И.С. Гудилина, Л.Б. Саратовская, Л.Ф. Спиридонова - English Reader in Computer Science (1114139), страница 4
Текст из файла (страница 4)
III. Answer the following questions:
1 What can you say about me Compound Electronic Document? 2. What is the main aim of IBM?
Unit?
Read and translate text №1 in written form using a dictionary if necessary.
TEXT № I
A New Program Allows Many Popular
Word Processors to 'Talk' to One Another.
The ability to transfer data from 5 1/4-inch to 3 1/2-inch disks and vice versa is becoming an important consideration as sales of laptops and IBM PS/2 computers increase. There are various ways to perform this time-consuming nuisance task. One software package specially designed for the purpose. The Brooklyn Bridge from White Crane Systems of Norcross, Ga., was covered in last week's column. But transferring data to and from disks of different sizes is only half the battle. Increasingly, it is also necessary to translate files, particularly those created through word processing programs, from the format of one program to that of another. Data stored in, say, a WordStar file suddenly needs to be "written" in WordPerfect. This poses a much more complex problem.
Word processing files are essentially composed of two parts: the text itself, and the formatting commands, the instructions that produce such aspects as boldface type, paragraph indentations, centered page numbers and so on. Because of these formatting elements, converting a file from one program to another has always been a tedious task at best,
Word Processing and Application Software
One way to translate from one word processing program to another was to strip a file of its formatting commands and then to feed the remaining text via ASCII code, which most word processing programs can deal with, to the new word processing program. Then the material would have to be reformatted manually, with the paragraph breaks, page numbers and underlining being reinserted via the keyboard. In the case of tabular material such as tables and lists, however, adding the new formatting commands often would take longer than simply retyping all of the data.
Another solution was to send the disks out to a service bureau specializing in file translations. However, this solution, besides being expensive, was a service of which average individuals could not readily avail themselves.
Enter the conversion utilities, programs that translate files from one program to another. Software publishers are beginning to realize that very few people can be persuaded to buy a new and different word processor—no matter how superior it may be to their current program—unless they will be able to take their previously entered files with them. So, a few publishers have begun to include conversion utilities in their word processing packages.
Personally, I would have preferred the use of the more commonly used Enter key for that purpose, but that's a minor point. Next, the word processor to which the files are to be converted, let's say WordStar, is located on the menu. That selection is made by pressing the right arrow key. Finally, the drive to which the translation is to be sent is indicated before one returns to the main menu.
Word Processing and Application Software
To translate a number of documents, say half a dozen of my columns, one queues them one at a time from the directory of the disk on which they are stored. The program permits the queuing of 99 documents, which would seem a sufficient number for anyone's purposes.
However, at one point in the course of testing Software Bridge, I looked through a directory of some 300 files only to discover that most of them were missing. It was definitely time to push the panic button!
As it turned out, the files had not been destroyed. Software Bridge's directory function simply cannot show more than 100 file names at a time. An explicit warning concerning this limitation stated in the manual might help to avert heart attacks among users like me who work with very large directories. Once all the files to be translated have been designated, the Fl key initiates their actual conversion. To convert this column from Word Perfect to Word Star took a little over a minute. Such speed won't exactly set the world on fire. But the conversion was, as I was pleased to discover, free of errors. And it certainly beats re-entry.
II. Read and translate text №2 orally without a dictionary. Make up a two-sentence annotation. ( see p. 5)
TEXT № 2
The Four-disk Software Bridge
Considering its sophisticated nature, the four-disk Software Bridge is surprisingly easy to use. Someone familiar with word processing will be able to learn the basics fairly quickly. Some of the more intricate features, such as the Edit Character Filter, might take some getting used to. But with the help of the manual, which is reasonably clear, the average user will be able to master them,
In case you're wondering, the Edit Character Filter permits one to replace a character or string characters in the document that is going through the translation process. I have not yet had to use this particular feature, but I suppose if a certain word processor cannot produce, for example, the British pound sign while another can, it could be useful.
Putting Software Bridge into use is a straightforward matter. In the case of a computer equipped with a hard disk, one simply types in "SB" to call up the main menu. From there one proceeds to the setup menu and designates the word processor from which a file or files are to be translated, manipulating the up and down arrow keys until the desired name, say Word Perfect, is highlighted. The left arrow key activates the selection.
NOTES:
-
intricate (adj.) — сложный.
-
to highlight (v.) — подсвечивать.
Unit 8
I. Read and translate text №1 in written form using a dictionary if necessary.
ТЕХТ № 1
Pitfalls to Avoid in Implementing a LAN
Today many offices are installing local area networks so that PC users can share software, databases, and communications facilities. Usually, the office starts by implementing a PC for word processing or spreadsheet applications. Then, perhaps a year later, a second PC is acquired to store a central database of records. Eventually, other users requiring access to these same records acquire PC's but find they have to duplicate the entire data base on their workstations in order to have access to the data they need. It becomes readily apparent that duplicating the central database becomes unworkable, especially if these data have to be constantly updated. Making sure that all of the databases are up-to-date becomes virtually impossible. Soon the office looks toward implementing a local area network.
With a local area network, all of the PC's in the office can be linked together, making it possible to share a central data base located on the workstation that serves as a central file server. Sharing of software, spreadsheets, and documents on the network is also possible. However, users that have begun to implement such networks have experienced some pitfalls. A number of issues must be addressed by thorough planning to make sure that the network is successful.
A local area network creates a multi-user environment, even though most of the applications on the PC's are written for single-user systems. Each workstation on the network may currently have data base management software that is used to access records and to generate reports from the database- However, just because an application runs on a single workstation on the network doesn't mean that it can run on the entire network and be used by all of its workstations. Network versions of word processing, database, and other application software packages must be purchased for me network.
Another problem can occur when more than one user tries to access and update the same data file on the file server simultaneously. The network operating systems should provide utilities for file and record locking, so that the first user can successfully update a record in the database before the second user is given access to this record. Network operating systems and network data base software must be specifically written for the network.
Network access to databases places increasing demands on the file server, the hard disk system that holds common applications and data bases shared by the users. As a result, one workstation with a hard disk system should be used as a dedicated file server for the network. This means that the file server should not be used as a workstation when the network is running or else severe performance problems can occur.
NOTES:
-
a pitfall (n.) — западня, ловушка
-
Spreadsheet (applications) (n.) — табличные приложения
II. Answer the questions and make up a close oral summary of the text:
-
What can you say about using spreadsheet applications?
-
What are the pitfalls that users implementing such networks have experienced?
-
What problem can occur when more than one user tries to access the same data file on the data server simultaneously?
III. Read and translate text №2 without a dictionary.
TEXT № 2
LAN
The personnel cost for system administration is often overlooked. A system administrator should be responsible for user administration, training, backup and support. Protecting the security of shared databases on the file server is another important responsibility. A secretary can't be expected to handle these responsibilities in her spare time.
A LAN may include workstations, a hard disk system, a tape backup unit, software, and printers. Each of these devices must be compatible with each other. When configuring a LAN planning should be done to determine what applications need to be supported. Do the users want to share a common database, to share software, or to share a printer? Do users want to use the central network system as a gateway to external data bases housed on branch minicomputers or mainframes? Does the system provide control over data security? Can the LAN be interfaced to other departmental LAN's within the organization for file transfer and for electronic mail purposes?
Planning to implement a successful local area network requires an understanding of user requirements, technical knowledge, and personnel administration.
Unit 9
I. Read and translate text №1 in written form using a dictionary if necessary. While translating, pay your attention to: the passive voice and prepositive determinates. Make up a close summary of the text.
ТЕХТ № 1
State of the Art and Trends
In early 1986, frame-buffer designs are characterized by (a) use of video RAM chips, (b) a variety of single-chip display processors available, and (c) integration of the video buffer, video lookup table, and digital-to-analog converter on a single chip. These products are designed for workstations used in office and computer-aided-design applications, which have up to 8 Mbit frame-buffer memories and require only modest update rates. Increasing integration of frame-buffer components onto single chips drives the cost of these displays down.
For frame buffers that require extremely high update rates, special-purpose processors are increasingly used. As image-processing techniques' are increasingly integrated with geometric graphics algorithms, updates are computed by digital signal-processors, either singly, in pipelines, or in arrays. As processing power increases, more update functions become feasible, such as antialiasing, wide lines, and pixel resembling that allows image copying with arbitrary scaling and rotation.
A number of challenges remain for frame-buffer designers. Surprisingly, no one has yet built a very large frame buffer (e.g. 20,000 x 20,000 pixels) that can be used to roam around a large image. Such a display might prove valuable in VLSI design, mapping, image interpretation, and graphic arts applications.
An open problem is how best to implement window-management systems, using a combination of hardware and software. Ideally, each application in a multiprocess computing environment has access to a complete frame buffer or to a simulation of one. The mapping from what the application deems a frame buffer to possibly overlapping windows on one or more display screens is the job of the window-management system. Individual frame buffers combined by the video generator, as in Wilkes et al (1984), can handle only a limited number of windows. One can imagine a memory-mapping scheme that would give the appearance of a separate frame buffer in each application's memory space, but in reality would be mapped to a single frame buffer. Appropriate protection would be required to prevent one application from interfering with another, and some means must be provided to inform each application about the current size of its frame buffer (window), which might change as windows are moved.
NOTES:
-
singly (adv.) — единично, однократно.
-
antialiasing (n.) — сглаживание.
-
to deem (v.) — запрещать, блокировать,
Unit 10
I. Read and translate text №1 in written form using a dictionary if necessary. Mind the grammar.
ТЕХТ № 1
Parallel Programming
Widespread use of distributed-memory multicomputers has been hindered by the difficulty of programming such machines. Users must write message-passing programs that deal with separate address spaces, communication, and synchronization. Parallelizing compilers provide the programmer with a global address space, numerous optimizing program transformations, and data distribution strategies to simplify this task. Unfortunately, all strategic parallelization decisions are currently left to the user. Many programmers instrument (frequently done by manually inserting write statements), compile, and execute their code to evaluate the potential performance gains or losses of their parallel programs. The use of runtime monitors automates instrumentation and runtime collection of performance data. However, runtime monitors still require the user to execute the parallel program, thus taking excessive time to arrive at the performance results.
Other problems, such as perturbation of the program's behavior and generation of vast seas of (mostly useless) data that require a performance expert to interpret, make performance analysis a tedious, error-prone, and time-consuming task. Performance prediction tools can significantly expedite this task by providing fast and accurate information to guide the programmer toward efficient data distribution strategies and/or profitable program transformations that will increase performance.