- •Lesson 1
- •Text a a first look at computers
- •Text b a short history of the personal computer
- •Text c renewing your license with a touchscreen
- •Lesson 2
- •Text a types of computers
- •Text b steve jobs and the NeXt computer
- •Text c learning a foreign language with hypertext
- •Lesson 3
- •Text a living with computers
- •Text b bits of history
- •Text c hot rod chips
- •Lesson 4
- •Text a elements of hardware
- •Text b history of the chip
- •Text c software down on the farm
- •Lesson 5
- •Text a memory
- •Internal Memory
- •Text b engineering with cad
- •Text c help for nurses from helpmate
- •Lesson 6
- •Text a elements of hardware
- •Input/Output Telecommunication
- •Text b the first computer
- •Text c creating 3-d models with a digitizer
- •Lesson 7
- •Text a types of software
- •Text b generations of computers
- •Text c monitoring weather at portland general electric
- •Lesson 8
- •Text a software package terminology
- •Text b bits of history – software
- •Text c surviving in kuwait
- •Lesson 9
- •Text a types of software
- •Integrated Software
- •Text b the “father” of the mouse
- •Text c data base helps fight on aids
- •Additional materials texts networks supporting the way we live
- •Modern networks
- •Workstation
- •What is dsp?
- •From Analog to Digital
- •Blinding Speed
- •DsPs versus Microprocessors
- •Different dsPs For Different Jobs
- •Dsp Evolution
- •Things that have dsPs
- •Robots Definitions
- •History
- •Early modern developments
- •Modern developments
- •General-purpose autonomous robots
- •Dedicated robots
- •Computer-aided manufacturing
- •Integration with plm and the extended enterprise
- •Basic and the first pc
- •Tools of the trade
- •Is "bug-free" software possible?
- •Prison inmates pass their time with programming
- •All circuits are busy
- •A data base with a view
- •Computer-aided school bus routing
- •Smart workers for smart machines
- •Robotics and the chip
- •The importance of software
- •" I ’ ll have the usual"
- •Exercises
- •Infinitives
- •Topics general information about the usa
- •Usa history, customs and traditions.
- •First programmers
- •My plans for future
- •My future profession
- •Glossary
Lesson 5
Exercise 5.1
Translate the following words paying attention to affixes.
Divide, division, divided, indivisible, divisibility; access, accessible, accessing, inaccessible, accessibility; connect, connection, connected, connectivity, connecting, disconnected; volatility; regardless; arrange, arrangement, rearrange, arranged; accomplish, accomplishment, accomplishing, accomplished; burn, burning, burnt; rotate, rotation, rotational, rotated, rotating; oxygen, oxide, dioxide, oxidize, oxidation; new, newer, renew, newest, renewal; mount, mounted, mountable, mounting; sequence, sequent, sequential; instance, instantaneous, instant, instantly.
Exercise 5.2
Translate the following sentences paying attention to conditional forms.
If the solution is acceptable, the network is reconfigured.
If the solution were acceptable, the network would be reconfigured.
If the solution had been acceptable, the network would have been reconfigured two days ago.
The network will be reconfigured providing the solution is acceptable.
The network could be reconfigured if the solution had been acceptable.
Had the solution been acceptable, the network could have been reconfigured.
Provided the solution was acceptable, they might reconfigure the network
They will not reconfigure the network unless the solution is accepted.
Were the solutions acceptable, the network could be reconfigured.
If I should find an acceptable solution, we would reconfigure the network.
I don’t know if the network will be reconfigured.
We’d reconfigure the network unless we hadn’t been told not to.
Exercise 5.3
Translate the following sentences paying attention to conditional forms.
If more than 20 or 30 processors are used, they end up spending most of their time on notification.
One solution would be to use a single shared memory and not to cache data that could be shared.
If you‘ve used technologies like Microsoft’s Active Server Pages, you’ll find Java Server Pages (JSP) easy enough to understand.
Had Microsoft obeyed the law, we would have had much more innovation and competition over the last seven years.
Moreover, much of that lost activity would have focused on the interface between the PC and the Internet – an area where more innovation would have been particularly welcome.
Many more people would use Linux operating system if it ran Office, especially an Office no longer subject to Microsoft’s strategy tax.
Meanwhile, middleware entrepreneurs could turn to the Office company as a distribution partner, if the Windows company tried to block them, and consumers and developers would be given many more choices.
The larger choice among innovations would leave users and developers worse off than if the lawbreaking had never happened.
Even if many technologists around the world have a working knowledge of English, if you are trying to sell something to them or support them through a technical crisis, you’ll have more success speaking to them in their own language.
The same goes for software, of course, and if you sell software into a global market, you’ll want to customize it to your customer’s requirements.
If you had 50 million people who wanted to download LimeWire, they could do it.
What would happen, for example, if the recording industry set its sights on LimeWire, as it did on Napster, for copyright violations?
Even if the company shuts down, the network it’s helped foster will live on.
Provided developers are aware of how VB’s (Visual Basic) error handling works, it’s possible if not easy to make sense of it.
If he is logged in on any device, be it desktop computer, cellphone, or PDA, her question will reach him wherever he is, in the office, at home or in between.
If unable to do so, such as by finding an alternative processor or network node, it automatically generates an error log and contacts IBM for another solution via Internet or private –network connection.
If IBM hasn’t fixed the problem before, human intervention is necessary.
Hadn’t antivirus software been set to scan files before they were saved, infection could have occurred.