- •Передмова
- •Lesson 1 computer software the reading module
- •I.Read the text:
- •The speaking module
- •III. Speaking exercises:
- •The writing module
- •IV. Writing exercises:
- •Lesson 2
- •The reading module
- •I. Read the text:
- •II. Reading exercises:
- •The speaking module
- •III. Speaking exercises:
- •The writing module
- •III. Writing exercises:
- •Lesson 3 operating system the reading module
- •I.Read the text:
- •I. Reading exercises:
- •The speaking modulee
- •III. Speaking exercises:
- •The writing module
- •IV. Writing exercises:
- •Lesson 4 common operating systems (Part 1- ms-dos and windows) the reading module
- •I. Read the text:
- •The speaking module
- •The writing module
- •IV.Writing exercises:
- •Lesson 5
- •The speaking module
- •The writing module
- •IV. Writing exercises:
- •Lesson 6 system utilities programs the reading module
- •The speaking module
- •III. Speaking exercises:
- •The writing module
- •IV.Writing exercises:
- •Lesson 7 what is a user interface? the reading module
- •I.Read the text:
- •II.Reading exercises:
- •The speaking module
- •The writing module
- •IV. Writing exercises:
- •Lesson 8 device drivers and interrupts the reading module
- •I.Read the text:
- •The speaking module
- •III.Speaking exercises:
- •The writing module
- •Lesson 9 the system kernel the reading module
- •I.Read the text:
- •II.Reading exercises:
- •The speaking module
- •The writing module
- •IV.Writing exercises:
- •Lesson 10 software engineering the reading module
- •I.Read the text:
- •Speaking module
- •III. Speaking exercises:
- •The writing module
- •III. Speaking exercises:
- •IV.Writing module
- •II.Reading exercises:
- •III. Speaking exercises:
- •IV.Writing exercises:
- •II.Reading exercises:
- •III. Speaking exercises:
- •IV. Writing exercises:
- •II.Reading exercises:
- •III. Speaking exercises:
- •IV. Writing exercises:
- •II.Reading exercises:
- •III.Speaking exercises:
- •IV. Writing exercises:
- •II.Reading exercises:
- •III.Speaking exercises:
- •IV. Writing exercises:
- •II. Reading exercises:
- •III. Speaking exercises:
- •IV. Writing exercises:
- •II.Reading exercises:
- •III.Speaking exercises:
- •IV. Writing exercises:
- •II.Reading exercises:
- •III.Speaking exercises:
- •IV. Writing exercises:
- •II.Reading exercises:
- •III.Speaking exercises:
- •IV. Writing exercises:
- •Список літератури:
IV. Writing exercises:
Exercise 1
Scroll-bar, editor, stability, malware, data center.
Exercise 2
graphical interface,
multimedia applications,
the world's personal computer market,
which is targeted at home users.
Lesson 5
II.Reading exercises:
Exercise 2
1. Macintosh. 2.A graphical user interface (GUI). 3. OS/2 Warp (IBM). 4. C language.
Exercise 3
1c, 2d, 3b, 4a.
Exercise 4
Was, provides, supports.
III.Speaking exercises:
Exercise 1
A mouse
A mouse is an input device with the ball rolled by the user to specify the position of the cursor or choose the menu item.
Macintosh
Macintosh, commonly nicknamed Mac, is a brand name which covers several lines of personal computers designed, developed, and marketed by Apple Inc. It was the first commercially successful personal computer to feature a mouse and a graphical user interface (GUI) rather than a command line interface.
Routines
Routines are sequence of instructions which perform such tasks as starting up the computer, transferring data from disks to peripherals and controlling the RAM space.
Macintosh finder
The Finder displays the Macintosh desktop and enables the user to work with disks, programs and files. It allows multitasking. It has a Internet set-up assistant, an e-mail program and Web browser.
Browser
It’s a program designed to display and fetch the Web pages on the Internet.
Exercise 2
1. What is Macintosh?
2.What does the Finder display?
3.Does warp include easy access to networks via modem?
4.What is the central component of Java OS is Java Virtual Machine?
IV. Writing exercises:
Exercise 1
RAM, multitasking, multivendor, Virtual Machine.
Exercise 2
…for many corporate installations.
…. advance CAD programs.
…..types of Digital and multivendor networks.
Lesson 6
II.Reading exercises:
Exercise 2
1.Utility programs help manage, maintain and control computer resources. These programs are available to help you with the day-to-day chores associated with personal computing and to keep your system running at peak performance.
2.Disc defragmenters, system profilers, Virus scanners, binary, text editor utility, archive utilities, compression utilities, encryption utilities, application launchers, registry cleaners, network managers, system utilities.
3. Defragmenter can detect computer files whose contents have been not Italic text stored on the hard disk in disjointed fragments, and move the fragments together to increase efficiency.
4. Backup software.
5. Virus scanning software.
6. Application launchers provide a convenient access point for application software.
Exercise 3
1c, 2a, 3d, 4b.
Exercise 4
Detect, hard disc, increase, algorithm.
III.Speaking exercises:
Exercise 1
Utility program
Utility programs help manage, maintain and control computer resources. These programs are available to help you with the day-to-day chores associated with personal computing and to keep your system running at peak performance
Disc checker
A disk checker can scan the contents of a hard disk to find files or areas that are corrupted in some way, or were not correctly saved, and eliminate them for a more efficiently operating hard drive
Virus scanners
Virus Scanning Software are utility programs designed to protect your computer from computer viruses
System utilities
Utility programs that provide a convenient method of performing routine data management tasks, such as deleting, renaming, cataloging, uncataloging, moving, copying, merging, generating and modifying data sets, particularly used on mainframe computers such as IBM mainframe utility programs
Registry cleaners
Registry cleaners clean and optimize the windows registry by removing old registry keys that are no longer in use
Exercise 2
1.What can a system profiler provide?
2.What provides a convenient access point for application software?