اللغة الانجليزية للتكنولوجيا
اللغة الانجليزية للتكنولوجيا
Authors
Ryan T. Miller and Enrico Gandolfi
Dear Students,
The most important thing to remember as you use this book is to try to
use the English you learn as much as possible. Remember that English,
like any language, has a lot of variation among speakers. Even within
the so-called standards for English (British, North American, or
Australian English, among others) there are many different varieties,
which may cause confusion and even miscommunication. So, when
you have a misunderstanding, use your negotiation skills, request
clarification, and perhaps confirm in writing. Think of English as a
communication tool. The most important thing is to communicate your
ideas, even if there are some small mistakes.
None of the speakers are professional actors, and not all of the speakers
are native speakers of English, but please listen for our voices from the
Midwest of the U.S. speaking to you in Palestine. Any errors in this
book remain the errors of the authors.
Sincerely,
Table of Contents
Introduction
Warm-up: What is technology?
Reading 1: App Development Basics
SAQ
Reading 2: Technology in our Lives
SAQ
Discussion
Matching: How do you use technology?
Discussion
Fill in the Blank
Listening: Explaining technology to grandpa
SAQ
Role Play: Explaining technology to a novice
Vocabulary Quiz
Discussion: Expectations for this course
Writing: A Testimony from the Future
1
Preface
This unit introduces students to the English for Technology
textbook. Students will read and discuss about what ‘technology’
means, basics of app development, and the role of technology in our
lives now and in the future.
Learning Outcomes
After studying this unit, students should be able to:
Explain what technology is
Express how technology affects our lives
Use the new vocabulary words to describe aspects of
technology and their functions
Discuss how technology has changed our lives and might
change our lives in the future
2
Unit 1: Welcome to English for Technology
Introduction
Hello and welcome to English for Technology!
In this course, you will learn to understand, speak, and write in ways
required to function in an English speaking IT job or university
program of study. The course is organized into units covering a wide
variety of IT topics. In each unit, you will learn new vocabulary, read
about ideas and situations in IT, have discussions with classmates, and
complete activities alone or with your peers that will help you develop
new skills and practice what you’ve learned.
In this first unit, we will guide you through the basic format of the units
in the course and the kinds of activities you will do.
3
discussions. Many of the discussions ask you for your opinion, so there
might not be a right or wrong answer. You should share what you think.
In this first unit, there are not very many vocabulary words you need to
learn. Read through the vocabulary below, which are related to some
basic technology concepts and terms. You might know some of the
words already. Which words are you familiar with, and which are new?
Put a check mark (✔) next to the ones you need to learn (that is, the
ones that you don’t know yet).
4
6. hardware: physical things that make up a computer, such as a
component or a peripheral
7. internet: the largest known public network in the world,
connecting millions of computers around the world
8. network: a group of connected computers
9. peripheral: an external computer add-on, such as a printer or a
scanner; also known as an 'accessory'
10. software: any program designed to run on a computer
SAQ
1. What will help you to develop software that works without
crashing?
2. What are the author’s four rules when building a new app?
3. Do you agree with these rules? Which do you think are most
important?
5
Reading 2: Technology in our Lives
Here are some vocabulary words that will be useful in the next reading.
Put a check mark (✔) next to the ones you need to learn.
After reading, you will have discussions and complete some activities.
6
SAQ
1. What is an innovation?
2. What is making people become more active as technology
consumers?
Discussion
7
Matching: How do you use technology?
Technologies Tasks
Fun
Laptop (Computer)
Work
Tablet
Stay updated
and informed
TV (Television)
Stay healthy.
8
Discussion
Next, listen to the dialogue and fill in the blanks with words from the
box below. Some of the words are used multiple times.
9
hardware internet peripheral
computer phone software
app application
Listening Link
10
Grandpa: “As long as it’s 23)‘__________’ and not 24)‘
__________’ pizza.”
SAQ
1. What is the grandpa learning?
2. What difficulty does the grandpa have?
3. Have you ever had to explain technology to a technology
novice? Was it easy or difficult? Why?
11
Vocabulary Quiz
Vocabulary Quiz
Choose the best definition for each of the words below.
1. Internet
a. the largest known public network in the world,
connecting millions of computers around the world
b. physical things that make up a computer, such as a
component or a peripheral
c. an electronic, digital device that stores and processes
information
2. data
a. any program designed to run on a computer
b. any device internal to the computer, such as a primary
hard disk drive or motherboard
c. raw information of any kind
3. component
a. an electronic, digital device that stores and processes
information
b. any device internal to the computer, such as a primary
hard disk drive or motherboard
c. any program designed to run on a computer
4. database
a. any device internal to the computer, such as a primary
hard disk drive or motherboard
b. an organized, electronic collection of information
optimized for fast access and typically consisting of
rows, columns, indexes, and keys
c. an electronic, digital device that stores and processes
information
12
5. hardware
a. an organized, electronic collection of information
optimized for fast access and typically consisting of
rows, columns, indexes, and keys
b. any device internal to the computer, such as a primary
hard disk drive or motherboard
c. physical things that make up a computer, such as a
component or a peripheral
13
English for Technology
Unit 2: Introduction to Computer Software
Table of Contents
14
Preface
This unit introduces students to the vocabulary and concepts for
discussing software features and bugs and open-source and closed-
source software models. Students will also learn about Sunbula and the
challenges encountered when building a web site. Lastly, students will
learn to write a software heuristic evaluation to evaluate the
functionality and usability of a piece of software.
Learning Outcomes
After studying this unit, students should be able to:
Recognize and use vocabulary related to software
Discuss personal experiences with software
Explain open-source and closed-source software models
Argue for their opinion about open-source and closed-source
software models
Write a software heuristic evaluation
15
Unit 2: Introduction to Computer Software
1. Have you ever written or modified any software? If so, what were
the challenges you faced? If not, why not?
2. Name three pieces of software you use frequently. Why do you use
them? What would you change about them?
3. What was the worst technical problem you have ever had with
software? How did you solve it?
Read through the vocabulary below, which are related to some basic
concepts and terms about software. You might know some of the words
already. Which words are you familiar with, and which are new? Put
a check mark (✔) next to the ones you need to learn (that is, the ones
that you don’t know yet).
16
1. abort: to end a program or a process before its completion
2. bug: an error in a computer program
3. compatible: capable of being used without modification
4. crash: a computer failure due to faulty hardware or a serious
software bug
5. documentation: text that explains how the software operates or
how to use it
6. end user: a person who uses a product or service on a computer
7. error: an incorrect action attributable to poor judgment, ignorance,
or inattention
8. execute: to start a program on a computer
9. feature: something a computer program is "supposed" to do; these
are often reasons to use a particular program or upgrade to a more
recent version
10. programmer: a person who writes or modifies computer programs
or applications
11. usability: a measure of how easy or efficient a program is to use
Listening Link 1
For as long as there has been computer hardware, there has also
been computer software. But what is software? Software is just
instructions written by a programmer which tells the computer what
to do. Programmers are also known as 'software developers', or just
'developers'.
Nothing much is simple about software. Software programs can
have millions of lines of code. If one line doesn't work, the whole
program could break! Even the process of starting software goes by
many different names in English. Perhaps the most correct technical
term is 'execute', as in "the man executed the computer program." Be
careful, because the term 'execute' also means (in another context) to
put someone to death! Some other common verbs that refer to starting
a software program are 'run', 'launch’, and even 'boot' (when the
software in question is an operating system).
Software normally has both features and bugs. Hopefully more of
the former than the latter! When software has a bug there are a few
things that can happen. The program can crash and terminate with a
17
confusing message. This is not good. End users do not like
confusing error messages such as:
Site error: the file
/home7/businfc6/public_html/blog/wordpress/wp-
content/plugins/seo-blog/core.php requires the
ionCube PHP Loader ioncube_loader_lin_5.2.so to be
installed by the site administrator.
SAQ
1. What is software?
2. How is software not simple?
3. Why does programming seem mysterious to most people?
4. Why should people studying IT learn a programming language?
18
Matching: Features and Bugs
Label the situations on the left with the “feature” or “bug” categories
on the right. In essence, are they useful or a problem to solve?
Situations Category
Bug
When I change the font
color, the program crashes
19
Dialogue: Software comparison
Listening Link 2
20
Think and Share: Experiences with software
Think of a piece of software you use often, and answer the following
questions about it:
1. What is the name of the software?
2. What does the software do?
3. What are the key (most important) features of the software that make
it better than other, similar software?
4. Have you ever encountered any bugs in the software? Has the
software ever crashed?
5. Have you ever used the software’s documentation? Was it easy to
use?
6. How is the software’s usability? Is it easy for the end user to use for
the first time?
Now, share your ideas about the software with a partner or small group.
1. closed source: software in which the license says that the user
cannot see, edit, or manipulate the source code
2. compiler: a program that converts computer code into a machine
code that can be read and executed by a computer
3. debugger: a computer program that assists in finding and
correcting errors in software
4. IDE (integrated development environment): an application
normally consisting of a source code editor, a compiler and/or
interpreter, build-automation tools, and a debugger
5. open source: software in which the code is distributed allowing
programmers to alter and change the original software as much as
they like
6. operating system: the software link between the computer and user
(for example, Microsoft Windows, Apple OSX, or Linux)
7. proprietary: privately developed and owned technology
8. restriction: a rule or law which limits or controls something
21
There are two basic kinds of software you need to learn about as
an IT professional. The first is closed source or proprietary software,
which you are not free to modify and improve. An example of this kind
of software is Microsoft Windows or Adobe Photoshop. This software
type is so popular that some people believe it's the only type there is.
But there's a whole other world of software out there.
The other kind of software is called open source software,
which is normally free to use and modify (with some restrictions of
course). Examples of this type of software include most popular
programming languages, some operating systems such as Linux, and
thousands of applications such as Mozilla Firefox and Open Office.
But what is the real difference between open source and closed
source software? Is open source software just about saving money?
Let's investigate. Let's say for instance you find a bug in the latest
version of Mozilla Firefox. The bug is causing a major project to fail
and you need to fix it right away. This is not very likely to happen, but
it's just an example. You could take the following steps:
Step 1. Download and unzip (or uncompress) the source code from
Mozilla.
Step 2. Use an IDE and a debugger to find and fix the bug in the
source code. You would need to know a little C++ to debug
applications such as this.
Step 3. Test the fix and then use a compiler to turn the source code
into a binary file. This can take a long time for big
programs. Once the source code is compiled then the
program should work!
Step 4. You are almost done. Now send the bug fix back to the
Mozilla Firefox team. They may even use your bug fix in
the next release!
Now imagine you find a bug in a proprietary code base such as
Microsoft Word. What can you do? Not much, just file a bug report
and hope someone fixes it at some point.
This is a rather extreme example, but it illustrates why
programmers generally prefer open source software to closed source
alternatives. Good programmers love code and they want access to it.
Hiding the code from a programmer is like hiding the car engine from
an auto mechanic. We don't like it!
22
SAQ
1. What does ‘closed-source’ mean? What does ‘open-source’ mean?
2. What are differences between closed-source and open-source
software?
3. If a programmer finds a bug in a piece of closed-source software,
what can they do? What about if they find a bug in open-source
software?
23
Role Play: Software supporter
Vocabulary Quiz
2. closed source
a) something a computer program is "supposed" to do; these are
often reasons to use a particular program or upgrade to a more
recent version
b) software in which the license stipulates that the user cannot see,
edit, or manipulate the source code of a software program
c) a measure of how easy or efficient a program is to use
24
3. crash
a) privately developed and owned technology
b) a computer failure due to faulty hardware or a serious software
bug
c) to start a program on a computer
4. end user
a) a person who uses a product or service on a computer
b) a person who writes or modifies computer programs or
applications
c) an electronic, digital device that stores and processes
information
5. restriction
a) a rule or law which limits or controls something
b) an application normally consisting of a source code editor, a
compiler and/or interpreter, build-automation tools, and a
debugger
c) a computer failure due to faulty hardware or a serious software
bug
25
Next, listen to the dialogue and answer the following questions. Listen
once without reading the script and see if you can answer the questions.
Then, listen again and follow along with the transcript to check your
answers.
1. What kind of a problem does Rami have?
2. According to Mahir, what kind of an error is it?
3. Why doesn’t microphone connect to the computer?
4. Is the company’s software “open source”?
5. When is a software called a “closed source”?
Listening Link 3
26
Mahir: Here let me look into it with my Integrated Development
Environment toolkit
Rami: That sounds fancy, what is that?
Mahir: Normally if a program aborts itself and gives an error, it will
just give you a pop up saying it doesn’t work, but with this tool I
can look into the source code and see a more detailed log of what’s
happening.
Rami: Do you think you can fix it?
Mahir: Yes, it’s actually very simple. The error it’s giving is because
the model identification number on the microphone does not match
the same number the computer is looking for. When you put the
microphone in the first time, the computer reads the code inside the
microphone to determine what model it is, and then installs the rest
of the code, which are the drivers, that allows the microphone and
computer to exchange information. It looks like the programmers
wrote the ID line of the code wrong so when the computer looks
for the device it can’t find it and connect.
Rami: So our department of highly paid intelligent people misnamed
the device in their own code, and now our computers don’t know
that our microphones are plugged into them?
Mahir: Yes, I can edit it right now for you so you can get to work
Rami: Doesn’t this mean that it won’t be working for the end users as
well, I got this microphone off of our shelves!
Mahir: You’re right, the customers will also be having this problem,
but our software is open source so that our customers have access
to it, and they usually either fix it themselves or give us suggestions
on how to get rid of some bugs and make the product work better.
Rami: I would rather have the company I’m buying from deal with all
of that tech stuff, I just want my microphone to work.
Mahir: That’s called closed-source-software, most of the time the
responsibility of coding only falls on the programmers at the
company, and they make it so that nobody but them can edit their
code. We have to make our products open-source so that everyone
can change it since we advertise our microphones as highly
customizable.
Rami: I guess that makes sense, those music professionals that we sell
to really want to tweak and customize everything they can.
27
Mahir: Yeah that doesn’t excuse the lazy mistakes the programmers
make though, I’m going to have to talk to them. Here you go it
looks like it’s working now
Rami: Well thanks a lot for your help, I’m glad I know a little bit more
about what we’re selling, good luck with the rest of your day
Mahir: No problem, I’ll see you around Rami.
General vocabulary:
1. empowerment: giving people skills and resources to be successful
2. fair trade organization: a company that sells products from
developing countries, and buys those products from local producers
for a higher wage and makes sure they have good working
conditions
3. freight: the transportation or shipping of goods
4. social justice: fair relationships in a society, especially in terms of
money, opportunities, and privileges
IT vocabulary:
5. (user) account: the place on a computer or server where a person’s
username, password, and other information about the person is
stored
6. admin: the person who is responsible for configuring and
administering a computer system
7. launch: to begin something
8. responsive design: web design that makes sure web pages look
good on different kinds of devices (such as computers, tablets, and
smartphones)
9. user friendly: easy for the end user to use or understand
28
(uprising) inside St. Andrews Guest House in Jerusalem. In 1996,
Sunbula was officially established as a nonprofit organization. In April
of 2010, Sunbula opened its second shop, “House of Palestinian
Crafts,” in the East Jerusalem neighborhood of Sheikh Jarrah. Sunbula
is a member of the WFTO (World Fair Trade Organization) and
upholds fair trade principles and practices. It currently works with 24
producer groups across Palestine who produce a range of local,
traditional crafts such as embroidery, jewelry, olive oil soap,
olivewood and mother-of-pearl carvings, Bedouin weaving, basketry,
ceramic, felt-wool items, and silk-screen printed garments. Since being
founded, Sunbula has become Palestine’s leading fair trade craft
organization, and is regarded as a trusted provider of the finest quality
traditional crafts while directly supporting hundreds of women and
their families.
Sunbula’s two fair trade stores in Jerusalem are important
means of selling and displaying the work of artisans, and have acted as
an economical support for them and their families. However, the
numbers of customers visiting the stores decreased substantially in
2000 and 2001, and like most Jerusalem establishments depending on
tourism, Sunbula was facing hard times. In 2001 Sunbula reached out
to internet users and launched their first website with an online
catalogue.
The website was programmed using basic HTML programming
language. The catalogue displayed the products and allowed users to
choose the quantities, add the address for the shipment, and checkout.
For security measures Sunbula did not accept payment via its website
at that point; the website would transmit the order via email to Sunbula
admins where they later contacted the customer to arrange for the
order’s payments. Freight information was only displayed on the
website but the catalogue did not automatically add the freight charges
when checking out and finalizing the order. Due to using HTML
programming language, it was not easy for the admins to change and
add information about products on the website without the help of an
IT expert.
The website was redesigned in 2005 and programmed using
Secured HTML Programming Language and PHP language. The
catalogue was programmed using PHP language allowing the
customers to create an account entering their own usernames and
password. The customers were able to add products to the cart, the new
29
system allowed them to make changes and delete items from the cart.
The website was not easy to use, and hard to update for the admins.
Since 2010 Sunbula partnered with Intertech Co. a Palestinian
information technology company that specializes in portal, web, and
mobile application development. A fully dynamic website using
Intertech’s web content management system was custom designed and
programmed to meet Sunbula’s needs. The admins were able to add
and adjust content on the website, adjust information and images, and
add product and quantities. The system automatically calculated freight
fees according to countries and weights and added to the final cart
visible to the customer. In 2015 using responsive design to
accommodate smart phone and tablets, Sunbula and Intertech launched
the current Sunbula website and online shop with a more secure store
and a more user friendly design. http://www.sunbula.org/
SAQ
1. What does Sunbula do?
2. What features did Sunbula’s first web site have?
3. What were problems with their first web site? How was its
usability?
4. What features were added in the second web site?
5. What features were added in the third web site?
To start your software heuristic evaluation, pick a program that you use
and know well. Then, describe it by following the outline below, which
is adapted from Nielson’s (1994) usability heuristic guide. In your
30
evaluation, you should refer to your personal experience as an end user
of the software. You might need to use the software a bit in order to
answer some of the questions.
Software Name:
Publisher/developer:
Error messages: Are they expressed in plain language that tells the
end user what the problem and the solution are? Do error messages use
error codes or other confusing language?
Open vs. closed source: Is the program open or closed source? Would
you change it? Is it easy to report possible bugs to the developers?
Visibility of system status: Does the software keep the user informed
about what is going on? Is there appropriate feedback from the
software?
Match between system and the real world: Does the software use
language that is user friendly, with words, phrases and concepts
familiar to the user, rather than language only understandable by a
programmer?
Once you are finished with your software heuristic evaluation, present
your findings to a small group or to your class.
31
English for Technology
Table of Contents
Preface
Goals of the Unit
Learning Outcomes
Warm-up Activity: Discussion
Reading: Operating Systems
Vocabulary
SAQ
Fill in the Blank
The Most Popular OSs
Role Play: OS Supporter
Reading: CLI and GUI
SAQ
Discussion
Fill in the Blank
Vocabulary Quiz
Reading: The Software Development Life Cycle (SDLC)
Before you read
Vocabulary
SAQ
Fill in the Blank
Vocabulary practice: Crossword
Case Study: Events.ps
Vocabulary
SAQ
Writing: Software Development Project Report
32
Preface
This unit introduces students to vocabulary and concepts
related to operating systems, graphical user interface-based OSs and
command line-based OSs, and the software development life cycle.
Students will read a case study about Events.ps, a web site for finding
cultural, social, musical, and other events in Palestine. Lastly, students
will learn to write a software development project report.
Learning Outcomes
After studying this unit, students should be able to:
Actively use the presented vocabulary in conversations
Identify and discuss the stages of the software development life
cycle
Write a software development report
33
Unit 3: Operating Systems & Software
Applications
34
Reading: Operating Systems
IT Vocabulary
1. Device driver: software which converts the data from a component
or peripheral into data that an operating system can use
2. File permissions: a set of strict rules for controlling read, write,
and execute access to a file or directory
3. Format: prepare a device to store data, erasing any existing data
4. Hidden file: a file which does not appear by default in a directory
listing; normally for security reasons or to spare confusion in end
users
5. Kernel: the fundamental part of an operating system responsible
for providing access to the machine's hardware
6. Launch: to start (or execute) an application
7. Multitasking: execution of two or more tasks at the same time
8. OS (operating system): a GUI or CLI software link between the
computer and operator; also provides a framework for productivity
software such as an office suite, web browser, or programming
languages
9. Sign in: to enter information related to an account name and its
password in order to access a computer resource
10. Sign out: to end a session with computer or network resource
11. VM (virtual machine): a software program which mimics the
performance of one or more hardware devices in order to run
software independently of the actual hardware
35
An operating system is a generic term for the multitasking software
layer that lets you perform a wide array of 'lower-level tasks' with your
computer. By lower-level tasks we mean:
● the ability to sign in with a username and password
● sign out the system and switch users
● format storage devices
● install and upgrade device drivers for new hardware
● install and launch applications such as word processors, games,
etc
● set file permissions and hidden files
● terminate misbehaving applications
36
some tasks better than others. Free BSD, Solaris, Linux, and Mac OS
X are some good examples of non-Windows operating systems
Geeks often install and run more than one OS on a single computer.
This is possible with dual-booting or by using a virtual machine.
Why? The reasons for this are varied and may include preferring one
OS for programming, and another OS for music production, gaming,
or accounting work.
SAQ
1. What are some lower-level tasks that an operating system allows
you to perform?
2. What is the difference between the first operating systems (before
1960) and those now?
3. What is the kernel of an operating system responsible for?
4. Can you name at least 3 operating systems?
Fill in the vocabulary words that best fit in the sentences below.
1. Hala tested her Java code on many __________ including:
Windows, Linux, and Macintosh.
2. Rashid could not __________ to his Windows computer because
he forgot his username and password.
3. My computer has lots of RAM and can handle __________ very
well. I can switch quickly between Google Chrome, Outlook, and
other programs I have open.
4. The server was set to automatically __________ users after 10
minutes of inactivity.
5. One must __________ a flash memory drive or a hard disk drive
before it can be used to store data.
6. The lowest level of an OS is the __________.
37
The Most Popular OSs
Before watching the below video, discuss the following questions with
a partner or small group: “What do you think was the most popular OS
in 2005? How about in 2012? In 2019?”
Next, watch the following video about changes in OS market share over
time (from 2003-2019).
<https://www.youtube.com/watch?v=eJuvKn5j_kE>
38
Reading: CLI and GUI
Read through the vocabulary below. Which words are you familiar
with, and which are new? Put a check mark (✔) next to the ones you
need to learn.
General Vocabulary
1. diehard: very determined or loyal
2. market share: the percentage that a company has of the total sales
for a particular product or service
IT Vocabulary
1. CLI (command line interface): a text-only link between a
computer and the user
2. GUI (graphical user interface): a graphical, icon-based link
between a computer and the user
3. interface: a program is the link between a computer and the user
4. office suite: a collection of integrated productivity programs
normally including at least: spreadsheet, word processor, database,
and presentation maker.
5. power user: a user of a computer whose skills are more advanced
than most other users
6. system administrator: a person who maintains a computer server
network, including patches, upgrades, and security related duties
Listening Link 1
39
An OS must have at least one
kind of user interface. Today
there are two major kinds of user
interfaces in use, the command
line interface (CLI) and the
graphical user interface (GUI).
Right now you are most likely
using a GUI interface, but your
system probably also contains a
command line interface as well.
Typically speaking, GUIs are
intended for general use and CLIs are intended for use by computer
engineers and system administrators. However, some engineers only
use GUIs and some diehard geeks still use a CLI even to type an email
or a letter.
Examples of popular operating systems with GUI interfaces
include Windows and Mac OS X. Unix systems have two popular GUIs
as well, known as KDE and Gnome, which run on top of X-Windows.
All three of the above mentioned operating systems also have built-in
CLI interfaces as well for power users and software engineers. The
CLI in Windows is known as MS-DOS. The CLI in Mac OS X is
known as the Terminal. There are many CLIs for Unix and Linux
operating systems, but the most popular one is called Bash.
In recent years, more and more features are being included in the
basic GUI OS install, including notepads, sound recorders, and even
web browsers and games.
A great example of an up and coming OS is Ubuntu. Ubuntu is a
Linux operating system which is totally free, and ships with nearly
every application you will ever need already installed. Even a
professional quality office suite is included by default. What's more,
thousands of free, ready-to-use applications can be downloaded and
installed with a few clicks of the mouse. This is a revolutionary feature
in an OS and can save lots of time, not to mention hundreds or even
thousands of dollars on a single PC. Not surprisingly, Ubuntu's OS
market share is growing very quickly around the world.
As an IT professional, you will probably have to learn and master
several, if not all, the popular operating systems. If you think this sort
of thing is fun and interesting, then you have definitely chosen the right
career.
40
We have learned a little about operating systems in this
introduction and you are ready to do more research on your own. The
operating system is the lowest software layer that a typical user will
deal with every day. That is what makes it special and worth studying
in detail.
SAQ
1. What does CLI mean? What does GUI mean?
2. Who typically uses a CLI and who typically uses a GUI?
3. Why is Ubuntu’s market share growing around the world?
Discussion
Write the vocabulary words that best fit in the sentences below.
1. For the final consumer, ________ is a better and easier user
interface than ________ .
2. With a ________ , it is possible to have two OSs on a single
computer at the same time.
3. The ________ is at the core of any OS.
4. I’ve been using computers for many years and I know a lot about
them. I am a ________.
5. You can use an ________ to get work done, such as writing
documents, presentations, or spreadsheets.
41
Vocabulary Quiz
4. OS or operating system
a) prepare a device to store data, erasing any existing data
b) a GUI or CLI software link between the computer and operator;
also provides a framework for productivity software such as an
office suite, web browser, or programming languages
c) a file which does not appear by default in a directory listing;
normally for security reasons or to spare confusion in end users
5. VM or virtual machine
a) a software program which mimics the performance of one or
more hardware devices in order to run software independently
of the actual hardware
b) concurrent execution of two or more tasks by a processor
c) an icon based link between a computer and its operator
42
Reading: The Software Development Life Cycle (SDLC)
Vocabulary
Read through the vocabulary below, which are related to the software
development life cycle. Which words are you familiar with, and which
are new? Put a check mark (✔) next to the ones you need to learn.
General Vocabulary
1. Evaluate: to test or assess
2. Meaningful: having real importance or value
3. Productive: working hard and getting good results
4. Stability: the state of being not easily changed or likely to change
IT Vocabulary
1. Alpha : the first version of a software application that is "feature
ready" but still very far from "production ready"
2. Beta: a software version which is feature-ready, has passed early
testing, and ready for more widespread testing
3. Debugging: the process of identifying and removing errors from
computer hardware or software
4. Freeware: software distributed without cost by the developer
which normally cannot be modified or sold without permission
5. Help file: electronic documentation included with a program
6. Iterative: ongoing, involving repetition of a process
7. Patch: a software update intended to fix bugs or security holes in a
software release
8. Proof of concept: an experiment that demonstrates that something
is possible
9. Prototype: a draft version of a product
43
10. RC (release candidate): a piece of software that has passed its
testing stages and is close to release
11. Shareware: closed source software distributed freely for a limited
time until a full version must be purchased
12. SDLC (software development life cycle): a formalized approach
to creating and maintaining software
13. Trial version: a piece of software which is available for evaluation
by customers free of charge, normally for a limited amount of time
14. Upgrade: to replace an older version of software or hardware with
a newer version
44
should be wary of beta versions, especially if program stability is
important to you. There are exceptions to this rule as well. For
instance, Google has a history of excellent beta versions which are
more stable than most company's releases.
3. After the beta stage of software development comes the release
candidates (abbreviated RC). There can be one or more of these
candidates, and they are normally called RC 1, RC 2, RC 3, etc.
The release candidate is very close to what will actually go out as
a feature complete 'release'.
4. The final stage is a 'release'. The release is the real program that
you buy in a shop or download. Because of the complexity in
writing PC software, it is likely that bugs will still find their way
into the final release. For this reason, software companies will offer
patches to fix any major problems that end users complain loudly
about.
Applications are distributed in
many ways today. In the past most
software has been bought in stores in
versions called retail boxes. More and
more, software is being distributed
over the Internet, as open source,
shareware, freeware, or traditional
proprietary and upgrade versions.
A common technique used in
software development is so-called
rapid prototyping, which means to constantly evaluate increasingly
refined prototypes for improving design and programming in a quick
and straightforward way. Another term used to describe this approach
is “the rule of loop”, stressing the importance of iterative testing and
improvement. A related concept is debugging, which describes the
process to fix issues and bugs when the software is close to be released.
SAQ:
1. What is the software development life cycle?
2. What is an alpha version? How is a beta version different?
3. How has distribution of software changed?
4. What is rapid prototyping?
45
Fill in the Blank
Write the vocabulary words that best fit in the sentences below.
1. ___________ versions are rarely released to the public and
frequently contain serious bugs.
2. The ___________ version of the new program was released
yesterday, but final release is still months away.
3. Sometimes a company will make a ___________ of a program that
offers fewer features than the full version.
4. The man needed to ___________ his office suite so he could export
his document files in the newest format.
5. The ___________ often contains useful information about how to
use a program.
6. Office suites such as MS Office or Google Docs are designed to
make users more ___________ at their jobs.
46
Vocabulary practice: Crossword
Across
3. to prepare a device to store data, erasing any existing data
6. working hard and getting good results
7. very determined or loyal
9. the first version of a software application that is "feature ready" but
still very far from "production ready"
12. closed source software distributed freely for a limited time until a
full version must be purchased
13. a text-only link between a computer and the user
14. a graphical, icon-based link between a computer and the user
Down
1. the state of being not easily changed or likely to change
47
2. to replace an older version of software or hardware with a newer
version
4. execution of two or more tasks at the same time
5. software distributed without cost
8. a software version which is feature-ready, has passed early testing,
and ready for more widespread testing
10. a software update intended to fix bugs or security holes in a
software release
11. the fundamental part of an operating system
Read through the vocabulary below, which will help you when you
read the case study. You might know some of the words already.
Which words are you familiar with, and which are new? Put a check
mark (✔) next to the ones you need to learn.
General Vocabulary
1. take to the next level: to make something better
2. venue: the place where an event takes place
IT Vocabulary
1. content management system (CMS): a user interface that allows
a user to add, modify, and remove content from a website without
the need for an admin
2. functionality: the particular use that something is designed for
3. platform: a program that controls the way a computer or web site
works
48
In 2017 the founders felt the need to take the platform to the next
level. The web site was built using WordPress, a free and open-source
content management system based on PHP & MySQL.
Due to the technology used, the website faced limitations and
restrictions on the possibility of expanding the platform's services and
functionalities.
At that point, the user was able to enter the website and browse the
events. Users explained that they needed reminders, an easier way to
search the events, and there were no functionalities to accommodate
organizers and venues.
Users had to purchase paper tickets for the events from points of
sale.
Organizers had to contact the admins to add their events, which
increased the effort and time of the admins of the website.
In July 2017, Events.ps contracted InterTech co., a Palestinian IT
company that specializes in portal, web, and mobile application
development, to re-design and develop the Events.ps platform. The
solution was to use InterTech’s customizable web content management
system for the development of the new platform using PHP & MySQL.
The new platform was designed to be more interactive with the addition
of new features, functionalities, and services.
The user’s profiles were divided into 5 types: Visitor, User,
Organizer, Assistant and Admin. Some of the accounts types are free
with no expiration dates, whereas pre-paid accounts are active for a
specific amount of time. Each type has different functionalities and
authorities. For example, an Organizer account can create, add events
with photos and videos, see available venues, send invitations, and
many other functions including viewing event attendance confirmation
list. The Admin account is the main account that controls every aspect
of the platform, including approving and managing published events.
The Admin account also generates analytical reports from the database
of events and users.
An E-ticketing system was added to the new system, which
replaces paper tickets and eliminates all problems associated with
them. The system allowed users to buy their tickets and get a QR code
that will be scanned by the organizers at the entrance of the event.
A mobile application (Android and IOS) was also developed
featuring all the new functionalities in the platform, in addition to
allowing organizers to scan the QR code for tickets. The mobile
49
application supports offline browsing and caching, and supports
mobile, tablets, and iPad.
Now with the motto "You will never miss an event" the new
platform gathers all events in Palestine enabling the users to browse
events by categories, cities or calendar, add the event to their favorite
list and personal calendar, and receive a reminder by email, which
encourages them to meet people and share their experience.
SAQ
1. What was the goal of Events.ps?
2. What were the limitations of the first version of the web site?
3. What are the five user types in the new CMS? What can an
Organizer do? What can an Admin do?
4. What are some of the functionalities of the new web site?
50
Here is some information that is usually included in a software
development project report:
51
1. Name of the software and the authors
The web site is named Events.ps, and is owned by Anas Aghbar and
Yasmin Attoun. The web site’s CMS was developed by InterTech co.
3. Rationale
4. Stakeholders
5. User Stories
52
Activity 2: Writing your own software development project report
First, think of a piece of software that you would like to use but does
not exist yet. This could be the software you thought of in the
discussion at the beginning of this unit, or it could be something
different. Think of what you would like the piece software to be able
to do, what problem it solves, and who would use it.
3. Rationale
53
4. Stakeholders
5. User Stories
6. Work plan
54
English for Technology
Table of Contents
Preface
Goals of the Unit
Learning Outcomes
Warm-up Activity: Discussion
Reading 1: Personal Computers
Vocabulary
SAQ
Your PC Use
Hardware Components
Fill in the Blanks
Ranking Activity
Reading 2: Peripherals
Vocabulary
SAQ
Discussion
Reading 3: Computer Memory and Storage
Vocabulary
SAQ
Dialogue
Discussion
Role Play
Vocabulary Quiz
Crossword Puzzle
Activity: Build your own computer
Writing Assignment: Evaluating Your Computer
55
Preface
In this unit, you will learn vocabulary, have discussions, and
write about personal computer components, peripherals, and input
devices.
Learning Outcomes
After studying this unit, students should be able to:
Remember vocabulary related to PC hardware components,
peripherals, and input devices
Use the new vocabulary in oral discussions and in writing
Evaluate information found on web sites of computer hardware
sales companies both in Palestine and in other countries
Evaluate their own computer
56
Unit 4: Computer Hardware
1. Do you have a computer? Do you know how it works and what its
components are? Name as many components as you can.
2. If you buy a new computer, how do you choose? Why?
3. Have you ever opened a computer and changed its parts? If so, what
did you change and why? If not, why not?
Read through the vocabulary below, which are related to some basic
concepts and terms about computer hardware. You might know some
of the words already. Which words are you familiar with, and which
57
are new? Put a check mark (✔) next to the ones you need to learn (that
is, the ones that you don’t know yet).
General Vocabulary
1. Augment: to add to something in order to improve or complete it
2. Emerge: to become known or apparent
3. Synonymous: having the same meaning
IT Vocabulary
1. Convergence: the evolution of devices towards common
functionality
2. Desktop computer: a personal computer typically in the shape of
a tower or box with a connected keyboard, mouse, and monitor
3. Embedded system: a computer using a relatively slow and
specialized processor and ROM chip, normally used to control a
particular device such as a washing machine or an MP3 player
4. Form factor: the size, configuration, or physical arrangement of a
computing device
5. Laptop: a portable computer with a built-in screen, integrated
keyboard, and battery power
6. PC (personal computer): a computer designed for use by one
person at a time
7. Server: a type of computer intended primarily for central
distribution of data to other computers Sn the same network
8. Smartphone: a hand-held multimedia computer optimized for
communication and featuring a touch screen and internet
connection
9. Smartwatch: a portable computer that is work on the wrist, like a
watch
10. Supercomputer: a computer designed to perform intensive tasks
such as weather prediction, big data calculations, or space research
11. Tablet: a portable computer shaped in the form of a notebook and
capable of advanced handwriting recognition via use of a stylus or
on-screen keyboard
12. Wearables: computers designed to be worn on the wrist, head, or
other places on the body often to improve mobility
13. Workstation: a high-quality computer, typically with lots of
RAM, plenty of CPU power, and a high quality video card
58
PCs are everywhere you look today. At home, at the office, and
everywhere in between. The term PC used to be synonymous with
a desktop computer running Windows, but this is not really true.
Really, any computer you use by yourself for general purposes and is
characterized by a small form factor could be called a PC. When
people think of a PC, they might think of a laptop, desktop computer,
or a workstation, but a smartphone can also be considered a kind of
PC.
Besides PCs, there are other types of computers you probably see
at work or school. These include servers, such as file servers, print
servers, web servers, and supercomputers.
But not all types of computers are as obvious as these. There are
still other kinds of computers that fit inside of other devices and control
them. These computers are known as embedded systems. Embedded
systems can be found in traffic lights, TV sets, refrigerators, coffee
machines and many more devices. Embedded systems are typically
controlled by inexpensive, specialized processors which can only
handle very specific tasks. New types of computers are always coming
out and replacing or augmenting existing computer types. Examples
of new types of computers emerging would be netbooks, tablets, and
even wearables, like smartwatches.
Keep in mind that the lines between computer types are constantly
being blurred. This phenomenon is known as convergence.
SAQ
1. What is a PC?
2. What are embedded systems?
3. What are some emerging types of computers?
4. What is convergence?
59
Your PC Use
What kinds of PCs do you use? How do you use different kinds of PCs
differently?
Some common tasks that people use PCs for are: watching movies/TV,
playing games, doing school work, doing work for your job, reading
news, communicating with friends, or communicating with co-
workers. Which kind of PC do you use for which tasks?
Laptop
Desktop
Smartphone
Tablet
Smartwatch
Workstation
60
Next, share your answers with a partner or a small group. Make sure to
give reasons for your answers. What differences do you see between
how you use PCs and how your classmates use PCs?
Hardware Components
61
11. USB (Universal Serial Bus): A relatively fast and convenient
computer technology allowing the connection of many peripherals
such as digital cameras, scanners, external hard drives, etc.; this is
a much faster replacement for the old serial bus technology
62
Ranking Activity
Components
Reading: Peripherals
Vocabulary
Here are some vocabulary words that will be useful in the next reading,
about peripherals. Put a check mark (✔) next to the ones you need to
learn.
63
8. graphics tablet: an input device or mouse alternative using a
sensitive rectangular surface and a stylus
9. input device: any peripheral used primarily to enter data into a
computer
10. microphone: a hardware device plugged into a computer's sound
card optimized for voice commands or other audio recording
11. modem: a device which converts digital signals into analog
signals, and back again when needed
12. monitor: a visual interface display between the computer and the
operator; normally a large rectangular LCD, LED, or CRT device
13. mouse: a handheld input device used to move an onscreen pointer
by means of sliding on a flat surface
14. mouse pointer: A special icon (normally an arrow) which indicates
the current location of the mouse on the desktop screen.
15. OCR (optical character recognition): the ability of a computer to
determine standard letters and numbers based on fuzzy logic
16. plug and play: a term used to describe the technology where a
peripheral device is automatically recognized and configured when
it is detected
17. printer: a peripheral device that produces a hard copy, normally
paper, from data stored in a computer
18. right-click: to press the right-side mouse button
19. scanner: a device for capturing a binary digital image from a hard
copy
20. speaker: An internal or external device which converts electrical
impulses into audible sound.
21. speech recognition: the ability of a computer to convert spoken
words from a user into usable data.
22. stylus: a part of an input device resembling a pen used to draw on
the surface of a graphics tablet
23. touchpad: an input device consisting of a sensitive rectangular area
in which one uses a finger to move a cursor on a display.
24. touchscreen: a display that also acts as an input device by allowing
a user to navigate a program by pressing specific locations of the
screen.
25. trackball: a pointing device consisting of a ball on top of a base
that is rotated to move a cursor on the computer screen
26. webcam: any specialized video camera designed to transmit video
over the internet
64
Peripherals are a generic name for any device external to a
computer, but still normally associated with its extended functionality.
The purpose of a peripheral is to extend and enhance what a computer
is capable of doing without modifying the core components of the
system. A printer is a good example of a peripheral. It is connected to
a computer, extends its functionality, but is not actually part of the core
machine.
Do not confuse computer peripherals with computer
accessories. An accessory can be any device associated with a
computer, such as a printer or a mousepad. A printer is a peripheral,
but a mousepad is definitely not one. A mousepad does not extend the
functionality of a computer, it only enhances the user experience.
Peripherals are meant to be easily interchangeable, although
you may need to install new drivers to get all the functionality you
expect out of a new peripheral device. The technology which allows
peripherals to work automatically when they are plugged in is called
plug and play. A plug and play device is meant to function properly
without configuration as soon as it is connected. This isn't always the
case however. For this reason some people sarcastically refer to the
technology as 'plug and pray'.
Still, plug and play was a big deal when it was introduced in the
1990's. Before then, installing a new peripheral could take hours, and
could even require changing some jumper settings, DIP switches, or
even hacking away at drivers or config files. It was not a fun time
except for real hardware geeks. With plug and play technology, all the
nasty jumpers and DIP switches moved inside the peripheral and were
virtualized into firmware. This was a clear victory for the common,
nontechnical person!
The most common peripheral linking device is probably USB
technology. Why? USB is good because you can daisy chain a lot of
peripherals together quickly, it is quite fast and growing ever faster in
recent editions, and it even provides enough power to supply some
smaller peripheral devices like webcams and flash drives.
Here is a list of common peripherals you should be familiar
with as an IT professional. Keep in mind the list is always changing
due to changing technologies:
- monitors or displays
- scanners
- printers
65
- external modems
- dongles
- speakers
- webcams
- external microphones
- external storage devices such as USB-based flash drives and portable
hard disk drives
- input devices such as keyboards, mice, etc. are normally considered
peripherals as well
Input devices are a further category of peripherals. We use
input devices every time we use a computer. Simply speaking, it is
these devices which allow us to enter information. Without them, the
computer would not know what we want it to do.
Some of the things we do with input devices are: move a cursor
around the screen, enter alphanumeric text, draw pictures, and even
enter binary data in the form of graphics or audio wave forms.
Input devices have a history as long as computers themselves.
Perhaps the first input device was the simple electronic switch (similar
to a light switch) which turned bits on or off. There were hundreds or
even thousands of these switches on larger computers. It used to take a
team of programmers hours or even days to set up a computer to
perform a single calculation.
Switches are still used today on computers. For instance the power
button on the computer is a switch which is also an input device telling
the computer to power on or power off.
Most likely in front of you right now are two of the most
popular input devices: the keyboard and the mouse. And instead of a
mouse on a laptop computer you normally have a touchpad.
As computers evolved throughout the late 20th century,
computers became more and more interactive. Input devices came and
went. Sufferers of carpal tunnel syndrome (a medical condition that
causes pain, numbness, and tingling in the hand and arm) often prefer
a trackball or stylus to a mouse. Computer users with disabilities have
invented a wide array of input devices designed to replace the mouse,
including devices controlled by foot or even eye movement.
Not only PCs and mainframes use input devices. Almost all
computers feature some kind of input device. Special scanners are used
in many stores and warehouses called barcode readers to enter stock
and sell items at the cashier. These are input devices as well. Even
66
microphones can technically be called input devices as a computer can
respond to them and interpret them as incoming data.
Corporations and especially government institutions are
already implementing the second generation of input devices to
improve security. These include retina scanners and/or fingerprint
readers to replace or improve accuracy of username and password
authentication. You will be seeing more of this kind of biometric
authentication in the coming years as a general remedy for weak
passwords or leaked passwords.
SAQ:
1. How is a peripheral different from a computer accessory?
2. What is a plug and play device?
3. Why is USB technology useful?
4. What is an input device?
5. What is carpal tunnel syndrome?
Discussion
67
Reading: Computer Memory and Storage
Here are some vocabulary words that will be useful in the next reading.
Put a check mark (✔) next to the ones you need to learn.
68
14. semiconductor storage: a type of storage using integrated circuits
to store data; examples include RAM, ROM, and flash memory
15. SAN (storage area network): a cluster of storage devices working
together to provide shared network storage.
16. video memory: This is dedicated or shared memory set aside
specifically for the graphics processor
17. volatile: temporary, requires power to retain its state
69
Storage today comes in many different types
including semiconductor storage, magnetic storage, and optical
storage. A typical computer today comes with anywhere between
128GB to 2TB of storage. Low end computers normally come with a
magnetic hard disk drive which reads data at around 75 to 200
MB/sec. These devices use rotating, magnetically-charged platters to
store data. Hard disk drives are still popular because they can store a
lot of data with relatively quick access times very cheaply.
Another type of storage is network storage, typically referred to
as a SAN. This storage is usually found in a datacenter. This type of
storage goes by other names such as "cloud storage" or "network
drive." It is of course highly limited by network speeds. If you are
offline and need a file then you are out of luck. That is why it's always
a good idea to get as much storage on your PC as you can afford.
In the future all magnetic storage types will become obsolete.
They will soon all be replaced by SSDs using semiconductor
technology. SSDs have three key advantages over magnetic storage
devices: speed, lack of moving parts, and low power consumption. This
makes them ideal for laptops where battery life and durability are huge
issues.
A last type of memory is ROMs, which are somewhere in
between memory and storage. Embedded systems, BIOSs and older
video game machines used these for various reasons, mainly copy
protection and cost.
In recent years, you are much more likely to see optical storage
devices such as CD-ROM, CD-R, DVD-ROM, and DVD-R devices
being used to store larger software and data archives. These devices
can store between 650 MB and 50 GB of data.
Because of the need for ever greater capacity and performance
for removable storage, a new device called the flash drive has taken
over the industry by storm. Based on semiconductor storage
technology, these devices are small, can store a large amount of data,
and can read and write data very fast.
What about the future? Expect a gradual convergence where
there is no longer a need for both storage and memory in PCs. Some
new technology such as quantum memory may arrive which has the
advantages of both memory and storage.
70
SAQ
1. What are the main differences between memory and storage?
2. What are advantages of SSDs?
3. How are ROMs different from other memory or storage?
4. What are advantages of a flash drive?
Dialogue
In the following dialogue, Maryam is a customer and Faisal is a
computer store owner.
Listening Link 1
71
Discussion
Role Play
Vocabulary Quiz
72
3. dongle
a. a peripheral device that produces a hard copy, normally paper,
from data stored in a computer
b. a hardware device that plugs into a parallel or a USB port,
acting as copy protection for a particular software application.
c. an output screen which contains visual information; some
variants include: LED lights, CRT or LCD monitors, and virtual
reality goggles
4. optical storage
a. a data storage technique using a pattern of markings on a disc
that can be read by a laser; examples include CD-ROM, and
DVD-ROM technology
b. a type of storage using integrated circuits to store data;
examples include RAM, ROM, and flash memory
c. a cluster of storage devices working together to provide shared
network storage.
5. right-click
a. a device which forms a digitized image of a human finger print
for the purpose of biometric authentication.
b. a pointing device consisting of a ball on top of a base that is
rotated to move a cursor on the computer screen
c. to press the right-side mouse button
73
Crossword Puzzle
Read the clues below, and fill in the correct words in the crossword
puzzle.
Across
2. a type of memory which is known for being non-volatile (permanent)
and fast
5. a handheld input device used to move an onscreen pointer by means
of sliding on a flat surface
6. a part of an input device resembling a pen used to draw on the surface
of a graphics tablet
7. a portable computer with a built-in screen, integrated keyboard, and
battery power
74
8. a portable computer shaped in the form of a notebook and capable
of advanced handwriting recognition via use of a stylus or on-screen
keyboard
9. to press and release the primary (left-side) mouse button
10. a hardware device that plugs into a parallel or a USB port, acting
as copy protection for a particular software application.
11. the ability of a computer to determine standard letters and numbers
based on fuzzy logic
14. a computer designed to be worn on the wrist, head, or other places
on the body often to improve mobility
15. an input device consisting of a sensitive rectangular area in which
one uses a finger to move a cursor on a display.
16. an output screen which contains visual information; some variants
include: LED lights, CRT or LCD monitors, and virtual reality
goggles
17. any specialized video camera designed to transmit video over the
internet
Down
1. to depress and release a mouse button twice in quick succession
3. any peripheral used primarily to enter data into a computer
4. temporary, requires power to retain its state
5. a visual interface display between the computer and the operator;
normally a large rectangular LCD, LED, or CRT device
12. a type of computer memory known for being volatile and fast.
13. a term used to describe the technology where a peripheral device is
automatically recognized and configured when it is detected
75
those first. Then, on the blank lines, write other components and
peripherals you would get, and check their prices too.
Some sites where you can start your search are:
Palestinian companies:
● Carmel Computers: https://www.carmel-pal.com
● PDX Information Technology: https://pdx.ps
American companies:
● Amazon: http://www.amazon.com
● EBay: http://www.ebay.com
● TigerDirect: http://www.tigerdirect.com
● NewEgg: http://www.newegg.com
● BestBuy: http://www.bestbuy.com
Next, discuss your choices with a partner or small group. Share your
reasons for picking some components and peripherals rather than
others.
76
Writing Assignment: Evaluating Your Computer
For this writing assignment, you are asked to write a report about the
computer you use for work and/or study (it could be yours or owned by
your employer/university). Please follow the outline below for
structuring your analysis:
77
English for Technology
Table of Contents
Preface
Goals of the Unit
Learning Outcomes
Warm-up Activity: Discussion
Reading: The World Wide Web
Vocabulary
SAQ
Ordering Activity
Matching: Web Site Uses
Fill in the Blanks
Dialogue
Discussion
Case Study: Alkamandjati: Giving foreign exposure to Palestine
SAQ
Discussion
Reading: Networking & Internet of Things
Vocabulary
SAQ
Discussion
Video Activity: Internet of Things
Activity: Build your own internet of things!
Fill in the Blanks
Role Play
Search activity
Vocabulary Quiz
Writing: Web site evaluation
78
Preface
In this unit, you will learn about the history of the development
of the World Wide Web, as well as vocabulary related to the Internet.
You will have discussions about how the Internet is used in our daily
lives and how the Internet may impact our lives in the future. You will
also read a case study about an organization, Alkamandjati Association,
and its needs and challenges as it established its web presence. Lastly, you
will complete a written evaluation of a web site.
Learning Outcomes
After studying this unit, students should be able to:
Understand and explain some of the history of the World Wide
Web
Use vocabulary relating to the Internet and networking
appropriately to discuss issues such as common uses of web
sites, the Web 2.0, and the Internet of Things
Analyze and evaluate a website through areas such as security
and content, as well as propose any suggestions for
improvement
79
Unit 5: The Internet
Before starting with this unit content, let’s do a little warm-up. Discuss
the following questions with a partner or a small group.
80
Reading: The World Wide Web
Read through the vocabulary below, which are related to some basic
concepts and terms about the World Wide Web. You might know some
of the words already. Which words are you familiar with, and which
are new? Put a check mark (✔) next to the ones you need to learn (that
is, the ones that you don’t know yet).
General Vocabulary
1. attempt: a try, an effort
2. cutting-edge: something new and innovative
3. fad: something that is very popular for only a short time
4. obnoxious: unpleasant, disturbing
IT Vocabulary
1. ARPANET (Advanced Projects Research Agency Network):
developed by the US military for defense purposes, this was first
global network with packet switching
2. backbone: a central high speed network that connects smaller,
independent networks
3. cookie: a text file created by web sites which contains personal
information about an end user
4. domain name: the characters (such as qou.edu, al-ayyam.ps, or
state.gov) that form the main part of an Internet address
5. download: to transfer data from a remote computer to a local
computer
6. e-commerce (electronic commerce): the term for buying and
selling goods and services over the world wide web
7. emoticon: a symbol that uses the characters on a computer
keyboard to convey emotion an email or instant message, such as
the smiley face :)
8. hyperlink: a document cross-reference technique enabling the
retrieval of a related document or resource simply by clicking on
an underlined word or image.
9. hypertext: any electronic cross-referencing document first
envisioned by Vannevar Bush in 1945
10. HTML (Hypertext Markup Language): the coding or tagging
syntax used to write documents for web browsers
81
11. upload: to transfer a file from a local computer to a remote
computer
12. URL (Uniform Resource Locator): the address which specifies
the location of a file on the Internet
13. WWW (World Wide Web): a global hypertext system operating
on the Internet that enables electronic communication of text and
multimedia.
82
"google" for information. We "tweet" what's happening around us to
others. The new words never seem to stop!
Just because the web seems so chaotic and unorganized
compared to more structured companies and governments, doesn't
mean its total anarchy. In 1994, Tim Berners-Lee started the W3C, a
worldwide organization dedicated to setting standards for the Web.
This group is probably the most respected authority for what should
and should not be Web standards. W3C's mission is to lead the Web to
its full potential.
As a student of English and Technology, you will hear people
use the words 'Internet' and 'World Wide Web' almost interchangeably.
They are, of course, not the same thing. So what is the difference
between the two? Perhaps a simple answer is that the Internet is the
biggest network in the world, and the World Wide Web is a collection
of software and protocols on that network. A more simple way to put
it is that the World Wide Web is an application that runs on the Internet.
The original backbone of the Internet is based on an old
military network called ARPANET which was built by DARPA (the
Defense Advanced Research Projects Agency of the United States
government) in the late 1960s. ARPANET was built so information
could withstand a nuclear war. The idea was to not have a single point
of failure. This means if part of the ARPANET was blown up in a
nuclear war, the rest of it will still work! What made ARPANET so
successful was its packet-switching technology, invented by Lawrence
Roberts. The idea is that "packets" of information have a "from"
address and a "to" address. How they get from point "a" to point "b"
depends on what roads are open to them. Packet switching is a very
elegant thing. Without it, the Internet would simply not work.
People view the World Wide Web through a software
application called a web browser or simply a "browser" for short. Some
popular examples of web browsers include Microsoft Internet
Explorer, Google Chrome, Mozilla Firefox, and Apple Safari.
Browsers allow people to search, view, and even add and edit data on
the World Wide Web.
The Web is not supposed to be a passive experience. Creating
new pages for the Web is getting easier all the time. Web editing
software is specially designed to work with hypertext languages such
as HTML, which is the original specification for the Web. Web editing
software normally allows for the WYSIWYG (What You See Is What
83
You Get) creation of text, images, and hyperlinks between related
documents. With web applications such as wikis, Twitter, and
Facebook, a typical user can create his or her first online presence in a
matter of hours.
At first, many people thought the Internet was "just a passing
fad". But we know now that the Internet is not a fad. So what
happened? Web 2.0 happened!
What is Web 2.0? It's very hard to say. It's just a phrase to
describe a transition from the pre-existing state of 'Web 1.0', which was
slow, static, and unusable, to a new, 'second web', which was faster,
more dynamic, and more usable for the average person. How did these
things happen? Easy. Broadband modems enabled sites like video-
streaming YouTube to become possible. Better design and
development practices enabled social media sites like Twitter and then
Facebook to attract hundreds of millions of users. Finally, search
engine technology improved on sites like Google where people could
actually find the information they were looking for.
What will be the future of the Web? Easy. More speed and more
power. In the future, digital distribution on the Internet is likely to
replace all other forms of media distribution including CDs, DVDs, and
even radio and television broadcasts.
SAQ:
1. What is the World Wide Web?
2. What is a hyperlink?
3. What is Web 2.0?
4. What is the difference between Web 1.0 and Web 2.0?
Ordering Activity
Which online tools and events came first? Order them below from 1
(the oldest) to 5 (the newest). Then, discuss your choices with a partner
or in a small group.
Google _____
84
Matching: Web Site Uses
What online spaces do you access and why? Match the different types
of web sites on the left with what you would use them for on the right.
Each online space can have more than one use!
Having fun
Personal Website
Social media
Search engines
Blogs
Staying updated on
friends’ lives
News web sites
Solving a problem
YouTube or other
video-based portal
85
Next, share your answers with a partner or a small group. What
differences do you see between how you use web sites and how your
classmates do? What other activities do you use Internet for?
Choose the word from the box that best fits each blank.
Dialogue
In the following dialogue, Ghada and Ashraf are two friends talking
about the Internet.
Listening Link 1
86
couple weeks, I’ve been working on my personal web site, and I
finally finished it today!
Ashraf: Wow, that’s cool! I’m impressed! How did you do it?
Ghada: First, I had to choose a CMS to run the site, which took a while.
Once I chose a CMS, I needed to customize it a bit using HTML
and CSS. I wanted to find a style that really represents me. Oh, and
I bought a domain name, too!
Ashraf: Impressive! I’m curious, what are you going to include on your
website?
Ghada: Good question. I’ll definitely include information about
myself, and then some hyperlinks to interesting content and my
social media profiles.
Ashraf: Are you going to use it for work, too?
Ghada: Not right now, but I enjoy doing art and recently I’ve had a
few people ask to buy my art, so I’m thinking of adding a gallery
and an e-commerce section to my site in the future. I could show
my artwork and people would be able to buy it right there on my
site. I’m a bit worried about the security of it though. I don’t want
anyone’s private information like their credit card number to be
compromised because of my site. What do you think?
Ashraf: I think it’s a great idea! As long as you make sure the e-
commerce site uses encryption to keep the data secure, you should
be fine. Oh, don’t forget to allow your users to leave comments and
feedback.
Ghada: That’s a good point! It is the Web 2.0 era, right?
Ashraf: You bet it is!
87
Case Study: Alkamandjati Association
88
Alkamandjati to recreate the new website with a user-friendly interface
and that has a responsive design that works on all platforms including
smart phones and tablets. Alkamandjati decided to join the two
websites and their domain names, Alkamandjati.com and
Alkamandjati.org, to become one identity and one website that displays
information to the user in English, Arabic, and French in order to
expose Palestinian culture and music internationally.
The Alkamandjati team worked on gathering all the content
they wanted to display in a friendly way. In early 2018, the new website
was launched using the domain name alkamndjati.org. The new site
uses the bootstrap framework, an open-source framework that
combines HTML, CSS, and JavaScript code to help developers build
web applications. The new website utilized new trends in web design;
for example, a slider was incorporated in the main page to display
images or videos. The main page displayed information such as “who
we are,” Alkamandjati’s programs, upcoming events, news and media
coverage, the Alkamandjati team, and finally contact information
including subscription to the weekly newsletter. This made the website
simple and easy to use, improving the user experience by minimizing
the number of clicks to reach information. Delays on the website were
also solved to be less than several seconds to make sure users will not
leave the website. Forms including a volunteer form and ‘join our team’
form were programmed in English, French, and Arabic.
Alkamandjati’s Testimonial: “We are very happy to have
collaborated with Intertech for the conception and development of
Alkamandjati’s new website. Their involvement, support, advice and
time enabled us to reach the result we were aiming at: a beautiful,
efficient, and interactive website that reflects the association between
work and dynamic.”
SAQ
1. What does Alkamandjati Association do?
2. What were the problems with the previous versions of
Alkamandjati’s web site?
3. What is the bootstrap framework?
89
Discussion
Read the below questions, and discuss your answers with a partner or
in a small group.
1. For a while, Alkamandjati Association had two online presences at
two different URLs. Do you think it is important for a company to
have a single online identity using a single domain name? Why?
2. Alkamandjati Association change from working with a French IT
company to working with a Palestinian IT company. Why was this?
What do you think are some advantages of working with a local
company? Can you think of any disadvantages?
3. What ‘Web 2.0’ characteristics does the new Alkamandjati.org
website have? You can use the description of the new web site and
CMS in the case study, or you can visit the website at
http://www.alkamandjati.org and see for yourself.
4. The Alkamandjati Association focuses on music education in
Palestine as a way of strengthening Palestinian culture and identity.
What other aspects of Palestinian culture and identity could be
strengthened using online tools like web sites?
Here are some vocabulary words that will be useful in the next reading,
about networking and internet of things. Put a check mark (✔) next to
the ones you need to learn.
General Vocabulary
1. authenticate: to verify that a process is true or genuine
2. jeopardize: to put something or someone in danger
IT Vocabulary
1. Bluetooth: an open wireless protocol for exchanging data;
primarily used for connecting mobile devices to computers
2. client-server: a networking model in which the functions are
divided between "child" computers and a single "parent" computer
which stores and controls access to data
3. distributed computing: a type of computing in which a
computational task is divided into subtasks that execute on a
collection of networked computers
90
4. domain: a named group of networked computers that are
administered as a unit with common rules and procedures
5. encryption: the process of making information 'more secure' by
rendering it unreadable to anyone but the intended recipient
6. ethernet: A wired local-area network normally running between
10 Mbps and 1,000 Mbps
7. firewall: a device or software program designed to prevent
unauthorized access to a network
8. groupware: software applications that facilitate shared work on
documents and information
9. IP address: a unique string of numbers that identifies a computer
or server on the Internet
10. LAN (local area network): a small computer network normally
contained within one room or building
11. node: any computer or other device connected to network
12. packet: a collection of bits normally sent through a network that
contains data surrounded by error correction information
13. P2P (peer-to-peer): a networking model where computers
seamlessly share data; used primarily to reduce sever bottlenecks
and reduce costs
14. protocol: a set of standards or rules which govern communication
15. user agreement: agreement between an user and a website/app
provider that addresses rights, duties, and obligation of both.
16. VPN (virtual private network): a relatively high security
connection to a private network
17. Wi-Fi: a trademarked, nontechnical term used to describe a certain
quality of wireless networking compatibility
18. WAN (wide area network): a network which covers more than
one building or area
91
In the simplest explanation, networking is just computers
talking to each other. They do this by sending data packets using
various protocols and transmission mediums such as ethernet cable
or Wi-Fi connections. Computers must also know how to find other
computers on the network. To put it briefly, every computer on the
network needs a unique address so messages know where to go after
they are sent.
Networks exist for many reasons including:
● distributed computing in a client-server or peer-to-
peer networking architecture
● centralized data security and authentication
● elimination of risk of computer downtime.
● combining computers into a single domain to
facilitate groupware applications and system administration tasks
● communication and fun!
92
There are other kinds of networking as well which are not
always between PCs and servers. An example
is Bluetooth technology, which is optimized for networking between
common consumer electronics such as mobile phones, mp3 players,
and similar devices.
The technological and media convergence we mentioned in
previous units is happening even here, with the so-called Internet of
Things. This term refers to the increasing inter-connection between
different devices (computers, smartphones, smart-homes, etc.) that can
automatically interact with each other without the need for user
intervention. The potential of such an innovation is glaring; however,
there are also concerns in terms of security and privacy. In other words,
personal information may be exposed and utilized without our consent.
Therefore, it is very important to read the user agreement (or terms of
use agreement) that websites or social apps may ask you to agree to.
SAQ
1. Why do we need networks?
2. What is the goal of data encryption?
3. What is Bluetooth technology?
4. What is the Internet of Things?
Discussion
93
Video Activity: Internet of Things
Action Reaction
Example: Mom and Dad return The garage door opens.
home on their bicycles.
The outlets turn on and the oven
begins to pre-heat.
94
Activity: Build your own internet of things!
95
Device 1: Device 2:
smartphone coffee machine
Advantages of connecting
I can save time by starting the coffee while I’m getting
dressed in the morning.
I can monitor my supply of coffee beans and immediately
order more when the machine is empty.
Disadvantages of connecting
I usually read the news while I wait in the kitchen for the
coffee to brew. Maybe I’ll stop reading the news?
Internet marketing companies will get my coffee bean
preferences and try to sell me more (so I might not get to
try other kinds).
Device 1: Device 2:
Advantages of connecting
Disadvantages of connecting
Device 1: Device 2:
Advantages of connecting
Disadvantages of connecting
Next, discuss your choices with a partner or small group. Share your
reasons for picking some specific connections and explain related pros
and cons.
96
Fill in the Blanks
Fill in the blank in each sentence using one of the vocabulary words
from this unit.
Role Play
97
Search activity
Vocabulary Quiz
98
4) 'upload'
a. The transfer a file or files from a remote computer to the user's
computer
b. to transfer a file from a local computer to a remote computer
c. an electronic, digital device that stores and processes
information
5) 'cookie'
a. a text file created by web sites which contains personal
information about an end user
b. The term for buying and selling goods and services over the
world wide web
c. any electronic cross-referencing document first prophesized by
Vannevar Bush in 1945
Next, you will write a report about a website that you often use (it could
be your personal one, a social media platform like Facebook or Twitter,
and so on; the choice is up to you).
Follow the form below for structuring your analysis. You can be either
specific in terms of details (e.g., pointing to better firewalls) or more
broad in your answers.
Owner:
99
E-commerce: Does the site have an e-commerce section? If so, what
is it for? Do you think it is clear and accessible? What about security
and privacy? If it does not have e-commerce, do you think it could?
100
English for Technology
Table of Contents
Preface
Goals of the Unit
Learning Outcomes
Warm-up Activity: Discussion
Reading: IT acronyms and measurements
Vocabulary
SAQ
Ranking Activity
Fill in the Blanks
Measurement matching
Activity: Compare different technologies by using measurement unit
Pair work: Computer Needs
Internet Search: Acronyms
Reading: English for Electronics
Vocabulary
SAQ
Discussion
Dialogue
Fill in the Blanks
Role Play
Vocabulary Quiz
101
Preface
In this unit, you will learn about acronyms and measurement
terms used in IT contexts and the kind of electronic devices they are
used with. You will have discussions about the varying needs of
different computer users. You will also learn terms used to describe
electronics and electrical circuits.
Learning Outcomes
After studying this unit, students should be able to:
Remember, write, and use in conversation acronyms and
measurement units used to describe computer hardware
Evaluate the needs of a computer use and make
recommendations about computer specifications
Remember terms used to describe electronic circuits
102
Unit 6: English for Electronics
Before starting with this unit content, let’s do a little warm-up. Discuss
the following questions with a partner or a small group.
Read through the vocabulary below, which are related to some basic
concepts and terms about IT measurements. You might know some of
the words already. Which words are you familiar with, and which are
new? Put a check mark (✔) next to the ones you need to learn (that is,
the ones that you don’t know yet).
103
General Vocabulary
1. acronym: an abbreviation; a way of writing a longer string of
words more concisely
IT Vocabulary
1. bandwidth: a measurement of the capacity of data which can be
moved between two points in a given period of time
2. benchmark: a measurement or standard that serves as a point of
reference for measuring performance
3. bit (binary digit): the smallest unit of storage; normally referred
to as a '1' or '0'
4. byte (binary term): 8 bits
5. fault tolerance: The ability of a system component to fail without
causing the entire system to shut down; this is often accomplished
with redundancy
6. FLOPS (floating point operations per second): a common
measurement of computer speed dealing with decimal calculations
in a given amount of time
7. frequency: the number of cycles per unit time of a sound wave,
most often measured in hertz
8. G (giga): one billion
9. Hz (hertz): an internationally used frequency unit; equals one
cycle per second
10. IPS (instructions per second): a very raw measurement of
computer processor speed
11. K (kilo): one thousand
12. M (mega): one million
13. µ (micro): one millionth
14. m (milli): a prefix meaning one thousandth
15. n (nano): one billionth
16. T (tera): one trillion
104
The world of IT is full of acronyms and abbreviations, as is the
world of measurements. So, working with IT measurements can get
quite confusing. For example, what is the difference between an MB
and an Mbit? What does ERP or CMS stand for? The above are
examples of standard acronyms we hear all the time. Inside every
organization there is likely to be a whole range of industry-specific
acronyms as well. For instance, in my company we often talk of LMS,
CAT, SEO, SL20, and many, many more.
If someone mentions an unfamiliar acronym in your presence, you
should ask the person to clarify and explain it. Most likely you will not
be the only person in the room who feels lost. Asking questions is not
seen as a sign of weakness in a modern IT department. It is a sign of
curiosity and seeking to better oneself and one's knowledge about a
subject. But let's not kid ourselves... in your IT career, you will have
acronyms for everything. Soon it will be you confusing newbies with
acronyms of your own.
IT needs acronyms because information is constantly expanding
out of control. Here are some examples of information explosion:
The CPU at the heart of Apple's iPhone 4 is more powerful than a
Cray supercomputer costing millions of dollars from the 1970's.
The software that powers the space shuttle runs on a single MB of
RAM. The minimum RAM requirement for Windows 7 is 1 GB
( or 1,000 times as much).
If automobiles had improved their performance at the same rate as
computers over the past 50 years, we might all be driving $500 cars
that go 5,000 kilometers per hour, and get 500 kilometers per liter
of fuel. They would probably fly too. Cool.
In 1980, a 10MB hard drive cost over $4,000 and was considered
to be a lot of storage. Today, you can't even buy a 10MB hard drive.
It would be worthless and pointless. Even Windows 95, released
way back in April 1995, required a 55MB minimum hard drive.
Now you can get a TB drive for under a hundred dollars.
Did you know that in 2010 Youtube transferred more data in one
day than the entire Internet did in the year 2000?
Acronyms and abbreviations are essential to IT. Learning them is
easier than you think. Computers tend to get more powerful on an order
of magnitude over previous generations. Some people have even tried
to quantify this phenomenon. One example is Moore's Law. A simple
105
way to explain Moore's Law is that a brand new computer is completely
outdated in five years.
How do you remember the difference between a kilobyte,
megabyte, gigabyte, and a terabyte without going crazy?
This is how: Break the terms down into their components. The word
"megabyte" consists of two different words... "mega" and "byte".
"Mega" is a multiplier prefix found at the start of measurement words
which means 1,000,000 (or a million times). One "byte" is (normally)
equal to 8 "bits". A "bit" is equal to 1 switch "on" or "off" (either a 1
or 0). It takes between 1 and 3 bytes to hold a letter, depending on what
kind of character encoding you are using. So a megabyte is equal to
8,000,000 bits.... or roughly equivalent to 500,000 letters of the
alphabet. This is about the length of a short novel. The
prefix giga means 1,000,000,000 or one billion times.
So how many bits are in a gigabyte? That's right... 8,000,000,000.
Enough to store 1,000 novels.
Once you learn the prefixes and basic units of measure, it's all very
easy.
kilo (K) = 1,000
mega (M) = 1,000,000
giga (G) = 1,000,000,000
tera (T) = 1,000,000,000,000
peta (P) = 1,000,000,000,000,000
exa (E) = 1,000,000,000,000,000,000
There are bigger units of measurement than an exabyte, such as a
zettabyte and a yottabyte, but we will not discuss them in this course at
this time. But your children and grandchildren may have to know them!
How big is an exabyte? For instance, every word ever spoken by
every member of mankind would fill about 5 exabytes of storage space.
The Internet transfers around 21 exabytes of data every month.
Now those are the "big number" multipliers. In IT however, things
are not always big. They can also be very small. Unfortunately the
"small multipliers" are often used inaccurately. For example the words
"microprocessor" and "nanotechnology" use the mathematical prefixes
“micro” and “nano,”, but not accurately. What they really mean in
general is "really small".
milli = .001
micro = .000 001
106
nano = .000 000 001
pico = .000 000 000 0001
Now that we know the prefixes... it's time to learn the units. We
have already discussed byte and bit. These are common measurements
in computing. Although computers are much faster now than they were
in 1940 (around the time they were invented), they are still digital,
meaning that they can only understand zeros and ones (0 and 1).
You can put all the prefixes you learned (especially the big ones)
onto any the following units of measurement related to IT:
bit (b)
byte (B)
bps
Hz (hertz)
FLOPS
IPS
What can you do with these measurements? Almost everything!
Compute bandwidth, measure processor speed in TFLOPs with
a benchmarking program, compare quality of digital cameras or
monitors, and much, much more.
Have fun, and don't fear IT acronyms and measurements. They are
only here to help us.
SAQ
1. Why do we need acronyms in IT?
2. What does “mega” mean? What does “micro” mean?
3. How are the following pronounced?
MB, GB, mb, GHz, TFLOPS
4. What are the measurements that you know the most and when do
you refer to them (e.g., at work)?
107
Ranking Activity
Giga _____
Kilo _____
Tera _____
Nano _____
Mega _____
Micro _____
Choose the word from the box that best fits each blank.
1. The new processor ran at much higher _________ than the one it
replaced, going from 1.8 GHz up to 4.0 GHz
2. Although _________ means "one-millionth", many people use it to
express simply "very small."
3. The ________ of my internet connection is really high! I can
download a lot of data very quickly!
4. A _________ is 1024 bytes.
5. _________ is a base measurement of computer speed often
expressed in millions (MIPS).
108
Measurement matching
109
Pair work: Computer Needs
110
Dialogue
In the following dialogue, Hakeem and Hala are two friends talking
about a new computer Hala bought.
Listening Link 1
Hakeem: Hey Hala! Did you get all the components for your new
computer?
Hala: I sure did! I just got the last parts yesterday. Would you like to
see what I bought?
Hakeem: Sure!
Hala: Look at this, my new processor has a clock speed of over 4
GHz! That’s so much faster than my old one that was only 2.4
GHz. I’ll be able to use it for all of the newest games other
software.
Hakeem: That’s great! How much RAM did you get?
Hala: Well, first I was going to just get 8 GB of RAM, but I wanted
to future-proof my computer a bit, and new apps are requiring
more and more RAM all the time, so I ended up getting 32 GB
instead.
Hakeem: Wow! I am sure you can run a lot of different applications
at the same time with that much RAM.
Hala: I also got a new hard disk to make sure my computer is up to
the task. Apps are taking more and more space all the time.
Not too long ago, just a few gigs was enough, but not anymore.
Hakeem: Yeah, some programs are really demanding in terms of
storage nowadays. You can never have too much disk space.
And you do a lot of video editing too, don’t you?
Hala: Yeah, I do. That’s why I bought two 4 terabyte hard drives.
That should give me enough space for all of my apps and also
all of my video files I’m working on.
Hakeem: That’s great. I see you did your homework.
Hala: Well, knowing measurements and parameters is the key to
picking what you really need for your computer.
111
Internet Search: Acronyms
ASCII ________________________________________
PCMCIA ________________________________________
USB ________________________________________
RAM ________________________________________
MP3 ________________________________________
HTML ________________________________________
URL ________________________________________
Here are some vocabulary words that will be useful in the next reading,
about electronics. Put a check mark (✔) next to the ones you need to
learn.
112
6. light bulb: a source of electric light which uses a filament stored
in a glass enclosure
7. LED (light-emitting diode): a semiconductor source of light
8. path: a continuous trace or wire in electric circuit which connects
various components
9. PCB (printed circuit board): a laminate board which supports
electric components in the circuit
10. resistor: an electrical component, which restricts the flow of
electrons in the circuit.
11. solar cell: an electrical device which converts the energy from light
into electricity
12. soldering iron: a handy tool used to assemble the electrical
components on a PCB (printed circuit board).
13. voltage: also known as "electric tension", is a difference between
electric potential between two points
14. voltaic cell: A device that derives energy from chemical reaction,
such as in a battery
Listening Link 2
113
Nature is organized in such a way that it aims at making this
potential equal in both points of the circuit. So to make it equal, there
is a need to move some of the electrons from one place to another.
Current is exactly what we call this movement.
Of course we need to take our voltage from some electric source.
One common source of power in smaller home appliances is batteries,
or voltaic cells. The energy stored in batteries comes from chemical
reactions that take place inside. But quite often we may replace the
batteries with another source of energy, such as a solar cell, which may
be found in simple calculators or electronic watches.
So, right now our circuit consists of a source (battery) and a path (a
conductor in which the electrons flow). We need one more element that
will consume the energy stored in the source of voltage. This element,
called a load, could be a light bulb. Light bulbs contain a filament
inside. The more electrons that flow through the bulb, the hotter the
filament gets. At some point, the filament starts to glow with light. But
sometimes this light might be too bright for us and we would like to
dim it.
To dim the light, it is enough to add an additional element that will
take away some energy from our circuit - a resistor. The greater the
value (resistance) of this element, the bigger drop in voltage we
experience. So, our first electrical circuit is done.
To assemble it we may use a printed circuit board or PCB, a
laminate board with paths printed on it and the holes drilled to make
place for electronic components. To attach the elements to the PCB we
need a hand tool called a soldering iron or a soldering gun. This device
heats the solder and enables us to attach our elements to the path.
Everyday appliances consist of much more sophisticated electronic
components than our circuit, like for example capacitors which can
store energy for a short time. Capacitors are used for example in photo
cameras as a source of energy for flash bulbs. Capacitors store voltage
from batteries, and when needed the load is discharged rapidly so you
can see the burst of light. There are also light-emitting diodes (LEDs)
which are more and more common sources of light in homes.
Due to the vast development in technology, electronic circuits get
smaller and smaller every year. Usually they can be found
as integrated circuits or IC - small chips that consist of various
components that are inseparable. However, to fully understand the way
electronic devices work, it is perhaps best to learn the basics of
114
electronics with simpler and larger models. There is no substitute for
manual practice under the supervision of experienced users of the
soldering gun.
[Written by Aleksandra Mietus, an English teacher in Poland]
SAQ
1. What does EMF stand for?
2. How does a light bulb work?
3. What is a printed circuit board?
4. What does a capacitor do?
Discussion
Together with a partner or in a small group, discuss the following
questions about your experiences with electronics.
1. Have you ever created or fixed an electronic circuit? If yes, can you
explain more?
2. Have you ever planned to use electronics for teaching or for work?
3. Think about possible capacitors that you use in everyday life. Can
you give some examples?
115
Fill in the Blanks
Fill in the blank in each sentence using one of the vocabulary words
from this chapter.
116
Role Play
Vocabulary Quiz
2. acronym
a. one million
b. an abbreviation; a way of writing a longer string of words more
concisely
c. one trillion
3. Hz or hertz
a. The ability of a system component to fail without causing the
entire system to shut down; this is often accomplished with
redundancy
b. an internationally used frequency unit; equals one cycle per
second
c. a measurement of the capacity of data which can be moved
between two points in a given period of time
117
4. soldering iron
a. a set of electronic interconnections in a small "chip" or plate
where all the elements are inseparable
b. an electrical component which uses electrostatics to store
energy
c. a handy tool used to assemble the electrical components on a
PCB (printed circuit board).
5. path
a. a continuous trace or wire in electric circuit which connects
various components
b. a flow of electric charge (such as electrons or ions)
c. an electrical component which uses electrostatics to store
energy
118
a headphone amplifier, an EMF sensor, and an electromagnetic glove!
Visit the Gadgetronicx web site and check out a few of the electronic
diagrams and see if you can understand how they work.
Gadgetronicx: <http://www.gadgetronicx.com>
119
English for Technology
Table of Contents
Preface
Goals of the Unit
Learning Outcomes
Warm-up Activity: Discussion
Reading: The Web 2.0
Vocabulary
SAQ
Fill in the Blanks
Matching: Social Media Uses
Discussion: Social Media Use
Case Study: Gamiphy
Vocabulary
SAQ
Reading: Privacy and copyright
Vocabulary
SAQ
Discussion: Social Media and Risk
Dialogue: Online Toxicity
Discussion
Pair activity: Creative Commons Licenses
Debate: Should children have access to social media?
Vocabulary Quiz
Writing Assignment: Online Business Proposal
120
Preface
In this unit, you will learn vocabulary and have discussions
about social media and related topics such as the various uses of social
media sites, online toxicity, netiquette, gamification, online privacy,
and copyright issues. You will also have a debate and write a business
proposal for a social media-based business.
Learning Outcomes
After studying this unit, students should be able to:
Remember and use vocabulary relating to social media, online
privacy, and copyright
Discuss social media issues, such as online toxicity, netiquette,
privacy, and copyright
Argue for a position on online safety
Write a business proposal
121
Unit 7: Social Media
Before starting with this unit content, let’s do a little warm-up. Discuss
the following questions with a partner or a small group.
122
Reading: The Web 2.0
Read through the vocabulary below, which are related to some basic
concepts and terms about social media. You might know some of the
words already. Which words are you familiar with, and which are new?
Put a check mark (✔) next to the ones you need to learn (that is, the
ones that you don’t know yet).
General Vocabulary
1. feature: an interesting or important part, quality, ability, etc.; a trait
or characteristic
2. flagship: the best, largest, or most important one of a group of
things
3. social network: a group of individuals who are connected by and
through social ties and associations
4. synchronous: happening at the same time
IT Vocabulary
1. blog: a website where a person, group, or company writes (usually
with an informal style) about activities and experiences, with
content added periodically. Originally a shortened version of “web
log.”
2. bookmark: to save the location of online content you want to
return to later
3. forum: an open online space where users can discuss and exchange
opinions
4. gamification: the application of game mechanics to processes that
are not related to gaming
5. hybridization: convergence between different social media in
terms of features and characteristics
6. learning management system (LMS): an online system
developed for organizing and delivering educational materials
123
7. live streaming: a video that is taken and shown in real time with
other users
8. mobile: related to smartphone use and experience
9. newsfeed: news from different sources that are aggregated in just
one informative flow
10. really simple syndication (RSS): the gathering of content from
different online sources
11. thread: discussion posted in a forum
12. user generated content (UGC): content created by users
124
● Blogs are websites characterized by 1) a chronological order of
posts (diary-style); and 2) an informal/immediate style. They
were one of the first examples of Web 2.0, and today they are a
widespread internet phenomenon.
● Forums are online spaces where users can log in, leave
messages, and reply to others’ threads. They are still popular
despite the increasing use of live chats.
There are several trends characterizing social media at large despite
their own peculiarities and differences.
● Bookmarking is the ability to save the content you want when
and where you prefer.
● Really simple syndication (RSS) allows users to collect and
organize content from different online sources (e.g., newsfeed).
● User Generated Content (UGC) refers to pictures, audio,
video, animation, text, and so on that is created by users. It is
implied that UGCs are designed and created to be shared with
others.
● Synchronous interaction means that users are increasingly able
to communicate in real time, such as live streaming and instant
messaging.
● Clouding is the ability to store your content online so that you
can access it anytime and anywhere with a connection.
Dropbox is a famous clouding platform, but also Google Drive
includes this feature.
● Gamification can be described as the application of game
mechanics and dynamics to non-recreational processes and
activities (for instance, working). Virtual badges (see Khan
Academy) are a good example of how social media is becoming
more engaging. Moreover, the simple “thumb up” of Facebook
can be seen in this light as well, referring to a point system.
Hybridization is the convergence between different social media,
which share features which each other. For instance, the ability to
comment content is widespread across the Web 2.0. Otherwise, on
Blackboard Learn is possible to embed videos from YouTube. Mobile
social media are taking a foothold because social media are
increasingly experienced on mobile devices. Therefore, related content
becomes shorter (mobile consumption tends to be quicker) and more
visual than textual.
125
SAQ
1. What is a blog?
2. Are social media getting similar to each other?
3. What are some examples of gamification that come to your mind?
1. With a good _________ you can stay updated about what is going
on all around the world!
2. _________ makes boring tasks more exciting.
3. I often comment and discuss my viewpoints on my favorite ______
4. I would like to open a _________ for sharing my ideas and
thoughts.
5. _________is so engaging, you feel to be part of the video itself.
126
Matching: Social Media Uses
Associate the features on the left with the social media that include
them on the right. One social media can have more than one feature,
and each feature might be in more than one social media site.
Live streaming
Facebook
Gamification
Twitter
Interacting with other people
Instagram
Creating content
WhatsApp
Getting news
Wikipedia
Learning new information
127
Discussion: Social Media Use
People use social media for many different purposes, from leisure and
fun to learning new things. Some social media are very visual (e.g.,
pictures, memes, gifs), others are more about discussion and exchange
of views. Some social media are designed to work on mobile (e.g.,
Instagram, WhatsApp), while others run also on personal computers.
Some social media can have influencers followed by millions of people
and specific trending topics (perhaps associated with popular
#hashtags) widely debated by their community. Now, look at the
prompts below and try to answer them with a partner.
128
Case Study: Gamiphy
Check the vocabulary below, and then read the case study. Then,
answer the questions.
Vocabulary
1. digital badge: an indicator of accomplishment, skill, quality, or
interest that can be earned in an online environment
2. digital marketing: the marketing of products or services using the
Internet, mobile phones, display advertising, and other digital
media
3. e-commerce: activities that relate to the buying and selling of
goods and services over the Internet
4. gain traction: to get the support, interest, etc. that is needed for
something to succeed or make progress
5. infrastructure: the basic equipment needed for something to
function properly
6. loyalty program: a marketing strategy designed to encourage
customers to continue to shop at or use the services of a business,
often by giving the customer a reward
7. optimization: making something as good or as effective as
possible
8. startup: a new business, often one started by an entrepreneur to
demonstrate a business model
9. user engagement: a user’s response to some type of offering, such
as a product, a service or a website
10. user retention: the ability of a company, product, app, etc. to keep
its users over a specific period of time.
Gamification is a rapidly growing trend in digital marketing,
and many companies are using gamification to make activities that are
usually thought of as nuisances (such as watching advertisements)
more interesting, interactive, and engaging. However, gamification can
be quite expensive and it can be difficult for small companies to
implement.
129
To address this problem, Palestinian entrepreneur Aws
Alnabulsi founded the company Gamiphy in 2017. Alnabulsi studied
electrical engineering at Al-Najah University and then spent five years
working on multiple tech startups in Silicon Valley and in his
hometown of Nablus before founding Gamiphy. With funding from the
Ibtikar Fund, Alnabulsi started Gamiphy to help small and medium
sized businesses adopt gamification technologies.
Gamiphy is a user engagement and retention platform that
offers clients tools to engage, reach out to, and retain users. In addition,
Gamiphy also offers clients a standalone app which makes it easy to
access the market through integrated plug-in features and tools to
customize their own gamification experience. Gamiphy offers clients
a variety of features, such as loyalty programs, digital badges,
branded games, quizzes, and playable apps to keep their customers
engaged and coming back.
Gamiphy is appealing to small to medium sized businesses
because it offers these businesses tools that are usually only available
to much larger companies. Big companies may have the resources to
spend large amounts of money on developing gamification platforms
and marketing campaigns. By working with Gamiphy, smaller
companies can also implement gamification without the financial,
technical, or human resources necessary to develop these tools
internally.
Although Gamiphy seeks to target markets in a variety of
industries, it currently focuses mainly on the e-commerce sector. The
advantage of focusing on the e-commerce sector is the availability of
the infrastructure and technology needed to effectively utilize
gamification platforms. As Gamiphy continues to gain traction in
targeted markets, Alnabulsi hopes to further acquire the necessary
resources to enlist the services of marketing and sales expert, and
product developers needed for further optimization of Gamiphy to
meet the needs and demands of new markets.
When it comes to impact, Gamiphy focuses on helping
companies efficiently use their existing resources to access the latest
technologies in gamification and a wide variety of optimization
features at competitive prices. Not only does Gamiphy allow tech based
startups and entrepreneurs to access some of the latest technologies
used in big budget campaigns by some of the largest global
corporations, it also creates employment opportunities for tech savvy
130
Palestinians. Gamiphy is helping Palestinian developers to adopt the
latest technologies to spur innovation and creativity.
For more information about Gamiphy, see their web site at:
<http://www.gamiphy.co>
SAQ
1. What services does Gamiphy provide?
2. Why would a small company want to use Gamiphy’s services?
3. Do you think gamification such as digital badges, branded games,
quizzes, and playable apps would make you use continue to use a
product or service?
4. Do you think gamification is more relevant to some products and
services than others? If so, what kinds of products and services is
it more relevant to? If not, why do you think it is applicable to
every product and service? Share your answers with a partner or
small group.
131
General Vocabulary
1. algorithm: a set of steps that are followed in order to solve a
mathematical problem or to complete a computer process
2. fraud: the crime of using dishonest methods to take something
from another person
3. mitigate: to make something less severe or harmful
4. privacy: being away from public attention (e.g., personal
information and data)
IT Vocabulary
1. Creative Commons: a nonprofit organization that works to
increase the amount of work that is available to the public for free
through public copyright licenses that support sharing
2. cyberbullying: a form of bullying or harassment online
3. digital footprint: your presence online (e.g., your social media
profile, your website)
4. moderating: the ability revise, remove, and manage online content
(usually attributed to administrators)
5. netiquette: rules of conduct for online settings
6. reporting: the ability to block and report (to administrators) users
due to various types of misconduct
7. spam: email and other materials that are received but not wanted
8. toxicity: negative and hostile behavior against other online users
9. trolling: an online behavior characterized by hostility and
disrespect
132
original work diffusion and modification. Let’s take a look at some of
CC’s licenses:
Attribution (by)
All CC licenses require that others who use your work in any way must
give you credit the way you request, but not in a way that suggests you
endorse them or their use. If they want to use your work without giving
you credit or for endorsement purposes, they must get your permission
first.
ShareAlike (sa)
You let others copy, distribute, display, perform, and modify your
work, as long as they distribute any modified work on the same terms.
If they want to distribute modified works under other terms, they must
get your permission first.
NonCommercial (nc)
You let others copy, distribute, display, perform, and (unless you have
chosen NoDerivatives) modify and use your work for any purpose
other than commercially unless they get your permission first.
NoDerivatives (nd)
You let others copy, distribute, display and perform only original
copies of your work. If they want to modify your work, they must get
your permission first.
(from <https://creativecommons.org/share-your-work/licensing-types-
examples>)
133
Another issue is related to
online toxicity, which is a dynamic
that younger as well older users are
increasingly experiencing. Online
environments are often accused of
being a breeding ground of hate and
discrimination. This is a result of the
so-called “online disinhibition
effect,” which is when the social
restrictions and inhibitions that
people normally have in face-to-face
communication are lessened or
removed when interacting on the
Internet. This can result in a toxic media culture in which individuals
ignore face-to-face social rules and are more inclined to attack other
users because they are protected by anonymity. Cyberbullying
practices and widespread hate campaigns represent examples of such a
trend. Spam and trolling are not rare on social media, and you have to
be careful about possible fraud risks. As a consequence, moderating
and reporting features are increasingly included in social media
systems for mitigating these issues. A simple solution is to work on a
shared netiquette for staging a safe environment. The perception is that
online behaviors are less important than offline ones…but it is not true,
and the former can have real consequences on users, especially young
ones.
SAQ
1. Why is privacy important?
2. What is a netiquette?
3. How do Creative Commons licenses work?
134
Discussion: Social Media and Risk
1. Have you ever thought about your digital footprint? What can
others see about you online? Are you worried about what others
can see?
2. Have you ever been moderated by an administrator online?
3. Do you have negative/toxic experiences on social media outlets that
you want to share?
Listening Link 1
135
but they write on my posts where my friends and family can see
them.
Nur: That does sound like a problem. Maybe you could set your
profile’s privacy settings to private for a while. That would keep
them away from your posts at least.
Ali: That’s a good idea, Nur. I might need to do that, at least until these
cyberbullies stop.
Discussion
1) What did Ali experience?
2) Do you think making changing his privacy settings is a good
solution?
3) What are some netiquette rules that you think people should follow
on social media? Think of rules on your own, or choose the most
important rules from the following picture.
a) ___________________________________________________
b) ___________________________________________________
c) ___________________________________________________
136
Pair activity: Creative Commons Licenses
137
For ideas, you may want to look at the reading earlier in this unit
again to make some notes. Also, there is plenty of information online
you can read to support your position. For example, this site has a lot
of useful information to support both sides:
https://socialnetworking.procon.org/
Vocabulary Quiz
Choose the best definition for each of the words below.
1) Cyberbullying
a. A proactive attitude toward others
b. A disruptive behavior against others online
c. A new social media about cyberculture
2) blog
a. A static website where users can also view content
b. A website with periodically updated content and an
informal style
c. A forum for IT experts and educational technology
practitioners.
3) LMS
a. Social media that can be accessed only on mobile
devices.
b. Social media developed for gamification purposes.
c. Social media designed to support and manage
education.
4) moderating
a. The ability to supervise online content by users given to
administrators.
b. The ability to send funny pictures to other users on the
same social media.
c. The ability to create blogs with few clicks.
5) spam
a. Unsolicited emails and other materials received by
users.
b. Periodic report about a social media profile activity.
c. Points collected by using a specific social media.
138
Writing Assignment: Online Business Proposal
Imagine that you want to start an online business. Perhaps you are an
aspiring social media influencer. In this assignment, you will think of
an idea for an online business that has a social media element. This
business could be entirely based on social media, such as a technology
review company on YouTube, or it might have a social media element,
such as a makeup importing company that uses Instagram for
marketing.
In this activity, you will write a short business proposal for your online
venture. You will be writing this for a potential investor who is thinking
about supporting your business. Your business proposal should explain
what your idea is for an online business, and argue for why the business
has potential to be successful.
139
To make your business plan, some things you will need to think about
are:
What type of content will your business focus on? For example,
will it be entertainment or informative? Will you sell products?
Will it be a blog about your life? Will you review technology
products? Think about the things you know about, and how they
might transfer to a social media format.
Which social media site will you use? If you are going to make
videos, YouTube might be a good choice, but if you are going to
post photos, Instagram might be better. If you want to post
information and have your followers discuss it, Facebook might be
a good option.
Who would be your competitors, and what makes your business
different?
140
4. Competitors: Who are your competitors? What advantages and
disadvantages do they have? How is your business different from
your competitors’?
5. Execution: How will you start and develop your business? This
could include plans for marketing, sales, or other logistics.
Now, based on this outline, write a business proposal for your online
business. Then, share it will others in your class.
141
English for Technology
Table of Contents
Preface
Goals of the Unit
Learning Outcomes
Preface
Goals of the Unit
Learning Outcomes
Warm-up Activity: Discussion
Reading: Programming Languages
Vocabulary
SAQ
Matching: Finding the Right Programming Language
Ordering Activity
Fill in the Blanks
Vocabulary: Computational concepts
Discussion
Dialogue
Role Play: Working with a client
Search activity
Vocabulary Quiz
Writing Assignment: Pseudocode
142
Preface
In this unit, you will read about and discuss prominent
programming languages. You will learn and use vocabulary that is
related to programming languages, and you will use this vocabulary in
discussions about programming languages. Lastly, you will try out
pseudocoding with MIT’s Scratch.
Learning Outcomes
After studying this unit, students should be able to:
Remember and use vocabulary related to programming
languages
Have discussions about programming languages
Evaluate the strengths and weaknesses of programming
languages
Understand what pseudocoding is
143
Unit 8: Programming Languages
Before starting with this unit content, let’s do a little warm-up. Discuss
the following questions with a partner or a small group.
1. Have you ever written any code? If yes, what did the code do?
2. What are the programming languages that you know?
3. Would you like to learn more about programming? Why? / Why
not?
Read through the vocabulary below, as these are related to some basic
concepts and terms about programming languages. You might know
some of the words already. Which words are you familiar with, and
which are new? Put a check mark (✔) next to the ones you need to learn
(that is, the ones that you don’t know yet).
144
IT Vocabulary
1. NET Framework: a software framework by Microsoft which
executes code via a virtual machine
2. C: a low-level, compiled programming language developed in the
early 1970s by Dennis Ritchie for use on the UNIX operating
system
3. compiler: a program that takes human readable code and turns it
into machine readable code for running at a later time
4. ECMAScript: the official specification or "standard" for the
language commonly known as JavaScript
5. elegant code: concise, clean, and clear code which allows other
developers to understand and extend it
6. interpreter: a program that reads a high-level programming
language, converts it into machine code, and then immediately runs
that code
7. Java: a high-level, compiled, object-oriented programming
language developed by Sun Microsystems and now owned by
Oracle.
8. JavaScript: a popular web page scripting language created by
Brendan Eich at Netscape to provide client-side interactivity in
Web pages.
9. multi-paradigm language: a programming language that supports
both procedural and object-oriented programming philosophies
10. object-oriented language: any programming language optimized
for modeling real-world objects and concepts
11. Perl: a high-level, interpreted programming language written by
Larry Wall in 1986 and typically used for a wide variety of
programming tasks including system administration
12. PHP (PHP Hypertext Preprocessor): a high-level, interpreted
programming language written by Rasmus Lerdorf in 1995 and
aimed mainly at web developers creating dynamic applications
13. portability: a measure of how easily programs can be moved to a
new system without having to make any changes.
14. procedural language: any programming language that is based on
a step-by-step approach to solving a problem
15. Python: a high-level, interpreted programming language
developed by Guido van Rossum at CWI in the Netherlands
145
16. Ruby: an object-oriented, high-level, interpreted programming
language developed in the 1990's by ace Japanese programmer
Yukihiro Matsumoto.
17. syntax: rules governing the structure of a programming language
18. VB (Visual Basic): a Windows-only, multi-paradigm programming
language developed by Microsoft and intended for beginners or
casual use
1. Java
Java uses a compiler, and is an object-oriented language released in
1995 by Sun Microsystems. Java is the number one programming
language today for many reasons. First, it is a well-organized
language with a strong library of reusable software components.
Second, programs written in Java can run on many different computer
architectures and operating systems because it uses the JVM (
Java virtual machine ). Sometimes this is referred to as code
portability or even WORA (Write Once, Run Anywhere). Third,
Java is the language most likely to be taught in university computer
science classes. A lot of computer science theory books written in the
146
past decade use Java in the code examples. So learning Java syntax is
a good idea even if you never actually code in it.
Java Strengths: WORA, popularity Java
Weaknesses: Slower than natively compiled languages
2. C
C is a compiled, procedural language developed in 1972 by Dennis
Ritchie for use in the UNIX operating system. Although designed to
be portable in nature, C programs must be specifically compiled for
computers with different architectures and operating systems. This
helps make them extremely fast. Although C is a relatively old
language, it is still widely used for system programming, writing
other programming languages, and in embedded systems.
Strengths: Speed
Weaknesses: Memory management can be difficult to master
3. C++
C++ (pronounced “C plus plus”) is a compiled, multi-paradigm
language written as an update to C in 1979 by Bjarne Stroustrup. It
attempts to be backwards-compatible with C and brings object-
orientation, which helps in larger projects. Despite its age, C++ is
used to create a wide array of applications from games to office
suites.
Strengths: Speed
Weaknesses: C++ is older and considered clumsier than newer
object-oriented languages such as Java or C#.
4. PHP
PHP uses a run-time interpreter, and is a multi-paradigm language
originally developed in 1996 by Rasmus Lerdorf to create dynamic
web pages. At first it was not even a real programming language, but
over time it eventually grew into a fully featured object-oriented
programming language. Although PHP has received much criticism in
the past for being a bit sloppy and insecure, it's been pretty good since
Version 5 came out in 2004. It's hard to argue with success. Today,
PHP is the most popular language used to write web applications.
Strengths: Web programming, good documentation
Weaknesses: Inconsistent syntax, too many ways to do the
same thing, a history of bizarre security decisions
147
5. VB (Visual Basic) is an interpreted, multi-paradigm language
developed by the Microsoft Corporation for the Windows platform. It
has been evolving over the years and is seen as a direct descendant of
Microsoft's old BASIC from the 1970's. Visual Basic is a good
language for scripting Windows applications that do not need the
power and speed of C#.
Strengths: None.
Weaknesses: Only runs in Windows
6. Python
Python is an interpreted, multi-paradigm programming language
written by Guido van Rossum in the late 1980's and intended for
general programming purposes. Python was not named after the snake
but after the Monty Python comedy group. Python is characterized by
its use of indentation for readability, and its encouragement
for elegant code by making developers do similar things in similar
ways. Python is used as the main programming choice of both Google
and Ubuntu.
Strengths: Excellent readability and overall philosophy
Weaknesses: None
7. C#
C# (pronounced “C sharp”) is a compiled, object-oriented language
written by Microsoft. It is an open specification, but rarely seen on
any non-Windows platform. C# was conceived as Microsoft's
premium language in its .NET Framework. It is very similar to Java
in both syntax and nature.
Strengths: Powerful and pretty fast
Weaknesses: Only really suitable for Windows
8. JavaScript
JavaScript is an interpreted, multi-paradigm language. However, it is
a very strange language. Despite its name, it has nothing whatsoever
to do with Java. You will rarely, if ever, see this language outside of a
web browser. It is basically a language meant to script behaviors in
web browsers and used for things such as web form validation and
AJAX style web applications. The trend in the future seems to be
building more and more complex applications in JavaScript, even
including simple online games and office suites. The success of this
148
trend will depend upon advancements in the speed of a browser's
JavaScript interpreter. If you want to be correct, the real name of this
programming language is ECMAscript, although almost nobody
actually calls it this.
Strengths: it's the only reliable way to do client-side web
programming
Weaknesses: it's only really useful in a web browser
9. Perl
Perl is an interpreted, multi-paradigm language written by Larry
Wall in 1986. It is characterized by a somewhat disorganized and
scary-looking syntax which only makes sense to other PERL
programmers. However, a lot of veteran programmers love it and use
it every day as their primary language. 10 years ago, Perl was more
popular than it is today. What happened? A lot of newer programmers
and even old Perl programmers (such as myself) have switched to
other languages such as PHP, Python, and Ruby. Perl is perhaps still
the best language for text processing and system administration
scripting.
Strengths: text processing and system administration
Weaknesses: strange syntax, and perhaps too many ways to do
the same thing
10. Ruby
Ruby is an interpreted, object-oriented language written by Yukihiro
Matsumoto around 1995. It is one of the most object-oriented
languages in the world. Everything is an object in Ruby; even letters
and numbers can have method calls. It's a great language to learn if
you love objects. The only negative is that its love of object-
orientation makes it a bit slow, even for an interpreted language.
Strengths: Perhaps the world's most object-oriented language
Weaknesses: its superior object model comes at a price...
namely speed
SAQ
1. What is the difference between C and C++?
2. What are the strengths of Ruby?
3. What are the weaknesses of Python?
4. What is the difference between Java and JavaScript?
149
Matching: Finding the Right Programming Language
What is the right programming language to use and why? Match the
different characteristics on the left with related programming
languages on the right. You can match more than one feature with each
type of programming language, and vice versa.
Java
Speed
C
Object-oriented
Python
Web-
programming
C#
Windows-based Ruby
JavaScript
Bad-memory
management
150
Next, share your answers with a partner or a small group. What
differences do you see between your evaluation and how your
classmates assessed these programming languages? What other
programming languages do you know?
Ordering Activity
Which programming language came first? Order them below from 1
(the oldest) to 5 (the newest). Then, discuss your choices with a partner
or in a small group.
C Python Ruby
compiler Java NET Framework
Perl multi-paradigm language interpreter
VP ECMAScript JavaScript
151
Vocabulary: Computational concepts
152
Discussion
Dialogue
In the following dialogue, Rana and Nasr are two friends talking about
learning how to code.
Listening Link 1
153
still incredible. However, I’m currently improving my skills
with C++. It is straightforward and very elegant, if you know
what I mean! Moreover, it’s popular in game development and
I want to work for a game company. I am also taking some
workshops to learn Python.
Rana: Oh, that’s great. I’ve heard of Python before, but I don’t know
very much about it. I’ve heard that it’s a good language to
know.
Nasr: Yes, it is! Python is characterized by a great structure and you
don’t have to use a compiler before execution. But, there are so
many alternatives. It really depends on what you want to
develop and for which platform.
Rana: OK, I see. How about web scripting languages? I’ve been
interested in learning a scripting language for developing web
sites and online tools, but I’m not sure what to learn.
Nasr: Well, one of my professors said that PHP is the most popular
web scripting language in the world and it supports many
advanced object-oriented programming techniques. So you
may want to give that a try!
Rana: Sounds good! Thanks for the tip!
154
Role Play: Working with a client
Work in a pair with another student. One of you
is a client who wants to develop a new social
media site with gaming and networking
features. The idea is to set a new standard in the
quickest way possible. The other is the head
developer of a team that was hired for
programming it. The former wants to know
which are the best programming languages to
use for making his vision concrete, while the
latter should explain possible alternatives and
their strengths and weaknesses. Before you
begin your discussion, make some notes of
ideas to support your claims.
Search activity
Vocabulary Quiz
155
2. procedural language
a) a program that takes human readable code and turns it into
machine readable code for running at a later time
b) any programming language that is based on a step-by-step
approach to solving a problem
c) rules governing the structure of a programming language
3. portability
a) a program that reads a high-level programming language,
converts it into machine code, and then immediately runs that
code
b) a programming language that supports both procedural and
object-oriented programming philosophies
c) a measure of how easily programs can be moved to a new
system without having to make any changes.
4. ECMAScript
a) the official specification or "standard" for the language
commonly known as JavaScript
b) a low-level, compiled programming language developed in the
early 1970s by Dennis Ritchie for use on the UNIX operating
system
c) a high-level, interpreted programming language written by
Rasmus Lerdorf in 1995 and aimed mainly at web developers
creating dynamic applications
5. VB or Visual Basic
a) an object-oriented, high-level, interpreted programming
language developed in the 1990's by ace Japanese programmer
Yukihiro Matsumoto.
b) a Windows-only, multi-paradigm programming language
developed by Microsoft and intended for beginners or casual
use
c) a high-level, compiled, object-oriented programming language
developed by Sun Microsystems and now owned by Oracle.
156
Writing Assignment: Pseudocode
For this writing assignment, you are asked to write a pseudocode about
a possible program that you want to compile. You should know this
term from the previous search activity; in essence, pseudocode is
summarizing programming dynamics in an easy and straightforward
way that does not require high coding skills. For instance, you may
describe an object that acts by itself or is influenced by different
conditions (e.g., if the object touches the wall, it turns). Depicting these
steps means that you need to narrate how you code works without
coding it! Even expert programmers use pseudocode for understanding
apparently complex programming syntaxes. Take a look at Scratch
(<https://scratch.mit.edu/>), which is a free tool from the
Massachusetts Institute of Technology (MIT) that is designed to
support pseudocoding and computer science education.
Follow the outline below for envisioning your ideal coding piece:
157
English for Technology
Table of Contents
Preface
Goals of the Unit
Learning Outcomes
Warm-Up Activity: What Makes a Good Presentation?
Reading: How to prepare a speech
Vocabulary
SAQ
Fill in the Blank
Try it Out! Ideas for Speech
Presentation Phrases
Reading: Common errors in presentations
SAQ
TED Talks Presentation Examples
Case Study: Customer Relationship Management System
Vocabulary Practice: Crossword Puzzle
158
Preface
This unit will talk about the parts of a good presentation and tips on
how to create effective presentation slides. You will learn about what
makes a presentation either effective or ineffective. You will get some
tips on preparing a good presentation, and you will practice by listening
to presentations and then trying to make one yourself. You will also
read a case study about a marble and stone company in Palestine.
Learning Outcomes
By the end of this unit, students should be able to:
Identify and produce the appropriate parts of a speech;
Identify the traits of good speeches and the steps to create one ;
Identify and remedy common presentation mistakes;
Use statistical information in a speech.
159
Unit 9: Presentation Skills
Below are several ideas needed for a good presentation. Rate each
idea from what you think is the most to least important (1 = most
important; 10 = least important). Compare your notes with a partner
and answer the questions below.
160
Discuss your answers with a partner or small group. Together with your
partner or group, come to an agreement about which three are the most
important.
General Vocabulary
1. inform: to give someone facts or information
2. persuade: to cause someone to do or believe something by giving
them good reasons
3. credibility: if someone can be believed or trusted
4. quote: a series of words or phrases taken from what someone else
said or wrote
5. provocative: causing a strong reaction like annoyance or anger,
done to get attention
Presentation Vocabulary
6. slide: an image shown on a large screen; 3 or more images make a
slideshow
7. rhetorical question: a question asked to make a point rather than
to get an answer
8. statistics: a set of numbers or a collection, analysis, and
presentation of numeric information
9. clip: a short part of a video
10. audience: a group of people listening to or watching something like
a speech or a movie
Listening Link 1
161
your message and the purpose of the presentation. Fortunately, if you
know how to write an essay, you already know a lot about how to write
a speech. The bonus is that you don’t have to write down everything
you’re going to say. Keep things in note form instead. There are a few
easy steps you can follow to prepare for a presentation.
Step 1
The first step in preparing a good presentation is brainstorming.
What is your presentation about? Is it meant to inform or to persuade
your audience? List a few items you would like to talk about. Why are
they important to your main topic? Are there any facts that support
these reasons? A good rule is to have at least two facts or pieces of
information for each idea. These will give you credibility.
Step 2
The second step is to write an introduction. How you begin a
presentation is at least as important as the facts you will talk about. A
good introduction will make the audience trust the speaker, while a
poor one may bore them. One effective way to get the audience’s
attention is by telling a related story. You can tell how or why you are
speaking. What made you interested in your subject? You can also talk
about your expertise in the subject, or even how you found the facts
and figures used in your presentation. All of these are useful for
increasing your credibility. The story should be related to the subject
of your presentation, and it should be something that is important to
your audience. Knowing the audience’s demographics (age, gender,
class, job titles, etc.) is important when designing a presentation. What
is important to them? What will help them the best? Design your
presentation with their wants and needs in mind to further gain
credibility. Another opening is to find and use a fact or statistics that
people don’t know. For example, if you are talking about how to
decrease the IT costs in a company, you may want to say something
like, “Software licenses represent 30% of the IT budget at Keymar Inc.
We can reduce this to 15% if we decommission software we use for
small functions and instead move to open source solutions.” After your
opening, write down why your opening is important to your subject.
The audience likes to know what they will hear, and this is a chance
for you to tell them.
162
Step 3
The third step in preparing a presentation is to write your facts
and reasons about your subject. For example, if you are speaking about
why your company should adopt a certain piece of software
(persuade), you may want to talk about how much time or money the
new software could save. If you are talking about best practices in
information security (inform), you may talk about the reasons that
people should be concerned about information security. With any
reason, include facts and statistics; the more you have that back up
your position, the more believable you appear to your audience. Make
sure that the facts come from a reliable source, and then mention where
those facts came from.
Conclusion
A conclusion is the next step in your preparations to make a
speech. Sum up what you talked about. It is good to remind people what
they just heard, especially the main points, as this will help them
remember it better. Finally, leave them thinking about your
presentation. One good way to write a concluding statement is to
predict what may happen with or without changes. With the example
of why your company should adopt a certain piece of software, you
may want to state that by adopting this software, the employees will be
more productive, communication among employees will be enhanced,
and the company will save money. Since this is a business presentation,
it is best to not say something too provocative. Remember that you
want the audience to be on your side and you want them to remember
your speech in a positive way.
SAQ
1. What are a few similarities between writing a speech and writing
an essay? What are a few differences?
2. What are a few things a speaker can do to gain credibility?
3. Why is it important to know the demographics of the audience?
4. What are a few ways to write a good opening for your speech?
5. Why do you think it is a good idea to use a prediction for the
concluding statement?
163
Fill in the Blank
Using the vocabulary, fill in the blanks with the best word for each
sentence. The first one has been done for you.
3. Because she only had a little time and could not show an entire
film, Layla showed a ____________________ of a film in her
speech.
164
Try it Out! Ideas for Speech
Below are 8 sample ideas for a speech. For each idea, answer a few
questions about them:
Who is the intended audience for each idea (managers, customers,
employees, CEOs/CFOs/CIOs)? Why do you think?
Is the purpose of each speech to inform or to persuade? How do
you know?
What would be a good idea for an opening for each idea? What is
a good concluding statement?
Presentation Phrases
Because most multinational business is typically done in English, it is
also important to know what to say when presenting in English. Here
are a few phrases you can use in presentations:
1. Introducing a topic
My subject today is…
I’d like to talk to you about…
I’m going to discuss…
165
Then, I’ll cover…
And last of all, I want to…
Do you know any other phrases that would be useful for these
purposes? Add some phrases of your own to each of the sets of phrases
listed above.
166
not looking at your audience. This tells them that you as a speaker are
not interested in them, and they will pay less attention to you and your
speech.
Fixes for this:
a. Make your slides simple with little to no text. This removes the
temptation to read to your audience. It also gives you things to
add that they don’t know about.
b. Practice and memorize (remember) your speech topics and
facts. By doing this before speaking, you will not need to read
your slides. It also makes you look like an expert, giving you
more credibility.
167
4. Difficult to hear the speaker
This issue is especially true for people who don’t like to speak
loudly, or for those who are shy. While people near the speaker can
hear them, anyone in the back of a larger room has a difficult time
hearing what the speaker has to say. Remember, you will not always
have a microphone!
Fix for this:
a. Practice speaking in the room with a friend. Know the place
you will be making your presentation. Before your speech, have
a friend go the back of the room and try speaking. If your friend
cannot hear you, you are not loud enough. If they can hear you
well, you are fine.
b. Pretend you are speaking in a crowded room and must talk
louder than everyone else.
168
b. Put the picture on one side and words on the other. This is the
most effective way to make sure your audience can read your
words.
169
b. Practice speaking without something to lean on. This will get
you more accustomed to not leaning. Have a friend watch you
and point out if you do it.
SAQ
1. Why is it important not to read your speech from slides or from a
paper?
2. Which of the above errors do you think is most important for you
to consider when you make a presentation?
3. Which of the above fixes do you think is best? Can you think of
any others?
170
TED Talks Presentation Examples
1. How did the presenter start the speech? Did they use a story, a joke,
or a statistic?
2. Did the presenter preview their speech? Did they tell you what the
speech will cover?
3. Did the presenter use statistics or quotes in their speech? Did they
make you pay attention? Why or why not?
4. Were the slides simple or complex? Were the pictures effective?
5. Did the presenter ask a rhetorical question? Could they answer the
question?
6. Did the presenter move around a lot?
7. Did the presenter make you think about the topic after the speech
was over? Why or why not?
8. What else did you like or dislike about the presenters and their
styles?
This video describes ways that the digital world and real world are
coming together.
<https://www.ted.com/talks/jinha_lee_a_tool_that_lets_you_touch_pi
xels>
171
Case Study: Customer Relationship Management
System
172
CRM applications were only known in the 1990s, initially
dominated by large, rich companies with huge budgets who were able
to invest in computers and programming applications. With the
development of computers and the spread of free open source
applications, the situation is changing for the better. The CRM system
is now available for start-ups and companies; free of charge or for a
simple monthly subscription.
Communication Aspect:
With CRM help, any employee can have access to the same
customer information. So, if the employees changed or the customers’
contact point changed, the new employees will not start from the
bottom; in fact, they will have full access to all customers’ information.
Moreover, CRM relies on cloud storage, which means it can be
accessed from any internet-connected device.
173
Daily Tasks Aspect:
There are many daily and routine tasks that follow the sales
process, such as filling out forms, submitting reports, legal issues, etc.
If done manually, it may take a long time, but using a CRM system will
help employees to use automated programs that will take care of these
tasks so they can focus on more enriching tasks, such as meeting the
potential customers’ needs.
174
Vocabulary Practice: Crossword Puzzle
Across
2. a short part of a video
5. a series of words or phrases taken from what someone else said
or wrote
6. to cause someone to do or believe something by giving them
good reasons for it
7. to give someone facts or information
8. a collection, analysis, and presentation of information
9. a question asked to make a point rather than to get an answer
10. a group of people listening to or watching something
Down
1. an image shown on a large screen
3. causing a strong reaction on purpose to get attention
4. the fact that someone can be believed or trusted
175
English for Technology
Table of Contents
Preface
Goals of the Unit
Learning Outcomes
Warm-Up Activity: What is ethical and what is not?
Reading: The Ten Rules of Computer Ethics
Vocabulary
SAQ
Matching
Short Response
Research Essay
176
Preface
In this unit, you will learn about ethical considerations when
using computers. You will read a list of 10 recommended rules of
computer ethics, published by the Computer Ethics Institute. You will
also learn vocabulary related to computer ethics. Lastly, you will write
a research essay on ethics violators.
Learning Outcomes
By the end of this unit, students should be able to:
Remember vocabulary related to computer ethics
Understand the 10 rules of computer ethics from the Computer
Ethics Institute
Apply concepts of computer ethics to real-life situations
Write a research essay on ethics violators
177
Unit 10: Computer Ethics
1. Did you ever download a movie or a song from the web? If so, did
you pay for it? If it was free, would you consider your download as
stealing (often called “piracy”)? Why or why not?
2. On social media, how often do you read posts in which people fight
with or are mean to others? What do they usually fight about? Does
anybody win these fights?
3. Is an employee who takes emails and/or files (like photos and
documents) from a company and posts them in a chat room for the
general public to see a hero or a thief? Would it matter if the
information taken shows a crime? What if the emails and files
belonged not to a company but to a private individual, like a
colleague? How would that affect your evaluation of the
employee’s character?
178
Reading: The Ten Rules of Computer Ethics
General Vocabulary
1. appropriate (verb): to use or steal without permission
2. consent: allowing permission
3. consequences: results; things that happen as a result of a previous
action
4. copyright infringement: to use somebody's content without
proper permission
5. dependent: decided or controlled by something else
6. encounter: to meet or come across
7. ethics: a branch of philosophy that addresses questions about
morality (what is right and wrong)
8. intellectual property: creative work, designs, or products invented
by a person (or people) who then have exclusive rights to use or to
license the use of the material
9. proprietary: like property, a description of something owned and
controlled
10. reputation: the common opinion about someone or something
11. ruined: damaged or destroyed
12. snoop: to search for private information without permission
13. social engineering: a broad term for any online or offline technique
that uses deception to trick people into giving out confidential
information
14. tedious: boring, repetitive, or slow or long
15. violation: breaking a rule
IT Vocabulary
1. CEI (Computer Ethics Institute): a nonprofit research, education,
and public policy organization focused on the issues, dilemmas,
and challenges of advancing information technology within ethical
frameworks
179
2. cracking: criminal hacking; exploiting security holes to gain
unauthorized access to computer systems
3. Internet privacy: general techniques and technologies used to
protect sensitive data, communications, and preferences
4. open-source: software that is free to use and whose code can be
freely distributed and changed
5. phishing: obtaining sensitive information through a deceptive
email campaign, while pretending to be a trusted person or business
6. photoshopping: digitally transforming or altering a photograph in
order to misrepresent the original
7. privacy policy: a statement or a legal document that discloses the
ways an organization gathers, uses, and stores the end user's data.
Listening Link 1
180
world! Why did he say this? Airplane drones can bomb a target while
the pilot is safe in a computer room thousands of miles away. Criminals
can use phishing and other social engineering techniques to steal your
financial information while sitting safely in another country.
Companies can create confusing privacy policies to gather and use
information about you without your knowledge or consent.
Governments can block access to information using firewalls. These
are all very serious ethical violations that happen every day.
The main concerns of computer ethics are: Internet
privacy, cracking, copyright infringement, and Internet control.
The Computer Ethics Institute (CEI) has laid these 10 rules down for
people to follow.
181
a common practice to spread half-truths, exaggerations, lies, and
rumors on the Internet. This is wrong.
Rule #6: Do not copy or use proprietary software for which you
have not paid.
Think about how hard it is to write good software. Think about all the
people and costs involved. You have two choices: 1) buy a license or
2) find an open-source alternative. Using pirated software is not only
unethical, but it is also dangerous because of possible hidden malware.
Rule #9: Think about the social consequences of the program you
are writing or the system you are designing.
Do you write software that helps people to steal, kill, spy, gamble, or
spread pornography? If so, please ask yourself why. Is there a way you
can use your IT talents for good purposes? Wouldn’t the world be a
better place if everyone was engaged in positive behavior instead of
negative behavior? Think about it!
182
best, “Having two identities for yourself is an example of a lack of
integrity."
SAQ
1. What is intellectual property?
2. What is the difference between proprietary and open-source
software?
3. What is ethics?
4. How can a privacy policy be used against people?
183
Matching
184
3. Without consent of his
company or its clients, Anis, an
employee at CheapBuy, defies
the User Agreement and
publishes the names of clients he
does not like on social media
where he makes fun of the __________________________
products they buy.
185
Short Response
1.
Cracking
2.
Snooping
186
3.
Stealing Intellectual
Property
Research Essay
187
1. Use a search engine to pick two famous (infamous?) people who
used computer technology unethically. The two can be obvious
criminals (those who steal credit card information), whistle-blowers
(those who steal information to show an organization/government is
guilty of wrongdoing), or somewhere in-between (social media
influencers who alter their online images to improve their appearance).
• Evaluation (Opinion)
188
4. Add a cover, an outline, and references pages.
Person 2
Person 1
Person 2
189
Name Effects on Society Sources of
Information
(URL)
Person 1
Person 2
Which effects are the most influential on society, and why? The effects
could be economic, political, social, or cultural.
Person 1
Person 2
190
Create a one-sentence working thesis (include 2 people, “computer
ethical violations,” and which person is deemed the most influential).
Gather all quotations you plan to use into a single word file. Order the
quotations and clearly label each based on the body sections of the
essay. Include a citation with each quotation. This way, you have the
original text and the citations needed all in one place. You can choose
to paraphrase or create direct quotations from the information gathered
when it is time to write your essay.
• Background of Violations
Quotation A:
Quotation B:
Quotation A:
Quotation B:
• Effects of Violations
Quotation A:
Quotation B:
Quotation A:
Quotation B:
• Evaluation (Opinion)
Quotation A:
Quotation B:
191
• Appendix Biographies
Person 1:
Quotation A:
Quotation B:
Image Source:
Person 2:
Quotation A:
Quotation B:
Image Source:
• Background of Violations
Note: Having more than two quotations for each item is permissible
and encouraged.
192
Sample Appendix
Appendix
193
for five years before dying tragically in a water skiing accident in
Lake Tahoe in 2018 (Wilbur, 2019).
[Add text]
194
English for Technology
Table of Contents
Preface
Goals of the Unit
Learning Outcomes
Warm-Up Activity: Discussion
Reading: Video Games
Vocabulary
SAQ
Fill in the Blank
Matching
Pair work
Reading: Emerging Technologies
Vocabulary
SAQ
Discussion
Dialogue
Debate
Vocabulary Quiz
Writing
195
Preface
In this unit, you will learn about innovative technologies,
including technologies related to video games as well as emerging
technologies such as virtual reality and augmented reality. The unit will
focus on ways that digital entertainment can be used for learning and
professional development, and the impact and reciprocal differences
between virtual reality and augmented reality. You will learn
vocabulary related to these topics, and you will have chances to use
this vocabulary in discussions and debates with classmates. Lastly, you
will try to come up with an idea for a new game and possible ways to
integrate virtual and augmented reality.
Learning Outcomes
By the end of this unit, students should be able to:
Remember vocabulary related to video games, virtual reality,
and augmented reality
Use the vocabulary in discussions and debates about these
topics
Understand ways that digital entertainment can be used for
learning and professional development
Write a plan for a new video game design
196
Unit 11: Innovative Technologies
Before starting with this unit content, let’s do a little warm-up. Discuss
the following questions with a partner or a small group.
197
Reading: Video Games
Read through the vocabulary below, which are related to some basic
concepts and terms about video games. You might know some of the
words already. Which words are you familiar with, and which are new?
Put a check mark (✔) next to the ones you need to learn (that is, the
ones that you don’t know yet).
General Vocabulary
1. emerge: to become known or important
2. enjoyment: a feeling of pleasure, satisfaction, and joy.
3. escapism: a distraction from everyday life issues and concerns.
4. humankind: the human race as a whole; all human beings.
5. multi-faceted: something that has multiple aspects and elements to
consider.
Game Vocabulary
1. aesthetics: the visual component of a videogame, from art styles to
graphics.
2. arcade cabinet: a stand-alone game machine with just one game
installed. They were popular in the Seventies and Eighties.
3. BattleRoyale: online video games where a high number of players
(or small teams) compete against each other. The winner is the last
who remains in the game.
4. MOBA (multiplayer online battle arena): online strategy games
in which two teams compete. Each player controls a hero with the
support of other characters.
5. character: virtual actors with which players can interact (also
known as non-player characters).
198
6. eSports: competitions based on video games.
7. first person shooter: video games based on a) a first-person
perspective and b) a gameplay based on shooting virtual characters.
8. game console: a home device designed to run video games.
9. gameplay: the interactive system of a videogame.
10. genre: a category of video games that share similar characteristics.
11. heuristic: a winning strategy for mastering a videogame.
12. controller: an input device based on an array of buttons (also
known as a gamepad).
13. joystick: an input device based on a stick and a limited number of
buttons.
14. levels: units of time/space through which a videogame is structured
15. mechanics: the basic rules of a videogame.
16. role-playing game (RPG): video games where players improve
their avatar throughout in terms of skills and abilities.
17. serious games: a game that is not meant for entertainment (e.g., for
use in industries such as education, science, health care,
engineering, etc.)
18. story: sequence of meaningful events, from a beginning to an
ending.
19. strategy game: video games where players have to control
different entities and deal with a variety of resources for winning.
199
Despite this variety, video games tend to share some elements with
each other. For instance, they tend to be structured in levels, have
specific goals, suggest heuristics and best practices, and require some
sort of abilities or skills to be mastered. Some video games have a
story, different characters, involving aesthetics, and an accessible
user interface. The input system is a further element that drastically
evolved in the past years. In the 1970s and 1980s, joysticks were very
popular in video game arcade cabinets. Since then, controllers have
become the standards for game consoles like PlayStation and X-Box
One. However, mobile games are also played via touchscreen on
smartphones and tablets. Finally, computers are still very popular game
machines due to their performances, which tend to be more powerful
than stand-alone game consoles’ ones.
Game genres are several as well. Some like first-person shooters
and action games rely on reflexes and dexterity skills, while others like
strategy and role-playing games require critical thinking and
planning. Sometimes the gameplay can include elements from different
genres.
In the last twenty years, novel ways to develop video games have
emerged. Independent video games are developed by teams that are
smaller than usual. Indeed, developing a videogame may require a
hundred people and a lot of money! However, now tools like Unity3D
and Unreal Engine are free and they provide a good start. Serious and
educational games are titles designed to address topics and themes
beyond mere escapism, trying to teach something new or provide
alternative perspectives and viewpoints. Indeed, trying & failing
represents an effective learning process that video games may easily
embrace and support. Newsgames are games used by journalists and
newspapers for conveying information in engaging and interesting
ways.
Recent video games often have an online component, and you may
have heard of the phenomenon of eSports. A lot of people enjoy
watching others playing on platforms like Twitch.tv or Mixer. This has
entailed the establishment of new genres, like MOBAs and
BattleRoyale games.
200
SAQ
1. What is a videogame?
2. How have video games changed through time?
3. Are all video games just for fun?
Choose the word from the box that best fits each blank.
201
Matching
Associate the terms on the left with the pictures on the right. One term
can be associated with more than one picture.
Controller
Mobile gaming
Joystick
Seventies
Game console
202
Pair work
Video games are increasingly used for a variety of goals and purposes.
Some are designed to be entertaining, while others aim to trigger
reflection and discussion. Specific genres like FPS are often accused of
having negative influences on young people, while others depict
themes and topics like empathy and friendship. As in any creative
sector, digital entertainment is characterized by different instances and
orientations.
Now, look at the prompts below and try to answer them with a partner.
1. Are all video games violent? Can you give some examples of video
games that you consider negative for players?
2. Can video games be educational? Try to think of some examples
even searching online.
3. What was the first videogame that you played? Can you remember
where and with whom you played it?
4. What is your opinion about online games? Have you ever played
them?
5. In a videogame, what is the aspect (e.g. story, gameplay) that
interests you the most?
203
Reading: Emerging Technologies
General Vocabulary
1. habit: a behavior that is repeated through time.
2. mimic: to replicate, copy, or emulate someone or something.
3. turnover: an ongoing change.
IT Vocabulary
1. augmented reality (AR): adding digital elements to reality
2. embodied interaction: being involved with technology with your
whole body.
3. fidelity: the realism that emergent technologies can communicate
4. geolocation: ability to collect the current spatial location of a
device.
5. head-mounted display (HMD): devices placed around users’
heads that support virtual and augmented reality experiences.
6. hologram: digital character/object within a real environment.
7. hotspot: a point of interest in an augmented reality setting.
8. immersion: the feeling of losing yourself within virtual
environments.
9. MMO: this acronym stands for Massive Multiplayer Online,
pointing to virtual environments with several users interacting
simultaneously.
10. virtual reality (VR): a digital setting that tries to be an alternative
of the real one.
204
Emerging technologies can be defined as innovations that show
potential in improving society and our everyday life. There is a
significant turnover of groundbreaking innovations that seem to
change our life. Some reach this goal, impacting our routines and
habits; others are forgotten, or their scope is narrowed. Technology
itself changes fast with effects that are not so easy to envision; think
about Google Glasses, which were supposed to
Among the most recent, virtual reality (VR) and augmented
reality (AR) are here to stay. With virtual reality, we refer to a
technology mediated setting that defers from the real one. Think about
the virtual environments of MMOs, which follow rules and dynamics
that are different than what we expect. Otherwise, head-mounted
displays (think about Oculus Rift or PlayStation VR) involve users’
senses in novel ways, pushing immersion via technology beyond. The
concept of immersion itself is indeed crucial in virtual reality – with
this term, we refer to the feeling to “lose yourself” during an
experience. Reaching this state is tendentially a desired effect because
it means that the artificial space is engaging enough to forget what is
around. Another important parameter is the fidelity of a virtual
environment – how much real it appears. As you can imagine,
developing a virtual world that mimics the real one is important in
terms of engagement and enjoyment. For both immersion and fidelity,
involving as many senses as possible seems supportive due to the idea
of embodied interaction. However, at the beginning these
technologies may foster motion sickness, which is a feeling of
displeasure due to such a sensorial involvement.
Augmented Reality may sound similar to VR but it is actually quite
different. Rather than building a fictional setting, it aims to augment
and enrich our reality “here and now”. In other words, augmented
reality tools add elements to what is in front of our eyes. Think about
mobile apps like Pokémon Go and Ingress that rely on geolocation for
providing real time information on smartphones according to users’
location (often called hotspots). Mobile AR can provide instant
feedback with interesting implications for learning, tourism, and
marketing.
Otherwise, holograms are a further example of AR. The idea is to
let something new emerge within targeted environments through
headsets like Hololens and Magic Leap. Users can add and play with
augmented characters and layers. Think about movies and tv shows like
205
Star Trek and Minority Report, and you would have an idea! However,
mobile technologies represent the most popular AR platforms due to
their accessibility and cost.
Both VR and AR are becoming cheaper in comparison with the
past. Devices like Oculus Go and Google Cardboard are increasingly
accessible, while the number of apps and software developed for
exploiting these technology increases every single day.
SAQ
1. What is the difference between
augmented reality and virtual reality?
2. What is the difference between
immersion and fidelity?
3. What is an emergent technology? Try
to make an example beyond virtual
reality and augmented reality.
Discussion
Together with a partner or in a small group, discuss the following
questions about your experiences with emergent technologies.
206
Dialogue
In the following dialogue, Tamara and Anis are two friends discussing
about video games and technologies.
Listening Link 1
207
Debate
Virtual reality and augmented reality seem the two sides of the
same coin. They are characterized by specific pros and cons. For
instance, the former builds brand new environments that may isolate
users; the latter harnesses our “here
and now”, but it can distract us from
what is concretely happening with
possible safety risks.
In this debate, you will work
with another student or in a small
group to answer the question Is
virtual reality more engaging than
augmented reality? One person (or
one group) will argue for the
“Virtual reality” option, and the
other person (or group) will argue for the “Augmented Reality” one.
Each person/group should present the reasons and conditions that
motivate your preference. In your argument, you can also address the
reasons that the other person or group is incorrect.
For ideas, you may want to look at Reading 2 again to make some
notes.
Vocabulary Quiz
1) embodied interaction
d. A gameplay that relies on strategic thinking.
e. Online interactions characterized by positive attitudes.
f. The involvement of the whole body with interactive
technologies.
2) geolocation
d. A technological feature that locates a device in space.
e. A technological feature that stores content on cloud platforms
by default.
f. An emergent technology that is getting widespread.
208
3) MMO
d. Massive online environments with several users.
e. eSports related events with a focus on FPSs.
f. The mobile version of AR.
4) hotspot
d. A head mounted display hosting AR applications.
e. A store where you can buy video games.
f. A place of interest in an AR experience.
5) eSports
d. Competitions based on creating the most realistic VR
environment.
e. Competitions based on video games.
f. Competitions based on finding AR elements all around the
players.
Writing
Imagine that you are an aspiring game designer and that you have
enough resources for producing a videogame. You are asked to write
down the main elements of your game, from main goals to leading
rules. In addition, you have to envision possible ways to add VR and
AR elements to your project. Follow the outline below for structuring
your game development plan:
209
1. Name of game
2. Main goal (what are the players supposed to do?)
3. Structure (e.g., levels).
4. Story and relevant characters.
5. Main mechanics and heuristics shaping the game (e.g., what is its
genre?).
6. Targeted device (e.g., is it for mobile?)
7. Audience (e.g., who are you targeting? Kids? Adults? Expert
gamers?).
8. Online and augmented/virtual reality components (is it possible to
play the game online and how? Are there opportunities to engage
with AR/VR instances in the game? If yes, can you explain?).
When you have answered all these questions, share your project with
the class provide constructive feedback for the future. You may end up
creating a videogame together!
210
English for Technology
Unit 12: Business Communication
Table of Contents
Preface
Goals of the Unit
Learning Outcomes
Warm-Up Activity: Discussion
Vocabulary
Business Email and Letter Structure
SAQ
Letter Example
SAQ
Business Email and Letter Content
SAQ
Business Email Exercise 1
Business Email Exercise 2
Business Email Exercise 3
Business Email Exercise 4
Bad News Letter Exercise
211
Preface
In this unit, you will learn about writing business letters and
emails. You will also learn vocabulary related to business
communication. The exercises in the unit will introduce you to best
practices when responding to business emails and letters as well as how
to deliver bad news by email or letter.
Learning Outcomes
By the end of this unit, students should be able to:
Remember vocabulary related to business communication
Use vocabulary related to business communication to analyze
and discuss business emails and letters
Remember basic structure of business emails and letters
Write business emails and letters, including responding to
emails and letters and delivering bad news
212
Unit 12: Business Communication
Before starting this unit, let’s do a little warm-up. Discuss the following
questions with a partner or small group.
1. Estimate how many emails you have received in the last month.
How many were there in the last year? How many physical (non-
electronic) letters did you receive during the same timeframe? How
many text/instant messages have you sent in just the last week?
2. Text/instant messages, emails, and letters can all be used to deliver
similar information. In general, what determines the choice of one
method over another?
3. Think back to a time when you had to deliver bad news (or a
negative response) in writing. How did you deliver the bad news in
that email or letter? Would it have been a good idea to use a text
message to send that message?
213
Vocabulary
General Vocabulary
1. structure: format or layout of the parts of an object or thing.
2. audience: those who listen to or read the words of another.
3. formality: rules about the etiquette one follows as dictated by a
social, religious, or professional situation.
4. conventions: traditional or expected ways an action or activity is
performed.
5. function: the way an object, theory, or person works.
6. parallel: content, objects, or ideas that have a similar form or
meaning as another. In math, parallelism signifies two lines that
have the same slope and do not cross.
7. convey: to transfer an object physically or explain an idea verbally
from one place or person to another.
8. third-party: person or group outside of the current conversation or
situation who are indirectly affected by any decisions made about
it.
9. keep (or kept) in the loop: informed along with other involved
individuals.
10. copy: jargon for “send a copy to.”
11. need-to-know: private information that is shared only with people
who need to know it to do their job.
12. missive: another word for a letter or email.
13. concise: brief and clear language.
14. FYI: abbreviation, meaning “For Your Information,” that is used
in speech and writing to call attention to important information.
15. party: a person or group taking one side of an issue or participating
as a stakeholder in an argument.
16. alienate: to create a rift in a relationship that negatively affects
people, both socially and emotionally.
17. rule of thumb: an estimate or an action given as a practical
example of a typical behavior in the situation described.
214
2. attachment: a document included with an email or letter. This is
usually supplementary information that provides more complete
details than an email or letter can.
3. enclosure: another word for an attachment in printed documents
included with a physical letter.
4. CC line: abbreviation for the “Carbon Copy” line in which the
addresses of others are listed who will receive the email in addition
to the main recipient. These addresses are plainly visible to all who
receive an email.
5. BCC line: abbreviation for the “Blind Carbon Copy” line in which
the addresses of others are secretly listed who will receive a copy
of the email in addition to the main recipient. Any address listed in
the BCC line is known only to the sender of the email. Other
recipients cannot see them.
6. cold email/letter: traditionally named a “cold call,” these are
emails or letters that a recipient is not expecting and/or does not
recognize the name (or address) of the sender, so the document will
be assumed to be SPAM.
7. dated action: a sentence in a business document which lists a
deadline for the reader to respond by if interested in the opportunity
offered.
8. opt out: choosing not to be a part of or participate in an activity or
offer.
9. objective: the purpose of a business document written in one
sentence. This is analogous to a thesis in an essay.
10. email thread: a collection of the original email and all replies to it
that share a common subject line. The previous emails are listed in
reverse chronological order at the bottom of the newest (current)
email.
215
Business Email and Letter Structure
Background
All written documents have a structure (an expected document
format), a target audience (intended readers), and a specific level of
formality (rules to show politeness and respect) that need to be
followed when composing them. Hence, there are many conventions
that have arisen over time in order to facilitate communication. For the
purposes of this unit, we will only examine the conventions of
professional documents (ones that can be used in school or at work),
not informal ones we might send to our friends or post on social media.
216
namely the writer’s self-introduction, objective, explanation of the
objective, and a dated action (if applicable). The ending functions to,
basically, say “goodbye” and contains the closing, signature, and an
attachment/enclosure note (if present).
Side-By-Side Comparison
Subject: Salutation:
Salutation: Subject:
Closing Closing
Signature Signature
Attachment(s): Enclosure(s)
cc:
217
General Formatting Notes
There are several different styles of email and letter writing
formats, but the traditional style is single-spaced and does not use
indents. Instead of indents, a blank line is placed in-between each line
and paragraph. When writing either, use a plain, 12-point font.
Heading Notes
The “From” address line is filled-in automatically by email
software. In these days of multitasking, multiple email accounts, and
people owning multiple personal devices, it is easy to respond too
quickly to an email and use the wrong account/email address. In other
words, if we are not careful, we might accidentally use our personal
address when writing a business email or our business address when
sending email to friends. For professional and legal reasons, avoid this
at all costs, especially if your personal address is a screen name or an
otherwise creative composition. Clients will think such an address is
unprofessional and possibly SPAM if they do not see a domain that
they recognize as a company they do business with. The best way to
avoid the appearance of unprofessionalism is to keep your business,
school, and personal accounts separate. Even though it is convenient,
do not use the same software to check and respond to all your email
accounts.
Although we have to avoid the issues with the “From” line, it
is important to remember that emails have two useful address lines that
we can take advantage of in business: CC and BCC lines. The CC
(carbon copy) line is used to officially send a copy of an email to an
important third-party, such as a manager. This line is used for
accountability. It is a way to tell the recipients something like, “The
manager knows what I am doing.” A CC line can also be used in a
physical letter. When used, it is placed at the very bottom of a letter,
below the enclosure line. The BCC (blind carbon copy) line,
oppositely, is for a secret recipient. Writing an address in the BCC line
will privately send a copy of the email to one or more people, but only
you, the writer, will know. No one else who receives the email can see
who (if anyone) is listed in the BCC line.
Hence, the BCC line is utilized in two common situations. In
one situation, a writer needs to mass email strangers. In this case, the
same basic information, like an acceptance notification from a
university, needs to be sent to many people. When the information is
218
the same but the addresses are different, writers often choose to use
BCC lines so as not to violate anyone’s privacy. Masking an address
via the BCC line helps cut down on SPAM because no visible list of
addresses is sent with the email. Then, an unscrupulous recipient
cannot steal the addresses and SPAM the others.
The second common situation where the BCC line is used
happens when a writer wants to privately notify others about an email’s
content but does not want any of the immediate recipients to know.
This can occur when an employee wants to secretly notify a colleague
to beware of a controversy that is brewing in the office, so s/he puts
that colleague’s address in the BCC line of an email. Those who are
causing the controversy will get placed in the To line, and the manager
might get CC’ed. In this formulation, the controversy-causing
employees know their exploits are being read about by the manager,
but no one but the sender knows that the person in the BCC, like an HR
representative, is being notified of the situation too. Here, the HR
person is kept in the loop so that s/he will not be caught off guard if
the situation turns into a larger problem that HR will have to help with.
As with any issue, use the BCC line ethically. “Copy” only those
people with a need-to-know, and send information only to those who
will not abuse the information they receive. The role of those who
receive a BCC email is to be informed but to remain silent in the email
conversation. Anyone who is asked to participate in the conversation
should be in the To or CC lines.
The final line in the opening is the subject line. Its function in
business documents is to concisely summarize the document because
it is the first “real” information that a reader sees. Subject lines should
be parallel with an objective. Both need to contain the topic and main
points of the document.
Body Notes
At a minimum, the first paragraph of an email or letter should
be the objective, or the purpose of the document, which is summarized
in one sentence. Oftentimes, especially when sending an unexpected
missive, which is termed a “cold email” or a “cold letter,” the writer
will begin the first paragraph with a short self-introduction. In a school
setting, for example, a student will use the first few sentences of the
first paragraph of an email to give their full name, course
name/number, and course meeting time to reinforce their relationship
219
with the teacher. In a business setting, the sender can use the first line(s)
to explain where s/he met the recipient, which person they know in
common, or why s/he is writing. Either approach is designed to help
the recipient know the email is valid and not SPAM.
In general, treat the body of emails and letters like paragraphs
in an essay or report. Start them with topic sentences, and keep each
paragraph about one topic only. Also, for clarity, it is good to use
transitions. Emails tend to be short, or concise, and need shorter body
paragraphs because they are not used to send very important
information. Letters, essays, and reports, on the other hand, are chosen
when the information they deliver is either more important or needs
more explanation and/or research to make convincing.
Lastly, the final paragraph of an email or letter’s body should
not be a traditional conclusion that summarizes the document like the
one many essays end with. Instead, the paragraph provides the space to
give a reader necessary information and important reminders about
what to do next. The final paragraph can be used in different ways. One
option for this paragraph is to include a dated action, which gives a
deadline that an interested reader must respond by. Another option is
to offer an explanation of the next steps that the reader should take if
interested. Third, if the email includes an attachment, the final
paragraph usually contains a notice to remind a reader that an
attachment has been sent, and the paragraph will also briefly indicate
the information that the attachment includes. This attachment notice is
made so that recipients do not accidentally overlook an attachment.
Fourth, the final body paragraph can offer kind words of gratitude for
the assistance or opportunity one has received. Finally, if needed, a
polite apology can be added to the last paragraph to send good will and
underscore the importance of the business relationship between the
writer and recipient despite the writer needing to opt out of a business
opportunity.
Ending Notes
The ending of both emails and letters starts with a brief
goodbye, called a “closing,” that ranges from “Sincerely” or “Thanks”
to “Write with any questions” or “Looking forward to your response.”
The signature follows the closing. In an email, the signature always
contains the sender’s name and the sender’s title,
department/organization, mailing address, and email and phone contact
220
information. The difference between the signature in an email and a
letter is that the mailing address does not need to be included in the
ending of a letter because it has been stated earlier in the letter.
Furthermore, if a letter is being sent on a pre-printed letterhead, any
information included on that letterhead can be omitted from the ending.
Lastly, attachments and enclosures are synonyms. They are
listed so that a reader does not miss them. Different email software will
load a sent or received attachment in different locations. (In this unit’s
example, it is being placed at the bottom of the email though sometimes
it will be displayed elsewhere.) As for the enclosure in a letter
(abbreviated as “Enc.,” these are always on paper. When including an
enclosure in an envelope, always place it behind the letter so that, when
a recipient opens an envelope, the first thing s/he sees is the letter,
which will detail for the reader what they have been sent and why.
Email Example
To: [email protected]
CC: [email protected]
BCC: [email protected]
From: [email protected]
Date: January 22, 2018
Abdulwadood,
First, look over the proofs for mistakes and omissions. If you find
any, let me know what the corrections should be.
Second, there are 3 cover illustrations for you to look at. Choose
the one you like best. They all follow the specifications we agreed
upon. They all cost the same, so whichever you choose, we will still
be within the budget.
221
Please let me know about any corrections needed and which
illustration you prefer by February 15 so that we can get the book
printed and available by August 2020.
Attachments: textbook_proof.pdf,
illustration.zip
SAQ
222
3. Explain in the space below what the purpose is of including the
sender’s full contact information in the signature?
Letter Example
Predraga Vilimonovica 25
Raska 33652
Serbia
Abdulwadood Sharabi
Wehda Street (opposite Qasr al-Basha)
Haraat al-Daraj Quarter
Gaza City
Palestinian Territory
First, read over the contract to verify the details and budget meet
your specifications. Check also that you approve of the listed
schedule.
223
Because we are on a tight schedule if the release date is to be
August 2021, please overnight the signed contract back to me by
July 17, 2020.
Sincerely
Enc. Contract
cc: Remi Jones, Editor
SAQ
1. What line is “Enc.” similar to in an email?
a. Subject
b. Dated action
c. Attachment
2. In this letter (and all letters), what sentence should the subject be a
mirror image of?
a. Dated action
b. Sub-topic sentence
c. Objective
4. Find and copy the Dated Action line in the space below.
224
Business Email and Letter Content
Content Limitations
Keep things simple. As a rule, each email and letter should be
about one general objective when possible. Sometimes the objective is
specific, such as “Office policy changes during summer.” Other times,
only a vague objective is used to loosely include all main points (for
example, “Office updates”). Whenever possible, all information in an
email or letter should be closely related.
In the example below, there is one objective (office policy
changes), which is broken down into three parts (business hours,
computers, and lunch breaks). These topics work because they are
about office policy changes. If the business also wanted to
communicate information about a charity event it is hosting, that type
of FYI is unrelated, so it should be sent in a separate email or letter.
The next example has an objective entitled “updates” because that best
categorizes all the information. Even though hours, lunch area, front
door construction, and charity event are not directly related, they can
still be conveniently grouped as “news” or “updates.” Though there is
no limit to how many main points can be included in an email or letter,
it is usually best to keep them under four so that the document is never
longer than the equivalent of one or two pages.
Objective: Four office updates for March
1. Weekend business hours change
2. Remodeled lunch area coming soon
3. Front door construction
4. Charity event for disabled children
Replying to Emails
All email software has a reply button. When replying to an
email, there are important issues to be aware of. For one thing, all
replies should include the full email thread previously sent and
received, They should also keep the same subject as used throughout
225
the thread. Never delete any parts from a reply. Keeping the same
subject and email thread will help readers remember what the
conversation has been about. It will also remind each party about what
has been promised and what the major issues discussed have been.
No matter what, use the reply button intelligently. It is a bad
choice and should not be used when one needs to send a new email. Do
not mix new information with old (unrelated) content. This results in
an email with a meaningless subject line. Not only does this look
unprofessional, but it is highly confusing.
226
get to it, a refusal should be direct and to the point, such as, “In light of
all the above issues, we are sorry, but the shipment deadline must be
extended three months.” When sending bad news, the objective gets
delayed in order to use the space to first offer clear reason(s) why the
refusal is occurring. To augment the delay required by bad news, the
subject and objective lines typically are replaced with generic
information about the topic of the email or letter.
There are two examples below of paired subject and objective
lines. The first set delivers positive (or neutral news) and so is more
direct.
Neutral/Positive News
Subject: Order #912 Confirmation & Shipping Date Estimate
Objective (paragraph 1): I am writing to confirm your July 2
order of 5,000 units and to provide a shipping date estimate.
Bad News
Subject: Order #912 Update
Generic Topic Notice (paragraph 1): I am writing to update
you about the status of Order #912.
Objective (second to last paragraph): Because of all these
issues, we are sorry, but Order #912 must be canceled.
In short, delaying bad news gives one time to explain and therefore
sounds more polite because it is less shocking.
The other factors involved in delivering bad news is to adjust
both the quantity and the formality of words throughout the entire
document. Writers need to strike a balance which is governed by the
anticipated effect of the bad news on the reader and the importance of
the relationship that a refusal might threaten. Word quantity shows that
a writer is aware of the importance of the business relationship and is
being thoughtful. Formality (politeness) avoids language that might
inflame, or make worse, a situation. When sending bad news, a basic
rule of thumb is to increase word quantity (add explanation) based on
the following scale.
227
Fewer words <------------------------------------------------------------> More Words
Canceled Meeting -- Deadline Extension Request -- Must Cancel Order -- Cannot Accept Promotion
2 phrases 2 sentences paragraph entire letter
The guidelines in the chart above suggest that the actual apology is only
a small part of the total document. This is because an apology comes
across as shallow if not put into context. Anyone can say s/he is sorry.
To make sorrow meaningful, one has to detail the explanatory
circumstances. Hence, along with an apology, an expression of
gratitude for the business opportunity, an acknowledgement of the
inconvenience the bad news might cause, and an explanation of what
the refusal/change is based upon are typically included. When possible,
frame your reasons neither as cold, hard facts nor as selfish actions but
as a step that will be mutually beneficial to all parties involved.
SAQ
1. How many parallel structures are shared by emails and letters?
2. Why should one include an objective in an email and letter?
3. What are three instances when a writer might want to include a third-
party and so use a CC line in an email?
4. Is there ever a time when a writer should delete an email’s thread
when replying?
228
Business Email Exercise 1
229
a. CC the two fighting employees to show them she has influence
in the company.
b. BCC her friends to make fun of the stupidity of the fighting
employees.
c. There is no need to copy anyone.
Circle the letters of the best subject line for each emailed objective
below. There is only one correct answer for each.
230
3. Objective: Here is an update about the attendees and preparation
requirements for the Fasteners Convention we are sponsoring this July.
a. Subject: Fasteners Convention
b. Subject: Fasteners Convention Attendees and Preparations
c. Subject: Let’s Make This a Good One
231
Business Email Exercise 4
To:
CC:
BCC:
From:
Date:
Subject:
Salutation:
Closing
232
Signature
Attachment(s)
Date:
233
Salutation:
Closing
Signature
234
English for Technology
Unit 13: IT Careers
Table of Contents
Preface
Goals of the Unit
Learning Outcomes
Warm-Up Activity: Think and Share
Reading: Choosing an IT Career Path
Vocabulary
SAQ
Discussion
Phrase Matching
Reading: How to get a promotion
Vocabulary
SAQ
Think and Share
Case Study: Networking and Jobs.PS
Vocabulary
SAQ
Think and Share
Reading: IT Jobs
Matching
Think and Share
Sample Job Ad
Technology Tip
Writing: Job Application Forms
Writing: How to write an effective cover letter
Writing: How to write an effective resume
LinkedIn Profiles
235
Preface
In this unit, you will learn about a variety of IT career options. You will
learn vocabulary related to IT jobs and working in IT companies, and
use this vocabulary in discussions about IT jobs and ways to get a
promotion in an IT company. You will read a case study about a
Palestinian job web site, Jobs.ps, and the founder’s ideas about
professional networking. You will also learn about filling out job
applications, writing a cover letter and resume, and creating a LinkedIn
profile.
Learning Outcomes
By the end of this unit, students should be able to:
Remember vocabulary related to IT jobs and working in IT
companies
Understand and evaluate ways to network and get a promotion
in an IT company
Search Palestinian and American job web sites to find relevant
IT job advertisements
Fill out a job application form
Write a cover letter
Write a resume
Create a LinkedIn profile
236
Unit 13: IT Careers
237
Reading: Choosing an IT Career Path
The article below is about some important things to keep in mind when
looking for a job in IT.
Vocabulary
Read through the vocabulary below, which will help you understand
the reading. Put a check mark (✔) next to the ones you need to learn.
Listening Link 1
238
the average. This will make your chances much higher than normal to
get hired. Once you have job experience then you will be in a better
position to ask for more money. In some places, the best way to get
more money is to quit your job and work for another similar company.
This may sound cruel or thankless, but that is how business works in
some places in the world.
Everyone who works hard deserves a raise every year. How do
you show your IT manager that you are a good performer? Easy. Show
up on time, be dependable, be active in meetings, and always do a
little bit more than is asked of you. Also equally important is to be well-
liked by members of your team.
SAQ
1. Why should you keep an eye on job websites?
2. What are some different levels of software developer positions?
3. Why might you need to start in a lower-level job?
4. What can you do after you get more job experience?
Discussion
1. Have you ever had a job before? If so, how did you find it?
2. In Palestine, is the best way to get more money to quit your job and
work for another similar company? Do you think this is cruel?
3. Do you think everyone who works hard deserves a raise every year?
Why?
239
Phrase Matching
Some words commonly go together. Choose the verb from the box that
commonly goes with the nouns below to make a phrase. Write the
correct verb on the line.
Once you have a job, you’ll want to keep that job, and even be
promoted within the company. The next reading will be about things
you should keep in mind in order to get a promotion at your job!
Vocabulary
Which words are you familiar with, and which are new? Put a check
mark (✔) next to the ones you need to learn (that is, the ones that you
don’t know yet).
General Vocabulary
1. Back-up: support
2. Fellow: people who belong to the same group or share a situation
or experience
3. Layoff: ending the employment of a worker
4. Negotiate: discuss something formally in order to make an
agreement
5. Passive-aggressive: a type of behavior where someone resists
someone else by avoiding them
6. Promotion: moving to a higher or more important position in an
organization
240
7. Responsibility: a duty or task that you are required or expected to
do
8. Socializing: talking to and doing things with other people in a
friendly way
9. Stubborn: refusing to change your ideas or to stop doing
something
10. Worth: amount of value something or someone has
IT Vocabulary
1. Project manager: the person in a software development team who
takes the overall responsibilities to manage the software project
2. ScrumMaster: the project manager for an agile development team
This article explains some of the things you can do to help yourself get
a promotion at work.
Meeting set goals can have beneficial results when it's time to
negotiate salaries, survive a round of layoffs, or get a promotion.
241
3. Be courteous, helpful, and respectful to others
In a good IT department, the engineers are known for sharing
knowledge and helping each other. In bad IT departments, the
engineers are secretive and hide knowledge. How can everyone get
better if some people are selfish with what they know? Information
wants to be free. You must set it free. Even if you go to several
universities, graduate school, and have collected many IT
certifications, you will still learn much more about IT from your fellow
engineers. So, it is important to be kind and respect your fellow IT staff.
They are your family for eight hours every day, forty hours every week!
When you start a new job, realize how some people are nice to
you and some people ignore you. Which kind of person do you want to
be? When you get a new junior team member, try to help them and
include them in decisions. Make sure they have someone to eat lunch
with. If you socialize after work with your co-workers, invite new
employees with you. Being nice to new people can have many rewards,
both emotionally and financially.
There is a saying, "Think globally, act locally." What this
means is that just by being nice and pleasant yourself, you can make
the whole world a more nice and pleasant place as well.
SAQ
1. Are IT employees judged most based on how much they know
or who they know?
2. Why is it important to socialize with people at your company?
3. Why should engineers share what they know?
4. How can you help a new junior team member?
5. What does it mean to be passive-aggressive? Why is it bad?
242
Think and Share
Then, work with your group to rank each item as a group. Discuss the
reasons for your choices to try to persuade your group to agree with
you. But, remember that in the end, you need to all agree on your final
ranking!
Vocabulary
Read through the vocabulary below, which will help you understand
the reading. Put a check mark (✔) next to the ones you need to learn.
General Vocabulary
1. agenda: a plan or goal that guides someone's behavior (often kept
secret)
2. branding: promotion of a product or company through advertising
243
3. candidate: a person who applies for a job
4. delegate: to assign a task to someone else
5. entrepreneur: a person who starts a business and is willing to risk
loss in order to make money
6. norms: standards of proper or acceptable behavior
7. primitive: seeming to come from a time in the past
8. random: done without a particular plan or pattern
9. recruiting: finding suitable people and getting them to join a
company
IT Vocabulary
1. portal: a Web site that helps you find other sites
2. solution: a set of software programs and/or services that are sold
as a single package
244
highest quality candidates throughout Palestine. Jobs.ps Ltd has around
one million visits per month, more than 100,000 registered job-seekers,
around 40,000 posted jobs, and almost 3,000 active employer accounts.
Jobs.ps offers an effective recruiting and employer branding
solutions via company pages for employers. They help thousands of
clients and partners promote their employer brand to candidates
researching them and advertise their jobs to ideal candidates who may
not be aware of them. What differentiates Jobs.ps from other recruiting
channels is the quality and number of candidates they deliver and their
influence on candidates' decisions as they research jobs and companies.
Mr. Amjad Hamarsheh, Founder and CEO of Jobs.ps has
recognized the value of networking, and he has adapted some unique
methods:
● Figure out who matters most: Amjad has started to attend almost
all business conferences and gathering and registering in his diary
a pool of business cards from prospective clients and partners.
Then, he categorized his contacts into those who are ‘possible’ and
‘difficult’ to reach before going to the next tier. Then, he started to
prioritize with whom to network and when.
● Find the right team: Amjad found out the easiest way to engage
everyone was by hiring the right team and getting them involved.
Through his excellent delegation skills, he and the team decided to
connect with those whom Jobs.ps can help. So, the team started to
network with international NGOs working in Palestine, and Jobs.ps
has listed a number of points that they thought would be of interest
to the potential clients.
● All about the people: Because networking is all about people,
Jobs.ps has kept the social aspect high on their priority list. Amjad
and his team continued to engage with business people for mutual
benefit. The engagement was not limited to policy makers and main
actors on the ground; they have also engaged with investors,
donors, policy makers and businessmen to benefit their future
growth. In all their meetings, they agreed to promote an important
value, which concentrates on giving; they always explained what
their business can give to people and to the community as well.
245
controlling the progress of their project. For them, this is a very useful
project but it also is complex in nature because it is new to the norms
of Palestinians and firms working in Palestine, where activities are
subject to considerable degree of uncertainty in performance and in
time.
Jobs.ps has developed a networking code for their company,
listed below.
SAQ
1. What is networking?
2. What is Jobs.ps? What does it offer?
3. What are Mr. Hamarsheh’s networking methods?
4. How many of items in the Jobs.ps networking code can you
remember without looking at the list in the article?
246
Think and Share
Next, share your answers with a partner or small group. Do you and
your classmate(s) agree? Talk with your classmate(s) to try to come to
an agreement.
Reading: IT Jobs
There are many kind of jobs that exist in the IT world. Below are just
some of these. Read through the descriptions of each job and think
about whether you would enjoy the job or not, and why.
Enterprise Architect
Tasks and Responsibilities: As a senior-level technical employee, an
Enterprise Architect is responsible for analyzing the business
structure and processes to make sure the business, application, data,
and technology of the company are in line with the organization’s
goals.
247
Qualities: Good technical, business, and design skills
Salary: High
Dress: Formal
Notes: Interact with people in many departments. A lot of
responsibility.
IT Manager
Tasks and Responsibilities: IT Managers are responsible for planning
and coordinating activities that have to do with the computer systems
of a company. IT managers are in charge of the installation and
maintenance of hardware and software in the company.
Qualities: Detail oriented, punctual, critical, supportive
Salary: Medium-high
Dress: Business Casual
Notes: Very stressful
Technical Writer
Tasks and Responsibilities: Technical Writers write instruction
manuals, how-to guides, journal articles, and other supporting
documents to communicate complex and technical information more
easily.
Qualities: Excellent writing skills, good technical mind
Salary: Medium
Dress: Business Casual
Notes: Writers are often good at telling stories
Graphic Designer
Tasks and Responsibilities: Graphic designers create visual concepts,
using computers or by hand, to communicate ideas to consumers.
They develop the overall layout and production design for
applications such as advertisements, brochures, magazines, and
reports.
Qualities: Excellent drawing and illustration skills, good color
matching and artistic qualities
Salary: Medium
Dress: Casual
Notes: Requires a lot of creativity
248
Software Developer
Tasks and Responsibilities: Software developers are the creative
minds behind computer programs. Some develop the applications that
allow people to do specific tasks on a computer or another device.
Others develop the underlying systems that run the devices or that
control networks.
Qualities: Creative, persistent, insatiable thirst for knowledge
Salary: Medium-high
Dress: Casual
Notes: Companies have a lot of developers compared to other
positions listed. Must have good programming abilities!
Project Manager
Tasks and Responsibilities: Project Managers plan, coordinate, and
direct computer-related activities in an organization. They help
determine the information technology goals of an organization and
are responsible for implementing computer systems to meet those
goals.
Qualities: Cooperation, leadership, and organization skills
Salary: Medium
Dress: Business Casual
Notes: This tends to be a high stress position with long hours, and
requires a lot of organization.
IT Security Manager
Tasks and Responsibilities: IT Security Mangers plan and carry out
security measures to protect an organization’s computer networks and
systems. Their responsibilities are continually expanding as the
number of cyberattacks increases.
249
Qualities: Defensive, pro-active
Salary: Medium-high
Dress: Smart, clean dress is very important
Notes: Must stay up to date on the newest methods hackers are using.
Must be good at researching new security technologies.
System Administrator
Tasks and Responsibilities: Systems Administrators are responsible
for the day-to-day operation of the computer networks in an
organization.
Qualities: Must have strong problem solving skills and attention to
detail
Salary: Medium-high
Dress: Casual
Notes: Must have in-depth knowledge of computer systems
Software Tester
Tasks and Responsibilities: Software Testers are responsible for the
quality of software development. They perform automated and
manual tests to make sure the software created by developers doesn’t
have any bugs.
Qualities: Detail-oriented, persistent, curious
Salary: Low-medium
Dress: Casual
Notes: Must have good analytical and problem-solving skills
IT Support Engineer
Tasks and Responsibilities: IT Support Engineers provide help and
advice to computer users and organizations. These specialists either
support computer networks or they provide technical assistance
directly to end users.
Qualities: Must be good at explaining things to people, good listener,
and good at dealing with customers
Salary: Low-medium
Dress: Casual
Notes: Must be very patient!
250
Matching
The six people below are all looking for a job in IT. Read the
description of each person, and decide which job would fit them best.
Once you have finished, share your answers with a partner.
Khaled Leila
Good at Good problem-solving
communicating skills
Knows only a bit Very detail-oriented
about computers Never gives up
Rashid Nadia
Good at C++, JAVA, Knows a lot about how
PHP, HTML businesses work
Very creative Very detail-oriented
Likes big data
Yousef Nur
Good problem solving Strong technical skills
skills Strong business skills
Doesn’t like talking Good communication
with people skills
What kind of IT job would you like to have in the future? Read through
the list of IT jobs again, and choose which job you think would fit your
personality.
Then, tell a partner or a small group which job you would like to have,
and why you think it would fit your personality.
251
Sample Job Ad
Read the sample job advertisement below. As you read, try to answer
the following questions:
252
Technology Tip
Visit some of these job sites, and search for some of the IT jobs
presented earlier. Do you find any companies wanting to hire someone
in that position? Read the job advertisement. What information is
given about the position? What information is given about the
company? What jobs might fit you?
When you apply for a job, one of the first things you often have
to do is fill out an application form. Such a form asks for basic
information about you, such as your name, address, and contact
information (telephone, email) and when you would be able to start the
new job. Sometimes, employers will also ask you for your salary
requirements (i.e., how much you would need to be paid in the new
position).
Job applications also usually contain sections where you have
to give a longer answer (a few sentences or a short paragraph). For
253
example, you might need to summarize your qualifications and skills
or your previous work experience. You might also be asked to explain
why you are interested in this particular job. In all of these, it is
important to focus on what you are able to provide to the potential
future employer, rather than what they can provide to you. For
example, when you describe why you are interested in the job, you
should show how you will positively contribute to the company (for
example, through use or development of your skills), not just how you
will benefit from the job (for example, a good salary). It is also
important that you show that you read the job ad closely. So, if the job
ad says that they want someone with experience using a specific
programming language, you should indicate in your answers how well
you can use that programming language. Your answers should also
show that you know about the company you are applying to. For
example, if you are applying to a small startup, you might mention that
you enjoy working in the exciting and fast-paced environment of a
startup.
Activity:
Next, find a job ad on one of the sites listed earlier, and fill out
the below job application form based on that job ad.
254
Job Application
Date of Interview (Month/Day/Year):
/ /
Full Name:
Address: City:
Phone: E-mail:
Date Available to Start: Salary Requirements:
255
Previous Employment
Dates of employment: Position(s) held:
Company name:
Address:
Supervisor’s name:
Your responsibilities:
256
Writing: How to write an effective cover letter
The first paragraph goes after this. This part is where you
introduce yourself. You also tell the company how you learned about
their job and why you are interested in it, which may include
information about the company and why it sounds interesting to you.
This tells the company that you care about them.
257
The second paragraph should be about you and what you have
done that relates to the job. What does the job require, and what are
your credentials for the job? Give examples of your traits that would
help you do the job well. This includes past jobs, volunteering that
relates to the job, and classes you took and what you learned that
specifically trained you for this position. This is where you tell the
company why you are qualified for the job.
The third and final paragraph is where you tell the company
again that you are interested in the job opening. Let the company know
that you hope to hear from them soon and that you are available for an
interview at the company’s convenience. Thank the reader for his or
her time and give your contact information again.
Don’t forget a formal closing salutation (such as “Sincerely”,
“Best regards”, or “I look forward to your response”), and then sign
your name. Even if your signature is difficult to read, since you
included it at the top of the page like a letterhead, the reader will be
able to identify you.
258
Writing: How to write an effective resume
You probably know what a resume is, and you may have heard
of a CV (curriculum vitae, or “life’s work” in Latin). Both contain
professional information about you as a potential employee, and in
general, companies use one work or another with basically the same
meaning. A resume should contain everything you’ve done in your
professional career. Because of this, you will add jobs and skills to it
as you gain experience. Some companies may ask for an updated
resume regularly to consider employees for promotions or pay raises.
However, like a cover letter, a resume may need to be tailored to fit the
job you want. For example, if you want a job as an IT professional, it
is better to add school experience and jobs that are related to
technology, computers, etc. However, this type of resume may not be
suitable for a job as a marketing specialist where other talents may need
to be highlighted.
Resumes should be concise, clear, and informative. Highlight
only professional skills and training relevant to the job. For example,
your experience working in a youth program during secondary
education may only be relevant if you are applying to a job as the
manager of a daycare. Someone in a technical industry may find
working with youth non-essential to the job position they are trying to
fill. Consider your credentials as well as your personal traits in crafting
a resume that will show a potential employer your skill set and set you
apart from other applicants.
Before beginning to write a resume, consider how long you
think employers typically look at each resume? 5 minutes? 3 minutes?
In fact, most hiring managers take less than 30 seconds to view it
before deciding if it is worth his or her time to spend longer! For this
reason, it is important to have a concise resume. Generally, a resume is
no more than 2 pages, and in the case of most recent university
graduates, it may be a single page. Make your impact immediate.
Because hiring supervisors often read so many resumes at one time,
and because they are busy, they may glance at it and look first for any
errors. If mistakes are found, resumes are often simply thrown away.
Most employers think that if you are careless in representing yourself,
you will also be careless in representing their company. Because of
this, it is very important to be meticulous when writing a resume.
259
Resumes are advertisements of yourself, so they should show
you and your credentials for the job. But what goes first? Not all
resumes are the same, but typically the first thing is a heading. Like the
cover letter, it should include your full name at the top (perhaps in a
bigger font than the rest of the resume), then optionally your address,
phone number, and professional e-mail address. Don’t include links to
social media sites unless they are only representing your professional
accomplishments (such as a link to a repository of software you have
developed).
The next part of the resume may include career objectives or
highlights. This states in one or two sentences what kind of job you are
qualified for. It should be specific to the job you are applying to. If you
don’t know the exact job title, state subjects and areas that you are
interested in and well trained and prepared for. Don’t promise skills
that you do not have, even if you do anticipate that you can learn on
the job. In some cases, if a company finds that you have misrepresented
yourself in hiring documents such as the resume or the cover letter, this
can be grounds for termination. In other words, don’t lie. In the cover
letter you could indicate skills that you would like to improve or learn
on the job, but be careful not to claim what is not true.
Because you are a student and may not have a lot of experience
in the field you want to work in, your education history should go next.
This should include education levels, the subject you studied (major),
and date(s) of graduation. Since you haven’t graduated from university
yet, you may include your “expected” date of graduation. Some people
include honors they earned in education or the community, and these
often speak to your dedication and exceptionality. It may also be a good
idea to include classes you took that are relevant to the job that you
want.
Next, you should include relevant work experience. These are
jobs or volunteering you have already done (or are currently doing) that
are related to the job you want. Because you are in university, you don’t
need to include information about your employment if you lack it, but
internships or work (paid or volunteer) are good habits to pursue during
your university education to build your professional profile and skill
set. For each employer or workplace, include the company name, the
address, your job title, and your dates of employment. After this include
one or two lines about your duties there (what you typically did there).
Make these short and use action verbs when describing what you did.
260
As you gain more experience in your field, eventually you will want to
place this section before your education. For now, it goes after
education.
Finally, you should have a list of activities you may do in
university (if any). Some employers like to see what you have done in
terms of public or community service or special activities as a
university student (club president or treasurer, for example). You can
also include special skills here, such as “proficient in PHP, SQL, and
HTML,” “fluent in English,” or even how many words per minute that
you can type.
You may not need to include this on your resume, but it is a
good idea to have a list of references. Employers will ask others what
they think of you, so it is good to keep at least 3 people who are not
related to you that may recommend you for a certain job. Generally,
you should give the people’s names, their titles and company or
institution, and their contact email or phone numbers.
LinkedIn Profiles
261
Creating a LinkedIn profile is a good idea in today’s digital
world. It can get your name out to more people more quickly. When
people search for you online, they are likely to find your LinkedIn
profile, so it is important to present yourself in a professional manner.
In this exercise, you will complete your LinkedIn profile. If you
have Internet access, you can go to <http://www.LinkedIn.com> and
create a real profile. If you are not able to do that, you can complete a
mock profile using the template in this unit.
The first section of your LinkedIn profile has your photo, name,
and ‘headline.’ People usually put their current position and their
current employer in their headline. For example, you could put
“Student at Al Quds Open University” if you do not have another job.
Next is the “About” section. This is a viewer’s first impression
about you, and a place where you can summarize your most important
information. This is probably the most important section of your
profile, since it is what people will see first. Potential employers will
read this before deciding whether to continue reading your profile or
not. You could highlight your biggest achievements, describe your
biggest strengths, and show off your personality. Some tips for this
section are:
Describe what is most important to you about your current or
future work. That is, what excites you about your field?
Explain your current position. Don’t just state your job title.
Instead, explain what you do. This is a good place to show your
skills and experience.
Highlight your successes: If you have won any awards or had
any particularly successful moments at work, you can include
those here also.
Fill out the first part of your profile with your name, headline, and
‘About’ section, either online in a real LinkedIn profile, or in the
template below.
262
Next is the Experience and Education section. For each position
you’ve had, you should list your job title, the name of the company that
employed you, and the dates of your employment. You don’t need to
list exact dates; listing the month and year is enough. You can also
include a bulleted list of key responsibilities and successes you had in
that position, highlighting your abilities. Usually, positions you had in
the past are written in past tense, and your current position is in present
tense. For example, if in a previous job you managed multiple projects
at the same time, you could write something like “Successfully
managed multiple projects simultaneously.”
Next, fill in the Experience and Education sections of your
profile, either in your LinkedIn profile online or using the template
below.
263
Lastly, you can add any skills and accomplishments you have.
You should add skills and accomplishments that are relevant to the kind
of job you are looking for, or that would help you to be seen as a good
candidate for such a job.
Use the template below to add some skills in the top section,
and accomplishments in the lower section. Then, talk with your
classmates to find people who are willing to endorse your skills.
264
265