Текст
                    НББГТУ ждя
42	№ б/н.
Ц 18	Царева Г.В.
English for Computer science Students	
* * 4	24р.07к.
ТОСУЯЛ.^
1Г
гту
УН**’’''
МИНИСТЕРСТВО ОБРАЗОВАНИЯ И НАУКИ РОССИЙСКОЙ ФЕДЕРАЦИИ
u
БРЯНСКИЙ ГОСУДАРСТВЕННЫЙ ТЕХНИЧЕСКИЙ УНИВЕРСИТЕТ 1
--- -----	-	,---------- ,	- -3
Г.В. Царева, Т.Б. Худобко
idents” и лиц. ШИХСЯ итием ства. лцего, шьно-имый гой и
ENGLISH FOR COMPUTER SCIENCE STUDENTS
АНГЛИЙСКИЙ язык ДЛЯ СТУДЕНТОВ, ИЗУЧАЮЩИХ КОМПЬЮТЕРНЫЕ ТЕХНОЛОГИИ
,)С и дены 1ЧИ к ак в >ного роля г на
Утверждено редакционно-издательским советом в качестве учебн ого пособия
тают »бия. за и
два зока
ты, пов. ных
НАУЧНАЯ	ами
БИБЛИОТЕКА	зют
Брянского государственного	
технического университета *' БРЯНСК	5ой по
ИЗДАТЕЛЬСТВО БГТУ
2004	Эго
гов
ЗБК 87.3
Г.В. Царева, Т.Б. Худобко. English for Computer Science students: Английский язык для студентов, изучающих компьютерные технологии: Учеб, пособие. - Брянск: БГТУ, 2004. - 143 с.
ISBN 5-89838- >094-9
Учебное пособие состоит из базового курса, хрестоматии для чтения и ключей к тестам и глоссария. Уроки базового курса включают основной и дополнительный тексты; список ключевых слов и словосочетаний; лексические и речевые упражнения; контрольные тесты. Хрестоматия дает дополнительный материал для чтения по профессионально-ориентированной тематике.
Учебное пособие предназначено для студентов и аспирантов неязыковых вузов, самостоятельного изучения английского языка, а также для лиц, овладевших основами английского языка и желающих продолжить его изучение.
Библиогр. - 15 назв.
Научный редактор	к.пед.н., доцент кафедры иностранных языков БГТУ Акулова Е.А.
Рецензенты:	кафедра иностранных языков СЭИ БГУ; доцент, к. пед. н. Антонова Т.В.
ISBN 5-89838-094-9
© Брянский государственный технический университет, 2004
3
ПРЕДИСЛОВИЕ
Учебное пособие «English for Computer Science Students” предназначено для студентов технических вузов, аспирантов и лиц, имеющих базовые знания английского языка и интересующихся актуальными проблемами, связанными с возникновением, развитием и будущим компьютеров, с глобальной компьютеризацией общества.
Цель книги - помочь учащимся развить навыки изучающего, аналитического, реферативного чтения профессиональноориентированных текстов, расширить словарный запас, необходимый для профессионального общения на английском языке в устной и письменной форме.
Учебное пособие содержит 2 части: базовый курс и дополнительные тексты для чтения. В конце пособия приведены толковый словарь наиболее употребительных терминов и ключи к итоговым тестам, которые позволяют использовать тесты как в режиме контроля, так и самоконтроля. Структура учебного материала, построение заданий и наличие тестового контроля создают оптимальные условия для использования пособия на аудиторных занятиях и при самостоятельной работе студентов.
Базовый курс состоит из 9 уроков, которые отражают актуальную тематику профессиональной направленности пособия. Каждый урок базового курса включает учебный словарь (слова и словосочетания), основной текст, лексические упражнения, два дополнительных текста, речевые упражнения. В конце урока приводится тест для самоконтроля по изученной тематике.
Учебный словарь включает ключевые лексические единицы, необходимые для усвоения тематического материала разделов. Некоторые статьи словаря дают толкование специализированных терминов и понятий.
Тексты учебного пособия знакомят студентов с вопросами устройства, работы, применения и развития компьютеров, расширяют их знания в сфере компьютерных технологий.
Все тексты пособия аутентичны и представляют собой отрывки из англоязычных учебников и сайтов Интернета по рассматриваемой проблематике.
Тематический отбор текстов обусловлен концепцией учебного пособия, требованиями вузовских программ для студентов
4
негуманитарного профиля, а также учебно-методическими задачами данного этапа обучения.
Основные тексты пособия предназначены для развития навыков изучающего чтения.
Дополнительные тексты носят образовательно-развивающий характер и могут использоваться для изучающего, ознакомительного и поискового видов чтения, развития навыков перевода, реферирования, аннотирования, навыков работы со словарем, а также служат базой для совершенствования навыков говорения.
Лексические упражнения направлены на закрепление активной лексики, расширение рецептивного и потенциального словарей, развитие языковой догадки.
Речевые упражнения носят творческий характер и ориентированы на развитие диалогового общения в ситуациях, которые наиболее часто могут возникать в процессе профессиональной деятельности.
Сборник дополнительных текстов содержит информацию, расширяющую кругозор студентов по рассматриваемым в базовом курсе темам. Хрестоматия может быть использована для домашнего чтения, а также как дополнительный материал для говорения по базовым темам учебника.
Толковый словарь поясняет студентам терминологическую основу профессиональной лексики й облегчает выполнение ряда упражнений, включенных в базовый курс.
МЕТОДИЧЕСКИЕ РЕКОМЕНДАЦИИ
Учебное пособие рассчитано на 68 аудиторных часов и 130 часов самостоятельной работы. Упражнения направлены на активизацию профессионально - ориентированного лексического материала, развитие навыков монологической и диалогической речи.
В начале каждого раздела студентам представляется вводный текст и лексический минимум по соответствующей тематике. В послетекстовых упражнениях закрепляется лексика, понимание текста, развиваются навыки монологической речи, закладываются основы для диалогического общения. В зависимости от уровня группы можно усложнить послетекстовые лексические упражнения, предлагая студентам придумывать со словами собственные предложения и ситуации, воспроизвести толкование терминов, представленных в вводном тексте, подготовить реферирование исходного текста с опорой на активный словарь.
Упражнения на понимание второго текста расширяют словарный запас по изучаемой теме. На основе изложенной в тексте проблемы можно предложить студентам подготовить сообщение, раскрывающее один из аспектов темы или организовать дискуссию по затронутой тематике.
Упражнения на аудирование построены так, чтобы студенты при прослушивании воспринимали как отдельные слова и словосочетания, так и целостные сообщения. Целесообразно использование письменного фиксирования ключевых слов и составление плана текста, а также восстановление полного текста в письменном виде при многократном прослушивании.
Упражнения в рубрике «DISCUSSION» стимулируют развитие как подготовленной, так и спонтанной речи в профессионально -ориентированной среде. Рекомендуется выполнять упражнения в парах и микрогруппах.
Тексты для дополнительного чтения можно использовать не только для ознакомительного чтения, но и для разработки диалогов, ролевых игр, дискуссий и т.д.
Толковый словарь знакомит с отраслевыми терминами и понятиями на английском языке, дает расшифровку наиболее
6
употребительных аббревиатур и акронимов в сфере компьютерных технологий. Данные словаря можно использовать в качестве дополнительных упражнений на развитие языковой догадки, сравнение собственных толкований терминов с общепринятыми.
Авторы выражают глубокую благодарность рецензентам, преподавателям кафедры иностранного языка БГУ и кафедры иностранного языка СЭИ БГУ, где апробировалось данное учебное пособие, за замечания, которые были приняты и реализованы при доработке рукописи.
Авторы будут признательны всем за критические замечания и пожелания.
UNIT I
COMPUTER SCIENCE
INTRODUCTORY TEXT
The beginnings of the modem computer date back to the 1600's when Blaise Pascal,|a Trench mathematician and scientist, 'developed one of the first mechanical calculating aSvfces..
It is only within the past decade, however, that computer technology has become essential in the work environment. Almost every profession is deeply affected by the computer revolution: physicians consult computer-based expert systems to help diagnose illnesses; musicians compose and perform music using computers, and students and professionals in every field use electronic mail to communicate with both colleagues and strangers. With so many, applications for computer technology, it is not surprising that the demand fbr computer professionals has been steadily rising.
Computer science is a fovmd discipline that involves the study of the structure, functions, and applications of computersj and—rdated-fesfeologiesr ।At the advanced jevel, computer science can involve the ffudy'fofTughly specialized ’'subfields such as knowledge engineering, cognitive science, or management information systems.
^Students interested m pnisuiiig eiiieem in computer and related fields will find that many educational opportunities exist. { Depending on one's professional goals, training for various computer careers can range from vocational education programs in such areas as data processing technology and computer maintenance; to bachelor's degree programs that prepare programmers, database managers, and systems analysts; to graduate programs focusing on cutting-edge research in artificial intelligence, robotics, or software engineering.
The emphasis of a computer science program can sometimes be determined from the title of the program: those with titles such as data processing, management information systems, or information science are usually business- oriented; computer science, software engineering, or engineering and computer science programs tend to be oriented toward
8
science and engineering, and those titled computer and information science usually provide a mixture of orientations.
Advising students about computer science study can b£ difficult because many~~gray~ areas”jbxist where computer science and other disciplines/ such as engineering, business, mathematics, philosophy, linguistics, and psychology overlap/ For example, artificial intelligence has close ties with cognitive psychology and linguistics; computer graphics is tightly linked with fine arts and industrial design, and the student of robotics must understand basic engineer ing concepts.
’.Significant overlap also exists among the various computer science specializations themselves, ijvith differences measurable only in level of emphasis. Knowledge engineering, cognitive science, and artificial intelligence, often considered separate areas of study, are all involved in the effort to understand and recreate human intelligence and reasoning. Likewise, computer information systems, management information systems, and information science all focus on the nature and efficient flow of information within organizations. Even the well-established division between hardware and software begins to blur when one considers specializations such as systems analysis, robotics, computer engineering, and other subfields that require in-depth knowledge of all major aspects of computer science.
Because the computing field is so broad and complex and because it always changing, it is advisable for students to obtain a broad base of knowledge |that includes training in both hardware and software before pursuing specialized study. While the specializations offered by universities will no doubt change as technological advancements are made, computer professionals with a comprehensive background in computer science will always be in demand.
1. calculating devices
1. essential
2. to be affected by
TOPICAL VOCABULARY
вычислительные приборы
существенный, важный, необходимый находиться под влиянием
3.	application
4.	demand for
5.	to be in demand
6.	related
7.	advanced level
8.	cognitive
9.	to pursue a career
10.	data processing
11.	computer maintenance
12.	cutting-edge
13.	artificial intelligence (Al)
14,	software engineering
15.	title
16.	to overlap
17.	knowledge engineering
18. computer engineering
19. hardware
^20. to blu|-
21.	to obtain
22.	technological advancement
23.	comprehensive background
я
применение
потребность, спрос
пользоваться спросом родственный, связанный с продвинутый познавательный
заниматься ч-л, иметь профессию обработка данных
эксплуатация, техническое обслуживание
передовой, прогрессивный, самый современный
искусственный интеллект программотехника, инженерия разработки ПО название,заглавие частично совпадать
инженирикг знаний (дисциплина, занимающаяся вопросами формализации знаний предметной области с целью построить базу знаний разрабатываемой экспертной системы)
конструирование (проектирование) ЭВМ (дисциплина, занимающаяся вопросами архитектуры и методами разработки компьютеров) аппаратные средства, аппаратура, оборудование (совокупность физических устройств компьютера или отдельных его частей) сделать неясным, затуманить, затемнить
получать, добывать технический прогресс всесторонняя подготовка
10
II
EXERSISES
1.	Read the introductory text again and answer these questions.
•	What is the role of Blaise Pascal in the development of computer science?
•	Why can we say that computer technology is essential in the work environment nowadays?
•	How can you define “ computer science”?
•	What educational opportunities exist for students interested in pursuing
, careers in computer?
•	Why is it difficult to advise students about computer science?
•	Why do you think it is advisable for students to obtain a broad base of knowledge in computer science before any specialized study?
•	Why will highly qualified professionals always be in demand?
2.	Find in the text equivalents for the following words and wordcombinations:
Necessary, to be influenced by, sphere, use, to include, aim, different, up-to-date, to supply, to be connected, fundamental, very important, attempt, to comprehend, similarly, to concentrate, to become indistinct, main, thorough, complicated, to get, undoubtedly.
3.	Read the text. Do the tasks given below.
COMPUTER LITERACY FOR ALL
Fortunately, fewer and fewer people are sufferirjg from computer anxiety. The availability of inexpensive, powerful, and easier-to-use personal computers is reducing the intimidation factor. As new generationU^row up in the Information Age* they are perfectly at home with computers?''"----"""	'
(2)	Why are you studying about computers? In addition to curiosity (and perhaps a course- requirement!), you probably recognize that it will not be easy to get through the rest of your life without knowing about computers. Let us begin with a definition of computer literacy that encompasses three aspects of the computer’s universal appeal:
•	Awareness. Studying about computers will make you more aware of their importance, their versatility, their pervasiveness, and their potential for fostering good and (unfortunately) evil.	,
•	Knowledge.^!.earning what computers are and how they work requires coming tp terms with some technical j argon. Дп the end, you will benefit from such knowledge, but at first it may be frustrating.	о
•	Interaction. There is no better way to understand computer thatw through interacting with onej So being computer literal also means being able to use a computer for some simple applications.
Note that no part of this definition suggests that you must be able to create the instructions that tell a computer what to do. This would be tantamount to saying that anyone who plans to drive a car must first become an auto mechanic. Someone else can write the instructions for the computer; you simply use the instruction to get your work done. For ' example, a bank teller might use a computer to make sure that customers really have as much money in theh.account as they wish to withdraw. Or ^an accountant might use Tme’To prepare a report, a farmer to check on market prices, a store manager to analyze sales trends and a_teenager to * play a video jgarne. We cannot guarantee that these people are computer literate, but they have at least grasped the "hands-on" component of the definition — they can interact with a computer. It is possible fbr everyone to be computer literate?
J»*^\_Computer literacy is not a question of human abilities. Just about anyone can become computer literate^IrT the near future, people who do not understand computers will have the same status as people today who cannot read.
If this is your first computer class, you might wonder whether using a computer is really as easy as thevcfc^h^rcli^g^hy. Some students think so, but many do not. In fact, somejnovice comptrteusers? can be confused and frustrated at first. Indeed,\ a few arc so frustrated in the early going^ they think they neyerjyjHLeam^To their surprise, however, after a couple Q -pTlessons they not only are using computers but enjoying the experience.
Some students may be taken aback when the subject matter turns / out to be more difficult than they expected — especially if their only J computer experience involved the fun of video games. They are confused ! Jby the special terms used in computer classes, jas if they had stumbled into ' some foreign-language course by mistake ДА few ..students may be frustrated by the hands-on nature of the experience2[in which they have
one-to-one relationship with the computer. jTheir previous learning experiences, in contrast, have been shared and sheltered — they have been shared with peers in a classroom and sheltered by the guiding hand of an experienced person. Now they are one-on-one with a machine, at least part of the time. The experience is different, and maybe(slighUy; scary., But keep in mind that others have survived and even triumphed. So can you.
And don't be surprised to find that some of your fellow students already seem to know quite a bit about computers. Computer literacy courses are required by many schools and colleges and include students with varying degrees of understanding. That mix often allows students to Jeam from one anothery— and provides a few with the opportunity to teach others what they know.
> Find in the text equivalents to:
компьютерная грамотность; доступность (наличие); осведомленность; век информации; прожить оставшуюся жизнь; притягательность компьютеров; снять с банковского счета; технический жаргон; взаимодействие; рекламный ролик; к удивлению; пара занятий; растеряться; предыдущий учебный опыт; поделиться со сверстниками; быть наедине с; помнить; страшноватый; однокурсники; вырасти в компьютерной среде; учиться другу друга; пользователь-новичок.
> Answer the following questions:
~i 1. What does being computer literate mean?
42. What are the three aspects of the computer's universal appeal?
4 3. What is the best way to understand computers?
Л4. What are the simplest applications of computers^yyi •_
5. What is the hand-on, component of computer literacy?^» \
4 6. What are some novice computer users frustrated by?	<
A 7. What is the first computer literacy skill?
-f 8. Is it possible for everyone to be computer literate? Do you need any special talents?
13
> Put the proper words into sentences:
computer networks, info, computer literate, routine, boring, repetitive tasks,	to co,ne 10 terms with, -qualitative.
1.	Society is heading in the direction of ^majority.
2.	Computer programs .nosean integrate text?.'’.‘Йага;and graphs.
3.	The source of.theromputer.	with
4.	It is difficult for some people to come ... the speed of change in tin modem vyorld.,. . i .	- „
5.	Many .V which people Find ... and tiring can now be carried out machines.	adCcz/G-X/
6.	Computers give us speed, ..., sco^e^^alit^,^flexibility, large capacity, elimination of	^fifeeaset^gfQbienpy.„	?
7.	Wc needb.exp^raing^omputer3tecfiiiology^aniTadjust our vision
to a whole new world..	r-	5
8.	As more and more people are linked by V, now soon will it be before the paperless office becomes a reality?
LISTENING SKILLS
Listen to these people talking about how they use computers at work and write each speaker's job in the table.
electrical engineer secretary accountant librarian composer
Speake	Job	What he/she uses computers for
1		
2		
3		
4		
Now listen again and write what each speaker uses his/her computer for.
14
Formula 1 cars
DISCUSSION
Working in pairs choose one of the areas in the diagram below and discuss what computers can do in this area.
Entertainment
Factories and industrial processes
Hospitals and medical research
Useful words:
Formula I: racing car, car body, design, mechanical parts, electronic components, engine speed
Entertainment: game, music, animated image, multimedia, encyclopedia In factories: machinery, robot, production line, computer-aided manufacturing software
In hospitals: patients, medical personnel, database program, records, scanner, diagnose, disease, robot, surgery
Useful constructions:
Computers are used to....
A.	PC can also be used/pr ...
Computers can help ... make ... control... store... keep ... provide ... manage. ... give., perform ... measure... test... provide access to ...
B.	Now write a short paragraph summarizing your discussion. Then ask one person from your group to give a summary’ of the group's ideas to the rest of the class.
Examples:
In business, computers are used jor financial planning, accounting and specific calculations. In the office, computers are used to write letters and keep records of clients, suppliers and employees.
Computers and microchips have become part of our everyday lives: we visit shops and offices which have been designed with the help of computers, we read magazines which have been produced on computer, we pay bills prepared by computers. Just picking up a telephone and dialing a number involves the use of a sophisticated computer system, as does making a flight reservation or bank transaction.
We encounter daily many computers that spring to life the instant they’re switched on (e.g. calculators, the car’s electronic ignition, the timer in the microwave, or the programmer inside the TV set), all of which use chip technology.
What makes your computer such a miraculous device? Each time you turn it on, it is a tabula rasa that, with appropriate hardware and software, is capable of doing anything you ask. It is a calculating machine that speeds up financial calculations. It is an electronic filing cabinet, which manages large collections of data, such as customer’s lists, accounts, or inventories. It is a magical typewriter that allows you to type and print any kind of document- letters, memos or legal documents. It is a personal communicator that enables you to interact with other computers and with people around the world. If you like gadgets and electronic entertainment, yOu can even use your PC to relax with computer games.
16
17
FINAL TEST
Put the following sentences in the same sequence as the information is arranged in the introductory text (Расположи te следующие предложения в той же последовательности как информация представлена в вводном тексте)
1.
A.	There exist a lot of educational opportunities for those who are interested in pursuing computer careers
B.	The difference in computer specializations can sometimes be measured only in level of emphasis.
C.	Nowadays computer technology has become essential almost in every-pro fession.
D.	Thanks to technological advancement computer professionals will always be in demand.
 The main idea of the text “Comptif er Literacy For All” can be expressed as:
2.
A.	Every person must have a computer nowadays.
B.	It’s quite possible for everyone to become computer literate now.
C.	Computer literacy depends on your human abilities.
	Choose the right Russian equivalent to the following English sentence (Выберите верный русский эквивалент следующему английскому предложению)
3.	In the near future people who do not understand computers will have the same status as people today who cannot read.
А. В ближайшем будущем изменится статус людей, не знающих компьютер и не умеющих читать.
в. В ближайшем будущем понимание компьютера станет важнее, чем умение читать.
С. В ближайшем будущем к людям, не знающим компьютер, будут относиться так, как сегодня относятся к тем, кто не умеет читать.
 Choose the right English equivalent to the following Russian sentence (Выберите верный английский эквивалент следующему русскому предложению)
4.	Ввиду постоянных изменений в компьютерной сфере, студентам необходимо приобрести глубокие фундаментальные знания как в аппаратном, так и в программном обеспечении прежде, чем приступить к изучению специализированной области.
A.	Thanks to computer advancements it is necessary fbr students to have a special study of hardware and software.
B.	Because the computing field is always changing it’s essential fbr students to obtain a broad base of knowledge both in hardware and software before carrying out any specialized study.
C.	Although computing field is always changing students must have deep basic knowledge not only in hardware and software but also in different computer specializations.
 Find the equivalents in two двух языках)
5.	comprehensive background
6.	software engineering „
7.	cutting-edge research
8.	industrial design
9.	artificial intelligence
languages (Найдите эквиваленты в
А.	искусственный интеллект
В.	промышленное проектирование
С.	всесторонняя подготовка
□.передовое исследование
 Choose the right variant:
10.	One of the first calculating devices was developed by...
A. Ch.Barbage	В. B. Pascal
11.	Within recently computer technology has become ... in the work environment.
A. unnecessary	B. difficult
C. essential	D. superfluous
12.	Being computer ... also means being able to use a computer for some simple applications.
П НАУЧНАЯ
БИБЛИОТЕКА
Брянского государственного технического университета
IS
B.illiteral
A. literal
 Insert the proper words into the following sentences:
13.	Training for various computer careers one cam focus on cutting-edge research in ... intelligence.
14.	... processing technology is one of the areas in vocational education programs.
15.	Such computer programs as data processing, management information systems, and information science are usually .. .-oriented.
16.	If you like gadgets and electronic entertainment, you can use your . to relax with computer games.
17.	There exist many gray areas where computer science and othc disciplines ....
18.	Computer science is a broad ... that involves the study of the structure functions, and applications of computers.
19.	There is no better way to understand computer than through ... wit) one.
20.	The well-established division between hardware and software begins to ... when one considers specializations such as systems analyses, robotics, computer engineering and other subfields.
UNIT II
COMPUTER SYSTEM
INTRODUCTORY TEXT
। Computers are electronic machines, which can accept data in a certain form, process the data and give the results of the processing in a specified format as information.
Computers can be divided into three main types, depending on their size and power.
Mainframe computers are the largest and most powerful. They can handle large amounts of information very quickly and can be used by many people at the same time. They usually fill a whole room'and are sometimes referred to as mainframes or computer installations. They are found in large institutions and government departments.
Minicomputers, commonly known as minis, are smaller and less powerful than mainframes. They are about the size of an office desk or smaller and are usually found in banks and offices. They are becoming less popular as microcomputers improve.
Microcomputers, commonly called as micros, are the smallest and least powerful. They can handle smaller amounts of information at a time and are ideal for use as home computers, but are also used in education and business. More powerful micros are gradually being produced; therefore they are becoming the most commonly used type of
computers.
A computer can do very little until it is given some information. This is known as the input and usually consists of a program and some data.
A program is a set of instructions, written in a special computer language, telling the computer what operations and processes have to be carried out and in what order they should be done. Data, however, is the particular information that has to be processed by the computer, e.g. numbers, names, measurements.
Information in the form of data and programs is known as software, and mechanical parts that make up a computer system are called hardware. A standard computer system consists of three main
20
sections: the Central Processing Unit (CPU), the main memory and the peripherals.
Perhaps the most influential component is the Central Processing Unit. Its function is to execute programs and coordinate the activities of all the other units. In a way. it is the ‘brain’ of the computer. The unit consists of three main parts:
a)	the Control Unit, which examines the instructions in the user’s program, interprets each instruction and causes the circuits and the rest of the components - disk drives, monitors, etc. -to be activated to execute the functions specified;
b)	the Arithmetic Logic Unit (ALU), which performs mathematical calculations (+,-,etc.) and logical operations (and, or,etc.);
c)	the registers, which are high-speed units of memory used to store and control information. One of these registers is the Program Counter (PC) which keeps track of the next instruction to be performed in the main memory. Another is the Instruction Register (IR) which holds the instruction that is currently being executed
The main memory holds the instructions and data which are currently being processed by the CPU. It has two types: RAM and ROM, both contained in electronic chips connected to the main board of the computer. RAM stands for ‘Random-Access Memory’ and is the working area of the computer, that is, the basic location where the microprocessor stores the required information. All the information stored in the RAM is temporary. ROM is the acronym for ‘Read-Only Memory’, which implies that the processor can read and use the information stored in the ROM chip, but cannot put information into it. ROM chips have ‘constant’ information, including instructions and routines for the basic operations of the CPU.
The peripherals are the physical units attached to the computer. They include storage devices and input/output devices.
Storage devices (floppy or hard disks) provide a permanent storage of both data and programs. Disk drives are used to handle one or more floppy disks. Input devices enable data to go into the computer’s memory..The most common input devices are the mouse and the keyboard. Output devices enable us to extract the finished product from the system. For example, the computer shows the output on the monitor or prints the results onto paper by means of a printer.
21
On the rare panel of the computer there are several ports into which we can plug a wide range of peripherals - modems, fax machines, optical drives and scanners.
These are the main physical units of a computer system, generally known as the configuration.
TOPICAL VOCABULARY
1. to process data	обрабатывать данные
2. mainframe computer	универсальная ЭВМ
3. to handle information	анализировать информацию
4. software	программное обеспечение
5. hardware	аппаратные средства
6. influential component	важный компонент
7. Central Processing Unit (CPU)	центральный процессор
8. to cause	вызывать, быть причиной
9. circuit	схема, цепь
10. disk drive	дисковод
11. Arithmetic Logic Unit (ALU) арифметико-логическое устройство (часть
	процессора, выполняющая
	набор его арифметических и
	логических команд)
12. register	регистр
13. track	след, курс, путь
14. currently	в настоящее время
15. board	печатная плата
16. temporary	временный
17. to imply	подразумевать
18. routine	подпрограмма
19. peripheral	периферийное (внешнее)
	устройство
20. to attach	присоединять, прикреплять
21. storage device	(внешнее) устройство
22
22.
23.
24.
floppy hard disk to enable
хранения данных гибкий (магнитный) диск жёсткий диск
давать возможность, позволять
25.
to plug
включать, втыкать
EXERCISES
1.	Read the introductory text again and answer these questions:
-	What types can computers be divided into?
-	Where are mainframe computers usually found?
-	Where do minicomputers find their application?
-	What type of computer is most commonly used and why?
-	What is understood by ‘a program’?
-	What main sections does a standard computer system consist of?
-	How can you characterize the CPU?
-	What parts does it consist of?
-	What functions does the Control Unit perform?
-	What is the ALU?
-	Which is the third component of the CPU?
-	What is RAM?
-	What is ROM?
-	What term is used to denote all physical units attached to the computer?
-	Can you name storage and input/output devices?
2.	Find in the text equivalents for the following words and word-combinations;.usually, little by little, to fulfil, to perform, part, at the present moment, to denote, to connect, with the aid of.
3.	Read the text. Do the tasks given below.
CENTRAL PROCESSING UNIT
At the centre of the computer system is the CPU, which can be considered to be the “brain” of the computer. Its main components are the central processor and the main memory’. The speed and capacity of these components have been greatly improved with each new generation of computers. In the first generation, the central processor was built from electronic valves, which were rather unreliable. The second generation used transistors. The third generation used integrated circuits. The fourth generation of computers uses microprocessors. These are contained on electronic chips, which are slices of silicon with thousands of electronic components and circuits engraved on them.
Early computers used magnetic cores in their main memory but fourth generation computers use mu$h smaller and more powerful electronic memory chips.
The two parts of the central processor are the Control Unit (CU) and the Arithmetic and Logic Unit (ALU).
The control unit controls all the other units in the computer system. It decodes the program instructions and makes sure they are carried out in the correct sequence. The arithmetic and logic unit, on the other hand, performs the calculations and data manipulation e.g. comparing, sorting and combining data.
These units have small, short-item storage areas called registers, which are used for special tasks. For example, the register in the CU known as the program computer is used to hold the address of the next instruction to be carried out. The register in the ALU known as the accumulator is used to temporarily hold the data item currently being processed.
Each unit of the CPU is connected by a group of wires called a bus. There are data buses for carrying data from one unit to another, control buses for sending control signals to each unit and address buses for accessing each part of the main memory.
The power of CPU is partly determined by its speed. This is controlled by a clock in the processor, which sends out regular pulses to each unit to keep them in step. The clock pulse rate is measured in megahertz (MHz).
A computer can be made more powerful by connecting a second
24
processor to work in parallel with the first one. When computers are connected in a network configuration, the processing can be shared by the CPUs. This distributed processing make the system much more powerful.
> Use the information in the text and the diagram to help you match the terms in the box with the appropriate explanation or definition below.
input	processor	output
Expenses (eg. payroll, services, publicity)
Income (e.g. sales, stocks, interest)
Fata
processing
Result on the monitor or in printed form
software peripheral devices MONITOR floppy disk HARDWARE INPUT port
OUTPUT Central Processing Unit
1	The brain of the computer.
2	Physical parts that make up a computer system.
3	Programs whichjcan be used on a particular computer system.
4	'Pile information which is presented to the computer.
5	Results produced by a computer.
6	Hardware equipment attached to the CPU.
7	Visual display unit.
8	Small device used to store information. Same as 'diskette'.
25
9	Any socket or channel in a computer system into which an input/output device may be connected.
4.	Read and guess.
Read these slogans or quotations, and say what computer element they refer to.
1	a) 'Point and click here for power.'
b) 'Obeys every impulse as if it were an extension of your hand.'
2	a) 'Displays your ideas with perfect brilliance.'
b) 'Sec the difference - sharp images and a fantastic range of colours.'
3	a) 'I love this drive. It's quiet and fast.'
b) 'With this it's easy to back up your data before it's too late.'
4	a) 'Power and speed on the inside.'
b) 'Let your computer's brain do the work.'
5 a) '... a big impact on the production of text and graphics.'
 b) 'Your choice: a laser powerhouse.'
6 a) 'Your fingers will hardly know they're working.'
b) 'Choose a full 105-key layout, and type with efficiency.'
5. Agree or disagree with the following statements, make the false ones true:
1.	The CPU directs and coordinates the activities taking place within the computer system.
2.	The Arithmetic Logic Unit performs calculations on the data.
3.	RAM, ROM and secondary memory are the components of the main memory
4.	Information cannot be processed by the microprocessor if it is not loaded into the main memory.
5.	“Permanent” storage of information is provided by RAM.
6.	Minicomputers can handle large amounts of information very quickly, can be used by many people at rhe same time and usually fill a whole room.
7.	Keyboard and monitor are input devices.
26
LISTENING SKILLS
> Listen to a short lecture given by John Griffiths, an expert on computer systems. As you listen, label the pictures on the next page with these words:
microcomputer (portable) microcomputer (desktop PC) mainframe minicomputer
> Listen again and put a tick next to the correct answer.
1.	According to the speaker:
a)	a mainframe computer is less powerful than a minicomputer.
b)	a mainframe is more powerful than a minicomputer.
c)	a mainframe is not very powerful but can execute jobs very rapidly.
2,	Mainframe computers arc used by: a) students and teachers in schools, b) executives and businessmen.
c) large organizations that need to process enormous amounts of data.
3	.'Multitasking' means:
a)	access to a minicomputer through terminals.
b)	doing a number of tasks at the same time.
c)	connection to a 'host' computer by a network so that many users have access to data and programs.
4	.The most suitable computers for home use are: a) mainframes.
b)	minicomputers.
c)	microcomputers (PCs).
5	The smallest and least powerful computers are known as.
a)	minicomputers.
b)	desktop PCs.
c)	laptops and notebook computers.
DISCUSSION
Working in pairs make up dialogues discussing the following problems. You are a computer novice.
1. Ask another student to describe the computer. Touch upon these aspects hardware and software CPU, main memory, peripherals.
2. Discuss main types of computers giving both their advantages and disadvantages.
SUPPLEMENTARY READING
COMPUTER AS IT IS
fAny computer is, architecturally, like any other computer in the early days of computers.
However, there are differences. They are the following: an early processor used to be made of thousands of vacuum tubes. Reliability was measured m mere hours between failures, and the cooling plant was often larger than the computer itself. Then the transistor was invented. The number of them was enormous in each
mainframe! Besides, in computers of the 1950’s, the transistors, diodes, resistors, capacitors and other components were mounted on printed-circuit (PC) cards] A typical 5-in. card contained a dozen transistors and a hundred other parts. A card might have contained a single flip-flop and a thousands cards were required to build each computer.
| In the early 1960’s semiconductors makers created a wholly new technology: a whole flip-flop could be integrated. Several of integrated circuits (ICs) could be mounted on a single printed card. Soon, improved fabrication processors enabled even more complex circuit to be created in a single IC. The new technology was called medium-scale
28
integration (MSI), and the older technology was labeled small-scale integration (SSI). The progress towards smaller computers continued
If used for computers discrete transistors were too costly and unreliable, they were too large and too slow.
I In the 1960’s advances in microelectronic components led to the development of the minicomputer, followed more recently by an even smaller microcomputer. Both have filled a need for small relatively flexible processing systems able to execute comparatively simple computing functions at lower cost.
In 1971, Intel Corp. delivered the first microprocessor, the 4004. All the logic to implement the CPU, the central processing unit, of a tiny computer was put onto a silicon chip less than 1/4-in square. That design was soon followed by many others. The progress towards smaller computers is likely to continue: there is already talk of nanocomputers pico-computers.^hen the central processing unit (CPU) of a computer is implemented in a single or very small number of integrated circuits, we call it a microprocessor. When a computer incorporates a microprocessor as its major component, the resulting configuration is called a microcomputer. When the entire computer, including CPU, memory and input-output capability, is incorporated into a single IC, we also call that configuration a microcomputer. To distinguish between the two microprocessor types, we call the latter a one-chip microcomputer. J
Modem computer and microelectronic devices have interacted so closely in their evolution that they can be regarded as virtually symbiotic. Microelectronics and data processing are linked.
FINAL TEST
 Put the following sentences in the same sequence as the information is arranged in the introductory text (Расположите следующие предложения в той же последовательности как информация представлена в вводном тексте)
1.	A. The input usually consists of a program and some data.
B.	A wide range of peripherals can be plugged into ports on the rare panel of the computer.
C.	CPU is considered to be the “brain” of the computer.
Vj
D.	There exist two types of the main memory.
 Choose the right English equivalent to the following Russian sentence (Выберите верный английский эквивалент следующему русскому предложению).
До тех пор пока в компьютер не введена некоторая информация, он способен выполнить совсем немногие операции.
2.	A. A computer can do very little although it is given some information.
B.	Unless a computer is given some information it won’t work at all.
C.	A computer can do very little until it is given some information.
* Choose the right Russian equivalent to the following English sentence (Выберите верный русский эквивалент следующему английскому предложению)
3.	The power of CPU is partly determined by its speed.
А.	Мощность ЦП не зависит от скорости его работы.
В.	Мощность ЦП полностью определяется скоростью его работы.
С.	Мощность ЦП частично определяется скоростью его работы.
 Find the equivalents in two languages (Найдите эквиваленты в двух языках)
4.	board	А.	подпрограмма
5.	routine	В. гибкий диск
6.	floppy	С. дисковод
7.	bus	D. печатная плата
8.	disk drive	Е. Шина
“ Complete the sentences with the proper word (Закончите предложения подходящим no смыслу словом) 9. The main components of the computer are the central processor and the ... .
10. The second generation of computers used ....
H. Microprocessors are used by the ... generation of computers.
12.	The register in the ALU is known as the ... .
13.	The clock pulse rate in computers is measured in ... .
14.	Physical units attached to the computer are known as v®'.-
15.	A set of instructions written on a special computer language is called a
16.	Information in the form of data and programs is known as «Н.
17.	The unit, which performs mathematical and logical calculations is known as ... f.....
18.	The most common input devises are the../'and the
19.	The computer shows the output on the ...
20.	The computer prints the results on the?.. .
 Choose the right variant (выберите правильный вариант)
21.	... is the particular information that has to be processed by the computer.
A. program B.routine C. data
22.	Each unit of the CPU is connected by a group of wires called a ... .
A. board B. track C. bus D. register
23.	... are ideal for use as home computers.
A. minicomputers B. microcomputers C. mainframe computers 24. Mechanical parts that make up a computer system are called A. software B. configuration C. peripherals D. hardware 25 ... chips have “constant ” information.
A. RAM	B. ROM
31
UNIT III
INPUT DEVICES
INTRODUCTORY TEXT
Input devices are the pieces of hardware which allow us to enter information into the n are the keyboard and the mouse.
The keyboard allows the user to key in programs and data and to control the computer system. There are keyboards with different number of keys nowadays.
A mouse is a device for controlling the cursor and selecting items on the screen. Typically, a mouse is a palm-sized device, slightly smaller than a pack of cards. On top of the mouse there are one or more buttons for communicating with the computer. A ‘tail’ or wire extends from the mouse to a connection on the back of the computer.
Besides the mouse there are other cursor control devices. They are a trackball and a joystick.
A trackball is similar to a mouse but it has the ball on top. To move the cursor on the screen, the user rotates the ball using his fingers.
To operate a joystick, the user grips and moves a vertical lever. The movement of the lever causes the cursor to move around the screen.
Pressing a button on the joystick puts the required process into operation. Cursor movements can be made very quickly using this device therefore it is often used for playing fast action games.
We can also interact with the computer by using many other specialized input devices: a scanner, a lightpen, a graphics tablet, or a voice recognition device.
A scanner converts text or pictures into electronic codes that can be manipulated by the computer.
Lightpens and graphics tablets are referred to drawing devices used for CAD (Computer-Aided Design).
A lightpen is similar in shape to an ordinary pen. It is held against the screen and works by sending signals to the computer when it senses the light given off by the screen. This enables the computer to calculate its position. As the light pen is moved, lines appear on the screen. The special programs used with the light pen allows the lines to be increased or decreased in size or moved to different positions.
33
A graphics tablet has a flat board (or tablet) across which a pen is moved. By using the reflection of light, ultrasound or other methods the graphics tablet can measure the distance of the pen from the sides of the tablet and therefore calculate its position. As the pen is moved across the tablet lines are displayed on the screen.
A voice recognition device allows the user to input data by speaking into a microphone. The computer compares the input with the sound patterns of words stored in the memory. To reduce the amount of memory required, the vocabulary used with this device is limited to a few words. However, the large amount of memory needed to analyse the input makes it difficult to use this device with microcomputer.
1.	key in
2.	wire
3.	extend
4.	rotate
5-	grip
6.	lever
7.	lightpen
8.	graphics tablet
9.	refer to
10.	flat
11.	pattern
12.	reduce
TOPICAL VOCABULARY
вводить с клавиатуры
провод, проводник, шина
расширять, наращивать, увеличивать,
делать длиннее
поворачивать, вращать(ся)
схватить, сжать, крепко держать
рычаг
световое перо
графический планшет (syn. digitizing
tablet)
ссылаться на, относить к, приписывать
плоский, ровный
образец, модель, шаблон
уменьшать, снижать
EXERCISES
1.	After reading the text give a short description of each input device mentioned above according to the following plan:
о The name
о Its look
о Its usage
Do you know any other input devices?
Can you describe them according to the same plan?
2.	Decide which of the input device would best suit each of hese requirements. In some cases more than one variant is possible.
о To input mathematical information.
о To copy engineering drawings.
о To guide a rocket in a computer game.
о To help a busy manager to find a file quickly.
о To help disabled people who cannot move their arms.
о To design new components without first making a large number >f drawings.
о To help young children learn to spell.
3.	Read some additional information about the keyboard, nouse and scanner.
Keyboard
Any keyboard has the following groups of keys:
•	alphanumeric keys: arranged in the same order as a typewriter ( this layout is known as QWERTY because these are the first six letters on the top left of the keyboard);
•	function keys: used by various programs to instruct the PC to perform specific tasks, such as Save, Copy, Cut, Paste, Help, etc;
.. • numeric keypad: set of numeric or editing keys (the Num Lock key is used to switch from numbers to editing functions);
•	editing keys: cursor and other keys usually used within word processors to page up and down in a long document or to edit text (using Insert or Delete keys);
•	special keys: used to issue commands or to produce alternative characters in key combinations, for example, the Alt key.
Most keys of the keyboard are auto-repeating, that means that , if hey are held down, they repeat their function again and again until they re released.
34
35
, Мо,1. *	,	i i * л указатель; щелкать, тащить; отпускать; подобно; захватывать что-л 
TW mouse is des lined to slide around on your desktop. A;, ук^а ’	7
ine mouse is ucsiyicu suut av	j	г	быстрой манере; лицом вниз; под чем-л.; серия чего-л •
moves, it moves an image on the screen called a pointer or mouse сигм в „Я1О1паяся лампа	P
The pointer usually looks like an arrow or I-bar, and it mimics нврашаюшаяс
movements ofthe mouse on your desktop. ...	> Choose one of the above mentioned input devices and speak
What makes the mouse especially useful is that it is a very qui	detaj|s	p
way to move around on a screen. The mouse also issues instructions to ’a
computer very quickly. Point to an available option with the cursor, cl:, д Match these descriptions with the words from №e box on the mouse, and the option has been chosen.
Mice are so widely used in graphic applications because they can ____--------------------------------------. __________________
things that are difficult, if not impossible, to do with keyboard keys. I Alt Key, Backspace Key, Caps Lock key, Insert Key, Enter Key, example, the way you move an image with a mouse is to put the pointer End Key, Delete key, Auto-repeat, Carriage return, Extended keyboard, the object you want to move, press the button and drag the image fr .Keystroke, Arrow Keys, Function Keys, AT keyboard one place on the screen to another. When you have the image where у—--------------------—----------------------------------------
want it, you release the button and the image stays there. Similarly, i
’ 7	,	,	r	\ i „ L ohort tor Alternate key, it is like a second Control kev It is
mouse is used to grab one comer of the image (say a square) and to stre’	- 7~
Jiiuuac.otov s	«=	standard on all PCs. You use it m the same fashion as the Control key -
it into another s ape (say a rec ang e).	holding it down while you press another key. The meaning of any this key
The buttons on the mouse are used to select .terns a. which	,M9?IQR„rJI,„s Ь "V У
mouse points. \ ou posit,on the ptnnter on an object on the screen.	the iva,e„t	'
example, on a menu or a tool in a paint program, and then you press	л	J	-------
mouse button to ‘select’ it. Mice are .also used to load documents inti	. । u ,i , • г , ,
2.. Most computer keyboards contain our such keys for movine nroeram- vou nut the pointer on the file name and double-click on	.	; л-———	^7-^ nivvuig
P °	, . P	.	-1	• he cursor or insertion point right, left, up, or down. When combined with
name - that is, you press a mouse button twice	m rapid succession. . P . T/Г t	.	z „„ ч ,	,	.
, } н	Scanner	he	" Function, Control,	or Alt keys	(on PCs), these	keys	can have
_	„ . ,	.,	...	. л r iifferent meanings. The exact manner in which these keys function
In a flatbed scanner, the paper with the image is placed face de,	0	.	.	. 7S
,	D	1 lepends on which program is running. Some programs ignore them
on a glass screen similar to a photocopier. Beneath the glass are •	—-----------5 F
lighting and measurement devices. Once the scanner is activated, it re: cS
images as a senes oldois and .ben g?erat? a digitised .mage tba,^Hdo^ sent to the computer and stored as a file. The manufacturer usm f. r b 7
includes software which offers different ways of treating the scam £	. „ .	, .	,	, ., . ,дгт. т
vj 4. An 84-key keyboard introduced with the PC /AT. It was later image.	rcplaggd with the 101-key keyboard which is called . .
A colour scanner operates by using three rotating lamps, each <	7 7-------
which has a different coloured filter: red, green and blue. The resuh -.1^	.	.	.
three separate images are combined into one by appropriate software. ha<L Д _that ™ves he ™ or msertion^oipt backward one
F 6	space. In addition to moving the cursor backward, this key
.	.	. , . , .. ,	suaffijr deletes the character to the left of the cursor or insertion point. It is
,	> Write English equivalents for the following:	angularly usefid, therefore, for correcling typos
расположение; набор чего-л.; переключаться с ...на ...; редактиров	° 7j
текст; давать распоряжение; автоповтор; удерживать; имитиров'
3ft
37
6. A key on computer keyboards that turns insert mode on and off. £ 13. A toggle key on computer keyboards that, when activated, This key does not work for all programs, but most word processors and caUSes all subsequent alphabetic characters to be uppercase, but has no text editors support it. b	effcct on °^ler
7. Special keys on the keyboard that have different meanings depending on which program is running. These keys are normally labeled F]_ to Fl0 or Fl2 (or Fl5 on Macintoshes). New PCs have the enhanced keyboard, with twelve these keys aligned along the top of the keyboard.
12 14. The pressing of a key. The efficiency of software programs is sometimes measured by the number of key pressings it requires to perform a specific function. The fewer the key pressings, claim some software producers, the faster and more efficient the program.
' 8. A keyboard for Macintosh computers that contains up to 15	$
function keys above the alphanumeric keys, and a numeric keypad. It i< sometimes called an enhanced keyboard because of its similarity to the Pf enhanced keyboard.
— 9. A key that moves the cursor (or insertion point) to th;
LISTENING SKILLS
> Listen to the description of three input devices. What are they?
1.........
beginning of the next line, or returns control to whatever program 1 currently running. After a program requests information from you (b displaying a prompt), it will usually not respond to your input until yo have pressed this key. This allows you to correct typing mistakes or 1 reconsider your entry before it is too late.
2..........
3..........
> Listen to the conversation between Vicky Cameron, an Information Technology (IT) lecturer, and complete these notes.
1. The technology used in scanners is similar to that used in
10.	A special cursor control key on PC keyboards and Macintot extended keyboards. This key has different meanings depending on whic. program is running. For example, it might move the cursor to the end 1 the line, the end of the page, or the end of the file.
11.	This key is used to remove characters and other objects. ( PCs, this key generally removes the character immediately under tl cursor (or to the right of the insertion point), or the highlighted text object. It deletes the character under the cursor, and the Backspace k; deletes the character to the left of the cursor or insertion point.
12.	This key is a special code that moves the cursor (or print hea to the beginning of the current line. In the ASCII character set, it has decimal value of J3.
A laser beam reads the image in..........................
The image is then........................................
Text is scanned with.....................................
Black-and-white scanners work best with..................
Greyscale scanners have been designed to work with.......
Colour scanners produce lovely images on screen but......
DISCUSSION
Working in pairs make up dialogues discussing the following problems.
. 1. You friend knows little about the computer. Fie asks you Questions keys of the keyboard. Tell him all you know.
38
39
2. One of you is a manager in a shop selling computers. Tell customer how to use the mouse.	"
3. One of you is a teacher. Your student was given the task -learn about input devices. Ask him for this information.
SUPPLEMENTARY READING
KEYBOARD LAYOUT
travel, force and key feedback are keyboard characteristics generally ed on by most manufacturers and are specified by ANSI as follows:
" ter line distances between adjacent keys shall be between 18 and 19 £ (0 71 and °-75 inch) horizontally, and between 18 and 21 mm (0.71
nd 0.82 inch) vertically (Clare. 1970).
The keys...shall have a maximum vertical displacement between 1.5 and 0 mm (0.06 and 0.24 inch).
The preferred displacement is between 2.0 and 4.0 mm (0.08 and 0.16
Long existing standards dictate the location of
of the keys, such as the numbers, letters, symbol	maximum force to depress the keys, expressed in Newtons (N)...shall
and the standard function keys, such as shift, new line and backspa	Mw£,en q25 n and 1.5 N. The preferred key force is between 0.5 N
These keys are in the "touch" area and account for most of the keystro] Q6N " the user makes without breaking rhythm and losing speed. Special fund A keys, such as CLEAR are in nontouch locations and can be struck oni-. The more proficient the user, the lighter the touch can be. If too the user moves the hand away from the home position. They are in ittlcTorce is required, however, extra keys may be struck accidentally, and nontouch area because they are infrequently used and should be viewed f too much force or displacement is required, some keys may fail to be verification before being struck.	ictuated because thewer did not press hard enough. Also, excessive force
nduces finger fatigue. There is evidence (Kinkead and Gonzales, 1969;
The QWERTY layout is currently the mdst popular keyb.A1(len, Daniels and Kanarick, 1972) that optimum force/displacement configuration. It is named after the first six keys of the upper left Characteristics of a |<ey require a steadily increasing force as the key is row. It was developed in 1872 and laid out to slow typists down somevjq)ressed untji contact is made. Immediately beyond that point, the force and so prevent "jamming" of mechanical typewriters. The DVOR1S sharply changed so that users can easily "feel" when the key has been layout was proposed in 1932 as a faster and more efficient layout (Dvcjressed sufficiently. A typical force displacement curve for a key with 1943). This layout places the most frequently used keys on the home nactjje feedback is shown in While it can be shown to be an improvement over the QWERTY lay the magnitude of the advantages have not been shown sufficient to ju retrofitting keyboards and retraining typists. Thus, it currently has lim. acceptance.
FINAL TEST
KEY MECHANISM
Efficient keying requires that keys function with minimum adeqt.	" Choose the sentences which are true to the
force and with sufficient displacement to provide muscular feedback t< ’nf°rtnation of the introductory text (Выберете предложения, user. Key forces for current high production keyboards are in the ranr СОответствУ,О11,,!е информации вводного текста) 0.40 to 1.25 newtons with key displacements of 3 to 5 mm. Key spa-. !• A. The keyboard and the mouse are the only available input devices.
40
41
В.	A trackball looks like a mouse and the difference is that it h. a ball on its top.
C.	Lightpens and joysticks are referred to drawing devices us, for CAD (Computer-Aided Design).
D.	A voice recognition device needs a lot of memory.
E.	A graphics tablet like a lightpen is useful for making drawir, with the help of the computer.
 The main idea of the text about the keyboard (exercise 3) can be expressed as: (Главная идея текста о клавиатуре может быть выражена как:)
2. A. All keyboards have the same amount of keys.
B.	The description of the most useful keys found on any keyboar
C.	Functional keys are the main keys of any keyboard.
В The fewer the key pressings, claim some software producers, the faster and more efficient the program.
C Some software producers claim, the faster and more efficient the program, the fewer the key pressings.
« Give the right Russian equivalent to the following English sentence (Дайте верный русский эквивалент английскому предложению)
This key has different meanings depending on which program is running.
6. А. Эта клавиша имеет различные значения вне зависимости от выполняемой программы.
В. Эта клавиша обладает одним и тем же значением при выполнении различных программ.
С. Эта клавиша обладает различными значениями в
The main idea of the text about the mouse (exercise 3) can
зависимости от выполняемой программы.
be expressed as:
3.	A. To show that the mouse is more functional than the keyboarc B. To show what the mouse can do as an input device.
D. To show the construction of the mouse and the main fields of its usage.
 The main idea of the text about the scanner (exercise 3) ca be expressed as:
4.	A. To describe the difference between a flatbed and colour scanner.
B.	To describe the operating mechanism of a flatbed and coloui scanner.
C.	To stress the difference between a flatbed and colour scanne
 Find the equivalents in two languages (Найдите эквиваленты в двух языках)
7. extend	А. снижать
8. reduce	В. сжать
9. rotate	G. увеличивать
10. grip	D. вводить с клавиатуры
11. refer	Е. вращать
	F. приписывать
* Complete the sentences with the proper word (Закончите предложения подходящим по смыслу словом)
12.	The most popular keyboard layout is.
13.	The mouse is connected to the computer with the help of the
	Give the right English equivalent to the following Russian sentence (Дайте верный английский эквивалент русскому предложению)
Как утверждают некоторые производители программного обеспечения, чем меньше требуется нажатий клавиш, тем быстр*, и эффективнее программа.
5.	A. Thelfaster the key pressings, claim some software producers the fewer and more efficient the program.
14.	The input device, which is helpful for disabled people as they зап input data by speaking into a microphone, is known as ..
15.	Input devices that are especially useful for engineers are .......
16.	Input device which is very good for copying text and graphic lata is called ...
17.	A key that moves the cursor to the beginning of the next line is
42
43
18. DVORAK was proposed in 1932 as a faster and more efficient
19. Keys that instruct the computer and are fo\md on most keyboar,: on their tops are known as..............
UNIT IV
OUTPUT DEVICES
 Choose the right variant (Выберете правильный вариан f
20.	If you want to put a file into operation you should.the
mouse button.
A. Drag	B. Click
C. Double-click	D. Grab
21.	Joystick looks like a..with a button on its top.
A. Lever	B. Pen
C. Tablet	D. Box
22.	Graphics tablet includes a pen and a board that should be.
A. Vertical C. Movable
23......
A. Pattern
C. Image
24.....
A. Functional keys
C. Alphabetic keys
25. Touchpad has
A. Icons
C. Blank spaces
INTRODUCTORY TEXT
We interact with computers by entering instructions and data into them. After this information has been processed internally, we can see the results on the screen of the
B. Stable
D. Flat is an example to copy. B. View D. Device
...are used for changing text material.
B. Editing keys
D. Numeric keys .....instead of characters
B. Pictures
D. Symbols
monitor.
The characters and pictures that we see on the screen are made up of dots, also called picture elements (pixels)./jhe total number of pixels in which the display is divided both horizontally and vertically is known as the resolution. If the number of pixels is very large we obtain a high resolution display and therefore a sharp imagej Typical resolutions are 640x480, or 1024x768 pixels.
The cathode ray tube of the monitor is very similar to that of a TV set. Inside the tube there is an electron beam which scans the screen and turns on or off the pixels that make up the image. £fhe beam begins in the top left comer, and scans the screen from left to right in a continuous sequence which repeats 50, 60 or 75 times per second, depending on the system! If the rate of this repetition is low, we can perceive a flickering, unsteaay screen, which can cause eye fatiguejHowever, a fast-moving 75 Hz ‘refresh rate’ eliminates this annoying flicker.
/The monitor is controlled by a separate circuit board, known as the display adaptor, which plugs into the motherboard of the computer.^) Different boards drive different types of display. For example, the VGA (Vid^o Graphics Array) card has become a standard for colour monitors.
 Portable computers use a flat Liquid-Crystal Display, instead of a P'ctwe tube. An LCD uses a grid of crystals and polarizing filters to show *Ье wage- The crystals block the light in different amounts to generate the the image.
.Printing is the final stage in creating the document. That is the l,urP^e of the printers joined to the computing equipment. There are hff^nt types of printers and the results you can obtain with different Tpesfof printers vary substantially. It must be taken into account that • ,r|ifcs vary in cost, speed, print quality and other factors such as noise or -°rrqpatibility.
dol
JK.
8-
9.
10.
11.
12.
13.
14.
15.
16.
17.
18:
19.
44
First daisy wheel and dot-matrix printers were of impact type that made them very noisy. Modem printers are non-impact and give almost silent printing by using methods that do not require mechanical contact between the print head and the paper (e.g. heat, electrostatics or laser).
One common type of non-impact printer is an ink-jet printer. It operates by firing a fine spray of quick-drying ink onto paper. The ink jet is formed into the required character by electrostatic fields. This type of printer is quite fast and can print at the rate of up to about 400 cps.
Laser printers are extremely fast, printing a complete page at a time. They scan the image with a laser beam and transfer it to paper with special ink powder. They are constantly being improved. In terms of spec and quality they are preferred by experts for different reasons: they have a wider range of scalable fonts, they can emulate different language system; they can produce graphics, and they have many other advantages.
Another type of non-impact printer is thermal printer which uses heat, a special kind of paper and electrosensitive methods.
Photosetters can be regarded as an attractive alternative. They do not print on regular paper, but on photographic paper or microfilm. They can produce output w ith a resolution of over 2000 dots per inch. In addition, they are extremely fast, but very expensive.
Finally, plotters are a special kind of printer. Plotters use ink and fine pens held in a carriage to draw very detailed designs on paper. They
are used for construction plans, engineering drawings and other technical DEROSES illustrations.
(регенерации) адаптер дисплея подключать, вставлять в разъем системная плата (разг.
материнская плата) видеографический адаптер сетка, решетка
совместимость
лепестковый принтер точечно-матричный принтер принтер контактной печати принтер бесконтактной печати струйный принтер масштабируемый шрифт (с программно изменяемым кеглем) эмулировать (выполнять на одном компьютере программы, написанные
для компьютера другого типа) термографический принтер плоттер, графопостроитель
display adaptor plug motherboard
Video Graphics Array Grid compatibility daisywheel printer dot-matrix printer impact printer non-impact printer ink-jet printer scalable: font
emulate
20.
thermal printer plotter
21.
22.
1.
2.
3.
dot pixel resolution
4.
5.
6.
7.
cathode ray tube
scan
flicker
refresh rate
TOPICAL VOCABULARY
точка,
пиксел, элемент изображения разрешение, разрешающая способность
электронно-лучевая трубка просматривать, сканировать мерцание, дрожание частота обновления
. Read the introductory text again and answer these questions.
•	According to the writer, what is the importance of ‘pixel resolution’?
•	Why can a low refresh rate produce eye fatigue?
•	What does ‘LCD’ stand for? What type pf computers use LCD displays?
•	What output device gives permanent copy of processed data? What types of printers do you know? What technical features make them different from each other?
46
47
2.	Study the adjectives given in the box and use them to describe the types of printers from the text.
Fast slow high quality noisy quiet cheap easy
Expensive difficult simple reliable compatible with
Powerful expandable adaptable
3.Read the text to study recommendations for healthy experience wii the computer. Do the tasks given below.
TO YOUR HEALTH
Can all this computing be good for you? Are there any unheall side effects? The computer seems harmless enough. How bad can it sitting in a padded chair in a climate-controlled office?
Health questions have been raised by the people who sit all da\ front of the video display terminals (VDTs) of their computers, computer users getting bad radiation? What about eyestrain? And v about the age-old back problem, updated with new concerns about work who hold their hands over a keyboard? What about repetitive-action inj also known as carpal tunnel syndrome? What about the risk miscarriage?
Unions and legislators in many communities continue to push laws limiting exposure to video screens. Many manufacturers now о screens with built-in protection.
Meanwhile, there are a number of things workers can do to take < of themselves. A good place to begin is with an ergonomically desig workstation. Ergonomics is the study of human factors related computers. A pfoperly designed workstation takes a variety of factors i account, such as the distance from the eyes to the screen and the angb the arms and wrists. Experts recommend these steps as cop mechanisms:
. Turn the screen away from the window to reduce glare, and cover your screen with a glare deflector. Turn off overhead lights; illuminate your work area with a lamp.
•	Put your monitor on a tilt-and-swivel base.
•	Get a pneumatically adjustable chair. Position the seat back so your lower back is supported.
•	Place the keyboard low enough to avoid arm and wrist fatigue. Do not bend your wrists when you type. Use an inexpensive, raised wrist rest. Do not rest your wrists on a shaip edge
•	Sit with your feet firmly on the floor.
•	Exercise at your desk occasionally rotating your wrist, rolling your shoulders, and stretching. Better yet, get up and walk around at regular intervals.
> Find in the text equivalents to:
вредные побочные эффекты; мягкое кресло; вентилируемое помещение; электромагнитное излучение; облучение; радикулит;
усталость рук и кистей; рабочее место; верхнее освещение;
учитывать (принимать в расчет); наклонная и вращающаяся поставка;
[уменьшить свечение; встроенная защита; пневматически регулируемое кресло; вращать; потягиваться; острый край, регулярно.
I, > Fill in the table:
,	Problem	Disease	How to cope
VDT adiaSon	Eyestrain, headache, immune system diseases, risk of miscarriage	Increase distance from the eyes to the screen Install radiation protection devices (a glare reflector)
staying indoors Autism 1 —	——-			
49
48
4.	Look through the advertisements of computer monitors from IBM. Compare the monitors taking into account their features and price.
Elat Panel monitors
from S329.00 IBM web price*
Common features:
• As small as one-sixth the depth of a typical CRT Consumes less power than comparable CRT monitor^
•	Sharp, stable image provides flicker-free viewing
•	Design floats display towards user, emphasizing its sleek, light look
Performance flat panel monitor features:
-	Hybrid models allow digital or analog input
•	Ergonomic stands swivel, tilt and lift for comfortable viewing
•	Supports applications from general business up to ultra-high-resolutioi imaging
Irom S119.00 IBM web price*
Performance CRT monitor features:
•	High resolution and fine-strip pitch for sharp, scalable images
•	Flat screen Aperture Grille for brightness and clarity
•	Great value for those who desire excellent text and graphics viewing
> Tony Clark, a lecturer in computer ergonomics, is talking to some students about health and safety in a computer classroom. Listen and complete the sentences below.
I You should get a good chair, one that...............................
2.	Position the keyboard............................................
3.	Position the monitor..........eye	level, or just................
4.	A tilt-and-swivel display lets you...............................
5.	You should stay an arm’s length away from........................
6.	If you work in a room with a lot of computers, sit...............
> Listen to the radio interview and decide whether these statements about ink-jet printers are true or false.
I.	Ink-jet printers are quieter than dot-matrix printers.
2.	Ink-jet printers are cheaper than dot-matrix printers
3.	It is unlikely that ink-jet printers will ever become real competition for laser printers.
4.	Ink-jet printers can easily print on envelopes, labels and transparencies.
5.	Ink-jet colour printers use four inks: magenta, yellow, cyan and r,‘ black.
Only large businesses can afford colour ink-jet printers.
Essential CRT monitor features:
•	Ideal for value-conscious customers
	Excellent choice for viewing basic applications
•	Flat screen technology and speakers available on select models
50
51
Working in pairs make up dialogues discussing the following problems.
1.	Ask another student to describe the monitor of his computer. Touch upon these aspects: resolution, size, image quality, display type-
2.	A company requires quite a fast printer for their minicomputer which does not need special paper and which will not disturb the work of the office. Help this company representative choose appropriate printer.
3.	A computer user complains of eyestrain caused by his monitor. I to find out the reasons and give helpful recommendations.
to refocus your eye phones to your new viewpoint, sounds surround you, nd a fiber-optic glove allows you to "manipulate" what you see. You fflay seek out strange new worlds, fight monsters in computer combat, or strap yourself into the seat of a Star Wars-type jet and scream through cyberspace, blasting all comers to oblivion (computer oblivion, at least). qt with your stomach appropriately settled, you might even try out the most incredible roller coaster ride you will ever take in your life.
For the disabled, virtual reality promises a new form of freedom Consider the wheelchair bound paraplegic child who is suddenly able to use virtual reality gear to take part in games like baseball or basketball. Research funded by the government takes a military point of view, investigating the possibility of sending robots into the real conflict while human beings don cyberspace gear to guide them from back in the lab.
Spectrum Holobyte, a Computer games development Company, announced its first virtual reality Computer game for the home during 1991 Christmas season. Imagine yourself suddenly clutching your handheld laser pistol as a giant bird swoops right at you from the age of dinosaurs! Your laser shot goes astray, and you feel yourself suddenly lifted off the ground and carried higher and higher. That’s enough - for some of us it can be virtually too real.
SUPPLEMENTARY READING
STRAP ON SOME EYEPHONES AND YOU ARE VIRTUALLY THERE
FINAL TEST
• Put the following sentences in the same sequence as the information is arranged in the introductory text (Расположите следующие
One of the most exciting new areas of сотри research is virtual reality. Having been featured in TV sitcoms as well public television documentaries, virtual reality is merely an ambitic последовательности,в какой информация new style of computer interface. Virtual reality creates the illusion вводном тексте) being in an artificial world — one created by computers.
Virtual reality visitors strap on a set of eyephones, 3-D goggl that are really individual computer screens for the eyes. Slipping on ' rest of the gear allows you not only to see and hear, but also to sei your voyage.-The world of virtual reality has been called cyberspace computer-enhanced fantasy world in which you move around a manipulate objects to your mind's content.
When you move your head, magnetic sensors instruct the сотри
предложения
в той же представлена в
1,}A. There are different types of printers.
*-B. For seeing the result of processing data we need a special output device.
I C. The more is the number of pixels the better image we get.
* D. Using a printer type depends on the application.
f
52
• The main idea of the text «To Your Health» can be expressed as: (Главная идея текста «Для вашего здоровья» может быть выражена как:)
2.	A. It is impossible to be healthy while working at the computer oB. One can be quite healthy while working at the computer if b. follows some useful rules.
C. Trade unions should take care of computer users.
 Give the right English equivalent to the following Russia sentence (Дайте верный английский эквивалент русскому предложению)
Если Вы работаете в офисе с большим количество компьютеров, не сидите боком или спиной слишком близко мониторам.
3.*А. If you work in an office with a large number of computer don’t sit too close to the sides or backs of monitors.
B. If your work in an office includes computers, don’t e anything with monitors.
& C. While working in an office, don’t use computers ai monitors too much.
* Give the right Russian equivalent to the following Englb sentence (Дайте верный русский эквивалент английском предложению)
It is unlikely that ink-jet printers will ever become real competition for laser printers.
4	. А. Вероятно, скоро струйные принтеры буду конкурировать с лазерными.
В. Маловероятно, что лазерные принтеры состав; конкуренцию струйным.
• С. Маловероятно, что струйные принтеры составят реальную конкуренцию лазерным.
 Find the equivalents in two languages (Найди эквиваленты в двух языках)
5	. daisywheel printer 6 А. точечно-матричный принтер
6	.dot-matrix printer 9 В. струйный принтер
7	.impact printer £ С. принтер бесконтактной печати
53
8	.non-impact printer D. термографический принтер
9	.ink-jet printer 7 Е. принтер контактной печати
5 F.лепестковый принтер
	Complete the sentences with the proper word (Закончите предложения подходящим по смыслу словом)
10.	A grid of crystals and polarizing filters to show the image are used in	
11.	If the number of pixels is small the resolution is.
12.	The monitor is controlled by a separate circuit board, known as
13.	Printers using methods that do not require mechanical contact between the print head and the paper are known as--
14.	Printers that scan the image with a laser beam and transfer it to paper with a special ink powder are known as....
15.	Non-impact printer which uses heat, a special kind of paper and electrosensitive methods is.....
16.	Monitors and printers are the most common..
17.	The study of human factors related to computers is.
18.	If computer users don’t want to ruin their experience there are a number of things they can do to take care of...........
. * Choose the right variant (Выберете правильный вариант)
19.	We get flickering screen if.is low
A. Pixel	B. Dot
J C. Refresh rate	D. Display
20.	The picture tube of the display which is made of glass and contains a vacuum is...
A. Display adaptor	d B. Cathode ray tube
C. Monitor	D.. Video card
21....is known to exist between two computers if programs can
be run on both without any change
MA. Compatibility	B. Resolution
C. Refresh rate	D. Display adaptor
22.	A very common graphics output device which is used to make different types of engineering drawing is.
_ i
54
A. Thermal printer	J B. Plotter
C. Inl-jet printer	D. Dot-matrix printer
23.	Л flickering screen can cause.
A. Carpal tunnel syndrome ^B. Eyestrain
C. Back injury	D. Immune system diseases
24.	Ink-jet, laser and thermal printer are known as.
J A. Non-impact	B. Impact
25......is used to give a permanent copy of a document.
A. Monitor	J B. Printer
55
UNIT V
STORAGE DEVICES
INTRODUCTORY TEXT
Information stored in the RAM is lost when the computer is turned off. Because of this data and applications are stored in either hard or
floppy disks that provide a more permanent backing store.
Floppy disks are called so because they consists of flexible plastic material which has a magnetizable surface. Sizes vary, but 3.5-inch diameter disks are the most popular.
The surface of a floppy disk is divided into concentric circles or ‘tracks’, which are then divided into ‘sectors’. When you insert a blank disk into a disk drive, it must be ‘initialized’, or formatted, before information can be recorded onto it. This means that magnetic areas are created for each track and sector, along with a catalogue or ‘directory’ which will record the specific location of files.
Hard disks have important advantages over floppy disks: they spin at a higher speed, so you can store, retrieve information much faster than with floppies. They can also hold vast amounts of information, from 20 MB up to several hundred gigabytes. Apart from this, both types of disks work in the same way.
When buying a hard disk you should consider the kind of drive mechanisms and products available. There are ‘internal’ and ‘external’ irives which are both fixed hard drives, i.e. rigid disks sealed into the drive mit, either within or attached to the computer. A third type of hard drive, mown as ‘removable’, allows information to be recorded on ‘cartridges’, vhich can be removed and stored off-line for security purposes. These systems provide 80 Mb tol GB transportable cartridges, so if you can afford t, a removable drive gives you a great deal of extra storage capacity.
The development of optical technology has resulted in mass storage nedia such as CD-ROM drives and erasable optical disks. Optical storage levices give us immediate access to an enormous amount of information, lundreds of megabytes of software, images, animation, and digitized ound can be recorded on one light, durable optical disk. Basically, there re three main types of optical disks: WORMs, CD-ROMs and erasable ptical disks.
56
WORM stands for ‘write once, read many’, WORM disks are called because they are indelible, i.e. they cannot be erased. For tl, reason, they can last 100 years, and this technology is very useful > ‘permanent’ archiving of important documents in fields like medicine. or history. Each WORM disk can hold one gigabyte of information.
CD-ROM system offers everything, from enormous sharewa collections to large dictionaries, from multimedia databases to font faintf and graphics. Companies and government agencies have discovered i| t CD-ROM is the most economical way of sharing information. In fact. , CD-ROM disk (650 MB) can replace 300,000 pages of text (about ' floppies), which represents a lot of saving in distributing materials . corporate databases. Yet CD-ROM technology has some disadvantag You cannot write anything onto a CD-ROM disk, nor can you change w is imprinted on it. You can only ‘read’ it like a book. Another reason v CD-ROM is not widely used for ‘personal’ data storage is that CD-RC drives are slow. They are fast enough for reading CD-ROM disks and a? CDs but are too slow when compared with hard drives.
Erasable optical disks usually hold between 120 and 1,000 MB data in 3.5” or 5.25” disks. Unlike CD-ROMs and WORMs, eras?
8-	seal	л
9.	attach
10.	erasable
11.	immediate
12.	durable
13.	indelible
14.	permanent
15.	shareware
16.	imprint
17.	secondary storage device
18.	affect
57
запечатывать, герметически закрывать
прикреплять, прикладывать стирающийся
немедленный, непосредственный, прямой
надежный, долговечный, устойчивый
нестираемый
постоянный, неизменный условно-бесплатное ПО («попробуй, перед тем как куп ить»)
запечатлевать
внешнее запоминающее устройство
воздействовать, влиять
optical disks (EOD) are rewritable, i.e. we can write on them in tfie s:’"xerCISES way as a hard disk. They are mainly used as secondary storage devY
functioning as file servers or as a second storage unit, accompanying h L Read the introductory text and fill in the table disks. EOD have two important advantages over hard disks: they are
affected by magnetic fields, and they have a longer data life. Howe optical drives are slower than hard drives.
TOPICAL VOCABULARY
	Available types	Pros	Cons	Use/Purpose
loppy disk				—	—	
arddisk						
'Ptical disk			—.—					—	_		
1. backing store	хранение на внешних носителя:
2. flexible	гибкий, подвижный
3. surface	поверхность
4. blank	пустой, чистый
5. spin	крутить(ся), вертеть(ся)
6. retrieve	восстанавливать, исправлять
7. rigid	жесткий, твердый, неподвижнь
2, Compare these storage devices summing up the information of
>e table and using the following expressions:
V Like...	Both...
J Unlike...	...is different to...
jIn comparison	with...	....whereas...
hi contrast to...	...is similar to...
58
59
Obviously, the latest 15.000RPM drives and 10,000RPM drives can more data than the latest 7,200RPM drives, so if absolute bandwidth !,V necessity for your applications, you have little choice but to get the die drives. Also, if you need low latency, faster drives are better; not феу usually have lower average seek times, but also the rotational h is one place where slow-spinning drives can never beat a faster one.
average rotational latency is half the time it takes to rotate the drive ce- thus, it is 2 milliseconds for 15,000RPM, Sms for 10,000RPM drives, ’ms for 7,200RPM drives and 5.6ms for 5,400RPM drives.) Latency is •k time plus rotational delay. You can achieve similar or even better ults by using the ccd (concatenated disk) driver to create a striped disk av out of multiple slower drives for comparable overall cost.
Make sure you have adequate air flow around the drive, especially if j are going to use a fast-spinning drive. You generally need at least 1/2" 25cm) of spacing above and below' a drive. See where the air flows in, J put the drive where it will have the largest volume of cool air flowing !lund it. You may need to seal some unwanted holes or add a new fan for Active cooling.
3. Read and translate the text. Before reading study the mean;, of some abbreviations which you come across in the text.
SCSI (Small Computer System Interface) - интерфейс малых вычислительных систем
MB (megabyte) - мегабайт, Мбайт, Мб
SCA (Single Connector Attach) - - одноразьемный подключе ID (Integrated Drive) - интегрированный накопитель
RPM (Rotations per minute) - оборотов в минуту ccd (concatenated disk) - сцепленный диск
> Make the list of unknown words and compare it with another student.
SCSI HARD DRIVES
As mentioned in the SCSI section, virtually all SCSI hard drive today are SCSI-2 compliant and thus will work fine as long as you ci them to a supported SCSI host adapter. Most problems people eno are either due to badly designed cabling (cable too long, star top.	.,	.
aic ci ci	у ь ° v	, Another consideration is noise. Many 10,000 or faster drives eenerate
etc) insufficient termination, or defective parts. However, then .	d Л v,y w. id.>tci wives generate
, .	. . . i -	мь™ мт.	whine which is quite unpleasant to most people. That, plus
Г may T	61,5 »«“ for cooling may make 10,000 or fas,er drives
SCSI hard doves for your system.	uitable for some office and home environments
Rotational speed: Rotational speeds of SCSI drives sold today i-	. _
from around 4.500RPM to I5.000RPM. Most of them are either 7,20» F»™	SCS dnves sold today are of3.5" form factor,
or 10000RPM, with I5.000RPM becoming affordable. Even tho„t2. „ ® in .’ /,Т elgbts ( hal -height ) or I" ( low-?0,00>RPM drives can generally transfer data faster, they run eonsidt^	d"Ve.'S "'l	’ CDROM drive,
ho ter than their 7.200RPM counterparts. Л large fraction of today'’™'™'e men,,0,,ed P™’OTS “T"' .	,	, Л i.r	,i ,u nave three standard 3.5 drive bays, vou will not be able to out three
drive malfunctions are heat-related. If	drives in there (without frying them, that is),
your PC case, you may want to stick with 7,200RPM or slower drive,,	3 =	>
Note that newer drives, with higher areal recording densttit-	SCSi taid Aives sold today are Ultra,
deliver muchWe bits per rotation than older ones. Today's	SCS1 The firs* Ultra3z0 host adapters and devices
7 200RPM drives can sustain a throughput comparable to 10,QU ТПь^.л e	bandwidth of Ultra SCSI is 20MB/sec,
drives of one or two model generations ago. The number to find on ti 3’ТГ ? “	U °	160MB/sec and
sheet for-bandwidth is 'internal data (or transfer) rate’. It is usr Can	3-0MB/sec. There is no difference in max cable
megabits/sec so divide it by 8 and you will get the rough approxima ’	tra and Ultra-wide; however, the more devices you have
how much megabytes/sec you can get out of the drive.	Same bus’ the sooner У°и wil1 start hav|ng bus integrity problems.
61
Unless you have a well-designed disk enclosure, it is not easy |., ,
more than 5 or 6 Ultra SCSI drives work on a single bus.
If you want to connect many disks, get wide or Ultra 160 SCSI ц they usually cost a little more but it may save you down the road.
There are two variant of wide SCSI drives; 68-pin and 80-p >, (Single Connector Attach). The SCA drives do not have a separate power connector, and also read the SCSI ID settings through the connector. If you are really serious about building a large storage ч get SCA drives and a good SCA enclosure (dual power supply with a one extra fan). They are more electronically sound than 68-pin count,’ and they arc easier to install too.
How much information can be held in the high density disks , ned in the conversation?
еППс How much was a pack of ten high density disks? How much did she pay altogether?
У Paul is interested in CD-ROMs. He has gone to his local uter shop to ask for some information.
mPRead the sentences below, and as you listen put a cross next to Which contain a technical mistake. Then listen again and rewrite iese sentences with the correct information.
> Now read the sentences and say if they are true or false,
1.	Fast drives need good ventilation system.
2.	Fast drives have less rotational delay than slow-spin drives.
3.	Cooling system is the only problem to take into account befon-purchase fast drives.
4.	3.5" form factor is the only available form of SCSI hard drives.
5.	It does not matter how many de vices you have on the same bus.
6.	All SCA drives have a separate 4-pin power connector.
1	A CD-ROM disk is very different from a compact music disk.
2.	You need a hard disk to read CD-ROM disks.
3.	The data on a CD-ROM is read with a laser beam.
4-	A typical CD-ROM disk can hold 100 MB.
5.	The data on a CD-Rom can be changed or ‘written’ to.
6.	A CD-ROM is a good way of storing large amounts of information (images, sounds, applications, etc.).
7.	CD-ROM drives cannot play audio CDs.
> Read the text again and sum up the information o| passages in the number of sentences given below.
Rotational speed: 1... 2... 3...4...5...
Form factor: 1... Interface: 1...2...3...
DISCUSSION
Working in pairs make up dialogues deciding which of the products would be most suitable for the purposes below. Discuss the pros id cons with a partner.
1.
2.
3.
LISTENING SKILLS
roducts available
D-ROM drive (each CD disk holds650 MB)
v	_	'movable cartridge drive (when you need additional storage you simply
" Sue is in a shop. Listen to the conver.у another 45or 88 MB transportable hard disk enclosed in a plastic and answer these questions.	rtridg^)
.	ard disk drive (superfast 12ms hard drive. Capacity ranges from 40 to
What type of disks did Sue want to buy - hard or floppy? )Q MB) Did she mention a particular make of disk?
What size disk did she ask for?
asable optical disk system (Rewritable 3.5”floptical disks with a storage Pacityof 128 MB)
63
62
DAT Data tape drive (digital audio tape drives to store computer data | for back-up purposes. Slow access. Huge amounts of information)
Problems to decide
To store data and programs at home.
To hold large amounts of information in a big company.
To store an illustrated encyclopedia for children.
To store historical records in the National Library.
2.
3.
4.
Useful expressions
For personal use, I would recommend...because...
In a big company, it would be a good idea to...
However, ...is good for an encyclopedia because...
Well, that depends on...
I agree/ disagree with you. CD-ROMs...
Besides, ...
SUPPLEMENTARY READING
SEAGATE BARRACUDA 7200.7
In a fashion that surprised some watchers, Seagate quickly followed the Barracuda ATA V with the Barracuda 7200.7. The former series, P °"ts gg gigabyte platters, represented somewhat of a transitional product Seagate ramped up production of units with 80 GB platters, a size S arded as more "standard" by the industry.
The Barracuda 7200.7 family delivers a somewhat confusing array of ng configurations. All feature 80 gigabytes per platter and specified  5 millisecond random read seek times. The standard ATA-100 units, [able in sizes from 40 GB to the flagship 160 GB, come with a 2-negabyte cache. The ATA-100 "Barracuda 7200.7 Plus" comprises 120 ]B and 160 GB models with 8-megabyte buffers. Finally, serial ATA ersions spanning 80 GB to 160 GB come standard with 8 megabytes. Notably absent on the 7200.7 is the "SeaShield,” a metal plate found on arlier models that protected electronics mounted along the underside Tinted circuit board. Keep in mind that the SATA 7200.7 does not feature traditional 4-pin molex power connector but rather requires the new L-haped SATA power connector either incorporated on the power supply rare) or through an adapter (found in some retail SATA controller kits).
Over the last three years, hardware enthusiastsI increasing disappointment as Seagate took the respt
FINAL TEST
watched with
Barracuda name and slapped it onto successive series of drives featii more and more mundane performance. Though the Barracuda ATA IV V featured impressively low noise floors, their performance in category leaders Western Digital and Hitachi by significant margins. A purchasing a Barracuda ATA drive did so for its low noise, not its lea performance.
W. Put the following sentences in the same sequence as the information is arranged in the introductory text (Расположите следующие предложения в гой же последовательности, в акой информация представлена в вводном тексте)
With the serial ATA 'Cuda V, Seagate finally debuted a c featuring an 8-megabyte buffer as well as the only drive to esche PATA-to-SATA bridge. While this first attempt exhibited s improvement over the standard parallel ATA (2-meg) unit, the S? Barracuda nonetheless trailed WD's and Hitachi's disks by a signif margin.
L A. EOD have some advantages over hard disks.
,.уЙ. Floppy disks are divided into tracks and sectors for storing information.
C. WORM disks are suitable for storing archives.
pD. Hard disks are faster than floppies.
64
65
 Which sentence can be used in the annotation to the text «Sf
hard drive» (Какое предложение может быть использовано в . Find the equivalents in two languages (Найдите аннотации к тексту)	,квиваленты в дву х языках)
2.	A. Rotational speed, form factor and interface should be taken lr account in using SCSI hard drives.
<B. The text gives valuable information on the factors mostly important in using SCSI hard drives.
C. The text sum up the information about SCSI hard drives.
 Give the right English equivalent to the following Russiai sentence (Дайте верный английский эквивалент русскому предложению)
Убедитесь, что ваш дисковод установлен в том месте, где он получает достаточное охлаждение.
3.	A. Make sure you have adequate air flow around the drive, especially you are going to use a fast-spinning drive.
B. See where the air flows in, and put the drive where it will have the largest volume of cool air flowing around йДМакс sure your drive situated so that it has adequate volume of cool air flowing around
• Give the right Russian equivalent to the following Englisl sentence (Дайте верный русский эквивалент английскому предложению)
5. immediate	" А. стирающийся
6. indelible	В. гибкий
7 rigid	J С. неизменный
8. durable	1 D. жесткий
9. permanent	g Е. нестираемый
10. flexible	? F. надежный
11. erasable	S G. немедленный
	Н. легкий
Complete the sentences with the proper word (Закончите федложения подходящим по смыслу словом)
12.	Hard or floppy disks are used for permanent...
13.	Tracks and sectors are marked on the floppy disk..
14.	The monitor is controlled by a separate circuit board, known as
15.	Some software which is free of charge (‘try before buy’) is ailed	
16.	Disks without any record are ....
17.	WORM stands for..........
18.	If we can write different information on disks again and again
iey are called........
Note that newer drives, with higher areal recording densities, car. „ deliver much more bits per rotation than older ones.
44. А. Обратите внимание, что новые дисководы с увеличение» £-записывающей способностью могут обрабатывать намного болылк {nput битов за вращение, чем старые дисководы.
В. Помните, что усовершенствованные дисководы имеют увеличенную записывающую плотность и могут поставлять больв. Imprinted битов за вращение, чем старые дисководы.	. Sealed
С. Обратите внимание, что старые дисководы могли	21. Hard disks are
обрабатывать больше битов за вращение, чем новые с увеличенное. Written записывающей способностью.	Affected v
Choose the right variant (Выберете правильный вариант)
19.	When data are incorrect the user should
. t	'IB. Retrieve
 Attach	D. Store
20.	The user can’t change what is.on WORM disks.
.		1 u	B. Read
D. Spinned by magnetic fields.
B. Attached D. Surrounded
them.
ftft
22.	If the hard disk is considered ‘internal’, it means that it is ..........into the computer.
A. Attached	JB.	Sealed
C. Imprinted	D.	Spinned
23.	CD-ROM drives are....then hard drives.
A. Faster	v'B.	Slower
24.	Floppy and hard types of disks work.
J K. In the same way	B. In quite different ways
C. Slightly different
25.	Erasable optical disks are mainly used as.
J A. Secondary storage devices B. Backing store
67
UNIT VI
BASIC SOFTWARE
INTRODUCTORY TEXT
Information provided by programs and data is
known as software. Programs are sets of instructions that make the computer execute operations and tasks. There are two types of software :
The system software refers to all the programs which control the basic functions of a computer. They include operating systems, system utilities (e g. an anti-virus program, a back-up utility) and language translators (e.g. a compiler- the software that translates instructions into machine code).
The applications software refers to all those applications - such as word processors and spreadsheets - which are used for specific purposes. Applications are usually stored on disks and loaded into the RAM memory when activated by the user.
The operating system is the most important type of system software. It is usually supplied by the manufacturers and comprises a set of programs and files that control the hardware and software resources of a computer system. It controls all the elements that the user sees, and it communicates directly with the computer. In most configurations, the OS s automatically loaded into the RAM section when the computer is started rp.
System utilities are small programs which improve a system's terformance and help users take advantage of the computer's capabilities. They are often desk accessories that can be called up while you're working n another application. They can also be INITs — i.e. system extensions vhich are activated when you turn on the computer; control devices which ou adjust in the control panel, or even stand-alone programs that run «’hen you need them. Utilities are available for back-up, file search, virus rotection, disaster recovery, and so on.
Spreadsheets are application programs for financial planning which How the user to analyse information presented in tabular form, by ianipulating rows and columns.
Word processor is an application that manipulates text a produces documents suitable for printing. Three major features that w, processors offer are checkers. Two more mail merging.
spell checkers, online thesauruses and grainy important features are automatic hyphenation 5
TOPICAL VOCABULARY
1.	software
2.	operating system
3.	back-up utility
4.	compiler
5.	application
6.	word processor
7.	spreadsheet
8.	comprise
9.	desk accessory
10.	system extension
11.	adjust
12.	row
13.	spell checker
14.	online thesaurus
15.	grammar checker
16.	hyphenation
17.	mail merging
69
писем слиянием, слияние
писем
выпускать
jg release
19 database management system система управления базой данных
exercises
Read the description of word processor features and name these features
Splitting of a word between two lines so that the text will fit better >n the page.
It is responsible for the explosion of ‘personalized’ mail. By lesignating what information goes into which blank space, a computer can >rocess a huge amount of correspondence substituting the ‘personal’ nformation into a form letter.
This feature helps the user look up different words for using them in imilar instances. It contains definitions and suggestions of words with imilar and opposite meanings.
It can be used to compare words in the program’s dictionary to those sed in the user’s document.
It counts words in sentences to flag possible run-on sentences, looks эг words that show possible conflicts between verbs and subjects and ffers advice about corrections.
программное обеспечение операционная система резервная утилита, сервисная программа
компилятор, транслятор приложение, прикладная программа текстовый процессор электронная таблица содержать, охватывать, вмещать экранная принадлежность расширение системы
рейдировать, устанавливгГРЩитпШ. For help use the glossary, ряд программа проверки орфографии
сетевой словарь, справочки программа грамматически' контроля
разбивка текста по слогам расстановка переносов формирование стандартны
Find to the terms in Column A the proper explanation from
А Database
database program
В
- a set of systems programs which allow the data from a database to be used by a number of different application programs;
- a file of structured data;
ffetabase management system - an application program used to
70
71
1987: Windows 2.0
> What else do you know about databases and their basic features? Which tasks can be performed by using a database? Make list of possible applications.
store, organize and retrieve a ia,, collection of data.
3. Read about Windows operating system.
Windows 2.0 took advantage of the improved processing speed of the Intel 286 processor, expanded memory, and inter-application communication capabilities made possible through Dynamic Data Exchange (DDE). With improved graphics support, users could now early Interface overlap windows, control screen layout, and . n„ „	, ... л .... .	„	. nS nO(,r product preceded use keyboard combinations to move rapidly
Many longtime PC users trace the Microsoft Windows® operating sy^.anager pri e	z
„ У .лол . rur , n и с .	>	• windows I-0 GUI. through Windows operations. Many developers
to the 1990 release of Windows 3.0, the first widely popular version e Wtnaow	b
iv- i .. a m г *	cur i	nA	„ Лр;г first Windows-based applications for this release.
Windows and the first version of Windows many PC users ever trirote tneir m»1
However, Microsoft initially announced the Windows product seven y<-earlier and released the first version in 1985.
1990: Windows 3.0
1985: Windows 1.0
Program Manager, File Manager, and Print Manager.
A completely rewritten application development environment.
An improved set of Windows icons.
popularity of Windows 3.0 grew with the release of a new Windows
ie third major release of the Windows platform from Microsoft offered iproved performance, advanced graphics with 16 colors, and full support of тт, t . e ,	., , P more powerful Intel 386 processor. A new wave of 386 PCs helped drive
The first version of Windows provided a nfemorepuw
„	.	_	,	, .	, p nonulantv of Windows 3.0, which offered a wide range of useful features
software environment for developing and runnr j applications that use bitmap displays and nwd lties’1ПС u pointing devices. Before Windows, PC users relied
The Windows i.o productive. MS-DOS® method of typing commands at the box featured the operating prompt (C:\). With Windows, users moved a mouse windows andWgraph!ealV°int aIld C,ick their WaY thrOUgJ1 tasks> Such user interface (GUI). starting applications.	ie
In addition, Windows users could switch anwftware development kit (SDK), which helped software developers focus se veral concurrently running applications. The product included a sei ore on writing applications and less on writing device drivers.
desktop applications, including the MS-DOS file management program calendar, card file, notepad, calculator, clock, and telecommunicatu programs, which helped users manage day-to-day activities.
1995: Windows 95
indows 95 was the successor to the three existing general-purpose sktop operating systems from Microsoft—Windows 3.1, Windows for «^groups, and MS-DOS. Windows 95 integrated a 32-bit TCP/IP ransmission Control Protocol/Intemet Protocol) stack for built-in ternet support, dial-up networking, and new Plug and Play capabilities at made it easy for users to install hardware and software.
72
The 32-bit operating system also offered enhanced multii^ nl products capabilities, more powerful features for mobile computing, and integr^^ networking.	e
would be based on the Windows NT and Windows 2000
1998: Windows 98
2000: Windows 2000 Professional
e

Windows 2000 Professional was designed to replace Windows 95, Windows 98, and Windows NT Workstation 4.0 on all business desktops and laptops. Windows 2000 added major improvements in reliability, of use, Internet compatibility, and support for mobile computing.
Windows 98 was the upgrade from Windows 95. Described as operating system that "Works Better, Plays Better," Windows 98 was first version of Windows designed specifically for consumers.
With Windows 98, users could find information more easily on their } as well as the Internet. Other ease-of-use improvements included jse __ ability to open and close applications more quickly, support for readrnong other improvements, Windows 2000 Professional simplified DVD discs, and support for universal serial bus (USB) de vices.	ardware installation by adding support for a wide variety of new Plug and
1999: Windows 98 Second Edition	]ay hardware, mclu^g advanced networking and wireless products,
SB devices, IEEE 13^94 devices, and infrared devices.
Windows 98 SE, as it was often abbreviated, was an incremental updatt Windows 98. It offered consumers a variety of new and enhan; hardware compatibility and Internet-related features.	I/ /
Windows 98 SE helped improve users' online experience with the Inicr.
Explorer 5.0 browser technology and Microsoft Windows NetMeetm 3.0 conferencing software. It also included Microsoft DirectX® API t, which provided improve support for Windows multimedia, and offe home networking capabilities through Internet connection sharing (It Windows 98 SE was also the first consumer operating system fT Microsoft capable of using device drivers that also worked with Windows NT business operating system.
2001: Windows XP
With the release of Windows XP in October 2001, Windows"15 Microsoft merged its two Windows operating system lines for consumers and businesses, uniting them around the 'indcws2000 code base.
The "XP" in Windows XP stands for "experience," symbolizing the novatrvfrexperiences that Windows can offer to personal computer users, ith Windows XP, home users can work with and enjoy music, movies, essaging, Snd photos with their computer, while business users can work larter ЙПЙ faster, thanks to new technical-support technology, a fresh .	.....	.	„.. .	er interface, and many other improvements that make it easier to use for
2000: Windows Mdlennium Edition (Windows Me)	V)Cje rangeof tasks
Designed for home computer users, Windows Me offered consult numerous music, video, and home networking enhancements reliability improvements.
For example, to help consumers troubleshoot their systems, the Sys'w7™?^,XP Professional brings the solid foundation of Windows Restore feature let users roll back their PC software configuration to a 4^	desktOp’ cnhancmg liability, security, and performance,
or time before a problem occurred. Windows Movie Maker provided uC^^Y,Sual des,gn’ W,ndows XP Professional includes features for with the tools to digitallv edit, save, and share home videos. And "T advanced. home computing, including remote desktop Microsoft Windows Media® Player 7 technologies, users could fi2j?fenCryptl"g f,,e1_system’ and SySte™ restore and advanced organize, and play digital media easily.	< .“3features- Key enhancements for mobile users include wireless
Windows Me was the last Microsoft operating system to be based on ” networkmg suPPort’ Windows Messenger, and Remote Assistance.
Windows 95 code base. Microsoft announced that all future opera!
2001: Windows XP Professional
74
75
Windows XP Home Edition offers a clean, simplified visual design	. omnuter viruses
makes frequently used features more accessible. Designed for home ц. To protect your system agains P the product offers such enhancements as the Network Setup V/i'	,	.1	>	. n,s
Windows Media Player, Windows Movie Maker, and enhanced d, > Listen t0 LUCy B°yd’ V®	k Л L™
photo capabilities.	Jsheet programs and say whether the statements right or wrong.
’r
2002: Windows XP Tablet PC Edition , A spreadsheet program displays information in the form of a table, with a lot of columns and rows.
? In a spreadsheet you can only enter numbers and formulas.
The long-held industry vision of mainstream pen-ba2‘ ° preadsheet you cannot change the width of the columns.
computing became a reality when Microsoft unveiled 3 П rA„4cheet programs can produce visual representations in the form of Windows XP Tablet PC Edition in November, 2002. $Рге
logical evolution of notebook computers, Tablei . P’e c a, s’
include a digital pen for handwriting recognition capabilities, yet Ca‘5. Spreadsheets cannot be used as databases.
used with a keyboard or mouse, too. In addition, users can run $ existing Windows XP applications. The result is a computer that is ф versatile and mobile than traditional notebook PCs.	& A
DISCUSSION
LISTENING SKILLS
Working in pairs make up dialogues discussing the following problems.
I. Your friend has bought a computer and it is necessary to install basic software. Recommend him some system and applications software
> Listen to four advertisements from describing its features.
radio programme about computers,
Number the system utilities below in 2. Your friend is going to type his course paper. Advise him to the order in which you hear them, use word processor and explain its superiority to traditional typewriter.
□ screen saver
□	virus detector
□	crashed disk rescuer and data recovery
□	printing aid
3. Discuss operating system on your computer with your partner make notes of its advantages. Ask your partner about his operating system.
> Which utility would you use for each of the^W^J^^L SUPPLEMENTARY READING requirements?
\УГМГ^СТНЕ GRAPHICAL USER INTERFACE
1	To work on one document while another is printing.	у
2	To diagnose and repair damaged disks.	The term user interface refers to the standard
3	To automatically, blank out the screen after a specific interval of inact: ^rocfediires the user follows to interact with a particular computer. A few time (so that the image does not burn into the screen).	Уеад»ago, the way in which users had access to a computer system was
duit<5 complex. They had to memorize and type a lot of commands just to
see the content of a disk, to copy files or to respond to a single ргоп щ, fact, only experts used computers, so there was no need for a user-friCr interface. Now, however, computers are used by all kinds of people ,-ц, a result there is a growing emphasis on the user interface.
> A good user interface is important because when you buy a pro?, you want to use it easily. Moreover, a graphical user interface saves ;i of time: you don’t need to memorize commands in order to execute application; you only have to point and click so that its content appears the screen.
Macintosh computers - with a user interface based on graphics ,, intuitive tools - were designed with a single clear aim: to facilitate inaction with the computer. Their interface is called WIMP: Window, [C( Mouse and Pointer and software products for the Macintosh have b-designed to take full advantage of its features using this interface-addition, the ROM chips of a Macintosh contain libraries that provi program developers with routines for generating Windows, dialog boxt icons and pop-up menus. This ensures the creation of applications witr high level of consistency.
Today the most innovative GUIs are the Macintosh, Micros 06eci Windows and OS/2's graphical Presentation Manager. > These tin coot platforms include similar features: a desktop with icons, Windows a folders, a printer selector, a file finder, a control panel and various de accessories. Double-clicking a folder opens a window which coniai programs, documents or further nested folders. At any time within a folu you can launch the desired program or document by double-clicking 11 icon, or you can drag it to another location.
The three platforms differ in other areas such as device installable network connectivity or compatibility with application programs.
These interfaces have been so successful because they are extreme easy to use. It is well known that computers running under an attract!' interface stimulate users to be more creative and produce high quai:Russian sentence (Дайте верный английский эквивалент русскому results, which has a major impact on the general public.	предложению)
FINAL TEST
Put the following Microsoft Windows® operating
In the same sequence as they appeared. (Расположите ^едуюшие операционные системы в той же последовательности °’. они появлялись)
1. A. Windows 2000 Professional.
. B. Windows 98
C. Windows 3.0
D. Windows XP
,,-Ij. Windows Millennium Edition
Windows XP Tablet PC Edition
• Among the software in the right column find those that can be nfejTedt0 those in the left: (Среди названий программного
* иДМНия в правой колонке найдите те , которые можно нфи к названиям левой:)
^ system utilities	A. desk accessory
applications software	В. payroll program
C. spreadsheet D. anti-virus program E. word processors F. editor
G. database program
Give the right English equivalent to the following
Хорошо известно, что компьютеры, работающие с Привлекательным интерфейсом, побуждают пользователей к более 'творческому сотрудничеству и приводят к более высоким Оезультатам.
78
4. A. It is well known that computers have attractive interface an(, users are more creative and the results are better.
B. It is well known that computers running under an attractive interb stimulate users to be more creative and produce high quality results.
C. Computers are well-know'n to run attractive interface that ц,. users to be more creative and have better results.
• Give the right Russian equivalent to the following EngIjS|, sentence (Дайте верный русский эквивалент английскому предложению)
Spell checker can be used to compare words in the progra, dictionary to those used in the user's document.
5. А. Программа проверки орфографии может быть исполгад для сравнения написания слов в документе пользователя со слов, программного словаря. Вероятно, что лазерные принтеры соси конкуренцию струйным.
В. Программа проверки орфографии может быть примене для сравнения слов программного словаря с теми, которые исполы в своем документе пользователь.
С. Программа проверки орфографии используется для сочг ния слов документа пользователя со словами программного словар
	Find the equivalents in two languages (Найдите эквиваэ ты в двух языках)
6. spreadsheet	А. прикладная программа
7. desk accessory	В. слияние писем
8. application	С. расстановка переносов
9. compiler	D. экранная принадлежность
10. utility	Е. текстовый процессор
11. hyphenation	F. электронная таблица
12. mail merging	G. сервисная программа
	Н.транслятор
79
	Complete the sentences with the proper word (Закончите р^дожения подходящим по смыслу словом)
13.	An anti-virus program refers to small programs improving a stem's performance which are called....
14.	Word processors and spreadsheets are the most common......
15.	Windows are considered to be the most widely spread ...
16-	A set of systems programs for using data by a number of different application programs is known as...
17.	Language translator for interpreting instructions into machine code is called	
18.	The first version of Windows operating system was released in
19.	The "XP" in Windows XP stands for...
20.	Spell checkers, online thesauruses and grammar checkers are three major features of.......
 Choose the right variant (Выберете правильный вариант)
21.	System utilities .... small programs which help users take advantage of the computer's capabilities.
A. Release	B. Comprise
C. Adjust	D. Display
22.	Windows operating system which includes a digital pen for handwriting recognition capabilities is called.
A. Windows 2000 Professional B. Windows XP
C. Windows XP Tablet PC Edition D. Windows Millennium Edition
23.	The standard procedures of interacting the user with a particular computer are referred to..
A. Spreadsheet	B.	Interface
C. Compiler	D. Desk accessory
24.....was the derivative from Windows 95.
A. Windows 98	B. Windows 3.0
C. Windows 2.0	D. Windows Me
80
25......is responsible for text fitting on the page
A. Hyphenation	B. Mail merging
C Spell checker	D. Grammar checker
SI
UNIT VII
COMPUTER LANGUAGES
INTRODUCTORY TEXT
Unfortunately, computers cannot understand ordinary spoken English or any other natural language. The only language they can
uti|erstand directly is called machine code: central processors operate on ccfes which consist of a series of binary digits (Is and Os). In this form, (^Instructions are said to be in machine codes.
qj However, machine code as a means of communication is very difficult to write. For this reason, we use symbolic languages that are eajrr to understand. Then, by using a special program, these languages translated into machine codes. For example, the so-called assembly ufeuages use abbreviations such as ADD, SUB, MPY to represent «Auctions. These mnemonic codes are like labels easily associated with :Mptems to which they refer.
Ж Basic languages, where the program is similar to the machine code vftion, are known as low-level languages. In these languages, each Aruction is equivalent to a single machine code instruction, and the digram is converted into machine code by a special program called an Aembler. These languages are still quite complex, and restricted to particular machines.
& To make the programs easier to write and to overcome the problem «intercommunication between different types of machines, higher-level linages were designed such as BASIC, COBOL, FORTRAN or IftSCAL. These languages are all problem-oriented rather than machine-®ented and can be converted into the machine codes of different types of jo-.puteis. Programs written in one of these languages (known as source «grams) are converted into a lower-level language by means of a mpiler (generating the object program). On compilation, each element in a high-level language is generally translated into many achine code instructions.
E People communicate instructions to the computer in symbolic Inguages and the easier this communication can be made the wider the fcplication of computer will be. Scientists are already working on
82
Artificial Intelligence and the next generation of computers may be ab|c, understand human languages.
TOPICAL VOCABULARY
1. machine code	машинный код, программа на машинном языке
	
2. binary	двоичный (представленный в двоичной системе счисления)
3. assembly language	ассемблер ( машинноориентированный язык)
4. assembler	ассемблер (программа, преобразующая исходный текст языке низкого уровня в исполняемый машинный код)
5. abbreviation	аббревиатура, сокращение
6. mnemonic code	мнемонический код
7. item	элемент данных
8. low-level language (LLL)	язык низкого уровня (предназначенный для прямого управления аппаратурой компьютера)
9. high-level language (HLL)	язык высокого уровня
10. to convert	преобразовывать
11. restricted	узкий, ограниченный
12. to overcome a problem	преодолеть, решить проблему
13. problem-oriented language (POL) проблемно-ориентированный язык	
	(предназначенный для решения задач в определённой предметш области)
14. source program	исходная программа
15. compiler	компилятор,транслятор
16. object program	объектная программа
к EXERCISES
» 1. Read the introductory text again and answer these questions:
i • What is called ‘machine code’?
•	What is the reason for using ‘symbolic languages’ in computers?
•	How can you characterize ‘low-level languages’?
•	Can you give examples of “high-level languages”? What are their advantages?
•	Do you think computers will be able to understand human languages?
2.Match each term in column A with its definition in column B:
.’Assembler
► Machine code.
. High - level mguage
. Assembly mguage
. Compiler
. Low-level language
7. Source code
a program that translates instructions from a high-level
language into a form that can be understood by the computer
a low-level symbolic code converted by an q assembler
a series of instructions written in a form that a computer can read and understand
a set of instructions for a computer program that a computer programmer understands and that are translated into instructions that a computer understands
a computer program that translates instructions from a low-level language into a form that can be understood and executed by the computer
a computer language that is made as similar as possible to a human language
a language close in form to machine code used for writing	i
computer programs
84
3. Read the text. Before reading translate into Russian the following international words used in he text:
I
Formula, mathematics, type, problem, program, structure, algorithmic, college, university, symbol, modern, logical, mathematical, concept, interactive, dialect, instruction	
Computers can deal with different kinds of problems but they nwq be given the right instructions. Instructions are written in one of the hiaj). level languages, for example, FORTRAN, COBOL, ALGOL, PASCAL. BASIC, or C. But a program written in one of these languages should be interpreted into machine code. Usually when one instruction written in a high- level language is transformed into machine code, it results in several instructions. A brief description of some high-level languages is given below. Each one has its advantages and disadvantages but some are better suited to particular types of work than others.
FORTRAN (FORmular TRANslator) Written in 1956, this is one of the oldest languages. It is particularly suited to solving problems using formulas in science, engineering and mathematics. Although it is widely used in these fields, it is not as suitable for business applications and is more difficult to learn than some other languages. It was really designed for use on mainframe computers using punched cards.
COBOL (Common Business Oriented Language) This is another of the older languages dating 1958. It is mainly used for business applications but is not as suitable for mathematics. This language is closer to English than the others and is therefore easier to read and write. However, programs written in COBOL tend to be very long.
ALGOL (ALGOrithmic Language) This language was written in 1958. It is suitable for business applications and is also good for mathematics. It is easy for understanding because of its very clear structure.
PASCAL This language, based on ALGOL, is named after famous scientist Blaise Pascal. It is a more repent language, dating from 1973. It is a general purpose language and is often used in colleges and universities as a teaching language. It is also commonly used for small business applications. Although it has a very clear structure, it is little more difficult to learn than some other languages.
LISP (LISt Processing) This language first made its appearance in 1959 It is designed for processing lists and symbols and is used for artificial
85
diligence research. A LISP program can improve itself each time it is
It is more flexible than other computer languages, however, it is difficult to learn.
^GO is another modem language derived from LISP which made its Appearance in 1969. It is a very simple language to learn and was designed te be used by very' young children. It encourages a logical, structured use ^language and has most often been used to teach mathematical concepts tch as angles.
^SIC (Beginers All-purpose Symbolic Introduction Code) was written
1964 as a teaching language. It is a general purpose language which is interactive i.e. data can be input while the program is running. It is quite &sy for beginners to learn and is very userfriendly e.g. it displays helpful foor messages to tell the user when he has made a mistake. But there are afferent dialects of BASIC, which makes it difficult to use the same program on two different makes of computer.
I C is developed to support UNIX operating system. C is a general-purpose language.
Other well known languages include FORTH, ALP, ADA, PL/1, PROLOG, RPG, COMAL and APT.
y, When a program is designed to do a specific type of work it is called application program.
.} > Find in the text equivalents to:
В иметь дело с, краткое описание, решать проблемы, Перфокарта, большая ЭВМ. пригодный для, язык общего назначения, вести начало от/ датироваться, искусственный интеллект, Допускать программу, появиться, происходить от, лёгкий в ^использовании, указание на ошибку, прикладная программа.
> Fill in the table.
Language	FORTRAN	COBOL	ALGOL	PASCAL	LISP	LOGO
Date						
Use						
I Features						
I Other I points						
86
> Complete the sentences choosing proper endings:
1.	FORTRAN is a high-level language, which is used for...
a)	supporting UNIX operating system;
b)	commercial purposes;
c)	solving scientific and mathematical problems;
2.	ALGOL is a high-level language, which is intended to...
a)	be used for commercial purposes;
b)	solve mathematical and scientific problems;
c)	be used by students who require a simple language to begin programming.
3.	COBOL is a high-level language, which is designed ...
a)	to solve mathematical and scientific problems;
b)	to be used for commercial purposes;
c)	to support the UNLX operating system;
5.	C is a high-level language, which is developed...
a)	to support the UNIX operating system;
b)	to deal with mathematical problems;
c)	for commercial purposes.
DISCUSSION
Complete the table by asking for information like this:
- What does “FORTRAN” mean?
-“FORTRAN” stands for...
- When was it developed?
- In....
- What's it used for? -It's used for...
- What features has it got? —It's a combination of algebraic formulae and English phrases. It's difficult to learn.
Answer your partner's questions too.
S$s for student A:		S7 Characteristics	Use/function
Uguage	Date of develop men!		
»Rt-®N (FOR-Kla R.AN-Ktion)	• 1954-56	• Has combination of algebraic formulae and English phrases. • Difficult to team.	• Problem-oriented language for scientific and mathematical use
Eobol	• 1958- 59	• • •	• Mainly used for business applications.
Rascal Blamed ter	•	• Structured language with algorithmic features designed for fast execution of the object program. • A fast compiler called TurboPascal was created in 1982. Von" popular.	ft ft
|logo - 1 I	• 1969	•	Easy to leant. •	Flexible: it can do maths, make lists, construct graphics. •	Its drawing capabilities allow children to construct simple graphics programs.	ft
'LISt Processing	• 1959	ft ft	• Developed to work on natural languages and Artificial Intelligence (АГ). • Suitable€or manipulating and analyzing text.
•PROLOG • Implemented by ...	•	• Has its roots in mathematical logic. • Programmers do not specify 'how' something is done, but 'what' is to be done, describing situations and problems.	ft ft
88
Notes for student B:
Language	Date of develop tnent	Characteristics	Use/Function	! I
• FORI RAN FORmula TRANslatio n;	1954- 56	• Has combination of algebraic formulae and English phrases. • Difficult to learn.	• Problem-oriented language for scientific , and mathematical use. 1
• Common Business (Oriented Language)	•	• Easy to read. • Able to handle very large data files. • Written in English.	I
• (Named after the famous scientist Blaise Pascal.)	1970- 73	•	• General-purpose. • Often used in colleges and universities to teach programming.
			
		•	
•LOGO	•	• • •	• Designed for use in schools to encourage children to experiment with programming.
•LISP •	•	•	Designed for processing lists and symbols (non-numeric data;. •	Numerous commercially available LISP implementations.	• 
• PROgram-ming in LOGic • Implemented by David Warren in the mid 1970s.	Early 1970s	•	•	for Al research. •	In Japan, was central to the development of fifth-generation computers.
89
К Г 5	LISTENING SKILLS
\ > Listen to Vicky Cameron, the Information Technology (IT) urer from Units 7 and 12, talking to her students about C Eiiage. Complete the table with the relevant information.
Jkyeloped by pin is Ritchie	Date	Characteristics	Uses	Extension 		Created to replace Originally C+C and 	 designed for 	 	 Object-The language is		 oriented small,	 Today it is Languages 	 used to....
p’s-	SUPPLEMENTARY READING
	>	FEED IN ENGLISH, Sjjp	PRINT OUT IN FRENCH
' Once upon a time, according to a much told story, a computer was it a task of translating ‘traffic jam’ into French and back into English, he machine buzzed, clicked, blinked its lights and eventually came up ith ’car-flavored marmalade’. Machine translation has come a long way nee then. Computer translation systems are now in use in many parts of le world.
With so many official languages, translating and interpreting take p more than 50% of the Community’s administrative budget. But Ithough the efficiency of machine translation is improving rapidly, there’s о question of human translators being made redundant. On the contrary, eople and machines work together in harmony. Today’s computers are of file value in translating literary works, where subtlety is vital, or the aoken word, which tends to be ungrammatical, or important texts, where
90
absolute accuracy is essential. But for routine technical reports, worki,-),, papers and the like, which take up so much of the translation workload the international organizations, computers are likely to play an increasing role. The method of operation will probably be for the machines to make^ rough version, which the translator will then edit, correcting obvi0(j5 mistakes, and where necessary referring back to the original.
If machines can translate languages, could they ever tea;}) languages? Yes say enthusiasts, although they doubt that the teacher could ever be totally replaced by a machine in the classroom. Good old teacher, know best!
 Put the following sentences in the same sequence as the information is arranged in the introductory text (Расположи ie следующие предложения в той же последовательности, в какой информация представлена в вводном тексте)
1. A. Programs written in assembly languages are translated into machine code by a special program called an assembler.
B.	It’s possible to expect the appearance of computers, which will be able to understand human languages.
C.	High-level languages make programs easier to write, modify and understand.
D.	Writing a machine code program takes a very long time is best left to experts
 Choose the right English equivalent to the following Russian sentence (Выберите верный английский эквивалент следующему русскому предложению).
2. Программу, написанную на одном из языков высокого уровня, следует преобразовывать в машинный код.
A. The program, written ijj one of high-level languages, should be converted into machine code.
91
EThe program, written in one of assembly languages, should be ^converted into machine code.
I The program, written in one of low-level languages, should be r converted into machine code.
i  Choose the right Russian equivalent to the following bglish sentence (Выберите верный русский эквивалент ёдующему английскому предложению)
К 3. Although the efficiency of machine translation is improving Vpidly, there's no question of human translators being made redundant.
[. Вследствие того, что эффективность машинного перевода быстро астёт, встаёт вопрос о том, что перевод, выполненный человеком, 1>льше не потребуется
L Хотя эффективность машинного перевода быстро растёт, не может (ыть речи о том, чтобы отказаться от переводов, выполненных ёловеком.
Несмотря на то, что эффективность машинного перевода быстро
меньшается, встаёт вопрос о том, чтобы отказаться от переводов, ыполненных человеком.
[•	 Find the equivalents
Эквиваленты в двух языках) М. low-level language
5.	to solve problems
6.	suitable for
7.	high-level language
8.	source program
in two languages (Найдите
А.пригодный для
В.	исходная программа
С.	решать проблемы
D.	язык низкого уровня
Е.	язык высоко! о уровня
 Complete the sentences with the proper word (Закончите предложения подходящим по смыслу словом)
9.	High level language, which is mainly used for business applications but is not as suitable for mathematics is called ...
10.	Codes which consist of a series of binary digits and which central processors operate on are known as...
11.	Basic languages, where the program is similar to the machine code version, are...
12.	A general-purpose language often used in colleges and universities as a teaching language is called...
92
13.	Computer languages, which resemble English to some extern are called...
14.	A general-purpose language, which is interactive, easy i;i. beginners and very user-friendly, is known as...
15.	Programs written in one of the high level languages are know., as ...
16.	Computer language developed to support the UNIX operating system is called...
17.	A computer program that translates instructions from a low-level language into machine code is called...
 Choose the right variant (выберите правильный вариант)
18.	The only language computer can understand directly is called.
A. Assembly language B. High-level language
C. Machine code	D. Low-level language
19.	LISP language was written in...
A. 1958	B.1973
C. 1964	D. 1959
20.	FORTRAN was really designed for use on...
A. minicomputers B. mainframe computers C.microcomputers
21.	... as a means of communication is very difficult to write.
A. symbolic language	B. machine code
C. high-level language	I), compilation
22.	High-level languages are usually...
A. problem-oriented	B. machine-oriented
23.	Computer language designed to be used by very young children is...
A. PASCAL	B. FORTRAN
C. ALGOL	D. LOGO
24.	High-level programming languages are...
A. BASIC, FORTRAN	B. assembly and	machine
Languages
93
UNIT VIII
DATA COMMUNICATION SYSTEMS
^72^
INTRODUCTORY TEXT
A multi-user system is made up of a number of terminals sharing a mainframe computer. Each terminal consists of at least one input device and
Eput device and allows the user to communicate with the computer.
|L There are a number of different types of terminals. For example, a Etype terminal is made up of a keyboard and a printer which gives a Kicopy output.
fe A VDU terminal has a keyboard and a screen. It usually has its own Kjmal processor which deals with the input'output and editing of data jd is, therefore, referred to as an intelligent terminal.
I A graphics terminal is similar to a VDU terminal but is specially feigned to display graphics such as pictures, maps, graphs, diagrams etc. ш has a lightpen attached to allow the user to ‘draw’ on the screen. It is Brmally used for Computer Aided Design.
'’Often a mainframe computer and its terminals are situated a long Stance apart. They may be in different rooms, buildings, cities or even Duntries. These remote access terminals are connected to the mainframe amputer by telecommunication links (e.g. telephone lines). Computers nd terminals connected together using telecommunications are known as data communications (or dataeomm) system.
" Dataeomm systems may also be formed from a number of computers nd peripherals connected together in a network. This allows software and ardware to be shared by a large number of users over long distances.
A network contained in a relatively small area, such as an office uilding, factory site or university campus, is known as a Local Area letwork or LAN. The two mam types of LAN are single cable networks nd loop networks.
If the network is connected over a large area it is called a Wide rea Network or WAN. This may be linked using telephone lines, ledicated lines are permanently connected to a system but dialed lines re only connected when needed. However, existing telephone lines are esigned to carry analogue signals and not the digital signals used by amputers. A special device is therefore needed at each end of the
94
telephone line to convert the signals to the correct form.nTiis device j<, known as a modulator/demodulator or modem. A special kind of modem known as an acoustic coupler has rubber cups into which an ordinary telephone can be plugged. Although this avoids having to make a special connection into the telephone system, it is more likely to suffer from corruption of data due to interference.
Modern telecommunications systems are being developed using fibre-optic cables. These allow data to be transmitted as pulses of light along thin strands of glass (about the thickness of a human hair). In this way; data can be communicated at very high speed, measured in bauds i.e bits per second. It also results in very low level of interference.
rData can be communicated over long distances and over water by using microwave radio links. These transmit and receive high frequency microwave signals using small dish aerials. Since there must be a clear path between these aerials, they are usually situated at the top of high towers.;
Data communications over long distances can make use of communications satellites, which are placed in fixed orbits above the Earth. The satellites receive signals from ground stations on the Earth, amplify the signals then retransmit them to other ground stations, which may be in another country or another continent.
The development of efficient data communications systems is an important aspect of the growth in information technology.
TOPICAL VOCABULARY
1.	apart
2.	remote access
3.	single cable network
4.	loop network
5.	dedicated line
6.	dialed line
7,	acoustic coupler
отдельно, порознь
дистанционный доступ, выборка однокабельная сеть
разветвленная сеть
специализированная линия
автоматическая линия, соединенная с
' компьютером когда требуется акустический коммутатор
95
8.	plug
9.	fibre-optic cable
10.	strand
11.	baud
12.	aerial
13.	amplify
14.	wave
вставлять штепсель (программная вставка)
оптоволоконный кабель
прядь,сгренга
бод (единица скорости передачи
информации)
антенна
расширять, усиливать
волна
EXERCISES
1.	Read the introductory text and answer the following questions.
What is meant by the word ‘terminal’? What types of terminal do you know?
Can you explain the meaning of the abbreviations LAN and WAN? Give the answer.
What device is used to connect a computer to a telephone line?
Is there any difference between dedicated and dialed line?
Is using telephone lines the only way of transmitting data? If not, name other means.
Which type of cable allows data to be transmitted as pulses of light?
How can you express the key idea of the text?
2.	Complete the tables.
Table 1.
Terminal	Components	Features
Teletype		
VDU		
Graphics		
Table )
Datacomm system
Components	Functions
1. Network	
2. LAN	
3. WAN	
4. Modem	
5. Fibre-obtics cable	
6. Microwave radio	
7. Communications satellite	
3.	Compare some things given below showing their similarity and contrast. Use the following expressions:
Like...
Unlike...
In comparison with...
In contrast to...
Both...
...is different to... ....whereas...
...is similar to...
	Dialed line, dedicated line
	Analogue signal, digital signal
v'" Local Area Network, Wide Area Network
	Ordinary telephone cable, fibre-obtics cable
	Microwave radio link, satellite link
	Input device, output device
	Impact printer, non-impact printer
97
4.	Look at the words and phrases in the box. Would you ciate them with e-mail, the Internet or both? If there any words don’t know , find someone in the class who can explain them to
erver log on search engine hyperlink home page bookmark ittachment graphics online inbox chat room newsgroup
> Work with a partner. Choose three of the words from the and write definitions for them. Close your books and exchange mr definitions with another pair of students. Can you remember the rms?
5.	Read the text and do the tasks given below.
INTERNET EXPLORER HISTORY
ь. —O In the early 90s—the dawn of history as far as the World s	КдаЙИ Wide Web is concerned—relatively few users were
Microsoft-communicating across this global network. In 1995, Internet Microsoft hosted an Internet Strategy Day and announced Ехп1оГРГ ’ts commitment to adding Internet capabilities to all its products. In fulfillment of that announcement, Microsoft ntemet Explorer arrived as both a graphical Web browser and the name or a set of technologies.
1995: Internet Explorer 1.0
n July 1995, Microsoft released the Windows 95 operating system, which hcluded built-in support for dial-up networking and TCP/IP (Transmission Control Protocol/Intemet Protocol), key technologies for connecting to the ntemet. In response to the growing public interest in the Internet, Vlicrosoft created an add-on to the operating system called Internet explorer 1.0. When Windows 95 with Internet Explorer debuted, the ntemet became much more accessible for many more people.
For Windows 95 Internet Explorer replaced the need for cumbersome, manual installation steps required by many of the existing shareware browsers.
98
1995:	Internet Explorer 2.0
In November 1995, Microsoft released its first cross-platform browser Internet Explorer 2.0, which supported both Macintosh and 32-bn Windows users.
With Internet Explorer 2.0 came a new set of fledgling Internet technologies that offered Web developers and designers the power |0 design secure, media-rich Web sites with tracking capabilties. Internet Explorer 2.0 technology introduced Secure Socket Layer (SSL) protocol as well as support for HTTP cookies, Virtual Reality Modeling Language (VRML), and Internet newsgroups.
1996:	Internet Explorer 3.0
In August 1996, Microsoft released its completely rebuilt Internet Explorer technology, which included features that were revolutionary for the tinn. Designed for Windows 95, Internet Explorer 3.0 technology offered useful components that immediately appealed to users, including Internet Mail and News 1.0 and Windows Address Book. Later, Microsoft Net Meeting^'; and Windows Media Player were added. Now the Internet Explorer browser could display GIF and JPG files, play MIDI sound files, and plav streaming audio files without the assistance of helper applications.
For Web developers, Internet Explorer 3.0 technology delivered a flexible programming model with a choice of scripting languages. Moreover, Internet Explorer 3.0 was designed to allow Web developers tfe extend it easily at a time when Internet standards were quickly evolving.
1997:	Internet Explorer 4.0
Designed for Windows 95, Windows 98, and Windows NT®, Internet Explorer 4.0 technology was a significant move forward. For Web developers, the addition of Dynamic HTML (DHTML) heralded the next step in Web design. DHTML gave Web developers more control over content and style and created opportunities that previously had been possible only with software applications.
Suddenly Web pages became much more interactive—users could expand menus with a click or drag images and objects around. The Web started to look more like the applications and games that people were accustomed to and less like a static series of pages.
With Internet Explorer 4.0, Microsoft Outlook® Express 4.0 was also installed for the first time as an upgrade to Internet Mail and News. This built-in component improved the way users sent, received, and organized their e-mail and address book.
99
I Internet Explorer 5.0
the September 1998 release of Internet Explorer 5.0 technology, ipers gained the ability to design richer Web applications. DHTML lities were expanded, giving Web developers more flexibility and to create interactive Web sites.
personalization became a key focus as Web applications based on 4L emerged. Users encountered rich applications on the Web—for >le, an expense report could automatically configure itself based on a personalized settings. With expanded programming capabilities such se, Internet Explorer 5.0 technologies helped user in a new era of e-erce.
Internet Explorer 6
st Explorer 6 technology was released with Windows XP in 2001 as e private, reliable, and flexible technology than previous versions, se privacy and security had become customer priorities, Microsoft nented tools that support Platform for Privacy Preferences (P3P), a >logy under development by the World Wide Web Consortium ).
From the home user simply browsing content on the Web, to the IT administrator deploying and maintaining a rich set of Windows Internet technologies, to the Web developer creating rich Web content, Internet Explorer 6 technologies provide the freedom to experience the best of the Internet.
>	Give synonyms to the following words from the text:
Beginning, main, answer, additional peripheral, available, huge, characteristic, at once, to attract smb., help, to develop, to announce, before, to be used to, to make better, to achieve, to appear, to face, former, to supply.
>	Sum up the information given about each Internet Explorer and express it in one sentence.
>	Using the following expressions write the annotation to the text:
The text deals with .1—
LISTENING SKILLS
> Listen to the interview with David Collins, the president of Videotex Lin^. He is explaining
videotex system to a journalist. Complete the jouftralist’s notes.
Videotex: interactive system of information.
Allows anybody with a telephone and appropriate equipment to access a wide range of services.
Need a........to be connected to a videotex network
To install a modem one cable of modem is connected to......
and the other to................................................
Public videotex system in Europe:
Neyv Prestel in the UK
Teletel in France
Ibertex in......................................................
Videotel in.....................................................
Specialized services offered by the French Minitel system:
Information services provided by videotex: current affairs, entertainment,......................................................
	101
> Listen to the interview with Tom Bryant, a writer with a mpuler magazine. Are the following sentences true or false?
1. ;vice. 2.	A pen-based interface uses an electronic stylus as an input Pen computers do not require specialized operating systems to
:ognize pen gestures and characters.
3.	Pen computers come with operating systems that can be trained
recognize handwriting.
4.	Some pen computers are more powerful than desktop PCs.
5.	A Personal Digital Assistant is a hand-field pen computer signed to organize and communicate personal information.
6.	You cannot transmit data from pen computers to desktop PCs d peripherals.
7.	Business people will make up a large section of the pen
> Read this extract from the interview and fill in the missing words. The first letters of each missing word is given.
Interviewer: Can you explain how a (1) p.......computer work?
Tom Bryant: Sure. A pen computer usually (2) r...on rechargeable
Interview	alkaline batteries. You hold the computer with one hand and with the other you use an electronic (3) s....... to write, draw and make selections on a flat LCD (4) s	 wer: That means it doesn’t have a keyboard.
Tom Bryant: That’s right. You write (5) i....with the stylus like a pen.
Interviewer: And how does the computer (6) r.......what you write?
Tom Bryant: It reads the (7) p......of the pen and sends signals to the
	screen. The computer then translates the movements of the pen into characters or performs the functions like ‘delete’. The operating system recognizes specific gestures.
i
102
103

DISCUSSION
Working in pairs make up dialogues discussing the following problems.
1.	You friend has just bought a computer and he is in doubt whether to use the Internet or not. Describe him pros and cons of this global net.
2.	One of you is going to send a letter to your friend using the posi
office. The task of the other student to advise him to use the e-mail.
3.	Can we balance the use of technology and real-life conversation'1 How?
SUPPLEMENTARY READING
THE LANGUAGE OF E-MAIL
'vgS***"*"*-w;  ,*
E- mail is the simplest and most immediate function of the Internet for many people. Run trough a list of questions that new e-mail users ask most and some snappy answers to them.
What is electronic mail? E-mail, as it’s normally shortened to, is just a message that is composed, sent or read electronically (hence the name). With regular mail you write your message (letter etc) and drop it off at the post office. The postal service then delivers the message and the recipient reads it. E-mail operates basically the same-way except that everything happens electronically. You compose your message using e-mail software, send it over the lines that connect the Internet’s networks and the recipient uses an e-mail program to read the message.
How does e-mail know how to get where it’s going? Everybody who’s connected to the Internet is assigned a unique e-mail address. In a way, this address is very' like the address of your house or apartment because it tells everyone else your exact location on the Net. So anyone; who wants to send you an e-mail message just tells the e-mail program the appropriate address and runs the Send command. The Internet takes over from there and makes sure the missive arrives safely.
 What’s this netiquette stuff I keep hearing about? The Net is a Kge, unwieldy mass with no ‘powers-that-be’ that can dictate content or fcndards. This is, for the most part, a good thing because it means there’s E censorship and no one can wield authority arbitrarily. To prevent this Eganized chaos from descending into mere anarchy, however, a set of juidelines has been put together over the years. These guidelines are Known collectively as netiquette (network etiquette) and they offer jtuggestions on the correct way to interact with the Internet denizens. To rive you the taste of netiquette, here are some highlights to consider.
•	• Keep your message brief and to the point andrriake sure you
t	clear up any spelling slips or grammatical gaffes before
г	shopping it out.
!	• Make sure the Subject lines of your message are detailed
If	enough so they explain what your message is all about.
h • Don’t SHOUT by writing your missive entirely in uppercase letters.
• Don’t bother other people by sending them test message. If you must test a program, send a message to yourself.
What’s a flame? The vast majority of e-rnail correspondence is civil and courteous, but with millions of participants all over the world, it’s nevitable that some folks will rub each other the wrong way. When this lappens, the combatants may exchange emotionally charge, caustic, often obscene messages called flames. When enough of these messages exchange hands, an out-and-out flame war develops. These usually bum hemselves out after a while, and then the participants can get back to more interesting things.
Is e-mail secure? In a word no. The Net’s open architecture allows programmers to write interesting and useful new Internet services, but it J so allows unscrupulous snoops to lurk where they don’t belong. In articular, the e-mail has two problems: it’s not that hard for someone else io read your e-mail, and it’s fairly easy to forge an e-mail address. If ecurity is a must for you, then you’ll want to create an industrial strength >assword for your home directory, use encryption for your most sensitive nessages, and use an anonymous remailer when you want to send something incognito.
t()4
FINAL TEST
 Find and match the pairs of expressions from the left and right columns that have the same meaning
(Найдите и соотнесите нары выражений из левой и правой колонки, обладающие одинаковым значением)
1.	modem
2.	baud
3.	telecommunication link
4.	fibre-optic cable
5.	terminal
6.	web
A.	telephone line
B.	network
C.	workstation
D.	bits per second
E.	modulator/demodulator
F.	thin strands of glass
Choose the sentences which are true to the information of
the introductory text (Выберете предложения, соответствующие информации вводного текста)
7.	A. Terminals of data communications system share the same software and hardware.
B.	Data communications over long distances can’t make use of microwave radio links.
C.	A graphics terminal is usually used for Computer-Aided Design.
D.	Telephone lines carry digital signals.
E.	Dish aerials are usually situated at the top of high towers.
F.	Any terminal has one input device and output device.
The main idea of the text« Internet Explorer History » can
be expressed as: (Главная идея текста может быть выражена как:)
8.	A. The development of Internet Explorers has a long history.
B.	The development of Internet Explorers made Internet more accessible for many people.
C.	The development of Internet Explorers makes Internet more accessible and their new versions opens more and more abilities for Internet users.
10>
Ж  Give the right Russian equivalent to the following English
•ord combinations (Дайте верный русский эквивалент Кглийским словосочетаниям)
£	9. dedicated	line	А. автоматическая линия
®	В. специализированная линия
к	С. разветвленная сеть
10.	loop network	А. однокабельная сеть
В. локальная сеть
С. разветвленная сеть
11.	data communications system А. система базы данных
В. система передачи данных
С. система хранения данных
 Give the right English equivalent to the following Russian word combinations (Дайте верный английский эквивалент
12.	акустический коммутатор
13.	однокабельная сеть
14.	графический терминал
15.	световое перо
16.	дистанционный доступ
 Complete the sentences with the proper word (Закончите предложения подходящим по смыслу словом)
17.	LAN stands for ...
18	converts analogue signals into digital signals and vice
versa.
19.	Computers make use of...signals.
20.	Windows 95 with Internet Explorer 1.0 debuted in.
21.	Internet Explorer 6 technology was released in 2001 with.
• Find the equivalents in two languages (Найдите эквиваленты в двух языках)
22.	plug	А.	отдельно
23.	amplify	В. прядь
24.	strand	С. волна
106
25. apart
D.усиливать
E. вставлять штепсель
 Choose the right variant (Выберите правильный вариант)
26.......gives computer user the opportunity to send a message to
somebody without leaving home.
A. Aerial	B. E-mail
C. Modem	D. Display
27. A special kind of modem with rubber cups is known as.......
A. Acoustic coupler	B. Demodulator
C. Modulator	D. Fibre-optic cable
28. A network contained in a relatively small area is known as.
A. WAN	B. Loop network
C. LAN	D. Single cable network
107
UNIT IX
COMPUTER RESEARCH
INTRODUCTORY TEXT
The IBM Computer Science team explores foundational issues that confront the
computing industry today. Because theory cuts across every aspect of computer science, they tend to interact with a large number of other research teams. The IBM research center has ongoing projects in the following areas:
-Algorithms: How can you get computers to solve problems efficiently? -Complexity: What computational resources (time, storage, etc) do problems inherently require?
-Database: What models and algorithms are useful in helping computers store and retrieve information efficiently?
-Web: What is the overall structure of the World-wide Web, and how can algorithms take advantage of this?
IBM’s focus on algorithms falls under the following broad categories: (1) Massive data set algorithms'. The design of algorithms that work on massive data sets is inevitable from a practical point of view. These algorithms have to work with very limited main memory. Three computational models have been proposed in this setting: the data stream model where the algorithm can make one or few passes over the data; the sampling model, where the algorithm is allowed random access; and the sublinear model, where the running time of the algorithm has to be sublinear in its input size. (2) Approximation algorithms: To overcome the curse of NP-hardness, developing approximation algorithms becomes important. The primal-dual and the semi-definite programming methods have been of immense help in this regard. These tools have yielded remarkably powerful algorithms to to solve many important combinatorial optimization problems. (3) Aggregation algorithms: Developing algorithms for improving the performance of large-scale databases and information retrieval system is a challenging task. Recent interests include aggregation algorithms with performance guarantees and static pruning methods for reducing the index size in 1R systems. (4) Other algorithms: Other interests of the IBM research team
108
include lattice algorithms, online algorithms, and property testinn algorithms.
Complexity theory is a field that concerns itself with the intrinsic computational difficulty of problems. It focuses on the effect of limitin;, natural computational resources, e.g. time and space, on the class of problems that need to be solved. The emphasis is on generality, and this is usually achieved by defining appropriate models of computation. Th. classical Turing machine captures the notion of general computation. In dealing with specific classes of problems, it has been fruitful to also consider other models such as circuits, probabilistic Turing machines, random access machines, interactive proof systems, sampling/dat.i stream models etc. Thej’roup at IBM Almaden has focused on a variety of problems in this area. Recent work has addressed the complexity oi lattice problems, zero-knowledge protocols, fault-tolerant computing, property testing, derandomization, communication complexity, sampling, an data stream algorithms.
’’I’here”-is a long history of research at IBM on the theory of databases, going back to the early days of the relational model, which was invented, developed, and studied extensively here. Their main database focus now, both in theory and in more practical projects, is on less traditional ways of storing data, such as in multimedia databases and in emerging databases and data service technologies for the Internet. In the area of multimedia databases, IBM investigated aggregation algorithms for combining fuzzy information from multiple sources
Algorithmic tools for searching and mining the web are becoming increasingly sophisticated and vital. In this context, algorithms that use and exploit structural information about the web perform better than generic methods in both efficiency and reliability. The IBM research center provides a characterization of the web that shows that the web emerges as the outcome of a number of essentially independent stochastic processes that evolve at various scales. A striking consequence of this scale invariance is that the structure of the web is “fractal”- cohesive sub-regions displays the same characteristics as the web at large. An understanding of this underlying fractal nature is therefore applicable to designing data services across multiple domains and scales. We describe,potential applications of this line of research to optimized algorithm design for web-scale data analyses.
The IBM focuses on two kinds of Web-related research. The first is understanding and modeling the seemingly chaotic Web and the
К	109
• second is developing algorithms that exploit this understanding. Several i.macro-level micro-level connectivity properties of the Web were studied | and the bow-tie model was proposed to abstract the connectivity I properties. A simple stochastic model was constructed to explain j. experimentally observed phenomena; such models can be used to predict i the evolution of the Web.
^•<5	TOPICAL VOCABULARY		
i.	massive data set algorithms	алгоритмы большого
2.	data stream model	объёма данных модель потока данных
3.	sampling model	модель выборочного типа
4.	random access	прямой (произвольный)
5.	sublinear model	доступ сублинейная модель
6.	approximation algorithms	алгоритмы
7.	primal-dual method	аппроксимирующего типа основной двухвариантный
	8.	semi-definite method	метод метод нечёткого типа
9.	diverse	разнообразный
10.	aggregation algorithms	алгоритмы совокупного
11.	information retrieval system	типа система возвращения
12.	performance guarantees	информации гарантии эффективности
13.	static pruning method	эксплуатации статический метод
14.	. lattice algorithm	отсечения решений алгоритм решётчатого
15.	online algorithm	типа интерактивный алгоритм
16.	property testing algorithm	алгоритм проверки
		свойств
J
по
17.	intrinsic	свойственный, внутренний
18.	Turing machine	машина Тьюринга (гипотетический вычислитель)
19.	interactive proof systems	системы интерактивных испытаний
20.	fault-tolerant	отказоустойчивый
21.	relational model	модель отношения, сравнения
22.	fuzzy information	нечёткая информация
23.	generic method	базовый (общий) метод
24.	fractal structure/nature	фрактальная структура/природа
25.	cohesive	способный к сцеплению, связующий
26.	bow-tie model	модель в виде завязанного
банта
EXERCISES
1.	Read the introductory text again and answer these questions.
-	What ongoing projects does IBM develop?
-	What categories does their focus on algorithms fall under?
-	What is the IBM’s complexity theory concerned with?
-	Can you name the ways of storing data employed in the IBM?
-	What characterization of the Web do IBM researchers give?
-	What for was the bow-tie model proposed?
2.	Find in the text equivalents for the following words and word-combinations:
разрабатываемые проекты; круг-интересов в ч-л.; с практической точки зрения; неизбежный; сотрудничать с; исследовать проблемы; делиться на категории; время работы; вычислительная модель; преодолеть проблему; улучшить работу; сложная задача; крупномасштабные базы'данных; заниматься/интересоваться ч-л.; хранение данных; надёжность; потенциальное применение; исследование всемирной сети; экспериментально выявленное явление.
111
3.	Read the text. Do the tasks given below.,
CAN COMPUTERS OUTSMART US?
If the world’s population continues to grow at its present ratedoubling every 40 years- there isn’t going to be enough room for us all on Earth by the year 2600. The only sounds in the room are the clicking of the pressure pads and the whin ing of the computer. We need to become more complex if biological systems are to keep ahead of electronic ones. j\t the moment computers have an advantage of speed but they show no sign of intelligence. This is not surprising as our present computers are less complex than the brain of an earthworm, a species not known for its intellectual powers. But computer’s speed and complexity double every eighteen months and this will probably continue until computers have a similar complexity to the human brain.
But will computers ever show true intelligence, whatever it might be? It seems to me that if very complicated chemical molecules can operate in humans to make them intelligent, then equally complicated electronic circuits can also make computers act in an intelligent way. And if they are intelligent, they can presumably design computers that have even greater intelligence and complexity.
> Choose the words given below to complete the text:
Twenty years ago we relied mainly on TVs, r|jji^s and stereo equipment to provide entertainment in our homes, (1)__their place is
quickly being taken over by computers. (2)___do we use computers to
lighten or load at work, increasingly we Eire using computers for fun. (3)___. More and more home computers have access to the Internet.
(4)___ we can now access a huge range of leisure facilities in our
homes, suph as reading newspapers on screen, shopping from home, (5)ty? Mowmoading music and films. Developments in optical fibre cables and DVD videos CDs mean that we can now download entire albums or feature films onto our computers and soon video players and hi-fis could become totally obsolete_________________________________
But now; but then; also; it’s true that; as well; not only; so, in this sense; but more importantly; this means that; as well as; after all.
112
> Make sentences out of the two parts:
1.	Computers’ speed and complexity
2.	To keep ahead of electronic systems
3.	Is it possible tliat computer
4.	The clicking of the pressure pads and computer whirring
5.	At the moment computers show
A.	will have a similar complexity to the human brain.
B.	may become the only sounds in the room in the future.
C.	double every ten years.
D.	no sign of intelligence.
E.	people need to become more complex.
DISCUSSION
Working in pairs discuss the following problems:
1.	What role does the computer play in your everyday life?
2.	Do you think it will be the same in ten years’ time?
3.	Do you use e-mail or the Internet? If you do, what do you use them for?
SUPPLEMENTARY READING
VIDEO GAMES
Videp games these days are extremely popular. One in four households in Britain has a Playstation and in 1999 the video game industry
113
made nearly a billion pounds, which was 60 percent more than cinema box office takings.
So, why are video games so popular? Well, they combine very fast moving, well-designed graphical images with very interesting sound design and music. But crucially they’re interactive, so they can change according to what you do from moment to moment, so the computer system concentrates on what you are saying to it, and poses you very interesting challenges and difficulties at very high speed.
The first commercial video game came along in 1971. IT was called Computer Space. Unfortunately it wasn’t very successful because it was a very complicated game involving spaceships and torpedoes and black holes and so forth. The same man who had invented that invented a game called Pong in 1972 and that’s when the video game explosion really took off. It was a very simple tennis game.
The very early video games like Pong just took place on one screen and the boundaries of the screen were the boundaries of the playing area. But then the space in video games started to get larger. The games started to scroll from side to side or up and down, so that the playing area became larger than the total size о one screen. The graphics in games slowly became more colourful and more detailed and then the big innovation took place in the 90’s, which was the invention of full 3D. This meant that you started to control characters who explored fully realized, solid 3D environments. You could wander round landscapes and buildings and look at them from any angle.
1 think video games are close to becoming an art form in itself. Certainly, when cinema was only around 30 years old, as video games are today, a lot of people thought films were mindless entertainment and rotted peoples’ brains and were no good. But now we know that cinema is an art form and we have film critics wrho can analyse films and enhance our enjoyment of them, so in the future it will be true of video games as well. The current research in video games is concentrating on artificial intelligence. People want to play video games that give a greater illusion of interacting with real characters.
114
FINAL TEST
®* Put the following sentences in the same sequence as the information is arranged in the introductory text (Расположите следующие предложения в той же последовательности как информация представлена в вводном тексте)
1.	A. Complexity theory developed by the IBM research center is concerned with the intrinsic computational difficulty of problems.
B.	The bow-tie model was proposed to abstract the connectivity properties of the Web.
C.	The IBM investigated aggregation algorithms for combining fuzzy information from multiple sources.
D.	Other algorithms developed by the IBM include lattice algorithms, online algorithms, and property testing algorithms.
• Choose the right English equivalent to the following Russian sentence (Выберите верный английский эквивалент следующему русскому предложению)
Алгоритмические инструменты для исследования сети постоянно усложняются.
2.	A. Algorithmic tools for searching the web are becoming increasingly vital.
B.	Algorithmic tools for searching the web are becoming more reliable.
C.	Algorithmic tools for searching the web are becoming increasingly sophisticated.
• Choose the right Russian equivalent to the following English sentence (Выберите верный русский эквивалент следующему английскому предложению)
Because theory cuts across every aspect of computer science, the IBM tends to interact with a large number of other research teams.
3. А. Так как теория "полностью соответствует компьютерной науке, IBM взаимодействует с большим количеством исследовательских групп.
В. Так как теория затрагивает все аспекты компьютерной науки,
115
IBM взаимодействует с большим количеством исследовательских групп.
С. Так как теория идёт в разрез с компьютерной наукой, IBM не склонна сотрудничать с большим количеством исследовательских групп.
• Find the equivalents in two languages (Найдите эквиваленты в двух языках)
4.	fault-tolerant
5.	sampling model
6.	random access
7.	fuzzy information
8.	generic method
А. модель выборочного типа
В.	произвольный доступ
С.	базовый метод
D.	нечёткая информация
Е.	отказоустойчивый
F.	метод отсечения
 Complete the sentences with the proper word (Закончите предложения подходящим по смыслу словом)
9.	То overcome NP-hardness the IBM developed good........
10.	The algorithms are allowed random access to data in the.
11.	The IBM focuses now on less traditional ways of storing ....
12.	It was discovered that the structure of the Web is ... .
13.	Stochastic models can be used to predict the evolution of the ...
14.	Algorithms for improving the performance of large scale databases
are ....
15.	Massive data set algorithms have to work with very limited main ....
16.	To abstract the connectivity properties of the Web there was proposed the.......
17.	The intrinsic computational difficulty is a field of concern of
 Choose the right variant (выберите правильный вариант)
18.	The running time of the algorithm is of great importance in A. sampling model B. data stream model C. sublinear model
116
19-	Random access to data is allowed to the algorithm in the
A. sampling model B. data stream model C. sublinear model
20..T	he algorithm can make one or few passes over the data in the
A. sampling model B. data stream model C. sublinear model
21.	At the moment computers have an advantage of speed but they show no sign of
A.	Complexity	C. vitality
B.	Intelligence	D. reliability
22.	In the future computers may have a similar complexity to the human
A. thoughts	B. ideas	C. Brain
23.	The problem of computational resources is touched upon in the IBM’s project
A.”algonthms”	C. “complexity”
В ”web”	D. “database principles”
24.	The aspect of efficient problem solving is discussed in the IBM’s project
A.”algorithms”	C. “complexity”
B.”web”	D. “database principles
25.	To overcome the curse of NP-hardness ... algorithms become important.
A. massive data set B. approximation C. aggregation
117
SUPPLEMENTARY PART
TEXT I
Assignment: Read the text., give the main idea and make the plan of it.
WINDOWS SERVER PRODUCTS HISTORY
The public caught the first glimpse of a new type of Microsoft Windows® operating system in August 1991, when Windows Advanced Server for LAN Manager was demonstrated at a developers conference. By the time it launched two years later, the product had been renamed Microsoft Windows NT® and marked the first appearance of the Windows Server operating system. It quickly became known for its support of high-performance servers, advanced workstations, and client/server computing.
Windows NT Advanced Server 3.1 was designed as a dedicated server operating system for client/server environments
1993: Windows NT Advanced Server 3.1
Windows NT Advanced Server 3.1 was launched in July 1993 as a dedicated server for a client/server environment. It provided the power, scalability, enhanced fault tolerance, and standards-based interoperability required for enterprise computing. Microsoft promoted Windows NT Advanced Server as an application server for Novell NetWare, Banyan VINES, and Microsoft networks, capable of providing a platform for sophisticated business solutions such as
financial, accounting, and vertical applications. As an application server, Windows NT Advanced Server was also a powerful platform for database servers such as Microsoft SQL Server™, communications servers such as Microsoft SNA Server, and mail servers such as Microsoft Mail.
For network management, Windows NT Advanced Server provided customers with centralized security and server management, along with graphical tools to manage multiple systems as well as a single logon for enterprise users. In addition, it could run all the applications created for desktop Windows versions.
IIS
1994:	Windows NT Server 3.5
The next release of Windows NT Server was built on the stability >{ version 3.1, but with greatly enhanced processing speed and improver] connectivity to other systems, particularly in Novell NetWare and UNl\ environments.
Enhancements included new administration tools, improved client software configuration, an auto-reboot and dump facility, better tools for NetWare, and better remote access capabilities.
1995:	Windows NT Server 3.51
This incremental release of Windows NT Server in June 1995, included a tool to help customers manage Client Access Licenses (CAEs) for a suite of server products called the Microsoft BackOffice® family. This release also featured a utility that enabled over-the-netwcrk installation of Windows 95.
1996:	Windows NT Server 4.0
With this upgrade, Windows NT Server gained the popular look and feel of Windows 95 and added many advanced features for business and technical users. Enhancements included:
	Higher network throughput.
•	Faster file and print services.
•	Robust application support.
	Standards-based communications features.
	An integrated Web server, Internet Information Server (IIS) 2.0.
	Support for the Microsoft FrontPage® Web editing and management tool.
•	A toolset for developing and managing intranets.
Subsequent service packs and option packs offered additional features, including public-key and certificate authority functionality, smart card support, improved symmetric multiprocessing (SMP) scalability, clustering capabilities, and component object model (COM) support.
1997: Windows NT Server 4.0, Enterprise Edition
Windows NT Server 4.0, Enterprise Edition, built on the strengths ol Windows NT Server 4.0 by adding features and capabilities designed tc appeal to large corporate customers. Windows NT Server 4.0, Enterprise
119
Edition, added greater performance and scalability, higher availability, and expanded services for developing enterprise applications.
The product also included Microsoft Transaction Server to facilitate the development of Internet and intranet applications, and Microsoft Message Queue Server (MSMQ), which enabled applications running at different times to communicate across heterogeneous networks and systems that may be temporarily offline.
In October 1998, Microsoft announced that it would drop the "NT" suffix in the next major version of the Windows NT operating system, which would become known as Windows 2.000.
1998: Windows NT Server 4.0, Terminal Server Edition
Windows NT Server 4.0, Terminal Server Edition gave the Windows NT Server operating system the ability to serve 32-bit Windows operating system-based applications to terminals and terminal emulators running on PC and non-PC desktops. This technology offered a bridge for organizations that were transitioning to a pure 32-bit desktop environment by allowing their existing non-Windows-based computers to connect to a Windows network.
2000: Windows 2000 Server Family
In February 2000, Bill Gates unveiled the Windows 2000 client and server family. The client side was represented by Windows 2000 Professional, which went on to become Windows XP Professional. To support businesses of all sizes, three server versions were offered:
•	Windows 2000 Server provided a multipurpose network operating system for departmental file, print, Web, and entry-level application servers.
•	Windows 2000 Advanced Server was designed to 'support business-critical Web and line-of-business application on a reliable, manageable operating system.
•	Windows 2000 Datacenter Server delivered the highest levels of operating system scalability and availability for the most demanding server applications.
For IT professionals, the Windows 2000 Server family introduced new, centralized, policy-based management with Microsoft IntelliMirror® management technologies and the Microsoft Active Directory® directory
120
service. In addition, a high-performance Web server featuring Active Server Pages (ASP) was included, as well as COM+ component services, transaction and message queuing support, and end-to-end XML support.
2003: Windows Server 2003
Launched in April 2003, the Windows Server™ 2003 , family works as a highly productive infrastructure that ur L1 c helps organizations "do more with less".
The first server operating system to feature built-in Microsoft .NET functionality, Windows Server 2003 delivers significantly greater dependability, security, and scalability compared to earlier versions. Four versions are tailored to the varying needs of organizations:
	Windows Server 2003. Standard Edition, provides a solution for departmental and standard workloads and supports file and printer sharing, helps secure Internet connectivity, centralizes deployment of desktop applications, and enhances collaboration among employees, partners, and customers.
	Window s Sen er 2003. Enterprise Edition, is the platform for
mission-critical server workloads. By delivering high reliability, scalability, and performance, it offers a superior value to businesses of all sizes.
•	Windows Server 2(H>3, Datacenter Edition, is designed to support the highest levels of scalability and reliability. Windows 2003, Datacenter Edition, is available in both 32-bit and 64-bit versions through original equipment manufacturer (OEM) partners.
 Windows Server 2003, Web Edition, a new offering, is a singlepurpose operating system for dedicated Web serving and hosting. It provides a platform for rapidly developing and deploying Web services and applications.
2003: 64-Bit Operating Systems
A new generation of scalable 64-bit server applications demanded a new platform with additional scalability and reliability. Originally launched as Windows Advanced Server, Limited Edition, Microsoft now features 64-bit versions of the Windows Server 2003, Enterprise Edition and Windows Server 2003, Datacenter Edition, operating systems.
121
Designed specifically for 64-bit Intel Itanium hardware, these server operating systems break the 4-gigabyte (GB), 64-GB memory limit and support memory-intensive applications, such as those for data warehousing, busmess intelligence, and Web hosting.
TEXT 2
Assignment: Read the text and give a summery of it.
WINDOWS TECHNOLOGIES HISTORY
Microsoft Windows® XP technologies make it easy to enjoy your favorite games, music, and movies; create home movies; enhance digital photos, and more.
PC-based games.
DirectX
Microsoft DirectX® 9.0 technology drives high-speed multimedia and games on the PC. DirectX provides the exciting graphics, sound, music, and three-dimensional animation that bring games to life. DirectX is also the platform that allows software developers to build the type of exciting, high-speed multimedia required for today's
DirectX debuted in 1995 and quickly became a recognized standard for multimedia application development on the Windows platform. Today. DirectX 9.0 integrates an advanced suite of multimedia application programming interfaces (APIs) into Microsoft Windows operating systems so that software developers can access specialized hardware features without having to write hardware-specific code.
DirectX 9.0 can be installed on:
Windows
Media Player
Windows
•	Windows 98 Second Edition
•	Windows Millennium Edition (Windows Me)
•	Windows 2000 Professional and Windows 2000 Server
-	Windows XP Home and
Windows XP Professional
Windows Media Player
Included with Windows operating systems for several years. Windows Media® Player allows users to play music CDs, DVD movie:,, and digitally stored songs on their computers.
Windows Movie Maker
When Windows Me arrived in 2000—specifically designed for home computer users—it featured the first Microsoft version of a consume-video-editing product, Windows Movie Maker. An easy-to-use video editor, Movie Maker is used to capture, organize, and edits video clips, and then export them for PC or Web playback.
Movie Maker 2, released in 2003, adds new movie-making transitions, jazzy titles, and fun special effects. Based on the Microsoft DirectShow® and Windows Media technologies, Movie Maker was originally included only with Windows Me. Today Movie Maker 2 is available for Windows XP Home Edition and Windows XP Professional.
Windows Messenger
With the release of Windows XP in 2001 came Windows Messenger, bringing instant messaging to users across the Internet. With Windows Messenger, users communicate with one another in real time with text messages. Although real-time communication such as video conferencing has been available as a technology for some time, Windows Messenger was the first communication tool that provided an integrated, easy-to-use way of participating in text chat, voice and video communication, and data collaboration.
The latest edition, Windows Messenger 4.7, improves instant messaging capabilities with new task-based menus, cool emoticons, and easier ways to organize and group contacts.
TEXT 3
Assignment: Read the text, write the annotation to it and retell it.
OTHER WINDOWS PRODUCTS
f — Today, the reliable and familiar I	Microsoft Windows® platform
1 г extends beyond the office desktop, helping make any time, any place __________computing a reality. Embedded
* - - - - technology is the means by which
computing power is placed in more places than ever, from handheld devices to automobiles.
Many of the rapidly evolving embedded products rely on special versions of the Windows operating system. Now software developers and hardware manufacturers can use Windows technology to build intelligent, 32-bit Windows-based devices that connect people to information in innovative ways.
Windows CE .NET
Microsoft Windows CE .NET, the successor to Windows CE 3.0, combines a real-time, embedded operating system with the powerful tools for rapidly creating the next generation of smart, connected, and small-footprint devices. With a complete operating system feature set and comprehensive development tools, Windows CE .NET contains the features developers need to build, debug, and deploy customized Windows CE .NET-based devices.
Built on its own code base from the ground up, this operating system debuted in September 1996. Windows CE originally ran on the Handheld PC but now is used in devices of different shapes, sizes, and degrees of ruggedness, such as mobile handhelds, industrial controllers, gateways, and advanced consumer electronics.
Windows CE .NET has been optimized for the next generation of smart, connected devices requiring reliable networking, real-time operations, and rich multimedia and Web browsing. With support for
124
multiple CPU architectures, its scalable, open foundation has become a popular choice for hardware manufacturers in building a wide variety of embedded products.
Windows XP Embedded
Windows XP Embedded is an operating system and development platform that delivers the power of Windows in componentized form fci the rapid development of reliable, advanced embedded devices.
Based on the same code base as Windows XP Professional, Windows XP Embedded offers more than 10,000 individual feature components from which embedded developers can choose to achieve optimum functionality in a reduced footprint. Developers receive the added advantage of a familiar programming model along with the latest multimedia, Web browsing, power management, and device support.
TEXT 4
Assignment: Read the texts and find similarity and things that differ the first hackers from hackers of today.
THE FIRST HACKERS
The first "hackers" were students at the Massachusetts Institute of Technology (MIT) who belonged to the TMRC (Tech Model Railroad Club). Some of the members really built model trains. But many were more interested in the wires and circuits underneath the frack platform. Spending hours at TMRC creating better circuitry was called "a mere hack." Those members who were interested in creating innovative, stylistic, and technically clever circuits called themselves (with pride) hackers.
During the spring of 1959, a new course was offered at MIT, a freshman programming class. Soon the hackers of the railroad club were spending days, hours, and nights hacking away at their computer, an IBM 704. Instead of creating a better circuit, their hack became creating faster, more efficient program — with the least number of lines of code.
125
Eventually they formed a group and created the first set of hacker's rules, called the Hacker's Ethic.
Steven Levy, in his book Hackers, presented the rules:
•	Rule 1. Access to computers - and anything, which might teach you, something about the way the world works - should be unlimited and total.
•	Rule 2: All information should be free.
•	Rule 3: Mistrust authority - promote decentralization.
•	Rule 4. Hackers should be judged by their hacking, not bogus criteria such as degrees, race, or position.
•	Rule 5 . You can create art and beauty on a computer.
•	Rule 6: Computers can change your life for the better.
These rules made programming at MIT's Artificial Intelligence Laboratory a challenging, all encompassing endeavor. Just for the exhilaration of programming, students in the Al Lab would write a new program to perform even the smallest tasks. The program would be made available to others who would try to perform the same task with fewer instructions. The act of making the computer work more elegantly was, to a bonafide hacker, awe-inspiring.
Hackers were given free reign on the computer by two Al Lab professors, "Uncle" John McCarthy and Marvin Minsky, who realized that hacking created new insights. Over the years, the Al Lab created many innovations: LIFE, a game about survival; LISP, a new kind of programming language; the first computer chess game; The CAVE, the first computer adventure; and SPACEWAR, the first video game.
HACKERS OF TODAY
Hackers, having started as toy railroad circuitry designers in the late fifties, are completely new people now. Once turned to computers, they became gods and devils. Nowadays holders and users of the World Wide Web hide their PCs under passwords when the keyword "hacker" is heard. When and how did this change take place? Why are we so frightened of Hacker The Mighty and The Elusive?
One of the legends says that hackers have changed under the influence of "crackers" — the people who loved to talk on the phone at somebody else's expense. Those people hooked up to any number and
120
enjoyed the pleasure of telephone conversation, leaving the most fun -bills —for the victim. Another legend tells us that modem hackers were bom when a new computer game concept was invented. Rules were very simple: two computer programs were fighting for the reign on the computer. Memory, disk-space and CPU time were the battlefield. The results of that game are two in number and are well known: hackers and computer viruses. One more story tells that the "new " hackers came to existence when two MIT students that attended the Al Lab found an eno: in a network program. They let people, responsible for the network, know but with no result. The offended wrote a code that completely paralyzed the network and only after that the error was fixed. By the way, those students founded The Motorola Company later.
Today, when the Internet has entered everyone's house there's no shield between a hacker and your PC. You can password yourself up, but then either hackers will crack your PC anyway or nobody will enter your site, because passwords kill accessibility. If your PC is easy to access no one can guarantee what 'II happen to your computer - hackers, you know them.
Monsters? Chimeras9 Not at all! Every hacker is a human being and has soft spots: good food, pretty girls or boys (it happens both ways), classical music, hot chocolate al the fireplace, apple pie on Sunday. Hacker is first of all a connoisseur, a professional with no computer secret out of his experience. And what is the application for skills depends on him. God, and Holy Spirit.
TEXT 5
Assignment: Read the text and retell it.
VIRUSES AND VACCINES
The terms viruses and vaccines have entered the jargon of the computer industry to describe some of the bad things that can happen to computer systems and programs. Unpleasant occurrences like the March 6, 1991, attack of the Michelangelo vims will be with us for years to come. In fact, from now on you need to check your IBM or IBM-compatible personal computer for the presence of Michelangelo before March 6 every year — or risk losing all the data on your hard disk when you turn on your
127
machine that day. And Macintosh users need to do the same for another intruder, the Jerusalem virus, before each Friday the 13th, or risk a similar fate for their data.
A virus, as its name suggests, is contagious. It is a set of illicit instructions that infects other programs and may spread rapidly. The Michelangelo virus went worldwide within a year. Some types of viruses include the worm, a program that spreads by replicating itself; the bomb, a program intended to sabotage a computer by triggering damage based on certain conditions -— usually at a later date; and the Trojan horse, a program that covertly places illegal, destructive instructions in the middle of an otherwise legitimate program. A virus may be dealt with by means of a vaccine, or antivirus, program, a computer program that stops the spread of and often eradicates the vims.
Transmitting a Virus. Consider this typical example. A programmer secretly inserts a few unauthorized instructions in a personal computer operating system program. The illicit instructions lie dormant until three events occur together: 1. the disk with the infected operating system is in use; 2. a disk in another drive contains another copy of the operating system and some data files; and 3. a command, such as COPY or DIR, from the infected operating system references a data file. Under these circumstances, the virus instructions are now inserted into the other operating system. Thus the virus has spread to another disk, and the process can be repeated again and again. In fact, each newly infected disk becomes a virus carrier.
Damage from Viruses. We have explained how the virus is transmitted; now we come to the interesting part — the consequences. In this example, the virus instructions add 1 to a counter each time the virus is copied to another disk. When the counter reaches 4, the virus erases al] data files. But this is not the end of the destraction, of course; three other disks have also been infected. Although viruses can be destructive, some are quite benign; one simply displays a peace message on the screen on a given date. Others may merely be a nuisance, like the Ping-Pong virus that bounces a "Ping-Pong ball" around your screen while you are working. But a few could result in disaster for your disk, as in the case of Michelangelo.
Prevention. A word about prevention is in order. Although there are programs called vaccines that can prevent virus activity, protecting your computer from viruses depends more on common sense than on building a
12S
"fortress" around the machine. Although there have been occasions where commercial software was released with a virus, these situations are rare. Viruses tend to show up most often on free software acquired from friends Even commercial bulletin board systems, once considered the most likely suspects in transferring viruses, have cleaned up their act and now assure their users of virus-free environments. But not all bulletin board systems are run professionally. So you should always test diskettes you share with others by putting their write-protection tabs in place. If an attempt is made to write to such a protected diskette, a warning message appears on the screen. It is not easy to protect hard disks, so many people use antivirus programs. Before any diskette can be used with a computer system, the antivirus program scans the diskette for infection. The drawback is that once you buy this type of software, you must continuously pay the price for upgrades as new viruses are discovered.
TEXT 6
Assignment: Read the text and write an essay “The Perspectives of the Virtual Reality Development”.
IS IT POSSIBLE TO CREATE PERFECT VIRTUAL REALITY?
Human beings have always been seeking for a better place to live, better food to eat, better people to meet. The wise have concluded that there 's no perfection itself. Human 's brain identifies reality by its imperfection. And thus, the attempts to create ideal wrorld turned to creating the world alike reality — virtual reality.
On the first stage, when technology wasn 't so developed, virtual reality models just presented the essence of the current processes. But along with the development of technology and science a real world model is quite similar to our life. It's still something alike, a copy but not perfect. Copying itself isn't an example to follow, but this way wemay explore the universe more carefully. So what are the problems of creating perfect virtual reality — cyberspace where you can't say whether it's cyberspace or no!?	_,
One of the difficulties is that it doesn't look like reality. We can't present the needed number of colors, the full palette our eye can catch. We can *t introduce shades that really look like shades because the rendering
129
algorithms we have are huge and approximate. And it's still not possible to show such a movie in real time.
If we’d like just to imitate the movements of molecules, which are easy to be programmed, and this way to model the reality, again, we have a great wall to be stepped over. Our knowledge of micro world is poor and even though Einstein himself worked at the Uniform Field Theory, it is still uncompleted. On the other hand, the molecules are so many that programming a single cell, let alone even an insect, is the work of life for hundreds of programmers. Nobody can imagine the difficulty of virtualization of a human being. To model the universe we should create another one.
There are tasks to be solved before we can create 99% acceptable virtual reality: e.g. the speed of processing, fractal algorithms for rendering, quark mechanics and so on. But has anybody thought of connecting a computer to human's brain and clipping the images you and your ancestors have seen to present for someone else, or maybe using the calculating and data processing capabilities of the cortex? By the way, the process of seeing, hearing, smelling, and feeling the world is just a bunch of electric signals entering the brain. May be, the answer is here, and the distance is not the unaccomplished technical achievements, but ideas, strategic decisions, some crazy projects like the Head Of Professor Dowel. Will there be the final step to create perfect virtual reality? Let's see.
TEXT 7
Assignment: Read the text, give the main idea and the summary of it.
SURFING THE NET
What is more impressive than the pyramids, more beautiful than Michelangelo's David and more important to mankind than the wondrous inventions of the Industrial Revolution? To the converted, there can be only one answer: the Internet that undisciplined radical electronic communications network that is shaping our universe. Multimedia, the electronic publishing revolution, is entering every area of our lives — college, work and home. This new digital technology combines texts.
130
video, sound and graphics to produce interactive language learning, football, music, movies, cookery and anything else you might be interested in.
The industrial age has matured into the information age; wherein the means to access, manipulate, and use information has become crucial to success and power. The electronic superhighway provides an entry to libraries, research institutions, databases, art galleries, census bureaus, etc For those of us interested in intercultural communications Cyberspace is a universal community, with instant access not only to information anywhere, but also to friends old and new around the globe.
The Internet is an amorphous global network of thousands of linked computers that pass information back and forth. While the Internet has no government, no owners, no time, no place, no country, it definitely has a culture, which frequently approaches anarchy; and it has a language, which is more or less English. People who interact in an Internet environment know how addresses are formed, how to use e-mail, ftp, Usenet News, Telnet, and other software tools.
Like all new worlds, Cyberspace has its own lingo, for example: e-bahn, i-way, online, freenel, web page, freeware, browser, gopher, archie, gateway. There are words to describe people who roam the net: netters, e-surfers, internet surfers, netizens, spiders, geeks... The Internet has its own prerogatives: for example, the dismissive term lurker for the person who hangs around the net, reading what is there but not contributing anything. The term flaming refers to the public humiliation of another netter as punishment for a real or imagined transgression against net culture.
Large-scale use of computer-to-computer transfer of information was implemented by the US military in the late 60s and early 70s — part of the superpower competition of the cold war and the arms race. The US military created an electronic network (Arpanet) to use computers for handling the transfer of large amounts of sensitive data over long distances at incredible speed. Computer-to-computer virtual connections, using satellites and fiber optics, have distinct advantages over telephone or radio communications in the event of a nuclear attack. Mathematicians and scientists (and their universities) have been linked and electronically exchanging information overjhe Internet since the mid-70s.
Now the Internet has become commercialized with private and public companies offering access to it. (CompuServe — is the best-known
international commercial electronic access provider). The Internet is being expanded and improved so that every home, every school, every institution can be linked to share data, information, music, video and other resources. If you have a computer or a computer terminal, some kind of connection (probably, modem and telephone line) to the Internet, and some kind of Internet service provider, you can participate in electronic communication and become a citizen of the global village.
Information technology is a good vehicle for the argument. Some scientists remind us that voluminous information does not necessarily lead to sound thinking. There are many genuine dangers that computers bring to modem society: efficient invasion of privacy, overreliance on polling in politics, even abdication of control over military decision-making. Data glut obscures basic questions of justice and puipose and may even hinder rather than enhance our productivity. Edutainment software and computer games degrade the literacy of children. On the other hand, only a few use PCs on network to share information and ideas. In most cases IT is used to speed routine tasks, to automate manual processes rather than to change work patterns and business practices. Most managers use their PCs to edit documents — not a good use of their time when they could be dreaming up creative applications. It is time to evaluate anew the role of science and technology in the affairs of the human species.
So, if you are riding on the information highway, you should take steps to cope with information overload. The gift of boundless information is causing a new kind of stress known alternately as technostress, information overload or Information Fatigue Syndrome. Some experts say that we don't get anywhere near the data it takes to overload our neurons. According to some estimates, our mind is capable of processing and analyzing many gigabytes of data per second — a lot more data than any of today's supercomputers can process and act on in real time. We feel overloaded by the quantity of information because we are getting it unfiltered. We should filter out the junk and turn data into shapes that make sense to us. Stress in moderation is good: it drives us to achieve, stimulates our creativity and is the force behind social and technological breakthroughs. Stress is revealing how humans are in some ways more primitive than the technology they have created. Meditation, muscular relaxation, aerobics, jogging, yoga can be effective stress relievers, but no technique is universal: experiment and find the one that best works for you.
132
The cornerstone of an economy are land, labor, capital and entrepreneurial spirit. That traditional definition is now being challenged. Today you find a fifth key economic element: information dominant. As we evolve from an industrial to an information society, our jobs are changing from physical to mental labor. Just as people moved physically from farms to factories in the Industrial age, so today people are shifting muscle power to brain power in a new, computer-based., globally linked by the Internet society.
133
KEYS TO FINAL TESTS
Unit one 1) С, A, B, D; 2) В; 3) C; 4) B; 5) D; 6) A; 7) E; 8) C; 9) B; 10) B; 11) C; 12) A; 13) artificial; 14) data; 15) oriented; 16) personal computer; 17) overlap; 18) discipline; 19) interacting; 20) blur.
Unit two 1) A, C, D, B; 2) C; 3) C; 4) D; 5) A; 6) B; 7) E; 8) C; 9) main memory; 10) transistor; 11) fourth; 12) accumulator; 13) megahertz; 14) peripherals; 15) program; 16) software; 17) ALU; 18) mouse keyboard; 19) monitor; 20) printer; 21) C; 22) C; 23) B; 24) D; 25) B.
Unit three 1) B, D, E; 2) B; 3) D; 4) B; 5) B; 6) C; 7) C; 8) A; 9) E; 10) B; 11) F; 12) QWERTY; 13) Wire; 14) Voice recognition device; 15) Graphics tablet; 16) Scanner; 17) Enter; 18) Layout; 19) Functional; 20) C; 21) A; 22) D; 23) A; 24) B; 25) B.
Unit four 9 1) С, B, A, D; 2) B; 3) A; 4) C; 5) F; 6) A;7) E; 8) C; 9) B; 10) Liquid-Crystal Display; 11) Low; 12) Display adaptor; 13) Nonimpact; 14) Laser printers; 15) Thermal printer; 16) Output devices; 17) Ergonomics; 18) Themselves; 19) C; 20) B; 21) A; 22) B; 23) B; 24) A; 25) B.
Unit five 1) B, D, C, A; 2) В; 3) C; 4) A; 5) G; 6) E; 7) D; 8) F; 9) C; 10) B; 11) A; 12) Storage; 13) Surface; 14) Display adaptor; 15) Shareware; 16) Blank; 17) ‘Write once, read many’; 18) Rewritable; 19) B; 20) A; 21) C; 22) B; 23) B; 24) A; 25) A.
Unit six 1) С, В, E, A, D, F; 2) A, D, F; 3) В, С, E, G; 4) B; 5) B; 6) F; 7) D; 8) A; 9) H; 10) G; 11) C; 12) B; 13) System utilities; 14) Applications; 15) Operating system; 16) Database management system; 17) Compiler; 18) 1985; 19) Experience; 20) Word processor, 21) B; 22) C; 23) B; 24) A; 25) A.
134
Unit seven 1) D, A, С, B; 2) A; 3) B; 4) D; 5) C; 6) A, 7) E; 8) B; COBOL; 10) machine codes; 1)) low-level; 12) PASCAL; 13) high-level languages; 14) BASIC; 15) object program; 16) C; 17) an assembler; 1§; C; 19) D; 20) B; 21) B: 22) A; 23) D; 24) A.
Unit eight 1) E; 2) D; 3) A; 4) F; 5) C; 6) B; 7) С, E, F; 8) C; 9) B; 10) C; 11) B; 12) Acoustic coupler; 13) Single cable network; 14) Graphics terminal; 15) Lightpen; 16) Remote access; 17) Local Area Network; 18) Modem; 19) Digital; 20) 1995; 21) Windows XP; 22) E-23) D; 24) B: 25) A; 26) B; 27) A; 28) C.
Unit nine 1) D; А; В; C; 2) C; 3) B; 4) E; 5) A; 6) B; 7) D; 8) C; 9) approximation algorithms; 10) sampling model; 1!) data; 12) fractal; 13) web; 14) aggregation algorithms; 15) memory; 16) bow-tie model; 17) complexity theory; 18) C; 19) A; 20) B; 21) B; 22) C; 23) B; 24) C; 25) A.
135
GLOSSARY
BIOS. This is the Basic Input/Output System that identifies the software or set of programs used to boot the computer (before locating the system disk). The BIOS is located in main memory, although not in the RAM (Random Access Memory) area as this would mean the information would be lost once the computer was switched off. It is therefore located in the ROM (Read Only Memory) area, in which it is stored permanently.
BOOT, MASTER BOOT (Boot sector). All disks (both floppy and hard disks) have a very important section called the boot sector. This sector contains information on the characteristics and contents of the disk, and may also contain a program that makes it possible to boot the computer. When we speak of the boot sector of a floppy disk, we use the term BOOT, whereas the term MASTER BOOT (MBR - Master Boot Record) is used to refer to the same section of a hard disk.
• BOOT. This usually refers to the boot sector in a floppy disk.
. MASTER BOOT RECORD (MBR). This refers to the boot sector of a hard disk.
In both cases the boot sector corresponds to the first sector of the disk, which takes up 512 Bytes. These "special areas" on the disks are the target of Boot viruses among others.
Bug A bug is a coding error in a program. Viruses are programs and consequently can have bugs. This means that the actions that the virus was initially coded to carry out might not take place if a bug is found in the viral code.
Cache. This is a small section that corresponds to the computer memory. It is usually a place to store something temporarily. Its function it to increase the processing speed of the computer. To do this, a copy of the most recently accessed data is stored for fast access.
Chat. This is a service that permits written conversations to take place over the Internet. Through an Internet connection and a special program it is possible to converse with an unlimited number of other computer users.
136
Cluster. This is a physical section of a storage disk that includes one or	more	adjacent	sectors
Additionally, it also refers to viruses that infect hard disks or floppy disks and modify the file allocation table.
Cookie. A cookie is a text file that the server sends to users when they visit a web page. The purpose of these files is to identifly users visiting a web site. Cookies can store information on the user: operating system, browser installed, e-mail ad dress,... etc.
Cracker. A hacker is someone who breaches computer security, usually a network. They do not respect the information they obtain.
Directory / Folder. Both terms are used to describe the same thing. They refer to non-physical divisions created on a disk where files are stored. They constitute a method of organizing data in much the same way as traditional paper files are stored in folders and filing cabinets.
E I Windows
C'l All Llseis
£ ; ~l Application Data
Cj Лрр1оз
S О Catfoot
® Г ~l Command
I I Config
Some folders under the Windows directory.
DOS (MS-DOS). This is the Disk Operating System used by Microsoft before Windows was developed.
Dropper. Droppers are executable files that contain viruses. When these files are run, the "dropper" releases the viruses it might contain. It is important to note that when an antivirus program scans this type of files no viruses will be detected, as the virus code is not created until the user runs the "dropper".
File, Archive, Document. This is where information is stored in a computer storage device i.e. the actual work carried out by a user (texts, images, databases, spreadsheets^ etc.). Each file or document is given a name and is assigned an extension, a three-letter code that identifies the type of file in question. Some common extensions include EXE and COM (executable files, programs), TXT (text files) and DOC (Word documents).
137
FTP (File Transfer Protocol). This is a protocol used on the Internet to exchange files between computers on the Internet. This connection makes it possible to download files to your computer.
Hacker. This is someone who attemps to gain unauthorized access computer systems.
Host. This term refers to a computer that works as a source of information. This term is normally used when there are two computer systems connected by means of modems and telephone lines. The system that contains the data is the host, whereas the user's computer will be the remote terminal. A server will work as a host for its clients and we can even say that a desktop computer works as a host for its peripherals.
HTTP (HyperText Transfer Protocol) This is the underlying protocol used by the Internet. This protocol makes it possible to access hypertext documents created in HTML format. This means that HTTP allows users to view web pages through a w'eb browser.
Hyperlinks also known as links, they may take on the form of text, images, buttons or sections of an HTML document (Web page). By placing the mouse pointer over them and clicking, the user will be taken to another page or a different section of the page he/she was already viewing.
IP (Internet Protocol). This is the number that identifies a computer on the Internet. It is like an ID code or a passport number. It consists.of a set of four numbers (form 0 to 256) separated by dots. An example of this might be the following: 168.40.25.12. Knowing this number might be enough to access other computers remotely, as long as the right tool is used.
Joke. Jokes are programs designed to trick users into believing that they have been infected by a virus. These programs usually simulate the destructive effects of viruses - for instance the deletion of the files in the hard disk -. Users are strongly recommended not to open any files attached to e-mail messages.
Malware. This term is used to refer to any program containing malicious code such as viruses, Trojans or worms.
138
Replication. These are terms used to describe the action by which a virus makes copies of itself in order to carry out subsequent infections.
SCR files. These are what are known as Script files. They take SCR extensions and are used to determine the parameters (conditions) under which certain programs should be run. They therefore make it possible to open a program in accordance with previously established conditions.
Spam. Spam is usually defined as unsolicited e-mail or junk e-mail. Although this is not a virus of any kind, it is somehow related to them in that most viruses use e-mail to propagate to other computers. It is a form of bulk mail to a list of e-mail addresses obtained from different sources. On some occasions it can also be related to Hoaxes, as these are messages are always spread via e-mail.
Template (global template). A template is a file that a specific application uses to initiate a session with pre-established default values or parameters. For example, Microsoft Word uses a template called NORMAL.DOT.
Trojan. Trojans are not viruses as such, as they do not replicate to make copies of themselves. They are in fact programs that are installed on remote computers and produce no damage (at least not at first), although they may be accompanied by other damaging programs. Trojans are designed to open a back door on the victim machine, which makes it vulnerable to attack from a malicious user.
Tunneling. This is a technique specifically designed to prevent the correct use of the permanent (resident) antivirus protection installed on a computer.
Virus. A virus is a program that can enter a computer system in many ways. These programs are special in that they can produce unwanted or damaging effects on infected machines. Once a virus has managed to enter a system, it will situate itself in places where it can be unintentionally run by the user.
139
Virus Signature File. This is pail of antivirus programs and contains each of the definitions of all viruses detected. It is in fact a database that contains the references used for detection purposes.
Windows Registry. This is a file used by the Windows operating system to store configuration information on all the programs installed on the computer, as well as the definition of the operating system itself. This configuration information is made up of keys, subkeys and values, which can be consulted and modified, although most programs do this automatically at setup.
Worm. A type of malicious program similar to a virus but which infects in a different manner. While viruses infect other programs by copying themselves within files, worms only make copies of themselves.
Zip. There are several tools that make it possible to compress files so as to reduce their size. Files compressed by means of the tool WinZip will have .ZIP extension, although there are some other compression formats such as AR.I, LZH, LHA, RAR,... All compressed archives contain other files. If a compresed file is infected, it might cause another infection to take place upon when decompressing or working with the file in question.
Zoo (zoo virus). A zoo virus is not in the wild. They can only be found in certain places like virus labs, where they are analysed in order to get to learn more about how they work and and the techniques that they use.
140
ЗАКЛЮЧЕНИЕ
Уважаемые студенты!
Завершив работу по данному пособию, вы прошли еще один важный этап в изучении английского языка. Вы получили навыки профессиональной коммуникации, узнали более 200 новых терминологических единиц и словосочетаний, подготовились к различным видам чтения литературы профессиональной тематики, приобрели умения аннотирования и реферирования. Такой результат приносит удовлетворение нам, авторам данного пособия, и поможет вам в дальнейшей профессиональной деятельности.
Однако чтобы владеть английским языком в совершенстве, будь то язык повседневного общения или профессиональноориентированный, необходима постоянная тренировка. Вы должны продолжать получать новые знания, практиковаться и делать успехи. Расширяйте свой словарный запас, читайте англоязычные журналы, газеты и иную литературу. Не ленитесь пользоваться справочным материалом. Используйте возможности общения с носителями языка или своими коллегами, владеющими иностранным языком.
Большие информационные возможности в области изучения иностранного языка открывает сегодня Интернет. Ваша профессиональная направленность непосредственно связана с использованием его ресурсов, поэтому дерзайте и извлекайте пользу из англоязычных сайтов Интернет. Адреса некоторых из них вы сможете найти в списке рекомендуемой литературы. Желаем вам успехов в работе!
Авторы
141
СПИСОК ИСПОЛЬЗОВАННОЙ И РЕКОМЕНДУЕМОЙ ЛИТЕРАТУРЫ
1.	Англо-русский толковый словарь по вычислительной технике, Интернету и программированию. - 3-е изд., испр. и доп. - М.: Издательско-торговый дом «Русская Редакция», 2002. - 640 с.
2.	English for Computer Science Students: Учеб. пособие/Сост. T.B. Смирнова, М.В. Юдельсон; Науч. ред. Н.А. Дударева. - 2-е изд. -М.: Флинта: Наука, 2002. - 128 с.
3.	R. White/PC Computing/How Computer Works.-USA, 1994.
4.	P Duffy. Focus on Innovators and Inventions.AJSA, NJ, 1994.
5.	Webster’s New-World Dictionary of Computer Terms.-USA, NY, 1996-
6.	Computer magazines: Byte, Computer, WebserverZ/Домашний компыотер.-l 997-2000.
7.	Infotech: English for Computer Users. - Cambridge University Press, 1996.
8.	http://www.webopedia.com
9.	ttp://www.useic.ru/study/apply/cs.htm
10.	http://www.almaden.ibm.com/software/quest/
142
ОГЛАВЛЕНИЕ
Предисловие..................................... 3
Методические рекомендации........................5
UNITI..........................................  7
Computer Science UNIT II.........................................19
Computer System UNIT III........................................31
Input Devices UNIT IV.........................................43
Output Devices UNIT V..........................................55
Storage Devices UNIT VI.........................................67
Basic Software
UNIT VII..........................................81
Computer Languages UNIT VIII.......................................93
Data Communication Systems UNIT IX........................................107
SUPPLEMENTARY PART.............................117
TEXT 1 .WINDOWS SERVER PRODUCTS HISTORY........117
TEXT 2.WINDOWS TECHNOLOGIES HISTORY............121
TEXT 3.OTHER WINDOWS PRODUCTS..................123
TEXT 4.THE FIRST HACKERS. HACKERS OF TODAY.....124
TEXT 5. VIRUSES AND VACCINES...................126
TEXT 6. IS IT POSSIBLE TO CREATE PERFECT VIRTUAL REALITY?........................................128
TEXT 7.SURFING THE NET.........................129
KEYES TO FINAL TESTS...........................133
GLOSSARY....................................   135
ЗАКЛЮЧЕНИЕ...................................  140
СПИСОК ИСПОЛЬЗОВАННОЙ И РЕКОМЕНДУЕМОЙ ЛИТЕРАТУРЫ.....................................141
Учебное издание
ЦАРЕВА ГАЛИНА ВЯЧЕСЛАВОВНА ХУДОБКО ТАТЬЯНА БОРИСОВНА
English for Computer Science Students Английский язык для студентов, изучающих компьютерные технологии
Учебное пособие для студентов и аспирантов
е
Научный редактор Е.А. Акулова
Редактор издательства Т.И.Королёва
Компьютерный набор Г.В. Царева, Т.Б. Худобко
Темплан 2004 г., п.'4
Подписано в печать Формат 60x84 1/16 Бумага офсетная. Офсетная печать. Усл. печ. л. 8,31 Уч.-изд.л. 8,31 Тира 135 экз. Заказ 342
Издательство Брянского государственного технического университета 241035, Брянск, бульвар 50-летия Октября, 7. БПУ. 55-90-49 Лаборатория оперативной полиграфии БГТУ, ул Институтская, 16.