|
BLOQUE I
ACTIVIDAD 1
Read the text and find the contextual reference.
OPERATING SYSTEMS (OS)
Overview: The operating system (OS) is the low-level software which schedules tasks, allocates storage and handles the interface to peripherical hardware. It presents a default interface to the user when no application program is running. The OS may be split into a kernel that is always present and various system programs which use facilities provided by the kernel to perform high-level house-keeping tasks. These often act as servers in some client-server relationship.
1. which schedules tasks (l. 1) ..............................................
2. It presents a default interface (l. 2) .............................................
3. that is always present (l. 3) .............................................
4. which use facilities (l. 4) .............................................
5. These often act (l. 5) .............................................
ACTIVIDAD 2
- Read the text. Then name two tasks that the operating systems perform.
operating system
| |
The operating system is the most important program that runs on a computer. Every computer must have an operating system to run other programs. (It) performs basic tasks, such as recognizing input from the keyboard, sending output to the display screen and controlling peripheral devices such as disk drives and printers. For large systems, the operating system has greater responsibilities. (It) makes sure that different programs and users running at the same time do not interfere with each other. The operating system is also responsible for security, ensuring that unauthorized users do not access the system. Operating systems can be classified as follows: · multi-user : Allows two or more users to run programs at the same time. Some operating systems permit hundreds or even thousands of users. |
3. Match
Terabyte Internet Message Protocol
Hexadecimal a trillion bytes
Bitmap Short message Service
SMS The digits 0-9 are used plus the letters A- F
IMAP collection of data represented as an array of bits
ACTIVIDAD 3
Acronyms and Abbreviations
ASCII | MIPS | PCMCIA | USB | MP3 | WAP | UMTS |
|
ACTIVIDAD 1
1. READ THE TEXT
2. WRITE DEFINITIONS OF PROGRAM, PROGRAMMERS, FLOWCHARTS
3. THEN MAKE A SYNOPSIS.
Programming
Computers are controlled by sets of instructions called programs. Programs are written by a person called programmer using special languages called programming languages.
Programmers do some systems analysis as well as writing the program code. Their first task is usually to analyse the problem, so that they can design a system too deal with it. When they have designed a code for a system and tested it, they then have to create documentation, i.e. notes which explain the structure and logical steps of the program for future users and trainers. They can make changes to the program according to information obtained from the users. They sometimes use diagrams, called flowcharts, to show the sequence of logical steps in a program. Flowcharts have arrows to indicate the direction of program flow and special symbols to indicate different functions in the program.
It is very difficult to write a program without any faults. The errors, or bugs as they are commonly known, can be caused by a number of factors, and programs have to be tested and altered to eliminate all the errors, before they are used.
ACTIVIDAD 2
COMPUTER PROGRAMS
- Put the words in the correct place
compiler program high-level languages interpreter program low-level languages |
Computer programs can be written in a variety of computer languages. The two main types of computer languages are ……………………..and …………………………… Low-level languages operate faster, but are more difficult to write. They include: machine code – which consists of 1s and 0s- assembly language – which uses mnemonics and numbers.
High-level languages are closer to human languages and are easier to use. They include: C++ (C plus plus), Java, Java Script, Visual Basic, and Delphi .
One of the easiest programming languages to use is called BASIC.
All computer programs, however, have to be converted into low-level machine code to be understood by a computer. Some languages can be compiled by a ………………………….., which converts the whole program into machine code at one time.
Other language are interpreted by an ……………………………………..which converts the program into machine code one line at a time, as each line is required by the processor. A compiled program only needs to be compiled once, but an interpreted program needs to be interpreted every time it is used. Compiled program are faster than interpreted program. The Hyper Text Markup Language (HTML) is not really a programming language, but is used for creating web pages.
- Match
1) High-level languages A) It converts the program into machine code
at once.
2) Low-level languages B) It is used to create web pages.
3) Compiler program C) It is easy to use.
4) Interpreter program D) It is fast and difficult.
5) HTML E)It converts the program into machine code
line by line. (little by little)
- True or False?
1) There is only one type of computer language……..
2) Low-level languages are easier to write………
3) A compiled program needs to be compiled at one time…….
4) Interpreted programs are slower than Compiled programs……..
ACTIVIDAD 3
Access Professional English in Use ICT website . Then do the activity COMPUTER LANGUAGES
|
ACTIVIDAD 1
- Read the two following text
- Find out connectors. Underline and classify
- Choose the best definition of network. Translate it.
- Answer
- What is a network?
- What are its hardware components?
- What is the difference between a local area network and a wide area network?
- What advantages do you think networks have?
TEXT 1
NETWORK: techniques, physical connections and computer programs used to link two or more computers. Network users are able to share files, printers and other resources; send electronic messages and run programs on other computers.
Passwords are commonly used to restrict access to a network and keep the system secure. Each of a network is given a name and password, (which) determine what services are made available to them. Passwords prevent unauthorized users, or hackers, from breaking into the system. At the same time, (they) should not be difficult for the user to remember. Ideally, they should have a minimum of six characters, and be composed of a mixture of capital and small letters, numbers and symbols. It is better not to use words in the dictionary or proper names because some hackers use special computer programs (which) automatically try all the words and combinations of words in a computerized dictionary to try to discover other users’ passwords. It is also useful to change passwords frequently.
Text 2
A network is simply two or more computers linked together. It allows users to share data files, software applications, hardware like printers and other computer resources such as fax.
Most networks link computers within a limited area- within a department, an office, or a building. These are called Local Area network or LANs. But networks can link computers across the world, so you can share information with someone on the other side of the world. When networks are linked together in this way, they are called Wide Area Networks or WANs.
Networks increase productivity by allowing workers to share information without printing, copying, telephoning or posting. They also save money by sharing peripherals such as printers.
BLOQUE IV
|
ACTIVIDAD 1
Speech-recognition
Mobile phones and the Internet have changed the way we communicate. However, we still need to use the keyboard and the mouse to communicate with computers. When shall we be able to interact with PCs by voice? Speech recognition systems can make this possible soon; in fact, speech companies claim that their programs let you dictate, control your PC by voice command, and convert text into speech.
The most popular voice recognition packages are IBM ViaVoice, Dragon Naturally Speaking, and L&H Voice Xpress. If you decide to buy one speech program look for these features:
1. All the programs let you dictate text directly onto your word processor, spreadsheet or e-mail. They claim an accuracy rate of around 98 percent. The technology is particularly useful to dictate notes, business memos and e-mail.
2. Speech programs are usually more accurate if you train the software by reading aloud for about 20 minutes. This process involves reading sample text and teaches the program to recognize words that are not in its built-in dictionary (eg. Proper names, acronyms, unusual words). Most products let multiple users personalize their vocabulary and pronunciation.
3. They offer useful voice commands for editing and formatting (e.g. setting font size and style, text alignment, etc.). However, it’s a bit difficult to make corrections by voice; using the keyboard may be faster and more accurate.
4. Speech software allows you to use commands to launch programs or to navigate around windows and menus. You can also tell your programs to open a file, save it in a particular format or print it.
5. Some systems let you search the Web by voice. The Web version of IBM ViaVoice enables chat room users to chat using their voices rather than keyboards. Dragon Naturally Speaking lets you browse the Web by speaking URLs and links, and dictate into online forms and fields in Microsoft Internet Explorer.
Speech recognition requires a powerful processor (500 MHz Pentium recommended), 64 MB of RAM, a good sound car, and a high-quality headset microphone.
Speech recognition technology has improved a lot and its potential is enormous, but some experts consider that it is not ready for common use yet. Some day, however, we’ll be talking to our PC naturally, like a friend.
A. Tick (v) the features mentioned in the article.
· Activate menus by saying the words on the screen.
· Execute applications by voice.
· Manage databases
· Configure multiple voice profiles
· Read documents to you using a text-to-speech system.
· Surf the web by speaking
· Create and compile a computer program
· Take dictation with accuracy.
· Design graphics
· Accept spoken commands
ACTIVIDAD 2
MODAL VERBS- With the help of the text, fill in the gaps in these sentences. Use the correct modal verb from the list.
Can (ability) must (necessity) should (advice)
Could (possibility) will (prediction) would (in hypothetical conditions)
- With many voice-recognition programs, the user………………first train the software to recognize individual pronunciations.
- You ……………….dictate into the program’s text screen, or you …………..dictate directly into any Windows application.
- If you intend to do a lot of dictation, you ……………………..get a high-quality headset microphone.
- Speech-recognition software ……………….help children with special educational needs.
- In a few years’ time, everyone …………………..use voice commands to interact with computers.
- If I could afford it, I ………………………….buy a new PC and a speech-recognition package.
ACTIVIDAD 3
A Read the text and then try to answer the questions below.
Music for an electronic generation. MP3 technology has revolutionized the music industry. It’s a standard format that compresses audio files enabling you to transmit them over the Net much more easily. This also makes them easier to download, attach to an email or store on disk. It means you can listen to music at high-quality sound for little or no cost. A couple of ways in which you might use MP3 files are: · to expand and play MP3 music files. To do this you need an MP3 player, which you can download from the Internet. Two popular choices are Winamp (from Nullsoft) and RealJukebox (from RealNetworks). They support streaming MP3 music, which lets you play a file while it’s downloading · to create your own MP3 files from your CDs. You can do this using a CD ripper, a program that extracts music tracks and saves them on disk. Then using an encoder they’re converted into the MP3 format. A program like MusicMatch has all that you need to turn CD tracks straight into MP3 song files. To find MP3 music titles on the Web you need an MP3 search engine, or you can visit music portal sites like MP3.com and Emusic.com. There are, of course, minimum specifications for this software. You’ll need at least a Pentium or PowerPC, 64 MB of RAM, a 10-bit sound card, and stereo speakers. A portable MP3 player lets you listen to MP3 files anywhere. For example, Diamond’s Rio portable player allows you to transfer MP3 music from your PC to its built-in RAM through your PC’s parallel port. It looks like a little personal stereo and runs on batteries. There are also MP3 portable players for the car. There is, however, a growing problem with MP3 music files as a lot of them are pirated and offered free on illegal websites. Big record companies stand to lose millions of dollars as music is transmitted free of charge provoking a fierce reaction from them. Now, the Recording Industry Association of America has decided to create a new compression standard called SDMI (Secure Digital Music Initiative) to protect digital music from piracy. Glossary
|
How much did you understand? Now try these questions.
1 What is MP3?
2 Why is MP3 technology so popular?
3 What software do you need to expand and play MP3 music files?
4 What is streaming audio?
5 How can you make your own MP3s?
6 Why are music companies so angry about the MP3 format?
7 What is the objective of the Secure Digital Music Initiative?
B Match each word on the left (1-8) with its partner on the right (a-h) to make a common technical term.
1 | compression | A | Speaker |
2 | sound | B | Company |
3 | Web | C | Engine |
4 | record | D | Attachment |
5 | search | E | Site |
6 | stereo | F | Protection |
7 | e-mail | G | Format |
8 | copyright | H | Card |
C Which verbs on the left are frequently found with nouns on the right?
to download | CDs |
to play | the Web |
to install | Files |
to compose | Software |
to browse | Data |
to process | Music |
ACTIVIDAD 4
Access Professional English in Use ICT website . Then do the activity Create your own Podcast
BLOQUE V
|
ACTIVIDAD 1
Dealing with How Internet Infrastructure Works
(Original text at http://computer.howstuffworks.com/internet-infrastructure.htm/printable )
1. VOCABULARY EXERCISE
Match the elements in the two lists:
1. network a. order
2. however b. surprising
3. hierarchy c. big
4. provider d. supplier
5. dedicated e. get to
6. amazing f. special
7. major g. run
8. flow h. important
9. arrive i. web
10. crucial j. nevertheless
2. MANIPULATING VERBS (in the Protocol of the Internet section)
Fill in the blanks with the right verbs from the box:
have represents was
call use contains
a. The machines ....................... unique identifying numbers.
b. The computers ............................binary numbers.
c. We ....................... the four numbers in an IP address octets.
d. The Net section always ............................ the first octet.
e. The system with typical IP addresses...........................fine when the computers were few.
f. www.howstuffworks.com .......................... HowStuffWorks.com’s IP address.
3. UNDERSTANDING EXPRESSIONS IN ENGLISH
Use the underlined expressions in a new sentence:
a. We use the Internet’s DNS servers to translate the human-readable domain name into the machine-readable IP address.
................................................................................................................................................
b. The left-most word, like www, is the host name.
................................................................................................................................................
c. A given domain name can contain millions of host names as long as they are all unique.
...............................................................................................................................................
d. Once it has made a request to a root DNS server for any .COM domain, it knows the IP address for a DNS server handling the .COM domain.
...............................................................................................................................................
e. All the machines on the Internet are either servers or clients.
...............................................................................................................................................
4. TRANSLATION OF PHRASES
Give a Spanish version of the following phrases in the text:
- a global collection of networks
- a non-profit group established in 1992
- worldwide web
- Network Access Points
- Point of Presence
5. A READING COMPREHENSION EXERCISE
Answer the following questions on the text:
a. Who owns the Internet?
.......................................................................................................................................
b. Which are the elementary parts of the Internet?
......................................................................................................................................
c. What are backbones?
......................................................................................................................................
d. What is an IP address?
.......................................................................................................................................
e. Give some examples of top-level domain names.
........................................................................................................................................
|
ACTIVIDAD 1
Dealing with "Multimedia"
(Original text at: http://en.wikipedia.org/wiki/Multimedia )
1. VOCABULARY EXERCISE
Match the elements in the two lists:
1. media a. operation
2. information b. see
3. country c. mix
4. features d. channels
5. view e. data
6. surgery f. characteristics
7. blend g. nation
2. USE OF VERBS
Fill in the blanks with the correct forms of "to be" and "to have"
a. My PC ....................an old version of Multimedia.
b. A multimedia artist .................a person who can blend art and techniques.
c. Modern movies usually ........................special effects. (FX)
d. Electronic encyclopedias ...................much more attractive than the traditional ones.
e. Although I ................not an expert in multimedia, I can use them fairly well.
3. UNDERSTANDING EXPRESSIONS IN ENGLISH
Use the underlined word or expression in a new sentence
a. Multimedia also refer to computer media.
.......................................................................................................................................
b. Multimedia can speed-up learning and improve user experience.
.......................................................................................................................................
c. This lets an engineer zoom critical parts of a product.
.......................................................................................................................................
d. when you come across those minds able to blend different techniques
......................................................................................................................................
4. A READING COMPREHENSION EXERCISE
a. What is a good effect of the use of multimedia on user experience?
....................................................................................................................................
b. Can you name some of the main conveniences of a CBT?
....................................................................................................................................
c. How do mechanical enginners use CAD?
...................................................................................................................................
d. What is virtual surgery?
...................................................................................................................................
ACTIVIDAD 2
Viruses. Zip for Windows
What is a virus?
A virus is a piece of programming code usually disguised as something else that causes some unexpected and usually undesirable event. A virus is often designed so that it is automatically spread to other computer users. Viruses can be transmitted as attachments to an e-mail note, as downloads, or be present on a diskette or CD. The source of the e-mail note, downloaded file, or diskette you've received is often unaware of the virus. Some viruses wreak their effect as soon as their code is executed; other viruses lie dormant until circumstances cause their code to be executed by the computer. Some viruses are playful in intent and effect ("Happy Birthday, Ludwig!") and some can be quite harmful, erasing data or causing your hard disk to require reformatting.
Generally, there are three main classes of viruses:
File infectors. Some file infector viruses attach themselves to program files, usually selected .COM or .EXE files. Some can infect any program for which execution is requested, including .SYS, .OVL, .PRG, and .MNU files. When the program is loaded, the virus is loaded as well. Other file infector viruses arrive as wholly-contained programs or scripts sent as an attachment to an e-mail note.
System or boot-record infectors. These viruses infect executable code found in certain system areas on a disk. They attach to the DOS boot sector on diskettes or the Master Boot Record on hard disks. A typical scenario (familiar to the author) is to receive a diskette from an innocent source that contains a boot disk virus. When your operating system is running, files on the diskette can be read without triggering the boot disk virus. However, if you leave the diskette in the drive, and then turn the computer off or reload the operating system, the computer will look first in your A drive, find the diskette with its boot disk virus, load it, and make it temporarily impossible to use your hard disk. (Allow several days for recovery.) This is why you should make sure you have a bootable floppy.
Macro viruses. These are among the most common viruses, and they tend to do the least damage. Macro viruses infect your Microsoft Word application and typically insert unwanted words or phrases.
The best protection against a virus is to know the origin of each program or file you load into your computer or open from your e-mail program. Since this is difficult, you can buy anti-virus software that can screen e-mail attachments and also check all of your files periodically and remove any viruses that are found. From time to time, you may get an e-mail message warning of a new virus. Unless the warning is from a source you recognize, chances are good that the warning is a virus hoax.
EXERCISE: Read the text carefully; then, answer the questions in Spanish.
1. How does a virus spread in the Web?
2. Do viruses act immediately?
3. What kind of files do file infectors infect?
4. How do macro viruses operate?
5. How can we best protect ourselves from viruses?
ACTIVIDAD 3
Zip for Windows
Installing the WinZip Wizard
We will refer to the on-screen panels using the title that appears at the top of each panel.
1. In the WinZip Setup panel, choose Start with the WinZip Wizard and click Next. The Search for Favorite Zip Folders panel will appear.
2. In the Search for Favorite Zip Folders panel, choose Search Entire Hard Disk so the Wizard can search your system for Zip files (this is the recommended option). You will see the search progress, and then a panel that says something like "17 folders were added to your 'Favorite Zip Folders'". Click Next.
3. The Wizard will open an Explorer window displaying the WinZip program group icons. Click Next to continue, and the Wizard Welcome panel will appear.
4. In the Wizard Welcome panel, click Next again, and the Select Activity panel will appear.
That's it, you have installed WinZip, and you're ready to begin using the WinZip Wizard. The sections below describe using the Wizard for unzipping and zipping files.
Using the WinZip Wizard
If you have just installed WinZip and selected the WinZip Wizard interface, then at this point the Select Activity panel is on the screen.
If you have previously installed WinZip, you can start a WinZip session using the WinZip program item in the WinZip program group, the Start menu, or the WinZip icon on your desktop.
Here is a brief introduction to the features of the WinZip Wizard.
If you have previously installed WinZip, you can start a WinZip session using the WinZip program item in the WinZip program group, the Start menu, or the WinZip icon on your desktop.
Here is a brief introduction to the features of the WinZip Wizard.
Quick Unzipping with the WinZip Wizard
1. In the Select Activity panel, choose Unzip or install from an existing Zip file and click Next. The Select Zip File panel will appear.
2. In the Select Zip File panel, click on the Zip file you want to work with and click Next. The Unzip panel will appear.
3. In the Unzip panel, click Unzip Now to open the files in the archive. The WinZip Wizard will open a Windows Explorer window showing the unzipped files.
That's it, you've just unzipped (extracted) a Zip file using the WinZip Wizard. You can now work with the unzipped files, or click Next to choose another activity within WinZip, or close the WinZip Wizard window.
Quick Zipping with the WinZip Wizard
1. In the Select Activity panel, choose Create a new Zip file and click Next.
2. In the Choose Zip Name panel, type the name you want to use for your new Zip file and click Next. For example, if you are creating a Zip file that will contain some files related to yearly reports, you might type "1999 reports" as the name for your Zip file.
3. In the Select Files panel, click Add files to add files to your Zip file, then select the files you want to add and click OK.
4. Click Zip Now to create the new Zip file.
That's it, you've just created a Zip file using the WinZip Wizard. You can now click the WinZip Classic button if you would like to examine the contents of your new archive, or click Next to choose another activity within WinZip, or close the WinZip Wizard window.
EXERCISE: Read the text carefully; then, answer the questions in Spanish.
1. ¿Qué usaremos para referirnos a los paneles en pantalla?
2. ¿Qué tipo de ventana abrirá el asistente (el Wizard)?
3. Si ya has instalado WinZip y seleccionado la interfase con asistente, ¿Qué aparecerá en pantalla?
4. ¿Qué debemos hacer en el panel "Select Zip File" para obtener el panel "Unzip"?
5. ¿Cuál es el primer paso para comprimir un archivo usando el asistente?
ACTIVIDAD 4
What is next?
Power and speed for PCs and the Internet
PCs have broken the barrier of 1 GHz, the DVD is included in most PCs, MP3 has become the standard to compress digital music on the Net; and CD-ROM players with MP3 music are available for the car.
New portals and free services are changing the face of the Internet. Thousands of webcams offer us live views of our planet, from fascinating landscapes and monuments to shopping centres and busy streets of big cities. Conventional modems are being replaced by ISDN, ADSL and satellite connections. ADSL is a form of Digital Subscriber Line that carries data, voice, and MPEG2 video. Its downstream data flow is between 1.5 and 9 megabits per second, so music and pictures will be downloaded in the blink of an eye.
New palmtops – the office in your pocket
Hand-held PCs come with Microsoft Pocket Office pre-installed, so you can write your project while taking the train or make calculations in the plane. They are also equipped with software to handle e-mail and surf the Web. You can hear popular MP3 music or record your ideas through its built-in voice recorder. Once at home you can synchronise data with your desktop PC.
Mobile phones – the future of mobile computing
Not long ago, mobile phones could just transmit voice and SMS messages. Now they can display Internet information thanks to the Wireless Application Protocol or WAP. On these Web-enabled phones you can read information such as stock prices, weather, business news and sports news.
Some hybrid models combine a phone with a PDA. They look like a regular phone with a dialpad and a small screen on its front. But if you flip up the front cover you find a larger screen that is touch-sensitive. Some include a virtual keyboard which pops up when you want to enter email text or a WAP address.
But the future is called “third-generation” (3G) mobiles. They will transmit a caller’s picture and voice simultaneously. From 2001 UMTS mobile phones will deliver users information, e-commerce, games and videoconferencing via fixed, wireless and satellite networks.
Wearable computers, aren’t they chic?
Can you imagine wearing a PC on your belt and getting e-mail on your eyeglasses?
This may sound science-fiction, but the trend is very real. Charmed Technology and other companies are using fashion shows to exhibit their innovative products.
Wearable computers are battery-powered systems worn on the user’s body - on a belt, backpack or vest. They’re designed for mobile or hands-free operations, often incorporating a microphone and a head-mounted display for viewing Internet sites.
Users of wearable technology consider themselves “cyborgs”. This term comes from “cybernetic organism”, referring to a being that is part robot, part human.
GLOSSARY
GHz Gigahertz, equivalent to one thousand megahertz
ISDN Integrated Services Digital Network which provides speeds of roughly 128,000 bits-per-second.
ADSL Asymmetric Digital Subscriber Line. Typically the upstream data flow is between 16 and 640 kilobits per second while the downstream data flow is between 1.5 and 9 megabits per second .ADSL also provides a voice channel.
MPEG Moving Pictures Experts’ Group, a standard for compressing and decompressing images
PDA Personal Digital Assistant which includes an address book, a calendar, Internet access, etc.
SMS Short Message Service which allows you to send short text messages with maximum 160 characters to GSM mobile phones worldwide. GSM is the Global System for mobile Communication that allows transmission of voice and data on mobile phones.
UMTS Universal Mobile Telecommunications System, used by 3G mobile phones
A . Read the texts and select the right choice.
1. One GHz is equivalent to
a) 100 MHz
b) 1,000 MHz
2. ADSL lets you
a) have quick, easy access to the Internet.
b) compress digital music.
3. A “palmtop” is the same as
a) a hand-held computer.
b) a laptop.
4. According to the text, WAP is
a) a hardware device that connects mobile phones to the Internet.
b) a protocol that enables mobile phones to access Internet information.
5. 3G mobile phones
a) will not support audio and video formats.
b) will handle multiple data types including voice and video.
6. Charmed Technology, Inc.
a) is trying to bring wearable computers into fashion.
b) produces laptops.
7. A “cyborg”
a) looks like being half machine, half human.
b) rejects wireless technology.
B. Language work: Compound adjectives.
A compound adjective is made up of two parts and usually describes appearance. The second part is frequently a past participle.
e.g. blue-eyed girl = a girl who has got blue eyes.
voice-activated device = device which is activated by voice
sugar-free product = a product that uses no sugar
Find the following noun phrases in the text and explain their meaning as in the examples.
hand-held PC
web-enabled phone
battery-powered systems
hands-free operations
head-mounted display