2017. Alnabulsi studied
electrical engineering at Al-Najah University and then spent five years
working on multiple tech startups in Silicon Valley and in his
hometown of Nablus before founding Gamiphy. With funding from the
Ibtikar Fund, Alnabulsi started Gamiphy to help small and medium
sized businesses adopt gamification technologies.
Gamiphy is a user engagement and retention platform that
offers clients tools to engage, reach out to, and retain users. In addition,
Gamiphy also offers clients a standalone app which makes it easy to
access the market through integrated plug-in features and tools to
customize their own gamification experience. Gamiphy offers clients
a variety of features, such as loyalty programs, digital badges,
branded games, quizzes, and playable apps to keep their customers
engaged and coming back.
Gamiphy is appealing to small to medium sized businesses
because it offers these businesses tools that are usually only available
to much larger companies. Big companies may have the resources to
spend large amounts of money on developing gamification platforms
and marketing campaigns. By working with Gamiphy, smaller
companies can also implement gamification without the financial,
technical, or human resources necessary to develop these tools
internally.
Although Gamiphy seeks to target markets in a variety of
industries, it currently focuses mainly on the e-commerce sector. The
advantage of focusing on the e-commerce sector is the availability of
the infrastructure and technology needed to effectively utilize
gamification platforms. As Gamiphy continues to gain traction in
targeted markets, Alnabulsi hopes to further acquire the necessary
resources to enlist the services of marketing and sales expert, and
product developers needed for further optimization of Gamiphy to
meet the needs and demands of new markets.
When it comes to impact, Gamiphy focuses on helping
companies efficiently use their existing resources to access the latest
technologies in gamification and a wide variety of optimization
features at competitive prices. Not only does Gamiphy allow tech based
startups and entrepreneurs to access some of the latest technologies
used in big budget campaigns by some of the largest global
corporations, it also creates employment opportunities for tech savvy

130
Palestinians. Gamiphy is helping Palestinian developers to adopt the
latest technologies to spur innovation and creativity.

(Based on a report by Leila Farraj of MENA Catalyst Foundation,


published August 14, 2018:
https://www.storytelling.demo.bluetd.com/startups/276.html)

For more information about Gamiphy, see their web site at:
<http://www.gamiphy.co>

SAQ
1. What services does Gamiphy provide?
2. Why would a small company want to use Gamiphy’s services?
3. Do you think gamification such as digital badges, branded games,
quizzes, and playable apps would make you use continue to use a
product or service?
4. Do you think gamification is more relevant to some products and
services than others? If so, what kinds of products and services is
it more relevant to? If not, why do you think it is applicable to
every product and service? Share your answers with a partner or
small group.

Reading: Privacy and copyright

Read through the vocabulary


below, which are related to some
basic concepts and terms about
privacy and copyright. You might
know some of the words already.
Which words are you familiar with,
and which are new? Put a check
mark (✔) next to the ones you need
to learn (that is, the ones that you don’t know yet).

131
General Vocabulary
1. algorithm: a set of steps that are followed in order to solve a
mathematical problem or to complete a computer process
2. fraud: the crime of using dishonest methods to take something
from another person
3. mitigate: to make something less severe or harmful
4. privacy: being away from public attention (e.g., personal
information and data)

IT Vocabulary
1. Creative Commons: a nonprofit organization that works to
increase the amount of work that is available to the public for free
through public copyright licenses that support sharing
2. cyberbullying: a form of bullying or harassment online
3. digital footprint: your presence online (e.g., your social media
profile, your website)
4. moderating: the ability revise, remove, and manage online content
(usually attributed to administrators)
5. netiquette: rules of conduct for online settings
6. reporting: the ability to block and report (to administrators) users
due to various types of misconduct
7. spam: email and other materials that are received but not wanted
8. toxicity: negative and hostile behavior against other online users
9. trolling: an online behavior characterized by hostility and
disrespect

Despite their strengths, social media have downfalls as well.


Privacy protection and management are a critical issue to address.
Social media collect our information and, due to their hidden
algorithms, it is challenging to understand and control how social
media sites gather and use our information. Also, our digital footprint
is increasingly used as a criterion of selection by employers and
institutions, and that the “right to be forgotten” - to remove online
content damaging privacy - is not feasible.
Copyright is a further hot topic. The proliferation of content
through social media asks us to reflect on ownership and how to protect
original materials and supervise their use and modification. Creative
Commons (CC) has developed a set of guidelines to fix this issue.
These guidelnes include different types of licenses aimed at supporting

132
original work diffusion and modification. Let’s take a look at some of
CC’s licenses:

Attribution (by)
All CC licenses require that others who use your work in any way must
give you credit the way you request, but not in a way that suggests you
endorse them or their use. If they want to use your work without giving
you credit or for endorsement purposes, they must get your permission
first.

ShareAlike (sa)
You let others copy, distribute, display, perform, and modify your
work, as long as they distribute any modified work on the same terms.
If they want to distribute modified works under other terms, they must
get your permission first.

NonCommercial (nc)
You let others copy, distribute, display, perform, and (unless you have
chosen NoDerivatives) modify and use your work for any purpose
other than commercially unless they get your permission first.

NoDerivatives (nd)
You let others copy, distribute, display and perform only original
copies of your work. If they want to modify your work, they must get
your permission first.
(from <https://creativecommons.org/share-your-work/licensing-types-
examples>)

133
Another issue is related to
online toxicity, which is a dynamic
that younger as well older users are
increasingly experiencing. Online
environments are often accused of
being a breeding ground of hate and
discrimination. This is a result of the
so-called “online disinhibition
effect,” which is when the social
restrictions and inhibitions that
people normally have in face-to-face
communication are lessened or
removed when interacting on the
Internet. This can result in a toxic media culture in which individuals
ignore face-to-face social rules and are more inclined to attack other
users because they are protected by anonymity. Cyberbullying
practices and widespread hate campaigns represent examples of such a
trend. Spam and trolling are not rare on social media, and you have to
be careful about possible fraud risks. As a consequence, moderating
and reporting features are increasingly included in social media
systems for mitigating these issues. A simple solution is to work on a
shared netiquette for staging a safe environment. The perception is that
online behaviors are less important than offline ones…but it is not true,
and the former can have real consequences on users, especially young
ones.

SAQ
1. Why is privacy important?
2. What is a netiquette?
3. How do Creative Commons licenses work?

134
Discussion: Social Media and Risk

Together with a partner or in a small group, discuss the following


questions about your experiences with social media and their risk.

1. Have you ever thought about your digital footprint? What can
others see about you online? Are you worried about what others
can see?
2. Have you ever been moderated by an administrator online?
3. Do you have negative/toxic experiences on social media outlets that
you want to share?

Dialogue: Online Toxicity


In the following dialogue, Nur and Ali are two users discussing online
toxicity.

Listening Link 1

Nur: Hi Ali! How are you?


Ali: I’m OK. But I’ve been having trouble recently with some people
online.
Nur: Oh, like spam?
Ali: No, I met them in a game I like to play. I think they got upset when
I beat them in the game. They followed me to my social media pages
and they kept harassing me there. They kept trolling me and leaving
lots of toxic comments on all of my posts! It’s really frustrating.
Nur: Oh, wow. That’s horrible! It sounds like a case of cyberbullying.
Have you tried to do anything about it?
Ali: Well, I tried to report them to the site administrators, but they
haven’t done anything yet. The site isn’t moderated, so all the toxic
comments just keep coming. I’m not sure what to do.
Nur: I had a similar experience in the past. I think people sometimes
act more aggressively online. We really need to have a good
netiquette to follow, with clear rules for how to behave online.
Ali: Yeah, you’re right. The site they keep harassing me on doesn’t
have very clear netiquette rules. They do have a TOS, but that
doesn’t cover cyberbullying. I try to just ignore the toxic comments,

135
but they write on my posts where my friends and family can see
them.
Nur: That does sound like a problem. Maybe you could set your
profile’s privacy settings to private for a while. That would keep
them away from your posts at least.
Ali: That’s a good idea, Nur. I might need to do that, at least until these
cyberbullies stop.

Discussion
1) What did Ali experience?
2) Do you think making changing his privacy settings is a good
solution?
3) What are some netiquette rules that you think people should follow
on social media? Think of rules on your own, or choose the most
important rules from the following picture.
a) ___________________________________________________
b) ___________________________________________________
c) ___________________________________________________

(Netiquette1 by Helen DeWaard / CC BY 2.0)

136
Pair activity: Creative Commons Licenses

Work in pair or small group. Look at the different CC license


combinations below, and try to remember what they imply in terms of
what you can and cannot do. Think about something that you created
or you would like to create in the future; then, try to envision which CC
license(s) you would use for protecting and sharing it online. Discuss
your choices and motivation with a partner or small group.

Debate: Should children have access to social media?

Social media has undoubtedly


changed our society. But has it
changed for the better or for the
worse? What effects does social
media have on children who are
growing up with social media a
part of their everyday life? As a
young adult, this is an issue you
will need to consider.
In this debate, you will work
with another student or in a small group to answer the question Should
children have access to social media? One person (or one group) will
argue for the “Yes” position, and the other person (or group) will argue
for the “No” position. The “Yes” person/group should present the
reasons that children should have access to social media, and the “No”
person/group should present the reasons why children should not. In
your argument, you can also address the reasons that the other person
or group is incorrect.

137
For ideas, you may want to look at the reading earlier in this unit
again to make some notes. Also, there is plenty of information online
you can read to support your position. For example, this site has a lot
of useful information to support both sides:
https://socialnetworking.procon.org/

Vocabulary Quiz
Choose the best definition for each of the words below.
1) Cyberbullying
a. A proactive attitude toward others
b. A disruptive behavior against others online
c. A new social media about cyberculture

2) blog
a. A static website where users can also view content
b. A website with periodically updated content and an
informal style
c. A forum for IT experts and educational technology
practitioners.

3) LMS
a. Social media that can be accessed only on mobile
devices.
b. Social media developed for gamification purposes.
c. Social media designed to support and manage
education.
4) moderating
a. The ability to supervise online content by users given to
administrators.
b. The ability to send funny pictures to other users on the
same social media.
c. The ability to create blogs with few clicks.
5) spam
a. Unsolicited emails and other materials received by
users.
b. Periodic report about a social media profile activity.
c. Points collected by using a specific social media.

138
Writing Assignment: Online Business Proposal

Imagine that you want to start an online business. Perhaps you are an
aspiring social media influencer. In this assignment, you will think of
an idea for an online business that has a social media element. This
business could be entirely based on social media, such as a technology
review company on YouTube, or it might have a social media element,
such as a makeup importing company that uses Instagram for
marketing.

Brainstorm some ideas for an online company. You might start by


thinking of topics or activities that you are interested in already, and
how those could become an online business.

In this activity, you will write a short business proposal for your online
venture. You will be writing this for a potential investor who is thinking
about supporting your business. Your business proposal should explain
what your idea is for an online business, and argue for why the business
has potential to be successful.

139
To make your business plan, some things you will need to think about
are:
 What type of content will your business focus on? For example,
will it be entertainment or informative? Will you sell products?
Will it be a blog about your life? Will you review technology
products? Think about the things you know about, and how they
might transfer to a social media format.
 Which social media site will you use? If you are going to make
videos, YouTube might be a good choice, but if you are going to
post photos, Instagram might be better. If you want to post
information and have your followers discuss it, Facebook might be
a good option.
 Who would be your competitors, and what makes your business
different?

A business proposal typically has the following sections:

1. Executive Summary: This is the first part of the business proposal,


but it is usually written last. It summarizes the key information in
your business proposal. It is the first thing that a reader (and
potential investor!) will see, so it’s important that your executive
summary presents the most important information.
2. The Opportunity: In this section, you describe what the opportunity
is for your business. That is, you describe what the problem or gap
is in the current market. For example, if you want to start a
YouTube channel that reviews new technology products for a
Palestinian audience, then you should show that there are few such
channels currently. Or, if you will start an Instagram account to sell
makeup from Korea, you should show that there isn’t currently
someone else who does this.
3. Market Analysis: In this section, you describe who your target
customers, users, or audience are. Where are they and what are their
demographics (age, gender, etc.)? What are their needs, and how
are those needs currently being met? For example, if you think your
target audience would want makeup from Korea, they might
currently be buying makeup from China or Japan. You should also
think about how big of a potential market this is.

140
4. Competitors: Who are your competitors? What advantages and
disadvantages do they have? How is your business different from
your competitors’?
5. Execution: How will you start and develop your business? This
could include plans for marketing, sales, or other logistics.

Now, based on this outline, write a business proposal for your online
business. Then, share it will others in your class.

141
English for Technology

Unit 8: Programming Languages

Table of Contents

Preface
Goals of the Unit
Learning Outcomes
Preface
Goals of the Unit
Learning Outcomes
Warm-up Activity: Discussion
Reading: Programming Languages
Vocabulary
SAQ
Matching: Finding the Right Programming Language
Ordering Activity
Fill in the Blanks
Vocabulary: Computational concepts
Discussion
Dialogue
Role Play: Working with a client
Search activity
Vocabulary Quiz
Writing Assignment: Pseudocode

142
Preface
In this unit, you will read about and discuss prominent
programming languages. You will learn and use vocabulary that is
related to programming languages, and you will use this vocabulary in
discussions about programming languages. Lastly, you will try out
pseudocoding with MIT’s Scratch.

Goals of the Unit


 To understand vocabulary related to programming languages
 To use vocabulary related to programming languages in
discussions
 To evaluate the strengths and weaknesses of various
programming languages
 To experience pseudocoding with MIT’s Scratch software

Learning Outcomes
After studying this unit, students should be able to:
 Remember and use vocabulary related to programming
languages
 Have discussions about programming languages
 Evaluate the strengths and weaknesses of programming
languages
 Understand what pseudocoding is

143
Unit 8: Programming Languages

Warm-up Activity: Discussion

Before starting with this unit content, let’s do a little warm-up. Discuss
the following questions with a partner or a small group.

1. Have you ever written any code? If yes, what did the code do?
2. What are the programming languages that you know?
3. Would you like to learn more about programming? Why? / Why
not?

Reading: Programming Languages

Read through the vocabulary below, as these are related to some basic
concepts and terms about programming languages. You might know
some of the words already. Which words are you familiar with, and
which are new? Put a check mark (✔) next to the ones you need to learn
(that is, the ones that you don’t know yet).

144
IT Vocabulary
1. NET Framework: a software framework by Microsoft which
executes code via a virtual machine
2. C: a low-level, compiled programming language developed in the
early 1970s by Dennis Ritchie for use on the UNIX operating
system
3. compiler: a program that takes human readable code and turns it
into machine readable code for running at a later time
4. ECMAScript: the official specification or "standard" for the
language commonly known as JavaScript
5. elegant code: concise, clean, and clear code which allows other
developers to understand and extend it
6. interpreter: a program that reads a high-level programming
language, converts it into machine code, and then immediately runs
that code
7. Java: a high-level, compiled, object-oriented programming
language developed by Sun Microsystems and now owned by
Oracle.
8. JavaScript: a popular web page scripting language created by
Brendan Eich at Netscape to provide client-side interactivity in
Web pages.
9. multi-paradigm language: a programming language that supports
both procedural and object-oriented programming philosophies
10. object-oriented language: any programming language optimized
for modeling real-world objects and concepts
11. Perl: a high-level, interpreted programming language written by
Larry Wall in 1986 and typically used for a wide variety of
programming tasks including system administration
12. PHP (PHP Hypertext Preprocessor): a high-level, interpreted
programming language written by Rasmus Lerdorf in 1995 and
aimed mainly at web developers creating dynamic applications
13. portability: a measure of how easily programs can be moved to a
new system without having to make any changes.
14. procedural language: any programming language that is based on
a step-by-step approach to solving a problem
15. Python: a high-level, interpreted programming language
developed by Guido van Rossum at CWI in the Netherlands

145
16. Ruby: an object-oriented, high-level, interpreted programming
language developed in the 1990's by ace Japanese programmer
Yukihiro Matsumoto.
17. syntax: rules governing the structure of a programming language
18. VB (Visual Basic): a Windows-only, multi-paradigm programming
language developed by Microsoft and intended for beginners or
casual use

There are hundreds of programming


languages in use today. How can you know
which one to learn first? How do you know
which ones are the best for your IT field of
choice? Well, I can't answer that question for
you. But why not start by learning one of the
top 10 most popular ones? That way you will
always be able to get a job in the IT industry.
Learning a programming language is not easy, but it can be very
rewarding. You will have a lot of questions at first. Just remember to
ask for help when you need it! You can find out the answer to almost
everything on Google nowadays.... so there is no excuse for failure.
Also remember that it takes years to become an expert programmer.
Don't expect to get good overnight. By learning something new every
day, eventually you will be competent enough to get the job done.
This article covers the top 10 most popular programming languages as
ranked by Tiobe.com in June 2009, with some general reviews and
comments about each language listed. These are personal opinions, and
other IT professionals might have different opinions.

1. Java
Java uses a compiler, and is an object-oriented language released in
1995 by Sun Microsystems. Java is the number one programming
language today for many reasons. First, it is a well-organized
language with a strong library of reusable software components.
Second, programs written in Java can run on many different computer
architectures and operating systems because it uses the JVM (
Java virtual machine ). Sometimes this is referred to as code
portability or even WORA (Write Once, Run Anywhere). Third,
Java is the language most likely to be taught in university computer
science classes. A lot of computer science theory books written in the

146
past decade use Java in the code examples. So learning Java syntax is
a good idea even if you never actually code in it.
 Java Strengths: WORA, popularity Java
 Weaknesses: Slower than natively compiled languages

2. C
C is a compiled, procedural language developed in 1972 by Dennis
Ritchie for use in the UNIX operating system. Although designed to
be portable in nature, C programs must be specifically compiled for
computers with different architectures and operating systems. This
helps make them extremely fast. Although C is a relatively old
language, it is still widely used for system programming, writing
other programming languages, and in embedded systems.
 Strengths: Speed
 Weaknesses: Memory management can be difficult to master

3. C++
C++ (pronounced “C plus plus”) is a compiled, multi-paradigm
language written as an update to C in 1979 by Bjarne Stroustrup. It
attempts to be backwards-compatible with C and brings object-
orientation, which helps in larger projects. Despite its age, C++ is
used to create a wide array of applications from games to office
suites.
 Strengths: Speed
 Weaknesses: C++ is older and considered clumsier than newer
object-oriented languages such as Java or C#.
4. PHP
PHP uses a run-time interpreter, and is a multi-paradigm language
originally developed in 1996 by Rasmus Lerdorf to create dynamic
web pages. At first it was not even a real programming language, but
over time it eventually grew into a fully featured object-oriented
programming language. Although PHP has received much criticism in
the past for being a bit sloppy and insecure, it's been pretty good since
Version 5 came out in 2004. It's hard to argue with success. Today,
PHP is the most popular language used to write web applications.
 Strengths: Web programming, good documentation
 Weaknesses: Inconsistent syntax, too many ways to do the
same thing, a history of bizarre security decisions

147
5. VB (Visual Basic) is an interpreted, multi-paradigm language
developed by the Microsoft Corporation for the Windows platform. It
has been evolving over the years and is seen as a direct descendant of
Microsoft's old BASIC from the 1970's. Visual Basic is a good
language for scripting Windows applications that do not need the
power and speed of C#.
 Strengths: None.
 Weaknesses: Only runs in Windows

6. Python
Python is an interpreted, multi-paradigm programming language
written by Guido van Rossum in the late 1980's and intended for
general programming purposes. Python was not named after the snake
but after the Monty Python comedy group. Python is characterized by
its use of indentation for readability, and its encouragement
for elegant code by making developers do similar things in similar
ways. Python is used as the main programming choice of both Google
and Ubuntu.
 Strengths: Excellent readability and overall philosophy
 Weaknesses: None

7. C#
C# (pronounced “C sharp”) is a compiled, object-oriented language
written by Microsoft. It is an open specification, but rarely seen on
any non-Windows platform. C# was conceived as Microsoft's
premium language in its .NET Framework. It is very similar to Java
in both syntax and nature.
 Strengths: Powerful and pretty fast
 Weaknesses: Only really suitable for Windows

8. JavaScript
JavaScript is an interpreted, multi-paradigm language. However, it is
a very strange language. Despite its name, it has nothing whatsoever
to do with Java. You will rarely, if ever, see this language outside of a
web browser. It is basically a language meant to script behaviors in
web browsers and used for things such as web form validation and
AJAX style web applications. The trend in the future seems to be
building more and more complex applications in JavaScript, even
including simple online games and office suites. The success of this

148
trend will depend upon advancements in the speed of a browser's
JavaScript interpreter. If you want to be correct, the real name of this
programming language is ECMAscript, although almost nobody
actually calls it this.
 Strengths: it's the only reliable way to do client-side web
programming
 Weaknesses: it's only really useful in a web browser

9. Perl
Perl is an interpreted, multi-paradigm language written by Larry
Wall in 1986. It is characterized by a somewhat disorganized and
scary-looking syntax which only makes sense to other PERL
programmers. However, a lot of veteran programmers love it and use
it every day as their primary language. 10 years ago, Perl was more
popular than it is today. What happened? A lot of newer programmers
and even old Perl programmers (such as myself) have switched to
other languages such as PHP, Python, and Ruby. Perl is perhaps still
the best language for text processing and system administration
scripting.
 Strengths: text processing and system administration
 Weaknesses: strange syntax, and perhaps too many ways to do
the same thing

10. Ruby
Ruby is an interpreted, object-oriented language written by Yukihiro
Matsumoto around 1995. It is one of the most object-oriented
languages in the world. Everything is an object in Ruby; even letters
and numbers can have method calls. It's a great language to learn if
you love objects. The only negative is that its love of object-
orientation makes it a bit slow, even for an interpreted language.
 Strengths: Perhaps the world's most object-oriented language
 Weaknesses: its superior object model comes at a price...
namely speed

SAQ
1. What is the difference between C and C++?
2. What are the strengths of Ruby?
3. What are the weaknesses of Python?
4. What is the difference between Java and JavaScript?

149
Matching: Finding the Right Programming Language

What is the right programming language to use and why? Match the
different characteristics on the left with related programming
languages on the right. You can match more than one feature with each
type of programming language, and vice versa.

Java

Speed

C
Object-oriented

Python

Web-
programming
C#

Windows-based Ruby

JavaScript
Bad-memory
management

150
Next, share your answers with a partner or a small group. What
differences do you see between your evaluation and how your
classmates assessed these programming languages? What other
programming languages do you know?

Ordering Activity
Which programming language came first? Order them below from 1
(the oldest) to 5 (the newest). Then, discuss your choices with a partner
or in a small group.

C++ _____ Python _____ C _____

Perl _____ VB _____

Fill in the Blanks


Choose the word from the box that best fits each blank.

1. The ____ is Microsoft's premium solution for programming


applications, and supports over 20 languages including C#,
VB.NET, and IronRuby.
2. The students liked programming python more than C because they
didn't have to use a ____ before execution.
3. The professor told us that officially JavaScript should be called
____, but that few people do so in practice.
4. Computer languages that require an _____ often run slower than
languages that require a compiler
5. PHP started out as a procedural language, but grew into a _____
when it added support for objects in version 4.

C Python Ruby
compiler Java NET Framework
Perl multi-paradigm language interpreter
VP ECMAScript JavaScript

151
Vocabulary: Computational concepts

Here are some vocabulary words about programming processes and


parameters. Put a check mark (✔) next to the ones you need to learn.

1. argument: a value passed to a function when it is called


2. array: a data structure such as a variable that holds other variables
in a particular order; For example: $a = ($b, $c, $d)
3. attribute: a property such as order, size, or color
4. callback: code that is passed as an argument to other code
5. for loop: a sequence of instructions set to be repeated a specified
amount of times until a condition is met
6. function: a named sequence of procedural code statements that
perform a certain task global scope: usable anywhere in a program
7. goto statement: an instruction in older procedural programming
languages that specifies that the instruction execution is to jump to
specified location, normally a line number
8. local scope: usable only in a limited section of program text such
as a function
9. operand: a value from which an operator derives another value
10. operator: a symbol that represents an arithmetical calculation.
11. parameter: a variable specified inside a function or subroutine
definition which may set by the code which calls it
12. regex (regular expression): a string that describes or matches a set
of strings, according to certain syntax rules
13. statement: a sentence of code in a programming language, usually
ending with a semi-colon
14. string: a series of letters and/or numbers
15. subroutine: an independent block of code, separate from the main
program, which performs a specific task necessary to the program
16. switch: a block of code or function causing a program to change its
default behavior
17. variable: a symbol used to represent data which can be changed
while the program is running.
18. while loop: a sequence of instructions set to continue until a certain
expression is false

152
Discussion

Together with a partner or in a small group, discuss the


following questions about your take on coding and
programming.

1. Which programming languages do you already have some


experience with? Which ones do you want to learn? Why?
2. Which language do you think is best for making banking software?
Web pages? Games? Text processing?
3. Computer languages such as FORTRAN and COBOL were once
very popular, but they are not used as much anymore. Why do you
think they lost popularity? Which languages in the top 10 do you
think will drop in 10 years? Which language or languages do you
think will gain in popularity?

Dialogue

In the following dialogue, Rana and Nasr are two friends talking about
learning how to code.

Listening Link 1

Rana: Good morning Nasr! How are


you today?
Nasr: Hi Rana! Just recovering from
yesterday. I had a long day at the
university.
Rana: I can imagine, final exams are
coming up and I bet you are working really hard. What are you
studying right now? I remember you always wanted to be a
programmer…
Nasr: That’s right, you remember well! I’m currently taking classes
in computer science, and more specifically in coding. It is quite
challenging, but it is stimulating too.
Rana: That’s cool! Which programming languages are you learning?
Is C still around?
Nasr: C is still a popular programming language, even if it was
created 40 years ago! Its minimalism and extreme speed are

153
still incredible. However, I’m currently improving my skills
with C++. It is straightforward and very elegant, if you know
what I mean! Moreover, it’s popular in game development and
I want to work for a game company. I am also taking some
workshops to learn Python.
Rana: Oh, that’s great. I’ve heard of Python before, but I don’t know
very much about it. I’ve heard that it’s a good language to
know.
Nasr: Yes, it is! Python is characterized by a great structure and you
don’t have to use a compiler before execution. But, there are so
many alternatives. It really depends on what you want to
develop and for which platform.
Rana: OK, I see. How about web scripting languages? I’ve been
interested in learning a scripting language for developing web
sites and online tools, but I’m not sure what to learn.
Nasr: Well, one of my professors said that PHP is the most popular
web scripting language in the world and it supports many
advanced object-oriented programming techniques. So you
may want to give that a try!
Rana: Sounds good! Thanks for the tip!

Discuss the following questions with a partner or small group:


1. Have you ever taken coding or programming classes? Which
languages did you explore?
2. Do you think it is important to learn how to code? If yes, why and
from which age? If not, how can you think about ways to make
programming easier to understand and master?

154
Role Play: Working with a client
Work in a pair with another student. One of you
is a client who wants to develop a new social
media site with gaming and networking
features. The idea is to set a new standard in the
quickest way possible. The other is the head
developer of a team that was hired for
programming it. The former wants to know
which are the best programming languages to
use for making his vision concrete, while the
latter should explain possible alternatives and
their strengths and weaknesses. Before you
begin your discussion, make some notes of
ideas to support your claims.

Search activity

Work in small groups and try to define the terms


“pseudocode” and “computational thinking”. You
can use search engines like Google and Yahoo.

Vocabulary Quiz

Choose the best definition for each of the words below.

1. PHP or PHP Hypertext Preprocessor


a) a high-level, interpreted programming language written by
Rasmus Lerdorf in 1995 and aimed mainly at web developers
creating dynamic applications
b) the official specification or "standard" for the language
commonly known as JavaScript
c) a high-level, interpreted programming language developed by
Guido van Rossum at CWI in the Netherlands

155
2. procedural language
a) a program that takes human readable code and turns it into
machine readable code for running at a later time
b) any programming language that is based on a step-by-step
approach to solving a problem
c) rules governing the structure of a programming language

3. portability
a) a program that reads a high-level programming language,
converts it into machine code, and then immediately runs that
code
b) a programming language that supports both procedural and
object-oriented programming philosophies
c) a measure of how easily programs can be moved to a new
system without having to make any changes.

4. ECMAScript
a) the official specification or "standard" for the language
commonly known as JavaScript
b) a low-level, compiled programming language developed in the
early 1970s by Dennis Ritchie for use on the UNIX operating
system
c) a high-level, interpreted programming language written by
Rasmus Lerdorf in 1995 and aimed mainly at web developers
creating dynamic applications

5. VB or Visual Basic
a) an object-oriented, high-level, interpreted programming
language developed in the 1990's by ace Japanese programmer
Yukihiro Matsumoto.
b) a Windows-only, multi-paradigm programming language
developed by Microsoft and intended for beginners or casual
use
c) a high-level, compiled, object-oriented programming language
developed by Sun Microsystems and now owned by Oracle.

156
Writing Assignment: Pseudocode

For this writing assignment, you are asked to write a pseudocode about
a possible program that you want to compile. You should know this
term from the previous search activity; in essence, pseudocode is
summarizing programming dynamics in an easy and straightforward
way that does not require high coding skills. For instance, you may
describe an object that acts by itself or is influenced by different
conditions (e.g., if the object touches the wall, it turns). Depicting these
steps means that you need to narrate how you code works without
coding it! Even expert programmers use pseudocode for understanding
apparently complex programming syntaxes. Take a look at Scratch
(<https://scratch.mit.edu/>), which is a free tool from the
Massachusetts Institute of Technology (MIT) that is designed to
support pseudocoding and computer science education.

Follow the outline below for envisioning your ideal coding piece:

1. Characters involved (e.g., an avatar, an animal).


2. Actions that these characters can perform according to users’ inputs
(e.g., if I click the right arrow, the character moves right).
3. Variables that may influence characters’ actions (e.g., impacting
another characters).
4. Possible loops and subroutines working in the background (e.g., a
dynamic scenario).
5. Use and audience of this program (e.g., a game, an interactive
storytelling).

Try to make it real with Scratch and see if it works!

157
English for Technology

Unit 9: Presentation Skills

Table of Contents

Preface
Goals of the Unit
Learning Outcomes
Warm-Up Activity: What Makes a Good Presentation?
Reading: How to prepare a speech
Vocabulary
SAQ
Fill in the Blank
Try it Out! Ideas for Speech
Presentation Phrases
Reading: Common errors in presentations
SAQ
TED Talks Presentation Examples
Case Study: Customer Relationship Management System
Vocabulary Practice: Crossword Puzzle

158
Preface
This unit will talk about the parts of a good presentation and tips on
how to create effective presentation slides. You will learn about what
makes a presentation either effective or ineffective. You will get some
tips on preparing a good presentation, and you will practice by listening
to presentations and then trying to make one yourself. You will also
read a case study about a marble and stone company in Palestine.

Goals of the Unit


 To increase presentation skills in English;
 To practice giving a speech;
 To use tips to improve your presentation skills.

Learning Outcomes
By the end of this unit, students should be able to:
 Identify and produce the appropriate parts of a speech;
 Identify the traits of good speeches and the steps to create one ;
 Identify and remedy common presentation mistakes;
 Use statistical information in a speech.

159
Unit 9: Presentation Skills

Warm-Up Activity: What Makes a Good Presentation?

Below are several ideas needed for a good presentation. Rate each
idea from what you think is the most to least important (1 = most
important; 10 = least important). Compare your notes with a partner
and answer the questions below.

_____ The speech has an effective opening statement.


_____ It is easy to hear and understand the speaker.
_____ The speaker pays attention to entire audience.
_____ The presentation slides are simple and easy to read.
_____ The speaker uses excellent supporting facts.
_____ The speaker knows their audience and its needs well.
_____ The speaker seems to be an expert.
_____ The speech is well-organized.
_____ The speaker sums up speech well.
_____ The speaker’s conclusion makes the audience think about the
speech after it is over.

160
Discuss your answers with a partner or small group. Together with your
partner or group, come to an agreement about which three are the most
important.

Reading: How to prepare a speech

Read through the vocabulary below, which are related to preparing a


presentation. You might know some of the words already. Which
words are you familiar with and which are new? Put a check mark (✔)
next to the ones you need to learn.

General Vocabulary
1. inform: to give someone facts or information
2. persuade: to cause someone to do or believe something by giving
them good reasons
3. credibility: if someone can be believed or trusted
4. quote: a series of words or phrases taken from what someone else
said or wrote
5. provocative: causing a strong reaction like annoyance or anger,
done to get attention

Presentation Vocabulary
6. slide: an image shown on a large screen; 3 or more images make a
slideshow
7. rhetorical question: a question asked to make a point rather than
to get an answer
8. statistics: a set of numbers or a collection, analysis, and
presentation of numeric information
9. clip: a short part of a video
10. audience: a group of people listening to or watching something like
a speech or a movie

Listening Link 1

Have you ever been asked to talk about something without


being prepared for it? While experts in that field can create a good
answer or two on things they know well, very few people can deliver a
good speech without preparing for it. Without planning well, even the
best speakers struggle. To create a good presentation, you need to plan

161
your message and the purpose of the presentation. Fortunately, if you
know how to write an essay, you already know a lot about how to write
a speech. The bonus is that you don’t have to write down everything
you’re going to say. Keep things in note form instead. There are a few
easy steps you can follow to prepare for a presentation.

Step 1
The first step in preparing a good presentation is brainstorming.
What is your presentation about? Is it meant to inform or to persuade
your audience? List a few items you would like to talk about. Why are
they important to your main topic? Are there any facts that support
these reasons? A good rule is to have at least two facts or pieces of
information for each idea. These will give you credibility.

Step 2
The second step is to write an introduction. How you begin a
presentation is at least as important as the facts you will talk about. A
good introduction will make the audience trust the speaker, while a
poor one may bore them. One effective way to get the audience’s
attention is by telling a related story. You can tell how or why you are
speaking. What made you interested in your subject? You can also talk
about your expertise in the subject, or even how you found the facts
and figures used in your presentation. All of these are useful for
increasing your credibility. The story should be related to the subject
of your presentation, and it should be something that is important to
your audience. Knowing the audience’s demographics (age, gender,
class, job titles, etc.) is important when designing a presentation. What
is important to them? What will help them the best? Design your
presentation with their wants and needs in mind to further gain
credibility. Another opening is to find and use a fact or statistics that
people don’t know. For example, if you are talking about how to
decrease the IT costs in a company, you may want to say something
like, “Software licenses represent 30% of the IT budget at Keymar Inc.
We can reduce this to 15% if we decommission software we use for
small functions and instead move to open source solutions.” After your
opening, write down why your opening is important to your subject.
The audience likes to know what they will hear, and this is a chance
for you to tell them.

162
Step 3
The third step in preparing a presentation is to write your facts
and reasons about your subject. For example, if you are speaking about
why your company should adopt a certain piece of software
(persuade), you may want to talk about how much time or money the
new software could save. If you are talking about best practices in
information security (inform), you may talk about the reasons that
people should be concerned about information security. With any
reason, include facts and statistics; the more you have that back up
your position, the more believable you appear to your audience. Make
sure that the facts come from a reliable source, and then mention where
those facts came from.

Conclusion
A conclusion is the next step in your preparations to make a
speech. Sum up what you talked about. It is good to remind people what
they just heard, especially the main points, as this will help them
remember it better. Finally, leave them thinking about your
presentation. One good way to write a concluding statement is to
predict what may happen with or without changes. With the example
of why your company should adopt a certain piece of software, you
may want to state that by adopting this software, the employees will be
more productive, communication among employees will be enhanced,
and the company will save money. Since this is a business presentation,
it is best to not say something too provocative. Remember that you
want the audience to be on your side and you want them to remember
your speech in a positive way.

SAQ
1. What are a few similarities between writing a speech and writing
an essay? What are a few differences?
2. What are a few things a speaker can do to gain credibility?
3. Why is it important to know the demographics of the audience?
4. What are a few ways to write a good opening for your speech?
5. Why do you think it is a good idea to use a prediction for the
concluding statement?

163
Fill in the Blank

Using the vocabulary, fill in the blanks with the best word for each
sentence. The first one has been done for you.

1. Rather than to avoid making people upset, he made a


provocative claim to get attention.

2. Facts and figures, such as the amount of food an average person


eats a year, are called .

3. Because she only had a little time and could not show an entire
film, Layla showed a ____________________ of a film in her
speech.

4. Commercials that only give facts or information are meant to


______________________ people.

5. Other commercials __________________________ people to


buy something by showing what the product can do.

6. Samed’s speech was excellent; each __________________ in


his presentation showed images that went well with the speech.

7. Hana had a lot of _________________________. Her


knowledge made people trust her immediately.

8. Everyone listening to the speaker was silent; his


______________________ wanted to hear what he said next.

9. A ___________________________________ is often used to


make a point rather than to get an answer.

10. Zainab used a ______________________ from a famous


hockey player, Wayne Gretzky, who said, “You miss one
hundred percent of the shots you don’t take.” In other words, if
you don’t try, you won’t succeed.

164
Try it Out! Ideas for Speech

Below are 8 sample ideas for a speech. For each idea, answer a few
questions about them:
 Who is the intended audience for each idea (managers, customers,
employees, CEOs/CFOs/CIOs)? Why do you think?
 Is the purpose of each speech to inform or to persuade? How do
you know?
 What would be a good idea for an opening for each idea? What is
a good concluding statement?

1. How to get the most from employees


2. Reasons for switching software to a newer system
3. Tips on excellent customer service
4. Three simple ways to increase profit over the next quarter
5. The importance of ergonomics (study of furniture and machines that
help people work efficiently and safely) in the office
6. Why Product X is better to buy than a competitor’s Product Y
7. Why switch to making products with environmentally friendly
materials
8. Explaining new safety protocols (rules for how to do something) on
the production line

Presentation Phrases
Because most multinational business is typically done in English, it is
also important to know what to say when presenting in English. Here
are a few phrases you can use in presentations:

1. Introducing a topic
My subject today is…
I’d like to talk to you about…
I’m going to discuss…

2. Outlining the presentation


There are several parts to my presentation.
First, I’d like to introduce…
Secondly, I’ll talk about…
Next, I wish to discuss…

165
Then, I’ll cover…
And last of all, I want to…

3. Introducing new information


Here’s some basic information about…
Let me add …
Let’s look now at…

4. Moving on to another reason


Turning to…
Let’s move on to look at…

5. Summing up the presentation


So the major points are…
To reiterate (repeat), I’ve talked about…

6. Ending the presentation


To conclude, I want to tell you about our future plans…
Thanks so much for your attention, and I’d like to open the floor
for questions and discussion…

Do you know any other phrases that would be useful for these
purposes? Add some phrases of your own to each of the sets of phrases
listed above.

Reading: Common errors in presentations

Even experts who are comfortable with


speaking in front of people make a few
mistakes in presentations. Here are 11 of the
most common mistakes you might make
and a few tips on how to fix them.

1. Reading the slides to your audience


This is one of the most common
mistakes people make when doing a
presentation. Your speech is already in a format to read, so why not
read it? First, your audience is also reading it, so reading it to them will
make them bored. Second, when you are looking at your slides, you are

166
not looking at your audience. This tells them that you as a speaker are
not interested in them, and they will pay less attention to you and your
speech.
Fixes for this:
a. Make your slides simple with little to no text. This removes the
temptation to read to your audience. It also gives you things to
add that they don’t know about.
b. Practice and memorize (remember) your speech topics and
facts. By doing this before speaking, you will not need to read
your slides. It also makes you look like an expert, giving you
more credibility.

2. Reading the speech to their audience from a paper


This is also very common. Even if your slides look good and have
little text, many speakers will write their entire speech as an essay and
read it. Again, this keeps the speaker from looking at their audience.
Fixes for this:
a. Practice your speech beforehand. By knowing most of your
speech and its subject already, you won’t need to read as much,
and you can look at your audience more.
b. Use note cards. Unlike writing an essay, notes can be simple
reminders, a sentence long or even a sentence fragment. All you
want these to do is to remind you what comes next. Remember,
you are the expert, and the less time you are reading notes, the
more you look like the expert that you are.

3. Too many words on the slide


Many times, we want to write our entire speech on the presentation
slides. While you are speaking, however, your audience is reading the
text and not paying attention to you.
Fixes for this:
a. Keep slides simple. Include very little text and use pictures and
graphs to say what you want to say. Remember the quote, “A
picture is worth a thousand words.”
b. If you need to use more text, break it up by using something
like simple and quick animations in PowerPoint. For each point
you wish to make, include a few lines, not moving to the next
point until you are done talking about it. This way, you control
the pace of the presentation.

167
4. Difficult to hear the speaker
This issue is especially true for people who don’t like to speak
loudly, or for those who are shy. While people near the speaker can
hear them, anyone in the back of a larger room has a difficult time
hearing what the speaker has to say. Remember, you will not always
have a microphone!
Fix for this:
a. Practice speaking in the room with a friend. Know the place
you will be making your presentation. Before your speech, have
a friend go the back of the room and try speaking. If your friend
cannot hear you, you are not loud enough. If they can hear you
well, you are fine.
b. Pretend you are speaking in a crowded room and must talk
louder than everyone else.

5. Pictures on the slide are blurry or stretched out


When you see a picture you like, it is easy to make it fit your slide.
However, a blurry or stretched slide is distracting. Many times, people
will pay attention to it rather than you or your words.
Fixes for this:
a. Make sure your photo is large enough. For a PowerPoint
presentation, get at least photos of 600 pixels, large enough to
place anywhere on your slide. While a big picture can shrink
and look good, it is impossible to make a small picture bigger
and make it look good.
b. Cut a photo rather than stretching it. If a photo is too wide, cut
it.

6. Difficult to read words on slides


This one is more common than you may think. You found a really
good picture, but words you put on top of the picture are hard for the
audience to read.
Fixes for this:
a. Make sure the font color of the words contrasts with the picture.
This makes the words easier to read. For example, if your
picture has bright colors, make sure your font is a darker color.
If your picture is darker, use brighter colors for the words.

168
b. Put the picture on one side and words on the other. This is the
most effective way to make sure your audience can read your
words.

7. Speech is too short or too long


Many times, in class or in business, there is a time limit on how
long or short you can speak. Speakers who are nervous tend to be too
short so that their part can be over more quickly; or longer, since they
are pausing a lot to think about what they want to say next.
Fix for this:
a. Rehearse and time your speech. The more you practice, the less
you will stop.
b. Use note cards with brief notes to help you remember what you
need to say next. Speeches that are just right make you look like
an expert, increasing your credibility.

8. Speaker is moving around a lot


Many times, speakers will move back and forth. This tells the
audience that the speaker is nervous, and they will focus on this and
not your speech.
Fixes for this:
a. Move your feet until you are comfortable. A lot of the time,
speakers move back and forth because they are not comfortable
and become tired when standing. Set your feet apart a little so
that you can stand comfortably for a longer time. Try it out by
yourself and note where your feet are when you are
comfortable.
b. Use your hands for gestures. If there is an interesting statistic
on a slide that you want your audience to see, point it out.

9. Speaker leans on something


This is also very common. Many times, a speaker wants to lean on
something like a podium or table for support. However, this looks
informal and it can get uncomfortable for the speaker.
Fix for this:
a. Pretend there is nothing to lean on. If there is nothing to lean
on, then you cannot lean.

169
b. Practice speaking without something to lean on. This will get
you more accustomed to not leaning. Have a friend watch you
and point out if you do it.

10. Slides are too “busy”


When there is a lot on your slides, they are hard to read. This can
be because you have too many words, graphs, or pictures on your slide
at once. Your audience will look at these and not listen to you.
Fix for this:
a. Keep the slides simple. Have only one graph or picture per
slide. That way, there isn’t too much to distract your audience.
b. Control what is seen with simple, quick animations. By having
items come on the screen only after you click on them, you have
control over what the audience sees and when they see it.

11. Too many slides


You want to keep the slides simple, but there is so much to say!
How many slides should you have?
Fix for this:
a. Only include important information on each slide.
b. Keep information to topic sentences only and tell the
audience the rest through your words not your slides.

Most of these can be fixed by practicing in front of another person.


Sometimes, it takes another person to see what we cannot see
ourselves. Have them point out any errors. This way, you will be more
aware of your errors and be able to fix them.

SAQ
1. Why is it important not to read your speech from slides or from a
paper?
2. Which of the above errors do you think is most important for you
to consider when you make a presentation?
3. Which of the above fixes do you think is best? Can you think of
any others?

170
TED Talks Presentation Examples

Using what you know about presentations,


try watching the following TED talks (no
more than 5 minutes each). Each of these
contains captions (subtitles). Answer the
following questions for each video:

1. How did the presenter start the speech? Did they use a story, a joke,
or a statistic?
2. Did the presenter preview their speech? Did they tell you what the
speech will cover?
3. Did the presenter use statistics or quotes in their speech? Did they
make you pay attention? Why or why not?
4. Were the slides simple or complex? Were the pictures effective?
5. Did the presenter ask a rhetorical question? Could they answer the
question?
6. Did the presenter move around a lot?
7. Did the presenter make you think about the topic after the speech
was over? Why or why not?
8. What else did you like or dislike about the presenters and their
styles?

These 10 tech tips are useful for smartphones and computers.


<https://www.ted.com/talks/david_pogue_10_top_time_saving_tech_
tips>.

This video describes ways that the digital world and real world are
coming together.
<https://www.ted.com/talks/jinha_lee_a_tool_that_lets_you_touch_pi
xels>

171
Case Study: Customer Relationship Management
System

Imagine that you are the IT director for a company. Your


company is considering purchasing a license for a Customer
Relationship Management system. Read the below information about
CRM systems, written by Jaffa Net, a Palestine-based software
development company that implements software solutions for the
financial, government, and telecommunications sectors, among others.
Once you have read the information about CRM systems, you
will need to make a presentation to either recommend your company
to adopt or not adopt a CRM system.

Customer Relationship Management Systems

A Customer Relationship Management (CRM) system is a


strategy and an approach that compiles data from a range of different
communication channels about the customer’s history, their personal
information, how to contact them, as well as organizing all
correspondence, purchase order, payments, invoices and complaints. It
manages the organizations’ relationships and interactions with current
and potential customers. It is mainly used by companies so they can
have a deep understanding of their customers.
CRM includes any kind of business, whether it is a small
company, different shops, retailers, wholesalers, government
institutions or a whole country. Even though it is based on the
relationship with the customers, CRM system is flexible so you can add
any sort of data concerning the company’s activities, such as products,
inventory and provided services.
Through using this system, customers’ data cannot be lost,
which in turn will help the marketing and sales department in
measuring the performance of each marketing and advertising
campaign
Not to mention, cash flow and future sales can be predicted, so
it helps in arranging the company’s financial budget throughout the
year, and knowing when the money will be available for purchases ,and
when the money should be saved for marketing and advertising
campaigns and when is the best time for creating promotional
campaigns to increase sales levels .

172
CRM applications were only known in the 1990s, initially
dominated by large, rich companies with huge budgets who were able
to invest in computers and programming applications. With the
development of computers and the spread of free open source
applications, the situation is changing for the better. The CRM system
is now available for start-ups and companies; free of charge or for a
simple monthly subscription.

The importance of CRM software is:


The Organizing Aspect:
Everything you do for the customer and every interaction your
customer takes must be documented, saved and available when needed.
Therefore, you need an effective program that can measure, classify
and make data available with a simple click and CRM system can
perform all of these tasks.

The Education Aspect:


A CRM application can provide you with deep and detailed
statistics about your customers, their interests, what they usually buy,
their price range, etc. so you can anticipate their needs in advance.
Thus, a well-managed CRM program will allow you to choose your
potential customers more accurately and allow you to launch new
products and other promotion campaigns

Communication Aspect:
With CRM help, any employee can have access to the same
customer information. So, if the employees changed or the customers’
contact point changed, the new employees will not start from the
bottom; in fact, they will have full access to all customers’ information.
Moreover, CRM relies on cloud storage, which means it can be
accessed from any internet-connected device.

Customer Service Aspect:


If the customer encounters a problem and comes to you for a
solution, CRM can help you solve the problem more quickly and
efficiently. Once the customer contacts the company, the employee will
be able to access all the customer's information and past transactions,
including purchases, preferences, addresses, phone number, etc.

173
Daily Tasks Aspect:
There are many daily and routine tasks that follow the sales
process, such as filling out forms, submitting reports, legal issues, etc.
If done manually, it may take a long time, but using a CRM system will
help employees to use automated programs that will take care of these
tasks so they can focus on more enriching tasks, such as meeting the
potential customers’ needs.

Improved Analytical Reports:


Since all data and information are stored in CRM systems, it is
much easier to analyze large amounts of data because data can be sorted
in any form. In addition, you can automatically create reports by
choosing different tools.
CRM helps you manage your business successfully by knowing
and communicating with your customers. One point to remember is
that you should provide your employees with detailed training for your
organization's CRM system so they can get the most out of it.

Next, make your presentation to persuade your boss to either adopt or


not adopt a CRM system. Remember the information and tips you
learned earlier in this unit!

174
Vocabulary Practice: Crossword Puzzle

Complete the crossword puzzle using the clues below.

Across
2. a short part of a video
5. a series of words or phrases taken from what someone else said
or wrote
6. to cause someone to do or believe something by giving them
good reasons for it
7. to give someone facts or information
8. a collection, analysis, and presentation of information
9. a question asked to make a point rather than to get an answer
10. a group of people listening to or watching something

Down
1. an image shown on a large screen
3. causing a strong reaction on purpose to get attention
4. the fact that someone can be believed or trusted

175
English for Technology

Unit 10: Computer Ethics

Table of Contents

Preface
Goals of the Unit
Learning Outcomes
Warm-Up Activity: What is ethical and what is not?
Reading: The Ten Rules of Computer Ethics
Vocabulary
SAQ
Matching
Short Response
Research Essay

176
Preface
In this unit, you will learn about ethical considerations when
using computers. You will read a list of 10 recommended rules of
computer ethics, published by the Computer Ethics Institute. You will
also learn vocabulary related to computer ethics. Lastly, you will write
a research essay on ethics violators.

Goals of the Unit


 To learn vocabulary related to computer ethics
 To understand issues related to computer ethics
 To understand ramifications of computer ethics in everyday life
 To write a research essay on ethics violators

Learning Outcomes
By the end of this unit, students should be able to:
 Remember vocabulary related to computer ethics
 Understand the 10 rules of computer ethics from the Computer
Ethics Institute
 Apply concepts of computer ethics to real-life situations
 Write a research essay on ethics violators

177
Unit 10: Computer Ethics

Warm-Up Activity: What is ethical and what is not?


Before starting with this unit, let’s do a little warm-up. Discuss the
following questions with a partner or a small group.

1. Did you ever download a movie or a song from the web? If so, did
you pay for it? If it was free, would you consider your download as
stealing (often called “piracy”)? Why or why not?
2. On social media, how often do you read posts in which people fight
with or are mean to others? What do they usually fight about? Does
anybody win these fights?
3. Is an employee who takes emails and/or files (like photos and
documents) from a company and posts them in a chat room for the
general public to see a hero or a thief? Would it matter if the
information taken shows a crime? What if the emails and files
belonged not to a company but to a private individual, like a
colleague? How would that affect your evaluation of the
employee’s character?

178
Reading: The Ten Rules of Computer Ethics

Read through the vocabulary words below, which are related to


computer ethics. You might know some of the words already. Which
words are you familiar with, and which are new? Put a check mark (✔)
next to the ones you need to learn (that is, the ones that you don’t know
yet).

General Vocabulary
1. appropriate (verb): to use or steal without permission
2. consent: allowing permission
3. consequences: results; things that happen as a result of a previous
action
4. copyright infringement: to use somebody's content without
proper permission
5. dependent: decided or controlled by something else
6. encounter: to meet or come across
7. ethics: a branch of philosophy that addresses questions about
morality (what is right and wrong)
8. intellectual property: creative work, designs, or products invented
by a person (or people) who then have exclusive rights to use or to
license the use of the material
9. proprietary: like property, a description of something owned and
controlled
10. reputation: the common opinion about someone or something
11. ruined: damaged or destroyed
12. snoop: to search for private information without permission
13. social engineering: a broad term for any online or offline technique
that uses deception to trick people into giving out confidential
information
14. tedious: boring, repetitive, or slow or long
15. violation: breaking a rule

IT Vocabulary
1. CEI (Computer Ethics Institute): a nonprofit research, education,
and public policy organization focused on the issues, dilemmas,
and challenges of advancing information technology within ethical
frameworks

179
2. cracking: criminal hacking; exploiting security holes to gain
unauthorized access to computer systems
3. Internet privacy: general techniques and technologies used to
protect sensitive data, communications, and preferences
4. open-source: software that is free to use and whose code can be
freely distributed and changed
5. phishing: obtaining sensitive information through a deceptive
email campaign, while pretending to be a trusted person or business
6. photoshopping: digitally transforming or altering a photograph in
order to misrepresent the original
7. privacy policy: a statement or a legal document that discloses the
ways an organization gathers, uses, and stores the end user's data.

The text below is adapted from The Ten Commandments of Computer


Ethics, from the Computer Ethics Institute
<http://computerethicsinstitute.org/publications/tencommandments.ht
ml>

Listening Link 1

Ethics is a branch of philosophy that deals with determining


what is right and wrong. Listed below are 10 rules to help you
understand computer ethics. Anyone working in the field of IT is going
to encounter a lot of ethical problems. Why? Because computers are
very powerful and IT professionals are like wizards controlling this
technology. Non-technical people are increasingly dependent and
trust information technology. If the next 20 years is anything like the
last 20 years, the future is very bright for IT workers. This is why IT
professionals need to study and practice computer ethics.
People rely on computers to handle the more tedious details of
their social, business, and financial lives. Imagine what would happen
if an enemy or a business competitor got access to your email account,
bank account, Facebook profile, and company website? They could
destroy your reputation in a matter of hours. This is why we need to
study Computer Ethics.
The idea of Computer Ethics was invented in 1950 by MIT
professor Norbert Weiner. Norbert predicted that the world would
undergo “a second industrial revolution” — an “automatic age” with
“enormous potential for good and for evil.” Today we live in that

180
world! Why did he say this? Airplane drones can bomb a target while
the pilot is safe in a computer room thousands of miles away. Criminals
can use phishing and other social engineering techniques to steal your
financial information while sitting safely in another country.
Companies can create confusing privacy policies to gather and use
information about you without your knowledge or consent.
Governments can block access to information using firewalls. These
are all very serious ethical violations that happen every day.
The main concerns of computer ethics are: Internet
privacy, cracking, copyright infringement, and Internet control.
The Computer Ethics Institute (CEI) has laid these 10 rules down for
people to follow.

Rule #1: Do not use a computer to harm other people.


You should not program a computer to do dangerous things to people.
A few examples are programming a robot to kill people, make viruses,
or weapons of mass destruction. What this means is that computers are
not an excuse to do bad things to people. The programmer is
responsible for the actions of his or her programs.

Rule #2: Do not interfere with other people's computer work.


Everyone has the right to use computers. Likewise creating a computer
virus is wrong because it wastes people’s time and money and destroys
potentially valuable property.

Rule #3: Do not snoop around in other people's computer files.


It is illegal to open and read someone's real physical mail, and it is also
illegal to snoop on network connections and read someone’s email,
passwords, files, databases, etc.

Rule #4: Do not use a computer to steal.


This one is obvious. Stealing is just as bad with a computer or without
one. Use your IT powers for good!

Rule #5: Do not use a computer to bear false witness.


This rule means that you shouldn’t use a computer to create false facts,
such as photoshopping a picture to make an innocent man look guilty.
Perhaps another equally important rule should be, “Don’t believe
everything you see on the Internet”. Just like in traditional media, it is

181
a common practice to spread half-truths, exaggerations, lies, and
rumors on the Internet. This is wrong.

Rule #6: Do not copy or use proprietary software for which you
have not paid.
Think about how hard it is to write good software. Think about all the
people and costs involved. You have two choices: 1) buy a license or
2) find an open-source alternative. Using pirated software is not only
unethical, but it is also dangerous because of possible hidden malware.

Rule #7: Do not use other people's computer resources without


authorization or proper compensation.
Is it ethical to use a neighbor’s lawn mower or mixer without telling
them? What about their Internet connection? No, it isn’t! Is it legal or
ethical to do bad things on a computer while logged in as someone else?
No, it isn’t! Don’t do it!

Rule #8: Do not appropriate other people's intellectual property.


If you copy text or images from a website and post them on your own
website it is a crime in most countries, as it is considered as unethical.
Why? You are causing irreparable damage to the creator of the content.
Remember how hard it is to write a paper. Do you want someone else
to take the credit for something you wrote? Of course not! Why not
create your own unique and original content instead? You will be much
happier in the long run creating new things that you can say that you
did. These will make you look good and feel accomplished too.

Rule #9: Think about the social consequences of the program you
are writing or the system you are designing.
Do you write software that helps people to steal, kill, spy, gamble, or
spread pornography? If so, please ask yourself why. Is there a way you
can use your IT talents for good purposes? Wouldn’t the world be a
better place if everyone was engaged in positive behavior instead of
negative behavior? Think about it!

Rule #10: Always use a computer in ways that ensure consideration


and respect for your fellow humans.
Things that you do ‘online’ can have real effects in your ‘offline’ life
as well. Perhaps Mark Zuckerberg, the founder of Facebook, said it

182
best, “Having two identities for yourself is an example of a lack of
integrity."

That was a brief introduction to Computer Ethics. You should continue


to think about ethical questions throughout your IT career. Your career
and maybe even your life can be ruined by making the wrong ethical
decisions.

SAQ
1. What is intellectual property?
2. What is the difference between proprietary and open-source
software?
3. What is ethics?
4. How can a privacy policy be used against people?

183
Matching

Everyone wants to avoid being cheated online. Read each example of


an inappropriate use of computer technology on the left, and write the
name of the ethical violation it is from the list below. Note: three terms
from the list will not be used.

List of Ethical Violations


Appropriating Content, Cracking, Multiple Identity Use, Phishing,
Photoshopping, Privacy Policy Violation, Snooping.

Inappropriate Use Examples Ethical Violation Type

1. Basma copies an image of a


business owner from one photo
& pastes it into a picture of a jail
cell to hurt her competitor’s __________________________
reputation.

2. Salem receives an email from


[email protected]
with a subject “Final Notice:
Account Locked.” The email
contains a link with the words
“Click Immediately” and warns
him to change his password and
resubmit his credit card
information because his account __________________________
has been hacked.

184
3. Without consent of his
company or its clients, Anis, an
employee at CheapBuy, defies
the User Agreement and
publishes the names of clients he
does not like on social media
where he makes fun of the __________________________
products they buy.

4. Yezid works for Image Online


Analytics. As part of his job, he
created and uses 11 email
accounts to leave positive
feedback on clients’ business __________________________
websites.

5. Nadia runs a blog to advertise


her services as a tour guide.
Because she is a poor
photographer, Nadia often surfs
to the site Personal Travel Bug
Photos and takes copyrighted
images she finds there to __________________________
illustrate her posts.

185
Short Response

Following the examples in the previous exercise, create short scenarios


that illustrate each ethical violation listed.

Inappropriate Use Examples Ethical Violation Type

1.

Cracking

2.

Snooping

186
3.

Stealing Intellectual
Property

Research Essay

The first known computer hackers to be prosecuted were the


414s from Milwaukee, Wisconsin in 1983. They used modems to
randomly dial phone numbers and gain entrance into computer
systems. Today, there are news stories that occur almost weekly about
major computer crimes involving millions of people. Anyone who has
an email account likely receives daily phishing schemes in their junk
box. The problem appears endless, so it is good to understand those
who violate computer ethics so that you won’t be their next victim.

187
1. Use a search engine to pick two famous (infamous?) people who
used computer technology unethically. The two can be obvious
criminals (those who steal credit card information), whistle-blowers
(those who steal information to show an organization/government is
guilty of wrongdoing), or somewhere in-between (social media
influencers who alter their online images to improve their appearance).

2. Find at least 3 electronic sources of information (6 minimum) for


each person. Include at least two in-text citations in each body
paragraph.

3. Your essay should have 7 content paragraphs organized in the


following way.

• Paragraph 1: Introduction of essay (with thesis)

• Background of Violations (Objective information only, no


opinion)

Paragraph 2: Violations of person 1


Paragraph 3: Violations of person 2

• Effects of Violations (Objective information only, no opinion)

Paragraph 4: Effects of person 1’s actions on society


Paragraph 5: Effects of person 2’s actions on society

• Evaluation (Opinion)

Paragraph 6: Based on your research, which person


influenced society more?

• Paragraph 7: Conclusion of essay (with thesis restatement)

• Appendix (with photo and one paragraph biography of each


person)

188
4. Add a cover, an outline, and references pages.

5. If needed, copy the following prewriting tables using paper or a word


processor and fill them in with bullet points to get started.

Working Sources for Research Essay


Person 1

Person 2

Name Ethics Violations List Sources of


Information
(URL)

Person 1

Person 2

189
Name Effects on Society Sources of
Information
(URL)

Person 1

Person 2

Which effects are the most influential on society, and why? The effects
could be economic, political, social, or cultural.

Which effects caused the most issues, and why?

All in all, which person do you deem the most influential?

Name Biography Sources of


Information
(URL)

Person 1

Person 2

190
Create a one-sentence working thesis (include 2 people, “computer
ethical violations,” and which person is deemed the most influential).
Gather all quotations you plan to use into a single word file. Order the
quotations and clearly label each based on the body sections of the
essay. Include a citation with each quotation. This way, you have the
original text and the citations needed all in one place. You can choose
to paraphrase or create direct quotations from the information gathered
when it is time to write your essay.

Quotation Gathering - Categories

• Background of Violations

Paragraph 2: Violations of person 1

Quotation A:
Quotation B:

Paragraph 3: Violations of person 2

Quotation A:
Quotation B:

• Effects of Violations

Paragraph 4: Effects of person 1’s actions on society

Quotation A:
Quotation B:

Paragraph 5: Effects of person 2’s actions on society

Quotation A:
Quotation B:

• Evaluation (Opinion)

Quotation A:
Quotation B:

191
• Appendix Biographies

Person 1:
Quotation A:
Quotation B:
Image Source:

Person 2:
Quotation A:
Quotation B:
Image Source:

Quotation Gathering - Example

• Background of Violations

Paragraph 2: Violations of Jane Hanersly

Quotation A: “Hanersly was accused by the New Jersey


federal prosecutor of 13 counts of computer fraud for selling
contact information for of Hunter Bank customers in 1998”
(Smith, 2010).

Quotation B: In 2014, Hanersly again was on trial for three


counts of conspiracy to access a computer without
authorization” (Williams-Daye, 2017).

Note: Having more than two quotations for each item is permissible
and encouraged.

192
Sample Appendix

Appendix

Biographies of Computer Ethics Violators

Figure 1. Image of Jane Trusk


Jane Trusk (2011) on the cover of Hacker Today!

Biography of Jane Trusk

Jane Trusk was born in Williamsburg, VA, on December 12,


1970. After graduating from Yale in 1995 with a degree in Computer
Logistics, Trusk started the hacker group Bilbury695. The 695s
undertook the notorious Hunter Bank hack which earned Trusk a six
year prison sentence (Hampton, 2011). After being released from
prison in 2008, Trusk started the Computer Integrity Foundation
whose mission is “To help at-risk youth in urban centers by training
them in computer coding skills” (Pere, 2014). Trusk served on the
board of directors of several non-profits, including Art America and
Tech for Everyone, and was a contributing editor to Wifi Magazine

193
for five years before dying tragically in a water skiing accident in
Lake Tahoe in 2018 (Wilbur, 2019).

Figure 2. Image of Ellington Snoop

Ellington Snoop (2006) in publicity photo with LED mask.

Biography of Ellington Snoop

[Add text]

194
English for Technology

Unit 11: Innovative Technologies

Table of Contents

Preface
Goals of the Unit
Learning Outcomes
Warm-Up Activity: Discussion
Reading: Video Games
Vocabulary
SAQ
Fill in the Blank
Matching
Pair work
Reading: Emerging Technologies
Vocabulary
SAQ
Discussion
Dialogue
Debate
Vocabulary Quiz
Writing

195
Preface
In this unit, you will learn about innovative technologies,
including technologies related to video games as well as emerging
technologies such as virtual reality and augmented reality. The unit will
focus on ways that digital entertainment can be used for learning and
professional development, and the impact and reciprocal differences
between virtual reality and augmented reality. You will learn
vocabulary related to these topics, and you will have chances to use
this vocabulary in discussions and debates with classmates. Lastly, you
will try to come up with an idea for a new game and possible ways to
integrate virtual and augmented reality.

Goals of the Unit


 To learn vocabulary related to video games, virtual reality, and
augmented reality
 To have discussions and debates about video games, virtual
reality, and augmented reality, particularly how digital
entertainment
 To learn how digital entertainment can be used for learning and
professional development
 To write a plan for a new video game design

Learning Outcomes
By the end of this unit, students should be able to:
 Remember vocabulary related to video games, virtual reality,
and augmented reality
 Use the vocabulary in discussions and debates about these
topics
 Understand ways that digital entertainment can be used for
learning and professional development
 Write a plan for a new video game design

196
Unit 11: Innovative Technologies

Warm-Up Activity: Discussion

Before starting with this unit content, let’s do a little warm-up. Discuss
the following questions with a partner or a small group.

1. Do you play video games?


2. Which video games do you like the most?
3. Do you know the difference between augmented reality and virtual
reality?

197
Reading: Video Games

Read through the vocabulary below, which are related to some basic
concepts and terms about video games. You might know some of the
words already. Which words are you familiar with, and which are new?
Put a check mark (✔) next to the ones you need to learn (that is, the
ones that you don’t know yet).

General Vocabulary
1. emerge: to become known or important
2. enjoyment: a feeling of pleasure, satisfaction, and joy.
3. escapism: a distraction from everyday life issues and concerns.
4. humankind: the human race as a whole; all human beings.
5. multi-faceted: something that has multiple aspects and elements to
consider.

Game Vocabulary
1. aesthetics: the visual component of a videogame, from art styles to
graphics.
2. arcade cabinet: a stand-alone game machine with just one game
installed. They were popular in the Seventies and Eighties.
3. BattleRoyale: online video games where a high number of players
(or small teams) compete against each other. The winner is the last
who remains in the game.
4. MOBA (multiplayer online battle arena): online strategy games
in which two teams compete. Each player controls a hero with the
support of other characters.
5. character: virtual actors with which players can interact (also
known as non-player characters).

198
6. eSports: competitions based on video games.
7. first person shooter: video games based on a) a first-person
perspective and b) a gameplay based on shooting virtual characters.
8. game console: a home device designed to run video games.
9. gameplay: the interactive system of a videogame.
10. genre: a category of video games that share similar characteristics.
11. heuristic: a winning strategy for mastering a videogame.
12. controller: an input device based on an array of buttons (also
known as a gamepad).
13. joystick: an input device based on a stick and a limited number of
buttons.
14. levels: units of time/space through which a videogame is structured
15. mechanics: the basic rules of a videogame.
16. role-playing game (RPG): video games where players improve
their avatar throughout in terms of skills and abilities.
17. serious games: a game that is not meant for entertainment (e.g., for
use in industries such as education, science, health care,
engineering, etc.)
18. story: sequence of meaningful events, from a beginning to an
ending.
19. strategy game: video games where players have to control
different entities and deal with a variety of resources for winning.

Games are as old as humankind. When we are very young, we


learn by playing. When we are older, we keep playing for enjoyment
and even professional development. Video games harness technology
to make use of the power of games, and are the leading sector of current
entertainment in terms of revenues and innovation. People play video
games at home or while they are traveling, alone or with others, for
having fun or for learning something new. The first video games (such
as Space Invaders or Pac Man) started to be published in the 1970s,
while the rise of internet and mobile devices have made the sector more
multi-faceted and rich.
Over time, video games have changed a lot. We moved from few
pixels and simple game mechanics to sophisticated game settings with
complex rules and dynamics. The number of devices that can host and
run video games has increased as well. Now you can play on your
computer, on a game console, or even on your smartphone.

199
Despite this variety, video games tend to share some elements with
each other. For instance, they tend to be structured in levels, have
specific goals, suggest heuristics and best practices, and require some
sort of abilities or skills to be mastered. Some video games have a
story, different characters, involving aesthetics, and an accessible
user interface. The input system is a further element that drastically
evolved in the past years. In the 1970s and 1980s, joysticks were very
popular in video game arcade cabinets. Since then, controllers have
become the standards for game consoles like PlayStation and X-Box
One. However, mobile games are also played via touchscreen on
smartphones and tablets. Finally, computers are still very popular game
machines due to their performances, which tend to be more powerful
than stand-alone game consoles’ ones.
Game genres are several as well. Some like first-person shooters
and action games rely on reflexes and dexterity skills, while others like
strategy and role-playing games require critical thinking and
planning. Sometimes the gameplay can include elements from different
genres.
In the last twenty years, novel ways to develop video games have
emerged. Independent video games are developed by teams that are
smaller than usual. Indeed, developing a videogame may require a
hundred people and a lot of money! However, now tools like Unity3D
and Unreal Engine are free and they provide a good start. Serious and
educational games are titles designed to address topics and themes
beyond mere escapism, trying to teach something new or provide
alternative perspectives and viewpoints. Indeed, trying & failing
represents an effective learning process that video games may easily
embrace and support. Newsgames are games used by journalists and
newspapers for conveying information in engaging and interesting
ways.
Recent video games often have an online component, and you may
have heard of the phenomenon of eSports. A lot of people enjoy
watching others playing on platforms like Twitch.tv or Mixer. This has
entailed the establishment of new genres, like MOBAs and
BattleRoyale games.

200
SAQ
1. What is a videogame?
2. How have video games changed through time?
3. Are all video games just for fun?

Fill in the Blank

Choose the word from the box that best fits each blank.

1. Recent games have very complex game _____________ in


comparison with old ones.
2. I cannot beat this_____________ , it is too difficult!
3. These two games share the same _____________, which is one of
my favorites!
4. When I was younger I spent hours on _____________.
5. _____________ are becoming very popular all around the world,
with a million viewers for a single online match!

story MOBA controller


heuristic genre mechanics
arcade cabinets level joystick
gameplay character eSports

201
Matching

Associate the terms on the left with the pictures on the right. One term
can be associated with more than one picture.

Controller

Mobile gaming

Joystick

Seventies

Game console

Then, comment and discuss your choices in pairs or small groups.

202
Pair work

Video games are increasingly used for a variety of goals and purposes.
Some are designed to be entertaining, while others aim to trigger
reflection and discussion. Specific genres like FPS are often accused of
having negative influences on young people, while others depict
themes and topics like empathy and friendship. As in any creative
sector, digital entertainment is characterized by different instances and
orientations.
Now, look at the prompts below and try to answer them with a partner.

1. Are all video games violent? Can you give some examples of video
games that you consider negative for players?
2. Can video games be educational? Try to think of some examples
even searching online.
3. What was the first videogame that you played? Can you remember
where and with whom you played it?
4. What is your opinion about online games? Have you ever played
them?
5. In a videogame, what is the aspect (e.g. story, gameplay) that
interests you the most?

203
Reading: Emerging Technologies

Read through the vocabulary below, which are


related to emerging technologies. You might
know some of the words already. Which words
are you familiar with, and which are new? Put
a check mark (✔) next to the ones you need to
learn (that is, the ones that you don’t know
yet).

General Vocabulary
1. habit: a behavior that is repeated through time.
2. mimic: to replicate, copy, or emulate someone or something.
3. turnover: an ongoing change.

IT Vocabulary
1. augmented reality (AR): adding digital elements to reality
2. embodied interaction: being involved with technology with your
whole body.
3. fidelity: the realism that emergent technologies can communicate
4. geolocation: ability to collect the current spatial location of a
device.
5. head-mounted display (HMD): devices placed around users’
heads that support virtual and augmented reality experiences.
6. hologram: digital character/object within a real environment.
7. hotspot: a point of interest in an augmented reality setting.
8. immersion: the feeling of losing yourself within virtual
environments.
9. MMO: this acronym stands for Massive Multiplayer Online,
pointing to virtual environments with several users interacting
simultaneously.
10. virtual reality (VR): a digital setting that tries to be an alternative
of the real one.

204
Emerging technologies can be defined as innovations that show
potential in improving society and our everyday life. There is a
significant turnover of groundbreaking innovations that seem to
change our life. Some reach this goal, impacting our routines and
habits; others are forgotten, or their scope is narrowed. Technology
itself changes fast with effects that are not so easy to envision; think
about Google Glasses, which were supposed to
Among the most recent, virtual reality (VR) and augmented
reality (AR) are here to stay. With virtual reality, we refer to a
technology mediated setting that defers from the real one. Think about
the virtual environments of MMOs, which follow rules and dynamics
that are different than what we expect. Otherwise, head-mounted
displays (think about Oculus Rift or PlayStation VR) involve users’
senses in novel ways, pushing immersion via technology beyond. The
concept of immersion itself is indeed crucial in virtual reality – with
this term, we refer to the feeling to “lose yourself” during an
experience. Reaching this state is tendentially a desired effect because
it means that the artificial space is engaging enough to forget what is
around. Another important parameter is the fidelity of a virtual
environment – how much real it appears. As you can imagine,
developing a virtual world that mimics the real one is important in
terms of engagement and enjoyment. For both immersion and fidelity,
involving as many senses as possible seems supportive due to the idea
of embodied interaction. However, at the beginning these
technologies may foster motion sickness, which is a feeling of
displeasure due to such a sensorial involvement.
Augmented Reality may sound similar to VR but it is actually quite
different. Rather than building a fictional setting, it aims to augment
and enrich our reality “here and now”. In other words, augmented
reality tools add elements to what is in front of our eyes. Think about
mobile apps like Pokémon Go and Ingress that rely on geolocation for
providing real time information on smartphones according to users’
location (often called hotspots). Mobile AR can provide instant
feedback with interesting implications for learning, tourism, and
marketing.
Otherwise, holograms are a further example of AR. The idea is to
let something new emerge within targeted environments through
headsets like Hololens and Magic Leap. Users can add and play with
augmented characters and layers. Think about movies and tv shows like

205
Star Trek and Minority Report, and you would have an idea! However,
mobile technologies represent the most popular AR platforms due to
their accessibility and cost.
Both VR and AR are becoming cheaper in comparison with the
past. Devices like Oculus Go and Google Cardboard are increasingly
accessible, while the number of apps and software developed for
exploiting these technology increases every single day.

SAQ
1. What is the difference between
augmented reality and virtual reality?
2. What is the difference between
immersion and fidelity?
3. What is an emergent technology? Try
to make an example beyond virtual
reality and augmented reality.

Discussion
Together with a partner or in a small group, discuss the following
questions about your experiences with emergent technologies.

1. Have you ever tried Virtual Reality or Augmented Reality tools?


How was your experience?
2. Think about your childhood. Do you remember a novel technology
back then that ended up changing your life?
3. Make an example of an emergent technology beyond virtual reality
and augmented reality that is going to change our future.

206
Dialogue

In the following dialogue, Tamara and Anis are two friends discussing
about video games and technologies.

Listening Link 1

Tamara: Good morning, Anis!


Where are you going in such a
hurry?
Anis: Hi Tamara! I’ve been waiting
for this day for a long time! I am
going to get my copy of a new
video game that’s being released
today, SoccerSimulation!
Tamara: I’ve heard of that. I heard it has beautiful graphics and is
really lifelike…it’s just like playing soccer for real!
Anis: Yeah, and the game mechanics are quite complex and you can
try different heuristics during the same match! Its gameplay is a
perfect combination of realism and engagement!
Tamara: That sounds great, but does it have a multiplayer mode that
you can play online? If so, I’m sure it will be an eSports hit.
Anis: Hmm… good question. I’m not sure actually. But I am positive
that there is a VR mode that you can access if you have a head
mounted display. The reviews I read online said it is really
immersive, but at the beginning it may be a bit disorienting.
Tamara: You mean that you can get motion
sickness? I tried one of those head mounted
displays, and the fidelity is incredible but it is a
little odd to move and look around like that.
Anis: Yes, but I think once you get used to it, it’s not
a big deal in the long term. You know, any new
technology requires a little bit of training and patience.
Tamara: I agree. Hey, I’d like to try out SoccerSimulation too. We
should have a playdate soon. What do you think?
Anis: Yes, we should! I recently got two new controllers, so we can
play together!
Tamara: Looking forward to it!

207
Debate
Virtual reality and augmented reality seem the two sides of the
same coin. They are characterized by specific pros and cons. For
instance, the former builds brand new environments that may isolate
users; the latter harnesses our “here
and now”, but it can distract us from
what is concretely happening with
possible safety risks.
In this debate, you will work
with another student or in a small
group to answer the question Is
virtual reality more engaging than
augmented reality? One person (or
one group) will argue for the
“Virtual reality” option, and the
other person (or group) will argue for the “Augmented Reality” one.
Each person/group should present the reasons and conditions that
motivate your preference. In your argument, you can also address the
reasons that the other person or group is incorrect.
For ideas, you may want to look at Reading 2 again to make some
notes.

Vocabulary Quiz

Choose the best definition for each of the words below.

1) embodied interaction
d. A gameplay that relies on strategic thinking.
e. Online interactions characterized by positive attitudes.
f. The involvement of the whole body with interactive
technologies.

2) geolocation
d. A technological feature that locates a device in space.
e. A technological feature that stores content on cloud platforms
by default.
f. An emergent technology that is getting widespread.

208
3) MMO
d. Massive online environments with several users.
e. eSports related events with a focus on FPSs.
f. The mobile version of AR.

4) hotspot
d. A head mounted display hosting AR applications.
e. A store where you can buy video games.
f. A place of interest in an AR experience.

5) eSports
d. Competitions based on creating the most realistic VR
environment.
e. Competitions based on video games.
f. Competitions based on finding AR elements all around the
players.

Writing

Imagine that you are an aspiring game designer and that you have
enough resources for producing a videogame. You are asked to write
down the main elements of your game, from main goals to leading
rules. In addition, you have to envision possible ways to add VR and
AR elements to your project. Follow the outline below for structuring
your game development plan:

209
1. Name of game
2. Main goal (what are the players supposed to do?)
3. Structure (e.g., levels).
4. Story and relevant characters.
5. Main mechanics and heuristics shaping the game (e.g., what is its
genre?).
6. Targeted device (e.g., is it for mobile?)
7. Audience (e.g., who are you targeting? Kids? Adults? Expert
gamers?).
8. Online and augmented/virtual reality components (is it possible to
play the game online and how? Are there opportunities to engage
with AR/VR instances in the game? If yes, can you explain?).

When you have answered all these questions, share your project with
the class provide constructive feedback for the future. You may end up
creating a videogame together!

210
English for Technology
Unit 12: Business Communication

Table of Contents

Preface
Goals of the Unit
Learning Outcomes
Warm-Up Activity: Discussion
Vocabulary
Business Email and Letter Structure
SAQ
Letter Example
SAQ
Business Email and Letter Content
SAQ
Business Email Exercise 1
Business Email Exercise 2
Business Email Exercise 3
Business Email Exercise 4
Bad News Letter Exercise

211
Preface
In this unit, you will learn about writing business letters and
emails. You will also learn vocabulary related to business
communication. The exercises in the unit will introduce you to best
practices when responding to business emails and letters as well as how
to deliver bad news by email or letter.

Goals of the Unit


 To learn vocabulary related to business communication
 To learn the basic structure of business emails and letters
 To learn best practices when responding to emails and letters
 To learn how to deliver bad news

Learning Outcomes
By the end of this unit, students should be able to:
 Remember vocabulary related to business communication
 Use vocabulary related to business communication to analyze
and discuss business emails and letters
 Remember basic structure of business emails and letters
 Write business emails and letters, including responding to
emails and letters and delivering bad news

212
Unit 12: Business Communication

Warm-Up Activity: Discussion

Before starting this unit, let’s do a little warm-up. Discuss the following
questions with a partner or small group.

1. Estimate how many emails you have received in the last month.
How many were there in the last year? How many physical (non-
electronic) letters did you receive during the same timeframe? How
many text/instant messages have you sent in just the last week?
2. Text/instant messages, emails, and letters can all be used to deliver
similar information. In general, what determines the choice of one
method over another?
3. Think back to a time when you had to deliver bad news (or a
negative response) in writing. How did you deliver the bad news in
that email or letter? Would it have been a good idea to use a text
message to send that message?

213
Vocabulary

General Vocabulary
1. structure: format or layout of the parts of an object or thing.
2. audience: those who listen to or read the words of another.
3. formality: rules about the etiquette one follows as dictated by a
social, religious, or professional situation.
4. conventions: traditional or expected ways an action or activity is
performed.
5. function: the way an object, theory, or person works.
6. parallel: content, objects, or ideas that have a similar form or
meaning as another. In math, parallelism signifies two lines that
have the same slope and do not cross.
7. convey: to transfer an object physically or explain an idea verbally
from one place or person to another.
8. third-party: person or group outside of the current conversation or
situation who are indirectly affected by any decisions made about
it.
9. keep (or kept) in the loop: informed along with other involved
individuals.
10. copy: jargon for “send a copy to.”
11. need-to-know: private information that is shared only with people
who need to know it to do their job.
12. missive: another word for a letter or email.
13. concise: brief and clear language.
14. FYI: abbreviation, meaning “For Your Information,” that is used
in speech and writing to call attention to important information.
15. party: a person or group taking one side of an issue or participating
as a stakeholder in an argument.
16. alienate: to create a rift in a relationship that negatively affects
people, both socially and emotionally.
17. rule of thumb: an estimate or an action given as a practical
example of a typical behavior in the situation described.

Business Writing Vocabulary


1. letterhead: the often professionally printed top and/or bottom of a
letter that displays a business name, logo, and contact information.

214
2. attachment: a document included with an email or letter. This is
usually supplementary information that provides more complete
details than an email or letter can.
3. enclosure: another word for an attachment in printed documents
included with a physical letter.
4. CC line: abbreviation for the “Carbon Copy” line in which the
addresses of others are listed who will receive the email in addition
to the main recipient. These addresses are plainly visible to all who
receive an email.
5. BCC line: abbreviation for the “Blind Carbon Copy” line in which
the addresses of others are secretly listed who will receive a copy
of the email in addition to the main recipient. Any address listed in
the BCC line is known only to the sender of the email. Other
recipients cannot see them.
6. cold email/letter: traditionally named a “cold call,” these are
emails or letters that a recipient is not expecting and/or does not
recognize the name (or address) of the sender, so the document will
be assumed to be SPAM.
7. dated action: a sentence in a business document which lists a
deadline for the reader to respond by if interested in the opportunity
offered.
8. opt out: choosing not to be a part of or participate in an activity or
offer.
9. objective: the purpose of a business document written in one
sentence. This is analogous to a thesis in an essay.
10. email thread: a collection of the original email and all replies to it
that share a common subject line. The previous emails are listed in
reverse chronological order at the bottom of the newest (current)
email.

215
Business Email and Letter Structure

Background
All written documents have a structure (an expected document
format), a target audience (intended readers), and a specific level of
formality (rules to show politeness and respect) that need to be
followed when composing them. Hence, there are many conventions
that have arisen over time in order to facilitate communication. For the
purposes of this unit, we will only examine the conventions of
professional documents (ones that can be used in school or at work),
not informal ones we might send to our friends or post on social media.

Email and Letter Overview


Email (electronic mail) and letters both function to deliver
information. Computer technology is helping to make email prominent
and, thus, in some cases to phase out the need for a physical letter.
However, both email and letters are alive and well. For the most part,
email and letters have a parallel structure and function. The main
difference is that emails are quicker and less formal. Because they are
less formal, they are best used when speed and convenience are the
goals and when one is sending them to people that they already have
business, academic, or personal relationships with. Letters, on the other
hand, are on paper (often with a pre-printed letterhead) and so are
slower and more costly to send. They can be sent by themselves, but
they often accompany other documents that deliver important and
detailed information, like contracts that need to be signed or rules that
should be followed.
So which one do we use and when? If a document is making an
important announcement, it is better to send a letter because it is more
formal. If a document is asking simple questions to someone that you
know, use an email. If a document is sent to a stranger or meant to be
signed and returned, use a letter. When a document will be held onto
and referred to in the future, use a letter. When writing to simply update
a reader quickly (such as to convey information about changing
business hours for the summer), choose an email.
There are roughly three basic sections in emails and letters:
heading, body, and ending. The heading contains the
sender’s/receiver’s information; this includes addresses, date, subject,
and salutation. The body is used to deliver important information,

216
namely the writer’s self-introduction, objective, explanation of the
objective, and a dated action (if applicable). The ending functions to,
basically, say “goodbye” and contains the closing, signature, and an
attachment/enclosure note (if present).

Side-By-Side Comparison

Email Structure Letter Structure

To: Return address (no name):


CC:
BCC: Date:
From:
Date: Recipient Name & Address:

Subject: Salutation:

Salutation: Subject:

Writer introduction & objective Writer introduction & objective


paragraph paragraph

Explanation paragraph of Explanation paragraph of


objective 1 objective 1

Explanation paragraph of Explanation paragraph of


objective 2 objective 2

Dated action paragraph Dated action paragraph

Closing Closing

Signature Signature

Attachment(s): Enclosure(s)
cc:

217
General Formatting Notes
There are several different styles of email and letter writing
formats, but the traditional style is single-spaced and does not use
indents. Instead of indents, a blank line is placed in-between each line
and paragraph. When writing either, use a plain, 12-point font.

Heading Notes
The “From” address line is filled-in automatically by email
software. In these days of multitasking, multiple email accounts, and
people owning multiple personal devices, it is easy to respond too
quickly to an email and use the wrong account/email address. In other
words, if we are not careful, we might accidentally use our personal
address when writing a business email or our business address when
sending email to friends. For professional and legal reasons, avoid this
at all costs, especially if your personal address is a screen name or an
otherwise creative composition. Clients will think such an address is
unprofessional and possibly SPAM if they do not see a domain that
they recognize as a company they do business with. The best way to
avoid the appearance of unprofessionalism is to keep your business,
school, and personal accounts separate. Even though it is convenient,
do not use the same software to check and respond to all your email
accounts.
Although we have to avoid the issues with the “From” line, it
is important to remember that emails have two useful address lines that
we can take advantage of in business: CC and BCC lines. The CC
(carbon copy) line is used to officially send a copy of an email to an
important third-party, such as a manager. This line is used for
accountability. It is a way to tell the recipients something like, “The
manager knows what I am doing.” A CC line can also be used in a
physical letter. When used, it is placed at the very bottom of a letter,
below the enclosure line. The BCC (blind carbon copy) line,
oppositely, is for a secret recipient. Writing an address in the BCC line
will privately send a copy of the email to one or more people, but only
you, the writer, will know. No one else who receives the email can see
who (if anyone) is listed in the BCC line.
Hence, the BCC line is utilized in two common situations. In
one situation, a writer needs to mass email strangers. In this case, the
same basic information, like an acceptance notification from a
university, needs to be sent to many people. When the information is

218
the same but the addresses are different, writers often choose to use
BCC lines so as not to violate anyone’s privacy. Masking an address
via the BCC line helps cut down on SPAM because no visible list of
addresses is sent with the email. Then, an unscrupulous recipient
cannot steal the addresses and SPAM the others.
The second common situation where the BCC line is used
happens when a writer wants to privately notify others about an email’s
content but does not want any of the immediate recipients to know.
This can occur when an employee wants to secretly notify a colleague
to beware of a controversy that is brewing in the office, so s/he puts
that colleague’s address in the BCC line of an email. Those who are
causing the controversy will get placed in the To line, and the manager
might get CC’ed. In this formulation, the controversy-causing
employees know their exploits are being read about by the manager,
but no one but the sender knows that the person in the BCC, like an HR
representative, is being notified of the situation too. Here, the HR
person is kept in the loop so that s/he will not be caught off guard if
the situation turns into a larger problem that HR will have to help with.
As with any issue, use the BCC line ethically. “Copy” only those
people with a need-to-know, and send information only to those who
will not abuse the information they receive. The role of those who
receive a BCC email is to be informed but to remain silent in the email
conversation. Anyone who is asked to participate in the conversation
should be in the To or CC lines.
The final line in the opening is the subject line. Its function in
business documents is to concisely summarize the document because
it is the first “real” information that a reader sees. Subject lines should
be parallel with an objective. Both need to contain the topic and main
points of the document.

Body Notes
At a minimum, the first paragraph of an email or letter should
be the objective, or the purpose of the document, which is summarized
in one sentence. Oftentimes, especially when sending an unexpected
missive, which is termed a “cold email” or a “cold letter,” the writer
will begin the first paragraph with a short self-introduction. In a school
setting, for example, a student will use the first few sentences of the
first paragraph of an email to give their full name, course
name/number, and course meeting time to reinforce their relationship

219
with the teacher. In a business setting, the sender can use the first line(s)
to explain where s/he met the recipient, which person they know in
common, or why s/he is writing. Either approach is designed to help
the recipient know the email is valid and not SPAM.
In general, treat the body of emails and letters like paragraphs
in an essay or report. Start them with topic sentences, and keep each
paragraph about one topic only. Also, for clarity, it is good to use
transitions. Emails tend to be short, or concise, and need shorter body
paragraphs because they are not used to send very important
information. Letters, essays, and reports, on the other hand, are chosen
when the information they deliver is either more important or needs
more explanation and/or research to make convincing.
Lastly, the final paragraph of an email or letter’s body should
not be a traditional conclusion that summarizes the document like the
one many essays end with. Instead, the paragraph provides the space to
give a reader necessary information and important reminders about
what to do next. The final paragraph can be used in different ways. One
option for this paragraph is to include a dated action, which gives a
deadline that an interested reader must respond by. Another option is
to offer an explanation of the next steps that the reader should take if
interested. Third, if the email includes an attachment, the final
paragraph usually contains a notice to remind a reader that an
attachment has been sent, and the paragraph will also briefly indicate
the information that the attachment includes. This attachment notice is
made so that recipients do not accidentally overlook an attachment.
Fourth, the final body paragraph can offer kind words of gratitude for
the assistance or opportunity one has received. Finally, if needed, a
polite apology can be added to the last paragraph to send good will and
underscore the importance of the business relationship between the
writer and recipient despite the writer needing to opt out of a business
opportunity.

Ending Notes
The ending of both emails and letters starts with a brief
goodbye, called a “closing,” that ranges from “Sincerely” or “Thanks”
to “Write with any questions” or “Looking forward to your response.”
The signature follows the closing. In an email, the signature always
contains the sender’s name and the sender’s title,
department/organization, mailing address, and email and phone contact

220
information. The difference between the signature in an email and a
letter is that the mailing address does not need to be included in the
ending of a letter because it has been stated earlier in the letter.
Furthermore, if a letter is being sent on a pre-printed letterhead, any
information included on that letterhead can be omitted from the ending.
Lastly, attachments and enclosures are synonyms. They are
listed so that a reader does not miss them. Different email software will
load a sent or received attachment in different locations. (In this unit’s
example, it is being placed at the bottom of the email though sometimes
it will be displayed elsewhere.) As for the enclosure in a letter
(abbreviated as “Enc.,” these are always on paper. When including an
enclosure in an envelope, always place it behind the letter so that, when
a recipient opens an envelope, the first thing s/he sees is the letter,
which will detail for the reader what they have been sent and why.

Email Example

To: [email protected]
CC: [email protected]
BCC: [email protected]
From: [email protected]
Date: January 22, 2018

Subject: Proofs of Book & Cover Illustrations

Abdulwadood,

This is Enaya Said Zahlan, a project coordinator, from Publisher’s


Friend. I am attaching the proofs of your textbook and several
cover illustrations to choose from.

First, look over the proofs for mistakes and omissions. If you find
any, let me know what the corrections should be.

Second, there are 3 cover illustrations for you to look at. Choose
the one you like best. They all follow the specifications we agreed
upon. They all cost the same, so whichever you choose, we will still
be within the budget.

221
Please let me know about any corrections needed and which
illustration you prefer by February 15 so that we can get the book
printed and available by August 2020.

Write with any questions,

Enaya Said Zahlan


Project Coordinator
Publisher’s Friend
Predraga Vilimonovica 25
Raska 33652
Serbia
+381 11 xxx xx xx

Attachments: textbook_proof.pdf,
illustration.zip

SAQ

1. Which sentence from the email example is the objective?


a. I am attaching the proofs of your textbook and several cover
illustrations to choose from.
b. Please let me know about any corrections needed and which
illustration you prefer by February 15 so that we can get the
book printed and available by August 2018.
c. Proofs of Book & Cover Illustrations.

2. Which sentence from the email is the dated action?


a. I am attaching the proofs of your textbook and several cover
illustrations to choose from.
b. Please let me know about any corrections needed and which
illustration you prefer by February 15 so that we can get the
book printed and available by August 2018.
c. Proofs of Book & Cover Illustrations.

222
3. Explain in the space below what the purpose is of including the
sender’s full contact information in the signature?

4. Explain in the space below why [email protected] is


CC’ed on this email?

Letter Example

Predraga Vilimonovica 25
Raska 33652
Serbia

June 11, 2017

Abdulwadood Sharabi
Wehda Street (opposite Qasr al-Basha)
Haraat al-Daraj Quarter
Gaza City
Palestinian Territory

Dear Mr. Sharabi

Subject: Publishing Contract

This is Enaya Said Zahlan, a project coordinator, from Publisher’s


Friend. Per our phone conversation, I am enclosing a publishing
contract for your textbook.

First, read over the contract to verify the details and budget meet
your specifications. Check also that you approve of the listed
schedule.

Next, if everything is good, sign and return the original contract.


Remember to make a photocopy and keep it for your records.

223
Because we are on a tight schedule if the release date is to be
August 2021, please overnight the signed contract back to me by
July 17, 2020.

I appreciate the opportunity to work with you on this great book.


Contact me with questions.

Sincerely

Enaya Said Zahlan


Enaya Said Zahlan
Editorial Assistant
[email protected]
+381 11 xxx xx xx

Enc. Contract
cc: Remi Jones, Editor

SAQ
1. What line is “Enc.” similar to in an email?
a. Subject
b. Dated action
c. Attachment

2. In this letter (and all letters), what sentence should the subject be a
mirror image of?
a. Dated action
b. Sub-topic sentence
c. Objective

3. What is this sentence called: “I appreciate the opportunity to work


with you on this great book. Contact me with questions.”
a. Subject
b. Follow-up
c. Closing

4. Find and copy the Dated Action line in the space below.

224
Business Email and Letter Content

Content Limitations
Keep things simple. As a rule, each email and letter should be
about one general objective when possible. Sometimes the objective is
specific, such as “Office policy changes during summer.” Other times,
only a vague objective is used to loosely include all main points (for
example, “Office updates”). Whenever possible, all information in an
email or letter should be closely related.
In the example below, there is one objective (office policy
changes), which is broken down into three parts (business hours,
computers, and lunch breaks). These topics work because they are
about office policy changes. If the business also wanted to
communicate information about a charity event it is hosting, that type
of FYI is unrelated, so it should be sent in a separate email or letter.

Objective: Notice of office policy changes during summer


1. Hours of operation cuts
2. Computer network availability changes
3. Lunch breaks extension

The next example has an objective entitled “updates” because that best
categorizes all the information. Even though hours, lunch area, front
door construction, and charity event are not directly related, they can
still be conveniently grouped as “news” or “updates.” Though there is
no limit to how many main points can be included in an email or letter,
it is usually best to keep them under four so that the document is never
longer than the equivalent of one or two pages.
Objective: Four office updates for March
1. Weekend business hours change
2. Remodeled lunch area coming soon
3. Front door construction
4. Charity event for disabled children

Replying to Emails
All email software has a reply button. When replying to an
email, there are important issues to be aware of. For one thing, all
replies should include the full email thread previously sent and
received, They should also keep the same subject as used throughout

225
the thread. Never delete any parts from a reply. Keeping the same
subject and email thread will help readers remember what the
conversation has been about. It will also remind each party about what
has been promised and what the major issues discussed have been.
No matter what, use the reply button intelligently. It is a bad
choice and should not be used when one needs to send a new email. Do
not mix new information with old (unrelated) content. This results in
an email with a meaningless subject line. Not only does this look
unprofessional, but it is highly confusing.

Delivering Bad News


Sending bad news, or a response one believes will be reacted to
negatively, requires extra care in order to not offend a reader. It is
important that we do not alienate readers because no one wants to put
a business relationship at risk that we might need in the future. When
writing, the main means that we have at our disposal to avoid hurt
feelings is to delay the bad news (in other words, to delay the objective)
and to regulate the quantity and formality (politeness) of what we say.
A delay tactic is often used to ease a reader into bad news. This
approach is used to prepare the reader to receive and take bad news
without being too upset by it. In terms of emails and letters, the actual
bad news (the objective of the email) is delayed. It is not in the first
paragraph but is moved to the second last paragraph. There, a writer
makes a clear refusal notice (statement of bad news). When we finally

226
get to it, a refusal should be direct and to the point, such as, “In light of
all the above issues, we are sorry, but the shipment deadline must be
extended three months.” When sending bad news, the objective gets
delayed in order to use the space to first offer clear reason(s) why the
refusal is occurring. To augment the delay required by bad news, the
subject and objective lines typically are replaced with generic
information about the topic of the email or letter.
There are two examples below of paired subject and objective
lines. The first set delivers positive (or neutral news) and so is more
direct.

Neutral/Positive News
Subject: Order #912 Confirmation & Shipping Date Estimate
Objective (paragraph 1): I am writing to confirm your July 2
order of 5,000 units and to provide a shipping date estimate.

The second example is indirect because it is sending bad news.

Bad News
Subject: Order #912 Update
Generic Topic Notice (paragraph 1): I am writing to update
you about the status of Order #912.
Objective (second to last paragraph): Because of all these
issues, we are sorry, but Order #912 must be canceled.

In short, delaying bad news gives one time to explain and therefore
sounds more polite because it is less shocking.
The other factors involved in delivering bad news is to adjust
both the quantity and the formality of words throughout the entire
document. Writers need to strike a balance which is governed by the
anticipated effect of the bad news on the reader and the importance of
the relationship that a refusal might threaten. Word quantity shows that
a writer is aware of the importance of the business relationship and is
being thoughtful. Formality (politeness) avoids language that might
inflame, or make worse, a situation. When sending bad news, a basic
rule of thumb is to increase word quantity (add explanation) based on
the following scale.

227
Fewer words <------------------------------------------------------------> More Words

Canceled Meeting -- Deadline Extension Request -- Must Cancel Order -- Cannot Accept Promotion
2 phrases 2 sentences paragraph entire letter

Neutral Explanation <--------------------------------------------------> Very Apologetic

I apologize but I am grateful


the meeting is canceled +
due to a scheduling conflict. I understand the inconvenience
+
2-3 reasons why I cannot
+
bad news directly stated
+
I apologize

The guidelines in the chart above suggest that the actual apology is only
a small part of the total document. This is because an apology comes
across as shallow if not put into context. Anyone can say s/he is sorry.
To make sorrow meaningful, one has to detail the explanatory
circumstances. Hence, along with an apology, an expression of
gratitude for the business opportunity, an acknowledgement of the
inconvenience the bad news might cause, and an explanation of what
the refusal/change is based upon are typically included. When possible,
frame your reasons neither as cold, hard facts nor as selfish actions but
as a step that will be mutually beneficial to all parties involved.

SAQ
1. How many parallel structures are shared by emails and letters?
2. Why should one include an objective in an email and letter?
3. What are three instances when a writer might want to include a third-
party and so use a CC line in an email?
4. Is there ever a time when a writer should delete an email’s thread
when replying?

228
Business Email Exercise 1

Read the scenarios, and choose if the CC or BCC line is appropriate.

1. As the team leader, Dawsar sends an email to his group’s members


listing the minutes of the last meeting and important reminders about
procedural changes agreed to by the team. Who else should Dawsar
copy on the email and how?
a. CC the manager to be informed of the changes.
b. BCC the CEO because Dawsar wants to appear effective in his
work.
c. There is no need to copy anyone.

2. Falah wants to clarify how many vacation days he has banked, so he


writes the HR coordinator to find out. Who else should Falah copy on
the email and how?
a. CC the HR manager to make sure the coordinator responds
quickly.
b. BCC the friends Falah is planning to vacation with.
c. There is no need to copy anyone.

3. Enaya noticed that her colleague Ghosoon sounded impatient during


their last teleconference. Not wanting to put her on the spot during the
meeting, Enaya decides to send an email and ask Ghosoon if everything
is okay with her husband who was recently hospitalized with
appendicitis. Who else should Enaya copy on the email and how?
a. CC Enaya’s manager out of fear of the erratic behavior’s effect
on other employees.
b. BCC Ghosoon’s manager as a hint to demote her to a less
stressful position.
c. There is no need to copy anyone.

4. Jana is an IT assistant who services employee workstations. In the


process of updating software for the Sales Department, Jana saw two
coworkers fighting each other in front of a client who looked scared.
Not being a member of the Sales Department, Jana plans to email the
Sales Department manager so that the manager is aware of the
situation. Who else should Jana copy on her warning email and how?

229
a. CC the two fighting employees to show them she has influence
in the company.
b. BCC her friends to make fun of the stupidity of the fighting
employees.
c. There is no need to copy anyone.

Business Email Exercise 2

Circle the letters of the best subject line for each emailed objective
below. There is only one correct answer for each.

1. Objective: Please forward your UK itinerary, choice of hotels, and


preferred airline.
a. Subject: Warning! Do ASAP!!
b. Subject: UK Itinerary, Hotels, and Airline
c. Subject: UK Trip FYI

2. Objective: Attached is a list of cost cutting measures each


department must enact to compensate for our budget shortfall.
a. Subject: Cost Cutting Measures Requirement
b. Subject: hello!
c. Subject: Please Reduce Expenses

230
3. Objective: Here is an update about the attendees and preparation
requirements for the Fasteners Convention we are sponsoring this July.
a. Subject: Fasteners Convention
b. Subject: Fasteners Convention Attendees and Preparations
c. Subject: Let’s Make This a Good One

Business Email Exercise 3


Put yourself in the place of the writers of each email objective below.
Construct a dated action paragraph for each objective. (Note: These
objectives are identical to the ones used in the previous exercise.)

1. Objective: Please forward your UK itinerary, choice of hotels, and


preferred airline.
Dated Action:

2. Objective: Attached is a list of cost cutting measures each


department must enact to compensate for our budget shortfall.
Dated Action:

3. Objective: Here is an update about the attendees and preparation


requirements for the Fasteners Convention we are sponsoring this July.
Dated Action:

231
Business Email Exercise 4

Using a word processor, compose a cold email in which you contact a


possible corporate client (one from another business) who does not
know you. In the email, inform them about 2 services that your
company is offering at a 25% discount for the next three months.

Include a subject, a self-introduction, an objective, one paragraph for


each service, a dated action (when the potential customer must respond
by if interested), a closing, and a signature. Also, include a notice in
the dated action paragraph about the price list attached to the email.
(Note: since this is not an actual email, you do not have to construct a
genuine attachment, just practice writing a notice about it.) When
typing out the exercise, keep the line labels at the top from “To”
through “Subject.” Remove all the rest. Also, when typing, left align
all information and keep the spacing as illustrated so that the lines of
important content are separated from each other by one blank line.

Use the following format when constructing the email.

To:
CC:
BCC:
From:
Date:

Subject:

Salutation:

Writer introduction & objective paragraph

Explanation paragraph of objective 1

Explanation paragraph of objective 2

Dated action paragraph (with attachment notice)

Closing

232
Signature

Attachment(s)

Bad News Letter Exercise

Compose a letter in which you deliver bad news to a client who is


responsible for 20% of your company’s yearly profits. Invent what the
bad news is, but make sure it requires you to explain at least two
reasons why your company is saying “no” (or delivering bad news) to
this important client. If unsure, the items below offer some possible
bad news to send: notifying the customer about an important deadline
postponement, a raise in prices for services, or the need to cancel a
large order, major (inconvenient or costly) changes that your company
has to make to an international visit/meeting/demonstration that has
been in the planning stages for six months. If none of these work, invent
your own.

When writing, include a subject, a self-introduction, a notice of what


the letter is about, two paragraphs of explanation for why your
company is sending the bad news, a delayed objective (in the second
to last paragraph) that expresses a direct statement of the bad news, a
final paragraph of apology and well-wishes for a strong and continued
business relationship, a closing, and a signature. When typing out the
exercise, keep the “subject” label but remove all others like “date,”
“recipient,” “explanation paragraph of problem 1,” and so on. Left
align all paragraphs, and keep the spacing as illustrated below so that
important content is separated from each other by one blank line.

Use the following format when constructing the email.

Return address (no name):

Date:

Recipient Name & Address:

233
Salutation:

Subject (generic topic):

Writer introduction & generic notice of issue paragraph

Explanation paragraph of problem 1

Explanation paragraph of problem 2

Direct bad news paragraph

Apologies paragraph with hopeful messages

Closing

Signature

234
English for Technology
Unit 13: IT Careers

Table of Contents

Preface
Goals of the Unit
Learning Outcomes
Warm-Up Activity: Think and Share
Reading: Choosing an IT Career Path
Vocabulary
SAQ
Discussion
Phrase Matching
Reading: How to get a promotion
Vocabulary
SAQ
Think and Share
Case Study: Networking and Jobs.PS
Vocabulary
SAQ
Think and Share
Reading: IT Jobs
Matching
Think and Share
Sample Job Ad
Technology Tip
Writing: Job Application Forms
Writing: How to write an effective cover letter
Writing: How to write an effective resume
LinkedIn Profiles

235
Preface
In this unit, you will learn about a variety of IT career options. You will
learn vocabulary related to IT jobs and working in IT companies, and
use this vocabulary in discussions about IT jobs and ways to get a
promotion in an IT company. You will read a case study about a
Palestinian job web site, Jobs.ps, and the founder’s ideas about
professional networking. You will also learn about filling out job
applications, writing a cover letter and resume, and creating a LinkedIn
profile.

Goals of the Unit


 To learn vocabulary about IT jobs and working in IT companies
 To have discussions about how to get an IT job and how to get
a promotion in an IT company
 To learn about the IT job market in Palestine through web sites
such as Jobs.ps, and about the American IT job market
 To fill out a job application form
 To write a cover letter
 To write a resume
 To create a LinkedIn profile

Learning Outcomes
By the end of this unit, students should be able to:
 Remember vocabulary related to IT jobs and working in IT
companies
 Understand and evaluate ways to network and get a promotion
in an IT company
 Search Palestinian and American job web sites to find relevant
IT job advertisements
 Fill out a job application form
 Write a cover letter
 Write a resume
 Create a LinkedIn profile

236
Unit 13: IT Careers

Warm-Up Activity: Think and Share

Answer the following questions based on your opinion. Then, share


your opinion with a partner or small group.

1. What makes somebody a good employee?


2. What IT job would you like to have in the future? Why?
3. What do you need to do to get a job in IT?

237
Reading: Choosing an IT Career Path

The article below is about some important things to keep in mind when
looking for a job in IT.

Vocabulary
Read through the vocabulary below, which will help you understand
the reading. Put a check mark (✔) next to the ones you need to learn.

1. Contacts: the people you know


2. Dependable: trustworthy and reliable
3. Keep an eye on: pay attention to
4. Keep in mind: be aware of something
5. Networking: interacting with others to exchange information and
develop professional or social contacts
6. Raise: an increase in salary
7. Show up: arrive
8. Suit: fit or be appropriate for

Listening Link 1

Sometimes the hardest part of meeting a goal is to properly


define what you are trying to accomplish in the first place. In this
chapter we will discuss the top IT job positions available around the
world right now. So, as you read the chapter, reflect on which career
most suits your personality... and then go for it!
There are several things to keep in mind when determining
what field of IT to go into. Keep an eye on job web sites (such as
LinkedIn.com, DICE.com, Monster.com, or Jobs.ps) to see which jobs
are most in-demand. Keep in mind that for many jobs described later
in the chapter, there are several levels of positions available. For
instance there are "junior," "senior," and "lead" software developer
positions available. You probably can't start out your career as a lead
developer. You have to know your own limits.
Be honest with yourself. If you don't have previous experience,
good contacts from networking, or a good education, you will be more
successful in getting a lower-level job. Also, find out what the job you
are applying for typically pays in your area. If you are just starting your
career, you may need to keep your salary expectations a bit lower than

238
the average. This will make your chances much higher than normal to
get hired. Once you have job experience then you will be in a better
position to ask for more money. In some places, the best way to get
more money is to quit your job and work for another similar company.
This may sound cruel or thankless, but that is how business works in
some places in the world.
Everyone who works hard deserves a raise every year. How do
you show your IT manager that you are a good performer? Easy. Show
up on time, be dependable, be active in meetings, and always do a
little bit more than is asked of you. Also equally important is to be well-
liked by members of your team.

SAQ
1. Why should you keep an eye on job websites?
2. What are some different levels of software developer positions?
3. Why might you need to start in a lower-level job?
4. What can you do after you get more job experience?

Discussion

1. Have you ever had a job before? If so, how did you find it?
2. In Palestine, is the best way to get more money to quit your job and
work for another similar company? Do you think this is cruel?
3. Do you think everyone who works hard deserves a raise every year?
Why?

239
Phrase Matching
Some words commonly go together. Choose the verb from the box that
commonly goes with the nouns below to make a phrase. Write the
correct verb on the line.

1. _________ a goal apply


2. _________ your personality deserve

3. _________ in mind keep


meet
4. _________ for a job
suit
5. _________ a raise

Reading: How to get a promotion

Once you have a job, you’ll want to keep that job, and even be
promoted within the company. The next reading will be about things
you should keep in mind in order to get a promotion at your job!

Vocabulary
Which words are you familiar with, and which are new? Put a check
mark (✔) next to the ones you need to learn (that is, the ones that you
don’t know yet).

General Vocabulary
1. Back-up: support
2. Fellow: people who belong to the same group or share a situation
or experience
3. Layoff: ending the employment of a worker
4. Negotiate: discuss something formally in order to make an
agreement
5. Passive-aggressive: a type of behavior where someone resists
someone else by avoiding them
6. Promotion: moving to a higher or more important position in an
organization

240
7. Responsibility: a duty or task that you are required or expected to
do
8. Socializing: talking to and doing things with other people in a
friendly way
9. Stubborn: refusing to change your ideas or to stop doing
something
10. Worth: amount of value something or someone has

IT Vocabulary
1. Project manager: the person in a software development team who
takes the overall responsibilities to manage the software project
2. ScrumMaster: the project manager for an agile development team

This article explains some of the things you can do to help yourself get
a promotion at work.

1. Learn something new every day


IT is an area where people are judged largely by how much they
know. If money and a high job position are important to you, you can
quickly raise your level by telling your manager that you want harder
tasks and more responsibility. IT managers normally love it when
employees ask for more responsibility. When you meet with your
manager, set goals for yourself and meet or exceed those goals. Here
are some things you can do to increase your worth to your company:
1. learn a new programming language
2. take a certification such as Microsoft, Linux Professional
Institute, or Cisco
3. study to be a ScrumMaster or another type of project
manager

Meeting set goals can have beneficial results when it's time to
negotiate salaries, survive a round of layoffs, or get a promotion.

2. Attitude is very important!


Take an active interest in things outside IT: such as sports,
politics, music, and film. This will make socializing at company events
easier for you. If you are disliked in the company then you will not get
promotions or important projects, and working itself will become more
challenging.

241
3. Be courteous, helpful, and respectful to others
In a good IT department, the engineers are known for sharing
knowledge and helping each other. In bad IT departments, the
engineers are secretive and hide knowledge. How can everyone get
better if some people are selfish with what they know? Information
wants to be free. You must set it free. Even if you go to several
universities, graduate school, and have collected many IT
certifications, you will still learn much more about IT from your fellow
engineers. So, it is important to be kind and respect your fellow IT staff.
They are your family for eight hours every day, forty hours every week!
When you start a new job, realize how some people are nice to
you and some people ignore you. Which kind of person do you want to
be? When you get a new junior team member, try to help them and
include them in decisions. Make sure they have someone to eat lunch
with. If you socialize after work with your co-workers, invite new
employees with you. Being nice to new people can have many rewards,
both emotionally and financially.
There is a saying, "Think globally, act locally." What this
means is that just by being nice and pleasant yourself, you can make
the whole world a more nice and pleasant place as well.

4. Have your own mind and your own opinions


State your opinions in meetings and give good reasons and facts
to back up your opinions. But don't be stubborn or insistent if things
don't go your way. And whatever you do, please don't be passive-
aggressive! Passive-aggressive behavior is when you think something
bad about a person or an idea, and then you talk badly behind someone's
back (when that person is not around). This is very destructive behavior
to both yourself and your IT department.

SAQ
1. Are IT employees judged most based on how much they know
or who they know?
2. Why is it important to socialize with people at your company?
3. Why should engineers share what they know?
4. How can you help a new junior team member?
5. What does it mean to be passive-aggressive? Why is it bad?

242
Think and Share

The reading suggested four things an employee can do to get a


promotion. Which do you think is most important? Which do you
think is least important? Rank each in their order of importance: Put a
“1” next to the one that is most important, and a “4” next to the one
that is least important.

_______ Learn something new every day

_______ Attitude is very important!

_______ Be courteous, helpful, and respectful to others

_______ Have your own mind and your own opinions

Next, share your answers with a partner or small group.

Then, work with your group to rank each item as a group. Discuss the
reasons for your choices to try to persuade your group to agree with
you. But, remember that in the end, you need to all agree on your final
ranking!

Case Study: Networking and Jobs.PS

Networking is an important part of getting a job, but it can also be quite


difficult. In this case study, you’ll read about Amjad Hamarsheh, the
founder and CEO of Jobs.ps, and his approach to networking.

Vocabulary
Read through the vocabulary below, which will help you understand
the reading. Put a check mark (✔) next to the ones you need to learn.

General Vocabulary
1. agenda: a plan or goal that guides someone's behavior (often kept
secret)
2. branding: promotion of a product or company through advertising

243
3. candidate: a person who applies for a job
4. delegate: to assign a task to someone else
5. entrepreneur: a person who starts a business and is willing to risk
loss in order to make money
6. norms: standards of proper or acceptable behavior
7. primitive: seeming to come from a time in the past
8. random: done without a particular plan or pattern
9. recruiting: finding suitable people and getting them to join a
company

IT Vocabulary
1. portal: a Web site that helps you find other sites
2. solution: a set of software programs and/or services that are sold
as a single package

Networking is a business activity in which businesspeople and


entrepreneurs meet to form business relationships, share information,
and seek potential partners for business opportunities. Business
networking simply refers to building and cultivating relationships with
people of similar interests in ways that can benefit all parties. They
might join groups, attend networking events or network in online
forums.
In this case, I am going to elaborate how business networking
has helped Jobs.ps to expand their business in a country that was
historically dealing with job adverts or announcements in a very
primitive method. I am going to focus on how Jobs.ps networking has
changed business norms about announcing for hiring as well as for job
seekers to find and apply for jobs in Palestine.
Jobs.ps Ltd, located in Ramallah, is the leading job portal in
Palestine. Since its beginning, the company has played a key role in
providing service and building lasting relationships by placing the

244
highest quality candidates throughout Palestine. Jobs.ps Ltd has around
one million visits per month, more than 100,000 registered job-seekers,
around 40,000 posted jobs, and almost 3,000 active employer accounts.
Jobs.ps offers an effective recruiting and employer branding
solutions via company pages for employers. They help thousands of
clients and partners promote their employer brand to candidates
researching them and advertise their jobs to ideal candidates who may
not be aware of them. What differentiates Jobs.ps from other recruiting
channels is the quality and number of candidates they deliver and their
influence on candidates' decisions as they research jobs and companies.
Mr. Amjad Hamarsheh, Founder and CEO of Jobs.ps has
recognized the value of networking, and he has adapted some unique
methods:
● Figure out who matters most: Amjad has started to attend almost
all business conferences and gathering and registering in his diary
a pool of business cards from prospective clients and partners.
Then, he categorized his contacts into those who are ‘possible’ and
‘difficult’ to reach before going to the next tier. Then, he started to
prioritize with whom to network and when.
● Find the right team: Amjad found out the easiest way to engage
everyone was by hiring the right team and getting them involved.
Through his excellent delegation skills, he and the team decided to
connect with those whom Jobs.ps can help. So, the team started to
network with international NGOs working in Palestine, and Jobs.ps
has listed a number of points that they thought would be of interest
to the potential clients.
● All about the people: Because networking is all about people,
Jobs.ps has kept the social aspect high on their priority list. Amjad
and his team continued to engage with business people for mutual
benefit. The engagement was not limited to policy makers and main
actors on the ground; they have also engaged with investors,
donors, policy makers and businessmen to benefit their future
growth. In all their meetings, they agreed to promote an important
value, which concentrates on giving; they always explained what
their business can give to people and to the community as well.

The value of Jobs.ps Network Technique


Jobs.ps networking technique was not random, but the
opposite. Their technique needed a lot of planning, scheduling, and

245
controlling the progress of their project. For them, this is a very useful
project but it also is complex in nature because it is new to the norms
of Palestinians and firms working in Palestine, where activities are
subject to considerable degree of uncertainty in performance and in
time.
Jobs.ps has developed a networking code for their company,
listed below.

1. Build genuine personal connections.


2. Smile.
3. Listen when you join a conversation, then show you were
listening.
4. Be yourself and don't try to sell.
5. Research attendees and go prepared with questions.
6. Take a colleague or a friend.
7. Be curious.
8. Go in without a strict agenda and try to make a new friend.
9. Don’t leave without leaving a positive attitude behind you.

The bottom line is that business is all about networking, and in


order to run a successful business, make sure you meet people, host
people at your venue, visit other businesses, join unions, attend
conferences, cross-promote and volunteer for your community.

(Adapted from a text by Mahmoud Khweis, CM, CPT)

SAQ
1. What is networking?
2. What is Jobs.ps? What does it offer?
3. What are Mr. Hamarsheh’s networking methods?
4. How many of items in the Jobs.ps networking code can you
remember without looking at the list in the article?

246
Think and Share

First, think about the following questions by yourself.


1. Look at Mr. Hamarsheh’s three networking methods. Which do you
think would work best for you? Which do you think would not
work for you? Why? What other networking methods can you
think of?
2. Look at the Jobs.ps networking code. Which two do you think are
most important?

Next, share your answers with a partner or small group. Do you and
your classmate(s) agree? Talk with your classmate(s) to try to come to
an agreement.

Reading: IT Jobs

There are many kind of jobs that exist in the IT world. Below are just
some of these. Read through the descriptions of each job and think
about whether you would enjoy the job or not, and why.

CTO (Chief Technical Officer), CIO (Chief Information Officer)


Tasks and Responsibilities: The CTO/CIO makes all executive
decisions about the technological interests of a company. They are
responsible for outlining the company's technological vision,
implementing technology strategies, and ensuring that the
technological resources are aligned with the company's business
needs.
Qualities: Business savvy, technical mindset, good people skills
Average Salary: Very high
Dress: Very formal
Notes: These jobs are highly competitive and involve a lot of work.

Enterprise Architect
Tasks and Responsibilities: As a senior-level technical employee, an
Enterprise Architect is responsible for analyzing the business
structure and processes to make sure the business, application, data,
and technology of the company are in line with the organization’s
goals.

247
Qualities: Good technical, business, and design skills
Salary: High
Dress: Formal
Notes: Interact with people in many departments. A lot of
responsibility.

IT Manager
Tasks and Responsibilities: IT Managers are responsible for planning
and coordinating activities that have to do with the computer systems
of a company. IT managers are in charge of the installation and
maintenance of hardware and software in the company.
Qualities: Detail oriented, punctual, critical, supportive
Salary: Medium-high
Dress: Business Casual
Notes: Very stressful

Technical Writer
Tasks and Responsibilities: Technical Writers write instruction
manuals, how-to guides, journal articles, and other supporting
documents to communicate complex and technical information more
easily.
Qualities: Excellent writing skills, good technical mind
Salary: Medium
Dress: Business Casual
Notes: Writers are often good at telling stories

Graphic Designer
Tasks and Responsibilities: Graphic designers create visual concepts,
using computers or by hand, to communicate ideas to consumers.
They develop the overall layout and production design for
applications such as advertisements, brochures, magazines, and
reports.
Qualities: Excellent drawing and illustration skills, good color
matching and artistic qualities
Salary: Medium
Dress: Casual
Notes: Requires a lot of creativity

248
Software Developer
Tasks and Responsibilities: Software developers are the creative
minds behind computer programs. Some develop the applications that
allow people to do specific tasks on a computer or another device.
Others develop the underlying systems that run the devices or that
control networks.
Qualities: Creative, persistent, insatiable thirst for knowledge
Salary: Medium-high
Dress: Casual
Notes: Companies have a lot of developers compared to other
positions listed. Must have good programming abilities!

Project Manager
Tasks and Responsibilities: Project Managers plan, coordinate, and
direct computer-related activities in an organization. They help
determine the information technology goals of an organization and
are responsible for implementing computer systems to meet those
goals.
Qualities: Cooperation, leadership, and organization skills
Salary: Medium
Dress: Business Casual
Notes: This tends to be a high stress position with long hours, and
requires a lot of organization.

Database Developer / Database Administrator


Tasks and Responsibilities: Database Developers or Administrators
use specialized software to store and organize data, such as financial
information and customer shipping records. They make sure that data
are available to users and secure from unauthorized access.
Qualities: Detail-oriented, high business knowledge
Salary: Medium-high
Dress: Business Casual
Notes: If processing giant data sets excite you, then this job is for you.

IT Security Manager
Tasks and Responsibilities: IT Security Mangers plan and carry out
security measures to protect an organization’s computer networks and
systems. Their responsibilities are continually expanding as the
number of cyberattacks increases.

249
Qualities: Defensive, pro-active
Salary: Medium-high
Dress: Smart, clean dress is very important
Notes: Must stay up to date on the newest methods hackers are using.
Must be good at researching new security technologies.

System Administrator
Tasks and Responsibilities: Systems Administrators are responsible
for the day-to-day operation of the computer networks in an
organization.
Qualities: Must have strong problem solving skills and attention to
detail
Salary: Medium-high
Dress: Casual
Notes: Must have in-depth knowledge of computer systems

Software Tester
Tasks and Responsibilities: Software Testers are responsible for the
quality of software development. They perform automated and
manual tests to make sure the software created by developers doesn’t
have any bugs.
Qualities: Detail-oriented, persistent, curious
Salary: Low-medium
Dress: Casual
Notes: Must have good analytical and problem-solving skills

IT Support Engineer
Tasks and Responsibilities: IT Support Engineers provide help and
advice to computer users and organizations. These specialists either
support computer networks or they provide technical assistance
directly to end users.
Qualities: Must be good at explaining things to people, good listener,
and good at dealing with customers
Salary: Low-medium
Dress: Casual
Notes: Must be very patient!

250
Matching
The six people below are all looking for a job in IT. Read the
description of each person, and decide which job would fit them best.
Once you have finished, share your answers with a partner.

Khaled Leila
Good at Good problem-solving
communicating skills
Knows only a bit Very detail-oriented
about computers Never gives up

Rashid Nadia
Good at C++, JAVA, Knows a lot about how
PHP, HTML businesses work
Very creative Very detail-oriented
Likes big data

Yousef Nur
Good problem solving Strong technical skills
skills Strong business skills
Doesn’t like talking Good communication
with people skills

Think and Share

What kind of IT job would you like to have in the future? Read through
the list of IT jobs again, and choose which job you think would fit your
personality.

Then, tell a partner or a small group which job you would like to have,
and why you think it would fit your personality.

251
Sample Job Ad

Read the sample job advertisement below. As you read, try to answer
the following questions:

1. What are the IT Helpdesk Analyst’s responsibilities?


2. What qualifications does this job require from the candidates?
3. Which of these qualifications do you think you have?
4. Is experience required?

IT Help Desk Analyst, CESO, Inc.

Are you an IT support analyst seeking purpose, challenge, and talented


colleagues? Would you like to grow your career supporting a growing
civil engineering and architectural firm? CESO is a small firm with
large firm project opportunities. We develop leaders and empower staff
to use their gifts to impact the world through service – to our clients, to
our coworkers, and to our communities. So if this speaks to you, let’s
connect!

As a helpdesk analyst, you will be responsible for troubleshooting end-


user workstations, servicing application servers, administrating
applications and monitoring the helpdesk system.

We develop and inspire our IT staff through training and coaching on


the job. At CESO, we believe that work should be more rewarding than
just a paycheck. In addition to a comprehensive benefit and
compensation program, our work environments are warm inviting
spaces to collaborate with your coworkers. CESO is a principle-
centered organization, thinking and acting in alignment with strong
values of service, integrity and authenticity. We create memories and
friendship through our employee and service events including lunches,
birthday celebrations, outings, and community service opportunities.

Our Helpdesk Analysts will have a high school diploma or equivalent,


and at least 1 year of concentrated computer technology or computer
services experience. Also, experience in Microsoft Active Directory,
Windows operating systems, Microsoft Office software, helpdesk
management systems and Autodesk products are a plus.

252
Technology Tip

Many companies post their job advertisements online, on web


sites that are specifically for cataloging job adverts. Some of these sites
also let job applicants post their resume for companies to see. Then,
any companies who are interested in the candidate can contact him or
her to invite the candidate for an interview. Some job sites also handle
the entire application process, with all communication between the
company and the candidate occurring through the web site, including
all application documents.

Some useful sites for looking for IT jobs are:


● <http://www.jobs.ps>: As you learned earlier in this unit, this is the
biggest job site in Palestine
● <http://www.dice.com>: A US-based job site for IT jobs
● <http://www.hired.com>: Also a US-based site for IT jobs
● <http://www.monster.com>: The biggest job site in the US (not only
IT jobs)
● <http://www.linkedin.com>: A US-based social networking site for
professional purposes. You can make a profile and search for jobs.

Visit some of these job sites, and search for some of the IT jobs
presented earlier. Do you find any companies wanting to hire someone
in that position? Read the job advertisement. What information is
given about the position? What information is given about the
company? What jobs might fit you?

Writing: Job Application Forms

When you apply for a job, one of the first things you often have
to do is fill out an application form. Such a form asks for basic
information about you, such as your name, address, and contact
information (telephone, email) and when you would be able to start the
new job. Sometimes, employers will also ask you for your salary
requirements (i.e., how much you would need to be paid in the new
position).
Job applications also usually contain sections where you have
to give a longer answer (a few sentences or a short paragraph). For

253
example, you might need to summarize your qualifications and skills
or your previous work experience. You might also be asked to explain
why you are interested in this particular job. In all of these, it is
important to focus on what you are able to provide to the potential
future employer, rather than what they can provide to you. For
example, when you describe why you are interested in the job, you
should show how you will positively contribute to the company (for
example, through use or development of your skills), not just how you
will benefit from the job (for example, a good salary). It is also
important that you show that you read the job ad closely. So, if the job
ad says that they want someone with experience using a specific
programming language, you should indicate in your answers how well
you can use that programming language. Your answers should also
show that you know about the company you are applying to. For
example, if you are applying to a small startup, you might mention that
you enjoy working in the exciting and fast-paced environment of a
startup.

Activity:
Next, find a job ad on one of the sites listed earlier, and fill out
the below job application form based on that job ad.

254
Job Application
Date of Interview (Month/Day/Year):
/ /

Applicant Data Position Applied for:

How were you referred to us:

Full Name:

Address: City:

Phone: E-mail:
Date Available to Start: Salary Requirements:

Type of employment desired: 


Full-Time 
Part-Time
Summarize your relevant skills or qualifications

Summarize your relevant experiences

Why are you interested in this job?

255
Previous Employment
Dates of employment: Position(s) held:

Company name:

Address:

Supervisor’s name:

Your responsibilities:

Starting salary and title:

Ending salary and title:

Reason for leaving:

May we contact this employer for a reference? 


Yes 
No

256
Writing: How to write an effective cover letter

First, what is a cover letter? Sometimes it is serves as the


application for a job together with a resume or CV. At other times, it
can accompany the company’s application form. The cover letter
should always be tailored to a specific job, which demonstrates to the
potential employer that you have an eye for detail and that you know
something about their company and the job. The cover letter also tells
the employer about you and why you would be a good fit for both the
company and their job opening. It is your chance to show your
confidence in your ability to do the job. Because this is a business
document, it needs to be formatted with a business heading. You can
find cover letter templates in word processing software like Microsoft
Word or Open Office, or you can search for them on the Internet. Use
one that is appropriate and has a good business font. The cover letter is
generally no more than one page long.
A typical cover letter is in business letter format and has at the
beginning the following information, line by line:
 Your Name
 Your Contact information: include phone number and a
professional e-mail address (address is optional although it may
indicate to a potential employer that you live nearby – always an
asset if they want you to do overtime!)
 Space
 Date
 The name and title of the manager of the department (if you can
find it; if not, Human Resources Manager or Hiring Manager)
 The company’s name
 The company’s address
 Another space
 A formal salutation (such as “Dear Mr. Ahmad” or “Dear
Sir/Madam”)

The first paragraph goes after this. This part is where you
introduce yourself. You also tell the company how you learned about
their job and why you are interested in it, which may include
information about the company and why it sounds interesting to you.
This tells the company that you care about them.

257
The second paragraph should be about you and what you have
done that relates to the job. What does the job require, and what are
your credentials for the job? Give examples of your traits that would
help you do the job well. This includes past jobs, volunteering that
relates to the job, and classes you took and what you learned that
specifically trained you for this position. This is where you tell the
company why you are qualified for the job.
The third and final paragraph is where you tell the company
again that you are interested in the job opening. Let the company know
that you hope to hear from them soon and that you are available for an
interview at the company’s convenience. Thank the reader for his or
her time and give your contact information again.
Don’t forget a formal closing salutation (such as “Sincerely”,
“Best regards”, or “I look forward to your response”), and then sign
your name. Even if your signature is difficult to read, since you
included it at the top of the page like a letterhead, the reader will be
able to identify you.

Writing a Cover Letter


Next, you are going to write a cover letter for a job. First, you
need to choose an IT job (look at the ones that were discussed earlier
in the unit). Then, search on a job site (such as those discussed earlier
in the Technology Tips section), and find a job advertisement.
Now that you have all the information you need (a job listing,
information about the company, and information about yourself), write
a cover letter based on the steps above. Be sure to make this only one
page long.

258
Writing: How to write an effective resume

You probably know what a resume is, and you may have heard
of a CV (curriculum vitae, or “life’s work” in Latin). Both contain
professional information about you as a potential employee, and in
general, companies use one work or another with basically the same
meaning. A resume should contain everything you’ve done in your
professional career. Because of this, you will add jobs and skills to it
as you gain experience. Some companies may ask for an updated
resume regularly to consider employees for promotions or pay raises.
However, like a cover letter, a resume may need to be tailored to fit the
job you want. For example, if you want a job as an IT professional, it
is better to add school experience and jobs that are related to
technology, computers, etc. However, this type of resume may not be
suitable for a job as a marketing specialist where other talents may need
to be highlighted.
Resumes should be concise, clear, and informative. Highlight
only professional skills and training relevant to the job. For example,
your experience working in a youth program during secondary
education may only be relevant if you are applying to a job as the
manager of a daycare. Someone in a technical industry may find
working with youth non-essential to the job position they are trying to
fill. Consider your credentials as well as your personal traits in crafting
a resume that will show a potential employer your skill set and set you
apart from other applicants.
Before beginning to write a resume, consider how long you
think employers typically look at each resume? 5 minutes? 3 minutes?
In fact, most hiring managers take less than 30 seconds to view it
before deciding if it is worth his or her time to spend longer! For this
reason, it is important to have a concise resume. Generally, a resume is
no more than 2 pages, and in the case of most recent university
graduates, it may be a single page. Make your impact immediate.
Because hiring supervisors often read so many resumes at one time,
and because they are busy, they may glance at it and look first for any
errors. If mistakes are found, resumes are often simply thrown away.
Most employers think that if you are careless in representing yourself,
you will also be careless in representing their company. Because of
this, it is very important to be meticulous when writing a resume.

259
Resumes are advertisements of yourself, so they should show
you and your credentials for the job. But what goes first? Not all
resumes are the same, but typically the first thing is a heading. Like the
cover letter, it should include your full name at the top (perhaps in a
bigger font than the rest of the resume), then optionally your address,
phone number, and professional e-mail address. Don’t include links to
social media sites unless they are only representing your professional
accomplishments (such as a link to a repository of software you have
developed).
The next part of the resume may include career objectives or
highlights. This states in one or two sentences what kind of job you are
qualified for. It should be specific to the job you are applying to. If you
don’t know the exact job title, state subjects and areas that you are
interested in and well trained and prepared for. Don’t promise skills
that you do not have, even if you do anticipate that you can learn on
the job. In some cases, if a company finds that you have misrepresented
yourself in hiring documents such as the resume or the cover letter, this
can be grounds for termination. In other words, don’t lie. In the cover
letter you could indicate skills that you would like to improve or learn
on the job, but be careful not to claim what is not true.
Because you are a student and may not have a lot of experience
in the field you want to work in, your education history should go next.
This should include education levels, the subject you studied (major),
and date(s) of graduation. Since you haven’t graduated from university
yet, you may include your “expected” date of graduation. Some people
include honors they earned in education or the community, and these
often speak to your dedication and exceptionality. It may also be a good
idea to include classes you took that are relevant to the job that you
want.
Next, you should include relevant work experience. These are
jobs or volunteering you have already done (or are currently doing) that
are related to the job you want. Because you are in university, you don’t
need to include information about your employment if you lack it, but
internships or work (paid or volunteer) are good habits to pursue during
your university education to build your professional profile and skill
set. For each employer or workplace, include the company name, the
address, your job title, and your dates of employment. After this include
one or two lines about your duties there (what you typically did there).
Make these short and use action verbs when describing what you did.

260
As you gain more experience in your field, eventually you will want to
place this section before your education. For now, it goes after
education.
Finally, you should have a list of activities you may do in
university (if any). Some employers like to see what you have done in
terms of public or community service or special activities as a
university student (club president or treasurer, for example). You can
also include special skills here, such as “proficient in PHP, SQL, and
HTML,” “fluent in English,” or even how many words per minute that
you can type.
You may not need to include this on your resume, but it is a
good idea to have a list of references. Employers will ask others what
they think of you, so it is good to keep at least 3 people who are not
related to you that may recommend you for a certain job. Generally,
you should give the people’s names, their titles and company or
institution, and their contact email or phone numbers.

Writing your Resume


The next step is to write a resume using the above
recommendations. You may create your own format or use a template
(many of these can be found on in word processing software such as
Microsoft Word or Open Office, as well as online). The font should be
business-appropriate (e.g., Times New Roman).

LinkedIn Profiles

LinkedIn.com is a popular social networking site for work and


professional purposes. Users can create a professional profile on the
site, like an online resume. A LinkedIn profile usually has a person’s
name, photo, their strengths and skills, current and previous positions,
and their education. Like other social networking sites, LinkedIn has a
variety of ways for users to communicate with each other, such as
groups (e.g., about specific companies, jobs, or topics of interest) and
direct messages. Different from other sites, LinkedIn also allows users
to give each other endorsements, or public support of someone’s stated
skills.
LinkedIn is also a good place to look for job advertisements
around the world in a wide variety of fields.

261
Creating a LinkedIn profile is a good idea in today’s digital
world. It can get your name out to more people more quickly. When
people search for you online, they are likely to find your LinkedIn
profile, so it is important to present yourself in a professional manner.
In this exercise, you will complete your LinkedIn profile. If you
have Internet access, you can go to <http://www.LinkedIn.com> and
create a real profile. If you are not able to do that, you can complete a
mock profile using the template in this unit.
The first section of your LinkedIn profile has your photo, name,
and ‘headline.’ People usually put their current position and their
current employer in their headline. For example, you could put
“Student at Al Quds Open University” if you do not have another job.
Next is the “About” section. This is a viewer’s first impression
about you, and a place where you can summarize your most important
information. This is probably the most important section of your
profile, since it is what people will see first. Potential employers will
read this before deciding whether to continue reading your profile or
not. You could highlight your biggest achievements, describe your
biggest strengths, and show off your personality. Some tips for this
section are:
 Describe what is most important to you about your current or
future work. That is, what excites you about your field?
 Explain your current position. Don’t just state your job title.
Instead, explain what you do. This is a good place to show your
skills and experience.
 Highlight your successes: If you have won any awards or had
any particularly successful moments at work, you can include
those here also.
Fill out the first part of your profile with your name, headline, and
‘About’ section, either online in a real LinkedIn profile, or in the
template below.

262
Next is the Experience and Education section. For each position
you’ve had, you should list your job title, the name of the company that
employed you, and the dates of your employment. You don’t need to
list exact dates; listing the month and year is enough. You can also
include a bulleted list of key responsibilities and successes you had in
that position, highlighting your abilities. Usually, positions you had in
the past are written in past tense, and your current position is in present
tense. For example, if in a previous job you managed multiple projects
at the same time, you could write something like “Successfully
managed multiple projects simultaneously.”
Next, fill in the Experience and Education sections of your
profile, either in your LinkedIn profile online or using the template
below.

263
Lastly, you can add any skills and accomplishments you have.
You should add skills and accomplishments that are relevant to the kind
of job you are looking for, or that would help you to be seen as a good
candidate for such a job.
Use the template below to add some skills in the top section,
and accomplishments in the lower section. Then, talk with your
classmates to find people who are willing to endorse your skills.

264
265

You might also like