The arrival of the Internet has virtually redefined mankind. Never before has communications been so smooth, fast and accessible. The effect of this legacy gives one the power to command a worldwide audience at one's fingertips. All that is needed is a computer and a telephone line. Today, there is more information posted on the Net than any library in the world. The information from the Net aids numerous individuals and organisations ranging from students conducting research to multinational organisations in need of the latest expertise.
The Net has, however, generated more criticism than it can possibly handle. The large amount of inaccurate information in cyber space angers all levels of society. It has become a channel for some irresponsible users to champion their own selfish causes while others go on spree of character assassinations. Today, even ten or twelve - year - old minors can set up their own webpage, publish and disseminate their ideas regardless how malicious, erroneous or dangerous their ideas may be. This gets even more ugly in today's dog - eat - dog business environment where not only characters but also the reputations of companies and nations are stake. Large organisations have been crippled by irresponsible " netizens " who post and circulate incorrect information and rumours via the Internet. An example of this when an unidentified source claimed that the Japanese giant Sony intended to buy out ailing software company Apple Computers. It generated shock waves and unnecessary damaging panic in the stock market and computers industry.
Today, the days of protecting access to corporate computers and data with user passwords are no longer safe. With an ever increasing number of contentious " netizens " working hours on their computers, the ability of hackers to breach any password clearly indicates that information can never be too " safe ". The most worthy of all hackers is probably the Analyzer, who at the mere age of seventeen successfully broke into the Pentagon files. Besides spreading top - secret information, the Net is also capable of spreading dangerous virus, which can only be detected after damage has been done. When twenty - four - year - old Chen from Taipei created the Chernobyl computer virus with the aim to humiliate and take revenge on incompetent anti - virus software producers, disaster struck a number of countries in Asia and the Middle - East. Turkey and South Korea each reported 3 000 000 computers damaged on that black Monday, 26 April 1999. Young talents like the Analyzer and Chen make it difficult and expensive for governments, banks, organisations and even individuals to operate using the Internet without first realising the risks and commitment involved.
E-mail, a form of cyber - culture that universally revolutionised communication, has today become nightmare. Workers everywhere today are handling volumes of data which threaten to engulf them. On top of that, they have to deal with unsolicited junk e - mail which causes information overload. In 1997, the British business fielded 794 million items of unsolicited mail and 65 per cent of managers in the UK considered themselves as victims of information overload. All these have prompted many e - mail users to close accounts since their addresses have over time found their way to persistent salesperson.
The rampant display of pornography and violence on the Internet have become a subject of grave concern among parents and governments. The impact of explicit pornography material certainly can affect the minds of both adults and youngsters. The Net too has been linked as a source that has brought about an overall increase in crime all around the world. Many criminals are known to have been influenced by websites on the Net, gaining their violent inspiration from numerous gruesome sites available to all. These sites feature graphic displays of mutilation of justifications of the comission of hate crimes.
The " Information Super Highway " , the " Gutter of Misinformation " and the " Playground for Irresponsible Individuals " - call it what you want, but no one can ignore what the Net has done and is capable of doing for mankind in the future. What needs to be done is to inculcate a greater understanding of this powerful tool at all levels - from governments and organisations, to schools, parents and childrens, before a certain equilibrium can be reached.
( MUET express for Advanced Learners, pg. 49 & 50 )
--------------------------------------------------------------------------------------
PRESENT CONTINUOUS TENSE
DEFINITION: To express an action that happen now, in the future or around now.
Example:
PRESENT CONTINUOUS |
gaining |
PRESENT PERFECT TENSE
PRESENT PERFECT |
Been |
Have |
Don’t |
has |
SIMPLE PRESENT AND PAST TENSE
PRESENT TENSE | PAST TENSE | ||
Engulf | Working | Broke | Reached |
Take | Protecting | Claimed | Crippled |
Capable | Breach | Influenced | Considered |
Operate | damaging | Generated | Posted |
Angers | Deaf | Needed | Redefined |
handle | Set up | Involved | Detected |
Humilate | Need | Damaged | Reported |
spreading | Aids | created | |
Publish | Go | ||
Become | Effect | ||
Command | Struck | ||
Threaten | Buy | ||
Post | Deal |
CONJUNCTION
DEFINITION: Also called as joining words are used to join sentences, words, phrases and clauses.
Example:
CONJUNCTION | |
And | Than |
Tomorrow | However |
That | For |
While | Or |
But | with |
Which | since |
PREPOSITION
DEFINITION: How a relationship between places, people and things.
Example:
PREPOSITION | |
Of | To |
At | On |
In | From |
And | By |
Via | With |
Into | Besides |
After | for |
ARTICLES
DEFINITION: Type of determine which include words like `this,my,their,each and any` are used at the beginning of a noun phase to identify exactly what or who the noun refer to.
Example :
A | An | The |
A number | An unidentified | The risks |
A channel | An ever increasing | The aim |
A spree | The ability | |
A telephone line | The days | |
A computer | The rampant | |
A worldwide | The latest | |
The Net | ||
The information | ||
The world | ||
The stock market |
PRESENT PARTICIPLE
DEFINITION: Is a verb that used to name action. Each main verb has 4 forms.
They are :
1. base form : eg. speak
2. past form : eg. spoke;
3. past participle : eg. spoken;
4. present participle : eg. speaking.
Example :
PRESENT PARTICIPLE |
damaging |
PAST PARTICIPLE
DEFINITION: A participle that expresses completed action
Examples :
Examples :
PAST PARTICIPLE |
Been |
Done |
ADVERB
DEFINITION: An adverbs modifies the meaning of a verb, an adjective or another adverb.
Examples:
ADVERB | |
Virtually | Never |
Before | So |
However | More |
That | Regardless |
how | to |
Even | This |
Where | Not |
Also | Cripple |
Out | Probably |
Successfully | Without |
Buy | when |
ADJECTIVE
DEFINITION: A describing word. It usually describes a noun or a pronoun.
Examples :
ADJECTIVES | |
redefined | Smooth |
fast | Accessible |
One | Worldwide |
One’s | Possibly |
what | Greater |
This | Powerful |
level | Certain |
Large | inaccurate |
Graphic | selfish |
Malicious | erroneous |
Dangerous | minor |
ugly | Only |
Irresponsible | Incorrect |
Unidentified | Japanese |
Ailing | Corporate |
Safe | Ever |
Persistent | Many |
Involved | Individuals |
Expensive | Difficulty |
Young | which |
Secret | Mere |
Worthy | Never |
Number | violence |
VERBS
DEFINITION: A word that represents an action or a state of being.
Examples:
Examples:
‘s’ ending | Without ‘s’ ending | ‘ed’ ending |
gets | Circulate | Influenced |
indicates | post | Considered |
causes | disseminate | Created |
angers | Publish | Reported |
aids | Set up | Crippled |
gives | Go | Claimed |
Working | Posted | |
Breach | Generated | |
Broke | Reached | |
Protecting | Detected | |
Champion | Intended | |
Command | Redefined | |
Conducting | ||
Operate | ||
Threaten | ||
Engulf | ||
Capable | ||
Ignore | ||
Call | ||
Feature | ||
Gaining | ||
Aim | ||
spreading | ||
Known | ||
Struck | ||
Take | ||
Close | ||
Arrival | ||
Been | ||
Humilate | ||
Affect | ||
impact |
NOUNS
DEFINITION: The part of speech that names a person, place, thing, or idea. The following words are nouns: child, town, granite, kindness, government, elephant, and Taiwan. In sentences, nouns generally function as subjects or as objects.
Examples :
NOUNS | |
Internet | Mankind |
legacy | effect |
our | Command |
audience | fingertips |
Today | information |
Net | library |
Worla | students |
Organization | individuals |
critism | Handle |
Channel | irresponsile |
Users | Champion |
causes | spree |
Character | Assassionations |
Set up | ideas |
Today | Webpage |
Business | reputation |
Companies | Commitment |
Risks | banks |
Goverments | Talents |
Damage | virus |
Capable | Analyzer |
Nackers | Indicates |
Increasing | Passwords |
Access | today |
Computers | Software |
Giant | Source |
Example | Line |
Telephone | Stake |
Nations | Cyber |
Culture | Communication |
Victims | Managers |
Items | Accounts |
Address | Salespersons |
Pornography | Justifications |
Crimes | grave |
PRONOUNS
DEFINITION: A word that takes the place of a noun. She, herself, it, and this are examples of pronouns.
Example:
PRONOUNS | |
This | There |
Any | It |
Some | Their |
Most | All |
Who | Themselves |
They |
SINGULAR
DEFINITION: The form of word which express only one.
Example:
SINGULAR | |
Arrival | Has |
Communicatins | One |
Society | Space |
Has | Rumours |
Organization | Netizens |
It | Waves |
PLURAL
DEFINITION: Relating to, or containing, more than one; designating two or more.
Examples:
Examples:
PLURAL | |
Angers | Levels |
Schools | Parents |
Child | Others |
Post | Circulate |
Data | Computers |
PUNCTUATIONS MARK
DEFINITION: The use of symbols not belonging to the alphabet of a writing systems to indicates aspect of the intonation and meaning not otherwise conveyed it in the writing language.
Types of the punctuations:
1. Full stop (.)
2. Comma (,)
3. Exclamation mark (!)
4. Quatation mark (“ “)
5. Apostrophe (‘)
6. Questions mark (?)
7. Colon (:)
8. Semicolon (;)
PUNCTUATION MARK | EXAMPLE |
Full stop | . |
Comma | , |
Exclamation mark | ! |
Quatation mark | “ “ |
Question mark | ? |
Semicolon | ; |
Colon | : |
No comments:
Post a Comment