- •Introduction
- •Introduction
- •Input devices
- •Input Peripheral Output
- •Improvement Reason
- •36 Unit 6 Operating Systems
- •Introduction
- •Instructions/complex instructions
- •46 Unit 8 Applications Programs
- •1 A museum
- •2 Publishers of a subscription-only magazine
- •54 Unit 10 Computing Support Officer
- •Introduction
- •Introduction
- •Introduction
- •Introduction
- •98 Unit 20 The ex-hacker
- •Introduction
- •In Computing
- •108 Unit 22 People in Computing
- •Introduction
- •Introduction
- •Introduction
- •It's worth considering too the type of battery used. Get one with rechargeable cells.
- •I How up to date did you feel the course was?
- •I That question really relates to my next one. Is there anything that you would add to or take away from the course?
- •I Erm, that would be a great thing because most students have paper qualifications and no practical experience.
- •Very bottom. You see that little status
- •Is that right? с Yes.
- •Interview: Webpage Creator
- •In touch if there's any further
- •Interview: The ex-hacker
- •Interviewer Ralph was one of two 18-year-olds arrested in the 1990s for hacking into a large American
- •I So you're sitting in front of your computer...Somewhere, how do you set about getting into someone else's system?
- •I How can you avoid being hacked into?
- •I How did you get into this business in the first place? Were you a computer geek at school?
- •1 And how did you manage to get into the American company's files?
- •I And managed to get into the ceo's personal files.
- •I Did you feel terribly excited?
- •I How did they track you down?
- •I Now you're helping companies to avoid people like you.
- •I Do you hackers know each other? Is there a competitive element to all this? Is there a kind of rivalry?
- •I Movies sometimes feature hackers.
- •I a recent survey found that four out of ten uk consumers are reluctant to use credit cards for Internet purchases. How risky is it really?
- •1 Telecommunications engineer
- •5 Keen reader
- •Information Technology
36 Unit 6 Operating Systems
Demonstrate the use of the -ing form after prepositions using the example sentences in the text Draw Ss* attention to cases where to is a preposition rather than part of the infinitive and is therefore followed by -ing. For example look forward to, object to, used to doing something.
5 and 6 Both these tasks are best done individually.
Key 5
Loading into memory nonresident programs as required is one task of the supervisor program.
Communicating directly with the hardware is the role of the operating system.
Establishing a user interface is one of the key functions of the operating system.
Providing services for applications software is an additional role.
Supporting multiple programs and users is part of the work of mainframe operating systems.
Facilitating interaction between a single user and a PC is the task in most cases.
Processing large amounts of data quickly is one of the most important functions of a computer.
Allowing the computer to process data faster is the main reason for installing more memory.
Key б
Don't switch off without closing down your PC.
1 want to upgrade my computer.
He can't get used to logging on with a password.
You can find information on the Internet by using a search engine.
He objected to paying expensive telephone calls for Internet access.
He tried to hack into the system without knowing the password.
You needn't learn how to program in HTML before designing webpages.
I look forward to inputting data by voice instead of using a keyboard.
PROBLEM-SOLVING
SPEAKING
8 Most of these popular operating systems should be known to your Ss either through their studies or the warmup work done for Task 1, The task is a straightforward information exchange
| |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
7 Do this in small groups. Encourage Ss to justify their choices where there is disagreement to maximise the quality of the interaction.
UNIT б Operating Systems 37
SPECIALIST READING
9 Copy the MacOS X features onto the board and elicit different ways of combining the table information into full sentences and these sentences into paragraphs. Compare the final version with the description provided in the SB. Note any differences and decide which version is best. Then set the Linux description task for individual work.
Key 9 Linux
Linux is a Unix-based operating sytem designed for use on a wide variety of computer systems. The source code is freely available. A variety of distribution kits are available. Graphics are provided by a graphic engine called XFree86. It has both a command line interface and a GUI. Both KDE and Gnome GUIs can be used.
Key A
The GNU programming tools
The source code was released on the Internet.
Modify it to fix bugs or add new features.
Because they believe that if they make it available it will destroy their revenue stream.
Command interpreters, programming tools, text editors, typesetting tools and graphical user interfaces.
A complex standard distributed windowing system on which people implement graphical interfaces.
KDE and Gnome
Key В
a vi b v с ii d i e iii f iv
a False b False с True d True e True