0% found this document useful (0 votes)
17 views35 pages

Uyen Ôn 1

The document provides an overview of computer architecture, including key components like CPU, RAM, and storage types such as HDD and SSD. It discusses the importance of memory cache in improving data access speeds and the roles of computer architects in designing efficient systems. Additionally, it highlights the challenges faced in maintaining and updating computer architectures.

Uploaded by

Uyên Mỹ
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
17 views35 pages

Uyen Ôn 1

The document provides an overview of computer architecture, including key components like CPU, RAM, and storage types such as HDD and SSD. It discusses the importance of memory cache in improving data access speeds and the roles of computer architects in designing efficient systems. Additionally, it highlights the challenges faced in maintaining and updating computer architectures.

Uploaded by

Uyên Mỹ
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 35

MODULE 1: COMPUTER ARCHITECTURE

STT Từ vựng Định nghĩa (Tiếng Anh) Dịch tiếng Việt


1 RAM the main electronic memory of a bộ nhớ điện tử chính của máy tính cá
personal computer and used for storing nhân, dùng để lưu trữ chương trình
the programs and data being used và dữ liệu đang sử dụng
2 processor the part of a computer that processes bộ phận của máy tính xử lý dữ liệu
the data
3 ROM a type of memory that holds instructions loại bộ nhớ chứa các lệnh cần thiết
which are needed to start up the để khởi động máy tính
computer
4 supercomputer the most powerful type of mainframe loại máy tính lớn mạnh nhất trong
computer dòng máy tính lớn (mainframe)
5 CPU the electronic processor at the centre of bộ xử lý trung tâm điện tử trong máy
a computer tính
6 scanner an optical input device that uses the thiết bị đầu vào quang học dùng ánh
reflection of light to copy text or sáng để sao chép văn bản hoặc hình
graphics into a computer ảnh vào máy tính
7 Monitor the main output device used to display thiết bị đầu ra chính hiển thị thông
Màn hình the output from a computer on a screen tin từ máy tính lên màn hình
8 Keyboard the main electronic input device that has thiết bị đầu vào chính có các phím
Bàn phím keys arranged in a similar layout to a giống như máy đánh chữ
typewriter
9 mainframe the largest and most powerful type of loại máy tính lớn và mạnh nhất,
computer. It is operated by a team of được vận hành bởi một nhóm
professionals. chuyên gia
10 printer a common output device used for thiết bị đầu ra phổ biến dùng để in
printing the output of a computer on thông tin từ máy tính ra giấy
paper

Most PCs are held back not by the speed of their main processor but by the time it takes to move data
in and out of memory. One of the most important techniques for getting around this bottleneck is the
memory cache.
The idea is to use a small number of very fast memory chips as a buffer or cache between main memory
and the processor. Whenever the processor needs to read data, it looks in this cache area first. If it finds
the data in the cache then this counts as a ‘cache hit’ and the processor need not go through the more
laborious process of reading data from the main memory. Only if the data is not in the cache, does it
need to access main memory but in the process it copies whatever it finds into the cache so that it is
there ready for the next time it is needed. The whole process is controlled by a group of logic circuits
called the cache controller.
One of the cache controller’s main jobs is to look after ‘cache coherency’ which means ensuring that any
changes written to main memory are reflected within the cache and vice versa. There are several
techniques for achieving this, the most obvious being for the processor to write directly to both the
cache and main memory at the same time.

1. processor
2. bottleneck
3. buffer
4. counts
5. memory
6. logic
7. reflected
8. techniques

Note that the term PC usually refers to an IBM __________ (1) personal computer, i.e. an Apple Mac
personal computer is not referred to as a PC. A computer that provides a service on a network, e.g.
__________ (2) files, sharing a printer, is known as a server computer. __________ (3) computers
usually have a UPS (uninterruptible power supply) attached to them. This is a battery that automatically
provides an electricity supply to allow the server to shut itself down properly if the main supply fails.
The combination of the processor and memory is sometimes referred to as the CPU (central processing
unit), although sometimes the processor itself is __________ (4) to as the CPU. The other parts
connected to the CPU are known as peripherals. These can include input devices, output devices,
storage devices and communications devices. __________ (5) devices include: keyboards, scanners,
barcode readers, digital cameras, microphones and video cameras e.g. webcams (small digital video
cameras used on the Web). __________ (6) devices include: monitors (VDU display screens), printers,
plotters, loudspeakers, headphones. Storage devices include: magnetic tape, floppy disks (diskettes),
hard disks, CD-ROMs, CD-R disks, CD-RW disks, DVDs and MO disks. A common communications device
is a __________ (7) (a modulator/demodulator used for converting digital signals to analogue signals
and vice versa to allow a computer to be connected to the ordinary __________ (8) system).

Passage 2
1. compatible
2. storing
3. server
4. referred
5. input
6. output
7. modem
8. telephone

A set of CONNECTORS (1) used for carrying signals between the different PARTS (2) of a computer is
known as a bus. Data is transferred constantly between the processor and memory along the system
bus. Each part of memory has its own memory address and the processor determines where PROCESSED
(3) data is stored by sending an address signal along an address bus and data along a data bus. This is
SYN (4) by an electronic clock in the CPU that determines the operating speed of the processor.
Transferring data between the processor and RAM can slow up the computer; therefore, some very
EXPENSIVE (5), extremely fast memory is usually used as a cache to hold the most frequently used data.

Passage 3
1. connectors
2. parts
3. processed
4. synchronised
5. expensive
6. desktop
7. consists
8. cables
Hard disks _____CONSIST_____ (1) of a set of magnetic coated metal disks that are vacuum-sealed
inside a case to keep out the dust. The magnetic surfaces of the___DISK_______ (2) are formatted using
a read/write head to provide magnetic storage areas. These storage areas form concentric circles called
tracks and each track is subdivided into sections called _____SECTOR_____ (3). The disks are rotated at
high speed and read from or written to by the read/write head that moves across the surface of the
disks. In server computers, hard disks can be connected together and made to operate as one unit using
RAID (a redundant array of inexpensive disks). This can speed up the system and ___PROVIDE_______
(4) a way of recovering data if the system crashes (fails suddenly and completely, usually referring to the
failure of a hard disk). There is a variety of optical storage devices that use laser_____LIGHT_____ (5) to
read or write to a disk.
An input device called a barcode reader is a ___SPECIAL_______ (6) type of scanner for reading
barcodes (a set of printed bars of varying thickness that are___USED_______ (7) to identify a product
e.g. used to price items in supermarkets).
When comparing computers, the power of the computer is important. This is mainly determined by the
speed and ____CAPACITY______ (8) (size) of each part of the computer.

Passage 4
1. consist
2. disks
3. sectors
4. provide
5. light
6. special
7. used
8. capacity
While computer architectures can differ greatly depending on the purpose of the computer, several key
components generally contribute to the structure of computer architecture:
Central Processing Unit (CPU) Often referred to as the "brain" of the computer, the CPU executes
instructions, performs calculations, and manages data. Its architecture dictates factors such as
instruction set, clock speed, and cache hierarchy, all of which significantly impact overall system
performance.
Memory Hierarchy This includes various types of memory, such as cache memory, random access
memory (RAM), and storage devices. The memory hierarchy plays a crucial role in optimizing data access
times, as data moves between different levels of memory based on their proximity to the CPU and the
frequency of access.
Input/Output (I/O) System The I/O system enables communication between the computer and external
devices, such as keyboards, monitors, and storage devices. It involves designing efficient data transfer
mechanisms to ensure smooth interaction and data exchange.
Storage Architecture This deals with how data is stored and retrieved from storage devices like hard
drives, solid-state drives (SSDs), and optical drives. Efficient storage architectures ensure data integrity,
availability, and fast access times.
Instruction Pipelining Modern CPUs employ pipelining, a technique that breaks down instruction
execution into multiple stages. This allows the CPU to process multiple instructions simultaneously,
resulting in improved throughput.
Parallel Processing This involves dividing a task into smaller subtasks and executing them concurrently,
often on multiple cores or processors. Parallel processing significantly accelerates computations, making
it key to tasks like simulations, video rendering, and machine learning.
Permanent storage is storage meant to save your data, files, and programs when you are not using
them, even when the computer is shut down. This is why we call it permanent. It is much cheaper than
RAM (1GB of permanent storage costs way less than 1GB of RAM), but it is also much slower. With
slower, we mean that it is orders of magnitude slower than RAM, million times slower.
There are two technologies for permanent storage, HDD and SSD. Hard Disk Drive, HDD, is the older
technology, data is stored on magnetic disks that have to rotate to be accessed. It is the slower of the
two, but also the cheaper and the one that can boost higher capacities. On the other hand, Solid State
Drive, SSD, is the newer technology which has no disk or moving part, everything is managed through
electronics. It is faster, because you don’t have to wait for the disk to physically spin to reach your piece
of data, and less prone to breaking because it has no moving parts. It is more expensive than HDD, but
still cheaper than RAM.
Because permanent storage is million times slower than RAM (even in SSDs), CPU cannot access it
directly. If you want to execute a program or read some data, it first needs to be moved to the RAM to
be accessed. To make an analogy, imagine you have a library and you want to read a book or write on a
notebook. First, you need to go to the bookshelf and fetch the book you want (you have to remove it
from permanent storage). You carry your book to the desk (in the RAM), and here you do what you need
to do. Once you finish, you put it back on the shelf (the permanent storage).

1. What is the primary purpose of permanent storage in a computer system?


A. To execute programs
B. To save data, files, and programs when not in use
C. To manage data access times
D. To boost higher capacities
2. Why is permanent storage referred to as "permanent" in the text?
A. It lasts forever
B. It is more reliable than RAM
C. It retains data even when the computer is shut down
D. It is always in use

3. What is the main difference between HDD and SSD in terms of technology?
A. HDD uses magnetic disks, while SSD uses electronic management
B. HDD is faster than SSD
C. SSD has moving parts, while HDD does not
D. HDD is more expensive than SSD

4. Why is SSD faster than HDD, according to the text?


A. Because SSD has higher capacities
B. Because SSD uses magnetic disks
C. Because SSD has no moving parts and everything is managed electronically
D. Because SSD is cheaper than RAM

5. Why does the CPU need to move data from permanent storage to RAM before executing a program
or accessing data?
A. Because permanent storage is more reliable
B. Because permanent storage is million times slower than RAM
C. Because permanent storage is cheaper than RAM
D. Because permanent storage lasts forever

Architecture Overview
Almost all modern computers use the Von Neumann architecture model that was created by a
mathematician in the 1940’s. This model includes fundamental things like the computer’s CPU, registry,
memory, storage, logic unit and input/output (I/O) interface. Most computer’s architecture can be
divided into three categories. First, the hardware system includes the CPU, direct memory and data and
graphics processors. Second, the Instruction Set Architecture directs the embedded programming
language in the CPU. The ISA’s programming defines the functions and capabilities of the CPU. Third, the
micro-architecture is the computer’s international organization that defines data paths, storage,
execution and processing. A computer’s architecture may be created and maintained by systems
engineers, application architects and software engineers.
Computer Architects
Computer architects oversee the implementation of architecture strategies and policies within
companies. They create computer models and standard solutions that save costs, increase capabilities
and align with business needs. Their architectural solutions must deliver stability, availability and
sustainability. Computer architects may deal with server storage, data backup, virtual recovery and
internal applications. In order to produce efficient systems, they must stay up to date on the latest
computer, programming and technology trends.
The Challenge of Architecting
Creating a computer’s architecture, framework and infrastructure can be quite challenging. Senior
computer architects may update, maintain and create system architectures that support product lines
and business goals. They may review, modify and approve existing architectural designs through careful
comparative research. Senior computer architects may communicate architecture strategies in order to
convince executive management, technical teams and third-party vendors. Senior computer architects
must have significant experience in the design, development and deployment of enterprise solutions.
They should fully understand computer infrastructure, middleware and integration.

Read the passage and choose the correct option to answer each question.
1. What is the Von Neumann architecture model primarily composed of?
A. Hardware system, micro-architecture, and data paths
B. CPU, registry, memory, storage, logic unit, and I/O interface
C. Instruction Set Architecture, data backup, and graphics processors
D. CPU, direct memory, and virtual recovery
2. What does the Instruction Set Architecture (ISA) define in the computer's architecture?
A. Data paths, storage, execution, and processing
B. International organization and embedded programming language
C. Functions and capabilities of the CPU
D. Server storage, data backup, and virtual recovery
3. What is the role of computer architects in companies?
A. Creating computer models and standard solutions
B. Approving existing architectural designs
C. Overseeing technology trends and programming languages
D. Maintaining and updating micro-architecture
4. What challenges do senior computer architects face in their roles?
A. Dealing with server storage and data backup
B. Convincing executive management, technical teams, and third-party vendors
C. Defining micro-architecture and infrastructure
D. Reviewing and modifying Instruction Set Architecture
5. What knowledge is crucial for senior computer architects to possess?
A. Latest computer, programming, and technology trends
B. International organization and embedded programming language
C. CPU, direct memory, and data processors
D. Hardware system and logic unit
Complete the summary, using ONE word from the above reading passage.

Modern computers largely follow the Von Neumann architecture model, developed in the 1940s,
encompassing key components like the ________(1), registry, memory, storage, logic unit, and
input/output interface. Computer architecture typically falls into three categories: hardware system,
Instruction Set Architecture (ISA), and micro-architecture. The________ (2) system includes the CPU,
direct memory, and processors, while the ________ (3) guides the embedded programming language in
the CPU. ________ (4), as the computer's international organization, defines data paths, storage,
execution, and processing.
Computer architects play a vital role in implementing architecture ________ (5) within companies,
designing ________ (6) and solutions aligned with business needs. They focus on creating efficient
systems ensuring stability, availability, and sustainability, addressing aspects like server ________ (7),
data backup, and virtual recovery. The complexity of architecting computer systems involves challenges
such as updating, ________ (8), and creating architectures supporting business goals. Senior computer
architects need extensive experience in designing and deploying enterprise solutions, staying updated
on computer trends, and effectively communicating strategies to various stakeholders, including
executive management and technical teams.

Summary:
1. CPU
2. hardware
3. ISA
4. Micro-architecture
5. strategies
6. models
7. storage
8. maintaining

 ROM is used to ....................................................................................


 The function of flash memory key is to ..................................................
 RAM holds .........................................................................................
 The processor ......................................................................................
 Most PCs are held back by ....................................................................
 Looking after ‘cache coherency’ means ...............................................
 The ‘write-back’ cache allows the processor to ..................................... .....................................
 ‘Dirty cache’ tells the cache controller to ............................................. .....................................
 Disk caching works in essentially the same way whether ......................... .....................................
 If the requested information isn't in the cache, ...................................... .....................................
 The CPU is the heart of the computer, a microprocessor chip which ........ .....................................
 At the back of a computer, there are ports into which ............................. .....................................
 Hardware is ........................................................................................ .....................................
 Software is ......................................................................................... ....................................
 Peripherals are ................................................................................... .....................................

1. ROM is used to hold instructions which are needed to start up the computer.
2. The function of flash memory key is to read and write to electronic chips on a card.
3. RAM holds data read or written to it by the processor.
4. The processor controls all the operations in a computer.
5. Most PCs are held back by the time it takes to move data in and out of memory.
6. Looking after 'cache coherency' means ensuring that any changes written to main memory are
reflected within the cache and vice versa.
7. The 'write-back' cache allows the processor to write changes only to the cache and not to main
memory.
8. 'Dirty catche' tells the cache controller to write their contents back to main memory before
using the space to cache new data.
9. Disk caching works in essentially the same way whether you have a cache on your disk
controller or you are using a software-based solution.
10. If the requested information isn't in the cache, the data is read from the disk along with a large
chunk of adjacent information.
11. The CPU is the heart of the computer, a micro processor chip which processes data and
coordinates the activities of all the other units.
12. At the back of a computer, there are ports into which we can plug external devices such a
scanner or a modem.
13. Hardware is any electronic or mechanical part of the computer system that you can see or touch.
14. Software is a set of instructions, called a program, which tells a computer what to do.
15. Peripherals are the physical units attached to the computer such as input/output devices, and
storage devices.
1H. Kernel – Nhân hệ điều hành: Lớp thấp nhất ở lõi của hệ điều hành. Nó xử lý việc phân bổ tài nguyên
phần cứng cho phần còn lại của hệ điều hành và các chương trình ứng dụng.
2A. Port – Cổng: Chuyển đổi để sử dụng trên một hệ điều hành hoặc nền tảng máy tính khác.
3I. Log on – Đăng nhập: Kết nối với tài khoản hệ thống mạng, thường bằng cách dùng mật khẩu.
4C. Resident – Cư trú: Lưu trong bộ nhớ máy tính.
5G. Hardware – Phần cứng: Các thành phần vật lý của một hệ thống máy tính.
6D. Server – Máy chủ: Máy tính chính cung cấp dịch vụ trên một mạng.
7F. Word processing – Xử lý văn bản: Quá trình gõ và chỉnh sửa văn bản bằng trình xử lý văn bản.
8B. Utility – Tiện ích: Chương trình đi kèm với hệ điều hành, dùng để thực hiện các tác vụ thường xuyên
hoặc bảo trì hệ thống.
9J. Text editor – Trình soạn thảo văn bản: Chương trình máy tính để chỉnh sửa dữ liệu hoặc mã nguồn
cơ bản, ví dụ như một trình xử lý văn bản đơn giản.
10E. Interface – Giao diện: Phần cứng hoặc phần mềm kết nối hai hệ thống với nhau và cho phép chúng
giao tiếp.

Linux has its ___ROOTS______(1) in a student project. In 1992, an undergraduate called Linus Torvalds
was studying computer science in Helsinki, Finland. Like most computer science courses, a
big___COMPONENT______ (2) of it was taught on (and about) Unix. Unix was the wonder operating
system of the 1970s and 1980s: both a textbook example of the principles of operating system
_____DESIGN____ (3), and sufficiently robust to be the standard OS in engineering and scientific
computing. But Unix was a _COMMERCIAL________ (4) product (licensed by AT&T to a number of
resellers), and cost more than a student could pay.
Annoyed by the shortcomings of Minix (a compact Unix clone written as a teaching aid by Professor
Andy Tannenbaum) Linus set out to write his own ‘kernel’ – the__CORE_______ (5) of an operating
system that____HANDLE_____ (6) memory allocation, talks to hardware __DEVICES_______ (7), and
makes sure everything keeps running. He used the GNU programming tools developed by Richard
Stallman’s Free Software Foundation, an organisation of volunteers dedicated to fulfilling Stallman’s
ideal of making good____SOFTWARE_____ (8) that anyone could use without paying. When he'd written
a basic kernel, he released the source code to the Linux kernel on the Internet.

Passage 1
1. roots
2. component
3. design
4. commercial
5. core
6. handles
7. devices
8. software
Source code is important. It’s the original from which compiled programs are generated. If you don't
have the source code to a program, you can’t ___MODIFY______(1) it to fix bugs or add new
___FEATURE______ (2). Most software companies won’t sell you their source code, or will only do so for
an eye watering price, because they believe that if they make it available, it will destroy
their___REVENUE______ (3) stream.
What happened next was astounding, from the ___CONVENTIAONAL______ (4), commercial software
industry point of view - and utterly predictable to anyone who knew about the Free Software
Foundation. Programmers (mostly academics and students) began using Linux. They found that it didn’t
do things they wanted it to do - so they fixed it. And where they improved it, they sent the
__IMPOVEMENT_______ (5) to Linus, who rolled them into the kernel. And Linux began to grow.
There’s a term for this model of software __DEVELOPMENTS_______ (6); it’s called Open Source (see
www.opensource.org/ for more information), so Anyone can have the source code - it’s free (in the
sense of free speech, not free beer). Anyone can___CONTRIBUTE______ (7) to it. If you use it heavily
you may want to extend or develop or fix bugs in it - and it is so easy to give your (8___FIXS______) back
to the community that most people do so.

Passage 2
1. modify
2. features
3. revenue
4. conventional
5. improvements
6. development
7. contribute
8. fixes

The OS (operating system) is the set of computer programs that allow the user to perform basic)
___TAKS____ (1) like copying, moving, saving and printing files. It also provides an ) ___INTERFACE____
(2) between (i.e. provides communication between) ____APPLICATIONS___ (3) programs (e.g. word
processors or spreadsheets) and the computer hardware. As a user interacts with an applications
program on the screen, the applications program (4) __ COMMUNICATE_____) with the operating
system and the operating system communicates with the computer hardware. The work of the
operating system takes place in the background and is not always obvious to the user.
The most important program in an OS is the ) ___SUPERVISOR____ (5) program. It remains in memory
all the time that the computer is operating, and manages the OS. It loads other parts of the OS into
memory when they are needed. Programs that remain in memory while the computer is in use are
known as resident programs. Programs that only stay in memory while they are being used are known as
) ___NON-RESIDENT____ (6) programs.
Some operating systems are command driven (i.e. the user runs a program by typing a command). The
screen is usually blank except for a ) __SYMBOL_____ (7) (e.g. $) which acts as a command prompt.
When the command is typed at the prompt and the Enter key is pressed, the command is processed and
the output is (8) ) ___DISPLAYED____on the screen. OS commands are usually short words or
abbreviations (e.g., date, logout, password, ls).

Passage 3
1. tasks
2. interface
3. applications
4. communicates
5. supervisor
6. non-resident
7. symbol
8. displayed

III. READING COMPREHENSION


Passage 1. Read the passage then answer the questions below.
1. Where is SuperSocial Pty Ltd based in?
2. What are SuperSocial ESN’s main selling points?
3. What kind of companies is the Basic system designed for?
4. What can users of the Basic Plus system do?
5. Which system has the high level of security?

SuperSocial ESN is an Enterprise Social Networking system produced by SuperSocial Pty Ltd, a company
based in Melbourne, Australia. Its main selling points are that it helps clients’ employees to
communicate more efficiently and gives them better access to digital data. It provides a wide range of
functions and because of SuperSocial’s tiered pricing, clients can choose not to pay for the features that
they don’t actually need.
Plans start with the Basic system, which is designed for a small business at one location. This has instant
messaging as well as file sharing.
The next level up, only slightly more expensive, is the Basic Plus system. This has OCR and a document
management system with tagging so that the user can scan documents and keep track of the electronic
versions. There is also a document archiving feature.
The highest-level system is the Premium system, which has all the capabilities of the first two levels, plus
some additional features. With it, users can give and record webinars, and there is a speech-to-text
capability so that users can create documents without typing. Many users like to be able to write and
send messages even when driving. Users of the Premium system can access data wherever they are,
whether in the office, visiting a client or at home. And it comes with a high level of security, including a
VPN and encryption so that access to the server is very secure.

Passage 1
1. Melbourne, Australia
2. It helps clients’ employees to communicate more efficiently and gives them better access to
digital data.
3. A small business at one location
4. They can scan documents and keep track of the electronic versions.
5. The premium system

Passage 2. Read the passage then answer the questions below.


1. What is the role of an operating system in a computer?
2. How do application programs interact with the operating system?
3. Why is an operating system essential for software development?
4. What purpose does system software serve in relation to applications?
5. How does the operating system contribute to reducing coding efforts in software development?

OPERATING SYSTEM
What is an operating system?
An operating system (OS) is the program that, after being initially loaded into the computer by a boot
program, manages all of the other application programs in a computer. The application programs make
use of the operating system by making requests for services through a defined application program
interface (API). In addition, users can interact directly with the operating system through a user
interface, such as a command-line interface (CLI) or a graphical UI (GUI).

Why use an operating system?


An operating system brings powerful benefits to computer software and software development.
Without an operating system, every application would need to include its own UI, as well as the
comprehensive code needed to handle all low-level functionality of the underlying computer, such as
disk storage, network interfaces and so on. Considering the vast array of underlying hardware available,
this would vastly bloat the size of every application and make software development impractical.
Instead, many common tasks, such as sending a network packet or displaying text on a standard output
device, such as a display, can be offloaded to system software that serves as an intermediary between
the applications and the hardware. The system software provides a consistent and repeatable way for
applications to interact with the hardware without the applications needing to know any details about
the hardware.
As long as each application accesses the same resources and services in the same way, that system
software -- the operating system -- can service almost any number of applications. This vastly reduces
the amount of time and coding required to develop and debug an application, while ensuring that users
can control, configure and manage the system hardware through a common and well-understood
interface.
Passage 2
1. Handle low-level functionality
2. Make requests through an API
3. It simplifies coding
4. Increased application complexity
5. By offloading common tasks

Passage 3
OPEN-SOURCE: THE WAY FORWARD?
With open-source software, what do people think about first? Money, usually, because open-source
software is free, but this isn’t the only important thing. First, there is freedom from the software
vendors. Organizations say that freedom is the number one reason to choose open-source software.
With open-source software, an organization doesn’t have to follow the software vendor’s decisions.
With proprietary software, the vendor controls software updates. For example, users can’t add features
to proprietary software themselves, but they can add features to open-source software.
Also, with open-source software, companies have more control of their data. Proprietary software often
stores data in special ways that only the vendor understands. So, when a company wants to change to
another vendor’s software, moving the data to the new software can be very difficult. Open-source
software is different; open-source software vendors explain their data clearly and openly so that they
are not a secret. Because of this, moving data isn’t a problem.
Sometimes people worry about open-source operating systems. They think that their favorite software
won’t run on open-source operating systems. However, this isn’t true because there is a lot of office
software, such as word processors and spreadsheets, for open-source operating systems. In fact, there
are many kinds of this software and they work well. It is only special areas, such as graphics design,
where proprietary software is clearly better.
Read the passage then answer the questions below.
1. Does open-source software cost money?
2. What is the number one reason for organisations to choose open-source software?
3. Is it difficult to move data with open-source software?
4. What office software can run on open-source operating systems?
5. Does graphics design run better on open-source software or proprietary software?

Passage 3
1. No
2. Freedom is the number one reason to choose open-source software.
3. No
4. Word processors and spreadsheets
5. Proprietary software

Complete the summary, using ONE word from the above reading passage.
When we talk about open-source software, people usually think about it being free. But it's not just
about saving money; it's also about _______(1). With open-source software, organizations don't have to
follow the _______ (2) of software vendors. This is the main reason why many choose open source –
they want the freedom to make their own choices.
Unlike _______ (3) software, where the vendor controls updates and users can't add features, open-
source software allows users to _______ (4) and improve features on their own. It gives more control to
organizations over their data. Proprietary software often stores data in ways that only the vendor
understands, making it difficult to switch to another vendor's _______ (5). Open-source software, on the
other hand, explains its data openly, making data transition easier.
Some worry that their favorite software won't run on _______ (6) operating systems. But that's not true
for many office software like word processors and spreadsheets, which work well on open-source
_______ (7) systems. While proprietary software may be better in certain areas like _______ (8) design,
open source covers a lot and is versatile.

Summary
1. freedom
2. decisions
3. proprietary
4. add
5. software
6. open-source
7. operating
8. graphics

II. WRITING
Make meaningful sentences by adding between 8 and 15 words to the given phrases.
1. An operating system is a set of programs that lies between applications software and the
computer hardware.
2. An operating system lies between applications software and the computer hardware.
3. Besides controlling the entire operating system, the supervisor loads into memory other
operating system programs from disk storage only as needed.
4. An important function of the operating system is to manage the computer's resources, such as
the central processing unit, memory, disk drives, and printers.
5. As soon as the PC is switched on, the operating system starts running the user interface.
6. The main reason for installing more memory is to allow the computer to process data faster.
7. The task in most cases of the operating system is to facilitate interaction between a single user
and a PC.
8. The main reason for installing more memory is to allow the computer to process data faster.
9. If you don't have the source code to a program, you can't modify it to fix bugs or add new
features.
10. With Open Source, anyone can have the source code and contribute to it.
11. Typical functions of the operating system are handling input/output operations, running
programs and organizing files on disks.
12. The operating system allows multitasking because a user can run several programs (and do
various tasks) at a time.
13. A drop-down menu is a list of options that appear below a menu bar when you click on an item.
14. A compression utility rewrites data so that it takes less space on disk.
15. A media player lets you watch DVDs, play music and listen to the radio on the Web.
No. Term Definition Vietnamese Meaning
1. bandwidth
2. LAN Computers connected together over a Các máy tính được kết nối trong
small area such as a company một khu vực nhỏ như phòng ban
department của công ty
3. office A computer program or set of Bộ chương trình máy tính được
application programs that are used in a typical sử dụng trong văn phòng như
suite office, e.g. a word processor, xử lý văn bản, bảng tính và cơ
spreadsheet and database sở dữ liệu
4. data centre A facility for storing large amounts Cơ sở dùng để lưu trữ lượng lớn
of information thông tin
5. broadband Able to carry signals transmitted Có khả năng truyền tín hiệu trên
over a wide range of frequencies dải tần số rộng
6. SAP A widely used enterprise resource Một chương trình hoạch định
planning tool program nguồn lực doanh nghiệp được
sử dụng rộng rãi
7. email The common name for an electronic Tên thông thường của thư điện
mail message, i.e. a text message tử — một dạng tin nhắn văn bản
sent electronically using a computer gửi bằng máy tính
8. website A set of related pages on the World Một tập hợp các trang liên quan
Wide Web trên mạng Internet toàn cầu
9. ASP A company that offers individuals or Một công ty cung cấp quyền
enterprises access to applications and truy cập các ứng dụng và dịch
related services over the internet vụ liên quan qua Internet
10. tab A dialog box component that is used Thành phần hộp thoại dùng để
to switch between different sets of chuyển đổi giữa các tập dữ liệu
data khác nhau
Passage 1
If your hard disk is packed to (1) BURSTING point, the IT department is far too busy to fix your email
problems, and your business can't (2)AFFORD to buy the tools that you'd like to develop the company
website, then it's time to think about using an application service provider (ASP). Rather than (3
INSTALLING) software on each machine or server within your organisation, you rent applications from
the ASP, which provides remote access to the software and manages the (4)HARDWARE required to run
the applications.
There are a lot of advantages to this approach. The havoc caused by (5) VIRUS makes the idea of
outsourcing your email and office suite services an attractive option. It also gives you more FLEXIBILITY
(6) — you pay for applications as and when you need them, rather than investing in a lot of costly
software which you're then tied to for years. Not having to worry about upgrading to the latest version
of your office suite or about ___BATTLING____ (7) with the complexities of managing an email system,
leaves businesses with more time. Time to focus on what they do best.
However, there are some potential pitfalls. To use applications remotely requires a lot of
BANDWIDTH(8), which is only really available from a broadband connection or a leased line to the ASP
itself. It is also important to ensure that the ASP will be able to provide a secure, reliable service which
will be available whenever you need it.

Passage 1
1. bursting
2. afford
3. installing
4. hardware
5. viruses
6. flexibility
7. battling
8. bandwidth
Passage 2
Providing applications and storage ____SPACE_____(1) for vast numbers of users ___REQUIRES______
(2) some powerful technology on the part of the ASP. This includes security controls and data storage as
well as providing the physical links to customers. For the most part, ASPs don’t own the data centres
that store the information. Instead, they lease space from data storage specialists. In this way, they can
be ______CONFIDENT___ (3) of meeting customers’ increasing storage requirements by buying more
space as it’s needed.
There’s a wide ___VARIETY______ (4) of applications available for use via ASPs. Office suite applications
and email services are two of the most ____GENERIC_____ (5) applications available through ASPs.
Large, complex business applications such as enterprise resource planning tools like SAP are another
popular candidate for delivery through an ASP. Other business services, such as payroll and accounting
systems are also available. This is particularly ___BENEFICIAL______ (6) to small businesses which are
likely to grow quickly and don’t want to deal with the problems caused by outgrowing their existing
system and having to move to a high-end ___PACKAGE______ (7) ASPs also offer a means of using
specialist tools that would otherwise prove prohibitively expensive. Small businesses have the
opportunity to use such tools for short periods of time as and when they need them, rather than having
to buy the ____SOFTWARE_____ (8) as a permanent investment.

Passage 2
1. space
2. requires
3. confident
4. variety
5. generic
6. beneficial
7. package
8. software

Passage 1. Read the passage then answer the questions below.


1. What kind of equipment does Bluetooth work with?
2. Is Bluetooth costly?
3. What devices can Bluetooth create a secure 1 Mbit/s link between them?
4. What does Bluetooth radiate less than most national and international standards?
5. Does Bluetooth allow the technology to operate on aircraft?
TROUBLESHOOTING GUIDE
As portable computing devices get smarter and more capable, connectivity frustrations increase. This is
where Bluetooth comes in. The brainchild of Ericsson, IBM, Intel, Nokia and Toshiba, Bluetooth is a
microwave high-speed wireless link system that’s designed to work with portable equipment. To that
end, it’s low power, very small and very low cost. It uses the same frequencies as existing radio LANs
(and, incidentally, microwave ovens) to create a secure 1 Mbit/s link between devices within 10m of
each other. These devices can be laptops, PDAs, cellphones, wired telephone access points, even
wristwatch devices, headphones, digital cameras and so on. With them, your notebook PC will be able to
access your cellular phone and thus the Internet without your having to take the phone out of your
pocket. Files can be exchanged and communications set up for voice and data between just about any
device capable of handling the information.
Bluetooth operates in the unlicensed ISM (Industrial, Scientific and Medical) band at 2.45GHz, which is
globally available for products. There’s 89MHz of bandwidth allocated here, and since Bluetooth is very
low power, it actually radiates less than most national and international standards that allow non-
transmitting devices to leak as part of their normal operation. This is key, as it allows the technology to
operate without restriction on aircraft.

Passage 1
1. Portable equipment
2. No
3. Laptops, PDAs, Cellphones, Wired Telephone Access Points, Even Wristwatch Devices,
Headphones, Digital Cameras
4. It’s very low power.
5. Yes

Passage 2. Read the passage then answer the questions below.


1. In order to improve your marketability to potential employers, what can you do?
2. What kind of things do people need to consider if they are going to train themselves up?
3. Which organization offers the range of certification programmes?
4. Who does Microsoft offer certification programmes?
5. What do you need to consider before you choose a type of training?

Passage Text:
Suppose you’re a support engineer. You’re stuck in a job you don’t like and you want to make a change.
One way of making that change is to improve your marketability to potential employers by upgrading
your skill-set. If you’re going to train yourself up however, whose training should you undertake? If you
need certificates, whose certificates should they be? Even if you get those certificates, how certain can
you be that your salary will rise as a result? One solution is the range of certifications on offer from
Microsoft.
Microsoft offers a large array of certification programmes aimed at anyone from the user of a single
program such as Microsoft Word, to someone who wants to become a certified support engineer. There
are a myriad of certificates to study for too. If you’re the proud holder of any of those qualifications,
then you’re entitled to call yourself a Microsoft Certified Professional (MCP).
Once you’ve decided which track you want to take, you should consider just how qualified you already
are in terms of experience and knowledge. Will you need to go and take some courses with a training
company, or are you the type who can make good use of self-study materials? How much time do you
genuinely have to devote towards this? Will your employer pay for your course? Will it grant you leave
to go and do the course - assuming you can find one - on either a full-time or part-time basis?

Passage 2
1. Upgrade your skill-set
2. Whose training they should undertake; whose certificates they should be and how certain they
can be that their salary will rise.
3. Microsoft
4. Anyone from the user of a single program to someone who wants to become a certified support
engineer
5. How qualified you already are in terms of experience and knowledge

1. How many types of objects are mentioned in the passage?


2. Can the same data be in any other record? NO
3. What is an example of the primary key?
4. What is a simple way to get data out of a database?
5. If we want to combine information from several tables, what can we do?

Passage 3.
A database has several parts. These are called objects. The simplest of these is a table; most databases
have at least two. Tables look like a spreadsheet. Each row in the table is a record, containing
information about one item, such as a person or something that the company sells. Each of these
contains several fields with information about the item. For example, in a company’s employee
database, these might be family name, given name, phone number and so on. One important point is
that one field in each record must be unique - the same data must not be in any other record. We call
this field the primary key. It can be a staff ID number, for example, it can’t be a given name because
many people have the same given name.
Another type of object is a form, which is used for entering data into tables. A third object type is a
report. This can show data from more than one table at the same time, looks good and is suitable for
printing.
These are several ways to get data out of a database. One is simply to retrieve a record - for example, if
we want to check the data in a single record, such as an employee’s phone number. If we want to
combine information from several tables or to do something with the data such as add up financial
information from several records, we can query the database.

Complete the summary, using ONE word from the above reading passage.
A database consists of various objects, with _______(1) being the simplest and most common. Tables
resemble _______ (2), with each row representing a record containing information about an _______
(3). Fields within each record, such as family name or phone number, store specific details. It’s crucial
for one field, known as the primary key, to be _______ (4) in each record, ensuring no repetition of data.
Forms, another object type, facilitate _______ (5) entry into tables, while reports display data from
multiple tables simultaneously, presenting it in a visually appealing format suitable for _______ (6).
Retrieving data from a database involves various methods. _______ (7) record retrieval is common for
checking specific details, like an employee’s phone number. Querying the database becomes necessary
when combining information from multiple tables or performing actions, such as summarizing _______
(8) data from various records.

Summary
1. tables
2. spreadsheets
3. item
4. unique
5. data
6. printing
7. Single
8. financial
 backbone → H. The main transmission path handling the major data traffic connecting different LANs
together
→ Đường trục: Tuyến truyền dẫn chính đảm nhiệm phần lớn lưu lượng dữ liệu, kết nối các mạng LAN
khác nhau.
 bridge → G. A hardware and software combination used to connect the same type of networks or to
partition a large network into two smaller ones
→ Cầu nối mạng: Tổ hợp phần cứng và phần mềm dùng để kết nối các mạng cùng loại hoặc chia mạng
lớn thành hai mạng nhỏ hơn.
 gateway → B. An interface that enables dissimilar networks to communicate such as two LANs based
on different topologies or network operating systems
→ Cổng mạng: Giao diện giúp các mạng khác loại có thể giao tiếp với nhau (ví dụ như hai LAN khác
nhau).
 hub → F. An electronic device at the centre of a star network topology
→ Bộ chia (hub): Thiết bị điện tử trung tâm trong mô hình mạng hình sao.
 router → D. An electronic device that links different networks or parts of a network. It determines the
path that a signal should take to reach its destination.
→ Bộ định tuyến: Thiết bị giúp kết nối và định hướng đường đi cho tín hiệu giữa các mạng khác nhau.
 traffic → I. The volume of signals or data that passes through a network system
→ Lưu lượng: Khối lượng tín hiệu hoặc dữ liệu đi qua hệ thống mạng.
 half-duplex → E. Able to transfer data in both directions but only in one direction at a time
→ Bán song công: Truyền dữ liệu hai chiều nhưng chỉ một chiều tại một thời điểm.
 full-duplex → J. Able to transfer data in both directions simultaneously
→ Toàn song công: Có thể truyền và nhận dữ liệu đồng thời.
 node → A. A network terminal or point where a computer is connected to a network
→ Nút mạng: Điểm kết nối máy tính vào mạng.
 packet → C. A fixed size unit of data prepared for transmission across a network
→ Gói dữ liệu: Đơn vị dữ liệu cố định được chia để truyền trong mạng.
44
Firms in the past used two __FUNDAMENTALLY_ (1) ___ different types of networks: telephone
networks and computer networks. Telephone networks historically handled voice communication, and
computer networks handled __DATA TRAFFIC_ (2) ___. Telephone companies built telephone networks
throughout the twentieth century by using voice transmission ___ (3) TECHNOLOGIES___ (hardware and
software), and these companies almost always operated as regulated monopolies throughout the world.
Computer companies originally built computer networks to _TRANSMIT__ (4) ___ data between
computers in different locations.
Thanks to continuing telecommunications deregulation and information technology innovation,
telephone and computer networks are __CONVERGING_ (5) ___ into a single digital network using
shared Internet-based standards and technology. Telecommunications providers today, such as AT&T
and Verizon, offer data transmission, Internet ___ACCESS (6) ___, mobile phone service, and television
programming as well as voice service. Cable companies, such as Cablevision and Comcast, offer voice
service and Internet access. Computer networks have _EXPANDED__ (7) ___ to include Internet
telephone and video services. Both voice and data communication networks have also become more
powerful (faster), more ___ (8) _PORTABLE__ (smaller and mobile), and less expensive.

Passage 1

1. fundamentally
2. data traffic

3. technologies

4. transmit

5. converging

6. access

7. expanded

8. portable
Packet switching is a method of slicing digital messages into parcels called packets, sending the packets
along different communication paths as they become available, and then ___ (1) ___ the packets once
they arrive at their destinations. Prior to the development of packet switching, computer networks used
leased, dedicated telephone ___ (2) ___ to communicate with other computers in remote locations. In
circuit-switched networks, such as the telephone system, a complete ___ (3) ___ circuit is assembled,
and then communication can proceed. These dedicated circuit-switching techniques were expensive and
wasted available communications ___ (4) ___ - the circuit was maintained regardless of whether any
data were being sent.
Packet switching is more efficient. Messages are first broken down into small fixed ___ (5) ___ of data
called packets. The packets include information for directing the packet to the right address and for
checking transmission ___ (6) ___ along with the data. The packets are transmitted over various
communications channels by using ___ (7) ___, each packet traveling independently. Packets of data
originating at one source will be routed through many paths and networks before being reassembled
into the original ___ (8) ___ when they reach their destinations.
Passage 2

1. reassembling
2. circuits

3. point-to-point

4. capacity

5. bundles

6. errors

7. routers

8. message

III. READING COMPREHENSION


Passage 1. Read the passage then answer the questions below.
1. What are two kinds of networks that are in common use?
2. What are the four types of wired networks mentioned in paragraph 2?
3. What is a big advantage for some large networks using a mesh?
4. What are the functions of special computers?
5. What will the browser do when you type a web address into it?

WHAT IS A NETWORK?
A network is a group of linked computers or other devices. There are two kinds of networks that are in
common use. In Local Area Networks (LANs) computers are close together – perhaps in the same
building. They might be connected directly to each other by cable or through a wireless network such as
wi-fi. In contrast, wide area networks (WANs) cover a larger area and usually use telephone lines or a
mobile phone system to connect. A LAN can be a part of WAN.
There are different types of wired networks. One is a star system. In this, each computer (or other
device) is connected to a central server. Another type is a ring system. This is a network that has each
computer linked to two others. In a bus system, there is a central cable which is called a bus, and each
computer is linked to it. Some large networks use a mesh. In this, each computer is linked to several
others. This has one big advantage: if one connection breaks, the data can use other connections.
Therefore, it is difficult to break a mesh network.
Many networks work on a client-server system. In this, servers are special computers that store data,
serve websites and have other similar functions. Generally, a client program will ask the server for data
and the server will then send the data back to the client. For example, when you type a web address
into a browser, the browser (the client) will ask the server for a web page, which then sends the web
page back.
Passage 1
1. LANs, and WANs
2. Star system, ring system, bus system and mesh
3. If one connection breaks, the data can use other connections. Therefore, it is difficult to break a
mesh network.
4. Store data, server websites
5. The browser (the client) will ask the server for a web page, which then sends the web page back.

Passage 2. Read the passage then answer the questions below.


1. Does the company have locations in one country or more than one? THE COMPANY HAS MORE
THAN ONE LOCATION
2. What problem do they have with communication?
3. Why are internet sales going down?
4. What kind of system do they need?
5. What two steps does the company want to take next?

CURRENT ISSUES FOR BDL LIMITED AND POSSIBLE IT SOLUTION


Introduction
Our last year has been good. The new overseas office is doing well and our B2B and B2C sales are
increasing quickly. Our sales team is working hard and our four bricks-and-mortar shops are also doing
well. However, there are some issues that we need to deal with so that we can continue to do well in
the future. Some new technology might help with these.
Problems: communication and internet sales
We have found two problems that the IT Department could help use with. These are:
 Communication between our different country offices and departments in different locations
isn’t very efficient, especially for our international locations. We are collaborating more and
more between different locations, so it’s important to make this easy for people.
 Internet sales are going down. There are several reasons for this. The main one is that
customers don’t like using the current online shopping systems. We need a system that’s easier
to use so that customers don’t give up before they finish their transactions.
Recommendations for IT solutions
The first step should be to find out whether technology can help with these problems and, if so, how it
can help. If this is successful, next we should find out about prices and features of appropriate systems.

Passage 2
1. The company has more than one location.
2. Communication isn’t very efficient, especially for international locations.
3. Customers don’t like using the current online shopping systems.
4. A system that’s easier to use so that customers don’t give up before they finish their
transactions.
5. Find technology to help with the problems and find out the prices and features of appropriate
systems.

Passage 3. Read the passage then answer the questions below.


1. What is Andrea Pinheiro da Silva’s job?
2. Why was it important that a new site looked exciting and dynamic?
3. What are the two areas that the customer wanted their new site to have?
4. What sources did they decide to use?
5. Were their customers happy with the website?

A WEB DEVELOPER’S WORK


Andrea Pinheiro da Silva is a web developer who is well known for the websites she has developed. Her
websites have won several awards. Here, she describes a recent project.
‘Recently, I worked on a project for SLFan, a fan club for the Space Liberator game. There were a few
other sites for fans of the same game, so it was important that it looked exciting and dynamic, to get
more site visits. The customer also wanted their new site to have two different areas: a public one for
general content and a private one with premium content for paying fans.
We decided to use a combination of PHP, HTML5, and MySQL. PHP was chosen to keep costs down (it’s
open source) and for its flexibility. It’s also very versatile: it integrates easily with many other website
tools. We mainly used HTML5 for multimedia content but also used other systems so that the site can
be viewed on many types of devices, including mobile devices. And MySQL was just right for the private
area: forum posts and other private data can be stored in the MySQL database.
Speaking of mobile devices, one of the challenges was to make the site viewable on mobile phones and
smaller tablets. We had to make sure that every page can be seen in mobile format. We also had to
work on SEO because high search rankings were required. That involved working closely with SLFan.
The end result was a website that the customers were very pleased with. They were great people and
real fun to work with!”

Passage 3
1. A web developer
2. To get more site visits
3. A public one for general content and a private one with premium content for paying fans
4. A combination of PHP, HTML5 and MySQL
5. Yes

Complete the summary, using ONE word from the above reading passage.
Andrea Pinheiro da Silva, a well-known web ______ (1), shares insights into her recent project for SLFan,
a fan club dedicated to the Space Liberator game. The goal was to create an exciting and______ (2)
website to attract more visitors, considering the presence of other fan sites. The client sought a design
with two distinct______ (3): a public section for general content and a private area with premium
content for paying fans.
To achieve this, a______ (4) of PHP, HTML5, and MySQL was employed. PHP was chosen for its cost-
effectiveness and flexibility, being open source and easily integrable with various website tools. ______
(5) was mainly used for multimedia content, ensuring compatibility with different devices, including
mobile ones. MySQL proved suitable for the ______ (6) section, efficiently storing forum posts and
private data.
Adapting the ______ (7) for mobile devices presented a challenge, requiring every page to be optimized
for mobile viewing. Additionally, a focus on SEO was crucial for achieving high search rankings, requiring
close collaboration with SLFan. The outcome was a website that delighted the ______ (8), emphasizing
the enjoyable collaboration with the SLFan team throughout the project.

Summary
1. developer
2. dynamic
3. areas
4. combination
5. HTML5
6. private
7. site
8. customers
1. Various electronic devices are also used to I. English-Vietnamese Translation
amplify, filter and determine the best path 1. Các thiết bị điện tử khác nhau cũng được
for the signals. sử dụng để khuếch đại, điều chỉnh và xác
2. The electronics in the hub are used to định đường dẫn tốt nhất cho tín hiệu.
amplify the signals to prevent them from 2. Các thiết bị điện tử trong trung tâm được
becoming too weak before they reach the sử dụng để khuếch đại tín hiệu nhằm ngăn
desired computer. chúng trở nên quá yếu trước khi đến được
3. In future, wireless networks will use a máy tính mong muốn.
radio transmitter and receiver tuned to 3. Trong tương lai, mạng không dây sẽ sử
use the same radio frequency, instead of dụng bộ phát và bộ thu vô tuyến được
cabling. điều chỉnh để sử dụng cùng tần số vô
4. Extra bytes of data called synch bytes are tuyến, thay vì đi cáp.
added at the beginning and end of each 4. Các byte dữ liệu bổ sung được gọi là byte
block. đồng bộ được thêm vào đầu và cuối mỗi
5. When a message is transmitted through a khối.
network, it is processed in various ways by 5. Khi một tin nhắn được truyền qua mạng,
the software and the hardware. nó sẽ được phần mềm và phần cứng xử lý
6. The presentation layer ensures that the theo nhiều cách khác nhau.
message is transmitted in a language that 6. Lớp trình bày đảm bảo rằng thông báo
the receiving computer can interpret. được truyền bằng ngôn ngữ mà máy tính
7. High-speed routers can serve as part of the nhận có thể hiểu được.
Internet backbone. 7. Bộ định tuyến tốc độ cao có thể đóng vai
8. With Wi-Fi, one access point can cover an trò là một phần của đường trục Internet.
entire floor or even a building. 8. Với Wi-Fi, một điểm truy cập có thể bao
9. There are now Wi-Fi hotspots in hotels, phủ toàn bộ tầng hoặc thậm chí là một tòa
libraries and airports so you can link to a nhà.
network away from home or your office. 9. Hiện nay đã có các điểm truy cập Wi-Fi ở
10. Wireless networks are much slower and khách sạn, thư viện và sân bay để bạn có
the further you are from an access point, thể liên kết với mạng ở xa nhà hoặc văn
the slower the rate. phòng của mình.
11. The application layer is the only part of a 10. Mạng không dây chậm hơn nhiều và bạn
communications process that a user sees, càng ở xa điểm truy cập thì tốc độ càng
and even then, the user doesn't see most chậm.
of the work that the application does to 11. Lớp ứng dụng là phần duy nhất của quy
prepare a message for sending over a trình liên lạc mà người dùng nhìn thấy và
network. thậm chí sau đó, người dùng không thấy
12. The transport layer subdivides the data hầu hết công việc mà ứng dụng thực hiện
into segments, creates checksum tests để chuẩn bị tin nhắn gửi qua mạng.
that can be used later to determine if the 12. Lớp vận chuyển chia nhỏ dữ liệu thành các
data was scrambled. phân đoạn, tạo các kiểm tra giá trị tổng
13. The data-link layer keeps a copy of each kiểm mà có thể được sử dụng sau này để
packet until it receives confirmation from xác định xem dữ liệu có bị xáo trộn hay
the next point along the route that the không.
packet has arrived undamaged. 13. Lớp liên kết dữ liệu giữ một bản sao của
14. An intermediate node calculates and mỗi gói cho đến khi nhận được xác nhận
verifies the checksum for each packet. từ điểm tiếp theo dọc tuyến rằng gói đã
15. The application layer converts the bits into đến mà không bị hư hại.
readable characters, and directs the data 14. Nút trung gian tính toán và xác minh giá trị
to the correct application. tổng kiểm cho mỗi gói.
15. Lớp ứng dụng chuyển đổi các bit thành các
ký tự có thể đọc được và chuyển dữ liệu
đến đúng ứng dụng.

II. WRITING
Make meaningful sentences by adding between 8 and 15 words to the given phrases.
1. A bridge is a hardware and software combination which is ........................................................
2. A router directs ..............................................................................................................................
3. A gateway enables ..........................................................................................................................
4. A backbone is the main transmission path which ...................................................................
5. A LAN connects .............................................................................................................................
6. A modem converts ........................................................................................................................
7. A server stores ................................................................................................................................
8. A hub is an electronic device which .........................................................................................

9. The application layer converts ...................................................................................................


10. The presentation layer ensures that ........................................................................................
11. The session layer opens communications and keeps straight .........................................
12. The three functions of the transport layer are .................................................................
13. The network layer adds ..............................................................................................................
14. The physical layer encodes .......................................................................................................
15. Networking allows two or more computer systems to ....................................................
1. A bridge is a hardware and software combination 1. Là sự kết hợp giữa phần cứng và
which is phần mềm dùng để kết nối các
used to connect the same type of networks. loại mạng giống nhau.
2. A router directs 2. Chuyển tiếp các thông điệp liên
communicating messages when several networks are lạc khi nhiều mạng được kết nối
connected together. với nhau.
3. A gateway enables 3. Cho phép các mạng khác loại
dissimilar networks to communicate, such as two giao tiếp với nhau, chẳng hạn
LANs based on different topologies systems. như hai mạng LAN có kiến trúc
4. A backbone is the main transmission path which khác nhau.
handles the major data traffic and connects different 4. Xử lý lưu lượng dữ liệu chính và
LANs together. kết nối các mạng LAN khác nhau
5. A LAN connects lại với nhau.
computers over a small distance such as within a 5. Kết nối các máy tính trong phạm
company. vi gần như trong một công ty.
6. A modem converts 6. Chuyển đổi tín hiệu số thành tín
digital signals to analogue signals and vice versa. hiệu tương tự và ngược lại.
7. A server stores 7. Lưu trữ nhiều chương trình
many programs shared by all the clients in the được chia sẻ bởi tất cả các máy
network. khách trong mạng.
8. A hub is an electronic device which 8. Kết nối tất cả dây cáp dữ liệu
connects all the data cabling in a network. trong một mạng.
9. The application layer converts 9. Chuyển đổi dữ liệu thông điệp
a message's data from human-readable form into từ dạng con người có thể đọc
bits. sang dạng bit.
10. The presentation layer ensures that 10. Đảm bảo thông điệp được
the message is transmitted in a language that the truyền đi bằng ngôn ngữ mà
receiving computer can interpret. máy tính nhận có thể hiểu được.
11. The session layer opens communications and keeps 11. Mở kết nối và giữ cho việc liên
straight lạc giữa các nút trong mạng
the communications among all nodes on the được ổn định.
network. 12. Bảo vệ dữ liệu được gửi đi, chia
12. The three functions of the transport layer are nhỏ dữ liệu thành các đoạn, và
to protect the data being sent, subdivide the data tạo các kiểm tra tổng
into segments, and create checksum tests. (checksum).
13. The network layer adds 13. Thêm phần đầu chứa thứ tự của
a header containing the sequence of packets and the các gói tin và địa chỉ của máy
address of the receiving computer. tính nhận.
14. The physical layer encodes 14. Mã hóa các gói tin vào môi
the packets into the medium that will carry them – trường truyền dẫn – chẳng hạn
such as an analogue signal. như tín hiệu tương tự.
15. Networking allows two or more computer systems 15. Cho phép hai hoặc nhiều hệ
to thống máy tính trao đổi thông
exchange information and share resources and tin và chia sẻ tài nguyên, thiết bị
peripherals. ngoại vi.

You might also like