Copyright © Fazekas Katalin, 2004. Minden jog fenntartva. Jelen könyvet, illetve annak részeit tilos reprodukálni, adatrögzítő rendszerben tárolni, bármilyen formában vagy eszközzel - elektronikus úton vagy más módon - közölni a szerző és a kiadó engedélye nélkül.
Lektorok: Metodikai lektor: Nyelvi lektor: Szerkesztő:
Kozmér Bianka Chris Lacey Bátonyi Zsuzsanna
A jegyzet megrendelhető, illetve megvásárolható az LSI Informatikai Oktatóközpontban 1037 Budapest, Bécsi út 324. Telefon: 436-6520 Fax: 436-6521
ISBN 963 577 348 X
Kiadó: LSI Informatikai Oktatóközpont Felelős vezető: Dr. Kovács Magda Témafelelős: Flier István
OLITON KFT. 1104 Bp. Kadau. 149.
TARTALOMJEGYZÉK
1. rész - Általános bevezetés, a középfokú vizsga követelményrendszerének leírása
5
2. rész - írásbeli I. feladat - írott szöveg értése II. feladat - Szakmai szókincsteszt
8 40
III. feladat - Irányított fogalmazás
51
IV. feladat - Fordítás idegen nyelvről
56
3. rész - Szóbeli I. feladat - Szakmai beszélgetés
68
II. feladat - Szövegértés
69
III. feladat - PowerPoint Presentation
. 79
IV. feladat - Szakmai beszélgetés egy adott témáról
81
Kulcs (Key)
82
Kedves olvasó, Egy olyan gyakorlókönyvet tart a kezében, amely segíti abban, hogy a LEXINFO informatikai angol középfokú nyelvvizsga követelményeit megismerhesse, illetve fel tudjon készülni a középfokú nyelvvizsga sikeres letételére. A jelen könyv három részből áll. Az elsőben képet kaphat arról, hogy milyenek az írásbeli és a szóbeli vizsga feladatsorai, hogyan lehet rájuk felkészülni, illetve milyen más segítségre is lehet szükség ahhoz,
hogy az akadályokat Ön le tudja győzni. Ezen túl megpróbálok segítséget nyújtani ahhoz, hogy a
vizs-
ga értékelési rendszerébe is betekintést kapjon. A második rész az írásbeli vizsga feladataiból ad válogatást. Az egyféleképpen megoldható feladatok megoldása, illetve a kifejtős feladatok közül néhány mintamegoldás hátul található. A harmadik rész a szóbeli feladatsorokból ad válogatást. Itt megadok néhány segítő kérdést - ezek természetesen csak minták, hiszen a vizsgabizottság kérdező tanárai bármilyen kérdést feltehetnek. Ezekhez a feladatokhoz is adtam meg hátul lehetséges megoldásokat, illetve kapaszkodókat ahhoz, hogy a vizsgára nyugodtabban és felkészültebben mehessen el. A szóbeli vizsga hallás utáni értést ellenőrző feladatait jelen kiadványunkban csak érintőlegesen tárgyalom. Erre a részfeladatra a felkészülést bármilyen hanganyaggal kiegészített általános nyelvkönyvvel, illetve angolul beszélő TV- és rádióműsorok hallgatásával, nem szinkronizált filmek rendszeres nézésével gyakorolhatja. Remélem, a könyv feladatainak elvégzése után könnyebb szívvel jelentkezik az Önnek leginkább megfelelő vizsgára, és annak akadályait sikerrel veszi. Ehhez kívánok kitartást és sok sikert,
a Könyv írója
4
1. rész - Általános bevezetés, a középfokú vizsga követelményrendszerének leírása
A LEXINFO vizsgarendszer leírását a Vizsgaközpont Tájékoztató kiadványaiból ismerheti meg részletesen. Itt most rövid átfogó tájékoztatást kap azzal a céllal, hogy a jelen kiadványt könnyebben és nagyobb haszonnal tudja forgatni. A vizsga • kétnyelvű - azaz mind a szóbeli mind az írásbeli vizsgán szerepet kap a magyar nyelv is, • szintező' - azaz a vizsgázónak előre el kell döntenie, milyen szintű vizsgára jelentkezik. Egy magasabb szintű vizsga sikertelen letétele - bármilyen határérték elérése esetén - nem jelenti az alacsonyabb szint teljesítését. « a megfelelés két feltételhez kötött: minden részfeladatból el kell érni a minimum 40%-ot, illetve az összpontszám 60%-át. • az írásbeli és a szóbeli vizsga szétválik - külön időpontban, egymástól függetlenül teljesíthető'.
ÍRÁSBELI Az írásbeli vizsga négy feladatból áll. Az 1. és a 2. feladatra 60 perc áll rendelkezésre, ezeket a feladatokat szótár nélkül kell elvégezni. Ez a két feladat tetszőleges sorrendben teljesíthető. Az első feladat ún. „írott szöveg értése". A szöveg kb. 1200-1500 leütésből áll. Általában az Internetről levett, eredeti, az informatika témaköréből vett anyag. A szöveg elolvasása után az értést ellenőrző feladat következik. Ez többféle lehet, pl. 10 angol állításról meg kell állapítani, hogy Igaz/Hamis/Nem szerepelt, egy, a szövegre rákérdező kérdésre az adott válaszokból ki kell választani a legjobban illőt, egy adott mondat második felét kell kiválasztani az adott 2-3 lehetőség közül stb. A szövegben a feladat természetéből adódóan lehetnek ismeretlen szavak, a lényeg a szöveg-összefüggések felismerése, illetve az általános informatikai ismeretek kreatív alkalmazása. A második feladat egy szakmai szókincsteszt kitöltése. Ez általában két részből áll, de mindkét rész célja az, hogy a vizsgabizottság meggyőződjék arról, hogy a vizsgázó tisztában van a számítástechnika alapvető fogalmaival angolul, illetve érti az egyszerű nyelven megfogalmazott definíciókat. A feladatok többfélék lehetnek, pl. párosítás, behelyettesítés, kérdésekre való rövid válaszadás, rövidítések feloldása stb. A harmadik és negyedik feladatra fordítható összesen 90 perc. A harmadik feladat megoldásához szótár használata engedélyezett, a rendelkezésre álló idő kb. 45 perc. Itt két adott témakörből választhatóan az egyikről egy 220-250 szóból álló fogalmazást kell írni. Mindkét témakör az informatika területéről szól, az egyik kapcsolódik az első feladat témaköréhez. Ehhez a feladathoz a jelölt szótárt használhat. A negyedik feladat egy kb. 150 szóból álló angol nyelvű informatikai szöveg lefordítása magyar nyelvre szótár segítségével. A szöveg eredeti, általában az Internetről leszedett újságcikk, vagy más érdekes szöveg. Megértéséhez az általános informatikai ismereteknél mélyebb tudás - a fordításhoz szükséges általános nyelvi készségeken felül - nem szükséges. Itt fontos az összefüggő szöveg megfelelő stilisztikai szinten való előállítása is. Mindegyik feladat 20-20 pontot ér, a 80 pont 60%-a, azaz 48 pont adja ki a megfelelt minősítést. Ugyanakkor a jelöltnek még egy feltételnek eleget kell tennie ahhoz, hogy a vizsgát sikerrel letegye: mindhárom feladatból legalább 8-8 pontot kell elérni (azaz 40-40% -ot). A feladatoknál itt, a gyakorlókönyvben, illetve a vizsgán a „Feladatlapon" pontosan fel van tüntetve a feladatok pontértéke. így a vizsgázó tudja, hogy egy feladat kihagyásával hány pontot veszít.
Krtckelcs A szövegértési feladatnál minden helyes válasz két pontot ér. Itt részpontok nem adhatók. A szakmai szókincstcszt feladatai I vagy 2 pontosak, ahol részpontok adhatók, azt mindenütt jelölik. A fogalmazás - természetéből adódóan - nehezebben értékelhető. Mind a nyelvhelyességet, mind a/ általános, illetve szakszókincs helyes használatát, mind a szöveg tartalmát cs szerkezetét pontozzák Ennek jobb megértése erdekében - a könyv utolsó részében - megadunk néhány mintafogalmazást. A negyedik feladat lefordítandó szövegét az értékelő tanár tiz hosszabb egységre bontva egységenként maximum 2-2 ponttal értékeli. Ennél a feladatnál figyelembe kell venni a fordítás pontosságát, a magyar stílust, az esetleges félrefordítások súlyát és arányát, a szövegösszefüggések helyes tolmácsolását magyar nyelven.
SZÓBELI A szóbeli vizsga öt feladatot ölel magába. Az első négy a vizsgabizottság előtt zajlik, amely egy kérdezőtanárból és egy elnökből áll. A vizsga eredményét a bizottság tagjai közösen döntik el. Mivel a szóbeli vizsga harmadik feladata egy előre elkészített PowerPoint-os előadás tartása, ezt a megfelelő műszaki előírások betartásával a szóbeli vizsga időpontja előtt a Vizsgaszabályzatnak megfelelően a Vizsgahelyre kell eljuttatni. A laborfeladatot a Vizsgahely számítógép segítségével szervezi. Itt az értékelést szoftver végzi. A szóbeli vizsga eredményét a labor- és a szóbeli vizsga teljesítményének összesített pontszáma teszi ki. Itt is érvényes az, hogy minden részfeladatot legalább 40%-ra kell teljesíteni, illetve az összpontszám 60%-a adja ki a megfelelt minősítést. Az első feladat egy rövid, szakmai tárgyú általános beszélgetés, amelyben a vizsgáztató a jelölt munkájáról, tanulmányairól, szakmai érdeklődési köréről, szakmai tájékozottságáról, a számítástechnikához kapcsolódó hobbijairól tesz fel kérdéseket. Ennek időtartama maximum 5-6 perc, mely időtartam első 2-3 perce a bemelegítést szolgálja, azaz nem kerül értékelésre. A második feladat az ún. „olvasott szöveg értése", amely egy rövid, 12-15 sorból álló szakmai szöveg olvasásából, összefoglalásából, ha szükséges egy rövid rész fordításából és a szöveghez kapcsolódó kérdések megvitatásából áll. A harmadik feladat egy előre elkészített PowcrPoint-os kiselőadás megtartása. A tárgy megválasztása a jelölt feladata, egyetlen kikötés, hogy az valamilyen informatikai témához kapcsolódjék. Hosszúsága kb. 5 perc, amely idő alatt a jelölt a kivetített diák segítségével kifejti véleményét az adott témakörben. Felolvasás esetén ez a feladat nem értékelhető. A negyedik feladat az ún. irányított szakmai beszélgetés. Ez annyiban különbözik az elsőtől, hogy ennek témaköre kötött. A kérdező tanár döntése alapján a jelölt vagy az olvasott szöveg témakörében fejti ki véleményét, vagy az általa választott PowerPoint-os előadás témájában ad többletinformációt, illetve esetleg védi meg álláspontját. Az ötödik feladat az ún. „hallott szöveg értése". Ez a feladat a szóbelitől eltérő napon is történhet a Vizsgaközpont egy számítógépes termében. A vizsga két részből áll. A kb. 20 percig tartó vizsga első részében egy rövid szöveget kell háromszori meghallgatás alapján feldolgozni. Az első meghallgatás még feladatlap nélkül történik, a második és a harmadik meghallgatás közben egy angol állításokat tartalmazó feladatsort kell kitölteni. A második rész a szakmai szókincs-ismeret mérésére szolgál. A másfél-két perces idő alatt a jelölt a hallott információk alapján tölti ki a képernyőn megjelenő szókincstesztet. (i
A szóbeli vizsga pontjainak összértéke 60. Ebből a vizsgabizottság előtti négy feladatra egyenként 10 pontot lelict kapni, mig a laborfeladat összesen 20 pontot ér. Itt is érvényesek azok a szabályok, amelyek az Írásbelinél követendők, azaz minden részfeladatból legalább 40%-ot kell teljesíteni, mig az összpontszám 60%-a, azaz ebben az esetben 36 pont elérése jelenti a vizsga sikeres letételét. Míg a laborfeladat kérdéseinek értékelése teljesen objektív (a szoftver végzi cl), addig a szóbeli feladatok megítélése a vizsgabizottság dolga. A szóbeli vizsga során a bizottság elnöke a pontozáson kívül részletes feljegyzéseket készít a vizsgázó teljesítményéről, azaz a nyelvhelyességről, kommunikációs készségről, szakmai szókincsismeretről, értési szintről stb. A jelen kiadvány utolsó részében megtalálható néhány, a különböző feladatokhoz kapcsolódó - mintakérdés és válasz azzal a céllal, hogy a vizsgára való felkészülés során a jelentkező konkrét kapaszkodókat kapjon.
FELKÉSZÜLÉS A LEXINFO informatikai középfokú szaknyelvi vizsgára olyan angolul jól tudó jelentkezőket várnak, akik tanulmányaik vagy munkájuk során informatikával, számítástechnikával foglalkoznak, esetleg tanulmányaikat külföldön szeretnék folytatni. A vizsgasorok összeállítóinak meggyőződése, hogy azok, akik rendszeresen angolul használják az Internetet, chatelnek vagy emaileznek angolul, használati útmutatókat, információs anyagokat lapozgatnak vagy esetleg még egy-egy angol nyelvű szaklap is kerül a kezükbe, megfelelő célirányos felkészüléssel és az általános nyelvi készségek birtokában sikeresen próbálkoznak a nyelvvizsga letételével. A jelen kiadvány célja az információk átadásán és a nyelvi készségek fejlesztésén túl az is, hogy a jövőbeli vizsgázók betekintést nyerjenek a vizsga folyamatába, illetve az alkalmazott értékelési rendszerbe. Amennyiben úgy gondolják, hogy a jelen könyvben található feladatok meghaladják tudásukat, az alábbi, az alapfokra felkészítő kiadványokat tudjuk ajánlani: Bátri Blanka-Fazekas Katalin: Everyday English for Computer Use (2003, DI-PRESS Kiadó) Fazekas Katalin: Computer Reader (LSI Kiadó, nyomtatott változat 2002, elektronikus változat SZÁMALK 2003) Fazekas Katalin: Tanulói segédlet a Computer Reader-hez (LSI Kiadó 2002) Fazekas Katalin: Előkészítő feladatsorok Informatikai Szaknyelvi Vizsgára - Angol Alapfok (LSI 2004) Saját kiadványainkon kívül az Oxford University Press informatikai témájú könyveire hívjuk fel figyelmüket. A Vizsgaközpont által forgalmazott kiadványokat egyedül is lehet használni, természetesen még hatékonyabb, ha a vizsga előtt egy, a Nyelvvizsga Központ által szervezett, rövidebb-hosszabb előkészítő tanfolyamon vesz részt az a vizsgázó, aki lehetőség szerint már az első alkalommal meg akar felelni a vizsga követelményeinek. Ezekről a tanfolyamokról a Vizsgaközpont Titkárság személyesen vagy telefonon a 4366-582 számon az LSI Idegen Nyelvi Lektorátusán, illetve a LEXINFO honlapján http://www.gdf-ri.hu/Lexinfo lehet pontos információhoz jutni. Jó munkát, sikeres felkészülést és vizsgázást kíván,
a Szerző
2. rész - ÍRÁSBELI I. FELADAT - írott szöveg értése •ív Rending Comprehension is the most important skill anil it is part of both the written ami the oral examinations, we have prepared two kinds of practice materials. A: The first type is a bit easier than the task at the written exam. Our aim was to ¡five ample practice material in a graded from. In this part all the reading passages are followed by 5 simple comprehension questions, all yon have to do is decide whether they are True or False. B: The second part gives you 15 more articles with comprehension questions. These passages are longer (see examination specification) and contain 10 comprehension questions or statements. They are more complicated and show you what type of tusks you are going to face at the written exam. I./A.
1. Middle-aged women are getting hooked on card games and puzzles online, says a report. W h i l e h a r d c o r e o n l i n e g a m i n g r e m a i n s the p r e s e r v e o f y o u n g m e n , research f i r m S c r e e n D i g e s t f o u n d that " b o r e d housew i v e s " are fuelling the g r o w t h of other g a m e s o f f e r e d on the net. F e m a l e s m a k e up 6 5 % of the g r o w i n g m a r k e t in skill-based g a m e s such as cards, solitaire and puzzles. This kind of casual g a m i n g is estimated to have been worth £ 2 7 0 m in 2003. Willing to pay T h e g i a n t s o f the g a m e w o r l d h a v e s e t t h e i r s i g h t s o n e n t i c i n g a w h o l e n e w g e n e r a t i o n o f p l a y e r s , a p p e a l i n g t o p e o p l e w h o are described as casual g a m e r s . M i c r o s o f t h a s a l r e a d y l a u n c h e d a n e w r a n g e o f o n l i n e g a m e s f o r its X b o x c o n s o l e t o a p p e a l t o t h e less h a r d c o r e g a m e r . " A m a z i n g l y , e v e r y s i n g l e o n e o f t h e m a j o r c a s u a l g a m e s s e r v i c e p r o v i d e r s r e p o r t e d t h a t this g r o w t h w a s b e i n g predominantly fuelled by middle-aged and f e m a l e gamers, the antithesis of the hardcore g a m i n g markets," said report author Nick Gibson. " W e j o k i n g l y t e r m e d this the bored h o u s e w i f e , " he added. Increasingly these " h o u s e w i v e s " are getting involved in competitive gaming, entering skill-based w e b games tournaments to c o m p e t e for cash and other prizes.
http://news.bbc.co.Uk/2/hi/technology/3791983.stm {T}rue of (F)alse
1. The article says that today the number of bored housewives spending a lot of time with online games and puzzles is higher than the number of middle aged young men doing the same. 2. Most women attracted by skill-based online games are in their forties. 3. The term "casual g a m e r ' refers to these women.
I I • CD
4. "Hardcore" gaming is a new trend in the online game industry.
CD
5. These "housewives" seem to be attracted by the feeling of challenge.
CD
j
2. Digital pen takes on mouse Imagine if you could pick up a digital file or a note on a c o m p u t e r and pass it to a c o l l e a g u e ' s c o m p u t e r as easily as you can give them a p a p e r d o c u m e n t or a Posr-lt note. R e s e a r c h e r s at S o n y ' s C o m p u t e r S c i e n c e L a b o r a t o r i e s in T o k y o believe they have figured out h o w to do just that. Today, laptops, m o b i l e p h o n e s and P D A s are e v e r y w h e r e and we digitally s w a p or access an increasing a m o u n t of i n f o r m a t i o n . But it is still difficult for t w o p e o p l e w h o are in the s a m e room to copy files or notes between their devices. T h e typical w a y s of e x c h a n g i n g files, using e - m a i l , disks, or a shared file server, are i m p r a c t i c a l o r c l u m s y i n m a n y cases. D r J u n R e k i m o t o and h i s team a t the S o n y I n t e r a c t i o n L a b o r a t o r y h a v e b e e n g r a p p l i n g with these challenges, and recently p r e s e n t e d their research to an international a u d i e n c e m Vienna, at the C H I 2 0 0 4 , a c o n f e r e n c e on h o w we interact with c o m p u t e r s . 'Pick and drop' Dr Rekimoto's lab has extended the drag and d r o p technique used in most PC s o f t w a r e to create a 'pick and drop' technique So the o w n e r of a h a n d h e l d c o m p u t e r can p i c k up a file f r o m their device, using a special p e n , and d r o p it o n t o the screen of a n o t h e r computer, by placing the pen on its screen. He refers to this approach as 'direct manipulation'. It a l l o w s people to visually select and m o v e i n f o r m a t i o n in p h y s i c a l s p a c e , rather than having to u n d e r s t a n d abstract c o n c e p t s of n e t w o r k s and servers.
http://news.bbc.co.Uk/2/hi/technoIogy/3774747.stm (T)rue or (F)alse
1. The article deals with the issue of data transfer. 2. Sony Computer Science Laboratories have invented a new tool for swapping information between two PDAs. 3 The new invention was presented to the public in a conference in Austria. 4. The term "pick and drop" technique here refers to how files can be moved from one directory to the other. 5. Dr. Jun Rekimoto, the Japanese scientist has developed the new device according to public expectations, which take into account that for most people abstract concepts are too hard to manipulate with.
• • • • •
I I
3. Handy future for gesture sensor T h e familiar k e y b o a r d and m o u s e m e t h o d o f interacting with y o u r c o m p u t e r c o u l d s o o n b e r e d u n d a n t . T w o US researchers h a v e d e v e l o p e d a n o v e l w a y of u s i n g a c o m p u t e r that u s e s h a n d g e s t u r e s a n d a smart p a d that watches how hands move. T h e inventors claim that t h e smart pad s y s t e m , called M u l t i T o u c h , is easier on the wrists a n d less likely to p r o m o t e the repetitive strain injuries o f t e n associated with p r o l o n g e d k e y b o a r d a n d m o u s e use. The researchers also c l a i m that it is s i g n i f i c a n t l y m o r e flexible than a m o u s e / k e y b o a r d c o m b i n a t i o n and could help identify users. G e s t u r e politics Since it w a s i n v e n t e d by Douglas Engelbart in the late 1960s, t h e c o m p u t e r m o u s e has b e c o m e f a m i l i a r to a l m o s t all c o m p u t e r users. But its d a y s could be n u m b e r e d if the M u l t i T o u c h s y s t e m invented by J o h n Elias and W a y n e W e s t e r m a n at the University of D e l a w a r e b e c o m e s popular.
http://news.bbc.co. uk/2/hi/technology/2333041.stm
j
I
I
I lie gesture sensor called MultiTouch is acluallv a device fastened in the user's wrist.
inru.Mir (I i.it-..•
• • • • •
II you put (his device on your wrist, it will directly communicate u ith your computer. v I his new invention has been developed in answer to complaints about physical problems. 4. The new invention's only positive side is that it can protect the user's wrists and shoulders. 5. In the future the computer mouse is expected to be replaced by some more flexible and less strainful devicc.
4. Robots get cheeky Meet K-bot. p r o b a b l y the most s o p h i s t i c a t e d robot head yet developed. It is the crcation of David H a n s o n , a f o r m e r D i s n e y e m p l o y e e n o w w o r k i n g at the University of T e x a s - D a l l a s . T h e android head has c a m e r a s b e h i n d its e y e s that will f o l l o w your m o v e m e n t s ; sophisticated s o f t w a r e d r i v e s tiny motors under the p o l y m e r skin to m i m i c y o u r facial expressions. K-bot will smile, sneer, f r o w n and e v e n squint. Its 24 mechanical m u s c l e s react in u n d e r o n e s c c o n d to p r o d u c e the copycat visage. Computers of t o m o r r o w T h e t w o - k i l o g r a m head was s h o w n o f f to the annual m e e t i n g of the A m e r i c a n Association for the A d v a n c e m e n t of Science ( A A A S ) in Denver. Delegates w e r e b e i n g updated on the latest d e v e l o p m e n t s in biologically inspired intelligent robotics. " T h i s is the face for social r o b o t i c s , " said Mr H a n s o n , w h o is building the m a c h i n e as part of his P h D studies. " T h e human face is the m o s t natural p a r a d i g m f o r h u m a n - c o m p u t e r interactions. This is h o w we will interact with t h e c o m p u t e r s of tomorrow." Remarkably, the m a i n c o m p o n e n t s in this a d v a n c e d m a c h i n e have been built from parts that cost less than S400, and H a n s o n believes this cost can be d r a m a t i c a l l y reduced.
http://news.bbc.co.Uk/2/hi/in_deptli/sci_tech/2003/denver_2003/2769741.stm (T)rue or (Raise •
1. K-bot is very similar to a live cat's head. 2. Its face can participate in communicative situations like smiling, frowning etc. 3. Its face muscles are moved by very small motors. 4. Although the reaction time of its facial expressions is long, the future lies in this type of robots.
• • •
5. Considering how smart this robot looks, its production price is relatively low.
5. Robot helper knows how you feel H u m a n s are natural p s y c h o l o g i s t s c a p a b l e of reading t h e e m o t i o n s and mental stale of their fellows at a glance. N o w two US researchers are b u i l d i n g a robot that is as sensitive to emotional states as its h u m a n masters. T h e robot will h a v e no e m o t i o n s of its o w n but will be a sympathetic helper that responds to its o w n e r ' s mental wellbeing. Before m a k i n g the robot helper, the pair of researchers are creating the system that can reliably distinguish between separate h u m a n e m o t i o n s and w o r k out w h a t s o m e o n e is feeling.
in
I |
S t r e s s levels Robot m a k e r N i l a n j a n Sark.ir and psychologist C r a i g S m i t h f r o m Vandcrbilt U n i v e r s i t y in T e n n e s s e e a r e collaborating on the project to m a k e the sensitive m a c h i n e . The pair are not c o n c e r n e d with g i v i n g their robot e m o t i o n s . T h e y j u s t want it to u n d e r s t a n d what h u m a n s are feeling. Marly work is c o n c e n t r a t i n g on w a y s of accurately s e n s i n g w h a t p e o p l e arc feeling, but P r o f e s s o r S m i t h a c k n o w l e d g e d the difficulty of the task lacing t h e m . " T h e hard fact is that different i n d i v i d u a l s e x p r e s s the s a m e e m o t i o n rather differently/* he said. To get a better idea of h o w p e o p l e r e s p o n d to d i f f e r e n t situations, the pair are fitting e x p e r i m e n t a l s u b j e c t s with small wearable sensors that m o n i t o r their r e a c t i o n s w h i l e they play video g a m e s .
http://ncws.hbc.co.Uk/2/hi/technology/25900S7.stm
(T)ruo or (F)alse
1. The aim of these two US researchers was to design a robot that can be as sensible as a human being. 2. The robot's main task will be to serve its owner like a good butler. 3. The task is very complcx as different individuals have different needs. 4. The researchers think that by observations thev can draw general conclusions from tests carried out in everyday situations. 5. The researchers are trying to get some ideas by following human responses to video games with the help of wearable sensors.
6. Life with a robot dog B B C Go Digital's J o n W u r t z e l looked a f t e r S o n y ' s intelligent A i b o for a couple of weeks to find out how much fun y o u can h a v e w i t h a r o b o t d o g . W h e n I first s a w A i b o c o m e out of his b o x , a h u g e s m i l e b r o k e out a c r o s s my face. This robot s e a m l e s s l y b e c a m e a h i m . n o t an it. He m a d e me want to p l a y with him. 11 helps that A i b o is o n e h a n d s o m e l o o k i n g robot dog. R o u g h l y the size of a large p u p p y , A i b o is sleek and polished, a n d his m o v e m e n t s are r e c o g n i s a b l y c a n i n e . His flexibility s e e m s to surpass g y m n a s t s , and w a t c h i n g him stretch, p r a n c e a r o u n d a r o o m , or c h a s e a ball is entrancing Satisfying experience As an aesthetic e x p e r i e n c e . A i b o is h u g e l y s a t i s f y i n g . H e also c o m e s with s o m e p r o m i s i n g features. You can p r o g r a m h i m to r e s p o n d to a s p e c i f i c n a m e . A c a m e r a within the d o g e n a b l e s h i m to s e e and can be wirelessly c o n n e c t e d to y o u r c o m p u t e r , a l l o w i n g y o u to see the w o r l d through his perspective.
You can also c h a n g e his s o f t w a r e so that he b e c o m e s a puppy, c o m p l e t e w i t h c r y i n g a n d d e m a n d i n g b e h a v i o u r
http://news.bbe.co.iJ k/2/hi/in_depth/sci_tech/200 l/artificial_intelligence/l 536962. stm(T)rue or (F'ialse 1. The robot dog is so life-like that you immediately want to play with him. 2. When Aibo appeared, he immediately smiled at his master. 3. Me not only looks nice but moves around like a dog. 4. He is called Aibo, which name lie understands immediately. 5. He can be programmed to behave in different ways.
p
i
7. Computer babbles like a baby T h e idea of a child android p r o g r a m m e d to love, as in S t e v e n Spielberg's film A.I., m a y s e e m like p u r e s c i e n c e fiction. But this m a y b e c o m e a reality s o o n e r than we think, a c c o r d i n g to J a c k Dunietz, a hi-tech e n t r e p r e n e u r and president of an Israeli-based c o m p a n y called Artificial I n t e l l i g e n c e (A.I.). His team of scientists have designed a c o m p u t e r p r o g r a m based on a set of behavioural algorithms that enable the computer to learn l a n g u a g e the s a m e w a y h u m a n s do, starting from scratch. Up until now, c o m p u t e r analysts h a v e p r o v i d e d p r o g r a m s with built-in grammatical rules. T h i s is the first t i m e a p r o g r a m has b e e n b a s e d o n the d e v e l o p m e n t a l l a n g u a g e l e a r n i n g o f h u m a n s . Talking computers coming Within 10 years, says Mr D u n i e t z , we will s e e t h e next t e c h n o l o g i c a l revolution - c o m p u t e r s that can c o n v e r s e naturally with h u m a n s . " T h e PC revolution of the 1980s and the Internet r e v o l u t i o n of the 1990s were mere precursors of a big w a v e about to hit us - the user i n t e r f a c e r e v o l u t i o n , " he says. Just over o n e year a g o s a w the birth of baby H a l , a c o m p u t e r p r o g r a m n a m e d after t h e intelligent c o m p u t e r in 2 0 0 1 : A Space Odyssey. T h e p e r s o n H a l calls " m u m m y " is A n a t T r e i s t e r - G o r e n , a n e u r o l i n g u i s t w h o has b e e n training H a l to t a k e his first steps in l a n g u a g e acquisition. T h e t w o talk on a d a i l y b a s i s , s o m e t i m e s f o r hours at a time. Ms Treister-Goren g u i d e s Hal t h r o u g h a virtual reality m a d e up of t y p i c a l examples f r o m a child's w o r l d , like p l a y i n g with a ball or visits to the z o o .
http://news.bbc.co.uk/l/hi/in_depth/sci_tech/2001/artificial_intelligence/1537842.stm (T)rue or (F)alse
1. The robot the passage is about is called a "child" because it can be programmed to love.
•
2. The novelty of this child android is that it can acquire a language the same way as a human does.
• • • •
3. If a robot develops its language knowledge like people, it will probably be able to communicate in a more natural way than being preprogrammed for talk. 4. The process of teaching this robot to talk is similar to the way parents teach their babies in their first years. 5. As the robot has no long years to grow up like a baby does, its "mummy" is immediately teaching it how to behave in adult situations.
8. Sing Star hits the high notes A s S o n y c o n t i n u e s o n its r e l e n t l e s s q u e s t t o e n s u r e e v e r y h o m e i n t h e w o r l d p o s s e s s e s a P l a y S t a t i o n 2 , g a m e s like S i n g S t a r will b e c o m e e v e r m o r e p o p u l a r . T h e p r e m i s e of Sing Star is simple - it is a karaoke-inspired title which awards points to players w h o can sing in tune. The g a m e c o m e s with t w o microphones and a g a m e disk, featuring about 30 songs and music videos. Players can sing solo, duet and even battle it out to find the most tuneful. T w o players can warble simultaneously in a head to head battle - the g a m e tracks the players' performances with live c o m m e n t s s u c h as "awful" and "cool". If being told by a games console that you are lone d e a f is n o t e n o u g h humiliation - y o u can a l w a y s play b a c k y o u r p e r f o r m a n c e to hear the d r e a d f u l rendition yourself. T h e p r e m i s e is wrapped in a simple-to-use interface, w h i c h reflects the young teen audience at which the g a m e is squarely aimed. Addictive It is s i m p l e a n d addictive fiin, w h i c h a late n i g h t s e s s i o n w i t h three f r i e n d s can attest to. T h e s o n g s r a n g e f r o m recent chart hits s u c h as Jamelia's Superstar to p o p c l a s s i c s s u c h as Like A Virgin a n d A-ha's T a k e on Me a n d all-time classics such as Elvis' S u s p i c i o u s M i n d s . T h e original m u s i c v i d e o s f o r e a c h of t h e tracks play in t h e b a c k g r o u n d as y o u sing. If y o u o w n o n e o f S o n y ' s E y e Toy c a m e r a s t h e n y o u c a n a l s o w a t c h y o u r s e l f i n action a s you p e r f o r m . O n the d o w n s i d e , the g a m e ' s 30 tracks is a severe limitation a n d p l a y e r s will q u i c k l y get b o r e d of the offerings.
http://news.bbc.co.Uk/l/hi/technology/3746887.stm
1. PlayStation 2 is a game that enables users to sing to music like at a caraoke party.
(T)rue or (F)alse
O
2. The problem with PS2 is that only one singer can use it at one time.
CH
3. While singing, the gamers can get a critical feedback from the software.
CH
4. The repertoire can be enlarged by recent hits - which reflects the teen audience' expectations.
I I
5. The game package includes a camera, which can record the gamers' performance.
I I
9. Eco glass cleans itself with Sun A r e v o l u t i o n a r y k i n d o f g l a s s t h a t n e e d s l i t t l e c l e a n i n g c o u l d m e a n s o a p i s b i n n e d f o r g o o d . T h e Pilkington Activ glass has a special n a n o - s c a l e - e x t r e m e l y thin - c o a t i n g of macrocrystalline t i t a n i u m o x i d e w h i c h reacts to daylight. This reaction b r e a k s d o w n filth on t h e glass, with no n e e d f o r detergent. W h e n water h i t s it, a h y d r o p h i l i c e f f e c t is created, so water a n d dirt slide off. It is o n e of f o u r finalists f o r the e m i n e n t M a c R o b e r t e n g i n e e r i n g a w a r d . T h e p r i z e is given out by the U K ' s R o y a l A c a d e m y o f E n g i n e e r i n g f o r technological a n d e n g i n e e r i n g i n n o v a t i o n . 'Nano' cleaning " P i l k i n g t o n Activ is b a s e d on titanium d i o x i d e , w h i c h is used in f o o d s t u f f s , t o o t h p a s t e s , a n d s u n c r e a m , " explained Dr Kevin S a n d e r s o n , o n e of the t e a m m e m b e r s w h o d e v e l o p e d Activ at Pilkington's technical r e s e a r c h centre. But usually it is a w h i t e p o w d e r w h i c h is not ideal f o r glass b e c a u s e you can't s e e t h r o u g h it. " S o we u s e d it in a t h i n film f o r m - 15 n a n o m e t r e s thick - so that it a p p e a r s as c l o s e to n o r m a l glass as it c a n . " A l t h o u g h not strictly n a n o t e c h n o l o g y , the special c o a t i n g a n d the c h e m i c a l r e a c t i o n s h a p p e n at t h e n a n o - s c a l e ( o n e t h o u s a n d m i l l i o n t h of a m e t r e ) . T h e titanium dioxide coating on the glass had two properties that m a d e it special, said Dr Sanderson. It absorbs sunlight - ultraviolet radiation w h i c h c a u s e s w h a t is called a photocatalytic e f f e c t . T h r o u g h this process, the c o a t i n g reacts w i t h light w h i c h then breaks d o w n organic dirt.
http://news.bbc.co.Uk/l/hi/technology/3770353.stm (T)rue or (F)alse
1. This new invention has got a special award granted for engineering products. 2. This active glass is made of microcrystalline titanium oxide.
CH
3. If we use this glass in our windows, we don't need anything else just water to keep them clean.
I I
4. Titanium dioxide is poisonous stuff.
CD
5. The essence of the cleaning process is that it gets into reaction with light, which breaks down filth.
•
10. Tiny science is lost on UK public N a n o t e c h n o l o g y is a total m y s t e r y to m o s t people, an opinion poll reveals. T h e B M R B s u r v e y s h o w s j u s t 2 9 % o f the p u b l i c c l a i m t o h a v e h e a r d o f it, w h i l e o n l y 1 9 % a r e a b l e t o give nanotech a d e f i n i t i o n , w h e t h e r a c c u r a t e or not. T h e s c i e n c e is an e m e r g i n g f i e l d in which n e w materials or d e v i c e s are c o n s t r u c t e d by m a n i p u l a t i n g individual, or groups of atoms or molecules. It c o u l d lead to a r a n g e of materials with n o v e l properties; to n e w d r u g delivery s y s t e m s a n d s m a l l e r c o m p u t e r s . T h e f u l l potential i s only j u s t b e i n g explored b y researchers. T h e poll w a s carried out for t h e Royal A c a d e m y of E n g i n e e r i n g a n d the R o y a l Society, w h i c h h a v e a w o r k i n g g r o u p r e v i e w i n g the potential i m p a c t s o f n a n o t e c h n o l o g y .
\ n Mirpri.si' I lie etoiip was set up alter c o n c e r n s w e r e raised in media rcporis about the possible dangers particles c n g i n c e i e d mi ilnnano-scale - a n a n o m e l i c is a billionth of a m e t r e - p o s e to people's health. Science fiction writers, notably M i c h a e l C r i c h t o n . h a v e also Honied the idea that " n a n o b o t s " could run a m o k , turning the u hi Id into a "grey g o o " Mosi people t h o u g h , h a v e liule idea w h a t nanotcch is - for better or worse.
http://ne\vs.bl>c.co.u k/l/hi/sci/tcch/3513382.stm
(T)rue or (Raise
|
1. A survey shows that the majority of people have never heard of the term "nanotechnology".
|
2. 19% of the people asked in the survey could give a correct definition of term.
j
3. Researchers have accurate ideas about what potentials nanotechnology has for scicncc.
I 4. There is a rising public concern about the potential harmful effects of nanotechnology-cngincered inventions. | i
5 These public worries have been caused by issues first raised by science fiction writers in their books.
•
• • • •
II. London's little idea N a n o t e c h n o l o g y m a y be the s c i e n c e of the small, but it is surely destined for bigger things. T h e n e w London C e n t r e for N a n o t e c h n o l o g y ( L C N ) , d u e to open in 2004, is a joint venture b e t w e e n University C o l l e g e London and Imperial C o l l e g e , d e s i g n e d to put British science at the centre of this e m e r g i n g field. Based in a new b u i l d i n g with p u r p o s e - b u i l t clean r o o m s and laboratories, the centre is f u n d e d by a £13.65 m higher education grant u n d e r the S c i e n c e R e s e a r c h I n f r a s t r u c t u r e Fund. " T h e r e is n o w a h u g e e f f o r t in n a n o t e c h n o l o g y w o r l d w i d e , " said deputy director Dr Q u e n t i n Pankhurst. " W e believe our central location and e x p e r t i s e will attract both interest a n d investment f r o m the capital." Dust devil He is convinced that the n e w c e n t r e will deliver results across many disciplines, including electronics, chemistry and medicine. Ii will e m p l o y about 100 p e o p l e , i n c l u d i n g 25 principal investigators and 50 students. " f l i c core of the n e w c e n t r e is a 2 0 0 - s q u a r e - m e t r e clean r o o m , w h i c h will allow novel n a n o s c a l c p r o c e s s i n g t e c h n i q u e s to he developed and a p p l i e d to p r o b l e m s in areas r a n g i n g f r o m health care to q u a n t u m c o m p u t a t i o n ,
said Dr Pankhurst
http://ncws.bbc.co.Uk/l/hi/sci/tech/2698649.stm (T)rue ot {Flalse •
I. There is a great scientific potential in nanotechnology. ;
2 The new research centre in London is mainly funded by the state.
I
3. The word "clean" here probably refers to a scientific term meaning
I
4. Nanotechnology is expected to produce revolutionary inventions
that the location is free of dust or any other nano-scalc dirt in the an in one field. 5. At least half of the staff will come from universities. 14
• • • •
12. Test tube holds a trillion computers R e s e a r c h e r s at the W e t / m a n n Institute in Israel h a v e d e v e l o p e d a c o m p u t e r so small that a trillion of its kind lit into a test tube. I'he n a n o c o m p u t e r consists of D N A and D N A - p r o e e s s i n g e n z y m e s , both dissolved in a liquid. T h e inventors believe it could ultimately lead to a d e v i c e c a p a b l e of p r o c e s s i n g D N A inside the h u m a n body, f i n d i n g a b n o r m a l i t i e s and creating healing d r u g s . In the m e d i u m term, it c o u l d be turned into a tool c a p a b l e of s p e e d i n g up the currently labour intensive j o b of D N A sequencing. From salesmen to genomes D N A s e q u e n c i n g is p a n of the task of c r a c k i n g the g e n e t i c c o d e of interesting o r g a n i s m s as d i v e r s e as the p n e u m o n i a bug. the t o m a t o and the h u m a n b o d y to d i s c o v e r m o r e about the w a y they f u n c t i o n . P r o f e s s o r Ehud S h a p i r o , head of the W e i z m a n n t e a m , s a y s the D N A c o m p u t e r is an a u t o m a t o n , c o m p l e t i n g its work w i t h o u t h u m a n intervention at each s t a g e of processing. " T o d a y it is limited to p r o c e s s i n g D N A w h i c h is synthetically d e s i g n e d . In the future it could p r o c e s s any D N A m o l e c u l e s . " h e told B B C N e w s Online.
T h e m a c h i n e ' s input, output a n d s o f t w a r e p r o g r a m are all D N A m o l e c u l e s .
http://news.bbc.co.Uk/l/hi/sci/tech/1668415.stm (T)rue or (F)alse
1. Scientists have produced a nanocomputer in order to create a device capable of cracking the genetic code of organisms. 2. DNA sequencing is still a problem for the scientists to solve 3. Once ready, the computer doesn't need any human help to perform its task. 4. The computer itself consists of one DNA molecule. 5. The new tool of today hasn't still reached its full potential.
•
• • • •
13. Cvber-cops to patrol Internet chatrooms L O N D O N , E n g l a n d ( R e u t e r s ) - Police p l a n t o p a t r o l I n t e r n e t c h a t r o o m s a s p a r t o f a m u l t i n a t i o n a l c r a c k d o w n o n pedophile rings. T h e y will also seize the f i n a n c e s of Web site operators w h o p e d d l e child p o r n o g r a p h y a n d f r e e z e the credit c a r d s of thencustomers. " W e w a n t to create the e q u i v a l e n t of a b e a t c o p for the Internet." said the U K ' s N a t i o n a l C r i m e S q u a d A s s i s t a n t C h i e f C o n s t a b l e Jim G a m b l e . Police f r o m Britain, the U n i t e d States, C a n a d a and A u s t r a l i a are to f o r m a global task force w i t h the p r i m a r y aim of s t o p p i n g p e d o p h i l e s luring children into o f f l i n e e n c o u n t e r s . " T h i s s h o u l d not be v i e w e d as a Big Brother tactic - this is about p o l i c e b e c o m i n g m o r e v i s i b l e on the Internet." G a m b l e told Reuters on Wednesday. " U n d e r the plan, an o f f i c e r w o u l d a p p e a r in a chat area f r o m t i m e to t i m e to o b s e r v e c o n v e r s a t i o n s and w o u l d he identified with a type of ' c y b e r b a d g e ' or icon for the "Virtual G l o b a l Task F o r c e ' to let e v e r y o n e in t h e c h a t r o o m k n o w . G a m b l e said. " W e w a n t to g i v e the potential p r e d a t o r t h e idea that we are present to m a k e t h e m think 'will I loiter here or will I flee f r o m that particular c h a t r o o m ? " T h e p r o b l e m o f p e d o p h i l e " g r o o m i n g " o f children i n c h a t r o o m s has b e e n g r o w i n g . Last year. M i c r o s o f t ' s M S N W e b portal s h u t d o w n c h a t r o o m s in nearly e v e r y c o u n t r y w h e r e it o p e r a t e d , s a y i n g they had b e c o m e a h a v e n for p e d o p h i l e s and s p a m - p e d d l e r s . T h e m o v e w a s greeted with m i x e d e m o t i o n s .
http:/A> ww.cn n.coni/2004/TECH/intcrnct/06/09/crimc.internct.reut/indc , \. lit ml
I ""Patrolling" Internet cliatrooms in tins case means sneaking into these circles without being seen and checking on activities going on among the members. 2. The Cyber police will have legal means to take measures in order to stop child pornography. .). The maul aim of the operation is to reduce the number of porno sites on the Internet. 4. MSN Web portal has already tried to handle the problem without the police intervention. 5. Everybody welcomed the step when MSN closed down some portals because of their illegal activities.
(T)iij.'
,1 Ml'-.
•
• • • •
14. Dot-travel? Dot-mail? New I n t e r n e t d o m a i n s weighed A n e w balch of p r o p o s e d i n t e r n e t d o m a i n s c o u l d m a k e it easier to fight spam and filter out s m u t , but the head of the regulatory b o d y that will usher t h e m sees e v e n b r o a d e r possibilities. A n y b o d y with S8 to s p a r e can r e s e r v e a d o m a i n n a m e e n d i n g in .com or .info, but the 10 n e w d o m a i n s being considered by I C A N N are d e s i g n e d for s p e c i f i c p u r p o s e s . I C A N N e x p e c t s to d e c i d e w h i c h o n e s m a k e the cut by S e p t e m b e r 30. T w o m e y said he expected the e v a l u a t i o n p r o c e s s to go m o r e s m o o t h l y than a previous r o u n d in 2 0 0 0 w h e n participants said they had little idea w h y p r o p o s a l s w e r e a c c e p t e d or rejected. Independent evaluators will a s s e s s a variety of f a c t o r s , from the perceived need the d o m a i n will fill to whether sponsoiing organizations have the technical ability to r u n a registry that could contain millions of n a m e s . Proposals The 10 p r o p o s a l s s u b m i t t e d lo I C A N N c o v e r a w i d e range, b a c k e d by a mix of nonprofit o r g a n i z a t i o n s and technology companies. T h e j o b s d o m a i n w o u l d a l l o w c o m p a n i e s t o list available j o b s . A n t i - s p a m crusaders S p a m h a u s h a v e p r o p o s e d .mail as a b a d g e of h o n o r for those w h o don't send unsolicited bulk e-mail. Nokia. V o d a f o n e G r o u p Pic a n d M i c r o s o f t C o r p . h a v e p r o p o s e d a .mobi d o m a i n for W e b sites and other online content designed to fit on the small s c r e e n s of cell p h o n e s .
http://www.cnn.com/2004/TECH/internet/05/28/domains.reut/iridex.litmI
(T)rue or (F)alse
I j
1. From now on there is a new regulatory body to decide on new Internet domains.
2. If you want to introduce a new domain name ending, you have to pay 8 dollars. I 3. The selection criteria for new domain name endings havealways been clearly defined and made public, i 4. Whether a domain name ending is accepted depends on two I main factors. j i
K.
5 Most of the new endings suggest the main field of activity the URLs belong to.
•
• • •
15. Used laptops yield secret data R e s e a r c h e r s find p e r s o n a l and corpoiate information on c o m p u l e r s bought ai a u c t i o n s and on-line. I -aptops containing sensitive financial details and all manner of corporate secrets can be snapped up at auctions for a pittance, a security firm revealed on Wednesday. Stockholm-based Pointsec Mobile Technologies said it bought 100 laptop computers from a host of Internet a n d public auctions o v e r the past t w o m o n t h s . T h e e x e r c i s e intended to d e m o n s t r a t e that the scores of lost or stolen l a p t o p s that w i n d up at auction e v e r y day h a v e hard d r i v e s with little or no security, g i v i n g identity thieves and f r a u d s t e r s e a s y access to lucrative data. W h a t it did not e x p e c t to find w a s a c a c h e of c o r p o r a t e laptops too that were as easy to c r a c k as g r a n d m a ' s PC. In all, the firm's t e c h n i c i a n s w e r e able to pull sensitive details f r o m 70 of the 100 m a c h i n e s it b o u g h t . " E v e n w h e n c o m p a n i e s or individuals b e l i e v e they h a v e w i p e d the hard drive c l e a n , it is blatantly clear h o w e a s y it is to retrieve sensitive i n f o r m a t i o n from t h e m " . Wiped clean? C o m p a n i e s usually go to the trouble of w i p i n g a c o m p u t e r hard d r i v e of any sensitive details b e f o r e d i s c a r d i n g them, but even that is not foolproof. A bigger problem is laptops lost on the train or the airport, which are often auctioned to the public if the o w n e r s don't c l a i m t h e m .
http://money.cnn.com/2004/06/09/technology/personaltech/bc.tech.laptop.reut/index.htm
(T)rue or (F)alse
1. liven if you think you have wiped the memory of your laptop clean, it is not advisable to sell them. 2. The Swedish company has been surprised to find that second-hand laptops bought at auctions or online give out the sensitive information of their previous owners. 3. Even companies make the mistake of selling their laptops not considering security issues. 4. You can easily buy a second-hand laptop that even your grandmother can crack. 5. Be careful with your laptop when traveling because, if lost and sold at an auction, your sensitive data may be accessed by the new owner.
I—1
I I I I I I I—I
I./B 1. A headlong rush is taking place in cyberspace to grab a slice of the potentially lucrative market for legal music downloads. C o c a - C o l a is the latest to j o i n the fray, l a u n c h i n g its o w n b r a n d e d o n l i n e m u s i c s e r v i c e with m o r e than 2 5 0 , 0 0 0 tracks costing from 80 p e n c e each. It s e e m s that e v e r y o n e f r o m r e c o r d labels to s o f t w a r e c o m p a n i e s is t r y i n g to cash in on the s u c c e s s of A p p l e ' s iTunes music store w h i c h has sold 25 m i l l i o n s o n g s in j u s t n i n e m o n t h s . To t h o s e in the m u s i c b u s i n e s s , it reflects a s h i f t in h o w t h e industry s e e s t h e Internet. " T h e t e n o r o f our d i s c u s s i o n s h a s entirely c h a n g e d . " " W e w e n t f r o m zero r e v e n u e a s a n industry t o $ 3 0 m b y the e n d o f last y e a r for legitimate digital d o w n l o a d s . " O v e r t h e p a s t 12 m o n t h s , the b i g record labels h a v e realized there is an u n t a p p e d d e m a n d f o r online music. N o w singles c a n be d o w n l o a d e d o v e r the net f o r j u s t u n d e r a p o u n d , as w e l l as w h o l e a l b u m s by c h a r t - t o p p i n g artists. " T h e r e has b e e n an absolute sea c h a n g e in the last y e a r , " " T h e r e has b e e n a c o m p l e t e s h i f t in e m p h a s i s a n d p h i l o s o p h y in getting this c o n t e n t o u t to t h e p u b l i c . " The shift i n the r e c o r d industry d i d not c o m e o v e r n i g h t . T h e w i d e s p r e a d o n l i n e s h a r i n g o f copyrighted s o n g s and the vision o f A p p l e f o r c e d the h a n d o f t h e business. " P e o p l e u s e d t o bitch that y o u can't c o m p e t e w i t h f r e e . " " N o w e v e r y o n e has a c c e p t e d that y o u can c o m p e t e w i t h f r e e , o f f e r i n g s o m e t h i n g that i s better than f r e e . " A t the d i s c u s s i o n o n digital d o w n l o a d s a t the r e c e n t C o n s u m e r E l e c t r o n i c s S h o w i n L a s Vegas, m o s t panellists a g r e e d that the k e y to s u c c e s s p r o v i d i n g a b e t t e r alternative to u n a u t h o r i s e d file-sharing services.
(1350
characters)
http://news.bbc.co.Uk/l/hi/technology/3409089.stm
Finish the following sentences by choosing the best answer from the given alternatives. 1. Legal music downloads a. seem to be a profitable business nowadays. b. make online firms rush in a competition for the market. c. Both a. and b. 2. Coca-Cola a. started its enterprise in this field before many other companies could see how profitable this activity would be. b. has joined the large number of online music service providers because it can see huge potentials in the business. c. Neither a. nor b. 3. Apple's iTunes music store a. showed the others that selling online music could be a very profitable enterprise. b. started its online music trading about three quarters of a year ago. c. Both a. and b. 4. Many people have realized now that a. the Internet is not a threat to the music industry. b. from zero revenue their profits can grow to 30 million dollars in one year. c. Neither a. nor b. 5. Even the best-known music manufacturers a. know now that online music is the future. b. have realized that downloading music cannot be stopped with legal measures. c. Neither a. nor b. 18
6. The price for downloading legally greatly depends on a. whether we want a single song or a whole album. b. how rccent and trendy the music is. c. Neither a. nor b. 7. The change came last year when a. the participants of the industry decided to change their approach to music downloading. b. Apple ¡Tunes introduced online music sharing overnight. c. Both a. and b. 8. The concept that nobody can compete with free software a. cannot be beaten. b. has overcome the headlong rush for the potentially lucrative market. c. Neither a. nor b. 9. Many participants in the music industry have already accepted that a. the competition is free. b. if the service is better, people are ready to pay for it. c. Both a. and b. 10. At the Consumer Electronics Show a. people agreed that unauthorized file-sharing services are not the best answer to the public demand. b. there was a public discussion about the ways of providing legal ways for downloading files. c. Neither a. nor b.
2. The number of songs sold via Europe's biggest music download sites has increased tenfold over the past year. M o r e than a million d o w n l o a d s h a v e b e e n sold via sites such a s F r e e s e r v e , M S N a n d M y c o k e m u s i c f r o m J a n u a r y - M a r c h - 10 times up on t h e s a m e p e r i o d in 2 0 0 3 . O D 2 , the f i r m that p r o v i d e s the d o w n l o a d s , said O u t K a s t ' s H e y Ya! w a s the m o s t p o p u l a r s o n g i n the U K . It said it p r o v e d there w a s d e m a n d for a " d e c e n t , legal alternative to p o o r quality illegal peer-to-peer n e t w o r k s " . M u s i c fans are d o w n l o a d i n g a w i d e r a n g e of songs, w i t h the top 100 d o w n l o a d s a c c o u n t i n g f o r j u s t 11% of sales, the c o m p a n y said. T h i s contrasts with C D s i n g l e sales, w h e r e the top 100 C D singles a c c o u n t for 7 7 % o f total C D singles sales. " T h i s indicates that O D 2 ' s legal d o w n l o a d sites are i n t r o d u c i n g m u s i c - l o v e r s to all k i n d s of n e w t y p e s of m u s i c , " said O D 2 chief e x e c u t i v e C h a r l e s G r i m s d a l e . M e a n w h i l e , a report by r e s e a r c h e r s at H a r v a r d and N o r t h Carolina U n i v e r s i t i e s h a s s u g g e s t e d that s w a p p i n g s o n g s online has h a d no n e g a t i v e e f f e c t on m u s i c sales. T h e report said h i g h levels o f f i l e - s w a p p i n g had a n e f f e c t o n C D s a l e s that w a s " i n d i s t i n g u i s h a b l e f r o m z e r o " . T h e research, c o n d u c t e d o v e r 17 w e e k s in 2 0 0 2 , b l a m e d "a r e d u c t i o n in m u s i c v a r i e t y " a n d "a c o n s u m e r b a c k l a s h " for declining sales. T h e study says illicit s o n g - s w a p p i n g a c c o u n t s f o r a "tiny f r a c t i o n " of a 2 0 % dip in m u s i c sales o v e r the last three years.
(1170
characters)
http://news.bbc.co.Uk/l/hi/entertainment/music/3590777.stm
Which is the host (closest to the information covered by the passage) answer to the following questions? I What docs the headline suggest'.' a. In one year about ten times as many songs were illegally downloaded in liurope as in the world globally. b. Downloading music with the help of European file-swapping sites has drastically increased in one year. 2. I low many songs were sold online in 2003? a. The article doesn't exactly say. h. More than one million. 3 Which is/are Europe's biggest music download site/s? a. OD2. b. Frceserve, MSN and Mycokemusic. 4. Which" was the most popular song downloaded online? a. We don't exactly know. b. Outkast's Hey Ya. 5. What does the passage say about file-sharing software services? a. They are poor quality. c. They are illegal but decent. 6. What information can we get if we compare sales with downloading habits? a. 11 percent of the downloaded music makes up 100 percent of the sales. b. Only a minority of people who download certain songs will buy them on CDs or records. 7. Why are CDs different? a. CD sales figures show different preferences than downloading statistics. b. They are mostly sought after. 8. What is OD2? a. It is a site from where we can legally download music by paying for the copyright. b. [t is a company which services several sites offering legal downloading for music fans. 9. What do the researchers at Harvard and North Carolina Universities suggest? a. Their researches have shown them that CD sales are not greatly influenced by the illegal file-sharing practice. b. They have found that CD sales figures haven't been significantly dropping. 10. What arc the research's findings? a. The main reason for the decline in sales figures is the lack of mustc variety. b. Illicit music downloading can be blamed for a major drop in music sales.
20
3. China is tightening controls on online video games. Ii h a s sol up a c e n s o r s h i p c o m m i t t e e to m o n i t o r g a m e s f o l l o w i n g the b a n n i n g of a S w e d i s h g a m e called Hearts of Iron, w h i c h portrayed M a n c h u r i a , Tibet and X i n j i a n g as i n d e p e n d e n t nations. A p r e v i o u s N o r w e g i a n g a m e . Project IGI2: Covert Strike, inccnscd o f f i c i a l s for its portrayal of the C h i n e s e army. T h e c o m m i t t e e is c h a r g e d with b a n n i n g content that " c o u l d threaten national unity". " O n l i n e g a m e s with c o n t e n t t h r e a t e n i n g state security, d a m a g i n g the nation's glory, d i s t u r b i n g social o r d e r a n d i n f r i n g i n g on other's legitimate rights will also be p r o h i b i t e d , " said a C h i n e s e Ministry of Culture s t a t e m e n t carried by the official X i n h u a n e w s agency. In future only the disks of online g a m e s that are a u t h o r i s e d by the M i n i s t r y of C u l t u r e c a n be imported. G a m e s currently in C h i n a m u s t be e x a m i n e d by the c o m m i t t e e b e f o r e I S e p t e m b e r or the g a m e operators will f a c e p u n i s h m e n t , the s t a t e m e n t said. M e m b e r s o f the s c r e e n i n g c o m m i t t e e i n c l u d e teachers, university s c h o l a r s , foreign a f f a i r s o f f i c i a l s , i n f o r m a t i o n industry e n g i n e e r s and m e m b e r s o f t h e N a t i o n a l C o m m i t t e e o f the C h i n e s e People's Political C o n s u l t a t i v e C o n f e r e n c e . T h e r e are in e x c e s s of 140 o n l i n e g a m e s in C h i n e s e m a r k e t s at the c u r r e n t time, with m o r e than 8 0 % of t h o s e foreign. T h e r e are c o n c e r n s a m o n g C h i n e s e o f f i c i a l s that the contents of s u c h g a m e s are too o f t e n related to sex, violence and superstition. S u c h content could a d v e r s e l y a f f e c t y o u n g p e o p l e ' s m e n t a l health, s a i d T u o Z u h a i , a n o f f i c i a l with the M i n i s t r y o f Culture
(1314
characters)
http://news.bbc.co.Uk/l/hi/technology/3766023.stm Which sentence is True? 1. a. According to the headline of this article the control on video games in China hasn't been tight enough so far. b. According to the headline China is considering video games as a tool for tightening controls. 2.
a. The censorship committee banned a Swedish game called Hearts of Iron. b. The censorship committee's task is to check whether online games violate the political ideas of China.
a. The Ministry of Culture stated that video games with a politically adverse content will be banned. b. The Ministry of Culture declared that these video games mean a political threat against China. 4. a. The problem with the Swedish game was that it threatened the national unit)' by handling certain formerly independent territories as separate ones. b. The game "Hearts and Iron" took place in territories which used to be independent.
a. The Ministry of Culture is in charge of the censorship starting from 1st September. b. The censorship involves authorization by the Ministry of Culture. 6.
a. After the 1st September games will not be sold without the authorization from the Mtnistrv of Culture. b. Unless the video sanies are given green light, their operators " •'! -
a. The committees run by ihe Ministry of" Culture mainly include people representing the different educational fields of China. b. Even the political power is represented among those deciding what content "could threaten" the nation. 8.
a. The members of the committee come from the National Committee of the Chinese People's Political Consultative Conference. b. Members of the National Committee of the Chinese People's Political Consultative Conference are represented in this screening committee too. 9. a. The Chinese online game market is mainly based on products manufactured in the far East. b. Only 20% of online games are home products. 10.
a. Chinese officials think superstition-related games may play a negative political influence on the young. b. In Certain Chinese officials' opinion the mental health of the Chinese youth may be harmfully affected by the contents of the online video games produced by foreign firms.
4. A pesky computer virus is taking advantage of the excitement surrounding the latest Harry Potter film. T h e N e t s k y . P w o r m is e n j o y i n g a r e s u r g e n c e by d i s g u i s i n g itself as a P o t t e r g a m e , s a y anti-virus experts. T h e virus, w h i c h f i r s t a p p e a r e d t o w a r d s t h e e n d o f M a r c h , s p r e a d s b y e - m a i l a n d via f i l e - s h a r i n g services. T h e t h i r d f i l m about t h e a d v e n t u r e s o f t h e b o y w i z a r d , H a r r y P o t t e r a n d t h e P r i s o n e r o f A z k a b a n , w a s r e l e a s e d o n Monday, m a k i n g £ 5 m i n o n e day. A c c o r d i n g t o anti-virus f i r m S o p h o s , N e t s k y . P w a s the s e c o n d m o s t c o m m o n virus i n M a y , t o p p e d only b y the i n f a m o u s Sasser w o r m . It n o w s e e m s to be p i c k i n g up s t e a m a g a i n , with S o p h o s s a y i n g it h a d spotted t h o u s a n d s of c o p i e s of it in the last f e w days. Netsky.P, which only a f f e c t s M i c r o s o f t W i n d o w s PCs, relies on tricking a c o m p u t e r user into c l i c k i n g on an i n f e c t e d file. Virus w r i t e r s h a v e i n c r e a s i n g l y u s e d t h e n a m e s of celebrities to try to m a k e p e o p l e o p e n an e - m a i l and unleash its m a l i c i o u s payload. Past c o p i e s o f N e t s k y . P h a v e m a s q u e r a d e d a s n u d e p h o t o s o f B r i t n e y S p e a r s , E m i n e m M P 3 m u s i c f i l e s and illegal software. " E c h o i n g a t e c h n i q u e u s e d in 2 0 0 0 by t h e P i k a c h u w o r m , N e t s k y . P targets y o u n g c o m p u t e r u s e r s by s o m e t i m e s p o s i n g as c o n t e n t c o n n e c t e d w i t h the H a r r y P o t t e r b o o k s a n d m o v i e f r a n c h i s e , " s a i d G r a h a m Cluley, s e n i o r technology consultant at S o p h o s . " P a r e n t s n e e d to e d u c a t e their c h i l d r e n against the threats of viruses, to e n s u r e t h e popularity of P o t t e r doesn't cast a nasty spell o n their c o m p u t e r s y s t e m s . "
(1250
characters)
http://news.bbc.co.Uk/l/hi/technology/3773443.stm
22
Which sentence is closer in meaning to the original reading passage? 1. a. The headline suggests that the more popular the latest Harry Potter film is, the easier it is for the virus to spread all over the world. b. According to the headline this computer virus is attracting so much excitement because it's spreading with the help of the popular Harry Potter film. 2.
a. The virus appeared when the third Harry Potter film was released. b. The virus has been spreading faster since the HP Film was released. 3. a. The virus mainly spreads like most, via e-mails and file-sharing software. b. The virus can spread mainly because it disguises itself as a game.
a. The well-known Sasser worm was the most common virus in May. b. When the film came out, Netsky stepped up to first place. 5. a. Netsky can spread on computers running on operation systems other than MS. b. Sophos confirms that this virus - like most - takes advantage of users opening infected files. 6.
a. A way to make people eager to open suspicious emails is to send it in the name of well-known people. b. People who know celebrities are more exposed to malicious viruses.
a. If a virus was disguised by nude photos of Britney Spears to click open, it would have more chance to spread than MP3 music files. b. Netsky has been able to spread so fast because its creator has found a very effective way of disguising it. 8. a. The technique for effective dissemination used in this virus has never been applied before. b. There doesn't seem to be anything new in the way this virus is spreading among young users. 9. a. Young computer users are attracted to the Harry Potter books so much that they seem to forget all precaution when opening up emails from unknown senders. b. Young computer users are still inexperienced, this is why Netsky.P has been spreading on the net so successfully.
a. Parents must be involved in the war against the threats of viruses. b. The popularity of the Harry Potter books may spoil the pleasures gained from the computer.
5. UK music fans have legally downloaded more than 500,000 songs so far this year, industry figures show. T h e biggest-selling d o w n l o a d of the y e a r to date is C o l d p l a y ' s 2 , 0 0 0 Miles, j u s t a h e a d of O u t K a s t ' s H e y Ya!. T h e half-a-million barrier w a s b r o k e n j u s t a w e e k after the UK launch of Napster, w h o s e s a l e s are not included in the figures. T h e British P h o n o g r a p h i c Industry's ( B P I ) figures also reveal that the cassette s i n g l e has d i e d as a f o r m a t . In the first quarter of 2 0 0 3 , £ 4 1 8 , 0 0 0 w o r t h of cassette singles w e r e sold - b u t there w e r e no s h i p m e n t s in the first three m o n t h s of this year. But the UK m u s i c industry will be b u o y e d by the g r o w t h in legal d o w n l o a d s . T h a t m a r k e t w a s practically non-existent this t i m e last year. BPI c h a i r m a n Peter J a m i e s o n said: "With 5 0 0 , 0 0 0 legal d o w n l o a d s sold already this year, we h a v e hit yet another m i l e s t o n e in the d e v e l o p m e n t of this e x c i t i n g n e w m a r k e t f o r music. "This-is s h a p i n g up to be a b r e a k t h r o u g h y e a r f o r the m u s i c industry." T h e first quarter of 2 0 0 4 also s a w a 4 7 . 8 % rise in the sales of vinyl 7-inch s i n g l e s . B u t C D s i n g l e sales d r o p p e d b y a l m o s t a t h i r d o n t h e s a m e period last year, w h i l e C D a l b u m s a l e s w e r e d o w n a l m o s t 3%. T h e B P I said t h e small d e c l i n e in CD a l b u m sales w o u l d " c o m e as a relief in an industry w h i c h h a s seen double digit declines in some major markets". A l b u m sales account f o r m o r e than 9 0 % o f t h e U K industry's revenue. T h e total v a l u e o f t h e U K m u s i c i n d u s t r y fell 4 . 3 % i n t h e f i r s t three m o n t h s o f 2 0 0 4 c o m p a r e d w i t h t h e s a m e period last year.
(¡258
characters)
http://news.bbc.co.Uk/l/hi/entertainment/music/3769365.stm
Find the answer to the following questions: 1. When were 500.000 songs downloaded legally in the UK? a. In the first few months of 2004. b. In all 2004. 2. How do we know how these songs were downloaded? a. It is just a guess, as the traffic on the Internet cannot be traced. b. Legal downloads can easily be followed by the companies themselves. 3. Which is the most popular song this year? a. Number one is OutKast's Hey Ya. b. We still don't know because the figures refer to the first part of the year. 4. What does the number half a million refer to? a. It is the number of sold copies of the biggest-selling song. b. It refers to the times when the top song was downloaded legally. 5. When did Napster start in the UK? a. We don't exactly know it from the article. b. When OutKast's Hey ya! was launched to the legal file-sharing sites. 6. Why does the passage say that the cassette single is no longer the most wanted item on the music market? a. It compares the sales figures of 2004 to those of last year. b. It gives the sales figures of 2003, which were very high.
24
7. Wlial can the British music industry financially gain in this situation? a. The rise of albums. b. The growth of legal downloading. 8. Why does the BPI chairman think that 2004 may be a breakthrough for the music industry? a. He is sure that the exciting new albums are shaping the market. b. Because legal downloads - opposed to illegal music piracy - may bring more profits. 9. What is the difference between the demand for traditional records and CDs? a. Whereas single records are selling, single CD sales drop drastically. b. Whereas CD albums sales dropped by 3%, record albums are on the rise. 10. What does the BPI say about the British market? a. They think that in the British market, where there have been huge drops recently, the mild decline of the CD album sales must be considered as something positive. b. They know that the decline in the sales of the British music industry has been huge.
6. The smoke alarm has beaten the digital camera, mobile phone and the microwave oven in a survey to find out the British public's top 10 innovations. T h e s a f e t y d e t e c t o r n o w fitted i n all n e w b u i l d i n g s i n t h e U K w a s c o n s i d e r e d t h e t o p g a d g e t b y 7 0 % o f t h o s e asked. T h e first b a t t e r y - o p e r a t e d h o m e s m o k e d e t e c t o r w a s p a t e n t e d i n t h e U S i n 1969 b y R a n d o l p h S m i t h a n d K e n n e t h H o u s e . A l m o s t t w o - t h i r d s o f r e s p o n d e n t s p u t t h e m o b i l e p h o n e i n t h e i r t o p 1 0 innovations. T h e c o n v e n i e n c e o f the m i c r o w a v e o v e n a p p e a l e d t o many, w i n n i n g o v e r h a l f t h e v o t e s . A n d the h u g e g r o w t h i n digital p h o t o g r a p h y i n r e c e n t y e a r s h a s c l e a r l y p l a y e d w e l l f o r t h e c a m e r a w h i c h c a m e f o u r t h i n t h e list. Scientific a n d technological b r e a k t h r o u g h s i n the s h a p e o f D N A t e s t i n g and laser e y e - s u r g e r y c a m e i n f i f t h a n d sixth. G a d g e t s s u c h a s M P 3 players, w h i c h i n o t h e r t e c h p o l l s h a v e p r o v e d popular, c a m e n o w h e r e i n t h e vote. " B y f a v o u r i n g the s m o k e a l a r m , B r i t s h a v e o p t e d f o r a n i n n o v a t i o n that f u l f i l s o n e o f o u r m o s t b a s i c a n d primal n e e d s s a f e t y in the h o m e . " C o n v e n i e n c e w a s also a f a c t o r i n the n a t i o n ' s c h o i c e . T h e m i c r o w a v e o v e n , cash a n d debit c a r d s a n d l o n g - l i f e light b u l b s w e r e all labour-saving d e v i c e s that m a d e it i n t o the t o p 10. W h e n asked w h a t p e o p l e w o u l d like to s e e f r o m f u t u r e i n n o v a t i o n s , a third v o t e d for a w a s h i n g m a c h i n e that w a s h e d , dried and ironed clothes. O n e in five o p t e d for a w e i g h t loss drink a n d o n e in 10 w a n t e d to cut out the hassles of c o m m u t i n g w i t h a t i m e capsule to e n s u r e a s p e e d y route to w o r k . " T h e s e c h o i c e s d e m o n s t r a t e that p e o p l e i n t h e U K a r e m o r e i n t e r e s t e d i n practical, e v e r y d a y i n n o v a t i o n than revolutionary dreams."
(1420
characters)
http://news.bbc.co.Uk/l/hi/technology/3770559.stm Which sentence is closer to the article: 1. a. The British buy more digital cameras and mobile phones than smoke alarms. b. Most people agree that the smoke alarm is a more important innovation than the digital camera or the mobile phone. 2.
a. Seven people out o f t e n surveyed in the UK think that the smoke alarm is a top gadget. b. Among those who were asked in a questionnaire, about 3% think that the digital camera is more important than the smoke alarm.
a. Many Britons put the microwave oven among the first 10 innovations. b. The digital camera's position didn't really reflect the importance of digital photography in our life. 4.
a. The medical applications of high tech inventions were well represented in the respondents' evaluation. b. DNA testing was given a high position although laser eye surgery was found more important. 5. a. Interestingly enough, the results of this poll differ in certain aspects such as the place of MP3 players. b. In all surveys MP3 players show how popular they are in our everyday life. 6.
a. The high position of the smoke alarm shows how important our convenience proves to be. b. The Brits have given their vote to the smoke alarm because they are getting more conscious of safety hazards. 7. a. The top 10 high tech inventions show that people are most interested in the labour saving devices, b Long life light bulbs belong to a different category. 8.
a. Most people's future expectation of high tech devices includes even more convenient labour saving devices. b. Every third person among the respondents expect that in the future the high tech inventions should take even more load off the household duties. 9. a. The answers show that even in the UK many people are worried about their weight. b. Some people are dreaming of speedy vehicles so that their commuting time could be reduced drastically. 10.
a. The Brits are not very practical people. b. The Brits think that down to earth innovations can improve their quality of life.
7. Online newspapers tempt readers The n u m b e r of n e w s p a p e r w e b s i t e s a r o u n d the w o r l d has d o u b l e d s i n c e 1999, a s t u d y has found. There has b e e n a t r e m e n d o u s b o o m in the c o n s u m p t i o n of o n l i n e editions. Timothy Balding, director g e n e r a l of World A s s o c i a t i o n of N e w s p a p e r s said w e b a u d i e n c e s for n e w s p a p e r s have g r o w n by 3 5 0 % o v e r the last five y e a r s . He was a d d r e s s i n g editors a n d executives f r o m h u n d r e d s of n e w s p a p e r s w h o are m e e t i n g for the society's annual c o n g r e s s in Istanbul this w e e k . file past y e a r was a c h a l l e n g i n g o n e for the world's n e w s p a p e r s , said Mr Balding. Total global circulation w a s d o w n slightly f o r the year in the 208 c o u n t r i e s s u r v e y e d by the Paris-based association, which represents 18,000 n e w s p a p e r s . But over the last five years, n e w s p a p e r sales w o r l d w i d e went up by 4 . 7 5 % . Well over o n e billion p e o p l e n o w read a n e w s p a p e r e v e r y day. Europeans are b u y i n g f e w e r n e w s p a p e r s . Circulation fell in 13 of the 15 " o l d " E u r o p e a n Union countries, e x c l u d i n g the new m e m b e r s w h o j o i n e d in M a y . T h e biggest d r o p was in Ireland, f o l l o w e d by the UK
Hul although sales h a v e d e c l i n e d in m a n y m a t u r e markets, s o m e d e v e l o p i n g m a r k e t s arc still strong. N e w s p a p e r s a l e s w e i e up by o v e r 4% in C h i n a , the world's biggest market, and by an impressive 9% in India. China has the largest lotal d a i l y circulation of any country in the world, with m o r e lhan 85 million c o p i e s sold, f o l l o w e d by India, Japan and the U S A . In Russia, the n u m b e r of dailies published has a l m o s t doubled in Iwo years. The g r o w t h in n e w free c o m m u t e r dailies is also e x p a n d i n g the reach of the written press to a y o u n g e r generation, said the association's T i m o t h y B a l d i n g . T h e n u m b e r of free dailies has sliol up, with a 16% increase in 2 0 0 3 f r o m a year earlier, and a 2 4 % increase in the past five y e a r s in c o u n t r i e s for w h i c h data exists.
(1157 characters) http://news.bbc.co.Uk/l/hi/technology/3767267.stm
Which is closer to the article? I. a. The number of newspapers is increasing drastically all over the world. b. There is an increasing number of online newspapers accessible on the Internet. c. Both a. and b.
a. Timothy Balding is a director general, who was talking about the increasing number of online newspapers to the audience of the World Association of Newspapers' annual congress. b. The World Association of Newspapers has had its meetings once a year for the past 5 years. c. Neither a. nor b. 3. a. The World Association of Newspapers is based in Istanbul, where it annually holds its meetings. b. The Association is based in Paris and represents 18,000 online papers. c. Neither a. nor b. 4. a. The problem in the past year was that although the circulation of online newspapers increased, the demand for traditional papers slightly decreased. b. The problem last year was that all the 18.000 newspapers represented by the Association had a slight drop in the circulation numbers. c. Both a. and b. 5. a. The ligures showing the drop in circulation numbers still don't represent the 10 new EU member states. b. The Irish seem to spend the least money on newspapers among the "old" EU member states. c. Neither a. nor b. 6.
a. The tendency for circulation numbers to decline seems to be global. b. People buy the greatest number of newspapers in India. c. Neither a. nor b.
7.
a. In China more than 85 papers are sold each day. b. People buy fewer daily papers in India than in China. c. Both a. and b. 8. a. Russian people buy much more daily papers today than two years ago. b. One year ago the number of Russian daily papers was three quarters of what is published today. c. Neither a. nor b. 9. a. There is a rise in the number of free commuter dailies because editors wish to reach the younger generations. b. The article suggests that the younger generation doesn't actually spend money on traditional papers. c. Both a. and b. 10.
a. In the past 5 years there has been a steady and gradual increase in the number of free dailies. b. We don't have updated global data regarding the increase of the number of free dailies. c. Both a. and b.
8. Virtual real estate boom draws real dollars Rising interest rates h a v e yet to cool white-hot real estate prices. Perhaps that's w h y the c o n c e p t of virtual h o m e ownership has c a p t u r e d the imagination o f a g r o w i n g n u m b e r o f o n l i n e g a m e r s , w h o are p l u n k i n g d o w n r e a l cash f o r their o w n slice of the digital frontier. L a r g e s w a t h e s of u n d e v e l o p e d o n l i n e property, s o m e b e a r i n g an u n c a n n y r e s e m b l a n c e to a p a l m - s t u d d e d West Coast b e a c h f r o n t idyll, a r e selling for u p t o $ 5 5 0 a n acre. T h a t a m o u n t is but a s o n g c o m p a r e d w i t h real w o r l d real estate, but t h e s e are c o m p u t e r i z e d r e p r e s e n t a t i o n s of p r o p e r t y - p r e t t y pictures, if y o u will - in an o n l i n e g r a p h i c r o l e - p l a y i n g g a m e k n o w n as " S e c o n d L i f e . " " T h e idea o f land o w n e r s h i p and t h e e a s e w i t h w h i c h y o u can o w n land a n d d o s o m e t h i n g w i t h i t . . . i s intoxicating," said Philip R o s e d a l e , C E O o f " S e c o n d L i f e " creator, San F r a n c i s c o - b a s e d L i n d e n Labs. " S e c o n d L i f e " is a relatively n e w entry i n t o the w o r l d o f M a s s i v e l y M u l t i p l a y e r O n l i n e g a m e s , k n o w n to enthusiasts as M M O s . Like S o n y Corp.'s " E v e r Q u e s t O n l i n e , " p l a y e r s c r e a t e their o w n civilizations a n d interact with others living alternative lives online. Starting a " s e c o n d l i f e " costs $ 9 . 9 5 a m o n t h a n d requires a d o w n l o a d at the g a m e ' s W e b site a n d a fairly p o w e r f u l M a c o r W i n d o w s - b a s e d c o m p u t e r . C u r r e n t p l a y e r s arrange w e l c o m i n g parties f o r n e w b i e s a n d o f t e n h e l p point t h e m toward plots available for virtual h o m e s t e a d i n g . T h e " S e c o n d L i f e " w o r l d is a little o v e r a y e a r old, b u t in its accelerated e c o s y s t e m , w h e r e p l a y e r s fly and don't w a s t e time eating or g o i n g to t h e b a t h r o o m , a c o m m e r c i a l s o c i e t y h a s quickly e m e r g e d - c o m p l e t e w i t h stores, artisans, charities a n d social c l u b s . . .
(1440 characters) http://www.cnn.com/2004/TECH/fun.games/06/03/column.livewire.reut/index.html
Find the best answer/s to the following questions: 1. What do we know about real estate prices? a. They are very high. b. They have decreased due to rising interest rates. c. Both a. and b. 2. Why has the concept of virtual home ownership become so fashionable? a. The interest rates are growing. til.
b. The real estate prices are very high. c. Both a. and b. 3. What kind of online gamers does the article refer to? a. They are people willing to invest in virtual real estate. b. They are people who are paying with virtual cash for virtual real estates. c. Neither a. nor b. 4. What is the price for these online properties? a. They can be around 550 dollars. b. The price depends on how big the estate is. c. Both a. and b. 5. What are these properties like? a. Some of them look like a nice real estate similar to those on the West Coast. b. They very much look like an idyllic place with palm trees. c. Both a. and b. 6. What is "Second Life"? a. It is an online game for people who want to play a role. b. It is the name of the virtual real estate agency selling online properties. c. Neither a. nor b. 7. What docs Philip Rosedale think about Second Life? a. He thinks that Second Life can be poisonous. b. He says that with the help of Second Life one can easily become a landowner. c. Neither a. nor b. 8. What is MMO? a. It is the abbreviation of online games attracting huge numbers of players on the Internet. b. It is the name for players enthusiastic about online games. c. Both a. and b. 9. What costs 9.95 dollars a month? a. It is the subscription fee for joining the group of MMOs. b. It is the fee for becoming an online player on the Internet. c. Neither a. nor b. 10. What is the Second Life world like? a. It is an online ecosystem with many virtual institutions of the real society. b. It is a virtual place where gamers can live a fantasy life without worrying about the real problems of existence. c. Both a. and b.
9. Study: Web porn entices far more surfers than search O n l i n e p o r n sites g e t a b o u t t h r e e t i m e s m o r e visits t h a n t h e t o p W e b s e a r c h e n g i n e s , i n c l u d i n g m a r k e t l e a d e r Google, a r e s e a r c h f i r m said T h u r s d a y . Visits to the top three W e b search e n g i n e s - which virtually d o m i n a t e their sector - a c c o u n t e d for 5 . 5 % of all Internet visits by U.S. users. D u r i n g s a m p l i n g lime, G o o g l e g a r n e r e d 2 . 7 % of all W e b visits while Yahoo Search and M S N S e a r c h received 1.7% and 1.1% respectively. T h e three leading s e a r c h p r o v i d e r s fall into a s u b c a t e g o r y H i t w i s e calls 'Search Engines and Directories,' w h i c h covers 1,944 W e b search a n d directory sites. T h e subcategory, w h i c h a c c o u n t e d for 13.8% of all Internet visits, also includes A s k J e e v e s . c o m , Y a h o o . c o m and M i c r o s o f t ' s M S N . c o m . 'Search E n g i n e s a n d Directories,' a l o n g with the 'Email Services,' 'Net C o m m u n i t i e s and Chat,' ' S o f t w a r e ' a n d o t h e r subcategories, m a k e up Hitwise's ' C o m p u t e r s and Internet' category that pulled in almost o n e - t h i r d of all visits. Other large H i t w i s e categories i n c l u d e 'Adult' at 18.8%, 'Entertainment' at 8.0%, 'Business a n d F i n a n c e ' at 7 . 4 % and ' S h o p p i n g and C l a s s i f i e d s ' at 7 % . In a s e p a r a t e r e p o r t p u b l i s h e d late last m o n t h , H i t w i s e s a i d that b e t w e e n A u g u s t and April, G o o g l e r e m a i n e d the m o s t visited search site and w a s alone a m o n g the three sector players in g a i n i n g market share within its subcategory. H i t w i s e also f o u n d that f a s t - g r o w i n g c o m p a r i s o n s h o p p i n g sites such a s S h o p p i n g . c o m , N e x T a g a n d B i z r a t e are getting fewer referrals f r o m W e b search p r o v i d e r s . T h e s a m e a p p e a r s to be true f o r t o p travel sites.
(/ 340 characters) http://www.usatoday.com/techAvebguide/internetlife/2004-06-03-popular-porn_x.htm
Which ending is closer to the original article? 1. The headline of the article suggests that a. porn sites are more popular than search engines. b. more surfers visit porn sites than use the different search functions c. Both a. and b. 2. Google is said a. to belong to the leading search engines of the Internet. b. to be visited three times less often than the online porn sites. c. Both a. and b. 3. The article gives figures a. about the visits by the American Internet users. b. about how many American users visit the different American search engines. c. Neither a. nor b. 4. Search Engines and Directories a. is the name for the three leading search providers. b. include a great number of search and directory sites. c. Both a. and b. 5. Yahoo.com a. is different from Yahoo Search because one is the name of the provider and the other is a portal. b. is the same as Yahoo Search. c. Neither a. nor b.
30
6. 'Computers and Internet' a. is the category into which different subcategories like Email Services and others fall. b. is similar to Net Communities or Software in the fact that they all belong to a larger category. c. Both a. and b. 7. Mitwise must be a. the name of a research firm. b. the firm that has categorized the portals according to the number of visitors. c. Both a. and b. 8. The 'Adult' subcategory, which has got 18.8%, a. must refer to its content. b. is visited by more people than 'Business and Finance' and 'Shopping and Classifieds' together. c. Both a. and b. 9. The research found that a. Google was the only search site that could grow its market share. b. both Yahoo Search and MSN Search have gained less market share than Google. c. Both a. and b. 10. Top travel sites seem a. to be gaining popularity by the Web search providers. b. to be losing their popularity among surfers. c. Neither a. nor b.
10. 'Toxic dust' on computers linked to diseases S A N F R A N C I S C O - "Toxic d u s t " f o u n d on c o m p u t e r p r o c e s s o r s a n d m o n i t o r s c o n t a i n s c h e m i c a l s linked to reproductive and neurological disorders, a c c o r d i n g to a n e w s t u d y by several e n v i r o n m e n t a l g r o u p s . The survey, released T h u r s d a y by Silicon Valley Toxics Coalition, C o m p u t e r T a k e B a c k C a m p a i g n and Clean Production Action, is a m o n g the first to identify b r o m i n a t e d f l a m e rctardants on t h e s u r f a c e s of c o m m o n d e v i c e s in h o m e s and offices. Electronics c o m p a n i e s b e g a n u s i n g p o l y b r o m i n a t e d diphenyl ( P B D E s ) a n d o t h e r f l a m e retardants in the 1970s, arguing that the toxins p r e v e n t fires and c a n n o t e s c a p e f r o m plastic casings. "This will be a great s u r p r i s e to e v e r y o n e w h o uses a c o m p u t e r , " said Ted S m i t h , director of the Toxics Coalition. "The chemical industry is s u b j e c t i n g us all to w h a t a m o u n t s to c h e m i c a l trespass by p u t t i n g t h e s e s u b s t a n c e s into use in c o m m e r c e . T h e y c o n t i n u e to use their c h e m i c a l s in w a y s that are a f f e c t i n g h u m a n s a n d o t h e r species." Researchers collected s a m p l e s of dust f r o m d o z e n s of c o m p u t e r s in eight states, i n c l u d i n g university c o m p u t e r labs in N e w York, M i c h i g a n a n d Texas, legislative o f f i c e s in C a l i f o r n i a , a n d an i n t e r a c t i v e c o m p u t e r display at a children's m u s e u m i n M a i n e . T h e y tested for three t y p e s o f b r o m i n a t e d f l a m e retardants s u s p e c t e d t o b e h a z a r d o u s . Penta- and o c t a - b r o m i n a t e d d i p h e n y l will be taken o f f the m a r k e t by the end of the year. E n v i r o n m e n t a l g r o u p s are d e m a n d i n g legislation that w o u l d b a n d e c a - b r o m i n a t e d d i p h e n y l , too.
(1290 characters) littp://\vww.usatoday.coin/tech/news/2004-06-03-toxic-computer-dust_x.htm
W hich sfatcmcnl is closer (o (he article in meaning? a. Computers seem to be collecting toxic dust. b. The dust on computers seem to be loxic as it may cause different disorders.
a. Environmental groups have conducted different surveys to find out the toxic content oI dust collected from common devices. b. The survey, conducted by different environmental groups wanted to study how toxic dust influences the human reproductive organs. 3. a. The amount of dust collected on these devices has been increasing ever since companies started using polybrominted diphenyl. b. The dust collected on these devices had not been toxic until firms started to use polybrominatc diphenyl 011 their surfaces. 4. a. I'BDEs are used on these surfaces because they make our deviccs less flammable. b. PBDEs are not toxic because they stay closed in the casings of our dcviccs.
a. Ted Smith, the director of the Toxics Coalition thinks that we are tn danger due to being subjected to toxic chemicals used on our devices. b. Ted Smith, the director of the Toxics Coalition thinks that the chemical industry is trespassing the commercial law. 6.
a. In Ted Smith' opinion most people have already been aware of the dangers their computers expose them to. b. According to Ted Smith people will be surprised if they hear about the dangers their computers mean to their health.
a. The different environmental groups state that the products manufactured by the chemical industry threaten the life of humans and other species. b. The use of different chemical substances may have a lasting effect on both humans and other species. 8. a. The research covered different computers and one monitor. b. The researchers wanted to find out whether common monitors or interactive displays are more hazardous. 9. a. The scientists conducting the survey tested all the different types of chemicals suspccted to be toxic b. The scientists examined the dust collected from computers covered by three types of polybrominatc diphenyl. 10.
a. The research has reached its aim: toxic substanccs have been banned from the devices. b. The environmentalists still have a lot to do in this issue.
II. I'.mploytT accuscd of selling stolen cell phones online •\ l i m n e r ccltuNu p h o n e c o m p a n y e m p l o y e e is f a c i n g c o m p u l c r f r a u d and theft c h a r g e s tor allegedly selling .stolen f e l l p h o n e s on an Inlcrncl auction silc. I'aul Richard C o o k , 30. of N e w Llano, w a s arrested T u e s d a y on 29 c o u n t s of c o m p u l c r fraud and o n e count of theft a c c o r d i n g to 1.1 C r a i g Stansbury. public i n f o r m a t i o n ollicei tor L a f a y e t t e Parish S h e r i f f s O f f i c e Cook had b e e n an e m p l o y e e o f C i n g u l a r Wireless in Lafayette w h e n lie allegedly stole S 5 0 0 worth of p h o n e s from the c o m p a n y , S t a n s b u r y said. S t a n s b u r y said C o o k then sold the stolen p h o n e s oil eBay, C o o k also d e l r a u d c d s o m e w o u l d - b e buyers on eBay, failing to ship the p h o n e s after he had received m o n e y , he said. S o m e of the v i c t i m s w e r e f r o m the area, S t a n s b u r y said, f t e said he had seen an increase in f r a u d u l e n t transactions ovet the Internet recently, and usually, the v i c t i m s w e r e out of luck b e c a u s e the perpetrator lived across s t a t e or international lines, " A n y t i m e you deal with e B a y or an Internet b u y i n g site, it's h a r d to track the perpetrator d o w n if y o u ' r e the victim of a crime." Stansbury said he believed C o o k m i g h t h a v e s t a l l e d his s c a m late last year. C o o k o n l y f a c e s o n e c o u n t of theft b e c a u s e the m e r c h a n d i s e all c a m e f r o m Cingular. S t a n s b u r y said he b e l i e v e d the p h o n e s could h a v e b e e n stolen all at once l ie said C o o k stole m o r e than S13.000 f r o m C i n g u l a r and u n s u s p e c t i n g buyers. C o o k is b e i n g held 011 $ 8 2 , 0 0 0 b o n d , with each count of f r a u d a c c o u n t i n g for a $ 2 , 5 0 0 b o n d .
(1characters) http://\\\v\v.iisatoday.com/tcchAvirelcss/phoncs/2004-06-04-stolen-mobile-pliones_x.htm?I>()F.='ir.CIS\A
Finish the sentence! 1. An ex employee of a mobile phone company a. has tried to sell his firm's products on the Internet. b. has joined an online auction site to sell cell phones online. 2. The company employee, Paul Richard Cook a. was accuscd of stealing 29 computers. b. was charged with theft and computer fraud. 3. Cook stole a. 500 cell phones worth 500 dollars each. b. the mobile phones in order to sell them online. 4. eBay seems to be a. an Internet portal for e-commerce. b. the portal for Cook's company where they run their c trading activities. 5. Cook not only stole cell phones and traded them online but he a. used his company's portal for his illegal trading business. b. was even unfair to his virtual customers. 6. Mr. Stansbury, the public information officer of Cook's company a. thinks that these illegal transactions are 011 the rise because the victims arc out of luck. b. has said that it is easier to carry out illegal online transactions because the victims live far from where the fraudulent traders are. 7. If you arc the victim of an Internet crime, a. you should turn to eBay or other Internet buying sites. b. your situation is difficult because it is very hard to find online criminals.
S. Cook is believed to have been carrying out these illegal transactions a for less than a year, b. for more than a year. 9. Cook probably stole the cell phones a. on a regular basis. b. from his own company called Cingular. 10. The value of cell phones Cook has stolen from his company and buyers a. surpasses 13 thousand dollars. b. amounts up to 82 thousand dollars.
12. Two indicted for selling military cameras to China Two Silicon Valley b u s i n e s s m e n h a v e b e e n indicted after prosecutors said they s h i p p e d sensitive military c a m e r a s to China. A federal grand jury in San Jose indicted Philip C h e n g and Martin Shih on Wednesday on nine counts of m o n e y laundenng, violating export c o d e and o t h e r crimes. T h e m e n , arrested in M a y after allegedly s h i p p i n g n i g h t vision c a m e r a s to a research institute linked to the C h i n e s e military, f a c e at least 45 years in prison a n d fines of up to $2 million each. T h e i n d i c t m e n t s c o m e a m i d a b r o a d c r a c k d o w n b y the D e p a r t m e n t o f H o m e l a n d Security, w h i c h h a s increased scrutiny over exports since the 2 0 0 1 terrorist attacks. T h e a g e n c y ' s investigative a r m , I m m i g r a t i o n a n d C u s t o m s E n f o r c e m e n t (ICE), is p r o s e c u t i n g at least five similar cases against p e o p l e w h o a l l e g e d l y s h i p p e d m i l i t a r y e q u i p m e n t - f r o m missile c o m p o n e n t s to m i c r o c h i p s - to China. "Last m o n t h alone, o u r a g e n t s u n c o v e r e d t w o s e p a r a t e plots t o s m u g g l e satellite a n d military h e l i c o p t e r c o m p o n e n t s t o C h i n a , " said M i c h a e l G a r c i a , assistant s e c r e t a r y for I C E . " T h o s e seeking to illegally a c q u i r e A m e r i c a ' s military technology s h o u l d b e o n n o t i c e . " P r o s e c u t o r s i n N e w H a v e n , C o n n . , u n s e a l e d a n indictment i n M a y charging t w o S o u t h K o r e a n n a t i o n a l s with exporting military helicopter e n g i n e s to C h i n a . A l s o last m o n t h , I C E a g e n t s in Los A n g e l e s arrested t w o b u s i n e s s m e n on charges of c o n s p i r i n g to p u r c h a s e U . S . d e f e n c e articles, i n c l u d i n g satellite technology, for export to C h i n a .
(1300 characters) http://www.usatoday.com/tech/world/2004-06-04-china-cams_x.htm?POE=TECISVA
Which answer is closer to the article? 1. What were the two Silicon Valley businessmen accused of? a. They sold merchandise that was on the list of goods banned from being imported to China. b. They violated the American export code by exporting military cameras to China. c. Both a. and b. 2. How many times did they ship the cameras to China? a. They did it nine times. b. We don't know the exact number. c. Neither a. nor b. 3. What sentence did the federal grand jury bring? a. The sentence consists of two parts: one is imprisonment and the other is a financial punishment. b. The businessmen will spend the rest of their life in prison. c. Neither a. nor b.
34
4. Why is Ihc sentence so severe? a. Because the camcras were shipped for the Chinese army. b. Because due to the growing number of terrorist attacks the Department of Homeland Security has increased security steps. c. Both a. and b. 5. What is ICE'.' a It is the abbreviation for the Department of Homeland Security. b. It is the short form for a regional agency investigating customs enforcements. c. Neither a. nor b. 6. What is ICE's main field of activity? a. To investigate the violation of export code. b. To investigate whether military equipment is shipped to China. c. Both a. and b. 7. What shows that the agency is effective? a. Each month ICE uncovers several plots in which satellite and military equipment is smuggled to China. b. ICE is successfully uncovering different plots that try to illegally acquire America's military technology. c. Both a. and b. 8. What happened last month? a. Two separate plots were organized to smuggle high tech military products to China. b. ICE caught some agents trying to smuggle military products to China. c. Neither a. nor b. 9. What products seem to be on the list of articles banned from export to China? a. Satellite and military helicopters and components as well as military cameras. b. A wide range of articles. Only some of them have been mentioned in the article. c. Both a. and b. 10. Why did ICE agents arrest two businessmen in Los Angeles? a. They tried to buy satellite technology articles for China. b. They had been carrying out export activities with China. c. Neither a. nor b. 13. Iraq seeks '.IQ' domain to make its mark on Net Iraq is m a k i n g its first claim for an internationally r e c o g n i z e d p r e s e n c e on the Internet. Iraq's m e d i a c o m m i s s i o n and the U . S . - l e d a d m i n i s t r a t i o n in Iraq w a n t to set up W e b a d d r e s s e s u s i n g the d o m a i n c o d e " . I Q " as the final tag. That w o u l d m e a n a d d r e s s e s f o r Web p a g e s w o u l d be distinctively identified on the Internet with Iraq's o w n c o u n t r y code. T h e Iraqi c h a i r m a n of the National C o m m u n i c a t i o n s & M e d i a C o m m i s s i o n , S i y a m e n d O t h m a n , said the .IQ d o m a i n n a m e w o u l d allow Iraqis to stake a "virtual flag" in the w o r l d w i d e Internet community. It is "an important tangible and symbolic m i l e s t o n e f o r this nation, as well as the f r e e d o m a n d h o p e s of the Iraqi p e o p l e , " he w r o t e in a letter d a t e d M a y 20 to the Internet C o r p o r a t i o n for A s s i g n e d N a m e s and N u m b e r s ( I C A N N ) . A l t h o u g h Internet c a f e s are p o p p i n g u p t h r o u g h o u t B a g h d a d , f e w p e o p l e qj^n c o m p u t e r s , a n d e v e n f e w e r have regular a c c e s s to the Internet. A recent s u r v e y cited by t h e U . S . - l e d administration in Iraq f o u n d that about 6% of Iraqis say they h a v e access to the Internet but f e w e r than 2% use it regularly. A b o u t 12% of t h e p o p u l a t i o n r e p o r t s h a v i n g a computer. Iraqi o f f i c i a l s say the rebuilding of Iraq has b e e n h a m p e r e d by p o o r national c o m m u n i c a t i o n s . B e f o r e the war, a n Internet c o m m u n i t y h a d b e g u n t o e m e r g e u n d e r the r e g i m e ' s State C o m p a n y f o r Internet Services, f o u n d e d in 2001.
I lie Stale C o m p a n y is n o w ihc m a i n national Internet service provider. t h e U.S.-run administration in Iraq s a y s it has begun to create electronic c o n n e c t i o n s b e t w e e n various g o v e r n m e n t b u r e a u s and to m a k e the Internet m o r e a c c e s s i b l e to the private sector. (IMill
cluirnrlcrx)
li ttp://www. iisatoday.com/tccli/iiews/2004-06-03-iraq net_x.htm
Decide which is the best ending to the following sentences: 1. Iraq is trying a. to introduce its portals on the Internet. b. to show its political existence by using its special domain name ending. 2. The new domain names with the tag "IQ" a. have been established by the US led administration in Iraq. b. are going to be introduced as a joint action by some Iraqi office and the American administration. 3. The new domain code a. will show clearly that the portal the surfer is using belongs to the Iraqi National Communications and Media Commission. b. will help to clearly identify the Iraqi portals. 4. Siyamend Othman thinks that a. the new domain name is like a flag. b. the new tag symbolizes the beginning of freedom for the Iraqi people. 5. ICANN is a. an international association which decides on new Internet addresses and tags. b. a virtual society that operates on the Internet. 6. As far as the Internet and computers are concerned a. even in the capital the Iraqi people are still very much behind. b. in Baghdad the situation is not so bad as people can use the Internet cafes. 7. There is a recent survey about Internet access in Iraq, which a. has been can ted out by the American administration. b. shows that even those who have access to the Internet don't use it regularly. 8. In the Iraqi officials' opinion a. the reconstruction of the country has been delayed by the lack of computers and Internet access. b. to rebuild the country will take longer as people cannot access updated information. 9 Before the war a. the situation in the field of Internet application was completely different. b. more and more Iraqi people started to use the Internet services. 10. After the war a. the US run administration is trying to expand the Internet service to the private companies as well. b. the US inn administration, together with the State Company for Internet Services, is doing its best to provide an efficient Internet service both to the private and the state sectors.
14. Flash memory boom heralds new wave ol'gadgets l AII'IM • I'Voiu m o b i l e p h o n e s lo video c a m e r a s , gadget m a k e r s aie c o n j u r i n g up n e w p r o d u c l s to take a d v a n t a g e of chcapci Mash m i c r o c h i p s with bigger m e m o r i e s I'lic chips ate aticady uliujuilou.s, at [lie heart of the m e m o r y c a r d s used in digital c a m e r a s anil key-sized d r i v e s that plug into a c o m p u t e r ' s U S B drive. Hut a icccnl slide in p r i c e s a n d increase in m e m o r y capacities is g i v i n g a f u r t h e r b o o s t to sales of Hash-based p i o d u c t s and e n c o u r a g i n g m a n u f a c t u r e r s to c o m e up with new applications. T h e s h i f t s herald a l o n g e r - t e r m trend that could eventually spell the d e m i s e of s t o r a g e m e d i a s u c h as c o m p a c t disks and even D V D s , and p r o m i s e e v e n fatter p r o f i t s for flash chip m a k e r s S a m s u n g and T o s h i b a . At the C o m p u l c x c o m p u t e r s h o w this w e e k in Taiwan, K i n g B y l e I n f o r m a t i o n w a s c r o w i n g a b o u t b o o m i n g d e m a n d for us M u s i c D r i v c . a d e v i c e the size of a lipstick that stores data and plays back m u s i c . Vice m a n a g e r of sales Luisa S a m said the w h o l e s a l e price for a 5 1 2 m e g a b y t e ( M B ) M u s i c D r i v e . which can hold about eight hours of m u s i c , had d r o p p e d lo S98 f r o m S135 in early 2004. ''At the beginning of t h e year, we w e r e s h i p p i n g j u s t 3 , 0 0 0 M u s i c D r i v e s a m o n t h b e c a u s e the pricc was very h i g h . " she said. " N o w we are s h i p p i n g about 10,000 a m o n t h . ' Sam said M u s i c D r i v e s can c o m e with up to 16 g i g a b y t e s of m e m o r y , e n o u g h f o r m o r e than five d a y s of m u s i c , albeit at a h e f l y price lag of 5 2 , 0 0 0 . " W e h a v e special c u s t o m e r s with U.S. military applications, w h o h a v e o r d e r e d this m o d e l , " s h e said, declining t o n a m e the buyers.
(1300 characters) http://www.usatoday.com/tech/tcchinvestor/2004-06-03-flash-boom-ahead_x.htm
Which sentence is correct? 1. a. With the growth of memory capacities the range of high tech gadgets is growing. b. The larger memory capacities are, the smarter high tech gadgets become. c. Both a. and b. 2.
a. Flash microchips are the heart of our smart devices. b. Flash microchips can be found in the different memory cards. c. Both a. and b. 3. a. Some of the drives we use with our computers have shrunk into a size as small as a key. b. These very small drives (unlike the normal size) plug into the computer's USB drive. c. Neither a. nor b. 4. a. Although memory capacities arc growing rapidly, the prices of these gadgets are dropping at a slower pacc. b. The growth of memory capacities induce manufacturers to produce more and more flash based devices. c. Both a. and b. 5. a. This fast rise in the number of flash based devices is similar to what happened to compact disks and DVDs. b. This growth in the flash based applications may dramatically reduce demand !'• -' ' ' c. Both a. and b.
6.
a. One ol" the typical applications of flash technology is MusicDrivc, a product of KingByte Information. b. MusicDrive is a flash technology based gadget. c Both a. and b. 7. a. Luisa Sam, the vice manager of sales at Samsung said she expected a drastic drop in price in the music gadget market. b. The vice manager of sales said their product, MusicDrive, could be bought at 98 dollars in early 2004. c. Neither a. nor b. 8.
a. The sales manager at KingByte Information explains their good sales figures by the fact that the price has recently fallen considerably. b. The annual sales figures of MusicDrives have tripled in 2004. c. Neither a. nor b. 9. a. Sam thinks that the price of 2000 dollars for a music device with 16 gigabytes of memory is lower than it was at the beginning of the year. b. The sales manager at KingByte Information is sure that the music devices based on flash memory can reach a capacity of 16 gigabytes of memory in the near future. c. Neither a. nor b. 10.
a. Many people have been ordering music devices with a huge memory capacity at a low price. b. Sam has named some of their most important customers who are greatly interested in their product. c. Neither a. nor b.
15. McDonald's, Sony to offer free song downloads C H I C A G O ( R e u t e r s ) - M c D o n a l d ' s ( M C D ) and S o n y ( S N E ) are t e a m i n g u p t o g i v e a w a y f r e e m u s i c d o w n l o a d s , a s the f a s t - f o o d c o m p a n y looks b e y o n d its l o n g - s t a n d i n g partnership with Walt Disney Co. ( D I S ) a n d g o e s after y o u n g adults. M c D o n a l d ' s will l a u n c h a U . S . p r o m o t i o n on J u n e 8 o f f e r i n g c u s t o m e r s w h o b u y a Big M a c Extra Value m e a l an access c o d e worth o n e f r e e s o n g d o w n l o a d a t S o n y ' s C o n n e c t m u s i c store. T h e so-called Big M a c Meal Tracks p r o m o t i o n , which will run f o r s i x to 10 w e e k s , will later e x p a n d to E u r o p e , M c D o n a l d ' s said. A n a l y s t s s a i d t h e a l l i a n c e , a n n o u n c e d T h u r s d a y at a L o s A n g e l e s n e w s c o n f e r e n c e , could be another w a y for M c D o n a l d ' s to tap in to p o p c u l t u r e that a p p e a l s to a h i p a u d i e n c e a n d m o v e b e y o n d m o v i e tie-ins with Disney, k n o w n for their appeal to y o u n g e r children. Since S e p t e m b e r , M c D o n a l d ' s h a s b e e n t r y i n g to revitalize its i m a g e w i t h y o u n g adults. Its "I'm Lovin' It" global ad c a m p a i g n , for e x a m p l e , i n c o r p o r a t e s h i p - h o p m u s i c a n d n o n - r e s t a u r a n t v e n u e s in television c o m m e r c i a l s that attempt to position M c D o n a l d ' s as a lifestyle c o m p a n y a n d n o t strictly a p u r v e y o r of fast food. "1 think M c D o n a l d ' s is trying to e s c a p e w h a t I call the k i d d y l a n d b o x , " said Jack Trout, a m a r k e t i n g consultant w h o heads C o n n e c t i c u t - b a s e d Trout & P a r t n e r s . "I think D i s n e y u n d e r m i n e s their strategy for m o v i n g to the older set." " T h e y ( M c D o n a l d ' s ) n e e d to f i n d m a r k e t i n g p a r t n e r s that appeal to that," he said.
(1230
characters)
http://www.usatoday.com/tech/news/2004-06-03-mcdonalds_x.htm
38
Answer the following questions with the most appropriate sentence! 1. Why arc McDonald's and Sony teaming up? a. McDonald's has decidcd to break off its partnership with Walt Disney. b. McDonald's is opening up to the market of young adults. c. Both a. and b. 2. What is McDonald's promotion about? a. They are introducing a new service for their young customers eating in one of their chain restaurants. b. Those who order a special meal get an access code to use McDonald's Hotspots free for browsing the Internet. c. Neither a. nor b. 3. How does Sony come into the picture? a. Sony has opened a music store next to McDonald's in the States. b. People who get the free access code will be able to download one song free from Sony's online music store. c. Both a. and b. 4. Is the promotion called Big Mac Meal Tracks global? a. Not at the moment, but they are planning to take it overseas later. b. It is, but it will finish after 6 to 10 weeks. c. Neither a. nor b. 5. How do analysts explain McDonald's alliance with Sony? a. McDonald's is said to have made this alliance because it wants to get rid of its tie-in with Disney. b. McDonald's probably wants to attract a different audience from what it targeted earlier. c. Both a. and b. 6. How is McDonald's trying to change its image? a. It is launching global campaigns suggesting that it is more than a fast food chain. b. With its slogan "I'm loving it" it suggests that it combines food with music. c. Neither a. nor b. 7. Why do non-restaurant venues appear in McDonald's commercials? a. The aim is to convey that going to McDonalds' is not just eatmg in a fast food restaurant but taking up a life style. b. Th'ey incorporate hip hop music as a tool to propagate Sony, their partner in the alliance. c. Neither a. nor b. 8. What does Jack Trout refer to when he uses the expression "kiddyland box"? a. He is referring to McDonald's image as a popular destination for Kids. b. He recalls the meals specially made for kids at McDonald's. c. Neither a. nor b. 9. What is Jack Trout's opinion about the traditional alliance of McDonald's with the Disney Co? a. He thinks Disney (at the present state of affairs) has a negative effect on the efficiency of McDonald's new marketing campaign. b. He is sure Disney cannot help McDonald's in its new marketing campaign. c. Both a. and b. 10. How does Jack Trout, the marketing consultant of Trout and Partners, explain McDonald's alliance with Sony? a. McDonald's has been trying to find marketing partners who help it to leave its traditional image behind. b. McDonald's has looked for a new partner that can help it to appeal to an older generation than the target group of Disney. c. Both a. and b.
11. M'XADAT - Szakmai szokincstcszt In this part ive give you sample exercises of different types. Our intention was both to give you tasks to increase and practice your IT vocabulary and to show you what type of tasks await you at the 11 •ritten exam ¡nation. The total number of points you can achieve in this part is 20.
I. Read the following definitions. You will find blanks that must be filled with one of the words from the list. Be careful because there arc more words in the list than needed. Each correct solution is 2 points.
1. horizontal, identify, linking, recognize, tracking, transmits, vertical bar code Invented in South Beach, Miami, by Joseph Woodland and Bernard Silver, in 1949, it was patented in 1952 and first used commercially in 1974. Composed of a series of (I) lines printed on most physical merchandise, it's used to identify the product and its price (among other details). A scanner (2) the information to a cash register or computer for action (such as printing out a receipt). Bar codes are used in a variety of ways, including (3) medical records to a hospital patient's ID bracelet or (4) packages from overnight shippers. Considered to be the killer application of the digital age, bar-coded UPC symbols are used by more than one million companies worldwide to (5) consumer products.
2. accessed, downloaded, found, improves, reuse, retrieved, saved cache or caching The action of storing Web files for later (1) so that they can be (2) more quickly by the end-user. When you're on the Web, the cache (3) your Web browser's performance: it stores HTML page code, graphics, and multimedia elements so that when you return to that particular Web page (even if you just hit the back button), the information doesn't have to be (4) all over again. The cache is a form of high-speed memory that your computer sets aside to store frequently accessed data; once the data is stored, it can be (5) directly from your hard drive rather than from a server.
3. developed, integrated, manufacturers, many-purpose, provide, special-purpose, users
The incredibly complex yet tiny modules that store computer memory or
(I) logic
circuitry for microprocessors. Perhaps the best-known chips arc the Pentium microprocessors from Intel. The PowerPC microprocessor, (2) by Apple, Motorola, and IBM, is used m Macintosh personal computers and some workstations. AMD and Cyrix also make popular microprocessor chips. There are quite a few (3) of memory chips. Many (4) chips, known as application-specific (5) circuits, are being made today for automobiles, home appliances, telephones, and other devices. 40
4. access, browse, contact, contain, identity, saved, stored cookics ll is a tunny name for a small piece of information about you (about your computer, actually). It is a small file that a Web server automatically sends to your PC when you (!) certain Web sites. Cookies arc (2) as text files 011 your hard drive so servers can (31 them when you return to Web sites you've visited before. Cookics (4) information that identifies each user, for example: login orusername, passwords, shopping cart information, preferences, and so on. When a user revisits a Web site, his or her computer automatically "serves up" the cookie, which establishes the user's (5).
5. appliances, construction, building, choice, enables, share, variety home
networking
At its basic level, it is the (1) of a network system that (2) users within a single home to simultaneously connect to the Internet over a single account and to (3) printers and other peripherals. As smart homes become an everyday reality, a wide (4) of devices that contain chips will become part of the system (including lighting, (5), security, and televisions). Systems are based on coaxial cable, existing telephone wires (POTS), and wireless radio frequency (RF).
6. difference, installed, maintained, outdated, query, statement, updated ghost site The name for a Web site that is no longer (1) but remains online and available for viewing. Some ghost sites continue to be useful because the content may not be (2) (see: guru site). The (3) between a ghost site and other abandonned sites is that the ghost site contains a (4) acknowledging that it is no longer being (5).
7. account, binary, cancellation, crash, deletion, receiver, recipient mail bomb An e-mail message with huge (1) files attached to it, sent to (2) the (3) 's mail server (the server that houses e-mail) or mail reader (a software program for e-mail). Mail bombing is a form of electronic harassment that is one step beyond flaming, and on many systems, it can result in the (4) of the bomber's (5).
8. circulated, messages, sent, term, unsolicited, unwanted, via, way meatloaf Unlike spam, which is (1) commercial e-mail (UCE), meatloaf is unwanted personal e-mail. It's (2) by friends or office mates (3) group e-mail lists. Meatloaf consists of jokes, anecdotes, and other trivia. The (4) is a variation on spam to reflect that these (5) are "homemade."
9. distant, online, offline, remote, searching, site, surfing, thumb mouse potato The (I) version of a couch potato, as in, one who sits for an extended period of tunc in front of the computer screen just (2) around. Instead of using the (3) to press down on the
(4) control, the pointer finger is constantly called upon to "surf' from one (5) to another.
10. bandwidth, capacity, designed, enables, planned, provides, running, speed multilink A protocol standard that (I) higher Internet access speeds and greater (2). Multilink uses two modems to connect to the Net simultaneously, at double the (3) of a single modem. It requires two or more modems, a phone line, a dial-up account for each, and a PC (4) either Windows 98 (or higher) or Windows NT; also, your ISP must have the necessary hardware and software to support this service. It was originally (5) for ISDN connections.
11. You can find a list of IT words and 10 definitions. You must match them. Be careful because there are more IT terms than definitions. Each correct match is 1 point. 1. annotation 1
|, authorization |
dirty connection [
|, lurker
I, biometrics 1
I, COM port I
, mip d ] , patch 1
I, digital watermark
|, silicon Q J, telematics FZ1, wire jam •
1. A very slow Internet connection due to a large amount of Internet traffic or some other type of technical glitch between your computer and your ISP. 2. The science of combining telecommunications and computers to control the electronic and mechanical functions in automobiles. 3. The fundamental material used in making computer chips, it is a semiconductor (meaning it has electrical conductivity). 4. A measure of a computer's processing speed. 5. A visitor to a newsgroup or chat room who only reads other people's posts, never posting his or her own, thus remaining anonymous. 6. Notes that you can add to documents. These notes are stored on your local disk (hard drive) and are available each time you access a document. This feature is found in some Web browsers as well. 7. A method for identifying an electronic document, it is usually information placed in the code. 8. A socket in the back of a computer for hooking up or plugging in devices, such as modems or printers. 9. Popular in sci-fi movies, it refers to voice, fingerprint, or retinal identification. Not widely used in the real world, however, future uses may include e-commerce transaction signatures identified by its means. 10. Supplemental software code that, when installed to the original software program, fixes problems. It can usually be downloaded off the Internet in order to fix a bug.
42
2.
alphanumeric 1 connection | screen saver I
|, anonymous FTP I
|, formula I
I, mailbot [
I, wallpaper I
1. customize I 1, nerd 1
I, default | |, protocol [
I, dirty |, router |
|,
I
1. An option that allows you to connect to a site, search through available files, and download any file, document, or program without having to establish an account (a username and password) on the system where the material resides. 2. To make changes or specifications to a program or Web site so that it meets your individual needs. 3. A computer software setting or preference that states what will automatically happen in the event that the user has not stated another preference. 4. A set of characters that contains both letters and numbers. Often used in cryptic passwords, these codes can also consist of punctuation and symbols found on a standard keyboard. 5. A program that activates itself when a computer has been inactive for a period of time. 6. An electronic device that connects two networks. For example, this is what connects a local network to an ISP for Internet access. 7. A specification that describes how computers talk to each other on a network. It is an established method of exchanging data over the Internet. 8. Similar to a geek (a person who knows a lot about the Internet), but this is more of a brainy person who knows everything there is to know about computers. 9. An abnormally slow or lagging Internet connection due to heavy traffic or some other type of anomaly. 10. An e-mail server that automatically responds to requests for information. 3. authorization | multitasking | zine [
|, beta bugs [
|, bulletin board |
|, newsgroup Q ^ j , redirect |
|, identification |
|, smiley |
|, switch |
I, mirror |
1,
|, web rating [
|,
1
1. This is either a domain name that another domain points to or a server that holds copies of a different domain's files. Some servers are so popular that other servers have been set up to spread the traffic load to more than one site. 2. The simultaneous execution of more than one task. For example, a computer that launches or runs more than one program simultaneously. 3. When you type in a URJL and hit "enter" but notice that the browser automatically sends you to another URL, you are experiencing it. 4. A measurement of the size of a Web site's audience. 5. The nickname for an electronic newspaper. Just like their real-world counterparts, they primarily derive revenue from ad banner sales. 6. It is a forum for sharing information. Each one is an area on the Internet that allows users to post messages and reply to other users. 7. A process that verifies whether or not an individual or organization that has requested an action actually has the right to make the request.
8. The problems, errors, glitches, or anomalies identified during the pre-release phase of a commercial computer product. 9. In telecommunications, it is a network device that selects a path or circuit for sending a unit of data to its next destination. It may also include the function of the router, a device or program thai determines the route the data should be sent to. 10. It is a sequence of typed characters that creates a rough picture of something, such as a facial expression. 4. configuration | menu |
|, demon |
|, refresh [
|, delete [
|, retrieval |
[, dial-up |
|, thumbnail |
|, erase |
1, flowchart |
|, virtual j
|, icon
]
1. The service whereby a functional unit can use the telephone to initiate and effect communication with another functional unit 2. A graphical representation of a process or the step-by-step solution of a problem, using suitably annotated geometric figures connected by flowlmes, for the purpose of designing or documenting a process or program 3. A miniature graphical representation of a document or of an image. 4. The manner in which the hardware, software, or other aspects of an information processing system are organized and interconnected. 5. A list of options displayed by a data processing system, from which the user can select an action to be initiated. 6. The process of repeatedly producing a display image on a screen so that the image remains visible. 7. To remove data from a data medium. It will not only delete the data but will also overwrite it in such a manner that it cannot be retrieved by a later operation. 8. In information processing, the act or process of recovering data or information. 9. Pertaining to something that appears to have some characteristics of something else for which it serves as a surrogate. 10. A procedure that is invoked without being called explicitly whenever an alteration, an addition, a deletion or other event occurs. 5. connector ( ~ J , digit node j
[, shrink |
, dots | |, transfer [
|, feasibility study| |, virus |
| , icon Q ] ] , indent j
j, word wrap j
|, invert|
[ ,
|
1. A character that represents a natural number. For example, one of the characters 0 through 9 in the decimal system. 2. A graphic symbol, displayed on a screen, to which the user can point with a device, such as a mouse, in order to select. 3. A study to identify and analyze a problem and its potential solutions to determine their viability, costs, and benefits. 4. To begin a line farther in from the margin than the other lines. 5. A flowchart symbol that represents a break in a flowline and that indicates where the flowline is continued.
fi To change a physical or logical stale lo its opposite. 7 In a network, an entity that is associated with or connected to one or more other entities. In network topology or in an abstract arrangement, they arc points on a scheme. In a computer network, they arc computers or data communication equipment. S. I n rcducc the size of a window. 9. A program that propagates itself by modifying other programs to include a possibly changed copy of itself and that is executed when the infectcd program is invoked. It often causes damage or annoyance and may be triggered by some event. 10. A function that automatically places a whole word on the next line when the length of the word and its associated punctuation exceeds the available space on the line.
file |
|, justify |
|, latency |
piggyback entry Q J , robot
[, magnetic disk | shareware[
|, maintenance |
|, slowness |
|, wizard |
I, memory |
|,
|, word wrap •
1. An interactive aid that guides a user through a series of steps to accomplish a task. 2. Unauthorized access to a data processing system via an authorized user's legitimate connection. 3. Software that is distributed without a licensing fee, but for which a nominal payment is requested for continued use. 4. The time interval between the instant at which a call for data is initiated and the instant at which the actual transfer of the data begins. Synonymous with waiting time. 5. To align text horizontally so that the first or last characters, or both, of every line are aligned with their corresponding margins or to align text vertically so that the first and last lines of the text are aligned with their corresponding margins. 6. A named set of records treated as a unit. 7. A flat circular plate with a magnetizable surface layer on one or both sides of which data can be stored. 8. A usually programmable mechanical device designed to perform tasks of manipulation or locomotion under automatic control. 9. Any of the addressable storage space in a processing unit or any other internal storage that is used to execute instructions. 10. A set of activities intended to keep a functional unit in, or to restore it to, a state in which it can perform a required function. It includes activities such as tests, measurements, replacements, adjustments, and repairs.
III. What do the following definitions define? We give you the first letter. Each correct word is 2 points. 1. 1. In text processing, a generally unused area that lies between the text area of a page or screen and any of the four edges of the page or screen. It may contain elements such as page headers, page footers, small illustrations, notes, and page numbers. M 2. Software that permits multiple users on a network to work together; for example, software ti'electronic mail, for scheduling and planning, and for file sharing. G
3. A person who uses his or her knowledge and means to gain unauthorized access to protected resources. II 4. In text processing, a named, structured unit of text and possibly images that can be stored, edited, retrieved, and exchanged among systems or users as a separate unit. D 5. The movement of a display image vertically or horizontally, to view data not otherwise visible within the boundaries of a screen or window. S 6. In a process computer system, the means for interconnection between the computer system and the process interface system. A bus may be used as one. H 7. A preliminary version of a document prepared for review, approval, or editing. D C 8. A horizontal arrangement of characters or other expressions. R 9. A hidden software or hardware mechanism usually created for testing and troubleshooting, that may be used to circumvent computer security. T 10. A card in which hole patterns can be made. P C 2. 1. A permanent copy of machine output in a visually readable form, generated on a device such as a printer or plotter; for example, printed reports, listings, documents, and summaries. H C 2 Non-volatile memory- that can be erased and reprogrammed in blocks instead of one byte at a time. F M 1 T h e movement of data through the active parts of a data processing system in the course of the pertormance of specific work. D F 4. An ordered tree in which each node has at most two other nodes that are directly subordinate. It T 5. A relatively small area on a Web page with content independent from the remainder of the Web page; the content may be dynamic, contain audio, etc. B 6. To make an identical copy of an existing document. D 7. A locator or a pointing device that employs a lever with at least two degrees of freedom. J 8. The arrangement of text or graphics on a page so that the page is oriented for normal reading when its width exceeds its length. L 9. A hand-held pointing device operated by moving it on a surface other than the display surface. It is usually equipped with one or more pushbuttons for selecting items. M 10. A read/write storage device or register that may be used for the temporary storage of intermediate data or pointers. S P
3. 1. Pertaining to events that occur at the same instant of time. S 2. To work at home and to use a workstation to send or receive information to or from the office. T 3. A test that uses a representative set of programs and data designed to evaluate the performance of computer hardware and software in a given configuration. B 4. An order for an action to take place. C 5. To terminate abruptly a processing activity in a data processing system because it is impossible or undesirable for the activity to proceed. A 6. A non-impact printer that forms the characters or unique images by projecting heated particles or droplets of ink onto the output medium. B P 7. An e-mail server that automatically responds to requests for information. M 8. To translate all or part of a program expressed in a high-level language into a program expressed in an intermediate language, an assembly language, or a machine language. C 9. An online forum for sharing information. N 10. Supplemental software code that, when installed to the original software program, fixes problems. It can usually be downloaded off the Internet in order to fix a bug. P 46
9.
1. Popular in sci-fi movies, it refers to voice, fingerprint, or retinal identification. Not widely used in the real world, however, future uses may include e-commerce transaction signatures identified by its means. B 2. A drop-down menu that only appears in certain parts of a GUI. To see it, you click on the upper right button of your mouse (PC). C S M 3. A computer software setting or preference that states what will automatically happen in the event that the user has not stated another preference. D 4. An abnormally slow or lagging Internet connection due to heavy traffic or some other type of anomaly occurring between your computer's connection and the ISP you're using. D C 5. The capability of a functional unit to meet the requirements of a specified interface without appreciable modification. C 6. A routine or storage used to compensate for differences in rate of flow of data, or time of occurrence of events, when transferring data from one device to another. B 7. Process of making a reserve copy of a file, of a document, etc. B 8. An open-loop device designed for transferring data between several devices located between its two end-points, only one device being able to transmit at a given time. B 9. A menu structure whereby a selection may cause the appearance of another menu. C M 10. The name for a Web site that is no longer maintained but remains online and available for viewing. G S
IV. In the following definitions there are 4-5 basic IT words missing. Which are they? We give you the first letter. Each correct word is 2 points. 1. BASIC: A procedural algebraic language with a small i (J) set and originally d (2) to be. i (3) and for ease of learning. The name is the a (4) derived from Beginner's AllP (5) Symbolic Instruction Code. 2.
broadband: A frequency band that is used for an application r (1) a wide r (2) of frequencies. The broadband can be d (3) into several narrower bands, each band of which can be used for different p (4) or be made available to different users. Synonymous with w (5). 3. callback: Ap (1) in which a data p the call, and dials the calling terminal to a d (5) back.
(2) system identifies a calling terminal, d (4) the calling terminal. Synonymous with
(3)
4. clock: The electronic c (1) in an electronic device that generates a steady s (2) of regularly spaced pulses. A clock is generally used for r (3) the time of state transitions, synchronizing multiple events, or m (4) time intervals inside the electronic d (5).
color resolution: A m (I) of the ability to d (2) between two color v (3). Typically. color resolution is expressed by the number of b (4) necessary to express in b (5) form the maximum number of possible different color value. 6.
hot plugging: The ability to add or r (I) hardware or p (2) devices to a computer while the computer is running. The operating system automatically recognizes the change and the system isn't i (3) Also known as "hot swapping/' hot plugging is currently s (4) by two external bus standards: Universal S (5) Bus (USB) and FireWire. 7. mail bomb: An e-mail m (1) with huge binary files a (2) to it, sent to crash the recipient's mail s (3) or mail reader (a software program for e-mail). Mail bombing is a form of electronic h (4) that is one step beyond flaming, and on many systems, it can result in the cancellation of the bomber's a (5).
mirror: cither "i -j (I) name that another domain points to or a server that holds copier ••>!% different domain's files. Some servers are so p (2) thai othci servers have been set up to mirror them, in order to s (3) the traffic load to more than one site. Many international sites have mirrors s (4) up in other countries to allow quicker access for i (5) users. 9. mouse potato: The o (I) version of a couch potato, as in, one who sits for an extended period of time in front of the computer s (2) just s (3) around. Instead of using the thumb to press down on the r (4) control, the pointer finger is constantly called upon to s (5) from one "site" to another. 10. Multitasking (multiprocessing): The simultaneous e : (1) of more than one task. For example, a computer that launches or r (2) more than one program s (3) is multitasking. This term has e (4) to include human activities, such as talking on the phone, reading e-mail, and eating lunch at the s (5) time.
V. In the following section we give you both the definition and the word. The problem is we have left out one or two basic IT words. Can you write them in? To make it easier we have given you the first character. Each correct word is 2 points. 1. 1. A malicious program that r itself until it fills all of the s space on a drive or network: Worm 2. A short application program especially for p a simple specific task: Applet 48
3. A program that works with the operating system as a command processor, used to enter commands and initiate their e Shell 4. Playing sound or video in real time as it is downloaded over the Internet o to storing it in a local file first. Streaming 5. Any computer on a network that is a repository for services a to other computers on the network. Host 6. A place where i goes into or out of a computer, or both. Port 7. In online chat "Emoticons" are clusters of punctuation such as : ) and : > that are used to set the tone for the s that precedes them. 8. Sandbox: a protected, limited area in computer memory where applications (generally Java-based) are allowed to "play" without risking d to the system. 9. An open standard for compression and decompression used widely for PC download archives, ZIP was developed by Phil Katz for his DOS-b program PKZip, and it is is now w used on Windows-based programs. 10. Spyware also called adware. Spy ware is any s that covertly gathers user information through the user's Internet c without his or her knowledge, usually for advertising purposes. 2. 1. A bright, usually blinking, movable i on a d marking the position at which a character can be entered, corrected, or deleted. Cursor 2. Capable of orderly, efficient integration and o with other elements in a system with no modification or c ¡¡i:-c, Compatible 3. A (jii.aie telephone circuit p connecting two points, normally p on a lease by a local PTT. Leased line 4. A small w receiver that, when triggered (generally via phone), will beep or vibrate. The wearer will have been trained to r to this signal. Pager 5. A s of instructions that repeats either a specified number of times or until a particular condition is met. Loop 6. Tooltip: a label that appears on the screen when the user h the mouse pointer over an i in a Microsoft Windows system. 7. WAP: acronym for wireless application p 8. A plastic card with a magnetic strip containing e data that is read by passing the card through a usually slotted electronic d Swipe card 9. The main board of a computer, usually containing the c..-. for the central processing unit, keyboard, and monitor and often having s for accepting additional circuitry. Motherboard. 10. A hub is used to connect several computers together. In a message h service, a number of local computers might e messages solely with a hub computer. The hub would be responsible for exchanging messages with other hubs. 3. 1. Highlighting means that c or symbols are treated to make them stand out from the rest of the t , often by using bold type. 2. Cursor pad is the group of four a cursor control k , used to move the cursor up and down or to the right or left. 3. Pop-up window is a window that can be d on the screen at any time on top of anything. When the window is r , the original screen display is restored. 4. Scroll bar is a bar d along the side of a window with a marker which i how far you have scrolled. 5. A hand-held scanner is a d that is held in your hand and contains a r of photoelectric cells which, when moved over an image, c it into data which can be m by a computer.
(> Scrvicc provider is a company that oilers users a c to the Internet. It litis a computer that acts as a d name server and has a high-s link to the Internet. 7. Patch is a t correction made to a program. It can be a small correction made to software by the u 011 the i of the software publisher. X Disk mirroring is a data p system in which all or part of a hard disk is d onto another disk drive. Any changes made to the data on the original drive are duplicated on the m drive. 9. Data compression means reducing the size of blocks of data by r spaces, empty sections and unused m 10. Critical path analysis is the definition of tasks or jobs and the time each r 111 order to achieve certain g 4. 1. A transistor is a s component with three e , the emitter, the base and the c It is used for switching or amplifying an electronic s 2. Radiopaging is a communications service using radio pager d which beep to let the user know that someone is trying to get in c with them. 3. Microprocessor is an IC chip at the centre of a computer for c the system and p the data. 4. Decoding means converting ad coded s back to its original form. 5. An integrated circuit is an e circuit containing many components 011 a single s chip. 6. A modem is an electronic device used by computers for converting 0 signals from digital to a form and i signals vice versa. 7. Semiconductor is a component made from a m which changes from being an i to being a conductor when certain impurities are added to it. 8. SMS is the abbreviation for Short Message Service. Am of sending t messages that are 160 characters in 1 or shorter over a mobile phone. 9. Upstream is the signal p for receiving communications from a c computer to a server in a n 10. Extensible mark-up language is a meta-language that allows developers to c their own set of customised t that identify the meaning and s of data. 5. 1. Bandwidth is the range of f that can be transmitted over a communications c 2. Buffering is the process of temporarily s data from a fast s so that it can be f at a steady rate to a slower system. 3. ADSL is the abbreviation for an a digital s line. A form of DSL that has a different b for the u and the downstream. 4. Wap is the acronym for w application p A set of standards for allowing users to send emails and a information including video t from the Internet on a mobile phone. 5. Packet-switching is a method of transferring data across a network by d it into packets and transferring the packets individually from n then putting the packets together again when they arrive at the d 6. Mirroring is a technique used in RAID 1 systems where at least two hard disks are p in such a way that the hard disk c writes each byte of data to both disks. It ensures that a b exists in case the p disk drive fail. 7. Batch program is a program that r without any terminal or user i Typically such programs p large scale updates, produce reports or handle housekeeping functions. A high priority batch job may be run in f 8. Keyboard lock is a security method where the screen is c and the keyboard is locked after a pre-s period of inactivity to prevent u use. 9. Low-level language, such as assembly, is a programming language in which each i has one c instruction in machine code. 10. An icon is a visual symbol or picture used in a menu to r a program or a file. The program is usually i by using a mouse and clicking its button when the c is over the icon. 50
III. FELADAT - Irányított fogalmazás In this section - besides giving you sample topics and sample compositions - we have tried to collect several issues for you to consider when preparing for and completing this task. These remarks serve as guidelines in addition to your teacher's comments and corrections. Writing a composition needs a certain skill. Ltkc all other skills it can be acquired. For some it may take a longer time (25-30 compositions) for others it is easier (10-15). You can decide for yourself which category you belong to if you think of your results in the Hungarian literature lessons.
A. Points to consider when writing a guided composition: 1. When making your choice you have to consider a. how much you know about the topic b. whether you have formed your personal opinion and whether you want to share it with your audience c. how well you know the related vocabulary d. what grammatical structures you may need and how familiar they are for you (conditional, auxiliaries, verb tenses, etc.) e. the required length - whether you have too much or too little to say f. whether you have a personal opinion or standpoint to draw conclusions, to make generalizations, etc. g. whether you have or you can find a way of logically structuring what you have to say about the given topic h. whether you understand the 'hints' or guidelines, that is you know more or less what is expected of you i. the time limit you have at your disposal 2. When writing your composition you must consider the following: a. think of a logical structure for your thoughts and always remember it b. remember the basic rules of composition writing and remember the basic formal rules c. focus on the main point d. don't forget the grammatical and spelling rules e. remember to use technical vocabulary - don't repeat words f. never forget the element of time g. try to produce easily readable handwriting and an acceptable layout a. It is advisable to write a summary or at least spend some time collecting your thoughts and putting them down on a paper. Try to make different columns for generalizations, conclusions, specific examples, examples for and against your basic standpoint. You must always decide your own standpoint or position regarding the main issue. b. The three basic parts: introduction, body and conclusion. The introduction can be the explanation of the title, or a so-called general thesis statement related to the topic, perhaps a controversial generalization with which you wish to argue later on or just your viewpoint in a simple form. The body - at least three times as long as the introduction - consists of supporting paragraphs. The paragraphs may follow each other logically, may support each other or give contradictory opinions. In certain cases several examples may be given in order to support or reject the case, etc. The conclusion - some general statements, moral teaching, etc. - may be a general lesson or a personal teaching, a message to humanity or society, or just the repetition of a statement from the introduction (of course in a re-phrased form).
c. As the compositions are assessed according to the so-called language accuracy too, here are some very simple rules: - be consistent with the verb tenses - avoid structures which you are not sure about - try to use passive voice as often as possible. - the application of relative pronouns is always a problem - you should read over the basic rules before the written exam (you will probably need them) - remember the difference between present and past participle and the rules related to them (these two structures will improve the quality of your work greatly) - don't use very simple and short sentences but resist the temptation of very long and complex ones as well - linking or 'transition' words are tricky and important, but you should remember correctly how to use them (unless, although, until etc.) - indirect or reported speech is a tricky part of the English language - remember the rules of word order and verb tenses, or simply avoid using it - spelling issues: don't mix up American and British spelling rules (traveling/travelling, economize/economise etc.). Try to choose one and be consistent throughout the composition. The English use capital letters in headlines. d. In case you don't remember a much needed technical word, you can give its definition - just remember how to make a definition (if you have prepared for the technical vocabulary test, you will have acquired the skill). Instead of repeating a word you can refer to it (the one, the latter and the former etc.) e. You must always leave time for reading your work at least once more before submitting it. Always leave a margin or use double-spaced lines, this way you will have somewhere to make corrections. f. The layout of your piece of work, the overall impression is very important. Try to use medium-sized characters, don't cross wrong words out, just put them in brackets, use clear paragraphs and leave margins for the teacher's remarks as well.
B. Sample topics and compositions 1. What Do You Think about File-sharing Software? Use the following words/expressions: Swapping music, illegal commercial activity, virtual society of young people, issues of copyright, record-makers' financial interests, etc. (See Sample Composition in Key) 2. What do you know about Operating Systems? Compare at least two, using the following questions as guidelines: - Which is the best-known OS and why? - What are its benefits and limits? - Compare it with another one by describing its advantages and disadvantages, terms of use, applicability, hardware specifications, troubleshooting techniques, etc. 3. Vocational Training/College Training in Hungary Use the following hints/questions: Describe the situation in Hungary. - What training programs can you choose from and which are more practice-oriented? - Which skills are most sought after? - How does the Labour Market influence post-secondary training? (See Sample Composition in Key) 52
4. Entertainment and the Internet - How does the Internet replace going out? - What kinds of entertainment activities can we find on the Internet without leaving our home? - What are the dangers? - What are the positive aspects? - Why is the Internet more 'democratic'? (access to information) (Sec Sample Composition in Key) 5. Sport and the Internet - What sport activities can be played over the Internet? - Simulation games - What skills can be developed with the help of these games? - How does the Internet influence real sport? (See Sample Composition in Key) 6. What is Your Opinion about Unwanted Emails? Spammers and filters Meatloaf Online advertising - banners Slower service, full mailboxes (See Sample Composition in Key) 7. Smart Devices and Their Influence on the Quality of Life Use the following words/expressions: Embedded computer, chip, interactivity, home-networking, security issues. More free time - less hard physical work ... (See Sample Composition in Key) 8. Robot Technology - Are Robots a Blessing or Curse? - What are robots good for? - What are the limitations of robots? - Could robots become more intelligent than humans? - Can you give examples of films/novels/short stories that deal with the topic? - Are writers/scientists optimistic or pessimistic about this issue? 9. File-sharing and Copyright Well-known file-sharing sites - free/paying The music industry and its main target group Solutions (See Sample Composition in Key) 10. Electronic Books and Magazines Compare electronic reading materials with the traditional printed books and other information sources. Electronic paper and downloading text Professional forums and sources of specific information Monitor-resolution (dpi): the human eye ...
11. Desktop Publishing and Other Supporting Software - How do you prepare text for publication? • What can we import and how can we arrange text? - What supporting software can you use? What are they for? 12. Data Protection on the Home PC and in General Security measures Passwords and encryption Biometric means against hackers Hacking and industrial spying Weak points of a network - the individual Firewalls, mirroring, storage of back copies, etc. 13. Chatting and its Dangers Chat groups - virtual clubs without real contact Young people and their imagination/fantasies Psychological control Pornography 14. The Importance of Student Mobility in Academic Studies New opportunities - European grants Long practice in the Western countries (the world is opening up for the Hungarians) Credit systems and transferability (See Sample Composition in Key) 15. -
Technology without Limitations - Life in the Future What do you think our life will be like in a hundred years' time? Home robots/transportation/space research/virtual reality Will humans be happier/lonelier/more satisfied/physically fitter/mentally stronger, etc? Does technology offer us a higher quality of life?
16. The Different Stages of Photography The beginnings - black and white still pictures Colour photos - art or skills? Digital photography - its benefits and drawbacks The digital camera - its applications 17. How Can Modern Technology Improve Quality of Life for the Disabled? Internet - information accessible from home Telework - making money and being useful in society Online learning - distance learning - better chances in life Smart equipment to help people with physical disabilities - mobile technology Telecommunication systems, speaking computers for the blind, wheelchairs with all conveniences, online medical advice, etc. 18. Teleconferencing and Power Point Presentations What is teleconferencing and what hardware technology is needed for it? What does it replace and what are its limits? What is a good PowerPoint presentation like? The proportion of speaking and reading, the issue of length, background decorations, number of imported tables, images, logos, layout, etc. 54
19. What Do You Think of Hackers? What can be downloaded? Technical tricks Quality issues Losses for the copyright holder (See Sample Composition in Key) 20. What Does the Average Computer User Know/Have to Know? Baste skills and competences (Word, emailing, storage devices, basic hardware skills) ECDL Common problems (security, backup copies, peripheries, viruses and other infections, etc.) How does the average user update/expand memory/buy new software? 21. What Do the Different Professionals Use Computer Technology for? Choose two or three jobs and describe the role of computers in them. E.g. What does a teacher use the computer for? Is it important for a tradesperson to know what a computer is good for? Does an artist need the computer for his/her work? In what jobs is information flow offered by emailing and the Internet vital? "e-society" 22. E-Commerce and Electronic Signatures Online trading, professional home sites, e-banking and its problems, logos/banners and online advertisement, Electronic wallets and safety issues, Virtual shops and reduced costs ... 23. Science Fiction and the Potentials for our Future Life Do you think quality of life increases or decreases with the advances of modem technology? Are humans becoming happier in a world full of technical devices? Is humanity becoming more vulnerable or more able to deal with the hardships of life? Are you optimistic or pessimistic about life for future generations? 24. Computer-Controlled Safety Tools (health, sports, hardships of space/climate etc.) Types of dangers and the answers of technology The limits of smart products Our responsibility (See Sample Composition in Key)
IV. FELADAT - Fordítás idegen nyelvről In this scction we give you 20 passages for translation. The first ten have been translated (see Key), the second ten are for further practice. Each text has been divided into ten units; these show how teachers assess your performance. Each unit is worth 2 points if it has been translated correctly. 1 point is given if a shorter part of the unit is missing or not translated properly.
A. Some practical advice for the translation task Before the exam the main question is how to prepare for this task. One point to remember is that you have to collect all the information about the task well in time. Read carefully all the exam specifications you can access, download all materials available on the homepage of the examination center, consult teachers or attend preparatory classes. Some of the practical questions may be the following: 1. How much practice you need depends on many factors, such as a. the level of your overall language skills b. the level of your translation skills in your mother tongue c. your knowledge about and interest in the topic of the passage to be translated d. tools and facilities at your disposal (dictionary) e. the quantity of prior practice in the general foreign language
a. By overall language skills we mean the range of vocabulary you have, grammar and language accuracy, dictionary skills, general logical skills like guessing, analogy etc. b. Do you remember what marks you had in literature lessons when you had to write an essay about a given topic? Was it easy for you to find the proper words to express your thoughts? Could you express yourself in a complex way? Was your style positively appreciated by your teacher? If your answers are in the positive, you can relax. You will probably pass this part of the written exam with relative ease. c. If you know what to expect of the passage, you know the technical words and their Hungarian equivalent without looking them up in the dictionary, you are really and genuinely interested in what you have to translate, your task will be easy. You can be sure you understand what the text is about. d. There are basic rules about what dictionaiy to use and how to use it. If your dictionary is too small, you won't find the words you most need, if it is too big, it will take too long to look up the unknown words. Try to use the same dictionary every time and in the beginning spend some time reading the introduction about the meanings of the abbreviations and finding out what extra information can be accessed at the end of the volume. You can save a lot of time in the exam if you practice looking up the words in a traditional dictionary. Although an online dictionary is much faster, it will not be at your disposal when most needed, at the exam. Another issue may be the question of edition time. With information technology words are born and become obsolete very fast. Not even the updated editions of dictionaries will contain the most recent high tech inventions, which - in certain cases - don't even have a Hungarian equivalent. In such cases - among others - does your prior knowledge come into the picture. e. Considering all the previous points we should say that everybody, even those who regularly read professional literature or possess excellent essay writing skills in their mother tongue, needs a lot of practice. Remember that reading comprehension skills cannot substitute translation skills. Understanding something is different from expressing it in your mother tongue and, formulating something in writing is still different from oral expression.
5 ft
2. How (o practice depends on several considerations: a. How much time do you have? li. Who will help you? c Will somebody correct you and explain the reason for your mistakes? a. The minimum time required for this task is the time set by the examination itself multiplied by minimum 10-15 and the time needed for assessment and correction. (10-15 is the minimum number (¡/passages to he translated before the exam). It doesn't matter whether you do some translation work over a longer period or decide on a shorter intensive preparation phase. What does matter is that you should never replace translation with reading comprehension. b. Of course the best thing is that you have regular classes with a professional teacher who will correct your mistakes and explain to you the basic rules. The second best thing is that you work on your own and you collect all your questions and problems and discuss them with a teacher during a consultation lesson. If you can't have any professional feedback, rely on your own resources. Ask a friend or relative - preferably someone with some IT knowledge - to read your translation and tell you whether it sounds all right and makes sense. In most cases even you can decide whether you have translated the passage correctly - perhaps you have to read the translated text over again after a while. c. If you have a teachcr to help you, don't hesitate to ask as many questions as you need in order to improve your style or avoid your mistakes. If you have to rely on yourself, the most often asked question is: Do I have to translate word by word? How freely should I translate? Can I use English words in the Hungarian text? Should I translate proper names into Hungarian too? There are several theoretical books dealing with the skill of translation, which will probably give you the answers. In this short book we have selected several passages for translation practice for you to find them out yourself. 3. What to practice? a. Dictionary skills and lexis issues b. Guessing skills c. Skimming d. Hungarian style a. By dictionary skills we don't only mean increasing the speed of finding words in a dictionary but rather practicing and improving the following skills: • Guessing the stem of a word and its meaning without looking it up (e.g. efficiency comes from efficient, redesign comes from design and "re", and it means designing again, speedy must mean something with speed etc.) • Considering the structure of the sentence in order to decide on vocabulary and meaning. • Guessing the meaning of unknown words in case they cannot be found in the dictionary but we know more or less what they must mean from the context. b. Guessing the meaning of whole sentences and headlines when we are not sure what they exactly mean. c. Reading the whole passage or paragraph in order to have an overall idea of • what the message of the text is, • what kind of a text it is (essay, short story, interview, report etc.) • the dominant style (register, lexis etc., whether it is serious or funny, realistic or fictivc, political or artistic etc.) • the meaning of the title or headline d. After considering the points mentioned in paragraph c. we can try to improve our Hungarian version. In our case (mostly professional and technical passages) we can limit our efforts to a smaller number of possible variations: the passages arc mostly:
• short articles • short stories • technical perhaps economic or scientific and never political or artistic passages • usually with a serious tone. Wc must consider certain characteristics of the two languages (comparative linguistics) (e.g. where th I nglish passage contains abbreviations - participles, gerunds etc., the Hungarian translation will probably offer shorter sentences etc.)
B. Passages for Translation: 1. Next GameCube set for 2005 debut G a m e r s c a n g e t a look a t t h e s u c c e s s o r t o t h e G a m e C u b e ( ! )
in just under a year's time, Nintendo has suggested. T h e Japanese g a m e s giant has said it w o u l d like to s h o w c a s e its next g e n e r a t i o n c o n s o l e at next year's F3 video g a m e trade s h o w in May. (2) Rather t h a n . o f f e r i n g a n e w edition of the s a m e thing, they w a n t to o f f e r n e w ways of g a m e playing. (3) Sony and M i c r o s o f t are also e x p e c t e d to launch their n e w c o n s o l e s next year. Sates s l u m p (4) The G a m e C u b e has b e e n s t r u g g l i n g d u e to competition from S o n y ' s PlayStation 2 and M i c r o s o f t ' s Xbox. (5) Nintendo had h o p e d to sell six million consoles over the past year, but it fell short, only s h i p p i n g five million. In the c o m i n g 12 m o n t h s it a i m s to sell 4.5 million. (6) Disappointing G a m e C u b e sales h a v e hit N i n t e n d o ' s b o t t o m line, w i t h net profits falling by 5 0 % , a c c o r d i n g to t h e company's annual results. (7) In the US, sales h a v e s l u m p e d , with the G a m e C u b e m a k i n g up j u s t 17% of the market, a c c o r d i n g to analysts N P D . (8) Looking to the future, N i n t e n d o has set s o m e a m b i t i o u s s a l e s targets f o r its n e w dual-screen h a n d h e l d g a m e s console. (9) Nintendo said it was h o p i n g to sell 3.5 million DS consoles, w h i c h is d u e out in Japan by the end of the year, and in Europe and US in early 2005. (10)
(226 words) 2. Bitter pill for 'cyberchondriacs' The net is h a v i n g a p r o f o u n d e f f e c t on m e d i c i n e , as in all fields, not least because r e s e a r c h e r s in medical labs can s h a r e research with colleagues around the w o r l d . ( I ) T h e r e are t h o u s a n d s of websites c l a i m i n g to be able to d i a g n o s e and c u r e illnesses o n l i n e , but there are c o n c e r n s about h o w much the i n f o r m a t i o n provided can be trusted. (2) Although a physical a p p o i n t m e n t w i t h a GP might p r o v i d e a quick diagnosis and prescription, m a n y feel it is not long enough to get e n o u g h i n f o r m a t i o n a b o u t health p r o b l e m s . (3) The net is providing m a n y with w h a t they want, and this is c r e a t i n g a g r o w i n g breed of so-called c y b e r c h o n d r i a c s . (4) A survey by the Health on the N e t F o u n d a t i o n f o u n d that about 5 0 % of people used the net to get a s e c o n d opinion. (5) Just over half of patients w h o d i s c u s s e d the results of net s e a r c h e s with their doctors f o u n d the consultation m o r e constructive. (6) More harm than good? However, s e l f - d i a g n o s i s o v e r the net can be a real m i n e f i e l d . The information can c a u s e c o n f u s i o n and u n n e c e s s a r y a l a r m . (7) T h e r e are h u n d r e d s of u n s c r u p u l o u s sites which exist purely to m a k e money. "The concept of d i a g n o s i s is that y o u e n g a g e in a consultation, and m a y b e investigations, with a p r o f e s s i o n a l , and after that you then agree upon a d i a g n o s i s . " (8) T h e consultation is rather o n e - s i d e d , and patients o f t e n do not k n o w w h o they are talking to or what their m o t i v e s are. In m a n y cases, it d o e s not take l o n g to find out. (9) What surfers are likely to get for t h e m o n e y could be inaccurate, false or unreliable information, and sites often cover themselves by with an a d v i c e line like, "if you're worried you s h o u l d go and see y o u r doctor". (10)
(290 words) http://news.bbc.co.Uk/2/lii/technology/3736653.stm
Health websites no threat to CPs C P s n e e d not h e o v e r l y w o r r i e d u h e n ( h e i r p a t i e n t s look t o t h e i n t e r n e t f o r i n f o r m a t i o n , a c c o r d i n g t o r e s e a r c h . ( ! ) University of York r e s e a r c h e r s spoke to parents in 358 h o u s e h o l d s w h e r e o n e or m o r e child had a chronic d i s e a s e T h e y found the c h i l d r e n ' s p a r e n t s said the internet w a s a u s e f u l s o u r c e of additional i n f o r m a t i o n . (2) But parents said it did n o t u n d e r m i n e their faith in health p r o f e s s i o n a l s - or in their children's m e d i c i n e s - a n d s e l d o m led to c h a n g e s in t r e a t m e n t . (3) Lead r e s e a r c h e r said: " P a t i e n t s don't use the internet in isolation; t h e y add it to routine s o u r c e s of i n f o r m a t i o n s u c h as family. friends, b o o k s , m a g a z i n e s and other media. (4) "Our findings also s u g g e s t that people are sensible about what they find online and there is not necessarily a need for an e x t e n s i v e s y s t e m to g u a r a n t e e the quality of e-hcallh i n f o r m a t i o n . (5) " H a v i n g said this, we also found that p e o p l e appreciated h a v i n g w e b s i t e s r e c o m m e n d e d by health p r o f e s s i o n a l s . " (6) T h e York t e a m s u r v e y e d 3 5 8 h o u s e h o l d s with children and c a r r i e d o u t f o l l o w - u p i n t e r v i e w s with 69 p a r e n t s a n d 16 children. (7) T h e f i n d i n g s s h o w e d m o s t p e o p l e had a high degree of trust for health p r o f e s s i o n a l s , and that medical r e g i m e n s w e r e rarely altered as a result of net i n f o r m a t i o n (S) T h e y also d e m o n s t r a t e d that most p e o p l e w e r e cautious about the potential d a n g e r s of health i n f o r m a t i o n on the internet, a l t h o u g h they w e r e c o n v i n c e d they could differentiate b e t w e e n v a l u a b l e i n f o r m a t i o n and 'rubbish'. (9) T h e data s u g g e s t that p a t i e n t s think o n l y 'other people' m a y be m i s l e d by s u s p e c t health i n f o r m a t i o n . " (10)
(259 words) http://news.bbc.co.Uk/2/hi/health/3703465.stm
Apple tackles Mac security flaw A p p l e u s e r s h a v e b e e n u p d a t i n g t h e i r s o f t w a r e t o close a s e c u r i t y hole w h i c h c o u l d , i n t h e o r y , e x p o s e t h e i r c o m p u t e r s t o a t t a c k . (1) On Friday, A p p l e w a r n e d of a f l a w in its Safari w e b b r o w s e r w h i c h could a l l o w m a l i c i o u s c o d e to be run on a m a c h i n e without a user's p e r m i s s i o n . (2) But security firm S e c u n i a s a i d there w e r e still what it called " c r i t i c a l " holes in the OS X o p e r a t i n g s y s t e m . (3) M a c s h a v e a reputation f o r h a v i n g f e w e r security p r o b l e m s than W i n d o w s P C s . This is the s e c o n d t i m e this m o n t h that there have been w a r n i n g s of holes in A p p l e ' s s o f t w a r e . (4) 'Better than most' In a s t a t e m e n t , A p p l e s p o k e of a "theoretical v u l n e r a b i l i t y " in its s o f t w a r e , u r g i n g users of its OS X o p e r a t i n g s y s t e m to install a security p a t c h . (5) A p p l e takes security v e r y s e r i o u s l y a n d w o r k s quickly to a d d r e s s potential threats as we l e a m of t h e m . (6) " W h i l e n o o p e r a t i n g s y s t e m can b e c o m p l e t e l y i m m u n e f r o m all security issues, M a c O S X's U N I X - b a s e d architecture has so far turned out to be m u c h better than m o s t , " (7) " F r o m the b e g i n n i n g , A p p l e has d o w n p l a y e d this issue," said S e c u n i a chief e x e c u t i v e officer. (8) Apple fans h a v e long touted the benefits of the M a c , partly d u e to the relative i m m u n i t y of the m a c h i n e s to the security holes and viruses that p l a g u e W i n d o w s - b a s e d c o m p u t e r s . (9) M i c r o s o f t ' s d o m i n a n c e of the w o r l d of c o m p u t i n g and its p o o r security record m a k e s it an attractive target for virus writers. (JO)
(250 words) http://news.bbc.co.Uk/2/hi/technology/3741871.stni
One Small Step in Uphill Fight as Linux Adds a Media Player (1) By STEVE L O U R G N U Linux, the free c o m p u t e r operating s y s t e m , has had far m o r e s u c c e s s in w i n n i n g c o n v e r t s 111 corporate data centers than on d e s k t o p personal c o m p u t e r s . (2) But as m o r e u s e r - f r i e n d l y s o f t w a r e m a k e s its w a y onto the Linux desktop, the free operating system is s t a r t i n g to m a k e p r o g r e s s in its D a v i d - v s . - G o l i a t h c o m p e t i t i o n against Microsoft, the d o m i n a n t p o w e r in PC s o f t w a r e . (3) Another step in the p r o g r e s s of Linux m personal c o m p u t e r s will c o m e today, w h e n t w o large Linux distributors, Red I Iat and Novell, are expected to a n n o u n c e that they will ship the media-playing s o f t w a r e of RealNetworks in their Linux desktop products. (4) R e a l N e t w o r k s , f o u n d e d by R o b Glaser, w a s the early leader in s o f t w a r e f o r p l a y i n g digital music and video files sent o v e r the Internet. Its m e d i a - p l a y i n g s o f t w a r e c o m p e t e s with M i c r o s o f t ' s W i n d o w s M e d i a Player. (5) T h a t rivalry has b e c o m e an antitrust issue, and the European C o m m i s s i o n ruled in M a r c h that M i c r o s o f t was illegally using its W i n d o w s m o n o p o l y in PC o p e r a t i n g s y s t e m s to try to c o n t r o l the m a r k e t f o r m e d i a - p l a y i n g s o f t w a r e . (6) T h e commission ordered M i c r o s o f t to offer a version of W i n d o w s without a media player - a ruling Microsoft is appealing. (7) Yesterday, the E u r o p e a n C o m m i s s i o n a g r e e d not to e n f o r c e a d e a d l i n e of t o d a y that w o u l d have f o r c e d M i c r o s o f t to sell the u n b u n d l e d version in E u r o p e , while a court in L u x e m b o u r g c o n s i d e r s the matter. (8) R e a l N e t w o r k s had p r e v i o u s l y reached distribution a g r e e m e n t s with T u r b o L i n u x , w h i c h is strong in Asian markets, and Sun M i c r o s y s t e m s , w h o s e J a v a desktop s o f t w a r e runs on Linux. (9) " L i n u x is m a k i n g rapid p r o g r e s s on the d e s k t o p , and this m a k e s o u r technology t h e de facto standard for m e d i a - p l a y i n g s o f t w a r e on L i n u x , " said D a n S h e e r a n , a senior vice president at R e a l N e t w o r k s . (10)
(280 words)
6.
An Advance in Digital TV Is Coming. Why Isn't Anybody Excited? By KEN B E L S O N (I) Nothing, it seems, c o m e s e a s i l y w h e n cable p r o v i d e r s a n d electronics c o m p a n i e s c o n v e r g e . (2) C a b l e c o m p a n i e s have a f e d e r a l m a n d a t e , starting T h u r s d a y , to p r o v i d e c o n s u m e r s with a n e w way to get digital and highdefinition television p r o g r a m s without h a v i n g to pay for a s e p a r a t e digital set-top box. (3) As part of the g o v e r n m e n t ' s long-term goal of creating an entirely digital b r o a d c a s t universe, the plan requires that cable providers distribute c a b l e c a r d s - each a b o u t the size of s e v e r a l credit cards s t a c k e d - that can be p l u g g e d into slots on n e w television sets for a c c e s s to encrypted digital p r o g r a m m i n g . (4) S t a r t i n g T h u r s d a y , at least h a l f of all t e l e v i s i o n s that a r e 36 i n c h e s or larger w i l l h a v e to i n c l u d e a s l o t f o r a c a b l e card. (5) In addition to e l i m i n a t i n g c l u n k y set-top b o x e s , t h e c a b l e card t e c h n o l o g y is m e a n t to help bolster television sales and motivate c o n s u m e r s to sign up f o r digital services. But the reality m a y be quite d i f f e r e n t . (6) T h e cable cards, unlike s e t - t o p boxes, p r o v i d e only o n e - w a y signals: f r o m t h e c a b l e provider to c u s t o m e r s ' h o m e s . C o n s u m e r s with televisions that use the cards will not be able to receive video on d e m a n d , interactive p r o g r a m guides and other services that require t w o - w a y signals. (7) This significant d r a w b a c k m e a n s that people with set-top b o x e s m a y be unlikely to s w i t c h . (8) Television m a k e r s are hoping that the cable card option will be attractive to the roughly 50 million c a b l e c u s t o m e r s w h o do not s u b s c r i b e to digital p r o g r a m s and are l o o k i n g f o r an easy w a y to receive digital services. (9) But m o s t analysts are skeptical that the m a r k e t will e m b r a c e the t e c h n o l o g y . ( 1 0 )
(2HO words) http://www.ny times.com/2004/06/28/technology/28cable.htinl?pagewanted=print&position=
2.
Bill to Curb Online Piracy Bill t o C u r l ) O n l i n e P i r a c y I s C h a l l e n g e d a s l o o B r o a d ( ! ) A copyright hill i n t r o d u c e d in the Senate this w e e k is f a c i n g criticism from g r o u p s including representatives of the t e l e c o m m u n i c a t i o n s and electronics industries, (2) w h o c o n t e n d it could m a k e c o m p u t e r c o m p a n i e s , Internet p r o v i d e r s and o t h e r t e c h n o l o g y b u s i n e s s e s liable for online piracy. (3) But s u p p o r t e r s of the bill, including its bipartisan sponsors, say it w o u l d provide a p o w e r f u l tool to c u r b illegal c o p y i n g of m u s i c files and o t h e r m e d i a , (4) a n d w o u l d protect children f r o m the lure of a technology that is intended to help them break the law. (5) The legislation, introduced late Tuesday, is the so-called induce bill, which would m a k e liable a n y o n e w h o "intentionally aids, abets, induces or p r o c u r e s " a c o p y r i g h t violation. (6) It is a i m e d primarily at the m a k e r s of file sharing s o f t w a r e , which is u s e d to trade c o p i e s of digital files o v e r the Internet. (7) But critics say that the bill's l a n g u a g e is overly broad, and that it a m o u n t s to a f u n d a m e n t a l u n r a v e l i n g of a 1984 S u p r e m e Court decision (8) that has protected companies developing otherwise legal technologies that could be abused by users. (9) "It's a very p o w e r f u l i n s t r u m e n t that can be used to threaten a n d intimidate industries that copyright o w n e r s disagree w i t h . " (10)
(210 words) http://www.ny times.coni/2004/06/24/technology/24copyright.html?pagewanted=print&position=
8.
Web Marketers Get Personal By BOB TEDESCHI IN the 2 0 0 2 m o v i e " M i n o r i t y R e p o r t , " the character played by T o m Cruise, J o h n A n d e r t o n , darted through a city in which electronic billboard a d v e r t i s e m e n t s s p o k e t o h i m b y n a m e . ( I ) T h e next w a v e of I n t e r n e t advertising could m a k e J o h n A n d e r t o n s of us all. (2) Starting next w e e k , a h a n d f u l of m a r k e t e r s in the United States will begin s e n d i n g c u s t o m i z e d ads to Internet u s e r s w h o land on A b o u t . c o m , L y c o s a n d n y t i m e s . c o m , a m o n g other W e b sites. (3) So, instead of s e e i n g a r a n d o m a d v e r t i s e m e n t for the A u d i o Book C l u b or the e-travel agencies Orbitz and Priceline, you might see ads addressing you by name, mentioning s o m e of your past p u r c h a s e s at the site a n d urging you to return. (4) ( T h e idea s o u n d s s p o o k i e r than it is. O n l y t h o s e who h a v e a g r e e d to receive electronic m e s s a g e s f r o m c o m p a n i e s they h a v e d o n e business w i t h will s e e the ads.) (5) Analysts and industry executives say this n e w approach offers online sellers a new and inexpensive way to retain customers they have spent h e a v i l y to a c q u i r e . (6) In recent years, m a r k e t e r s h a v e m a i n l y u s e d e - m a i l m e s s a g e s to p e r s u a d e users to return, (7) but s p a m filters n o w block m a n y legitimate c o m m e r c i a l e - m a i l m e s s a g e s and s p a m - w e a r y c o n s u m e r s are less inclined to o p e n c o m m e r c i a l m e s s a g e s that m a k e it to their i n - b o x e s . (8) The c o m p a n y behind the n e w ads, Dotomi, is the brainchild of Yair Goldfinger, who created the technology thai eventually b e c a m e A O L ' s i n s t a n t m e s s a g i n g s e r v i c e . (9) A c c o r d i n g t o J o h n F e d e r m a n , D o t o m i ' s c h i e f e x e c u t i v e a n d t h e f o r m e r publisher of P C W e e k , Mr. G o l d f i n g e r d e v e l o p e d D o t o m i ' s " d i r e c t m e s s a g i n g " s y s t e m as a kind of c o m m e r c i a l a n a l o g to instant m e s s a g i n g . (10)
(260 words) http://wwwjiYtinR»s.com/2004/06/28/technolo«y/28econi.html?pagewanted=print&position=
9.
Despite an Act of Leniency, China lias Its Eye on the Web (I) IU H O W A R D W. F R E N C H A Chinese court recently a n n o u n c e d that an Internet d e m o c r a c y advocate chaiged with subversion would gel a suspended s e n t e n c e instead of a long prison t e r m , (2) with the c a s e d r a w i n g criticism from h u m a n rights g r o u p s and serving as a cry loi this country's g r o w i n g n u m b e r of online c o m m e n t a t o r s . (3) Both in C h i n a and a b r o a d , s o m e c o m m e n t a t o r s q u i c k l y a p p l a u d e d w h a t s e e m e d like an official s h o w of leniency lowaul the accused m a n . Du D a o b i n , (4) a prolific a u t h o r of o n l i n e essays on issues of d e m o c r a c y a n d free s p e e c h . (5) But many a m o n g China's rapidly g r o w i n g group of Internet commentators are warning that what appears to be government m a g n a n i m i t y in this high-profile case conceals a quiet but concerted push to tighten controls of the Internet and surveillance of its users. (6) Internet c a f e users in C h i n a h a v e long been s u b j e c t to an e x t r a o r d i n a r y range of controls. T h e y i n c l u d e c a m e r a s placed discreetly throughout the e s t a b l i s h m e n t s to m o n i t o r and identify users (7) and W e b masters. Internet c a f e m a n a g e r s keep an e y e on user activity, w h e t h e r electronically or by patrolling the p r e m i s e s . (S) T h e a v e r a g e Internet user, m e a n w h i l e , neither sees nor, in m a n y cases, suspects the activities of a force w i d e l y estimated to n u m b e r as m a n y as 3 0 , 0 0 0 Internet p o l i c e o f f i c e r s . (9) T h e C h i n e s e g o v e r n m e n t has a l s o established a W e b site w h e r e p e o p l e are able to report f e l l o w W e b users for suspicious or provocative behavior. (10)
(242 words)
10.
For Liars and Loafers, Cellphones Offer an Alibi B> M A T T R I C H T E L C e l l p h o n e s are c h o c k - f u l l of f e a t u r e s like built-in c a m e r a s , personalized ring t o n e s a n d text m e s s a g i n g . (1) T h e y also g a v e a real boost to K e n n y Hall's e f f o r t to cheat on his girlfriend. (2) Mr. Hall, a 20-year-old c o l l e g e student in D e n v e r , d e c i d e d in M a r c h to spend a w e e k e n d in n e a r b y B o u l d e r with another w o m a n . (3) He turned to his c e l l p h o n e for help, s e n d i n g out a text m e s s a g e to h u n d r e d s of o t h e r cellphone users in an "alibi and excuse c l u b , " a n e t w o r k of 3 , 4 0 0 s t r a n g e r s w h o help each other skip w o r k , get out of dates or give a loved o n e the slip. (4) A s s i s t a n c e c a m e instantly. A c l u b m e m b e r , on r e c e i v i n g Mr. Hall's m e s s a g e , a g r e e d to call the g i r l f r i e n d (5) He pret e n d e d xo be the s o c c e r c o a c h f r o m the U n i v e r s i t y of C o l o r a d o at B o u l d e r a n d said t h a t Mr. Hall w a s n e e d e d in t o w n for a try out. (6/ "It w o r k e d out pretty g o o d , " said Mr. Hall, w h o s i g n e d up for the n e t w o r k on w w w . s m s . a c , a W e b site that offers access to h u n d r e d s of m o b i l e chat r o o m s . (7) C e l l p h o n e s are usually u s e d to help p e o p l e k e e p track of each other and stay in easy contact. B u t they are also starting to take on quite a d i f f e r e n t f u n c t i o n - h e l p i n g users h i d e their w h e r e a b o u t s , create alibis and g e n e r a l l y excuse their bad behavior. (8) A n o t h e r n e w tactic is the use of a u d i o r e c o r d i n g s that c a n be p l a y e d in the b a c k g r o u n d d u r i n g a p h o n e conversation to falsify the caller's w h e r e a b o u t s . (9) P h o n e s can be e q u i p p e d to play, at the press of a button, the s o u n d s of honking horns, a m b u l a n c e sirens or a dentist's drill. (10)
(270 words) http://www.nytimes.com/2004/06/26/technology
1 in ther 10 Passages lor Translation Practice We are providing 10 more passages of similar length. The lexis have been devided into 10 units to help you with the teacher evaluation. Remember that each unit is worth 2 points, (no reference in K.HY!)
T h e n u m b e r of s o n g s sold via E u r o p e ' s biggest m u s i c d o w n l o a d sites has increased tenfold o v e r the past year. ( ! ) M o r e than a million d o w n l o a d s h a v e b e e n s o l d via sites s u c h as F r e e s e r v e , M S N and M y c o k e m u s i c f r o m J a n u a r y - M a r c h - 10 times up on the s a m e period in 2 0 0 3 . (2) O D 2 . the firm that p r o v i d e s the d o w n l o a d s , said Outkast's Hey Ya! w a s the most p o p u l a r s o n g in the U K . (3) It said it proved there w a s d e m a n d f o r a " d e c e n t , legal alternative to p o o r quality illegal peer-to-peer n e t w o r k s " . (4) M u s i c f a n s are d o w n l o a d i n g a w i d e r a n g e o f s o n g s , with t h e top 100 d o w n l o a d s a c c o u n t i n g f o r j u s t 11% o f s a l e s , t h e c o m p a n y said. (5) T h i s contrasts with CD single sales, w h e r e the top 100 CD singles account for 7 7 % of total CD singles sales. (6) " T h i s indicates that O D 2 ' s legal d o w n l o a d sites are i n t r o d u c i n g m u s i c - l o v e r s to all k i n d s of n e w types of m u s i c , " said O D 2 chief e x e c u t i v e C h a r l e s G r i m s d a l e . (7) M e a n w h i l e , a report by r e s e a r c h e r s at H a r v a r d and North Carolina Universities has s u g g e s t e d that s w a p p i n g songs online has had no n e g a t i v e e f f e c t on m u s i c sales. (8) T h e report said high levels of file-swapping had an effect on CD sales that was " i n d i s t i n g u i s h a b l e f r o m zero". (9) It also suggests that a l b u m p u r c h a s e s e x p e r i e n c e d a peak in the 1990s as music fans r e p l a c e d their vinyl collections with CDs
(10)
(224 words) http://news.bbc.co.Uk/l/hi/entertainment/music/3590777.stm
C h i n a is tightening controls on o n l i n e v i d e o g a m e s . (J) It has set up a c e n s o r s h i p c o m m i t t e e to m o n i t o r g a m e s f o l l o w i n g the banning of a S w e d i s h g a m e called H e a r t s of Iron, which portrayed M a n c h u r i a , Tibet and X i n j i a n g as i n d e p e n d e n t nations. (2) A p r e v i o u s N o r w e g i a n g a m e , P r o j e c t IG12: C o v e r t Strike, incensed o f f i c i a l s for its portrayal of the C h i n e s e army. (3) T h e c o m m i t t e e is c h a r g e d with b a n n i n g content that " c o u l d threaten national unity", said the state press. (4) Future imports " O n l i n e g a m e s with c o n t e n t threatening state security, d a m a g i n g the nation's glory, d i s t u r b i n g social order and infringing on other's legitimate rights will also be prohibited," said a C h i n e s e Ministry of Culture s t a t e m e n t carried by the official X i n h u a n e w s agency. (5) In f u t u r e only the d i s k s of o n l i n e g a m e s that are a u t h o r i s e d by the Ministry of Culture can be imported. (6) G a m e s c u r r e n t l y i n C h i n a m u s t b e e x a m i n e d b y the c o m m i t t e e b e f o r e 1 S e p t e m b e r o r t h e g a m e o p e r a t o r s will face p u n i s h m e n t the s t a t e m e n t said. (7) M e m b e r s of the s c r e e n i n g c o m m i t t e e i n c l u d e teachers, university scholars, foreign a f f a i r s o f f i c i a l s , information industry e n g i n e e r s and m e m b e r s of the N a t i o n a l C o m m i t t e e of the C h i n e s e People's Political C o n s u l t a t i v e C o n f e r e n c e . (8) Sex a n d v i o l e n c e T h e r e are in e x c e s s of 140 o n l i n e g a m e s in C h i n e s e m a r k e t s at the current time, with m o r e than 8 0 % of those foreign. (9) " T h e Ministry o f C u l t u r e will i m p o r t s o m e foreign online g a m e s w h o s e contents a c c o r d with C h i n e s e national conditions and bring positive e f f e c t s to y o u n g p e o p l e ' s mentality." (10)
(24(1 words) http://iiews.bbc.co.Uk/l/lii/technology/3766023.stni
A pesky computer virus is taking advantage of the excitement surrounding the latest H a m Potter film. (I) The N e t s k y . P w o r m is e n j o y i n g a resurgence by disguising itself as a Potter g a m e , say anti-virus experts. (2) T h e virus, w h i c h first a p p e a r e d t o w a r d s the end of M a r c h , s p r e a d s by e - m a i l and via file-sharing services. (3i T h e third film about the a d v e n t u r e s of the b o y wizard, Harry Potter and the P r i s o n e r of A z k a b a n . w a s released on M o n d a y , m a k i n g £ 5 m in o n e day. (4) Celebrity tricks A c c o r d i n g to anti-virus firm S o p h o s , Netsky.P w a s the s e c o n d most c o m m o n virus in May, topped only by the i n f a m o u s S a s s e r w o r m . (5) It n o w s e e m s to be p i c k i n g up s t e a m again, w i t h S o p h o s s a y i n g it had spotted t h o u s a n d s of c o p i e s of it in the last fewdays. (6) Netsky.P, which only affects Microsoft W i n d o w s PCs, relies on tricking a c o m p u t e r user into clicking on an infected file. (?) Virus w r i t e r s h a v e i n c r e a s i n g l y used the n a m e s of c e l e b r i t i e s to try to m a k e p e o p l e o p e n an e - m a i l and u n l e a s h its m a l i c i o u s p a y l o a d . (S) Past c o p i e s o f N e t s k y . P h a v e m a s q u e r a d e d a s n u d e p h o t o s o f B r i t n e y S p e a r s , E m i n e m M P 3 m u s i c files and illegal s o f t w a r e . (9) " E c h o i n g a t e c h n i q u e u s e d in 2 0 0 0 by the P i k a c h u w o r m , N e t s k y . P targets y o u n g c o m p u t e r users by s o m e t i m e s p o s i n g as content c o n n e c t e d with t h e H a r r y Potter b o o k s a n d m o v i e f r a n c h i s e , " said G r a h a m Cluley, senior technology consultant at S o p h o s . (10)
(232 words) http://news.bhc.co.Uk/l/hi/technology/3773443.stm
UK music fans have legally downloaded more than 500,000 songs so far this year, industry figures show. (I) T h e biggest-selling d o w n l o a d of the year to d a t e is C o l d p l a y ' s 2 , 0 0 0 Miles, j u s t a h e a d of O u t K a s t ' s Hey Ya!. (2) The h a l f - a - m i l l i o n b a r r i e r w a s b r o k e n j u s t a w e e k a f t e r t h e U K l a u n c h o f N a p s t e r , w h o s e s a l e s a r e not i n c l u d e d i n the figures. (3) The British P h o n o g r a p h i c I n d u s t r y ' s (BPI) figures also reveal that the cassette s i n g l e has died as a format. (4) In the first quarter of 2003, £ 4 1 8 , 0 0 0 w o r t h of cassette singles w e r e sold - b u t there w e r e no s h i p m e n t s in the first three m o n t h s of this year. (5) The lack of s h i p m e n t s " e f f e c t i v e l y m a r k e d t h e d e m i s e of the f o r m a t " , said the BPI. But the UK m u s i c industry will be b u o y e d by the growth in legal d o w n l o a d s . T h a t market was practically non-existent this l i m e last year. (6) B P I c h a i r m a n Peter J a m i e s o n s a i d : " W i t h 5 0 0 , 0 0 0 legal d o w n l o a d s s o l d a l r e a d y this year, w e h a v e hit yet a n o t h e r m i l e s t o n e in the d e v e l o p m e n t of this exciting n e w m a r k e t for m u s i c . " (7) "This is s h a p i n g up to be a b r e a k t h r o u g h y e a r f o r the m u s i c i n d u s t r y . " The first quarter of 2 0 0 4 also s a w a 4 7 . 8 % rise in the sales of vinyl 7-inch singles. (8) But C D s i n g l e s a l e s d r o p p e d b y a l m o s t a third o n the s a m e p e r i o d last y e a r , w h i l e C D a l b u m s a l e s w e r e d o w n a l m o s t 3 % . (9) The B P I said the small d e c l i n e in CD a l b u m s a l e s w o u l d " c o m e as a relief in an industry w h i c h has seen double digit declines in s o m e m a j o r m a r k e t s " . (10/
(25'S words) http://news.bbc.co.Uk/l/hi/entertainment/mnsic/3769365.stm
M
I he smoke alarm has beaten the digital camera, mobile phone and the microwave oven (I) in
) T h e first b a t t e r y - o p e r a t e d h o m e s m o k e d e t e c t o r w a s p a t e n t e d i n the U S i n 1 % 9 b y R a n d o l p h S m i t h a n d K e n n e t h House
(4i
Almost two-thirds of r e s p o n d e n t s put the m o b i l e p h o n e m then lop 10 innovations. T h e c o n v e n i e n c e of the m i c r o w a v e o v e n a p p e a l e d to many, w i n n i n g o v e r half the votes (5) A n d the h u g e g r o w t h in digital p h o t o g r a p h y in recent years has clearly p l a y e d well for the c a m e r a w h i c h c a m e fourth in the list
(6)
Scientific and t e c h n o l o g i c a l b r e a k t h r o u g h s in the s h a p e of D N A testing and laser e y e - s u r g e r y c a m e m fifth and sixth. (~< G a d g e t s such as M P 3 players, w h i c h in other lech polls h a v e proved popular, c a m e n o w h e r e in the vote. (S) " B y f a v o u r i n g the s m o k e a l a r m , Brits h a v e opted for an innov ation that f u l f i l s o n e of o u r most basic a n d primal needs • s a f e t y in the h o m e , " c o m m e n t e d P r o f e s s o r Harrison, the report a u t h o r a n d chair of d e s i g n at Brunei University. (9) C o n v e n i e n c e was a l s o a f a c t o r in the nation's c h o i c e T h e m i c r o w a v e o v e n , cash and debit c a r d s and long-life light bulb.-, w e r e all l a b o u r - s a v i n g d e v i c e s that m a d e it into t h e top 10. (10)
¡250 words! http://news.bbc.co.Uk/l/hi/technology/3770559.stm
Online newspapers tempt readers I'he n u m b e r of n e w s p a p e r w e b s i t e s a r o u n d the world has d o u b l e d since 1990, a s t u d y h a s f o u n d . T h e r e h a s been a t r e m e n d o u s b o o m in the c o n s u m p t i o n of online editions. (1) I'imothv Balding, director g e n e r a l o f World A s s o c i a t i o n o f N e w s p a p e r s said w e b a u d i e n c e s for n e w s p a p e r s h a v e grov\r by 3 5 0 % over the last five y e a r s . (2) H e w a s a d d r e s s i n g editors a n d e x e c u t i v e s from h u n d r e d s o f n e w s p a p e r s w h o are m e e t i n g for the society's annual congresin Istanbul this w e e k . Global circulation T h e past year w a s a c h a l l e n g i n g o n e for the world's n e w s p a p e r s , said Mr Balding. Total global circulation w a s d o w n slightly for the year in the 2 0 8 countries s u r v e y e d by the Paris-based association, u ii.. . represents 18.000 n e w s p a p e r s . (4) But o v e r the last f i v e y e a r s , n e w s p a p e r sales w o r l d w i d e w e n t u p b y 4 . 7 5 % . Well over o n e billion p e o p l e n o w read a n e w s p a p e r e v e r y day. (5) E u r o p e a n s arc b u y i n g f e w e r n e w s p a p e r s . Circulation fell in 13 of the 15 " o l d " E u r o p e a n U n i o n c o u n t r i e s , e x c l u d i n g n e w m e m b e r s w h o joined in M a y . T h e biggest d r o p w a s in Ireland, f o l l o w e d by the U K . (6) But a l t h o u g h sales h a v e d e c l i n e d i n m a n y m a t u r e m a r k e t s , s o m e d e v e l o p i n g m a r k e t s a r e still s t r o n g
N e w s p a p e r sale-
w e r e up by over 4% m C h i n a , the w o r l d ' s biggest market, and by an i m p r e s s i v e 9% in India. (7) Chin;-, has the largest total d a i l y c i r c u l a t i o n of any c o u n t r y in the world, with m o r e than 85 million c o p i e s sold, follow ed by India. Japan and the U S A . (S) In Russia, the n u m b e r of d a i l i e s p u b l i s h e d has a l m o s t d o u b l e d in t w o years. (9) T h e g r o w t h in n e w f r e e c o m m u t e r dailies is also e x p a n d i n g the reach of the written press to a y o u n g e r generation, said the association's T i m o t h y B a l d i n g . (10) (2SO
words)
http://news.bbc.co.Uk/l/hi/technology/3767267.stm
7.
Virtual real estate boom draws real dollars N E W Y O R K ( R e u t e r s ) -- Rising interest rates h a v e yet to cool w h i t e - h o t real estate prices. ( I ) P e r h a p s that's w h y the c o n c e p t of \ irtual h o m e o w n e r s h i p has captured the imagination of a g r o w i n g n u m b e r of online g a m e r s , w h o are p l u n k i n g d o w n real cash for their o w n slice of the digital frontier. (2) Large s w a t h e s of u n d e v e l o p e d online property, s o m e b e a r i n g an u n c a n n y r e s e m b l a n c e to a p a l m - s t u d d e d West Coast b e a c h f r o n t idyll, are selling for up to S550 an acrc. (3) I'liat a m o u n t is but a s o n g c o m p a r e d with real world real estate, but these are c o m p u t e r i z e d r e p r e s e n t a t i o n s of p r o p e r t y pretty pictures, if y o u will - in an online g r a p h i c r o l e - p l a y i n g g a m e k n o w n as " S e c o n d Life." (4) " T h e idea of land o w n e r s h i p and the ease with w h i c h you can o w n land and do s o m e t h i n g wilh i t . . . is i n t o x i c a t i n g , " said Philip Rosedale, C E O of " S e c o n d L i f e " creator, San F r a n c i s c o - b a s e d Linden Labs. (5) "Sccond Life" is a relatively n e w entry into the world of M a s s i v e l y Multiplayer O n l i n e g a m e s , k n o w n lo e n t h u s i a s t s as M M O s . ( f t ) Like S o n y Corp.'s " E v e r Q u e s t " and Electronic Arts' " T h e S i m s O n l i n e , " players create their o w n civilizations and interact with o t h e r s living alternative lives online. (7) Stalling a " s c c o n d l i f e " costs S9.95 a m o n t h and requires a d o w n l o a d at the g a m e ' s W e b site and a fairly p o w e r f u l M a e or W i n d o w s - b a s e d c o m p u t e r , (8) Current players arrange w e l c o m i n g parties for n e w b i e s and o f t e n help point t h e m toward plots available, for virtual h o m e s t e a d i n g . (9) T h e " S e c o n d L i f e " w o r l d is a little over a year old, b u t in its accelerated e c o s y s t e m , w h e r e p l a y e r s fly a n d don't waste t i m e eating or g o i n g to t h e b a t h r o o m , a c o m m e r c i a l society has quickly emerged... (10)
(280 words) http://wwvv.cnn.eom/2004/TECH/fun.games/06/03/coluinn.livewire.reut/iiidex.lituil
S. 'Toxic dust' on computers linked to diseases (I) S A N F R A N C I S C O - " T o x i c dust" f o u n d on c o m p u t e r p r o c e s s o r s a n d m o n i t o r s contains c h e m i c a l s linked to reproductive and neurological disorders, according to a n e w study by several e n v i r o n m e n t a l groups. (2) T h e survey, released Thursday by Silicon Valley Toxics Coalition, C o m p u t e r T a k e B a c k C a m p a i g n and C l e a n Production A c t i o n , is a m o n g the first to identify b r o m i n a t e d f l a m e retardants on the surfaces of c o m m o n d e v i c e s in h o m e s and offices. (3) Electronics c o m p a n i e s began using p o l y b r o i n i n a t e d d i p h e n y l ( P B D E s ) and other flame retardants in the 1970s, arguing that the toxins p r e v e n t fires and cannot e s c a p e f r o m plastic casings. (4) " T h i s will be a great surprise to e v e r y o n e w h o uses a c o m p u t e r , " said Ted Smith, director of the Toxics C o a l i t i o n . (S) " T h e c h e m i c a l i n d u s t r y is s u b j e c t i n g us all to w h a t a m o u n t s to c h e m i c a l t r e s p a s s by p u t t i n g t h e s e s u b s t a n c e s into use in c o m m e r c e . (6) T h e y c o n t i n u e to use their c h e m i c a l s in w a y s that a r e a f f e c t i n g h u m a n s and other s p e c i e s . " (7) R e s e a r c h e r s c o l l e c t e d samples of dust f r o m d o z e n s of c o m p u t e r s in eight states, including university c o m p u t e r labs in N e w York, M i c h i g a n a n d T e x a s , l e g i s l a t i v e o f f i c e s in C a l i f o r n i a , a n d an i n t e r a c t i v e c o m p u t e r d i s p l a y at a children's m u s e u m in M a i n e . (8) T h e y tested for three t y p e s of b r o m i n a t e d f l a m e retardants suspected to be h a z a r d o u s . (9) Penta- a n d o c t a - b r o m i n a t e d diphenyl will be taken o f f the m a r k e t by the end of the year. E n v i r o n m e n t a l groups are d e m a n d i n g legislation that would ban d e c a - b r o m i n a t e d diphenyl, too. (10)
(228 words) http://www.usatoday.coni/tech/news/2004-06-03-toxic-computer-dust_x.litni
til.
9.
Employee accused of selling stolen cell phones online (!) t . A F A Y E T T i : , La. (AP) - A f o r m e r cellular p h o n e c o m p a n y e m p l o y e e is facing c o m p u t e r fraud and theft charges for allegedly selling stolen cell p h o n e s on an Internet auction site. (2) Paul R i c h a r d C o o k . 30. of N e w Llano, w a s arrested T u e s d a y on 29 counts of c o m p u t e r fraud and o n e count of theft, a c c o r d i n g to Ll. C r a i g Stansbury. public i n f o r m a t i o n o f f i c e r for Lafayette Parish Sheriffs O f f i c e . (3) Cook had been an e m p l o y e e of C i n g u l a r W i r e l e s s in L a f a y e t t e w h e n he allegedly stole S500 w o r t h of p h o n e s f r o m the c o m p a n y , S t a n s b u r y said. (4) Stansbury said C o o k then sold the stolen phones on eBay. Cook also d e f r a u d e d s o m e wouldbe b u y e r s on eBay, failing to ship the p h o n e s a f t e r he h a d r e c e i v e d m o n e y , he said. (5) S o m e of the victims w e r e f r o m the area, S t a n s b u r y said. He s a i d he has seen an increase in f r a u d u l e n t t r a n s a c t i o n s over the Internet recently, and usually, the victims are out of luck b e c a u s e the perpetrator lives a c r o s s state or international lines. (6) " A n y t i m e you deal with e B a y or an Internet b u y i n g site, it's h a r d to track the perpetrator d o w n if you're the victim of a c r i m e . " S t a n s b u r y said. (7) S t a n s b u r y said he believed C o o k m a y h a v e started his s c a m late last year. Cook only faces o n e count of theft b e c a u s e the m e r c h a n d i s e all c a m e f r o m Cingular. S t a n s b u r y said he b e l i e v e d the p h o n e s could h a v e been stolen all at once. (8) He s a i d C o o k stole m o r e than S I 3 , 0 0 0 from C i n g u l a r a n d u n s u s p e c t i n g buyers. C o o k is being held on S 8 2 , 0 0 0 bond, with each count of fraud a c c o u n t i n g for a S2,500 bond. (9) S t a n s b u r y said C o o k w a s a l s o w a n t e d for t w o o u t s t a n d i n g w a r r a n t s in Baton R o u g e . (10)
(27/ words) http://\v>v>Y.usaloday.coin/tech/\vireless/p^^
10.
Two indicted for selling military cameras to China (!) S A N F R A N C I S C O - T w o Silicon Valley b u s i n e s s m e n h a v e b e e n indicted a f t e r prosecutors said they shipped sensitive military c a m e r a s to C h i n a . (2) A federal grand jury in San Jose indicted Philip C h e n g a n d Martin Shih on Wednesday on nine counts of m o n e y laundering, violating export code and other crimes. (3) T h e m e n , arrested in M a y after allegedly shipping night vision c a m e r a s to a research institute linked to the C h i n e s e military, f a c e at least 45 years in prison and fines up to S2 million each. (4) The i n d i c t m e n t s c o m e a m i d a broad c r a c k d o w n by the D e p a r t m e n t of H o m e l a n d Security, w h i c h has i n c r e a s e d ' s c r u t i n y over e x p o r t s since the 2001 terrorist attacks. (5) T h e a g e n c y ' s investigative a r m , I m m i g r a t i o n and C u s t o m s E n f o r c e m e n t (ICE), is p r o s e c u t i n g at least five s i m i l a r cases against p e o p l e w h o a l l e g e d l y shipped m i l i t a r y e q u i p m e n t - f r o m missile c o m p o n e n t s to m i c r o c h i p s - to C h i n a . (6) "Last m o n t h alone, our a g e n t s u n c o v e r e d t w o separate plots to s m u g g l e satellite and military h e l i c o p t e r c o m p o n e n t s to C h i n a , " s a i d M i c h a e l G a r c i a , a s s i s t a n t s e c r e t a r y f o r I C E . (7) " T h o s e s e e k i n g t o illegally a c q u i r e A m e r i c a ' s m i l i t a r y t e c h n o l o g y s h o u l d be on n o t i c e . " (8) P r o s e c u t o r s i n N e w H a v e n , C o n n . , unsealed a n i n d i c t m e n t i n M a y charging t w o South K o r e a n n a t i o n a l s with e x p o r t i n g military helicopter e n g i n e s to C h i n a . (9) A l s o last m o n t h , I C E a g e n t s in L o s A n g e l e s arrested t w o b u s i n e s s m e n on charges of c o n s p i r i n g to p u r c h a s e U.S. d e f e n s e articles, including satellite technology, for export to C h i n a . (10)
(228 words) http://www.usatoday.com/tech/world/2004-06-04-china-cams_x.htm?POE=TECISVA
3. rész - SZÓBELI I. FELADAT - Szakmai beszélgetés The questions listed here are identical to those included in Book One (Basic Level). In that book we have provided ideas and vocabulary related to the first ten questions. In this publication wc give you further ideas related to the second ten questions. The requirements of the intermediate level arc different in the following ways: • The examiner will ask the questions faster and applying a more elaborate lexis • The examinee is expected to answer at a faster speed and at a higher level with fewer grammatical inaccuracies • The examinee has to use a more elevated style, applying longer sentences and more complex grammatical structures • The examiner wants to get not only the facts but the examinee's opinion, including in certain cases his or her agreement or disagreement on the professional issues. 1. Tell us something about your studies. 2. When and how did you first come across IT and computers? 3. What do you use a computer for? 4. If you could choose an IT job, what would you choose and why? 5. Would you like to work abroad? Why or why not? 6. Do Hungarian IT experts make less money than people abroad? Why or why not? 7. Tell us something about word processing software. S. Why do you think the Windows Operation System has become the most popular OS in the world? What is a 'Window' in this sense? 9. What does a system administrator/programmer/helpdesk person/.. .do? 10. Why do you think data protection and safety are so very important? 11. How do you protect your data on your home computer? 12. What passwords do most people use and why? 13. What more does a computer 'know' if you compare it to a traditional typewriter? 14. What do you usually use the Internet for and why? 15. How can we learn with the help of the Internet? 16. What are the properties of a 'nice and successful' URL?(well chosen domain name, well designed website) 17. If you want to find a good job, where will you look for the job advertisements? Why? 18. What are databases used for? Have you ever used a database? 19. What is a good presentation like? What are presentations used for? 20. What is an 'applet' and how can you make one? 21. If you had a lot of money and you wanted to spend it on electronic gadgets, what would you buy and why? 22. Is there any electronic gadget you would love to have? What is it and why? 23. With how many people do you exchange emails and how do you manage your mails? 24. What do you do if you get an email from an unknown sender? Why? Do you always do the same? 25. If you could take a laptop and nothing else on a long holiday, what software would you install and why? 26. How do you get hold of new software? (For hints and sample questions see KEY)
6S
1!. FELADAT - S/.övcgcrtcs This tusk involves rending and talking about a shorter IT text. The candidate will be given some time to read it. Then they will have to sum it up in their own words. The examiner may ask some helping questions or tell the examinee to translate some underlined sentences. The following passages show you the whole process in the following way: 1. You can read the passage, in which you will find some underlined sentences. These are for translation practice. 2. After the text there are some questions. Find the answers by reading the text again. In the Key you will find the sample answers to the first five passages. 3. The next part is the sample summary. This can be found in the Key. Try to give a sample summary first and then check it in the Key. Of course yours may be a little different. What you can check is whether you have remembered all the main issues and whether your summary is not too long. Remember that it cannot be longer than half of the original! 4. The next part gives you the sample questions that already belong to 4. sz. FELADAT
1. A t i n y p r o t o t y p e f u e l cell t h e s i z e o f a t h u m b h a s b e e n d e v e l o p e d b y T o s h i b a . T h e J a p a n e s e electronics giant said the m e t h a n o l f u e l cell c o u l d p o w e r g a d g e t s s u c h as a digital m u s i c player for 20 hours. Fuel cells g e n e r a t e electrical p o w e r by c a t a l y s i n g s u b s t a n c e s ' such as h y d r o g e n and m e t h a n o l . Toshiba h o p e s that b y 2 0 0 5 , t h e f u e l cells c o u l d b e u s e d i n h a n d h e l d e l e c t r o n i c d e v i c e s instead o f l i t h i u m - i o n batteries. Size m a t t e r s Fuel cells h a v e been t o u t e d 1 as a g r e e n p o w e r s o u r c e for t h e f u t u r e as they p r o d u c e electricity by c o n v e r t i n g h y d r o g e n and o x y g e n into water. M a n y c o m p a n i e s a r e w o r k i n g o n d e v e l o p i n g the t e c h n o l o g y that c o u l d r e p l a c e c o n v e n t i o n a l batteries. The main obstacle has been m a k i n g the cells small and inexpensive. T h e prototype developed by Toshiba measures 22 millimetres by 45 millimetres (0.88 inches by 1.80 i n c h e s ) and w e i g h s 8.5 g r a m s ( 0 . 2 9 o u n c e s ) .
http://news.bbc.eo.Uk/2/hi/technology/3837585.stm Questions: 1. How big is this fuel cell and how long can gadgets be powered by one? 2. What will these cells replace? 3. What kind of gadgets will they be used in? 4. How do these cells produce electricity? FURTHER Questions to talk about; 1. Can you think of high tech methods or new ways of producing electric power without further polluting our environment or using up our limited resources? 2. There is a tendency for manufacturers to produce smaller and smaller gadgets and electronic devices. Have you heard about nanotechnology? What do you know about it?
H o t m a i l i s b o o s t i n g t h e a m o u n t o f s t o r a y e s p a c e f o r u s e r s o f b o t h its f r e e a n d p a i d e - m a i l s e r v i c e . F r o m J u l y the basic H o t m a i l a l l o w a n c e will b e b o o s t e d t o 2 5 0 M B and p a v i n g c u s t o m e r s will pet t w o gigabytes. T h e m o v e is w i d e l y seen as a r e s p o n s e to G o o g l e ' s G M a i l service w h i c h g i v e s all u s e r s a g i g a b y t e of s t o r a g e to k e e p all their m e s s a g e s . With the a n n o u n c e m e n t , H o t m a i l b e c o m e s o n e o f a g r o w i n g pool o f e - m a i l f i r m s o f f e r i n g users h u g e a m o u n t s o f storage. Size m a t t e r s Currently, p a y i n g c u s t o m e r s of M i c r o s o f t ' s H o t m a i l get at least 10 MB of s t o r a g e s p a c e a n d t h o s e w h o use it for free h a v e 2 MB for their old m e s s a g e s . B o o s t i n g s t o r a g e limits m e a n s H o t m a i l m u s t r e v a m p ' its c h a r g i n g system w h i c h is based around a " p a y m o r e to store m o r e " s y s t e m .
http://news.bbc.co.Uk/2/hi/technoIogy/3835495.stm 'vegyület valamilyen celra kifejleszt leljavit
3
3
Questions: 1. Why is Hotmail boosting its email service? 2. What does Google oiler to its customers and what is the name of the service'.' .1. I low much storage space do Hotmail customers gel? 4 Why docs I lotmail have to change its charging system? FURTHER Questions to talk about: 1. Can you name some Hungarian email providers and compare their services? 2. What are the pros and cons of emailing?
Mobile users in N o r w a y can now w a t c h TV on their phones, courtesy of
the public broadcaster N R K .
The service f r o m the N o r w e g i a n B r o a d c a s t i n g Corporation allows p e o p l e to watch television on their m o b i l e s 24 liouis a day. A l o n g s i d e the live s t r e a m i n g ' , p e o p l e can pick more specialized content such as a n e w s bulletin e v e r y h o u r and a Top G e a r style m o t o r i n g s h o w . Increasing popularity l or the m o m e n t it is s i m p l y testing w h e t h e r c o n s u m e r s will want and use TV on their phones. So far the f e e d b a c k has been e n c o u r a g i n g . " I n the first eight h o u r s of l a u n c h i n g . 2 , 0 0 0 clips w e r e d o w n l o a d e d , " said Bjarne A n d r e M y k l e b u s t . a s p o k e s m a n for NRK.. H e e x p e c t s the service t o b e c o m e more p o p u l a r a s video p h o n e s b e c o m e m o r e c o m m o n . " U s a g e will go up and up. M o b i l e n e t w o r k s are getting faster and better and by next year 8 0 % of handsets will h a v e a media player," h e told B B C N e w s O n l i n e .
http://nevvs.bbc.co.Uk/2/hi/technology/3829343.stm Questions: 1. What is NRK.? 2. What service does it provide? 3. What programs will make up the 24 hour program? 4. Why does the spokesman sound optimistic? FURTHER Questions to talk about: 1. Services on your mobile phone: is it a small computer? 2. What further services do you expect your mobile phone to provide in the future? 4. U K p o l i c e a r e l o o k i n g i n t o c o m p l a i n t s a b o u t excessive p h o n e bills a l l e g e d l y c a u s e d b y P C s o f t w a r e t h a t s e c r e t l y dials up p r e m i u m rate numbers6. T h e National Hi-Tech C r i m e U n i t w a s a p p r o a c h e d by the p r e m i u m rate w a t c h d o g , Icstis, following a rise in complaints o f net-related p h o n e f r a u d . " W e are i n discussions with t h e m , " a n lestis s p o k e s m a n told B B C N e w s O n l i n e . P r o g r a m s called diallers c a n secretly install t h e m s e l v e s a n d automatically c o n n e c t to p r e m i u m rate lines. P a y p e r view Diallers are c o m m o n l y used by pornographic or gambling sites as a w a y of charging people, without the need for a credit card. But it s e e m s that m a n y p e o p l e are not a w a r e that thev h a v e d o w n l o a d e d a p r o g r a m that will dial a p r e m i u m rate number. A c c o r d i n g to Icstis. the n u m b e r of c o m p l a i m s about high telephone bills related to w e b - b a s e d p r e m i u m tate services has soared 1 .
http://nevvs.bbc.co.Uk/2/hi/teclmology/3836203.stm Questions: 1. What is Icstis? 2. What is a "dialler"? 3. What is a premium rate line? 4. What does lestis say about high telephone bill related complaints? •"ingyenesen 5 egylolytában lolyo egyenes közvetítés kedvezményes tarilájú teleionszámok 'egekbe szokni 70
I URTIIFR Questions (o talk about: I Do you sometimes dial up premium rale numbers'.' What services do tliey offer? 2. I lave you ever tried to complain about something like a high phone bill? 1 low do you do it?
W h a t is s p y w a r e ? S n v w a r e is s o f t w a r e that hides itself s o m e w h e r e on y o u r c o n m u t e i collectinL' i n f o r m a t i o n about you and what you dn on the Internet.Spvware can invade y o u r p r i v a c y by p a s s i n g on your p e r s o n a l details without you even k n o w i n g thai this is what it is d o i n g . l f y o u shop on the internet u s i n g y o u r credit or debil c a r d s s o m e s p y w a r e can record y o u r credit card details, so b e w a r e ! Basic spyware S p y w a r e is often d o w n l o a d e d 01110 y o u r PC w h e n vou d o w n l o a d other free s o f t w a r e . W h e n y o u see a license agreement for any s o f t w a r e y o u d o w n l o a d f r o m t h e internet read it c a r e f u l l y . O f t e n b u r i e d in t h e l i c e n c e a g r e e m e n t will be a disclaimer* saying thai i n f o r m a t i o n a b o u t y o u and y o u r b r o w s i n g h a b i t s will be sent to the c o m p a n y ' s website.
http://www.bbc.co.uk/webwise/askb ruce/articles/security/spyware_l.shtml Questions: 1. What is spyware? 2. How does it work? 3. When might you come across a license agreement and what should you do then? 4. What will the license agreement often include? FURTHER Questions to talk about: I For whom do you think spyware is useful? 2. Have you ever downloaded free software? What software can you access free?
A g r o u p o f I r a q i c o m p u t e r e n t h u s i a s t s a r e a d v o c a t i n g " t h e use o f t h e o p e r a t i n g s y s t e m L i n u x t o r e b u i l d t h e i r country. A s h r a f Hasson a n d H a s a n e n N a w f a l are both natives o f B a g h d a d . Like m a n y 2 0 - s o m e t h i n g s , H a s s o n and N a w f a l g r e w up nurturing'" passions for c o m p u t e r s a n d for p r o g r a m m i n g . Both of t h e m a r e f i r m b e l i e v e r s in o p e n source s o f t w a r e Unlike expensive s o f t w a r e , o p e n - s o u r c e s o f t w a r e can be freely distributed a n d m o d i f i e d , as l o n p as the modifications are shared with other users. T h e s e t w o L i n u x enthusiasts, t h o u g h , did not e v e n k n o w o n e a n o t h e r b e f o r e the ousting of S a d d a m Hussein. But t h e y found e a c h other online, in a L i n u x f o r u m hosted by Iraqi e x p a t r i a t e s , s o o n after S a d d a m fell and started thinking a b o u t w h a t they c o u l d do. " E v e r y c o u n t r y has a Linux users g r o u p e x c e p t Iraq, so I thought, m a y b e Iraq deserves to have a L i n u x users g r o u p , " said A s h r a f H a s s o n .
http://news.bbc.co.Uk/2/hi/technology/3830545.stm Questions: 1. What do you know about these two native Iraqis? 2. What is open source software? 3. How did these two youngsters get to know each other? 4. What did the two of them propose? FURTHER Questions to talk about: 1. What do you know about the Linux Operating System? 2. What do you know about a users group or special interest group? a
megjegyzes beleveli magat nevel. apol
9 ,0
S p a m o v e r l o a d i s m a k i n g c o m p u t e r s sick a n d driv ing u s e r s m a d . R e s e a r c h c o m m i s s i o n e d by Yahoo funis thai the a v e r a g e British PC lias nine 'sick days' pei year, t w o m o r e than the a v e r a g e I'oi w o t k e r s Six o l ' t h e s c are w a s t e d h a u l i n g with s p a m and three m o r e d a v s are lost d u e to virti.se> Neailv h :l nl British c o m p u l e r users find dealing with | u n k e-m.uls m o r e stressful lhan Irallic jams a n d llie m a j o r i t y wanl serw."'.' p u n iticis lo act. Q \ c i hall of Ihe 2.300 people Questioned by Yahoo as p a n ol'ils anti-snam c a m p a i g n had asked ihcir provider in dp s o m e t h i n g to stop the d e l u g e " o f i u n k e - m a i l s tlicv were receiving A r o u n d a third of p e o p l e w o u l d be p r e p a r e d lo m a k e a drastic lifestyle c h a n g e , s u c h as e x e r c i s i n g five times a w e e k , if it meant an e n d to s p a m . M a r t i n o Corbelli, marketing director of e - m a i l filtering firm S u r f C o n t r o l , thinks internet and e-mail providers are not f u l f i l l i n g their obligations lo c o n s u m e r s . " T h e y never h a v e d o n e m u c h about s p a m and all the indications arc (hat they are lethargic about fighting Ihe p r o b l e m . " he told B B C N e w s Online.
http://nevvs.bbc.co.Uk/2/hi/tcchnology/3S32305.stni Questions: !. What did Yahoo's research reveal? 2. What do many British computer users say about dealing with span:" 3. On what condition would many people make a drastic lifestyle change? 4. What does Martino Corbelli think about the email providers? FURTHER Questions to talk about: I. What can you do if your computer is Hooded with spam? 2 What obligations do you think internet providers have to their customers?
S. Millions of w e b p a g e s c o v e r i n g all aspects of life m the UK. are to be archived in a trial proiect led by the British Library T h e two-vear proiect will archive s o m e 6.000 w e b s i t e s m an attempt to capture a flavour of British life online. T h e organisers said that a l t h o u g h the w e b had b e c o m e the i n f o r m a t i o n tool of c h o i c e for m a n y , little thought had b e e n given to preserving websites. T h e w e b a r c h i v e is due to go live in January 2005. ' U n i q u e insight' A c c o r d i n g to the b a c k e r s of the project, there is a real d a n g e r that valuable e d u c a t i o n a l , cultural and s c i e n t i f i c resource.-, on the w e b could be lost in the future. To c o u n t e r ' ; this, six leading UK institutions h a v e got t o g e t h e r to work out h o w ;o best p r e s e r v e British w e b s i t e s . T h e UK W e b Archiv ing C o n s o r t i u m includes the British Library, as well as the national libraries of Wales and Scotland. T h e other m e m b e r s are the National A r c h i v e s , the W e l l c o m e Trust and the lomt I n f o r m a t i o n S y s t e m s C o m m i t t e e of the Higher and Further Education C o u n c i l s .
http://news.bbc.co.Uk/2/hi/technology/3S27227.stm Questions: 1 What is this two year project about? 2. What do they want to archive and why? 3. Who are backing the project_ 4. When will the project start? FURTHER Questions to talk about: 1. What Hungarian websites would you archive in order to keep it for posterity? 2. What Hungarian institutions can you think of that would back a similar Hungarian project?
'fvizlozon •'valaminpk az elharitasara
M a c h i n e s hnill b y c o m p u t e r giant I B M helped the Nazi regime c o m m i t m a s s m u r d e r m o r e efficiently. G \ p s \ group«; h a v e a l l e g e d " . A S w i s s court lias eleared the w a y f o r a lawsuit against the firm, asking for c o m p e n s a t i o n for its w a r t i m e rote. IBM had an o l l i c c ¡n ( i c n e v a d u r i n g the war. w h i c h the lawsuit a l l e g e s was used for trading with the N a z i s . T h e firm mst.sis thai n had no role in the 1 lolocaust. and thai ils G e r m a n unit w a s taken over b e f o r e the war. T h i s was h o w IBM p u n c h - c a r d m a c h i n e s c a m e to be used bv the H o l o c a u s t b u r e a u c r a c y , the c o m p a n y says Call for compensation T h e case is one of m a n y l a w s u i t s " l a u n c h e d by g r o u p s representing J e w i s h . G y p s y and o t h e r victims of the Holocaust Most actions so far have been based in the U S . a n d have targeted G e r m a n c o m p a n i e s s u c h as D a i m l e t C h r v s l e r . Volkswagen and S i e m e n s , which can he s h o w n 10 h a v e p r o f i t e d from Nazi-era slave labour. S o m e G e r m a n c o m p a n i e s h a v e contributed to f u n d s created to c o m p e n s a t e victims and their families.
http://nows.hbc. co. uk/2/hi/business/3832141. stm Questions: 1 What IBM product is alleged to have been used during the Second World War according to the passage? 2. Who arc accusing IBM of helping the Nazi regime? 3. What and who arc the groups launching the lawsuits representing? 4 What other companies have been accuscd of having profited from the Nazi era? FURTHER Questions to talk about: 1. What do you know about the punch card machines and what were punchcards themselves'.' 2. What do you think about the role of big industrial companies in political issues or wars?
10. Indian Railways is to offer internet access to passengers from 30 June, according to t h e Times of India. T h e service will be launched on the D e l h i - A m r i t s a r and Delhi-Bhopal routes, the report said. A kiosk with t w o computers will be set up on l u x u r y c o a c h e s w h i l e " h o t s p o t s " will a l l o w p a s s e n g e r s with w i r e l e s s - e q u i p p e d d e v i c e s to c o n n e c t to the web. Indian R a i l w a y s has e x t e n s i v e l y c o m p u t e r i s e d its o p e r a t i o n s to deal with a d m i n i s t r a t i o n and ticketing. T h e service is being run by RailTel, a t e l e c o m s i n f r a s t r u c t u r e a g e n c y of the Ministry of R a i l w a y s , w h i c h p r o v i d e s intemei kiosks at train stations. T h e service will initially be free with eventual chargcs e x p e c t e d to be s i m i l a r to the fees at RailTel's stahon k i o s k s .
http://news.bbc.co.nk/2/hi7business/3835525.stm Questions: 1. Where will Indian Railways offer Internet access to passengers starting from 30th June? 2. In what ways will passengers be able to access the internet while travelling by train? 3. What do the internet kiosks at train stations provide? 4. What will they charge for the service? FURTHER Questions to talk about: 1. What do you know about hotspots? 2. How do wireless devices communicate with each other or connect to the web? 3 What is the future for w ireless connections?
"aim
' 'per. kerese:
I! I l c w i l d e r e d f e s t i v a l - g o e r s al G l a s t o n b u r y 2 0 0 4 h a v e h a d a h e l p i n g h a n d findinj' t h e i r w a y " h o m e " 1 will) n lent t h a t lights n n b y text m e s s a g e . O v e r 100.000 anisic lovers have m a d e the a n n u a l trek to Ihe Vale o f ' A v a l o n which means t h o u s a n d s of identical tents O r a n g e has designed a Text Me H o m e Tent with a receiver a n d a n t e n n a in it with a unique n u m b e r to text. T h e limited edition tent is lo show how m o b i l e technology can m a k e festival life a bit easier, says Orange. With a lightweight antenna a n d receiver box. as well as special luminous'* ribbing"' e m b e d d e d on the tent's edge, the w h o l e contraption is not overly c u m b e r s o m e . T h e a n t e n n a simply slots into the d o m e of the tent, and a wire feeds through the fabric of the tent lo the receiver box.
http://news.bbc.co.Uk/2/hi/teclinology/3841819.stm Questions: 1. How do festival goers find their tent among thousands of identical ones'.' 2. How docs mobile technology help life quality in this example? 3. How does this technical invention work?
FURTHER Questions to talk about: 1. Can you describe some high tech gadgets that improve quality of life? 2. Do you think these digital devices are indispensable or just trendy?
12. Microsoft Open to Open Source E v e n as Microsoft begins to m a k e small c o n t r i b u t i o n s to o p e n - s o u r c e c o m m u n i t i e s , it's trying hard to keep the opensource Linux operating s y s t e m from taking market s h a r e f r o m W i n d o w s around the world. In o n e h i g h - p r o f i l e case, the city of Munich, G e n n a n y , last w e e k said it w o u l d switch f r o m W i n d o w s to Linux for its 14.000 p e r s o n a l c o m p u t e r s Microsoft Corp. says it is l o o k i n g to turn o v e r m o r e of its p r o g r a m s to open-source s o f t w a r e d e v e l o p e r s , p l a y i n g a greater role in a process that the R e d m o n d c o m p a n y has criticized strongly at limes in the past. The company has so far released two s o f t w a r e - d e v e l o p m e n t tools to the open-source community, and it wants to continue the practice, a M i c r o s o f t m a n a g e r told an industry g r o u p this w e e k . "There's more of that on the w a y , " said M i c r o s o f t ' s S t e p h e n Walli, w h o oversaw ihe process of releasing those tools under open-source licenses. " A n d it's not j u s t about d e v e l o p e r tools. There are other things that we can be looking al when you actually look at the b r e a d t h of s o u r c e c o d e that we h a v e " . . .
http://www.techncwsworld.com/story/34726.html Questions: 1. Why is Microsoft opening up to Open Source? 2. How does the passage illustrate that Microsoft is losing market share? 3. How is Microsoft trying to participate in the open source business too? 4. What does Stephen Walli say about the firm's endeavours in order to release new tools? FURTHER Questions to talk about: 1. What is your opinion about the Microsoft products? 2. What are the advantages of open source software? Are there any disadvantages?
'^világító. lenyes ">s?egèly 74
( assini I ' r o l i e will K v p l u r e P l a n e t ' s I t i u g s t assim is the lasl of N A S A ' s big-budgel missions, started tiefore the era of smaller, c h e a p e r ventures, such as the highly publicized M a i s rovers'", "t he liuropean S p a c e A g e n c y a n d the Italian space a g e n c y p a r t n e r e d with N A S A on this trip. The m v s i c i v of Saturn's l i n e s will net the Sherlock H o l m e s treatment with a high-tech iwist w h e n the international C'assint-I l u v e e n s mission a r r i v e s at the sixth planet from Ihe sun next week A s t r o n o m e r s h a v e b e e n i n t r i g u e d " b y S a t u r n ' s r i n g s for c e n t u r i e s . T h e r e are s e v e n m a i n r i n g s ; t h e m o s t r e c e n t w a s discovered in 19X0 by Voyager 1. What they k n o w is that the rings are m a d e of ice crystals, r a n g i n g f r o m m i c r o s c o p i c lo s t a d i u m - s i z e . W h a t they don't k n o w is w h e r e t h o s e materials c a m e from and h o w long t h e y ' v e b e e n there. T h e d e t c c t i v c w o r k begins at 9:12 p.m. ET W e d n e s d a y w h e n the S3.27 billion p r o b e is set to fire its r o c k e t and settle into orbit a r o u n d Saturn six y e a r s and eight m o n t h s after il left Earth. From N A S A ' s Jet P r o p u l s i o n L a b o r a t o r y in Pasadena, C a l i f , controllers plan to k n i f e " the s p a c e c r a f t through a space b e t w e e n the planet's rings. " T h e health of the s p a c e c r a f t is excellent, and all indications arc perfect for the m a n o e u v r e . "
It ttp://ww\v. tech news world, eoni/sto rv/34731 .html Questions: 1. What is Cassim? 2. Who participated in this project? 3. What do we know about Saturn's rings? 4. What do we know about the probe itself.' FURTHER Questions to talk about: 1. How docs technology help space research? 2. What gadgets essential lo spacc exploration can you think of? 14. I n d i a , tJS M o v e C l o s e i n S p a c c T e c h n o l o g y "Together, ihe United Stales and India have the potential to transform the future into a safer, m o r e prosperous tomorrow. Together, our countries can hamess : l > civil s p a c c c o o p e r a t i o n for the lasting benefit of all h u m a n k i n d , " U . S . U n d e r s e c r e t a r y for C o m m e r c e K e n n e l h Juster said a t the c o n f e r e n c e , adding, " T h e s e e d s o f that c o o p e r a t i v e effort have already b e e n p l a n t e d . " India a n d the United States h a v e b e g u n c o o p e r a t i o n in the s p a c e technology with W a s h i n g t o n s o f t e n i n g its stance on the sanctions i m p o s e d on N e w Delhi following the 1998 n u c l e a r tests. The United Slates has licensed B o e i n g ' s satellite s y s t e m s division to explore a tie-up w i t h the Indian S p a c e Research O r g a n i z a t i o n to build a c o m m u n i c a t i o n satellite. India's s p a c e a g e n c y , the Indian S p a c e R e s e a r c h O r g a n i z a t i o n , said it plans to build a c o m m e r c i a l c o m m u n i c a t i o n s satellite by m i d - 2 0 0 6 . Scientists, g o v e r n m e n t o f f i c i a l s and business leaders f r o m India and the United States are c u r r e n t l y p a r t i c i p a t i n g in a live-day I n d i a - U . S . C o n f e r e n c e o n S p a c e S c i e n c e , A p p l i c a t i o n s and C o m m e r c e i n B a n g a l o r e . U.S. U n d e r s e c r e t a r y for C o m m e r c e K e n n e t h Juster said Washington is keen lo s e e s t r o n g e r c o m m e r c i a l links with India on space t e c h n o l o g y .
http://www.tech ncwsworld.com/story/34744.html Questions: 1. What did the US Undersecretary declare about the potentials of the cooperation between US and India? 2. When were sanctions imposed on India and what kind of sanctions are they? 3. What are the plans of the Indian Research Organization? 4. What kind of commercial links should be strengthened according to the undersecretary? FURTHER Questions: 1. Can you think of other international relationships or organizations that serve the objective to transform the future into a safer tomorrow? —2. What do you know about communication satellites? ,7
MarSiaro izgat. erdekol '^alszorit, atszel hasznosil. megzabolaz ,8
?0
15. .SpaeeShipOne - History or f u t u r e ? Paul Allen, askeil by o n e of tile 5 5 0 j o u r n a l i s t s attending the S p a e e S h i p O n e event yesterday h o w he sees this effort dovetailing-' with his s u p p o r t for SF.TI. the Search for Extraterrestrial Intelligence, j o k i n g l y r e s p o n d e d ; "If they're not g o i n g to c o m e here, we'll go t h e r e . " T h e m e r e fact'-
that Paul Allen lias paid lo shoot s o m e o n e in a rocket into space is. by itself, no big deal.
N A S A , a m o n g others, has b e e n there. What will ultimately m a k e t o d a y ' s ellbrt m o r e important than just a c h i e v i n g one for the history b o o k s - the first privately orchestrated and p i l o t e d m a n n e d s p a c e flight - will be if it actually leads t o w a r d a f u t u r e in which such space trips will be as routine and a f f o r d a b l e as a cruise ship vacation. "We're h e a d i n g into orbit s o o n e r than you t h i n k , " predicted Burt R u t a n , the r e n o w n e d aviation p i o n e e r Allen recruited to plan, build and launch S p a e e S h i p O n e . " T h e next 25 years will be a wild ride." Allen a g r e e d , s p e a k i n g at an o v e r f l o w i n g n e w s c o n f e r e n c e y e s t e r d a y b e f o r e today's launch at the M o j a v e Airport, saying he w a s m o t i v a t e d to s p e n d m o r e than S20 million on this p r o j e c t to p r o m o t e d e v e l o p m e n t of the c o m m e r c i a l space industry.
http://www.technewsworld.com/story/34620.html Questions: 1. What is SpaeeShipOne? 2. What makes this event so important? 3. Who are Burt Rutan and Paul Allen? 4. What was the purpose of Paul Allen when he decided to spend so much money on this project'.' FURTHER Questions: 1 What do you think of Extraterrestrial Intelligence? 2. Can you remember some films, novels or short stories that deal with this topic? 16. Encrypted File S h a r i n g : P 2 P Fights Back M a s k i n g ihe user's IP a d d r e s s is the main issue today. With a h i d d e n IP address. W e b surfers can visit W e b sites, post m e s s a g e s a n d s e n d e - m a i l w i t h o u t leaving a traditional trail that can link the c o m m u n i c a t i o n with a particular Internet c o n n e c t i o n to a c o m p u t e r ' s p h y s i c a l location. Is it p o s s i b l e to end the i n v e s t i g a t i o n s and p r o s e c u t i o n s that the R I A A , the music d o w n l o a d p o l i c e and similar entities 1 ' use to prosecute users of file-sharing networks'? The answer depends, say online security experts, on which next-generation technology p r o v e s to be m o r e s u c c e s s f u l . "Everybody n o w k n o w s you can't download stuff for f r e e / ' said M a r k Ishikavva. C E O and founder of BayTSP, a leading security firm f o r the record industry. P e o p l e w h o participate in tile s h a r i n g through n e t w o r k s , he said, s o o n e r or later will get caught. "It's like p l a y i n g Russian R o u l e t t e " But that could c h a n g e s o o n An innovative s o f t w a r e product recently released by S y n c o d e a could e l i m i n a t e c o n c e r n s about getting c a u g h t and s u e d f o r sharing music and data files. " T h i s will end a n y t e c h n o l o g y that tries to m o n i t o r or duplicate tiles flowing in the P 2 P n e t w o r k s , " Lee said.
http://www.technewsworld.com/story/34052.html Questions: 1. What are the advantages of a hidden IP address? 2. What is RIAA and why is it needed? 3. How is Russian Roulette similar to free downloading? 4. What could the new software product released by Syncodea eliminate? FURTHER Questions: 1. What do you know about file-sharing software? 2. What are the moral and legal issues of free downloading? ?,
osszeillik - 2 puszta leny ^inlezmeny. S2erve2et
7
f>
15. N a p s t e r A r r i v e s i n B r i t a i n , But S u c c e s s I s n ' t C e r t a i n Britons don't k n o w N a p s t e r 2 is a s h a l l o w attempt to cash in M on w h a t was. T h e y haven't b e e n e x p o s e d to Napster 2 in the s a m e w a y North A m e r i c a n s have. T h e y still r e m e m b e r the old Napster, the P 2 P file-sharing application that first lived music lovers I'rom t h e iron grip of the c o r p o r a t e m u s i c industry, and they think there's a similarity. There's an article in Britain's prestigious T i m e s O n l i n e today called " Q & A : N a p s t e r a n d the M u s i c Industry." which s e e m s - at least on the s u r f a c e - to explain what N a p s t e r 2 will m e a n to Britons n o w that its o w n e r , R o x i o . has s u c c e e d e d in s n a k i n g " it into the United K i n g d o m . "Easy, s a f e a n d l e g a l " N a p s t e r r e l a u n c h e d , said the Financial T i m e s yesterday. Does that m e a n O D 2 or iTunes, for e x a m p l e , or L i m e W i r e , Blubster, B e a r S h a r e , M o r p h e u s , G r o k s t e r or any of the other c o m m e r c i a l P2P a p p l i c a t i o n s is hard to use, u n s a f e a n d illegal? N o , a l t h o u g h the implication is there. It's a r e f e r e n c e to S h a w n Fanning's Napster, the application that fired the first, r e s o u n d i n g shots in what h a v e since b e c o m e the file-sharing w a r s .
http://www.technewsworld.com/story/33938.htnil Questions: 1. Where did Napster arrive to Britain from? 2. Is Napster 2 similar to the old Napster? 3. Who is Roxio? 4. Which are the other commercial file sharing applications? FURTHER Questions: 1. Do you use any file-sharing software? Do you download music or videos from the net? 2 What do you mostly use the Internet for?
T h e B o y o f 1 4 W h o A r r a n g e d His O w n M u r d e r i n a n I n t e r n e t C h a t R o o m Chilling Story of H o w a Suicidal G r a m m a r S c h o o l Pupil P o s e d As a S p y O n l i n e to T r i c k His F r i e n d Into Stabbing 2 6 H i m T h e 'dark side' of the Internet w a s b l a m e d yesterday for a g r a m m a r s c h o o l b o v ' s a s t o n i s h i n g plot to arrange his o w n murder. The hoy, w h o was 14 at the time, h o o d w i n k e d a n o t h e r t e e n a g e r into s t a b b i n g h i m after u s i n g an Internet chat room to pose as a spy. With his a d o l e s c e n t i m a g i n a t i o n f u e l l e d " by the plots of J a m e s B o n d films, the s c h o o l b o y , i d e n t i f i e d only as 'John', used a series of alter e g o s to c o n v i n c e his 16-year-old a c c o m p l i c e that his o w n s t a b b i n g had b e e n o r d e r e d by 'the Government'. T h e gullible 3 " older boy, 'Mark', w a s so t a k e n in by the f a n t a s y that he b e l i e v e d he w o u l d be paid P o u n d s 5 0 0 . 0 0 0 and would be given a j o b as a secret agent as a r e w a r d . J o h n s u r v i v e d the stabbing.
http://www.technewsworld.com/story/34122.html Questions: !. How did the boy persuade his friend to kill him? 2. How did the boy want his friend to kill him? 3. Why did the friend believe him? 4. Did the boy die? FURTHER Questions: 1. What are the "dark sides" of the Internet? 2. What do you know about chat groups? Are you a member of any? •'•'behalt, penzre vält •' •becsempeszm (itt1 '•-leszur
"lapial (uzemanyatjoai filial) hrszekony, naiv
1'). Software Experts Find 'First' Mobile Virus Cabir infecls the S y m b i a n o p e r a t i n g system that is used in several m a k e s of mobiles, notably the N o k i a brand, and propagates-'* t h r o u g h t h e n e w Bluetooth w i r e l e s s technology that is in several n e w m o b i l e phones. If the v i m s s u c c e e d s in penetrating the p h o n e , it writes the inscription 'Caribe' on the screen and is then activated e v e r y t i m e that the p h o n e is turned on. What is b e i n g d e s c r i b e d as the first ever c o m p u t e r virus that can infect m o b i l e p h o n e s has b e e n d i s c o v e r e d , anti-virus s o f t w a r e d e v e l o p e r s said on T u e s d a y , adding that up until n o w it has had no h a r m f u l effect. The F r e n c h unit of the R u s s i a n security s o f t w a r e d e v e l o p e r K a s p e r s k y L a b s said that that virus - called C a b i r - a p p e a r s to have b e e n d e v e l o p e d by an international g r o u p specializing in creating viruses w h i c h try to s h o w "that no t e c h n o l o g y is reliable and s a f e from their a t t a c k s . " Bluetooth'" T r a n s m i s s i o n It is able to scan for p h o n e s that are also using the Bluetooth t e c h n o l o g y and is able to s e n d a copy of itself to the first handset that it finds.
http://www. techncwsworld.com/story/34513. html Questions: 1. What is Cabir? 2. How does this virus 'work'? 3. Through what technology does the virus 'sneak in"? 4. Why does an international group create new viruses? FURTHER questions: 1. What do you know about viruses? 2. Why do programmers create viruses? 20. A First in Space, with S o m e S c a r y M o m e n t s " T h e flight t o d a y o p e n s a n e w c h a p t e r in history, m a k i n g s p a c e a c c e s s within the reach of o r d i n a r y c i t i z e n s , " said Patti G r a c e S m i t h , t h e a s s o c i a t e a d m i n i s t r a t o r f o r c o m m e r c i a l s p a c e transportation f o r t h e Federal Aviation A d m i n i s t r a t i o n . Smith p r e s e n t e d M e l v i l l w i t h a s t r o n a u t w i n g s a f t e r the f l i g h t . A veteran civilian test pilot h a s b e c o m e the first h u m a n to reach s p a c e in a privately d e v e l o p e d m i s s i o n , guiding a tiny rocket ship m o r e than 60 m i l e s a b o v e California in a flight w i t h several w h i t e - k n u c k l e " m o m e n t s . In f r o n t of t h o u s a n d s of s p e c t a t o r s a n d a t e e m i n g " press c o r p s , t h e s q u i d - s h a p e d " craft, S p a c e S h i p O n e , w a s lifted into the a t m o s p h e r e shortly a f t e r 6 : 3 0 a.m. on M o n d a y attached to the belly of a sleek p l a n e called the W h i t e K n i g h t W h e n the p l a n e r e a c h e d an altitude of 5 0 , 0 0 0 feet, it d r o p p e d the s m a l l e r craft, and its pilot, M i c h a e l Melvill, started the rocket that took h i m up n e a r l y 3 0 0 , 0 0 0 feet m o r e , to the b e g i n n i n g s of space. He then b r o u g h t S p a c e S h i p O n e back to earth as a g l i d e r " , t o u c h i n g d o w n at 8:15.
http://www.technewsworld.com/story/34709.htmi Questions: 1. What did Grace Smith say about the first commercial flight? 2. What do we know about this space flight? 3. Who was the pilot in this venture? 4. How did the spacecraft return to earth? FURTHER Questions: 1. What do you think is the role of civilians in modem technology and trends? 2. There have been several "white-knuckle" moments in the history of space exploration. Can you think of some? 29
hirdet fe|lett technologiaju ideglepo 32 hemzsego 33 tintahal-alaku 34 siklorepul6 30
31
78
III. FELADAT - PowerPoint Presentation This is a PowerPoint Presentation that each candidate has to prepare at home and submit it according to the specifications described in the LEXINFO "Vizsgaszabályzat". All we provide here is some guidance. Read these points carefully and follow them as much as you can when executing the actual task. There are several stages to follow: 1. Choosing the topic 2. Structuring - logical flow 3. Designing the slides - unity of design 4. Supporting ideas - proportion of text on slides and talk 5. Supporting skills 6. Preparation and Performance 1. Points to consider when choosing your topic - Are you interested in it and do you know a lot about it? - Have you already produced it in Hungarian? - Will you need it in your later professional life? - Can you easily find supporting charts/tables/pictures, etc.? - Can you access resources (preferably in English too)? - Can you easily find someone to help you in case you need professional assistance or advice? - Is it too general and too specific for such a short presentation? - Is it interesting enough for your audience? - Is the topic not too abstract for this form of presentation? - Is it not too complex for your level of English? 2/3. When structuring your topic (deciding on the number and layout of slides) - be logical and clear (in your choice of word-processing elements such as character size, type, illustrations etc.) - find a suitable structure (introduction, body, conclusion). - remember the time element and the correct proportion of written and oral information. - the proportion of text and other parts (pictures, charts etc.) should always depend on the message they serve. - don't put too much information on one slide because it results in smaller characters, thus less readability. - decorative elements should never take priority over the informative ones (logo, background photo or colours etc.) - don't use such technical or professional words which may be incomprehensible for your audience. - remember that the slides must serve the following purposes: a. help the presenter to remember facts. b. help the presenter to remember the structure and flow of what he has to say. c. make the presentation easy to follow and understand. d. make the presentation more interesting and enjoyable. e. influence two senses of perception instead of one (seeing and hearing). These two senses should always support each other by strengthening and never weakening the effect.
4. Supporting ideas a. A good PowerPoint Presentation should suggest that the presenter • is an expert in his/her chosen topic. • knows much more about it than what is contained in the presentation. • is quite enthusiastic about the topic and has some personal explanation why he has chosen it. b. If we accept the statement in point a., we can expect the presenter - to possess much more information about the topic than he/she tells us. - to be able to answer our further questions. - to give (further) literature or resources which support his viewpoints/thesis. - to use up-to-date and well-founded information. 5. Supporting skills Making a successful PPP requires the application of very different skills, including: a. design skills b. scientific research skills (collecting data, using resources, structuring the ideas, giving examples, and giving the theoretical background) c. linguistic skills (language accuracy and the application of appropriate vocabulary, style and register, etc.) d. technical know-how (familiarity with the software, its rules, advantages and limits) (compatibility issues, data protection questions, hardware application skills, lighting effects and sizes of assembly halls etc.) e. communication skills - register and pronunciation - audibility and the ability to handle any technical problems that may arise - showing a relaxed but not complacent attitude - the proportion of reading and speaking - the correct proportion of personal and professional elements - eye contact and other forms of contact with the audience - reading versus memorising - remembering the time limits - self-assurance in handling further questions or remarks - the skill to handle awkward situations like lengthy questions. Probably the most important aspect to consider is how much the presenter can rely on the text of the slides and how much he must remember. 6. a. Preparation and b. Performance a. There are two things to remember: - Preparation is not over when the slides are ready - try to rehearse, make notes, decide how much and in what way to use them etc. - The slides saved on a floppy or CD should be submitted to the Language Centre several workdays before the appointed oral examination date. (Remember to consult the Centre and find out the technical specifications) b. Besides remembering the points enlisted in point 5. and 6/a., when preparing your PPP make sure that - you can be heard - you can see the monitor - you don't stand with your back to the examination board - you have your notes at hand - you know how to use the hardware (you have tested it before the exam) - you don't read but talk - you keep eye contact with the examination board - you try to show your listeners that you could go into further details if you had more time - you are an experienced presenter (smiling, relaxed etc.) If you need further help or tips, use Google search, where you can find a lot of tutorials and "How to..." sites. They will not only give you assistance but show you samples. 80
IV. FELADAT - Szakmai beszélgetés egy adott témáról This task depends on the examination board. They can ask you to either discuss your PPP in details or give your opinion about the reading passage processed in task 2. The candidate's task is not only talking freely about the given topic but also finding supporting ideas for his/her opinion, in certain cases giving further information or arguing with the examiner's opinion. a. In the following paragraph we give you some guidelines for the possible questions resulting from the first alternative: what kind of further questions may be expected in this task? 1. Why have you chosen this topic? 2. What literature/resources have you used? 3. Do you think this is the only answer to the issue you have dealt with in slide number ? 4. Could you give some further examples for ....? 5. I'm afraid I don't quite understand what you mean when saying ....'... Could you please explain it in a simpler/more detailed way? 6. I don't agree with you in this point, could you explain to me what you mean by ....? 7. Could you give the definition of the technical expression "...."? 8. I have read somewhere that there is another answer to the problem discussed in slide number What is your opinion about it? 9. I'm afraid there is a chart on slide , which doesn't seem to prove your theory. Could you explain it to me in details? 10. Your table on slide .... has given us the figures taken from British examples. Could you say something about the Hungarian situation? b. For the second option we have given you sample questions following the reading passages themselves, (see II. FELADAT)
KULCS - KEY ÍRÁSBELI I. FELADAT READING COMPREHENSION (A) 2 T F T F T
1 F T F F T
1 2 3 4 5
3 T F T F T
4 F T T F T
5 F F T F T
6 T F T F T
7 F T T T F
8 T F T F F
9 T F T F T
10 T F F T F
11 T F T F T
12 F F T F T
13 F T F T F
14 F F F F T
15 T F T F T
5 A B B A A A B B A A
6 B A A A A B A B A B
7 B A C A A C B A C B
8 A C A B C A C A C C
9 C A A B A A A C C C
10 B A B A A B B A B B
11 B B B A B B B A B A
12 C B A C C C B B C C
13 B B B B A A B A B B
14 A C A B B C C A A C
15 B C B A B A A A C C
READING COMPREHENSION (B) 2 B A A A A B A B A A
1 C B C A C C A C B B
1 2 3 4 5 6 7 8 9 10
3 A B A A B B B B B B
4 A B A A B A B B A A
II. FELADAT VOCABULARY TEST I. 1 (bar c o d e )
2(cache)
3 (chip)
4 (cookies)
5 (home networking)
6 ( g h o s t site)
7 (mail b o m b )
8 (meat loaf)
9 (mouse potato)
10 (multi link)
l
vertical
reuse
provide
browse
construction
maintained
binary
unsolicited
online
provides
2
transmits
accessed
developed
stored
enables
outdated
crash
circulated
surfing
bandwidth
3
linking
improves
manufacturers
access
share
difference
recipient
via
thumb
speed
4
tracking
downloaded
special p u r p o s e
contain
variety
statement
cancellation
term
remote
running
5
identify
retrieved
integrated
identity
appliances
updated
account
messages
site
designed
II. 1
2
3
4
5
6
1
Wire jam
Anonymous FTP
Mirror
Dial up
Digit
Wizard
2
Telematics
Customize
Multitasking
Flowchart
Icon
Piggyback entry
3
Silicon
Default
Redirect
Thumbnail
Feasibility study
Shareware
4
Mip
Alphanumeric
Web rating
Configuration
Indent
Latency
5
Lurker
Screen saver
Zine
Menu
Connector
Justify
6
Annotations
Router
Newsgroup
Refresh
Invert
File
7
Digital watermark
Protocol
Authorization
Erase
Node
Magnetic disk
8
COM port
Nerd
Beta bugs
Retrieval
Shrink
Robot
9
Biometrics
Dirty connection
Switch
Virtual
Virus
Memory
Patch
Answerbot
Smiley
Demon
Word wrap
Maintenance
10
III.
1 Margin
2
3
4
1
Hard copy
Simultaneous
Biometrics
2
Groupware
Flash memory
Telework/telecommute
Context sensitive menu
3
Hacker
Data flow
Benchmark
Default
4
Document
Binary tree
Command
Dirty connection
5
Scrolling
Banner
Abort
Compatibility
6
Highway
Duplicate
Bubble jet printer
Buffer
7
Draft copy
Joystick
Mailbot
Backup
8
Row
Landscape
Compile
Bus
9
Trapdoor
Mouse
Newsgroup
Cascading menu
Punch card
Scratch pad
Patch
Ghost site
10
IV. 2
3
4
5
6
7
8
9
10
1 instruction
required
procedure
component
measure
remove
message
domain
online
execution
2 designed
range
processing
stream
distinguish
peripheral
attached
popular
screen
runs
3 interactive
divided
disconnects
regulating
values
interrupted
server
spread
surfing
simultaneously
4 abbreviation
purposes
authenticate
measuring
bits
supported
harrassment
set
remote
expanded
device
binary
Serial
account
international
surf
same
1
5 purpose
wideband
dial
h
v. 1
2
3
4
5
1
replicates, storage
indicator, display
characters, text
semiconductor, electrodes, collector, signal
frequencies, channel
2
performing
operation, conversion
arrows, keys
devices, contact
storing, source, fed
3
execution
permanently, provided
displayed, removed
controlling, processing
asymmetric, subscriber, bandwidth
4
opposed
wireless, respond
displayed, indicates
digitally, signal
wireless, protocol, access, transmissions
5
available
sequence
device, row, convert, manipulated
electronic, silicon
dividing, node, destination
6
information
holds, icon
connection, domain, speed
outgoing, analogue, incoming
paired, controller, backup, primary
7
sentence
protocol
temporary, user, instructions
material, insulator
runs, interaction, perform, foreground
8
damage
encoded, device
protection, duplicated, mirrored
method, text, length
cleared, set, unauthorized
9
based, widely
circuitry, slots
removing, material
path, client, network
instruction, corresponding
software, connection
handling, exchange, local
requires, goals
create, tags, structure
represent, initiated, cursor
10
III. KKLADAT SAMIM.K Kssavs 1. What Do You Think about File-Sharing Software and its Use? I think as long as people use this w a y of a c c e s s i n g and d o w n l o a d i n g music for their o w n p u r p o s e it is an a c c e p t a b l e practice and not a violation of the law. S w a p p i n g music in the traditional w a y has been g o i n g on since technology provided us the m e a n s , s u c h as cassetteplayers and CD burners. In the b e g i n n i n g , y o u n g p e o p l e s w a p p e d m u s i c within their close circles, at the c l u b s thev regularly went, colleges and s c h o o l s they visited or w o r k places w h e r e they met other m u s i c fans. Willi new technology a virtual society of y o u n g p e o p l e started to c o m e into existence: the youth of the Internet chat groups, the readers of bulletin b o a r d s , t h e b r o w s e r s of search engines, the g e e k s s p e n d i n g long h o u r s in f r o n t of their monitors. T h e s e b o y s and girls m e t m a n y m o r e virtual people, people w h o shared their interests, not only in search engines and c o m p u t e r g a m e s b u t in m u s i c too. T h e d e m a n d was there - the solution w a s s o o n to arrive. T h e a n s w e r w a s File-sharing s o f t w a r e and its application on a big scale. T h e w e l l - k n o w n sites like N a p s t e r , Gnutella, and later K a Z a a , w e r e b o m . People w e r e o v e r j o y e d - m u s i c files w e r e virtually flying across c y b e r s p a c e . T h e music industry started to w o r r y w h e n sales figures began falling. W h a t was h a p p e n i n g ? T h e a n s w e r w a s clear: an illegal c o m m e r c i a l activity w a s b o o m i n g - h u g e quantities of illegal C D s a p p e a r e d on the m a r k e t . This meant considerable financial loss for the record m a n u f a c t u r e r s , their financial interests greatly j e o p a r d i z e d . Legal cases e m e r g e d , police actions w e r e introduced, and e x e m p l a r y s e n t e n c e s w e r e m a d e . N o t h i n g really h e l p e d . A different line of action was needed. The m e s s a g e was clear: f i l e - s h a r i n g cannot be s t o p p e d . T h e n it must be t a m e d and restricted. T h e legal file-sharing sites were bom. This short history s h o w s us h o w the Internet, thus m o d e r n technology, influences the e v e r y d a y p r a c t i c e s of both the individual and the e c o n o m y .
(3 Of) words) 2. Vocational Training/College Training in Hungary In H u n g a r y vocational training a n d college training are less appreciated a n d a c c e p t e d as s u c c e s s f u l w a y s to a career than in most Western countries. T h e r e are m a n y reasons for this, w h i c h I will try to list and analyze here. T h e traditional ideal career in H u n g a r y - in the socialist era and e v e n b e f o r e - w a s to get a university d e g r e e and find a w e l l - p a y i n g j o b as a doctor, l a w y e r or foreign trade clerk. These p e o p l e could either m a k e a high i n c o m e f r o m salaries, fees, tips or start trading with m u c h s o u g h t - a f t e r w e s t e r n goods. As in socialism u n e m p l o y m e n t was a n o n - e x i s t i n g p h e n o m e n o n , p e o p l e with a u n i v e r s i t y d e g r e e w e r e s u r e to find a j o b - even if its requirements w e r e m u c h lower than the k n o w l e d g e and skills university s t u d i e s a n d d e g r e e s provided. Unlike in the past regime, m a r k e t d e m a n d s i n f l u e n c e all areas of life, a n d this is the c a s e with a c a d e m i c studies. The n u m b e r of u n e m p l o y e d u n i v e r s i t y g r a d u a t e s is steadily g r o w i n g t h o u g h there a r e several areas of the e c o n o m y w h e r e skilled p r o f e s s i o n a l s are b a d l y n e e d e d . T h e e x a m p l e s are n u m e r o u s : g o o d I T p r o f e s s i o n a l s , skilful c r a f t s m e n , helpful assistants in catering and o t h e r s e r v i c e sectors a r e a l w a y s in d e m a n d . Public education with new professional training p r o g r a m s have to be introduced in order to teach skills a n d competences, to p r o p a g a t e life-long learning a n d t e a c h personal skills like s e l f - m a n a g e m e n t , t e a m - w o r k i n g , etc. The main f o r m of professional training is the p o s t - s e c o n d a r y training p r o g r a m s , in w h i c h c a n d i d a t e s are trained to b e c o m e m a n a g e r assistants, s y s t e m administrators, w e b designers, s a l e s p e o p l e etc. T h i s type o f further e d u c a t i o n m e a n s an extra period of 1-2 years of p o s t - s e c o n d a r y training providing a certificate and in certain cases a p l a c e m e n t practice that m a y lead to e m p l o y m e n t as well. College training usually lasts three years and involves m o r e theoretical training than vocational programs. Since in certain cases it can be a s t e p p i n g s t o n e b e t w e e n college a n d university studies, there s h o u l d be a delicate b a l a n c e b e t w e e n developing competences and providing information. If we consider which skills a n d c o m p e t e n c e s are e x p e c t e d of the freshly trained p r o f e s s i o n a l s - s u c h as IT skills, personal skills, specific p r o f e s s i o n a l skills - we can state that flexibility and adaptability s e e m to be m o r e important than k n o w l e d g e .
(350 words)
86
3. Knterlainment and the Internéi Pan of the y o u n g g e n e r á l i o n s e e m s to be s p e n d i n g m o r e a n d m o r e t i m e in front of their m o n i t o r in d a r k e n e d r o o m s living in a kind of virtual w o r l d . T h i s m a y be f r i g h t e n i n g for s o m e parents, d e p e n d i n g on h o w they perceive it: they either start w o r r y i n g b e c a u s e their child n e v e r g o e s out and doesn't sleep enough, or they find it r e a s s u r i n g that their o f f s p r i n g isn't m i x i n g with u n d e s i r a b l e friends. Let's try to s e e what the p o s i t i v e and negative sides of the Internet are; w h e t h e r it will be d a n g e r o u s or h a r m f u l for future g e n e r a t i o n s . There are undoubtedly a lot of advantages if you h a v e the Internet at your disposal. What an endless source of in formation! All the search engines, all the specific interest groups, all the sites providing information for practically all y o u r personal needs. You don't have to leave y o u r room and b u y b o o k s or m e d i c i n e sold on the o t h e r s i d e of the w o r l d . You don't have to buy e x p e n s i v e C D s or c i n e m a tickets. S i m p l y a c q u i r e a file-sharing p r o g r a m or a c c e s s a site from w h e r e you can d o w n l o a d the latest p r o d u c t s of the e n t e r t a i n m e n t industry! No m o r e queuing in b a n k s , t e l e p h o n i n g s c h o o l s for information or s p e n d i n g m o n e y on s t a m p s . Just a f e w clicks and all the information is a v a i l a b l e from y o u r r o o m . Is there a n y t h i n g m o r e u s e f u l o r w o n d e r f u l ? U n f o r t u n a t e l y there arc s o m e d a r k sides too. E v e r y b o d y has heard o f kids g o i n g c r a z y about d o w n l o a d e d g a m e s , forgetting to go to school, f o r g e t t i n g to go to the training c o u r s e or e v e n forgetting to eat! E v e r y b o d y has read about kids b e c o m i n g disillusioned about e m o t i o n s , love a n d true h u m a n feelings, due to p o r n o g r a p h i c f i l m s or thrillers watched on TV or the Internet. Let's h o p e that the Internet - like all novelties - will s l o w l y lose its attraction and find its p r o p e r p l a c e in our life, and serve us instead of t h r e a t e n i n g our personality. (310
words)
4. Sport and the Internet T h e Internet is a vast s o u r c e of e n t e r t a i n m e n t a n d it o f f e r s s p o r t s in different f o r m s as well. Spoils m a y be passively e n j o y e d - like w a t c h i n g an e x c i t i n g r u g b y m a t c h or f o l l o w i n g a chess g a m e - , or can be learned or p r a c t i c e d - with t h e h e l p of d i f f e r e n t simulation activities and interactive g a m e s . I have several f r i e n d s w h o s p e n d hours r e a d i n g sport n e w s or w a t c h i n g live b r o a d c a s t s of sport e v e n t s - tennis f r o m W i m b l e d o n , the O l y m p i c G a m e s f r o m A t h e n s . S o m e t i m e s these p r o g r a m s are s o i m p o r t a n t f o r t h e m that they will access these sites on their m o b i l e p h o n e w h i l e travelling or f o l l o w ' t h e latest results in a small w i n d o w on their monitor. Another g r o u p of friends s p e n d most of their f r e e t i m e p a r t i c i p a t i n g in online b r i d g e t o u r n a m e n t s or p l a y i n g c h e s s g a m e s with virtual o p p o n e n t s or real ones sitting on the o t h e r s i d e of the world. W h y do t h e s e p e o p l e s p e n d so m u c h e n e r g y on t h e s e activities? Is it a kind of r e p l a c e m e n t f o r reality, a c o r n e r to be alone? Is it an easier w a y of f i n d i n g partners f o r their f a v o u r i t e p a s t - t i m e activities? Is it a kind of h i d e - a n d - s e e k w h e r e you do not s h o w y o u r w e a k n e s s e s and v u l n e r a b i l i t i e s ? Is it a w a y to prepare for a real g a m e against real o p p o n e n t s ? We don't k n o w the a n s w e r s . W h a t we do k n o w is that the I n t e r n e t can be a blessing or a curse, like all t e c h n o l o g i c a l inventions. It is up to the i n d i v i d u a l w h e t h e r it will b e c o m e our m a s t e r or our o b e d i e n t servant.
(250 words) 5. Smart Devices and Their Influence on Quality of Life High tech inventions are g r e a t l y i n f l u e n c i n g the quality of o u r e v e r y d a y life. Let's j u s t think of i n v e n t i o n s like the a u t o m a t i c w a s h i n g m a c h i n e , t h e dish-washer, t h e m i c r o w a v e and the o t h e r household a p p l i a n c e s , w i t h o u t which w e can't i m a g i n e our life a n y longer. T h e s e d e v i c e s h a v e b e c o m e s o natural that we don't e v e n c o n s i d e r t h e m high-tech p r o d u c t s . W h a t a b o u t digital c a m e r a s to edit our p e r s o n a l p h o t o s , p e n - d r i v e s to transfer o u r data, f l a t - s c r e e n s to protect o u r e y e s , h o m e n e t w o r k s to play c o m p u t e r g a m e s with p e o p l e in the o t h e r r o o m and m a n y m o r e i n v e n t i o n s o f f e r e d by a d v e r t i s e m e n t s a n d c o n s i d e r e d indispensable to 'keep up with the J o n e s ' ? Mow can we find the b a l a n c e b e t w e e n those g o o d s that are n e c e s s a r y to i m p r o v e our quality of life and t h o s e that belong to the c a t e g o r y of u n n e c e s s a r y c o n s u m p t i o n ? There m a y b e serious c o n s e q u e n c e s o f b e c o m i n g o v e r - d e p e n d e n t o n technology. D o i n g virtual s i m u l a t e d sports instead o f training our body, p l a y i n g interactive g a m e s instead o f m e e t i n g p e o p l e , e n j o y i n g r e c o r d e d m u s i c instead o f g o i n g t o a live c o n c e r t m a y d e s t r o y o u r b o d y a n d soul. At the s a m e t i m e we m u s t r e m e m b e r that life is c h a n g i n g - a n d h o p e f u l l y c h a n g i n g f o r t h e better, t h a n k s to health devices like p a c e - m a k e r s , e d u c a t i o n a l tools like e - l e a m i n g , industrial e q u i p m e n t like robots. Like e v e r y t h i n g else, t e c h n o l o g y can be t u r n e d to g o o d or b a d u s e s . T h e question is w h o is m a k i n g the d e c i s i o n s and for w h a t p u r p o s e ?
(230 words)
6. What is Your Opinion about Unwanted Kinails? livsidcs the huge a d v a n t a g e s o f e m a i l i n g there a r e several d i s a d v a n t a g e s , s p a m b e i n g just o n e o f them. I lie Internet user must a l w a y s be a w a r e of the risks he is t a k i n g w h e n g o i n g online b e c a u s e this w a y his d o c u m e n t s m a y be e x p o s e d to c r a c k e r s or h a c k e r s . I here a r e several w a y s of p r o t e c t i o n , e.g. email filters or s p a m bols but basically it is i m p o s s i b l e to fully protect your mbox. Unless you use email for the very limited p u r p o s e of p r i v a t e c o r r e s p o n d e n c e , you will regularly gel spam advertising high tech products or s e r v i c e s , free h o l i d a y s or s u p e r d i s c o u n t s . C a u t i o u s people don't j o i n n e w s g r o u p s or chat r o o m s b e c a u s e they are a w a r e of t h e dangers but in d o i n g this they e x c l u d e themselves f r o m t h e f u n these virtual c o m m u n i t i e s can offer. 1 personally tend to d e l e t e e v e r y e m a i l m e s s a g e c o m i n g f r o m u n - k n o w n s e n d e r s and c a r e f u l l y get rid of all mails with a t t a c h m e n t s or further links like 'your postcard', etc. S o m e t i m e s I get ' m e a t l o a v e s ' , that is emails f r o m friends or c o - w o r k e r s s e n d i n g me j o k e s or interesting gossip without any personal message. In these cases - if I h a v e l i m e -1 m a y read them but never forward them because I think emailing has replaced the tradition of letter-writing, which has a l w a y s b e e n a personal affair. In my o p i n i o n s p a m m i n g is n o t ethical. At the s a m e t i m e it is u n d e r s t a n d a b l e that the n e w tools a n d possibilities of m o d e m technology do not o n l y i m p r o v e our quality of life b u t h a v e their n e g a t i v e e f f e c t s on it as well.
(240 words) 7. File-Sharing and Copyright Most y o u n g people are c r a z y a b o u t music a n d s o m e of t h e m will listen to m u s i c a l m o s t all the t i m e they are a w a k e ! T h e n u m b e r o f g a d g e t s o n w h i c h y o u can listen t o m u s i c i s e n d l e s s , b e s i d e s cassette-players a n d w a l k m a n s , y o u n g people o f t e n listen on their c o m p u t e r to m u s i c d o w n l o a d e d with the help of the so-called f i l e - s h a r i n g p r o g r a m s . T h e r e h a v e been several s c a n d a l s a r o u n d t h e s e Internet sites - M P 3 , K a z a a , etc. - gossip a b o u t then being closed d o w n , r e o p e n i n g or being s u e d - w h i c h is quite u n d e r s t a n d a b l e if we c o n s i d e r h o w h a r m f u l they are f o r the c o m p a n i e s involved in the m u s i c industry. If I u n d e r s t a n d it correctly, the w h o l e affair is b a s e d on s w a p p i n g m u s i c o v e r the Internet. Let's s u p p o s e you h a v e a library of y o u r favourite b a n d or s i n g e r or s t y l e of m u s i c a n d y o u w a n t to increase your library. You o f f e r y o u r m u s i c to those w h o want to d o w n l o a d it, and in return y o u can a c c e s s theirs for free. The w h o l e idea s o u n d s brilliant a n d very s i m p l e - like all brilliant ideas do - but it isn't so brilliant for those w h o want to m a k e money from producing records, C D s or D V D s . Can y o u imagine h o w w o r r i e d or e v e n angry y o u w o u l d be if y o u k n e w that y o u r product, m a n u f a c t u r e d at a certain cost including copyright, fees, production, m a r k e t i n g , etc., will sell only in limited n u m b e r s t h a n k s to sites w h i c h o f f e r it for free! Since this has been g o i n g on m a n y p e o p l e h a v e b e e n c r a c k i n g their head to find a solution. T h e o n e they c a m e up with at the very beginning w a s s u i n g t h e s e sites for illegal trading. T h e p r o b l e m is it doesn't s e e m to w o r k . I don't think there is a n y real s o l u t i o n unless we start from t w o d i f f e r e n t directions. O n e is to c o n v i n c e p e o p l e that d o w n l o a d i n g illegally is a d i s h o n e s t activity a n d the other is that the m u s i c industry c o m p a n i e s w i l l o f f e r their products at s u c h a l o w price that m o s t y o u n g people can a f f o r d to b u y them.
(3JO words) 8. The Importance of Student Mobility in Academic Studies In our w o r l d i n f o r m a t i o n is a k e y w o r d . O n e can get m o s t of t h e i n f o r m a t i o n r e q u i r e d just by sitting in front of the m o n i t o r a n d a c c e s s i n g the Internet. But i n f o r m a t i o n m u s t be u s e d creatively. H u m a n creativity is very h a r d to d e f i n e , but perhaps if we s a y that creativity can m e a n p r o d u c i n g s o m e t h i n g n e w in quality, s o m e t h i n g that hasn't existed before, we c a n n o t be far f r o m b e i n g right. For c r e a t i n g s o m e t h i n g n e w w e n e e d our limitless i m a g i n a t i o n . B u t o u r i m a g i n a t i o n has t o b e n o u r i s h e d . O n e o f the best w a y s for this m a y b e travelling, w o r k i n g a b r o a d o r m e e t i n g n e w p e o p l e . As y o u n g p e o p l e are m u c h m o r e flexible a n d creative t h a n the o l d e r g e n e r a t i o n s , student m o b i l i t y must be a priority for all nations that want to rear c r e a t i v e artists, scientists or s i m p l y satisfied citizens. While s t u d y i n g abroad o n e can not only m a k e n e w f r i e n d s a n d l e a m n e w a p p r o a c h e s t o basic h u m a n issues, but o n e can find a n s w e r s to one's o w n q u e s t i o n s with the h e l p of t h e d i f f e r e n t d i m e n s i o n s e x p e r i e n c e d there. T h e w e s t e r n countries h a v e long d i s c o v e r e d this b a s i c truth a n d e v e n t h o s e y o u t h s who don't i n t e n d t o pursue their studies s o m e t i m e s d e c i d e to take a so-called 'gap-year' a n d e x p l o r e the w o r l d for their o w n f u n a n d f o r society's benefit. I hope that this concept a n d practice will soon spread in H u n g a r y so widely that a large percentage of Hungarians will be able to encourage their children to be mobile and s e e the w o r l d b e f o r e settling d o w n to the everyday routine of working life.
(250 words)
l
). Wlial I)o You I liink of llackers? Is Ille«al Downloadin« Stealin«? N o w a d a y s the large lilm p r o d u c e r s a n d r e c o r d - m a k i n g c o m p a n i e s arc c o m p l a i n i n g a b o u t their losses resulting from pirating. There are different reasons f o r this. O n e reason m a y be that storage d e v i c e s are b e c o m i n g c h e a p and the technology is b e c o m i n g easily accessible. You don't need a n y t h i n g else j u s t a blank CD and a c h e a p CD burner to have a copy of y o u r f a v o u r i t e b a n d ' s record and h a v e j u s t as g o o d quality as the original. With D V D technology the quality of the video f i l m s m a y be identical to the e x p e n s i v e c o p y r i g h t e d c o p y and then you don't even have to leave y o u r a r m c h a i r and go s h o p p i n g . T h e other reason is the existence of c o u n t l e s s sites which enable you to d o w n l o a d liles. You can e v e n j o i n discussion groups and chat forums in order to get the most recent information about new sites, possible d o w n l o a d s or file-swapping possibilities. W h y pay m o n e y if you can a c c e s s e v e r y t h i n g for free? A n d here we h a v e arrived at the main issue, the m o r a l question You, as a l a w - a b i d i n g citizen w o u l d not even dream of stealing a record or a book f r o m a s h o p . W h e n d o w n l o a d i n g illegally you don't e v e n feel you are d o i n g s o m e t h i n g immoral
W h y ? B e c a u s e n o b o d y can s e e and c a t c h y o u ? Perhaps b e c a u s e you are a n o n y m o u s ? B e c a u s e others are
d o i n g the s a m e ? 1 don't k n o w the answer. W h a t I k n o w is that t h e record and m o v i e m a k e r s will s o o n f i n d a w a y to s t o p it. If not by c o n v i n c i n g us that hot d o w n l o a d s are illegal, then by getting g o v e r n m e n t s to s t r i n g e n t l y e n f o r c e t h e law.
(260 words)
10. Computer-Controlled Safety Tools Life is risky. T h e r e are so m a n y places and w a y s o u r life can be threatened that we c a n n o t help t h i n k i n g it is a wonder that we are still alive! A n e w - b o r n baby can stop breathing at any m o m e n t and n o b o d y fully u n d e r s t a n d s why. Toddlers can mn under a moving car, or fall into a shallow pond in the garden and d r o w n . A n d this is just the beginning 1 W h a t about teenagers cycling on c r o w d e d r o a d s or e x p e r i m e n t i n g with c h e m i c a l s in the school lab. Is there a w a y to protect us f r o m all p o s s i b l e d a n g e r s ? Of course the a n s w e r is n e g a t i v e , a l t h o u g h there are certain ways to lessen the d a n g e r s of e v e r y d a y life. O n e w a y is to use technology. T h e s e s m a r t g a d g e t s are p r e s e n t in all fields of h u m a n activity. I don't m e a n C A D a n d C A M or s m a r t credit cards, h o u s e h o l d g a d g e t s , but extra d e v i c e s that can m a k e our life safer. T h e s e m a y be: - A smart g a d g e t to warn the m o t h e r in the h o u s e w h e n an object of about her child's size falls into the garden pond. - S e n s o r s to report to the p o l i c e any d i s t u r b a n c e caused by an unauthorized visitor in y o u r - h o m e . - C o m p u t e r s to m o n i t o r patients' vital f u n c t i o n s in intensive care. - Smart o x y g e n tanks for divers. - C h i p s w h i c h send signals f r o m u n d e r the s n o w w h e r e a skier or hiker has b e e n buried by an a v a l a n c h e . - R o b o t s that take over tasks too risky f o r h u m a n s in space, u n d e r water, in a c h e m i c a l factory, etc. T h e real question is to what extent science can m a k e life safer? Can we really stop w o r r y i n g ? C a n we stop being careful a n d attentive? Of course not! H u m a n thinking can never be eliminated. H u m a n s can never be replaced by thinking c o m p u t e r s however fantastic scientific a c h i e v e m e n t s will be in the f u t u r e .
(29 H words)
IV. sz. Fi;LA DAT Sample Translations 1. A következő GameCube játékkészlet 2005-ben jön ki. A N i n t e n d o azt állítja, h o g y a játék k e d v e l ő i m á r k e v e s e b b m i n t egy é v e n belül, 2005-ben láthatják, milyen lesz a G a m e C u b e új változata.A j a p á n j á t é k g y á r t ó óriás bejelentette, h o g y a j ö v ő m á j u s i E3 nevű j á t é k v á s á r o n szeretné bemutatni j á t é k k o n z o l j á n a k k ö v e t k e z ő generációját. Ahelyett, hogy a réginek e g y új változatát a j á n l a n á k , inkább a j á t é k használatának új m ó d o z a t a i t m u t a t j á k be. A j ö v ő é v b e n a S o n y és a M i c r o s o f t várhatóan szintén piacra d o b j a új j á t é k k o n z o l j a i t . Az eladások visszaesése A G a m e C u b e - n a k a S o n y P l a y S t a t i o n 2. és a Microsoft X b o x régóta k o m o l y k o n k u r e n c i á t j e l e n t . A N i n t e n d o a múlt é v b e n 6 millió j á t é k k o n z o l t szándékozott eladni, a z o n b a n ez nem sikerült és csak mintegy 5 millióra talált keresletet. A k ö v e t k e z ő 12 h ó n a p b a n 4,5 millió darab eladása a célja. A G a m e C u b e eladások k i á b r á n d í t ó m é r t é k e a Nintendóra ö v ö n aluli ütést mért, a c é g éves e r e d m é n y é b e n kimutatott tiszta haszna 50%-kal c s ö k k e n t . Az N P D elemzői szerint az amerikai e l a d á s o k visszaestek, a piaci f o r g a l o m 17%-át a G a m e C u b e eladásai teszik ki. A j ö v ő t illetően viszont a N i n t e n d o igen nagyratörő eladási terveket dédelget d u p l a - k i j e l z ő s kézi j á t é k k o n z o l j a i révén A N i n t e n d o azt állítja, h o g y r e m é n y e i szerint 3,5 millió DS k o n z o l t fog eladni, amely J a p á n b a n 2 0 0 4 végén, E u r ó p á b a n és az U S A - b a n 2005 elején kerül f o r g a l o m b a .
Keserű pirula a „Net-hipochondereknek" Az internet az o r v o s t u d o m á n y r a is n a g y hatással van, és h a s o n l ó a n a többi területhez, l e g i n k á b b olyan m ó d o n , hogy az orvosi l a b o r a t ó r i u m o k b a n d o l g o z ó k u t a t ó k m e g tudják osztani e r e d m é n y e i k e t a világ k ü l ö n b ö z ő részein t e v é k e n y k e d ő kollégáikkal. Web-oldalak ezrei állítják, h o g y online tudnak diagnosztizálni, illetve g y ó g y í t a n i k ü l ö n b ö z ő b e t e g s é g e k e t , de vannak k é t e l k e d ő k , akik arra k í v á n c s i a k , m e n n y i r e m e g b í z h a t ó k e z e k az i n f o r m á c i ó k . Bár a körzeti orvosnál töltött vizsgálat során m e g k a p j á k a g y o r s diagnózist és a g y ó g y s z e r t , s o k a n úgy érzik, h o g y ez az idő túlságosan rövid arra, h o g y e l e g e n d ő információt k a p j a n a k az e g é s z s é g ü g y i p r o b l é m á j u k r ó l . Az Internet sok e m b e r s z á m á r a é p p e n azt adja, amire s z ü k s é g e van, és ezzel megteremti egy új csoport, az ú g y n e v e z e t t net-hipochonderek á l l a n d ó n ö v e k e d é s é n e k a feltételeit. Az Internetes Egészség a N e t e n A l a p í t v á n y által elvégzett k i m u t a t á s szerint a beteg e m b e r e k 5 0 % - a az Internetet arra használja, h o g y m é g egy s z a k v é l e m é n y t szerezzen be. A betegek több mint a fele, akik az Internetről szerzett orvosi tanácsokat m e g b e s z é l t é k az o r v o s u k k a l , úgy találta, h o g y a konzultáció ilyen m ó d o n s o k k a l kielégítőbb s z á m u k r a . Vajon több a kár, mint h a s z o n ? Mindazonáltal az ö n d i a g n ó z i s igazi a k n a m e z ő n e k bizonyulhat. A letöltött i n f o r m á c i ó zavart és s z ü k s é g t e l e n ijedtséget is okozhat. A neten százával találhatók azok a gátlástalan honlapok, a m e l y e k csak azért v a n n a k , hogy p é n z t c s i n á l j a n a k felrakóiknak. A d i a g n ó z i s lényege az, h o g y az e m b e r e g y szakemberrel konzultál és esetleg vizsgálatokat végeztet, a m e l y e k után közösen megállapodnak a g y ó g y m ó d b a n . A konzultáció m e g l e h e t ő s e n egyoldalú, a betegek gyakran n e m t u d j á k , h o g y kivel beszélnek, és m e l y e k a konzultációt végző indítékai. Sok esetben ez az indíték gyorsan kiderül. Amit a szörfözők v a l ó s z í n ű l e g a p é n z ü k é r t k a p n a k , az lehet pontatlan, h a m i s v a g y megbízhatatlan. A h o n l a p o k a következő, tanácsot tartalmazó mondattal fedezik m a g u k a t : „ a m e n n y i b e n nyugtalanítja v a l a m i , forduljon o r v o s á h o z . "
90
Az egészséggel foglalkozó honlapok nem jelentenek fenyegetést a családi orvosoknak Egy kutatás szerint a családi o r v o s o k n a k n e m kell túlzottan a g g ó d n i amiatt, h o g y a betegeik az Internetről szedik le a/ információkat. A yorki egyetem kutatói 358 olyan háztartás szülőivel beszéltek, ahol egy vagy kél gyerek szenved krónikus betegségben, ü g y találták, h o g y e z e k n e k a g y e r e k e k n e k a szülei szerint az Internet a k i e g é s z í t ő i n f o r m á c i ó k h a s z n o s forrása U g y a n a k k o r a szülők elmondták, hogy m e g m a r a d t a hitük az egészségügyi s z a k e m b e r e k b e n - illetve a gyógyszerekben - cs ritkán k é n y s z e r ü l n e k arra, h o g y m e g v á l t o z t a s s á k a kezelést. Dr. S.N. vezető kutató szerint a b e t e g e k a netet n e m k ü l ö n á l l ó a n h a s z n á l j á k , h a n e m ö s s z e v e t i k a z o k k a l a forrásokkal, a m e l y e k e t a családtól, barátoktól, k ö n y v e k b ő l , f o l y ó i r a t o k b ó l és m á s h o n n a n s z e r e z n e k be. Kutatásaink azt is m u t a t j á k , h o g y az e m b e r e k é s s z e r ű e n m e g t u d j á k szűrni a vveben találtakat, n i n c s feltétlenül s z ü k s é g egy e g é s z rendszerre a h h o z , hogy segítségével garanciát k a p j u n k a z e g é s z s é g h e z k a p c s o l ó d ó online i n f o r m á c i ó k helyességéről. Ezzel együtt azt is m e g tudtuk állapítani, h o g y az e m b e r e k értékelik, ha e g é s z s é g ü g y i s z a k e m b e r e k a j á n l j á k f i g y e l m ü k b e a w e b e n m e g t a l á l h a t ó forrásokat. A yorki csoport 358 g y e r m e k e s családot kérdezett m e g , 69 s z ü l ő v e l és 16 g y e r e k k e l végeztek u t ó l a g o s interjúkat. Ü g y találták, h o g y a legtöbb e m b e r i g e n c s a k m e g b í z i k az e g é s z s é g ü g y i s z a k e m b e r e k b e n , és a v é g s ő döntést ritkán b e f o l y á s o l j a a vvebről leszedett i n f o r m á c i ó . Az is bebizonyosodott, h o g y a legtöbb e m b e r óvatosan kezeli a vvebet, és tudatában van ezeknek az online információknak a veszélyeivel, sőt a b b a n is b i z t o s a k , h o g y m e g t u d j á k k ü l ö n b ö z t e t n i az értékes i n f o r m á c i ó k a t a „ s z e m é t t ő l " . Adataink szerint a b e t e g e k ú g y g o n d o l j á k , h o g y a g y a n ú s o r v o s i i n f o r m á c i ó k c s a k m á s o k a t v e z e t h e t n e k félre, őket m a g u k a t nem.
Az Apple kezelni tudja a Mac biztonsági hiányosságait Az A p p l e f e l h a s z n á l ó k a z z a l a céllal f r i s s í t i k fel a s z o f t v e r ü k e t , h o g y s e g í t s é g é v e l b e t ö m j é k a z t a b i z t o n s á g u k a t veszélyeztető' l y u k a t , a m e l y e l m é l e t b e n k i s z o l g á l t a t j a s z á m í t ó g é p ü k e t a k ü l ö n b ö z ő ' t á m a d á s o k n a k . Pénteken az A p p l e a Safari vveb-keresőjén f i g y e l m e z t e t e t t arra a hibára, a m e l y l e h e t ő v é teszi, h o g y egy rosszindulatú kód anélkül f u s s o n a s z á m i t ó g é p e n , hogy arról a f e l h a s z n á l ó t u d o m á s t s z e r e z n e . U g y a n a k k o r a S e c u n i a n e v ű b i z t o n s á g t e c h n i k a i cég azt állította, h o g y m é g v a n n a k - általa k r i t i k u s n a k nevezett biztonsági l y u k a k a O S X n e v ű o p e r á c i ó s r e n d s z e r b e n . A M a c - e k arról n e v e z e t e s e k , h o g y k e v e s e b b b i z t o n s á g i p r o b l é m á i k vannak, mint a W i n d o w s a l a p ú személyi számítógépeknek. E b b e n a h ó n a p b a n a z o n b a n ez m á r a m á s o d i k eset, h o g y az A p p l e s z o f t v e r b e n t a l á l h a t ó b i z t o n s á g i h i á n y o s s á g o k r a figyelmeztetnek. Jobb, mint a legtöbb Az A p p l e egy k ö z l e m é n y b e n tárgyalt a s z o f t v e r elméleti s e b e z h e t ő s é g é r ő l , és felszólította az O S X o p e r á c i ó s rendszert a l k a l m a z ó f e l h a s z n á l ó k a t , h o g y telepítsenek fel egy rövid b i z t o n s á g i p r o g r a m o t . Az A p p l e n a g y o n k o m o l y a n veszi a b i z t o n s á g o t , és g y o r s a n m e g t e s z mindent, h o g y - amint t u d o m á s á r a jut - r e a g á l j o n lehetséges veszélyre. Bár nincs olyan o p e r á c i ó s rendszer, a m e l y t ö k é l e t e s e n el tud hárítani m i n d e n f é l e b i z t o n s á g i p r o b l é m á t , a M a c O S X U N I X - a l a p ú operációs r e n d s z e r e e d d i g s o k k a l h a t é k o n y a b b n a k bizonyult a többinél. Ezzel s z e m b e n a S e c u n i a c é g ü g y v e z e t ő i g a z g a t ó j a azt állította, h o g y az A p p l e m á r kezdettől f o g v a s e m kezelte m e g f e l e l ő súllyal az ügyet. Az A p p l e hívek m á r régen k i f i g y e l t é k a M a c előnyeit, ami r é s z b e n abból a d ó d i k , h o g y a g é p v i s z o n y l a g i m m ú n i s az olyan biztonsági h i á n y o s s á g o k k a l és v í r u s o k k a l s z e m b e n , a m e l y e k m e g t á m a d j á k a W i n d o w s - a l a p ú s z á m í t ó g é p e k e t . A M i c r o s o f t o t a s z á m í t ó g é p v i l á g b a n betöltött u r a l k o d ó h e l y z e t e és rossz b i z t o n s á g i statisztikái a vírusgyártók k e d v e n c céltáblájává teszi.
A Linux Media Player kis lépést jelent abban a felfelé törő harcban, amit a Linux folytat A G N U n e v ű L i n u x - a l a p ú i n g y e n e s s z á m í t ó g é p e s o p e r á c i ó s r e n d s z e r j ó v a l n a g y o b b e r e d m é n n y e l hódítja m e g a nagy ipari s z á m í t ó g é p e s a d a t k ö z p o n t o k a t , mint az asztali s z e m é l y i s z á m í t ó g é p e k p i a c á t . A z o n b a n azzal, hogy l e l h a s z n á l ó - b a r á t a b b s z o f t v e r t lehet futtatni a L i n u x a l a p ú g é p e k e n , ez az i n g y e n e s o p e r á c i ó s r e n d s z e r e g y r e n a g y o b b s i k e r e k e t ér el a jelenleg u r a l k o d ó P C - s z o f t v e r h a t a l o m , a Microsoft elleni Dávid-Góliát k ö / t i \ ei s e n y b e n is. Ebben a Linux állal vívott h a r c b a n a mai n a p o n ú j a b b lépés történik, a m i k o r két n a g y Linux terjesztő, a Red Mat és a Novell várhatóan bejelenti, h o g y a R e a l N e t w o r k s nevű m e d i a - l e j á t s z ó s z o f t v e r t feltelepítik a Linux alapon m ű k ö d ő asztali s z á m í t ó g é p p e l irányított t e r m é k e k r e . A Rob G l a s e r által alapított R e a l N e t w o r k s n e v ű c é g volt a k e z d e t e k b e n az a v e z e t ő szoftvergyártó, a m e l y n e k s z o f t v e r e i az Interneten keresztüli digitális z e n e és v i d e o f á j l o k lejátszását teszik lehetővé. A c é g által előállított m é d i a - l e j á t s z ó s z o f t v e r v e r s e n y r e tud kelni a z M S W i n d o w s M e d i a Player-rel. A két c é g közötti rivalizálás m o s t anti-tröszt k é r d é s s é vált. Az E u r ó p a T a n á c s által hozott ítélet azt állapította m e g márciusban, hogy az M i c r o s o f t törvénytelenül h a s z n á l j a fel a W i n d o w s által biztosított m o n o p ó l i u m á t a személyi s z á m í t ó g é p operációs r e n d s z e r e k területén arra, hogy s e g í t s é g é v e l m e g s z e r e z z e a „ m é d i a - p l a y e r " p i a c o n a vezető helyzetet. Az E u r ó p a Tanács elrendelte, h o g y a M i c r o s o f t köteles a W i n d o w s m é d i a - p l a y e r nélküli változatát is piacra dobni. A d ö n t é s ellen a M i c r o s o f t fellebezést nyújtott be. Tegnap az Európa Tanács b e l e e g y e z e t t abba, h o g y n e m r a g a s z k o d i k a mai h a t á r i d ő h ö z . E szerint a M i c r o s o f t arra kényszerült volna, h o g y E u r ó p á b a n f o r g a l o m b a h o z z a a s z o f t v e r szétbontott változatát. Eközben a l u x e m b u r g i bíróság m é g tárgyalja az ügyet. A R e a l N e t w o r k s k o r á b b a n m á r disztribúciós m e g á l l a p o d á s o k a t kötött a T u r b o L i n u x - s z a l , a m e l y igen erős az ázsiai piacon, valamint a Sun M i c r o s y s t e m s - s z e l , a m e l y J a v a - a l a p ú asztali s z á m í t ó g é p e L i n u x szoftver alatt fut. A Linux igen gyorsan t e r j e d a s z e m é l y i s z á m í t ó g é p e s p i a c o n , ezért a L i n u x - t e c h n i k a vált a m é d i a - p l a y e r s z o f t v e r tenvleges s z a b v á n y á v á .
6. Nagy léptekkel érkezik a digitális tv. Miért nincs nagyobb hűhó körülötte? Ú g y tűnik, s e m m i s e m történik k ö n n y e n , a m i k o r k á b e l - s z o l g á l t a t ó k é s e l e k t r o n i k a i cégek e g y e s ü l n e k . Csütörtöktől a k á b e l s z o l g á l t a t ó k együttesen f e l h a t a l m a z á s t k a p n a k arra, h o g y a f e l h a s z n á l ó k s z á m á r a olyan m ó d s z e r t biztosítsanak, a m e l y n e k s e g í t s é g é v e l anélkül n é z h e t ő k a digitális és nagy f e l b o n t á s ú t v - p r o g r a m o k , h o g y s z ü k s é g lenne pénzt kiadni egy. a k é s z ü l é k r e állítható digitális „ d o b o z é r t " . A k o r m á n y hosszútávú t e r v é n e k részeként, a m e l y arra irányul, h o g y m i n d e n ü t t a digitális tv-adás t e r j e d j e n el. arra van szükség, h o g y a szolgáltatók ú g y n e v e z e t t „ k á b e l k á r t y á k a t " o s s z a n a k szét. E z e k kb. olyan nagyok, m i n t n é h á n y hitelkártya ö s s z e f o g v a , és e z e k e t az új t v - k é s z ü l é k b e m e n e t i n y í l á s á b a kell beilleszteni ahhoz, h o g y h o z z á lehessen férni a k ó d o l t digitális p r o g r a m h o z . Csütörtöktől k e z d ő d ő e n a t v - k é s z ü l é k e k l e g a l á b b fele, a m e l y e k 36 c o l o s , v a g y annál n a g y o b b k é p e r n y ő v e l r e n d e l k e z n e k , m á r csak ilyen k á r t y a b e m e n e t i nyílással' f e l s z e r e l v e k e r ü l h e t n e k a k e r e s k e d e l e m b e . Azon felül, h o g y nincs t ö b b é s z ü k s é g ütött-kopott, k é s z ü l é k r e állított d o b o z o k r a , ez a kártyás technológia arra szolgál, l u g y n ö v e l j é k vele a t v - k é s z ü l é k e k eladási s z á m á t , v a l a m i n t arra is m o t i v á l j á k a tv-tulajdonosokat, h o g y e l ő f i z e s s e n e k a digitális szolgáltatásokra. De a v a l ó s á g e g é s z e n m á s lehet! Ezek a k á b e l k á r t y á k - n e m úgy, m i n t a k é s z ü l é k r e állított d o b o z o k - csak e g y i r á n y ú jelzéseket t o v á b b í t a n a k : a k á b e l szolgáltatótól a f e l h a s z n á l ó o t t h o n á b a . Az e z e k k e l a k á r t y á k k a l m ű k ö d ő t v - t u l a j d o n o s o k n e m tudnak videózni vagy olyan interaktív p r o g r a m o k h o z é s m á s s z o l g á l t a t á s o k h o z h o z z á j u t n i , a m e l y h e z k é t i r á n y ú j e l z é s e k r e van szükség. Ez a j e l e n t ő s hátrány azt e r e d m é n y e z i , hogy a d o b o z z a l r e n d e l k e z ő t v - t u l a j d o n o s o k valószínűleg n e m sietnek m a j d lecserélni készülékeiket. A t v - g y á r t ó k a b b a n r e m é n y k e d n e k , hogy a k á r t y á s m ó d s z e r a n n a k a közel 50 m i l l i ó kábel-tv t u l a j d o n o s n a k lesz v o n z ó , akik n e m f i z e t n e k elő a digitális m ű s o r s z ó r á s r a , és akik csak e g y o l y a n e g y s z e r ű m e g o l d á s t k e r e s n e k , a m e l y segítségével h o z z á f é r n e k a digitális s z o l g á l t a t á s o k h o z . U g y a n a k k o r sok p i a c e l e m z ő n e k k é t s é g e i v a n n a k , v a j o n a piac f e l k a r o l j a - e ezt a technikát.
92
7.
Törvénytervezet az online kalózkodás ellen Az online k a l ó z k o d á s v i s s z a f o g á s a érdekében m e g f o g a l m a z o t t törvényjavaslatot sokan azért t á m a d j á k , mert túl általános. Az ezen a héten a S z e n á t u s b a n tárgyalt, a szerzői j o g o k a t s z a b á l y o z ó t ö r v é n y j a v a s l a t o t kritikával f o g a d j á k a t e l e k o m m u n i k á e ó s és az elektronikai cégek képviselői. Azt állítják, h o g y ez a t ö r v é n y a s z á m í t ó g é p gyártó cégeket. Internet szolgáltatókat és m á s technológiai üzletágakat kiszolgáltatja az o n l i n e k a l ó z k o d á s n a k . U g y a n a k k o r a t ö r v é n y t á m o g a t ó i , beleértve a mindkét p á r t h o z tartozó s z p o n z o r o k a t is, azt állítják, ez a törvény h a t é k o n y e s z k ö z arra, h o g y visszaszorítsa az illegális z e n e és m á s fájlok másolását, és m e g v é d j e a g y e r e k e k e t attól, hogy egy olyan t e c h n o l ó g i a b ű v k ö r é b e kerüljenek, a m e l y n e k segítségével törvényt s é r t h e t n e k . liz a kedden tárgyalt t ö r v é n y t e r v e z e t , az ú g y n e v e z e t t „ k é n y s z e r í t ő " rendelet bárkit, aki s z á n d é k o s a n segít, felbújt, elősegít vagy r á v e s z szerzői j o g o k megsértésére, a t ö r v é n y által felelősségre v o n h a t ó v á tesz. E l s ő d l e g e s e n azok ellen a „ f i l e - m e g o s z t ó " s z o f t v e r g y á r t ó c é g e k ellen készült, a m e l y e k segítségével előállítják és az Interneten-keresztül árusítják a digitális f á j l o k m á s o l a t a i t . A t ö r v é n y kritikusai azt állítják, hogy a t ö r v é n y n y e l v e z e t e túl általános és l é n y e g é b e n csak egy 1984-es L e g f e l s ő b b Bírósági határozat á t f o g a l m a z á s a . Ez a határozat védte m e g e d d i g azokat a cégeket, a m e l y e k olyan t ö r v é n y e s t e c h n o l ó g i á k a t f e j l e s z t e n e k , a m e l y e k törvénytelen c é l o k r a is f e l h a s z n á l h a t ó k . Ez h a t é k o n y e s z k ö z n e k tűnik arra, h o g y segítségével olyan g a z d a s á g i á g a k a t f e n y e g e s s ü n k és f é l e m l í t s ü n k m e g , a m e l y e k m ű k ö d é s é v e l a szerzői j o g tulajdonosai n e m értenek egyet.
8. Az internetes marketing személyesebbé válik A 2 0 0 2 - b e n b e m u t a t o t t „ M i n o r i t y R e p o r t " c í m ű f i l m b e n a T o m Cruise állal j á t s z o t t f ő s z e r e p l ő , John A n d e r t o n úgy száguldott át a v á r o s o n , h o g y k ö z b e n az elektronikus óriásplakátok név szerint beszéltek hozzá. A z internetes r e k l á m o k k ö v e t k e z ő h u l l á m a m á r b e l ő l ü n k , m i n d a n n y i u n k b ó l i s J o h n A n d e r t o n t csinálhat. A j ö v ő héttől k e z d v e n é h á n y amerikai marketinges elkezd n é v r e szóló r e k l á m o k a t k ü l d ö z g e t n i a z o k n a k az Internet h a s z n á l ó k n a k , a k i k - t ö b b e k k ö z ö t t - az A b o u t . c o m , L y c o s . c o m vagy a n y t i m e s . c o m w e b o l d a l a k r a f e l m e n n e k , í g y ahelyett, h o g y a z e m b e r egy véletlenszerű r e k l á m r a akad, ami arra a k a q a r á b e s z é l n i , h o g y l é p j e n b e például a z A u d i o B o o k K l u b b a , v a g y látogassa m e g a z O r b i t z é s P r i c e l i n e n e v ű utazási i r o d á k h o n l a p j á t , saját n e v é r e s z ó l ó r e k l á m o k a t találhat, a m e l y e k emlékeztetik a h o n l a p s e g í t s é g é v e l bonyolított múltbeli Vásárlásaira, és arra u n s z o l j á k , h o g y azt i s m é t e l j e m e g . ( A z ötlet i j e s z t ő b b n e k h a n g z i k , m i n t a m i l y e n v a l ó j á b a n . C s a k azok f o g j á k látni e z e k e t a r e k l á m o k a t , akik k o r á b b a n b e l e e g y e z é s ü k e t a d t á k , h o g y elektronikus ü z e n e t e k e t k a p j a n a k azoktól a c é g e k t ő l , a m e l y e k k e l
m á r v a l a m i l y e n üzleti
k a p c s o l a t b a n álltak.) E l e m z ő k és ipari v e z e t ő k szerint ez az új m e g k ö z e l í t é s a z o k n a k az internetes k e r e s k e d ő k n e k kínál új és o l c s ó m e g o l d á s t vásárlóik m e g t a r t á s á r a , akik m á r sok pénzt áldoztak arra, h o g y m e g s z e r e z z é k ü g y f e l e i k e t . A z o n b a n a l e v é l s z e m é t s z ű r ő k j e l e n l e g elállják e g y c s o m ó j o g o s k e r e s k e d e l m i email üzenet útját. M o s t a n á i g a m a r k e t i n g e s s z a k e m b e r e k f ő k é p p arra használták az e m a i l üzeneteket, h o g y r á b e s z é l j é k v e v ő i k e t a visszatérésre. A levélszeméttől irtózó v e v ő k j e l e n l e g egyre k e v é s b é h a j l a n d ó k elolvasni a z o k a t a k e r e s k e d e l m i ü z e n e t e k e t , a m e l y e k átjutnak a szűrőkön. A D o t o m i n e v ű c é g , a m e l y az ú j f a j t a hirdetéseket a l k a l m a z z a , a n n a k a Yair G o l d f i n g e r - n e k a s z ü l e m é n y e , aki m e g alkotta azt a t e c h n o l ó g i á t , a m e l y végül az A O L g y o r s ü z e n e t k ü l d ő szolgáltatását e r e d m é n y e z t e . J o h n F e d e r m a n , a D o t o m i ü g y v e z e t ő igazgatója és a P C W e e k n e v ű folyóirat k o r á b b i k i a d ó j a szerint, Mr. G o l d f i n g e r fejlesztette ki a D o t o m i c é g „direkt ü z e n ő " rendszerét a k o r á b b i „direkt ü z e n e t k ü l d ő " t e c h n o l ó g i a k e r e s k e d e l m i megfelelőjeként.
9.
Bár érvényben van az ún. „Megengedő Törvény", Kína figyelemmel kíséri, mi történik az Interneten. Egy kínai b í r ó s á g n e m r é g e n j e l e n t e t t e be, h o g y e g y f e l f o r g a t ó t e v é k e n y s é g g e l vádolt személy, aki a z Internet s z a b a d s á g á é r t s z i l i t síkra, f e l f ü g g e s z t e t t s z a b a d s á g v e s z t é s t k a p a h o s s z ú b ö r t ö n b ü n t e t é s helyett. Az esetet kritikával fogadták a különböző e m b e r j o g i csoportok, és arra használták, hogy felhívják a figyelmet az ország e g y r e n ö v e k v ő számú internetes k o m m e n t á t o r a i r a . M i n d K í n á b a n , m i n d k ü l f ö l d ö n , n é h á n y k o m m e n t á t o r g y o r s a n m e g t a p s o l t a a m e g v á d o l t e m b e r iránt m u t a t o t t e n g e d é k e n y s é g hivatalos m e g n y i l v á n u l á s á t . Tu T a o - b i n igen t e r m é k e n y Online esszéíró, aki a s z ó l á s s z a b a d s á g r ó l és a d e m o k r á c i á r ó l jelentette m e g írásait a z Interneten. U g y a n a k k o r K í n a egyre n a g y o b b s z á m ú internetes k o m m e n t á t o r a i k ö z ö t t s o k a n v a n n a k o l y a n o k , akik arra f i g y e l m e z t e t nek, h o g y a m i ebben a n a g y figyelmet v o n z ó e s e t b e n a k o r m á n y n a g y l e l k ű s é g é n e k tűnik, az csak e g y c s ö n d e s és ö s s z e hangolt lépést takar arra, h o g y K í n a s z o r o s a b b r a f o n j a a z Internet feletti kontrollt é s a z internetezők m e g f i g y e l é s é t . A z internetes k á v é h á z a k s z ö r f ö s e i K í n á b a n m á r r é g ó t a k ü l ö n l e g e s e n s z é l e s k ö r ű e l l e n ő r z é s n e k v a n n a k kitéve. T ö b b e k k ö z ö t t o l y a n k a m e r á k v a n n a k e z e k n e k a z i n t é z m é n y e k n e k k ü l ö n b ö z ő részein e l h e l y e z v e , a m e l y e k s e g í t s é g é v e l b e lehet azonosítani az I n t e r n e t - h a s z n á l ó k a t és a w e b - m e s t e r e k e t . Az internetes k á v é h á z a k v e z e t ő i kétféle m ó d o n figyelik a n e t e z ő k e t , elektronikusan v a g y s z e m é l y e s e n k ö r b e j á r v a a h e l y i s é g e k b e n . A z átlagos Internet-használó u g y a n a k k o r e b b ő l s e m m i t n e m lát, sok e s e t b e n n e m i s sejti, h o g y erre a t e v é k e n y s é g r e n a g y j á b ó l 3 0 0 0 0 rendőrt a l k a l m a z n a k . A kínai k o r m á n y e g y olyan w e b o l d a l t i s létesített, a m e l y e n a z e m b e r e k b e t u d j á k j e l e n t e n i , h a n e t e z ő t á r s u k esetleg gyanús vagy provokatív m ó d o n viselkedik.
A hazugoknak és a csavargóknak a mobiltelefon jó alibit képes nyújtani. A m o b i l o k a t teletömték o l y a n e x t r á k k a l , m i n t p é l d á u l a b e é p í t e t t f é n y k é p e z ő g é p , saját k i c s e n g ő d a l l a m és s z ö v e g k ü l d é s i lehetőség. M i n d e z n a g y segítségére s z o l g á l t K e n n y H a l i n a k i s a b b a n , h o g y m e g c s a l j a a barátnőjét. A h ú s z é v e s denveri főiskolai d i á k m á r c i u s b a n elhatározta, h o g y e g y h é t v é g é t e g y m á s i k if jú h ö l g g y e l tölt el a közeli B o u l d e r b e n . A m o b i l j á h o z f o r d u l t segítségért. E g y ú n . alibi-szolgáltató k l u b t ö b b s z á z m o b i l t u l a j d o n o s t a g j á h o z f o r d u l t üzenetével. A k l u b m i n t e g y 3 4 0 0
e g y m á s t n e m i s m e r ő tagból áll, a k i k s e g í t e n e k e g y m á s n a k a b b a n , h o g y e l t u d j a n a k
lógni a m u n k á b ó l , k i b ú j j a n a k m e g b e s z é l t t a l á l k o z ó i k alól, v a g y m e g c s a l j á k s z e r e l m ü k e t . A segítség n e m váratott m a g á r a . A m i k o r elolvasta az ü z e n e t e t , az e g y i k k l u b t a g beleegyezett abba, h o g y f e l h í v j a a barátnőt. Ú g y tett, m i n t h a a B o u l d e r v á r o s á b a n t a l á l h a t ó C o l o r a d o E g y e t e m f o c i e d z ő j e lenne, é s azt m o n d t a , h o g y Mr. H a l i n a k p r ó b a j á t é k o n k e l l m e g j e l e n n i e . M i n d e n rendben m e n t - m o n d t a M r . H a l l , a k i b e j e l e n t k e z e t t a k l u b b a a w w w . s m s . a c c í m ű w e b o l d a l o n , a m e l y csetelő szobák százait ajánlja tagjainak. A m o b i l o k a t általában arra h a s z n á l j á k , h o g y a z e m b e r e k m e g t u d j á k találni e g y m á s t é s k a p c s o l a t b a n t u d j a n a k maradni. U g y a n a k k o r m o s t a n á b a n e g é s z m á s rendeltetést is k e z d e n e k f e l v e n n i - a b b a n s e g í t e n e k , h o g y a f e l h a s z n á l ó r e j t v e tartsa hollétét, alibit kreáljon, illetve á l t a l á n o s s á g b a n a h e l y t e l e n v i s e l k e d é s é t takargassa velük. E g y másik taktika az, h o g y o l y a n k o r á b b i f e l v é t e l e k e t h a s z n á l n a k f e l , a m e l y e k e t a t e l e f o n b e s z é l g e t é s k ö z b e n b e j á t s z a n a k , és így m e g t u d j á k h a m i s í t a n i a helyszínt. A telefonokat m á r fel l e h e t szerelni
o l y a n t e c h n i k á v a l , a m e l y n e k a segítségével e g y g o m b n y o m á s r a le lehet j á t s z a n i
k ü l ö n b ö z ő háttérzajokat, m i n t pl. a u t ó d u d á t , m e n t ő a u t ó s z i r é n á t v a g y e g y f o g o r v o s i f ú r ó h a n g j á t .
94
SZÓBELI I. FELADAT Introductory conversations (Sample questions, helping ideas related to the second 10 topics) II. How do you protect your data on your home computer? Questions to think about: a. Do you make backup copies? b. Have you got a CD burner? c. What passwords do you use? d. Do you often download free software at home? e. How often do you run antivirus software on your PC? f. Do you sometimes update your antivirus software?
12. What passwords do most people use and why? Ideas: encryption, coding, mixture of characters and digits, changing passwords every so often, easy to remember etc. 13. What more does a computer 'know' if you compare it to a traditional typewriter? Features to compare: - keyboard - spell check (languages), grammar check - editing (styles etc.) - memory for storage - printing - no limit to copies - soft copy (to be transferred) - desktop publishing 14. What do you usually use the Internet for and why? Words for consideration: File-sharing software, video and sound files, common interest groups and chat-rooms, online games and magazines, search engines and other information sources, electronic trading and online banking services, online libraries and electronic learning materials etc. 15. How can we learn with the help of the Internet? 1. Search engines for seeking specific information 2. Online libraries, museums and exhibitions 3. Distant learning, virtual universities and online courses 4. Online dictionaries and databases 5. Collection of images (Google's Image Search) 6. Interactive Web sites
16. What are the properties of a 'nice and successful' URL? (well chosen domain name, well-designed site)
17. If you want to find a good job where will you look for the job advertisements? Why? - Hungarian/international sites like jobonline, jobinfo etc. - databases of vacant positions and work conditions. - Besides the databases with particular job offers, one can find useful information regarding required personal skills like 'How to write a good CV', etc. - Extra information is sometimes provided (an insight into issues like financial conditions, extra offers, most wanted positions, the situation on the international job market, etc.) - Easy way to contact potential employers. 18. What are databases for? Have you ever used a database? Search facility, columns, rows and cells, wildcard characters, symbols etc. 19. What is a good presentation like? What are presentations used for? (see the chapter on PowerPoint Presentations) Video conferencing, marketing and selling 'tricks of the trade', influencing people 20. What is an "applet" and how can you make one? (see two definitions from online dictionaries) Applet Definition 1: a Java program which runs within a web browser or on a computer within the Java runtime interpreter. An applet does not run on its own without running inside of something, a program which converts the Java program code into instructions for the computer. Definition 2: a program designed to be executed from within another application. Unlike an application, applets cannot be executed directly from the operating system. With the growing popularity of OLE (object linking and embedding), applets are becoming more prevalent. A well-designed applet can be invoked from many different applications. Web browsers, which are often equipped with Java virtual machines, can interpret applets from Web servers. Because applets are small in files size, cross-platform compatible, and highly secure (can't be used to access users' hard drives), they are ideal for small Internet applications accessible from a browser.
II. FELADAT Reading comprehension 1.
SAMPLE Answers: 1. It is as small as a thumb/finger. It can work for 20 hours. 2. They will replace the lithium-ion batteries used in handheld electronic devices. 3. In handheld electronic devices. 4. They convert hydrogen and oxygen into water and this process produces electricity. Translation: Sok cég dolgozik azon, hogy kidolgozzon egy olyan technológiát, amellyel be lehet helyettesíteni a hagyományos elemeket. Eddig a fő akadály az volt, hogy hogyan állítsanak elő kicsi és olcsó elemeket. Sample Summary: The tiny fuel cell developed by Toshiba will generate electricity and power for gadgets like a digital music player for 20 hours. It is the size of a thumb and produces electricity by converting hydrogen and oxygen into water. Now the only problem is to find the technology to produce it cheaply. 2. Sample Answers: 1. It is a response to Google starting its Gmail service. 2. The name is Gmail Service and it offers a gigabyte of storage to all customers. 3. They currently get 10MB if they pay, and 2MB for free. 4. Because if it doesn't, its rival, Google, will win over most of its clients. %
Translation: Hotmail nagyobb tárolókapacitást szolgáltat mind az ingyenes, mind a fizetős email-ügyfeleinek. Júliustól a Hotmail alapszolgáltatása 250 megabyte lesz, mig a fizető szoltáltatást igénybe vevők 2 gigabyte tárolóhelyet vehetnek igénybe. Sample Summary: In response to Goggle's Gmail, Hotmail is offering a bigger amount of storage space for both its free and paid email services. Up from the present 10 MB for paying customers and 2 MB for free customers, the former will get 2 gigabytes and the latter will be entitled to 250 MB of space. 3. Sample Answers: 1. NRK is the public broadcaster's name in Norway. 2. It provides a service for people to watch its program 24 hours a day on their mobiles. 3. They are mostly news bulletins, motor shows and live streaming TV. 4. As the number of video phone owners increases, the demand for the service will grow as well. Translation: A norvég mobiltelefon tulajdonosok, az NRK (Norwegian Broadcasting Corporation) nevű közszolgáltatónak kőszönhetűen már a mobiljukról is nézhetnek tv-t. A norvég TV-társaság szolgáltatása lehetővé teszi, hogy az emberek a mobiljukról akár napi 24 órában nézhessék a műsort. Sample S u m m a r y : The Norwegian Broadcasting Corporation is offering TV to its viewers via mobile phone. Besides the live streaming, people can choose from more specialized programs such as news bulletins, motor shows etc. The service is expected to become more popular as the number of handsets with a media player is increasing. 4. Sample Answers: 1. Icstis is a company that follows the activities of premium rate services and related complaints. 2. Diallers are short programs activated without the client's agreement. They install themselves and automatically connect to premium rate lines. 3. They are numbers to connect to pornographic or gambling sites. 4. Icstis has found that the number of complaints related to web-based services is very high. Translation: Sokan nem is tudják, hogy éppen egy olyan programot töltöttek le az Internetről, amely egy emelt díjas számot fog a számítógépükről tárcsázni a tudtuk nélkül. Az Icstis szerint az emelt díjazású intemetszolgáltatásokkal kapcsolatos magas telefonszámlák miatti panaszok a közelmúltban megsokszorozódtak. Sample S u m m a r y : Icstis, the premium rate watchdog explains the rise in complaints of high telephone bills related to web based premium rate services by the fact that the so called diallers, that is programs can secretly install themselves and automatically connect to premium rate lines. These lines mostly access pornographic or gambling sites. 5. Sample Answers: 1. It is a secret program that collects information about the user without his or her prior consent. 2. It can hide itself on your computer by entering with the help of your Internet activities such as shopping, paying with credit card or just downloading files. 3. When downloading free software the user usually has to agree to the conditions. It is best if we read the wording of these conditions very carefully. 4. It will often include a disclaimer informing you that personal information may be processed and used.
Translation: Spywarenek hívják azt a szoftvert, amelyik azért bújik meg a számítógépen, hogy információkat gyűjtsön a gép gazdájáról, illetve arról, hogy mire használja az Internetet. A Spyware gyakran akkor kcriil fel a számítógépre, amikor a felhasználó ingyenes szoftvert tölt le a webről. Sample Summary: The software called spyware invades your privacy by passing on your personal data without you knowing it is happening. It will install itself on your PC when you download certain free software. Everybody must be careful and read all parts of the license agreement including any disclaimer warning the users about their privacy rights. 6.
Translation: Nem úgy, mint a drága szoftverek, a nyílt-forrású szoftverek szabadon terjeszthetők és változtathatók azzal a feltétellel, hogy a változtatásokhoz a többi felhasználó is hozzáfér. Sample Summary: Some young computer geeks in Iraqi are great fans of open source software. This software can freely be distributed and modified, as long as the modifications are shared with other users too. These young people communicate online and are quite enthusiastic about serving their country. The Iraqi youngsters met at an online Linux forum hosted by Iraqi expatriates. 7. Translation: Annak a 2500 ember több mint a fele, akiket Yahoo a levélszemét ellen indított kampánya részeként kérdezett meg, azt állította, hogy már korábban felkérte intemetszolgáltatóját, hogy tegyen valamit annak az érdekében, hogy megállítsa az elektronikus levélszekrényét elárasztó szemét áradatát. Sample Summary: Research commissioned by Yahoo has found that most British Internet users find dealing with junk emails more stressful than traffic jams and have asked their providers to do something to stop it. An email filtering firm marketing director thinks that email providers are not fulfilling their obligations to consumers. 8.
Translation: A brit életet mindenféle aspektusból leíró web oldalak millióit fogják archiválni egy olyan projekt keretében, amelyet a Brit Könyvtár irányít majd. A két évig tartó projekt során mintegy 6000 honlapot fognak archiválni azzal a céllal, hogy megpróbálják a jövőnek megmutatni a jelen brit valóságot a weben. Sample Summary: A two year project will archive some 60.00 websites to preserve British life online. The backers of the project, among others the National Archive's, the British Library etc, thinks that with their unique insight they can avoid the loss of valuable educational, cultural and scientific resources on the web. 9. Translation: A legtöbb lépést mostanáig az Egyesült Államokban tették, és ezek célpontjai olyan német cégek voltak, mint például a Daimler, Volkswagen és a Siemens, amelyekről kimutatható, hogy hasznot húznak a nácik által szervezett rabszolgamunkából. Sample Summary: Many lawsuits have been launched against big German firms which allegedly made profit from slave labour during the Nazi era in Germany. Now the American giant IBM is accused of helping the Nazis by providing punch card machines produced in its German unit.
98
10. Translation: K.ct számítógéppel felszerelt kioszkot fognak felállítani az első osztályú kocsikban, míg azok az utasok, akik drótnélküli készülékkel képesek az Internetet elemi, úgynevezett „forró helyek" segítségével tehetik majd azt meg. A szolgáltatás kezdetben ingyenes lesz, de esetenként felszámíthatnak a Rail Tel állomási bódékhoz hasonló költségeket. Sample Summary: From 30th June Indian Railways is offering wireless Internet access on its trains on two of its lines. Passengers can access the web either on their wireless devices or on one of the two computers set up on luxury coaches. Indian Railways has already started computerizing its operations like ticketing and administration. The service will initially be free. 11.
Translation: A 2004-cs Glastonbury fesztivál meglepődött vendégei segítséget kaptak abban, hogy megtalálják a saját sátrukat. A sátor a megfelelő szöveges üzenetre kivilágosodott. Sample Summary: Festival goers can now find their tent among the thousands of identical ones with the help of the new high tech gadget which consists of a lightweight antenna and receiver box as well as some special luminous ribbing embedded in the tent's material. 12. Translation: A cég mostanáig már két szoftverfejlesztő eszközt bocsátott ki az ún. nyitott kódot használó közösség számára, és készen áll arra, hogy folytassa ezt a gyakorlatot - jelentette ki a Microsoft menedzsere egy ipari csoportnak tartott beszédében ezen a héten. Sample Summary: As Microsoft is losing market share due to the expansion of the open source Linux operation system, it is doing its best to release its own software development tools to the open source community. 13. Translation: A Szaturnusz gyűrűinek rejtélyét Sherlock Holmes és a modem technika együttes alkalmazásával próbálják majd megoldani, amikor jövű héten a nemzetközi misszió megérkezik a nap hatodik bolygójára. Sample Summary: An international mission costing 3.27 million dollars will explore the sixth planet after a voyage of six years and eight months. The main objective of the mission is to get accurate information about Saturn's rings. 14. Translation: Az USA és India közösen rendelkezik azzal az programmal, amelynek segítségével a jövőt egy biztonságosabb és gyarapodást biztosító holnappá tudjuk alakítani. Az Egyesült Államok felhasználásra átadott Indiának egy Boeing műhold alrendszert azzal a céllal, hogy közös együttműködés keretében az Indiai Űrkutatási Szervezettel egy kommunikációs műholdat fejlesszen ki. Sample Summary: According to the American Undersecretary for Commerce the US and India have the potential to transform the future into a safer tomorrow. The first step on this route is an American satellite systems division to cooperate with the Indian Space Research Organization to build a communications satellite by mid 2006. 15. Translation: Ami végülis a mostanában zajló erőpróbát fontosabbá teszi, mint csupán egy kalandot, amelyik majd említésre kerül a történelemkönyvekben, az az, hogy egy oíyan jövőt készít elő, amelyikben az űrutazások annyira mindennapos események lesznek, mint jelenleg egy nyári tengeri hajókázás.
Sample Summary: SpaceSlupOne, a 20 million dollar project which is the first privately orchestrated and piloted manned space flight, will hopefully lead to a future in which space trips will be as routine and affordable as a cruise ship vacation today. 16. Translation: A jelen fő kérdése az, hogyan lehet az internetfelhasználó szolgáltatói cimét titokban tartani. Ha ez sikerül, a webező úgy tud honlapokba belépni, üzeneteket küldeni vagy emailezni, hogy nem hagyja maga mögött azt a nyomot, ami segítségével le lehet nyomozni számítógépe fizikai hollétét. Sample Summary: As long as a particular Internet connection to a physical computer location can be traced, Web surfers downloading anything free can be easily caught. Now, with new software released by Syncodea, computer, fans sharing music and data files can forget about their worries. 17. Translation: Ők még emlékeznek a régi Napsterre, arra a P2P alkalmazásra, amelyik először szabadította ki a zenerajongókat a nagyipari zenegyártás acélökléből. Azt hiszik, hogy a jelenlegi hasonlít rá. Sample Summary: Although Napster 2 is only a shallow copy of the old Napster, Britons still think it is the easy, safe and legal tool for downloading music from the net. The Financial Times and other online sources try to imply that Napster is safer and more legal than the many commercial P2P applications on the British market. 18. Translation: Tegnap az Internet sötét oldalát okolták azért a megdöbbentő esetért, amelyben egy középiskolás fiú megtervezte a saját meggyilkolását. Az akkor 14 éves fiú rávett egy másik tizenévest, hogy szúrja őt le azután, hogy egy internetes chat szobában kémnek adta ki magát. Sample Summary: The dark side of the Internet is blamed for the stabbing of a fourteen year old secondary school boy, who - with the help of an Internet chat room and a series of alter egos - convinced his friend to kill him. He promised his friend he would get 500,000 pounds and a job as a secret agent. 19. Translation: Kedden anti-virus szoftver fejlesztők bejelentették, hogy megjelent az első olyan számítógép vírus, amely mobiltelefonokat fertőz meg. Azt is hozzátették, hogy mostanáig a vírusnak nem volt semmilyen káros hatása. Sample Summary: Cabir, the first mobile phone virus has appeared. It propagates through the new Bluetooth wireless technology. Although it has no harmful effects, it writes Caribe on the screen and becomes activated every time the phone is turned on. It was created by an international group specializing in creating viruses. 20.
Translation: Egy veterán civil tesztpilóta az első olyan ember, aki egy magán kezdeményezés által megszervezett űrrepülésen részt vehetett. A Kalifornia felett több mint 60 mérföld magasságban vezérelt apró űrrakéta több lélegzetelállítóan izgalmas pillanattal szolgált. Sample Summary: A flight guided by a civilian test pilot and developed privately has become the first to reach space. The tiny space rocket, lifted part of the way on the belly of an airplane, went up to an altitude of 350,000 feet then returned as a glider guided by Melvill, its veteran pilot. 100