01-04-2020-Oxford_English_for_Infomation_Technology (1171844), страница 31
Текст из файла (страница 31)
Ada is a structuredlanguage developed and used by the US Department of Defense.Logo Logo is an easy-to-use language that is primarily used to teachchildren how to program.LISP Stands for LISt Processor; LISP is designed to process nonnumeric data - that is, symbols such as characters or words. It isused to develop applications in the field of artificial intelligence.FORTRANStands for FORmula TRANslator; FORTRAN was designed byscientists in 1954 and is oriented toward manipulating formulasfor scientific, mathematical, and engineering problem-solvingapplications.HTML Stands for HyperText Markup Language; HTML is a pagedescription language used to prepare a text for display in abrowser program.Peri Its name comes from Practical Report and Extraction Language.It first appeared in 1987 as a Unix-based tool for producingreports but is now widely used for creating interactive webpages.Prolog Stands for PROgramming LOGic; Prolog is used to developapplications in the field of artificial intelligence.
It is a populartool for natural-language programming.PAIRWORK Student AUNIT 221891 Systems AnalystStudies methods of working within an organisation to decide how taskscan be done efficiently by computers. Makes a detailed analysis of theemployer's requirements and work patterns to prepare a report ondifferent options for using information technology. This may involveconsideration of hardware as well as software. Either uses standardcomputer packages or writes a specification for programmers to adaptexisting software or to prepare new software. May oversee theimplementation and testing of a system and acts as a link between theuser and the programmer.2 Software Engineer/DesignerProduces the programs which control the internal operations ofcomputers. Converts the system analyst's specification to a logical seriesof steps.
Translates these into the appropriate computer language. Oftencompiles programs from libraries or sub-programs, combining these tomake up a complete systems program. Designs, tests and improvesprograms for computer-aided design and manufacture, businessapplications, computer networks and games.3 Computer Services Engineering TechnicianCan be responsible for installation, maintenance or repair of computersand associated equipment. Installs hardware, ranging from personalcomputers to mainframe machines, and tests by running special software.Some technicians carry out routine servicing of large mainframe systems,aiming to avoid breakdowns. Others are called in to identify and repairfaults as quickly as possible usually by replacing faulty parts.
Work canalso involve upgrading machines usually on customers' premises.4 Network Support Person or Computer Engineer:Network SupportMaintains the link between PCs and workstations connected in anetwork. Use telecommunications, software and electronic skills andknowledge of the networking software to locate and correct faults. Thismay involve work with the controlling software, on the wiring, printedcircuit boards, software or microchips on a file server, or on cableseither within or outside the building.Pairwork: Student BUNIT 2• Portable• Mobile Pentium III Processor850MHz• 100 MHz system bus• 20GB EIDE Hard Disk• 128MB SDRAM• Modular 16/40X DVD Driveand 3.5" Floppy Drive• High Performance 256-bit32MB Graphics• 15" SXGA (1400 x 1050) HighResolution TFT Display• Microsoft Windows 2000Portland, OR1 In Chicago, a VISA card is usedto pay for a $ 1,295 computer.The California computer findsthat the card was issued by aPortland bank and checksthat bank's computer systemto see if the transactionrequest should be approvedor denied.Options• Upgrade to 256MB RAM• 56Kbps PCMCIA Modem• 3 Year International Nextbusiness-day on-site service• Spare lithium ion battery• 10/100 Ethernet PortReplicator2 The transaction datatravel by satellite orground to a processingcenter in New Jersey.Total transaction timeis about 15 secondsFig 4 Visa cardsBecause the transaction tops $50, itis routed to a computer in Atlantafor closer scrutiny.The computer inAtlanta sends the transaction toCalifornia for processing.UNIT6PC-DOS An operating system similar to MS-DOS thathas been widely used on IBM microcomputers.Unix An operating system used on all sizes ofcomputers, but mostly large ones; available in manyversions, such as Linux, HP-UX, Xenix, Venix, Ultrix,A/UX, AIX, Solaris, and PowerOpen.VAX/VMS An operating system used by DEC VAXminicomputers.Windows 3.x* Refers to the Windows 3.0 andWindows 3.1 operating environments, and to variantssuch as Windows for Workgroups 3.11; each of these isa graphically-oriented shell program for Microsoft'sMS-DOS operating system.Windows 9X The operating system that replaced MSDOS and Windows 3.1, combining the functionality ofboth programs and much more into a single package;two versions were produced, Windows 95 andWindows 98, although various editions were madeavailable.Windows 2000 An operating system targetedprimarily to corporate client-server applications;available in both a desktop version and a version fornetwork administration.*Not a full operating systemUNIT 8r e v i e w sSim City 3000: World editionPCMaxis/Electronic ArtsThe basic game is the same asit was when it first appearedon the Commodore 64: zoneland, build roads, set taxes andlet simulated citizens build thecity of your dreams ornightmares.
A huge amount ofdetail has been added sincethen, and the World editionintegrates hundreds of newbuildings, a building editor, aterrain editor, and a scenarioeditor.You no longer have to buildAmerican cities, and you canUNIT9quickly flip them into aEuropean (German) or Asian(Korean/Japanese) style. Youcan add landmarks such as theBrandenburg Gate and theEiffel Tower.If you gave up on SC2000,this will restore your faith; andif you haven't played Sim Citybefore, this is a good place tostart.Jack SchofieldThe amount of detail in the3D buildings, cars andpedestrians is stunning.
A newwebsite is introduced also(www.simcity.com). There youcan download even morebuildings and swap files,buildings, city photos andscenarios with fellow fans.Explain to your partner with the help of these notes what MPEGVideo is and how it operates.MPEG = method of compressing/decompressing videosignals to reduce size by up to 95%video sequences stored in series or framesintraframe (l-frame) every 1/3rd second has most importantpicture informationbetween l-frames are predicted frames (P-frames) andbidirectional frames (B-frames)P- and B-frames store changes onlyP- and B-frames preserve video quality between l-framesHuman eye can't detect information discarded192PAIRWORK Student BU N I T 11Synchronous transmission sends data in blocks ofcharacters. Start and stop bit patterns, called synchbytes, are transmitted at the beginning and end of theblocks.
These start and end bit patterns synchroniseinternal clocks in the sending and receiving devices sothat they are in time with each other. Error check bytesare included immediately after each block of charactersto ensure that the whole sequence of characters hasbeen correctly transmitted.This method is rarely used with microcomputersbecause it is more complicated and expensive thanasynchronous transmission. It also requires carefultiming between sending and receiving equipment.
It isappropriate for computer systems that need totransmit great quantities of data quickly.UNIT 14Order form (order.htm) page wherevisitors can order on-lineProduct overview (product.htm)Some general information'Paula's Plants':Website overviewUNIT 15Fig 1b Site diagramProblemsYou would like to cheer up a friend.You're going to rent a car in the USA and travel from Miami toNew Orleans. You would like to plan a route.You're going walking in the mountains this weekend. You wouldlike to know what the chances are of rain.You want to forward a video email attachment you've received toa friend and it won't go.Travel ResearchNeon CityExercise informationWhether you're looking for thebest airline and hotel fares orresearching the best traveldestinations, the Web can help.Several websites also offer tipsfor travelling by aeroplane orwith small children.
Some allowyou to book train tickets.If you have a webpage that'slooking a little dull, you mightwant to add some neon signs,words or tubes. Neon Cityproduces a variety of cool neonclipart that you are free to useon your personal webpage solong as you link to the page yougot the design from.If your current exerciseprogram doesn't seem to beworking, consult the Web.While Web surfing doesn'tqualify as exercise, you can usethe Web to find information onan exercise program you'llenjoy. Some websites also helpto track your progress.www.neoncity.co.ukwww.fitnesslink.comwww.runnersworld.comwww.expedia.comwww.concierge.comwww.thetrainline.co.ukPAIRWORK Student BUNIT 16193Communication SystemsText and Graphics onlyMultimediaSynchronousAsynchronousfaxSynchronousNetphonesWebpagesnewsgroupFig 2b World of connectivityProblem BUNIT 17The monitor display screen is flickering.SYSTEMMake and modelCompaq, CV602Service Number8JD3ProcessorPentium IIIMemory128MBO.S.Windows 2000ConfigurationWindows 2000networkINSTRUCTIONSRESULTChange the monitor refresh rate setting by:• Right clicking with the mouse on the desktop• Selecting 'Properties-Settings'• Clicking on the Advanced button• Choosing the 'Monitor' tab.• Making sure that the 'Hide modes that this monitor cannot display'checkbox is ticked.• Selecting a higher refresh rate (i.e.
75Hz or more).• Rebooting the computer.• Checking that the monitor is functioning properly.Monitor nolonger flickering.UNIT 18Stealing by stealthAnti-virus detectionprogram doesn't detect theTrojan, allowing it throughthe firewall.How a Trojan may have penetratedMicrosoft's defencesANTIVIRUSHacker writes script and hidesscript in other code e.g.
imagefile, game or utility andattaches hidden script (Trojan)to email. Sends email tosomeone at Microsoft.Script uses a Microsoftemail program to sendnames and passwordsto hacker.Fig 3 Stealing by stealthNames and passwords areused by hacker to cruiseMicrosoft network forsource code software.Virus programrecordsnames andpasswords.PROGRAMMicrosoft employee opensattachment, therebyactivating the Trojan code.194PAIRWORK Student BUNIT 19A differential backup doesn't set the archive bit to the offposition after backing up the file. In a full backup inWindows, the operating system automatically sets thearchive bit to 0 (off).