- •English For it Students
- •Предисловие
- •Vocabulary:
- •Central Processing Unit (cpu)
- •Vocabulary:
- •Unit 2. Programming
- •Creating Computer Programs
- •Vocabulary:
- •Structured and Object-Oriented Programming
- •Vocabulary:
- •Unit 3. Databases Text 7 Databases and Database Management Systems
- •Database Structures
- •Unit 4. Networks
- •Network Structures
- •Vocabulary:
- •A(an) __________ is a way to connect computers so that they can communicate, exchange information, and share resources in real time.
- •Network Topologies
- •Internet
- •Vocabulary:
- •Unit 5. Information Systems
- •Building Information Systems
- •Vocabulary:
- •Part II
- •Unit 1. Computers around Us
- •Importance of Computer Literacy
- •Shapes of Computers Today
- •Technical Documentation
- •Types of Documentation
- •Computing Issues That Affect Us All Computer Crime
- •Computer Viruses
- •Unit 2. Input, Output, Storage Devices
- •The Mouse
- •Variants of the Mouse
- •Alternative Methods of Input Devices for the Hand
- •Optical Input Devices
- •Audiovisual Input Devices
- •Monitors and Sound Systems Monitors
- •Pc Projectors
- •Sound Systems
- •Printers
- •Types of Storage Devices
- •Magnetic Storage Devices
- •Unit 3. Operating System
- •Types of Operating Systems
- •Windows xp
- •Brief History of Linux
- •Unit 4. Application Software
- •Word Processing Software
- •Desktop Publishing Software
- •Spreadsheet Software
- •Database Management System
- •Presentation Programs
- •Managing the Small or Home Office
- •Working With Images Computer Platforms Used for Graphics
- •Types of Graphics Files
- •Getting Images Into Your Computer
- •Graphics Software
- •Digital Photography
- •Photography the Old Way
- •Multimedia
- •Creating and Distributing New Media Content
- •Technologies That Support New Media
- •Distributing New Media Content
- •Virtual Reality
- •Uses for Virtual Reality
- •Vr Hardware and Software
- •Pc As an Entertainment Center
- •Utility Software
- •Unit 5. Processor and Memory cpUs Used in Personal Computers
- •Universal Serial Bus (usb)
- •Musical Computers
- •Flash Memory and Cache Memory Flash Memory
- •Cache Memory
- •Memory and Computing Power
- •Unit 6. Programming
- •Visual Programming
- •Fourth-generation Programming Languages
- •Artificial Intelligence
- •Some Examples of ai Techniques
- •Building an Artificial Brain
- •Unit 7. Networks and the Internet Networking at Home and Around the World Data Communications Over Standard Telephone Lines
- •Networks in the Home
- •Isdn, t1, and t3
- •Dsl Technologies
- •Avoiding a Tangled Mess
- •From the History of the Internet
- •Getting Online, Working Online Accessing the Internet
- •Connecting a pc to the Internet
- •Commerce on the World Wide Web
- •Getting Published on the Internet
- •Minding Your Manners Online
- •Graphics Piracy on the Internet
- •Ignorance Is No Excuse
- •Staying Out of Trouble
- •Freebies on the Web
- •Personal Web Pages
- •Unit 8. Information Security Protecting Your Online Privacy
- •Macro Viruses
- •Viruses That Do Not Require Attachments
- •Protecting Yourself
- •Vocabulary
- •Литература:
- •Содержание Part I Computer Basics
Computing Issues That Affect Us All Computer Crime
Our legal system is gradually developing a legal framework for working with computers and working on the Internet. The most prevalent breach of law in cyberspace is software piracy, or the illegal copying or use of a program. Several types of copy protection schemes can be used to stop or slow down pirates.
Computer Viruses
A computer virus is a parasitic program that can replicate itself, infect computers, and destroy data. Viruses are most commonly spread by infected disks and when users download infected files over a network or from the Internet. A new breed of e-mail viruses is spread via files attached to e-mail messages or in the body of an e-mail message. Users can protect their data and software by using an antivirus program and by keeping the program's virus definitions up to date.
Theft
Computer-related theft is a costly problem for organizations and individual users, especially those who use portable computers. Many companies literally lock their computer systems with anti-theft devices. Software theft is a common problem in organizations where software is left unattended. Companies can combat the problem by keeping software in a locked storage location and overseeing its installation on individual computers. Data theft is perhaps the greatest concern to organizations. Hackers steal data by accessing a computer's disks over a network. In addition to stealing data, hackers have been known to destroy data, crash computer networks, and steal funds electronically. Organizations can protect the data on their networks by taking appropriate security measures. Basic measures include requiring users to provide identification and passwords before accessing the network. More sophisticated measures include encrypting data to make it unusable to anyone without the proper decoding key.
Computers and the Environment
The computer industry has become known for planned obsolescence, with both hardware and software being replaced or upgraded every couple of years. When disposed of improperly, obsolete hardware and software contribute to pollution and negatively affect the environment. Many newer devices are designed under the Energy Star program, which sets power-consumption standards for computer equipment.
Ethical Issues in Computing
Widespread access to computer technologies has created many ethical dilemmas. Government, legal, and computing professionals continue to debate computer-related ethical questions and attempt to develop laws that protect the freedoms of computer users while limiting immoral or illegal use of computers.
Unit 2. Input, Output, Storage Devices
Standard Methods of Input
The Keyboard
A standard computer keyboard has about 100 keys; each key sends a different signal to the CPU. Most keyboards follow a similar layout, with their keys arranged in five groups. Those groups include the alphanumeric keys, numeric keypad, function keys, modifier keys, and cursor-movement keys. Most keyboards use the QWERTY layout, which gets its name from the first six keys in the top row of letters. Several ergonomically correct keyboards are available to help users prevent hand and wrist injuries. When you press a key, the keyboard controller notes that a key was pressed and places a code in the keyboard buffer to indicate which key was pressed. The keyboard sends the computer an interrupt request, which tells the CPU to accept the keystroke.