0% found this document useful (0 votes)
60 views80 pages

IT Industry Terms and Definitions

This document contains 29 terms related to information technology, along with their definitions, examples, and pronunciations. Some of the key terms defined include: - Database analyst - A person responsible for the design of databases. - Developer - A person that works on new ideas, products, etc. - Electronic data - Information in electronic form that can be stored and processed by a computer. - Firewall - A device or program that stops unauthorized access to a computer while it is connected to the internet. - Network - A way computers are connected to each other. - Password - A secret word that allows you to use a computer system.

Uploaded by

antonloaderov
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views80 pages

IT Industry Terms and Definitions

This document contains 29 terms related to information technology, along with their definitions, examples, and pronunciations. Some of the key terms defined include: - Database analyst - A person responsible for the design of databases. - Developer - A person that works on new ideas, products, etc. - Electronic data - Information in electronic form that can be stored and processed by a computer. - Firewall - A device or program that stops unauthorized access to a computer while it is connected to the internet. - Network - A way computers are connected to each other. - Password - A secret word that allows you to use a computer system.

Uploaded by

antonloaderov
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 80

1 2 Страница3 1 4 Unit 1


terms definitions examples pronunciation
Unit 1 Working in the IT
industry (44)

access (n) the ability to use a system such as the internet Do you have access to the internet? /ˈӕkses/
1

They also have business investments in


data processing (phr) the use of data processing, telecommunications, /ˈdeɪtə/ /ˈprəʊsɛsɪŋ/
a computer to perform calculations on data and real estate management.
2
Database analysts are responsible for
database analyst (phr) a person who is responsible for the design of looking at data requirements within an /ˈdeɪtəˌbeɪs/
databases organisation /ˈænəlɪst/
3

develop (v) to invent something or bring something such as The software was developed by a /dɪˈvɛləp/
a product or service into existence marine science consulting firm.
4
I'm a software developer. I design
developer (n) a person that works on a new idea, product, etc. and develop computer games. /dɪˈvɛləpə/
5
information in an electronic form that can He analyses and presents electronic /ˌel.ekˈtrɒn.ɪk/
electronic data (phr) be stored and processed by a computer data. /ˈdeɪ.tə/
6

a device or program that stops people from seei


firewall(n) ng or using information on a computer without I create usernames and passwords and I /ˈfaɪə.wɔːl/
permission while it is connected to the internet set firewalls.
7

WLAN(Wireless Local Area Network) A


high-frequency (phr) a frequency of 3–30 megahertz type of local-area network that uses /haɪ//ˈfriː.kwən.si/
high-frequency radio wires to
communicate between nodes.
8

host (n) a computer that is accessible over a network. FTP a standard network protocol used /həʊst/
to copy a file from one host to another.
9
Страница 2 /ˈhelpˌdesk/ /kəʊ Unit 1
the IT Help Desk Coordinator supports the IT ˈɔː.dɪ.neɪ.tər/
IT help desk department by providing technical support and IT Help Desk Coordinator receives an
coordinator(phr) mentoring to the IT Help Desk Specialist to e-mail from a new employee.
coordinate technical assistance.
10

IT support officer (phr) helps non-expert colleagues with their IT- An IT support officer is to make sure /səˈpɔːt//ˈɒfɪsər/
related problems all of the computers work properly.
11
I need help with access to the company
network (n) is a way computers are connected to each other. network. /ˈnet.wɜːk/
12
Your position is a network
manages the computer system( for example, administrator and you are responsible
network administrator setting passwords and creating firewlls which for setting up firewalls, security levels, /ˈnet.wɜːk/
(phr) protect the computer system from wireless connection, usernames and /əd'mɪnɪstreɪtə/
unauthorised access) passwords.
13
A network architect is to plan and /ˈnet.wɜːk/
network architect (phr) designs the networks. design the network. /ˈɑː.kɪ.tekt/
14
Network security is any activity designed to
network security (phr) protect the usability and integrity of your I want to go to the CISCO network /ˈnetwɜːk/ /sɪ
network and data. security workshop. ˈkjʊərəti/
15
A network is a series of points or
node (n) a place where things such as lines or systems nodes interconnected by /nəʊd/
join. communication paths
16
You can't gain access to
password (n) a secret word that allows you to use a computer the computer system without entering y /ˈpɑːs.wɜːd/
system or enter a place our password.
17

programmer (n) A programmer creates the code for software He used to work as a programmer for /ˈprəʊ.ɡræm.ər/
applications and operating systems. a software company.
18

protocol (n) a computer language allowing computers that A standard network protocol used to /ˈprəʊ.tə.kɒl/
are connected to each other to communicate. copy a fie from one host to another.
19
Страница 3 Unit 1
You are responsible for setting up
security level (phr) the architecture, policy and processes that firewalls, security levels, wireless /sɪˈkjʊə.rə.ti/ /ˈlev.əl/
ensure data and system security connection, usernames and passwords.
20
set up (phr v) to make a piece of equipment ready for use Will you be able to set up my PC? /ˈset.ʌp/
21
the programs that you put into a computer to
software (n) make it do particular jobs I am installing the software /ˈsɒft.weər/
22

someone whose job is to decide what computer The work of a systems analyst involves
systems analyst (phr) programs an organization needs in order to problem-solving and system /ˈsɪs.təmz ˌæn.ə.lɪst/
work effectively, and then design them development
23

system maintenance a person responsible for the maintenance of They are system maintenance /ˈsɪs.təm//
officer (phr) hardware and software on a computer network officers. ˈmeɪn.tən.əns/ /ˈɒf.ɪs/
24

Examples of system software include


system software (phr) software that controls computer hardware operating systems like macOS, Linux OS /ˈsɪs.təm ˌsɒft.weər/
( machines and equipment) and Microsoft Windows.
25

a name or other word that you sometimes need


username (n) to type in along with a password before you are He entered your username and /ˈjuː.zə.neɪm/
allowed to use a computer or a website password.
26

is to create procedures on data management The best Web Analysts use their genius
which involves data analysis, web projects, data understanding of data to transform
website analyst (phr) integrity and web server security. A web websites, helping them to become more /'websaɪt//ˈæn.ə.lɪst/
analyst should know the interaction of web useful, beautiful, and powerful.
structures on the internet with users.
27
She works as a website developer for a /'websaɪt/ /dɪ
website developer (phr) someone whose job is to create websites financial services company. ˈvel.ə.pər/
28
a piece of) thin metal thread with a layer of
wire (n) plastic around it, used for carrying electric Someone had cut the phone wires. /waɪər/
29 current
Страница 4 Unit 1
is the term used to describe any computer
wireless connection (phr) network where there is no physical wired Employees need a network connection /ˈwaɪə.ləs/ /kə
connection between sender and receiver (wired and wireless) ˈnek.ʃən/
30

* administrator (n) someone whose job is to control the operation We're engaging the services of a /ədˈmɪn.ɪ.streɪ.tər/
of a business, organization, or plan professional administrator
31
* employee (n) someone who is paid to work for someone else I am a new employee in Finance. /ɪmˈplɔɪ.iː/
32
Your responsibilities will be mainly
* responsibility (n) the things you are in charge of in your job administrative /rɪˌspɒn.sɪˈbɪl.ə.ti/
33
a plan that gives events or activities and the Will the work be completed on
* schedule (n) times that they will happen or be done schedule (at the expected time)? /ˈʃedjuːl/
34
someone who is learning how to do something, A trainee is a new employee in our
* trainee (n) especially a job company. /ˌtreɪˈniː/
35

* training (n) the process of learning the skills you need to do The project thus includes a training /ˈtreɪnɪŋ/
a particular job or activity component
36
an event at which a group of people meet to
* workshop (n) learn more about something by discussing it The workshop starts in five minutes. /ˈwɜːkʃɒp/
37 and doing practical exercises
a set of rules for sending files to and from
** FTP (File Transfer a server (central computer) to other I can download the files from our /faɪl//trænsˈfɜːr/
Protocol) computers, using the internet: FTP site /ˈprəʊ.tə.kɒl/
38

** HTML (Hyper Text is the language used to create webpages. What does HTML stand for/ mean? /ˌeɪtʃ.tiː.emˈel/
Markup Language)
39
the technical rules that control communication He works on data networks that /ˌaɪˈpiː//ˈɪn.tə.net/
** IP (Internet Protocol) on the internet: are based on IP standards. /ˈprəʊ.tə.kɒl/
40

the science and activity of using computers and


** IT (information other electronic equipment to store and He was considering a career in IT. /ɪn.fəˌmeɪ.ʃən tek
technology) send information ˈnɒl.ə.dʒi/
41
Страница 5 Unit 1
The base and the leading university in /steɪt//ˌjuː.nɪˈvɜː.sə.ti/
** The State University of is a multi – profile higher educational the preparation of such specialists is /əv/ /ˌtel.ɪ.kəˌmjuː.nɪ
Telecommunications institution the STATE UNIVERSITY of ˈkeɪ.ʃənz/
TELECOMMUNICATIONS!
42

WLAN(Wireless Local Area Network) A type of


** WLAN (Wireless Local local-area network that uses high-frequency What does WLAN stand for/ mean? /ˈwaɪə.ləs//ˈləʊ.kəl/
Area Network) radio wires to communicate between nodes. /ˈeə.ri.ə//ˈnet.wɜːk/
43

the system of connected documents on the By the 1980s, some people had personal
** WWW (World Wide internet, usually with pictures, video, and computers in their homes, and the /ˌwɜːld waɪd ˈweb/
Web) sound, that can be searched for information World Wide Web, the Internet as we
about a particular subject know it today, began in 1990.
44
5 Страница 6 Unit 1
translation

доступ

обробка даних

аналітик баз даних

розробляти
програмне
забезпечення

програміст

електронні дані

брандмауер
(міжмережевий
екран)

висока частота

хост, комп'ютер, що
має доступ до IP
мережі
координатор служби Страница 7 Unit 1
технічної підтримки

співробітник служби
підтримки
інформацій них
технологій
мережа

адміністратор
мережі

архітектор мережі

безпека мережі

вузлова точка

пароль

програміст

протокол
Страница 8 Unit 1

рівень безпеки

встановити
програмне
забезпечення

системний аналітик

працівник служби
технічного
обслуговування

системне програмне
забезпечення

ім'я користувача

веб аналітик

веб програміст

дріт
Страница 9 Unit 1
бездротове
з'єднання

адміністратор

співробітник

відповідальність
графік, розклад,
список
стажер

навчання,
підготовка,
тренування

семінар

протокол передачі
фай лів

стандартна мова
розмітки для
створення веб-
сторінок

інтернет протокол

інформацій ні
технології
Страница 10 Unit 1

Державний
Університет
Телекомунікацій

бездротова
локальна мережа

Всесвітня мережа
terms definitions examples pronunciation
Unit 2 Computer systems
№ (44)

anti-virus (phr) produced and used to protect the main memory You should update your anti- /ˌæn.tiˈvaɪə.rəs/
of a computer against infection by a virus: virus software regularly.
1

Common application software


includes Adobe
a computer program that is designed to help Acrobat,CAD,Word,Excel,
application software (n) the user carry out a specific task or tasks Encarta,Notepad, /ˌæp.lɪˈkeɪ.ʃən/
InternetExplorer, Firefox and
Safari.
2

backup (phr v) a copy of information held on a computer that is There are many companies that /ˈbæk.ʌp/
stored separately from the computer. provide a web-based backup.
3
a 32-bit computer ( a computer
bit (n) a unit of information in a computer that must that processes 32 bits of /bɪt/
be either 0 or 1 information at a time)
4
to copy information, recorded music, images,
burn (v) etc. onto a CD They are burning CDs. /bɜːn/
5

enclosure that contains most of the components


of a personal computer. It provides mechanical Most personal computers possess
case (n) support and protection for internal elements a monitor, a keyboard, a mouse, /keɪs/
such as the motherboard, disk drives, and and a computer case.
power supplies
6
Advances in compression
compression (n) the act of making a computer file use less space technology mean that you can now /kəmˈpreʃ.ən/
when it is stored, using special software: send even quite large files by
email.
7
the way in which something, such as a Automatic
configuration (n) computer system or software, is organized to configuration copies this file auto /kənˌfɪɡ.əˈreɪ.ʃən/
operate matically
8
Have you checked the cable
connection (n) a way of joining users to a system connections? /kəˈnek.ʃən/
9
data entry(phr) enter ing the data into a system You enter the data into the system /ˈdeɪ.tə//ˈen.tri/
10

the process of changing electronic information


encryption (n) or signals into a secret code ( system of letters, Use mail encryption to send /ɪnˈkrip.ʃən/
numbers, or symbols) that people cannot sensitive data.
understand or use without special equipment:
11
a board covered with small metal electrical
connections that create one or more circuits Installing a wireless (or any other)
expansion card (video, and that can be connected to the main circuit network usually means opening /ɪkˈspæn.ʃən/ /kɑːd/
graphic) board of a computer so that it can do more your desktop PC to plug in an
things. expansion card.
12
The hard disk drive reliability
hard disk drive (phr) a device that is fixed inside a computer and is depends mainly on external /ˈhɑːd ˈdɪsk ˌdraɪvˌ/
used to store programs and information environment.
13
the physical and electronic parts of
hardware (n) a computer, rather than Its primary product is networking /ˈhɑːd.weər/
the instructions it follows hardware.
14

install (v) to put a computer program onto a computer so Andrew, can you help me install /ɪnˈstɔːl/
that the computer can use it. this software?
15
the board with a set of keys on a computer, etc.
keyboard (n) to type information or that you use in order to This is a wireless keyboard with /ˈkiː.bɔːd/
make it work. all the latest features.
16

laptop (n) a computer that is small enough to be carried He bought a new laptop. /ˈlæp.tɒp/
around easily and is flat when closed
17

log in (v) to connect to a computer system by putting in a If you are already a registered /lɒɡ /
particular set of letters or numbers. user, please log in.
18
the largest, fastest, or Another technical feature of the
main memory(RAM) (phr) most important place where tablet PC is its 2 GB of main /meɪn/ /ˈmem.ər.i/
a computer temporarily stores information or p memory.
rograms
19
a unit used for measuring the amount of
megabyte (n) information that a computer disk can store, or The camera has eight megabytes /ˈmeɡ.ə.baɪt/
the size of a computer file of built-in memory.
20

monitor (n) a computer screen or a device with a screen on She was staring at her computer /ˈmɒn.ɪ.tər/
which words or pictures can be shown. monitor.
21
he main part of a computer, which contains the We can now check if
motherboard (n) CPU (the part of a computer that controls all the the motherboard supports fast /ˈmʌð.ə.bɔːd/
22 other parts). writes.
a small device that you move across a surface in
mouse (n) order to move a cursor on your computer Hold down the control key and /maʊs/
screen. click the mouse.
23

An optical drive is a type of computer disk drive


that reads and writes data from optical disks
through laser beaming technology. This type of The laptop costs expansive with an
optical disk drive (phr) drive allows a user to retrieve, edit and delete external optical disk drive. /ˈɒp.tɪ.kəlˈdɪsk ˌdraɪv/
the content from optical disks such as CDs,
DVDs and Blu-ray disks.
24

The power supply unit is the piece of hardware The power supply is a crucial
power supply unit (phr) that converts the power provided from the piece because, without it, the rest /paʊər/ /səˈplaɪ//ˈjuː.nɪt/
outlet into usable power for the many parts of the internal hardware can't
inside the computer case. function.
25
the act of performing a particular series of
processing (n) operations on information, such as a set of IT expert is describing the data /ˈprəʊ.ses.ɪŋ/
calculations. processing steps to a colleague.
26
The service will prompt you to
program (n) a series of instructions put into a computer so download the appropriate /ˈprəʊ.ɡræm/
that it does particular tasks. program.
27

Programming software is a program or set of Programming software is also


programming software programs which helps the software developers known as programming tool or /ˈprəʊ.ɡræm.ɪŋ/ /ˈsɒft.weər/
(phr) by assisting them in creating, debugging and software development tool.
maintaining other programs and applications.
28
29 run (v) to (cause something to) operate. we are running a check-up. /rʌn/
a flat surface in a cinema, on a television, or as Write the letter on the computer,
screen (n) part of a computer, on which pictures or words then you can make changes easily /skriːn/
30 are shown. on screen.

The number of horizontal and vertical pixels on


a display screen. The more pixels, the more Screen resolution is one of those
information is visible without scrolling. Screen IT terms that people use without
screen resolution (phr) resolutions have a pixel count such as necessarily knowing exactly what /skriːn//ˌrez.əˈluː.ʃən/
1600x1200, which means 1,600 horizontal it means.
pixels and 1,200 vertical pixels.

31
to make something more modern or suitable
update (v) for use now by adding new information or Their website is updated daily. /ʌpˈdeɪt/
32 changing its design

wired (adj) connected to a computer or other device by a Employees need a network /waɪəd/
wire connection (wired and wireless).
33

wireless (adj) broadcasting or computer communication that Employees need a network /ˈwaɪə.ləs/
does not use wires. connection (wired and wireless).
34

a keyboard and screen with which a person can A company asks you to
work station (phr) use a computer system, or an area in an office, recommend a computer and work /ˈwɜːkˌsteɪ.ʃən/
factory, etc. where a single person works station configuration for their
sales team.
35
Her work is highly esteemed by all
* colleague (n) one of a group of people who work together her colleagues. /ˈkɒl.iːɡ/
36
Can I connect
* connect (v) to join or be joined with something else my printer to your computer? /kəˈnekt/
37
the person who is responsible for managing an I would like to speak to the
* manager (n) organization manager. /ˈmæn.ɪ.dʒər/
38
The role of Team Admin Assistant involves
* team admin assistant assisting senior management, by making sure He is an admin assistant in the /tiːm//ˈædmɪn/ /əˈsɪs.tənt/
(phr) all administration tasks have been taken care of office.
with ease.
39
You can usually troubleshoot the
* troubleshoot (v) to discover why something does not work problem by looking for a few /ˈtrʌb.əl.ʃuːt/
effectively and help to improve it. commonly occurring causes
40

also known by its original name Rijndael :


** AES (Advanced [ˈrɛindaːl]), is a specification for the encryption AES was designed to be efficient in /ədˈvɑːnst/ /ɪnˈkrip.ʃən/
Encryption Standard) of electronic data established by the U.S. both hardware and software. /ˈstæn.dəd/
41

** CPU (Central Processing the part of a computer that controls all the The motherboard and CPU are the /ˌsiː.piːˈjuː//ˈsen.trəl/
Unit or Processor) other parts. brains of your PC. /ˈprəʊ.ses.ɪŋ/ /ˈjuː.nɪt/
42
A megabyte is 2 to the 20th
** MB/s (Megabytes per describes a unit of data transfer to and from a power bytes, or 1,048,576 bytes in /ˈmeɡ.ə.baɪt/ /pɜːr/ /ˈsek.ənd/
second) computer storage device. decimal notation.
43

a type of computer memory that stores data


** RAM (random access that can be searched by programs. The speed of At this price, the model includes
memory) searches, as well as the number of searches that 512MB of RAM. /ræm/
can be made at the same time, increases with
the size of the RAM
44
translation

антивірус

прикладне
програмне
забезпечення

резервне
копіювання

біт

копіювати

Системний блок —
корпус комп'ютера

компресія

налаштування

з'єднання
введення даних

шифрування

картка розширень

жорсткий диск

обладнання

встановити

клавіатура

ноутбук

вхід в систему

оперативна пам'ять
мегабай т

монітор

материнська плата

мишка

оптичний диск

блок живлення

обробка

програма

програмне
забезпечення

запускати
екран

розширення екрану

модернізувати

провідний

бездротовий

робоче місце

колега

підключити

менеджер

помічник
адміністратора
усунення
несправностей

симетричний
алгоритм блочного
шифрування

центральний
процесор

Мб / с (мегабай т в
секунду)

пам'ять з довільним
доступом
(операти́ вна
па́ м'ять)
terms definitions examples pronunciation
Unit 3 Websites (17)
Before we made a decision we
browse (v) to look at information on the internet spent hours browsing various /braʊz/
1 websites.

a web page's actual download time is the time it The website needs to have
download time (phr) takes for a full web page (including graphic these features: good /ˌdaʊnˈləʊd//taɪm/
images, style sheets, scripts, etc.) to be interactivity, audio and fast
delivered to users. download times.
2

the meta tag contains information about the


document. Google understands a standard set
of meta tags. You can use custom meta tags to Meta tag- invisible information
meta tag (phr) provide Google with additional information (e.g. a hidden keyword) on a /ˈmet.ə/ /tæɡ/
about your pages. Google can use this website c
information to create rich snippets or enable
sorting of search results.
3
to look for information on a computer, the I searched the internet for the
search (v) internet, etc. best deal. /sɜːtʃ/
4
Page optimisation is increasing
visitor (n) someone who goes to a website on the internet the number of visitors to your /ˈvɪz.ɪ.tər/
5 site
information about where the visitors to your
site are from Visitor Map shows number of
visitor map (phr) online users ˈ/vɪz.ɪ.tər//mæp/
6
Since the mid-1990s, web
website traffic (phr) the amount of data sent and received by traffic has been the largest /ˈweb.saɪt/ /ˈtræf.ɪk/
visitors to a website. portion of Internet traffic.
7
to put a value in a particular position in the IP addresses are virtual and are
* assign (v) memory of a computer. assigned via software. /əˈsaɪn/
8
A commercial product can be
* commercial (adj) related to buying and selling things. bought. /kəˈmɜː.ʃəl/
9
analyse the information from
* customer (n) a person who buys goods or a service. the customer. /ˈkʌs.tə.mər/
10
After you publish the website,
* maintain (v) to keep something in good condition. update and maintain it on an /meɪnˈteɪn/
ongoing basis.
11

* monitor (v) a computer screen or a device with a screen on She was staring at her computer /ˈmɒn.ɪ.tər/
which words or pictures can be shown. monitor.
12
a piece of planned work or activity that is
* project (n) completed over a period of time and intended The cost of the project has /ˈprɒdʒ.ekt/
to achieve a particular aim increased.
13

It needs a new website to


to encourage or support something, or to help promote its courses, materials
* promote (v) something become successful. and learning resources and /prəˈməʊt/
provide online language-
learning services.
14
a formal suggestion, plan, or idea, often a Investors approved the merger
* proposal (n) written one. proposal. /prəˈpəʊ.zəl/
15

to make available to the public, usually by After you publish the website,
* publish (v) printing, a book, magazine, newspaper, or other update and maintain it on an /ˈpʌb.lɪʃ/
document. ongoing basis.
16

First, discuss with the customer


* requirement (n) an official rule about something that it is their requirements and the /rɪˈkwaɪə.mənt/
necessary to have or to do. target audience.
17
translation

переглядати

час завантаження

метатег

шукати

відвідувач

карта відвідувачів

трафік веб-сай ту

установлювати, доручати

комерцій ний

покупець
підтримувати

монітор

проект

сприяти

пропозиція

публікувати

вимога
terms definitions examples pronunciation
Unit 4 Databases (41)

the use of services, computer programs, etc.


cloud computing (phr) that are on the internet rather than ones that One emerging technology in /ˌklaʊd kəmˈpjuː.tɪŋ/
you buy and put on your computer this area is cloud computing.
1
one of several vertical blocks of print into I didn't have time to read the
column (n) which a page of whole article - just the first /ˈkɒl.əm/
2 a newspaper or magazine is divided: column.
arrange and systemise the data Please can you explain what
data coding (phr) data cording is? /ˈdeɪ.tə ,kəʊdɪŋ/
3

data collection (phr) gather the raw data which you want to process The majority of data collection /ˈdeɪ.tə kəˈlek.ʃən/
will be undertaken by interview.
4

data entry (phr) the work or process of putting information into /ˈdeɪ.təˈen.tri/
a computer database.
5
Data sorting is to create
data sorting (phr) create categories to organise the data into categories to organise the data /ˈdeɪ.təˈsɔːtɪŋ/
relevant groups into relevant groups.
6

Computer data storage, often called storage, is a


technology consisting of computer components Online storage is an emerging
data storage (phr) and recording media that are used to retain method of data storage and /ˈdeɪ.təˈˈstɔː.rɪdʒ/
digital data. It is a core function and back-up.
fundamental component of computers.
7

To tabulate information is to organize it into a Data tabulation is to arrange


data tabulation (phr) table. Tabulating is a way of processing the data into table format so that /ˈdeɪ.təˈtæbjəˈleɪʃən/
information or data by putting it in a table. it can be analysed.
8

Data validation means checking the accuracy Data validation is to clean the
data validation (phr) and quality of source data before using, data and double-check for faults /ˈdeɪ.təˈvæl.ɪˈdeɪ.ʃən/
importing or otherwise processing data. and inconsistencies 11 Enter
9
a device driver is a computer program that
operates or controls a particular type of device
that is attached to a computer computer My friend told me to update my
driver (n) program that makes it possible for a computer audio driver. /ˈdraɪ.vər/
to use other pieces of equipment such as a
printer.
10

to change electronic information or signals into All data will have encrypted
a secret code (= system of letters, numbers, backup to protect sensitive
encrypt (v) or symbols) that people cannot understand or information. /ɪnˈkrɪpt/
use on normal equipment:
11

enter (v) to put information into a computer, book, You have to enter a /ˈen.tər/
or document. password to access the database
12

An external drive is just a hard drive (HDD) or


solid-state drive (SSD) that is connected to a
computer on the outside rather than on the What is the largest capacity
external hard drive (phr) inside. ... External hard drives come in varying portable external hard drive? /ɪkˈstɜː.nəl hɑːd ˌdraɪv/
storage capacities, but they all connect to a
computer either by USB, FireWire, eSATA, or
wirelessly.
13

a space in a database or file which can contain a Each entry in


field (n) particular type of information, for example, a database activity module can /fiːld/
names or numbers have multiple fields
of multiple types
14

a place on A folder is a storage space


folder (n) a computer where files or programs can where many files can be placed /ˈfəʊl.dər/
be stored into groups and organize the
computer.
15

hard disk (phr) a device that is fixed inside a computer and is Hard disk stores more memory /ˈhɑːd ˌdɪsk/
used to store programs and information. for a low cost.
16
a piece of information or a description of
record (n) an event that is written on paper or stored on Use this record on our /ˈrek.ɔːd/
a computer. spreadsheet.
17
I need a security softwate, so i
retrieve (v) to get stored information from a computer. should retrieve it on official /rɪˈtriːv/
18 website.

row (n) a line of things arranged next to each other. MS Excel is in tabular format /rəʊ/
consisting of rows and columns.
19
is the protection of information systems from
theft or damage to the hardware, the software,
security (n) and to the information on them, as well as from I'll do the security checks and /sɪˈkjʊə.rə.ti/
disruption or misdirection of the services they then upgrade this week.
provide.
20
Then the server will send a
server (n) a central computer from which other payment request to a payment /ˈsɜː.vər/
computers get information. gateway.
21
a detailed description of how something should You should look at the
specification (n) be done, made, etc. specifications. /ˌspes.ɪ.fɪˈkeɪ.ʃən/
22
a computer program, used especially in We have a colour-coded Excel
spreadsheet (n) business, that allows you to do financial spreadsheet of all of our trip /ˈspred.ʃiːt/
23 calculations and plans. expenses

is the action of saving information for later use.


In computers, that may be to a storage device,
such as an internal hard drive, optical disc Brand-new SSD stores more
store (n) drive, or an external storage device. The OS than 1 TB of memory! /stɔːr/
(operating system) of the computer is
responsible for storing data on your computer.
24
Flash memory is the most
a small piece of equipment that you connect to fastest memories with an instant
USB flash drive (phr) a computer or other piece of electronic access, so people use USB flash /ˌjuː.esˈbiː flaʃ drʌɪv/
equipment to copy and store information drive to store their documents
on it.
25
Operating systems allow users
volume (n) the amount of space that is contained within an to create storage disks and set /ˈvɒljuːm/
object or solid shape the volume to them.
26

A VPN server is a type of server that enables


hosting and delivery of VPN services. It is a
combination of VPN hardware and software VPN servers are situated in
VPN server (phr) technologies that provides VPN clients with every part of our world. /vpn ˈsəːvə/
connectivity to a secure and/or private
network, or rather, the VPN.
27

Consumer relations are the relations which a


company has with its consumers. Consumer
relations are important for companies for Build positive customer
* customer relations (phr) having a long term relationship, getting a relations. /ˈkʌstəmə rɪˈleɪʃənz/
feedback, spreading positive word of mouth,
increasing brand loyalty, having a positive
brand image etc.
28

Human Resource Management


The personnel of a business or organization, has four basic functions: staffing,
* human resources (phr) regarded as a significant asset in terms of skills training and development, /ˈhjuːmən rɪˈzɔːsɪz/
and abilities. motivation, and maintenance.
29
he action or business of promoting and selling
* marketing (n) products or services, including market research The company must create the /ˈmɑːkɪtɪŋ/
and advertising. stunning marketing programm.
30
Users place orders if they want
* order (n) Request (something) to be made, supplied, or to buy something from online /ˈɔːdə/
served. shops.
31
The action of making or manufacturing from Apple's just annonced their
* production (n) components or raw materials, or the process of waited production series of /prəˈdʌkʃ(ə)n/
32 being so manufactured. new IPhones.

* purchase (n) something that you buy. Customers purchase products /ˈpɜː.tʃəs/
and services via mobile devices
33
* sales (n) The action of selling something. Every day it takes 5 to 6 hours to /seɪlz/
compile data about the sales.
34

* solution (n) It means of solving a problem or dealing with a DVDs and hard disks are cheap /səˈluːʃ(ə)n/
difficult situation and widely accessible solutions.
35
Stock managment must
* stock management (phr) Stock management is the practice of ordering, increase addition of goods from /stɒk ˈmanɪdʒm(ə)nt/
storing, tracking, and controlling inventory. company partners.
36

Technical support (tech support) refers to a We have an issue with a


range services companies provide to their programm, so we should call
* technical support (phr) customers for products such as software, technical support for /ˈtɛknɪk(ə)l səˈpɔːt/
mobile phones, printers, and other electronic, explanation.
mechanical or electromechanical products.
37

IT help desk department was


* department (n) An area of special expertise or responsibility. inveted to keep help servieces /dɪˈpɑːtm(ə)nt/
provided to consumers.
38
There are so many goods kept in
* warehouse (n) o store something in a warehouse. that warehouse. /ˈwɛːhaʊs/
39
** USB (Universal Serial a type of computer port which can be used to The computer supports the third
/ˌjuː.esˈbiː/
40 Bus) connect equipment to a computer. version of USB.

A VPN, or Virtual Private Network, allows you


to create a secure connection to another To access resource which is
** VPN (Virtual Private network over the Internet. VPNs can be used to unavailable in my country, I
Network) access region-restricted websites, shield your rather use VPN instead of /ˌviː.piːˈen/
browsing activity from prying eyes on public moving to another country.
Wi-Fi, and more
41
translation

хмарні обчислення

стовпчик

кодування даних

збір даних

введення даних

сортування даних

зберігання даних

таблиця даних

перевірка даних
драй вер

шифрувати

входити

зовнішній жорсткий диск

поле

папка

жорсткий диск
запис

отримати

ряд

безпека

сервер

специфікація

електроннa таблиця

зберігати

флеш накопичувач
обсяг

VPN сервер

відносини з клієнтом

ввіділ кадрів

маркетинг

замовлення

виробництво

покупка
продажі

рішення

управління запасами

технічна підтримка

відділ

cклад

універсальна Послідовна Шина

Віртуальна Особиста Мережа


terms definitions examples pronunciation
Unit 5 E-commerce (51)

We are getting logs


allowed traffic (phr) Allowed traffic is traffic that anyone in the with allowed traffic towards /əˈlaʊ db ˈtræf.ɪk/
system can access different ports.
1
a place on a website where you collect things There are four items in your
basket (n) you plan to buy from the website. /ˈbɑː.skɪt/
2 baske.
a set of wires, covered by plastic, This cable attaches the printer
cable (n) that carries electricity, phone signals, etc. /ˈkeɪ.bəl/
3 to the computer.

A workstation is a special computer designed


computer workstation for technical or scientific applications. Intended Computer workstations are a
(phr) primarily to be used by one person at a time, key part of the workplace. /kəmˈpjuː.tərˈwɜːkˌsteɪ.ʃən/
they are commonly connected to a local area
network and run multi-user operating systems.

Confirmations are designed to help prevent a user may receive


confirmation (n) a confirmation asking them if /ˌkɒn.fəˈmeɪ.ʃən/
mistakes from occurring.
they are sure they want to
5 delete a file.
Customer Contacts is the list of contacts for a Сustomer contacts can help
customer contacts (phr) person. you. /ˈkʌs.tə.mərˈkɒn.tækt/
6

cyber attacks (attacks on a computer from the


cyber attack (phr) internet) on a network perimeter (the network We will have a virtual private /ˈsaɪ.bə.rəˌtæk/
boundary between a private user network and network with a firewall which
the internet). will help stop cyber attacks on
7 the network perimeter.

people who try to gain illegal access to a The web application protection
hacker attack (phr) computer system. firewall (WAF) will protect our /ˈhæk.ər əˌtæk/
website from hacker attacks on
customer contacts and login
8 boxes.
a device to which you connect your computers
hardware firewall (phr) or network in order to protect them from The best hardware firewall is /ˈhɑːd.weərˈfaɪə.wɔːl/
unauthorized access. the Zyxel ZyWALL 110.
9

hosting environment (phr) the physical environment where hosting Website administrators will go
through two layers of security /ˈhəʊstɪŋɪnˈvaɪ.rən.mənt/
services are offered from.
before they access the hosting
10 environment.

inbound traffic (phr) is the information coming into the network This image is a visualization /ˈɪn.baʊndˈtræf.ɪk/
study of inbound traffic
11 measured in billions of bytes.

a thin sheet of a substance on top of a surface, Website administrators will go


layer (phr) or a level of material that is different from the through two layers of security /ˈleɪ.ər/
material on either side. before they access the hosting
12 environment.
a new solution aiming to save you from typing
in your username and password for various This allows login box to work
login box (phr) on larger number of websites /ˈlɒɡ.ɪnbɒks/
websites when accessed from your
smartphone's small screen. than most password managers
13 today.
Firewall policies tend to forget
that outbound traffic should
outbound traffic (phr) Outbound traffic is the information leaving the not get a free pass. /ˈaʊt.baʊndˈtræf.ɪk/
network.
14

perimeter (n) the network boundary between a private user /pəˈrɪm.ɪ.tər/


network and the internet A network perimeter is the
secured boundary between the
15 private and locally managed.

public network (phr) A network that any user can access with no /ˈpʌb.lɪkˈnet.wɜːk/
restrictions. Connecting to a public Wi-Fi
16 network can put you at risk.

to put information, especially your name, into In order to become the member
register (v) of club you need to register on /ˈredʒ.ɪ.stər/
an official list or record
17 our site.
Finally, the customer will
rejection (n) the act of refusing to accept. receive the server response with /rɪˈdʒek.ʃən/
18 rejection.
restricted (adj) limited in amount or range. This system provides restricted /rɪˈstrɪk.tɪd/
19 access.

We will set up a network with a


restricted traffic (phr) Restricted traffic is information not everyone firewall and routers to restrict /rɪˈstrɪk.tɪd ˈtræf.ɪk/
has access to. the inbound traffic.
20

secure private network a specified network in which restrictions are These IoT security solutions /sɪˈkjʊə.rəˈpraɪ.vətˈnet.wɜːk/
(phr) established to promote a secured environment. create a secure private
21 network over the Internet

is defined as a risk that which can potentially In Information Security threats


security threat (phr) can be many like Software /sɪˈkjʊə.rə.tiθret/
harm computer systems and organization.
22 attacks
Server response time is the amount of time Without a good server
server response (phr) required to load the HTML document of a response time, the HTML doc /ˈsɜː.vərɪˈspɒns/
website from a server so that the client can will take longer to load.
begin rendering the page.
23

shopping cart (phr) a part of a shopping website that keeps a record /ˈʃɒp.ɪŋ ˌkɑːt/
of what you want to buy until you pay for it The customer puts the item(s) in
24 a basket or shopping cart

tool (n) a program or feature of a program that helps /tuːl/


you do particular things on a computer. The spreadsheet program offers
25 several useful tools.
a document or website on a computer that An online tutorial for the
tutorial (n) shows you how to use a product in a series of program is available on our /tʃuːˈtɔː.ri.əl/
26 easy stages. website.
to improve the quality or usefulness of
upgrade (n) something, or change it for something newer or It's very simple to upgrade /ʌpˈɡreɪd/
27 of a better standard. the indexing software.
A virtual private network (VPN) is a network
that is constructed using public wires — usually Virtual Private Network allows
virtual private network the Internet — to connect remote users or you to create a secure /ˈvɜː.tʃu.əlˈpraɪ.vətˈnet.wɜːk/
(phr) regional offices to a company's private, internal connection to another network
network. over the Internet.
28
an arrangement with a bank to keep your
* account (n) money there and to allow you to take it out The customer opens an account. /əˈkaʊnt/
29 when you need to.
a point at which goods are paid for in a The customer goes to the check-
* check-out (n) supermarket or other store. /tʃekaʊt/
30 out.
a printed form, used instead of money, to Electronic cheques to pay for
* cheque (n) make payments from your bank account /tʃek/
31 transactions.
* complete (v) to finish doing something. Complete this text with the /kəmˈpliːt/
32 words in the box.
a small plastic card that can be used as a
* credit card (phr) method of payment, the money being taken Customers can use their credit /ˈkred.ɪt ˌkɑːd/
from you at a later time. cards.
33

a small plastic card that can be used as a


* debit card (phr) method of payment, the money being taken I paid with my debit card. /ˈdeb.ɪt ˌkɑːd/
from your bank account automatically.
34

Online shopping is a form of electronic


* online shopping (phr) commerce which allows consumers to directly What are the potential security /ˈɒn.laɪnˈʃɒp.ɪŋ/
buy goods or services from a seller over the threats to online shopping?
Internet using a web browser.
35
* payment (n) an amount of money paid. The bank will respond and send /ˈpeɪ.mənt/
36 payment acceptance .

* payment gateway (phr) A payment gateway allows payment to be made /ˈpeɪ.məntˈɡeɪt.weɪ/


securely through encryption. The payment gateway will
37 check the buyer's ability to pay.
a request for payment, is a nonstandard
request by a department for approval of
* payment request (phr) payment by the company for goods or services. /peɪ.məntˈrɪˈkwest/
It is often used for purchases when an invoice is Then the server will send a
not provided. payment request to a payment
38 gateway .
the act of encouraging something to happen or
* promotion (n) develop. We used a lot of promotions. /prəˈməʊ.ʃən/
39
an occasion when someone buys or sells electronic cheques to pay for
* transaction (n) something. /trænˈzæk.ʃən/
40 transactions.
the price at which goods are sold to shops by
* wholesale (n) the people who produce them, rather than the I bought my coat direct from the /ˈhəʊl.seɪl/
price which the customer usually pays in the factory at wholesale.
shop.
41
this means giving two independent forms of
** 2FA (two-factor identification (for example, your name and a We will have two-factor /tuː ˈfæk.tərɔːˌθen.tɪˈkeɪ.ʃən/
authentication) password or PIN number). authentication (2FA).
42

** B2B (business-to- when a company sells a service or product to For B2B, students will probably /ˈbɪz.nɪs t əˈbɪz.nɪst ə /
business) another company. talk about commodities like
coffee, or raw materials like
43 iron, copper or oil.

** B2C (business-to- when a company sells to an individual. B2C is probably the most /ˈbɪz.nɪs t ə kʌs.tə.mə/
consumer) common type of online business.
44

** C2C (consumer-to- when an individual sells to another individual. For C2C, students may mention
consumer)
45 local competitors to eBay /ˈkʌs.tə.mə t ə kʌs.tə.mə/
** Cat 5e (Category 5 is a type of cable that is used extensively in
/ˈkæt.ə.ɡri faɪvˈkeɪ.bəl/
46 cable) Ethernet connections in local networks. Cat 5e, a type of network cable

** e-commerce (electronic refers to the buying and selling of goods or


commerce) services using the internet, and the transfer of Networking, customer interface /ˌiːˈkɒm.ɜːs/
money and data to execute these transactions. and payment solutions are very
important parts of a company's
47 E-commerce solution.

** m-commerce (mobile buying products and services from a mobile The rise of mobile internet has
triggered a boom in m- /ˌemˈkɒm.ɜːs/
commerce) phone.
48 commerce.
49 ** PayPal an online transaction business. a PayPal account/payment /ˈpeɪ.pæl/
which is a method of encryption; the use of
two-factor authentication – this means giving Secure Socket Layer (SSL) will
** SSL (Secure Socket two independent forms of identification (for create a secure connection for /sɪˈkjʊər ˈsɒk.ɪt ˈleɪ.ər/
Layer) example, your name and a password or PIN the users.
number).
50
A web application firewall (or WAF) filters,
monitors, and blocks HTTP traffic to and from A Web Application
** WAF (web application a web application. A WAF is differentiated from Firewall protects web /webæp.lɪˈkeɪ.ʃənprəˈtek.ʃən/
protection firewall) a regular firewall in that a WAF is able to filter applications by monitoring and ˈfaɪə.wɔːl/
the content of specific web applications while filtering traffic.
regular firewalls serve as a safety gate between
servers.
51
translation
дозволений трафік

дозволений трафік

корзина

кабель

комп'ютерне робоче місце

підтвердження

контакти з клієнтами

кібератака

хакерська атака
апаратний брандмауер

хостинг-середовище

вхідний трафік

прошарок

поле для входу

вихідний трафік

периметр

мережа загального
користування

реєструвати

відхилення
обмежений

обмежений трафік

захищена приватна мережа

загроза безпеці

відповідь сервера

корзина

інструмент

навчальний посібник

оновлення

віртуальна приватна мережа

рахунок
каса, контрольна перевірка

квитанція,чек

укомплектовувати,
завершувати

кредитна карта

дебетова картка

інтернет-магазини

оплата

шлюз платежів

запит на оплату

просування

транзакція

оптова торгівля
двофакторна аутентифікація

бізнес для бізнесу

бізнес для споживача

споживач для споживач

кабель категорії 5, вита пара

електронна комерція

мобільна комерція

PayPal

рівень захищених сокетів


брандмауер захисту веб-
додатків
terms definitions examples pronunciation
Unit 6 Network (49)

a piece of computer equipment that allows


access point (phr) computers to be connected together without The reason for such an error is /ˈæksɛs/ /pɔɪnt/
wires to share information incorrect access point
1

An analog signal is a continuous wave denoted In 1978, Intel released the 2920
analog signal (phr) by a sine wave and may vary in signal strength as an "analog signal /ˈænəlɒg/ /ˈsɪgnl/
(amplitude) or frequency (waves per unit time). processor".
2

a measurement of the amount of information Information technologies double


bandwidth (n) that can be sent between computers, through a their capacity, price /ˈbændwɪdθ/
phone line performance, bandwidth, every
year.
3
a bridge is a device that
bridge (n) connects networks and sends connects two LANs (local area /brɪʤ/
packages of data between them networks), or two segments of
the same LAN.
4
MBC Every 1 - Entertainment
channel (n) a television station channel for both Variety /ˈʧænl/
5 Programs.
able to be used with a particular type of This software may not be
compatible (adj) computer, machine, device, etc. compatible witholder operating /kəmˈpætəbl/
6 systems.

a complete computer including the


computer system (phr) operatingsystem (= main software) and Icinga is an open-source /kəmˈpjuːtə ˈsɪstɪm/
equipment that makes it work computer system and network
monitoring application.
7
the study or use of computers / the activity, But quantum computing could
computing (n) study, or job of using computers change the world. /kəmˈpjuːtɪŋ/
8
The government should be
the act or process of making, producing, or concentrating on job creation ,
creation (n) building something, or something that has been not on cutting benefits for the /kri(ː)ˈeɪʃən/
made, built, or produced unemployed.
9

Data transfer or transfer is any information that In point of fact, electronic data
data transfer (phr) is transferred from one location to another transfer is a basic requirement /ˈdeɪtə ˈtrænsfə/
through some communication method for use of our current databases.
10

dial-up (n) A dial-up is a connection that is established You know, dial-up was a pretty /ˈdaɪəl-ʌp/
using a modem. impressive invention at the time.
11
Set to output audio with the
digital signal (phr) a signal that can be represented as a sequence original digital signal /ˈdɪʤɪtl ˈsɪgnl/
of discrete (digital) values. prioritized.
12
The number of bytes per second that data
download speed (phr) travels from a remote or local server to the I have a problem with the /ˌdaʊnˈləʊd spiːd/
user's computer network download speed.
13
the things that you use for a particular Emergency equipment can be /ɪˈkwɪpmənt/
equipment (n) activity airborne within 24 hours.
14
a device or system used to send and receive
fax machine (phr) documents in electronic form along a phone I'll send you the agenda by fax
15 line /fæks məˈʃiːn/
The site's aim is to provide a
gateway (n) something in a system that allows you to use its central gateway for e- /ˈgeɪtweɪ/
other parts commerce services
16
Abbreviated as Gb, a gigabit is a method of A gigabit is equal to 109 or
gigabit (n) measuring data transmission. 1,000,000,000 bits. /gigabit/
17
channels incoming data, shares You cannot connect a USB device
hub (n) the bandwidth among the devices via the USB hub. /hʌb/
present on a network
18
Serial programs operate on the
incoming data (phr) data that is entered by a user or program that is incoming data characters or
received from other sources packets sequentially, one at a / ˈɪnˌkʌmɪŋ ˈdeɪtə/
time.
19
a kilobit, kbit, or Kb is equal to
kilobit (n) A value of measurement 1,000 bits. /ˈkɪləˌbɪt/
20

Latency is the time required for a computer on


latency (n) a network to respond to a request. The lower Network latency experienced /ˈleɪtənsi/
the number, the faster the response. by users in selected countries
21

In computers, measurements
measurement (n) the size, shape, quality, etc. of something, which are constantly occurring and /ˈmɛʒəmənt/
you discover by measuring it determining the computer's
function.
22

Abbreviated as Mb (lowercase b) or Mbit, a For example, "100 Mbps"


megabit and is 1,000,000 (106) bits. It represents 100 megabits per
megabit (n) measures a quantity of data. When divided by a second, which is one possible /Megabit/
unit of time, such as seconds, it measures the speed of a network card.
rate that data is transferred.
23

A broadband modem is an
external device that connects to
modem or broadband modem is a hardware your computers and other
modem (n) device that connects a computer or router to a network devices using either a /ˈməʊdəm/
broadband network. network cable or over a wireless
connection.
24

If your TAB turns red and the


modulate (v) modulate is a method of changing a signal screamer isn't disabled, you /ˈmɒdjʊleɪt/
before it's sent or when it's received. need to modulate the signal.
25

A connector is a device that terminates a In the Network Settings screen


network connectors (phr) segment of cabling or provides a point of entry of this connector, you'd likely
for networking devices such as computers, specify a different IP address for / ˈnɛtwɜːk/ / kəˈnɛktəz/
hubs, and routers. a different smart host.
26
A network interface card (NIC)
A NIC is a computer expansion card for is a hardware component
network interface card connecting to a network (e.g., home network or without which a computer
(phr) Internet) using an Ethernet cable with an RJ-45 cannot be connected over a
connector. network. /ˈnɛtwɜːk ˈɪntəˌfeɪs kɑːd/
27

With software, a package is a module that can


package (n) be added to any program to add additional Select your data package and /ˈpækɪʤ/
options, features, or functionality. get access to the Internet.
28
A printer is an external hardware output device
printer (n) that takes the electronic data stored on a I only wrote that poem to test /ˈprɪntə/
computer or other device and generates a hard my printer.
copy of it.
29
When referring to a spreadsheet, the range or
range (n) cell range is a group of cells within a row or The currently selected range in /reɪnʤ/
column. the spreadsheet is the default.
30
a device that receives and delivers The Wifi, should give a more
repeater (n) signals; it sends the digital signals stable, since its operation /rɪˈpiːtə/
31 further on in the network depends only repeater.

a piece of electronic equipment on a


computer network that controls the
router (n) movement of information around the If the protocols don't match, the UK /ˈruː.tər/ US /ˈraʊ.t̬ɚ/
network; it connects networks that use router won't work.
the same protocol
32
The RFID scanner read the chips
scanner (n) a device that changes images or text into on every credit card in his /ˈskænə/
electronic form. wallet.
33

The ability of a cellular system


Signal strength is a measure of how well data is to use signal strength to choose
signal strength (phr) transmitted channels and split cells into
smaller units also helps expand /ˈsɪgnl strɛŋθ/
channel capacity.
34
a switch is a hardware device that filters and
switch (n) forwards network packets, but is often not It's got a powerful switch, good /swɪʧ/
capable of much more. range of signal.
35
transmitter or radio transmitter is an electronic They stole cameras and
transmitter (n) device which produces radio waves with an electrical equipment and broke
antenna. the station supports and the /trænzˈmɪtə/
transmitter.
36
Using your PSP system and a
a device that allows wireless devices wireless access point, you can
wireless access point (phr) to connect to a wireless network connect to the PS3 system that is
located within your home via /ˈwaɪəlɪs ˈæksɛs pɔɪnt/
the Internet.
37
HP is a United States
* corporation (n) a large company or group of companies that is information technology /ˌkɔːpəˈreɪʃən/
controlled together as a single organization corporation headquartered in
California.
38
the number of things that a company sells
* market share (phr) compared with the number of things of the The company has increased its /ˈmɑː.kɪt ˌʃeər/
same type that other companies sell market share
39

He didn't want to be involved in


* organization (n) a group of people who work together in an the organization of/for the /ˌɔːgənaɪˈzeɪʃən/
organized way for a shared purpose conference, although he was
willing to attend and speak.
40

is a standardized twisted pair cable for


** Cat 6 (Category 6 cable) Ethernet and other network physical layers that Category 6 cable supports runs /ˈkætɪgəri 6 ˈkeɪbl/
is backward compatible with the Category 5/5e up to 55 meters.
and Category 3 cable standards.
41

a system that sends television signals to a Three Security Guards would


** CCTV (closed-circuit limited number of screens and is often used in primarily monitor the closed- /kləʊzd-ˈsɜːkɪt ˈtɛlɪˌvɪʒən/
television) shops as protection against thieves circuit television around the
clock;
42
Asymmetric digital subscriber
** DSL (digital subscriber a system for sending and receiving information line is gradually being /ˌdiː.esˈel/
line) at high speeds over ordinary telephone lines introduced. /ˈdɪʤɪtl səbˈskraɪbə laɪn/
43
Gigabits Per Hour and Gibibits
** Gbit/m (gigabits per is a method of measuring how much data is Per Minute both are the units of /gigabits pɜː ˈsɛkənd/
minute) being transmitted per minute data transfer rate.
44

The ITU defines broadband as


** kbit/s (kilobits per is a unit of measurement for the speed of data Internet speed that provides the
second) transmission; 1 kbps is 1,024 bps user with a downstream speed /ˈkɪləˌbɪts pɜː ˈsɛkənd/
of no less than 256 kilobits per
second (Kbit/s)
45

a system that connects computers One personal computer of the


** LAN (Local Area to each other within a building or local area network had been /ˈləʊkəl ˈeərɪə ˈnɛtwɜːk/
Network) organization established in order to service
the whole process.
46

a measurement used to determine the amount I read somewhere that NASA is


** Mbit/s (megabits per of data (megabits) being transmitted per sending data to the Moon at 662 /megabits pɜː ˈsɛkənd/
second) second and is smaller than MBps megabits per second
47

POP3 (Post Office Protocol


** POP (post office is one of the most commonly used protocols Version 3) - used by a e-mail /pəʊst ˈɒfɪs ˈprəʊtəkɒl/
protocol) used to receive e-mail on many e-mail clients application for downloading
messages from a mail server
48

Expansion of connectivity of a
wide area network was
** WAN (Wide Area a computer network that covers large developed, enabling connections
Network) areas to provide e-mail and Internet /waɪd ˈeərɪə ˈnɛtwɜːk/
services to the provincial
regions of the country.
49
translation

точка доступу

аналоговий сигнал

пропускна здатність

міст

канал

cумісний

комп'ютерна система

обчислення
створення

передача даних

комутована лінія зв'язку

цифровий сигнал

швидкість завантаження

обладнання

факс

шлюз

гігабіт

хаб (концентратор)

вхідні дані
кілобіт

затримка

вимір

мегабіт

модем

модулювати

мережевий з'єднувач
мережева плата

пакет даних

принтер

діапазон

повторювач

маршрутизатор, роутер

сканер

потужність сигналу

перемикач
трансмітер

бездротова точка доступу

корпорація

ринкова частка

організація

Кабель 6 категорії

система охоронного
відеоспостереження

цифрова абонентська лінія


гігабіт на хвилину

кілобіт в секунду

Локальна
мережа

мегабіт в секунду

протокол поштового офісу

Широкосмугова
мережа
terms definitions examples pronunciation
Unit 7 IT support (60)
An anti-static wrist strap may also
anti-static wrist strap a device that helps to prevent the build-up of be called an electrostatic discharge /ˈænti-ˈstætɪk rɪst
(phr) static electricity near sensitive electronics (ESD) wrist strap. stræp/
1

attachment (n) is a file sent with an e-mail message I'll email my report to you as an /əˈtæʧmənt/
attachment
2
If Battery saver mode is off, you’ll be
battery mode (phr) changes certain settings to conserve battery prompted to turn on Battery saver /ˈbætəri məʊd/
power until you can recharge your phone mode when the battery reaches low
levels
3
The bolt was ripped off by the force of
bolt (n) a metal pin or bar, in particular the impact /bəʊlt/
4
A cable tester can test whether a
is a device that is used to test the strength and cable or wire is set up properly,
cable tester (phr) connectivity of a particular type of cable or connected correctly, and the /ˈkeɪbl ˈtɛstə/
other wired assemblies communication strength between the
source and destination
5

charge (v) store electrical energy in (a battery or battery- It takes several hours for my /ʧɑːʤ/
operated device) laptop’sbatteries to charge
6
a device for charging a battery or battery-
charger (n) powered equipment I lost the charger to my phone /ˈʧɑːʤə/
7

examine (something) in order to determine its Patricia has checked the reports and
check (v) accuracy, quality, or condition, or to detect the can vouch for the accuracy of /tʃek/
presence of something the information
8
name of the air cooling system - the
computer fan (phr) combination of a fan with a radiator installed computer fan design efficiently /kəmˈpjuːtə fæn/
on electronic components of a computer with dissipates heat
increased heat
9
Switch off the electric current before
current (n) the passage of electricity through a wire changing the bulb /ˈkʌrənt/
10
defragment (v) to make a computer organize its files and It allows you to defragment a single /ˌdiː.fræɡˈment/
freespace so that it can operate more quickly file, several files or an entire folde
11
First decide whether you need a
desktop computer (phr) a computer that fits on a desk but that is not desktop computer, or whether a /ˈdɛsktɒp kəmˈpjuːtə/
easily moved from place to place laptop or notebookwould be more
suitable
12

diagnostic (adj) used for discovering the characteristics A full diagnostic would require us to /ˌdaɪ.əɡˈnɒs.tɪk/
or cause of a problem in a system or machine take our systems off-line
13

disconnect (v) to stop being connected to the internet Once he fires the engine, I can always /ˌdɪs.kəˈnekt/
disconnect him if I have to
14
All types of media capable of storing
information have a disk space,
disk space (n) the maximum amount of data a disc or drive is including a CD, DVD, floppy disk, hard /dɪsk speɪs/
capable holding drive, memory stick/card, and USB
thumb drive
15
using electricity for power, involved in the
electrical (adj) production or movement of electricity, or That looks more electrical than /iˈlek.trɪ.kəl/
related in some way to electricity mechanical.
16
Even with a load of
electronic (adj) is any data or information transmitted over a electronic gadgetry, you still need /ˌel.ekˈtrɒn.ɪk/
network or the Internet some musical ability to write
a successful song
17
The best method of preventing
electrostatic discharge is to use an
electrostatic discharge the transfer of electrical charge between any electrostatic discharge wrist strap, /ɪˌlɛktrəʊˈstætɪk dɪsˈʧɑːʤ/
(phr) two objects grounding mat, or grounding
workbench
18
a mistake, esp. in a way that can
error (n) be discovered as wrong, or the making of This error means that a module /ˈer.ər/
such mistakes cannot be found
19
is checking the electronic system for any errors, fault diagnosis allows you to assess
fault diagnosis (phr) problems and malfunctions the technical condition /fɔːlt ˌdaɪəgˈnəʊsɪs/
20
find (v) to discover where something I can't find the file I created yesterday /faɪnd/
21
They couldn't fix my old computer, so
fix (v) to repair something I bought a new one /fɪks/
22

Most of you already know that a


hard disk speed (phr) the rate at which hard disk is able to operate fragmented registry slows down /hɑːd dɪsk spiːd/
computer speed (same as hard disks)
23
a tool used to drive bolts and screws with I need a hex key to open the server
hex key (phr) hexagonal sockets in their heads chassis /hɛks kiː/
24

hexagonal socket (phr) is a socket designed to fit the head of He had forgotten to plug the television /hɛkˈsægənl ˈsɒkɪt/
a hexagonal fastener such as a nut or bolt into the mains hexagonal socket
25
26 insert (v) to put something inside something else Let me just insert lens in microscope /ɪnˈsɜːt/

An IC extractor is a tool for safely and


insertion/extraction used for inserting and removing fibre quickly removin+D43g integrated /ɪnˈsɜːʃən/ɪksˈtrækʃən ˈklɪpə/
clipper (phr) connectors in tight spaces circuits (ICs) from their sockets
27

insulation (n) the act of covering something to stop heat, This insulation shall be strong /ˌɪn.sjəˈleɪ.ʃən/
sound, or electricity from escaping or entering enough to resist impacts and vibration
28
a device that measures electronic A second multimeter in series with
multimeter (n) properties and is used to find the discharge gap was used to indicate /ˈmʌl.tiˌmiː.tər/
electrical problems in batteries, power the current
supplies, and wiring systems
29
a small piece of metal with a hole in it through Nuts and bolts are used to hold pieces
nut (n) which you put a bolt of machinery together /nʌt/
30
a small tool with two handles for holding or
pliers (n) pulling small things like nails, or for cutting Pass me that pair of pliers, please /ˈplaɪ.əz/
31 wire

plug in (phr v) to become connected to a piece of electrical The keyboard plugs in at the back of /ˈplʌɡ.ɪn/
equipment or to the main electricity supply the computer
32
print out (phr v) produce a printed material on a page or set of At this point, you may want to print /prɪnt aʊt/
pages by a computer printer out the page for your reference
33
We had to bring in a computer expert
recover (v) to get something back that was lost or almost to help us recover the data from the
destroyed hard drive. /rɪˈkʌvər/
34
a computer program where you store files or
recycle bin (phr) folders that you want to delete before deleting Deletes the selected item(s) into the /ˌriːˈsaɪkl bɪn/
them permanently recycle bin
35
an act of reinstalling something, especially The time has come to reinstall
reinstall (v) software Windows! /ˌriːɪnˈstɔːl/
36

If you did not get an email, try logging


resend (v) to send a text message, an email, etc. Again in again: you will see an error message /ˌriːˈsend/
with a link to resend the email
37
is the degree to which a substance prevents the
resistance (n) flow of electricity through it ITC, stereo, time and resistance /rɪˈzɪs.təns/
38
to begin or start something again after it has Computer, restart all shield generator
restart (v) stopped for a period of time subsystems /ˌriːˈstɑːt/
39
a driver with a ratchet (so the blade turns in reversible ratchet driver used for
reversible ratchet driver only one direction) and a spiral in the handle easy driving of screws and nuts /rɪˈvɜːsəbl ˈræʧɪt ˈdraɪvə/
(phr) (so the blade rotates) with downward pressure
on the handle
40
is a small metal post with threads going down If I'm being honest, I've got one screw
screw (n) around it left /skruː/
41
nd I just need a screwdriver to get
screwdriver (phr) a tool that you use for turning screws this thing off /ˈskruːˌdraɪvə/
42

a space on a computer screen or web page Should you are looking for something
search box (phr) where you type a word or piece of information special, so you can also use the search /ˈsɜːtʃ ˌbɒks/
that you want to find box in the top menu
43
to make a machine or light stop But in 10 minutes, I'd like you to
switch off (phr v) working by moving a button switch off the network system /swɪtʃ ɒf/
44

switch on (phr v) to make a machine or piece of equipment start Please switch on JavaScript or change /swɪʧ ɒn/
working by pressing a switch the browser to the newer version
45
The activities of the Centre are three-
three-pronged (adj) having the stated number of prongs pronged /θriː-prɒŋd/
46
describes a cable connection that is in
tight (adj, adv) correctly and firmly Yes, it's nice and tight /taɪt/
47
rotation of nuts to create and increase the And then tightening a screw, which
tightening a screw (phr) strength of the connection parts will hold it in place /ˈtaɪtnɪŋ ə skruː/
48
an electronic sound that you hear on Please leave your message after
tone (n) a phone line the tone /təʊn/
49
50 turn on (phr v) put into action We can turn on the game if you want /ˈtɜːn.ɒn/
a small tool consisting of two thin
tweezers (n) pieces of metal joined at one end; I need you to go find some pliers or /ˈtwiː.zəz/
you use tweezers for picking up small tweezers
things
51

Even when undelete has become


undelete (v) is a software utility or command that restores a impossible, the data, until it has been /ʌn.dɪˈliːt/
deleted file to a file system overwritten, can be read by software
that reads disk sectors directly
52

uninstall (v) the process of taking a program files off of a To uninstall just do like any other /ˌʌn.ɪnˈstɔːl/
computer hard drive software on Windows Mobile
53

unplugged (adj, adv) one that is disconnected from the network The AC adapter has been unplugged, /ˌʌnˈplʌgd/
switching to battery mode
54
is a way to categorize the unique states of
version (n) computer software as it is developed and That version included 32767 possible /ˈvɜː.ʃən/
released configurations
55
a computer program or part of a computer
virus (n) program that can make copies of itself and is Software I can hack to build a virus /ˈvaɪə.rəs/
intended to prevent the computer from
working normally
56
The rated voltage of cables should be
voltage (n) the force of an electric current, measured in determined and stated by the /ˈvɒl.tɪdʒ/
volts manufacturer
57
tool used for cutting wire or removing Could be the work of pliers or wire
wire cutter/stripper (phr) insulation cutters /ˈwaɪə ˈkʌtə/ /ˈstrɪp.ər/
58
But if alternating current is running
an electrical current that regularly changes the through the wires every second of
** AC (alternating current) direction in which it moves every day and I turn on a switch /ˈɔːltəneɪtɪŋ ˈkʌrənt/
sending it here instead of there, how is
that lighting a fire?
59
electrical current that moves in one direction Are you using alternate or direct
** DC (direct current) only current to charge it? /daɪˈrɛkt ˈkʌrənt/
60
translation

антистатичний
браслет

прикріплення, вкладення

режим роботи від акумулятора

болт

кабельний тестер

заряджати

зарядний пристрій

перевіряти

вентилятор комп'ютера

струм
дефрагментувати

настільний комп'ютер

діагностичний

відключити

ємність диска

електричний

електронний

електростатичний розряд

помилка

діагностика несправностей
знай ти

лагодити

щвидкість жорсткого диску

шестигранний ключ

шестигранна розетка

вставляти

Пристрій для
вилучення /
вставки

ізоляція

мультиметр

гай ка

пласкогубці

підключати
надрукувати

відновити

кошик(корзина)

перевстановлювати

відправляти повторно

опір

перезапустити

реверсивна храпова викрутка

шуруп (гвинт)

викрутка

вікно пошуку

вимкнути

увімкнути
тризубний

щільний

закручувати гай ки

звуковий сигнал
увімкнути

пінцет

відновлювати після видалення

видалити

відкючений

версія

вірус

напруга

кусачки/інструмент для
зняття ізоляції
змінний струм

постій ний струм


terms definitions examples pronunciation
Unit 8 IT security and
safety (38)

adware (n) software that automatically plays Adware is most often integrated [ˈædweər]
advertisements on a computer into free applications
1
a type of software that looks for and
antivirus software (phr) removes viruses in programs and We created the world's /ˈæntɪˌvaɪrəs ˈsɒftweə/
documents on your computer preeminent antivirus software
2
term used to describe the process of Authentication is a critical step
authentication (n) identifying a person and making sure they are in ensuring secure /ɔːˌθɛntɪˈkeɪʃ(ə)n/
3 whom they say they are communications
having official permission to do something or Users can pretend that they
authorized (adj) for something to happen authorized with OpenID /ˈɔːθəˌraɪzd/
4
If a machine or device does something
automatically (adv) automatically, it does it independently, without These must lock automatically /ˌɔːtəˈmætɪkəli/
human control if the power's out.
5
To present a biometric
biometric scanning (phr) methods of recognizing a person based on a passport, or electronic or optical [ˌbaɪ.əʊˈmet.rɪk ˈskænɪŋ]
physiological characteristic scanning individual passport
valid
6
Browser hijacking is a form of
unwanted software that
browser hijacker (phr) software that replaces the user’s modifies a web browser's /ˈbraʊzə ˈhaɪˌʤækɪŋ/
search engine with its own settings without a user's
permission
7
to arrange something or change the controls on Additionally you can configure
configure (v) a computer or other device so that it can be Class settings, like Icon, Actions /kənˈfɪgə/
8 used in a particular way and more
Label says may cause
damage (v) harm or injury irreparable damage to the /kənˈfɪgə/
9 space-time continuum
But we think the hacker was
hacker (n) someone who hacks into other people's targeting this information /ˈhækə/
computer systems specifically
10
The incident left a spot on his
incident (n) an event that is either unpleasant or unusual reputation /ˈɪnsɪdənt/
11

irregularity (n) the quality of not being regular in shape or If there's been any irregularity, [ɪˌreɡ.jəˈlær.ə.ti]
form, or an example of this I had nothing to do with it.
12
refers to the beginning or executing a program The processor load of the
load (n) by moving (loading) the necessary information process in user space (in [ləʊd]
from a drive, such as a hard drive, into a percent)
computer's memory
13

intended to cause damage to a computer I was removing the malicious


malicious (adj) system, or to steal private information from a script from the phone and /məˈlɪʃəs/
computer system suddenly I got locked out
14

software designed to secretly access They found a piece of malware


malware (n) a computer system on the plane... an incredibly /ˈmælweə/
[= malicious software] sophisticated virus that knocked
out every communication device
15

The misuse of
to use something in an unsuitable way or in a telecommunication equipment
misuse (n) way that was not intended was criminalized by law, and [ˌmɪsˈjuːz]
wiretapping without a warrant
was prohibited
16

is a piece of software code that can be applied There's a special patch of the
patch (n) after the software program is installed to sky where we have thousands of [pætʃ]
correct an issue with that program planets
17

A peripheral device attached


peripheral (n) is hardware input device or output device that has a knob that can be turned to /pəˈrɪfərəl/
gives a computer additional functionality speed up, slow down, or even
reverse the scrolling of the text
18

privacy (n) is a term used to describe an individual's All I need is my privacy /ˈprɪvəsi/
anonymity and how safe they feel in a location
19
The text indicated later on what
procedure (n) a set of actions that is the official or accepted procedure would be applicable /prəˈsiːʤə/
way of doing something if a further procedure became
necessary
20
to give a description of something or We called the insurance
report (v) information about it to someone company to report the theft /rɪˈpɔːt/
21
is software, usually accessed on the Internet, The search engine found
search engine (phr) that searches a database of information someone who looks exactly like /ˈsɜːtʃ ˌen.dʒɪn/
22 according to the user's query. you

An event in which one or more aspects of It denotes security breaches


information security are compromised which can be effectively
security breaches (phr) (accessibility, confidentiality, integrity and managed by the Port Police with /sɪˈkjʊərɪti ˈbriːʧɪz/
reliability) the assistance of local
enforcement agencies
23

Participants representing
different industry sectors
highlighted the central role of
sensitive data (phr) information that is confidential, i.e. Secret obtaining and managing /ˈsɛnsɪtɪv ˈdeɪtə/
sensitive data in addressing
proliferation
24
The world must stand together
spread (v) to (cause to) cover, reach, or have an effect on a to prevent the spread of these /spred/
wider or increasing area weapons
25
computer software that secretly
records information about which Then, if spyware or other
spyware (n) websites you visit and sends programs try to change your /ˈspaɪ.weər/
information about the use of your default search to another site,
computer the Toolbar will notify you
26
The consent of the person
transfer (v) to move someone or something from proposed for transfer is also /ˈtrænsfə(ː)/
one place to another required
27
It's easier than you think to in
Trojan (n) a type of computer virus advertently download a /ˈtrəʊʤən/
28 malicious Trojan
unauthorized (adj) without official approval or permission An unauthorized version of the /ʌnˈɔː.θə.raɪzd/
software is being sold abroad
29

This type of attack allows


changing passwords from the
dictionaries (for example, shift
upper/lower case (phr) letters of the alphabet that are not written as password to upper case, /ˌləʊ.ə ˈkeɪs/
capital letters append '1' to the end of the
password, etc.
30
a type of computer virus that can
make copies of itself and destroy
worm (n) information on computers that are You can't just hack in and upload /wɜːm/
connected to each other; it spreads a worm
without the user taking action
31

The choice and management of


* management (n) the activity or job of being in charge of a resources are essential to the /ˈmæn.ɪdʒ.mənt/
company, organization, department, or team of success of any company.
employees
32
The recipient could simply
* recipient (n) a person who receives something refuse delivery /rɪˈsɪp.i.ənt/
33
a person who is in charge of a group of people The site supervisor ensures all
* supervisor (n) or an area of work and who makes sure that the aspects of quality assurances at /ˈsuː.pə.vaɪ.zər/
work is done correctly and according to the all levels
rules
34

it is an operator of automated and robotic the security coordinator sends


* safety coordinator (phr) security systems, monitoring their status sensors to the object, if /ˈseɪfti kəʊˈɔːdɪneɪtə/
necessary, through the sensors
and surveillance cameras
35

However, closer inspection of


* inspection (n) the act of looking at something carefully to the records revealed serious /ɪnˈspek.ʃən/
check its quality or condition inaccuracies.
36
The investigation was based on
* investigation (n) the act or process of examining a problem, information received through /ɪnˌves.tɪˈɡeɪ.ʃən/
statement, etc. cooperation
37
As implied by the previous
** P2P (peer-to-peer) refers to the transmission between two peer description, it is not possible to /ˌpiː.təˈpiː/
computers over a network block connections to particular
P2P networks
38
translation

рекламне ПЗ

антивірусне програмне
забезпечення

аутентифікація ( звірення)

авторизований

автоматично

біометричне сканування

викрадач браузера

налаштувати

пошкодити

хакер
інцидент(подія)

відхилення( порушення)

завантаження

шкідливий

шкідливе ПЗ

зловживання

ділянка

периферій ний пристрій

конфіденцій ність
процедура

звітувати

пошукова система

порушення безпеки

конфіденцій ні дані

поширення

шпигунське ПЗ

передача

Троян
неавторизований

мала літера

Черв'як
(Програма)

управління

одержувач

керівник

координатор безпеки

перевірка
дослідження

однорангова мережа

You might also like