- •Contents
- •Module 1
- •1. What is a Computer? Word List
- •III. Understanding words
- •IV. Content review
- •V. Translate the sentences from Ukrainian into English using new vocabulary.
- •VI. Discussion.
- •2. Types of Computer Word list
- •"Types of computer"
- •III. Match types of computer with their definitions.
- •IV. Understanding
- •V. Choose the correct adjective. Then fill in the gaps with the correct form of the adjective.
- •VI. Translate from Ukrainian into English.
- •VII. Make up dialogue between a shop assistant and a customer.
- •VIII. Prepare a report about ibm pc and Apple Macintosh (Mac).
- •3. Early Computing Machines and Inventors Word list
- •Exercises
- •I Match words with definitions
- •II Sequencing of events
- •IV. Understanding the text
- •V. Categorization
- •VI. Make the degrees of comparisons of adjectives and adverbs from the exercise V.
- •VIII. Make up questions to the text.
- •IX. Imagine! You are the guide at the Computer History Museum.
- •4. Five Generations of Modern Computers Word list
- •First Generation (1945-1956)
- •Fourth Generation (1971-Present)
- •III. Locating information
- •V. Replace the pronouns with the corresponding nouns.
- •VI. Give the main characters of the computers of each generation.
- •5. The Parts of Computer Word list
- •IV. Understanding the text
- •V. Replace the pronouns with the corresponding nouns.
- •VI. Make up questions to the text.
- •VII. Translate the following sentences from Ukrainian into English.
- •VIII. Retell the text using exercise VI as a plan.
- •6. The Central Processing Unit Word list
- •I. Main idea
- •II. Understanding the passage
- •III. Locating information
- •V. Understanding words
- •VI. Word forms
- •VII. Content review
- •7. Types of Hardware Word list
- •Hardware
- •III. Complete the passages using the words.
- •Module 1 Variant 2
- •III. Complete the passages using the words.
- •IV. Choose the appropriate form of the words to complete the sentences.
- •Module 1 Variant 3
- •III. Complete the passages using the words.
- •Module 2
- •1. Types of Software Word List
- •I. Main idea
- •Types of software
- •IV. Which of the listed below statements are true/false.
- •V. Find English equivalents in the text:
- •VI. Give definitions to the following using the vocabulary:
- •2. Operating Systems Word List
- •IV. Complete the following sentences using information given in the text
- •VI. Answer the questions
- •3. Linux Text a
- •Exercise
- •1. Find equivalents
- •Exercises
- •I. Answer the following questions:
- •II. Understanding words
- •III. Complete the sentences with the words given bellow:
- •Why use Linux? Word list
- •Advantages of Using Linux
- •Retell these texts using your plan.
- •II. Understanding the passage
- •IV. Contextual reference
- •V. Understanding words
- •VI. Word forms
- •5. Memory Word list
- •Exercises
- •I. Find in the text adjectives which are used with the following nouns. Translate the word combinations.
- •II. Fill in the gaps with the appropriative words.
- •Find the passive constructions in the 4th and 5"' paragraphs and put them into past and future forms.
- •Give the main idea of the text in one sentence.
- •V. Decide whether the following statements are true or false.
- •VI. Translate from Ukrainian into English.
- •6. Internet Word List
- •II. Read the text "Internet"
- •IV. Find in the text Passive Constructions and make them Present, Past or Future Simple Passive
- •V. Change the following sentences into Passive Voice
- •VI. Understanding the text
- •VII. Translate the sentences from Ukrainian into English
- •VIII. Give the definitions of the following words
- •IX. Retell the text using sentences of exercise VI as a plan.
- •7. Viruses Word List
- •I. Refer back to the text and find synonyms for the following words
- •II. Name the words using the definitions
- •VII. Make your plan to the text.
- •III. Complete the passages using the words.
- •VI. Choose the appropriate form of the words to complete the sentences.
- •III. Complete the passages using the words.
- •IV. Choose the appropriate form of the words to complete the sentences.
- •III. Complete the passages using the words.
- •3. Nanorobots
- •4. Types of Networks. Neural Networks.
- •5. Artificial Intelligence
- •6. Digit that Means Nothing
- •7. Types of Error
- •9. Mineral Industry Software
- •10. Advantages of Electronic Detonator Application
5. Memory Word list
register ['redzistoj техн. лічильник
to require [ri'kwaia] вимагати
particular [ps'tikjuls] особливий, специфічний
to obey [o'bei] слухатися, коритися
bulk |'b'4k| об'єм; основна маса
to refer [rife:] посилатися, стосуватися
random fnendsm] випадковий
semiconductor | semiksndAkta] напівпровідник
volatile [VobtailJ непостійний, енергозалєжний
latter [Isbta] нсдавній;останній
pattern ['p&ten] зразок, модель
charge |tja:dz] навантаження; ел. заряд
exposure [iks'porno] зовнішній вплив, схильний до
зовнішнього впливу
14. erasable fi'reizebl] той що стирається
Pay attention to these abbreviations:
ROM(Read-Only Memory) постійна пам' ять
RAM(Random-Access Memory) оперативна пам'ять; запам'ято-
вуючий пристрій з довільним доступом
BIOS(Basic Input Output System) базова система введення/виведення
Memory
The memory (main store) of a computer is made up of a large number of registers which are used to hold the instructions (the program) required to solve a particular problem and some data.
Programs other than the one that is being obeyed may be stored on a backing-store external to the computer memory. In a similar way, the bulk of the data required for a computer run may also be stored on backing-storage. However, data to be operated on by the processing elements of the computer must be in the computer memory during the processing cycle.
There are two basic types of memory, namely read/write memory, whose contents may be changed, by writing new information into it and read only memory (ROM) whose contents are fixed. Read/write memory is usually referred to as random access memory (RAM) for historical reasons, although strictly speaking most modern read only memories can also be accessed in a random order.
The semiconductor RAM memory is of the volatile type. That is. when power is removed, all information previously written in memory is lost. ROM retains the information in it even without power.
ROMs, which are non-volatile, must have the information loaded into the somehow before they can be used. This can either be done during the
manufacturing process; they are then referred to as mask-programmed ROMs, or by the user. In the latter case they are referred to as programmable ROMs (PROMs). Programming is done either by burning the required information pattern into them with high voltage pulses (the fusible Imk type PROM) or by storing minute charges on them. The latter are erasable through exposure to ultraviolet light and referred to as EPROMs (erasable PROMs).
The ROM-BIOS is the part of ROM that is in active use, all the time the computer is at work. The role of the ROM-BIOS is to provide the fundamental services that are needed for the operation of the computer. For the most part, the BIOS, controls the computer's peripheral devices, such as the display screen, keyboard, and disk drives. When we use the term BIOS in its narrowest sense, we are referring to the device control programs - the programs that translate a simple command, such as read-something-from-thc-disk, into all the steps needed to actually perform the command, including error detection and correction. Conceptually, the BIOS programs lie between our programs (including DOS) and the hardware. In effect, this means that the BIOS, works in two directions in a two-sided process. One side receives requests from programs to perform the standard BIOS input/output services. The other side of the BIOS communicates with the computer's hardware devices, using whatever detailed command codes each device driver requires.
The IBM PC family, like all computers based on tire Intel 8086 family of microprocessors is controlled largely through the use of interrupts, which can be generated by hardware or software. The BIOS sendee routines are not exception; each one is assigned an interrupt number that we must call when to use the service. When an interrupt occurs, control of the computer is turned over to an interrupt-handling subroutine that is often stored in the system ROM (a BIOS service routine is nothing more than an interrupt handler).