Скачать 0.94 Mb.
|
FORTRAN - acronym for FORmula TRANslation. This language is used for solving scientific and mathematical problems. It consists of algebraic formulae and English phrases. It was introduced in the United States in 1954. COBOL - acronym for Common Business-Oriented Language. This language is used for commercial purposes. COBOL, which is written using English statements, deals with problems that do not involve a lot of mathematical calculations. It was first introduced in 1959. ALGOL - acronym for ALGOrithmic Language .Originally called IAL, which means International Algebraic Language. It is used for mathematical and scientific purposes. ALGOL was first introduced in Europe in 1960. PL/I - Programming Language I. It was developed in 1964 to combine features of COBOL and ALGOL. Consequently, it is used for data processing as well as scientific applications. BASIC - acronym for Beginner’s All–purpose Symbolic Instruction Code. It was developed in 1965 at Dartmouth College in the United States for use by students who require a simple language to begin programming. C - developed in the 1970s to support the UNIX operating system. C is a highly portable general–purpose language. Other such languages are APL (developed in 1962), PASCA L (named after Blaise Pascal and developed in 1971), LISP and PROLOG, both of which are used for work in artificial intelligence. LOGO is a development of LISP which has been used to develop computer–based training (CBT) packages. When a program written in one of these high–level languages is designed to do a specific type of work such as to calculate a company’s payroll or calculate the stress factor on a roof, it is called an applications program. Institutions either purchase these programs as packages or commission their own programmers to write them to meet the specifications of the users. The program produced after the source program has been converted into machine code is referred to as an object program or object module. This is done by a computer program called the compiler, which is unique for each computer. The compiler is a systems program which may be written in any language, but the computer’s operating system is a true systems program which controls the central processing unit (C P U), the input, the output, and the secondary memory devices. Another systems program is the linkage editor, which fetches required systems routines and links them to the object module (the source program in machine code). The resulting program is then called the load module, which is the program directly executable by the computer. Although systems programs are part of the software, they are usually provided by the manufacturer of the machine. Unlike systems programs, software packages are sold by various vendors and not necessarily by the computer manufacturer. They are a set of programs designed to perform certain applications which conform to the particular specifications of the user. 3.8 Summarize the information on different high-level computer languages by completing the table below.
3.9 Choose the proper word to fill in the gap. Change its form if necessary. instruction, instruct, instructed, instructor a) Our math’s _______ explained to us the principles of binary arithmetic. b) We were _______ to document our programs very carefully. c) Both ______ and data have to be changed to machine code before the computer can operate on them. compilation, compiler, compile, compiled a) Our university computer does not have a PASKAL________. b) Usually, a programmer _________ his program before he puts in the data. c) A source program cannot be directly processed by the computer until it has been ____. result, results, resulting a) The linkage editor links systems routines to object module. The _______ program, referred to as the load module, is directly executed by the computer. b) The _________ of these mathematical operations were obtained from the university mainframe and not from my micro. 3.10 Look at the words in bold type in Text A. Can you give your comments from the grammar perspective? Do you know that…?
*Do not forget that irregular verbs have specific forms of Past Participle. Write these sentences, changing the verbs in brackets into the present or past participle.
Now give your own examples. 3.11 Read the text. Find sentences with Past Participle and translate them. Your future life is strictly dependant to the profession you choose. There are various jobs to take up and many ways how to lead the future life. In my opinion, the best choice is to take up the profession connected with computers. Today computers are considered to be the symbol of modern era. Everything connected with Internet, computers, multimedia and interactive television seems to be the techniques of the future. This advanced techniques is present in every part of our life. Everyone should be familiar with it, because it is essential. If I would have to choose my future profession right now, I would probably decide to work as programmer, computer scientists or net administrator. I am fond of the new techniques and software and hardware novelties. Computers are my passion. Now finish the idea: If I would have to choose my future profession right now, I would probably decide to work as programmer… 3.12 Translate into English and reproduce the dialogue.
3.13 Before reading Text B match the key soft ware terms with their definitions. software operating system malware virus search engine
3.14 Read Text B using a dictionary and then make a list of software terms which are new for you. Give the definitions to these terms. TEXT All about Software Categories of applications software explained For years people understood the term software to refer to computer instructions, programs or data. Basically, anything that could be stored electronically on your computer is considered software. Traditionally, software has been divided into two different categories: systems software and applications software. However, in addition to those, an entire new batch of wares has entered the computer vernacular in recent years. Systems Software System software, as the diagram above illustrates, sits directly on top of your computer's hardware conponents (also referred to as its bare metal). It includes the range of software you would install to your system that enables it to function. This includes the operating system, drivers for your hardware devices, linkers and debuggers. Systems software can also be used for managing computer resources. Systems software is designed to be used by the computer system itself, not human users. Applications Software Unlike systems software, applications software is designed to be used by end-users. Applications software, in essence, sits on top of system software, as it is unable to run without the operating system and other utilities. Applications software includes things like database programs, word processors and spreadsheets, e-mail applications, computer games, graphics programs and such. Generally, people will refer to applications software as software. All the Other 'Ware Terminology Today we find new terms created frequently to classify types of applications software. You have classifications based on usage, for example games or accounting software, office applications,and other categories where the category is derived based on the main use of the software. Unfortunately, we also have a newer group of software related terms that have a negative association. Whileethe applications software itself may be useful, , it may also carry hidden programs or utilities that may cause undesirable effects. Malware We have a whole selection of software that may come bundled under the name of malware. Short for malicious software, malware is any software that has been designed (programmed) specifically to damage or disrupt a computer system. The most common forms of malware are computer viruses, worms, and Trojan horses. Other common types of software is adware and spyware. Adware is considered a legitmate alternative offered to consumers who don't wish to pay for software. Today we have a growing number of software developers who offer their goods as "sponsored" freeware until you pay to register. Generally most or all features of the software are enabled but you will be viewing sponsored advertisements while the software is being used. If you're using legitimate adware, when you stop running the software, the ads should disappear, and you always have the option of disabling the ads by purchasing a registration key. Unfortunately some applications that contain adware track your Internet surfing habits in order to serve ads related to you. When the adware becomes intrusive like this, then we move it into the spyware category and it then becomes something you should avoid for privacy and security reasons. Spyware works like adware, but is usually a separate program that is installed unknowingly when you install another application. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can also gather information about e-mail addresses and even passwords and credit card numbers. Unlike adware, spyware is considered a malicious program. For more information on spyware and adware, we recommend you check out Webopedia's "The Difference Between Adware & Spyware". Greyware Sometimes developers will include tools and programs within software that some may view as malware, but really, it falls into the grey area between malicious software and software, hence the name greyware. Greyware is the term used to categorize all other malicious or annoying software such as adware, spyware, trackware, and other malicious code and malicious software fall under. In addition to these types of software, there are more terms to describe software that is distributed with common tools and utilities that don't necessarily cause harm to your computer or are a security risk. Some of these terms are slang terms used to describe unwanted features found in applications software. Freeware is copyrighted software given away for free by the author. The author retains the copyright, which means that you cannot do anything with it that is not expressly allowed by the author. Usually, the author allows people to use the software, but not sell it. Shareware is software that distributed on the basis of an honor system. Most shareware is delivered free of charge, but the author usually requests that you pay a small fee if you like the program and use it regularly. Nagware is the term given to software that routinely issues a pop-up window or other form of visual interface asking the user to register a product, purchase an application or take another form of action. Bloatware is a slang term given to software that has so many features that it requires considerable disk space and memory resources to run. Abandonware is software that is no longer being sold or supported by its publisher. Considered a type of adware, slimeware is the slang term used to describe software that interferes with the user experience by changing key settings in order to gain profit. For example, slimeware may change your Internet browser default home page to one where you view a company's banner ad or products for sale. Software that is remotely accessed online usually with a Web browser, is called webware (although its more formal names are Web applications or online software. Lastly, there's warez which is a term that has been around for quite some time. Pronounced wayrz or wayrss, it is the name given to commercial systems software or applications software that has been pirated and made available to the public via a BBS or the Internet. Typically, those who pirate software, often called crackers, have figured out a way to de-activate the copy protection or registration scheme used by the software. The use and distribution of warez software is illegal. (http://www.webopedia.com) 3.15 Work in pairs or small groups. Using the list of software terms and definitions you’ve made check if your partners understand them. 3.16 Use http://www.webopedia.com or any other sites to investigate something new in computer software and present your information to your group. Unit 4 The Internet Vocabulary
4.1 How would you describe what the Internet is? Discuss it with your partner. 4.2 Match the terms and their definitions. a) Internet b) World Wide Web c) e-mail 1. A global network connecting millions of computers. 2. The transmission of messages over communications networks. 3. A system of Internet servers that support specially formatted documents. 4.3 Now read the text and try to describe the Internet again using the key vocabulary in bold type. Believe it or not, the Internet was created way back in 1969, during the Cold War, by the United States military. It was meant to be a "nuke-proof"(1) communications network. Today, the Internet spreads across the globe and consists of countless networks and computers, allowing millions of people to share information. Data that travels long distances on the Internet is transferred on huge lines known collectively as the Internet backbone. The Internet is now maintained by the Internet service providers. Many people think the Internet and the World Wide Web are the same thing. They're not! The World Wide Web is what you are browse. It is one of the many features of the Internet. E-mail, FTP(2), and Instant Messaging (3) are also features of the Internet. (http://www.sharpened.net) (1) "nuke-proof" устойчивый к воздействию ядерного оружия (2) FTP File Transfer Protocol протокол передачи файлов (используемый в Internet протокол передачи файлов между хост-компьютерами) (3) Instant Messaging система мгновенной передачи текстовых сообщений 4.4 Interview your partners if they surf the Internet. Use the questions given below.
4.5 Read the passage below and think if you always follow the netiquette. Why? / Why not? Discuss it with your partner. Netiquette, or net etiquette, refers to etiquette on the Internet. Good netiquette involves respecting others' privacy and not doing anything online that will annoy or frustrate other people. Three areas where good netiquette is highly stressed are e-mail, online chat, and newsgroups. For example, people that spam other users with unwanted e-mails or flood them with messages have very bad netiquette. You don't want to be one of those people. If you're new to a newsgroup or online chat room, it may help to observe how people communicate with each other before jumping in. 4.6 Think of good and bad points of the Internet and fill in the table. You can work either individually or in pairs.
4.7 Read Text A, compare your ideas with information given, and extend the table. How many advantages/disadvantages are there in your table? First, study the vocabulary you may need to understand the text. mankind [mæn'kaɪnd] (n) 1) человечество; человеческий род ['mænkaɪnd] 2) мужчины, мужской пол magnitude ['mæɡnɪtju:d] (n) 1) величина, paзмеры, 2) важность; значимость outweigh [̗aυt'weɪ] (v) быть тяжелее, превосходить в весе wealth [welθ] (n) изобилие, избыток target ['tɑ:ɡɪt] (n) цель advent ['ædvent] (n) наступление (какой-л. эпохи, какого-л. события), available [ə'veɪləbl] (adj) доступный; имеющийся в распоряжении, entertainment [̗entə'teɪnmənt] (n) развлечение; зрелищное мероприятие numerous ['nju:mǝrəs] (adj) многочисленный available [ə'veɪləbl] (adj) доступный; имеющийся в распоряжении theft [θeft] (n) воровство, кража obstruct [əb'strʌkt] (v) препятствовать, затруднять, мешать prone (adj) подверженный (чему-л.) Text A Advantages and Disadvantages of the Internet The Internet has been perhaps the most outstanding innovation in the field of communication in the history of mankind. As with every single innovation, the Internet has its own advantages and disadvantages. But usually, greater magnitude of advantages outweighs its disadvantages. Today the Internet has brought a globe in a single room. Right from news across the corner of the world, wealth of information to shopping, purchasing the tickets of your favourite movie. Advantages Communication The main target of the Internet has always been the communication. By the advent of the Internet, our earth has become a global village. Now we can communicate with a person who is sitting in the other part of the world. Information Information is probably the biggest advantage the Internet offers. Students and children are among the top users who surf the Internet for research. Today, it is almost required that students should use the Internet for research purpose of gathering resources. Entertainment Downloading games, visiting chat rooms or just surfing the Web are some of the entertainments. In fact, the Internet has been successfully used by people to find life long partners. When people surf the Web, there are numerous things that can be found. Music, hobbies, news and more can be found and shared on the Internet. Services Many services are now provided on the Internet such as online banking, job seeking, purchasing tickets. Often these services are not available off-line or can cost you more. E-Commerce It has got a really amazing and wide range of products from technology to household needs. Disadvantages Theft of personal information If you use the Internet, you may be facing danger as your personal information such as name, address, credit card number, etc. can be accessed and used by a criminal. Spamming Spamming refers to sending unwanted e-mails, which provide no purpose and obstruct the entire system. Virus threat Computers attached to the Internet are more prone to virus attacks and they can end up into crashing your whole hard disk. Pornography This is perhaps the biggest threat related to your children’s healthy mental life. (http://www.buzzle.com) 4.8 Match the words below to make word partners.
4.9 Now use the word partners to complete these sentences.
4.10 Analyse the “-ing” words in bold type in Text A. Are they gerunds? Why/Why not? Do you know that…?
Complete the sentences, using gerund.
Now give your own examples. 4.11 Work in pairs or in small groups. Discuss if you always trust the information from the Internet? Why/Why not? Now skim Text B and say what the main idea of the text is. 4.12 Read Text B and give your ideas on what could help Zack to understand that Professor Butz's Web page wasn't a reliable source of information? (To understand the text better use the vocabulary given below.) TEXT B The Web - Teaching Zack to Think As more and more students access the Internet for research, it's important that they learn how to validate online information. The Internet is a place where you can find "proof" of almost any belief system that you can imagine. And, for too many students, "If it's on the Internet, it must be true." The following story is also true. Fourteen-year-old Zack was asked to research a unique topic for his history class. Zack knew a bit about using reliable sources on the Internet, so when he found some information on a Web page on the US Northwestern University site he felt sure that he had found a reliable source of information for his project. The topic was unique too—Holocaust Revisionism—Zack had never heard of that before, so he decided to write his history paper on "How the Holocaust Never Happened." Zack found his "information" from a Web page at http://pubweb.northwestern.edu/~abutz/ (no longer at this URL), titled "Home Web Page of Arthur R. Butz." On his low-key home page, Butz explained that he wrote "A short introduction to the study of Holocaust revisionism" and that his material was intended for "advanced students of Holocaust revisionism." At the top of the page Butz identified himself as "Associate Professor of Electrical and Computer Engineering, Northwestern University». His article began with the following: “I see principal reasons for the widespread but erroneous belief in the legend of millions of Jews killed by the Germans during World War II: During both world wars Germany was forced to fight typhus… That was one of the main reasons for a high death rate in the camps, and the crematoria... Look at the above situation from the perspective of a 14-year-old, untrained to think critically about information. He's researching the Holocaust, and suddenly finds this Web page. His teacher told him to find a unique topic, and this certainly fit the bill. The page is simple and clear. It's written in a calm, logical tone. The page is clearly intended for experts in its field. Best of all is the source: Northwestern University! And a professor to boot! Perfect. validate ['vælɪdeɪt] v проверять достоверность proof [pru:f] (n) доказательство belief [bɪ'li:f] (n) убеждение, мнение; вера reliable [rɪ'laɪ əbl] (adj) заслуживающий доверия, достоверный reliable information - достоверные сведения reliable source – достоверный, надежный источник low-key (adj) 1) неброский; сдержанный 2) гамма тёмных тонов in a low key - в тёмных тонах Associate Professor доцент университета widespread ['waɪdspred] (adj) широко распространённый erroneous [ɪ'rəυnɪəs] (adj) ложный; ошибочный; typhus ['taɪfəs] (n) сыпной тиф fit the bill отвечать всем требованиям to boot к общей пользе; вдобавок; к тому же 4.13 Now read Text C and check your ideas. (To understand the text better use the vocabulary given below.) TEXT C Thinking about What We've Found The fact is that students increasingly depend on the Internet for information, so it's important that they develop ways to evaluate their findings. Zack could have used some, or all, of the following techniques to decide whether the site was a reliable source for information. Purpose Try to determine a Web site's purpose. What is it trying to do? Why was it created? Most Web sites are designed to sell services and products, present information, put ideas forward, or entertain. Many sites do several of these at once. A Web site's purpose will not always be clear. Look at Butz's site. His purpose is surely advocacy, although he comes across as an objective information provider, especially in the closing sentence of his article: "Surely any thoughtful person must be skeptical." Would a 14-year-old know how to distinguish between objective information and propaganda? Understand the purpose(s) of a Web site, and that those purpose(s) may not be entirely obvious. Author The next step in validation involves the site's author. We all know that it's easy to fool people. Many people will believe someone if he or she sounds authoritative. Butz is a professor, sure, but he's an Engineering professor. How does that qualify him to speak as an expert on the Holocaust? It doesn't. But people see "Professor" and take what he says seriously. Zack didn't know anything about Butz, but could have researched his background. If Zack ran a search for "Arthur Butz," on the search engine Google, he would find Butz's name on a page titled "Holocaust Deniers" at the Web site for the anti-hate organization HateWatch (http://www.splcenter.org/intel/hatewatch/). Similarly, Zack would find Butz's article at a second hate directory site listed under "A Guide to Hate Groups on the Internet: Hate Books, Newsletters and Articles". Zack would find Butz mentioned negatively in a March 1998 USA Today article titled, "College anti-Semitism on the rise, according to new report." Zack would also find Butz's book described as popular among "anti-Semites" in a review of Deborah Lipstadt's book Denying the Holocaust. If Zack had run this multi-search on Butz, he would have seen how other people categorize Butz' work. Establish the credibility of the author. Meta-Web Information Meta-Web information validates Web pages solely within the context of other Web pages. Let's start with the URL, or address, of a Web page. You need to know when they're accessing a personal home page. Most Internet Service Providers give their subscribers a few megabytes of free space on a Web server to use as they want. Here are two sample URLs: In the first example, the word "users" is the user name of someone who accesses the Internet through cdsinet.net. In the second example, focus on the ~. A tilde (~) indicates a Web site that has been created by someone given space on a Web server. "stefan" is the user name of someone who accesses the Internet through icon-stl.net. Knowing the above, if Zack had looked at Butz's URL - Just as Zack can know something about individuals by their clothing, he can learn about a Web site by looking at its URL. Clothing tells us a lot, but the company a person keeps tells us more. Learning how a Web page interacts within the network of all other Web sites is valuable information. Meta-information sources. It is always a good idea to look beyond the Internet for sources of authentic information. evaluate [ɪ'væljυeɪt] (v) оценивать; определять количество, качество и т. п. technique [tek'ni:k] (n) метод; способ determine [dɪ'tɜ:mɪn] (v) определять; устанавливать entertain [̗entə'teɪn] (v) развлекать, занимать advocacy ['ædvəkəsɪ] (n) 1) защита 2) пропаганда (взглядов и т. п.) distinguish [dɪ'stɪŋɡwɪʃ] (v) различать, распознавать authoritative [ɔ:'θɒrɪtətɪv] (adj) авторитетный; надёжный deny [dɪ'naɪ] (v) отрицать, отвергать denier тот, кто что-либо отвергает credibility [̗krədə'bɪlətɪ] (n) вероятность, правдоподобие experienced [ɪk'spɪərɪənst] опытный, знающий tilde ['tɪldə] (n) (полигр.) тильда (tilde) beyond [bɪ'jɒnd] (prep) за; по ту сторону, вне authentic [ɔ:'θentɪk] (a) 1) подлинный, аутентичный 2) достоверный, верный 4.14 Translate the text into English and then finish it. Use the vocabulary from the Texts B,C. Все большее количество студентов используют Интернет как источник информации для своих исследований. Сегодня в Интернете можно найти доказательства любых идей, которые могут прийти вам в голову. А ведь многие считают ту информацию, которая представлена в Интернете вполне достоверной. Но это не так. Поэтому очень важно научиться оценивать достоверность такой информации. Для того чтобы определить является ли сайт надежным источником информации, можно использовать несколько методов: ___________ 4.15 Write a list of recommendations to help students critically evaluate the reliability of a Web site. |
Методические указания предназначены для студентов I курса всех технических специальностей нгту, изучающих английский язык (уровень... | Настоящее издание адресовано студентам I курса всех технических специальностей, изучающим английский язык на заочном отделении нгту,... | ||
Методические указания предназначены для самостоятельного изучения предмета, выполнения контрольной работы и подготовки к экзамену... | «Международная конференция» магистрантами и студентами всех факультетов как на занятиях по английскому языку, так и в режиме самостоятельной... | ||
Методические указания предназначены для студентов 2 курса всех специальностей заочной формы обучения | Математика. Экономико-математические модели : программа, методические указания и контрольные задания для студентов 4 – 5-го курсов... | ||
Методические указания предназначены для студентов технических специальностей очной полной и сокращенной формы обучения | Методические указания предназначены для студентов I курса всех специальностей гапоу рб "Уфимский медицинский колледж" для организации... | ||
Методические указания, программа, решение типовых задач, программированные вопросы для самопроверки и контрольные задания для студентов-заочников... | ... |
Поиск Главная страница   Заполнение бланков   Бланки   Договоры   Документы    |