Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Unit 5 Computer Viruses

Download as pdf or txt
Download as pdf or txt
You are on page 1of 23

UNIT 5

COMPUTER VIRUSES

Task 1 Study this diagram which explains how one type of virus operates.
Try to answer these questions.

1. What is the function of the jump instruction?


2. What are the main parts of the virus code?
3. What is the last act of the virus?

Uninfected Infected
program program

ORIGINAL
Starting instruction

JUMP
Instruction

MISDIRECTION routine VIRUS


REPRODUCTION routine CODE
TRIGGER routine
PAYLOAD routine

Task 2 Scan this text to check your answers. Ignore any parts which do
not help you with this task.

THE ANATOMY OF A VIRUS

A biological virus is a very small, simple organism that infects living cells, known
as the host, by attaching itself to them and using them to reproduce itself. This often
causes harm to the host cells.
Similarly, a computer virus is a very small program routine that infects a computer
system and uses its resources to reproduce itself. It often does this by patching the
operating system to enable it to detect program files, such as COM or EXE files. It then
copies itself into those files. This sometimes causes harm to the host computer system.
When the user runs an infected program, it is loaded into memory carrying the
virus. The virus uses a common programming technique to stay resident in memory. It
can then use a reproduction routine to infect other programs. This process continues
until the computer is switched off.
The virus may also contain a payload that remains dormant until a trigger event
activates it, such as the user pressing a particular key. The payload can have a variety
of forms. It might do something relatively harmless such as displaying a message on
the monitor screen or it might do something more destructive such as deleting files on
the hard disk.
When it infects a file, the virus replaces the first instruction in the host program with
a command that changes the normal execution sequence. This type of command is
known as a JUMP command and causes the virus instructions to be executed before
the host program. The virus then returns control to the host program which then
continues with its normal sequence of instructions and is executed in the normal way.
To be a virus, a program only needs to have a reproduction routine that enables it
to infect other programs. Viruses can, however, have four main parts. A misdirection
routine that enables it to hide itself; a reproduction routine that allows it to copy itself to
other programs; a trigger that causes the payload to be activated at a particular time or
when a particular event takes place; and a payload that may be a fairly harmless joke
or may be very destructive. A program that has a payload but does not have a
reproduction routine is known as a Trojan.
·
Task 3 Now read the whole text to find the answers to these questions.

1. How are computer viruses like biological viruses?


2. What is the effect of a virus patching the operating system?
3. Why are some viruses designed to be loaded into memory?
4. What examples of payload does the writer provide?
5. What kind of programs do viruses often attach to?
6. Match each virus routine to its function?

Routine Function
1. misdirection a. does the damage
2. reproduction b. attaches a copy of itself to another program
3. trigger c. hides the presence of the code
4. payload d. decides when and how to activate the payload

7. How does a Trojan differ from a virus?


Task 4 Describe the effects of these viruses and other destructive
programs.

1. logic bomb - example


a. A dismissed employee's name is deleted from the company's payroll.
b. A logic bomb is activated.
c. All payroll records are destroyed.
2. Form (Boot sector virus)
a. A certain date occurs.
b. A trigger routine is activated.
c. Keys beep when pressed and floppies are corrupted.
3. Beijing (Boot sector virus)
a. The operator starts up the computer for the one hundred and twenty-ninth
time.
b. A trigger routine is activated.
c. The screen displays, 'Bloody! June 4, 1989'.
4. AntiEXE
a. The infected program is run.
b. The boot sector is corrupted.
c. The disk content is overwritten.
d. Data is lost.
5. Cascade (File virus - COM files only)
a. A particular date occurs.
b. The payload is triggered.
c. Characters on a text mode screen slide down to the bottom.
6. macro virus - example
a. An infected document is opened in the word processor.
b. The virus macro is executed.
c. The virus code is attached to the default template.
d. The user saves another document.
e. The virus code attaches to the saved document.
f. The saved document is opened in the word processor.
g. The virus destroys data, displays a message or plays music.

Task 5 Some verbs beginning or ending with en have a causative


meaning. Replace the words in italics in these sentences with the
appropriate form of en verb from this list.

enable encrypt ensure


encode enhance brighten
encourage enlarge widen

1. MIDI message makes sound into code as 8-bit bytes of digital information.
2. The teacher is using a new program to give courage to children to write
stories.
3. The new version of Sim City has been made better in many ways.
4. A gateway makes it possible for dissimilar networks to communicate.
5. You can convert data to secret code to make it secure.
6. Make sure the machine is disconnected before you remove the case.
7. Designers can offer good ideas for making your website brighter.
8. Electronic readers allow you to make the print size larger.
9. Programmers write software which makes the computer able to carry out
particular tasks.
10. You can make the picture on your monitor wider.

Task 6 Decide in your group what these kinds of computer crime are. Then
match the crimes to the short descriptions which follow.

1. Logic bomb
2. Denial of Service attack
3. Trojan Horse
4. Trapdoors
5. Mail bombing
6. Software Piracy
7. Piggybacking
8. Spoofing
9. Defacing
10. Hijacking

a. Leaving, within a completed program, an illicit program that allows


unauthorised - and unknown - entry.
b. Destructive code introduced into a program that is triggered by some event
taking place on the computer system at later time.
c. Adding concealed instructions to a computer program so that it will still work
but will also perform prohibited duties. In other words, it appears to do
something useful but actually does something destructive in the background.
d. Tricking a user into revealing confidential information such as an access code
or a credit-card number.
e. Inundating an email address with thousands of messages, thereby slowing or
even crashing the server.
f. Manipulating programs or data so that small amounts of money are deducted
from a large number of transactions or accounts and accumulated elsewhere.
The victims are often unaware of the crime because the amount taken from
any individual is so small.
g. Unauthorised copying of a program for sale or distributing to other users.
h. Swamping a server with large numbers of requests.
i. Redirecting anyone trying to visit a certain site elsewhere.
j. Changing the information shown on another person's website.
Task 7 Consider these examples of computer disasters. How could you
prevent them or limit their effects?

1. You open an email attachment which contains a very destructive virus.


2. Someone guesses your password (the type of car you drive plus the day and
month of your birth) and copies sensitive data.
3. Your hard disk crashes and much of your data is lost permanently.
4. Someone walks into your computer lab and steals the memory chips from all
the PCs.
5. Your backup tapes fail to restore properly.

Task 8 Study these security measures to protect hardware and software.


Which measures would prevent or limit the effects of the
disasters in Task 7?

Control Access to Hardware Separate and Rotate Functions:


and Software  If functions are separate, then two or
 Lock physical locations and more employees would need to
equipment. conspire to commit a crime.
 Install a physical security system.  If functions are rotated, employees
 Monitor access 24 hours a day. would have less time to develop
methods to compromise a program
Backup Data and Programs
or system.
 Make incremental backups, which  Perform periodic audits.
are copies of just changes to files,
at frequent intervals.
Implement Network Controls
 Make full backup, which copy all files,
periodically.  Install firewalls to protect networks
 To protect files from natural disasters from external and internal attacks.
such as fire and flood, as well as from  Password-protect programs and data
crimes and errors, keep backups in with passwords which cannot easily
separate locations, in fireproof be cracked.
containers, under lock and key.  Monitor username and password use
– require changes to passwords
Protect against Natural Disasters regularly.
 Install uninterruptible power  Encrypt data.
supplies and surge protectors.  Install a callback system.
 Use signature verification or
Protect against Viruses biometric security devices to ensure
 Use virus protection program. user authorization.
 Use only vendor-supplied software or
public domain or shareware products
that are supplied by services that
guarantee they are virus free.
Task 9 Find words or phrases in these security measures which mean:

1. copies of changes to files made to reduce the risk of loss of data


2. software available for a short time on a free trial basis; if adopted a fee is
payable to the author
3. cannot be disrupted or cut
4. put at risk
5. deciphered, worked out
6. protect data by putting it in a form only authorized users can understand
7. a combination of hardware and software to protect networks from unauthorized
users
8. observe and record systematically
9. measuring physical characteristics such as distance between the eyes
10. at regular intervals

Task 10 Decide on the relationship between these events. Then link them
using structures from this and earlier units.

1. Anti-virus program
a. A user runs anti-virus software.
b. The software checks files for virus coding.
c. Coding is matched to a known virus in a virus database.
d. A message is displayed to the user that a virus has been found.
e. The user removes the virus or deletes the infected file.
f. The virus cannot spread or cause further damage.

2. Face recognition
a. You approach a high-security network.
b. Key features of your face are scanned.
c. The system matches your features to a database record of authorised
staff.
d. Your identity is verified.
e. You can log on.
f. Your identity is not verified.
g. You cannot use the system.

3. Voice recognition
a. Computers without keyboards will become more common.
b. These computers are voice-activated.
c. The user wants to log on.
d. She speaks to the computer.
e. It matches her voice to a database of voice patterns.
f. The user has a cold or sore throat.
g. She can use the system.
h. Stress and intonation patterns remain the same.
Task 11 Match the words and definitions listed below.

1. a detonator a. a protective device


2. an infector b. to remove all traces of something
3. a shield c. a device used to set off an explosion or other destructive
4. to detect process
5. to boot d. to discover or recognize that something id present
6. to trigger e. to set a process in motion
7. to erase f. something which transmits a disease or virus
g. stolen, obtained without the owner’s consent
8. pirated
h. to load the operating system into memory

Task 12 Read this news report and discuss the questions that follow.

NSA consultant’s son is computer saboteur


“Worm” came from graduate student
A court heard today how a Cornell University graduate student, Robert T. Morris Jr.
(25), infected a host of government and educational computer centres with a computer
virus, known as ‘worm’, which literally brought all computational activity to a halt in over
6,000 installations. Morris, the son of a prominent National Security Agency computer
consultant, was sentenced for his offences yesterday. As punishment, he was required
to spend no time in prison but, instead, serve three years' probation, contribute 400
hours of community service, and to pay a $10,000 fine along with associated court and
probation costs.

1. How serious do you think Robert Morris's crime-was?


2. Do you think the punishment was
a too severe?
b about right?
c not severe enough?
3. Do you know of any similar incidents of computer hacking?
UNIT 6
CHAT & CONFERENCING
Task 1 Discuss these questions.

1. What is your favourite way to chat on the Internet?


2. How much time do you spent chatting?
3. Do you give out personal details in chat rooms? Why should you be careful
about this?

Task 2 Read the text and match the headings (or subtitles) with each
paragraph.

1. Cheap calls over the Internet


2. Virtual words and online communities
3. Chat rooms on the Web: join the crowd!
4. Real-time video conferencing
5. Private chats with IM services

VIRTUAL MEETINGS

………………………………………
Imagine,~ you want to assemble
·.
a group of people from around the world for a
brainstorming session. Conferencing programs such as NetMeeting or CUSeeMe allow
virtual workgroups to communicate via the Internet. To videoconference, you'll need a
webcam. Participants sentence each other's faces in small windows on their monitors
and hear each other's voices on the computer speaker. You can use just audio, video
and audio simultaneously, or the screen-sharing capability to collaborate on documents
without audio or video.
……………………………………..
Internet telephony, also known as VoIP (Voice over Internet Protocol), almost
eliminates long-distance phone charges, allowing you to call nearly anywhere in the
word for the price of a local call. If you have flat-rate internet access, you can’t beat the
price – it’s practically free.
With internet telephony, you can make a voice call from your computer to another
person's computer, landline, or mobile phone. You can download telephony software
such as Skype or Net2Phone from the Net, and it's even free!
……………………………………..
People also use more traditional chat conferencing or bulletin board systems
(BBSs) to communicate online. Note that during chat sessions, participants type
messages to each other rather than communicate by voice. Chat software can be
used on the Web with your browser to conduct online chat sessions with other
users and can accommodate between 50 and 1,000 users simultaneously. Some
companies even use chat conferencing on their websites to facilitate communication
with customers
…………………………………………..
Chat rooms can be good venues to meet people and discuss topics of mutual
interest. But what if you want to chat privately with a friend, family member or business
colleague? Then Instant Messaging, or IM, is the way to go. Many IM services now
offer audio and video capabilities, so if you have a microphone and a webcam, you can
chat and sentence who you're talking to. The four most popular IM services are ICQ
and AIM (from AOL), Windows Live Messenger, and Yahoo! Messenger. They all work
similarly. First, you enroll in the service by creating a username - which is also your
screen name - and a password. Next, you build what is known as a buddy list - a list of
people that you want to communicate with. When any of the contacts on your list is
online, you can start a private chat with that person.
How do you know who's online? When you launch your IM software, it connects
with the service's IM server and logs you on. The server checks your buddy list to
sentence if any of your contacts are also logged on. Your list updates to show who is
currently online. By clicking on a name you can send text-based messages to that
person. After you type your note and click on the Send button, the message travels to
the IM server, then immediately forwards to your buddy's computer. This all happens in
real time-instantly.
…………………………
You can also chat in incredible 3-D worlds that are built by other users, for
example Second Life. In these virtual reality environments you can play 3-D games
and interact with other users via avatar identities Avatars are 3-D graphical
representations of the participants.

Task 3 Read the text again and answer these questions.

1. Why is video conferencing so useful for virtual workgroups?


2. What special hardware and software do you need to video conferencing?
3. Which technology enables people to make phone calls over the Internet?
4. What is the difference between web chat rooms and Instant Messaging?
5. How do you log on to an IM server?

Task 4 Find terms in the text with the following meanings.

1. at a fixed price
2. a central system that provides information about whether, users are online
and passes instant messages between them
3. a friend list or contact list
4. happening immediately and without delay
5. artificial reality; a 3-D space generated by the computer
6. characters used when interacting with people on line
Task 5 Do this netiquette quiz.

1. Netiquette, or net etiquette, is a general code of behaviour for communicating


online.
O True
O False
2. TYPING IN CAPITAL LETTERS looks like:
O the message is very important.
O you’re shouting.
3. What should you avoid doing in chat rooms?
O Being respectful
O Giving out personal or financial information
4. Spamming means
O posting stupid comments in chat rooms.
O posting unsolicited advertising messages.
5. Before asking questions in a chat room or posting messages to forums, you
should always
O read the FAQs (Frequently Asked Questions).
O introduce yourself and post a test message.
6. Avoid flame wars. Flames are
O angry responses or offensive comments.
O people who break the rules of netiquette.
7. Keep messages short and to the point, and check spelling and grammar.
O True
O False

Task 6 Netiquette
1/ Rewrite this IM chat, using full forms instead of abbreviations.

Abby: BTW, where r u going for ur holiday?


By the way, where are you going for your holiday?
Sue: Girona. Have u been?
Abby: Yes. I went 2 Girona last summer.
Sue: Did u have a good time?
Abby: It's great, IMO. How r u going 2 travel?
Sue: We're flying.
Abby: Where r u staying?
Sue: In a youth hostel.
Abby: IC. IOW, the cheapest place possible!
Sue: LO! Yes. BTW, any recommendations?
Abby: Let me think. I'll send u a msg ASAP.
Sue: TIA!
Abby: Got 2 go. BFN!
2/ Rewrite this IM chat, using abbreviations.

Paulo: By the way, are you free on Saturday?


Emma: Sure - it would be good to meet face to face. Shall we go for a
coffee?
Paulo: Good plan. Cafe Moka makes the best coffee, in my opinion.
Emma: It's the closest to your house in other words!
Paulo: Laughing out loud! Yes, you’re right! But the coffee really is good.
Emma: See you at 4?
Paulo: Great. Bye for now.

Task 7 Discuss these questions. Give reasons for your answers.

1. Which program do you use to chat with friends?


2. Do you use abbreviations when you chat online or when you send text
messages?
3. Do you use voice or video while chatting? How?
4. Have you ever used the Internet to make cheap calls?
5. Does Instant Messaging distract you from your work?
6. Do you use your real name or a nickname in chat rooms?
7. Do you talk to strangers during web chats? Why shouldn’t you?
8. Would you ever go on a date with somebody you’d met on the Net?
9. Have you ever gone to cybercafé?
10. What services would you expect a cybercafé to offer?

Task 8 Analyze these sentences (Kinds of sentences & clauses & phrases).

1. Participants
,~ sentence each·.
other's faces in small windows on their monitors
and hear each other's voices on the computer speaker.
2. Internet telephony, also known as VoIP (Voice over Internet Protocol), almost
eliminates long-distance phone charges, allowing you to call nearly anywhere
in the word for the price of a local call.
3. You can download telephony software such as Skype or Net2Phone from the
Net, and it's even free!
4. Many IM services now offer audio and video capabilities, so if you have a
microphone and a webcam, you can chat and sentence who you're talking
to.
5. By clicking on a name you can send text-based messages to that person.
6. After you type your note and click on the Send button, the message travels to
the IM server, then immediately forwards to your buddy's computer.
7. You can use just audio, video and audio simultaneously, or the screen-sharing
capability to collaborate on documents without audio or video.
8. First, you enroll in the service by creating a username - which is also your
screen name - and a password.
9. When any of the contacts on your list is online, you can start a private chat
with that person.

Task 9 Think about the advantages of video conference then read the
brief text below to check your opinion.

Video conferencing is a simple and cost-effective way to keep in touch with your staff,
customers and partners. You can have meetings with people in two or more locations through
a video link while saving a considerable amount of money in travel and accommodation
expenses. In addition to traditional meetings, a high-quality video link can be used for
internal and external communications, consultation, remote training, help desking and other
support operations as well as sales meetings.

Task 10 Make a checklist to arrange an efficient and smooth video


conference from the start to the end. Listen to the recording of
how to have a successful video conference and confirm how
many points you have mentioned to get the result: happy
participants and time and money saved all round.
UNIT 7
GRAPHICS DESIGN

Task 1 Look at the computer graphics (a-d) and discuss these questions.

1. Which of these computer graphics are three-dimensional (3-D)?


2. What are the advantages of creating 3-D images?
3. Which types of professional might use thees computer graphics?
4. Who else use computer graphics in their job? How do they use them?

Task 2 Read the text below and check your answers.

COMPUTER GRAPHICS

Computer graphics are pictures and drawings produced by computer. There are
two main categories:
Raster graphics, or bitmaps, are stored as a collection of pixels. The sharpness of
an image depends on the density of pixels, or resolution. For example, text or pictures
that are scaled up - that is, made bigger - may show jagged edges. Paint and photo-
editing programs like Adobe Photoshop focus on the manipulation of bitmaps. Popular
raster formats are JPEG, GIF and TIFF.
Vector graphics represent images through the use of geometric objects, such as
lines, curves and polygon, based on mathematical equations. They can be changed or
scaled without losing quality. Vector data can be handled by drawing programs like
Adobe Illustrator, Corel Draw or Macromedia Freehand. EPS is the most popular file
format for exchanging vector drawings.
Almost all computer users use some form of graphics. Home users and
professional artists use image-editing programs to manipulate images. For example,
you can add filters (special effects) to your favourite photos, or you can composite
images. Compositing is combining parts of different images to create a single image.
Graphics artists and designers use drawing programs to create freehand drawing
and illustrations for books or for the Web. Business people use presentation graphics
to make information more interesting visually - graphs and diagrams can be more
effective ways of communicating with clients than lists of figures. Electrical engineers
use graphics to design circuits in order to present data in a more understandable
form. Mechanical engineers use CAD (Computer Aided Design) software to develop,
model and test car designs before the actual parts are made. This can save a lot of
time and money.
CAD is also used in the aerospace, architecture and industrial sectors to
design everything from aeroplanes and buildings to consumer products. Designers
start a project by making a wireframe, a representation showing the outlines of all
edges in a transparent drawing. They then specify and fill the surfaces to give the
appearance of a 3-D solid object with volume. This is known as solid modelling. Next,
they add paint, colour and filters to achieve the desired ‘look and feel’: this is called
texturing the object. Finally, they render the object to make it look real. Rendering
includes lighting and shading as well as effects that simulate shadows and reflections.
Computer art, or digital art, is used in adverts and TV programmes. Artists and
scientists use special graphic applets to create amazing fractals. Fractals are
geometrical patterns that are repeated at small scales to generate irregular shapes,
some of which describe objects from shapes. Government agencies use GIS
(Geographic Information Systems) to understand geographic data and then plan the
use of land or predict natural disasters. Cartographers use GIS to rnake detailed
maps. Animators use computer animation software to create animated cartoons or
add effects in movies and video games.

Task 3 Read the text again and answer these questions.

1. What are the differences between raster graphics and vector graphics?
2. Which graphics file formats are mentioned?
3. What is compositing? .
4. What does CAD stand for?
5. What are the benefits of using graphics in the car industry?
6. What type of graphics software is used to make maps or models of the Earth?
7. Who uses computer animation? How?
Task 4 Match the words (1-6) with the definitions (a-f).

1. resolution a. special effects that can be applied to pictures


2. jagged b. a technique that generates realistic reflections, shadows and
highlights
3. filters
c. geometrical figures with special properties
4. wireframe
d. irregular or uneven
5. rendering e. the number of pixels in an image
6. fractals f. the drawing of a model by using features like edges or contour
lines

Task 5 1/ Decide if the –ing forms in these sentences are gerunds,


present participles or adjectives.

1. PCs generate graphics by performing mathematical calculation on data.


2. Business people use graphics to make information more interesting visually.
3. Graphics and diagrams can be more effective ways of communicating with
clients
4. than lists of figures.
5. She is designing a logo for the company.
6. If you need to make a presentation, I suggest using PowerPoint.
7. The Internet is a network linking other network.

2/ Correct the mistakes in these sentences. There are seven


mistake in total.

1. Computer animation is the process of create objects which move across the
screen.
2. Texturing involves add print, colour and filters to drawings and designs.
3. You can open the colour palette by click on the corresponding icon.
4. CAD programs are very fast at to perform drawing functions.
5. A lot of time and money is saved by test a car design before to make the
product.
6. To render refers to the techniques used to make realistic images.

Task 6 Student A chooses task from the list (1-6) and describes it.
Student B chooses the most appropriate graphics software for
the task (a-t) and gives reasons for his or her choice.
1. to edit and retouch photos
2. to create illustrations and drawings for a magazine
3. to prepare slideshows for training sessions or conferences
4. to make mechanical designs and architectural plans
5. to create dynamic simulations and special effects for films, TV,
advertisements and games
6. to analyse geographic data and make maps

a. Computer animation software, for example 3-D Studio Max.


b. GIS software, for example ArcView
c. Presentation software, for example PowerPoint
d. A CAD package, for example AutoCAD
e. Vector graphics software, for example Freehand
f. A paint and image-editing program, for example Photoshop

Task 7 Before reading the text below, try to answer these questions.

1. How many distinct shades of colour can the human eye see?
2. What is:
a. a pixel?
b. a bit?
c. a byte?
d. a greyscale display?
3. Roughly how many different colour shades can be generated from 24-bit
colour?
4. If your machine has 24-bit colour and a one million-pixel display, how much
memory will you need to drive the screen?

24-BIT COLOUR
Short explanation:
If your computer has 24-bit colour, then it can display photographic images in colour
on its screen that have natural-looking tones.
Long, long explanation:
In principle, there is an infinite number of shades available between a solid colour
and pure white. In practice, the human eye can detect somewhere between 150-200
distinct shades, so as long as you've got more than this, you can produce an
undetectably smooth progression of shades (there are exceptions, but they’re not
worth going into here).
A computer builds up a picture from a series of building blocks called pixels. Each
pixel is a square (normally) of a single colour. The more pixels you can divide the
picture into, the higher the resolution of the complete image. The computer organizes
itself by describing each pixel that it wants to display as a code in the binary
mathematical set (numbers built up from a series of 0s or 1s). Each 0 or l is called a
bit.
Computers are generally structured to work in groups of eight bits (called a byte).
These eight numbers can be used to count up to 256, and so can describe 256
shades of grey from black to white, which is more than enough to satisfy the eye.
A computer which can assign eight bits to describe each pixel will produce perfect
black and white photographs on its monitor. A monitor that can show all these shades
is called a greyscale display.
Now your eye can detect those 150-200 shades in all three of the colours it can
see: red, green, and blue. If you use eight bits to describe colour, you only get 256
colours, which isn't enough.
To get the full colour photographic effect on a computer monitor, you need to be
able to generate 256 shades for each colour. This takes eight bits of information per
colour, giving a total of 24 bits. This is the 24-bit colour that you keep reading about in
computer magazines. If you take all the possible variations of 256 shades of three
colours, you end up with a possible 16. 7 million colour shades.
You only really need 24-bit colour if you are going to do colour photographic
retouching on-screen or similar 'painting' on-screen. For linework and picture placing,
an 8-bit colour monitor is perfectly adequate, as you can still define colours for print
even if you can't show them on the screen.
Naturally, there's a bottom line in all this, or everyone would be using 24-bit colour.
To start with, you need special circuit boards which plug into your computer and
drive the monitor.
A typical high resolution colour monitor can display about a million pixels. The 24
bits that your computer uses to describe each pixel can also be described as three
bytes. To describe a million pixels takes three million bytes. In other words, a hefty
three megabytes of your computer's memory is assigned to driving the screen. With 8-
bit colour, you only need one Mb.
Generally, 24-bit colour boards include extra memory and processors to speed up
the display performance.

Task 8 Decide whether the following statements true (T) or false (F) in
relation to the information in the text. If you think a statement
is false, change it to make it true.

1. If a computer can generate more than 200 distinct shades of colour, the human
eye will see a perfectly smooth progression of shades.
2. Everybody should have a computer that can show true shades on its screen.
3. A group of eight binary numbers is called a byte.
4. Under certain circumstances, 8-bit colour can provide more than 256 colours.
5. To run 24-bit colour, you need three times as much memory to drive the screen
as you do to run 8-bit-colour.
Task 9 Use the information in the text to complete the dialogue in your own
words.

A. -----------------------------------------------------------------------
B. Yes, I’d like to find out a little about 24-bit colour.
A. -----------------------------------------------------------------------
B. Well, first of all, I’d like to know what sort of quality it will give me on my
monitor.
A. ------------------------------------------------------------------------
B. As many as that? What add-ons do I need?
A. ------------------------------------------------------------------------
B. How much memory will I need to drive the screen?
A. ------------------------------------------------------------------------
B. It’s a high-resolution screen.
A. ------------------------------------------------------------------------
B. That’s a lot! I use colour mainly for linework and picture-placing. Do you think
it’s worth buying 24-bit colour?
A. ------------------------------------------------------------------------
UNIT 8
S
DESTOP PUBLISHING r

Task 1 Discuss these questions.

1. What kind of documents can be produced with a desktop publishing system?


2. Page layout software is the key component of a desktop publishing system.
Which file types can be imported into a page layout program?

Task 2 Read the text below and check your answers.

WHAT IS DESKTOP PUBLISHING?

Desktop publishing (DTP) refers to the use of computers to design and


publishing books, brochures, newsletters, magazines and other printed pieces. DTP
is really a combination of several different processes including word processing,
graphics design, information design, output and pre-press technologies, and
sometimes image manipulation.
DTP centres around a page layout program. Typically, a layout program is used
to import texts created in word processing programs; charts and graphs from
spreadsheet programs; drawings and illustrations created in CAD, drawing or paint
programs; and photographs.
The program is then used to combine and arrange them all on a page. It is this
ability to manipulate so many different items and control how they are used that
makes layout software so popular and useful. However, modern word processors
also have publishing capabilities, meaning the line separating such programs from
DTP software is becoming less clear. In general, though, powerful new publishing
systems use high-quality scalable fonts and give you control over typographic
features such as kerning, (adjusting the spaces between letters to achieve even,
consistent spacing). Another key feature of DTP software is text flow - the ability to
put text around graphic objects in a variety of ways.
Once composed, DTP documents are printed on a laser printer or on a high-
resolution imagesetter. For transfer to a commercial printer, the documents are
generally saved in their native page layout format (such as Adobe InDesign or
QuarkXPress) or as PDF files. PDF stands for Portable Document Format and allows
people to view, search and print documents exactly as the publisher intended – you
don’t need to have the software and fonts used to create it. PDF files can be
published and distributed anywhere; In print, attached to email posted on websites, or
on DVD. To open a PDF file, only the Adobe Acrobat Reader (a free download) is
required.
In modern commercial printing, DTP files are output directly to the printing plates
without using film as an intermediate step. This new technology is known as
Computer-To-Plate (CTP) or direct to plate, and the machine that generates plates
for a printing press is called a platesetter. CTP machines are expensive, so most
people take their files to a service bureau, a company that specializes in printing
other people’s files. Service bureaux offer a full range of scanning and printing
solutions.

Task 3 Read the text again and answer these questions.

1. What type of software is used for the creation of DTP documents?


2. What are three differences between DTP software and word processors?
3. What is a PDF and what can it do?
4. Which program do you need to view a PDF document?
5. Why do people send their DTP files to service bureaux?

Task 4 Find words in the text with the following meanings.

1. Shape, style and size of a typeface, for example Courier at 10pt.


2. The process of adjusting the space between characters
3. Feature that enables you to wrap text around images on the page.
4. Metal surfaces that carry the image to be printed.
5. A machine that creates the printing plates.

Task 5 Look at this extract from an online tutorial for DTP publishing.
Put the steps in the creation of a DTP document (a-f) into the
correct order.

a, First, the DTP designers decide the basic form of the document (the type of
document, general design, colour, fonts, images required, etc.).
b. The last step is to take the files to a service bureau, which will print the
publication.
c. To create the DTP document, the designer begins by selecting a template or
by specifying the settings of a new document (the page size, margins,
columns, paragraph styles, master pages, etc.).
d. When the text has been edited, the designer imports the pictures and uses
precise tools to position, scale, crop and rotate all the items.
e. The next step is to type the text directly or to import it from a word processing
program like Word or WordPerfect.
f. Once the file is composed and saved, the designer has to prepare it for printing,
which involves verifying the colour specification, creating a Postscript or PDF
file, exporting the file in HTML format for the Web, checking proofs, etc.
Task 6 Look at this web extract about e-publishing. What examples of e-
publishing can you find in the text?

Publishing has existed in its current form for centuries. Ever since paper was first
invented, human beings have found ways of using it to pass on messages to each other.
Books, magazines and newspapers are now part of our everyday lives, but with the
invention of the Internet and the speed of new technological advances, the world of
publishing is changing. Online newspapers and magazines, biogs, and even e-book readers
are changing the way we get information. But will we ever stop picking up a good old-
fashioned newspaper?
E-publishing versus paper publishing - who will win?

Task 7 Work in teams. Team A prepares a list of the advantages of


traditional publishing over e-publishing. Team B prepares a list
of the advantages of e-publishing over traditional publishlng. Use
your dictionary, the Internet and your teacher to help you.

Task 8 Which of these should be published in electronic form and


which in traditional paper versions? Compare answers with
others in your group. Give reasons for your decisions.

1. a national newspaper
2. a textbook on information technology
3. a laser printer manual
4. Shakespeare's plays
5. a detective story
6. a traveller's guide to India
7. schoolbooks
8. an encyclopedia

Task 9 Rewrite these sentences to emphasize the words in italics.

1. I like the fact that my books are available everywhere.


2. Bill Gates introduced the Windows NT operating system in 1993.
3. Bill Gates introduced the Windows NT operating system in 1993.
4. Bill Gates introduced the Windows NT operating system in 1993.
5. I need information quickly.
6. Ebooks will replace all the throwaway books we read.
7. Ebooks will replace all the throwaway books we read.
8. It’s not cheap.
9. I like the look and the feel of books.
10. I don't like reading off a computer screen.
Task 11 Find an IT term for each of these definitions. Each term includes
one of the commonly used prefixes.

1. working at a distance
2. a system of numbers with 2 as its base
3. a way of communicating between a user and a computer
4. 1048576 bytes of information
5. describes a program which allows two way communication between user and
computer
6. set of computer instructions operating as one unit
7. having many different modes of input
8. a computer higher in scale than any other
9. a machine which provides cash to bank customers without requiring a human
operator
10. a very small but powerful processor
11. a system used by many people
12. a word processing feature which corrects by itself

Task 12 Replace the words in italics in each sentence with the


appropriate form of an -ise (-ize) verb.

1. Players let you group songs into playlists and make the selection random.
2. lf you adopt differential backup, this reduces to a minimum the size of your
backup set.
3. Most hotels use systems which have been converted for computers.
4. Software developers can produce solutions which are tailored to the customer.
5. Some software houses produce specially written applications.
6. Utilities can be put into categories as editors, filters or communications
programs.
7. You can protect data by putting it in a form only users with authority can
understand.
8. It ls an offence to make copies of software which are done without authority.

You might also like