Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

Computer_Engineering_print_new2

.pdf
Скачиваний:
628
Добавлен:
01.06.2015
Размер:
6.14 Mб
Скачать

Computer Engineering 91

1._______________________

Virtual reality is a computer simulated environment, whether it is a simulation of the real or imaginary world. Most current virtual reality environments are primarily visual experiences, displayed either on a computer screen or through special stereoscopic displays, but some simulations include additional sensory information, such as sound or tactile information (haptic systems), and are generally known as force feedback. Users can interact with a virtual environment either through the use of standard input devices or through multimodal devices (data gloves, omnidirectional treadmill).

2._______________________

Immersion is basically a unique experience that is connected with the world of virtual reality. Exploring a three dimensional world of virtual reality the user simply immerses in it as the real world. This

phenomenon is known as telepresence1. Thus the user gets focused about his newly created identity inside the Virtual Reality world. Immersion is made

up of two main components: depth and breadth2 of information. Depth of information includes the resolution of the display unit, the graphics quality, the effectiveness of the audio and video etc. Breadth of information is a number of sensory dimensions presented simultaneously.

3._______________________

To develop a real time virtual environment a computer graphics library can be used as embedded resource coupled with a common programming language, such as C++, Java etc.

Some of the most popular computer graphics

library/API3/language are OpenGL, Direct3D, Java3D

and VRML4, and their use is directly influenced by the system demands in terms of performance, program purpose, and hardware platform. The use of multithreading can also accelerate 3D performance and enable cluster computing with multi-user interactivity.

Virtual reality can serve to new product design,

helping as an ancillary tool for engineering in manufacturing processes. Among other examples, we may also quote Electronic Design

Automation, CAD5, FEA6, and Computer Aided

Manufacturing.

4._______________________

Beyond modeling assembly parts, 3D computer graphics and VR techniques are currently used in the research and development of medical devices for innovative therapies, treatments, patient monitoring. VR also finds application into health care professionals training from anatomy instruction to surgery simulation. 3D Virtual reality simulation is becoming widely used for urban planning and transport projects. Architects use this technology to create virtual designs of buildings. Dramatic improvements in the field of virtual reality are taken place due to the extensive research and usage of VR in the military applications where they are applied almost for flight simulations or combat training.

5._______________________

The element of interaction is the most important to make the user really feel free to get involved with the virtual environment. Interaction is characterized by speed (the rate of the user’s actions recorded by computer and the way they are reflected to be realized), range (the number of results or reactions that can come out of any user action), mapping (the ability of a computer system to produce results as good as the natural world in response to the user actions). The possibility to move from place to place inside a virtual environment is a kind of interactivity. A poorly designed interaction can hamper immersion to a great extent and the user may simply stop getting involved in the virtual environment. The virtual environment is considered to be well designed and developed if it responds to the user action in a way it makes sense.

English for Special Purposes

force feedback
in military applications
Telepresence
in medical research
Interaction
for engineering in manufacturing processes
visual experience
Innovative treatments
sound or tactile information
flight simulations
force feedback system
building design

92 Computer Engineering

An omnidirectional treadmill is a device that allows a person to perform locomotive motion in any direction. The ability to move in any direction is how these treadmills differ from their basic counterparts that permit only unidirectional locomotion.

Omnidirectional treadmills are employed in immersive virtual environment implementations to allow unencumbered movement within the virtual space through user self-motion.

Comments:

1виртуальное присутствие, иллюзия нахождения в виртуальном пространстве;

2ширина;

3(Application Programming Interface) интерфейс прикладного программирования;

4(Virtual Reality Modeling Language) язык моделирования виртуальной реальности, позволяющий описывать трёхмерные сцены, использовать анимацию и путешествия по Web для различных проектов в Internet;

5(Computer-Aided Design) система автоматизи-

рованного проектирования, САПР;

6(Finite Element Analysis) анализ методом конечных элементов: широко применяемый в САПР метод моделирования поведения сложных систем путём разбиения их на множество элементов.

COMPREHENSION CHECK

12. Reread the text and choose the best option to complete the following statements.

1. Almost any modern virtual reality environment

is primarily...

2. Exploring a 3D VR environment the user can

immerse in it as the real world that is known as...

3. Information breadth includes…

the resolution of the display and the

graphics quality

a number of sensory dimensions presented

simultaneously

the effectiveness of the audio and video

4. The use of VR computer graphics library, API and language is influenced by…

system performance requirements,

program purpose, hardware platform embedded resources

multithreading and multi-user interactivity

5. Three-dimensional VR simulations are widely used by architects for ….

6. Development of virtual reality is caused by its wide usage…

7. Interaction mapping is the ability of a computer system to …

record the rate of the user’s actions and

reflect them

produce results as good as the natural world

in response to the user actions

produce the number of results or reactions

that can come out of any user action

8. Well designed VR applications must...

hamper immersion to a great extent

move the user from place to place

respond to the user action to make sense

English for Special Purposes

Computer Engineering 93

SPECIALIST READING B: Head-mounted display technology

13. Five sentences have been removed from the text.

1.Low cost HMD devices are available for use with 3D games and entertainment applications.

2.An embedded Ethernet interface option permits direct access to data and configuration.

3.This can be used to show stereoscopic images.

4.Some HMDs allow superimposing a CGI upon a real-world view.

5.However, the pixel density (pixels per degree or arcminutes per pixel) is also used to determine visual acuity.

6.Recent applications have included the use of HMD for paratroopers.

Read the text quickly and put the correct sentence in each space to form a logical, coherent and correct text. There is one extra sentence you are not going to need.

General

A head-mounted display (helmet mounted display), is a display device, worn on the head or as part of a helmet, that has a small display optic in front of one (monocular HMD) or each eye (binocular HMD). A typical HMD has either one or two small displays with lenses and semi-transparent mirrors embedded in a helmet, eye-glasses or visor. The display units are miniaturized and may include CRT, LCDs, Liquid crystal on silicon (LCos), or OLED. Some vendors employ multiple micro-displays to increase total resolution and field of view.

Most HMDs display only a computer generated image (CGI), sometimes referred to as a virtual image. ____________________________________

__________. This is sometimes referred to as augmented reality or mixed reality. Combining realworld view with CGI is done by projecting the CGI through a partially reflective mirror and viewing the real world directly (Optical See-Through method). The same combination can also be done electronically by accepting video from a camera and mixing it electronically with CGI (Video See-Through method).

Performance parameters

A binocular HMD has the potential to display a different image to each eye. __________________

______________. Humans have around 180° FOV

(field of view), but most HMDs offer considerably less than this. Typically, greater field of view results in greater sense of immersion and better situational awareness. As for resolution HMDs usually mention either the total number of pixels or the number of pixels per degree.

Listing the total number of pixels (1600×1200 pixels per eye) is borrowed from how the specifications of computer monitors are presented.

__________________________________________

__________________________________________

used to determine visual acuity. 60 pixels/° (1 arcmin/pixel) is usually referred to an eye limiting resolution, above which increased resolution is not

English for Special Purposes

94 Computer Engineering

noticed by people with normal vision. HMDs typically offer 10 to 20 pixels/°, though advances in micro-displays help increase this number.

Applications

Major HMDs are increasingly being integrated into the cockpits of modern helicopters and fighter aircraft. These are usually fully integrated with the pilot's flying helmet and may include protective visors and night vision devices. Military, police and firefighters use HMDs to display tactical information such as maps or thermal imaging data while viewing the real scene.

_________________________________________

_________________________________________.

Engineers and scientists use HMDs to provide stereoscopic views of CAD schematics. These systems are also used in the maintenance of complex systems, as they can give a technician a combination of computer graphics (system diagrams and imagery) with the technician's natural vision. There are also applications in

surgery, where radiographic data is combined with the surgeon's natural view of the operation.

________________________________________

_________________________________________.

One of the pioneers in this field was Sony that

released the Glasstron in 1997, which had a positional sensor permitting the user to view the surroundings, with the perspective moving as the head moved, providing a deep sense of immersion. A HMD system has been developed for Formula One as a part of an advanced telemetry system to communicate to the driver wirelessly from the heart of the race pit.

14. Read the text and put the following points in order to form a summary of the article.

Certain HMDs are embedded into the pilot's flying helmet and include night vision devices.

HMDs offer a resolution from 10 to 20 pixels/°.

Sony was one of the pioneers in the field of HMDs production.

Binocular HMDs are able to display stereoscopic images.

HMDs are often used in engineering and science to provide stereoscopic images of CAD and to maintain complex systems.

A typical HMD is worn on the head and has displays embedded in the visor.

HMD systems are used by F1 pilots and managers as a part of wireless communication system.

Medium-priced HMDs are used with 3D games and entertainment applications.

Some HMDs provide mixed reality that allows superimposing a computer mage upon a real-world view.

1._______________________________

2._______________________________

3._______________________________

4._______________________________

5._______________________________

6._______________________________

7._______________________________

8._______________________________

9._______________________________

English for Special Purposes

Computer Engineering 95

WRITING: Virtual reality devices & applications

15. Write a description of a virtual

 

reality

device or application. Don’t

…………

forget to mention these points:

 

 

general information;

 

 

specifications;

 

 

field of use;

 

 

performance parameters;

 

 

special features.

 

Use links from Get Real to help you.

● Get Real

Check these websites for the latest

VR devices and apps:

http://www.vrealities.com/

http://vrlab.epfl.ch/

SPEAKING: Virtual reality products

16. Role play. Work in pairs. Play the parts of a VR company sales manager and an interviewer. Make up a conversation presenting the latest VR products. Discuss the following issues:

fields of application;

the developer;

the product advantages/disadvantages;

specifications and special features.

You can use the description of the virtual reality device or application from ex. 13, the Supplementary reading section text “Shadow Dexterous Hand” and the links from Get Real.

The following discourse markers may help you:

structuring

first(ly), first of all, second(ly), third(ly) etc;

Note that firstly/ secondly etc are more

 

lastly, finally; to begin with; to start

formal than first, second etc, and are

 

with; in the first/ second/ third place; for one

more common in British than American

 

thing; for another thing

English.

 

 

 

Summing up

in conclusion; to sum up; briefly; in short

 

 

 

 

 

 

 

English for Special Purposes

96 Computer Engineering

Unit 10 Computer Security

WB revision Infinitive Constructions

Malicious software Network security management Focusing…

 

 

LEAD-IN: Quiz on computer and network security

1. Read the questions of the quiz and think of the answers to them. Work in pairs to discuss the answers.

1.Which three email characteristics can help you to identify hoax virus warnings?

The message is from a trusted source.

The message warns of a virus that will infect your computer by simply reading the message.

The message requests that you forward the message to others.

The message was forwarded many times.

2.Which two strategies will help to protect hardcopy information?

Shred printouts before disposal.

Encrypt all files.

Sign all documents.

Adopt a "clean desk" policy.

3.Which three types of information should you avoid adding to your instant messaging account details?

Addresses.

Organization names.

Nicknames.

Phone numbers.

4.Which three steps are important to perform when you receive instant messages?

Verify the source of the message.

Verify the size of any attachment sent to you.

Verify the purpose of the attachment sent to you.

Verify that your security and antivirus updates have been applied before you download or open any attachment.

5.Which PDA security best practice will help protect the information on your PDA?

Clearly identify your PDA with company stickers or logos.

Never remove your PDA from your bag for airport security.

Store your PDA passwords in a safe location.

Synchronize your PDA data regularly.

6.Which two methods will reduce the chances that your password will be compromised?

Make your password lower case.

Change your password regularly.

Use Default passwords.

English for Special Purposes

Computer Engineering 97

Use a passphrase.

7.Which negative outcome can result from hoax virus warnings and malicious spam?

Denial of service.

Data loss.

Reduced account privileges.

Credit card fraud.

8.Which three actions can you take to increase the security of your Web browsing? (Choose three.)

Learn to recognize common scams.

Manage user names and passwords.

Only browse secure Web sites.

Use caution when downloading.

PRONUNCIATION

2. Make sure you pronounce the following words properly:

virus

['vaɪ(ə)rəs]

legitimate

[lɪ'ʤɪtəmət]

worm

[wɜːm]

nefarious

[nɪ'fɛərɪəs]

piracy

['paɪərəsɪ]

disseminate

[dɪ'semɪneɪt]

hoax

[həuks]

innocuous

[ɪ'nɔkjuəs]

propagate

['prɔpəgeɪt]

piggyback

['pɪgɪbæk]

header

['hedə]

adjust

[ə'ʤʌst]

anomaly

[ə'nɔməlɪ]

subtle

['sʌtl]

WORD STUDY

3. Translate the following definitions and memorize the terms:

computer security (n) - the collective processes and mechanisms by which sensitive and valuable information and services are protected from publication, tampering or collapse by unauthorized activities or untrustworthy individuals and unplanned events respectively;

back up (v) -to store a copy of files on a storage device to keep them safe;

firewall (n) - a combination of hardware and software used to control the data going into and out of a network;

antivirus program (n) - a computer program or sets of programs used to detect, identify and remove viruses from a computer system;

infect (v) - affect with a virus;

detect (v) - discover or identify the presence or existence of

payload (n) - the part of the virus that causes the damage;

fraud (n) - wrongful or criminal deception intended to result in financial or personal gain;

spreading viruses (n) - distributing programs that can reproduce themselves and are written with the purpose of causing damage or causing a computer to behave in an unusual way;

salami shaving (n) - manipulating programs or data so that small amounts of money are deducted from a large number of transactions or accounts and

English for Special Purposes

98 Computer Engineering

accumulated elsewhere. The victims are often unaware of the crime because the amount taken from any individual is so small;

denial of service attack (n) - swamping a server with large number of requests;

mail bombing (n) - inundating an email address with thousands of messages, slowing or even crashing the server;

software piracy (n) - unauthorized copying of a program for sale or distributing to other users;

shareware (n) - software that is available free of charge and often distributed informally for evaluation, after which a fee may be requested for continued use.

4. Match the following words with their synonyms (A, B) and opposites (C, D):

A

B

 

 

damage

particular

replicate

covert

legitimate

reproduce

 

 

backdoor

hide

relay

mischief

predetermined

deception

fraud

transmit

conceal

authorized

 

 

C

D

 

 

legitimate

destruct

backdoor

harmless

download

unauthorized

 

 

malicious

harmful

conceal

ban

innocuous

public

protect

reveal

permit

remove

 

 

5. Match A with B to make a word combination and then find its Russian equivalent in C:

A

 

B

C

executable

 

threat

модель управления доступом

compromise

 

activity

незаконная деятельность

backdoor

 

file

заранее заданное событие

informed

 

model

команда перехода

malicious

 

protection

информированное согласие

nefarious

 

management

основная программа

host

 

software

файл с расширением ".ехе"

JUMP

 

the security

скрытая угроза

predetermined

 

consent

вредоносные программы

copy

 

event

управление ключом

key

 

program

защита от копирования

access control

 

command

нарушить безопасность

 

 

 

 

6. There are a variety of different crimes that can be committed in computing, spreading viruses or software piracy are among them. Complete the puzzle using the clues to know some more examples of them.

 

 

 

gaining unauthorized access to a

 

h

 

 

 

c

 

 

 

 

 

 

 

g

 

 

 

 

 

 

network system

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

using another person’s identification code or

 

 

p

 

 

 

g

 

 

 

b

 

 

 

 

k

 

 

g

 

using that person’s files before logging off

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

English for Special Purposes

Computer Engineering 99

 

 

 

tricking a user into revealing confidential information

 

 

 

s

 

 

 

 

 

o

 

 

 

 

 

f

 

 

 

 

 

 

 

g

 

 

 

 

such as access code or a credit card number

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

changing the information shown on

 

d

 

 

 

 

 

 

 

 

 

 

c

 

 

 

 

 

 

 

g

 

 

 

 

 

 

 

 

another person’s website

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

redirecting anyone trying to

 

h

 

 

 

 

j

 

 

 

 

 

 

 

k

 

 

 

 

 

 

 

 

g

 

 

 

 

 

 

 

 

 

visit a certain site elsewhere

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

WORD BUILDING: Revision

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

7. Choose the correct word to complete each sentence. Use a dictionary to help you.

 

 

 

 

 

 

 

 

 

 

1.

 

An electronic / electronics pen is one example of an input device.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

2.

 

The computer is the greatest technological / technologically invention of the twentieth

 

 

 

century.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

3.

 

In twenty years’ time some people will live in space, perhaps inside a computerizing /

 

 

 

computerized colony.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

4.

 

This computer is considerably / considerable faster than the old one.

 

 

 

 

 

 

 

 

 

 

5.

 

If you are new to this system, almost everything will have to be explaining / explained.

6.

 

Connectivity / Connection is an important concept in global communications.

 

 

 

 

 

 

 

 

 

 

7.

 

Those files are not accessive / accessible unless you know the password.

 

 

 

 

 

 

 

 

 

 

8.

 

If an error occurs, it is important to take correction / corrective action immediately.

 

 

 

 

 

 

9.

 

A computer program / programming is a set of instructions that tell the computer how to do

 

 

 

a specific task.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

10.

An error or malfunction of a computer program is known as a debug / bug.

 

 

 

 

 

 

 

 

 

 

11.

Programs written in a high-level language require compiler / compilation – that is,

 

 

 

translation into machine code, the language by the processor.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

12.

Digital TV is a way of transmitting / transmitted pictures by means of digital signals, in

 

 

 

contrast to the analogue signals used by traditional TV.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

8. Fill in the gaps with the correct prefix from the following list.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

re-

de-

e-

mono-

un-

im-

 

 

 

hyperautomicro-

multi-

in-

sub-

 

 

 

 

 

 

1.

Most people prefer a colour screen to a _____chrome screen.

 

 

2.

_____script is a character or symbol written below and to the right of a number or letter,

 

often used in science.

 

 

 

 

 

 

3.

By the year 2030 cash will be _____placed by electronic money.

 

 

4.

Tablet computers typically _____corporate small (8.4–14.1 inches/21–36 centimeters) LCD

 

screens.

 

 

 

 

 

 

5.

Microchips _____planted into our arms will serve as ID cards and contain our medical

 

records.

 

 

 

 

 

 

6.

Futurists predict that smart technology will be incorporated into fabrics so you’ll be able to

 

_____mail from your coat.

 

 

 

 

 

 

7.

_____media is a form of enriched multimedia which allows an interactive and dynamic

 

linking of visual and audio elements.

 

 

 

 

 

English for Special Purposes

100Computer Engineering

8.This program displays a message when it detects spyware and other _____wanted software that may compromise your privacy or damage your computer.

9.Digital Terrestrial TV is received via a set-top box, a device that _____codes the signal received through the aerial.

10.Optical discs are ideal for _____media applications, where images, animation and sound occupy a lot of disc space.

GRAMMAR FOCUS: Infinitive Constructions

9. Read and translate the following sentences paying attention to the Infinitive Constructions. If you need help use GRAMMAR FILES 10 (p. 118).

1.Asymmetric ciphers permit the encryption key to be public.

2.A change is so subtle that someone not specifically looking for it is unlikely to notice it.

3.Steganography can be said to protect both messages and communicating parties.

4.Everybody knows a plaintext to be the source of information to be secured.

5.This sequence causes digitized images to be stored in core memory.

6.This process was not expected to be effective.

7.Hackers have been known to do a variety of things to computer systems, including downloading files and leaking confidential information, hijacking websites, defacing websites by changing the text and graphics on the webpages etc.

8.A virus may cause a computer to behave in an unusual way.

9.We proved this suggestion to be wrong.

10.Such a threat often turns out to be nothing more than a hoax.

11.This general term is known to be used by computer professionals to mean a variety of forms of hostile, intrusive or annoying software or program code.

12.There happened to exist some ideas about the system break-in.

13.This problem is not considered to be a major one.

14.People make systems work.

English for Special Purposes

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]