ББК
Авторы: М.Г. Бондарев, А.С. Андриенко, Л.В. Буренко, О.Г. Мельник, Э.А. Сидельник.
Computer Engineering: Издание 2-е (испр. и доп.): Учебное пособие. – М: Изд-во «Флинта»,
2014.– 147 с.
Рецензенты:
К.ф.н., доцент, заведующий кафедрой английского языка ТГПИ Е.В. Полякова.
К.п.н., доцент кафедры иностранных языков ИУЭС ЮФУ О.Н. Черноморова.
Предисловие
Практика организации современного учебного процесса, необходимость повышения
качества образования в отечественных высших учебных заведениях технического
профиля актуализирует необходимость изучения дисциплины «Иностранный язык для
профессиональных (специальных) целей» с целью развития и совершенствования
определенного программными документами уровня сформированности иноязычной
коммуникативной профессиональной компетентности студентов. Развитие иноязычной
профессиональной коммуникативной компетентности позволит студентам и будущим
выпускникам осуществлять эффективное профессионально ориентированное общение со
специалистами других стран, участвовать в процессе академической и профессиональной
мобильности в национальном и международном образовательном поликультурном
пространстве на современном этапе интеграции вузов, быть конкурентоспособными на
рынке труда, совершенствовать и приумножать национальные достижения.
Учебное пособие “Computer engineering” разработано с учетом программы обучения
иностранному языку для студентов неязыковых вузов по направлениям «Информатика и
вычислительная техника» (08.03.01); «Автоматизация технологических процессов и
производств» (15.03.04); «Информационные системы и технологии» (09.03.02) и
«Системный анализ и управление» (27.09.03). Аутентичный текстовый материал
тематических разделов пособия и разработанная система упражнений имеют
профессионально ориентированную проблематику. Уровень сложности текстового
материала, представленного в пособии, ориентирован на студентов с уровнем
сформированности лингвистической компетенции в объеме базового курса изучения
дисциплины «Иностранный язык». В вузе данный уровень эквивалентен первому и
второму курсам обучения студентов на образовательном уровне бакалавриата.
Текстовый материал и система заданий учебного пособия могут быть использованы
для групповой и самостоятельной работы студентов в аудитории под руководством
преподавателя, а также для внеаудиторной работы. Организация обсуждения
предложенных в тематических разделах пособия проблем в студенческой аудитории в
форме ролевой игры, диспутов, игр-соревнований, обсуждений «круглого стола»,
проектов, презентаций и других форм общения студентов на иностранном языке
представляется значимой, так как имитирует ситуации естественной языковой
профессионально ориентированной коммуникации.
Пособие “Computer engineering” может быть рассчитано на 150-200 и более часов
аудиторной работы в вузе в зависимости от индивидуального календарного
планирования и, соответственно, структурно-содержательного блока рабочих
программ с учетом специфики обучения студентов в определенном вузе.
Весь предлагаемый материал разбит на 10 разделов (Units), содержащих следующие
проблемы для обсуждения: “Computer & Computing”, “Software”, “Portable computers”,
“Programming languages”, “Computer networking”, “Computer graphics”, “Multimedia”,
“Telecommunications”, “Virtual reality”, “Computer security”.
Каждый раздел пособия имеет свое тематическое направление. Структура раздела
позволяет студентам снять трудности языкового, речевого и психологического
характера в процессе усвоения учебного материала раздела, легко ориентироваться в
структурно-содержательном блоке текстовых заданий и упражнений. Каждый раздел
имеет в своей структуре следующие типы заданий:
Appendix p.120
PRONUNCIATION
2. Make sure you pronounce the following words properly:
hardware ['hɑːdwɛə] keyboard ['kiːbɔːd]
software ['sɔftwɛə] application [æplɪ'keɪʃ(ə)n]
device [dɪ'vaɪs] circuitry ['sɜːkɪtrɪ]
embedded [ɪm'bedɪd] semiconductor [semɪkən'dʌktə]
computer [kəm'pjuːtə] chassis ['ʃæsi:]
punch card [pʌnʧ] [kɑːd] access ['æksəs]
communicate [kə'mjuːnɪkeɪt] data ['deɪtə]
technology [tek'nɔləʤɪ] digitization [dɪʤɪtaɪ'zeɪʃ(ə)n]
WORD STUDY
3. Translate the following definitions and memorize the terms:
hardware (n) - the machines, wiring and other physical components of a computer
or other electronic system: processing hardware, storage
hardware;
integrated circuit (n) - an electronic circuit formed on a small piece of semiconducting
material: circuit board, circuit diagram, printed circuit (board);
computer (n) - an electronic device (machine) which is used for storing data,
organizing and finding words, numbers and pictures, for doing
calculations and for controlling other machines;
central processing unit (n) - the part of a computer in which operations are controlled and
executed;
input device (n) - a piece of computer equipment such as a keyboard which enables
you to put information into a computer;
memory-storage device(n) - the part of a computer in which data or program instructions can
be stored for retrieval;
bus (n) - a distinct set of conductors carrying data and control signals within
a computer system, to which pieces of equipment may be
connected in parallel;
mainframe (n) - a large high-speed computer, especially one supporting numerous
workstations or peripherals;
software (n) - the collection of computer programs and related data that provide
the instructions telling a computer what to do: system software,
application software;
operating system (n) - the system software that allows all the hardware and software
components to work together. It consists of a set of programs that
manages all the computer's resources, including the data in main
memory and in auxiliary storage.
chassis (n) - the frame, base of a device, equipment or a vehicle onto which the
metal covering is fixed;
semiconductor (n) - a material, such as silicon, which allows electricity to move through
it more easily when its temperature increases, or an electronic
device made from this material;
digitization (n) - the process of putting information into digital form, usually so that
it can be processed by a digital computer.
4. Match the following words with their synonyms (A, B) and the Russian equivalents (C, D):
A B C D
technology system unit input device встроенный
data monitor application аппаратное обеспечение
software exchange information keyboard доступ
screen facility digitization оцифровка
main memory ways to perform tasks output device устройство ввода
chassis RAM access клавиатура
device programs and data hardware устройство вывода
communicate information embedded приложение
adware distributed similarly to freeware, except that it requires payment after a trial period
groupware designed to monitor the actions of your computer and send this data via the Net
GRAMMAR FOCUS : Present Tenses: Simple and Continuous (Active & Passive Voice)
8. Underline the correct form of the verb and translate the sentences. If you need help use GRAMMAR
FILES 1 (p. 107).
1. When one computer system is set up / sets up / set up to communicate with another
computer system, connectivity becomes / become an important system element.
2. People are the most important component / is the most important component of the
computer system: they create / creates / are created the computer software
instructions and respond to the procedures that those instructions present.
3. Computer uses / is used / are using to convert data into information and to store
information in the digital form.
4. Nowadays computer development is rapidly progressing / rapidly progresses.
5. Researchers are currently developed / are currently developing microchips called
digital signal processors (DSPs).
6. Data feed / is feeding / is fed into the computer's memory.
7. The main memory holds / is holding / is held the instructions and data which are
being processed / are processed / are processing by the CPU.
8. Peripherals include /are including / are included storage devices and input/output
devices.
9. Disk drives are used / is used / are using to read and write data on disks.
10. Input devices enable / are enabled / were enabled data to go into the computer’s
memory.
9. Before starting, answer the following questions. The term computer is used to describe a device made
This kind of information is well known and you will up of a combination of electronic and electromechanical
deal easily with the quiz. components. Computer has no intelligence by itself and
COMPUTER-quiz is referred to as hardware which is the computer's
Who founded Microsoft physical electronic and mechanical parts. A computer
Charles Babbage system can be viewed as consisting of five most vital
corporation?
elements: _____________________________________
Who set up Apple
Herman Hollerith ______________. When one computer system is set up
Computers’ Corporation? to communicate with another computer system,
Who invented a tabulating connectivity becomes the sixth system element of the
machine using punched Bill Gates total computer system.
cards for computation? ______________________________________________
Who designed the _________________: they create the computer
George Boole software instructions and respond to the procedures
“analytical engine”?
that those instructions present.
Who developed logical Steven Jobs and
The basic job of the computer is the processing of
algebra? Stephen Wozniak
information. Computers accept information in the form
10. These phrases and sentences have been of instruction called a program and characters called
removed from the text. data to perform mathematical and logical operations,
1. There are two different types of computers – and then give the results. The data is raw material while
information is organized, processed, refined and useful
analog and digital.
for decision making. Computer is used to convert data
2. People are the most important component of
into information. Computer is also used to store
the computer system… information in the digital form.
3. The most common form of computer in use ______________________________________________
today is the embedded computer. ________________________. Analog computers solve
4. In addition, hardware devices can include problems by using continuously changing data
external components... (temperature, pressure, voltage) rather than by
5. An incredible important contribution in manipulating discrete binary digits (1s and 0s) as digital
computer technology development … computers do. In current usage, the term computer
6. IBM made punch-card office machinery… usually refers to digital computers. Hybrid computers
combine elements of both types. Digital computers are
7. …Hardware, Software, People, Procedures, and
generally more effective than analog computers for
Data.
three principal reasons: they are not as susceptible to
8. This process is called digitization. signal interference; they can convey data with more
Read the text quickly and fill in the gaps with precision; and their coded binary data are easier to store
the suitable phrases or sentences to form a and transfer than are analog signals.
logically correct text. Mind that one extra Such computers can represent any type of data, from
sentence you don’t have to use is given. numbers and letters to musical notes._________
__________________________________________.
A vague image of modern computer was first outlined
in 1833 by British mathematician Charles Babbage. His
design of an “analytical engine” contained all the
necessary elements of a modern computer: input
devices, a store (memory), a mill (computing unit), a
control unit, and output devices.
Ch.Babbage H.Hollerith J. Atanasoff C. Berry
COMPREHENSION CHECK
12. Put the facts in the logical order as they are given in the text:
№
Steven Jobs and Stephen Wozniak, his engineer partner, founded a company
named Apple Computer, Inc.
Hollerith founded the Tabulating Machine Company to produce similar
machines.
Bill Gates founded Microsoft.
13. Mark the following statements as “true” or “false”, correct the false ones. Find information in the text if
necessary.
True False
1. A computer has an artificial intellect.
2. Connectivity can be viewed as an important element of a computer system.
3. The basic job of a computer is to encode algorithms written in a programming
language.
4. Hybrid computers have elements of both analog and digital computers.
5. Hardware is used to store data.
6. American mathematician Charles Babbage was the first to outline a vague
image of a modern computer.
7. The ABC Computer was the first image of the first electronic digital computer.
8. Steven Jobs and Stephen Wozniak were the founders of the Apple II computer.
9. The dominant operating system was developed by Apple Computer Company.
10. Nowadays DOS is not the prevailing operating system.
14. Read the text and underline the information to prove the following statements:
1. Software is not a part of hardware.
2. The term” motherboard” is the point of argument.
3. External Bus Controllers are used to connect to external peripherals.
15. Say if the text touches upon the following points (tick them) and put the information in the correct
order:
X № X №
RAM description information about CAE software
power supply features central processing unit functions
external components of a computer networking connections description
history of computer-aided engineering (CAE) the definition of the term “mouse”
typical personal computer case keyboard usage
1) A personal computer is made up of multiple PCI-E, PCI-E 2.0, or AGP), in the form of a Graphics Card.
physical components of computer hardware, upon 10) Internal storage encompasses hardware that
which can be installed an operating system and a keeps data inside the computer for later use and
multitude of software to perform the operator's desired remains persistent even when the computer has no
functions. Typical personal computers consist of a case power (hard disk – medium-term storage of data; solid-
or chassis in a tower shape (desktop) and the following state drive – a device similar to hard disk, but
parts: containing no moving parts; disk array controller – a
2) Motherboard is the "body" or mainframe of the device to manage several hard disks to achieve
computer. The term “motherboard” is the point of performance or reliability improvement).
argument in the USA even at Court level. It was even 11) Sound card enables the computer to output
proposed to use the term “mainboard” not to give any sound to audio devices, as well as accept input from a
privileges to male or female belonging of the word. microphone. Most modern computers have sound
3) Central processing unit (CPU) performs most of cards built-in to the motherboard, though it is common
the calculations which enable a computer to function; for a user to install a separate sound card as an
sometimes it is referred to as the "brain" of the upgrade.
computer. 12) Networking connects the computer to the
4) Computer fan is used to lower the temperature Internet and/or other computers (modem is used for
of the computer; a fan is almost always attached to the dial-up connections, network card – for DSL/Cable
CPU, and the computer case will generally have several internet, and/or connecting to other computers, direct
fans to maintain a constant airflow. cable connection – use of a null modem, connecting
1
5) Random Access Memory (RAM ) is also known as two computers together using their serial ports or a Lap
the physical memory of the computer. Fast-access link cable, connecting two computers together with
memory that is cleared when the computer is powered their parallel ports).
down. RAM attaches directly to the motherboard, and 13) Hardware devices can include external
is used to store programs that are currently running. components of a computer system. The following are
2
Firmware is loaded from the Read only memory ROM either standard or very common including various input
run from the Basic Input-Output System (BIOS) or in and output devices, usually external to the computer
newer systems Extensible Firmware Inter-face (EFI) system.
compliant. 14) Keyboard is used to input text and characters by
6) Internal Buses are connections to various internal depressing buttons (referred to as keys), similar to a
3
components: PCI, PCI-E, USB, Hyper Transport, CSI , and typewriter. The most common English-language key
AGP (being phased out). layout is the QWERTY layout. Mouse is a pointing device
7) External Bus Controllers are used to connect to that detects two dimensional motions relative to its
external peripherals, such as printers and input devices. supporting surface. Webcam is a low resolution video
These ports may also be based upon expansion cards, camera used to provide visual input that can be easily
attached to the internal buses. transferred over the internet. Microphone - an acoustic
8) Controllers for hard disk, CD-ROM and other sensor that provides input by converting sound into
drives for a PC are IDE/ATA; the controllers sit directly electrical signals. Printer is a machine that can be
on the motherboard or on expansion cards, such as a connected to a computer in order to make copies on
Disk array controller. IDE is usually integrated, unlike paper of documents or other information held by the
SCSI (Small Computer System Interface) which can be computer. Monitor is a screen which displays an image
found in some servers. The floppy drive interface is a generated by a computer. Computer speakers, or
4
legacy MFM interface, which is now slowly multimedia speakers, are external speakers, commonly
disappearing. All these interfaces are gradually being equipped with a low-power internal amplifier. The
5
phased out to be replaced by SATA and SAS . standard audio connection is a 3.5mm (1/8 inch) stereo
9) Video display controller produces the output for jack plugs often colour-coded lime green (following the
the visual display unit. This will either be built into the PC 99 standard) for computer sound cards.
motherboard or attached in its own separate slot (PCI,
Comments
1
RAM – запоминающее устройство с произвольной выборкой (ЗУПВ).
2
ROM – постоянное запоминающее устройство (ПЗУ).
3
CSI – высокоскоростная шина Common Systems Interconnect - последовательный точка-точка интерфейс.
4
MFM – устаревшая ныне шина для подключения жестких дисков. Использовалось два шлейфа – один для
управляющих сигналов, другой – для обмена данными. Один из шлейфов был очень похож на шлейф для FDD.
5
SAS – компьютерный интерфейс, разработанный для обмена данными с такими устройствами, как
жёсткие диски, накопители на оптическом диске и т. д. для замены параллельного интерфейса SCSI и
обеспечения более высокой пропускной способности. SAS совместим с интерфейсом SATA, поддерживает
передачу информации со скоростью до 3 Гбит/с (в перспективе до 10 Гбит/с).
● Get Real
Check these websites to find out more
additional computer history facts and
the latest computer evolution
achievements:
http://www.accessscience.com
http://science news.org
Introducing a I would like to present you (to touch upon) a problem; I’d like to state (maintain) the
problem importance of this problem, to say that this problem is very vital and extremely popular;
I’d like to mention that I have studied and used a lot of information from the following
(different) sources.
Carving the I’d like analyze the main facts; It’s worth mentioning; I’d like to give my opinion on the
main idea problem, which concerns…; I share the authors opinion (I agree/disagree)
Summing up Now I’d like to draw a conclusion; I’d like to conclude; summing up; as I’m running out of
the presented time I’d like to summarize
information
on a problem
Unit 2 Software
Useful prefixes 1 Conditionals Software Operating system
• Slax • MINIX3
• Open SUSE • Haiku
• React OS • Ubuntu
• Mona OS • Symbian OS
PRONUNCIATION
2. Make sure you pronounce the following words properly:
amount [ə'maunt] require [rɪ'kwaɪə]
commercially [kə'mɜːʃ(ə)lɪ] schedule ['ʃedjuːl ];
extensively [ek'sten(t)sɪvlɪ] sequence ['siːkwən(t)s]
function ['fʌŋkʃ(ə)n] subroutine ['sʌbruːˌtiːn]
fundamental [fʌndə'ment(ə)l] total ['təut(ə)l]
laboratory [lə'bɔrət(ə)rɪ] typing ['taɪpɪŋ]
provide [prə'vaɪd] instruction [ɪn'strʌkʃ(ə)n]
WORD STUDY
3. Translate the following definitions and memorize the terms:
software (n) - the collection of computer programs and related data that provide
the instructions telling a computer what to do: system software,
application software;
operating system (n) - the system software that allows all the hardware and software
components to work together; a set of programs that manages all
the computer's resources;
bug (n) - an error in a computer program or system;
computer programmer (n) - a person whose job involves writing programs for computers;
debugging (n) - the process of identifying and removing errors from computer
hardware or software;
disk operating system (n) - a computer operating system that controls and manages files and
programs stored on disk; DOS is a shorthand term for several
closely related operating systems (MS-DOS, PC DOS, DR-DOS, etc.)
that dominated the IBM PC compatible market;
flowchart (n) - a graphical representation of a computer program in relation to its
sequence of functions;
graphical user interface (n) - a visual way of interacting with a computer using items such as
windows, icons, and menus, used by most modern operating
systems;
LINUX (n) - an operating system modeled on Unix, whose source code is
publicly available at no charge;
program (n) - a set of instructions that a computer follows in order to perform a
particular task;
schedule (n) - a plan for carrying out a process or procedure, giving lists of
intended events and times;
eliminate (v) - completely remove or get rid of something;
file (n) - holder, cover, case, box, etc. for keeping data;
server (n) - a computer or computer program which manages access to a
centralized resource or service in a network;
UNIX (n) - a computer operating system developed in 1969 by K. Thompson
and D. Ritchie; today is used to describe any operating system that
conforms to Unix standards, meaning the core operating system
operates the same as the original Unix operating system;
4. Match the following words with their synonyms (A, B) and the Russian equivalents (C, D):
A B C D
acquaint error restore удалять ошибки
coder introduce paging file последовательность
series eliminate task manager ядро
bug programmer kernel количество
expel time-table calculation восстанавливать
schedule performance flowchart диспетчер задач
execute sequence debug обеспечивать
operation edition sequence блок-схема
version carry out provide вычисление
efficiency procedure amount файл подкачки
A B
store a computer
conform mistakes
solve data
load the instructions
embed to standards
eliminate a problem
access software
follow the files
A prefix is placed at the beginning of a word to modify or change its meaning. These are
some prefixes used in English for Computer Engineering. You can find more detail or
precision for each prefix in a dictionary. The origins of words are extremely complicated.
You should be very careful, because what often appears to be a prefix is not a prefix at all.
7. Match the prefixes with their meanings in the box. Two of them have the same meaning.
8. Write a prefix in front of each word (some of them can take more than one prefix).
1. If system software were not / was not / is not a permanent component of the computer, it wouldn’t /
does not / will not control its fundamental function.
2. If a database system won’t include / doesn’t include / didn’t include programs, it isn’t possible /
wasn’t possible / won’t be possible to allow multiple users to access the files concurrently.
3. If we manage / can manage / managed to store endless amounts of data, probably, it wouldn’t be
necessary to have such hard storage devices we have now.
4. Even if a program works / will work / worked correctly it will have bugs.
5. If the name “UNIX” wasn’t / weren’t / isn’t a trademark of The Open Group, it wouldn’t license it for
use with any operating system.
6. If operating system was not responsible / were not responsible / is not responsible for the
management and coordination activities of the computer, it wouldn’t serve as an interface between
Hardware and User.
10. Complete these sentences with the correct form of the verbs in brackets.
1. If you (bring) __________ your digital video camera, we can make a movie on my PC.
2. You won't be able to play those video files if you (not have) __________ the correct plug-in.
3. If the marketing manager (have) __________ PowerPoint, she could make more effective
presentations.
4. If I could afford it, I (buy) __________ a new game console.
5. If I had the money, I (invest) __________ in some new multimedia software.
11. Before starting, answer the following questions. Two types of software instruct a computer to
This kind of information is well known and you’ll perform its tasks — systems software and applications
deal easily with the quiz: software.
Systems software is a permanent component of the
COMPUTER-quiz
computer that controls its fundamental functions.
What is the purpose of a device driver? Different kinds of applications software are loaded
What are apps? into the computer as needed to perform specific tasks
What is the difference between Notepad and for the user, such as word processing. Applications
WordPad? software requires the functions provided by the
What functions does Adobe Reader perform? systems software.
What is DOS? Modern operating systems provide a graphical user
interface (GUI) to make the applications software
12. Read the text and study the information about easier to use.
processes called ‘alpha testing,’ ‘GUI-based A GUI allows a computer user to work directly with
software’, UNIX OS, a version of UNIX called Linux an application program by manipulating text and
graphics on the monitor screen through the keyboard
and debugging. Be ready to find out more
and a pointing device such as a mouse rather than
information about these problems and to discuss
solely through typing instructions on command lines.
them.
The Apple Computer company's Macintosh computer,
introduced in the mid-1980s, had the first
commercially successful GUI-based software.
Another example of systems software is a database
system. A database system works with the file system
and includes programs that allow multiple users to
access the files concurrently. Computers that use disk
memory-storage systems are said to have disk
operating systems (DOS). Popular operating systems
for PCs are MS-DOS and Windows, developed by the
Microsoft Corporation in the early 1980s and 1990s,
respectively. Workstations, servers, and some
mainframe computers often use the UNIX OS
originally designed by Bell Laboratories in the late
1960s. A version of UNIX called Linux gained
popularity in the late 1990s for PCs.
Software is written by professionals known as
computer programmers. Most programmers in large
corporations work in teams, with each person
focusing on a specific aspect of the total project.
Computer programs consist of data structures and
algorithms. Data structures represent the information
that the program processes. Algorithms are the
sequences of steps that a program follows to process
the information. For example, a payroll application
program has data structures that represent personnel
PROBLEM SOLVING
15. Which IT professionals are described here? Complete these definitions with jobs from the box.
software engineer computer security specialist blog administrator help desk technician
DTP operator hardware engineer network administrator webmaster
1. A _________________________ designs and develops IT devices.
2. A _________________________ writes computer programs.
3. A _________________________ edits and deletes posts made by contributors to a blog.
4. A _________________________ uses page layout software to prepare electronic files for network.
5. A _________________________ manages the hardware and software that comprise a publication.
6. A _________________________ designs and maintains websites.
7. A _________________________ works with companies to build secure computer systems.
8. A _________________________ helps end-users with their computer problems in person, by email
or over the phone.
COMPREHENSION CHECK
16. Give definitions to the following notions:
algorithm
instruction
specification
requirement
module
17. Mark the following statements as “true” or “false”, correct the false ones. Find information in the text if
necessary.
True False
1. A database system is another example of systems hardware.
2. LUNIX is another reimplementation of UNIX.
3. UNIX-like systems was run in the early 1990s and was applied for PCs.
4. The Macintosh Computer company had the first commercially successful GUI-
based software.
5. Algorithms are the sequences of steps that a program follows to process the
information.
● Get Real
Check these websites for useful
information:
www.coolwebmasters.com
http://en.wikipedia.org/
PC
Software Hardware
1 2 3 4 5
PRONUNCIATION
2. Make sure you pronounce the following words properly:
ultra-mobile ['ʌltrə 'məubaɪl] typical ['tɪpɪk(ə)l]
palmtop ['pɑːmtɔp] configuration [kənfɪgju'reɪʃ(ə)n]
wearable ['wɛərəbl] thickness ['θɪknəs]
designed [dɪ'zaɪnd] weigh [weɪ]
dimension [daɪ'men(t)ʃ(ə)n] weight [weɪt]
augment ['ɔːgmənt] behavioral [bɪ'heɪvjərəl]
optimize ['ɔptɪmaɪz] stylus ['staɪləs]
prosthetic [prɔs'θetɪk] isometric [ˌɪsə'metrik]
majority [mə'ʤɔrətɪ] companion [kəm'pænjən]
WORD STUDY
3. Translate the following definitions and memorize the terms:
portable (adj) - having the ability to run on a variety of computers (portable software) without
reference to a particular type of hardware; small and lightweight, able to be
easily carried or moved (hardware);
chipset (n) - a highly integrated circuit on the motherboard of a computer that controls
many of its data transfer functions;
docking station (n) - a device used to connect one appliance to another, esp. a portable computer
and a desktop computer, to make use of its external power supply, monitor,
and keyboard, esp. to enable the transfer of data between the machines;
pen computing (n) - a computer system employing a user-interface using a pointing device plus
handwriting recognition as the primary means for interactive user input;
smartphone (n) - a mobile telephone with computer features that may enable it to interact with
computerized systems, send e-mails, and access the web;
touchscreen (n) - a visual display unit screen that allows the user to give commands to the
computer by touching parts of the screen instead of using the keyboard;
omit (v) - to neglect to do or include;
stylus (n) - an electronic input device that is used to draw or write on the screen;
slot (n) - or expansion slot, a spare space on the system board of a computer to which
expansion boards can be fitted;
performance (n) - the action or process of carrying out or accomplishing an action, task, or
function;
general-purpose (adj) - having a range of uses or applications; not restricted to one function;
optical disc (n) - an inflexible disc on which information is stored in digital form by laser
technology;
consistency (n) - agreement or harmony between parts of something complex; compatibility;
configuration (n) - the particular choice of hardware items and their interconnection that make
up a particular computer system;
pointing stick (n) - an isometric joystick used as a pointing device. It was invented by research
scientist Ted Selker and now it is present on many brands of laptops;
flip (adj) - an electronics form factor which is in two or more sections that fold via a
hinge.
4. Complete the puzzle using the clues and the words from exercises 2 and 3.
A B A B
trackpad neglect traditional size
housing mobile utilize operate
omit touchpad run conventional
portable consistency dimension improve
compatibility case enhance use
6. Match A and B to make up phrases often used to speak about portable computers and then give their
Russian equivalents (C):
A B C
display housing
docking recognition
voice mode
high battery life
keyboard station
longer resolution
pointing battery
rechargeable device
portrait panel
7. Fill in the gaps with the correct prefix from the list.
11. Link these words to make predictions using predicting techniques. Express the level of certainty as you
see it. You can make all the necessary changes. If you need help use GRAMMAR FILES 4 (p. 111).
Example: computer teaching/ be used/ much. – I think computer teaching will probably be used more.
1) computers / write / own software. 4) very small devices / be built into clothing.
2) a body chip / correct / poor vision. 5) computers / be implanted into the human brain.
3) computer teaching / replace / courses. 6) people / vote in elections online.
COMPREHENSION CHECK
15. Read the text again and decide whether these statements are true (T) or false (F), correct the false
ones:
True False
1. The term “portable computer” is now almost exclusively used to refer to portable computers
that are larger than a laptop and do not run on batteries.
2. Laptops can only run on AC power and need to be plugged in.
3. The weight of early models of laptops was more than 5.4 kg.
4. Tablet PCs are designed in the flip form factor to protect the screen and the keyboard when
closed.
5. Despite the size and weight reductions, ultraportables retain the performance of a standard
notebook.
6. The battery life of subnotes is typically 10 hours.
7. Subnotebooks run specialized software such as Windows CE, Palm OS or Internet Tablet OS.
8. Low cost and low weight are the main advantages of netbooks over other computers of that
kind.
9. Although solid-state storage devices are less power consuming their storage capacity is also
little
10. A typical PDA has softkeys, a directional pad, and a numeric keypad rather than a touchscreen
for entering data.
11. Unlike a laptop or a palmtop, wearable computer is constantly turned on and interacts with
the real-world task.
12. All types of portable computers use standard motherboards or backplanes providing plug-in
slots for add-in cards.
LEAD-IN
1. Study the following words, think what unites them and continue this list.
PRONUNCIATION
2. Make sure you pronounce the following words properly:
algorithm [’ælgərið(ə)m] error [’erə]
artificial [ɑːti’fiʃ(ə)l] machine [mə’ʃiːn]
ambiguous [æm’bigjuəs] precision [pri’siʒ(ə)n]
automatically [ɔːtə’mætik(ə)li] programming ['prəugræmɪŋ]
completeness [kəm’pliːtnəs] execute ['eksɪkjuːt]
dominant [’dɒminənt] diversity [daɪ'vɜːsɪtɪ]
WORD STUDY
3. Translate the following definitions and memorize the terms:
they represent;
concept (n) - a general idea or notion that corresponds to some class of entities and
that consists of the characteristic or essential features of the class;
context (n) - the conditions and circumstances that are relevant to an event, fact,
etc.;
novice (n) - a person who is new to or inexperienced in a certain task, situation,
etc.;
convergence (n) - the combining of different forms of electronic technology, such as data
processing and word processing converging into information
processing;
predictability (n) - the state of knowing what something is like, when something will
happen, etc.
4. Match the following words with their synonyms (A, B) and the Russian equivalents (C, D):
A B C D
artificial precede automated looms машинно-считываемый,
perform satisfy batch process точно определённый,
specify sphere figuratively speaking автоматический ткацкий станок,
mode simulated machine-readable образно выражаясь,
predate modify precisely defined язык сценариев,
field detail scripting language процесс пакетной обработки
intent setting dominant implementation внешнее поведение
alter execute external behavior выйти из употребления
meet purpose fall into disuse вмешательство человека
context style human intervention основное применение
5. Jumbled words. Rearrange the letters in A to make words and match them with definition in B.
A B
a part of a program consisting of a coded command
eanualgg _______________
to the computer to perform a specified function;
a group or combination of interrelated, interdependent,
iiiaarfclt _______________
or interacting elements forming a collective entity;
_______________ a person who writes a program so that data may be
nstcrtnuiio
processed by a computer;
_______________ a system for the expression of thoughts, feelings, etc., by
itcompexly
the use of spoken sounds or conventional symbols;
_______________ a device, usually electronic, that processes data
mrrrmpogae
according to a set of instructions;
_______________
sestmy the state or quality of being intricate or complex;
_______________
topucerm non-natural.
6. Complete these sentences with the appropriate form of the verbs from the list:
back up build up catch up keep up set up start up free up update upgrade upload
1. To avoid losing data, you should __________ your files regularly.
2. You can __________ your PC by adding a new motherboard.
3. Delete some files to __________ space on your hard disk.
4. A Data is __________ from regional PCs to the company's mainframe each night.
5. The operating system boots when you __________ your computer.
6. She's taking a course to __________ her knowledge of computing.
7. He __________ a website to advertise his travel company.
8. You can __________ with developments by reading PC magazines.
9. If you miss a class, you can study the hand-outs to __________
10.The image in a digital camera is __________ from a red, green and blue image.
COMPREHENSION CHECK
11. Read the text again and decide whether these statements are true (T) or false (F), correct the false
ones:
True False
1. PLT is a branch of mathematics.
2. A programming language is a man-made language designed to express computations.
3. Programming languages can’t be used as a kind of human communication.
4. Programming language is like other forms of human expressions.
5. A programmer provides the abstractions presented in the language to represent the
concepts involved in a computation.
6. Computers "do exactly what they are told to do", and cannot "understand" what
code the programmer planned to write.
7. Programs for a computer might be performed in a batch process with no human
interaction.
8. The need for diverse computer languages arises from the range of contexts in which
languages are used.
9. It is impossible to operate a program without human intervention.
10.“Universal” computer language isn’t a dream any more.
12. Write the summary of the text using the following words and expressions:
The following words and phrases may help you to make a summary:
4
In the 1960s, Simula was the first language designed Comments:
1
to support object-oriented programming; in the mid- Assembler – Ассемблер, машинно-ориентированный
1970s, Smalltalk followed with the first "purely" object- язык программирования низкого уровня. Так как
oriented language. C was developed between 1969 and каждый тип процессоров имеет собственный набор
1973 as a systems programming language. Prolog, машинных команд, то под него создаётся и
designed in 1972, was the first logic programming уникальный, платформно-зависимый ассемблер.
2
language. In 1978, ML built a polymorphic type system on Algorithmic Language – Алгол, примитивный
top of Lisp, pioneering statically typed functional процедурный язык высокого уровня, оказал большое
programming languages. Each of these languages влияние на развитие процедурных языков (блочная
spawned an entire family of descendants, and most структура, рекурсия, БНФ). В 1960-70-х годах был
modern languages count at least one of them in their общепризнанным языком научных публикаций.
ancestry. Дальнейшее развитие Алгола-60 - Алгол-68, из-за
The 1960s and 1970s also saw considerable debate своей сложности не получил широкого
over the merits of structured programming, and whether распространения.
3
programming languages should be designed to support it. A Programming Language – созданный К. Айверсоном
New techniques reduced the footprint of a program as процедурный язык сверхвысокого уровня. Требует
well as improved productivity of the programmer and специальной клавиатуры. Дальнейшее развитие
user. The card deck for an early 4GL was a lot smaller for языка - APL2.
4
the same functionality expressed in a 3GL deck. Simula – язык моделирования сложных систем,
3._______________________ разработанный Оле Далом и Кристеном Нугардом.
The 1980s were years of relative consolidation. C++ Первый объектно-ориентированный язык,
combined object-oriented and systems programming. основанный на более раннем языке моделирования
The United States government standardized Ada, a дискретных событий Simula 1 и языке Algol. Впервые
systems programming language intended for use by введены понятия класса, наследования и
defense contractors. In Japan and elsewhere, vast sums динамического связывания. Развитие - Simula-67
were spent investigating so-called "fifth generation"
languages that incorporated logic programming
constructs. The functional languages community moved
to standardize ML and Lisp. Rather than inventing new
paradigms, all of these movements elaborated upon the
ideas invented in the previous decade.
One important trend in language design during the
1980s was an increased focus on programming for large-
scale systems through the use of modules, or large-scale
organizational units of code. Modula-2, Ada, and ML all
developed notable module systems in the 1980s,
although other languages, such as PL/I, already had
extensive support for modular programming.
The rapid growth of the Internet in the 1990s created
opportunities for new languages. Perl, originally a Unix
scripting tool first released in 1987, became common in
dynamic Web sites. Java came to be used for server-side
programming. These developments were rather
refinements to existing languages and paradigms, and
largely based on the C family of programming languages.
Programming language evolution continues, in both
industry and research. Current directions include security
and reliability verification, new kinds of modularity
(mixings, delegates, aspects), and database integration.
The following discourse markers may help you to create a good presentation; you can also visit the site
http://www.youtube.com/watch?v=HZj70Rv5K8M
LEAD-IN
1. Think about the basic components of a typical computer network (a file server, a bridge, a router, a
backbone, a LAN, a gateway, a modem…), try to explain their functions.
PRONUNCIATION
2. Make sure you pronounce the following words properly:
route [ruːt] wireless [’waɪələs]
router [’ruːtə] flow [fləu]
technology [tek’nɔləʤi] converge [kən'vɜːʤ]
conduct [kən’dʌkt] hierarchical [ˌhaɪə'rɑːkɪk(ə)l]
multinational [mʌlti’næʃ(ə)nəl] authentication [ɔːˌθentɪ'keɪʃ(ə)n]
transceiver [træn’si:və] asynchronous [eɪ'sɪŋkrənəs]
WORD STUDY
3. Translate the following definitions and memorize the terms:
frame relay (n) - a standardized wide area network technology that specifies the
physical and logical link layers of digital telecommunications
channels using a packet switching methodology;
Asynchronous Transfer Mode (n) - (ATM) an electronic digital data transmission technology that is
implemented as a network protocol and was first developed in the
mid 1980s to transport real-time video, audio, image files, text;
sensitive information (n) - confidential data;
intranet (n) - an internal network that makes use of internet technology;
extranet (n) - an intranet that is modified to allow outsiders access to it, esp.
one belonging to a business that allows access to customers;
precursor (n) - a person or thing that precedes and shows or announces someone
or something to come;
coaxial cable (n) - a cable consisting of an inner insulated core of stranded or solid
wire surrounded by an outer insulated flexible wire braid, used
esp. as a transmission line for radio-frequency signals.
4. Match the following words with their synonyms (A, B) and the Russian equivalents (C, D):
A B
specifications spread out
conduct motivate
hub privileged
deploy carry out
converge predecessor
interconnect considerable
sensitive detailed description
precursor join
drive centre
significant interrelate
C D
routing protocol обмениваться информацией
practical application протокол канала связи с непосредственным соединением
exchange data поставщик онлайновой информации
peer-to-peer network оптоволокно
Point to Point Protocol витая пара (два скрученных изолированных провода)
coaxial cable практическое применение
optical fiber сеть с пакетной коммутацией
twisted-pair cable одноранговая сеть (без иерархии и выделенных серверов)
content provider протокол маршрутизации
packet switched network коаксиальный кабель
5. Jumbled words. Rearrange the letters in A to make words and match them with definition in B.
A B
kiertnnwgo confidential;
_______________
a device that allows packets of data to be moved
xrnaette
_______________ efficiently between two points on a network;
essniivet the act of applying to a particular purpose;
_______________
an intranet that is modified to allow outsiders access to
ntrntiea
_______________ it;
the application of practical sciences to industry or
eourrt
_______________ commerce;
the interconnection of two or more networks in
lipaponcait
_______________ different places;
an internal network that makes use of internet
loechyntog
_______________ technology.
8. Complete these definitions with the correct participle (active or passive) of the verb given in brackets. If
you need help use GRAMMAR FILES 5 (p. 112).
1. A gateway is an interface __________ (enable) dissimilar networks to communicate.
2. A bridge is a hardware and software combination __________ (use) to connect the same type of
networks.
3. A backbone is a network transmission path __________ (handle) major data traffic.
4. A router is a special computer __________ (direct) message when several networks are linked.
5. A network is a number of computers and peripherals __________ (link) together.
6. A LAN is a network __________ (connect) computers over a small distance such as within a company.
7. A server is a powerful computer __________ (store) many programs (share) by all the clients in the
network.
8. A client is a network computer __________ (use) for accessing a service on a server.
9. A thin client is a simple computer __________ (comprise) a processor and memory, display, keyboard,
mouse and hard drives only.
10. A hub is an electronic device __________ (connect) all the data cabling in a network.
Relay, ATM (Asynchronous Transfer Mode) and Sonet Many of the social behavior seen in today's Internet
(Synchronous Optical Network). The difference between was demonstrably present in nineteenth-century
the WAN technologies is based on telegraph networks, and arguably in even earlier
3)______________________ and the speed at which networks using visual signals.
sending and receiving bits of information (data) occur. In September 1940 George Stibitz used a teletype
Wireless LANs and WANs (WLAN & WWAN) are basically machine to send instructions for a problem set from his
the same as a LAN or a WAN but there are no wires Model K at Dartmouth College in New Hampshire to his
between hosts and servers. 4)_____________________. Complex Number Calculator in New York and received
These types of networks are beneficial when it is too results back by the same means. Linking output systems
costly or inconvenient to run the necessary cables. like teletypes to computers was an interest at the
Metropolitan Area Network (MAN) is a network that is Advanced Research Projects Agency (ARPA) when, in
too large for even the largest of LAN's but is not on the 1962, J.C.R. Licklider was hired and developed a working
scale of a WAN. It also integrates two or more LAN group he called the "Intergalactic Network", a precursor
networks over a specific geographical area (usually a city) to the ARPANet.
so as to increase the network and the flow of In 1964, researchers at Dartmouth developed the
communications. The LAN's in question would usually be Dartmouth Time Sharing System for distributed users of
connected via "backbone" lines. large computer systems. The same year, at MIT, a
All networks are interconnected to allow research group supported by General Electric and Bell
communication with a variety of different kinds of media, Labs used a computer (DEC's PDP-8) to route and
including twisted-pair copper wire cable, coaxial cable, manage telephone connections.
optical fiber, and various wireless technologies. The Throughout the 1960s Leonard Kleinrock, Paul Baran
devices can be separated by a few meters (e.g. via and Donald Davies independently conceptualized and
Bluetooth) or nearly unlimited distances (e.g. via the developed network systems which used datagrams or
interconnections of the Internet). packets that could be used in a packet switched network
Informally, the Internet is the set of users, enterprises, between computer systems.
and content providers that are interconnected by 1965 Thomas Merrill and Lawrence G. Roberts
Internet Service Providers (ISP). From an engineering created the first wide area network (WAN).
standpoint, the Internet is 5)_____________________, The first widely used PSTN switch that used true
which share the registered IP address space and computer control was the Western Electric 1ESS switch,
exchange information about the reachability of those IP introduced in 1965.
addresses using the Border Gateway Protocol. Typically, In 1969 the University of California at Los Angeles, SRI
the human-readable names of servers are translated to IP (in Stanford), University of California at Santa Barbara,
addresses, transparently to users, via the directory and the University of Utah were connected as the
function of the Domain Name System (DNS). beginning of the ARPANet network using 50 kbit/s
Over the Internet, there can be business-to-business circuits. Commercial services using X.25, an alternative
(B2B), business-to-consumer (B2C) and consumer-to- architecture to the TCP/IP suite, were deployed in 1972.
consumer (C2C) communications. Especially when money Computer networks and the technologies needed
or sensitive information is exchanged, the 7)_____________________, continue to drive computer
communications are apt to be secured by hardware, software, and peripherals industries. This
6)_____________________. expansion is mirrored by growth in the numbers and
Intranets and extranets can be securely superimposed types of users of networks from the researcher to the
onto the Internet, without any access by general Internet home user.
users, using secure Virtual Private Network (VPN) Today, computer networks are the core of modern
technology. communication. All aspects of the PSTN are computer-
Before the advent of computer networks that were controlled, and telephony increasingly runs over the
based upon some type of telecommunications system, Internet Protocol. The scope of communication has
communication between calculation machines increased significantly in the past decade and this boom
and early computers was performed by in communications would not have been possible
7)_____________________. without the progressively advancing computer network.
VOCABULARY IN USE
12. Complete the following text using suitable words and word combinations:
1)____________ networks may be classified according to the 2) ____________ topology upon which the
network is based, such as bus network, star network, ring network, mesh network, star-bus network, tree
or 3) ____________ topology network. Network topology 4) ____________ the way in which devices in the
network see their logical relations to one another. The use of the 5) ____________ "logical" here is
significant. That is, network topology is independent of the "physical" 6) ____________ of the network.
Even if networked computers are physically placed in a linear 7) ____________, if they are connected via a
hub, the network has a Star topology, rather than a bus topology. In this regard the visual and operational
8) ____________ of a network are 9) ____________; the 10) ____________ network topology is not
necessarily the same as the physical layout.
COMPREHENSION CHECK
13. Read the text again and decide whether these statements are true (T) or false (F), correct the false
ones:
True False
1. Computer networking is the engineering discipline concerned with communication
between computer systems or people.
2. A computer network is a number of computers or devices connected to each other.
3. Methods of networking depend on programming language.
4. Computers are linked via Ethernet Cable, can be joined either directly (one computer
to another), or via a network centre that allows multiple connections.
5. The largest and best example of a LAN is the Internet.
6. All networks are interrelated to allow communication.
7. The main function of the Domain Name System (DNS) is to send messages.
8. The Dartmouth Time Sharing System distributes users of large computer systems.
9. Commercial services using X.25, an alternative architecture to the TCP/IP suite, were
spread out in 1972.
10. The communication has grown tremendously in the past decade thanks to the
progressively advancing computer network.
C2C; ARPA.
…………
Computational biology
Computational physics
Computer-aided design
Computer simulation
Digital art
Education
Graphic design
Infographics
Information visualization
Rational drug design
Scientific visualization
Video Games
Virtual reality
Web design
PRONUNCIATION
2. Make sure you pronounce the following words properly:
synthesize ['sɪnθəsaɪz] exterior [ɪk'stɪərɪə]
aesthetic [i:s'θetɪk] spatial ['speɪʃl]
visualization [vɪzυǝlaɪ'zeɪʃn] procedurally [prəυ 'si:dʒrǝli]
although [ɔ:l'ðəυ] finite ['faɪnaɪt]
representation [reprɪzen'teɪʃn] differentiate [dɪfə'renʃɪeɪt]
WORD STUDY
3. Translate the following definitions and memorize the terms:
need or purpose;
2) applying to a particular purpose or use;
discrete (adj) - separate or distinct in form or concept;
setting (n) - 1) the surroundings in which something is set; scene;
2) the scenery, properties, or background, used to create the
location for a stage play, film, etc;
approximation(n) - the process or result of making a rough calculation, estimate, or
guess;
sample (n) - a small part of anything, intended as representative of the whole;
specimen;
manifold (adj) - 1) of several different kinds; multiple: manifold reasons;
2) having many different forms, features, or elements: manifold
breeds of dog;
conjunction (n) - 1) the act of joining together; combination; union;
2) simultaneous occurrence of events; coincidence;
mesh (n) - a network; net;
via (prep) - by way of; by means of; through;
standalone (adj) - (of a device or system) capable of operating independently of any
other device or system.
4. Match the following words with their synonyms (A, B) and the Russian equivalents (C, D):
A B C D
mesh single content жидкость
foundation limited issue захват изображения
standalone combination boundary временной
define distinguish polygonal проблема; дело; тема; пункт
finite basis spatial пограничный
shape include temporal определение ключевых кадров
conjunction determine fluid содержание
encompass alike capture многоугольный
differentiate net data-driven местный
similar form keyframing компьютерно управляемый
Suffixes change the class of the root word. Suffixes can help you tell if a word is a noun, an
adjective or a verb. Common noun suffixes are:
-er, -or, -ion, -tion, -ation, -ment, -ness, -ity, -ant, - logy, -ing, -y, -ure, -sion
! When using suffixes, always check in your dictionary to see if you need to change any other
letters.
scan – scanner (double n)
6. Complete these sentences with the word in brackets and one of the noun suffixes. Use a dictionary to
help you.
1. Kodak is a (manufacture) ____________ of photographic and imaging equipment.
2. To avoid red eyes, use the camera's red eye (reduce) ____________ feature.
3. (Crop) ____________ a photograph means cutting out the parts of an image you don't need.
4. The (sharp) ____________ of a photograph is a combination of resolution and acutance - the ability
to represent clear edges.
5. Digital (techno) ____________ is evolving so rapidly that some cameras have a resolution of 12
megapixels – that's 12 million pixels.
6. Computer graphics are pictures and (draw) ____________ produced by computer.
7. The (sharp) ____________ of an image depends on the (dense) ____________ of pixels, or (resolute)
____________.
8. Paint and photo−editing programs like Adobe Photoshop focus on the (manipulate) ____________ of
bitmaps.
9. (Composite) ____________ is combining parts of different images to create a single image.
10. Graphic artists and (design) ____________ use drawing programs to create freehand drawings and
(illustrate) ____________ for books or for the Web.
11. Business people use (present) ____________ graphics to make information more interesting
visually.
12. CAD is used in aerospace, (architect) ____________ and industrial sectors.
13. Designers fill the surfaces to give the (appear) ____________ of a 3−d solid object with volume.
14. The process of adding paint, colour and filters is called (texture) ____________.
15. (Govern) ____________ agencies use GIS to understand geographic data and then plan the use of
land or predict natural disasters.
10. Computers occupy one of the leading places among the greatest achievements of modern engineering.
11. Developing the new method they achieved good results.
12. Our space exploration develops much faster than that of the other developed countries,
including the USA.
8. Write out the numbers of the sentences with a participle, a gerund or a noun to complete the following
chart.
participle gerund noun
…
9. Correct the mistakes in these sentences. There are seven mistakes in total.
1. Computer animation is the process of create objects which move across the screen.
2. Texturing involves add paint, colour and filters to drawings and designs.
3. You can open the colour palette by click on the corresponding icon.
4. CAD programs are very fast at to perform drawing functions.
5. A lot of time and money is saved by test a car design before to make the product.
6. To render refers to the techniques used to make realistic images.
10. Find the examples of the -ing forms in the following text and define their part of speech.
COMPREHENSION CHECK
15. Mark the following statements as “true” or “false”, correct the false ones. Find information in the text if
necessary.
True False
1. Computer Graphics focuses on purely aesthetic issues.
2. Computer Graphics differs completely from visualization.
3. Animation describes the changes of an object over the time.
4. Fluids are the most notable examples of Lagrangian representation.
5. Physical simulation has become more popular than data-driven models nowadays.
6. Visibility is a major component of light transport.
7. The model describes the shape of an object.
8. 3D graphics artist can find help in the Internet.
9. Rendering generates images from the real world.
10. Keyframing, inverse kinematics, and motion capture can’t be used together.
● Get Real
Check these websites for the latest
news in Computer Graphics:
http://www.nvidia.com/
http://www.3dnews.ru/
Unit 7 Multimedia
Useful prefixes 3 Participle II Multimedia Multimedia Web Design Adding
LEAD-IN
1. Identify these examples of content forms combined in multimedia and comment on how they can be
used:
PRONUNCIATION
WORD STUDY
3. Translate the following definitions and memorize the terms:
volatile (adj) - inconstant, unsteady, lasting only a short time; (of a memory) not retaining
stored information when the power supply is cut off;
convergence (n) - the combining of different forms of electronic technology, such as data
processing and word processing converging into information processing;
predictability (n) - the state of knowing what something is like, when something will happen, etc.
1. An electronic whiteboard is an excellent presentational device with the potential to do much more
- to go beyond display, providing a tool for _____active teaching and learning.
2. A _____linear editing system is a video or audio editing system which can perform random access
on the source material.
3. Most of the courses are _____paced, which means you can enroll any time and finish in less than a
semester or take up to a year.
4. The World Wide Web is a classic example of _____media, whereas a non-interactive cinema
presentation is an example of standard multimedia due to the absence of hyperlinks.
5. This application offer both internet and gaming acceleration. It can quickly _____hance your
computing experience with a single click of a button.
6. You should know that too many little icons can easily _____tract your website visitors.
7. _____loading usually refers to transfer from a larger "host" system to a smaller "client" system,
and "_____load" usually means to transfer data or files from a peripheral or subordinate system to
a larger or more central one.
8. Is it possible to create a simple image map with _____bedded hyperlinks that I can use online?
9. _____learning is pedagogy _____powered by digital technology.
10. Their aim is to make sure that every home becomes Internet _____abled in the next 10 years.
COMPREHENSION CHECK
13. Reread the text, tick the “false” sentences and
correct them.
14. Scan the text, identify different parts and entitle them.
title from… – to…
15. Read the text and decide whether these points are discussed in it.
Yes No Yes No
good multimedia web design characteristics the main goal of Web advertising
Web content variants vector graphics features
multimedia web design software products computer design specifications
streaming multimedia bitmap images
A good multimedia web design is one that adds is already included with the latest Web browsers.
to the overall value of your site. It depends on the Computer graphic designs are picture images
web site design as well as the kind of services you created and manipulated digitally on computers.
want to convey. The very last thing you need is to There are basically two forms in computer graphic
distract your viewer from the key message on your design: bitmaps and vector graphics. Bitmap images
web page through multimedia web design. are widely used. The number of pixels in the image
Multimedia web design products will allow you to determines the size of these images. They must be
publish two versions of your content. One version is printed or displayed at the same size. Any other size
published strictly with HTML and doesn't include the distorts the image. Vector graphics are a set of
rich features of the multimedia project, but it allows graphical objects stored as coordinates, and
most users to get to the content they want. The mathematical formulas that determine their shape
multimedia version will require additional download and position. These graphical objects are called
time or a plug-in, but the viewer will be able to see, primitives. Lines, curves, rectangles, ellipses etc. are
hear, and interact with the content exactly as it was all primitives. These are widely used in computer-
intended. Much of multimedia web design software aided design.
utilizes compression technology to create the Computer graphic design entails editing and
smallest possible files, thereby reducing the polishing graphics. 2D or 3D computer graphic design
download time and wait time for the viewer. programs can be used to create animations. One of
You can publish texts, audio, images and the issues in computer graphic design is choosing the
animation to the web as streaming multimedia. image that will convey the meaning best. The graphic
Streaming multimedia means that the user does not must complement the text on the website. The
have to wait for the files to download completely graphic designer must produce a visual
before he can see them. Usually a portion of the communication product for a specific audience.
content is downloaded, and the remainder is Technology gives the tools to create finished
downloaded while the content is being viewed. products quickly with a high level of professionalism.
Adding multimedia design to web site greatly An effective advertising or education campaign does
enhances the visual experience of the visitor. much more than deliver a message; it also influences
Multimedia for web design requires the viewer to the audience response. There is no point in telling
install a plug-in or player to view the content. people how good a product is if we can't make them
However, some products employ technology that start using it.
WRITING: Summary
16. Summarize the general ideas of text B:
Multimedia Web Design. Follow these This text goes under the headline...
steps:
1. Read the text again.
2. Underline the relevant information in
each paragraph.
3. Make notes about the main points.
Leave out details such as examples.
4. Make sentences from the notes and link
the sentences with connectors (and, but,
because, therefore, etc.).
5. Write your first draft.
6. Improve your first draft by reducing
sentences. For example:
cut out unnecessary phrases;
omit qualifying words (adjectives or
modifying adverbs);
transform relative clauses into -ing
participle clauses
7. Write the final version of your summary.
8. Don't forget to check the spelling and
grammar.
1. Online multimedia.
2. Edutainment applications and CBT courses.
3. Engineering multimedia applications.
4. Multimedia web design software.
5. Rich media components.
adding These expressions are much more elegant moreover (very formal); furthermore
than the conjunction 'and'. We use them to (formal); in addition; as well as that; on
add information to what has been said. top of that (informal); another thing is;
what is more; besides; in any case
logical These expressions show that the second therefore (formal); as a result (formal);
consequence statement follows logically from the first one. consequently (formal); so; then
Unit 8 Telecommunication
Suffixes -able, -ize Passive infinitives Telecommunication Satellite services Viewpoint adverbs
PRONUNCIATION
2. Make sure you pronounce the following words properly:
transmission [trænz'mɪʃn] medium ['mi:dɪəm]
purpose ['pɜ:pəs] multiple ['mʌltɪpl]
advantage [əd'vɑ:ntɪdʒ] allocate ['æləkeɪt]
router ['ru:tə] recurring [rɪkɜ:rɪŋ]
standardize ['stændədaɪz] layer ['leɪə]
WORD STUDY
3. Translate the following definitions and memorize the terms:
A B A B
run limit involve change
restrict periodic convert known
recurring assign familiar examine
allocate appoint correct aim
merge operate investigate include
destine unite purpose proper
SUFFIX –ABLE is used to form the adjectives having the necessary power, resources, skill,
time, opportunity, etc., to do something.
SUFFIX –IZE is used to form the verbs with the following meanings
1) to cause to become, resemble, or agree with
2) to become; change into
3) to affect in a specified way;
4) to act according to some practice, principle, policy
8. Form the adjectives from the following verb roots with suffix -able and translate them:
Example: drink – drinkable (пригодный для питья).
Wash, eat, suit, use, note, detect, operate, consume, count, enjoy, read, separate, love.
What do these words mean? Use it can ... or it can't... . Use a dictionary if necessary.
Example: If something is 1) washable, it can be washed.
If something is 2) unbreakable, it …
If something is 3) edible, it …
If something is 4) unusable, …
If something is 5) invisible, …
If something is 6) portable, …
9. Form the verbs with the help of the suffix −ize and translate them:
Customer – customize – изготовлять по техническим условиям заказчика (делать на заказ)
11. Rewrite these sentences. Instead of using 'somebody' or 'they', write a passive sentence.
1. Somebody has locked the computer. − The computer has been locked.
2. They have postponed the conference. The conference __________________________.
3. Somebody is using the computer at the moment. The computer __________________________.
4. I didn't realize that somebody was recording our conversation. I didn't realize that __________________.
5. When we got to the stadium we found that they had cancelled the game. When we got to the stadium,
we found that __________________________.
6. They are building a new ring road round the city. __________________________.
7. They have built a new hospital near the airport. __________________________.
12. Complete these sentences with one of the following verbs in the correct form: carry cause do
make repair send spend wake up. Sometimes you need have (''might have', 'could have' etc.).
1. The situation is serious. Something must be done before it's too late.
2. I haven't received the e-mail. It might _____________________ to the wrong address.
3. A decision will not _____________________ until the next meeting.
4. I told the hotel receptionist that I wanted to _____________________ at 6.30 the next morning.
5. Do you think that less money should _____________________ on equipment?
6. This net is in very bad condition. It should _____________________ a long time ago.
7. The injured man couldn't walk and had to _____________________.
8. It's not certain how the fire started but it might _____________________ by an electrical fault.
COMPREHENSION CHECK
17. Give definitions to the following notions:
1. Telecommunication –
2. Network –
3. Channel –
4. Internet –
5. Layered approach –
6. Telecommunication system –
7. Transmitter –
8. Receiver –
9. Packet switching –
18. Mark the following statements as “true” or “false”, correct the false ones.
True False
1. Mobile phone is an example of two-way communication system.
2. Any computer on the Internet has its unique IP address.
3. Low-level protocols change the operation of higher-level protocols.
4. The Domain Name System is used for the WWW.
5. SSL and TLS don’t provide confidentiality.
6. In an analogue signal the information is encoded as a set of discrete values.
7. Internet access can be restricted by blocking the traffic destined for a particular port.
20. Read the text quickly and tick the points that correspond to the context:
New technologies have made us independent from other people or any events.
It is difficult to withstand dangers, but humanity has created a system of defensive or offensive actions.
Thanks to worldwide system of satellites, it is possible to transmit signals into any place on earth.
There is a convergence between telecommunication and computing technologies.
We are certain that new communication technologies won’t concern our economic and social life.
Technical standards of today’s mobile phones allow business travelers use them on international trips.
Satellite systems will provide us with the information from any part of the globe.
WRITING: Summary
22. Summarize the main ideas of the text using the following phrases:
1. The text deals with…
2. The development of satellite services has solved…
3. There exist…
4. Of prime interest to the reader will be…
5. In conclusion … is given.
LEAD-IN: VR components
1. Study this list of Virtual reality components. Enumerate the fields they might be applied.
PRONUNCIATION
2. Make sure you pronounce the following words properly:
breadth [bredθ] miniaturized ['mɪnətʃ(ə)raɪzd]
simultaneously [sɪm,əl'teɪnɪəslɪ] superimposing [,su:pǝrɪm'pəυzɪŋ]
immersion [ɪ'mɜ:ʃn] schematic [ski:'mætɪk]
multithreading [,mʌltɪ'θredɪŋ] awareness [ə'weənɪs]
innovative ['ɪnəʋveɪtɪv] telemetry [tə'lemɪtrɪ]
WORD STUDY
3. Translate the following definitions and memorize the terms:
simulation (n) - the construction of a mathematical model for some process or situation (esp.
using a computer) in order to estimate its characteristics or solve problems
about it in terms of the model; (компьютерное моделирование)
force feedback (n) - the simulation of physical attributes such as weight in virtual reality, allowing
the user to interact directly with virtual objects using touch;
surroundings (n, pl) - the conditions around a person, place, or thing; environment;
hamper (v) - to prevent the progress or movement of smth.;
response (v) - a verbal or written answer, the act of reply or reaction;
involve (v) - to include or contain as a necessary part, to have an effect on smth.;
demand (n) - an urgent or peremptory requirement or request;
multithreading (n) - a technique by which a single set of code can be used by several processors at
different stages of execution;
awareness (n) - the state or ability to perceive, to feel, or to be conscious of events, objects or
sensory patterns;
extensive (adj) - covering or affecting a large area, large in amount or scale, widespread;
reflective (adj) - capable of sending back (reflecting) heat, light or other radiation, providing a
reflection;
resolution (n) - the degree of detail visible in a photographic, television or display image
wirelessly (adv) - without a wire connection, using a wireless technology: FM technology
broadcasts music wirelessly;
immersion (n) - complete and deep (mental) involvement, the act of immersing or state of
being immersed;
to show information on
a screen l
information in response
to an inquiry d a
7. Circle the letter of the answer that best completes each of these sentences:
Immersion components
VR computer graphics
languages
Interaction characteristics
VOCABULARY IN USE
1._______________________
Virtual reality is a computer simulated helping as an ancillary tool for engineering in
environment, whether it is a simulation of the real manufacturing processes. Among other
or imaginary world. Most current virtual reality examples, we may also quote Electronic Design
environments are primarily visual experiences, Automation, CAD5, FEA6, and Computer Aided
displayed either on a computer screen or through Manufacturing.
special stereoscopic displays, but some simulations 4._______________________
include additional sensory information, such as Beyond modeling assembly parts, 3D
sound or tactile information (haptic systems), and computer graphics and VR techniques are
are generally known as force feedback. Users can currently used in the research and development
interact with a virtual environment either through of medical devices for innovative therapies,
the use of standard input devices or through treatments, patient monitoring. VR also finds
multimodal devices (data gloves, omnidirectional application into health care professionals training
treadmill). from anatomy instruction to surgery simulation.
2._______________________ 3D Virtual reality simulation is becoming widely
Immersion is basically a unique experience that is used for urban planning and transport projects.
connected with the world of virtual reality. Exploring Architects use this technology to create virtual
a three dimensional world of virtual reality the user designs of buildings. Dramatic improvements in
simply immerses in it as the real world. This the field of virtual reality are taken place due to
phenomenon is known as telepresence1. Thus the the extensive research and usage of VR in the
user gets focused about his newly created identity military applications where they are applied
inside the Virtual Reality world. Immersion is made almost for flight simulations or combat training.
up of two main components: depth and breadth2 of 5._______________________
information. Depth of information includes the The element of interaction is the most
resolution of the display unit, the graphics quality, important to make the user really feel free to get
the effectiveness of the audio and video etc. involved with the virtual environment.
Breadth of information is a number of sensory Interaction is characterized by speed (the rate of
dimensions presented simultaneously. the user’s actions recorded by computer and the
3._______________________ way they are reflected to be realized), range (the
To develop a real time virtual environment a number of results or reactions that can come out
computer graphics library can be used as embedded of any user action), mapping (the ability of a
resource coupled with a common programming computer system to produce results as good as
language, such as C++, Java etc. the natural world in response to the user
Some of the most popular computer graphics actions). The possibility to move from place to
library/API3/language are OpenGL, Direct3D, Java3D place inside a virtual environment is a kind of
and VRML4, and their use is directly influenced by interactivity. A poorly designed interaction can
the system demands in terms of performance, hamper immersion to a great extent and the user
program purpose, and hardware platform. The use may simply stop getting involved in the virtual
of multithreading can also accelerate 3D environment. The virtual environment is
performance and enable cluster computing with considered to be well designed and developed if
multi-user interactivity. it responds to the user action in a way it makes
Virtual reality can serve to new product design, sense.
Comments:
1
An omnidirectional treadmill is a device that виртуальное присутствие, иллюзия нахождения в
allows a person to perform locomotive motion in any виртуальном пространстве;
direction. The ability to move in any direction is how 2
ширина;
these treadmills differ from their basic counterparts 3
(Application Programming Interface) интерфейс
that permit only unidirectional locomotion.
прикладного программирования;
4
(Virtual Reality Modeling Language) язык
моделирования виртуальной реальности,
позволяющий описывать трёхмерные сцены,
использовать анимацию и путешествия по Web для
различных проектов в Internet;
5
(Computer-Aided Design) система автоматизи-
рованного проектирования, САПР;
6
(Finite Element Analysis) анализ методом конечных
Omnidirectional treadmills are employed in элементов: широко применяемый в САПР метод
immersive virtual environment implementations to
моделирования поведения сложных систем путём
allow unencumbered movement within the virtual
space through user self-motion. разбиения их на множество элементов.
COMPREHENSION CHECK
12. Reread the text and choose the best option to complete the following statements.
1. Almost any modern virtual reality environment 5. Three-dimensional VR simulations are widely
is primarily... used by architects for ….
□ force feedback system □ building design
□ sound or tactile information □ flight simulations
□ visual experience □ Innovative treatments
2. Exploring a 3D VR environment the user can 6. Development of virtual reality is caused by its
immerse in it as the real world that is known as... wide usage…
□ Interaction □ for engineering in manufacturing processes
□ Telepresence □ in medical research
□ force feedback □ in military applications
● Get Real
Check these websites for the latest
VR devices and apps:
http://www.vrealities.com/
http://vrlab.epfl.ch/
16. Role play. Work in pairs. Play the parts of a VR company sales manager and an interviewer. Make up a
conversation presenting the latest VR products. Discuss the following issues:
fields of application;
the developer;
the product advantages/disadvantages;
specifications and special features.
You can use the description of the virtual reality device or application from ex. 13, the Supplementary
reading section text “Shadow Dexterous Hand” and the links from Get Real.
Structuring first(ly), first of all, second(ly), third(ly) etc; Note that firstly/ secondly etc are more
lastly, finally; to begin with; to start formal than first, second etc, and are
with; in the first/ second/ third place; for one more common in British than American
thing; for another thing English.
Summing up in conclusion; to sum up; briefly; in short
5. Which PDA security best practice will help protect the information on your PDA?
□ Clearly identify your PDA with company stickers or logos.
□ Never remove your PDA from your bag for airport security.
□ Store your PDA passwords in a safe location.
□ Synchronize your PDA data regularly.
6. Which two methods will reduce the chances that your password will be compromised?
□ Make your password lower case.
□ Change your password regularly.
□ Use Default passwords.
□ Use a passphrase.
7. Which negative outcome can result from hoax virus warnings and malicious spam?
□ Denial of service.
□ Data loss.
□ Reduced account privileges.
□ Credit card fraud.
8. Which three actions can you take to increase the security of your Web browsing? (Choose three.)
□ Learn to recognize common scams.
□ Manage user names and passwords.
□ Only browse secure Web sites.
□ Use caution when downloading.
PRONUNCIATION
2. Make sure you pronounce the following words properly:
virus ['vaɪ(ə)rəs] legitimate [lɪ'ʤɪtəmət]
worm [wɜːm] nefarious [nɪ'fɛərɪəs]
piracy ['paɪərəsɪ] disseminate [dɪ'semɪneɪt]
hoax [həuks] innocuous [ɪ'nɔkjuəs]
propagate ['prɔpəgeɪt] piggyback ['pɪgɪbæk]
header ['hedə] adjust [ə'ʤʌst]
anomaly [ə'nɔməlɪ] subtle ['sʌtl]
WORD STUDY
3. Translate the following definitions and memorize the terms:
computer security (n) - the collective processes and mechanisms by which sensitive and
valuable information and services are protected from publication,
tampering or collapse by unauthorized activities or untrustworthy
individuals and unplanned events respectively;
back up (v) - to store a copy of files on a storage device to keep them safe;
firewall (n) - a combination of hardware and software used to control the data
going into and out of a network;
antivirus program (n) - a computer program or sets of programs used to detect, identify
and remove viruses from a computer system;
infect (v) - affect with a virus;
detect (v) - discover or identify the presence or existence of
payload (n) - the part of the virus that causes the damage;
fraud (n) - wrongful or criminal deception intended to result in financial or
personal gain;
spreading viruses (n) - distributing programs that can reproduce themselves and are
written with the purpose of causing damage or causing a computer
to behave in an unusual way;
salami shaving (n) - manipulating programs or data so that small amounts of money are
deducted from a large number of transactions or accounts and
A B C D
damage particular legitimate destruct
replicate covert backdoor harmless
legitimate reproduce download unauthorized
backdoor hide malicious harmful
relay mischief conceal ban
predetermined deception innocuous public
fraud transmit protect reveal
conceal authorized permit remove
5. Match A with B to make a word combination and then find its Russian equivalent in C:
A B C
executable threat модель управления доступом
compromise activity незаконная деятельность
backdoor file заранее заданное событие
informed model команда перехода
malicious protection информированное согласие
nefarious management основная программа
host software файл с расширением ".ехе"
JUMP the security скрытая угроза
predetermined consent вредоносные программы
copy event управление ключом
key program защита от копирования
access control command нарушить безопасность
6. There are a variety of different crimes that can be committed in computing, spreading viruses or
software piracy are among them. Complete the puzzle using the clues to know some more examples of
them.
8. Fill in the gaps with the correct prefix from the following list.
8. This program displays a message when it detects spyware and other _____wanted software
that may compromise your privacy or damage your computer.
9. Digital Terrestrial TV is received via a set-top box, a device that _____codes the signal
received through the aerial.
10. Optical discs are ideal for _____media applications, where images, animation and sound
occupy a lot of disc space.
COMPREHENSION CHECK
13. Read the text again and decide which type of the malware stands the following descriptions for:
_______________ take control of your computer without your knowledge or permission;
_______________ send your data to an unauthorized recipient;
_______________ cause your computer to attack other computers;
_______________ delete your data;
_______________ a program that has a payload but does not have a reproduction routine;
_______________ delivers advertising content without your knowledge or permission;
_______________ self-contained program which acts like a program in its own right;
14. Decide whether these statements are true (T) or false (F), correct the false ones:
True False
1. The term “malware” stands for a variety of forms of software which is hostile, intrusive or
annoying.
2. It is usually easy to detect the presence of a computer virus because it has some main parts: a
misdirection routine, a reproduction routine, a trigger and a payload.
3. The payload of a virus is activated by some predetermined event.
4. Worms can be compared with a computer virus as it exploits computers for personal gain but
it differs from a virus though, because it does not replicate to other computers and usually is
not designed to destroy data.
5. Trojan horse is a technique that involves adding concealed instructions to a computer
programs so that it will still work but will also perform prohibited duties.
6. The purpose of spyware is to take partial control of your computer or to intercept data from
your computer.
7. Neither spyware nor adware can be downloaded to your computer without your personal
concern.
8. Backdoor allows unauthorized users to access computer bypassing general authentication
methods.
9. Rootkits make other forms of malware hide files or processes running on a computer and
render them difficult to be detected and removed.
10. Though all types of malware access a computer system without the owner's informed consent,
only viruses have a payload.
15. Use the chart given below to speak about malicious software.
WORMS
VIRUSES TROJANS
MALWARE
SPYWARE ROOTKITS
ADWARE
symmetric (or secret-key) and asymmetric (or public-key) files. The data to be concealed within encrypted or
algorithms. The difference is that symmetric algorithms random data is first encrypted before being used to
use the same key for encryption and decryption (or the overwrite part of a much larger block of encrypted data
decryption key is easily derived from the encryption key), or a block of random data. Messages can also be
whereas asymmetric algorithms use a different key for concealed in tampered executable files; pictures are
encryption and decryption, and the decryption key embedded in video material (optionally played at slower
cannot be derived from the encryption key. or faster speed).
Symmetric algorithms can be divided into stream Content-Aware Steganography hides information in
ciphers and block ciphers. Stream ciphers can encrypt a the semantics a human user assigns to a datagram.
single bit of plaintext at a time, whereas block ciphers These systems offer security against a non-human
take a number of bits and encrypt them as a single unit. adversary/warden.
Asymmetric ciphers (also called public-key algorithms In Blog-Steganography messages are fractionalized
or public-key cryptography) permit the encryption key to and the (encrypted) pieces are added as comments of
be public, allowing anyone to encrypt with the key but orphaned web-logs (or pin boards on social network
only a proper recipient (who knows the decryption key) platforms). In this case the selection of blogs is the
can decrypt the message. The encryption key is also symmetric key that sender and recipient are using; the
called the public key and the decryption key the private carrier of the hidden message is the whole blogosphere.
key or secret key. In Voice-over-IP conversations messages can be
Cryptography is used in information security to protect concealed in delayed or corrupted packets normally
information by hiding it from unauthorized or accidental ignored by the receiver, or in unused header fields.
disclosure while the information is in transit (either
electronically or physically) and while information is in 18. Read the text again and find the definitions of
storage. the following terms:
Steganography is the art and science of writing hidden network security ____________________________
messages and no one, apart from the sender and __________________________________________
intended recipient, suspects the existence of the
information security _________________________
message. It is a form of security through obscurity.
__________________________________________
The advantage of steganography over cryptography
alone is that messages do not attract attention to one factor authentication _____________________
themselves. Plainly visible encrypted messages – no __________________________________________
matter how unbreakable – will arouse suspicion, and two factor authentication_____________________
may be incriminating in countries where encryption is __________________________________________
illegal. Therefore, whereas cryptography protects the three factor authentication ___________________
contents of a message, steganography can be said to __________________________________________
protect both messages and communicating parties. cryptography _______________________________
It includes the concealment of information within
encryption _________________________________
computer files. In digital steganography, electronic
decryption _________________________________
communications may include steganographic coding
cipher ____________________________________
inside of a transport layer, such as a document file,
image file, program or protocol. Media files are ideal for symmetric algorithm _________________________
steganographic transmission because of their large size. __________________________________________
As a simple example, a sender might start with an asymmetric algorithm ________________________
innocuous image file and adjust the color of every 100th __________________________________________
pixel to correspond to a letter in the alphabet, a change stream cipher ______________________________
is so subtle that someone not specifically looking for it is block cipher ________________________________
unlikely to notice it. steganography _____________________________
Digital steganography techniques include concealing
messages within the lowest bits of noisy images or sound 19. Summarize the general ideas of text.
Grammar files
1. ACTIVE/PASSIVE VOICE
2. CONDITIONALS
Условные предложения используются для выражения действия, которое может произойти только при
выполнении определенного условия. Части данных предложений могут быть соединены при помощи
союзов if, unless (= if not) и as long as (= provided/ providing (that).
FIRST CONDITIONAL SENTENCES (реальное условие, может быть выполнено в будующем)
If A happens В will happen
(present simple) (will in positive or negative form + verb)
I f you like entertainment, you will love the latest multimedia video games.
Иногда в главном предложении используются модальные глаголы can, must или повелительное
наклонение.
I f you want to create your own MP3 files from your CDs, you must have a CD ripper.
You won't be able to play audio and video on the Web unless you have a plug-in like RealPlayer or
QuickTime. (= if you don't have a plug-in ...)
Вопросительные и отрицательные формы предложения образуются с помощью вспомогательного
глагола will (won’t):
Will the data be saved, if you unload the computer?
If you reset the computer system, perhaps, all data won’t be saved.
Данное правило применяется и к придаточным предложениям времени, которые вводятся
следующими союзами:
when while as soon as after before until.
Conditional 2 If we bought new software now… Our computer would work better.
Conditional 3 If we had upgraded our computer earlier… We would not have got that problem.
3. COMPARING
В научных текстах часто возникает необходимость сравнивать различные устройства, программы,
языки и т.д. Основная роль при сравнении, безусловно, принадлежит прилагательным и наречиям.
2. Степени сравнения многосложных прилагательных и наречий образуются при помощи слов more,
most; less, least.
Absolute Comparative Superlative
(положительная) (сравнительная) (превосходная)
Adjectives powerful more powerful most powerful
(прилагательные) specific more specific most specific
3. Двусложные прилагательные, оканчивающиеся на -er, -y, -ly, -ow образуют степени сравнения с
помощью суффиксов -er и -est. Наречия, оканчивающиеся на -ly образуют степени сравнения только
при помощи слов more (less) и most (least) (пример см. выше).
!!! Слова-усилители (Intensifiers). Для усиления степеней сравнения употребляются следующие слова:
very очень too слишком
rather довольно quite вполне
somewhat до некоторой степени a little немного
fairly явно, совершенно
a bit немного, слегка
extremely чрезвычайно
by far гораздо, намного much гораздо, намного
This large-capacity main battery should not be confused with the much smaller battery nearly all computers
use to run the real-time clock and to store the BIOS configuration in the CMOS memory when the computer is
off.
Этот аккумулятор большой емкости нельзя путать с гораздо меньшей по объему батарейкой,
расположенной на материнской плате почти всех компьютеров, которая используется для
поддержки работы часов реального времени и сохранения конфигурации БИОС когда компьютер
выключен.
4. PREDICTION
Прогнозируя, мы предполагаем, что произойдет в будущем. Предположения, как правило,
выражают разную степень уверенности.
can, could,
Possibility may(not), might possibly, perhaps possible
(not)
It is unlikely /doubtful that notebook computers Маловероятно, что ноутбуки будут дешевле
will be cheaper next year. в следующем году.
It is impossible that notebook computers will be Этого не может быть, чтобы ноутбуки
cheaper next year. стали дешевле в следующем году.
I will buy a notebook if the price of notebooks falls next year. Я куплю ноутбук, если цена на них
If the price of notebooks falls next year, I will buy one. упадет в следующем году.
Если говорящий не достаточно уверен в том, что какое-либо действие произойдет и стремиться
выразить предполагаемое, возможное, желаемое действие, то в речи используется
сослагательное наклонение, которое также может состоять из двух частей: главного предложения
(would/wouldn’t; might; could + V) придаточного (if + Past Simple основного глагола).
I would buy a notebook if the price of notebooks fell next year. Я бы купил ноутбук, если бы цена
If the price of notebooks fell next year, I would buy one. на них упала в следующем году.
5. ATTRIBUTIVE CLAUSES
Придаточные определительные предложения отвечают на вопросы which? what? и
присоединяются к главному предложению бессоюзным способом или при помощи союзных слов –
относительных местоимений и наречий: who; whom; whose,; which, that; when; where; why.
Относительные местоимения whom, whose и which, вводящие придаточное определительное
предложение, могут употребляться с предлогами.
Придаточное определительное предложение относится к какому-либо члену главного
предложения, выраженному именем существительным или местоимением (в основном
неопределенным somebody, anything), а также словами-заместителями: that, those, one.
Придаточное определительное предложение занимает место после того слова, которое оно
определяет в главном предложении.
Придаточные определительные предложения делятся на два типа: описательные
определительные предложения (Descriptive Clauses) и ограничительные определительные
предложения (Limiting Clauses).
Описательные определительные предложения могут быть выделены в отдельное предложение
или вовсе опущены без ущерба для смысла главного предложения. Такое определительное
предложение обычно отделяется от главного запятой:
Programming language theory, which is known as Теория языков программирования, или PLT, -
PLT, is a branch of computer science that … это раздел информатики, который…
смысла.
!!! В описательных определительных предложениях относительное местоимение that не
употребляется и относительные местоимения не могут быть опущены.
6 -ING FORMS
КАК РАЗЛИЧАТЬ -ING ФОРМЫ?
Сравните:
1. noun – morning
2. adjective – interesting
3. pronoun – something
4. verbal noun – building
5. gerund – by travelling
6. participle – fading flower
7. Continuous –I am standing
Формы герундия совпадают с формами причастия, но герундий имеет ряд отличительных признаков.
Герундий по своим функциям ближе к существительному (noun forms), тогда как причастие ближе к
прилагательному (adjectival forms). Герундий обозначает деятельность или процесс:
Герундий и причастие могут выполнять функцию левого определения. Различать их в этой функции
можно только на основе смыслового содержания, учитывая, что причастие выражает действие
определяемого существительного, например:
a writing man – пишущий человек,
тогда как герундий указывает на назначение предмета и на русский язык передается
существительным, например:
a writing table – письменный стол, т.е. стол для письма.
Сравните:
a smoking man – курящий человек (причастие)
a smoking room – комната для курения (герундий)
Отглагольное существительное тоже имеет окончание -ing (verbal noun). Чаще всего такие
существительные обозначают физические объекты: building. Признаками такого существительного
являются:
- наличие перед -ing формой артикля;
- наличие предлога of перед идущим за ней существительным;
- возможность употребления в форме множественного числа.
The readings of the voltmeter were correct.
Прилагательные употребляются после глагола-связки и перед существительным:
They use special applets to create amazing fractals.
It is interesting to know.
7. PARTICIPLE II
Причастие 2 (Participle II, Past Pariciple) правильных глаголов образуется путем добавления суффикса -
ed к основе глагола: to finish – finished
Неправильные глаголы: to write – written
Таким образом: Past Participle – V+ed (V3).
!!! Причастие 2 не имеет отдельных категорий времени и залога, так как может выражать действия,
относящиеся к любому времени в зависимости от времени сказуемого.
1) Определение:
The described method is widely used in electroplating.
Описанный метод широко применяется в гальванопластике.
We used all the methods recommended.
Мы применили все методы, которые были рекомендованы.
8. INFINITIVE
Инфинитив - это неличная глагольная форма, которая только называет действие и выполняет функции
как глагола, так и существительного. Инфинитив отвечает на вопрос что делать?, что сделать? Чаще
всего инфинитив встречается после глаголов:
Часто инфинитив используется после модальных глаголов. Модальные глаголы (can, could, must,
should, ought to, had better, may, might, will, would, shall) – это вспомогательные глаголы, которые
добавляют идею способности, необходимости, просьбы, разрешения, совета, желания, вероятности и
т.д. к действию, выраженному основным глаголом. Другими словами, модальные глаголы описывают
отношение говорящего к действию, выраженному основным глаголом. Все модальные глаголы
принимают после себя инфинитив без частицы "to" (кроме OUGHT TO!)
Инфинитив переходных глаголов имеет формы пассивного залога. Пассивный залог используют если
деятель не известен или не важен.
active: (to) do/clean/see etc. Somebody will upgrade the computer.
passive: (to) be done/cleaned/seen etc. The computer will be upgraded.
Конструкция can be / could be + past participle используется для выражения способности или
возможности в настоящем или прошлом в пассивном залоге.
My professor has told me that I may be invited to я give the keynote speech at the conference this year.
Information can be transmitted by devices such as the telephone, radio or TV.
It has been predicted that about one-third o f all work could eventually be performed outside the workplace.
There are many considerations be taken into account. – Существует много соображений, которые следует
принять во внимание.
This is not a process to be oversimplified. – Это не тот процесс, который можно упрощать.
Perfect infinitive
Перфектный инфинитив употребляется, чтобы выразить действие, которое предшествует действию,
выраженному глаголом−сказуемым.
There were some problems at first but they seem to have been solved.
Перфектный инфинитив после глаголов to expect, to intend, to mean, to hope, стоящих в прошедшем
времени, а также после модальных глаголов ought to, should означает, что действие, которое
ожидалось, не произошло.
active: have done/cleaned/seen etc. Somebody should have upgraded the computer.
passive: have been done/cleaned/seen etc. The computer should have been upgraded.
I intended (meant, hoped) to have come on time. – Я намеревался прийти вовремя (но не пришел).
Past perfect
active: had(done) The computer worked faster. Somebody had upgraded it.
passive: had been (done) It had been upgraded.
Continuous infinitive
Длительный инфинитив употребляется, чтобы выразить действие, длящееся в то время, когда
происходит действие глагола−сказуемого.
active: am/is/are (do)ing Somebody is upgrading the computer at the moment.
passive: am/is/are being (done) The computer is being upgraded at the moment.
Past continuous
active: was/were (do)ing Somebody was upgrading the computer when I arrived.
passive: was/were being (done) The computer was being upgraded when I arrived.
Future forms
Для выражения действий в будущем используются конструкции will be / is going to be / is being / is to
be + past participle.
9. NOUN ATTRIBUTES
Многие терминологические словосочетания строятся из сочетания имени существительного с
другими частями речи (другими существительными, причастиями и герундием – ing-forms, наречиями
и придаточными определительными предложениями), которые могут стоять до или после него (левое
и правое определение). При переводе терминологических словосочетаний необходимо четко
уяснить, в каком порядке следует раскрывать значение данного словосочетания. Особую трудность
при переводе представляют беспредложные терминологические словосочетания, состоящие из
цепочки слов, не связанных между собой какими-либо служебными словами. В беспредложном
словосочетании главным словом является последнее, все слова, стоящие слева от него, играют
второстепенную роль – роль определения. Перевод таких словосочетаний надо начинать с конца.
Рассмотрим основные типовые формы их образования. Определяющее и определяемое
существительное иногда соединяются дефисом, хотя твердых правил здесь нет, это зависит от
традиции.
Сложное дополнение – это сочетание имени существительного в общем падеже или местоимения в
объектном падеже (me, him, her, it, us, you, them) с инфинитивом глагола, выступающее как единый
член предложения. Сказуемое в предложении со сложным дополнением может быть выражено
следующими глаголами: to want, to find, to think, to report, to state, to suppose, to expect, to consider,
to see, to hear, to feel, to cause и т.д. Сложное дополнение переводится на русский язык
дополнительным придаточным предложением, вводимым союзами что, чтобы, как.
Инфинитив в таком обороте обычно употребляется с частицей to, но если сказуемое выражено
глаголами, передающими физическое восприятие, например: to watch, to see, to hear, to feel, to
observe, to notice, а также глаголами to make «заставлять» to let «разрешать», то частица to
опускается.
!!! Если глаголы to see, to hear, to make стоят в страдательном залоге, за ними следует инфинитив с
частицей to:
B.
noun / pronoun + link verb + certain / sure; likely / unlikely + to-infinitive
The real situation is likely to be very complex. – Вероятно, реальная ситуация является (будет) очень
сложной.
Unfortunately this approach is unlikely to be successful. – К сожалению, маловероятно, что этот
метод будет успешным.
C.
noun / pronoun + passive verb + to-infinitive
For the program to be written in time, we must begin to work immediately. – Для того, чтобы программа была
написана вовремя, мы должны начать работать немедленно.
For a designer to know the construction of PC is quite necessary. – Проектировщику совершенно
необходимо знать конфигурацию ПК.
Here is a program for you to correct. – Вот программа, которую вам нужно откорректировать.
Appendix
1. PREPOSITIONAL CONSTRUCTIONS
according to согласно чему-либо
in accordance (conformity) with в соответствии с чем-либо
as against в противоположность
as compared with/to по сравнению с
in comparison with в сравнении с
on the contrary/opposite to напротив
due to благодаря
because of из-за
owing to вследствие
on account of по-причине
thanks to благодаря
by means of посредством
with the help (aid) of с помощью
instead of/ in place of вместо
in spite of/ despite/ regardless to несмотря на
as to / as for что касается
as regards/regarding рассмотрение
with regard to в отношении
concerning по поводу
respecting/in respect of касательно
2. VERBS + PREPOSITIONS
agree with согласовываться c, совпадать с
apply to использовать, применять
adapt to адаптировать, настраивать, приспосабливать к
benefit by получать выгоду от чего-либо
comment on комментировать
conform to согласовываться, соответствовать, приспособиться
consist in состоять в чем-либо
contribute to способствовать, вносить вклад в
correspond to соответствовать, представлять собой
depend on зависеть от, полагаться на
differ from отличаться от
end in smth. закончиться чем-либо
lead to приводить к тому, что; вызывать
participate in принимать участие в чем-либо
prevent from не позволять, предотвращать
refer to ссылаться на
rely on полагаться на, основываться
result in приводить к, повлечь за собой
specialize in специализировать на чем-либо
succeed in преуспеть в чем-л., добиться чего-либо
suffer from страдать от, испытывать, претерпевать
3. NOUNS + PREPOSITIONS
an alternative to быть альтернативой чему-либо
in agreement with в согласии с, по соглашению
in comparison with по сравнению с
in connection with в связи с, применительно к
in relation to относительно, касательно
in use в употреблении
intention of намерение, стремление, цель
need for необходимость, потребность
probability of вероятность из
reason for мотив
use of применение
3. ADJECTIVES + PREPOSITIONS
capable of способный на что-либо
engaged in занятый чем-либо
essential to необходимый для
in general в целом
in particular в частности, в особенности
similar to подобно, подобным образом
full of полон
Supplementary reading
UNIT 1 COMPUTER & COMPUTING: Famous people in computer technology development
Unix (officially trademarked as UNIX, sometimes As a result, Unix became synonymous with "open
also written as Unix with small caps) is a computer systems".
operating system originally developed in 1969 by a Unix was designed to be portable, multi-tasking
group of AT&T employees at Bell Labs, including Ken and multi-user in a time-sharing configuration. Unix
Thompson, Dennis Ritchie, Brian Kernighan, and systems are characterized by various concepts: the
Douglas McIlroy. Today the term Unix is used to use of plain text for storing data; a hierarchical file
describe any operating system that conforms to Unix system; treating devices and certain types of inter-
standards, meaning the core operating system process communication (IPC) as files; and the use of a
operates the same as the original Unix operating large number of software tools, small programs that
system. Today's Unix systems are split into various can be strung together through a command line
branches, developed over time by AT&T as well as interpreter using pipes, as opposed to using a single
various commercial vendors and non-profit monolithic program that includes all of the same
organizations. functionality. These concepts are known as the Unix
As of 2007, the owner of the trademark is The philosophy.
Open Group, an industry standards consortium. Only Under Unix, the "operating system" consists of
systems fully compliant with and certified according many of these utilities along with the master control
to the Single UNIX Specification are qualified to use program, the kernel. The kernel provides services to
the trademark; others are called "Unix system-like" start and stop programs, handles the file system and
or "Unix-like". other common "low level" tasks that most programs
During the late 1970s and early 1980s, the share, and, perhaps most importantly, schedules
influence of Unix in academic circles led to large- access to hardware to avoid conflicts if two programs
scale adoption of Unix (particularly of the BSD try to access the same resource or device
variant, originating from the University of California, simultaneously. To mediate such access, the kernel
Berkeley) by commercial startups, the most notable was given special rights on the system, leading to the
of which are Solaris, HP-UX and AIX. Today, in division between user-space and kernel-space.
addition to certified Unix systems such as those The microkernel concept was introduced in an
already mentioned, Unix-like operating systems such effort to reverse the trend towards larger kernels and
as Linux and BSD are commonly encountered. The return to a system in which most tasks were
term "traditional Unix" may be used to describe a completed by smaller utilities. In an era when a
Unix or an operating system that has the "normal" computer consisted of a hard disk for
characteristics of either Version 7 Unix or UNIX storage and a data terminal for input and output
System V. (I/O), the Unix file model worked quite well as most
Unix operating systems are widely used in both I/O was "linear". However, modern systems include
servers and workstations. The Unix environment and networking and other new devices. As graphical user
the client-server program model were essential interfaces developed, the file model proved
elements in the development of the Internet and the inadequate to the task of handling asynchronous
reshaping of computing as centered in networks events such as those generated by a mouse, and in
rather than in individual computers. the 1980s non-blocking I/O and the set of inter-
Both Unix and the C programming language were process communication mechanisms was augmented
developed by AT&T and distributed to government (sockets, shared memory, message queues,
and academic institutions, which led to both being semaphores), and functionalities such as network
ported to a wider variety of machine families than protocols were moved out of the kernel.
any other operating system.
Jef Raskin, a user interface and system design Rob Enderle, a TechNewsWorld columnist, is
consultant. Future portable computers will look the Principal Analyst for the Enderle Group. In the
like tiny keyboards or writing tablets with a cable near future, most mobile devices will offer video
or a wireless link to your eyeglasses. Though it conferencing, as they incorporate user-facing
would seem inevitable, not all versions of the cameras. And many will also include pin projectors
glasses will connect to the computer or car or so their contents can be projected for easier
whatever by a wireless link. viewing. But innovation will truly take off when
Unfortunately, batteries are still big and heavy, battery size and capacity cease to be major hurdles
and will be for a while yet, so we'll have to have for industrial designers. Today, wireless and soon
some wires leading to battery packs, and once over-the-air charging could explode similar to how
you've got a wire to the battery on your belt, you wireless networking did in the past. Imagine not
might as well have a nice, reliable, and cheap wire having to plug in your laptop, iPad, or iPhone -
link to your eyeballs. Head-mounted displays will simply walking into your home or office will start
ultimately become cheaper than LCD panels. If it's the device charging - wirelessly. Faster chips and
done right, the eyeglass display will plug into faster wireless networks will also eventually allow
whatever gadget you have, giving at least 600 * voice recognition to finally become a reality.
800 pixels of screen resolution to the smallest cell Someday soon we will truly be able to ask
phone (displays with built-in cell phones will be questions to our mobile devices and they'll reply -
common). Because the illumination can come from and perhaps discuss the answer.
a single white light-emitting diode that takes a What's considered portable today will most
fraction of a watt to operate, lithium-ion or likely be considered doorstops ten years from now.
lithium-polymer batteries on your belt or in the As flexible and transparent displays enter the
keyboard unit will allow you to work for many mainstream devices will become lighter and
more hours on a single charge than today's big wearable. Early attempts to intertwine computers
screens permit. and clothing have failed to date because you need
The laptop will probably last through this batteries - and no one wants to plug in their pants.
decade, but we are exploring different alternatives But as wireless power takes hold and computers
and as such it is likely that conclusions on this shrink and their hard-case form disappears - the
subject will be different in the nearest future. The options become limitless.
market desperately needs to move to a more And of course, don't overlook the potential for
appliance-like device that is much more portable the merging of humankind and computers.
and much less power-hungry. With increasing Scientists continually push the envelope. Even
wireless bandwidth and availability our options are today early steps towards powering devices with
going to increase. Micro-displays are advancing, the body itself have leapt forward, and they'll
thanks to rear projection TVs, at an incredible rate, continue to do so at an exponential rate. So in the
making head-mounted displays more capable and future, perhaps we won't carry our portable
more likely long term. devices, maybe we'll be the device. And then the
While we have a number of choices, for most, question will be, not what's the next advance in
the laptop, with some enhancements, is likely to computers, but what's the next advance in
keep its place for at least the next five years. humans?
UNIT 5 COMPUTER NETWORKING: Global Networking Infrastructure for the 21st century
The competition was won by Bolt Beranek and a separate agency for operational management.
Newman (BBN), a research firm in Cambridge, MA, Responsibility was therefore transferred to the
and by September 1969 BBN had developed and Defense Communications Agency (now known as
delivered the first IMP to the Network the Defense Information Systems Agency).
Measurement Center located at UCLA. The New Packet Technologies
"ARPANET" was to touch off an explosion of ARPANET was a single terrestrial network.
networking research that continues to the present. Having seen that ARPANET was not only feasible
Apart from exercising leadership by issuing its but powerfully useful, DARPA began a series of
RFQ for a system that many thought was simply research programs intended to extend the utility of
not feasible (AT&T was particularly pessimistic), packet switching to ships at sea and ground mobile
DARPA also set a crucial tone by making the units through the use of synchronous satellites
research entirely unclassified and by engaging (SATNET) and ground mobile packet radio (PRNET).
some of the most creative members of the These programs were begun in 1973, as was a
computer science community who tackled this prophetic effort known as "Internetting" which was
communication problem without the benefit of intended to solve the problem of linking different
the experience (and hence bias) of traditional kinds of packet networks together without
telephony groups. Even within the computer requiring the users or their computers to know
science community, though, the technical much about how packets moved from one network
approach was not uniformly well-received, and it is to another.
to DARPA's credit that it persevered despite much Also in the early 1970s, DARPA provided follow-
advice to the contrary. on funding for a research project originated in the
ARPANET late 1960s by the Air Force Office of Scientific
The ARPANET grew from four nodes in 1969 to Research to explore the use of radio for a packet
roughly one hundred by 1975. In the course of this switched network. This effort, at the University of
growth, a crucial public demonstration was held Hawaii, led to new mobile packet radio ideas and
during the first International Conference on also to the design of the now-famous Ethernet. The
Computer Communication in October 1972. Many Ethernet concept arose when a researcher from
skeptics were converted by witnessing the Xerox PARC spent a sabbatical period at the
responsiveness and robustness of the system. Out University of Hawaii and had the insight that the
of that pivotal meeting came an International random access radio system could be operated on
Network Working Group (INWG) composed of a coaxial cable, but at data rates thousands of
researchers who had begun to explore packet times faster than could then be supported over the
switching concepts in earnest. Several INWG air. Ethernet has become a cornerstone of the
participants went on to develop an international multi-billion dollar local area network industry.
standard for packet communication known as These efforts came together in 1977 when a
X.25, and to lead the development of commercial four-network demonstration was conducted linking
packet switching in the U.S., Canada, France, and ARPANET, SATNET, Ethernet and the PRNET. The
the UK, specifically for systems such as Telenet, satellite effort, in particular, drew international
Datapac, Experimental Packet Switching System, involvement from participants in the UK, Norway,
Transpac, and Reseau Communication par Paquet. and later Italy and Germany.
By mid-1975, DARPA had concluded that the http://www.cs.washington.edu/homes
ARPANET was stable and should be turned over to
An image or picture is an artifact, usually two- information. The image is a digital image or raster
dimensional, that has a similar appearance to some graphics image. The term may be by analogy with an
subject – usually a physical object or a person. Images "artist's rendering" of a scene. 'Rendering' is also used
may be two-dimensional, such as a photograph, screen to describe the process of calculating effects in a video
display, and as well as a three-dimensional, such as a editing file to produce final video output.
statue. They may be captured by optical devices – such 3D projection is a method of mapping three
as cameras, mirrors, lenses, telescopes, microscopes, dimensional points to a two dimensional plane. As most
etc. and natural objects and phenomena, such as the current methods for displaying graphical data are based
human eye or water surfaces. on planar two dimensional media, the use of this type of
A digital image is a projection is widespread, especially in computer
representation of a two- graphics, engineering and drafting.
dimensional image using Ray tracing is a technique for generating an image
ones and zeros (binary). by tracing the path of light through pixels in an image
Depending on whether or plane. The technique is capable of producing a very high
not the image resolution is degree of photorealism; usually higher than that of
fixed, it may be of vector or raster type. Without typical scanline rendering methods, but at a greater
qualifications, the term "digital image" usually refers to computational cost.
raster images. Shading refers to depicting depth in 3D models or
A pixel is the smallest piece of information in an illustrations by varying levels of darkness. It is a process
image. Pixels are normally arranged in a regular 2- used in drawing for depicting levels of darkness on
dimensional grid, and are often represented using dots paper by applying media more densely or with a darker
or squares. Each pixel is a sample of an original image, shade for darker areas, and less densely or with a lighter
where more samples typically provide a more accurate shade for lighter areas. There are various techniques of
representation of the original. The intensity of each shading including cross hatching where perpendicular
pixel is variable; in color systems, each pixel has lines of varying closeness are drawn in a grid pattern to
typically three or four components such as red, green, shade an area. The closer the lines are together, the
and blue, or cyan, magenta, yellow, and black. darker the area appears. Likewise, the farther apart the
Graphics are visual presentations on some surface, lines are, the lighter the area appears. The term has
such as a wall, canvas, computer screen, paper, or stone been recently generalized to mean that shaders are
to brand, inform, illustrate, or entertain. Examples are applied.
photographs, drawings, line art, graphs, diagrams, Texture mapping is a method for adding detail,
typography, numbers, symbols, geometric designs, surface texture, or colour to a computer-generated
maps, engineering drawings, or other images. Graphics graphic or 3D model. Its application to 3D graphics was
often combine text, illustration, and color. Graphic pioneered by Dr Edwin Catmull in 1974. A texture map is
design may consist of the deliberate selection, creation, applied (mapped) to the surface of a shape, or polygon.
or arrangement of typography alone, as in a brochure, This process is akin to applying patterned paper to a
flier, poster, web site, or book without any other plain white box. Multitexturing is the use of more than
element. Clarity or effective communication may be the one texture at a time on a polygon. Procedural textures
objective, association with other cultural elements may (created from adjusting parameters of an underlying
be sought, or merely, the creation of a distinctive style. algorithm that produces an output texture), and bitmap
Rendering is the process of generating an image from a textures (created in an image editing application) are,
model, by means of computer programs. The model is a generally speaking, common methods of implementing
description of three dimensional objects in a strictly texture definition from a 3D animation program, while
defined language or data structure. It would contain intended placement of textures onto a model's surface
geometry, viewpoint, texture, lighting, and shading often requires a technique known as UV mapping.
Volume rendering is a technique used to display a data for 3D computer graphics is similar to plastic arts
2D projection of a 3D discretely sampled data set. A such as sculpting.
typical 3D data set is a group of 2D slice images 3D models may be created using multiple
acquired by a CT or MRI scanner. approaches: use of NURBS curves to generate accurate
Usually these are acquired in a regular pattern (e.g., and smooth surface patches, polygonal mesh modeling
one slice every millimeter) and usually have a regular (manipulation of faceted geometry), or polygonal mesh
number of image pixels in a regular pattern. This is an subdivision (advanced tessellation of polygons, resulting
example of a regular volumetric grid, with each volume in smooth surfaces similar to NURBS models).
element, or voxel represented by a single value that is A 3D model can be displayed as a two-dimensional
obtained by sampling the immediate area surrounding image through a process
the voxel. called 3D rendering,
3D modeling is the process of developing a used in a computer
mathematical, wireframe representation of any three- simulation of physical
dimensional object, called a "3D model", via specialized phenomena, or
software. animated directly for
Models may be created automatically or manually; other purposes. The model can also be physically
the manual modeling process of preparing geometric created using 3D Printing devices.
The term Rich Media refers to a broad range of digital sharp colors and small file sizes, the GIF format is ideal.
interactive media that can either be downloadable or These include screen grabs, clipart, drawings and
embedded in a webpage. When downloaded, it can be illustrations.
used or viewed offline using media players such as JPGs are better for photographs and illustrations with
Microsoft Media Player, Real Networks' RealPlayer, or over 256 colors. If you use JPGs for screen captures, it will
Apple's QuickTime. cause blurring of colors and the file size will be larger
For distance learning through the Web as in e- because the colors are averaged.
learning, rich media must be an integral part of the Animation: Macromedia Flash is best for animation on
courseware. It should comprise animation, interactivities the Web. Not only can you increase the Flash movie to
to various levels of sophistication, visuals and narration. 1024 x 768 from 640 x 480, but you don't lose any picture
These components make training programs more quality nor do you increase the file size. Alternatively, you
effective and your company sees a significant Return on can use animated GIF format.
Investment (ROI). Movies and digital video: The most popular
Other components of Rich Media streamable formats for digital video are Windows Media
File sizes: File sizes must always be small. To minimize Player, Apple QuickTime and RealVideo.
delays in file transfer, use file formats that make the best Sound files: Of the many formats for sound
use of Rich Media and are of good quality. These include compression available, MP3 is the most popular and has
Microsoft Media Player, GIF, JPG, RealPlayer, or Apple's excellent quality. If you use Real Audio and Windows
QuickTime, Macromedia Flash (SWF), MP3, Shockwave Media Player, you can safely use MP3.
Audio (SWA), Animated GIF, Macromedia Authorware One of the best ways of using sound on the Web is to
(AAM) and VOX. use Macromedia Flash which converts WAV files to the
If there are delays in self-paced interactive course Shockwave format it has internally. If you use
programs, students can be very frustrated as it interferes Macromedia Authorware with its 800kbps plug-in, you
with understanding and retention. So, file sizes must be can either use SWA (Shockwave Audio) or VOX (Voxware).
small and very streamable to slow modems. By Authoring software: You could give your learners a
streamable is meant that as bits of the digital video are "no plug-in" option by using Macromedia Dreamweaver
downloaded, the movie starts to play, until the entire with Course Builder. It creates good interactive learning, is
download is complete. compliant with AICC norms and can import all kinds of
Image formats: If you use less than 256 colors, media.
The concept of the "biosphere" was coined in the witnesses for their peers by issuing firsthand accounts,
beginning of this century by Russian geochemist or students can collect data from remote probes,
Vernadsky (1929) to describe the "envelope of life" as whether the probes be on school grounds or on the
an interdependent planetary web. The new moon. When used with video technologies, CMC allows
information environment needs a metaphor that students to actually see and hear events as they happen
implies the growing unity, interdependence and remotely. Classes can journey on real expeditions,
accessibility of information produced by humankind participate in real experiments and, in effect "look over
and to this end the author proposes the infosphere. the shoulders" of working scientists. For example, in the
The infosphere summarizes advances in nearly all "Live from Antarctica" project, students accessed
human endeavors. Sputnik, manned lunar landings, scientists' diaries and field journals to learn how they
and the first photograph of the entire Earth, a fragile "lived, worked, and played" at the South Pole.
blue orb in space, encouraged all people to think 4. Tele-mentoring becomes a rich and viable
globally. For educators, this revolutionary flow of teaching option. Many sites on the Internet, such as
information forces a rethinking of traditional learning professional groups and bulletin boards, are responsive
paradigms. Is there anything useful besides sending e- to student inquiries. By serving as mentors, scientists
mail and accessing databases that can help teachers and scholars can answer questions and provide
teach and students learn? classrooms with resources beyond textbooks and the
There are five general educational functionalities individual teacher's expertise. By exposing students to
of the infosphere . experts, scholars and people of achievement, tele-
1. Tele-access is the use of online resources in mentoring provides learners with positive role models,
learning, including online libraries, databases, particularly for those students to whom positive role
museums, satellite data and other classrooms. The models are not readily available. Such relationships can
latest space shuttle photos, paintings inspired by reward not only students but the mentors themselves.
Shakespeare plays, pending congressional legislation, 5. Tele-sharing often begins with simple e-mail
or foreign language resources for forty languages are chats between "keypals." It advances to "one-to-many"
available to students via the Internet. When students and "many-to-many" communications, and then
conduct online searches, they are tapping into blossoms into the sharing of resources, ideas,
information that is real-world oriented and nearly experiences, data and findings. This transition from
unlimited. Rather than digesting precanned answers, simple communications to cooperative learning offers
they are constructing their own knowledge and they relevancy and the analytical challenge of comparative
can do so with equal facility at home and in class. studies. Further, it calls upon students to engage in
2. Virtual publishing can authenticate learning by deeper social interactions. Such learning implies an
setting students' scholarship in the real world. On the equality among participants rather than the traditional
networks supported by International Education and vertically-structured, teacher-student relationship.
Resource Network (I*EARN), students from different We can also name the following positive features of
countries publish results of their collaborative telecommunication: helping students perceive
projects, including news magazines, literary journals, knowledge as constructed, not given; providing students
environmental and human-rights newsletters. with an effective model of lifelong learning; bolstering
Virtual publishing is hardly limited to text social, communication, and critical-thinking skills;
documents. Students can include graphics, video, increasing the authenticity of the learning environment;
sound and animation in their publications, as well as putting a human face on learning; finding role models
the hypertext links of digital books. for students; equity; and also for the first time, students
3. Tele-presence enables students to experience can benefit from the newest technologies rather than
events at remote sites. Students near an ecological be the last to use them.
disaster or in the path of a hurricane can serve as eye-
The World Wide Web is home to many authentic. Do not use any phone numbers
threats and the sneakiest of all Internet attacks is provided in the email. Remember that most
phishing. This nefarious online theft mechanism legitimate sites and financial services will never
can rob your money, personal information and deal with sensitive issues in emails.
even your identity. 3) Do not click on links in your email at first.
Phishing (password harvesting fishing) is Hover the mouse icon over the link and see what
getting passwords for online bank accounts or address appears in your browser screen. The text
credit card numbers by using emails that look like of the link can say one thing but the actual address
they are from real organizations, but in fact they could be someone's private computer or fake
are fake. So you think you are logging into your website. Do not copy the URL or link and paste it in
online bank account but you are actually logging your browser's address bar. To truly test its
into a very craftily disguised site that stores your authenticity, open a new window and type in the
login info to access your account. The term official site address of the organization or
"phishing" is a word play on "fishing", where a company. Phishing sites will use legitimate looking
fisherman baits his hook, fools the fish into links to fool you into clicking and then take you
thinking it is food and reels it in. Such tactics are a somewhere else entirely. Do not clickon links in
serious threat to online safety and individual pop-up windows at all.
users’ security. Here are some tips to prevent 4) Avoid sending private information like your
phishing from stealing your information. name, account details, passwords - any sensitive
1) Read emails and messages carefully. Look information that is unique to your online identity,
for some tell-tale phishing signs such as: through emails. Your email account or the
• Spelling mistakes and grammatical errors in the recipient's account could get hacked and your
email's text. information exposed.
• Your name isn't present anywhere but instead a 5) Be vigilant with downloads and attachments.
general name is given. ("Dear satellite Only open or download email attachments from
subscriber", instead of your full name heading known senders but make sure you scan the
the email). attachment prior to download, using your anti-
• Subtle threats to follow the email's instructions virus software.
("your account will be terminated if you fail to 6) Check any of your online or financial
follow the procedure"). accounts and transaction statements for any
• Unknown senders or companies you have never suspicious activity or operations. For example, if
heard of. there has been a deduction from your bank
• Impossibly unrealistic deals ("a wealthy account which you have no knowledge of or a
millionaire died and decided to leave you, Mr. "password successfully changed" alert appears on
Abc, all his money"). your phone, contact the respective department of
2) Verify the authenticity of the email sender. the company involved and assert that you have not
If an organization like a bank or company is trying performed any changes. Such checking of accounts
to contact you, whether known or unknown, you should be done at least once a month.
should contact that organization personally and 7) Your computer is your castle, so line its
verify that they have sent you the mail. Phishing defenses with spam filters, anti-spyware programs
sites are like chameleons, they do their best to and a decent firewall. Look for anti-virus programs,
simulate or imitate legitimate sites, to look with phishing filtering. Download the latest
security updates and keep your computer up-to- Turn on your browser's security mechanisms
date, so that it can handle the latest threats as and alert messages. Updating your browser will
they come. also keep such security features informed of the
8) If you are carrying out sensitive data latest threats.
transactions like online shopping or money 10) If you suspect a site of being "phishy" or you
transfers, make sure you are using a secure have been phished", then your silence will just
connection to a secure site. So look for "https://" allow the guilty party to scam someone else. Some
in your address bar, before the site's address. web browsers allow you to report suspected sites
Another sign is in the bottom right-hand side of or mark them as unsafe. You can even inform the
the web browser. A small chain or yellow lock legitimate site being impersonated of the phishing
icon indicates a secure connection. Sometimes site. The Federal Trade Commission deals with
such icons can be "faked", so check the URL of phishing scams and sites dealing with such attacks,
the site as well. Clicking on the lock icon should visit their site to complain of such sites and if you
display the site's security certificate. If the site are a victim, then informing the FTC can help
name and the name of the site on the certificate prevent the possible theft of your identity.
do not match, leave the site immediately. Don't fall for the "hook", be the smart fish that
9) With phishing being such a silent yet deadly got away by following the right anti-phishing tips. It
web menace, web browsers are also stepping up is web hooligans like phishers and hackers that give
their security mechanisms. So install a tool-bar or the Internet a bad name, so surf smart and access
phishing filter utility on your browser to warn you secure information smartly.
from navigating to phishing sites. By Rave Uno http://www.buzzle.com/articles
Word list
UNIT 1 COMPUTER & COMPUTING
attach (v)
case (chassis) (n)
circuitry (n)
collate (v)
connectivity (n)
convert (v)
data (n)
digitization (n)
distributed (adj)
drastically (adv)
embedded computer (n)
execute (v)
fraction (n)
hardware (n)
intelligence (n)
laptop (n)
loom (n)
maintain (v)
transmission (n)
motherboard (n)
palm-size (palmtop) (adj)
pin (n)
punch card (n)
rapid (adj)
succession (n)
raw (adj)
refer (v)
refined (adj)
respond (v)
shrink (v)
steam-driven machine (n)
store (v)
tabletop (desktop) computer (n)
total (adj)
tower shape (desktop) (n)
mainframe (n)
vague (adj)
various (adj)
service provider (n)
UNIT 2 SOFTWARE
acquire (v)
bug (n)
coin (v)
commercially (adv)
debugging (n)
eliminate (v)
encode (v)
flowchart (n)
gain (v)
get rid of (v)
implement (v)
inadequate (adj)
interoperability (n)
kernel (n)
linear (adj
malfunction (n)
message queue (n)
multiple (adj)
paging file (n)
require (v)
requirement (n)
schedule (n)
semaphore (n)
sequence (n)
simultaneously (adv)
socket (n)
specification (n)
split (v)
submit (v)
subroutine (n)
tool (n)
vendor (n)
verify (v)
UNIT 7 MULTIMEDIA
access (v)
advertisement (n)
appropriate (adj)
bitmap (n)
blend (v)
blurring (n)
combine (v)
content (n)
convergence (n)
convey (v)
delay (n)
deliver (v)
determine (v)
display (v)
divide (v) into
download (v)
enable (v)
enhance (v)
feature (n)
haptic (adj)
incorporate (v)
install (v)
interactivity (n)
linear (adj)
modifiable (adj)
plug-in (n)
predictability (n)
reduce (n)
self-paced (adj)
simulation (n)
survivability (n)
upload (v)
volatile (adj)
UNIT 8 TELECOMMUNICATION
access (n)
allocate (v)
browser(n)
chunk (n)
convert (v)
customize(v)
derive (v)
destine (v)
discrete (adj)
division (n)
encode (v)
ensure (v)
eventually
familiar (adj)
handle (v)
investigate (v)
involve (v)
layered (adj)
medium (adj)
merge (v)
multiple (adj)
padlock (n)
recurring (adj)
regardless (adj, adv)
restrict (v)
route (v)
router (n)
run (v)
stack (n)
vary (v)
NOTES