М инобр а зов а ния Р оссии В ор онеж ский госу да р ств енны й у нив ер ситет К а федр а а нглийского я зы ка
Computer Revolution У ч ебное п ос обие д л я с т уд ент ов груп п п род винут огоэт ап а обуч ения англ ий с к ому я зы к у и магис т ров ф -т а ПМ М Сос т авит ел ь – Ст ернина М .А.
В ор онеж – 2002
2
Пред л агаемое п ос обие п ред назнач ено д л я с т уд ент ов груп п п род винут ого эт ап а обуч ения англ ий с к ому я зы к у и магис т ров ф ак ул ьт ет а п рик л ад ной мат емат ик и, инф ормат ик и и мех аник и. Пос обие с ос т авл ено на мат ериал е аут ент ич ны х т ек с т ов и с т авит цел ью развит ие навы к ов ч т ения и вед ения бес ед ы п ос п ециал ьнос т и. Пос обие может бы т ь т ак же рек оменд овано д л я работ ы с магис т рами мат емат ич ес к ого ф ак ул ьт ет а и с т уд ент ами, обуч ающимис я п о п рограмме д оп ол нит ел ьного образования «Перевод ч ик в с ф ере п роф ес с ионал ьной к оммуник ации» ф ак ул ьт ет а к омп ьют ерны х наук .
Лит ерат ура 1. Gerald Lewis, Beatriz Del Castillo. English through Computers 2. – McGrawHill, 1998. 2. Geoff Jordan, Beatriz Del Castillo. English through Computers 3. – McGrawHill, 1999. 3. Santiago Remacha Esteras. Infotech. – Cambridge University Press, 2001.
3
Part 1. Computer Applications Unit 1. The Home Office Revolution PRE-READING TASK Discuss the following questions: 1. What kinds of work could you do at home, using a computer connected by a modem to networks? List at least six different types of work. 2. What are the advantages of working at home? 3. What are the disadvantages of working at home? READING I. Read the text below: Various studies on work suggest that eighty per cent of working people do not like their jobs. The reasons are varied: many people say they do not like working for a boss and that they would like to be independent, others say that the work is boring, or that they work too many hours, or that they have few possibilities for promotion, or that they dislike the cost and stress of traveling to work. At the same time as the majority of workers appear unhappy with their jobs, there is also the employer's point of view. The rising price of commercial office space makes it increasingly difficult to find adequate offices, and it is also increasingly difficult to find good workers. These factors, combined with today's low-priced, high-powered computers, have made both employers and those people who want to be independent look at the home office as a new option. It is estimated that 40 % of all computers now sold will be used at home, and that the home computer market will grow by 15 % each year. In Canada, home office computing is the fastest growing trend, in the United States more than a million people now work at a home office, and in France the government-sponsored national network is used by 450,000 people working from their homes for business purposes. What types of business can be done using a computer at home? Successful home businesses range from simple typing services to video production and mail order sales and cover just about everything else between. Some of the more common businesses include professional consulting, computer consulting, desktop publishing, writing, data entry and processing, and tutoring. Architects and engineers, fashion designers and interior decorators use special CAD (Computer Aided Design) software to work on projects for clients. Lawyers, accountants, and business consultants use spreadsheets and graphics software. Translators, copy typists, authors and others use word processors. Teachers use CAI (Computer Assisted Instruction) programs.
4
Most of these people use modems and communication software to connect with other colleagues, with data banks, and with their clients, and it is the networks that make the home office a real alternative. A central office can communicate with any number of people working from their homes, sending out work, and receiving the work when finished. Why should a company have ten secretaries working in a big, expensive office in the middle of a city if these secretaries can easily do the work at home? Why should writers, musicians, architects, business consultants, etc. need an office in the city, if computers and networks can allow them to work at home? Apart from the growth of independent professionals and business people working at a home office, there is also the growth of people working for a company, but doing part of the work at home. Work Well is a Canadian organization which promotes flexible work options. Workers are given the option of working at home instead of on the employer's usual premises, and telecommunication is the key to this alternative, allowing the electronic transfer of information by way of a remote computer terminal and a modem. At the moment, most workers combine a certain amount of time at the usual premises with work at home, going into the central office three days a week, and spending the rest of the time working at home. Telecommuting offers many advantages to employers and workers. Employer advantages include savings in rent, property, and utilities, higher worker productivity, and decreased absenteeism and resignations. Major advantages to the workers include avoiding the cost and stress of traveling, savings in vehicle costs, parking, clothing, and meals, fewer distractions, and the ability to work at your own pace. The major disadvantage to workers is a possible social isolation — workers do not have the contact with others that is possible when working in a normal company. This problem can be addressed by such things as newsletters and computer bulletin boards which allow the workers to communicate with each other electronically, and also by organizing meetings and social events which bring the home workers together. For telecommuters, the employer usually pays for the necessary computer equipment to be installed in their homes. The independent business person obviously has to pay for the equipment, and the cost of equipping a home office will vary according to individual requirements. In addition to office furniture, the average home office will contain a computer, a modem, a printer, and possibly a fax machine. A separate phone line is desirable. And people working at a home office will also need the support of the rest of the family, especially respect for the work schedule. This is a particularly important consideration for women, who must convince the family that if they are at home, they are not necessarily available to cook meals, help children, etc. II. Answer the following questions: 1. What reasons do people give for not liking their work? 2. What percentage of computers sold will be used at home? 3. Which government is sponsoring people working from their homes? 4. What types of business can easily be done at home using a computer? 5. What computer equipment do people working at home use?
5
6. What options does the Work Well Canadian organization offer the employees? 7. What are advantages of telecommuting for employers and workers? Ш . Read the following statements and say if they are true or false. 1. 2. 3. 4. 5.
Home office revolution meets the demands of both workers and employers. It is access to networks that makes home office revolution possible. A central office can communicate with only several home computers. It is impossible for workers to combine work at home with work at the office. The major disadvantage of working at home is smaller salary, if compared with those, working at an office.
Unit 2. Computers and Education PRE-READING TASK Discuss the following questions: 1. How important is free access to information for learning? 2. How do you think the availability of cheaper, more powerful computers linked in networks should affect education in the 21st century? 3. How do you think the availability of cheaper, more powerful computers linked in networks will affect education in the 21st century? READING I. Read the text below: Computers have become as much a part of our lives as televisions, and their networks cover the world more comprehensively than telephones do. What are the potential benefits of this technology for education? First, computer networks encourage interactivity. Computer-based exercises interact with students by giving them questions, and then responding to the students' input, typically by giving a response such as «Your answer is correct», or «No, try again». Computers may also take initiatives, behaving more like an assistant, or personal tutor. They may have information about each student's individual goals, and are able to examine the enormous amount of information that is available through networks in order to provide relevant data for each student. Computers are able to suggest exercises to students, and provide relevant back-up information, depending on the student's performance. A second benefit that computers can offer students is the ability to provide multimedia formats. Multimedia can be defined as various combinations of texts, graphics, sound, video and animation that are controlled, coordinated and delivered on the computer screen. Multimedia also implies interactivity, where the user is actively engaged in the presentation of information, and is not just a passive observer
6
of a fixed procession of sights and sounds. One of the most frequently used terms to describe the advantages of multimedia teaching is that it is «non-linear»: students are free to explore content, creating individual paths through the information provided by the computer. The three principal ways in which multimedia technology is used in education are: a) by the teacher at the front of the classroom as a more flexible and versatile update of traditional audiovisual media, b) by groups of students working on collaborative projects, c) by individual students working alone. Multimedia can increase the depth and breadth of education, particularly in specialized areas of the curriculum where access to teachers and valuable teaching materials is limited. For example, most medical students do not have ready access to detailed information about diagnostic techniques used in cardiology; these subjects are usually introduced late in a doctor's education. New programs using multimedia technology allow students unlimited access to this information; the programs simulate the cardiological problems, and give students the opportunity to experiment with different solutions without putting any patient's life at risk. As the cost of hardware falls, the use of multimedia with personal computers is becoming more common for individual student use. Interactive learning on an individual basis helps students of all levels. For quick learners, multimedia offers the opportunity to explore beyond the basics of the course. For slower learners, individualized learning situations lessen the fear of having to publicly ask for extra help or admit that they «didn't get it» the first time around. Third, information can be presented from many different perspectives. Ideas can be presented as text, as diagrams, as sound, as moving images, so that students get the maximum opportunity to see things from many different points of view. This means that students will be able to choose the type of media through which they want to receive and communicate ideas. Fourth, computers can go beyond static representation and offer simulations that allow students to test theories and ideas. Computer simulations cover the whole educational curriculum: chemistry, physics, biology, economics, engineering, social sciences, music, the list is endless. These simulations are at the center of what computers can offer education and they represent an extremely important advance in learning opportunities. Finally, when computers are linked by comprehensive networks, they will offer students a universal library: all the libraries in the world will be accessible and so will resources such as supercomputers, satellites and huge data bases. As more and more information becomes available, the ability to critically assess the value and validity of the information will be crucial. This ability has been important since books became widely available, but until now, making comparisons between different points of view has been quite difficult. Now comparing facts, opinions, and theories will become a lot easier. Computers can be programmed so that facts retrieved in one window on a screen will cause supporting and opposing arguments to be retrieved and displayed in other windows. An on-line library should
7
do more than simply retrieve what the student requests, it should help by offering related material, so allowing the student to browse through other information, and get ideas that he had not thought of. Today, facts are often separated from their original contexts. This fragmentation of information can be remedied by programs that put separately retrieved ideas into sequences that lead from one thought to the next. Programs can also provide students with organizational tools that help them identify goals for their searches: the programs will ask them what they want to look for, what parameters they want to impose, how deeply they want to pursue a question. The student can then make a first linear pass through the information, going sequentially as with a book, and subsequently go through the information again to criticize and evaluate it. Networked computers should dramatically improve education by putting more information more easily at people's disposal, and by encouraging them to question and challenge that information. Computers offer human beings not just masses of information, but the opportunity to check that information: any facts, opinions, beliefs, or views can be scrutinized, and the easier it is to question facts before accepting them, the more students will make it a habit. When education produces people with a wider, more critical point of view, modern culture will be transformed, as it was by the appearance of the personally owned book 400 years ago. II. Answer the following questions: 1. In what way will computers become more like assistants or personal tutors in the near future? 2. Define «multimedia». Why is multimedia considered to be a non-linear format? 3. What are the 3 ways of using multimedia technology mentioned in the text? 4. How is multimedia technology helping medical students? 5. How can multimedia help the fast and the slow learners working alone? 6. Why is the ability to see things from different points of view important to the learning process? 7. How do multimedia simulations help learning? 8. Why is it not enough to just have access to information? 9. How can computers help learners critically assess the value of information? Ш . Read the following statements and say if they are true or false. 1. Computers will be able to offer students exercises specially created and adapted to their individual levels and needs. 2. Multimedia consists of the presentation to an observer of a fixed procession of sights and sounds. 3. Medical students have unlimited access to information about diagnostic techniques used in cardiology. 4. Computer simulations only cover the science subjects in the educational curriculum. 5. When computers are linked by comprehensive networks, they will offer students access to all the libraries in the world.
8
Unit 3. Education for Socially Disadvantaged People PRE-READING TASK Discuss the following questions: 1. What kinds of disability make it difficult for people to use standard computer equipment? 2. What do you think is the attitude of big computer companies towards the disabled? 3. How do you think standard computer design could be altered to help the disabled? READING I. Read the text below: As the world becomes more and more based on the play of market forces and free competition, companies working in the areas of information technology and telecommunications have to give priority to making a profit. The result is that companies look for big markets — the young, the domestic household, industry, etc. — and have little incentive to worry about the problems of small minorities of the population like the disabled. Consequently, the disabled are not getting the help they need and the new technology is missing a great opportunity to improve the lives of the disabled. But perhaps companies should take a closer look. Here is some data concerning the potential market for companies prepared to serve the disabled and the illiterate. The data concerns only the USA. •43 million people are physically or mentally disabled. •One of six people is born with a disability. •About 500 000 people become disabled every year. •There are more than 4 million people with disabilities within the American school system today. •More than half of the Americans with disabilities are of working age, but only 25 % of them are employed. Apart from the profit potential of such a market, there are other reasons why emphasis should be put on technology as a mean of addressing the needs of people with physical or mental disabilities: a) To enable people to compete on an equal basis with others (for example, helping a blind person to stay abreast of the latest developments in his or her field, through optical character recognition technology, coupled with either “talking” software or a Braille software program).
9
b) To allow communication and self-expression to the deaf, to permit them to share ideas with others. c) To offer people who are reluctant to be involved in instructional literacy programs the opportunity to work on a computer and, consequently, a chance to get better, more marketable skills. To take advantage of new technologies handicapped people must first gain access to them. This difficulty of access may be financial (modern technologies are always expensive even if they are shared between people) or physical (blind and deaf people need special computer modifications). We have to distinguish between enabling technologies and adaptive ones. Enabling technologies enable the creation of equipment and applications that allow all users to interact with computers more easily. Adaptive technologies are hardware and software products that can be used to adapt computers to meet the needs of people with physical disabilities. In regard to the latter, four areas of adaptive technologies can be mentioned: •Computer input: solutions offered to people with motor impairments who have difficulties in manipulating standard devices. •Computer output: audible signals, speech synthesizers, screen reading programs designed for people with visual or hearing impairment who may find access to computer output difficult. • Environment: the provision of physical access to the equipment and modification of the environment to suit particular needs (wheelchair access to computer facilities, convenient printers, earphones, etc.). • Documentation: adaptation of the form of print to the disability (audiotapes, Braille, etc.). Special interest groups have made a list of more than sixty design characteristics of normal computers that present obstacles for individuals with disabilities, and Apple and its cooperators have been working on remedying the situation. Today, all the identified obstacles have either been eliminated or redesigned. The principal solutions consist of: • Close view: designed for people with visual impairments. It allows people to enlarge the screen to up to 16 times its actual size or to change the contrast. •System beep: the computer beeps to get the user's attention or, if the volume control is at zero, there is a blinking menu alternative. •Repeat key: most keyboards allow users to repeat a single keystroke by holding it down; but for people who can't lift their fingers quickly enough of the keyboard, tapping the key can be a real obstacle to computing. The solution is to simply omit this feature. •Easy access: disabled users type with a headstick or a mouthstick and can type keys one at a time and instruct the computer to respond as if the keys were pressed simultaneously. There is also a “voice-navigator”, a voice recognition tool that translates the user's spoken instructions into computer commands. Apple's research department is also teaching the computers to read handwriting, a technology that can be very useful for blind people.
10
•Headmaster: sipping and puffing into a plastic tube controls the clicking of the mouse, and an on-screen keyboard enables even individuals who are paralyzed from the neck down to operate the computer. Finally, while all these operating-system features will give the disabled a better chance to live normal, rewarding lives, we should emphasize the need for adequate support for this hardware and software. Computing personnel need to be given special training for the needs of people with disabilities so that they can provide the disabled with the backup systems they need. The numerous practical issues involved in providing the disabled with special equipment must be made clear to technical and service personnel, who must ensure that someone is available to offer training in the use of the available adaptive technologies and to know what to do if the material breaks down. II. Answer the following questions: 1. Why do big computer companies not pay much attention to the disabled? 2. Why, according to the text, are companies mistaken, from a business point of view, to pay so little attention to the disabled? 3. Apart from the profit motive, what reasons does the text give for using computer technology to help the disabled? 4. What is the difference between enabling technologies and adaptive ones? 5. What are the four areas of adaptive technologies mentioned in the text? 6. What five solutions have been offered to the problems of adaptive technologies? 7. Why is the provision of special hardware and software not enough to meet the problems of the disabled? Ш . Read the following statements and say if they are true or false. 1. Because companies must make profit, the needs of minorities are often given very little attention. 2. More than half of disabled Americans have a job. 3. Close view is an example of adaptive technology which is used to help the disabled input the data. 4. Computers that are able to read handwriting are especially useful for blind people. 5. In the United States all computing personnel are given special training for the needs of people with disabilities.
Unit 4. Computers in the Mass Media PRE-READING TASK Discuss the following questions: 1. Have you ever been to a newspaper office? How does it look like?
11
2. Do you think that newspaper production has changed within the last years? 3. Can you predict any changes in newspaper production in the future? READING I. Read the text below: Fans of American movies will no doubt be familiar with the old Hollywood image of a busy newspaper office. There were typewriters everywhere, ten phones would be ringing at the same time, people ran about clutching precious pieces of paper with newly-written articles, and the general impression was one of organized chaos. If a journalist from 50 years ago saw how a modern newspaper is put together, he would find a lot to surprise him. Computers are taking over the business of planning and organizing the printed page. Instead of the bedlam of phone conversations he was accustomed to hearing in the background, he would hear the hum of constantly arriving faxes, instead of the clattering of typewriters, he would hear the quieter and pleasanter tapping of computer keyboards. In a typical modern newspaper, the process of creating an edition begins with a set of specifications held in memory, of such things as the number of pages, advertising copy, photographs and so on. This information is passed to “slave’computers. This enables the different sections of the paper to be shared out between the different journalists, who have the template of their particular pages present on their own monitor. And can type their articles directly into it. The result is that in a mediumsized newspaper there will be dozens of small computer terminals, each with a writer working at it. Once the writer has completed a page, this is sent back to the sub-editor of the particular section (sports, economy, etc.), who checks it and puts it in the proper place. The next stage is “coordination”: this is the department which checks each page and fills in the gaps with photos which are digitized in the scanner section. Finally the pages are sent to be filmed. And the resulting transparencies are sent to the workshop which prepares them for the press. All this means that the “chaos” element is kept to a minimum, the work is shared out logically and efficiently. At the same time, the essential elements of a good newspaper have remained the same in spite of all technological changes: after all, computers can control many of the stages of production, but they can’t (yet) write articles themselves. Recently some researches said that they would soon be able to make a computer write sophisticated texts based on simple data. If this were to happen, a lot of people would have to start looking for another job! II. Answer the following questions: 1. Is the working atmosphere in a modern newspaper different from that of 50 years ago? 2. How is a modern newspaper produced?
12
3. What are the essential elements of a good newspaper? 4. Do you think computers will ever write newspaper articles themselves? Why (not)? Ш . Read the following statements and say if they are true or false. 1. In American movies people are always running around the newspaper office. 2. Modern newspaper office has a lot of computers and fax machines. 3. It is still impossible for different journalists nowadays to work on different newspaper pages simultaneously. 4. Due to technological changes it became possible to control many stages of newspaper production.
Unit 5. Computers in Research PRE-READING TASK Discuss the following questions: 1. What spheres of research can computers be used in? 2. Why are computers useful in scientific research? 3. Are there any disadvantages of using computers in research? 4. Where are “computer simulations”used most frequently? READING I. Read the text below: NASA AND THE SPACE PROGRAM Tens of thousands of technical and administrative tasks related to America's space program are accomplished every day with the aid of computers. The hardware ranges from small microcomputers used for word-processing, planning and data management by clerical, professional and management personnel to large mainframe computers for sophisticated management information and control systems. Computer applications Microcomputers •Data Base Management
Minicomputers •Computer Aided Drafting •Computer Aided Design and Engineering •Computer Graphics & Word Processing
13
Mainframes
Special Applications
•Payroll •Budgets •Shuttle Operations (Configuration Management) •Launch Control •Software Development
•Electronic Printing •Electronic Publishing • Photographic Process Monitoring •Modeling/Design • Simulation •Instrumentation/Data, Logging Telemetry
A good example of the technology used by NASA is contained in two computeraided engineering graphics software packages. They are called PLAID and TEMPUS and they model objects like Space Station modules and the astronauts who will work in the Space Station environment. By studying the graphics modules, specialists can find ways to ensure that the people in space interact efficiently and safely with machines. Computers related to the Space Shuttle — some examples At Kennedy Space Center in Florida, the LPS (Launch Processing System) controls the prelaunch checking and the sequencing of the launch countdown. It consists of various subsystems, including the checkout, control and monitor subsystem which relays information to visual display unit controlled by human operators. The screens use a system of color signals to indicate the degree of urgency of the information shown: a red signal means that immediate human attention is needed to prevent possible serious consequences. On board the Shuttle, there are five identical General Purpose Computers (GPCs): four of them are designated to run the primary avionics system software (PASS) and the other is known as the backup flight system (BFS). They use completely different software to perform the same functions — this is in order to avoid the possibility of an undetected error or “bug”in the software leading to general breakdown. By today' standards these computers are not very fast, but their advantages lie in their small size and durability. There is also a sophisticated landing system combining microwave scan beams and radars, but the astronauts also have the option of landing the Shuttle themselves in “manual mode”. To facilitate this, a “head-up display” (HUD) was installed — this consists of a cathode-ray tube generating computer images which are passed through a series of lenses onto “combiner glasses” which enable astronauts to see out of the window and read the controls at the same time! Other uses for computers All of the classic areas of conducting day-to-day business are supported by digital processing within NASA installations. From payroll processing to automatic control of building utilities to high-speed, high-quality scanning and printing of documents, office automation has become established as the most cost-effective way of working.
14
And finally — the Ames Center Supercomputer The world's most powerful supercomputer, capable of crunching out a quarter of a billion calculations per second, operates at the NASA Ames Research Centre in Mountain View, California. The major research projects selected for this computer focus on aerodynamics and hypersonic flight research. The high-speed processors are used to solve complex aerodynamic equations so that aircraft configurations can be tested by “flying the aircraft in the computer”, and this reduces the time and cost of developing new aircraft. Other projects include astrophysics, weather modeling, computational chemistry and other large-scale computational problems. II. Answer the following questions: 1. What are the names of two computer-aided engineering graphics software packages? 2. Why do NASA technicians use color monitors (instead of black-and-white)? 3. Explain in your own words why the Space Shuttle has sets of completely different software programs to perform the same function. 4. Explain in detail, giving your own examples, why the use of computers in offices is described as “cost-effective”.
Unit 6. Computer Games PRE-READING TASK Discuss the following questions: 1. What are your favorite computer games? What do you like about them? 2. Can you classify the computer games you know into different categories? 3. Chess is an example of a traditional game which has been “adapted” for computers. Do you know of any others? 4. There are a lot of expressions in English using the word “board” — surfboard, ironing board, floorboard, etc. What do you think a “board game”is? READING I. Read the text below: Many people use their PCs to play games, and some people use them for hardly anything else! Whatever you may think of a person who spends all his or her free time trying to shoot down imaginary “aliens”on the screen of a computer, the fact is that computer games can be extremely addictive, and they are fast becoming the most popular form of entertainment. Here are some of the most common types of games.
15
Adventure games This type of game does not require spectacular colors and sound effects — all you need is a little imagination. The program contains the details of an imaginary world which the user has to explore. The exploration takes the form of orders which the user types in on the keyboard (sometimes the program will allow abbreviations — for example “NE” for “go north-east”): these orders determine the actions taken by a character who represents the user's alter ego (like the hero in a novel). They may include movements (“go north”), physical actions (“open box”, “throw stick”) or sometimes reactions of an apparently less utilitarian nature (“fall in love with alien's daughter”). The program contains a routine called a “parser”which rapidly compares the orders typed in by the user with a list of recognized instructions. What happens when the user enters an order which the program doesn't recognize, well, that depends on the ingenuity of the programmer, but usually you get a message like “I don't know how to burst into tears” and an invitation to give an alternative instruction. Games of this type include the famous “Dungeons and Dragons”, as well as adventures involving alien spaceships, crimes and detectives, or mythical gods and goddesses. Board games It was inevitable that, as the technical possibilities of microcomputers increased, all the traditional old favorites like chess, draughts, poker and bridge would appear on computer screens. No longer does the keen amateur player have to look for a suitable opponent of his own level: the computer is an ideal opponent, since it is always willing to play, never cheats, does not take hours to make a move, and in many cases is even willing to give you advice on your next move! The quality of these programs has improved tremendously in a very short time, with attractive graphic displays, different options for choosing type of game or level, and so on. Educational games With the arrival of Dr. Logo, a programming language designed especially for educating children in basic notions of mathematics and geometry, and offering enormous recreational possibilities with its graphic “turtle”, the idea of educational games became very popular, and a number of software companies specialize in this type of games. There are games for learning spelling, mathematics, reading skills... even English! Sound and graphics This type of fast-moving action game, with its attractive bright colors and sound effects, became quite popular. With the advance in PC technology these games appeared in versions suitable for PC, and were soon followed by a vast number of new titles specially created for PC users, with enhanced graphics and sound effects. Now, a visit to any software shop will enable you to guide the movements of spaceships, frogs, miners, chickens, gorillas, kung-fu fighters, jumbo jets or international football players to your heart's content.
16
Games of strategy These games require you to think very carefully about situations which real-life leaders and decision-makers have to deal with: for example, you might be placed in the situation of your government's Minister of Finance, and have to plan the government's future expenditure taking into account all the possible consequences; or you may be a general, moving troops and tanks around a war zone, deciding when or whether to attack the enemy. This type of game is perhaps less popular than the others, but its value in developing your decision-making ability is undeniable. II. Answer the following questions: 1. Are computer games addictive or not? 2. What type of game is “Dungeons and Dragons”? 3. What do we call the movable figure in Dr. Logo which obeys instructions and draws on the screen? 4. What is the difference between an adventure game and a game of strategy? Ш . Read the following statements and say if they are true or false. 1. Many people use their computers for computer games only. 2. Adventure games do not require spectacular colors and sound effects. 3. It was difficult to predict that chess, draughts and popular card games would appear on computer screens. 4. Educational games are not popular nowadays. 5. Games of strategy are very important for decision makers.
Unit 7. Music for Electronic Generation PRE-READING TASK Discuss the following questions: 1. Have you ever used MP3 technology? 2. Have you ever heard about such technology? 3. What hardware do you need to listen to music via computer? READING I. Read the text below: MP3 technology has revolutionized the music industry. It’s a standard format that compresses audio files enabling you to transmit them over the Net much more easily.
17
This also makes them easier to download, attach to an email or store on disk. It means you can listen to music at high-quality sound for little or no cost. A couple of ways in which you might use MP3 files are: • to expand and play MP3 music files. To do this you need an MP3 player, which you can download from the Internet. Two popular choices are Winamp (from Nullsoft) and RealJukebox (from RealNetworks). They support streaming MP3 music, which lets you play a file while it’s downloading • to create your own MP3 files from your CDs. You can do this using a CD ripper, a program that extracts music tracks and saves them on disk. Then using an encoder they’re converted into the MP3 format. A program like MusicMatch has all that you need to turn CD tracks straight into MP3 song files. To find MP3 music titles on the Web you need an MP3 search engine, or you can visit music portal sites like MP3.com and Emusic.com. There are, of course, minimum specifications for this software. You’ll need at least a Pentium or PowerPC, 64 MB of RAM, a 10-bit sound card, and stereo speakers. A portable MP3 player lets you listen to MP3 files anywhere. For example, Diamond’s Rio portable player allows you to transfer MP3 music from your PC to its built-in RAM through your PC’s parallel port. It looks like a little personal stereo and runs on batteries. There are also MP3 portable players for the car. There is, however, a growing problem with MP3 music files as a lot of them are pirated and offered free on illegal websites. Big record companies stand to lose millions of dollars as music is transmitted free of charge provoking a fierce reaction from them. Now, the Recording Industry Association of America has decided to create a new compression standard called SDMI (Secure Digital Music Initiative) to protect digital music from piracy. Glossary MPEG-1 Audio Layer 3 (MP3) -
a popular file format for audio and video compression developed by the Moving Picture Experts Group
II. Answer the following questions: 1 2 3 4 5 6 7
What is MP3? Why is MP3 technology so popular? What software do you need to expand and play MP3 music files? What is streaming audio? How can you make your own MP3s? Why are music companies so angry about the MP3 format? What is the objective of the Secure Digital Music Initiative?
18
III. Match each word on the left (1-8) with its partner on the right (A-H) to make a common technical term. 1 2 3 4 5 6 7 8
compression sound web record search stereo e-mail copyright
A B C D E F G H
speaker company engine attachment site protection format card
IV. Which verbs on the left are frequently found with nouns on the right? to download to play to install to compose to browse to process
CDs the Web files software data music
Part 2. Computer Networks Unit 1. Computers and Networks PRE-READING TASK Discuss the following questions: 1. What different kinds of computers do you know? What do they do? 2. What different kinds of information can you think of? (reports, conversations, telegrams, letters). How are these different kinds of information transmitted? 3. How do you think a network functions? List some ways that computers could possibly be connected. 4. What do you think are the consequences of connecting computers in networks? What differences are there between millions of computers: a) all operating in isolation, and b) all connected?
19
READING I. Read the text below: The combination of computers and networks Computers are machines that deal with information: they receive, store, process, and present information. Networks are systems of connections which move information around: the networks permit many different computers to have access to the same information. Networks make it possible for information to be passed from one place to another with great efficiency and speed and it is this combination of computers and networks which is causing the information revolution. Information Information affects every part of our lives, and it comes in a multitude of various forms: speech, pictures, video, music, love letters, business reports, art, novels, news, etc. We have many ways of conveying information: talking to each other directly, or over the telephone, posting letters, sending fax, plus the mass media - newspapers, radio and television. The difference between all previous methods of passing information and the method used by computers is that humans have to do less work: a key concept in information revolution is that people will be unnecessary for much of the work involved in passing and processing information. Different computers deal with different types of information Computers can now deal with most types of information. Supercomputers can process millions of commands per second and give us weather forecasts, a detailed analysis for marketing a new product, a medical diagnosis. Sensory computers deal with auditory information and respond to people who speak to them. Robotic computers respond to instructions and make products. Millions of personal computers deal with the information given to them through various types of software and help people at home and at work. The young like working with personal computers, and many parents discover the power of PCs because their sons and daughters show them! LANs and WANs Networks are of two basic types: LANs (Local Area Networks) and WANs (Wide Area Networks). LANs are used to connect computers in the building or neighborhood, and WANs are used for long-distance connection. In a LAN, a server functions as the control center; it is a powerful PC responsible for storing the software and information that the other computers, which function as terminals or work stations, use. Various computers are connected by cables and a special LAN program. The result is that people working in different parts of the same building (a
20
bank, for example) can send to each other and receive information through their computers. WANs are possible thanks to the advances in communications technology, and this is the second part of the information revolution. WANs use telephone lines, but they also use the new communications technology which telephone companies, and the mass media (radio and TV) have developed. The traditional telephone lines, usually made of copper, are being replaced by glass fibers which allow more information to pass more quickly from one place to another. It is now possible to send data at a billion bits (a gigabit) per second, which means that someone in Madrid can send a 500 page document to someone in Tokyo in a few seconds. Cellular networks allow these telephone connections to reach people who are driving or walking, because no telephone wires or cables are necessary. The Global Village We can now imagine a world where hundreds of millions of computers communicate with each other. Business correspondence can arrive at its destination in five seconds, not five days, so that companies with offices in London, Barcelona, New York and Tokyo can collaborate on a project simultaneously. People can work at home, sending their work instantaneously to the office. A student in Bangkok can get information from a library in Paris, and somebody studying English in Hong Kong can exchange letters with someone in Manchester, in seconds. This really is the Global Village. II. Answer the following questions: 1. What do computers do with information? 2. What is the basic function of a network? 3. What are the two basic types of networks? 4. What is a server? 5. How are computers connected in networks? 6. What is the advantage of using glass fibers instead of copper in telephone lines? 7. How can computers be connected without using telephone lines or cables? Ш . Read the following statements and say if they are true or false. 1. Networks make it possible for information to be passed from one place to another. 2. LANs and WANs have nothing in common. 3. WANs are due to the advances in communication technologies. 4. Copper fibers are more effective than glass ones. 5. Mobile telephones use modern telephone cables.
21
Unit 2. A Closer Look at LANs PRE-READING TASK Discuss the following questions: 1. What is the difference between a LAN and a WAN? 2. What is a LAN for? 3. Why is security a problem for LAN users? READING I. Read the text below: What is a LAN? A Local Area Network (LAN) links a group of personal computers in a building together to let them share information. What is a LAN for? •File sharing. A LAN lets many users share a single copy of a file which is stored on a central computer. For example, a lawyers' office might have a common pool of documents that various lawyers and secretaries can access and update. The advantage of the LAN is that these files can be accessed immediately by all users, without the need to download the files from floppy disks or print them. • File transfer. A LAN lets you copy files from machine to machine without having to exchange floppies. • Application sharing. A LAN lets all the people connected use the same programs. •Printer sharing. A LAN allows many users to share the same printer. •Electronic intercom. A LAN allows users to type messages and send them to others in other parts of the building. New desktop organization software can also look in the computer-based diaries of various people connected by the LAN and arrange a meeting between them at a time convenient to them all. What is a LAN composed of? A LAN is a combination of computers, cables, adapter electronics, LAN management software, and LAN application software. •Computers. There are two types of computers used in a LAN: workstations, and servers. The workstations are the PCs on individual's desks, and they do work only for the person sitting in front of it. The servers are usually housed in a special place, and do work for all the workstations in the LAN. •Cable. The workstations must be connected by cable, which can be cheap phone wire or expensive fiber optics. Sometimes a single cable goes from station to station, visiting all the servers and workstations (which is called a bus or daisy-chain
22
topology), sometimes there is a separate cable running from a central place to each station (which is called a star), and sometimes the cables branch out repeatedly from a root place forming a tree. •Adapters. A LAN adapter card must be fitted to each workstation. It listens to all the traffic going by on the cable, and chooses only the messages destined for your workstation. When you want to send a request to a server, the adapter card waits for a break in the cable traffic and inserts your message into the stream. •LAN management software. You need special software to supervise the LAN. •LAN applications software. The usual programs used by PCs — spreadsheets, data bases, word-processors, CAD and graphics software, desk-top publishing — need to be loaded into the servers, and sometimes a special LAN edition of the software is necessary. Security When you have a LAN, you put everybody's files in one big pot. Unless you make special provisions, anybody can look at and modify anything. There are four reasons why having no security is not a good idea. •Limiting damage. If you type DEL instead of DIR, you can destroy hundreds of other people's files. •Confidentiality. There are often times when you will not want everybody to have access to all your files. •Fraud. If all workers had access to the accounts, one or two might be tempted to instruct the computer to send them a check. •Malicious damage. If a disgruntled worker wanted to damage the company, he could corrupt important files. The key to security is the password. Each user identifies himself with a password — a secret word that he must use when he sits down at the computer. The password tells the computer what files and programs the user can have access to. Passwords should be carefully chosen, they should not be written down, and they should be changed every month. Passwords will not always prevent serious «hackers» from entering the LAN system, so more sophisticated measures must be taken by companies to protect themselves against robbery and damage. Many people believe that changes are needed in the law, but, meanwhile, companies rely on special teams of computer experts to guard their computers by monitoring access, changing passwords, and making backup copies of all important information. II. Answer the following questions: 1. What is a LAN?
23
2. What are the functions of a LAN? 3. What is a LAN composed of? 4. What is the difference between a workstation and a server? 5. What are the three types of connections between the workstations and the server mentioned in the text? 6. Explain the expression «put everybody's files in one big pot». 7. What reasons does the text give for the necessity of security? Ш . Read the following statements and say if they are true or false. 1. File sharing means that every user has private files in a central storage system. 2. File transfer lets you copy files from one machine to another. 3. The electronic intercom function allows you to send messages to other PCs in the same building. 4. Workstations in a LAN store all the data. 5. A daisy chain is a type of printer. 6. Passwords offer 100% protection against illegal access to files.
Unit 3. Online Chatting PRE-READING TASK Discuss the following questions: 1. Have you ever participated in an Internet relay chat session? 2. Do you know anybody who took part in such a session? 3. Have you ever took part in an online conference? READING I. Read the text below: Internet relay chat Internet relay chat (IRC) is a system that allows many people to have real-time conversations simultaneously on the Internet. An IRC session is conducted by typing messages at the keyboard. The system is quite easy to use. To start a chat session you run an IRC client program on your computer, for example mIRC or Global Chat; this connects you to an IRC central server, a computer dedicated to IRC. Then you join a channel, which connects you to a single chat area. Next you type a message and the other participants can see it. Participants use nicknames to identify themselves. It's great fun. There are thousands of active channels at any time and you can even create a new channel.
24
Some basic IRC commands are /list (to see a list of available channels), /join # channel name (to join a conversation), /msg nickname (to send a private message to the specified users). Audio and video chats Like talking on the phone, you can talk to people over the Net. With Internet Phone (from Vocal-Tec) you can chat with voice, and with a program like CU-SeeMe (from Cornel University) you can add video to the conversation as long as you have a video camera connected to your PC. Conferences and Intranet chats Conferencing programs enable participants to talk to and see each other, collaborate and share programs. A typical program is Microsoft Netmeeting. It is used in intranets inside companies. An intranet is an internal network which uses public Internet software but makes the Web site only accessible to employees and authorized users. On-line virtual worlds The arrival of virtual environments has added a new dimension to on-line chatting. These worlds are generated with VRML (Virtual Reality Modeling Language), which displays 3-D animated objects and spaces on the Web pages. In a program like Worlds Chat, participants are represented by characters called avatars. You can choose your avatar from a menu of portraits (including people, fish, insects, etc) and then communicate with other users via the keyboard. Glossary real-time - immediate, live communication. client program - software running on your PC used to connect and obtain data from a server. channel - IRC conversation area. nickname - name used by a participant on IRC, instead of the real name. intranet - private network inside a company which uses many of the tools used on the public Internet. avatar - object which represents a participant in a three-dimensional chat room. Ш . Read the following statements and say if they are true or false. 1. Unlike email and newsgroups, in an IRC session communication is live, while you type messages. 2. An IRC channel is a computer system dedicated to IRC. 3. The IRC command /join #channel disconnects you from the specified channel. 4. Internet Phone is an application program which allows you to talk to people over the Internet, as if you were speaking on the telephone.
25
5. To take part in a video chat you need to have a video camera plugged into your computer. 6. An intranet is a public network. 7. An avatar is an image representing a participant in a 3-D virtual world.
Unit 4. The Methods of Mailing Lists PRE-READING TASK Discuss the following questions: 1.Have you ever been subscribed to a mailing list? 2. What is the difference between a mailing list and a newsgroup? 3. Are there any special rules for mailing lists? 4. What does the acronym FAQ stand for? READING I. Read the text below: A mailing list is a basic type of discussion group that uses e-mail to communicate. The messages are distributed to all the subscribers, i.e. everyone that belongs to the list. There are thousands of lists covering every imaginable topic, from hobbies and music to news and science. Types of lists •
Discussion lists let you send and receive messages, providing a discussion forum for the participants; but they're different from newsgroups. In a discussion list you receive the messages directly into your e-mail box. In a newsgroup you read the articles, i.e. messages posted by contributors that are stored in one central location.
•
One-way lists only let you receive messages, not send them. They're good for busy people who only wish to receive broadcast information.
•
Some lists can be received as a periodic "digest". This contains a lot of messages which have been grouped together and sent as a single message.
Other lists are restricted to certain users, requiring specific qualifications to join them. For example, a list about the science of stars and planets may be restricted to astronomers.
26
How to subscribe •
Before you can start receiving messages from a list you need to subscribe to it. This process adds your e-mail address to the list. If the list is automated (controlled by a computer program like listserv, listproc, or majordomo) you usually write in the body of the message: <subscribe listname> where "listname" is the name of the list. The address has the form <
[email protected]> You can quit a mailing list at any time. To unsubscribe you just need to write or, if this doesn't work, try <signoff listname>
If the list is administered by a person, just send a message to the human moderator saying something like . The address has the form <
[email protected]>. Remember that each list has two addresses: (i) the administrative address, used to subscribe and unsubscribe , and (ii) the list address, used to distribute the messages to everyone on the list. Tips When you join a list, you receive a confirmation message and some instructions about how to unsubscribe. Save this information, you may need it in the future. Some lists have a FAQ (frequently asked questions) document with the most common questions asked by newbies (new contributors). Read this file if you have any problem. Avoid flame wars. Flames are insulting messages directed at each other in discussion forums. When you go on holiday, remember to unsubscribe from lists temporarily. Otherwise your mailbox may overflow with messages. The Publicly Accessible Mailing Lists Website will help you find the mailing list that interests you. Go to http://www.neosoft.com/internet/paml and choose an index by name or by subject. You can also try Liszt, a famous list directory, at http://www.liszt.com. II. Complete the sentences using the text above to help you. Then write the words in the puzzle to discover the missing word. 1 A...................... mailing lists are controlled by a special computer program. 2 The process of subscribing adds your e ................... address to the list. 3 A d ....................... is a type of list that groups individual messages together and
27
sends them periodically as one message. 4 In newsgroups, the messages posted by contributors are called "a .........................." . 5 Insulting or insensitive messages directed at each other in a discussion forum are known as f................... . 6 New participants in discussion forums are also called "n ..................". 7 If you want to get off a mailing list, you just type the command u.............................. followed by the name of the list. 8 The lists a ....................... by a human moderator usually have the word "-request" in the address.
Unit 5. Internet 2 - The Next Step I. Read the headings and the text. Then match them to the paragraphs. Partners for change Trials and challenges A new project Future plans Speed, security, service 1..................................................... Internet 2 is a collaborative project between universities, government agencies and industry partners in the USA. It aims to create advanced Internet applications for academic research, distance learning and education. The I2 project was developed by the University Corporation for Advanced Internet Development (UCAID) in October 1996. 2..................................................... There are three major challenges facing Internet2: • to establish an advanced communications infrastructure for the US research and education community • to develop new applications, such as digital libraries, telemedicine and virtual laboratories, allowing participants to send big packets of data and video at high
28
speed. For example, teachers and students can view and consult during real-time medical operations, scientists can collaborate in virtual meetings, etc • to transfer the new network capabilities to all levels of education and to the rest of the Internet.
3..................................................... The I2 project is made up of three main categories of members: universities, non-profit organizations and corporate partners, i.e. sponsors and industries interested in investing in the project. 4..................................................... Internet2 is working together with advanced networks such as the high-speed Backbone Network Service developed by MCI/Worldcom, and the Next Generation Internet, which is being built by US federal agencies. It runs on a new fibre-optic backbone called Abilene, which operates at speeds of up to 2.4 gigabits (1,024 megabits) per second. Internet 2 uses Internet Protocol version 6 (IPv6) instead of the current IPv4. This new protocol uses the Quality of Service (QoS) technology, which allows users to send data with guaranteed delivery - on time and intact. 5..................................................... Internet 2 and its fast backbones are not available to the general public yet, and its physical structure is not intended to replace the global Internet. But the plan for the future is to integrate the new technology with the public Internet and to make it available to everyone.
II. Fill in the gaps in these sentences using the passive forms of the verbs in the box. provide
develop
use
call
send
deliver
1. The new national backbone ................................ Abilene. 2. The Internet 2 project ................................ by UCAID in October 1996. 3. Funds and grants for research ................................ by non-profit organizations like the National Science Foundation. 4. One objective of Internet 2 is to develop new technologies that can ................................ in the global Internet. 5. Huge packets of data and video ................................ at high speed. 6. In the future it’s likely that all media (TV, web content, email, etc.) ................................ over Internet 2. III. Refer to the text to find the term for these definitions. In paragraph 1: • investigation undertaken to discover new facts
29
In paragraph 2: • technology that provides high-quality information to doctors over long distances In paragraph 4: • glass material that guides light impulses at high frequencies • high-speed data highways that connect other networks • 1,024 megabits • specification that describes how computers will talk to each other on a network
Part 3. Software and Hardware Unit 1. Operating Systems PRE-READING TASK Discuss the following questions: 1. What operating systems do you know? 2. What commands are used in different operating systems? READING I. Read the text below: The operating system of a computer is what sets the computer hardware up for the user(s) to interact with it. Without such a system it would be very difficult to do anything with a modern computer. The operating system is made up of a set of programs or routines which translate commands introduced by the user into binary numbers (the language which the computer understands); and without such a system the only way to communicate with the computer would be by typing in machine code. This fact is often passed over by people who spend all their time using a wordprocessor or programming in one of high-level programming languages; both wordprocessors and high-level languages are designed to make you forget that the operating system is present, but to carry out their functions they rely on the various facilities the operating system provides. Most people think that the operating system is simply a series of commands which carry out “housekeeping” functions. These include dealing with files (copying, renaming, looking through the directory, etc), altering the parameters of the peripheral devices such as screen and keyboard (clearing the screen, redefining the effect of certain keys, etc), erasing unwanted files and so on.
30
However, though such commands are an important part of the system, they in turn depend on a set of fundamental “routines”which are stashed away permanently in the computer’s memory. To make this possible, the system sorts out the computer’s memory into “blocks” and “pages” and draws up an index to enable any program to look for the different parts (for example to make it possible to print a letter on screen, there has to be a “table” containing bit-mapped “pictures” of the letters, another to indicate the addresses of the different lines of the screen, and another containing the full “screen map”). What facilities the system offers to the user depends on the particular system and type of computer: but on a typical micro using a system like the popular MS-DOS (DOS stands for “Disc Operating System”), the user can address the system directly with commands such as COPY or RENAME, and thus deal with a variety of housekeeping tasks. Such an operating system is designed for a single user. It is served by a great variety of software packages, enabling the user to write and execute his own programs. There are, in addition, “multi-user” operating systems, which allow a number of different users at different terminals to work simultaneously on the same central machine. Such systems are designed to make the most efficient use of the CPU, memory and input/output devices; and they can cope with different users working on different tasks/programs at the same time. Systems of this kind include UNIX and Windows NT. II. Answer the following questions: 1. Explain the difference between a programming language like PASCAL and an operating system. 2. What makes an operating system like UNIX fundamentally different from a system like MS-DOS? 3. Why would it be difficult too use a computer without an operating system? 4. Is an operating system just a collection of useful “housekeeping” programs, or is it something more?
Unit 2. Computer Viruses PRE-READING TASK Discuss the following questions: 1. How many computer viruses are there nowadays? 2. Have you ever encountered with a virus that damaged your computer? 3. Why in your opinion are computer viruses invented? 4. What should be done to prevent our computers from viruses?
31
READING I. Read the text below: In May 1984 the magazine Scientific American published a rudimentary mathematical game entitled “Core Wars”, the object of which was to create a program which would survive by destroying other programs. This may have been the inspiration for subsequent attempts at creating computer viruses: in any case, whatever the origin of the virus craze might have been, the fact is that these digital infections are with us to stay. A computer virus is small piece of “code” (programming language) which is deliberately created and planted in order to interfere with the operation of other people's computers. None of the viruses which exist at present could possibly have come into being by accident: in fact, to create a virus requires, at the very least, weeks and weeks of hard work — which immediately raises the question, why do people create them? Perhaps in one or two cases a virus might have been the result of an experiment by over-enthusiastic students anxious to discover how far their programming abilities could extend, and these people may not have intended to cause any real harm. This appears to be the case of the so-called “Brian” virus, which was created in January 1986 by two brothers as an experiment at university. Their original version was basically harmless (it reproduced itself, displayed a short message on the screen, but did not interfere with the computer's system): however, they could not have foreseen the results of their experiment. Other students at the same university copied the virus and introduced changes to make it more destructive. In most cases, however, viruses are created by people with an interest in causing the maximum degree of destruction possible. Some may have been produced by commercial software companies trying to discourage piracy by propagating a fear of infection: more plausibly, the pirates themselves could have been responsible for creating them. The evidence shows, however, that most of computer viruses must have been created by mentally unstable individuals, motivated by malice or a warped sense of humor. Is there a solution to this problem? Obviously prevention is better than cure, and many outbreaks would have been avoided if the owners of PCs did not use pirated discs. Apart from this, there are programs available which can be installed in your system and will give warning if a virus appears, though brand new viruses may still escape detection. Various types of digital “vaccines”can also be used; but it will be a long time before a really effective solution can be found to this problem. II. Answer the following questions: 1. How can you define a computer virus? 2. Is it easy to create a virus, according to the text? 3. Did the creators of the “Brian”virus realize the consequences of their action? 4. What kind of people are usually those who create viruses?
32
Unit 3. Speech-recognition PRE-READING TASK Discuss the following questions: 1. Have you ever tried to interact with a computer by voice? 2. Are there any advantages in using voice instead of a keyboard? 3. Do you know any voice recognition programs? READING I. Read the text below: Mobile phones and the Internet have changed the way we communicate. However, we still need to use the keyboard and the mouse to communicate with computers. When shall we be able to interact with PCs by voice? Speech recognition systems can make this possible soon; in fact, speech companies claim that their programs let you dictate, control your PC by voice command, and convert text into speech. The most popular voice recognition packages are IBM ViaVoice, Dragon NaturallySpeaking, and L&H Voice Xpress. If you decide to buy a speech program, look for these features: 1. All the programs let you dictate text directly onto your word processor, spreadsheet or e-mail. They claim an accuracy rate of around 98 percent. The technology is particularly useful to dictate notes, business memos, letters and email. 2. Speech programs are usually more accurate if you train the software by reading aloud for about 20 minutes. This process involves reading sample text and teach the program to recognize words that are not in its built-in dictionary (e.g. proper names, acronyms, unusual words). Most products let multiple users personalise their vocabulary and pronunciation. 3. They offer useful voice commands for editing and formatting (e.g. setting font size and style, text alignment etc.). However, it’s a bit difficult to make corrections by voice; using the keyboard may be faster and more accurate. 4. Speech software allows you to use commands to launch programs or to navigate around windows and menus. You can also tell your programs to open a file, save it in a particular format or print it. Some systems let you search the Web by voice. The Web version of IBM ViaVoice enables chat room users to chat using their voices rather than keyboards.
33
Dragon NaturallySpeaking lets you browse the Web by speaking, and dictate online forms and fields in Microsoft Internet Explorer.
into
Speech recognition requires a powerful processor (500 MHz Pentium is recommended), 64 MB of RAM, a good sound card and a high- quality headset microphone. Speech recognition technology has improved a lot and its potential is enormous, but some experts consider that it is not ready for common use yet. Some day, however, we’ll be talking to our PC naturally, like a friend. II. With the help of the text, fill in the gaps in these sentences. Use the correct modal verb from the list. can (ability) must (necessity) could (possibility) will (prediction)
should (advice) would (in hypothetical conditions)
1. With many voice-recognition programs, the user .................... first train the software to recognise individual pronunciations. 2. You .................... dictate into the program’s text screen, or you .................... dictate directly into any Windows application. 3. If you intend to do a lot of dictation, you .................... get a high-quality headset microphone. 4. Speech-recognition software .................... help children with special educational needs. 5. In a few years’time, everyone .................... use voice commands to interact with computers. 6. If I could afford it, I .................... buy a new PC and a speech-recognition package.
Unit 4. The Look of Screens to Come PRE-READING TASK Discuss the following questions: 1. What are the advantages of flat screens? 2. Are flat screens based on cathode-ray tubes? 3. What are the sizes of flat screens?
34
READING I. Read the text below: Have you noticed how much your computer screen flickers? This may be because your computer monitor uses CRT technology. This kind of technology offers color and high-resolution pictures for relatively little money but the monitors are large, use a lot of energy, can flicker and emit electromagnetic radiation. In recent years flat screens have become increasingly popular. Users talk of benefits such as more desk space, how easy they are to adjust for tilt and height, crisper, clearer images and the total elimination of screen flicker. It’s like having a different PC, they say, a new window on the world. Most flat screens are based on LCD technology which has a lot of benefits over CRT technology. Among them: • LCDs are inherently flat, CRT monitors are not, so LCDs require much less space • LCDs use less power than CRTs • LCDs are distortion-free while typical CRTs are curved, which may cause image distortion • most LCD displays use a TFT system offering a wider angle of vision and highquality images. But there is one major drawback to flat screens: their cost. They are expensive compared with CRT monitors. Prices are falling, however, and they’ll soon find their way into homes, schools and businesses. Monitor manufacturers like Philips, Apple, Sharp or Panasonic offer compatible flat screens including built-in stereo speakers, headphone connection, and a USB port. Some models can also be removed from the stand and mounted on the wall. They come with stylish designs for a variety of applications. LCDs range from small-size PC screens and TVs to large-screen projectors. Glossary CRT - Cathode-ray tube, a picture tube used by PC monitors and TV sets. LCD - Liquid-crystal Display TFT - Thin Film Transistor, a technology that allows for clear and stable images. USB - Universal Serial Bus, an interface that lets you plug-and-play a lot of peripherals easily. II. Read the following statements and say if they are true or false. Correct those which are false. 1. Most computers still use CRT monitors.
35
2. Typical CRT-based displays occupy less space than LCD displays. 3. Liquid-crystal displays are curved. 4. Flat LCD screens are becoming very popular. 5. LCD technology consumes less power than CRT technology. 6. Flat screens are cheaper than CRT monitors. 7. Users of flat-screen monitors can’t adjust the angle of vision.
Unit 5. Windows 2000 I. Read the text and match a heading to a paragraph. Ready for the Internet Fast, secure and reliable What’s Windows 2000? Built-in support for new devices Easy to use 1 ......................................................................... Microsoft Windows® 2000 is the operating system for the next generation of PCs. It offers a user-friendly interface, NT technology, integrated web capabilities, and support for mobile computers and new devices. There are two main Windows systems: Windows 2000 Professional for desktops and laptops, and Windows 2000 Server family for networks, web servers and high-performance workstations. 2 ......................................................................... Windows 2000 includes a built-in safeguard called Windows File Protection, which prevents core system files from being deleted or changed by users or applications. If a system file is altered, this feature repairs that file avoiding many system crashing found in previous versions. Windows 2000 is 25 percent faster than Windows 9x on systems with 64 MB and lets you run more programs and do more tasks at the same time than previous versions. It protects your hard drive by using encryption and decryption systems. It also supports Kerberos, an Internet standard which protects corporate networks or intranets. 3 ......................................................................... The graphical user interface has been improved. You can personalise the Start menu and display applications you use most often. You can use step-by-step wizards for numerous tasks. The Hardware Wizard lets users add and configure peripherals. The Network Connection Wizard helps you connect to networks. The Microsoft Installer helps you install, configure and upgrade software easily.
36
With IntelliMirror Technology, based on Active Directory service, desktop administrators can easily manage and back up user’s data. 4 ......................................................................... With Internet Explorer integrated into the desktop, Windows 2000 allows you to search files and folders on your PC, find pages on your company intranet or surf the web. Internet Explorer automatically corrects mistakes on common URL conventions such as http, .com and .org. It also lets you download complete web pages with graphics for viewing off-line. NetMeeting video-conferencing software enables participants to talk to and see each other, share programs and ideas. It supports Dynamic HTML and Extensible Markup Language (XML) which help programmers create new ways of exchanging and displaying information. 5 ......................................................................... It supports the latest technologies, from digital cameras and music players to USB devices. USB (Universal Serial Bus) lets you easily connect and remove peripherals without configuring or rebooting your PC. It also offers support for storage devices such as DVD and Device Bay. Mobile users can share files between wireless devices (laptops or desktop PCs) through the IrDA (Infrared Data Association) protocol.
II. Read the text again and find: 1. The tool that protects important system files. 2. The protocol adopted for network authentication and security. 3. The web browser included with the operating system. 4. The Internet tool used to do video-conferencing. 5. The component that allows you to add and remove hardware devices without restarting the computer. 6. A popular infrared protocol used in wireless communication.
III. Find the words in the text that correspond to the following: Paragraph 1 1. pieces of hardware 2. portable computers Paragraph 2 3. characteristic 4. internal corporate networks Paragraph 3 5. set up a system in a particular way
37
6. improve a piece of software Paragraph 4 7. browse (the web) 8. web address Paragraph 5 9. restarting the computer 10. without cables
Unit 6. What is Next? PRE-READING TASK Discuss the following questions: 1. What do you know about the modern trends in computer production? 2. Can you predict how computers will look like in the middle of the 21 st century? READING I. Read the text below: Power and speed for PCs and the Internet PCs have broken the barrier of 1 GHz, the DVD is included in most PCs, MP3 has become the standard to compress digital music on the Net; and CD-ROM players with MP3 music are available for the car. New portals and free services are changing the face of the Internet. Thousands of webcams offer us live views of our planet, from fascinating landscapes and monuments to shopping centres and busy streets of big cities. Conventional modems are being replaced by ISDN, ADSL and satellite connections. ADSL is a form of Digital Subscriber Line that carries data, voice, and MPEG2 video. Its downstream data flow is between 1.5 and 9 megabits per second, so music and pictures will be downloaded in the blink of an eye. New palmtops – the office in your pocket Hand-held PCs come with Microsoft Pocket Office pre-installed, so you can write your project while taking the train or make calculations in the plane. They are also equipped with software to handle e-mail and surf the Web. You can hear popular MP3 music or record your ideas through its built-in voice recorder. Once at home you can synchronise data with your desktop PC.
38
Mobile phones – the future of mobile computing Not long ago, mobile phones could just transmit voice and SMS messages. Now they can display Internet information thanks to the Wireless Application Protocol or WAP. On these Web-enabled phones you can read information such as stock prices, weather, business news and sports news. Some hybrid models combine a phone with a PDA. They look like a regular phone with a dialpad and a small screen on its front. But if you flip up the front cover you find a larger screen that is touch-sensitive. Some include a virtual keyboard which pops up when you want to enter email text or a WAP address. But the future is called “third-generation”(3G) mobiles. They will transmit a caller’s picture and voice simultaneously. UMTS mobile phones will deliver users information, e-commerce, games and videoconferencing via fixed, wireless and satellite networks. Wearable computers, aren’t they chic? Can you imagine wearing a PC on your belt and getting e-mail on your eyeglasses? This may sound science-fiction, but the trend is very real. Charmed Technology and other companies are using fashion shows to exhibit their innovative products. Wearable computers are battery-powered systems worn on the user’s body - on a belt, backpack or vest. They’re designed for mobile or hands-free operations, often incorporating a microphone and a head-mounted display for viewing Internet sites. Users of wearable technology consider themselves “cyborgs”. This term comes from “cybernetic organism”, referring to a being that is part robot, part human.
Glossary GHz - Gigahertz, equivalent to one thousand megahertz ISDN - Integrated Services Digital Network which provides speeds of roughly 128,000 bits-per-second. ADSL - Asymmetric Digital Subscriber Line. Typically the upstream data flow is between 16 and 640 kilobits per second while the downstream data flow is between 1.5 and 9 megabits per second . ADSL also provides a voice channel. MPEG - Moving Pictures Experts’ Group, a standard for compressing and decompressing images PDA - Personal Digital Assistant which includes an address book, a calendar, Internet access, etc.
39
SMS - Short Message Service which allows you to send short text messages with maximum 160 characters to GSM mobile phones worldwide. GSM is the Global System for mobile Communication that allows transmission of voice and data on mobile phones. UMTS - Universal Mobile Telecommunications System, used by 3G mobile phones II. Select the right choice: 1. One GHz is equivalent to a) 100 MHz b) 1,000 MHz 2. ADSL lets you a) have quick, easy access to the Internet. b) compress digital music. 3. A “palmtop” is the same as a) a hand-held computer. b) a laptop. 4. According to the text, WAP is a) a hardware device that connects mobile phones to the Internet. b) a protocol that enables mobile phones to access Internet information. 5. 3G mobile phones a) will not support audio and video formats. b) will handle multiple data types including voice and video. 6. Charmed Technology, Inc. a) is trying to bring wearable computers into fashion. b) produces laptops. 7. A “cyborg” a) looks like being half machine, half human. b) rejects wireless technology. III. Find the following noun phrases in the text and explain their meaning: hand-held PC web-enabled phone battery-powered systems hands-free operations head-mounted display
40
Contents Part 1. Computer Applications Unit 1. The Home Office Revolution … … … … … … … … … … … … … … … … … 3 Unit 2. Computers and Education… … … … … … … … … … … … … … … … … … ... 5 Unit 3. Education for Socially Disadvantaged … … … … … … … … … … … … … ... 8 Unit 4. Computers in the Mass Media… … … … … … … … … … … … … … … … … 10 Unit 5. Computers in Research… … … … … … … … … … … … … … … … … … … .. 12 Unit 6. Computer Games… … … … … … … … … … … … … … … … … … … … … … 14 Unit 7. Music for Electronic Generation… … … … … … … … … … … … … … … … 16 Part 2. Computer Networks Unit 1. Computers and Networks… … … … … … … … … … … … … … … … … … ... 18 Unit 2. A Closer Look at LANs… … … … … … … … … … … … … … … … … … ..... 21 Unit 3. Online Chatting… … … … … … … … … … … … … … … … … … … … … ..... 23 Unit 4. The Methods of Mailing Lists… … … … … … … … … … … … … … … … … 25 Unit 5. Internet 2 – the Next Step… … … … … … … … … … … … … … … … … … .. 27 Part 3. Software and Hardware Unit 1. Operating Systems… … … … … … … … … … … … … … … … … … … … … .. 29 Unit 2. Computer Viruses … … … … … … … … … … … … … … … … … … … … … 30 Unit 3. Speech-recognition … … … … … … … … … … … … … … … … … … … … … 32 Unit 4. The Look of Screens to Come … … … … … … … … … … … … … … … … .. 33 Unit 5. Windows 2000 … … … … … … … … … … … … … … … … … … … … … … .. 35 Unit 6. What is Next? ........................................................................................... 37
Сос т авит ел ь – М арина Абрамовна Ст ернина Р ед ак т ор – Т .Д . Б унина