Uyen Ôn 1
Uyen Ôn 1
Most PCs are held back not by the speed of their main processor but by the time it takes to move data
in and out of memory. One of the most important techniques for getting around this bottleneck is the
memory cache.
The idea is to use a small number of very fast memory chips as a buffer or cache between main memory
and the processor. Whenever the processor needs to read data, it looks in this cache area first. If it finds
the data in the cache then this counts as a ‘cache hit’ and the processor need not go through the more
laborious process of reading data from the main memory. Only if the data is not in the cache, does it
need to access main memory but in the process it copies whatever it finds into the cache so that it is
there ready for the next time it is needed. The whole process is controlled by a group of logic circuits
called the cache controller.
One of the cache controller’s main jobs is to look after ‘cache coherency’ which means ensuring that any
changes written to main memory are reflected within the cache and vice versa. There are several
techniques for achieving this, the most obvious being for the processor to write directly to both the
cache and main memory at the same time.
    1.   processor
    2.   bottleneck
    3.   buffer
    4.   counts
    5.   memory
    6.   logic
    7.   reflected
    8.   techniques
Note that the term PC usually refers to an IBM __________ (1) personal computer, i.e. an Apple Mac
personal computer is not referred to as a PC. A computer that provides a service on a network, e.g.
__________ (2) files, sharing a printer, is known as a server computer. __________ (3) computers
usually have a UPS (uninterruptible power supply) attached to them. This is a battery that automatically
provides an electricity supply to allow the server to shut itself down properly if the main supply fails.
The combination of the processor and memory is sometimes referred to as the CPU (central processing
unit), although sometimes the processor itself is __________ (4) to as the CPU. The other parts
connected to the CPU are known as peripherals. These can include input devices, output devices,
storage devices and communications devices. __________ (5) devices include: keyboards, scanners,
barcode readers, digital cameras, microphones and video cameras e.g. webcams (small digital video
cameras used on the Web). __________ (6) devices include: monitors (VDU display screens), printers,
plotters, loudspeakers, headphones. Storage devices include: magnetic tape, floppy disks (diskettes),
hard disks, CD-ROMs, CD-R disks, CD-RW disks, DVDs and MO disks. A common communications device
is a __________ (7) (a modulator/demodulator used for converting digital signals to analogue signals
and vice versa to allow a computer to be connected to the ordinary __________ (8) system).
Passage 2
    1. compatible
   2.   storing
   3.   server
   4.   referred
   5.   input
   6.   output
   7.   modem
   8.   telephone
A set of CONNECTORS (1) used for carrying signals between the different PARTS (2) of a computer is
known as a bus. Data is transferred constantly between the processor and memory along the system
bus. Each part of memory has its own memory address and the processor determines where PROCESSED
(3) data is stored by sending an address signal along an address bus and data along a data bus. This is
SYN (4) by an electronic clock in the CPU that determines the operating speed of the processor.
Transferring data between the processor and RAM can slow up the computer; therefore, some very
EXPENSIVE (5), extremely fast memory is usually used as a cache to hold the most frequently used data.
Passage 3
    1. connectors
    2. parts
    3. processed
    4. synchronised
    5. expensive
    6. desktop
    7. consists
    8. cables
Hard disks _____CONSIST_____ (1) of a set of magnetic coated metal disks that are vacuum-sealed
inside a case to keep out the dust. The magnetic surfaces of the___DISK_______ (2) are formatted using
a read/write head to provide magnetic storage areas. These storage areas form concentric circles called
tracks and each track is subdivided into sections called _____SECTOR_____ (3). The disks are rotated at
high speed and read from or written to by the read/write head that moves across the surface of the
disks. In server computers, hard disks can be connected together and made to operate as one unit using
RAID (a redundant array of inexpensive disks). This can speed up the system and ___PROVIDE_______
(4) a way of recovering data if the system crashes (fails suddenly and completely, usually referring to the
failure of a hard disk). There is a variety of optical storage devices that use laser_____LIGHT_____ (5) to
read or write to a disk.
An input device called a barcode reader is a ___SPECIAL_______ (6) type of scanner for reading
barcodes (a set of printed bars of varying thickness that are___USED_______ (7) to identify a product
e.g. used to price items in supermarkets).
When comparing computers, the power of the computer is important. This is mainly determined by the
speed and ____CAPACITY______ (8) (size) of each part of the computer.
Passage 4
    1. consist
    2. disks
    3. sectors
    4. provide
    5. light
    6. special
    7. used
    8. capacity
While computer architectures can differ greatly depending on the purpose of the computer, several key
components generally contribute to the structure of computer architecture:
Central Processing Unit (CPU) Often referred to as the "brain" of the computer, the CPU executes
instructions, performs calculations, and manages data. Its architecture dictates factors such as
instruction set, clock speed, and cache hierarchy, all of which significantly impact overall system
performance.
Memory Hierarchy This includes various types of memory, such as cache memory, random access
memory (RAM), and storage devices. The memory hierarchy plays a crucial role in optimizing data access
times, as data moves between different levels of memory based on their proximity to the CPU and the
frequency of access.
Input/Output (I/O) System The I/O system enables communication between the computer and external
devices, such as keyboards, monitors, and storage devices. It involves designing efficient data transfer
mechanisms to ensure smooth interaction and data exchange.
Storage Architecture This deals with how data is stored and retrieved from storage devices like hard
drives, solid-state drives (SSDs), and optical drives. Efficient storage architectures ensure data integrity,
availability, and fast access times.
Instruction Pipelining Modern CPUs employ pipelining, a technique that breaks down instruction
execution into multiple stages. This allows the CPU to process multiple instructions simultaneously,
resulting in improved throughput.
Parallel Processing This involves dividing a task into smaller subtasks and executing them concurrently,
often on multiple cores or processors. Parallel processing significantly accelerates computations, making
it key to tasks like simulations, video rendering, and machine learning.
Permanent storage is storage meant to save your data, files, and programs when you are not using
them, even when the computer is shut down. This is why we call it permanent. It is much cheaper than
RAM (1GB of permanent storage costs way less than 1GB of RAM), but it is also much slower. With
slower, we mean that it is orders of magnitude slower than RAM, million times slower.
There are two technologies for permanent storage, HDD and SSD. Hard Disk Drive, HDD, is the older
technology, data is stored on magnetic disks that have to rotate to be accessed. It is the slower of the
two, but also the cheaper and the one that can boost higher capacities. On the other hand, Solid State
Drive, SSD, is the newer technology which has no disk or moving part, everything is managed through
electronics. It is faster, because you don’t have to wait for the disk to physically spin to reach your piece
of data, and less prone to breaking because it has no moving parts. It is more expensive than HDD, but
still cheaper than RAM.
Because permanent storage is million times slower than RAM (even in SSDs), CPU cannot access it
directly. If you want to execute a program or read some data, it first needs to be moved to the RAM to
be accessed. To make an analogy, imagine you have a library and you want to read a book or write on a
notebook. First, you need to go to the bookshelf and fetch the book you want (you have to remove it
from permanent storage). You carry your book to the desk (in the RAM), and here you do what you need
to do. Once you finish, you put it back on the shelf (the permanent storage).
3. What is the main difference between HDD and SSD in terms of technology?
A. HDD uses magnetic disks, while SSD uses electronic management
B. HDD is faster than SSD
C. SSD has moving parts, while HDD does not
D. HDD is more expensive than SSD
5. Why does the CPU need to move data from permanent storage to RAM before executing a program
or accessing data?
A. Because permanent storage is more reliable
B. Because permanent storage is million times slower than RAM
C. Because permanent storage is cheaper than RAM
D. Because permanent storage lasts forever
Architecture Overview
Almost all modern computers use the Von Neumann architecture model that was created by a
mathematician in the 1940’s. This model includes fundamental things like the computer’s CPU, registry,
memory, storage, logic unit and input/output (I/O) interface. Most computer’s architecture can be
divided into three categories. First, the hardware system includes the CPU, direct memory and data and
graphics processors. Second, the Instruction Set Architecture directs the embedded programming
language in the CPU. The ISA’s programming defines the functions and capabilities of the CPU. Third, the
micro-architecture is the computer’s international organization that defines data paths, storage,
execution and processing. A computer’s architecture may be created and maintained by systems
engineers, application architects and software engineers.
Computer Architects
Computer architects oversee the implementation of architecture strategies and policies within
companies. They create computer models and standard solutions that save costs, increase capabilities
and align with business needs. Their architectural solutions must deliver stability, availability and
sustainability. Computer architects may deal with server storage, data backup, virtual recovery and
internal applications. In order to produce efficient systems, they must stay up to date on the latest
computer, programming and technology trends.
The Challenge of Architecting
Creating a computer’s architecture, framework and infrastructure can be quite challenging. Senior
computer architects may update, maintain and create system architectures that support product lines
and business goals. They may review, modify and approve existing architectural designs through careful
comparative research. Senior computer architects may communicate architecture strategies in order to
convince executive management, technical teams and third-party vendors. Senior computer architects
must have significant experience in the design, development and deployment of enterprise solutions.
They should fully understand computer infrastructure, middleware and integration.
Read the passage and choose the correct option to answer each question.
1. What is the Von Neumann architecture model primarily composed of?
A. Hardware system, micro-architecture, and data paths
B. CPU, registry, memory, storage, logic unit, and I/O interface
C. Instruction Set Architecture, data backup, and graphics processors
D. CPU, direct memory, and virtual recovery
2. What does the Instruction Set Architecture (ISA) define in the computer's architecture?
A. Data paths, storage, execution, and processing
B. International organization and embedded programming language
C. Functions and capabilities of the CPU
D. Server storage, data backup, and virtual recovery
3. What is the role of computer architects in companies?
A. Creating computer models and standard solutions
B. Approving existing architectural designs
C. Overseeing technology trends and programming languages
D. Maintaining and updating micro-architecture
4. What challenges do senior computer architects face in their roles?
A. Dealing with server storage and data backup
B. Convincing executive management, technical teams, and third-party vendors
C. Defining micro-architecture and infrastructure
D. Reviewing and modifying Instruction Set Architecture
5. What knowledge is crucial for senior computer architects to possess?
A. Latest computer, programming, and technology trends
B. International organization and embedded programming language
C. CPU, direct memory, and data processors
D. Hardware system and logic unit
Complete the summary, using ONE word from the above reading passage.
Modern computers largely follow the Von Neumann architecture model, developed in the 1940s,
encompassing key components like the ________(1), registry, memory, storage, logic unit, and
input/output interface. Computer architecture typically falls into three categories: hardware system,
Instruction Set Architecture (ISA), and micro-architecture. The________ (2) system includes the CPU,
direct memory, and processors, while the ________ (3) guides the embedded programming language in
the CPU. ________ (4), as the computer's international organization, defines data paths, storage,
execution, and processing.
Computer architects play a vital role in implementing architecture ________ (5) within companies,
designing ________ (6) and solutions aligned with business needs. They focus on creating efficient
systems ensuring stability, availability, and sustainability, addressing aspects like server ________ (7),
data backup, and virtual recovery. The complexity of architecting computer systems involves challenges
such as updating, ________ (8), and creating architectures supporting business goals. Senior computer
architects need extensive experience in designing and deploying enterprise solutions, staying updated
on computer trends, and effectively communicating strategies to various stakeholders, including
executive management and technical teams.
Summary:
   1. CPU
   2. hardware
   3. ISA
   4. Micro-architecture
   5. strategies
   6. models
   7. storage
   8. maintaining
      1.    ROM is used to hold instructions which are needed to start up the computer.
      2.    The function of flash memory key is to read and write to electronic chips on a card.
      3.    RAM holds data read or written to it by the processor.
      4.    The processor controls all the operations in a computer.
      5.    Most PCs are held back by the time it takes to move data in and out of memory.
      6.    Looking after 'cache coherency' means ensuring that any changes written to main memory are
            reflected within the cache and vice versa.
      7.    The 'write-back' cache allows the processor to write changes only to the cache and not to main
            memory.
      8.    'Dirty catche' tells the cache controller to write their contents back to main memory before
            using the space to cache new data.
      9.    Disk caching works in essentially the same way whether you have a cache on your disk
            controller or you are using a software-based solution.
      10.   If the requested information isn't in the cache, the data is read from the disk along with a large
            chunk of adjacent information.
      11.   The CPU is the heart of the computer, a micro processor chip which processes data and
            coordinates the activities of all the other units.
      12.   At the back of a computer, there are ports into which we can plug external devices such a
            scanner or a modem.
      13.   Hardware is any electronic or mechanical part of the computer system that you can see or touch.
      14.   Software is a set of instructions, called a program, which tells a computer what to do.
      15.   Peripherals are the physical units attached to the computer such as input/output devices, and
            storage devices.
1H. Kernel – Nhân hệ điều hành: Lớp thấp nhất ở lõi của hệ điều hành. Nó xử lý việc phân bổ tài nguyên
phần cứng cho phần còn lại của hệ điều hành và các chương trình ứng dụng.
2A. Port – Cổng: Chuyển đổi để sử dụng trên một hệ điều hành hoặc nền tảng máy tính khác.
3I. Log on – Đăng nhập: Kết nối với tài khoản hệ thống mạng, thường bằng cách dùng mật khẩu.
4C. Resident – Cư trú: Lưu trong bộ nhớ máy tính.
5G. Hardware – Phần cứng: Các thành phần vật lý của một hệ thống máy tính.
6D. Server – Máy chủ: Máy tính chính cung cấp dịch vụ trên một mạng.
7F. Word processing – Xử lý văn bản: Quá trình gõ và chỉnh sửa văn bản bằng trình xử lý văn bản.
8B. Utility – Tiện ích: Chương trình đi kèm với hệ điều hành, dùng để thực hiện các tác vụ thường xuyên
hoặc bảo trì hệ thống.
9J. Text editor – Trình soạn thảo văn bản: Chương trình máy tính để chỉnh sửa dữ liệu hoặc mã nguồn
cơ bản, ví dụ như một trình xử lý văn bản đơn giản.
10E. Interface – Giao diện: Phần cứng hoặc phần mềm kết nối hai hệ thống với nhau và cho phép chúng
giao tiếp.
Linux has its ___ROOTS______(1) in a student project. In 1992, an undergraduate called Linus Torvalds
was studying computer science in Helsinki, Finland. Like most computer science courses, a
big___COMPONENT______ (2) of it was taught on (and about) Unix. Unix was the wonder operating
system of the 1970s and 1980s: both a textbook example of the principles of operating system
_____DESIGN____ (3), and sufficiently robust to be the standard OS in engineering and scientific
computing. But Unix was a _COMMERCIAL________ (4) product (licensed by AT&T to a number of
resellers), and cost more than a student could pay.
Annoyed by the shortcomings of Minix (a compact Unix clone written as a teaching aid by Professor
Andy Tannenbaum) Linus set out to write his own ‘kernel’ – the__CORE_______ (5) of an operating
system that____HANDLE_____ (6) memory allocation, talks to hardware __DEVICES_______ (7), and
makes sure everything keeps running. He used the GNU programming tools developed by Richard
Stallman’s Free Software Foundation, an organisation of volunteers dedicated to fulfilling Stallman’s
ideal of making good____SOFTWARE_____ (8) that anyone could use without paying. When he'd written
a basic kernel, he released the source code to the Linux kernel on the Internet.
Passage 1
    1. roots
    2. component
    3. design
    4. commercial
    5. core
    6. handles
    7. devices
    8. software
Source code is important. It’s the original from which compiled programs are generated. If you don't
have the source code to a program, you can’t ___MODIFY______(1) it to fix bugs or add new
___FEATURE______ (2). Most software companies won’t sell you their source code, or will only do so for
an eye watering price, because they believe that if they make it available, it will destroy
their___REVENUE______ (3) stream.
What happened next was astounding, from the ___CONVENTIAONAL______ (4), commercial software
industry point of view - and utterly predictable to anyone who knew about the Free Software
Foundation. Programmers (mostly academics and students) began using Linux. They found that it didn’t
do things they wanted it to do - so they fixed it. And where they improved it, they sent the
__IMPOVEMENT_______ (5) to Linus, who rolled them into the kernel. And Linux began to grow.
There’s a term for this model of software __DEVELOPMENTS_______ (6); it’s called Open Source (see
www.opensource.org/ for more information), so Anyone can have the source code - it’s free (in the
sense of free speech, not free beer). Anyone can___CONTRIBUTE______ (7) to it. If you use it heavily
you may want to extend or develop or fix bugs in it - and it is so easy to give your (8___FIXS______) back
to the community that most people do so.
Passage 2
    1. modify
    2. features
    3. revenue
    4. conventional
    5. improvements
    6. development
    7. contribute
    8. fixes
The OS (operating system) is the set of computer programs that allow the user to perform basic)
___TAKS____ (1) like copying, moving, saving and printing files. It also provides an ) ___INTERFACE____
(2) between (i.e. provides communication between) ____APPLICATIONS___ (3) programs (e.g. word
processors or spreadsheets) and the computer hardware. As a user interacts with an applications
program on the screen, the applications program (4) __ COMMUNICATE_____) with the operating
system and the operating system communicates with the computer hardware. The work of the
operating system takes place in the background and is not always obvious to the user.
The most important program in an OS is the ) ___SUPERVISOR____ (5) program. It remains in memory
all the time that the computer is operating, and manages the OS. It loads other parts of the OS into
memory when they are needed. Programs that remain in memory while the computer is in use are
known as resident programs. Programs that only stay in memory while they are being used are known as
) ___NON-RESIDENT____ (6) programs.
Some operating systems are command driven (i.e. the user runs a program by typing a command). The
screen is usually blank except for a ) __SYMBOL_____ (7) (e.g. $) which acts as a command prompt.
When the command is typed at the prompt and the Enter key is pressed, the command is processed and
the output is (8) ) ___DISPLAYED____on the screen. OS commands are usually short words or
abbreviations (e.g., date, logout, password, ls).
Passage 3
    1. tasks
    2. interface
    3. applications
    4. communicates
    5. supervisor
    6. non-resident
    7. symbol
    8. displayed
SuperSocial ESN is an Enterprise Social Networking system produced by SuperSocial Pty Ltd, a company
based in Melbourne, Australia. Its main selling points are that it helps clients’ employees to
communicate more efficiently and gives them better access to digital data. It provides a wide range of
functions and because of SuperSocial’s tiered pricing, clients can choose not to pay for the features that
they don’t actually need.
Plans start with the Basic system, which is designed for a small business at one location. This has instant
messaging as well as file sharing.
The next level up, only slightly more expensive, is the Basic Plus system. This has OCR and a document
management system with tagging so that the user can scan documents and keep track of the electronic
versions. There is also a document archiving feature.
The highest-level system is the Premium system, which has all the capabilities of the first two levels, plus
some additional features. With it, users can give and record webinars, and there is a speech-to-text
capability so that users can create documents without typing. Many users like to be able to write and
send messages even when driving. Users of the Premium system can access data wherever they are,
whether in the office, visiting a client or at home. And it comes with a high level of security, including a
VPN and encryption so that access to the server is very secure.
Passage 1
    1. Melbourne, Australia
    2. It helps clients’ employees to communicate more efficiently and gives them better access to
       digital data.
    3. A small business at one location
    4. They can scan documents and keep track of the electronic versions.
    5. The premium system
OPERATING SYSTEM
What is an operating system?
An operating system (OS) is the program that, after being initially loaded into the computer by a boot
program, manages all of the other application programs in a computer. The application programs make
use of the operating system by making requests for services through a defined application program
interface (API). In addition, users can interact directly with the operating system through a user
interface, such as a command-line interface (CLI) or a graphical UI (GUI).
Passage 3
OPEN-SOURCE: THE WAY FORWARD?
With open-source software, what do people think about first? Money, usually, because open-source
software is free, but this isn’t the only important thing. First, there is freedom from the software
vendors. Organizations say that freedom is the number one reason to choose open-source software.
With open-source software, an organization doesn’t have to follow the software vendor’s decisions.
With proprietary software, the vendor controls software updates. For example, users can’t add features
to proprietary software themselves, but they can add features to open-source software.
Also, with open-source software, companies have more control of their data. Proprietary software often
stores data in special ways that only the vendor understands. So, when a company wants to change to
another vendor’s software, moving the data to the new software can be very difficult. Open-source
software is different; open-source software vendors explain their data clearly and openly so that they
are not a secret. Because of this, moving data isn’t a problem.
Sometimes people worry about open-source operating systems. They think that their favorite software
won’t run on open-source operating systems. However, this isn’t true because there is a lot of office
software, such as word processors and spreadsheets, for open-source operating systems. In fact, there
are many kinds of this software and they work well. It is only special areas, such as graphics design,
where proprietary software is clearly better.
Read the passage then answer the questions below.
    1. Does open-source software cost money?
    2. What is the number one reason for organisations to choose open-source software?
    3. Is it difficult to move data with open-source software?
    4. What office software can run on open-source operating systems?
    5. Does graphics design run better on open-source software or proprietary software?
Passage 3
    1.   No
    2.   Freedom is the number one reason to choose open-source software.
    3.   No
    4.   Word processors and spreadsheets
    5.   Proprietary software
Complete the summary, using ONE word from the above reading passage.
When we talk about open-source software, people usually think about it being free. But it's not just
about saving money; it's also about _______(1). With open-source software, organizations don't have to
follow the _______ (2) of software vendors. This is the main reason why many choose open source –
they want the freedom to make their own choices.
Unlike _______ (3) software, where the vendor controls updates and users can't add features, open-
source software allows users to _______ (4) and improve features on their own. It gives more control to
organizations over their data. Proprietary software often stores data in ways that only the vendor
understands, making it difficult to switch to another vendor's _______ (5). Open-source software, on the
other hand, explains its data openly, making data transition easier.
Some worry that their favorite software won't run on _______ (6) operating systems. But that's not true
for many office software like word processors and spreadsheets, which work well on open-source
_______ (7) systems. While proprietary software may be better in certain areas like _______ (8) design,
open source covers a lot and is versatile.
Summary
   1. freedom
   2. decisions
   3. proprietary
   4. add
   5. software
   6. open-source
   7. operating
   8. graphics
II. WRITING
Make meaningful sentences by adding between 8 and 15 words to the given phrases.
     1. An operating system is a set of programs that lies between applications software and the
        computer hardware.
     2. An operating system lies between applications software and the computer hardware.
     3. Besides controlling the entire operating system, the supervisor loads into memory other
      operating system programs from disk storage only as needed.
4.    An important function of the operating system is to manage the computer's resources, such as
      the central processing unit, memory, disk drives, and printers.
5.    As soon as the PC is switched on, the operating system starts running the user interface.
6.    The main reason for installing more memory is to allow the computer to process data faster.
7.    The task in most cases of the operating system is to facilitate interaction between a single user
      and a PC.
8.    The main reason for installing more memory is to allow the computer to process data faster.
9.    If you don't have the source code to a program, you can't modify it to fix bugs or add new
      features.
10.   With Open Source, anyone can have the source code and contribute to it.
11.   Typical functions of the operating system are handling input/output operations, running
      programs and organizing files on disks.
12.   The operating system allows multitasking because a user can run several programs (and do
      various tasks) at a time.
13.   A drop-down menu is a list of options that appear below a menu bar when you click on an item.
14.   A compression utility rewrites data so that it takes less space on disk.
15.   A media player lets you watch DVDs, play music and listen to the radio on the Web.
No.    Term                      Definition                     Vietnamese Meaning
1.  bandwidth
2.  LAN             Computers connected together over a    Các máy tính được kết nối trong
                    small area such as a company           một khu vực nhỏ như phòng ban
                    department                             của công ty
3.    office        A computer program or set of           Bộ chương trình máy tính được
      application   programs that are used in a typical    sử dụng trong văn phòng như
      suite         office, e.g. a word processor,         xử lý văn bản, bảng tính và cơ
                    spreadsheet and database               sở dữ liệu
4.    data centre   A facility for storing large amounts   Cơ sở dùng để lưu trữ lượng lớn
                    of information                         thông tin
5.    broadband     Able to carry signals transmitted      Có khả năng truyền tín hiệu trên
                    over a wide range of frequencies       dải tần số rộng
6.    SAP           A widely used enterprise resource      Một chương trình hoạch định
                    planning tool program                  nguồn lực doanh nghiệp được
                                                           sử dụng rộng rãi
7.    email         The common name for an electronic Tên thông thường của thư điện
                    mail message, i.e. a text message      tử — một dạng tin nhắn văn bản
                    sent electronically using a computer gửi bằng máy tính
8.    website       A set of related pages on the World    Một tập hợp các trang liên quan
                    Wide Web                               trên mạng Internet toàn cầu
9.    ASP           A company that offers individuals or Một công ty cung cấp quyền
                    enterprises access to applications and truy cập các ứng dụng và dịch
                    related services over the internet     vụ liên quan qua Internet
10.   tab           A dialog box component that is used Thành phần hộp thoại dùng để
                    to switch between different sets of    chuyển đổi giữa các tập dữ liệu
                    data                                   khác nhau
Passage 1
If your hard disk is packed to (1) BURSTING point, the IT department is far too busy to fix your email
problems, and your business can't (2)AFFORD to buy the tools that you'd like to develop the company
website, then it's time to think about using an application service provider (ASP). Rather than (3
INSTALLING) software on each machine or server within your organisation, you rent applications from
the ASP, which provides remote access to the software and manages the (4)HARDWARE required to run
the applications.
There are a lot of advantages to this approach. The havoc caused by (5) VIRUS makes the idea of
outsourcing your email and office suite services an attractive option. It also gives you more FLEXIBILITY
(6) — you pay for applications as and when you need them, rather than investing in a lot of costly
software which you're then tied to for years. Not having to worry about upgrading to the latest version
of your office suite or about ___BATTLING____ (7) with the complexities of managing an email system,
leaves businesses with more time. Time to focus on what they do best.
However, there are some potential pitfalls. To use applications remotely requires a lot of
BANDWIDTH(8), which is only really available from a broadband connection or a leased line to the ASP
itself. It is also important to ensure that the ASP will be able to provide a secure, reliable service which
will be available whenever you need it.
Passage 1
    1. bursting
    2. afford
    3. installing
    4. hardware
    5. viruses
    6. flexibility
    7. battling
    8. bandwidth
Passage 2
Providing applications and storage ____SPACE_____(1) for vast numbers of users ___REQUIRES______
(2) some powerful technology on the part of the ASP. This includes security controls and data storage as
well as providing the physical links to customers. For the most part, ASPs don’t own the data centres
that store the information. Instead, they lease space from data storage specialists. In this way, they can
be ______CONFIDENT___ (3) of meeting customers’ increasing storage requirements by buying more
space as it’s needed.
There’s a wide ___VARIETY______ (4) of applications available for use via ASPs. Office suite applications
and email services are two of the most ____GENERIC_____ (5) applications available through ASPs.
Large, complex business applications such as enterprise resource planning tools like SAP are another
popular candidate for delivery through an ASP. Other business services, such as payroll and accounting
systems are also available. This is particularly ___BENEFICIAL______ (6) to small businesses which are
likely to grow quickly and don’t want to deal with the problems caused by outgrowing their existing
system and having to move to a high-end ___PACKAGE______ (7) ASPs also offer a means of using
specialist tools that would otherwise prove prohibitively expensive. Small businesses have the
opportunity to use such tools for short periods of time as and when they need them, rather than having
to buy the ____SOFTWARE_____ (8) as a permanent investment.
Passage 2
    1. space
    2. requires
    3. confident
    4. variety
    5. generic
    6. beneficial
    7. package
    8. software
Passage 1
    1. Portable equipment
    2. No
    3. Laptops, PDAs, Cellphones, Wired Telephone Access Points, Even Wristwatch Devices,
       Headphones, Digital Cameras
    4. It’s very low power.
    5. Yes
Passage Text:
Suppose you’re a support engineer. You’re stuck in a job you don’t like and you want to make a change.
One way of making that change is to improve your marketability to potential employers by upgrading
your skill-set. If you’re going to train yourself up however, whose training should you undertake? If you
need certificates, whose certificates should they be? Even if you get those certificates, how certain can
you be that your salary will rise as a result? One solution is the range of certifications on offer from
Microsoft.
Microsoft offers a large array of certification programmes aimed at anyone from the user of a single
program such as Microsoft Word, to someone who wants to become a certified support engineer. There
are a myriad of certificates to study for too. If you’re the proud holder of any of those qualifications,
then you’re entitled to call yourself a Microsoft Certified Professional (MCP).
Once you’ve decided which track you want to take, you should consider just how qualified you already
are in terms of experience and knowledge. Will you need to go and take some courses with a training
company, or are you the type who can make good use of self-study materials? How much time do you
genuinely have to devote towards this? Will your employer pay for your course? Will it grant you leave
to go and do the course - assuming you can find one - on either a full-time or part-time basis?
Passage 2
    1. Upgrade your skill-set
    2. Whose training they should undertake; whose certificates they should be and how certain they
       can be that their salary will rise.
    3. Microsoft
    4. Anyone from the user of a single program to someone who wants to become a certified support
       engineer
    5. How qualified you already are in terms of experience and knowledge
Passage 3.
A database has several parts. These are called objects. The simplest of these is a table; most databases
have at least two. Tables look like a spreadsheet. Each row in the table is a record, containing
information about one item, such as a person or something that the company sells. Each of these
contains several fields with information about the item. For example, in a company’s employee
database, these might be family name, given name, phone number and so on. One important point is
that one field in each record must be unique - the same data must not be in any other record. We call
this field the primary key. It can be a staff ID number, for example, it can’t be a given name because
many people have the same given name.
Another type of object is a form, which is used for entering data into tables. A third object type is a
report. This can show data from more than one table at the same time, looks good and is suitable for
printing.
These are several ways to get data out of a database. One is simply to retrieve a record - for example, if
we want to check the data in a single record, such as an employee’s phone number. If we want to
combine information from several tables or to do something with the data such as add up financial
information from several records, we can query the database.
Complete the summary, using ONE word from the above reading passage.
A database consists of various objects, with _______(1) being the simplest and most common. Tables
resemble _______ (2), with each row representing a record containing information about an _______
(3). Fields within each record, such as family name or phone number, store specific details. It’s crucial
for one field, known as the primary key, to be _______ (4) in each record, ensuring no repetition of data.
Forms, another object type, facilitate _______ (5) entry into tables, while reports display data from
multiple tables simultaneously, presenting it in a visually appealing format suitable for _______ (6).
Retrieving data from a database involves various methods. _______ (7) record retrieval is common for
checking specific details, like an employee’s phone number. Querying the database becomes necessary
when combining information from multiple tables or performing actions, such as summarizing _______
(8) data from various records.
Summary
   1. tables
   2. spreadsheets
   3. item
   4. unique
   5. data
   6. printing
   7. Single
   8. financial
 backbone → H. The main transmission path handling the major data traffic connecting different LANs
together
→ Đường trục: Tuyến truyền dẫn chính đảm nhiệm phần lớn lưu lượng dữ liệu, kết nối các mạng LAN
khác nhau.
 bridge → G. A hardware and software combination used to connect the same type of networks or to
partition a large network into two smaller ones
→ Cầu nối mạng: Tổ hợp phần cứng và phần mềm dùng để kết nối các mạng cùng loại hoặc chia mạng
lớn thành hai mạng nhỏ hơn.
 gateway → B. An interface that enables dissimilar networks to communicate such as two LANs based
on different topologies or network operating systems
→ Cổng mạng: Giao diện giúp các mạng khác loại có thể giao tiếp với nhau (ví dụ như hai LAN khác
nhau).
 hub → F. An electronic device at the centre of a star network topology
→ Bộ chia (hub): Thiết bị điện tử trung tâm trong mô hình mạng hình sao.
 router → D. An electronic device that links different networks or parts of a network. It determines the
path that a signal should take to reach its destination.
→ Bộ định tuyến: Thiết bị giúp kết nối và định hướng đường đi cho tín hiệu giữa các mạng khác nhau.
 traffic → I. The volume of signals or data that passes through a network system
→ Lưu lượng: Khối lượng tín hiệu hoặc dữ liệu đi qua hệ thống mạng.
 half-duplex → E. Able to transfer data in both directions but only in one direction at a time
→ Bán song công: Truyền dữ liệu hai chiều nhưng chỉ một chiều tại một thời điểm.
 full-duplex → J. Able to transfer data in both directions simultaneously
→ Toàn song công: Có thể truyền và nhận dữ liệu đồng thời.
 node → A. A network terminal or point where a computer is connected to a network
→ Nút mạng: Điểm kết nối máy tính vào mạng.
 packet → C. A fixed size unit of data prepared for transmission across a network
→ Gói dữ liệu: Đơn vị dữ liệu cố định được chia để truyền trong mạng.
44
Firms in the past used two __FUNDAMENTALLY_ (1) ___ different types of networks: telephone
networks and computer networks. Telephone networks historically handled voice communication, and
computer networks handled __DATA TRAFFIC_ (2) ___. Telephone companies built telephone networks
throughout the twentieth century by using voice transmission ___ (3) TECHNOLOGIES___ (hardware and
software), and these companies almost always operated as regulated monopolies throughout the world.
Computer companies originally built computer networks to _TRANSMIT__ (4) ___ data between
computers in different locations.
Thanks to continuing telecommunications deregulation and information technology innovation,
telephone and computer networks are __CONVERGING_ (5) ___ into a single digital network using
shared Internet-based standards and technology. Telecommunications providers today, such as AT&T
and Verizon, offer data transmission, Internet ___ACCESS (6) ___, mobile phone service, and television
programming as well as voice service. Cable companies, such as Cablevision and Comcast, offer voice
service and Internet access. Computer networks have _EXPANDED__ (7) ___ to include Internet
telephone and video services. Both voice and data communication networks have also become more
powerful (faster), more ___ (8) _PORTABLE__ (smaller and mobile), and less expensive.
Passage 1
   1. fundamentally
   2. data traffic
3. technologies
4. transmit
5. converging
6. access
7. expanded
   8. portable
Packet switching is a method of slicing digital messages into parcels called packets, sending the packets
along different communication paths as they become available, and then ___ (1) ___ the packets once
they arrive at their destinations. Prior to the development of packet switching, computer networks used
leased, dedicated telephone ___ (2) ___ to communicate with other computers in remote locations. In
circuit-switched networks, such as the telephone system, a complete ___ (3) ___ circuit is assembled,
and then communication can proceed. These dedicated circuit-switching techniques were expensive and
wasted available communications ___ (4) ___ - the circuit was maintained regardless of whether any
data were being sent.
Packet switching is more efficient. Messages are first broken down into small fixed ___ (5) ___ of data
called packets. The packets include information for directing the packet to the right address and for
checking transmission ___ (6) ___ along with the data. The packets are transmitted over various
communications channels by using ___ (7) ___, each packet traveling independently. Packets of data
originating at one source will be routed through many paths and networks before being reassembled
into the original ___ (8) ___ when they reach their destinations.
Passage 2
    1. reassembling
    2. circuits
3. point-to-point
4. capacity
5. bundles
6. errors
7. routers
8. message
WHAT IS A NETWORK?
A network is a group of linked computers or other devices. There are two kinds of networks that are in
common use. In Local Area Networks (LANs) computers are close together – perhaps in the same
building. They might be connected directly to each other by cable or through a wireless network such as
wi-fi. In contrast, wide area networks (WANs) cover a larger area and usually use telephone lines or a
mobile phone system to connect. A LAN can be a part of WAN.
There are different types of wired networks. One is a star system. In this, each computer (or other
device) is connected to a central server. Another type is a ring system. This is a network that has each
computer linked to two others. In a bus system, there is a central cable which is called a bus, and each
computer is linked to it. Some large networks use a mesh. In this, each computer is linked to several
others. This has one big advantage: if one connection breaks, the data can use other connections.
Therefore, it is difficult to break a mesh network.
Many networks work on a client-server system. In this, servers are special computers that store data,
serve websites and have other similar functions. Generally, a client program will ask the server for data
and the server will then send the data back to the client. For example, when you type a web address
into a browser, the browser (the client) will ask the server for a web page, which then sends the web
page back.
Passage 1
    1. LANs, and WANs
    2. Star system, ring system, bus system and mesh
    3. If one connection breaks, the data can use other connections. Therefore, it is difficult to break a
          mesh network.
    4. Store data, server websites
    5. The browser (the client) will ask the server for a web page, which then sends the web page back.
Passage 2
    1. The company has more than one location.
    2. Communication isn’t very efficient, especially for international locations.
    3. Customers don’t like using the current online shopping systems.
    4. A system that’s easier to use so that customers don’t give up before they finish their
       transactions.
    5. Find technology to help with the problems and find out the prices and features of appropriate
       systems.
Passage 3
    1. A web developer
    2. To get more site visits
    3. A public one for general content and a private one with premium content for paying fans
    4. A combination of PHP, HTML5 and MySQL
    5. Yes
Complete the summary, using ONE word from the above reading passage.
Andrea Pinheiro da Silva, a well-known web ______ (1), shares insights into her recent project for SLFan,
a fan club dedicated to the Space Liberator game. The goal was to create an exciting and______ (2)
website to attract more visitors, considering the presence of other fan sites. The client sought a design
with two distinct______ (3): a public section for general content and a private area with premium
content for paying fans.
To achieve this, a______ (4) of PHP, HTML5, and MySQL was employed. PHP was chosen for its cost-
effectiveness and flexibility, being open source and easily integrable with various website tools. ______
(5) was mainly used for multimedia content, ensuring compatibility with different devices, including
mobile ones. MySQL proved suitable for the ______ (6) section, efficiently storing forum posts and
private data.
Adapting the ______ (7) for mobile devices presented a challenge, requiring every page to be optimized
for mobile viewing. Additionally, a focus on SEO was crucial for achieving high search rankings, requiring
close collaboration with SLFan. The outcome was a website that delighted the ______ (8), emphasizing
the enjoyable collaboration with the SLFan team throughout the project.
Summary
   1. developer
   2. dynamic
   3. areas
   4. combination
   5. HTML5
   6. private
   7. site
   8. customers
1. Various electronic devices are also used to I. English-Vietnamese Translation
    amplify, filter and determine the best path     1. Các thiết bị điện tử khác nhau cũng được
    for the signals.                                    sử dụng để khuếch đại, điều chỉnh và xác
2. The electronics in the hub are used to               định đường dẫn tốt nhất cho tín hiệu.
    amplify the signals to prevent them from        2. Các thiết bị điện tử trong trung tâm được
    becoming too weak before they reach the             sử dụng để khuếch đại tín hiệu nhằm ngăn
    desired computer.                                   chúng trở nên quá yếu trước khi đến được
3. In future, wireless networks will use a              máy tính mong muốn.
    radio transmitter and receiver tuned to         3. Trong tương lai, mạng không dây sẽ sử
    use the same radio frequency, instead of            dụng bộ phát và bộ thu vô tuyến được
    cabling.                                            điều chỉnh để sử dụng cùng tần số vô
4. Extra bytes of data called synch bytes are           tuyến, thay vì đi cáp.
    added at the beginning and end of each          4. Các byte dữ liệu bổ sung được gọi là byte
    block.                                              đồng bộ được thêm vào đầu và cuối mỗi
5. When a message is transmitted through a              khối.
    network, it is processed in various ways by     5. Khi một tin nhắn được truyền qua mạng,
    the software and the hardware.                      nó sẽ được phần mềm và phần cứng xử lý
6. The presentation layer ensures that the              theo nhiều cách khác nhau.
    message is transmitted in a language that       6. Lớp trình bày đảm bảo rằng thông báo
    the receiving computer can interpret.               được truyền bằng ngôn ngữ mà máy tính
7. High-speed routers can serve as part of the          nhận có thể hiểu được.
    Internet backbone.                              7. Bộ định tuyến tốc độ cao có thể đóng vai
8. With Wi-Fi, one access point can cover an            trò là một phần của đường trục Internet.
    entire floor or even a building.                8. Với Wi-Fi, một điểm truy cập có thể bao
9. There are now Wi-Fi hotspots in hotels,              phủ toàn bộ tầng hoặc thậm chí là một tòa
    libraries and airports so you can link to a         nhà.
    network away from home or your office.          9. Hiện nay đã có các điểm truy cập Wi-Fi ở
10. Wireless networks are much slower and               khách sạn, thư viện và sân bay để bạn có
    the further you are from an access point,           thể liên kết với mạng ở xa nhà hoặc văn
    the slower the rate.                                phòng của mình.
11. The application layer is the only part of a     10. Mạng không dây chậm hơn nhiều và bạn
    communications process that a user sees,            càng ở xa điểm truy cập thì tốc độ càng
    and even then, the user doesn't see most            chậm.
    of the work that the application does to        11. Lớp ứng dụng là phần duy nhất của quy
    prepare a message for sending over a                trình liên lạc mà người dùng nhìn thấy và
    network.                                            thậm chí sau đó, người dùng không thấy
     12. The transport layer subdivides the data                                           hầu hết công việc mà ứng dụng thực hiện
         into segments, creates checksum tests                                             để chuẩn bị tin nhắn gửi qua mạng.
         that can be used later to determine if the                                  12.   Lớp vận chuyển chia nhỏ dữ liệu thành các
         data was scrambled.                                                               phân đoạn, tạo các kiểm tra giá trị tổng
     13. The data-link layer keeps a copy of each                                          kiểm mà có thể được sử dụng sau này để
         packet until it receives confirmation from                                        xác định xem dữ liệu có bị xáo trộn hay
         the next point along the route that the                                           không.
         packet has arrived undamaged.                                               13.   Lớp liên kết dữ liệu giữ một bản sao của
     14. An intermediate node calculates and                                               mỗi gói cho đến khi nhận được xác nhận
         verifies the checksum for each packet.                                            từ điểm tiếp theo dọc tuyến rằng gói đã
     15. The application layer converts the bits into                                      đến mà không bị hư hại.
         readable characters, and directs the data                                   14.   Nút trung gian tính toán và xác minh giá trị
         to the correct application.                                                       tổng kiểm cho mỗi gói.
                                                                                     15.   Lớp ứng dụng chuyển đổi các bit thành các
                                                                                           ký tự có thể đọc được và chuyển dữ liệu
                                                                                           đến đúng ứng dụng.
II. WRITING
Make meaningful sentences by adding between 8 and 15 words to the given phrases.
     1. A bridge is a hardware and software combination which is ........................................................
     2. A router directs ..............................................................................................................................
     3. A gateway enables ..........................................................................................................................
     4. A backbone is the main transmission path which ...................................................................
     5. A LAN connects .............................................................................................................................
     6. A modem converts ........................................................................................................................
     7. A server stores ................................................................................................................................
     8. A hub is an electronic device which .........................................................................................