Вы находитесь на странице: 1из 147

2 Computer Engineering

ББК
Авторы: М.Г. Бондарев, А.С. Андриенко, Л.В. Буренко, О.Г. Мельник, Э.А. Сидельник.
Computer Engineering: Издание 2-е (испр. и доп.): Учебное пособие. – М: Изд-во «Флинта»,
2014.– 147 с.

Под общей редакцией Г.А. Краснощековой.

Учебное пособие “Computer Engineering” предназначено для студентов высших


учебных заведений, обучающихся по направлениям «Информатика и вычислительная
техника» (08.03.01); «Автоматизация технологических процессов и производств» (15.03.04);
«Информационные системы и технологии» (09.03.02) и «Системный анализ и управление»
(27.09.03).
Основной целью пособия является формирование и развитие иноязычной
профессиональной коммуникативной компетентности студентов компьютерных
специальностей на старших курсах технического вуза для осуществления профессионально
ориентированного общения с зарубежными специалистами в интенсивно развивающейся
сфере международного научно-технического содружества.
Изучение материала предлагаемого пособия предоставит возможность студентам
совершенствовать профессиональную компоненту инженерного образования с акцентом на
их профильную специальность, повышать мотивацию к изучению иностранного языка для
профессиональных целей.
Данное учебное пособие также может быть использовано студентами, аспирантами,
специалистами и широким кругом изучающих, имеющих базовый уровень
сформированности компетенций по английскому языку и интересующихся актуальными
проблемами в области развития компьютерных технологий и информационных систем.

«Рекомендовано Учебно-методическим объединением по образованию в


области лингвистики Министерства образования и науки Российской
Федерации в качестве учебного пособия для студентов-бакалавров технических
направлений»

Рецензенты:
К.ф.н., доцент, заведующий кафедрой английского языка ТГПИ Е.В. Полякова.
К.п.н., доцент кафедры иностранных языков ИУЭС ЮФУ О.Н. Черноморова.

© М.Г. Бондарев, А.С. Андриенко,


Л.В. Буренко, О.Г. Мельник, Э.А. Сидельник.
2014.

English for special purposes


Computer Engineering 3

Предисловие
Практика организации современного учебного процесса, необходимость повышения
качества образования в отечественных высших учебных заведениях технического
профиля актуализирует необходимость изучения дисциплины «Иностранный язык для
профессиональных (специальных) целей» с целью развития и совершенствования
определенного программными документами уровня сформированности иноязычной
коммуникативной профессиональной компетентности студентов. Развитие иноязычной
профессиональной коммуникативной компетентности позволит студентам и будущим
выпускникам осуществлять эффективное профессионально ориентированное общение со
специалистами других стран, участвовать в процессе академической и профессиональной
мобильности в национальном и международном образовательном поликультурном
пространстве на современном этапе интеграции вузов, быть конкурентоспособными на
рынке труда, совершенствовать и приумножать национальные достижения.
Учебное пособие “Computer engineering” разработано с учетом программы обучения
иностранному языку для студентов неязыковых вузов по направлениям «Информатика и
вычислительная техника» (08.03.01); «Автоматизация технологических процессов и
производств» (15.03.04); «Информационные системы и технологии» (09.03.02) и
«Системный анализ и управление» (27.09.03). Аутентичный текстовый материал
тематических разделов пособия и разработанная система упражнений имеют
профессионально ориентированную проблематику. Уровень сложности текстового
материала, представленного в пособии, ориентирован на студентов с уровнем
сформированности лингвистической компетенции в объеме базового курса изучения
дисциплины «Иностранный язык». В вузе данный уровень эквивалентен первому и
второму курсам обучения студентов на образовательном уровне бакалавриата.
Текстовый материал и система заданий учебного пособия могут быть использованы
для групповой и самостоятельной работы студентов в аудитории под руководством
преподавателя, а также для внеаудиторной работы. Организация обсуждения
предложенных в тематических разделах пособия проблем в студенческой аудитории в
форме ролевой игры, диспутов, игр-соревнований, обсуждений «круглого стола»,
проектов, презентаций и других форм общения студентов на иностранном языке
представляется значимой, так как имитирует ситуации естественной языковой
профессионально ориентированной коммуникации.
Пособие “Computer engineering” может быть рассчитано на 150-200 и более часов
аудиторной работы в вузе в зависимости от индивидуального календарного
планирования и, соответственно, структурно-содержательного блока рабочих
программ с учетом специфики обучения студентов в определенном вузе.
Весь предлагаемый материал разбит на 10 разделов (Units), содержащих следующие
проблемы для обсуждения: “Computer & Computing”, “Software”, “Portable computers”,
“Programming languages”, “Computer networking”, “Computer graphics”, “Multimedia”,
“Telecommunications”, “Virtual reality”, “Computer security”.
Каждый раздел пособия имеет свое тематическое направление. Структура раздела
позволяет студентам снять трудности языкового, речевого и психологического
характера в процессе усвоения учебного материала раздела, легко ориентироваться в
структурно-содержательном блоке текстовых заданий и упражнений. Каждый раздел
имеет в своей структуре следующие типы заданий:

English for Special Purposes


4 Computer Engineering

Lead In – знакомство с предлагаемой проблемой раздела, выполнение предтекстовых


заданий с целью предварительного обсуждения представленной проблемы с опорой на
фоновые знания студентов.
Pronunciation – имеет целью проведение фонетического тренинга блока основных
лексических единиц раздела.
Word Study – содержит дефиницию лексического материала по проблеме раздела с
целью дальнейшей эффективной работы с текстом.
Word Building – знакомство с особенностями словообразования.
В задании Grammar Focus – представлена грамматическая проблема для изучения
студентами, исходя из специфики конкретного тематического раздела пособия. Снять
грамматические трудности и изучить грамматический материал, представленный на
русском языке более подробно можно в секции Grammar Files, которая находится в конце
пособия после тематических разделов.
Specialist Reading – включает в себя аутентичный текстовый материал по проблеме
раздела.
Vocabulary in Use – предлагает задания лексического характера с опорой на
прочитанный текстовый материал.
Comprehension Check – представляет систему заданий с целью выявить степень
понимания прочитанного текстового материала.
Ряд следующих заданий: Writing, Get Real, Speaking, по мнению разработчиков пособия,
заслуживает особого внимания студентов, так как данные задания имеют целью не
только интенсивное совершенствование всех видов речевой деятельности студентов,
но и эффективное развитие творческого мышления и индивидуального подхода
студентов к рассмотрению проблемы раздела в процессе подготовки.
Разделы Writing и Speaking содержат задания, имеющие целью развитие творческого
мышления и индивидуальной точки зрения студентов, которые мотивируют обучаемых
к дальнейшему изучению и критическому видению предлагаемой проблемы,
дополнительному использованию различных информационных источников по изучаемой
теме.
Writing – в разделе представлена система письменных заданий.
Speaking – раздел включает в себя систему заданий с целью развития
коммуникативной компетенции студентов в процессе профессионально
ориентированного общения.
Get Real – в данном разделе даны ссылки на Интернет сайты, работа с которыми
поможет студентам творчески использовать дополнительный материал по
проблематике всех разделов пособия (особенно в ходе выполнения заданий разделов
Writing и Speaking) наиболее полно реализовать профессиональные интересы, проявить
индивидуальность и креативность в процессе подготовки к занятию. Использование
предлагаемых информационных источников поможет студентам в процессе выполнения
творческих заданий, составления докладов и подготовки презентаций. Возможность
использования видеоматериалов по выбору студентов с учетом их профессиональных
предпочтений приблизит атмосферу занятия к реальной языковой среде, сделает его
более информативным.
Применение на занятии информационных технологий в обучении, использование
студентами компьютерных средств и информационных источников сети Интернет в
аудитории и во внеаудиторное время способствуют повышению уровня
профессиональной компетентности, развитию современного взгляда на технические

English for special purposes


Computer Engineering 5

науки, формированию профессионального мышления средствами иностранного языка,


повышению мотивации к изучению дисциплины «Иностранный язык для
профессиональных (специальных) целей».
Supplementary Reading Section – содержит дополнительный текстовый материал по
проблеме тематических разделов пособия.
Word List – в данном разделе дан тезаурус языка для специальных целей “Computer
Engineering”. Список предлагаемых для изучения лексических единиц структурирован по
тематическим разделам пособия.
Система упражнений каждого тематического раздела пособия была разработана с
целью интенсивного вовлечения студентов в дискуссию, позволяющую анализировать
предложенную в разделе проблему с элементами обобщения и оценки, аргументировано
выражать собственную точку зрения.
Учебное пособие может быть предложено студентам, магистрантам, специалистам
и всем желающим изучать английский язык с целью развития и совершенствования
иноязычной профессиональной коммуникативной компетентности в процессе
обсуждения проблем профессионально ориентированной тематики, а также может
быть использовано преподавателями английского языка в учебном процессе в качестве
основного и дополнительного практического пособия по направлению “Computer
Engineering”.
Авторы надеются, что специфика структурно-содержательной организации
материала и разработанная система упражнений поможет преподавателю в выборе
адекватных методов и приемов в процессе планирования занятия по дисциплине.
Авторы пособия выражают благодарность заведующей кафедрой иностранных
языков Инженерно-технологической академии Южного федерального университета,
доктору педагогических наук, профессору Г.А.Краснощековой за ценные замечания и
плодотворное обсуждение идей, представленных в пособии; также авторы благодарны
рецензентам и коллегам кафедры иностранных языков ИТА ЮФУ за поддержку и
методические рекомендации в процессе практической работы над пособием.
Авторы с благодарностью примут все замечания, предложения и пожелания и учтут
их в дальнейшей работе. Официальный сайт ЮФУ: http://tti.sfedu.ru.

English for Special Purposes


6 Computer Engineering

Map of the book


Unit/page Word building Grammar Reading A

1. Computer & Useful suffixes Present Tenses What’s a computer


Computing p. 8 and Voices

2. Software Useful prefixes 1 Conditionals Software


p. 18

3. Portable computers Useful prefixes 2 Comparing & Portable Computers


p. 28 Predicting

4. Programming Up- & -up verbs Past tenses Programming


languages Language
p. 38
5. Computer Abbreviations Relative clauses Computer
networking with a participle Networking
p. 48

6. Computer graphics Noun suffixes -ing forms Computer Graphics


p. 58

7. Multimedia Useful prefixes 3 Participle II Multimedia


p. 68

8. Telecommunication Suffixes -able, - Passive infinitives Telecommunication


p. 77 ize

9. Virtual reality -ed/-ing Noun attributes Virtual Reality


p. 86 adjectives

10. Computer Security Word building Infinitive Malicious software


p.96 revision Constructions

Grammar files p.107

Appendix p.120

Supplementary reading p.122

English for special purposes


Computer Engineering 7

Word list p.136

Map of the book


Reading B Writing Speaking Supplementary
reading
Typical PC Computer Computer history & Famous people in
hardware development evolution computer tech
development. CPU.
Operating system Computer OS Computer systems Unix
development

Tablet computers Tablet computers Predictions for the The future of


vs. laptops future Portable computers

History of Practical application Universal JAVA


Programming of computer programming
Languages languages language
TCP/IP vs. PPP LAN (WLAN) Computer Global networking
description networking infrastructure for the
21st century

Computer Computer graphics Computer graphics The concept of


animation technologies branches computer graphics

Multimedia Web Summary Multimedia Rich media features


Design applications

Satellite services Summary The role of Telecommunications


telecommunication save lives. Inosphere.

Head mounted Virtual reality Virtual reality Shadow dexterous


display devices & products hand
technology applications

Network security Computer crimes Computer security Phishing


management prevention

English for Special Purposes


8 Computer Engineering

Unit 1 Computer & Computing


Useful suffixes Present Tenses and Voices What’s a computer Typical PC hardware Introducing a problem

LEAD-IN: Computer evolution


1. Focus on the following stages of computer inventions’ development. Try to give the names of inventors
and denote the period of time when these inventions appeared.

 analytical engine  mechanical calculator


 abacus  punch card
 ENIAC*  analog computer
 transistor  digital computer
*Electronic Numerical Integrator and Computer
Will you add more information concerning the unit problem and give your opinion on further evolution in
computer development from abacus to modern and future-planned devices.

PRONUNCIATION
2. Make sure you pronounce the following words properly:
hardware ['hɑːdwɛə] keyboard ['kiːbɔːd]
software ['sɔftwɛə] application [æplɪ'keɪʃ(ə)n]
device [dɪ'vaɪs] circuitry ['sɜːkɪtrɪ]
embedded [ɪm'bedɪd] semiconductor [semɪkən'dʌktə]
computer [kəm'pjuːtə] chassis ['ʃæsi:]
punch card [pʌnʧ] [kɑːd] access ['æksəs]
communicate [kə'mjuːnɪkeɪt] data ['deɪtə]
technology [tek'nɔləʤɪ] digitization [dɪʤɪtaɪ'zeɪʃ(ə)n]

WORD STUDY
3. Translate the following definitions and memorize the terms:

English for special purposes


Computer Engineering 9

hardware (n) - the machines, wiring and other physical components of a computer
or other electronic system: processing hardware, storage
hardware;
integrated circuit (n) - an electronic circuit formed on a small piece of semiconducting
material: circuit board, circuit diagram, printed circuit (board);
computer (n) - an electronic device (machine) which is used for storing data,
organizing and finding words, numbers and pictures, for doing
calculations and for controlling other machines;
central processing unit (n) - the part of a computer in which operations are controlled and
executed;
input device (n) - a piece of computer equipment such as a keyboard which enables
you to put information into a computer;
memory-storage device(n) - the part of a computer in which data or program instructions can
be stored for retrieval;
bus (n) - a distinct set of conductors carrying data and control signals within
a computer system, to which pieces of equipment may be
connected in parallel;
mainframe (n) - a large high-speed computer, especially one supporting numerous
workstations or peripherals;
software (n) - the collection of computer programs and related data that provide
the instructions telling a computer what to do: system software,
application software;
operating system (n) - the system software that allows all the hardware and software
components to work together. It consists of a set of programs that
manages all the computer's resources, including the data in main
memory and in auxiliary storage.
chassis (n) - the frame, base of a device, equipment or a vehicle onto which the
metal covering is fixed;
semiconductor (n) - a material, such as silicon, which allows electricity to move through
it more easily when its temperature increases, or an electronic
device made from this material;
digitization (n) - the process of putting information into digital form, usually so that
it can be processed by a digital computer.

4. Match the following words with their synonyms (A, B) and the Russian equivalents (C, D):

A B C D
technology system unit input device встроенный
data monitor application аппаратное обеспечение
software exchange information keyboard доступ
screen facility digitization оцифровка
main memory ways to perform tasks output device устройство ввода
chassis RAM access клавиатура
device programs and data hardware устройство вывода
communicate information embedded приложение

English for Special Purposes


10 Computer Engineering

5. Match a verb in A with a noun in B:


A B
connect the net
perform a button
store the system
transmit data
push signals
surf the expenses
calculate specific tasks
computerize two computers together

6. Complete the puzzle using the clues.

a small hand-held device which is moved across a mat or flat


surface to move the cursor on a computer screen e

a panel of keys that operate a computer or


typewriter b d

a device with a screen on which words or


pictures can be shown o

a connection technology for attaching peripheral


devices to a computer, providing fast data exchange b

a computer input device containing


different touch-sensitive areas
t h

permanent software programmed into a


read-only memory f r m k

WORD BUILDING: “-wares”

The suffix -ware refers to products of


the same type. In computing,
software refers to programs executed
by a computer, as opposed to
hardware which concerns physical
devices on which programs run. It is
commonly used to form jargon terms
for different classes of software.
7. Match the words with their definitions.
freeware designed to infiltrate or damage a computer (e.g. viruses, Trojan horses)
shareware devised to display advertisements; some includes spyware
malware available free of charge, but protected by copyright: it differs from 'free software", which
can be changed and distributed subject to license
spyware enables a group of people connected to a network to work on the same project

English for Special Purposes


Computer Engineering 11

adware distributed similarly to freeware, except that it requires payment after a trial period
groupware designed to monitor the actions of your computer and send this data via the Net

Consult your dictionary to find more “-wares”.

GRAMMAR FOCUS : Present Tenses: Simple and Continuous (Active & Passive Voice)
8. Underline the correct form of the verb and translate the sentences. If you need help use GRAMMAR
FILES 1 (p. 107).
1. When one computer system is set up / sets up / set up to communicate with another
computer system, connectivity becomes / become an important system element.
2. People are the most important component / is the most important component of the
computer system: they create / creates / are created the computer software
instructions and respond to the procedures that those instructions present.
3. Computer uses / is used / are using to convert data into information and to store
information in the digital form.
4. Nowadays computer development is rapidly progressing / rapidly progresses.
5. Researchers are currently developed / are currently developing microchips called
digital signal processors (DSPs).
6. Data feed / is feeding / is fed into the computer's memory.
7. The main memory holds / is holding / is held the instructions and data which are
being processed / are processed / are processing by the CPU.
8. Peripherals include /are including / are included storage devices and input/output
devices.
9. Disk drives are used / is used / are using to read and write data on disks.
10. Input devices enable / are enabled / were enabled data to go into the computer’s
memory.

SPECIALIST READING A: What is a computer?

English for Special Purposes


12 Computer Engineering

9. Before starting, answer the following questions. The term computer is used to describe a device made
This kind of information is well known and you will up of a combination of electronic and electromechanical
deal easily with the quiz. components. Computer has no intelligence by itself and
COMPUTER-quiz is referred to as hardware which is the computer's
Who founded Microsoft physical electronic and mechanical parts. A computer
Charles Babbage system can be viewed as consisting of five most vital
corporation?
elements: _____________________________________
Who set up Apple
Herman Hollerith ______________. When one computer system is set up
Computers’ Corporation? to communicate with another computer system,
Who invented a tabulating connectivity becomes the sixth system element of the
machine using punched Bill Gates total computer system.
cards for computation? ______________________________________________
Who designed the _________________: they create the computer
George Boole software instructions and respond to the procedures
“analytical engine”?
that those instructions present.
Who developed logical Steven Jobs and
The basic job of the computer is the processing of
algebra? Stephen Wozniak
information. Computers accept information in the form
10. These phrases and sentences have been of instruction called a program and characters called
removed from the text. data to perform mathematical and logical operations,
1. There are two different types of computers – and then give the results. The data is raw material while
information is organized, processed, refined and useful
analog and digital.
for decision making. Computer is used to convert data
2. People are the most important component of
into information. Computer is also used to store
the computer system… information in the digital form.
3. The most common form of computer in use ______________________________________________
today is the embedded computer. ________________________. Analog computers solve
4. In addition, hardware devices can include problems by using continuously changing data
external components... (temperature, pressure, voltage) rather than by
5. An incredible important contribution in manipulating discrete binary digits (1s and 0s) as digital
computer technology development … computers do. In current usage, the term computer
6. IBM made punch-card office machinery… usually refers to digital computers. Hybrid computers
combine elements of both types. Digital computers are
7. …Hardware, Software, People, Procedures, and
generally more effective than analog computers for
Data.
three principal reasons: they are not as susceptible to
8. This process is called digitization. signal interference; they can convey data with more
Read the text quickly and fill in the gaps with precision; and their coded binary data are easier to store
the suitable phrases or sentences to form a and transfer than are analog signals.
logically correct text. Mind that one extra Such computers can represent any type of data, from
sentence you don’t have to use is given. numbers and letters to musical notes._________
__________________________________________.
A vague image of modern computer was first outlined
in 1833 by British mathematician Charles Babbage. His
design of an “analytical engine” contained all the
necessary elements of a modern computer: input
devices, a store (memory), a mill (computing unit), a
control unit, and output devices.
Ch.Babbage H.Hollerith J. Atanasoff C. Berry

English for Special Purposes


Computer Engineering 13

The design called for more than 50,000 moving parts in


a steam-driven machine as large as a locomotive. Most of
its actions were executed through the use of perforated
cards: a method that was already used to control
automatic silk-weaving machines called Jacquard looms
by the name of the inventor. It was one of the first
programmable devices.
In the 1880s Herman Hollerith developed a calculating
machine able to count, collate, and sort information
stored on punch cards. His “tabulator” quickly
demonstrated the efficiency of mechanical data
manipulation. In 1896 Hollerith founded the Tabulating
Machine Company to produce similar machines. In 1924
the company changed its name to IBM. The most popular
of operating systems – which are used to run Comments:
1
mainframes, built by the industry leader IBM – include IBM MVS (Multiple Virtual Storage) - множественное
1 2 3
MVS , DOS/VSE , and VM .______________________ виртуальное хранилище, операционная система,
___________________________ the dominant business разработанная IBM (1974).
2
information system until the late 1960s. DOS/VSE (Virtual Storage Extended) – дисковая
From 1939 to 1942, American physicists John V. операционная система с расширенной виртуальной
Atanasoff and Clifford Berry built a computer based on памятью.
3
the binary numbering system. Their ABC (Atanasoff-Berry VM (Virtual Machine) — операционная система для
Computer) is often credited as the first electronic digital мэйнфреймов фирмы IBM. Первая версия была
computer. Furthermore, George Boole, a British выпущена в 1972 году для семейства компьютеров
mathematician, had already devised a complete system IBM System/370.
of binary algebra that could be applied to computer
circuits. Boolean algebra, developed in 1848, bridged the VOCABULARY IN USE
gap between mathematics and logic by symbolizing all
11. Replace the italicized words with the
information as being either true or false.
equivalents from the box:
_______________________________________________
______________ is made by Steven Jobs and Stephen modern plain invented consider kept
Wozniak, the founders of the Apple II computer. It is also productivity different kinds tiny
worth mentioning William Henry Gates III, (known as Bill information presented give commands to
Gates), the father of Microsoft Company. The first devices
that resemble modern computers date to the mid-20th 1. Software consists of the programs that instruct
century (1940–1945). Early electronic computers were the hardware to perform tasks.
the size of a large room. Modern computers are based on 2. Varieties of types of integrated circuitry are
tiny integrated circuits and are millions to billions of
used in contemporary supercomputers.
3. Embedded computers are small, simple
times more capable while occupying a fraction of the
devices, which are used to control other
space. _________________________________________
devices.
__________________. Embedded computers are small,
4. Herman Hollerith, an American inventor,
simple devices that are used to control other devices - for
fabricated a calculating machine able to count
example; they may be found in machines ranging from
information stored on punch card.
fighter aircraft to industrial robots, digital cameras, and 5. A device called “tabulator” quickly
children's toys. demonstrated the efficiency of mechanical
The dominant operating system is the disk operating data manipulating.
system (DOS) developed by Microsoft Corporation. Also 6. IBM introduced its Personal Computer in 1981.
popular is Microsoft's Windows NT, an adjunct to DOS
that provides enhanced computer graphics.

English for Special Purposes


14 Computer Engineering

COMPREHENSION CHECK
12. Put the facts in the logical order as they are given in the text:

 Steven Jobs and Stephen Wozniak, his engineer partner, founded a company
named Apple Computer, Inc.
 Hollerith founded the Tabulating Machine Company to produce similar
machines.
 Bill Gates founded Microsoft.

 IBM introduced its Personal Computer (PC).

 American physicists John V. Atanasoff and Clifford Berry built a computer


based on the binary numbering system.

13. Mark the following statements as “true” or “false”, correct the false ones. Find information in the text if
necessary.
True False
1. A computer has an artificial intellect.
2. Connectivity can be viewed as an important element of a computer system.
3. The basic job of a computer is to encode algorithms written in a programming
language.
4. Hybrid computers have elements of both analog and digital computers.
5. Hardware is used to store data.
6. American mathematician Charles Babbage was the first to outline a vague
image of a modern computer.
7. The ABC Computer was the first image of the first electronic digital computer.
8. Steven Jobs and Stephen Wozniak were the founders of the Apple II computer.
9. The dominant operating system was developed by Apple Computer Company.
10. Nowadays DOS is not the prevailing operating system.

SPECIALIST READING B: Typical PC hardware

14. Read the text and underline the information to prove the following statements:
1. Software is not a part of hardware.
2. The term” motherboard” is the point of argument.
3. External Bus Controllers are used to connect to external peripherals.
15. Say if the text touches upon the following points (tick them) and put the information in the correct
order:
X № X №
RAM description information about CAE software
power supply features central processing unit functions
external components of a computer networking connections description
history of computer-aided engineering (CAE) the definition of the term “mouse”
typical personal computer case keyboard usage

English for Special Purposes


Computer Engineering 15

1) A personal computer is made up of multiple PCI-E, PCI-E 2.0, or AGP), in the form of a Graphics Card.
physical components of computer hardware, upon 10) Internal storage encompasses hardware that
which can be installed an operating system and a keeps data inside the computer for later use and
multitude of software to perform the operator's desired remains persistent even when the computer has no
functions. Typical personal computers consist of a case power (hard disk – medium-term storage of data; solid-
or chassis in a tower shape (desktop) and the following state drive – a device similar to hard disk, but
parts: containing no moving parts; disk array controller – a
2) Motherboard is the "body" or mainframe of the device to manage several hard disks to achieve
computer. The term “motherboard” is the point of performance or reliability improvement).
argument in the USA even at Court level. It was even 11) Sound card enables the computer to output
proposed to use the term “mainboard” not to give any sound to audio devices, as well as accept input from a
privileges to male or female belonging of the word. microphone. Most modern computers have sound
3) Central processing unit (CPU) performs most of cards built-in to the motherboard, though it is common
the calculations which enable a computer to function; for a user to install a separate sound card as an
sometimes it is referred to as the "brain" of the upgrade.
computer. 12) Networking connects the computer to the
4) Computer fan is used to lower the temperature Internet and/or other computers (modem is used for
of the computer; a fan is almost always attached to the dial-up connections, network card – for DSL/Cable
CPU, and the computer case will generally have several internet, and/or connecting to other computers, direct
fans to maintain a constant airflow. cable connection – use of a null modem, connecting
1
5) Random Access Memory (RAM ) is also known as two computers together using their serial ports or a Lap
the physical memory of the computer. Fast-access link cable, connecting two computers together with
memory that is cleared when the computer is powered their parallel ports).
down. RAM attaches directly to the motherboard, and 13) Hardware devices can include external
is used to store programs that are currently running. components of a computer system. The following are
2
Firmware is loaded from the Read only memory ROM either standard or very common including various input
run from the Basic Input-Output System (BIOS) or in and output devices, usually external to the computer
newer systems Extensible Firmware Inter-face (EFI) system.
compliant. 14) Keyboard is used to input text and characters by
6) Internal Buses are connections to various internal depressing buttons (referred to as keys), similar to a
3
components: PCI, PCI-E, USB, Hyper Transport, CSI , and typewriter. The most common English-language key
AGP (being phased out). layout is the QWERTY layout. Mouse is a pointing device
7) External Bus Controllers are used to connect to that detects two dimensional motions relative to its
external peripherals, such as printers and input devices. supporting surface. Webcam is a low resolution video
These ports may also be based upon expansion cards, camera used to provide visual input that can be easily
attached to the internal buses. transferred over the internet. Microphone - an acoustic
8) Controllers for hard disk, CD-ROM and other sensor that provides input by converting sound into
drives for a PC are IDE/ATA; the controllers sit directly electrical signals. Printer is a machine that can be
on the motherboard or on expansion cards, such as a connected to a computer in order to make copies on
Disk array controller. IDE is usually integrated, unlike paper of documents or other information held by the
SCSI (Small Computer System Interface) which can be computer. Monitor is a screen which displays an image
found in some servers. The floppy drive interface is a generated by a computer. Computer speakers, or
4
legacy MFM interface, which is now slowly multimedia speakers, are external speakers, commonly
disappearing. All these interfaces are gradually being equipped with a low-power internal amplifier. The
5
phased out to be replaced by SATA and SAS . standard audio connection is a 3.5mm (1/8 inch) stereo
9) Video display controller produces the output for jack plugs often colour-coded lime green (following the
the visual display unit. This will either be built into the PC 99 standard) for computer sound cards.
motherboard or attached in its own separate slot (PCI,

English for Special Purposes


16 Computer Engineering

Comments
1
RAM – запоминающее устройство с произвольной выборкой (ЗУПВ).
2
ROM – постоянное запоминающее устройство (ПЗУ).
3
CSI – высокоскоростная шина Common Systems Interconnect - последовательный точка-точка интерфейс.
4
MFM – устаревшая ныне шина для подключения жестких дисков. Использовалось два шлейфа – один для
управляющих сигналов, другой – для обмена данными. Один из шлейфов был очень похож на шлейф для FDD.
5
SAS – компьютерный интерфейс, разработанный для обмена данными с такими устройствами, как
жёсткие диски, накопители на оптическом диске и т. д. для замены параллельного интерфейса SCSI и
обеспечения более высокой пропускной способности. SAS совместим с интерфейсом SATA, поддерживает
передачу информации со скоростью до 3 Гбит/с (в перспективе до 10 Гбит/с).

WRITING: Computer development


16. What are in your opinion on the most
urgent computer problems? Could you
give the ways of future computer
development? Give characteristics of your
own computer components and try to
describe a model of a Computer of the
Future. Do you consider that the future of
human development belongs to the
computer? Prove your ideas. Use links
from Get Real to help you.

● Get Real
Check these websites to find out more
additional computer history facts and
the latest computer evolution
achievements:
http://www.accessscience.com
http://science news.org

English for Special Purposes


Computer Engineering 17

SPEAKING: Computer history and evolution


17. Work in pairs or in groups with your partner(s) to discuss the following problems: “What type of
computer in your opinion is the most suitable for home and office use, for specific engineering tasks: for
Computer Aided Design (CAD), for instance, or other engineering fields?” “What are the most important
characteristics and the functions of main memory, I/O devices, storage devices, CPU?” “What peculiar facts
can you give about different computer programs and data, about CPU, the heart of the computer? (The
Supplementary Reading Section may help you).” “What will future computer technology development
result in”? Could you create a presentation on the problems, marked above? Role-play the discussion
problems in the form of a conference.

The following discourse markers may help you:

Introducing a I would like to present you (to touch upon) a problem; I’d like to state (maintain) the
problem importance of this problem, to say that this problem is very vital and extremely popular;
I’d like to mention that I have studied and used a lot of information from the following
(different) sources.
Carving the I’d like analyze the main facts; It’s worth mentioning; I’d like to give my opinion on the
main idea problem, which concerns…; I share the authors opinion (I agree/disagree)
Summing up Now I’d like to draw a conclusion; I’d like to conclude; summing up; as I’m running out of
the presented time I’d like to summarize
information
on a problem

English for Special Purposes


18 Computer Engineering

Unit 2 Software
Useful prefixes 1 Conditionals Software Operating system

LEAD-IN: Operating Systems


1. Study the following list of Operating Systems. What other Operating Systems could you name? Will you
characterize them? What are the main functions of OS?

• Slax • MINIX3
• Open SUSE • Haiku
• React OS • Ubuntu
• Mona OS • Symbian OS

PRONUNCIATION
2. Make sure you pronounce the following words properly:
amount [ə'maunt] require [rɪ'kwaɪə]
commercially [kə'mɜːʃ(ə)lɪ] schedule ['ʃedjuːl ];
extensively [ek'sten(t)sɪvlɪ] sequence ['siːkwən(t)s]
function ['fʌŋkʃ(ə)n] subroutine ['sʌbruːˌtiːn]
fundamental [fʌndə'ment(ə)l] total ['təut(ə)l]
laboratory [lə'bɔrət(ə)rɪ] typing ['taɪpɪŋ]
provide [prə'vaɪd] instruction [ɪn'strʌkʃ(ə)n]

WORD STUDY
3. Translate the following definitions and memorize the terms:

software (n) - the collection of computer programs and related data that provide
the instructions telling a computer what to do: system software,
application software;
operating system (n) - the system software that allows all the hardware and software
components to work together; a set of programs that manages all
the computer's resources;
bug (n) - an error in a computer program or system;
computer programmer (n) - a person whose job involves writing programs for computers;

English for Special Purposes


Computer Engineering 19

debugging (n) - the process of identifying and removing errors from computer
hardware or software;
disk operating system (n) - a computer operating system that controls and manages files and
programs stored on disk; DOS is a shorthand term for several
closely related operating systems (MS-DOS, PC DOS, DR-DOS, etc.)
that dominated the IBM PC compatible market;
flowchart (n) - a graphical representation of a computer program in relation to its
sequence of functions;
graphical user interface (n) - a visual way of interacting with a computer using items such as
windows, icons, and menus, used by most modern operating
systems;
LINUX (n) - an operating system modeled on Unix, whose source code is
publicly available at no charge;
program (n) - a set of instructions that a computer follows in order to perform a
particular task;
schedule (n) - a plan for carrying out a process or procedure, giving lists of
intended events and times;
eliminate (v) - completely remove or get rid of something;
file (n) - holder, cover, case, box, etc. for keeping data;
server (n) - a computer or computer program which manages access to a
centralized resource or service in a network;
UNIX (n) - a computer operating system developed in 1969 by K. Thompson
and D. Ritchie; today is used to describe any operating system that
conforms to Unix standards, meaning the core operating system
operates the same as the original Unix operating system;

4. Match the following words with their synonyms (A, B) and the Russian equivalents (C, D):

A B C D
acquaint error restore удалять ошибки
coder introduce paging file последовательность
series eliminate task manager ядро
bug programmer kernel количество
expel time-table calculation восстанавливать
schedule performance flowchart диспетчер задач
execute sequence debug обеспечивать
operation edition sequence блок-схема
version carry out provide вычисление
efficiency procedure amount файл подкачки

English for Special Purposes


20 Computer Engineering

5. Match a verb in A with a noun in B:

A B
store a computer
conform mistakes
solve data
load the instructions
embed to standards
eliminate a problem
access software
follow the files

6. Complete the puzzle using the clues.

a set of rules to be followed in calculations or other


problem-solving operations, especially by a computer a r

a graphical representation of a computer


program in relation to its sequence of functions l c t

a program that controls the operation of a


device such as a printer or scanner
i

an open-source version of the UNIX


operating system
n

the simultaneous execution of more


than one task by a single CPU
m i k g

WORD BUILDING: Useful prefixes 1

A prefix is placed at the beginning of a word to modify or change its meaning. These are
some prefixes used in English for Computer Engineering. You can find more detail or
precision for each prefix in a dictionary. The origins of words are extremely complicated.
You should be very careful, because what often appears to be a prefix is not a prefix at all.

7. Match the prefixes with their meanings in the box. Two of them have the same meaning.

again not (negative) before

re- means ______________________________________________________________


pre- means ______________________________________________________________
dis- means ______________________________________________________________
un- means ______________________________________________________________

8. Write a prefix in front of each word (some of them can take more than one prefix).

English for Special Purposes


Computer Engineering 21

___ write ___ titled


___ do ___ appear
___ like ___ format
___ agree ___ finish
___ view ___ start

GRAMMAR FOCUS : Conditionals


9. Underline the correct form of the verb and translate the sentences. If you need help you can use
GRAMMAR FILES 2 (p. 108).

1. If system software were not / was not / is not a permanent component of the computer, it wouldn’t /
does not / will not control its fundamental function.
2. If a database system won’t include / doesn’t include / didn’t include programs, it isn’t possible /
wasn’t possible / won’t be possible to allow multiple users to access the files concurrently.
3. If we manage / can manage / managed to store endless amounts of data, probably, it wouldn’t be
necessary to have such hard storage devices we have now.
4. Even if a program works / will work / worked correctly it will have bugs.
5. If the name “UNIX” wasn’t / weren’t / isn’t a trademark of The Open Group, it wouldn’t license it for
use with any operating system.
6. If operating system was not responsible / were not responsible / is not responsible for the
management and coordination activities of the computer, it wouldn’t serve as an interface between
Hardware and User.

10. Complete these sentences with the correct form of the verbs in brackets.
1. If you (bring) __________ your digital video camera, we can make a movie on my PC.
2. You won't be able to play those video files if you (not have) __________ the correct plug-in.
3. If the marketing manager (have) __________ PowerPoint, she could make more effective
presentations.
4. If I could afford it, I (buy) __________ a new game console.
5. If I had the money, I (invest) __________ in some new multimedia software.

SPECIALIST READING A: Software

English for Special Purposes


22 Computer Engineering

11. Before starting, answer the following questions. Two types of software instruct a computer to
This kind of information is well known and you’ll perform its tasks — systems software and applications
deal easily with the quiz: software.
Systems software is a permanent component of the
COMPUTER-quiz
computer that controls its fundamental functions.
What is the purpose of a device driver? Different kinds of applications software are loaded
What are apps? into the computer as needed to perform specific tasks
What is the difference between Notepad and for the user, such as word processing. Applications
WordPad? software requires the functions provided by the
What functions does Adobe Reader perform? systems software.
What is DOS? Modern operating systems provide a graphical user
interface (GUI) to make the applications software
12. Read the text and study the information about easier to use.
processes called ‘alpha testing,’ ‘GUI-based A GUI allows a computer user to work directly with
software’, UNIX OS, a version of UNIX called Linux an application program by manipulating text and
graphics on the monitor screen through the keyboard
and debugging. Be ready to find out more
and a pointing device such as a mouse rather than
information about these problems and to discuss
solely through typing instructions on command lines.
them.
The Apple Computer company's Macintosh computer,
introduced in the mid-1980s, had the first
commercially successful GUI-based software.
Another example of systems software is a database
system. A database system works with the file system
and includes programs that allow multiple users to
access the files concurrently. Computers that use disk
memory-storage systems are said to have disk
operating systems (DOS). Popular operating systems
for PCs are MS-DOS and Windows, developed by the
Microsoft Corporation in the early 1980s and 1990s,
respectively. Workstations, servers, and some
mainframe computers often use the UNIX OS
originally designed by Bell Laboratories in the late
1960s. A version of UNIX called Linux gained
popularity in the late 1990s for PCs.
Software is written by professionals known as
computer programmers. Most programmers in large
corporations work in teams, with each person
focusing on a specific aspect of the total project.
Computer programs consist of data structures and
algorithms. Data structures represent the information
that the program processes. Algorithms are the
sequences of steps that a program follows to process
the information. For example, a payroll application
program has data structures that represent personnel

English for Special Purposes


Computer Engineering 23

information, including each employee's hours worked VOCABULARY IN USE


and pay rate. The program's algorithms include 13. Replace the italicized words with the
instructions on how to compute each employee's pay equivalents from the box:
and how to print out the paychecks.
Generally, programmers create software by using the hard get rid of contain explanation
following development process: stable big parts order
1) Understand the software's requirements, which is
1. System software is a permanent component of
a description of what the software is supposed to do.
Requirements are usually written not by programmers the computer that controls its functions.
but by the people who are in close contact with the 2. Most programmers in great corporations work
future customers or users of the software. in teams.
2) Create the software's specifications, a detailed 3. Often the most difficult step in a program
description of the required tasks and how the development is the debugging stage.
programs will instruct the computer to perform those 4. When you debug the program you eliminate
tasks. The software specifications often contain programming mistakes.
diagrams known as flowcharts that show the various 5. The program’s algorithms include instructions.
modules, or parts, of the programs, the order of the 6. Algorithms are the sequences of steps that a
computer's actions, and the data flow among the program follows to process the information.
modules. 7. Software specifications are a detailed
3) Write the code – the program instructions description of the required tasks.
encoded in a particular programming language. 8. Large programs consist of dozens of modules
4) Test the software to see if it works according to broken up into smaller units.
the specifications and possibly submit the program for
alpha testing, in which other individuals within the 14. Complete the following sentences with the
company independently test the program. appropriate words:
5) Debug the program to eliminate programming
mistakes, which are commonly called bugs. (The term encoded interface instructions programmers
bug was coined in the early 1940s, when programmers loaded programs sequences eliminate bugs
looking for the cause of a mysterious malfunction in 1. Applications are ________ into the computer as
the huge Mark I computer discovered a moth in a vital
needed to perform specific tasks for the user.
electrical switch. Thereafter the programmers referred
2. Modern operating systems provide graphical
to fixing programming mistakes as debugging.)
user ________ to make the applications
6) Submit the program for beta testing, in which
software easier to use.
users test the program extensively under real-life
3. A database system includes ________ that
conditions to see whether it performs correctly.
allow multiple users to access the files
7) Release the product for use or for sale after it has
passed all its tests and has been verified to meet all its concurrently.
requirements. 4. Software is written by ________
These steps rarely proceed in a linear fashion. 5. The code is the program instructions ________
Programmers often go back and forth between steps in a particular programming language.
3, 4, and 5. If the software fails its alpha or beta tests, 6. To debug the program is to ________ mistakes,
the programmers will have to go back to an earlier which are called ________
step. Often the most difficult step in program 7. Algorithms are the ________ of steps that a
development is the debugging stage. A program is program follows to process the information.
considered to have bugs if it is slower or less efficient 8. The program algorithms include a set of
than it should be. ________

English for Special Purposes


24 Computer Engineering

PROBLEM SOLVING
15. Which IT professionals are described here? Complete these definitions with jobs from the box.
software engineer computer security specialist blog administrator help desk technician
DTP operator hardware engineer network administrator webmaster
1. A _________________________ designs and develops IT devices.
2. A _________________________ writes computer programs.
3. A _________________________ edits and deletes posts made by contributors to a blog.
4. A _________________________ uses page layout software to prepare electronic files for network.
5. A _________________________ manages the hardware and software that comprise a publication.
6. A _________________________ designs and maintains websites.
7. A _________________________ works with companies to build secure computer systems.
8. A _________________________ helps end-users with their computer problems in person, by email
or over the phone.

COMPREHENSION CHECK
16. Give definitions to the following notions:

algorithm

instruction

specification

requirement

module

17. Mark the following statements as “true” or “false”, correct the false ones. Find information in the text if
necessary.
True False
1. A database system is another example of systems hardware.
2. LUNIX is another reimplementation of UNIX.
3. UNIX-like systems was run in the early 1990s and was applied for PCs.
4. The Macintosh Computer company had the first commercially successful GUI-
based software.
5. Algorithms are the sequences of steps that a program follows to process the
information.

18. Answer the following questions:

1. Why is it so important to understand the software requirements?


2. What does it mean “to write the code”?
3. For what purpose should programmers debug the program?
4. What is an “algorithm”?
5. When did The Apple Computer Company’s Macintosh computer appear?

English for Special Purposes


Computer Engineering 25

SPECIALIST READING B: Operating system


19. Read the text quickly and say if it touches upon An operating system (commonly abbreviated as either
the following ideas. OS or O/S) is an interface between hardware and user.
Yes No An OS is responsible for the management and
The description of operating systems. coordination of activities and the sharing of the
The versions of Microsoft Windows family. resources of the computer.
The operating system acts as a host for computing
Some facts of microchips development.
applications run on the machine. One of the purposes of
The structure of integrated circuit.
an operating system is to handle the details of the
The history of languages of programming. operation of the hardware.
Characteristic of UNIX-like family. Operating systems offer a number of services to
The history of Mac OS. application programs and users. Applications access
The description of operating systems. these services through application programming
interfaces (APIs) or system calls. By invoking these
20. Find in the text and mark the information to interfaces, the application can request a service from the
prove the following statements: operating system, pass parameters, and receive the
1. the Unix-like family is a diverse group of results of the operation. Users may also interact with the
operating systems with several major sub- operating system with some kind of software user
categories; interface (SUI) such as typing commands by using
2. software is not a part of hardware; command line interface (CLI) or using a graphical user
interface (GUI, commonly pronounced “gooey”). For
3. UNIX-like systems run on a wide variety of
hand-held and desktop computers, the user interface is
machine architectures;
generally considered part of the operating system. On
4. Microsoft Windows versions are a family of
large multi-user systems like Unix and Unix-like systems,
proprietary operating systems. the user interface is generally implemented as an
application program that runs outside the operating
system. Whether the user interface should be included
as a part of the operating system is now a point of
contention.
Common contemporary operating system families
include BSD, Darwin (Mac OS X), GNU/Linux, SunOS
(Solaris/Open Solaris), and Windows NT (XP/Vista/7/10).
While servers generally run Unix or some Unix-like
operating system, embedded system markets are split
amongst several operating systems.
Dave Cutler developed the VMS operating system for
Digital Equipment Corporation for Microsoft. Steve Jobs,
a co-founder of Apple Inc., started NeXT Computer Inc.,
which developed the Unix-like NEXTSTEP operating
system. NEXTSTEP would later be acquired by Apple Inc.
and used, along with code from FreeBSD as the core of
Mac OS X.
Minix, an academic teaching tool which could be run
on early PCs, would inspire another reimplementation of
Unix, called Linux. Started by computer science student
Linus Torvalds with cooperation from volunteers over
the Internet, an operating system was developed with
the tools from the GNU Project.

English for Special Purposes


26 Computer Engineering

The Berkeley Software Distribution, known as BSD, is


the UNIX derivative distributed by the University of
California.
Microsoft Windows is a family of proprietary operating
systems that originated as an add-on to the older MS-
DOS operating system for the IBM PC. Modern versions
are based on the newer Windows NT kernel that was
originally intended for OS/2. Windows runs on x86, x86-
64 and Itanium processors.
The Unix-like family is a diverse group of operating
systems with several major sub-categories including
System V, BSD, and Linux (be acquainted with
supplementary reading text of the Unit). The name
"UNIX" is a trademark of The Open Group, which licenses Minix – MINIX is a Unix-like computer operating
it for use with any operating system that has been shown system based on microkernel architecture.
to conform to their definitions. "Unix-like" is commonly Andrew S. Tanenbaum wrote the operating
used to refer to the large set of operating systems, which system to be used for educational purposes;
resemble the original Unix. MINIX also inspired the creation of the Linux
Unix-like systems run on a wide variety of machine kernel. Its name is a portmanteau of the words
architectures. They are used heavily for servers in minimal and Unix.
business, as well as workstations in academic and Samba – is a free software re-implementation of
engineering environments. Free Unix variants, such as SMB/CIFS networking protocol, originally
GNU, Linux and BSD, are popular in these areas. developed by Australian Andrew Tridgell. As of
Some Unix variants like HP's HP-UX and IBM's AIX are version 3, Samba provides file and print services
designed to run only on that vendor's hardware. Others, for various Microsoft Windows clients and can
such as Solaris, can run on multiple types of hardware, integrate with a Windows Server domain, either
including x86 servers and PCs. Apple's Mac OS X, a hybrid as a Primary Domain Controller (PDC) or as a
kernel-based BSD variant derived from NEXTSTEP, Mach, domain member. It can also be part of an Active
and FreeBSD, has replaced Apple's earlier (non-Unix) Mac Directory domain.
OS. LDAP – Lightweight Directory Access Protocol is
Unix interoperability was sought by establishing the an application protocol for querying and
POSIX standard. The POSIX standard can be applied to modifying directory services running over TCP/IP.
any operating system, although it was originally created Domain name server – DNS, domain name server,
for various Unix variants. the system that automatically translates Internet
Mac OS X is a line of partially proprietary, graphical addresses to the numeric machine addresses that
operating systems developed, marketed, and sold by computers use.
Apple Inc., the latest of which is pre-loaded on all
currently shipping Macintosh computers. Mac OS X is the
successor to the original Mac OS, which had been Apple's
primary operating system since 1984. The most recent 21. Summarize the main ideas of the text using the
edition is Mac OS X v10.6, which was first made available following phrases:
on August 28, 2009. Releases of Mac OS X are named
This text concerns the problem of…
after big cats; the current version of Mac OS X is
Currently under development is…
nicknamed "Snow Leopard".
Mac OS X Server includes work group management and It is worth mentioning that…
administration software tools that provide simplified The main idea of this text is…
access to key network services, including a mail transfer We can draw a conclusion that…
agent, a Samba server, an LDAP server, a domain name
server, and others.

English for Special Purposes


Computer Engineering 27

WRITING: Computer OS development


22. Try to give your own ideas on the
following questions. What are in your
opinion the most urgent OS problems?
Could you give you opinion on the ways of
future OS development? Give
characteristics of your own OS on your
computer. Prove your ideas.Use links from
Get Real to help you.

● Get Real
Check these websites for useful
information:
www.coolwebmasters.com
http://en.wikipedia.org/

SPEAKING: Computer systems


23. Think of the computer system that will meet the needs of office users (software engineers, web
designers, computer security specialists, gamers etc.), complete the diagram, describe it and give reasons
for your choice. Study supplementary reading material and Internet sources in order to get useful
information.

PC

Software Hardware

OS Applications CPU Memory Peripherals

RAM ROM Input Output Storage

_____ _____ _____

English for Special Purposes


28 Computer Engineering

Unit 3 Portable computers


Useful prefixes 2 Comparing & Predicting Portable Computers Tablet computers Contrasting

LEAD-IN: Computer evolution


1. Read the lines from descriptions of some portable computers (B) and guess the type of a computer (A)
then match them with pictures below (1-5). Justify your guess. Give more details about each type. What
other types of portable computers are popular nowadays?
A B
 The personal digital assistant  …with handsfree interface, and usually some voice capability (speech
(PDA) recognition and speech synthesis)…
 The pocket computer  …it has a flat panel display and a keyboard, requiring a seated position and
both hands …
 The laptop  …it is something between a laptop and a PDA. They have a full keyboard
(often in reduced size), 11-13’ screens and usually no internal optical drive…
 The wearable computer  …it is a small calculator-sized handheld programmable computer…
 The Netbook  …usually held in one hand and operated with the other, can be used as an
organizer, a diary, a ‘to do’ list…

1 2 3 4 5

PRONUNCIATION
2. Make sure you pronounce the following words properly:
ultra-mobile ['ʌltrə 'məubaɪl] typical ['tɪpɪk(ə)l]
palmtop ['pɑːmtɔp] configuration [kənfɪgju'reɪʃ(ə)n]
wearable ['wɛərəbl] thickness ['θɪknəs]
designed [dɪ'zaɪnd] weigh [weɪ]
dimension [daɪ'men(t)ʃ(ə)n] weight [weɪt]
augment ['ɔːgmənt] behavioral [bɪ'heɪvjərəl]
optimize ['ɔptɪmaɪz] stylus ['staɪləs]
prosthetic [prɔs'θetɪk] isometric [ˌɪsə'metrik]
majority [mə'ʤɔrətɪ] companion [kəm'pænjən]

WORD STUDY
3. Translate the following definitions and memorize the terms:

English for Special Purposes


Computer Engineering 29

portable (adj) - having the ability to run on a variety of computers (portable software) without
reference to a particular type of hardware; small and lightweight, able to be
easily carried or moved (hardware);
chipset (n) - a highly integrated circuit on the motherboard of a computer that controls
many of its data transfer functions;
docking station (n) - a device used to connect one appliance to another, esp. a portable computer
and a desktop computer, to make use of its external power supply, monitor,
and keyboard, esp. to enable the transfer of data between the machines;
pen computing (n) - a computer system employing a user-interface using a pointing device plus
handwriting recognition as the primary means for interactive user input;
smartphone (n) - a mobile telephone with computer features that may enable it to interact with
computerized systems, send e-mails, and access the web;
touchscreen (n) - a visual display unit screen that allows the user to give commands to the
computer by touching parts of the screen instead of using the keyboard;
omit (v) - to neglect to do or include;
stylus (n) - an electronic input device that is used to draw or write on the screen;
slot (n) - or expansion slot, a spare space on the system board of a computer to which
expansion boards can be fitted;
performance (n) - the action or process of carrying out or accomplishing an action, task, or
function;
general-purpose (adj) - having a range of uses or applications; not restricted to one function;
optical disc (n) - an inflexible disc on which information is stored in digital form by laser
technology;
consistency (n) - agreement or harmony between parts of something complex; compatibility;
configuration (n) - the particular choice of hardware items and their interconnection that make
up a particular computer system;
pointing stick (n) - an isometric joystick used as a pointing device. It was invented by research
scientist Ted Selker and now it is present on many brands of laptops;
flip (adj) - an electronics form factor which is in two or more sections that fold via a
hinge.

4. Complete the puzzle using the clues and the words from exercises 2 and 3.

to work at several different tasks


simultaneously
t k

able to be carried or moved easily,


especially by hand p

denoting a computer system that is small


enough to be used at a desk k p
a computer input device in the form of a small
panel containing different touch-sensitive areas
t h
to modify something in order to achieve maximum
efficiency
p z

English for Special Purposes


30 Computer Engineering

5. Match the following words with their synonyms:

A B A B
trackpad neglect traditional size
housing mobile utilize operate
omit touchpad run conventional
portable consistency dimension improve
compatibility case enhance use

6. Match A and B to make up phrases often used to speak about portable computers and then give their
Russian equivalents (C):

A B C
display housing
docking recognition
voice mode
high battery life
keyboard station
longer resolution
pointing battery
rechargeable device
portrait panel

WORD BUILDING : Useful prefixes 2


Prefix Meaning Examples
macro-/mega- large or great in size or duration macroeconomics, megabyte
micro- very small microprocessor
multi- many or much multi-access
semi- half semiconductor
dec- ten decimal
de- remove/reduce decode
re- again/back reboot
ultra- very/extremely ultramodern

7. Fill in the gaps with the correct prefix from the list.

re- de- dec- semi- ultra- mega- micro- multi-


1. Portable computers, by their nature, are _____computers.
2. A _____byte equals approximately one million bytes.
3. Once you finish your program, you will have to test it and _____bug it to remove all the mistakes.
4. The introduction of _____conductor technology revolutionized the computer industry.
5. If a computer system has two or more central processors which are under common control, it is called a
_____processor system.
6. The _____imal system is a number system with a base of 10.
7. The _____chargeable battery of a laptop is charged from an AC adapter and typically stores enough
energy to run the laptop for 2 to 3 hours in its initial state.
8. _____portables typically weigh less than four pounds and, when closed, are 1.5" thin or thinner.

English for Special Purposes


Computer Engineering 31

GRAMMAR FOCUS : Comparing & predicting


8. Translate the following sentences paying
attention to the comparing techniques. If you need 9. Choose the correct variant to complete the
help use GRAMMAR FILES 3 (p. 109). sentences.
1. Many computers in this class cost as much as two 1. Some notebooks achieve a (further; more
desktop computers with similar specifications. further) portability improvement by omitting an
2. Netbooks typically have less powerful hardware optical drive.
than larger laptop computers. 2. Portable computers will become much
3. The capabilities of an analog computer are not as (commonly; more commonly) available.
great as those of a digital one. 3. A bit is (a small; the smallest) unit of information.
4. The smaller the computer the faster it operates. 4. What is (the good; the best) way to compile a
5. Convertible tablets are by far the most popular program?
form factor of tablet PCs. 5. Newer laptops come with LED based screens
6. Typical battery life for standard laptops is two to offering a (less; least) power consumption and
five hours of light-duty use, but may drop to as little (wider; more wider) viewing angles.
as one hour when doing power-intensive tasks. 6. Much (fewer; less) details are necessary for the
7. The memory effect happens when one does not new model.
use a battery to its fullest extent then recharges it. 7. (Higher; high) mathematics is a basic subject.

10. Complete the sentences using the verbs in


brackets in the correct form. All sentences refer to
the Future. If you need help use GRAMMAR FILES 4
(p. 111).
1. Portable computers __________ certainly
__________ (be going to) become more powerful
and they __________ also __________ (get)
cheaper. 2. It’s likely computers __________ (be
integrated) with other devices. 3. You __________
(be able to) talk to your computer to control it without using a keyboard. 4. Mobile phones may
__________ (replace) computers as the commonest way to access the Internet. 5. If the market for
portable computers __________ (grow), prices __________ (be reduced) even more next year. 6. The size
of a general-purpose computer will ultimately be limited by the input and output method used. If a screen
__________ (be) too small, it either __________ (not display) enough information, or the information
displayed __________ (be) too small to read easily.

11. Link these words to make predictions using predicting techniques. Express the level of certainty as you
see it. You can make all the necessary changes. If you need help use GRAMMAR FILES 4 (p. 111).

Example: computer teaching/ be used/ much. – I think computer teaching will probably be used more.

1) computers / write / own software. 4) very small devices / be built into clothing.
2) a body chip / correct / poor vision. 5) computers / be implanted into the human brain.
3) computer teaching / replace / courses. 6) people / vote in elections online.

English for Special Purposes


32 Computer Engineering

SPECIALIST READING A: Types of portable computers


12. Read the text quickly, ignoring the gaps and find Though the term portable computer has recently
out: been used almost exclusively to refer to portable
 what similar characteristics a laptop and a computers (1) _____, and usually do not run on
desktop computer have; batteries, smaller portable computers are also known as
 what operating systems subnotebooks run; mobile computers. They are referred to by their more
 what characteristics netbooks optimize for; specific terms: laptops, subnotebooks, hand-held
 what PDAs are commonly used for; computers, palmtops, and wearable computers.
 what main features wearable computers have. A laptop is a personal computer designed for mobile
use and small and light enough (2) _____. A laptop
13. Read the text again and choose from the phrases
integrates most of the typical components of a desktop
(a-k) the one which fits each gap (1-11). There is
computer, including a display, a keyboard, a pointing
one extra phrase you do not need to use. device (a touchpad, also known as a trackpad, and/or a
a. …retains the performance of a standard notebook; pointing stick), speakers, and often including a battery,
b. …the configuration and power management of the into a single unit. The rechargeable battery (if present) is
computer; charged from an AC adapter and typically stores enough
c. …that are larger than a laptop; energy to run the laptop for 2 to 3 hours in its initial
d. …general computing and accessing Web-based state, depending on (3) _____.
applications; Laptops are usually shaped notebook with
e. …predates the use of a mouse and graphical display; thicknesses between 18-38 mm and dimensions ranging
f. …they may be paired with a docking station; from 27x22cm, 13" display to 39x28cm, 17" display and
g. …to sit on a person's lap while in use; up. Modern laptops weigh 1.4 to 5.4 kg. Most laptops
h. …lie flat on the keyboard housing; are designed in the flip form factor to protect the screen
i. …by taking notes, holding contacts, and connecting; and the keyboard when closed. Modern tablet laptops
j. …general-purpose desktop operating systems; have a complex joint between the keyboard housing and
k. …constant interaction between the computer and the display, permitting the display panel to swivel and
user; then (4) _____.
l. …solid-state storage devices. A subnotebook (ultraportable) is a laptop designed
with an emphasis on portability (small size, low weight
and longer battery life) that (5) _____. They are usually
smaller and lighter than standard laptops, weighing
between 0.8 and 2 kg; the battery life can exceed 10
hours.
To achieve the size and weight reductions,
ultraportables use high resolution 13" and smaller
screens (down to 6.4"), have relatively few ports,
employ expensive components designed for minimal
size and best power efficiency, and utilize advanced
materials and construction methods. Some
subnotebooks achieve a further portability
improvement by omitting an optical/removable media
drive; in this case (6) _____ that contains the drive and
optionally more ports or an additional battery.
The term "subnotebook" is usually reserved to laptops
that run (7) _____ such as Windows, Linux or Mac OS X,
rather than specialized software such as Windows CE,
Palm OS or Internet Tablet OS.
Netbooks are a branch of subnotebooks, a category of

English for Special Purposes


Computer Engineering 33

small, lightweight, and inexpensive laptop computers


suited for (8) _____. They are often marketed as
"companion devices", i.e., to augment a user's other
computer access.
At their inception in late 2007 — as smaller notebooks
optimized for low weight (about 1 kg.) and low cost —
netbooks omitted certain features (e.g., the optical
drive), featured smaller screens and keyboards, and
offered reduced specification and computing power.
Some netbooks do not have a conventional hard drive
and use (9) _____ instead, as these require less power,
are faster, lighter, and generally more shock-resistant,
but with much less storage capacity.
A personal digital assistant (PDA) is a mobile device, FUNCTIONAL LANGUAGE: Prepositions
also known as a palmtop computer. Their weight is less
than 1 pound. PDAs are used to organize a person's life 14. Complete the sentences with the prepositions
(10) _____ to the Internet. They commonly have colour from the box. One preposition is not used in any
screens and audio capabilities, enabling them to be used sentences. Consult the APPENDIX (p. 120).
as mobile phones (smartphones), web browsers or
of to by in for on
portable media players. Many PDAs can access the
Internet, intranets or extranets via Wi-Fi or Wireless 1. Because ___ the additional requirements, laptop
Wide Area Networks (WWANs). components are usually of inferior performance
A typical PDA has a touchscreen, a memory card slot, compared ___ similar desktop parts.
and IrDA, Bluetooth, Wi-Fi. However, some PSAs may not 2. Laptop motherboards do not conform ___ a
have a touch screen, using softkeys, a directional pad, desktop form factor.
and a numeric keypad for input; this is typically seen on 3. There is a wide range of CPUs designed ___
telephones that are incidentally PDAs. laptops available.
Wearable computers are computers that are worn on 4. A battery's performance gradually decreases
the body. This type of wearable technology has been with time, leading ___ an eventual replacement
used in behavioral modeling, health monitoring systems, in 1-3 years, depending ___ the charging and
information technologies and media development. discharging pattern.
Wearable computers are especially useful for 5. Higher-end laptops and desktop replacements
applications that require computational support while ___ particular often come with dedicated
the user's hands, voice, eyes, arms or attention are
graphics processors on the motherboard or as an
internal expansion card.
actively engaged with the physical environment.
6. There are also some week points in relation ___
One of the main features of a wearable computer is
ergonomics.
consistency. There is a (11) _____, i.e. there is no need to
7. ___ addition, the users will need to move their
turn the device on or off. Another feature is the ability to
arms constantly while writing.
multi-task. It is not necessary to stop what you are doing 8. With primary focus given to web browsing and e-
to use the device; it is augmented into all other actions. mailing, netbooks rely heavily ___ the Internet
These devices can be incorporated by the user to act like for remote access to web-based applications.
a prosthetic. It can therefore be an extension of the 9. Netbooks have their internal storage in the form
user’s mind and/or body. of solid-state drives and not hard disks, which are
Portable computers have been increasing in popularity essential ___ installing many programs.
over the past decade, as they do not restrict the user in 10. Tablets, ___ general, were expected to replace
terms of mobility as a desktop computer would. Wireless standard laptops starting this year and, for the
Internet, extended battery life and more comfortable most part, that isn't happening.
ergonomics have been factors driving this increase in
popularity.

English for Special Purposes


34 Computer Engineering

COMPREHENSION CHECK
15. Read the text again and decide whether these statements are true (T) or false (F), correct the false
ones:
True False
1. The term “portable computer” is now almost exclusively used to refer to portable computers
that are larger than a laptop and do not run on batteries.
2. Laptops can only run on AC power and need to be plugged in.
3. The weight of early models of laptops was more than 5.4 kg.
4. Tablet PCs are designed in the flip form factor to protect the screen and the keyboard when
closed.
5. Despite the size and weight reductions, ultraportables retain the performance of a standard
notebook.
6. The battery life of subnotes is typically 10 hours.
7. Subnotebooks run specialized software such as Windows CE, Palm OS or Internet Tablet OS.
8. Low cost and low weight are the main advantages of netbooks over other computers of that
kind.
9. Although solid-state storage devices are less power consuming their storage capacity is also
little
10. A typical PDA has softkeys, a directional pad, and a numeric keypad rather than a touchscreen
for entering data.
11. Unlike a laptop or a palmtop, wearable computer is constantly turned on and interacts with
the real-world task.
12. All types of portable computers use standard motherboards or backplanes providing plug-in
slots for add-in cards.

16. Read the text again and complete the summary.


Portable computers are small and __________ do not have __________ disk or __________ drive and
enough to be __________. Laptops, __________, offer reduced specification and __________.
__________, __________ and wearable computers can PDAs or __________ computers are small
be classified as portables. enough to fit into the palm of a hand and used to
A laptop has most of the typical components of a __________ a person's life. PDAs feature __________
__________ including a __________, a __________, a screens, __________ capabilities and are used as
__________ device, speakers and a __________ which __________ (smartphones), __________ or
usually __________ enough energy to run the laptop __________ media players. They can access the
for 2 or 3 hours in its initial state. Internet, intranets or extranets via __________ or
A subnotebook is a class of laptop computers that __________ Networks. Many PDAs employ
are smaller and lighter than typical notebooks. __________ technology.
However, subnotebooks retain the performance of a __________ computers are computers that
standard notebook. The savings in size and weight are are worn on the body. They provide the user with the
usually achieved partly by __________ ports or having __________ support while his hands, voice, eyes, arms
removable media or optical __________. Many can be or attention are actively engaged with the __________.
paired with __________ to compensate. They generally The main features of wearable computers are
run full desktop __________ such as Windows or Linux. __________ and the ability to __________ providing
Netbooks are a category of small, lightweight, and constant __________ between the computer and
__________ laptop computers marketed as __________. The popularity of portable computers has
__________ and usually used for general computing been __________ over the past decade as they do not
and accessing __________ applications. They usually __________the user in terms of __________.

English for Special Purposes


Computer Engineering 35

SPECIALIST READING B: Tablet Computers


17. Scan the text, identify different parts and entitle Two distinctly different types of "tablet computers"
them. should be named.
title from… – to… A tablet personal computer (tablet PC) is a portable
… personal computer equipped with a touch-screen as a
1
primary input device. It is x86 based and uses a slightly
modified personal computer OS (Windows or Ubuntu
Linux) which supports touch-screen, (instead of a
traditional display, mouse and keyboard). A typical
tablet personal computer needs to be "stylus driven",
because operating the typical desktop based OS requires
a high precision to select "Widgets", such as the close
window button.
18. Read the text and decide whether these points
A "tablet computer", or simply "tablet", is a complete
are discussed in it.
computer contained entirely in a flat touch screen that
Yes No
uses a stylus, digital pen or fingertip as the primary input
differences between two types of tablets
device instead of a keyboard or mouse which may or
examples of computers of both types
may not be included. It is not x86 based and uses a RISC
pros and cons of tablet computers 2
(ARM or MIPS) CPU instead, that earlier was only used
development prospects of tablet computers in portable equipment like MP3 players and cell phones,
tablet computers in everyday life but has become powerful enough for most
common form factors of tablets contemporary computing tasks, such as browsing the
OS used in tablet computers Internet, light production work and gaming, tasks that
latest versions of tablets historically have been done on x86 based Personal
computers. The tablet computer and the associated
special operating software is an example of pen
computing technology.
Tablet computers come in a range of sizes. Tablet
personal computers tend to be as large as laptops and
often are the largest usable size for mobile tablet
computing while the new generation of tablet
computers can be much smaller and in size can border
on PDAs .
Booklet computers are dual screen tablet computers
that fold like a book. Typical booklet computers are
3
equipped with multi-touch screens and pen writing
recognition capabilities. They are designed to be used as
digital day-planners, internet surfing devices, project
planners, music players, and displays for video, live TV
and e-reading.
Slate computers are tablet computers without a
dedicated keyboard. For text input, users rely on
handwriting recognition via an active digitizer, touching
an on-screen keyboard using fingertips or a stylus, or
using an external keyboard that can usually be attached
via a wireless or USB connection. Convertible tablets
have a base body with an attached keyboard. They
more closely resemble modern laptops, and are usually

English for Special Purposes


36 Computer Engineering

heavier and larger than slates. Comments:


1
Typically, the base of a convertible attaches to the The term x86 refers to a family of instruction set
display at a single joint called a swivel hinge or rotating architecture based on the Intel 8086 CPU.
2
hinge. The joint allows the screen to rotate through 180° ARM – Acorn RISC Machines - семейство процессоров
and fold down on top of the keyboard to provide a flat ARM для встраиваемых и мобильных систем.
writing surface. This design, although the most common, Представляет собой некоторый конструктор, с
creates a physical point of weakness on the notebook. помощью которого заказчик набирает себе те
Convertibles are by far the most popular form factor of возможности, которые ему нужны. Линейка
tablet PCs, because they still offer the keyboard and продуктов фирмы ARM состоит из базовых
pointing device (usually a trackpad) of older notebooks, процессорных ядер и их "дочек", в которых
for users who do not use the touchscreen display as the реализованы различные дополнительные
primary method of input. возможности.
3
The iPad is a tablet computer designed and developed multi-touch — технология,
by Apple. It is particularly marketed as a platform for которая способна одно-
audio and visual media such as books, periodicals, временно обнаруживать и
movies, music and games, as well as web content. At определять координаты
about 1.5 pounds (680 grams), its size and weight are минимум 3 точек касания.
between those of most contemporary smartphones and
laptop computers. Apple released the iPad in April 2010,
and sold 3 million of the devices in 80 days.
The iPad runs the same operating system as the earlier
iPod Touch and iPhone and is controlled by a multi-touch
display – break from most previous tablet computers,
which used a pressure-triggered stylus.
The iPad's touchscreen display is a 9.7 inch (25 cm)
LCD (1024 × 768 pixels) with scratch-resistant glass. Like
the iPhone, the iPad is designed to be controlled by bare
fingers; normal gloves and styli that prevent electrical
conductivity may not be used, although there are special
19. Answer the questions:
gloves and capacitive styli designed for this use.
1. What are the differences between Tablet PC and
The display responds to two other sensors: an ambient
light sensor to adjust screen brightness and a 3-axis Tablet Computer?
accelerometer to sense iPad orientation and switch 2. Where was RISC CPU most exclusively used
between portrait and landscape modes. The iPad built-in before the advent of tablet computers?
applications support screen rotation in all four 3. How big can tablet computers be?
orientations, meaning that the device has no intrinsic 4. What are booklet computers used for?
"native" orientation; only the relative position of the 5. What input devices do the users of slates rely
home button changes. on?
The iPad uses a Wi-Fi data connection to browse the
6. What form factor of Tablet PC is the most
Internet, load and stream media, and install software.
popular? Why is it so popular?
Some models also have a 3G wireless data connection.
The device uses an internal rechargeable lithium-ion
7. What is the weakest point of convertible tablets?
polymer battery that can provide up to 10 hours of video, 8. What common features do the iPad and iPhone
140 hours of audio playback, or one month on standby. have? What makes them different?
iPad's not a perfect tablet computer, but the very 9. The iPad has no intrinsic "native" orientation,
implementation of the iPhone OS and its clever data- doesn’t it? Explain what opportunities this property
entry scheme – virtual keyboard, multi-touch gestures gives to the user.
and all – turns the iPad into an immeasurably more 10. What special features does the iPad have in
usable device than any other tablet PC. comparison to other tablet PCs?

English for Special Purposes


Computer Engineering 37

WRITING: Tablet computers vs. typical laptops


20. Write two paragraphs on a) or b).
Paragraph 1: compare the
advantages and disadvantages of a)
tablet computers versus
conventional laptops; b) portable
computers versus desktop
computers.
Paragraph 2: describe which of
the two is more usable in this or that
field.
While writing try to apply
different comparing techniques. If
you need help consult GRAMMAR
FILES 2 (p….).

SPEAKING: Predictions for the Future


21. Role play. Work in pairs. Play the parts of an IT expert and an interviewer. Make up a conversation
predicting the further developments of portable computers.
You can use the Supplementary reading section text “Predictions for the Future”.
The following discourse markers may help you:

Contrasting But; Although/ though; however Although is more


Study the following examples: typical of formal
The tablet PC is clearly coming but it is more an evolution of the speech or writing.
user interface right now than a true replacement for the existing The clause with
laptop computer. although can come
The tablet PC is clearly coming. However, it is more an evolution of at the beginning.
the user interface right now than a true replacement for the existing Though is used
laptop computer. like although in
Although (Though) the tablet PC is clearly coming, it is more an informal speech or
evolution of the user interface right now than a true replacement writing.
for the existing laptop computer.

English for Special Purposes


38 Computer Engineering

Unit 4 Programming Languages


Up- & -up verbs Past tenses Programming Language History of Programming Languages Good presentation

LEAD-IN
1. Study the following words, think what unites them and continue this list.

Russian spoken FORTRAN


symbolic written C# dot-and-dash
body mnemonic finger

PRONUNCIATION
2. Make sure you pronounce the following words properly:
algorithm [’ælgərið(ə)m] error [’erə]
artificial [ɑːti’fiʃ(ə)l] machine [mə’ʃiːn]
ambiguous [æm’bigjuəs] precision [pri’siʒ(ə)n]
automatically [ɔːtə’mætik(ə)li] programming ['prəugræmɪŋ]
completeness [kəm’pliːtnəs] execute ['eksɪkjuːt]
dominant [’dɒminənt] diversity [daɪ'vɜːsɪtɪ]

WORD STUDY
3. Translate the following definitions and memorize the terms:

artificial language (n) - an invented language, especially one intended as an international


medium of communication or for use with computers;
specification (n) - a detailed description of the criteria for the constituents, construction,
performance, etc., of a material, apparatus or of the standard of
workmanship required in its manufacture;
abstraction (n) - the process of formulating generalized ideas or concepts by extracting
common qualities from specific examples;
modification (n) - a small change or adjustment;
programming language (n) - a simple language system designed to facilitate the writing of
computer programs;
syntax (n) - a systematic statement of the rules governing the grammatical
arrangement of words and morphemes in a language;
semantics (n) - the study of the relationships between signs and symbols and what

English for Special Purposes


Computer Engineering 39

they represent;
concept (n) - a general idea or notion that corresponds to some class of entities and
that consists of the characteristic or essential features of the class;
context (n) - the conditions and circumstances that are relevant to an event, fact,
etc.;
novice (n) - a person who is new to or inexperienced in a certain task, situation,
etc.;
convergence (n) - the combining of different forms of electronic technology, such as data
processing and word processing converging into information
processing;
predictability (n) - the state of knowing what something is like, when something will
happen, etc.

4. Match the following words with their synonyms (A, B) and the Russian equivalents (C, D):

A B C D
artificial precede automated looms машинно-считываемый,
perform satisfy batch process точно определённый,
specify sphere figuratively speaking автоматический ткацкий станок,
mode simulated machine-readable образно выражаясь,
predate modify precisely defined язык сценариев,
field detail scripting language процесс пакетной обработки
intent setting dominant implementation внешнее поведение
alter execute external behavior выйти из употребления
meet purpose fall into disuse вмешательство человека
context style human intervention основное применение

5. Jumbled words. Rearrange the letters in A to make words and match them with definition in B.

A B
 a part of a program consisting of a coded command
eanualgg _______________
to the computer to perform a specified function;
 a group or combination of interrelated, interdependent,
iiiaarfclt _______________
or interacting elements forming a collective entity;
_______________  a person who writes a program so that data may be
nstcrtnuiio
processed by a computer;
_______________  a system for the expression of thoughts, feelings, etc., by
itcompexly
the use of spoken sounds or conventional symbols;
_______________  a device, usually electronic, that processes data
mrrrmpogae
according to a set of instructions;
_______________
sestmy  the state or quality of being intricate or complex;
_______________
topucerm  non-natural.

English for Special Purposes


40 Computer Engineering

WORD BUILDING: UP- and -up verbs

6. Complete these sentences with the appropriate form of the verbs from the list:
back up build up catch up keep up set up start up free up update upgrade upload
1. To avoid losing data, you should __________ your files regularly.
2. You can __________ your PC by adding a new motherboard.
3. Delete some files to __________ space on your hard disk.
4. A Data is __________ from regional PCs to the company's mainframe each night.
5. The operating system boots when you __________ your computer.
6. She's taking a course to __________ her knowledge of computing.
7. He __________ a website to advertise his travel company.
8. You can __________ with developments by reading PC magazines.
9. If you miss a class, you can study the hand-outs to __________
10.The image in a digital camera is __________ from a red, green and blue image.

GRAMMAR FOCUS : Past Tenses (Active & Passive)


7. Put the verbs in brackets into correct past tense form active or passive. If you need help use GRAMMAR
FILES 1 (p. 107).
1. While the experiment with a new computer _______________ (carry out) nobody left the laboratory.
2. A new type of computing equipment _______________ (produce) at our University last year.
3. At that time scientific work _______________ (do) mostly by large groups of researchers.
4. The business letter _______________ (receive) before you came.
5. An interesting research in the field of communication _______________ (do) at our University two years
ago.
6. We _______________ (look) for a more simple method of solution but could not find it.
7. Prospects of using smiles _______________ (understand) already by everybody by the end of previous
millennium.
8. Our engineers _______________ (develop) a new type of electronic devices.
9. Before starting the project the students _______________ (discuss) the advantages of net
communications.
10.Programming languages _______________ (can use) to create programs that specify the behavior of a
machine.

English for Special Purposes


Computer Engineering 41

SPECIALIST READING A: Programming Language


8. Read the heading and determine what this text is Programming language theory (commonly known
about. as PLT) is a branch of computer science that deals
with the design, implementation, analysis,
characterization, and classification of programming
languages and their individual features. It is a
multi-disciplinary field, both depending on and, in
some cases, affecting mathematics, software
engineering, linguistics, and even the cognitive
sciences. It is a well-recognized branch of computer
science, and as of 2009, an active research area,
with results published in numerous journals
9. Scan the text and make up the plan of the main dedicated to PLT, as well as in general computer
content. science and engineering publications.
A programming language is a machine-readable
1. … artificial language designed to express
computations that can be performed by a machine,
2. … particularly a computer. Programming languages
can be used to create programs that specify the
behavior of a machine, to express algorithms
precisely, or as a mode of human communication.
Many programming languages have some form
of written specification of their syntax and
semantics, since computers require precisely
defined instructions. Some are defined by a
specification document (for example, an ISO1
Standard), while others have a dominant
implementation (such as Perl2).
A programming language provides a structured
mechanism for defining pieces of data, and the
operations or transformations that may be carried
out automatically on that data. A programmer uses
the abstractions presented in the language to
represent the concepts involved in a computation.
These concepts are represented as a collection of
the simplest elements available (called primitives).
Programming languages differ from most other
forms of human expression in that they require a
greater degree of precision and completeness.
When using a natural language to communicate
with other people, human authors and speakers
can be ambiguous and make small errors, and still
expect their intent to be understood. However,

English for Special Purposes


42 Computer Engineering

figuratively speaking, computers "do exactly what


they are told to do", and cannot "understand" what
code the programmer intended to write. The
combination of the language definition, a program,
and the program's inputs must fully specify the
external behavior that occurs when the program is
executed, within the domain of control of that
program.
Programs for a computer might be executed in a
batch process (the input data are collected into
batches of files and are processed in batches by the
program) without human intervention, so all input
data is preselected through scripts or command-line
Comments:
parameters, or a user might type commands in an 1
International Standards Organization –
interactive session of an interpreter. In this case the
Международная организация по стандартизации.
"commands" are simply programs, whose execution 2
Practical Extraction and Report Language – язык для
is chained together. When a language is used to практического извлечения данных и составления
give commands to a software application (such as a отчётов, свободно распространяемый
shell) it is called a scripting language. интерпретируемый язык, текущая версия - Perl 5.
Many languages have been designed from
scratch, altered to meet new needs, combined with VOCABULARY IN USE
other languages, and eventually fallen into disuse. 10. Complete the following text using suitable
Although there have been attempts to design one words and word combinations:
"universal" computer language that serves all algorithm ; to communicate instructions; created;
purposes, all of them have failed to be generally computer; the theory of computation; interaction;
accepted as filling this role. The need for diverse external devices; execution; data structures;
computer languages arises from the diversity of programming language
contexts in which languages are used. A ________ is a language used to write _______
Programs range from tiny scripts written by programs, which involve a computer performing some
individual hobbyists to huge systems written by kind of computation or _______ and possibly control
hundreds of programmers. ______ such as printers, robots, and so on. Programming
Programmers range in expertise from novices languages differ from natural languages in that natural
who need simplicity above all else, to experts who languages are only used for ______ between people,
while programming languages also allow humans
may be comfortable with considerable complexity.
_______ to machines. Some programming languages are
Programs must balance speed, size, and
used by one device to control another. For example
simplicity on systems ranging from microcontrollers PostScript programs are frequently ______ by another
to supercomputers. program to control a computer printer or display.
Programs may be written once and not change Programming languages may contain constructs for
for generations, or they may undergo nearly defining and manipulating _______ or controlling the
constant modification. flow of ______. ______ classifies languages by the
Finally, programmers may simply differ in their computations they are capable of expressing. All Turing
tastes: they may be accustomed to discussing complete languages can implement the same set of
problems and expressing them in a particular algorithms. ANSI/ISO SQL and Charity are examples of
languages that are not Turing complete, yet often called
language.
programming languages.

English for Special Purposes


Computer Engineering 43

COMPREHENSION CHECK
11. Read the text again and decide whether these statements are true (T) or false (F), correct the false
ones:
True False
1. PLT is a branch of mathematics.
2. A programming language is a man-made language designed to express computations.
3. Programming languages can’t be used as a kind of human communication.
4. Programming language is like other forms of human expressions.
5. A programmer provides the abstractions presented in the language to represent the
concepts involved in a computation.
6. Computers "do exactly what they are told to do", and cannot "understand" what
code the programmer planned to write.
7. Programs for a computer might be performed in a batch process with no human
interaction.
8. The need for diverse computer languages arises from the range of contexts in which
languages are used.
9. It is impossible to operate a program without human intervention.
10.“Universal” computer language isn’t a dream any more.

12. Write the summary of the text using the following words and expressions:

programming languages …………


multi- disciplinary field
cognitive sciences
machine-readable
artificial
express computations
written specification
precisely defined
structured mechanism
a batch process
human interaction
the diversity of contexts

The following words and phrases may help you to make a summary:

The paper attempts to provide… … are discussed briefly.


The author considers… Details are given…
The consequence of development … … briefly surveys …
… is wide ... In conclusion… To sum up...

English for Special Purposes


44 Computer Engineering

SPECIALIST READING B: History of Programming languages


13. Scan the text and match the headings (a-c) with 1._______________________
the paragraphs (1-3) The first programming languages predate the modern
a. Consolidation and growth th
computer. The 19 century had "programmable" looms
b. Early developments and player piano scrolls which implemented what are
c. Refinement today recognized as examples of domain-specific
programming languages. By the beginning of the
14. Read the text and answer the questions. twentieth century, punch cards encoded data and
1. What was the first a programming language directed mechanical processing. In the 1930s and 1940s,
or a modern computer? the formalisms of Alonzo Church's lambda calculus and
2. When and where were the first electrically Alan Turing's Turing machines provided mathematical
powered digital computers created? abstractions for expressing algorithms; the lambda
3. What generation are Assembly languages calculus remains influential in language design.
referred to? In the 1940s, the first electrically powered digital
computers were created. The first high-level
4. What was the format and use of the early
programming language to be designed for a computer
programming languages heavily influenced
was Plankalkül, developed for the German Z3 by Konrad
by?
Zuse between 1943 and 1945.
5. When were the major language paradigms, Programmers of early 1950s computers, notably
which are now in use, developed? UNIVAC I and IBM 701, used machine language
6. What problem was widely discussed in programs, that is, the first generation language (1GL).
1960s and 1970s? 1GL programming was quickly superseded by similarly
7. What were the 1980s marked by? machine-specific, but mnemonic, second generation
8. What trend in language design was an languages (2GL) known as Assembly languages or
1
important one during the 1980s? Assembler . Later in the 1950s, assembly language
programming, which had evolved to include the use of
9. What are the current directions of the
macro instructions, was followed by the development of
programming language evolution?
"third generation" programming languages (3GL), such
as FORTRAN, LISP, and COBOL. 3GLs are more abstract
and are "portable", or at least implemented similar on
computers that do not support the same native machine
code. Updated versions of all of these 3GLs are still in
gen e ral u s e , an d ea ch h a s s tro n g ly influenced the
development of later languages. At the end of the 1950s,
2
the language formalized as Algol 60 was introduced,
and later programming languages are, in many respects,
descendants of Algol. The format and use of the early
programming languages was heavily influenced by the
constraints of the interface.
2._______________________
The period from the 1960s to the late 1970s brought the
development of the major language paradigms now in
use, though many aspects were refinements of ideas in
the very first Third-generation programming languages.
3
APL introduced array programming and influenced
functional programming. PL/I (NPL) was designed in the
early 1960s to incorporate the best ideas from FORTRAN
and COBOL.

English for Special Purposes


Computer Engineering 45

4
In the 1960s, Simula was the first language designed Comments:
1
to support object-oriented programming; in the mid- Assembler – Ассемблер, машинно-ориентированный
1970s, Smalltalk followed with the first "purely" object- язык программирования низкого уровня. Так как
oriented language. C was developed between 1969 and каждый тип процессоров имеет собственный набор
1973 as a systems programming language. Prolog, машинных команд, то под него создаётся и
designed in 1972, was the first logic programming уникальный, платформно-зависимый ассемблер.
2
language. In 1978, ML built a polymorphic type system on Algorithmic Language – Алгол, примитивный
top of Lisp, pioneering statically typed functional процедурный язык высокого уровня, оказал большое
programming languages. Each of these languages влияние на развитие процедурных языков (блочная
spawned an entire family of descendants, and most структура, рекурсия, БНФ). В 1960-70-х годах был
modern languages count at least one of them in their общепризнанным языком научных публикаций.
ancestry. Дальнейшее развитие Алгола-60 - Алгол-68, из-за
The 1960s and 1970s also saw considerable debate своей сложности не получил широкого
over the merits of structured programming, and whether распространения.
3
programming languages should be designed to support it. A Programming Language – созданный К. Айверсоном
New techniques reduced the footprint of a program as процедурный язык сверхвысокого уровня. Требует
well as improved productivity of the programmer and специальной клавиатуры. Дальнейшее развитие
user. The card deck for an early 4GL was a lot smaller for языка - APL2.
4
the same functionality expressed in a 3GL deck. Simula – язык моделирования сложных систем,
3._______________________ разработанный Оле Далом и Кристеном Нугардом.
The 1980s were years of relative consolidation. C++ Первый объектно-ориентированный язык,
combined object-oriented and systems programming. основанный на более раннем языке моделирования
The United States government standardized Ada, a дискретных событий Simula 1 и языке Algol. Впервые
systems programming language intended for use by введены понятия класса, наследования и
defense contractors. In Japan and elsewhere, vast sums динамического связывания. Развитие - Simula-67
were spent investigating so-called "fifth generation"
languages that incorporated logic programming
constructs. The functional languages community moved
to standardize ML and Lisp. Rather than inventing new
paradigms, all of these movements elaborated upon the
ideas invented in the previous decade.
One important trend in language design during the
1980s was an increased focus on programming for large-
scale systems through the use of modules, or large-scale
organizational units of code. Modula-2, Ada, and ML all
developed notable module systems in the 1980s,
although other languages, such as PL/I, already had
extensive support for modular programming.
The rapid growth of the Internet in the 1990s created
opportunities for new languages. Perl, originally a Unix
scripting tool first released in 1987, became common in
dynamic Web sites. Java came to be used for server-side
programming. These developments were rather
refinements to existing languages and paradigms, and
largely based on the C family of programming languages.
Programming language evolution continues, in both
industry and research. Current directions include security
and reliability verification, new kinds of modularity
(mixings, delegates, aspects), and database integration.

English for Special Purposes


46 Computer Engineering

WRITING: Practical application of programming languages


15. Study the information about the following programming languages given below. Write an
argumentative essay explaining what language would be the most appropriate to use for each of these
situation:
1. A schoolteacher wants his young pupils to learn some basic mathematics by controlling a simple robot.
2. The owner of a small business wants to create a simple database program to keep track of his stock.
3. An engineer wants to develop a program for calculating the stresses in a mechanical device.
4. A student wants to create web pages for a personal website.
5. A systems programmer wants to add some new modules to an operating system.
6. A programmer working for the US army wants to create a program for controlling a new type of weapon.
7. A finance company needs to process data from its branch offices on its mainframe computer.
8. A website designer wants to enable the data on his website to be easily processed by different programs.
9. A student studying artificial intelligence wants to write some programs for a course project.
10. A college lecturer wants his students to learn the principles of programming.
11. A professional programmer wants to create and sell a program for use in language learning.
12. A website designer wants to password-protect a section of a website.

PROGRAMMING LANGUAGES BOX


Java is developed by Sun Microsystems in 1990s and develop applications in the field of artificial intelligence. It
used for developing interactive applications for the is a popular tool for natural-language programming.
Internet. XML stands for extensible Markup Language; it is a
Ada, named after Countess Ada Lovelace (one of the metalanguage for creating webpages with meaningful
first programmers), is a superset of Pascal. Ada is a data that can be used by a variety of programs.
structured language developed and used by the US C++ is an object-oriented superset of С which
Department of Defense. combines the best features of a structured high-level
Log© is an easy-to-use language that is primarily used language and an assembly language that uses computer
to teach children how to program. resources efficiently and is easy to code. С was originally
LISP stands for LISt Processor and is designed to designed to write systems software but is now considered
process non-numeric data – that is, symbols such as a general-purpose language.
characters or words. It is used to develop applications in Visual Basic (BASIC) stands for Beginners' All-purpose
the field of artificial intelligence. Symbolic Instruction Code; it is a simple-to-use language
FORTRAN stands for FORmula TRANslator; it was that has a graphical interface. It makes it particularly easy
designed in 1954 and is oriented toward manipulating for an inexperienced programmer to create database
formulas for scientific, mathematical, and engineering programs.
problem-solving applications. Pascal, named after the mathematician Blaise Pascal,
HTML stands for HyperText Markup Language; it is a was created primarily to fill the need for a teaching
page-description language used to prepare a text for vehicle that would encourage structured programming. It
display in a browser program. is often used in college computing courses.
Perl (Practical Report and Extraction Language) first COBOL Stands for COmmon Business-Oriented
appeared in 1987 as a Unix-based tool for producing Language; it has been around for a long number of years
reports but is now widely used for creating interactive but is still an important transaction-processing language
webpages. used to process the records of large organizations on
Prolog stands for PROgramming LOGic; it is used to mainframe computers.

English for Special Purposes


Computer Engineering 47

SPEAKING: Universal programming language


16. Get ready to create and present your own “universal” programming language paying attention to its
purposes, peculiarities and advantages over other kinds of visual programming and languages for web.

The following discourse markers may help you to create a good presentation; you can also visit the site
http://www.youtube.com/watch?v=HZj70Rv5K8M

How do I You could introduce your talk or presentation formally.


start? Today I'm going to talk about...
In this presentation, I'd like to tell you a little bit about...
Alternatively, you could grab your audience's attention by starting with a question or a
challenging statement. Use pictures or objects.
So, how much do you know about ___________?
Have you ever asked yourself why ... ?
What I'm going to tell you about today will change the way you think about...
Pass around the picture/object. What do you think it is?
How do I Make it short. Write down the points you want to make, edit them down to, say, four,
organize the then decide which order you are going to make them in. Introduce each point with an
presentation? expression from the list below.
The first/key thing to say about __________ is...
The main point to make about __________ is...
What you really need to know about__________ is ...
Now let's look at...
Let's turn to/move on to ...
Another interesting thing to say about__________ is ...
Finally, I'd like to say a few words about...
What do I After introducing the point, add information briefly in two, three, or, at the most, four
say? sentences. Use markers like the ones below to construct long, well-balanced sentences.
Anyway,...; Naturally,...; Of course,...
Similarly, ... ; Surprisingly, ,.,; Remarkably, ...
Despite,...; However, ...; Although,...; Whereas...
Consequently, ... ; In addition,..; Moreover,...; Furthermore, ...
Incidentally, ... ; By the way, ... ; It's worth noting that...
How do I Conclude the presentation by briefly summarizing what you have said, or the points you
finish? have made. You could end by asking for comments or questions.
In conclusion,...; To sum up,...
So, remember that…is all about…,and.
So, there are three things to remember about…
Does anybody have any questions?

English for Special Purposes


48 Computer Engineering

Unit 5 Computer networking


Abbreviations Relative clauses with a participle Computer Networking TCP/IP vs. PPP

LEAD-IN

1. Think about the basic components of a typical computer network (a file server, a bridge, a router, a
backbone, a LAN, a gateway, a modem…), try to explain their functions.

PRONUNCIATION
2. Make sure you pronounce the following words properly:
route [ruːt] wireless [’waɪələs]
router [’ruːtə] flow [fləu]
technology [tek’nɔləʤi] converge [kən'vɜːʤ]
conduct [kən’dʌkt] hierarchical [ˌhaɪə'rɑːkɪk(ə)l]
multinational [mʌlti’næʃ(ə)nəl] authentication [ɔːˌθentɪ'keɪʃ(ə)n]
transceiver [træn’si:və] asynchronous [eɪ'sɪŋkrənəs]

WORD STUDY
3. Translate the following definitions and memorize the terms:

networking (n) - the interconnection of two or more networks in different places;


specification (n) - a detailed description of the criteria for the construction,
appearance, performance, etc., of a material, apparatus, standard
etc.;
peer-to-peer (adj.) - (P2P) designed so that computers can send information directly to
one another without passing through a centralized server;
Point-to-Point Protocol (n) - (PPP), a data link protocol commonly used to establish a direct
connection between two networking nodes. It provides
connection authentication and transmission encryption privacy;
High-Level Data Link Control (n) - (HDLC) a bit-oriented synchronous data link layer protocol
developed by the ISO. HDLC provides both connection-oriented
and connectionless service and can be used for point to
multipoint connections, but is now used almost exclusively to
connect one device to another;

English for Special Purposes


Computer Engineering 49

frame relay (n) - a standardized wide area network technology that specifies the
physical and logical link layers of digital telecommunications
channels using a packet switching methodology;
Asynchronous Transfer Mode (n) - (ATM) an electronic digital data transmission technology that is
implemented as a network protocol and was first developed in the
mid 1980s to transport real-time video, audio, image files, text;
sensitive information (n) - confidential data;
intranet (n) - an internal network that makes use of internet technology;
extranet (n) - an intranet that is modified to allow outsiders access to it, esp.
one belonging to a business that allows access to customers;
precursor (n) - a person or thing that precedes and shows or announces someone
or something to come;
coaxial cable (n) - a cable consisting of an inner insulated core of stranded or solid
wire surrounded by an outer insulated flexible wire braid, used
esp. as a transmission line for radio-frequency signals.

4. Match the following words with their synonyms (A, B) and the Russian equivalents (C, D):

A B
specifications spread out
conduct motivate
hub privileged
deploy carry out
converge predecessor
interconnect considerable
sensitive detailed description
precursor join
drive centre
significant interrelate

C D
routing protocol обмениваться информацией
practical application протокол канала связи с непосредственным соединением
exchange data поставщик онлайновой информации
peer-to-peer network оптоволокно
Point to Point Protocol витая пара (два скрученных изолированных провода)
coaxial cable практическое применение
optical fiber сеть с пакетной коммутацией
twisted-pair cable одноранговая сеть (без иерархии и выделенных серверов)
content provider протокол маршрутизации
packet switched network коаксиальный кабель

English for Special Purposes


50 Computer Engineering

5. Jumbled words. Rearrange the letters in A to make words and match them with definition in B.
A B
kiertnnwgo  confidential;
_______________
 a device that allows packets of data to be moved
xrnaette
_______________ efficiently between two points on a network;
essniivet  the act of applying to a particular purpose;
_______________
 an intranet that is modified to allow outsiders access to
ntrntiea
_______________ it;
 the application of practical sciences to industry or
eourrt
_______________ commerce;
 the interconnection of two or more networks in
lipaponcait
_______________ different places;
 an internal network that makes use of internet
loechyntog
_______________ technology.

WORD BUILDING: Abbreviations


An abbreviation (from Latin brevis, meaning short) is a shortened form of a word or
phrase. Usually it consists of a letter or group of letters taken from the word or
phrase. Abbreviations can be pronounced differently:
 as individual letters, such as TCP/IP [ˌtisi:pi:ˈaɪpi:];
 as a word, such as WAN [wæn], LAN [læn];
 as a word or names of letters, depending on speaker or context, such as FAQ
[fæk ] or [ˌefeɪˈkju:];
 as a combination of letter names and words, such as JPEG [ˈdʒeɪpɛɡ] and MS-
DOS [ˌɛmɛsˈdɒs];
Always check your dictionary or the Internet if you are not sure.

6. Do you know what these well-known abbreviations stand for?


OS, GUI, PDA, LAN, WAN, WWAN, BASIC, HTTP, COBOL, IBM, WP, IP, FTP, Wi-Fi, MMS, ADSL, SONET
7. Match the abbreviations with their definitions to know more terms on the theme.
Telnet  The method by which web pages are transferred from a website to your PC.
VoIP  A standardized multiplexing protocol that transfers multiple digital bit streams over optical fiber using
lasers or LEDs.
FTP  The network developed in the early 70s by the US Department of Defense.This was the precursor to
the Internet.
ARPANET  A file or web page containing answers to questions asked by internet users or visitors to a website.
HTTP  A standard network protocol used to transfer files from one host to another over a TCP-based
network. It is built on a client-server architecture and utilizes separate control and data connections
between the client and server.
JPEG  A protocol and a program which is used to log directly into remote computer systems. This enables
you to run programs kept on them and edit files directly.
SONET  An Internet protocol which allows you to make phone calls using the Internet instead of the regular
phone lines.
FAQ  A standard for compressing and decompressing image files.

English for Special Purposes


Computer Engineering 51

GRAMMAR FOCUS : Relative clauses with a participle


Preview: We can use the passive participle as in sentences 1
Relative clauses with a participle are often used in and 2.
technical descriptions. They allow you to provide a 1. The technology needed to set up a home
lot of information about a noun using as few words network. = technology which is needed.
as possible. 2. PCs equipped with Ethernet adapters = PCs which
Study these examples. are equipped.
1. The technology needed to set up a home We can use an active participle as in sentences 3
network. and 4.
2. PCs equipped with Ethernet adapters. 3. Network modem allowing clients to access the
3. Network modem allowing clients to access the Internet simultaneously = modem which allows
Internet simultaneously. clients to access the Internet simultaneously.
4. Data line linking client to server. 4. Data line linking client to server = data line which
links client to server.

8. Complete these definitions with the correct participle (active or passive) of the verb given in brackets. If
you need help use GRAMMAR FILES 5 (p. 112).
1. A gateway is an interface __________ (enable) dissimilar networks to communicate.
2. A bridge is a hardware and software combination __________ (use) to connect the same type of
networks.
3. A backbone is a network transmission path __________ (handle) major data traffic.
4. A router is a special computer __________ (direct) message when several networks are linked.
5. A network is a number of computers and peripherals __________ (link) together.
6. A LAN is a network __________ (connect) computers over a small distance such as within a company.
7. A server is a powerful computer __________ (store) many programs (share) by all the clients in the
network.
8. A client is a network computer __________ (use) for accessing a service on a server.
9. A thin client is a simple computer __________ (comprise) a processor and memory, display, keyboard,
mouse and hard drives only.
10. A hub is an electronic device __________ (connect) all the data cabling in a network.

9. Link these statements using a relative clause with a participle.


1. The technology is here today. It is needed to set up a home network.
2. You only need one network printer. It is connected to the server.
3. Her house has a network. It allows basic file-sharing and multi-player gaming.
4. There is a line receiver in the living room. It delivers home entertainment audio to speakers.
5. Eve has designed a site. It is dedicated to dance.
6. She has built in links. They connect her site to other dance sites.
7. She created the site using Netscape Composer. It is contained in Netscape Communicator.
8. At the centre of France Telecom's home of tomorrow is a network. It is accessed through a Palm Pilot-
style control pad.
9. The network can simulate the owner's presence. This makes sure vital tasks are carried out in her
absence.
10. The house has an electronic door-keeper. It is programmed to recognize you. This gives access to family
only.

English for Special Purposes


52 Computer Engineering

SPECIALIST READING A: Computer Networking


10. Scan the text and say which paragraph tells us Computer networking is the engineering discipline
about: concerned with communication between computer
systems or devices. Networking, routers, routing
a. types of networks;
protocols, and networking over the public Internet have
b. history of network development;
c. what computer networking is. their specifications defined in documents called RFCs.
Computer networking is sometimes considered
11. Now study the text and decide where the following 1)_____________________. Computer networks rely
sentences go in the text. heavily upon the theoretical and practical application of
a. …the data is transferred over sets of radio these scientific and engineering disciplines.
transceivers; A computer network is any set of computers or
b. A peer-to-peer network is where each client devices connected to each other with the ability to
shares their resources with other workstations exchange data. Local area network (LAN) is a network
in the network; that spans a relatively small space and provides services
c. …the switching capabilities they perform; to a small number of people. The first LAN was invented
d. …a sub-discipline of telecommunications, by a Law Doctor in 1978. Depending on the number of
computer science, information technology people that use a Local Area Network, a peer-to-peer or
and/or computer engineering; client-server method of networking may be
e. …human users by carrying instructions between used. 2)_____________________. Examples of peer-to-
them; peer networks are small office networks where resource
f. …the set of subnets, and aggregates of subnets;
use is minimal and a home network. A client-server
g. some form of communications security
network is where every client is connected to the server
mechanism;
and each other. Client-server networks use servers in
h. …to connect and communicate through and
different capacities. These can be classified into two
between them.
types: single-service servers, where the server performs
one task such as file server, print server, etc.; while
other servers can not only perform in the capacity of file
servers and print servers, but they also conduct
calculations and use these to provide information to
clients (Web/Intranet Server). Computers linked via
Ethernet Cable, can be joined either directly or via a
network hub that allows multiple connections.
Wide area network (WAN) is a network where a wide
variety of resources are deployed across a large
domestic area or internationally. An example of this is a
multinational business that uses a WAN to interconnect
their offices in different countries. The largest and best
example of a WAN is the Internet, which is a network
comprised of many smaller networks. The Internet is
considered the largest network in the world. The PSTN
(Public Switched Telephone Network) also is an
extremely large network that is converging to use
Internet technologies, although not necessarily through
the public Internet. A Wide Area Network involves
communication through the use of a wide range of
different technologies. These technologies include
Point-to-Point WANs such as Point-to-Point Protocol
(PPP) and High-Level Data Link Control (HDLC), Frame

English for Special Purposes


Computer Engineering 53

Relay, ATM (Asynchronous Transfer Mode) and Sonet Many of the social behavior seen in today's Internet
(Synchronous Optical Network). The difference between was demonstrably present in nineteenth-century
the WAN technologies is based on telegraph networks, and arguably in even earlier
3)______________________ and the speed at which networks using visual signals.
sending and receiving bits of information (data) occur. In September 1940 George Stibitz used a teletype
Wireless LANs and WANs (WLAN & WWAN) are basically machine to send instructions for a problem set from his
the same as a LAN or a WAN but there are no wires Model K at Dartmouth College in New Hampshire to his
between hosts and servers. 4)_____________________. Complex Number Calculator in New York and received
These types of networks are beneficial when it is too results back by the same means. Linking output systems
costly or inconvenient to run the necessary cables. like teletypes to computers was an interest at the
Metropolitan Area Network (MAN) is a network that is Advanced Research Projects Agency (ARPA) when, in
too large for even the largest of LAN's but is not on the 1962, J.C.R. Licklider was hired and developed a working
scale of a WAN. It also integrates two or more LAN group he called the "Intergalactic Network", a precursor
networks over a specific geographical area (usually a city) to the ARPANet.
so as to increase the network and the flow of In 1964, researchers at Dartmouth developed the
communications. The LAN's in question would usually be Dartmouth Time Sharing System for distributed users of
connected via "backbone" lines. large computer systems. The same year, at MIT, a
All networks are interconnected to allow research group supported by General Electric and Bell
communication with a variety of different kinds of media, Labs used a computer (DEC's PDP-8) to route and
including twisted-pair copper wire cable, coaxial cable, manage telephone connections.
optical fiber, and various wireless technologies. The Throughout the 1960s Leonard Kleinrock, Paul Baran
devices can be separated by a few meters (e.g. via and Donald Davies independently conceptualized and
Bluetooth) or nearly unlimited distances (e.g. via the developed network systems which used datagrams or
interconnections of the Internet). packets that could be used in a packet switched network
Informally, the Internet is the set of users, enterprises, between computer systems.
and content providers that are interconnected by 1965 Thomas Merrill and Lawrence G. Roberts
Internet Service Providers (ISP). From an engineering created the first wide area network (WAN).
standpoint, the Internet is 5)_____________________, The first widely used PSTN switch that used true
which share the registered IP address space and computer control was the Western Electric 1ESS switch,
exchange information about the reachability of those IP introduced in 1965.
addresses using the Border Gateway Protocol. Typically, In 1969 the University of California at Los Angeles, SRI
the human-readable names of servers are translated to IP (in Stanford), University of California at Santa Barbara,
addresses, transparently to users, via the directory and the University of Utah were connected as the
function of the Domain Name System (DNS). beginning of the ARPANet network using 50 kbit/s
Over the Internet, there can be business-to-business circuits. Commercial services using X.25, an alternative
(B2B), business-to-consumer (B2C) and consumer-to- architecture to the TCP/IP suite, were deployed in 1972.
consumer (C2C) communications. Especially when money Computer networks and the technologies needed
or sensitive information is exchanged, the 7)_____________________, continue to drive computer
communications are apt to be secured by hardware, software, and peripherals industries. This
6)_____________________. expansion is mirrored by growth in the numbers and
Intranets and extranets can be securely superimposed types of users of networks from the researcher to the
onto the Internet, without any access by general Internet home user.
users, using secure Virtual Private Network (VPN) Today, computer networks are the core of modern
technology. communication. All aspects of the PSTN are computer-
Before the advent of computer networks that were controlled, and telephony increasingly runs over the
based upon some type of telecommunications system, Internet Protocol. The scope of communication has
communication between calculation machines increased significantly in the past decade and this boom
and early computers was performed by in communications would not have been possible
7)_____________________. without the progressively advancing computer network.

English for Special Purposes


54 Computer Engineering

VOCABULARY IN USE
12. Complete the following text using suitable words and word combinations:

term computer distinct signifies arrangement hierarchical


network layout characteristics logical

1)____________ networks may be classified according to the 2) ____________ topology upon which the
network is based, such as bus network, star network, ring network, mesh network, star-bus network, tree
or 3) ____________ topology network. Network topology 4) ____________ the way in which devices in the
network see their logical relations to one another. The use of the 5) ____________ "logical" here is
significant. That is, network topology is independent of the "physical" 6) ____________ of the network.
Even if networked computers are physically placed in a linear 7) ____________, if they are connected via a
hub, the network has a Star topology, rather than a bus topology. In this regard the visual and operational
8) ____________ of a network are 9) ____________; the 10) ____________ network topology is not
necessarily the same as the physical layout.

COMPREHENSION CHECK
13. Read the text again and decide whether these statements are true (T) or false (F), correct the false
ones:
True False
1. Computer networking is the engineering discipline concerned with communication
between computer systems or people.
2. A computer network is a number of computers or devices connected to each other.
3. Methods of networking depend on programming language.
4. Computers are linked via Ethernet Cable, can be joined either directly (one computer
to another), or via a network centre that allows multiple connections.
5. The largest and best example of a LAN is the Internet.
6. All networks are interrelated to allow communication.
7. The main function of the Domain Name System (DNS) is to send messages.
8. The Dartmouth Time Sharing System distributes users of large computer systems.
9. Commercial services using X.25, an alternative architecture to the TCP/IP suite, were
spread out in 1972.
10. The communication has grown tremendously in the past decade thanks to the
progressively advancing computer network.

14. Define the following abbreviations:

LAN; WAN; WWAN;

PSTN; PPT; HDLC; ISP;

IP; DNS; B2B; B2C;

C2C; ARPA.

English for Special Purposes


Computer Engineering 55

SPECIALIST READING B: TCP/IP vs. PPP


15. Skim through the text and find explanations to TCP/IP
the abbreviations given in the titles. Then read the By the mid-1970s, many government agencies
text thoroughly and do the tasks below. were on the ARPA net, but each was running or
network developed for their specific project. All
16. Read the text and mark the equivalents for the
were capable networks, but all spoke different
following Russian words and phrases:
languages. What was clearly needed to make things
 несовместимый;
work smoothly was a set of networking protocols
 проверка целостности данных;
that would tie together disparate networks and
 перемешивать;
enable them to communicate with each other. The
 приводить в действие;
solution was found in 1982.
 подпрограмма;
TCP stands for Transmission Control Protocol; IP
 подключаться; is the abbreviation for Internet Protocol. With the
 узел; advent of TCP/IP, the word Internet - which is a
 назначение; portmanteau word for interconnected networks -
 поиск данных; entered the language.
 последовательное подсоединение; The TCP portion of the TCP/IP provides data
 нуль-модемный кабель; transmission verification between client and server.
 система соединения типа точка-точка; If data is lost or scrambled, TCP triggers
 пропускная способность; retransmission until the errors are corrected.
 входящее соединение; Package of subroutines that provide access to
 одновременно; TCP/IP protocols is called a socket.
 последовательный порт; The IP portion of TCP/IP moves data packets
 авторизация. from node to node. It decodes addresses and rout
data to designated destinations. The Internet
Protocol (IP) is what creates the network networks,
or Internet, by linking systems at different levels. It
can be used by small computers communicate
across a LAN (Local Area Network) in the same
room or with computers networks around the
world. Individual computers connected via a LAN
(either Ethernet or token ring) share the LAN setup
with both TCP/IP and other network protocols, such
as Novell or Windows for Workgroups. One
computer on the LAN then provides the TCP/IP
connection to the outside world.
TCP/IP has been ported to most computer
system including personal computers, and has
become the new standard in internetworking. It is 1
protocol set that provides the infrastructure for the
Internet today. TCP/IP comprises over 100 different
protocols. It includes services for remote logon, file
transfers, and data indexing and retrieval, among
others.

English for Special Purposes


56 Computer Engineering

PPP 17. Reread the text and answer the following


One of the most widely used protocols is the questions
Point to Point Protocol. PPP is a mechanism for 1. What determined the necessity of creating a set
creating and running IP and other network protocols of networking protocols?
over a serial link – be that a direct serial connection 2. What is the role of the TCP portion of the TCP/IP
(using a null-modem cable), over a telnet protocol?
established link, or a link made using modems and 3. What is a socket?
telephone lines (and of course ISDN). 4. What does the IP portion do?
Using PPP, you can connect your PC to a PPP 5. What is a function of a LAN?
server and access the resources of the network to 6. How many protocols does TCP/IP comprise?
which the server is connected as if you were directly 7. What is the PPP used for?
connected to that network. You can also set up your 8. In what way does it differ from the Ethernet
PC as a PPP server, so that other computers can dial connection?
into your computer and access the resources on 9. How can you apply client server relations in the
your local PC and/or network. You can also use PPP PPP?
on two PCs to link together two networks (or a local 10. Explain the term “peer-to-peer system”.
network to the Internet), creating a Wide Area
Network (WAN).
One major difference between serial based
PPP and an Ethernet connection is of course speed
– a standard Ethernet connection operates at 10
Mbs or 100 Mbs maximum theoretical throughput,
whereas an analogue modem operates at speeds up
to 56 kbps. Also, depending on the type of PPP
connection, there may be some limitations in usage
of some applications and services.
PPP is strictly a peer to peer protocol; there is
(technically) no difference between the machine
that dials in and the machine that is dialed into.
However, for clarity's sake, it is useful to think in
terms of servers and clients. When you dial into a
site to establish a PPP connection, you are a client.
The machine to which you connect is the server.
When you are setting up a box to receive and
handle dial-in PPP connections, you are setting up a
PPP server. Any PC can be both a PPP server and
client - even simultaneously if you have more than
one serial port (and modem if necessary).
The machine that initiates the call as the CLIENT,
whilst the machine that answers the telephone,
checks the authentication of the dial in request is
referred to as the SERVER. The use of PPP as a client
to link one or more machines at a location into the
Internet is, probably, the one in which most people
are interested.

English for Special Purposes


Computer Engineering 57

WRITING: LAN (WLAN) description


18. Write a description of a LAN or WLAN (wireless local area network). Don’t forget to mention these
points: general information, specifications, performance parameters, special features. Visit
http://www.buzzle.com/articles/computer-networking to get some useful information.

…………

SPEAKING: Computer Networking


19. Report. Find some information about these scientists who influenced greatly computer networking
development and get ready to report back to the group. Don’t forget to mention these points: background,
achievements, contributions etc.
 George Robert Stibitz 
 Joseph Carl Robnett Licklider
 Leonard Kleinrock
 Paul Baran
 Donald Watts Davies

English for Special Purposes


58 Computer Engineering

Unit 6 Computer Graphics


Noun suffixes -ing forms Computer Graphics Computer animation Details & examples

LEAD-IN: Computer graphics application


1. Study the list of CG applications and comment on how they can be used:

 Computational biology
 Computational physics
 Computer-aided design
 Computer simulation
 Digital art
 Education
 Graphic design
 Infographics
 Information visualization
 Rational drug design
 Scientific visualization
 Video Games
 Virtual reality
 Web design

PRONUNCIATION
2. Make sure you pronounce the following words properly:
synthesize ['sɪnθəsaɪz] exterior [ɪk'stɪərɪə]
aesthetic [i:s'θetɪk] spatial ['speɪʃl]
visualization [vɪzυǝlaɪ'zeɪʃn] procedurally [prəυ 'si:dʒrǝli]
although [ɔ:l'ðəυ] finite ['faɪnaɪt]
representation [reprɪzen'teɪʃn] differentiate [dɪfə'renʃɪeɪt]

WORD STUDY
3. Translate the following definitions and memorize the terms:

content (n) - information resources (entry) or filling of web servers;


dimension (n) - a measurement of the size of something in a particular direction,
such as the length, width, height, or diameter Syn. measurement;
encompass (v) - to enclose within a circle; surround Syn. include;
manipulate (v) - to handle or use, esp with some skill, in a process or action;
differentiate (v) - 1) to serve to distinguish between ;
2) to perceive, show, or make a difference (in or between);
discriminate;
application (n) - 1) a computer program that is written and designed for a specific

English for Special Purposes


Computer Engineering 59

need or purpose;
2) applying to a particular purpose or use;
discrete (adj) - separate or distinct in form or concept;
setting (n) - 1) the surroundings in which something is set; scene;
2) the scenery, properties, or background, used to create the
location for a stage play, film, etc;
approximation(n) - the process or result of making a rough calculation, estimate, or
guess;
sample (n) - a small part of anything, intended as representative of the whole;
specimen;
manifold (adj) - 1) of several different kinds; multiple: manifold reasons;
2) having many different forms, features, or elements: manifold
breeds of dog;
conjunction (n) - 1) the act of joining together; combination; union;
2) simultaneous occurrence of events; coincidence;
mesh (n) - a network; net;
via (prep) - by way of; by means of; through;
standalone (adj) - (of a device or system) capable of operating independently of any
other device or system.

4. Match the following words with their synonyms (A, B) and the Russian equivalents (C, D):

A B C D
mesh single content жидкость
foundation limited issue захват изображения
standalone combination boundary временной
define distinguish polygonal проблема; дело; тема; пункт
finite basis spatial пограничный
shape include temporal определение ключевых кадров
conjunction determine fluid содержание
encompass alike capture многоугольный
differentiate net data-driven местный
similar form keyframing компьютерно управляемый

5. Guess the jumbled words by their definition:

tnilioluamin  a source of light;


_______________
 the process or art of drawing in accordance
sgcrpahi
_______________ with mathematical principles;
rrxietoe  a part, surface, or region that is on the outside;
_______________
ecsruaf  the boundary of a solid figure;
_______________
lmeod  a representation of a structure.
_______________

English for Special Purposes


60 Computer Engineering

WORD BUILDING: Noun suffixes

Suffixes change the class of the root word. Suffixes can help you tell if a word is a noun, an
adjective or a verb. Common noun suffixes are:
-er, -or, -ion, -tion, -ation, -ment, -ness, -ity, -ant, - logy, -ing, -y, -ure, -sion
! When using suffixes, always check in your dictionary to see if you need to change any other
letters.
scan – scanner (double n)

6. Complete these sentences with the word in brackets and one of the noun suffixes. Use a dictionary to
help you.
1. Kodak is a (manufacture) ____________ of photographic and imaging equipment.
2. To avoid red eyes, use the camera's red eye (reduce) ____________ feature.
3. (Crop) ____________ a photograph means cutting out the parts of an image you don't need.
4. The (sharp) ____________ of a photograph is a combination of resolution and acutance - the ability
to represent clear edges.
5. Digital (techno) ____________ is evolving so rapidly that some cameras have a resolution of 12
megapixels – that's 12 million pixels.
6. Computer graphics are pictures and (draw) ____________ produced by computer.
7. The (sharp) ____________ of an image depends on the (dense) ____________ of pixels, or (resolute)
____________.
8. Paint and photo−editing programs like Adobe Photoshop focus on the (manipulate) ____________ of
bitmaps.
9. (Composite) ____________ is combining parts of different images to create a single image.
10. Graphic artists and (design) ____________ use drawing programs to create freehand drawings and
(illustrate) ____________ for books or for the Web.
11. Business people use (present) ____________ graphics to make information more interesting
visually.
12. CAD is used in aerospace, (architect) ____________ and industrial sectors.
13. Designers fill the surfaces to give the (appear) ____________ of a 3−d solid object with volume.
14. The process of adding paint, colour and filters is called (texture) ____________.
15. (Govern) ____________ agencies use GIS to understand geographic data and then plan the use of
land or predict natural disasters.

GRAMMAR FOCUS : -ing forms


7. Say to what part of speech these -ing forms belong. Translate the sentences. If you need help use
GRAMMAR FILES 6 (p. 113).
1. Our aim is solving this complex problem.
2. They succeeded in obtaining good results working with this computer.
3. In testing the devices they found some serious faults.
4. The growing importance of satellite services in telecommunications attracts worldwide attention.
5. Russian scientists played a great role in the spreading of the satellite television in Russia.
6. The scientist published his experiments proving the existence of radio waves in space.
7. Using the new method it is possible to increase accuracy and speed of computational results.
8. Thousands of scientists, using the most modern equipment, are studying this phenomenon.
9. These new devices are replacing their older equivalents.

English for Special Purposes


Computer Engineering 61

10. Computers occupy one of the leading places among the greatest achievements of modern engineering.
11. Developing the new method they achieved good results.
12. Our space exploration develops much faster than that of the other developed countries,
including the USA.

8. Write out the numbers of the sentences with a participle, a gerund or a noun to complete the following
chart.
participle gerund noun

1. By adding memory to a computer we increase its performance.


2. It is necessary to complete the experiment without destroying the substance.
3. Showing the technical difficulties of the scheme is the object of the paper.
4. We have heard of his starting a very important experiment in your laboratory.
5. No changes can be made in that branch of industry without introducing the most up-to-date
technology.
6. The possibility of chemical energy being transformed into electric energy is evident.
7. Proper measurement is of great importance for getting the necessary data.
8. There is no hope of our getting a complete analysis within 10 days.
9. Having used all the information available, the scientist suggested a new interesting method of
analysis.
10. Each scanning from top to bottom transmits one complete picture.
11. Having been adjusted the equipment operated properly.
12. Having carried on many experiments and tests a scientist published many articles on computer
science.
13. These principles are exactly the same as in the case of ships, each control having its code signal.
14. Several points of disagreement are evident when comparing the results obtained.
15. There is almost no limit to the speed at which the counting can be carried.
16. The program downloading from the Internet should be installed.
17. Scanning is the only practical method of converting a picture with its hundreds of thousands of tiny
details into a form suitable for transmission.
18. PCs generate graphics by performing mathematical calculations on data.
19. Businesspeople use graphics to make information more interesting visually.
20. Graphs and diagrams can be more effective ways of communicating with clients than lists of figures.

9. Correct the mistakes in these sentences. There are seven mistakes in total.
1. Computer animation is the process of create objects which move across the screen.
2. Texturing involves add paint, colour and filters to drawings and designs.
3. You can open the colour palette by click on the corresponding icon.
4. CAD programs are very fast at to perform drawing functions.
5. A lot of time and money is saved by test a car design before to make the product.
6. To render refers to the techniques used to make realistic images.

10. Find the examples of the -ing forms in the following text and define their part of speech.

English for Special Purposes


62 Computer Engineering

SPECIALIST READING A: Computer graphics


11. Scan the text and name:
Computer graphics is a subfield of computer
a) the applications of CG mentioned in the text;
science which studies methods for digitally
b) four subfields of CG.
synthesizing and manipulating visual content.
12. Match the following word combinations: Although the term often refers to the study of
1. computer a) processing three-dimensional computer graphics, it also
2. light b) review encompasses two-dimensional graphics and image
3. visual c) science processing.
4. image d) provider Computer graphics studies the manipulation of
5. physical e) developer visual and geometric information using
6. modeling f) transport computational techniques. It focuses on the
7. software g) simulation mathematical and computational foundations of
8. content h) content image generation and processing rather than purely
9. product i) tool aesthetic issues. Computer graphics is often
differentiated from the field of visualization,
although the two fields have many similarities.
Applications of computer graphics include:
 Special effects  Video games
 Visual effects  Digital art
There are four major subfields in computer
graphics.
The subfield of geometry studies the
representation of three-dimensional objects in a
discrete digital setting. Because the appearance of
an object depends largely on its exterior, boundary
representations are most commonly used. Two
dimensional surfaces are a good representation for
most objects, though they may be non-manifold.
The Lagrangian, L, of a dynamical system is a
function that summarizes the dynamics of the system.
Since surfaces are not finite, discrete digital
It is named after Joseph Louis Lagrange. The concept of approximations are used. Polygonal meshes are by
a Lagrangian was originally introduced in a far the most common representation, although
reformulation of classical mechanics known as point-based representations have become more
Lagrangian mechanics. In classical mechanics, the
Lagrangian is defined as the kinetic energy, T, of the popular recently. These representations are
system minus its potential energy, V. In symbols, Lagrangian, meaning the spatial locations of the
L=T−V. samples are independent. Recently, Eulerian surface
The Euler angles were developed by Leonhard Euler descriptions (i.e., where spatial samples are fixed)
to describe the orientation of a rigid body (a body in such as level sets have been developed into a useful
which the relative position of all its points is constant) representation for deforming surfaces which
in 3-dimensional Euclidean space. To give an object a
specific orientation it may be subjected to a sequence undergo many topological changes (with fluids being
of three rotations described by the Euler angles. This is the most notable example).
equivalent to saying that a rotation matrix can be The subfield of animation studies temporal
decomposed as a product of three elemental rotations.
descriptions for surfaces (and other phenomena),
i.e., how they move and deform over time.

English for Special Purposes


Computer Engineering 63

Historically, most work in this field has focused VOCABULARY IN USE


on parametric and data-driven models, but recently 13. Replace the italicized words with the
physical simulation has become more popular as equivalents from the box.
computers have become more powerful
foundations conjunction meshes
computationally.
differentiated encompasses
Rendering generates images from a model.
Rendering may simulate light transport to create 1. The term Computer Graphics includes 3D CG,
realistic images or it may create images that have a 2D CG and image processing.
particular artistic style in non-photorealistic 2. Computer Graphics is distinguished from
rendering. The two basic operations in realistic visualization.
rendering are transport (how much light passes 3. Polygonal nets are the most common
from one place to another) and scattering (how representation of surfaces.
surfaces interact with light). 4. CG focuses on the mathematical and
Transport describes how illumination in a scene computational basis of image generation and
gets from one place to another. Visibility is a major processing.
component of light transport. Models of scattering 5. Popular methods include keyframing, inverse
and shading are used to describe the appearance of kinematics, and motion capture, though many
a surface. Descriptions of this kind are typically of these techniques are used in combination
expressed with a program called a shader. with each other.
3D computer graphics are often referred to as 3D
14. Complete the sentences as in the text using
models. The model describes the process of forming
the words from the box.
the shape of an object. The two most common
sources of 3D models are those originated on the simulation setting visibility
computer by an artist or engineer using some kind samples content approximations
of 3D modeling tool, and those scanned into a 1. Computer graphics studies methods of digitally
computer from real-world objects. Models can also
synthesizing visual _____.
be produced procedurally or via physical simulation. 2. The subfield of geometry studies the
Before objects are rendered, they must be representation of three-dimensional objects in
placed (laid out) within a scene. This is what defines a discrete digital _____.
the spatial relationships between objects in a scene
3. Since surfaces are not finite, discrete digital
including location and size. Popular methods include _____ are used.
keyframing, inverse kinematics, and motion capture,
4. The Lagrangian representations mean that the
though many of these techniques are used in spatial locations of the _____are independent.
conjunction with each other. As with modeling, 5. Recently _____ has become more popular.
physical simulation is another way of specifying 6. _____ is a major component of light transport.
motion.
There are a multitude of websites designed to
help educate and support 3D graphic artists. Some
are managed by software developers and content
providers, but there are standalone sites as well.
These communities allow for members to seek
advice, post tutorials, provide product reviews or
post examples of their own work.

English for Special Purposes


64 Computer Engineering

COMPREHENSION CHECK
15. Mark the following statements as “true” or “false”, correct the false ones. Find information in the text if
necessary.
True False
1. Computer Graphics focuses on purely aesthetic issues.
2. Computer Graphics differs completely from visualization.
3. Animation describes the changes of an object over the time.
4. Fluids are the most notable examples of Lagrangian representation.
5. Physical simulation has become more popular than data-driven models nowadays.
6. Visibility is a major component of light transport.
7. The model describes the shape of an object.
8. 3D graphics artist can find help in the Internet.
9. Rendering generates images from the real world.
10. Keyframing, inverse kinematics, and motion capture can’t be used together.

16. Answer the questions:


1. What does Computer Graphics study?
2. How many subfields does it include?
3. What techniques does the subfield of geometry use?
4. What does the appearance of an object depend on?
5. What is the drawback of two dimensional surfaces?
6. Why are discrete digital approximations used?
7. What are the most common representations?
8. What subfield studies the movement or deformation of surfaces?
9. What are the two basic operations in rendering?
10. What are the most common sources of 3D modeling?

English for Special Purposes


Computer Engineering 65

SPECIALIST READING B: COMPUTER ANIMATION


17. Look through the text and find the sentences Computer animation is the art of creating
describing: moving images with the use of computers. It is a
 the target of the animation; subfield of computer graphics and animation.
 how the illusion of movement is created; Increasingly it is created by means of 3D
 the rates perceivable by eyes and brain; computer graphics, though 2D computer graphics
 skeletal animation; are still widely used for stylistic, low bandwidth,
 methods for generating the Avar values; and faster real-time rendering needs. Sometimes
 an open challenge in computer animation. the target of the animation is the computer itself,
18. Read the text and make a list of the key words but sometimes the target is another medium,
that would help you summarize the text. such as film. It is also referred to as CGI
_______________________________________ (computer-generated imaging).
_______________________________________ To create the illusion of movement, an image
is displayed on the computer screen and
_______________________________________
repeatedly replaced by a new image that is
___________________________________________ similar to the previous image, but advanced
________________________________________ slightly in the time domain (usually at a rate of 24
________________________________________ or 30 frames/second). This technique is identical
to how the illusion of movement is achieved with
________________________________________
television and motion pictures.
________________________________________ Computer animation is essentially a digital
________________________________________ successor to the art of stop motion animation of
________________________________________ 3D models and frame-by-frame animation of 2D
illustrations. For 3D animations, objects (models)
are built on the computer monitor (modeled) and
3D figures are rigged with a virtual skeleton. For
2D figure animations, separate objects
(illustrations) and separate transparent layers are
used, with or without a virtual skeleton. Then the
limbs, eyes, mouth, clothes, etc. of the figure are
moved by the animator on key frames. The
differences in appearance between key frames
are automatically calculated by the computer in a
process known as tweening or morphing. Finally,
the animation is rendered.
To trick the eye and brain into thinking they
are seeing a smoothly moving object, the pictures
should be drawn at around 12 frames per second
(frame/s) or faster. With rates above 70 frames/s
no improvement in realism is perceivable. At
rates below 12 frame/s most people can detect
jerkiness which detracts from the illusion of

English for Special Purposes


66 Computer Engineering

realistic movement. Conventional hand-drawn Inbetweening (tweening) is the process of generating


intermediate frames between two images to give the
cartoon animation often uses 15 frames/s, but
appearance that the first image evolves smoothly into
this is usually accepted because of the stylized the second image.
nature of cartoons. Avar (animation variable) is a variable controlling the
Computer animation demands higher frame position of part of an animated object, such as a
rates to reinforce the realism. In most 3D character. Successive sets of avars control all movement
computer animation systems, an animator creates of the character from frame to frame. In development,
a simplified representation of a character's they are used to define the junctions of a stick model.
Later, they are incorporated into a full wire frame model
anatomy, analogous to a skeleton. The position of
or a model built of polygons. Finally, surfaces are added,
each segment of the skeletal model is defined by
requiring a lengthy process of rendering to produce the
animation variables, or Avars. In human and final scene.
animal characters, many parts of the skeletal
model correspond to actual bones, but skeletal
animation is also used to animate other things,
such as facial features(though other methods for
facial animation exist).
There are several methods for generating the
Avar values to obtain realistic motion.
Traditionally, animators manipulate the Avars
directly. Rather than set Avars for every frame,
they usually set Avars at strategic points (frames)
in time and let the computer interpolate or
'tween' between them, a process called
keyframing.
One open challenge in computer animation is a
photorealistic animation of humans. Currently,
most computer-animated movies show animal
characters (A Bug's Life, Finding Nemo,
Ratatouille, Ice Age), fantasy characters (Monsters
Inc., Shrek), anthropomorphic machines (Cars,
Robots) or cartoon-like humans (The Incredibles,
Up). The movie Final Fantasy: The Spirits Within is
often cited as the first computer-generated movie
to attempt to show realistic-looking humans.
However, due to the enormous complexity of the
human body, human motion, and human
biomechanics, realistic simulation of humans
remains largely an open problem.

19. Summarize the text using the key words from


the previous exercise.

English for Special Purposes


Computer Engineering 67

WRITING: Computer Graphics technologies


20. Write a description of one of
Computer Graphics technologies. Don’t
forget to mention these points:
 general information;
 specifications;
 field of use;
 special features;
 examples of its application.
Use links from Get Real to help you.

● Get Real
Check these websites for the latest
news in Computer Graphics:
http://www.nvidia.com/
http://www.3dnews.ru/

SPEAKING: The branches of computer graphics


21. Choosing graphics software. Work in pairs. Student A chooses a task from the list and describes it.
Student В chooses the most appropriate graphics software for the task and gives reasons for his or her
choice. Swap roles.
Student A Student B
- to edit and retouch photos Computer animation software, for example 3-D
- to create illustrations and drawings for a magazine Studio Max
- to prepare slideshows for training sessions or GIS software, for example ArcView
conferences Presentation software, for example PowerPoint
- to make mechanical designs and architectural plans A CAD package, for example AutoCAD
- to create dynamic simulations and special effects for Vector graphics software, for example Freehand
- films, TV, advertisements and games A paint and image-editing program, for example
- to analyse geographic data and make maps Photoshop
22. Make a report on one of the following topics and discuss them in your group:
3D computer graphics; Cloth modeling; Computer facial animation; Geometry processing; Graphics
processing unit (GPU); Digital geometry; Digital image editing; Painter's algorithm; SIGGRAPH; Stanford
Bunny; Utah Teapot. Use Supplementary reading section text: The concept of computer graphics.

The following discourse markers may help you:


Giving details As well as that; another thing is; besides; furthermore; in addition; moreover; in particular

Giving For example; for instance; as an example


examples

English for Special Purposes


68 Computer Engineering

Unit 7 Multimedia
Useful prefixes 3 Participle II Multimedia Multimedia Web Design Adding

LEAD-IN
1. Identify these examples of content forms combined in multimedia and comment on how they can be
used:

PRONUNCIATION

2. Make sure you pronounce the following words properly:


multimedia [,mʌltɪ'mi:dɪə] appropriate [ə'prəυprɪət]
modifiable ['mɒdɪfaɪəbl] determine [dɪ'tɜ:mɪn]
advertisement [əd'vɜ:tɪsmənt] blurring [blɜ:rɪŋ]
recipient [rɪ'sɪpɪənt] content ['kɒntent]
survivability [sə,vaɪvə'bɪlətɪ] convergence [kən'vɜ:dʒǝns]

WORD STUDY
3. Translate the following definitions and memorize the terms:

content (n) - information resources (entry) or filling of web servers;


deliver (v) - to carry (transfer) and distribute (goods, mail, etc.) to several places;
linear (adj) - relating to a line or to length, resembling, represented by, or consisting of a line
or lines, having one dimension;
interactivity (n) - a state allowing or relating to continuous two-way transfer of information
between a user and the central point of a communication system (computer or
television);
enhance (v) - to intensify or increase in quality, value, power, etc.;
convey (v) - to carry, or transport from one place to another, to communicate (a message,
information, etc.);
haptic (adj) - relating to or based on the sense of touch;
feature (n) - a typical quality or an important part of something;
blend (v) - to mix or mingle components together thoroughly;

English for Special Purposes


Computer Engineering 69

volatile (adj) - inconstant, unsteady, lasting only a short time; (of a memory) not retaining
stored information when the power supply is cut off;
convergence (n) - the combining of different forms of electronic technology, such as data
processing and word processing converging into information processing;
predictability (n) - the state of knowing what something is like, when something will happen, etc.

4. Match the following words with their synonyms:


deliver demonstration simulation admission
enhance improve enable combination
convey entry access activate
display tactile incorporate hold-up
feature characteristic delay include
haptic supply volatile modeling
content communicate convergence unsteady

5. Match the following words with their equivalents in Russian:


predictability загружать из удаленного компьютера
delay предсказуемость
content подключаемая (вспомогательная) программа
blend растровое отображение графического объекта
bitmap позволяющий самостоятельно выбирать скорость обучения
volatile совмещение
self-paced живучесть
convergence загружать в удалённый компьютер
survivability непостоянный, временный
download информационное наполнение
plug-in задержка, время пересылки пакета от отправителя к получателю
upload смешивать

6. Match a verb in A with a noun in B:


A B
divide into special effects
convey information
develop categories
blend additional time
reduce techniques
require the download time
A B
combine visual experience
enhance multiple forms of content
require a new approach
install application
determine the image size
find a plug-in

English for Special Purposes


70 Computer Engineering

WORD BUILDING: Useful prefixes 3


A lot of prefixes are used in English for special purposes. Here is a list of prefixes which are useful in helping
you to understand unfamiliar words and terms. Some of them are used with a hyphen. Check in a dictionary
if you're not sure.

prefix meaning example


en- a) put in or on enclose, enqueue
b) cause to be in a certain condition enable, encode, enhance
em- a variant of en- before b, m, and p embed, empower
dis- indicating reversal connect – disconnect
non- indicating negation, exclusion from a nonexistent, nonfiction
specified class of persons or things
macro- a) large or great in size or duration macroscopic
b) producing larger than life images macrophotography
micro- very small microprocessor
inter- between or among international
together, mutually, or reciprocally interdependent, interchange
hyper- above, over, or in excess hypertext
self- of oneself or itself, automatic self-defence, self-recording
down- towards the end or the lower part download
up- up, upper, higher or upwards upload, upgrade, uplink, upstream
e- electronic, indicating the involvement e-business, e-money, e-book,
of the internet e-money, e-learning, e-mail
co- mutual, indicating partnership co-author, co-design
bi- two, having two, occurring twice bifocal, binary code, bi-directional bus,
re- again/back retransmit, replace, reboot
ultra- extremely/beyond ultra-slim, ultraspeed, ulrastable
co- with/together co-authoring system, co-developer
de- remove/reduce decode, deactivate, discharge
mis- wrongly, badly or incorrectly misconnection, misprint
over- excessive; beyond a desirable limit overvoltage, overdamping, overload
post- after or later than postbyte, postprocessor

7. Use a prefix from the box to form the right word.

hyper- down- e- self- inter- dis- non - up- en-(2) em-(2)

1. An electronic whiteboard is an excellent presentational device with the potential to do much more
- to go beyond display, providing a tool for _____active teaching and learning.
2. A _____linear editing system is a video or audio editing system which can perform random access
on the source material.
3. Most of the courses are _____paced, which means you can enroll any time and finish in less than a
semester or take up to a year.
4. The World Wide Web is a classic example of _____media, whereas a non-interactive cinema
presentation is an example of standard multimedia due to the absence of hyperlinks.

English for Special Purposes


Computer Engineering 71

5. This application offer both internet and gaming acceleration. It can quickly _____hance your
computing experience with a single click of a button.
6. You should know that too many little icons can easily _____tract your website visitors.
7. _____loading usually refers to transfer from a larger "host" system to a smaller "client" system,
and "_____load" usually means to transfer data or files from a peripheral or subordinate system to
a larger or more central one.
8. Is it possible to create a simple image map with _____bedded hyperlinks that I can use online?
9. _____learning is pedagogy _____powered by digital technology.
10. Their aim is to make sure that every home becomes Internet _____abled in the next 10 years.

GRAMMAR FOCUS: Participle II


8. Translate the sentences into Russian and define the functions of Participles. If you need help use
GRAMMAR FILES 7 (p. 114).

1. Multimedia technologies, whether delivered online or offline, offer significant advantages


over alternative communications mediums.
2. Interested users may sign up to receive future information concerning electronically
delivered products via e-mail.
3. A new web based program for MP3 files runs silently in the background and can be
accessed by any machine on your local network.
4. The word “play” suggests different notions to a child, an actor or a footballer, and has in
their speech different meaning. The same applies to the word “track” as used by a
pilot, a sportsman, DJ or the word “keyboard” as understood by a programmer, a musician
or a telephone operator.
5. In the 24-bit mode, the digital data is recorded onto the internal hard drive as 32-bit data,
ensuring even higher recording and playback quality.
6. If used in a computer based training environment, the students’ computer can be
connected to the A input, whilst the teacher computer can be connected to the B input.
7. Computer graphic designs are picture images created and manipulated digitally on
computers.
8. Certain videos are empty when downloaded. Why does it happen?

SPECIALIST READING A: Multimedia


1._______________________
In common usage, the termfor
English multimedia refers
Special Purposes
to an electronically delivered combination of
media including video, still images, audio, text in
such a way that can be accessed interactively.
72 Computer Engineering

9. Scan the text and match the headings (a – e) with


the paragraphs (1 – 5).
a) Entertainment and fine arts;
b) Structuring information in a multimedia
form;
c) Major characteristics;
d) Terminology;
e) Education.

10. Read the text and answer the questions.


1. What does the term “multimedia” refer to?
2. What is the difference between linear and non-
linear multimedia?
3. Where does multimedia find its application?
4. What applications are called interactive
multimedia?
5. Is multimedia entertainment used in Education?
6. How can you characterize the “on-line writing
style”?

11. Read the text and mark the information


about online multimedia features.

English for Special Purposes


Computer Engineering 73

a popular pastime and are software programs


available either as CD/DVD-ROMs or online.
Some video games also use multimedia features.
Multimedia applications that allow users to
actively participate instead of just sitting by as
passive recipients of information are called
Interactive Multimedia. In the Arts there are
multimedia artists, whose minds are able to
blend techniques using different media that in
some way incorporates interaction with the
viewer. Although multimedia material may be
volatile, the survivability of the content is as
strong as any traditional media.
4._______________________
In Education, multimedia is used to produce
computer-based training courses (CBTs) and
reference books. A CBT lets the user go through
a series of presentations, text about a particular
topic, and associated illustrations in various
information formats. Edutainment is an informal
VOCABULARY IN USE
term used to describe combining education with
entertainment, especially multimedia 12. Complete the sentences with suitable words
entertainment. Learning theory in the past and word combinations.
decade has expanded dramatically because of 1. Modern Interactivity is made possible by
the introduction of multimedia. The possibilities combining multiple forms of media ________.
for learning and instruction are nearly endless. 2. Haptic technology, illusions of taste and smell
The idea of media convergence is also becoming ________ the multimedia experience.
a major factor in education, particularly higher 3. Some multimedia artists often ________
education. techniques using different media applications.
5._______________________ 4. Multimedia content is not ________, it is as
Multimedia and the Internet require a strong as any traditional media.
completely new approach to writing. The style of 5. In the ________ multimedia applications are
writing that is appropriate for the “on-line used to develop special effects in movies and
world” is highly optimized and designed to be animations.
quickly scanned by readers. A good site must be 6. Multimedia games are ________ as CD/DVD-
attractive for visitors. When users view a page, ROMs or online.
they can only view one page at a time. As a 7. The edutainment possibilities are ________.
result, multimedia users have to create a 8. Nowadays media ________ is an important
“mental model of information structure”. That’s characteristic of higher education.
why users need predictability and structure, with 9. Education potential has expanded a lot on
clear functional and graphical continuity account of ________.
between the various components and 10. Attractiveness, ________ and structure are the
subsections of the multimedia production. zzzmain features of a good site.

English for Special Purposes


74 Computer Engineering

COMPREHENSION CHECK
13. Reread the text, tick the “false” sentences and
correct them.

 Multimedia represents a combination


of media including video, coded
representation, audio, printed text in
such a way that can be accessed
interactively.
 Linear multimedia is characterized by
the absence of navigational control for
the viewer.
 Online multimedia contains not only
photo galleries with both images and
title user-updated, but also display-
only illustrations, animations and
videos.
 A computer-based training course is a
set of texts, illustrations and
multimedia presentations.
 When users browse through an
Internet page they have to create a
“predictable structure of mental model
of information”.
 The style of writing in the Web is highly
refined and designed to greatly
impress readers.
 Haptic technology enhances the
multimedia experience.
 Being an example of linear content
hypermedia offers users certain
interactivity.
 In Education, reference books are still
produced without any multimedia
content.
 Several multimedia formats are
intended to make it easier and faster to
convey information.
 Any website should be characterized
by distinct continuity between the
elements and subsections of the
multimedia production.

English for Special Purposes


Computer Engineering 75

SPECIALIST READING B: Multimedia Web Design

14. Scan the text, identify different parts and entitle them.
title from… – to…

15. Read the text and decide whether these points are discussed in it.
Yes No Yes No
good multimedia web design characteristics the main goal of Web advertising
Web content variants vector graphics features
multimedia web design software products computer design specifications
streaming multimedia bitmap images

A good multimedia web design is one that adds is already included with the latest Web browsers.
to the overall value of your site. It depends on the Computer graphic designs are picture images
web site design as well as the kind of services you created and manipulated digitally on computers.
want to convey. The very last thing you need is to There are basically two forms in computer graphic
distract your viewer from the key message on your design: bitmaps and vector graphics. Bitmap images
web page through multimedia web design. are widely used. The number of pixels in the image
Multimedia web design products will allow you to determines the size of these images. They must be
publish two versions of your content. One version is printed or displayed at the same size. Any other size
published strictly with HTML and doesn't include the distorts the image. Vector graphics are a set of
rich features of the multimedia project, but it allows graphical objects stored as coordinates, and
most users to get to the content they want. The mathematical formulas that determine their shape
multimedia version will require additional download and position. These graphical objects are called
time or a plug-in, but the viewer will be able to see, primitives. Lines, curves, rectangles, ellipses etc. are
hear, and interact with the content exactly as it was all primitives. These are widely used in computer-
intended. Much of multimedia web design software aided design.
utilizes compression technology to create the Computer graphic design entails editing and
smallest possible files, thereby reducing the polishing graphics. 2D or 3D computer graphic design
download time and wait time for the viewer. programs can be used to create animations. One of
You can publish texts, audio, images and the issues in computer graphic design is choosing the
animation to the web as streaming multimedia. image that will convey the meaning best. The graphic
Streaming multimedia means that the user does not must complement the text on the website. The
have to wait for the files to download completely graphic designer must produce a visual
before he can see them. Usually a portion of the communication product for a specific audience.
content is downloaded, and the remainder is Technology gives the tools to create finished
downloaded while the content is being viewed. products quickly with a high level of professionalism.
Adding multimedia design to web site greatly An effective advertising or education campaign does
enhances the visual experience of the visitor. much more than deliver a message; it also influences
Multimedia for web design requires the viewer to the audience response. There is no point in telling
install a plug-in or player to view the content. people how good a product is if we can't make them
However, some products employ technology that start using it.

English for Special Purposes


76 Computer Engineering

WRITING: Summary
16. Summarize the general ideas of text B:
Multimedia Web Design. Follow these This text goes under the headline...
steps:
1. Read the text again.
2. Underline the relevant information in
each paragraph.
3. Make notes about the main points.
Leave out details such as examples.
4. Make sentences from the notes and link
the sentences with connectors (and, but,
because, therefore, etc.).
5. Write your first draft.
6. Improve your first draft by reducing
sentences. For example:
 cut out unnecessary phrases;
 omit qualifying words (adjectives or
modifying adverbs);
 transform relative clauses into -ing
participle clauses
7. Write the final version of your summary.
8. Don't forget to check the spelling and
grammar.

SPEAKING: Multimedia applications


17. Prepare a report and take part in a round table discussion on the topic “Multimedia applications”.
Pay attention to the following points:

1. Online multimedia.
2. Edutainment applications and CBT courses.
3. Engineering multimedia applications.
4. Multimedia web design software.
5. Rich media components.

Use Supplementary reading section text “Rich media


features” to express your opinion.

The following discourse markers may help you:

adding These expressions are much more elegant moreover (very formal); furthermore
than the conjunction 'and'. We use them to (formal); in addition; as well as that; on
add information to what has been said. top of that (informal); another thing is;
what is more; besides; in any case
logical These expressions show that the second therefore (formal); as a result (formal);
consequence statement follows logically from the first one. consequently (formal); so; then

English for Special Purposes


Computer Engineering 77

Unit 8 Telecommunication
Suffixes -able, -ize Passive infinitives Telecommunication Satellite services Viewpoint adverbs

LEAD-IN: Telecommunication devices


1. Match the telecommunication devices with their implementations:
Cell Phone  provides information to the viewer
Laptop with internet access  provides communication as well as access of information and
contribution of information via the internet
Television  provides information to the listener
Radio  allows sending and receiving e-mails and SMS with a high level of
security through on-device message encription
BlackBerry  provides communication between individuals
Two-Way Radio  provides access of information and contribution of information on the
internet
Dial-up modem  allows wired communication devices to connect to a wireless network
using Wi-Fi
Wireless access point  is a device used to connect a computer or ... termination broad band
adapter
A (DSL) modem  uses the facilities of the public switched telephone network to establish
a dialled connection to an Internet service provider via telephone lines

PRONUNCIATION
2. Make sure you pronounce the following words properly:
transmission [trænz'mɪʃn] medium ['mi:dɪəm]
purpose ['pɜ:pəs] multiple ['mʌltɪpl]
advantage [əd'vɑ:ntɪdʒ] allocate ['æləkeɪt]
router ['ru:tə] recurring [rɪkɜ:rɪŋ]
standardize ['stændədaɪz] layer ['leɪə]

WORD STUDY
3. Translate the following definitions and memorize the terms:

access (v) - a) to obtain or retrieve (information) from a storage device;


b) to place (information) in a storage device: direct access, sequential access;

English for Special Purposes


78 Computer Engineering

allocate (v) - to assign or allot for a particular purpose;


chunk (n) - a considerable amount: chunk of data;
customize (v) - to modify (something) according to a customer's individual requirements;
destine (v) - to appoint for something, intend, design;
encode (v) - to convert (characters and symbols) into a digital form as a series of impulses;
eventually (adv) - a) at the very end, finally;
b) (as sentence modifier) after a long time or long delay: Eventually, he arrived.
handle (v) - to deal with or treat in a specified way;
medium (n) - an intervening substance for transmitting data: automated data medium, data
input medium, data medium, interactive medium, transmission medium;
merge (v) - to blend or cause to blend, fuse;
regardless (adv) - in spite of everything;
restrict (v) - to confine or keep within certain often specified limits or selected bounds;
router (n) - a device that allows packets of data to be moved efficiently between two
points on a network: communications router, router ID, router identifier;
stack (n) - a) an area in a computer memory for temporary storage;
b) a set;
c)data structure: hardware stack, hidden stack, instruction stack;
stream(n) - continuous moving: bit stream, data stream, input stream, output stream;

4. Match the following words with their synonyms (A, B):

A B A B
run limit involve change
restrict periodic convert known
recurring assign familiar examine
allocate appoint correct aim
merge operate investigate include
destine unite purpose proper

5. Match the following words with their equivalents in Russian:


A B
packet switching многоуровневый подход
file sharing временное уплотнение каналов
discrete value шумовое сопротивление
layered approach передающая среда
instant messaging пакетная коммутация
time division multiplexing дискретное значение
noise resistance совместное использование файлов
transmission medium мгновенные сообщения

6. Complete the puzzle using the clues.

a device that allows packets of data to be moved efficiently


between two points on a network
r

English for Special Purposes


Computer Engineering 79

the form in which data is presented for handling by a


particular computer configuration (information transmission)
p

a software package that enables a user to find and


read hypertext files, esp on the World Wide Web o

a system of interconnected computer systems, terminals, and


other equipment allowing information to be exchanged r

a path along which data can be transmitted between a


central processing unit and peripheral devices a

7. Match a verb in A with a noun in B:


A B
transmit a segment
encode in order
allocate a signal
place information
block information
transfer access
restrict the traffic
route data

WORD BUILDING: Suffixes -able, -ize

SUFFIX –ABLE is used to form the adjectives having the necessary power, resources, skill,
time, opportunity, etc., to do something.
SUFFIX –IZE is used to form the verbs with the following meanings
1) to cause to become, resemble, or agree with
2) to become; change into
3) to affect in a specified way;
4) to act according to some practice, principle, policy

8. Form the adjectives from the following verb roots with suffix -able and translate them:
Example: drink – drinkable (пригодный для питья).
Wash, eat, suit, use, note, detect, operate, consume, count, enjoy, read, separate, love.

What do these words mean? Use it can ... or it can't... . Use a dictionary if necessary.
Example: If something is 1) washable, it can be washed.
If something is 2) unbreakable, it …
If something is 3) edible, it …
If something is 4) unusable, …
If something is 5) invisible, …
If something is 6) portable, …

English for Special Purposes


80 Computer Engineering

9. Form the verbs with the help of the suffix −ize and translate them:
Customer – customize – изготовлять по техническим условиям заказчика (делать на заказ)

economy _______________ _______________ crystal _______________ _______________


minimum _______________ _______________ hypnosis _______________ _______________
maximum _______________ _______________ legal _______________ _______________
optimum _______________ _______________ American _______________ _______________
standard _______________ _______________ oxide _______________ _______________

GRAMMAR FOCUS : Infinitive


10. Read and translate the following sentences paying attention to the Passive Infinitives. If you need help
use GRAMMAR FILES 8 (p. 115).
1. The word "communication" has been used in a very broad sense, it includes all of the procedures by
which one mind may affect another.
2. All kinds of distortions of sound to be conveyed by telephone communication are called noise.
3. In the mathematical theory of communication the word "information" to be used in a special sense must
not be confused with its ordinary usage.
4. The conference to be held in Moscow will discuss questions dealing with communication problems.
5. There are Markoff processes to be widely involved in the theory of communication.
6. The effectiveness problem must have been concerned with the demands of the design.
7. Only one information must have been given at the moment.
8. Zero and one may have been taken symbolically to represent any two choices.
9. This subject will be dealt with in the next chapter.
10. A new type of computing equipment is being produced at our plant.

11. Rewrite these sentences. Instead of using 'somebody' or 'they', write a passive sentence.
1. Somebody has locked the computer. − The computer has been locked.
2. They have postponed the conference. The conference __________________________.
3. Somebody is using the computer at the moment. The computer __________________________.
4. I didn't realize that somebody was recording our conversation. I didn't realize that __________________.
5. When we got to the stadium we found that they had cancelled the game. When we got to the stadium,
we found that __________________________.
6. They are building a new ring road round the city. __________________________.
7. They have built a new hospital near the airport. __________________________.

12. Complete these sentences with one of the following verbs in the correct form: carry cause do
make repair send spend wake up. Sometimes you need have (''might have', 'could have' etc.).
1. The situation is serious. Something must be done before it's too late.
2. I haven't received the e-mail. It might _____________________ to the wrong address.
3. A decision will not _____________________ until the next meeting.
4. I told the hotel receptionist that I wanted to _____________________ at 6.30 the next morning.
5. Do you think that less money should _____________________ on equipment?
6. This net is in very bad condition. It should _____________________ a long time ago.
7. The injured man couldn't walk and had to _____________________.
8. It's not certain how the fire started but it might _____________________ by an electrical fault.

English for Special Purposes


Computer Engineering 81

SPECIALIST READING A: Telecommunication


13. Scan the text and write out the names of the OSI Telecommunication is the assisted transmission
layers. of signals over a distance for the purpose of
data a_________n communication. In earlier times, this may have
Host layers

data p__________n involved the use of smoke signals, drums,


data s_____n semaphore, flags or heliograph. In modern times,
segments t_______t telecommunication typically involves the use of
packets n_____k electronic devices such as the telephone,
Media
layers

frames d__a l—k television, radio or computer. A basic


bits p______l telecommunication system consists of three
elements:
Telecommunication – the word was adapted from
• a transmitter that takes information and
French. It is a compound of the Greek prefix tele- (τηλε-),
meaning 'far off', and the Latin communicare, meaning converts it to a signal;
'to share'. The word was coined in 1904 by French • a transmission medium that carries the
engineer and novelist Édouard Estaunié. signal;
Heliograph – an instrument with mirrors and a shutter • a receiver that receives the signal and
used for sending messages in Morse code by reflecting converts it back into usable information.
the sun's rays. Often telecommunication systems are two-way
APRANET – Advanced Research Projects Agency
with a single device acting as both a transmitter
Network (USA).
and receiver or transceiver.
Signals can be either analogue or digital. In an
analogue signal, the signal is varied continuously
with respect to the information. In a digital signal,
the information is encoded as a set of discrete
values (ones and zeros). Noise resistance
represents a key advantage of digital signals over
analogue signals.
A network is a collection of transmitters,
receivers and transceivers that communicate with
each other. Digital networks consist of one or more
routers that work together to transmit information
VOCABULARY IN USE to the correct user.
14. Match the following word combinations: A channel is a division in a transmission medium
port medium
so that it can be used to send multiple streams of
web switching information. One could allocate each channel a
network number recurring segment of time over which to broadcast
file value – this is known as time-division multiplexing and is
Internet messaging sometimes used in digital communication.
layered administrator In 1960s the researchers started to investigate
instant browsing packet switching – a technology that would allow
packet sharing chunks of data to be sent to different computers.
transmission approach
This network would become ARPANET which
discrete chat
would eventually merge with other networks to
form the Internet.

English for Special Purposes


82 Computer Engineering

The Internet is a worldwide network of computers


and computer networks that can communicate with
each other using the Internet Protocol. Any
computer on the Internet has a unique IP address
that can be used by other computers to route
information to it. In this way, the Internet can be
seen as an exchange of messages between
computers.
The nature of computer network communication
lends itself to a layered approach where individual
protocols in the protocol stack run more-or-less
independently of other protocols. This allows lower-
level protocols to be customized for the network 15. Complete the sentences with the following
situation while not changing the way higher-level words: route port number devices encoded
protocols operate. router as in the text.
At the network layer, things become standardized 1. Telecommunication involves the use of
with the Internet Protocol (IP) being adopted for electronic __________.
logical addressing. For the world wide web, these
2. In a digital signal information is __________
“IP addresses” are derived from the human readable as a set of discrete values.
form using the Domain Name System (e.g. 3. Digital networks consist of one or more
72.14.207.99 is derived from www.google.com). __________ that work together.
At the transport layer, most communication 4. An IP address can be used by other computers
adopts the Transmission Control Protocol. With TCP, to __________ information to it.
packets are retransmitted if they are lost and placed
5. The packets carry __________ with them to
in order before they are presented to higher layers. specify what application the packet should be
The packets carry port numbers with them to
handled by.
specify what application or process the packet
should be handled by. Because certain application- 16. Complete the sentences with the prepositions
level protocols use certain ports, network from the box. Consult the APPENDIX (p. 120):
administrators can restrict Internet access by
of (in)to with for from to for
blocking the traffic destined for a particular port.
Above the transport layer, there are certain 1. The traffic is destined _____ a particular port.
protocols that are sometimes used and loosely fit in 2. A basic telecommunication system consists
the session and presentation layers, most notably _____ three elements.
the Secure Sockets Layer (SSL) and Transport Layer 3. Receivers and transceivers communicate
Security (TLS) protocols. These protocols ensure that _____ each other.
the data transferred between two parties remains 4. The Internet Protocol is adopted _____ logical
completely confidential and one or the other is in addressing.
use when a padlock appears at the bottom of your 5. The “IP addresses” are derived _____ the
web browser. Finally, at the application layer, there human readable form.
are many protocols Internet users would be familiar 6. A transmitter takes information and converts
with such as HTTP (web browsing), POP3 (e-mail), it _____ a signal.
FTP (file transfer), IRC (Internet chat), BitTorrent (file 7. The packets are retransmitted and presented
sharing) and OSCAR (instant messaging). _____ higher layers.

English for Special Purposes


Computer Engineering 83

COMPREHENSION CHECK
17. Give definitions to the following notions:

1. Telecommunication –

2. Network –

3. Channel –

4. Internet –

5. Layered approach –

6. Telecommunication system –

7. Transmitter –

8. Receiver –

9. Packet switching –

10. Time-division multiplexing –

18. Mark the following statements as “true” or “false”, correct the false ones.
True False
1. Mobile phone is an example of two-way communication system.
2. Any computer on the Internet has its unique IP address.
3. Low-level protocols change the operation of higher-level protocols.
4. The Domain Name System is used for the WWW.
5. SSL and TLS don’t provide confidentiality.
6. In an analogue signal the information is encoded as a set of discrete values.
7. Internet access can be restricted by blocking the traffic destined for a particular port.

19. Answer the questions:


1. What means of communication were used in earlier times?
2. What does a basic communication system consist of?
3. What is the main advantage of digital signals?
4. What does a digital network consist of?
5. What kind of investigation was started in 1960’s.
6. What was the forerunner of the Internet called?
7. Why is the layered approach so convenient?
8. What are the port numbers used for?
9. What protocols ensure confidentiality?
10. What protocol is used for Web browsing?

English for Special Purposes


84 Computer Engineering

SPECIALIST READING B: Satellite services

20. Read the text quickly and tick the points that correspond to the context:
 New technologies have made us independent from other people or any events.
 It is difficult to withstand dangers, but humanity has created a system of defensive or offensive actions.
 Thanks to worldwide system of satellites, it is possible to transmit signals into any place on earth.
 There is a convergence between telecommunication and computing technologies.
 We are certain that new communication technologies won’t concern our economic and social life.
 Technical standards of today’s mobile phones allow business travelers use them on international trips.
 Satellite systems will provide us with the information from any part of the globe.

Our world has Already, advanced systems of communication are


become an affecting both the layman and the technician. Complex
increasingly complex functions are being performed by people using
place in which, as advanced terminals which are intended to be as easy to
individuals, we are use as the conventional telephone.
very dependent on The new global satellite-communications systems
other people and on offer four kinds of service, which may overlap in many
organizations. An event in some distant part of the different kinds of receivers: voice, short messaging
globe can rapidly and significantly affect the quality of service, low-bandwidth internet access and tracking.
life in our home country. Voice. Satellite telephones provide similar
This increasing dependence on both a national and functionality to terrestrial mobile telephones.
international scale, has led us to create systems that Depending on the architecture of a particular system,
can respond immediately to dangers, enabling coverage may include the entire Earth, or only specific
appropriate defensive or offensive actions to be taken. regions. That makes them especially useful to remote,
These systems are operating all around us in military, third-world village, explorers and disaster-relief teams.
civil, commercial and industrial fields. Internet service satellite phones have notoriously
A worldwide system of satellites has been created, poor reception indoors, though it may be possible to
and it is possible to transmit signals around the globe by get a consistent signal near a window or in the top floor
bouncing them from one satellite to an earth station of a building if the roof is sufficiently thin. The phones
and thence to another satellite. have connectors for external antennas that are often
Originally designed to carry voice traffic, they are installed in vehicles and buildings. The systems also
able to carry hundreds of thousands of separate allow for the use of repeaters, much like terrestrial
simultaneous calls. These systems are being increasingly mobile phone systems.
adopted to provide for business communications, Messaging. Satellite messagers have the same
including the transmission of traffic for voice, facsimile, global coverage as satellite telephones, but carry text
data and vision. alone, which could be useful for those with laptop
It is probable that future satellite services will computers. Equipped with a small screen satellite
enable a great variety of information services to messagers also receive short messages.
transmit directly into the home, possibly including Tracking. Voice and messaging systems also tell
personalized electronic mail. The electronic computer is their users where they are to within a few hundred
at the heart of many such systems, but the role of meters. Combined with the messaging service, the
telecommunications is not less important. There will be location service could help rescue teams to find
a further convergence between the technologies of stranded adventurers, the police to find stolen cars,
computing and telecommunications. The change will be exporters to follow the progress of cargoes, and
dramatic: the database culture, the cashless society, the haulage companies to check that drivers are not
office at home, the gigabit-per-second data network. detouring to the pub. Satellite systems provide better
We cannot doubt that the economic and social positioning information to anyone who has a receiver
impact of these concepts will be very significant. for their signals.

English for Special Purposes


Computer Engineering 85

21 . Make 10 questions to the text using the following constructions:


1. What is the nature, difference, process, role, importance, etc. of………………………………………?
2. What is referred to as………………………………………………………………………………………………………...?
3. What is used as………………………………………………………………………………………………………….……….?
4. Where do we use………………………………………………………………………………………………………………..?
5. What function do the …… play…………………………………………………………………………………………….?

WRITING: Summary
22. Summarize the main ideas of the text using the following phrases:
1. The text deals with…
2. The development of satellite services has solved…
3. There exist…
4. Of prime interest to the reader will be…
5. In conclusion … is given.

SPEAKING: The Role of Telecommunication


23. Discuss the role of telecommunication in our life using viewpoint adverbs from the box. The
Supplementary reading section may help you.
of course It is true that…
no doubt It is certain that…
without doubt It is beyond doubt that…
to be sure to tell the truth
to be certain by no means
true It is likely that…
in fact It appears likely that…
in effect It is assumed that…
say We assume that
suppose as a matter of fact

English for Special Purposes


86 Computer Engineering

Unit 9 Virtual Reality


Adj -ed/-ing Noun attributes Virtual Reality HMD technology structuring/summing up

LEAD-IN: VR components
1. Study this list of Virtual reality components. Enumerate the fields they might be applied.

 a helmet mounted display


 data gloves
 a stereoscopic display
 a haptic system
 an omnidirectional treadmill
 a Virtual reality visor and eye
glasses

Try to name more Virtual reality components


and their possible application areas.

PRONUNCIATION
2. Make sure you pronounce the following words properly:
breadth [bredθ] miniaturized ['mɪnətʃ(ə)raɪzd]
simultaneously [sɪm,əl'teɪnɪəslɪ] superimposing [,su:pǝrɪm'pəυzɪŋ]
immersion [ɪ'mɜ:ʃn] schematic [ski:'mætɪk]
multithreading [,mʌltɪ'θredɪŋ] awareness [ə'weənɪs]
innovative ['ɪnəʋveɪtɪv] telemetry [tə'lemɪtrɪ]

WORD STUDY
3. Translate the following definitions and memorize the terms:

simulation (n) - the construction of a mathematical model for some process or situation (esp.
using a computer) in order to estimate its characteristics or solve problems
about it in terms of the model; (компьютерное моделирование)
force feedback (n) - the simulation of physical attributes such as weight in virtual reality, allowing
the user to interact directly with virtual objects using touch;
surroundings (n, pl) - the conditions around a person, place, or thing; environment;
hamper (v) - to prevent the progress or movement of smth.;
response (v) - a verbal or written answer, the act of reply or reaction;
involve (v) - to include or contain as a necessary part, to have an effect on smth.;
demand (n) - an urgent or peremptory requirement or request;
multithreading (n) - a technique by which a single set of code can be used by several processors at
different stages of execution;

English for Special Purposes


Computer Engineering 87

awareness (n) - the state or ability to perceive, to feel, or to be conscious of events, objects or
sensory patterns;
extensive (adj) - covering or affecting a large area, large in amount or scale, widespread;
reflective (adj) - capable of sending back (reflecting) heat, light or other radiation, providing a
reflection;
resolution (n) - the degree of detail visible in a photographic, television or display image
wirelessly (adv) - without a wire connection, using a wireless technology: FM technology
broadcasts music wirelessly;
immersion (n) - complete and deep (mental) involvement, the act of immersing or state of
being immersed;

4. Match the following words with their synonyms:

immersion modeling response established


simulation show screen over-the-air
surroundings hinder wireless answer
display at the same time extensive connect
demand environment couple (v) vast
simultaneously absorption involve implicate
hamper request mounted monitor

5. Match the following words with their equivalents in Russian:

force feedback измерение


multithreading отражательный
awareness накладывать (одно на другое)
reflective шлем
imaginary схематическое изображение
superimpose воображаемый (нереальный)
dimension обратная связь по усилию
mapping информированность (осознание)
helmet многопотоковость
schematic отображение

6. Complete the puzzle using the clues.

a movable part of a helmet that can be


pulled down to cover the face i

to place or lay one thing over another,


typically so that both are still evident p m e

the ability of a television or film image


to reproduce fine detail
e o t

to show information on
a screen l

English for Special Purposes


88 Computer Engineering

information in response
to an inquiry d a

the data fed into a computer


from a peripheral device n

WORD BUILDING: Participial Adjectives -ed/-ing

PRESENT PARTICIPIAL ADJECTIVE -ING PAST PARTICIPIAL ADJECTIVE -ED


serves as an adjective formed from an active serves as an adjective formed from the
verb. passive form of the verb.
This rod connects one moving part of the This wire is insulated with a nonconductor.
machine to another. (active verb) (passive verb)
This is a connecting rod. (present participial This is an insulated wire. (past participial
adjective ) adjective )
Present participial adjectives can be used to Past Participial Adjectives can be used to
describe: an ongoing quality, a process or describe a quality or process completed by
someone (state) as well as natural quality or
activity as well as the function of a noun.
state (no agent).

7. Circle the letter of the answer that best completes each of these sentences:

1. A device that has been adjusted for errors is a a) calibrating instrument


__________________. b) calibrated instrument

2. A device that adjusts other instruments is a a) calibrating instrument


__________________. b) calibrated instrument

3. You may choose any __________________ you a) viewing device


like. b) viewed device

4. You can modify the _______________ to add or a) existing platform


remove support for a particular operating system. b) existed platform

5. This _______________ is capable of measuring a) sensing device


specific movements of the body with respect to the b) sensed device
data of acceleration.

6. A great number of HMDs display only a computer a) generated image


_______________. b) generating image

7. A new cooling system for laptop computers has no a) moving parts


_______________. b) moved parts

8. A _______________ is a display device worn on the a) head mounted display


head. b) head mounting display

English for Special Purposes


Computer Engineering 89

GRAMMAR FOCUS: Noun attributes


8. Read and translate the following word combinations paying attention to nouns as attributes. If you need
help use GRAMMAR FILES 9 (p. 117).

computer aided manufacturing автоматизированное производство


computer simulated environment …
real time virtual environment
sensory information
discrete sampling system
entertainment application
solid-state devices
resolution measurement
health care professionals training
three-dimensional virtual reality simulation
night vision device
high speed photography industry
thermal imaging data
human hand available
signal sampling system
medium sized objects

English for Special Purposes


90 Computer Engineering

SPECIALIST READING A: Virtual Reality

9. Scan the text and match the headings (a – f) with the


paragraphs (1 – 5). There is one heading you will not need
to use.
a) Interactivity;
b) Implementation & Manufacturing;
c) Applications;
d) Motion tracking;
e) Immersion;
f) Virtual Reality fundamentals.

10. Now study the text to find this information.


Virtual Reality devices

Immersion components

VR computer graphics
languages

VR simulation field of use

Interaction characteristics

VOCABULARY IN USE

11. Complete the following text using suitable words and


word combinations.
immersion design telepresence military environment
simulation three-dimensional data gloves haptic

VR is the use of computer modeling and _______ that enables


a person to interact with an artificial 3-D visual _______. VR
applications immerse the user in a computer-generated
reality through the use of headsets, _______ or body suits.
The illusion of “being there” or _______ is effected by motion
sensors that pick up the user’s movements and adjust the
view on the screen in real time. _______ distinguishes VR
from other forms of human-computer interaction. _______
computer graphics allow the shape and form of objects to be
perceived. Some virtual worlds provide audio and _______
information. VR is used to create an illusion of reality for
entertainment as well as _______ training. It also enables
medical personnel to practice surgery simulations and
provides a way to experiment with new product _______.

English for Special Purposes


Computer Engineering 91

1._______________________
Virtual reality is a computer simulated helping as an ancillary tool for engineering in
environment, whether it is a simulation of the real manufacturing processes. Among other
or imaginary world. Most current virtual reality examples, we may also quote Electronic Design
environments are primarily visual experiences, Automation, CAD5, FEA6, and Computer Aided
displayed either on a computer screen or through Manufacturing.
special stereoscopic displays, but some simulations 4._______________________
include additional sensory information, such as Beyond modeling assembly parts, 3D
sound or tactile information (haptic systems), and computer graphics and VR techniques are
are generally known as force feedback. Users can currently used in the research and development
interact with a virtual environment either through of medical devices for innovative therapies,
the use of standard input devices or through treatments, patient monitoring. VR also finds
multimodal devices (data gloves, omnidirectional application into health care professionals training
treadmill). from anatomy instruction to surgery simulation.
2._______________________ 3D Virtual reality simulation is becoming widely
Immersion is basically a unique experience that is used for urban planning and transport projects.
connected with the world of virtual reality. Exploring Architects use this technology to create virtual
a three dimensional world of virtual reality the user designs of buildings. Dramatic improvements in
simply immerses in it as the real world. This the field of virtual reality are taken place due to
phenomenon is known as telepresence1. Thus the the extensive research and usage of VR in the
user gets focused about his newly created identity military applications where they are applied
inside the Virtual Reality world. Immersion is made almost for flight simulations or combat training.
up of two main components: depth and breadth2 of 5._______________________
information. Depth of information includes the The element of interaction is the most
resolution of the display unit, the graphics quality, important to make the user really feel free to get
the effectiveness of the audio and video etc. involved with the virtual environment.
Breadth of information is a number of sensory Interaction is characterized by speed (the rate of
dimensions presented simultaneously. the user’s actions recorded by computer and the
3._______________________ way they are reflected to be realized), range (the
To develop a real time virtual environment a number of results or reactions that can come out
computer graphics library can be used as embedded of any user action), mapping (the ability of a
resource coupled with a common programming computer system to produce results as good as
language, such as C++, Java etc. the natural world in response to the user
Some of the most popular computer graphics actions). The possibility to move from place to
library/API3/language are OpenGL, Direct3D, Java3D place inside a virtual environment is a kind of
and VRML4, and their use is directly influenced by interactivity. A poorly designed interaction can
the system demands in terms of performance, hamper immersion to a great extent and the user
program purpose, and hardware platform. The use may simply stop getting involved in the virtual
of multithreading can also accelerate 3D environment. The virtual environment is
performance and enable cluster computing with considered to be well designed and developed if
multi-user interactivity. it responds to the user action in a way it makes
Virtual reality can serve to new product design, sense.

English for Special Purposes


92 Computer Engineering

Comments:
1
An omnidirectional treadmill is a device that виртуальное присутствие, иллюзия нахождения в
allows a person to perform locomotive motion in any виртуальном пространстве;
direction. The ability to move in any direction is how 2
ширина;
these treadmills differ from their basic counterparts 3
(Application Programming Interface) интерфейс
that permit only unidirectional locomotion.
прикладного программирования;
4
(Virtual Reality Modeling Language) язык
моделирования виртуальной реальности,
позволяющий описывать трёхмерные сцены,
использовать анимацию и путешествия по Web для
различных проектов в Internet;
5
(Computer-Aided Design) система автоматизи-
рованного проектирования, САПР;
6
(Finite Element Analysis) анализ методом конечных
Omnidirectional treadmills are employed in элементов: широко применяемый в САПР метод
immersive virtual environment implementations to
моделирования поведения сложных систем путём
allow unencumbered movement within the virtual
space through user self-motion. разбиения их на множество элементов.

COMPREHENSION CHECK
12. Reread the text and choose the best option to complete the following statements.

1. Almost any modern virtual reality environment 5. Three-dimensional VR simulations are widely
is primarily... used by architects for ….
□ force feedback system □ building design
□ sound or tactile information □ flight simulations
□ visual experience □ Innovative treatments

2. Exploring a 3D VR environment the user can 6. Development of virtual reality is caused by its
immerse in it as the real world that is known as... wide usage…
□ Interaction □ for engineering in manufacturing processes
□ Telepresence □ in medical research
□ force feedback □ in military applications

3. Information breadth includes… 7. Interaction mapping is the ability of a


the resolution of the display and the computer system to …

graphics quality record the rate of the user’s actions and
a number of sensory dimensions presented

reflect them

simultaneously produce results as good as the natural world

□ the effectiveness of the audio and video in response to the user actions
produce the number of results or reactions
4. The use of VR computer graphics library, API □
that can come out of any user action
and language is influenced by…
system performance requirements, 8. Well designed VR applications must...

program purpose, hardware platform □ hamper immersion to a great extent
□ embedded resources □ move the user from place to place
□ multithreading and multi-user interactivity □ respond to the user action to make sense

English for Special Purposes


Computer Engineering 93

SPECIALIST READING B: Head-mounted display technology

13. Five sentences have been removed from the General


tex t. A head-mounted display (helmet mounted
1. Low cost HMD devices are available for use display), is a display device, worn on the head or as
with 3D games and entertainment part of a helmet, that has a small display optic in
applications. front of one (monocular HMD) or each eye
2. An embedded Ethernet interface option (binocular HMD). A typical HMD has either one or
permits direct access to data and two small displays with lenses and semi-transparent
configuration. mirrors embedded in a helmet, eye-glasses or visor.
3. This can be used to show stereoscopic The display units are miniaturized and may include
images. CRT, LCDs, Liquid crystal on silicon (LCos), or OLED.
4. Some HMDs allow superimposing a CGI Some vendors employ multiple micro-displays to
upon a real-world view. increase total resolution and field of view.
5. However, the pixel density (pixels per Most HMDs display only a computer generated
degree or arcminutes per pixel) is also used image (CGI), sometimes referred to as a virtual
to determine visual acuity. image. ____________________________________
6. Recent applications have included the use __________. This is sometimes referred to as
of HMD for paratroopers. augmented reality or mixed reality. Combining real-
world view with CGI is done by projecting the CGI
Read the text quickly and put the correct sentence
through a partially reflective mirror and viewing the
in each space to form a logical, coherent and
real world directly (Optical See-Through method).
correct text. There is one extra sentence you are
The same combination can also be done
not going to need.
electronically by accepting video from a camera and
mixing it electronically with CGI (Video See-Through
method).
Performance parameters
A binocular HMD has the potential to display a
different image to each eye. __________________
______________. Humans have around 180° FOV
(field of view), but most HMDs offer considerably
less than this. Typically, greater field of view results
in greater sense of immersion and better situational
awareness. As for resolution HMDs usually mention
either the total number of pixels or the number of
pixels per degree.
Listing the total number of pixels (1600×1200
pixels per eye) is borrowed from how the
specifications of computer monitors are presented.
__________________________________________
__________________________________________
used to determine visual acuity. 60 pixels/° (1
arcmin/pixel) is usually referred to an eye limiting
resolution, above which increased resolution is not

English for Special Purposes


94 Computer Engineering

14. Read the text and put the following points in


noticed by people with normal vision. HMDs
order to form a summary of the article.
typically offer 10 to 20 pixels/°, though advances in
 Certain HMDs are embedded into the pilot's
micro-displays help increase this number.
flying helmet and include night vision
Applications
devices.
Major HMDs are increasingly being integrated
 HMDs offer a resolution from 10 to 20
into the cockpits of modern helicopters and fighter
pixels/°.
aircraft. These are usually fully integrated with the
 Sony was one of the pioneers in the field of
pilot's flying helmet and may include protective
HMDs production.
visors and night vision devices. Military, police and
 Binocular HMDs are able to display
firefighters use HMDs to display tactical
stereoscopic images.
information such as maps or thermal imaging data
 HMDs are often used in engineering and
while viewing the real scene.
science to provide stereoscopic images of
_________________________________________
CAD and to maintain complex systems.
_________________________________________.
 A typical HMD is worn on the head and has
displays embedded in the visor.
 HMD systems are used by F1 pilots and
managers as a part of wireless
communication system.
 Medium-priced HMDs are used with 3D
games and entertainment applications.
 Some HMDs provide mixed reality that
allows superimposing a computer mage
upon a real-world view.
Engineers and scientists use HMDs to provide
stereoscopic views of CAD schematics. These
systems are also used in the maintenance of
1. _______________________________
complex systems, as they can give a technician a
combination of computer graphics (system
2. _______________________________
diagrams and imagery) with the technician's
natural vision. There are also applications in 3. _______________________________
surgery, where radiographic data is combined with
the surgeon's natural view of the operation. 4. _______________________________
________________________________________
_________________________________________. 5. _______________________________
One of the pioneers in this field was Sony that
released the Glasstron in 1997, which had a 6. _______________________________
positional sensor permitting the user to view the
surroundings, with the perspective moving as the 7. _______________________________
head moved, providing a deep sense of immersion.
A HMD system has been developed for Formula 8. _______________________________
One as a part of an advanced telemetry system to
communicate to the driver wirelessly from the 9. _______________________________
heart of the race pit.

English for Special Purposes


Computer Engineering 95

WRITING: Virtual reality devices & applications


15. Write a description of a virtual
reality device or application. Don’t …………
forget to mention these points:
 general information;
 specifications;
 field of use;
 performance parameters;
 special features.
Use links from Get Real to help you.

● Get Real
Check these websites for the latest
VR devices and apps:
http://www.vrealities.com/
http://vrlab.epfl.ch/

SPEAKING: Virtual reality products

16. Role play. Work in pairs. Play the parts of a VR company sales manager and an interviewer. Make up a
conversation presenting the latest VR products. Discuss the following issues:
 fields of application;
 the developer;
 the product advantages/disadvantages;
 specifications and special features.
You can use the description of the virtual reality device or application from ex. 13, the Supplementary
reading section text “Shadow Dexterous Hand” and the links from Get Real.

The following discourse markers may help you:

Structuring first(ly), first of all, second(ly), third(ly) etc; Note that firstly/ secondly etc are more
lastly, finally; to begin with; to start formal than first, second etc, and are
with; in the first/ second/ third place; for one more common in British than American
thing; for another thing English.
Summing up in conclusion; to sum up; briefly; in short

English for Special Purposes


96 Computer Engineering

Unit 10 Computer Security


WB revision Infinitive Constructions Malicious software Network security management Focusing…

LEAD-IN: Quiz on computer and network security


1. Read the questions of the quiz and think of the answers to them. Work in pairs to discuss the answers.
1. Which three email characteristics can help you to identify hoax
virus warnings?
□ The message is from a trusted source.
□ The message warns of a virus that will infect your computer
by simply reading the message.
□ The message requests that you forward the message to
others.
□ The message was forwarded many times.
2. Which two strategies will help to protect hardcopy information?
□ Shred printouts before disposal.
□ Encrypt all files.
□ Sign all documents.
□ Adopt a "clean desk" policy.
3. Which three types of information should you avoid adding to your instant messaging account details?
□ Addresses.
□ Organization names.
□ Nicknames.
□ Phone numbers.
4. Which three steps are important to perform when you receive instant messages?
□ Verify the source of the message.
□ Verify the size of any attachment sent to you.
□ Verify the purpose of the attachment sent to you.
□ Verify that your security and antivirus updates have been applied before you download or open any
attachment.

5. Which PDA security best practice will help protect the information on your PDA?
□ Clearly identify your PDA with company stickers or logos.
□ Never remove your PDA from your bag for airport security.
□ Store your PDA passwords in a safe location.
□ Synchronize your PDA data regularly.
6. Which two methods will reduce the chances that your password will be compromised?
□ Make your password lower case.
□ Change your password regularly.
□ Use Default passwords.

English for Special Purposes


Computer Engineering 97

□ Use a passphrase.
7. Which negative outcome can result from hoax virus warnings and malicious spam?
□ Denial of service.
□ Data loss.
□ Reduced account privileges.
□ Credit card fraud.
8. Which three actions can you take to increase the security of your Web browsing? (Choose three.)
□ Learn to recognize common scams.
□ Manage user names and passwords.
□ Only browse secure Web sites.
□ Use caution when downloading.

PRONUNCIATION
2. Make sure you pronounce the following words properly:
virus ['vaɪ(ə)rəs] legitimate [lɪ'ʤɪtəmət]
worm [wɜːm] nefarious [nɪ'fɛərɪəs]
piracy ['paɪərəsɪ] disseminate [dɪ'semɪneɪt]
hoax [həuks] innocuous [ɪ'nɔkjuəs]
propagate ['prɔpəgeɪt] piggyback ['pɪgɪbæk]
header ['hedə] adjust [ə'ʤʌst]
anomaly [ə'nɔməlɪ] subtle ['sʌtl]

WORD STUDY
3. Translate the following definitions and memorize the terms:
computer security (n) - the collective processes and mechanisms by which sensitive and
valuable information and services are protected from publication,
tampering or collapse by unauthorized activities or untrustworthy
individuals and unplanned events respectively;
back up (v) - to store a copy of files on a storage device to keep them safe;
firewall (n) - a combination of hardware and software used to control the data
going into and out of a network;
antivirus program (n) - a computer program or sets of programs used to detect, identify
and remove viruses from a computer system;
infect (v) - affect with a virus;
detect (v) - discover or identify the presence or existence of
payload (n) - the part of the virus that causes the damage;
fraud (n) - wrongful or criminal deception intended to result in financial or
personal gain;
spreading viruses (n) - distributing programs that can reproduce themselves and are
written with the purpose of causing damage or causing a computer
to behave in an unusual way;
salami shaving (n) - manipulating programs or data so that small amounts of money are
deducted from a large number of transactions or accounts and

English for Special Purposes


98 Computer Engineering

accumulated elsewhere. The victims are often unaware of the


crime because the amount taken from any individual is so small;
denial of service attack (n) - swamping a server with large number of requests;
mail bombing (n) - inundating an email address with thousands of messages, slowing
or even crashing the server;
software piracy (n) - unauthorized copying of a program for sale or distributing to other
users;
shareware (n) - software that is available free of charge and often distributed
informally for evaluation, after which a fee may be requested for
continued use.
4. Match the following words with their synonyms (A, B) and opposites (C, D):

A B C D
damage particular legitimate destruct
replicate covert backdoor harmless
legitimate reproduce download unauthorized
backdoor hide malicious harmful
relay mischief conceal ban
predetermined deception innocuous public
fraud transmit protect reveal
conceal authorized permit remove

5. Match A with B to make a word combination and then find its Russian equivalent in C:
A B C
executable threat модель управления доступом
compromise activity незаконная деятельность
backdoor file заранее заданное событие
informed model команда перехода
malicious protection информированное согласие
nefarious management основная программа
host software файл с расширением ".ехе"
JUMP the security скрытая угроза
predetermined consent вредоносные программы
copy event управление ключом
key program защита от копирования
access control command нарушить безопасность

6. There are a variety of different crimes that can be committed in computing, spreading viruses or
software piracy are among them. Complete the puzzle using the clues to know some more examples of
them.

gaining unauthorized access to a


network system
h c g

using another person’s identification code or


using that person’s files before logging off p g b k g

English for Special Purposes


Computer Engineering 99

tricking a user into revealing confidential information


such as access code or a credit card number
s o f g

changing the information shown on


another person’s website d c g

redirecting anyone trying to


visit a certain site elsewhere
h j k g

WORD BUILDING: Revision


7. Choose the correct word to complete each sentence. Use a dictionary to help you.
1. An electronic / electronics pen is one example of an input device.
2. The computer is the greatest technological / technologically invention of the twentieth
century.
3. In twenty years’ time some people will live in space, perhaps inside a computerizing /
computerized colony.
4. This computer is considerably / considerable faster than the old one.
5. If you are new to this system, almost everything will have to be explaining / explained.
6. Connectivity / Connection is an important concept in global communications.
7. Those files are not accessive / accessible unless you know the password.
8. If an error occurs, it is important to take correction / corrective action immediately.
9. A computer program / programming is a set of instructions that tell the computer how to do
a specific task.
10. An error or malfunction of a computer program is known as a debug / bug.
11. Programs written in a high-level language require compiler / compilation – that is,
translation into machine code, the language by the processor.
12. Digital TV is a way of transmitting / transmitted pictures by means of digital signals, in
contrast to the analogue signals used by traditional TV.

8. Fill in the gaps with the correct prefix from the following list.

re- de- e- mono- un- im-


hyper- auto- micro- multi- in- sub-

1. Most people prefer a colour screen to a _____chrome screen.


2. _____script is a character or symbol written below and to the right of a number or letter,
often used in science.
3. By the year 2030 cash will be _____placed by electronic money.
4. Tablet computers typically _____corporate small (8.4–14.1 inches/21–36 centimeters) LCD
screens.
5. Microchips _____planted into our arms will serve as ID cards and contain our medical
records.
6. Futurists predict that smart technology will be incorporated into fabrics so you’ll be able to
_____mail from your coat.
7. _____media is a form of enriched multimedia which allows an interactive and dynamic
linking of visual and audio elements.

English for Special Purposes


100 Computer Engineering

8. This program displays a message when it detects spyware and other _____wanted software
that may compromise your privacy or damage your computer.
9. Digital Terrestrial TV is received via a set-top box, a device that _____codes the signal
received through the aerial.
10. Optical discs are ideal for _____media applications, where images, animation and sound
occupy a lot of disc space.

GRAMMAR FOCUS: Infinitive Constructions


9. Read and translate the following sentences paying attention to the Infinitive Constructions. If you need
help use GRAMMAR FILES 10 (p. 118).
1. Asymmetric ciphers permit the encryption key to be public.
2. A change is so subtle that someone not specifically looking for it is unlikely to notice it.
3. Steganography can be said to protect both messages and communicating parties.
4. Everybody knows a plaintext to be the source of information to be secured.
5. This sequence causes digitized images to be stored in core memory.
6. This process was not expected to be effective.
7. Hackers have been known to do a variety of things to computer systems, including
downloading files and leaking confidential information, hijacking websites, defacing
websites by changing the text and graphics on the webpages etc.
8. A virus may cause a computer to behave in an unusual way.
9. We proved this suggestion to be wrong.
10. Such a threat often turns out to be nothing more than a hoax.
11. This general term is known to be used by computer professionals to mean a variety of
forms of hostile, intrusive or annoying software or program code.
12. There happened to exist some ideas about the system break-in.
13. This problem is not considered to be a major one.
14. People make systems work.

English for Special Purposes


Computer Engineering 101

SPECIALIST READING A: Malicious software


10. Read the text quickly and arrange the a) This software appears to bypass normal
paragraphs (a-h) according to the plan. There is one authentication methods, such as a username and
extra paragraph. What type of malware does it password, and allows unauthorized users to access
describe? and control your computer without your
1) Malware ___
knowledge. (1) _____ illegitimate modification to a
2) A computer virus ___
3) Worms ___ legitimate program. Trojan horses are a common
4) Trojan horses ___ kind of such threat.
5) Spyware ___ b) They are programs that scan systems or
6) Adware ___
monitor activity and relay information to other
7) Backdoor ___
computers. The information that may be (2) _____
11. These phrases and sentences have been include passwords, log-in details, account numbers,
removed from the text. Read the text quickly and fill personal information or other personal documents.
in the gaps with the suitable phrases or sentences to They may also gather and distribute information
form a logically correct text. There is one extra related to your computer, applications running on
sentence you don’t have to use. your computer, Internet browsing usage or other
a. A backdoor may take the form of an installed computing habits. This kind of malicious software
program or an … frequently attempts to remain unnoticed, either by
b. When the virus has been executed, the host program actively hiding (3) _____. It is likely to be
is executed in the normal way… downloaded from web sites (typically in a
c. This general term is known to be used by computer shareware or freeware), email messages, and
professionals to mean a variety of forms…
instant messengers.
d. …actively or passively gathered and disseminated by
c) It is a self-replicating program often written to
spyware may…
cause damage or mischief by inserting itself into a
e. …computer worms may have a "payload" that can
delete… software application without leaving any obvious
f. Spyware is a type of malicious software… sign of its presence. This type of malware operates
g. …or by simply not making its presence on a system by replacing the first instruction in the host
known to the user. program with a JUMP command. This command
h. When the virus is trigged by a predetermined event… changes the normal instruction sequence in a
i. Rootkits are popular with hackers… program, causing the virus instructions to be
j. …and are sometimes referred to as “network executed (processed by the processor) before the
viruses”.
host program instructions. (4) _____. A virus is
loaded into memory when a program it has
attached itself to is run or executed. It then
becomes memory resident i.e. it stays in the
memory until the computer is switched off.
(5) _____, it operates the payload. It is possible for
viruses to have the following parts:
 a misdirection routine that enables it to hide
itself;
 a reproduction routine that allows it to copy
itself to other programs;

English for Special Purposes


102 Computer Engineering

 a trigger that causes the payload to be activated


at a particular time or when a particular event
takes place;
 a payload that may be a fairly harmless joke or
may be very destructive.
d) This malicious program seems to be innocuous
or even beneficial (such as a program that you may
have downloaded to remove viruses or spyware),
but conceals other malware that compromise the
security, data, and proper functioning of your
computer. Like a virus it has a payload but doesn’t
have a reproduction routine. Trojan horses spread
via the network (6) _____. VOCABULARY IN USE
e) Malicious software is designed to secretly 12. Complete the sentences with the right words
access a computer system without the owner's given below.
informed consent. (7) _____ of hostile, intrusive or
annoying software or program code. Malware infected to protect innocuous
comes in many forms: viruses, worms, Trojan malicious spyware anti-virus
horses, rootkits, adware, spyware. worm adware replicates
f) This type of malware enables delivery of 1. Malware (________ software) are programs
advertising content to you through its own or designed to infiltrate or damage your computer,
another program’s interface. It can be downloaded for example, viruses, worms, Trojans and
from web sites (typically in a shareware or spyware.
freeware), email messages and instant messengers. 2. A virus can enter a PC via disc drive – if you insert
g) They hide files or processes running on a an ________ disc – or via the Internet.
computer, rendering them difficult to detect and 3. A ________ is self-copying program that spreads
remove. Other forms of malware, like worms, which through email attachments; it ________ itself
gain entry to your computer without your and sends a copy to everyone in an address
knowledge or permission are likely to install this book.
type of malware. (8) _____, who want to hide their 4. A Trojan horse seems to be ________ or even
nefarious activities on your computer. beneficial program but it may affect data
h) Like a virus, it is a self-replicating program, security.
often written to cause damage or mischief but in 5. ________ collects information from your
contrast to a virus, it is self-contained and does not computer without your consent.
need to become part of another program to 6. Most spyware and ________ (software that
propagate itself. Instead this type of malware allows pop-ups, advertisements that suddenly
infects the operating system, acts like a program in appear on your screen) is included with ‘free’
its own right, and spreads via the network causing downloads.
increased bandwidth. However, (9) _____, encrypt 7. If you want ________ your PC, don’t open email
or email files on the host computer. A very common attachments from strangers and take care when
payload for a worm is to install a backdoor in the downloading files from the Web.
infected computer to allow the creation of a 8. Remember to update your ________ software as
"zombie" computer under control of the worm often as possible, since new viruses are being
author. created all the time.

English for Special Purposes


Computer Engineering 103

COMPREHENSION CHECK
13. Read the text again and decide which type of the malware stands the following descriptions for:
_______________ take control of your computer without your knowledge or permission;
_______________ send your data to an unauthorized recipient;
_______________ cause your computer to attack other computers;
_______________ delete your data;
_______________ a program that has a payload but does not have a reproduction routine;
_______________ delivers advertising content without your knowledge or permission;
_______________ self-contained program which acts like a program in its own right;

14. Decide whether these statements are true (T) or false (F), correct the false ones:
True False
1. The term “malware” stands for a variety of forms of software which is hostile, intrusive or
annoying.
2. It is usually easy to detect the presence of a computer virus because it has some main parts: a
misdirection routine, a reproduction routine, a trigger and a payload.
3. The payload of a virus is activated by some predetermined event.
4. Worms can be compared with a computer virus as it exploits computers for personal gain but
it differs from a virus though, because it does not replicate to other computers and usually is
not designed to destroy data.
5. Trojan horse is a technique that involves adding concealed instructions to a computer
programs so that it will still work but will also perform prohibited duties.
6. The purpose of spyware is to take partial control of your computer or to intercept data from
your computer.
7. Neither spyware nor adware can be downloaded to your computer without your personal
concern.
8. Backdoor allows unauthorized users to access computer bypassing general authentication
methods.
9. Rootkits make other forms of malware hide files or processes running on a computer and
render them difficult to be detected and removed.
10. Though all types of malware access a computer system without the owner's informed consent,
only viruses have a payload.

15. Use the chart given below to speak about malicious software.

WORMS

VIRUSES TROJANS

MALWARE

SPYWARE ROOTKITS

ADWARE

English for Special Purposes


104 Computer Engineering

SPECIALIST READING B: Network security management


16. Scan the text, identify different parts and entitle The terms network security and information security
them. are often used interchangeably. Network security is
title from… – to… generally taken as providing protection at the
… boundaries of an organization by keeping out intruders.
Information security, however, explicitly focuses on
protecting data resources from malware attack or
simple mistakes by people within an organization by use
of data loss prevention (DLP) techniques. One of these
techniques is to compartmentalize large networks with
internal boundaries.
Network security starts from authenticating the user,
commonly with a username and a password. Since this
17. Read the text and decide whether these points
requires just one thing besides the user name, i.e. the
are discussed in it.
password which is something you 'know', this is
Yes No
sometimes termed one factor authentication. With two-
1) some rules to protect hardware and
factor authentication something you 'have' is also used
software protection against viruses
(e.g. a security token, an ATM card), or with three factor
2) data encryption
authentication something you 'are' is also used (e.g. a
3) software copy protection techniques
fingerprint or retinal scan).
4) control of the physical access Once authenticated, a firewall enforces access policies
5) the ways to hide the message such as what services are allowed to be accessed by the
6) the ways to conceal the fact of network users. Though effective to prevent
communication unauthorized access, this component may fail to check
7) the advantages of steganography over potentially harmful content such as computer worms or
cryptography Trojans being transmitted over the network. Anti-virus
software or an intrusion prevention system (IPS) help
detect and inhibit the action of such malware. An
anomaly-based intrusion detection system may also
monitor the network and traffic for unexpected (i.e.
suspicious) content or behavior and other anomalies to
protect resources, e.g. from denial of service attacks or
an employee accessing files at strange times. Individual
events occurring on the network may be logged for
audit purposes and for later high level analysis.
Communication between two hosts using a network
could be encrypted to maintain privacy. Information
security uses cryptography to transform usable
information into a form that renders it unusable by
anyone other than an authorized user; this process is
called encryption. Information that has been encrypted
(rendered unusable) can be transformed back into its
original usable form by an authorized user, who
possesses the cryptographic key, through the process of
decryption. A method of encryption and decryption is
called a cipher. Some cryptographic methods rely on the
secrecy of the algorithms.
There are two classes of key-based algorithms,

English for Special Purposes


Computer Engineering 105

symmetric (or secret-key) and asymmetric (or public-key) files. The data to be concealed within encrypted or
algorithms. The difference is that symmetric algorithms random data is first encrypted before being used to
use the same key for encryption and decryption (or the overwrite part of a much larger block of encrypted data
decryption key is easily derived from the encryption key), or a block of random data. Messages can also be
whereas asymmetric algorithms use a different key for concealed in tampered executable files; pictures are
encryption and decryption, and the decryption key embedded in video material (optionally played at slower
cannot be derived from the encryption key. or faster speed).
Symmetric algorithms can be divided into stream Content-Aware Steganography hides information in
ciphers and block ciphers. Stream ciphers can encrypt a the semantics a human user assigns to a datagram.
single bit of plaintext at a time, whereas block ciphers These systems offer security against a non-human
take a number of bits and encrypt them as a single unit. adversary/warden.
Asymmetric ciphers (also called public-key algorithms In Blog-Steganography messages are fractionalized
or public-key cryptography) permit the encryption key to and the (encrypted) pieces are added as comments of
be public, allowing anyone to encrypt with the key but orphaned web-logs (or pin boards on social network
only a proper recipient (who knows the decryption key) platforms). In this case the selection of blogs is the
can decrypt the message. The encryption key is also symmetric key that sender and recipient are using; the
called the public key and the decryption key the private carrier of the hidden message is the whole blogosphere.
key or secret key. In Voice-over-IP conversations messages can be
Cryptography is used in information security to protect concealed in delayed or corrupted packets normally
information by hiding it from unauthorized or accidental ignored by the receiver, or in unused header fields.
disclosure while the information is in transit (either
electronically or physically) and while information is in 18. Read the text again and find the definitions of
storage. the following terms:
Steganography is the art and science of writing hidden network security ____________________________
messages and no one, apart from the sender and __________________________________________
intended recipient, suspects the existence of the
information security _________________________
message. It is a form of security through obscurity.
__________________________________________
The advantage of steganography over cryptography
alone is that messages do not attract attention to one factor authentication _____________________
themselves. Plainly visible encrypted messages – no __________________________________________
matter how unbreakable – will arouse suspicion, and two factor authentication_____________________
may be incriminating in countries where encryption is __________________________________________
illegal. Therefore, whereas cryptography protects the three factor authentication ___________________
contents of a message, steganography can be said to __________________________________________
protect both messages and communicating parties. cryptography _______________________________
It includes the concealment of information within
encryption _________________________________
computer files. In digital steganography, electronic
decryption _________________________________
communications may include steganographic coding
cipher ____________________________________
inside of a transport layer, such as a document file,
image file, program or protocol. Media files are ideal for symmetric algorithm _________________________
steganographic transmission because of their large size. __________________________________________
As a simple example, a sender might start with an asymmetric algorithm ________________________
innocuous image file and adjust the color of every 100th __________________________________________
pixel to correspond to a letter in the alphabet, a change stream cipher ______________________________
is so subtle that someone not specifically looking for it is block cipher ________________________________
unlikely to notice it. steganography _____________________________
Digital steganography techniques include concealing
messages within the lowest bits of noisy images or sound 19. Summarize the general ideas of text.

English for Special Purposes


106 Computer Engineering

WRITING: Computer crimes prevention


20. There is a variety of security measures
that can be used to protect hardware and
software, including controlling physical
access to hardware and software, backing
up data and programs, using passwords,
installing firewall, encrypting data, etc.
Many of them have been mentioned in
this unit. Cover the material of Unit 10,
choose a computer crime and work out a
list of measures to prevent this crime. It
can be done in the form of an article with
the title “Ten tips to prevent…”.
Afterwards you can discuss your articles in
class. Use the material from
Supplementary reading section and the
following discourse markers to help you.

Focusing on the main What is the main problem?


problem / issue What is the real issue (here)?
(I think) the major problem is . . .
Our primary concern is . . .
(As I see it), the most important thing is . . .
The main problem we need to solve is . . .
We really need to take care of . . .
It all comes down to this: …
Asking for input What should we do about it?
What needs to be done?
What do you think we should do?
What are we going to do about it?
Making I recommend that . . .
recommendations I suggest that . . .
I would pke to propose that . . .
Why don't we . . .

SPEAKING: Computer security


21. Prepare a report and take part in a round table discussion on the topic “Computer security”. The
Supplementary reading section may help you.
Topics for discussion: History of computer security and cryptography, information theory, number
theory; Data Encryption Standard, Ciphers; Encryption on a network, key management; Access control
models, mechanisms; malicious logic, denial of service, covert channels; Security architecture; Hardware
mechanisms that protect computers and data; Secure operating systems; Secure coding; Computer crimes.

English for Special Purposes


Computer Engineering 107

Grammar files
1. ACTIVE/PASSIVE VOICE

Active tenses Affirmative sentence Negative sentence Interrogative sentence


Present simple I (you, we, they) load the I don’t load the computer Do you load the computer
computer every day. every day. every day?
She (he, it) loads the She doesn’t load the Does she load the
computer every day. computer every day. computer every day?
Present continuous I am loading the I am not loading the Am I loading the
computer. computer. computer?
You (we, they) are loading You are not loading the Are they loading the
the computer. computer. computer?
He (he, it) is loading the He is not loading the Is she loading the
computer. computer. computer?
Present perfect simple I (you, we, they) have I have not loaded the Have you loaded the
loaded the computer. computer. computer?
She (he, it) has loaded the She has not loaded the Has he loaded the
computer. computer. computer?
Past simple I loaded the computer I did not load the Did you load the
computer. computer?
Past continuous I (she, he, it) was loading I was not loading the Was she loading the
the computer. computer. computer?
You (we, they) were They were not loading the Were you loading the
loading the computer. computer. computer?
Past perfect I had loaded the They had not loaded the Had you loaded the
computer. computer. computer?
Future simple I will load the computer. We will not load the Will you load the
computer. computer?
Future continuous I will be loading the She will not be loading the Will they be loading the
computer. computer. computer?
Future perfect I will have loaded the We will not have loaded Will she have loaded the
computer the computer. computer?
Future perfect continuous I will have been loading They will not have been Will you have been
the computer. loading the computer. loading the computer?

Passive tenses Simple sentence Negative sentence Interrogative sentence


Present simple The computer is loaded by The computer is not Is the computer loaded by
me. loaded by me. me?
Present continuous The computer is being The computer is not being Is the computer being
loaded by me. loaded by me. loaded by me?
Present perfect simple The computer has been The computer has not Has the computer been
loaded by me. been loaded by me. loaded by me?
Past simple The computer was loaded The computer was not Was the computer loaded
by me. loaded by me. by me?
Past continuous The computer was being The computer was not Was the computer being
loaded by me. being loaded by me. loaded by me?
Past perfect The computer had been The computer hadn’t been Had the computer been
loaded by me. loaded by me. loaded by me?
Future simple The computer will be The computer won’t be Will the computer be
loaded by me. loaded by me. loaded by me?

English for Special Purposes


108 Computer Engineering

2. CONDITIONALS
Условные предложения используются для выражения действия, которое может произойти только при
выполнении определенного условия. Части данных предложений могут быть соединены при помощи
союзов if, unless (= if not) и as long as (= provided/ providing (that).
FIRST CONDITIONAL SENTENCES (реальное условие, может быть выполнено в будующем)
If A happens В will happen
(present simple) (will in positive or negative form + verb)
I f you like entertainment, you will love the latest multimedia video games.
Иногда в главном предложении используются модальные глаголы can, must или повелительное
наклонение.
I f you want to create your own MP3 files from your CDs, you must have a CD ripper.
You won't be able to play audio and video on the Web unless you have a plug-in like RealPlayer or
QuickTime. (= if you don't have a plug-in ...)
Вопросительные и отрицательные формы предложения образуются с помощью вспомогательного
глагола will (won’t):
Will the data be saved, if you unload the computer?
If you reset the computer system, perhaps, all data won’t be saved.
Данное правило применяется и к придаточным предложениям времени, которые вводятся
следующими союзами:
when while as soon as after before until.

SECOND CONDITIONAL SENTENCES (нереальные или проблематичные условия)


If A happened В would happen
(past simple) (would in positive or negative form+ verb)
I f you wanted to make a movie on your computer, first you would/you'd need to . . .
Глагол to be имеет форму were для всех лиц и чисел.
I f I were you, I'd get a new MP3 player.
Would (wound’t) употребляется со всеми лицами и числами существительных и местоимений в роли
подлежащего.
Вопросительные и отрицательные формы предложения образуются с помощью вспомогательного
глагола would (wound’t):
If different kinds of applications software weren’t loaded, the computer wouldn’t perform specific tasks for
the user.
THIRD CONDITIONAL SENTENCES (нереальное условие в прошлом)
If A had happened B would have happened
(past perfect) (would in positive or negative + perfect infinitive)
Would (wound’t) употребляется со всеми лицами и числами существительных и местоимений в роли
подлежащего.
Вопросительные и отрицательные формы предложения образуются с помощью вспомогательного
глагола would (wound’t):
If we had upgraded our computer we wouldn’t have got this problem

Type If Clause Conditional Clause

Conditional 1 If we upgrade our computer… It will work better.

Conditional 2 If we bought new software now… Our computer would work better.

Conditional 3 If we had upgraded our computer earlier… We would not have got that problem.

English for Special Purposes


Computer Engineering 109

3. COMPARING
В научных текстах часто возникает необходимость сравнивать различные устройства, программы,
языки и т.д. Основная роль при сравнении, безусловно, принадлежит прилагательным и наречиям.

ПРАВИЛА ОБРАЗОВАНИЯ СТЕПЕНЕЙ СРАВНЕНИЯ ПРИЛАГАТЕЛЬНЫХ И НАРЕЧИЙ


1. Односложные прилагательные и наречия добавляют суффиксы -er и -est.

Absolute Comparative Superlative


(положительная) (сравнительная) (превосходная)
Adjectives low lower lowest
(прилагательные) large larger largest
big bigger biggest

Adverbs soon sooner soonest


(наречия) late later latest

2. Степени сравнения многосложных прилагательных и наречий образуются при помощи слов more,
most; less, least.
Absolute Comparative Superlative
(положительная) (сравнительная) (превосходная)
Adjectives powerful more powerful most powerful
(прилагательные) specific more specific most specific

Adverbs easily more easily most easily


(наречия) highly more highly most highly

3. Двусложные прилагательные, оканчивающиеся на -er, -y, -ly, -ow образуют степени сравнения с
помощью суффиксов -er и -est. Наречия, оканчивающиеся на -ly образуют степени сравнения только
при помощи слов more (less) и most (least) (пример см. выше).

Absolute Comparative Superlative


(положительная) (сравнительная) (превосходная)
tiny tinier tiniest
-y speedy speedier speediest
-ly early earlier earliest

-er clever cleverer cleverest

-ow narrow narrower narrowest

4. Степени сравнения некоторых прилагательных и наречий образуются не по правилам:

Absolute Comparative Superlative


(положительная) (сравнительная) (превосходная)
good better best
well better best

English for Special Purposes


110 Computer Engineering

bad worse worst


badly worse worst
much more most
many more most
little less least
far farther, further farthest, furthest
late later, latter latest, last

УПОТРЕБЛЕНИЕ СТЕПЕНЕЙ СРАВНЕНИЯ


Положительная степень (Absolute) – это базовая форма, которая чаще всего констатирует данное
количество или качество, например:
The iPad's design is simple, with a minimum number of buttons, ports, etc.
Дизайн компьютера iPad прост, с минимальным количеством кнопок, портов и т.д.
Положительная степень прилагательных и наречий также используются:
1) при сравнении одинаковых качеств. В этом случае используется конструкция as … as, например:
Portable computers are as versatile and reliable as any computer on your desk.
Портативные компьютеры так же многофункциональны и надежны, как любой другой
компьютер на вашем столе.
2) при указании на неравные качества. В этом случае используется конструкция not as … as, например:
Desktop computers are not as portable as laptops.
Настольные компьютеры не такие мобильные как лэптопы.
Сравнительная степень (Comparative) прилагательных и наречий используется:
1) для сравнения двух качеств (состояний). В этом случае после прилагательного или наречия в
сравнительной степени следует слово than:
Subnotebooks are smaller than laptops.
Субблокнотные компьютеры меньше, чем лэптопы.
A laptop is more compact than a desktop computer.
Лэптоп – компактнее, чем настольный компьютер.
2) для передачи зависимости одного качества от другого (в русском языке – чем …тем). В этом случае
перед прилагательными или наречиями в сравнительной степени стоят слова the… the, например:
The smaller the computer the faster it operates.
Чем меньше компьютер, тем быстрее он функционирует.

Превосходная степень (Superlative) употребляется тогда, когда при сопоставлении вещей


подчеркивается их уникальность.
!!! Кроме степеней сравнения прилагательных и наречий для сравнения используются следующие
слова и выражения:
эквивалентность неэквивалентность
as many … as equal to compared to/with not as …as not as much
as much … as is like in comparison with …-er than not equal to
alike similar/ly each more…than unequally
the same … as equal/ly either fewer…than as unlike
the same both less…than as not the same as
similar to greater …than not all
are similar not as many

English for Special Purposes


Computer Engineering 111

!!! Слова-усилители (Intensifiers). Для усиления степеней сравнения употребляются следующие слова:
very очень too слишком
rather довольно quite вполне
somewhat до некоторой степени a little немного
fairly явно, совершенно
a bit немного, слегка
extremely чрезвычайно
by far гораздо, намного much гораздо, намного

This large-capacity main battery should not be confused with the much smaller battery nearly all computers
use to run the real-time clock and to store the BIOS configuration in the CMOS memory when the computer is
off.
Этот аккумулятор большой емкости нельзя путать с гораздо меньшей по объему батарейкой,
расположенной на материнской плате почти всех компьютеров, которая используется для
поддержки работы часов реального времени и сохранения конфигурации БИОС когда компьютер
выключен.

4. PREDICTION
Прогнозируя, мы предполагаем, что произойдет в будущем. Предположения, как правило,
выражают разную степень уверенности.

Verbs Adverbs Adjectives


will, will not;
Certainty certainly, definitely certain, sure
be going to
likely, unlikely,
most/highly likely expected, probable
Probability
probably, most/highly probable
MORE mostprobably

can, could,
Possibility may(not), might possibly, perhaps possible
(not)

improbable, doubtful, unlikely,


questionable probably not
Improbability
most/highly most/highly
LESS
improbable/unlikely doubtful/questionable
not possible,
Impossible cannot, could not
impossibility

Notebook computers will definitely be cheaper Ноутбуки определенно будут дешевле в


next year. следующем году.
It is (highly) probable/likely that notebook Вполне вероятно, что ноутбуки будут
computers will be cheaper next year. дешевле в следующем году.
Notebook computers may/might be cheaper next Ноутбуки может быть будут дешевле в
year. следующем году.

English for Special Purposes


112 Computer Engineering

It is unlikely /doubtful that notebook computers Маловероятно, что ноутбуки будут дешевле
will be cheaper next year. в следующем году.
It is impossible that notebook computers will be Этого не может быть, чтобы ноутбуки
cheaper next year. стали дешевле в следующем году.

Иногда прогнозирование (предположение) становится предметом определенных условий. В этом


случае используются сложноподчиненные предложения с придаточными условия, которые
состоят соответственно из двух частей: главного предложения (will/won’t; can+ V) и придаточного
(if + Present Simple основного глагола).

I will buy a notebook if the price of notebooks falls next year. Я куплю ноутбук, если цена на них
If the price of notebooks falls next year, I will buy one. упадет в следующем году.

Если говорящий не достаточно уверен в том, что какое-либо действие произойдет и стремиться
выразить предполагаемое, возможное, желаемое действие, то в речи используется
сослагательное наклонение, которое также может состоять из двух частей: главного предложения
(would/wouldn’t; might; could + V) придаточного (if + Past Simple основного глагола).

I would buy a notebook if the price of notebooks fell next year. Я бы купил ноутбук, если бы цена
If the price of notebooks fell next year, I would buy one. на них упала в следующем году.

5. ATTRIBUTIVE CLAUSES
Придаточные определительные предложения отвечают на вопросы which? what? и
присоединяются к главному предложению бессоюзным способом или при помощи союзных слов –
относительных местоимений и наречий: who; whom; whose,; which, that; when; where; why.
Относительные местоимения whom, whose и which, вводящие придаточное определительное
предложение, могут употребляться с предлогами.
Придаточное определительное предложение относится к какому-либо члену главного
предложения, выраженному именем существительным или местоимением (в основном
неопределенным somebody, anything), а также словами-заместителями: that, those, one.
Придаточное определительное предложение занимает место после того слова, которое оно
определяет в главном предложении.
Придаточные определительные предложения делятся на два типа: описательные
определительные предложения (Descriptive Clauses) и ограничительные определительные
предложения (Limiting Clauses).
Описательные определительные предложения могут быть выделены в отдельное предложение
или вовсе опущены без ущерба для смысла главного предложения. Такое определительное
предложение обычно отделяется от главного запятой:

Programming language theory, which is known as Теория языков программирования, или PLT, -
PLT, is a branch of computer science that … это раздел информатики, который…

Описательное определительное предложение which is known as PLT может быть выделено в


отдельное предложение или вовсе опущено. При этом главное предложение не теряет своего

English for Special Purposes


Computer Engineering 113

смысла.
!!! В описательных определительных предложениях относительное местоимение that не
употребляется и относительные местоимения не могут быть опущены.

Ограничительное определительное предложение тесно связано с тем членом предложения, к


которому оно относится, и не может быть опущено без нарушения смысла главного предложения.
Ограничительное определительное предложение не отделяется запятой от главного предложения:

A programming language provides a structured


mechanism for defining pieces of data, and the … действий и изменений, которые могут
operations or transformations that may be carried быть выполнены автоматически …
out automatically on that data…

6 -ING FORMS
КАК РАЗЛИЧАТЬ -ING ФОРМЫ?
Сравните:
1. noun – morning
2. adjective – interesting
3. pronoun – something
4. verbal noun – building
5. gerund – by travelling
6. participle – fading flower
7. Continuous –I am standing

Формы герундия совпадают с формами причастия, но герундий имеет ряд отличительных признаков.
Герундий по своим функциям ближе к существительному (noun forms), тогда как причастие ближе к
прилагательному (adjectival forms). Герундий обозначает деятельность или процесс:

Rendering includes lighting and shading.


Compositing is combining parts o f different images to create a single image.
This course involves painting and drawing in various media.

Отличия герундия от других частей речи:


 Наличие перед формой с окончанием -ing какого-либо предлога (of, after, before, by, for, from,
in, on, without):
Designers start a project by making a wireframe.
 Наличие перед -ing формой притяжательного местоимения (my, her, etc):
The professor approved of my solving problem.
 Наличие существительных в притяжательном или общем падежах.
We know of Newton’s having developed the principles of mechanics.
 Некоторые глаголы традиционно употребляются только с герундием, а не с инфинитивом:
avoid, fancy, finish, give up, hate, imagine, involve, keep, look forward to, mind, suggest, enjoy.
I enjoy editing pictures.
Причастие используется для образования длительных форм (continuous tenses) и в причастных
оборотах:
We are designing a new car on computer.
. . . a representation showing the outlines o f all edges. ( = which shows the outlines. . . )

English for Special Purposes


114 Computer Engineering

Герундий и причастие могут выполнять функцию левого определения. Различать их в этой функции
можно только на основе смыслового содержания, учитывая, что причастие выражает действие
определяемого существительного, например:
a writing man – пишущий человек,
тогда как герундий указывает на назначение предмета и на русский язык передается
существительным, например:
a writing table – письменный стол, т.е. стол для письма.
Сравните:
a smoking man – курящий человек (причастие)
a smoking room – комната для курения (герундий)
Отглагольное существительное тоже имеет окончание -ing (verbal noun). Чаще всего такие
существительные обозначают физические объекты: building. Признаками такого существительного
являются:
- наличие перед -ing формой артикля;
- наличие предлога of перед идущим за ней существительным;
- возможность употребления в форме множественного числа.
The readings of the voltmeter were correct.
Прилагательные употребляются после глагола-связки и перед существительным:
They use special applets to create amazing fractals.
It is interesting to know.

7. PARTICIPLE II
Причастие 2 (Participle II, Past Pariciple) правильных глаголов образуется путем добавления суффикса -
ed к основе глагола: to finish – finished
Неправильные глаголы: to write – written
Таким образом: Past Participle – V+ed (V3).

!!! Причастие 2 не имеет отдельных категорий времени и залога, так как может выражать действия,
относящиеся к любому времени в зависимости от времени сказуемого.

Причастие 2 от переходных глаголов соответствует русским причастиям:


 настоящего времени с окончаниями - мый, - щийся;
 прошедшего времени с окончаниями - нный, - тый, - вшийся.
asked – спрашиваемый, спрошенный
taken – берущийся, взятый
Функции причастия 2 в предложении:
 определение;
 определительный причастный оборот;
 обстоятельство.

1) Определение:
The described method is widely used in electroplating.
Описанный метод широко применяется в гальванопластике.
We used all the methods recommended.
Мы применили все методы, которые были рекомендованы.

English for Special Purposes


Computer Engineering 115

2) Определительный причастный оборот:


A substance is composed of tiny particles called molecules.
Вещество состоит из мельчайших частиц, называемых молекулами.
Вещество состоит из мельчайших частиц, которые называются молекулами.

3) Обстоятельство (времени или причины):


Placed in a vessel, a gas fills it completely. (A gas placed in a vessel fills it completely.)
При помещении в сосуд газ заполняет его полностью.

!!! when или if:


When heated solids expand little as compared with liquids.
a) деепричастие:
Нагреваясь, твердые вещества расширяются незначительно по сравнению с жидкими.
b) придаточное предложение:
Когда твердые вещества нагреваются, они расширяются незначительно по сравнению с жидкими.
c) существительное с предлогом:
При нагревании твердые тела расширяются незначительно по сравнению с жидкими.

8. INFINITIVE
Инфинитив - это неличная глагольная форма, которая только называет действие и выполняет функции
как глагола, так и существительного. Инфинитив отвечает на вопрос что делать?, что сделать? Чаще
всего инфинитив встречается после глаголов:

afford offer prepare hope begin fail


happen wish arrange promise learn mean
prefer want help (can’t) bear remember manage
appear decide pretend intend dare try
start forget ask refuse seem expect

Часто инфинитив используется после модальных глаголов. Модальные глаголы (can, could, must,
should, ought to, had better, may, might, will, would, shall) – это вспомогательные глаголы, которые
добавляют идею способности, необходимости, просьбы, разрешения, совета, желания, вероятности и
т.д. к действию, выраженному основным глаголом. Другими словами, модальные глаголы описывают
отношение говорящего к действию, выраженному основным глаголом. Все модальные глаголы
принимают после себя инфинитив без частицы "to" (кроме OUGHT TO!)
Инфинитив переходных глаголов имеет формы пассивного залога. Пассивный залог используют если
деятель не известен или не важен.
active: (to) do/clean/see etc. Somebody will upgrade the computer.
passive: (to) be done/cleaned/seen etc. The computer will be upgraded.

В английском языке есть несколько видов/форм инфинитива.


Present simple passive
Пассивный инфинитив образуется при помощи инфинитива to be и третьей формы смыслового
глагола. На русский язык может переводиться неопределенно-личным предложением или
придаточным дополнительным.

English for Special Purposes


116 Computer Engineering

Конструкция can be / could be + past participle используется для выражения способности или
возможности в настоящем или прошлом в пассивном залоге.

My professor has told me that I may be invited to я give the keynote speech at the conference this year.
Information can be transmitted by devices such as the telephone, radio or TV.
It has been predicted that about one-third o f all work could eventually be performed outside the workplace.

Конструкции must be / ought to be / should be + past participle используются чтобы выразить


необходимость или желательность в пассивном залоге.

You can't expect it to work if it's broken. It must be repaired.


You're not supposed to use this application. It shouldn't be allowed.
He ought to be rewarded for restoring the information.
Обратите внимание на инфинитив в роли определения, которое стоит после определяемого слова и
переводится придаточным определительным предложением, вводимым словом который. При этом сказуемое
в русском придаточном предложении приобретает форму будущего времени или используется со словами
должен, нужно, можно, независимо от времени сказуемого, например:

There are many considerations be taken into account. – Существует много соображений, которые следует
принять во внимание.
This is not a process to be oversimplified. – Это не тот процесс, который можно упрощать.

Perfect infinitive
Перфектный инфинитив употребляется, чтобы выразить действие, которое предшествует действию,
выраженному глаголом−сказуемым.
There were some problems at first but they seem to have been solved.

Перфектный инфинитив после глаголов to expect, to intend, to mean, to hope, стоящих в прошедшем
времени, а также после модальных глаголов ought to, should означает, что действие, которое
ожидалось, не произошло.
active: have done/cleaned/seen etc. Somebody should have upgraded the computer.
passive: have been done/cleaned/seen etc. The computer should have been upgraded.

I intended (meant, hoped) to have come on time. – Я намеревался прийти вовремя (но не пришел).

Past perfect
active: had(done) The computer worked faster. Somebody had upgraded it.
passive: had been (done) It had been upgraded.

Continuous infinitive
Длительный инфинитив употребляется, чтобы выразить действие, длящееся в то время, когда
происходит действие глагола−сказуемого.
active: am/is/are (do)ing Somebody is upgrading the computer at the moment.
passive: am/is/are being (done) The computer is being upgraded at the moment.

Past continuous
active: was/were (do)ing Somebody was upgrading the computer when I arrived.
passive: was/were being (done) The computer was being upgraded when I arrived.

There was somebody walking behind us. We were being followed.

English for Special Purposes


Computer Engineering 117

Future forms
Для выражения действий в будущем используются конструкции will be / is going to be / is being / is to
be + past participle.

9. NOUN ATTRIBUTES
Многие терминологические словосочетания строятся из сочетания имени существительного с
другими частями речи (другими существительными, причастиями и герундием – ing-forms, наречиями
и придаточными определительными предложениями), которые могут стоять до или после него (левое
и правое определение). При переводе терминологических словосочетаний необходимо четко
уяснить, в каком порядке следует раскрывать значение данного словосочетания. Особую трудность
при переводе представляют беспредложные терминологические словосочетания, состоящие из
цепочки слов, не связанных между собой какими-либо служебными словами. В беспредложном
словосочетании главным словом является последнее, все слова, стоящие слева от него, играют
второстепенную роль – роль определения. Перевод таких словосочетаний надо начинать с конца.
Рассмотрим основные типовые формы их образования. Определяющее и определяемое
существительное иногда соединяются дефисом, хотя твердых правил здесь нет, это зависит от
традиции.

Словосочетания, состоящие из entertainment industry – индустрия развлечений


существительных. web design software – программное обеспечение для
N+N оформления Web-сайтов
Словосочетания, состоящие из learning theory – теория обучения
существительного и an operating device – действующий прибор
формы на –ing a module holding 40 components – модуль,
V-ing +N; N+ V-ing содержащий 40 компонентов
the above statement – вышеупомянутое
Словосочетания, состоящие из
утверждение
существительного и наречия
the instrument available can provide – доступный
Adv + N; N+Adv
инструмент может обеспечить
a small device – маленький прибор
Словосочетания, состоящие из
a small electronic device - маленький электронный
существительного и
прибор
прилагательного
the smallest possible electronic device – наименьший из
Adj +N
возможных электронный прибор
Словосочетания, состоящие из achieved results – достигнутые результаты
существительного и прошедшего The results achieved showed many advantages. –
причастия Достигнутые результаты показали большие
V-ed+N; N+V-ed преимущества.
the information to be stored – информация,
Словосочетания, состоящие из
которая должна быть сохранена
существительного и инфинитива
the designs to be implemented – проект, который
N+Vto
должен быть внедрен
Словосочетания, состоящие из
directly coupled (multiprocessor) system – система с
прилагательного (наречия),
непосредственной связью (между процессорами)
причастия прошедшего времени и
isotropically radiated power – изотропно
существительного.
излучаемая мощность
Adj(Adv)+Ved+N

English for Special Purposes


118 Computer Engineering

10. INFINITIVE CONSTRUCTIONS


ИНФИНИТИВ КАК ЧАСТЬ СЛОЖНОГО ДОПОЛНЕНИЯ (COMPLEX OBJECT)

verb + noun / pronoun + (to)-infinitive

Сложное дополнение – это сочетание имени существительного в общем падеже или местоимения в
объектном падеже (me, him, her, it, us, you, them) с инфинитивом глагола, выступающее как единый
член предложения. Сказуемое в предложении со сложным дополнением может быть выражено
следующими глаголами: to want, to find, to think, to report, to state, to suppose, to expect, to consider,
to see, to hear, to feel, to cause и т.д. Сложное дополнение переводится на русский язык
дополнительным придаточным предложением, вводимым союзами что, чтобы, как.

Malware can cause your computer to attack other computers.

Инфинитив в таком обороте обычно употребляется с частицей to, но если сказуемое выражено
глаголами, передающими физическое восприятие, например: to watch, to see, to hear, to feel, to
observe, to notice, а также глаголами to make «заставлять» to let «разрешать», то частица to
опускается.

People make systems work.

!!! Если глаголы to see, to hear, to make стоят в страдательном залоге, за ними следует инфинитив с
частицей to:

The students were made to do all the calculations again.

СУБЪЕКТНЫЙ ИНФИНИТИВНЫЙ ОБОРОТ (СЛОЖНОЕ ПОДЛЕЖАЩЕЕ – COMPLEX SUBJECT)


Сказуемое английского предложения с оборотом «сложное подлежащее» всегда выражено глаголом –
характеристикой, то есть между существительным и инфинитивом стоит сказуемое предложения,
выражающее мнение, суждение и предположение. Мнение, суждение, предположение в таком
предложении может быть выражено следующими глаголами:
A.
noun / pronoun + active verb + to-infinitive

кажется (казалось), Initially this result may seem to be rather unexpected. –


seem
по-видимому, Первоначально такой результат может показаться
appear
похоже довольно неожиданным.
случайно; случилось He appeared not to have virus checked the attachments.
happen
так, что… По-видимому, он не проверил приложения на вирусы.
The fact happened to become known to everybody. –
prove (to be) Случилось так, что этот факт стал известен всем.
turn out (to be) оказывается He proved to be a good coder. – Он оказался хорошим
кодировщиком.

B.
noun / pronoun + link verb + certain / sure; likely / unlikely + to-infinitive

The real situation is likely to be very complex. – Вероятно, реальная ситуация является (будет) очень

English for Special Purposes


Computer Engineering 119

сложной.
Unfortunately this approach is unlikely to be successful. – К сожалению, маловероятно, что этот
метод будет успешным.

C.
noun / pronoun + passive verb + to-infinitive

is believed полагают, думают, считают


is considered считают, полагают;
He is considered to be an expert on computers.
считается
– Считается, что он хорошо разбирается в
is expected предполагается, ожидается
компьютерах.
is known известно The computer system was reported to be
is reported сообщают; сообщается hacked. – Сообщалось, что компьютерная
is said говорят система была «взломана».
is supposed полагают
is thought считают, полагают

Предложения такого типа переводятся сложноподчиненными предложениями. Перевод следует


начинать со сказуемого и переводить неопределенно-личным предложением (Примеры см. выше).

ПРЕДЛОЖНЫЙ ИНФИНИТИВНЫЙ ОБОРОТ (FOR-PHRASE)

Предложный инфинитивный оборот представляет собой сочетание предлога for и существительного в


общем падеже или местоимения в объектном падеже и инфинитива. Он может выполнять роль любого
члена предложения – подлежащего, части сказуемого, дополнения, обстоятельства, определения.

For the program to be written in time, we must begin to work immediately. – Для того, чтобы программа была
написана вовремя, мы должны начать работать немедленно.
For a designer to know the construction of PC is quite necessary. – Проектировщику совершенно
необходимо знать конфигурацию ПК.
Here is a program for you to correct. – Вот программа, которую вам нужно откорректировать.

English for Special Purposes


120 Computer Engineering

Appendix
1. PREPOSITIONAL CONSTRUCTIONS
according to согласно чему-либо
in accordance (conformity) with в соответствии с чем-либо
as against в противоположность
as compared with/to по сравнению с
in comparison with в сравнении с
on the contrary/opposite to напротив
due to благодаря
because of из-за
owing to вследствие
on account of по-причине
thanks to благодаря
by means of посредством
with the help (aid) of с помощью
instead of/ in place of вместо
in spite of/ despite/ regardless to несмотря на
as to / as for что касается
as regards/regarding рассмотрение
with regard to в отношении
concerning по поводу
respecting/in respect of касательно

2. VERBS + PREPOSITIONS
agree with согласовываться c, совпадать с
apply to использовать, применять
adapt to адаптировать, настраивать, приспосабливать к
benefit by получать выгоду от чего-либо
comment on комментировать
conform to согласовываться, соответствовать, приспособиться
consist in состоять в чем-либо
contribute to способствовать, вносить вклад в
correspond to соответствовать, представлять собой
depend on зависеть от, полагаться на
differ from отличаться от
end in smth. закончиться чем-либо
lead to приводить к тому, что; вызывать
participate in принимать участие в чем-либо
prevent from не позволять, предотвращать
refer to ссылаться на
rely on полагаться на, основываться
result in приводить к, повлечь за собой
specialize in специализировать на чем-либо
succeed in преуспеть в чем-л., добиться чего-либо
suffer from страдать от, испытывать, претерпевать

English for Special Purposes


Computer Engineering 121

3. NOUNS + PREPOSITIONS
an alternative to быть альтернативой чему-либо
in agreement with в согласии с, по соглашению
in comparison with по сравнению с
in connection with в связи с, применительно к
in relation to относительно, касательно
in use в употреблении
intention of намерение, стремление, цель
need for необходимость, потребность
probability of вероятность из
reason for мотив
use of применение

3. ADJECTIVES + PREPOSITIONS
capable of способный на что-либо
engaged in занятый чем-либо
essential to необходимый для
in general в целом
in particular в частности, в особенности
similar to подобно, подобным образом
full of полон

English for Special Purposes


122 Computer Engineering

Supplementary reading
UNIT 1 COMPUTER & COMPUTING: Famous people in computer technology development

Entrepreneur Steven In addition to


Jobs and Stephen proprietary systems,
Wozniak, his engineer open, or portable,
partner, founded a small operating systems have
company named Apple been developed to run
Computer, Inc. They computers built by
introduced the Apple II other manufacturers.
computer in 1977. Its Open operating systems rose to prominence during
monitor supported the 1980s and are now widely used to run personal
relatively high-quality computers (PCs) and workstations, which use
color graphics, and it had a floppy-disk drive. The extremely powerful PCs. The dominant operating
machine initially was popular for running video system is the disk operating system (DOS)
games. In 1979 Daniel Bricking wrote an electronic developed by Microsoft Corporation. Also popular
spreadsheet program called VisiCalc that ran on is Microsoft's Windows NT, an adjunct to DOS that
the Apple II. provides enhanced computer graphics.
IBM introduced its Personal Computer (PC) in Following the launch of the Altair 8800, William
1981. As a result of competition from the makers Henry Gates III, (known as
of clones (computers that worked exactly like an Bill Gates) called the
IBM PC); the price of personal computers fell creators of the new
drastically. By the 1990s personal computers were microcomputer, Micro
far more powerful than the multimillion-dollar Instrumentation and
machines from the 1950s. In rapid succession Telemetry Systems
computers shrank from tabletop to laptop and (MITS), offering to
finally to palm-size. demonstrate an
The English mathematician Charles Babbage implementation of the
conceived the first set of operating instructions for BASIC programming language for the system. After
a digital computer in the design of his “analytical the demonstration, MITS agreed to distribute Altair
engine” (1834), which was never built. The first BASIC Gates left Harvard University, moved to
operational stored-program computer was Albuquerque, New Mexico where MITS was
completed in 1949 at the University of Cambridge. located, and founded Microsoft there on
The operating systems that came into wide use September 5, 1975. The company's first
between 1950 and 1980 were developed mostly international office was founded on November 1,
by private companies to operate proprietary 1978, in Japan, titled "ASCII Microsoft" (now called
mainframe computers and applications. The most "Microsoft Japan"). On January 1, 1979, the
popular of these systems were built by IBM company moved from Albuquerque to a new home
Corporation) – include MVS, DOS/VSE, and VM. in Bellevue, Washington.

English for Special Purposes


Computer Engineering 123

UNIT 1 COMPUTER & COMPUTING: CPU

The heart of a computer is the central Comments:


1
processing unit (CPU). In addition to performing microprocessor - an integrated circuit that
arithmetic and logic operations on data, it times contains all the functions of a central processing
and controls the rest of the system. Mainframe unit of a computer.
2
and supercomputer CPUs sometimes consist of binary number – The binary numeral system, or
several linked microchips, called microprocessors1, base-2 number system represents numeric values
each of which performs a separate task, but most using two symbols, usually 0 and 1. More
other computers require only a single specifically, the usual base-2 system is a positional
microprocessor as a CPU. notation with a radix of 2. Owing to its
straightforward implementation in digital
electronic circuitry using logic gates, the binary
system is used internally by all modern computers.
3
main memory – the only one directly accessible to
the CPU. The CPU continuously reads instructions
stored there and executes them as required. Any
data actively operated on is also stored there in
uniform manner.
4
auxiliary storage unit – a device that store data
for a long time without extern power, external
Components known as input devices let users memory device.
5
enter commands, data, or programs for processing cathode-ray tube (CRT) – a high-vacuum tube, in
by the CPU. Computer keyboards, which are much which cathode rays produce a luminous image on a
like typewriter keyboards, are the most common fluorescent screen, used chiefly in televisions and
input devices. Information typed at the keyboard computer terminals.
6
is translated into a series of binary numbers2 that liquid-crystal display (LCD) – a form of visual
the CPU can manipulate. display used in electronic devices, in which a layer
Most digital computers store data both of a liquid crystal is sandwiched between two
internally, in what is called main memory3, and transparent electrodes.
externally, on auxiliary storage units4. As a
computer processes data and instructions, it
temporarily stores information in main memory,
which consists of random-access memory (RAM).
Random access means that each byte can be
stored and retrieved directly, as opposed to
sequentially as on magnetic tape.
Components that let the user see or hear the
results of the computer's data processing are
known as output devices. The most common one
is the video display terminal (VDT), or monitor,
which used a cathode-ray tube (CRT) 5, which is
nowadays out of date, or liquid-crystal display
(LCD)6 to show characters and graphics on a
television-like screen.

English for Special Purposes


124 Computer Engineering

UNIT 2 SOFTWARE: UNIX

Unix (officially trademarked as UNIX, sometimes As a result, Unix became synonymous with "open
also written as Unix with small caps) is a computer systems".
operating system originally developed in 1969 by a Unix was designed to be portable, multi-tasking
group of AT&T employees at Bell Labs, including Ken and multi-user in a time-sharing configuration. Unix
Thompson, Dennis Ritchie, Brian Kernighan, and systems are characterized by various concepts: the
Douglas McIlroy. Today the term Unix is used to use of plain text for storing data; a hierarchical file
describe any operating system that conforms to Unix system; treating devices and certain types of inter-
standards, meaning the core operating system process communication (IPC) as files; and the use of a
operates the same as the original Unix operating large number of software tools, small programs that
system. Today's Unix systems are split into various can be strung together through a command line
branches, developed over time by AT&T as well as interpreter using pipes, as opposed to using a single
various commercial vendors and non-profit monolithic program that includes all of the same
organizations. functionality. These concepts are known as the Unix
As of 2007, the owner of the trademark is The philosophy.
Open Group, an industry standards consortium. Only Under Unix, the "operating system" consists of
systems fully compliant with and certified according many of these utilities along with the master control
to the Single UNIX Specification are qualified to use program, the kernel. The kernel provides services to
the trademark; others are called "Unix system-like" start and stop programs, handles the file system and
or "Unix-like". other common "low level" tasks that most programs
During the late 1970s and early 1980s, the share, and, perhaps most importantly, schedules
influence of Unix in academic circles led to large- access to hardware to avoid conflicts if two programs
scale adoption of Unix (particularly of the BSD try to access the same resource or device
variant, originating from the University of California, simultaneously. To mediate such access, the kernel
Berkeley) by commercial startups, the most notable was given special rights on the system, leading to the
of which are Solaris, HP-UX and AIX. Today, in division between user-space and kernel-space.
addition to certified Unix systems such as those The microkernel concept was introduced in an
already mentioned, Unix-like operating systems such effort to reverse the trend towards larger kernels and
as Linux and BSD are commonly encountered. The return to a system in which most tasks were
term "traditional Unix" may be used to describe a completed by smaller utilities. In an era when a
Unix or an operating system that has the "normal" computer consisted of a hard disk for
characteristics of either Version 7 Unix or UNIX storage and a data terminal for input and output
System V. (I/O), the Unix file model worked quite well as most
Unix operating systems are widely used in both I/O was "linear". However, modern systems include
servers and workstations. The Unix environment and networking and other new devices. As graphical user
the client-server program model were essential interfaces developed, the file model proved
elements in the development of the Internet and the inadequate to the task of handling asynchronous
reshaping of computing as centered in networks events such as those generated by a mouse, and in
rather than in individual computers. the 1980s non-blocking I/O and the set of inter-
Both Unix and the C programming language were process communication mechanisms was augmented
developed by AT&T and distributed to government (sockets, shared memory, message queues,
and academic institutions, which led to both being semaphores), and functionalities such as network
ported to a wider variety of machine families than protocols were moved out of the kernel.
any other operating system.

English for Special Purposes


Computer Engineering 125

UNIT 3 PORTABLE COMPUTERS: The future of Portable Computers

Jef Raskin, a user interface and system design Rob Enderle, a TechNewsWorld columnist, is
consultant. Future portable computers will look the Principal Analyst for the Enderle Group. In the
like tiny keyboards or writing tablets with a cable near future, most mobile devices will offer video
or a wireless link to your eyeglasses. Though it conferencing, as they incorporate user-facing
would seem inevitable, not all versions of the cameras. And many will also include pin projectors
glasses will connect to the computer or car or so their contents can be projected for easier
whatever by a wireless link. viewing. But innovation will truly take off when
Unfortunately, batteries are still big and heavy, battery size and capacity cease to be major hurdles
and will be for a while yet, so we'll have to have for industrial designers. Today, wireless and soon
some wires leading to battery packs, and once over-the-air charging could explode similar to how
you've got a wire to the battery on your belt, you wireless networking did in the past. Imagine not
might as well have a nice, reliable, and cheap wire having to plug in your laptop, iPad, or iPhone -
link to your eyeballs. Head-mounted displays will simply walking into your home or office will start
ultimately become cheaper than LCD panels. If it's the device charging - wirelessly. Faster chips and
done right, the eyeglass display will plug into faster wireless networks will also eventually allow
whatever gadget you have, giving at least 600 * voice recognition to finally become a reality.
800 pixels of screen resolution to the smallest cell Someday soon we will truly be able to ask
phone (displays with built-in cell phones will be questions to our mobile devices and they'll reply -
common). Because the illumination can come from and perhaps discuss the answer.
a single white light-emitting diode that takes a What's considered portable today will most
fraction of a watt to operate, lithium-ion or likely be considered doorstops ten years from now.
lithium-polymer batteries on your belt or in the As flexible and transparent displays enter the
keyboard unit will allow you to work for many mainstream devices will become lighter and
more hours on a single charge than today's big wearable. Early attempts to intertwine computers
screens permit. and clothing have failed to date because you need
The laptop will probably last through this batteries - and no one wants to plug in their pants.
decade, but we are exploring different alternatives But as wireless power takes hold and computers
and as such it is likely that conclusions on this shrink and their hard-case form disappears - the
subject will be different in the nearest future. The options become limitless.
market desperately needs to move to a more And of course, don't overlook the potential for
appliance-like device that is much more portable the merging of humankind and computers.
and much less power-hungry. With increasing Scientists continually push the envelope. Even
wireless bandwidth and availability our options are today early steps towards powering devices with
going to increase. Micro-displays are advancing, the body itself have leapt forward, and they'll
thanks to rear projection TVs, at an incredible rate, continue to do so at an exponential rate. So in the
making head-mounted displays more capable and future, perhaps we won't carry our portable
more likely long term. devices, maybe we'll be the device. And then the
While we have a number of choices, for most, question will be, not what's the next advance in
the laptop, with some enhancements, is likely to computers, but what's the next advance in
keep its place for at least the next five years. humans?

English for Special Purposes


126 Computer Engineering

UNIT 4 PROGRAMMING LANGUAGES: Java

Java is a programming language originally


hardware support for executing Java byte code through
developed by James Gosling at Sun Microsystems and
its Jazelle option.
released in 1995 as a core component of Sun
Java uses an automatic garbage collector to manage
Microsystems' Java platform. The language derives
memory in the object lifecycle. The programmer
much of its syntax from C and C++ but has a simpler
determines when objects are created, and the Java
object model and fewer low-level facilities. Java
runtime is responsible for recovering the memory once
applications are typically compiled to byte code that
objects are no longer in use. Once no references to an
can run on any Java Virtual Machine (JVM) regardless of
object remain, the unreachable memory becomes
computer architecture. Java is a general-purpose,
eligible to be freed automatically by the garbage
concurrent, class-based, object-oriented language that
collector.
is specifically designed to have as few implementation
One of the ideas behind Java's automatic memory
dependencies as possible. It is intended to let
management model is that programmers can be spared
application developers "write once, run anywhere".
the burden of having to perform manual memory
Java is currently one of the most popular programming
management. In some languages, memory for the
languages in use, and is widely used from application
creation of objects is implicitly allocated on the stack, or
software to web applications.
explicitly allocated and deallocated from the heap. In
One characteristic of Java is portability, which
the latter case the responsibility of managing memory
means that computer programs written in the Java
resides with the programmer. If the program does not
language must run similarly on any supported
deallocate an object, a memory leak occurs. If the
hardware/operating-system platform. This is achieved
program attempts to access or deallocate memory that
by compiling the Java language code to an intermediate
has already been deallocated, the result is undefined
representation called Java byte code, instead of directly
and difficult to predict, and the program is likely to
to platform-specific machine code. Java byte code
become unstable and/or crash. This can be partially
instructions are analogous to machine code, but are
remedied by the use of smart pointers, but these add
intended to be interpreted by a virtual machine (VM)
overhead and complexity. Note that garbage collection
written specifically for the host hardware. End-users
does not prevent "logical" memory leaks, i.e. those
commonly use a Java Runtime Environment (JRE)
where the memory is still referenced but never used.
installed on their own machine for standalone Java
Garbage collection may happen at any time. Ideally,
applications, or in a Web browser for Java applets.
it will occur when a program is idle. It is guaranteed to
Standardized libraries provide a generic way to access
be triggered if there is insufficient free memory on the
host-specific features such as graphics, threading, and
heap to allocate a new object; this can cause a program
networking.
to stall momentarily. Explicit memory management is
Programs written in Java have a reputation for
not possible in Java.
being slower and requiring more memory than those
Java does not support C/C++ style pointer
written in C. However, Java programs' execution speed
arithmetic, where object addresses and unsigned
improved significantly with the introduction of Just-in-
integers can be used interchangeably. This allows the
time compilation in 1997/1998 for Java 1.1, the
garbage collector to relocate referenced objects and
addition of language features supporting better code
ensures type safety and security.
analysis, and optimizations in the Java Virtual Machine
As in C++, variables of Java's primitive data types are
itself, such as HotSpot becoming the default for Sun's
not objects. Values of primitive types are either stored
JVM in 2000. Currently, Java code has approximately
directly in fields or on the stack rather than on the heap,
half the performance of C code. Some platforms offer
as commonly true for objects. This was a conscious
direct hardware support for Java; there are
decision by Java's designers for performance reasons.
microcontrollers that can run java in hardware instead
Because of this, Java was not considered to be a pure
of a software JVM, and ARM based processors can have
object-oriented programming language.

English for Special Purposes


Computer Engineering 127

UNIT 5 COMPUTER NETWORKING: Global Networking Infrastructure for the 21st century

The Internet Phenomenon DARPA-sponsored research in the 1960s into a


The Internet has gone from near-invisibility to then-risky new approach to data communication:
near-ubiquity in little more than a year. In fact, packet switching. The U.S. government has played
though, today's multi-billion dollar industry in a critical role in the evolution and application of
Internet hardware and software is the direct advanced computer networking technology and
descendant of strategically-motivated deserves credit for stimulating wide-ranging
fundamental research begun in the 1960s with exploration and experimentation over the course
federal sponsorship. A fertile mixture of high-risk of several decades.
ideas, stable research funding, visionary Evolutionary Stages: Packet Switching
leadership, extraordinary grass-roots cooperation, Today's computer communication networks are
and vigorous entrepreneurship has led to an based on a technology called packet switching. This
emerging Global Information Infrastructure unlike technology, which arose from DARPA-sponsored
anything that has ever existed. research in the 1960s, is fundamentally different
Although not easy to estimate with accuracy, from the technology that was then employed by
the 1994 data communications market the telephone system or by the military messaging
approached roughly $15 billion/year if one system (which was based on "message switching").
includes private line data services ($9 billion/year), In a packet switching system, data to be
local area network and bridge/router equipment communicated is broken into small chunks that are
($3 billion/year), wide area network services ($1 labeled to show where they come from and where
billion/year), electronic messaging and online they are to go, rather like postcards in the postal
services ($1 billion/year), and proprietary system. Like postcards, packets have a maximum
networking software and hardware ($1 length and are not necessarily reliable. Packets are
billion/year). Some of these markets show annual forwarded from one computer to another until
growth rates in the 35-50% range, and the Internet they arrive at their destination. If any are lost, they
itself has doubled in size each year since 1988. are re-sent by the originator. The recipient
As this article is written in 1995, the Internet acknowledges receipt of packets to eliminate
encompasses an estimated 50,000 networks unnecessary re-transmissions.
worldwide, about half of which are in the United The earliest packet switching research was
States. There are over 5 million computers sponsored by the Information Processing
permanently attached to the Internet [as of mid- Techniques Office of the Department of Defense
1996 the number is between 10 and 15 million!], Advanced Research Projects Agency, which acted
plus at least that many portable and desktop as a visionary force shaping the evolution of
systems which are only intermittently online. computer networking as a tool for coherent
(There were only 4 computers on the ARPANET in harnessing of far-flung computing resources. The
1969, and only 200 on the Internet in 1983!) first experiments were conducted around 1966.
Traffic rates measured in the recently "retired" Shortly thereafter, similar work began at the
NSFNET backbone approached 20 trillion bytes per National Physical Laboratory in the UK. In 1968
month and were growing at a 100% annual rate. DARPA developed and released a Request for
What triggered this phenomenon? What Quotation for a communication system based on a
sustains it? How is its evolution managed? The set of small, interconnected computers it called
answers to these questions have their roots in "Interface Message Processors" or "IMPs."

English for Special Purposes


128 Computer Engineering

The competition was won by Bolt Beranek and a separate agency for operational management.
Newman (BBN), a research firm in Cambridge, MA, Responsibility was therefore transferred to the
and by September 1969 BBN had developed and Defense Communications Agency (now known as
delivered the first IMP to the Network the Defense Information Systems Agency).
Measurement Center located at UCLA. The New Packet Technologies
"ARPANET" was to touch off an explosion of ARPANET was a single terrestrial network.
networking research that continues to the present. Having seen that ARPANET was not only feasible
Apart from exercising leadership by issuing its but powerfully useful, DARPA began a series of
RFQ for a system that many thought was simply research programs intended to extend the utility of
not feasible (AT&T was particularly pessimistic), packet switching to ships at sea and ground mobile
DARPA also set a crucial tone by making the units through the use of synchronous satellites
research entirely unclassified and by engaging (SATNET) and ground mobile packet radio (PRNET).
some of the most creative members of the These programs were begun in 1973, as was a
computer science community who tackled this prophetic effort known as "Internetting" which was
communication problem without the benefit of intended to solve the problem of linking different
the experience (and hence bias) of traditional kinds of packet networks together without
telephony groups. Even within the computer requiring the users or their computers to know
science community, though, the technical much about how packets moved from one network
approach was not uniformly well-received, and it is to another.
to DARPA's credit that it persevered despite much Also in the early 1970s, DARPA provided follow-
advice to the contrary. on funding for a research project originated in the
ARPANET late 1960s by the Air Force Office of Scientific
The ARPANET grew from four nodes in 1969 to Research to explore the use of radio for a packet
roughly one hundred by 1975. In the course of this switched network. This effort, at the University of
growth, a crucial public demonstration was held Hawaii, led to new mobile packet radio ideas and
during the first International Conference on also to the design of the now-famous Ethernet. The
Computer Communication in October 1972. Many Ethernet concept arose when a researcher from
skeptics were converted by witnessing the Xerox PARC spent a sabbatical period at the
responsiveness and robustness of the system. Out University of Hawaii and had the insight that the
of that pivotal meeting came an International random access radio system could be operated on
Network Working Group (INWG) composed of a coaxial cable, but at data rates thousands of
researchers who had begun to explore packet times faster than could then be supported over the
switching concepts in earnest. Several INWG air. Ethernet has become a cornerstone of the
participants went on to develop an international multi-billion dollar local area network industry.
standard for packet communication known as These efforts came together in 1977 when a
X.25, and to lead the development of commercial four-network demonstration was conducted linking
packet switching in the U.S., Canada, France, and ARPANET, SATNET, Ethernet and the PRNET. The
the UK, specifically for systems such as Telenet, satellite effort, in particular, drew international
Datapac, Experimental Packet Switching System, involvement from participants in the UK, Norway,
Transpac, and Reseau Communication par Paquet. and later Italy and Germany.
By mid-1975, DARPA had concluded that the http://www.cs.washington.edu/homes
ARPANET was stable and should be turned over to

English for Special Purposes


Computer Engineering 129

UNIT 6 COMPUTER GRAPHICS: The concept of computer graphics

An image or picture is an artifact, usually two- information. The image is a digital image or raster
dimensional, that has a similar appearance to some graphics image. The term may be by analogy with an
subject – usually a physical object or a person. Images "artist's rendering" of a scene. 'Rendering' is also used
may be two-dimensional, such as a photograph, screen to describe the process of calculating effects in a video
display, and as well as a three-dimensional, such as a editing file to produce final video output.
statue. They may be captured by optical devices – such 3D projection is a method of mapping three
as cameras, mirrors, lenses, telescopes, microscopes, dimensional points to a two dimensional plane. As most
etc. and natural objects and phenomena, such as the current methods for displaying graphical data are based
human eye or water surfaces. on planar two dimensional media, the use of this type of
A digital image is a projection is widespread, especially in computer
representation of a two- graphics, engineering and drafting.
dimensional image using Ray tracing is a technique for generating an image
ones and zeros (binary). by tracing the path of light through pixels in an image
Depending on whether or plane. The technique is capable of producing a very high
not the image resolution is degree of photorealism; usually higher than that of
fixed, it may be of vector or raster type. Without typical scanline rendering methods, but at a greater
qualifications, the term "digital image" usually refers to computational cost.
raster images. Shading refers to depicting depth in 3D models or
A pixel is the smallest piece of information in an illustrations by varying levels of darkness. It is a process
image. Pixels are normally arranged in a regular 2- used in drawing for depicting levels of darkness on
dimensional grid, and are often represented using dots paper by applying media more densely or with a darker
or squares. Each pixel is a sample of an original image, shade for darker areas, and less densely or with a lighter
where more samples typically provide a more accurate shade for lighter areas. There are various techniques of
representation of the original. The intensity of each shading including cross hatching where perpendicular
pixel is variable; in color systems, each pixel has lines of varying closeness are drawn in a grid pattern to
typically three or four components such as red, green, shade an area. The closer the lines are together, the
and blue, or cyan, magenta, yellow, and black. darker the area appears. Likewise, the farther apart the
Graphics are visual presentations on some surface, lines are, the lighter the area appears. The term has
such as a wall, canvas, computer screen, paper, or stone been recently generalized to mean that shaders are
to brand, inform, illustrate, or entertain. Examples are applied.
photographs, drawings, line art, graphs, diagrams, Texture mapping is a method for adding detail,
typography, numbers, symbols, geometric designs, surface texture, or colour to a computer-generated
maps, engineering drawings, or other images. Graphics graphic or 3D model. Its application to 3D graphics was
often combine text, illustration, and color. Graphic pioneered by Dr Edwin Catmull in 1974. A texture map is
design may consist of the deliberate selection, creation, applied (mapped) to the surface of a shape, or polygon.
or arrangement of typography alone, as in a brochure, This process is akin to applying patterned paper to a
flier, poster, web site, or book without any other plain white box. Multitexturing is the use of more than
element. Clarity or effective communication may be the one texture at a time on a polygon. Procedural textures
objective, association with other cultural elements may (created from adjusting parameters of an underlying
be sought, or merely, the creation of a distinctive style. algorithm that produces an output texture), and bitmap
Rendering is the process of generating an image from a textures (created in an image editing application) are,
model, by means of computer programs. The model is a generally speaking, common methods of implementing
description of three dimensional objects in a strictly texture definition from a 3D animation program, while
defined language or data structure. It would contain intended placement of textures onto a model's surface
geometry, viewpoint, texture, lighting, and shading often requires a technique known as UV mapping.

English for Special Purposes


130 Computer Engineering

Volume rendering is a technique used to display a data for 3D computer graphics is similar to plastic arts
2D projection of a 3D discretely sampled data set. A such as sculpting.
typical 3D data set is a group of 2D slice images 3D models may be created using multiple
acquired by a CT or MRI scanner. approaches: use of NURBS curves to generate accurate
Usually these are acquired in a regular pattern (e.g., and smooth surface patches, polygonal mesh modeling
one slice every millimeter) and usually have a regular (manipulation of faceted geometry), or polygonal mesh
number of image pixels in a regular pattern. This is an subdivision (advanced tessellation of polygons, resulting
example of a regular volumetric grid, with each volume in smooth surfaces similar to NURBS models).
element, or voxel represented by a single value that is A 3D model can be displayed as a two-dimensional
obtained by sampling the immediate area surrounding image through a process
the voxel. called 3D rendering,
3D modeling is the process of developing a used in a computer
mathematical, wireframe representation of any three- simulation of physical
dimensional object, called a "3D model", via specialized phenomena, or
software. animated directly for
Models may be created automatically or manually; other purposes. The model can also be physically
the manual modeling process of preparing geometric created using 3D Printing devices.

UNIT 7 MULTIMEDIA: Rich media features

The term Rich Media refers to a broad range of digital sharp colors and small file sizes, the GIF format is ideal.
interactive media that can either be downloadable or These include screen grabs, clipart, drawings and
embedded in a webpage. When downloaded, it can be illustrations.
used or viewed offline using media players such as JPGs are better for photographs and illustrations with
Microsoft Media Player, Real Networks' RealPlayer, or over 256 colors. If you use JPGs for screen captures, it will
Apple's QuickTime. cause blurring of colors and the file size will be larger
For distance learning through the Web as in e- because the colors are averaged.
learning, rich media must be an integral part of the Animation: Macromedia Flash is best for animation on
courseware. It should comprise animation, interactivities the Web. Not only can you increase the Flash movie to
to various levels of sophistication, visuals and narration. 1024 x 768 from 640 x 480, but you don't lose any picture
These components make training programs more quality nor do you increase the file size. Alternatively, you
effective and your company sees a significant Return on can use animated GIF format.
Investment (ROI). Movies and digital video: The most popular
Other components of Rich Media streamable formats for digital video are Windows Media
File sizes: File sizes must always be small. To minimize Player, Apple QuickTime and RealVideo.
delays in file transfer, use file formats that make the best Sound files: Of the many formats for sound
use of Rich Media and are of good quality. These include compression available, MP3 is the most popular and has
Microsoft Media Player, GIF, JPG, RealPlayer, or Apple's excellent quality. If you use Real Audio and Windows
QuickTime, Macromedia Flash (SWF), MP3, Shockwave Media Player, you can safely use MP3.
Audio (SWA), Animated GIF, Macromedia Authorware One of the best ways of using sound on the Web is to
(AAM) and VOX. use Macromedia Flash which converts WAV files to the
If there are delays in self-paced interactive course Shockwave format it has internally. If you use
programs, students can be very frustrated as it interferes Macromedia Authorware with its 800kbps plug-in, you
with understanding and retention. So, file sizes must be can either use SWA (Shockwave Audio) or VOX (Voxware).
small and very streamable to slow modems. By Authoring software: You could give your learners a
streamable is meant that as bits of the digital video are "no plug-in" option by using Macromedia Dreamweaver
downloaded, the movie starts to play, until the entire with Course Builder. It creates good interactive learning, is
download is complete. compliant with AICC norms and can import all kinds of
Image formats: If you use less than 256 colors, media.

English for Special Purposes


Computer Engineering 131

UNIT 8 TELECOMMUNICATION: Telecommunications Save Lives

Disasters kill at least one million people each


decade and leave millions more homeless.
When disaster strikes, communication links are
often disrupted; yet for disaster relief workers,
these links are essential in order to answer critical
questions as to how many people have been
injured or died, where the injured are located and
the extent of the medical help needed. To put it
simply, in disaster and emergency situations,
Earthquake in Mexico telecommunications can save lives.
The International Telecommunication Union
(ITU) has put the subjects of disaster prevention,
preparedness and relief high on its agenda in an
effort to promote and offer technical assistance to
developing countries in the field of
telecommunications, and also to promote the
Gas escaping from a broken pipe burns as mobilization of the material, human and financial
water from a ruptured main floods a Los Angeles resources needed for its implementation, as well
street after an earthquake. as access to information.
For nearly 140 years, ITU has been helping the
world communicate, a guiding mission that
becomes even more important when disaster
strikes. As noted by the United Nations Secretary-
General, Kofi Annan:
"Humanitarian work is one of the most
important, but also one of the most difficult tasks
Forest fire in South Africa of the United Nations. Human suffering cannot be
measured in figures, and its dimensions often
surpass our imagination, even at a time when news
about natural and other disasters reaches every
corner of the globe in next to real time. An
appropriate response depends upon the timely
availability of accurate data from the often remote
Aftermath of the South East Asia tsunami and inaccessible sites of crises. From the
disaster of Sunday 26 December 2004 mobilization of assistance to the logistics chain,
which will carry assistance to the intended
beneficiaries, reliable telecommunication links are
indispensable."

English for Special Purposes


132 Computer Engineering

UNIT 8 TELECOMMUNICATION: Infosphere

The concept of the "biosphere" was coined in the witnesses for their peers by issuing firsthand accounts,
beginning of this century by Russian geochemist or students can collect data from remote probes,
Vernadsky (1929) to describe the "envelope of life" as whether the probes be on school grounds or on the
an interdependent planetary web. The new moon. When used with video technologies, CMC allows
information environment needs a metaphor that students to actually see and hear events as they happen
implies the growing unity, interdependence and remotely. Classes can journey on real expeditions,
accessibility of information produced by humankind participate in real experiments and, in effect "look over
and to this end the author proposes the infosphere. the shoulders" of working scientists. For example, in the
The infosphere summarizes advances in nearly all "Live from Antarctica" project, students accessed
human endeavors. Sputnik, manned lunar landings, scientists' diaries and field journals to learn how they
and the first photograph of the entire Earth, a fragile "lived, worked, and played" at the South Pole.
blue orb in space, encouraged all people to think 4. Tele-mentoring becomes a rich and viable
globally. For educators, this revolutionary flow of teaching option. Many sites on the Internet, such as
information forces a rethinking of traditional learning professional groups and bulletin boards, are responsive
paradigms. Is there anything useful besides sending e- to student inquiries. By serving as mentors, scientists
mail and accessing databases that can help teachers and scholars can answer questions and provide
teach and students learn? classrooms with resources beyond textbooks and the
There are five general educational functionalities individual teacher's expertise. By exposing students to
of the infosphere . experts, scholars and people of achievement, tele-
1. Tele-access is the use of online resources in mentoring provides learners with positive role models,
learning, including online libraries, databases, particularly for those students to whom positive role
museums, satellite data and other classrooms. The models are not readily available. Such relationships can
latest space shuttle photos, paintings inspired by reward not only students but the mentors themselves.
Shakespeare plays, pending congressional legislation, 5. Tele-sharing often begins with simple e-mail
or foreign language resources for forty languages are chats between "keypals." It advances to "one-to-many"
available to students via the Internet. When students and "many-to-many" communications, and then
conduct online searches, they are tapping into blossoms into the sharing of resources, ideas,
information that is real-world oriented and nearly experiences, data and findings. This transition from
unlimited. Rather than digesting precanned answers, simple communications to cooperative learning offers
they are constructing their own knowledge and they relevancy and the analytical challenge of comparative
can do so with equal facility at home and in class. studies. Further, it calls upon students to engage in
2. Virtual publishing can authenticate learning by deeper social interactions. Such learning implies an
setting students' scholarship in the real world. On the equality among participants rather than the traditional
networks supported by International Education and vertically-structured, teacher-student relationship.
Resource Network (I*EARN), students from different We can also name the following positive features of
countries publish results of their collaborative telecommunication: helping students perceive
projects, including news magazines, literary journals, knowledge as constructed, not given; providing students
environmental and human-rights newsletters. with an effective model of lifelong learning; bolstering
Virtual publishing is hardly limited to text social, communication, and critical-thinking skills;
documents. Students can include graphics, video, increasing the authenticity of the learning environment;
sound and animation in their publications, as well as putting a human face on learning; finding role models
the hypertext links of digital books. for students; equity; and also for the first time, students
3. Tele-presence enables students to experience can benefit from the newest technologies rather than
events at remote sites. Students near an ecological be the last to use them.
disaster or in the path of a hurricane can serve as eye-

English for Special Purposes


Computer Engineering 133

UNIT 9 VIRTUAL REALITY: Shadow Dexterous Hand

The SDH (Shadow ronment where radiation, toxic chemicals or


Dexterous Hand) is the biological hazards are present). Also medical
closest robot Hand to the examination, education and training by experts
human hand available. It could be done on long distance.
provides 24 movements, Ergonomic Research. When doing ergonomic
allowing a direct mapping research, one often needs a model of a human
from a human to the robot. hand The Shadow Dexterous Hand is an almost
The Shadow Hand has perfect reproduction. It can be used to test all
integrated sensing and position control, allowing kinds of objects that are designed for human
precise control from off-board computers, or hands: gloves, tools, pens, handles, etc.
integration into any existing robot platform. The
Shadow Hand contains an integrated bank of 40
Air Muscles which make it move. The Shadow
Hand can be fitted with touch sensing on the
fingertips, offering sensitivity sufficient to detect
a single small coin.
Applications
The Shadow Dexterous Hand is an advanced We also see uses for the Hand in the testing of
robot hand system that reproduces all the all kinds of human manipulation, for example the
movements of the human hand and provides accessibility of objects.
comparable force output and sensitivity. This Actuation
means it can pick up or handle small to medium The Hand is driven by 40 Air Muscles mounted
sized objects and perform precision tasks, so on the forearm. These provide compliant
robots using it can have the versatility of humans. movements. Following the biologically-inspired
The sensitivity and compliance of the Hand design principle, tendons couple the air muscles to
makes it possible to manipulate delicate objects the joints. Integrated electronics at the base of the
such as fruit and eggs. For the same reason, the hand system drive the pneumatic valves for each
Hand is safe around human beings, since it is less muscle and also manage corresponding muscle
strong than a person. Being the same size as a pressure sensors.
human hand, the system is versatile and suitable Busses. The hand system presents a Controller
for use for a variety of purposes: Area Network (CAN) bus interface to the outside
Research. The University of Bielefeld is using world. The CAN interface has been tested with
the SDH in their research into situated learning. standard controller cards as well as the supplied
Carnegie Mellon University is using it in their interface cards. All sensor data, components,
research into grasping. NASA's Robonaut group configuration and controllers can be accessed over
bought a SDH "to inspire their engineers". Others this bus. A simple protocol is used for the
are interested in using the Hand as a component communication. Example code for protocol
in their neurological, rehabilitation projects and interface is supplied as part of the GPL (General
many more applications. Public License) codebase only; alternate licensing is
Telepresence operations. A remote system also available as an option. An embedded Ethernet
using the SDH technology will allow an operator interface option permits direct access to robot data
to work in an inaccessible area (a harmful envi- and configuration by TCP/IP communication.

English for Special Purposes


134 Computer Engineering

UNIT 10 COMPUTER SECURITY: Phishing

The World Wide Web is home to many authentic. Do not use any phone numbers
threats and the sneakiest of all Internet attacks is provided in the email. Remember that most
phishing. This nefarious online theft mechanism legitimate sites and financial services will never
can rob your money, personal information and deal with sensitive issues in emails.
even your identity. 3) Do not click on links in your email at first.
Phishing (password harvesting fishing) is Hover the mouse icon over the link and see what
getting passwords for online bank accounts or address appears in your browser screen. The text
credit card numbers by using emails that look like of the link can say one thing but the actual address
they are from real organizations, but in fact they could be someone's private computer or fake
are fake. So you think you are logging into your website. Do not copy the URL or link and paste it in
online bank account but you are actually logging your browser's address bar. To truly test its
into a very craftily disguised site that stores your authenticity, open a new window and type in the
login info to access your account. The term official site address of the organization or
"phishing" is a word play on "fishing", where a company. Phishing sites will use legitimate looking
fisherman baits his hook, fools the fish into links to fool you into clicking and then take you
thinking it is food and reels it in. Such tactics are a somewhere else entirely. Do not clickon links in
serious threat to online safety and individual pop-up windows at all.
users’ security. Here are some tips to prevent 4) Avoid sending private information like your
phishing from stealing your information. name, account details, passwords - any sensitive
1) Read emails and messages carefully. Look information that is unique to your online identity,
for some tell-tale phishing signs such as: through emails. Your email account or the
• Spelling mistakes and grammatical errors in the recipient's account could get hacked and your
email's text. information exposed.
• Your name isn't present anywhere but instead a 5) Be vigilant with downloads and attachments.
general name is given. ("Dear satellite Only open or download email attachments from
subscriber", instead of your full name heading known senders but make sure you scan the
the email). attachment prior to download, using your anti-
• Subtle threats to follow the email's instructions virus software.
("your account will be terminated if you fail to 6) Check any of your online or financial
follow the procedure"). accounts and transaction statements for any
• Unknown senders or companies you have never suspicious activity or operations. For example, if
heard of. there has been a deduction from your bank
• Impossibly unrealistic deals ("a wealthy account which you have no knowledge of or a
millionaire died and decided to leave you, Mr. "password successfully changed" alert appears on
Abc, all his money"). your phone, contact the respective department of
2) Verify the authenticity of the email sender. the company involved and assert that you have not
If an organization like a bank or company is trying performed any changes. Such checking of accounts
to contact you, whether known or unknown, you should be done at least once a month.
should contact that organization personally and 7) Your computer is your castle, so line its
verify that they have sent you the mail. Phishing defenses with spam filters, anti-spyware programs
sites are like chameleons, they do their best to and a decent firewall. Look for anti-virus programs,
simulate or imitate legitimate sites, to look with phishing filtering. Download the latest

English for Special Purposes


Computer Engineering 135

security updates and keep your computer up-to- Turn on your browser's security mechanisms
date, so that it can handle the latest threats as and alert messages. Updating your browser will
they come. also keep such security features informed of the
8) If you are carrying out sensitive data latest threats.
transactions like online shopping or money 10) If you suspect a site of being "phishy" or you
transfers, make sure you are using a secure have been phished", then your silence will just
connection to a secure site. So look for "https://" allow the guilty party to scam someone else. Some
in your address bar, before the site's address. web browsers allow you to report suspected sites
Another sign is in the bottom right-hand side of or mark them as unsafe. You can even inform the
the web browser. A small chain or yellow lock legitimate site being impersonated of the phishing
icon indicates a secure connection. Sometimes site. The Federal Trade Commission deals with
such icons can be "faked", so check the URL of phishing scams and sites dealing with such attacks,
the site as well. Clicking on the lock icon should visit their site to complain of such sites and if you
display the site's security certificate. If the site are a victim, then informing the FTC can help
name and the name of the site on the certificate prevent the possible theft of your identity.
do not match, leave the site immediately. Don't fall for the "hook", be the smart fish that
9) With phishing being such a silent yet deadly got away by following the right anti-phishing tips. It
web menace, web browsers are also stepping up is web hooligans like phishers and hackers that give
their security mechanisms. So install a tool-bar or the Internet a bad name, so surf smart and access
phishing filter utility on your browser to warn you secure information smartly.
from navigating to phishing sites. By Rave Uno http://www.buzzle.com/articles

English for Special Purposes


136 Computer Engineering

Word list
UNIT 1 COMPUTER & COMPUTING
attach (v)
case (chassis) (n)
circuitry (n)
collate (v)
connectivity (n)
convert (v)
data (n)
digitization (n)
distributed (adj)
drastically (adv)
embedded computer (n)
execute (v)
fraction (n)
hardware (n)
intelligence (n)
laptop (n)
loom (n)
maintain (v)
transmission (n)
motherboard (n)
palm-size (palmtop) (adj)
pin (n)
punch card (n)
rapid (adj)
succession (n)
raw (adj)
refer (v)
refined (adj)
respond (v)
shrink (v)
steam-driven machine (n)
store (v)
tabletop (desktop) computer (n)
total (adj)
tower shape (desktop) (n)
mainframe (n)
vague (adj)
various (adj)
service provider (n)

English for Special Purposes


Computer Engineering 137

UNIT 2 SOFTWARE
acquire (v)
bug (n)
coin (v)
commercially (adv)
debugging (n)
eliminate (v)
encode (v)
flowchart (n)
gain (v)
get rid of (v)
implement (v)
inadequate (adj)
interoperability (n)
kernel (n)
linear (adj
malfunction (n)
message queue (n)
multiple (adj)
paging file (n)
require (v)
requirement (n)
schedule (n)
semaphore (n)
sequence (n)
simultaneously (adv)
socket (n)
specification (n)
split (v)
submit (v)
subroutine (n)
tool (n)
vendor (n)
verify (v)

English for Special Purposes


138 Computer Engineering

UNIT 3 PORTABLE COMPUTERS


add-in card (n)
ambient (adj)
augment (v)
backplane (n)
battery pack (n)
bay (n)
chipset (n)
conducive (adj)
conform (v)
consistency (n)
convertible (adj)
digitizer (n)
display panel (n)
docking station (n)
excel (in) (v)
failure point (n)
form factor(pl) (n)
general-purpose (adj)
graphics processor (n)
handwriting recognition (adj)
hinge (n)
housing (n)
implement (v)
inception (n)
inflexible (adj)
internal optical drive (n)
intrinsic (adj)
omit (v)
pen computing (n)
pertain (to) (v)
power efficiency (n)
prosthetic (adj)
removable (adj)
removable medium (n)
rechargeable battery (n)
restrict (to) (v)
solid-state storage devices (n)
stand-alone (adj)
stylus (n)
swivel (v)
tablet (n)
touchpad (n)
ultraportable (adj)

English for Special Purposes


Computer Engineering 139

UNIT 4 PROGRAMMING LANGUAGES


abstraction (n)
algorithm (n)
artificial (adj.)
cognitive science
compute (v)
computation (n)
concept (n)
constraint (n)
construct (n)
descendant (n)
domain-specific (adj.)
execute (v)
feature (n)
footprint (n)
GOTO statements
implement (v)
implementation (n)
lambda calculus
mnemonic (adj.)
mode (n)
multi-disciplinary field
object-oriented
programming
polymorphic (adj.)
programming language
punch card
require (v)
scratch (n)
syntax (n)
written specification
update (v)

English for Special Purposes


140 Computer Engineering

UNIT 5 COMPUTER NETWORKING


backbone (n)
bridge (n)
cable (n)
calculation (n)
capacity (n)
communication (n)
conduct (v)
content provider
converge (v)
deploy (v)
dissimilar (adj.)
Domain Name System
exchange data
flow (n/v)
Frame Relay
gateway (n)
hierarchical (n)
High-Level Data Link
Control
host (n)
hub (n)
interconnect (v)
IP address
layout (n)
multiple connection
network hub
networking (n)
peer-to-peer
Point-to-Point Protocol
provide information
rely on (v)
router (n)
routing protocol
server (n)
socket (n)
specification (n)
time-sharing (n)
topology (n)
wire (n)

English for Special Purposes


Computer Engineering 141

UNIT 6 COMPUTER GRAPHICS


aesthetic (adj)
although (conj)
boundary (n, adj)
capture (n)
conjunction (n)
content (n)
data-driven (adj)
define (v)
detract (v)
differentiate (v)
dimension (n)
discrete (adj)
encompass (v)
exterior (adj, n)
finite (adj)
fluid (adj, n)
foundation (n)
frame (n)
illumination (n)
issue (v, n)
jerkiness (n)
keyframing(n)
limbs (n)
mesh (n)
polygonal (adj)
reinforce (v)
representation (n)
rig (n)
sample (n)
setting (n)
shape (v, n)
similar (adj)
spatial (adj)
standalone
temporal (adj)
transparent (adj)
visibility (n)

English for Special Purposes


142 Computer Engineering

UNIT 7 MULTIMEDIA
access (v)
advertisement (n)
appropriate (adj)
bitmap (n)
blend (v)
blurring (n)
combine (v)
content (n)
convergence (n)
convey (v)
delay (n)
deliver (v)
determine (v)
display (v)
divide (v) into
download (v)
enable (v)
enhance (v)
feature (n)
haptic (adj)
incorporate (v)
install (v)
interactivity (n)
linear (adj)
modifiable (adj)
plug-in (n)
predictability (n)
reduce (n)
self-paced (adj)
simulation (n)
survivability (n)
upload (v)
volatile (adj)

English for Special Purposes


Computer Engineering 143

UNIT 8 TELECOMMUNICATION
access (n)
allocate (v)
browser(n)
chunk (n)
convert (v)
customize(v)
derive (v)
destine (v)
discrete (adj)
division (n)
encode (v)
ensure (v)
eventually
familiar (adj)
handle (v)
investigate (v)
involve (v)
layered (adj)
medium (adj)
merge (v)
multiple (adj)
padlock (n)
recurring (adj)
regardless (adj, adv)
restrict (v)
route (v)
router (n)
run (v)
stack (n)
vary (v)

English for Special Purposes


144 Computer Engineering

UNIT 9 VIRTUAL REALITY


awareness (n)
couple (v)
data gloves (n, pl)
demand (n)
dimension (n)
extensive (adj)
force feedback (n)
hamper (v)
haptic (adj)
helmet (n)
imaginary (adj)
immersion (n)
Implementation (n)
Innovative (adj)
Interactivity (n)
involve (v)
mapping (n)
mounted (pp)
(head mounted display)
multithreading (n)
omnidirectional treadmill (n)
reflective (adj)
resolution (n)
response (v)
schematic (adj)
screen (n)
simulation (n)
simultaneously (adv)
superimpose (v)
surroundings (n, pl)
telemetry (n)
tracking (n)
visor (n)
wireless (adj)

English for Special Purposes


Computer Engineering 145

UNIT 10 COMPUTER SECURITY


adjust (v)
backdoor (adj), (n)
bypass (v)
collapse (n)
compromise (v)
conceal (v)
copyrighted (adj)
disguise (v)
disseminate (v)
hacking (n)
header (n)
header field (n)
hijacking (n)
hoax (n)
hostile (adj)
inhibit (v)
innocuous (adj)
intruder (n)
intrusive (adj)
legitimate (adj)
malicious (adj)
menace (n)
mischief (n)
nefarious (adj)
overwrite (v)
piggybacking (n)
propagate (v)
relay (v)
replicate (v)
scam (n)
self-contained (adj)
sneaky (adj)
subtle (adj)
tamper (v)
trigger (v, n)
vendor (n)
vigilant (adj)

English for Special Purposes


146 Computer Engineering

NOTES

English for Special Purposes


Computer Engineering 147

English for Special Purposes

Вам также может понравиться