0% found this document useful (0 votes)
2 views

Zaban Computer

The document discusses the structure and content of a book designed for computer engineering students, focusing on reading comprehension, grammar, and vocabulary relevant to technical fields. It emphasizes the importance of understanding specialized terminology and improving reading skills through innovative materials and exercises. Additionally, it outlines the fundamental concepts of computers, including input, processing, and output, while highlighting their capabilities and limitations.

Uploaded by

shadi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Zaban Computer

The document discusses the structure and content of a book designed for computer engineering students, focusing on reading comprehension, grammar, and vocabulary relevant to technical fields. It emphasizes the importance of understanding specialized terminology and improving reading skills through innovative materials and exercises. Additionally, it outlines the fundamental concepts of computers, including input, processing, and output, while highlighting their capabilities and limitations.

Uploaded by

shadi
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 261

able of Contents

1- -------- -- --- I
2- [' -------------------------.]
3- -----------------------27
4-
5-
6-
7-
8-
----------
------------
9- l at
aaa

0 -----
1
2 ['[[MN -----------------------------------I 01
3 ;{ m _, -

4 ED PROGRAMMING ------------------------------Ill
5 1ING CERTIFIED -----------------------------------------------12l
6 -------------------- --- -- --- ------- ------ ----------------- I 31
D -------------------------- --- 14
D _[
r }'

I
used b omputer engineering and relat
have successfully finished general
mndertake us this book consists of I
f uni' ifferent teachers and
it consist
a reading part, grammar part and vocabulary part. The greater emp'
reading. Grammar is th r, :
Therefore, an at rovi
recognize specialized lexical items common to the science and technical fields:
ill meet the present needs of our students who seek to acquire a comprehension
rather than mere reading st1nu.

bject matters dealing not onl ith


mputer.
Grammatical points are also introduced following t
nts read a few pages to obtain in formation on some grammatical ints.
They are indirectly improving their reading abilities.
ises and activity in this book enjoy a special variety. The
In d
d to check the student's comprehension of the material
latter is to help students improve their reading con.3rehension skills.
The materials are designed and presented in an innovative way. That is, while
the students are occupied with obtaining information from the passages, thev are

indirectly involved in the reading comprehension activity whichis the main purpose
the book.
vocabulary, thi
with rm whic to a particular field, but ar
mu led in ll types of materials.
ided for m the new words, but for
ur own ne t nings to English
dictionary.
The presentation of vocabulary items is also difficult from that of traditional
ks. New words are introduced in such away that the students can learn th
and functions of the same word.
however we have tried our best to give easy-to-understand

are also expected to go through all your assignments before attending


:lasses. These exercises will be done in the classroom later and you get a cherr·· •
ully understand your problem better.
t the end, we would like to than ur colleagues and friends who heipea u>

lot to collect thi ial thanks to Dr. KarimZa •


faculty member o1 v a third editor, and Mr.
hammad Ghasem Yousefkhani for his helpful advice.

wWw.ProzheDownload.Com
r magnetize tiny metal cores. The switches, like the
capable of being in one of two possible states, that is, on or off; magnetized
demagnetized. The machine is capable of string and manipulating num

·hine do what we want by inputtin witch nd


turn others off, or that magnetize or do not
mputers is the processing information. For thi
defined as devices which inforr •
rm lled dat
mathematical and/or logical operations on the information and then suppl
perations. The program, or part of it, which tells the
do and the data, which provide the information needed
kept inside the computer in a place called memory.
mputers are thought to h
whether larg abilities. Fir
uch a
ubtraction, division, multiplication and exponentiation.
computers have a means of communicating with the user.
uldn't feed information in and get results back, these machines wouldn'
2

ertain computers (commonly minicomputers and


ontrol directly things such as robots, aircraft
navigation systems, medical instruments and etc.
Some of the most common methods of inputting information are to use
punched cards, magnetic tape, disks and terminals. The computer's input
device (which might be a card reader, a tape drive or disk drive, dependiny
on the medium used in inputting information) reads the information into the
computer.
or outputting information, two common d used are a printer
ints the T display screen which
. ult

wIn tween two


world? Unfortu eIy:
one number l

computer can solve a series of problems and make hundreds, even


thousands, of logical decisions without becoming tired
. lution to a problem in a fraction of the time it takes a human being t
do the job. A computer can replace people in dull, routine tasks, but it has n
riginality; it works according to the instructions given to it and cannot
alue judgments. There are times when a computer seems
a mechanical 'brain', but its achievements are limited by the
uter cannot do anything unless a n tell
nd gives it the appropriate information; but becau
e at the speed of light, a computer can carry out vast numbers
of arithmetic-logical operations almost instantaneously. A person can dc

a t
mpu in many cases tha ad
long before the job was finished.
ere ■

1. Understanding the passage


ide whether the following statements are True or False (T/F) by referring
in formation in the text. Then make the necessary changes so that the
alse statements become true.
1. r handl da if it hasn't r d

2. All compu accept and pr


and charac

4. Not all computers can perform arithmetic operations, make decision


and communicate in some way with the user.
5. Computers can still be useful machines even if they can't communicate

6. There are many different devices used for feeding mntormat1on mnto a

mputer.
7. Ther
- arc·ptung mntormatron.
8. Computers can make any type of decision they are asked to.
9. Computers can work without having t there is a
reakdown.

rd
and find synonyms (i.e. words with a similar meaning)
ds:
1. complex (i.e. is intricat
2. fundamental
3.a way
4. uninterested
. accomplishments
·k to the t nd find antonyms (i.e. words
ing words.

.
. reye
9. unusual

ructure I
· Contextual referenc
Transitional markers are words used to link ideas together so that the text i

moother to read. When pronouns such as it, they


who, whose, that, such, one and demonstrati

ned earlier in the sentence or paragraph. Their fun


4. Thu
her word
nd the last.

mple paragraph
computer(I) like any other machine, is used because, it(l) does certain
jobs better and more efficiently than humans. It(1) can r mor
information(2) and process it(2) faster than any human. The
r even months of pencil-and-paper

their(3)
many reasons they(3) are used so much in business
5

ere ■

Using the sample paragraph as a model, draw a rectangle around the word/
und the word/words that the circled words refer to.
Then join the O and the El with arrows:
omputers are electronic machin hat process information. They ar
pable of communicatin of doing di
arithmetic operations and of making three kinds of decisions. However, they
thinking. They accept data and instructions as input and
after processing it, they output the results.

.aercise 2
w look back at th I d find out wha,
es words in bold typ

I. that operate switches


hich accept information

4. which tells the computer


hich prints the new information
• which shows the results
7.which
. It can find the solution
• it has no originality
10. tells it what to d


B. ompar1son
1. Formation
ways of showing that similarities or difference>
r amongst things. The regular comparative and
words, whether these are adjectives or adverbs is formed a
new
ldes'
big bigges

dverb
later

placing the words more and most in front of words with three or more
yllables:

diectives n
beautiful

dverbs
carefull m :are fully

3 · may be lil in that they will add


ding -er and -est if they end in - -ly, -ow, -le and -er. Most of
the remaining words take more and most in front of them:

happiest
funnier funniest
earlier
friendlv friendlier friendli

-0
7

-syllable adverbs ending in -ly take more or most exampl


quickl
slowly
badly

more careful

more boring
two-syllable
more awfu] most awful
word.
most comple

commonest
ommon

handsomest
handsome
more handsom

politer
more poli most poli

qureter quietest
qui
more qurel most qui

5. Ther Th
and di
comparisons are as follows:
further/farther furthest/farthe
better
mo

2a
much mor mos1
well es

There are many reasons for using comparisons in discourse, they may
used to show: a. equivalence; b. non-equivalence; c. one item compared with
others; and d. parallel increase.

The following w

are similar each


as mar » 4O qual t either
as much as is like all
the same a imilar/l both
similar to qually alike
the sam ompare to/with

1. Third-ge d
9

2. Microcomputers are as efficient as minicomputers.


3. The term processor is central processing unit.
4. The digital computer

ntinuously work 1on.


. microcomputer can sometimes cost a minicomputer.
7. minicomputers and microcomputers can have a memory 2K

d mputer can be a large cash r


9. the same basic characteristics.
computer problem can equal months of

nd/or construct used t

(i.e. not the same).


not as ... a unequal (
word + er than not as many ... a unlik
more than neither ... nor ... as not the same as
wer than not as much ... a not all
less ... than

l. Learning a computer language is difficult as it seems.


2. A mainframe is and expensive a microcomP
or $10,000, you could have a very good micr
4. Ten " computers in use than today.

min 7 flexible.
7. An analog computer is a digital computer.
businesses have computerized their accounting departments.

The followmn r constructions are used to sh ne item


mpared with others (i.e. the superlative).
+

I In, in the world


today.
2. Digital computer programming is one used in data

The following words and/or constructions are used to show parall


i.e. two comparatives).

+ le

xample
I. the computer, the operations it can do.
2. the problem, it is to the compu
"grammer.
This part contain
tudy vocabulary efficiently, you must have a study plan and follow i
arefully.
In these flash-cards, direct under the word, you
the same word. These words have the same general meaning; they r,
ifferent parts of speech of the word. For each of the forms, the part o,

amples of using the keywords


nd other parts.
nd English.

adj. an action or decision made with little though


order or r
syn. haphazard
thing seemed arbitrary.
The teacher arbitrarily decided to give the class a

adj. very
·v. astound syn. astonishing

The scientists made an astounding discovery.


T

adj. very intelligent,


yn.
time it took th hers 1
a

In131-

Th ly h determined tl uld be no chance to finish on


time.
v. to make a requ
,,
n. petition yn. appe
anada petitioned the United Nations to consider its ca:
The student's petition was denied.

relinquish v.to give up control


n. relinquishment syn.
The troubled executive relinquished his control o

The relinquishment of his claim to the building will allow the building to b
ld.

resilient adj. strong enough rom difficulty or di


n. resilience
n feel better.
The doctor was surprised by his patient's resilie

tempt v. to make it attractive to do something wrong


adj. tempting yn. entice
n. temptation
The id tempted him to in
are more tempting when one is on a die

to a point at which no progress can b


adj. baffling made
n. bafflement syn. pu:
of many harmful diseases have baffled doc venturi
That was a baffling question.

wWw.ProzheDownload.Com
are machines designed peciall
p1
manipulating the information that has been given to the computer, in such

alled process mputers are made up of milli


nab le ring data or moving them, at enormou

,ll computers have several characteristics in common, regardless


make or design. Information, in the form of instructions and data, is given
the machine, after which the machine acts on it and a result is then returned.
The information to the machine is the input; the internal manipulative
operations, the processing; and the result, the output. These three basic
concepts of input, processing and output occur in almost every aspe
human life whether at work or at play. For example, in clothing
manufacturing, the input i of cut cloth; the processing is th

ewing together of these pi the finished garment

> OUTPUT
14

figure in the previous page show hematically the fundamental


hardware components in a comp -- 1s called

and other data manipulations are performed and the high-speed internal
memory in which data and calculations are stored during actual e»

ttached to the CPU are the various peripheral de


keyboards and mi
rrogram ds of tim

tapes or magnetic disks.


omputers have often been thought large adding
machines, but this is a very narr f

can mbined in an
quences. Therefore, a computer has no known limit on
the kinds of things it can do; its versatility is limited only by the imagination
f those using it.
In the lat and early 1960
kind in use today were being developed, they were very expensive to own
nd run. Moreover, their size and reliability were such that a large number of
onnel were needed to keep the equipment operating. This has all
changed now that computing power has become portable, more compact and
cheaper.

the way in which many kinds of work are performed. Comput an remov
many of the routine and boring tasks from our lives, the 1g us with
time f ithout saying that
computers ha hole nev
their development.
are True or Fals

l. All information to be processed must be prepared in such a way that th


mputer will understand it.
f the computer, data can

hem and
4. The basic concepts of data processing are restricted to compu
5. The processor is the central component of a computer system.
6. All other devices used in a compu Po.
ring information.
' ., much icted in what they can do.
9. Computers today cost le are smaller and need fewer p perat-
hem than in the pas
10. Computers haven't changed our working conditions very much.

ind out what the words in typeface refer o.

rmed dat
. or moving
3. the machine acts on it
4. th
5. it is not a single-purpose machin
ot things can do
using
to own
er, their size and reliability

10. did not exist

efer back to the text and find synonyms for the following words.

Now refer back to the text and find antonyms for the following words.
6.

10.

Suffixes
When you are reading, you will com is often
to guess the meanings of th ords if you understand the wa
words in English are generall

+ +

An English word can be divided into three parts: a prefix


suffix. means 'before'; a therefore, is what comes before th
17

-er (m
th prefixes and suffixes z
Prefixes usually change the
changes a word
being magnetized'. on the other hand, change the word from one
speech to another. ample, -ly added to the adjective quick giv
rb quickly. L n nsider som mnd their usual
anmngs.

IRB'
. -able
-ance -1ze -ly
-ence -ate -ibl
-or -ify -I
-CT -en -1c
-ist -ify -ical
-nee -ish
-l

rcI
.
following tables and try to find additional examples. Use your
dictionary if n

wWw.ProzheDownload.Com
-ence quality of independence
r, -or a person who

action measurement
quality

-ism magnetism
-dom domain/condition freedom
condition/state
friendship

implify
harden, widen, lengthen

lectronically, logi
in the manner of
omparably, helpfully
19

ha
ic, automatic, electrical
f being
like, full of

like
having
quality of
to make or do programming, coding

mead the following sentences and underline all the Then try to find
out what part peech th

proce
'RT terminal
becau-
not have a Fortra mpiler.

n 1ntr1

ha or tiny metal cores.


5. In de
a screen that shows an up-to-date summary of the computer jobs as

6. The introduction of terminals and screens has partly replaced the use o'

punched cards.
7. Binary arithmetic is based on two digits: 0 and 1.
. Multiplexing is when many electrical signals are combined and carried on

prepared
10. The computed results were printed in

o First choose the appropriate form of the words to


. .
complete the sentences. Then check the difference: meaning mn
your dictionary.

1.
a. A computer can perform mathematical................ very quickly.
b. One of the first persons to note that the computer is malfunctioning is
the computer .
. The job of a computer o
a computer installation.
d. The new machines in th r installation ar

a. computer i:
information.
still waiting for their into the compu

. It is to work without a template if the flowcharts are not


kept on file.
3.
a. may take a lot of time ·...................to a compl
. .
mn programming.
b. A computer can ................. a problem faster than any human being.
c. A computer has often been referred to as a problem ...................
4. remark, remarkable remarkably, remarked
a. Today's computers are ................ faster than their predecessors.
b. Systems analysts will often make ................... about existing
to help make th

».
ith the u

working in computer installations aren't very •..•.•..•...•.•


because they are shy.

a. do many kinds of quickly and


accuratel
b. . . . .. . . . . .. . . . . . . a branch making...............
·vithout the use of a .....................machine.
puter can numbers much faster than a manual .
d. Some problems aren't................. without logarithm tables.

7. mechani

a. Today's computers are less ..................


b. The.....................devices in a computer
than
.The ............ of the brain is very complicated hut unlike a computer it

1sn •
a. Because it is expensive to set up a computer department it is ............
to budget well for the basic ................... of the installations.
b. A good programmer isn't............. going to be a good systems analyst.
tudents' lack of understanding
mav .................. the instructor to restructure the course.

a. The length of time a programmer takes to make a program will


·................ on the complexity of the problem and his abilil

b. On

it's probably the most machine in the world


today.

a.Computer.....................is a fast growing discipline.


b. Th . improvements of computers are reducing man

a. A computer is limited in its ability by the .................. of man.


b. Some people are good at inventing storie
. It is practically impossible to........................ the speed hich a
puter calculates numbers.

be' d
ar1

b...................and subtr
ystem there is often no charge for the
programs.

a. There can be many involved in setting up a computer

. Iti ometimes a very p

ry .
big mn n owcharting
h, ' tor a

e written in Cobol or Fortran.


many .....................computer manufacturers today and a
able to .................. between the advantages and
disadvantag
e. The opinions of programmers as to the best way of solving a problem
ften ................ greatly.

a. Computers are................... machines.


. If you don't know the meaning of a computer term, you cannot
always.................an all-purpose dictionary for the answer.
omputers can do mathematical operations quickly and.............

entries fo flash-cards. rder


,a, vocabulary efficiently, you must have a study plan and follow i

fully.
l
word. a

lso you can observe two examples of using the keywords


and other parts.
keyword is then, defined in clear, to understand English.

adj. attractive or in
yn. alluring
n. appeal
Working abroad is appealing to many peopl
Through his speeches, the candidate appealed to the voters.

adj. acclaimed, well-known and popular


syn. renowned

The celebrated pianist will gi


an Francisco is celebrated for its multicultural makeup.

ing at the
n. contemporary ame tume a
yn. current

Contemporary architecture ma
rvantes was a contemporary of Shake

adj. weak in health or in bod


frailty syn. fragil
The frail wings of the newborn bird could not lift it off th
One of the frailties of human beings is laziness.
change or make different
n. alteration yn. modif

adv. Alterably
Will the storm alter its course and miss the coas.
loria hasn't made any alterations to her plans.

. -

hink about or prepare for something ahead of


adj. anticipatory
adj. anticipated yn. predi

.mes.
They planned their vacation with anticipation.

n. conformity
n. conformi
he rul
he has been a conformist.
adj. of great importance; full of life
n. vitali yn. indispensable
ital to the success of the program.
vitality was easily observable.
In order to use computers effectively to solve problems in our environmen
em' implies a good mixture of
tegrated parts together to form a useful whole. Computer systems may b
discussed in two pa
The first part the physical
v and recognized as 'computers'. Th
oftware - hat control and coordinate th
mputer hardware and that direct the pr

> OUTPUT

figure above shows diagrammatically the basic components of


computer hardware joined together in a computer system. The centerpiece i

called either the computer, the processor, or usually the Central Processing
11 I"\ •J"'ir,.~ . ~.,. _..............
-----.---.i....A. 1•A•1, .. " .. ,,..
_..,..i;1 ... ".. ha.: .-"'Ill .,... ,-; · .. i

' 'a manipulations are performed and to th


internal memory in which data and instructions are stored during th
execution of programs. The
anou ondary memory de and so on, are at

omputer software can be divided into two very broad categories -


ystems software and applications software. The former is often simply
referred to as 'systems". These, when brought into internal memory, direc
+a s . The latter may be pr
hardware by a system supplier as part of a uter product designed to
nswer a specific need in certain mplete hardwar
produc ms.
r failure of any computer depends on the skill with which
nents are selected and blended. A poorl
chosen system can be a monstrosity incapable of performing the for which it
was originally acquired.

1. he passage
Indicate the following idea • stated or not stated (
te
I. A system implies a good mixture of parts working together.
2. Input and output d

processor.
4. The 'Computer' is the hardware.
5. Software is the programs on cards
6. The processor is usually referred
7. The word 'computer' means th
uall ., programs.
hardware/software produ alled turnl m3.
2. Contextual referenc
· k back at the text and find out what th
I. Computer systems may be discussed in two parts
that are thought
• that control
In

• in which

7. The
8. Th ...,

9. The latter may be provided along with


I0. for which it was originally acquired

3. Understanding word
ext and find synonyms for the following words.
1. developed
2, infers

3. joined
4. chosen
w refer back to the text and find antonyms for the following words.
• segregated

7. narrow
8. well

4. Word for
irst choose the appropriate form of the words to compl
Then check the differences of meaning in your dictionary.
mputer manufacturers have............... both input and outpu
into one terminal.
svstem depends on the................all i
parts to form a useful whole
'................ input and output devices into one p ral has reduced
he area needed for a computer installation.

of information
between the arithmetic unit and the memory.
·................ the many activities in a computer department is the job
he department head.
to help him and
s help him with the of

a. Very often manufactur


internal workings of a computer.
•••••••••••• s a drawing that shows how I

rather than what it actually looks like.


A few ideas have been ...........·.... fo:

a. Th rds 'arithm etic-I

b. There is often an............... of ideas among computer


here is a big difference between an input and an output. These can
not bv., ... ,. ., ...... -~. ,.......
a. It is often difficult for computer science students to ................their
time up proportionally between studying and programming.
······...........bv three.
l •••••••••••••• of labor within a mpany.

Prefixe.
have already seen how suffix
prefixes, their usual meanings and how the change the
meanings of English words.

--o
ORDER mon
m1- inter- pre- bi-
un- . .
non- mun1- super hex-
. . 'ore-
In-
o- trans- t-

dis- multi-
re- extra-
mid-

I
Study th ables and try to find additional examples. Use your dictionary if
P

not good enough incomplete


not connected wit' illegal, irregular, irrelevan

non-impact
opp mislead, mislay
act1on
ainst
ial
reduce
too little underestimate

do again

•.
half, onductor
equ1- qual idistan
.
mputer

m1

megabyt
of location

rmmary, prim1u
a--- ostdated
retro-

mi- hal emicircle


mono- ne

two binary
triangle
quad- our quadruple
enta- fiv
h
ceptefli-
oct- eight al
ten

multi- many multiprogramming, multiplexer

pro-
automati
coordinat
neoclassical
pan- all
F

ill in the blanks with the correct prefix from the following list. Use the
glossary at the end of the book to help you.

multi- deci- sub- inter-


mt- mono- mega- auto
mini- de- inter- prim-

1 by ne million bytes.
2. hen many electrical signals are combined and
:arried on only one optical link.
3. Blocks are separated from each other by marks called..........block gaps.
4. The number in evervdav life is the ............mal
10.
5.

pictorial graphics.
7. The complete de: ription of the logical structure of data is called th
d parts, the ...........

• The small f
magnetized or .........magnetized.
I0. The introduction of chips or ..........conductor memories made it
the computer.

"r each prefixes in structure 3 find out at least 4 words with it in th


dictionary.
This part contains entries for some keywords like flash-cards. In order to
vocabulary efficiently, you must have a study plan and follow it

fully.
In these flash-cards, direct under the word, you will find other forms of

and other parts.

"
n. enthusiastic approval, applau
adj. acclaimed
n. a
rn has won acclaim abroad.
d authors often win Pulitzer P'

dj. displeasing, objectionable, or bad


n. unfavorable

ather conditions made it difficult to play tl

n. autonomy
.·lexico became an autonomous state in 1817.
with the government, all busin
disruptive adj. causing con
·. disrupt syn. disturbing
n. disruption
requent questions during lectures can be disruptive.
The storm caused a disruption in bus service.

haphazardly adv. having no order


adj. haphazard yn. arbitrarily, carel
n. haphazardn.
It was obvious that the house was built haphazardly.
assignment in a haphazard way.

advent g or arrival c

With the advent of computers, many tasks have been made easier.
The newspapers announced the advent of the concert season.

agile adj. able to move in a quick and easy wa


n. agility n. nimbl
n. agilene
- very agile animals.
he moved agilely across the stage.

albeit

His trip was successful


Albeit difficult at times, speaking another language is rewardin

wWw.ProzheDownload.Com
U

The ability of tiny computing devices to control complex operations ha


ansformed the way many tasks are performed, ranging from
research to producing consumer products. Tiny 'computers on a chip' are
used in medical equipment, home appliances, orkers us
handheld computing devices to collect data " o genera
rms, to control inventory and to serve as desktop organizers.
nly is computing equipment getting smaller, it is getting more
mputers are part of many machines and d
required continual human supervision and control. Today, computers in

urit

energy in phones provide features such as call


rwarding, ll monitoring and call answering.
smart machines are designed to take over some of the basic
usly performer doing, they make life a little
nd a little more pl

licenses, bank balances and so on. Smart phones, cars and appliances with
built in computers can be programmed to better meet individual needs.
art house has a built-in monitoring system that can turn lights on
and ren and close windows, operate the o
With small computing devices available for ..... smart tasks
like cooking dinner, programminr ·ontrolling the flow o
n mn an organ1z are able to spend more time doing
what they often do omputers can help people work
m
lultimedia systems are known for their educational and entertainment
value, which we call 'edutainment'. Multimedia combines text wi
animation and graphics, which greatly enhances the in

lik
ledical diagnosi pert systems, for
pinpoint a patient's illn suggest further t
drugs.
are that might otherwise be
incompatibl
are proliferating in man
nd communicate with others, personal computers are becoming
interpersonal PCs. They have the potential to significantly improve the way
ach other. Many people today telecommute - that is, use their
computers to stay in touch with the office while they are working at home.
With the proper tools, hospital staff can get a diagnosis from a medical
xpert hundreds or thousands of miles away. Similarly, the disabled can
mmunicate more effectively with others using comp
learning and videoconferencing are concepts made possible
with
remo
Internet, all of whom can send messag
information superhighway is designed to significantly expand this interacti
0 RLD... 39

connectivity that people all

Pe
connectivity are effectively integrated in a socially responsible way. People -
mputer users and computer professionals - are the ones who will decide
which hardware, software and networks endure and how great an impac
they will have on our lives. Ultimately people power must be exercised t

ensure that computers are used not onl but in a sociall


way.

1. True or
that require d mputers.
b. Computers are sometimes used to monitor systems tha
needed human super
rking is a way of allowing otherwise inc

hare
d. The u ple from being creati
not ha much influence over the way that
omputun

2. Find the an uestions in the text.


1. on a chip .
2. ed in the text?
the benefits of using computers with the following items?
a. ystem
b.
·. Phone
4. What smart devices are mentioned in the text?
5. What are smart cards used for',
6. What are the advantages of multimedia?
7. What can medical

computing are made available to people in


using electroni ms or boardrooms?
10. What aspects of computing can

, Edutainment

• Information superhighwa
B
a

1. pe:rt
..
mputers to stay in touch with th whil

11 m designed to provid
rces for people all over the world
I with a combination of educational and
entertainment
A combination of text with sound, video, animation and graphics

pa for some keywords like flash-cards. In order t


tudy vocabular u must have a study plan and follow i
full ,.,
In these flash-cards, direct under the word, you of
ame word. These words have the same general meaning; th
the different parts of speech he word. For each of the forms, the part ot

ib ot using the keyword


and

bear ndu
adv. bearably yn. yield
adj. bearabl
his orcl ny tine harv
a

Althougl r1 have been bearable for most

loc v. to prevent movement


n. blockage syn. obstruct
adj. blocked
The government blocked the sale of the airline.
The streets were flooded due to a blockage in the pipes.

blur . to make something difficult to


adj. blurre yn. cloud
adj. blurry
n. blur
The rain blurred everyone's view of the valley.
The whole accident is just a blur in my mind.

brilliant llige
n. brilliance syn. radiant
brilliant thinker.
he brilliantly produced +
.
. o mncrea mn a p
n. enhancemen uty
yn. n
n should enhance your chances of being admitted to college.
The computer enhanced our productivity.

e v. to interest greatl
adj. intriguing syn. fascinate

e was intrigued by the acclaim that he re


The intriguing question baffled historians.

v. to thro

In order to grow, crabs must shed their shells.


The experiments shed no new information on th

dj. to be the onl


.
n. uniqueness syn. rar
was presented with a unique opportunity to attend the conference.
tyle of writing is uniquely his own.
ata mining is simply filtering through large amounts of raw data for useful
information that gives businesses a competitive edg
made up of meaningful patterns and trends that are already in the data but
were previously un
most popular tool used when mini ).
I technologies try to work the way the human brain works, b
intelligent guesses, learning by example and using deductive reasoning.
popular AI methods used in data mining include
networks, clustering and decision tr
2ural networks look at the r ot using data, which are based onth
f data. As a resul
ontinually anal it t
compares these factors repeatedly until it finds ing. Thes
wn as rules. The software then loo> other patterns based
on th r sends out an alarm when a trigger value is hit.
lustering divides data into groups based on similar features or limited
data ranges. Clusters are used when data is not labeled in a way that is

o find
instances of fraud wouldn't have its record r not
udulent. But after analyzing patterns within clusters, the mining
4

can start to figure out the rules that point to which claims are likely e

and then
analyze the subsets to divide them into further subsets and so on (for a fs

more levels). The final subsets are then small enough that the mining process
patterns and relationships within the data.
nce the data to be mined is identified, it should be

the data should b


fields. Mining tools can work with all t
within r
-
of data storage, from large data
warehouses to smaller desktop datab fiat files. Data warehouses and

as refining parameters, using other data analy


rapping the data if it's unusable. If no further work is required, th
report proceeds to the decision makers for appropriate action.
data mining is being used for many purpo
nal ring patterns in
pulling stories about competitors from newswires, resolving bottlenecks in
production processes and analyzing sequences in the human genetic makeup.
There really is no limit to the type of business or area of study where data
mining can be beneficial.

True
a. Data mining is a process of analyzing known patterns in data.
rtificial intelligence is commonly used in data mining.
c. In data mining, und while analyzing data are used for
further analyzing the d
d. Data mining is used alse insuranc
ata mining is only useful

'hat tool is often used in data mining?


hat AI method is used for the following p CCSSecs'?

parate data into subsets and " the sub


them into further subsets for a number
b. Continually analyze and compare data until patterns emerge.
c. Divide data into groups based on similar features or limited dat

3. What term is used for the patterns found by neural net


4. When are clusters used in data mining?
5. What types of data storage can be used in data mining':
6. What can an anal o improve the data mining results'.
in which data mining is currently used.

ta mining
b. AI
d de
d. Data warehou:

1. method iving large amounts of data to make it easy

..
11.

iv. A computing tool that tries to operate in a way similar to the human
·amn
arge amounts of data stored in data ..............are often used for data
.......... The data is first........... to remo
The ............ is then analyzed usin
report is then analyzed by an............. who decides if the ............ need t
e refined, other data tools need to be used, or if the results need
, be discarded because they are .............. The analyst pa final
results to the ............... makers who decide on the .

.
This pa me keywords like flash-cards. In order to stud
vocabulary efficiently, you must have a study plan and follow it carefully.
flash-cards, direct under the word, you will find other forms of
rd. These words have the same general meaning: they represent
p r each of the forms. the
speech is given. Also you can observe two examples of using the keywords
nd
Th sy to understand English.

adj. extremely important, very serious, finding fault, tc


carefully judg

n. criti
dv. critically
It is critical to follow the directions for th riment exactly as th
instructor indica
. to change from the original shape or conditi
usually in an unnatural way
yn. de form
Time and space are distorted when traveling at the speed of light.
istortion of the image from a microscope can be caused by low light.

adj. various; distinct from other


n. di

ud had many di ts in psychology.


forms on earth mak

adj. successful, wealthy


v. prosper syn. thriving
•. pr
In the early 1900s, San Francisco was a prosperous city.
acteria prosper under the proper conditions.

adj. revealing
".r 1 ••

The report made some revelations about the nature of the conflict.

v. to move slowly and quietly close to the ground; t


dj. creeping gin to happen
. to press together so a completely distort the
adj. crushed
adj. crushing yn. grind
n. crush
The machine crushes corn to produce corn meal.
of the legislation was a crushing blow to the president's program.
L

its roots in a student project. In 1992, an undergraduate called


.
mnu tudying computer science in Helsinki, Finland.
urses, a big component of it was taught on (and
nix was the wonder operating system of the 1970s and 1980s:
ample of the principles of operating system design and
robust to be the standard OS in engineering and scientific
omputing. But Unix was a commercial product (licensed by ATET to a
number of resellers) and cost more than a student could pay.
nnoyed by the shortcomings of Minix (a compact Unix clone written
as a teaching aid by professor Andy Tannenbaum) Linus set out to
own 'kernel' - the core of an operating system th
allocation, talks to hardware
running. He used Richard
·allman's Free Softwar ....
to fulfilling Stallman's ideal of making good s

could use without paying. When he'd written a basic kernel, he released th

Source code i •
he iginal fr which compiled
programs are generated. I to a pr
modify it to fix buy
ll you their source code, or will only do so for an ey
they believe that if they make it available it will destroy their

What happened next was astounding, from the conventional


ftware industry point of view - and utterly predictable t

anyone who knew about the Free Software Foundation. Programmer


(mostly academics and students) began using Linux. They found that i
didn't do things they wanted it to do - so they fixed it. And where they
who rolled them into the
began to grow.
rm for this model of so

an have the source code - it's free (in the sense of fre
nyone can contribute to it. If you u
to extend or develop or fix bugs in it - and it is so easy to giv
your fixes back to the community that most people d
n operating system kernel on its own isn't a lot of use; but Linux was
nurposefully designed as a near-clone of Unix and there is a lot of softwar
and was designed to compile on Linux. By about 1992,
distributions' appeared.
distribution is the Linux-user term for a complete operating
kit, complete with the utilities and applicati
things - command interpreters, programming tools, text editors, typesetting
tools and graphical user interfaces based on the X windowing system. X is a
tandard in academic and scientific computing, but not hitherto common on
it's a complex distributed windowing system on which pee

and more people g know about Linux, some of them


nort the Lmnu
it's free, Linux is now the most widely-ported operating system there is.
a. LInu
In1.
.
• LInux I

n urux.
·. Linux runs on more types of computer than any other operating
ystem.

hat did write the Linux kernel.


2. w was th inux kernel first mad the general public.
. What is a programmer likely to do with code.
4. Why will most " ., u
5. What type of utilities and applications are provided in a Linux

s. What is X?

ical user interfaces are mentioned in the t

'ab
a. Kernel
b.

d. ' a

A distribution

able B
1. A type of mmer can d
or fix bugs in the software
..
11 . riginal systems program from which compiled programs are
nerated
111.

you need to make it do useful thi


iv. A standard distributed windowin ystem on which
'·:ment graphical i
dedi making good s

that anyone could use without paying


f an operating system that handles memory
talks to hardware de s and makes sur erything keeps runnin

is there bet een applications software and operating


ystems?
2, Why is the supervisor program the most important operating system

. What is the difference between resident and non-resident programs.


. What are the main functions of an operating system':

nothing. The hardware needs software to make it work. Are we t


as word processing or sp
package does not
hardware. Between the applications and the hardware 1s a
interface - an ing system is a set of program
that li oftware and mputer hardware.
important ing system, the program th
remains in memory and is thus referred to as resident. The supervis
ire operating system and loads into memory
rrograms (called nonresident) from disk storage only as needed.
n operating system has three main functions: (l) manage the
mputer's resources, such as the central processing unit, memory, disk
drives and printers, (2) establish a user interface and (3) execute and provid

work of an operating system is hidden from the user. In particular, the firs
listed function, managing the computer's resources, is taken care of withou
user being aware of the details. Furthermore, all input and output
perations, although invoked by an applications program, are actually
carried out by the operating system.

This part contains entries for some keywords like flash-cards. In order to
tudy vocabulary efficiently, you must have a study plan and follow i

carefully.
n these flash-cards, direct under the word, you will find other forms of
rd. These words have the same general meaning; th
' T the word. For each of the form '
speech is given. Also you can observe two examples of using the keyword
and other parts.

adj. not fine or smooth, not delicate


yn. r
adj. ordinary
vn. standard
oon it will be commonpl n to whom you are talking on
the· phone.

adj. difficul an
n. complexit
syn. complicated
The busin hed the complex production problem.
The universe has a complexi yond comprehension.

adv. no on rmng

adj.
n. exclusion
clud
Thi is used exclusively by the faculty.
T .... eluded everyone under the age of2l

adj. extremely larg


n. 1mmens1ty syn. mass1ve
rom the mountaintop you could see the immense valley.

adj. not easy to bend; fi,


n. rigidity syn. stiff
The teacher was very rigid in his ideas about class attendane
le adhered rigidly to his opinions about marriage.
55

adv. enough, in a satisfying manner


n. suItcrencv., yn. adequately
adj. _ ----- _

make he
er in me 1s fficient for her needs.

clarify adj. to make more easily understood, to make clear

.. clarification yn.
Unit 2 in this book clarifi aracters of computers .
gover

convenient adj. easy to reach, near; suitable to one's need


syn. practical
n is convenient to the physical sciences building.
or the convenience of-the student body, the library is located in a central
location.

wWw.ProzheDownload.Com
nd ible t

ways of interacting
with compute rgence o! mputers and consum
dening th
new emphasis on ea
industry in the next few

search into Graphical User Inter fac GUI) in the 1970s.


you'll b dy t ut the keyboard and
mouse any time soon industry - inspired by the
h rung up to impro
today's graphical user eloping products that
organize information graphically in intuitive ways. XML-based
orma.. including local and network files
within innovation:
uch as speech recognition that are p hake up interface design.
Speech will become a majo nt of user interfaces and
applications will b
and handheld PCs, with their cramped keyboards and basi
handwriting recognition, will benefit from speech technology.

other input devices, future interfaces will offer a combination of input types
a concept known as multimodal input. A mouse is a very efficient de
desktop navigation, for example, but not for changing the a
paragraph. By using both a mouse and speech input, a user
the appropriate paragraph and then say to the computer, 'Make that bold.' Of
will involve more than just traditional inpu
nd speech re
handwriting recognition. he abili
r gestures and even the abili
t The Intelligent Room, a project of Massachusetts Institute of
ial Intelligence Le
running Microsoft Windows through the use of video cameras. 'Up to now
the PC hasn't cared about the world around it,' said Rodney A. Brooks, the
or of MIT's Artificial Intelligence Lab. When you combine comy
eech understanding, it liberates the user from having
front of a keyboard and screen.'
It's no secret that the amount of information - both on the Intel
within intranets - at the fingertips of comput en expanding
rapidly. This information onslaught has led in intelligent
agents, software assistants that perform such as retrieving and
delivering information and automating rep will ma
computing significantly easier. They can be used as Web
helpdesks and shopping assistants. Combined with the ability to look and
listen, intelligent agents will bring personal computers one step closer tc

d that users have a


tendency to treat
making computer
59

appli they will have a


marked impact on the way we work with personal computers.
auestion will be not 'what does software look like' but 'how does it behave?'

a. Fewer people are using computers because computer functions ar


becoming integrated int
b. Keyboards and mice will soon not be required for using
computers.

ognition is likely to completely replace other input devices.


1ter speech and vision will free the user from having
front of a keyb

ers
1. pments are driving the development of completely new

1mpr

'- way have X :d the us-


4. What type of c speech technology'
ame a • a mouse is particularly useful and a pr
where it is not so useful.
ikely to
7. of input device will b d to give vision to the user
9. ays in which intelligent agents can be used.

a. GUI

c. Intelligent agen
d. 1is
The Intelligent Roon

i. Software assistant that performs tasks such as retrieving and


delivering information and automating
ii. Text to speech
'1.

:husetts Institute of Technology


Artificial Intelligence Lab
ystem that allows a user to interact with a computer using a
n of inputs such as speech recognition, hand writing
recognition, text to speech and etc.

This part contains entries for some keywords like flash-cards. In order 1

study vocabulary efficiently, you must have a study plan and follow ii
careful
In these flash-cards, direct under the word, you will find other forms of
rd. These words have the same general meaning
parts of speech of the word. For each of the forms, the part
peech is given. Also you can observe two examples of using the keyword

and other parts.


61

derstand English.

.
c. accu cy n. Dreese
h able mak servation with the ne
·riments m nducted with accur

adj.
mn
n. dmmne:
The light was too dim for studying.
The stars dimly lit the evening sky.

syn. enormous

oon was a gigantic step in space exploration for mankind.


Iew methods of farming offer gigantic advantages over the old methods.

adj. forever, without end


. last syn. enduring
nnedy let a lasting impression on the peopl
address.
The introduction of r ill h n industry.

vibrant adj. lively, ll of action, brigh


n. n. brilliant
brant personality made him well likea
he vibrance of the city is attractive to many individ

adj. primary or principal; having or ontrol


. dominat r something
n. domination
he dominant life forms of th era lived in the water. The
r dominated the skyline.

adj. not growing or pr


n. inacti

d been d n last
month.
The seniors live in the n

adj. lacking color; uninteresting, boring


n. drabness syn. colorless
Their clothing was quite drab.
The drabness of the desert made driving less interesting.

adj. carefully chosen


• discriminating

n. selectivity
They we tive when they ch mhe membre ademi
am.
I
ur email problems and ur busin uy the
develop th then its time to think
about using an appli P). Rather than installing
software on each
application m he softwar
and manages the hardware required to run the applicati
a lot of advantages to this approach. The ha

as and v u need them, rath investing in a lot of costly softwar


hen tied to for years. having to worry about upgrading t

.,. u1re ling with the complexiti


of managing an email system, lea
.
1me I
focus on what they do best.
How some potential pitfalls. To use applications
remotely requir dwidth, which is only really available from a
broadband conn P itself. It is also important
ide a secure, reliable
64

and storage spac of use


requIr me p chnology on the por P, This includ
ntrols and d iding the physical

information. Instead, they lea . In thi


way, they can be confident of meeting mncreasing
requirements by buying more space as it's needed.
a wide variety of applications available for use via ASPs.
and email servic
applications a through appli
uch a like he
ther
available. This i:
y to grow quickly and d
want to deal with the problems caused b owing their
and having to move to a high-end package. also
that would otherwise prove prohibiti expensive. Small
'usin the opportunity to use such ds of time
d them, rather than having to buy the software as a

with sudden large increases in customers. This means not only having
adequate storage for all your customers' details, but ensuring that you ha
the technology in place to handle stock levels, efficient delivery and large
volumes of traffic. It's very rare for an e-commerce business to handle all o

·ments by itself, making this one of the


ing able to respond rapidly to changes in the size of you
nd the type of product that they want to order from your bus1nes

demands more flexibility than traditional software can provide.


ere ■

P must be installed locally on a user's computer.


You need a high bandwidth connection to
Ps usuall

I. How do you pay for the applications provided by an ASP

b. charged according to u
ingle paymen
2. provide'
they have enough storage space for the
changing need
4. What types of applications are available from
5. Why is it useful for a small business to be able to rent specialist

ith the statements in Table B:

. 1ru:

d. Office suit
. Bandwidth
roadband
g. Data centr
h. SAP

i. Set of standard programs used in an office


ii. Facility for storing large amount
iii. Capacity o
iv. High capacity Interne
elf-replicating program

ii. Application service provider


iii. Collection of related WebPag

4. What kind of information is included in the tag':

The nam (p th
ot1on I
tandards for audio and
P3 is actually Audio Laver 3.

IP3 competes with another audio file format called .. The l


° files are much smaller than
of sound per megabyte, while a W or l
to hold the same amount. How d chieve thi:
compression? CDs and audio files don every sound of a
performance. Instead, they sample the performan cod
RS 67

file may sample a song 44,000 time


a rating a huge mass of information.
y stripping out sounds most people can't hear, M
hear nots·
ab it eliminates them from the mix. Similarly, i
eliminates quiet sound: at the same frequency. The result i

a file that sounds very similar 3

k
block called he tag may include the performer's name
the song's lyrics, the musical genre and a URL for mor

I. How do you play MP3 files':


2. What does the Windows Media Player file d IP3 file.
3. What is a standalone player?
4. What special features can players of

5. What information can you obtain by clicking on the track info button':
6. What does a skin enable you to do?
7. How do you play musi 'on an MP3 pla
'hat hardware and are d u need to make vour own audi

lost machines today have enough processing power and memory to pla
3s immediately Simply download an MP3 file like any other and click on
plorer. The Windows Media Player will decode the file and
r soundcard and then r speakers.
Other MP3 features include:

tandalone players have many feat ·indows' default


> To control wh
into play lists and randomize th T
hey offer spectrum anal
displays.

track info button gi the information on th


buttons
iles b
Skins
These programs are designed to change the appearance of the most popular
players. They're akin to the wallpaper that alters the lo
desktop. With a skin, a player can become a jukebox, a car dashboard, or a
+ar Trek tricorder. Think of them as easily interchangeable faceplate.

program that rips songs from a


.
turns them into Wa rts I P3 fil

With a writeabl y your


own audio CDs.

. stud
1. sing MIDI, computers can communicate with synth
It two clauses. An-ing clau
using MIDI
and a main clause:
mputers can communicate with synthesizer.
We can use an -ing clause, as in example l, to explain how something
happens. The-ing cl
clause as in example 2.
2. DVD drives read DVD disks (by) using blue laser light
also use -ing clauses to a cause and e

file may sample a song 44,000 times a second, [cause]


creating a huge mass of information. [effect]

ere
.

. MP3 remov
4. You can download single trac

6.
7. You can download a skin program.
ou can legally download some music.

rffec
a. This permits extra information t red on the performer and
other track details.
ompilation.
c. This allows you to sample a new group b ing their CD.
d. This gives an enormous storage capacity.
This allows the music being played to b d by the computer and
displayed on the monitor.
70

f. This enables you to change the appearance of your player.


g. These allow you to control the way the music sounds.
h. This produces much smaller files.

v ·,

elative clauses with a participle are often used in technical descriptions.


They allow you to provide a lot of information about a noun using as few
words as possible.

tudy these exampl he Task 3 tex.


I. The techn ded to set up a home network
ith Ethernet ada
3. Network modem allowing
imultaneousl
4. Data line linking client to

We can use the passive participle as in examples I and 2.

= technology which is needed

= PCs which are equipped

use an active participle as in examples 3 and 4.


the Interne

modem which allows clients to access the Internet simultaneousl

= data line which links client to


l. A gateway is an interface .....................(enable) dissimilar
networ
2.A bridge is a hardware and software c

same type of networks.


• A backbone is a netwo path................... (handle)

4. , computer.......····...........(direct) m
works are linked.
ripherals................ (link)

6.
n a compan
ul computer ..................(store) many program

................·arc) by all the clients in the network.


network computer .................(use) for accessing a
.
rvce on a server.
9. A thin client is a simple computer.............................. (comprise)
ssor and memory, display, keyboard, mouse and hard driv
only
I0. A hub is an el II the data
cabling in a network

1.a. Th day.
b. It is needed to set up a home network.
2.a. You only need one network printer.
b. Itis connected to the server.
.a. Her house has
b. ws basic file-sharing and multi-player gaming.
4.a. is a line receiver in the living room.
b. It delivers home entertainment audio to speakers.
.a. Eve has designed a site.
b. It is dedicated to dane
he has built in links.
b.
7.a.
b. is contained in Netscape Communicator.
5. a. At the centr hom omorrow I

network.
b. It is accessed through a Palm Pilot-style control pa
an simulate th
b. carried out in her absence.
I0. a. The house has an electronic door-keeper.
b. It is programmed to recognize you.
c. This gives access to family only.

This part ntries for some keywords like flash-cards. In order


abularv efficiently. u must have a study plan and follow i

flash-cards, direct under the word, you will find other forms o
ame word. These words have the same general meaning; they r

the different parts of speech of the word. For each of the forms, the part
peech is given. Also you can observe two examples of using the keyword
and other parts.
The keyword is then, defined in clear, easy to understand English.
RS 7.

adj. something th aptures the imaginati


v. dramati.. syn. emotional

The hurricane dramatically changed the line.

adj. something wit! fill of


v. elabora. details
yn. comple
An elaborate headdress indicated rank within the Aztec community.
s quite thorough.

adj.
. hazard syn. dangerous
Handling flammable liquids is hazardous.
There are many hazards involved with starting a busine

adj. of little consequence; very small


adj. minute yn. tiny
n. minutia
he profit

d with minute hairs.

. v. to make ready; first in importance r quality


adj. primed
dj. prim
prim
The di primed the ac rform
d away in the prim f his life.
74 English for Computer Engineering

mpl
yn. bas1

'e has a rudimentary knowledge of computers.


The rudiments of grammar are taught in all English classes.

adj. powerful, full of acti


· vgor yn. strong
His vigorous defense of the issues impressed everyone.
e approached his work with vigor.

nvenence
.
mpmng.
n
t the heart TCP/IP is a concept
alled the Internet address. This 32-bi ding gn
ery node on the network. typ ofad
ut you can write every address with a series of
o which a

gateways can us information from one machine t


lthough data-delivery systems lik .25 bring their
packets to any machine ele he IP module.,
must know each other's Internet addresses i

machine acting as a gateway connecting different TCP/IP networks will have


a different Internet address on each network. Internal look-up tables and
ftware based on another standard-called Resolution Protocol-ar
route the dat
piece of software works with the IP-lay
information to the right application on the receivin
dard called the User Datagra
P software as creating a data ad age that
what application the data block i ·ontact at th
76

oftware has described. The P software he final


rn.
TCP/IP comes int
packet is delivered to the correct Internet address and
application port. Software packages that follow the TCP standard run on
each machine, establish a connection to each other and manage th
exchanges. A data-delivery system like Ethernet doesn
a packet IP nor know
n vered bu
tructures and buffers the data flow, look
repl t of data management 1

alled relia
TCP brings the data packet into a ther high-level

rotocol and the Simpl


• If you tanda '
you will at least have w easily transferring files and other kinds o4
d.
onceptually, software that supports the TCP protocol stands alone. I
ata received through a serial ,
network, or from a network system like Ethernet. TCP
to use IP or UDP, it doesn't even have to know they exist. But in [

TCP is an integral part of the TCP/IP picture and it is most frequently used
with those two protocols.

1. 'True
a. Internet addresses are an integral part of th l.
b. In
R 77

ides the final routing for data within the

ckets that aren


with pa

f. TCP only works when it is combined with

I. What purpose does the Internet address have apart from identifying

° What data-delivery systems are mentioned in the text'.

What do IP modules need to know about each other

4. How many Internet addresses does a gateway have?


5. What does UDP software do:.
hen doe
. What pr rformed by p

are mentioned which are used to deal with

. Internet addr
b. Resolution Protocol

atagram Protocol
f. Transmission
ii. Standard used by software that ormation to th
application on th vork

between computers on the Internet


iv. A 32-bit number identifying a node on an IP network
·. stored information used to route data through a gatewa
r connecting dissimilar networks

This , for some keywords like flash-cards. In order


tudy vocabulary ly, you must have a study plan and follow i

refully.
In these flash-cards, direct under the word, you will find other forms of
ame word. These words have the same general meaning; they 1

the different parts of speech of the word. For each of the forms, the pa
you can observe two examples of using the keywords
and other parts.

adj. no regular pattern in thinking o

changeable without reason

paintings have an erratic quali cellent and

. to make something more than what it is


adj. ggerated n. embellish
n.
l government exaggerated th
that his business is successful would be an exaggeration.
79

v.grow at a fast pac


adj. burgeoning syn. thrive
The burgeoning population of major cities is creating a deman r mor

ned at the f14.

adv. attracting attention


n. noticeably
tis name was conspicuously absent from the list of winners.
The attorneys were

n. a important or famous 11
associated with a high position in government
syn. notabl
very dignitary in Washington was invited to the wedding.
Il of the high-ranking dignitaries attended the economic summit.

in a tricky wa

r montns.

u gy; very y
adj. exhaustive horough
adj. exhausting yn. depl
adj. exhausted

They exhausted their energy in 10 minut


The exhaustive report was acclaimed by everyone.
n. element or component
adj. faceted syn. aspect
al had many beneficial
It was a multifaceted problem that challenged the entire student body.

adj. more than enough


yn. sufficient
There is ample evidence that the young man was speeding when the accident
occurTeu.

he was amply paid for the work she completed.

adj. having little rain or water


yn. dry
The area known as the Sahara in the
world.

e
r regard for rul d
adj. defiant norms; to challenge
adj. defying
n.defian
I defy you to find that book in the libra
The circus performer demonstrated her death-defying routine.

. tO pass a law
n. legi

nacted the legislation during its last


uaent of the laws was in the hands
R 81

. to pretend, make beli


n. simul

indiscrimina

The indiscriminat products made th nfusing.


TI rganized indi

wWw.ProzheDownload.Com
defined, different mail pr nd
messages in slightly different ways. The mail system obably used
ploys a combination of SMTP and POP3 to send nd receive mail
respe ly. Others

er messages between one mail server and another. It's


mn PCs to send mail to th
ery pro deli
in batch mode. Once a messag
he recalled or cancelled. It's also deleted from the sending server once it'

aning that the co


. This makes it unsuitable for
ages to desktop PCs, which aren't guaranteed to be switched

In host-based mail systems, such as Unix and Web mail, is the


nly protocol the server uses.
eceived me ges ar d locally and re d from local file
system by the mail program. In "
lated into HTML and transmitt o your browser. SMTP is th

m system

al protocol used by many PC mail clients to ge'


typically your ISP's mail server, It only allows you
ages in your mailb
the receiving PC initiating the connection. PC-based POP3 mail clients can
do this automatically at a preset interval. When you use your Web mail
the mail
just as a PC-based application would. The messages are then
your Web mailbox and read via a browser.
Since POP3 downloads all the messages in your mailbox,
tion to leave messages on the server, so that they can be picked up from
machines without losing any. This does mean that you'll get ever
message downloaded every time you connect to the server, If y
clean out your mailbox regularly, this could mean long download
sing a Web mail account to retrieve POP3 mail, be careful about l
messag erver - if too many build up, each download will take a
long ti nd fill up your inbox. Many Web mail systems won't recogni
already downloaded, so you'll get duplicates of ones you

AP is similar in operation to POP, but allows you more choice over what
you download. Initially, only message headers are retri
iving information about the sender and subject. You can then download just
those messages you want to read. You can also delete individual message
-,er and some IMAP4 servers let you organize your mail intc
makes download times shorter and there's no danger of l

b. I more bandwidth than the other email p


d for sending email

me.

l. Name three different email protocols mentioned in the text.


2. Which email protocol is used to transfer messages betwe
computers?
Why is SMIP unsuitable for delivering m
host-based mail systems mentioned in th
ail messages stored in an SMTP sy.
6. What happens when you use your Web mail a

7.
messages on tne server.
o. What are the advantages of '
a.

. POP
d.'Pull p

i. An email transfer pr
sending computer rather than the receiving computer.
ii. A mail transfer protocol that initially only retrie the message
headers.
iii. An email transfer process in which the receiving computer initiate

Iv. nd me:
rvers.

time.

Thi like flash-cards. In order t

u must ha a study plan and follow iv

:fully.
In these flash-cards, direct under the word, you will find other forms of
ame word. These words have th
of art of
mpl
and other parts.
The keyword y to understand English.
·it ight

he cannot withstand the pr of her job.

grv
desire or opinion

e harbors ill feelings for her.


They harbored the political refugee in their home.

r plan of study encompasses every aspect of computer


The course encompasses all the literature of the nineteenth century.

adv. b
adj. i ·yn.
he reporters had i failed · include th m

1s inadvertent calculation caused him to d

adv. caused by something that cannot be explained b


+he laws of natur
yn.
Miraculously, he was unharmed after being hit by lightning.
iven th ·nt of her injuries, it is almost a miracle that she is still ali

~ I!
88 English for Computer Engineering

Will Detroit retrieve its status as the car manufacturing center of the world?
This computerized information retrieval system is the most up-to-date
stemavailable.

is negative reaction was unwarranted.


hat the ticket for the infraction was unwarranted.

n. the highest point


yn. ape'
e reached the zenitl hi fession at a very young age.
The publication of th ·nted the zenith of his car
tandard Generalized Markup is the language tha
pawned both tensibl
It 1

a language from which you can create other languag


it is the creation of a markup language (a system of encoded instructions f
rmatting electronic document elements).
HTML is an application-specifi et of
used for web pages, that creates
guage that is all
' 3ur information, not what the actual data is. You
can, therefore, say that HTML is a presentation language.
f SGML, but it is also, like SGML, a meta-languag
od for creating text formats for data so tha
r independent, platform independent and
languages and etc.)
is an extensible language, you don't over have a
browser to interpret the page. Applications can parse the XML document
nd read the information without .,

unlike HTML, is concerned with the identity, meaning and


. XML is extensible because it lets website d a

their own set of customized tags for documents. This ability to define your
and it is what gi
flexibility.
y defining your own markup tags, you can explicitly define th
content in the document. This makes XML a more intelligent markup
language than HTML. For example, in HTML, you could have a paragraph
ag <p> preceding a paragraph about baseball. Your Web brows

tag and knows to present the following text as a paragra

you could define a


<BASEBALL> tag to refer specifically to the text in the paragraph in your
document. This way, when your XML browser examines the document, th
document knows what data it contains and that makes the conten
intelligent. Search engine ata can do a better job of
finding the pages you are looking for because- f the intelligent nature
content.
, by design, does not deal with how the data is displayed to the
nd user. Because HTML is a presentation language,
to help handle th
·an use XML in your HTML documents to provide metadata, which is data
.bout data in the document.
..·' will do to the Web and e-c what HTML originally did
to the Internet. XML and i have the potential t
blow the roof off the Internet and how we do business.

ful'
b. SGML is more complex than XM
an only be used on Unix systems.
an only b
91

is a markup language.
.. Internet searches will be better with XML files.

2.

ame two meta-language


data
2ant b
6. What makes XML a more intelligent language than HTML.
7. What does the HTML markup tag p

a.

c. HTML
d. XML

1. nsible markup lan


iii. A coding system used for structuring and formatting documents
iv. Data about d
An exampl :ntation Language
A languag m which you can cr other languay
This part contains entries for some keywords like flash-cards. In order
tudy vocabulary efficiently, you must have a study plan and follow it
carefully.
In these flash-cards, direct under the word, you will find other forms of
ame word. These words have the same general meaning; they ,,
different parts of speech of the word.
h is given. Also you can observe two examples of using the keyword
and other parts.
The keyword is then, defined in clear, easy to understand English.

adj.
v. abuse syn. misus
The constant abuse of the environment will have grave consequences in th
future.

adj. allocated assignment of portions


v. allocate syn. distribution
is allocation of materials was gradually used up.
Allocating office space in the building was a difficult task.

usmng ing aside for futur


e, favoring traditional value
n., adj. at1' yn. preservation

-
onservation of forest land is imary objective
ervrce.

adj. abl don


yn. possible
It is a feasible design for the high-rise building.

The dancer has a limber .,


5he was able to make the limber movements that are required of gymnasts.

n. an opinion formed in advance without per1en

v pr n. bi

It is difficult to preconceptions if we are not open to new ideas.


about Lo
city.

adj. showing good health; in good shap


n. robustn n. strong
The robust economy is expected to continue growing quickl
The new product is selling robustly.
adi. ' ld to be presently useful; outmoded
n., adj. antique yn. old-fashioned
n. antiquity
This antiquated machinery breaks down too frequently.
Their home is filled with antique furniture.
0

(IS"
ISDN servic xisting telephone network infrastructure
to terminal adapters (TAs) in the client machine. A common ISDN interface
has a digital communications line consisting of three independen
channels: two Bearer (B) channels, each at 64Kbit/s and one Data (D)
channel at 16Kbits. The D channel is used to carry signaling and supervisory
he network, while the B channels carry the data and can be
linked to provide a 128Kbit/s data channel.

ome in two forms: satellite and cellular. Satellite


a modem to maintain the uploaa.
bandwidth is provided via a dedicated satellite dish, connector hardware and
proprietary soft
use assigned radio frequencies and are based around a
rranged in a cellular network, much lik

e companies can also offer affordable broadband ·r

coaxial or fiber infrastructure networks. The connection is shared by several


actual conn re variable, unlike I
and DSL.

logy capitalizes on the existing network of copper infrastructure,


but allows digital signals to be carried rather than analogue. It allows the full
bandwidth of the copper twisted-pair telephone cabling to be utilized.
ith splitter-based services, the DSL signal is pulled out from th
phone line as it enters your premises and is wired separately to a
additional hardware and installation bv the
provider at the customer site. The shielded option i
but the telephone company's equipment and some of your equipment migh

need upgrading.
ith Asymmetric Digital Subscriber Line (ADSL), most of the duplex
bandwidth is devoted to the downstream direction, with only a small
proportion of bandwidth being available for upstream. Much Internet traffic
through the client's connection. such as Web browsing. downloads and

responses are less significant and therefore require less on the upstream. In
addition, a small proportion of the downstream bandwidth can be devoted
oice rather than data, allowing you to hold phone conversations without
requiring a separate line.
DSL-based services are a very low-cost option when compared to
ther solutions offering similar bandwidth, so they can be made availabl
customer at extremely competitive pri
97

b. Two ISDN channel


bandwidth.
c. Comp d a modem.
d. Cellular networks work in a similar way to mobile phone systems.
systems require a special digital telephone line.
systems use analogue signals.
g. You need a separate tine to hold normal phone conversations on an
L system.

I. How many channels does an ISDN system commonly use.


2. What types of wireless systems are nan
3. What do P
4. What types o
5. hielded DSL system'?
downstream bandwidth, the upstream bandwidth in

a. larger
maller
c. the same
7. Which type of broadband service is th

a. ISD
b.

channel

f. Splitter-based services
g. ADSL
i. DSL system that separates the digital
ignal
ii. Digital channel used to carry I
information to the n rk
11. installed on a PC to allow it
.., twork
symmetric Digital Subscriber Line
v1.
ii.
-
Digital Subscriber Lin

This part ntries for some keywords like flash-cards. In order t


abula ou must have a study plan and follow it
illy.
hese flash-cards, direct under the word, you will find other forms
words have the same general meaning; they represent
parts of speech of the word. For each of the forms, the part of
speech is given.
and other parts.
then. defined in clear

yn. incorporate
The Unit America ha from all parts of th
world.
similation of a new cultural environment can be difficult.

n. a th
yn. quality
99

.
he high caliber of her work earned her a mn pay.
Only parts of the highest caliber can be d to make repair n th
pacecraft.

adj. needed for a specific purpose a formal request


require yn. required
n. requirement

v req
is the list of requi
The project team made a requisition for a n

v. to organize; to make clear


n. unraveling syn. separate
The dete not able to unravel he mystery of the missing money.
The unravelin fthe Soviet Union k place in the span of a few month.

n. a special quality that endears other people to th


person who has this quality
yn. appeal
he has a charisma that n ,
John F. Kennedy was known for his charismatic personality.

. to I
dj. endu yn.,
dj. enduring
n. enduranc
ow he is able to endure living n to the airport is beyond m
comprehension.
The enduranc
trainin
I00 English for Computer Engineering

forfei t o give up; to have something taken away, usually


n. forfeit by rule or regulation
yn. relinquish
Usually you must forfeit your native country's citizenship to become a
citizen of another county.
The forfeit occurred because not enough players showed up.

precarou adj. not safe, firm, or steady


yn. hazardou
The diver put himself in a precarious situation among the sharks.
The cup was positioned precariously on the edge of the table.

wWw.ProzheDownload.Com
engaging mn tion (say, an email or a business purch
third party read their transmission. Some form of dat
encryptic preven f the me e
hould b has tampered with it in transit.
heme. Finally, both parties mus

oday' s data encryption m

ryone using a public-key system has a public key and a private key.
, and decrypted with these keys. A message encrypted
with your public
priv ' '
,'or the system to work, twc engaging mn a secure transactuon
must know each other's publii kevs, how
guarded secrets known only to their owners.
''hen I want to send you an encrypted m
to turn my message into gibberish. I know that only you can
gibberish back into the original message, because only you know
key. Public-key cryptography also works in reverse - that is, only
your public key can decipher your private key's encryption.

age through a message-digest


within an application produces a number called a message-authentication
m works because it's almost impossible for an altered
message to have the same MAC as another me
,AC and turn it back into the original message.
• being used
m ' ±fore it's encrypted. Next, it
key. It then encrypts both the message ncrypted
he recipient's public key and sends the message.
When the recipient gets the message and decrypts it, they also get an
ge and runs it through th
same m
Then it decryp If the two ·
message hasn't been tampered with.
+de Web dictate that a r- authentication
lo, using digital certificates.
ver authenticates itself to a client by sending an unencrypted
II-based digital certificate. A digital certificate contains information
bout the company operating the server, including the server's public key.
The digital certificate is signed' by a trusted digital-certificate issuer, which
means that the issuer has investigated the company operating the server and
believes it to be legitimate. If the client trusts the issuer, then it can trust th

will change, but th


basic ten f secur w ill rem ain the sam e. If you
R 10.

understand the basics, then you're already thr teps ahead of everyone

"c
.

n be decrypted by anyone.
the recipient's public kev.
ages are normally encrypted using a private key before

message can often ha


f. A digital certificate should be signed by a trusted digital-certificat

g. A MAC is used to check that a message has not been tampered with.
h. The message is decrypted with the recipient's private key.
i. The message is received by tl
j. The message is encrypted wit' "' ipient's public key
. The message is sent by th

data encryption pr
a. privacy

2. A message encrypted with the recipient's public key can only b


decrypted with
a. the sender's private ke
b. the sender's public kev
ipient's privat
. What system is commonly used for encryption'.
104 English for Computer Engineering

4. What is the opposite of 'encrypt


5. A message-digest function is u
. authenticate a user

• encrypt a message
6. What information does a digital certifica a client'.

ibberish
b. Impostor I
e. Decipher
d.
• 1enets

-authentication cod
ii. Principal feature

erson pretending to be someone


lake unauthorized chanve
vi. Convert to meaningful da

a. to encrypt a message for sendiny

age
a digital signatur
able 2
i. sender's private k
11. k
iii. the recipient's private key
iv. the recipient's public ke

find the answer to these questions.


I. How are computer viruses like biological viru
2. What is the effect of a virus patching the operating sy
,, .-.. • . .e signed to be loaded into memory?
4. the wri
5. What kind of programs do virus routine to its function:

Routine
l. misdirection
2. reproduction
trigger
4. payload

Function
. does the damage
b. attacks a copy of itself to another program
hides the presence of cod
d. decide when and how to activate the payload

0 IRU
A imple organism that infects living cells
wn as th Mg itself to them and using them to reprodu
106 English for Computer Engineering

imilarity, a computer 1rus 1 ery small program utine that


infects a computer its resources to reproduce itself. It often
perating system to enable it to detect program
files. It then copies itself into those files. This
ystem.
run ram, it is loaded into mem
he virus uses rogramming techniqu
resident in memory. It can then use a reproduction routine to infect othe,
. his process continue until the computer is switched off.
: virus may also contain a payload that remains dormant until a
gger ent activates it, such as the user pressing a particular key. Th
ayload can have a variety of forms. It might do something
harmless such as displaying a message on the monito might d
destructive such as deleting files on the hard disk.
nen 1 irus replaces th
nrogram with a vunand that change hi
command is known a

control to the h l. t

instructions and is executed in the normal way.


0 rogram only needs to have a reproduction routine that
na r programs. Viruses can, however, have four main
parts. A misdirection routine that enables it to hide itself; a reproduction
routine that allows it to copy itself to other programs; a trigger that c
the payload to be activated at a parti
takes place; and a payload that may be a fairly h

routine is known as a Trojan.


R 107

phrasal verb is a verb + preposition combination. look up,


take down and turn over. Phrasal verbs are common mn
English. Sometimes they have a more formal one wo
He, work out = determine.
n phrasal verbs have two meanings.
ne we can work out from the meaning of the two words separately:

he looked up at the roof.

break into keep at


..., t into throwawav
hack into shut down
o about log on
set about log out
keep ahead ind out
srow up track down
phone up hand over
run up

ow in th

I. Hackers try to ................. passwords so they can penetrate a


2. Don't.................. your password to anyone who asks for it.
r. .lice ............ Ralph ............by talking to his friends and
-q
4. Some hackers................. systems to get commercially valuable
information.
nvou.................. to a network, vou hav provide an

7. Hackers may .................., pretending to be from your compan

can find
them.

10.................a system is strictly illegal nowadays.


Il. It's aconstant race to .................. of the hackers.

dit card receipts; they could help fraudse1>.


2. Trying to penetrate
. The typical hacker is a young person who has not matured yet.
4. The best way to begin hacking into a system is to try to get hold of a
password.
5. If someone telephones you and asks for your password, don
provide it.

6. Hackers closed Hotmail for five hours.


accumulated a telephone bill of $Im for Scotland Yard.
. The difficult thing was to determine how the website would rook.
number the support technician
.
gves you.
IO. Examine th
R 109

This part contains for some keywords like flash-cards. In order


ulary ou must have a study plan and follow
carefully.
In these flash-cards, direct under the word, you will find other forms of
vord. These words have the same general meaning; th
he word. For each of the forms
u can
and other parts.
The keyword i: tand English.

adj. sacrificial

crificed his day o' neighborhood.

adj. triumphan cvn. achievement


adj. triumphal
,.. tri_

r was characterized by one triumph after another.

adj. to make something impure by adding something


. contaminate dirty or
n. contamination syn. polluted
d water supply must be closed to the public.
acteria and in of food contamination.
adj. active and growing; healthy
v. flourish yn. thriving
mall flourishing ·ompan1 .. ould harmed by in th

oung mind will flourish with the pr

adj. neglected
dj. neglectful

n. negligenec
The presence of the first person singular in the poem was almost negligible.
is negligence caused him to lose all of the work he had done on th
computer.
.
ne of the principal motivations for mng P is to handle multimedia
applications in which such di und and vide
packaged together into executable modules. Another is writing program code

and reusable; in other words, code that shorten


program-development time.
Perhaps the key feature of P is encapsulation - bundling data and
alled 'objects'. Here's an exampl
lled
When the user selects the Triangles icon - which i ·+--

the properties of triangles and other daa menu might


appear on the screen offering • The choices may be (l) create
new triangle and (2) fetch a triangle alre ge. The menu, 1

the choices on time a us, s

h hatever properties or data


o get to the n the application migh
instructions that display -veral types of triangles-right
··les and so on.
observers feel that the encapsulation feature of
.
1

the natural tool fo.


images are integrated with text and graphics. With moving i
built into the objects themselves, program developers avoid th icky
blem of deciding h of data is to be integrated and
synchronized int hol
cond I is inheritance. This all P
say 'Rectangles' and a specific
ay 'Squares' (a rectangle with equal sides). Thus, all
properties of rectangles - 'Has 4 sides' and 'Contains 4 right angles' are th
two shown here are automatically inherited by Squares. Inheritance is a
useful property in rapidly processing business data. For instan
business that has a class called 'Employees at the Dearborn Plant
ific instance of this class, 'Welders'. If employees at the Dearborn plant

nefits package, welders automatically quali


ackage. If a welder named John Smith is later relocated from Dearborn
irmingham. Alabama, where a different benefits package i
n is simple. An icon representing John Smith - such as John
d on the screen and dragged with a mouse to an icon
representing plant. He then automatically 'inherits' the
Birminghambenefit package.
third principle behind OOP is polymorphism.
instructions but deal with them in
in the triangles example. If the user
right clicks the mouse on 'Right triangle', a voice clip might explain th
properties of right triangles. However, if the mouse is right clicked on
Equilateral triangle' the voice instead explains properties of equilateral
triangles.
combination of encapsulation, inheritance and polymorphism
leads to code reusability. 'Reusable code' means that new programs can
+. ,:dand pasted together from old programs. All one has to do i
access a library of objects and stitch them into a working whole. Thi
.: ,the need to write cod ...,

reusability makes both program development and program maintenance


ere ■

I. What advantages of using object-oriented programming ar

3. What multimedia d
types of triangle mentioned in the ex.

ids the problem of deciding how each separat


type of data is integrated and synchronized into a working whole.
. What specific type of rectangle is named iv

7. What common pr
. What features are made quicker bilis.

incapsulation, ............. and polymorphism are key features of


·................ programmmng.
ncapsulation allows data and pr
in .. . .. . . . . .. . . .. . called obj la
. . . . . . . . . . . . .. th " lymorphism
hat instruction .................. Th
•.......... features of OOP m Ogram code 1s

Table
ab

b.

d. Menu
f. Polymorphism
g. Library

P property that allows data and program instructions to

ii. A list of ch
P property that enables different objects to deal with th
struction in different ways
iv. A reusabl .,
. A module containing data and program instruction
i. Object-Oriented Programminy
ii. A rectangle with equal side

B
1.

6. how to get started


7. how to make progre

• How to become a programming expert


The primary requirements for being a good programmer are nothing more
than a good memory, an attention to detail, a logical mind and the ability
work through a problem in a methodical manner breaking tasks down into
maller, more manageable pieces.
not enough just to turn up for a job interview with a
logical mind as your sole qualification. An employer will want to
rt of formal qualification and a proven track record. But if you can sh
. . .
someone an mmpressrve p1ece o tware with your name on it, it will count
r a lot more than a string of a mic qualifi
So what specific skill mployers looking for? The Windo
market is ' ming and demand for good
opers. Avoid older languages such as FOR
nd programmer
uld be to subscribe to the
rogramming ma
f the low-cost 'student' editions of
k on Windows programming. 'f·

·or you nd

to computer
The first key point to realize is that you can't know everything. However

differentiate between contract work and consultancy good


m job to job
ry - a few days here, a w

a care coll mmpanies that keep coming back again and


again.
a lot of work out the
C++ and so on. And there are lots of people who know it too, so you ha
be better than them. Qualifications are important. Microsoft has a raft of
do Novell and Cisco and in my experience these ar
ery useful pieces of paper. Exams like Microsoft Certified
Th for
116 English for Computer Engineering

rtification. However, this won't guarantee n understanding of the


t, its positioning in the market, how other products and
n. "e where the all-important experier In.

Here's the road map. After leaving university you get a technical role
in a company and spend your evenings and weekends learning
vour trade - and getting your current employer to pa! ou

like that, you may be in a good position to move into a junior consultancy
n in one of the larger consultancy companies. By the age of 3
you've run big projects, rolled out major solutions and are well known.
aybe then it's time to make the leap and run your own life.

How to become an IT managel


IT managers manage projects, technology and Any large
anager resp r ensuring tha
everyone who actually needs a PC has one and that works properly. This
means taking responsibility for the maintenan 1d the
stallation of new software and for ing a help-desk and a support group.
edium also likely to have an IT systems
manager. Thy ing and implementing computer
business. They're responsible for
lopment projects and oversee the implementation and support
ompanies will have two or three major systems that ar
bought off the shelf and then tailored by an in-house dev
am.
' ·m basic hardware and softw pertise, an IT manager will
typically have over five years' industry. Most are between
budgets and f
in any potential recruit.

wWw.ProzheDownload.Com
117

early all IT managers ha degree if not a


as well. Interestingly, many of them d degrees in
any case, the best qualification for becoming a manager i

f your personality is such that you're unlikely to be asked to


take responsibility for a small team or a project, then you can forget being an
IT manager. You need to be bright, communicative and be able to earn th
ust of your teams. Most of this can't be taught, so if you don't have these
kills then divert your career elsewhere.

This part contains entries for some keywords like flash-cards. rder 1

tudy vocabulary tly, you must have a study ollow'


carefully.
In these flash-cards, direct under the word, you will find other forms of
ame general meaning; they -- s-a

ord. For each of the forms, th,


:h is given. Also you can amples of using the keyword
and other pa
The keyword is then, defined in clear, easy to understand English.

adj. more than sufficient


n. plenty syn. abundan
xamples of Miro's art are plentiful.
balanced diet normally provides plenty of the necessa' mr

h adj. protected from har elem 1

n. shelter reality
yn. protected

he has led a sheltered life since her parents have done everything for her.
eryone looked for shelter from the blazing sun.
n. a report of an event; money kept in a bank; a
adj. accountable tatement of something used or received, usually a
account inancial repor
n. accountino yn. story

y
The hu

dj. having many parts; finely detailed


n. intri yn. compl

[ understand all of the intricacies of modern automobil

magn1

The magnitude of shock waves determines the damage tha urs during an
rthquake.
The in
119

n. polling
n. pollster
poll
The poll indicated that conservation of the environment was the number on
D

tuck in a job you don't like and


to make a change. One way of making that change is to impro
your marketability to potential employers by upgrading your skill-set. If
you're going to train yourself up however, whose training should you
ndertake? If you need certificates, whose certificates should they be? Even
salary will ri

ers a large array of certification program-


the user of a single program such as Microsoft Word, t
meone who wan ertified support engineer. There are a
myriad o1 for too, If you're the proud hold
those qualifications, then ntitled to call
Certified Professional (MCP).
ne
.
qualified you already mn 1

knowledg ill vou need to go and tak with a training


ho can make good use of self-stud

Will your employer pay for your course? Will it grant you leave to go and d
urse - assuming you can find one - on either a full-time or part-time

1> k
amount of work you'll have to do to get up to speed fc

also mean the difference between passing or failing the exam.


While you're busy learning all you need to know for your certification

the practice exams are an absolute godsend. They show you the type of
ncounter and they familiarize you with th
pa time limits an'
tu answering the requisite number questions within
the allotted time. I simple as that.
raining course will help yo
· vou that it will be suitable
actly what the course offers and whethe t
attendants. You should also find out what th
n't have the minimum knowledge necessary to n

replaced by 'updated' on
certification a
'ltimately it's your responsibility to make sure you stay up to date. If

you don't, you lose your certification until you take an update.
upport engineer, you get the satisfaction of knowing th
passed a tough test and the happy knowledge that your network manager is
eating a bit over the fact that you could be head-hunted at any time.

a large range of certification programmers 1

dy.
b. You must get an advanced certificat

riod of full-time stud


d. amiliar with the structure o
e exam.
an decide on the suitability of a cour
It is your responsibility to make sure that your certification is kep

. Gaining a certificate is likely


employers.

eM.

1. mn a
support job':
2. e ·vou
getting amnmng
puter program is mentioned in th
4. Name two ways of studying that ar
5. What two factors will b
.
per1enc
6. Why is it important to become used to answering exam questiss?
7. What factors help vou decide whether the course will be suitabl

b. troubleshoot system
h computin
d. design busin lution:
i

1. Intel Pentium IV 1.7


2. Giga Main-board ( board)
• 512 MB RAM-bus
4. 80G
5. Embedded Intel 3D Direct AGP video with 64MB SDRA''
6. 64-voice wave-table sound

10.
11. ZIP dri
12. 1.44 MB 3.5" Floppy drive
13. 17 color SVGA moni

I4. Microsoft Intelligent-mou


15. 105-key keyboard
16. 56 Kb modem
17. Sony
l8.
19.
t Windows XP
21.

Resumes and application forms are two ways to provide employers with
written evidence of your qualifications and skills. Generally, th
information appears on both a resume and an application form. The way it i
presented differs. Some employers prefer a resume and others require an
application form. You want to apply for a jo' you need a resume? That
ds on the kind of job you're applying for.
Resume is required for all jobs; prof ·hnical, administrati
and managerial jobs.
There are many wa
job, you should choose th rmat that best highlights your skills, training
and experience.
When do you use a resume .
• To respond to a want ad.
• To give an employer more information about you than the job
n g!Ve>.

comany you'd like t


rviewer so he or she

a reminde your

Tips for good resume.:


.fi und and experience list will give you
the self information required to prepare
If you've worked before, list your jobs. Next, write down the work
duties for the jobs you've listed. Now, think about the skills or talents it took
to do each work duty.
Li :lubs you belong to, sports yo been involved
l I and things tha he first item on
your list

there you can b


reached hy you're qualified for that
kind of a resume should be short, preferable one page typewritten. It
free. It includes honest, positive information that is related t

me will open the door for an interview. it takes to do tha


item. Write them all down. Look at the abilities (talents) identified on your
ackground and experience list. You have talents that you use everyday.
Resumes are required for some jobs, and are sometimes required f
ther jobs. An employer may have you complete an application form instead
of submitting a resume. On some occasions, an employer may ask you to
comp addition t

n you fill out an application form, make sure you fill it out
ompletely and foll ll instructions. Do not omit any requested
the information you provide is correct.

pages is enough. In the following, you will see a 1ple resu


mn one page:

Name: Ahmad
hmadi

irth date: 1974, 12 Apr


arital Status: Married, I son
Tel: 0098-21-33332222
ax: 0098-21-44442222
ddress: No. 311, 3rd St., Valie-asr Sq., Tehran,
P.O.Box: 5436-876 Tehran-IR
-mail: [email protected]
• 1995-1999 B.Sc. in mputer Engineering in
USA, GPA=I6.5
or on
hospital
• 1991-1995 High School in Mathemati

.
• mpany mn hran, .net Programmer
• 'ompany in Tehran and

• ranch in Tehran
• 2003 Translating a book abou

• Programming Languages: .ne, , C'# and

• Databases: Oracle, 2

• Operating Systems: Windows 2000, X


• System Analysis and Design: UML and

& Hobbie
• Programming in .net


• Studying Compute
• Learning English
• Swimming
This part contains for some keywords like flash-cards. In order
ulary ou must have a study plan and follow
carefully.
In these flash-cards, direct under the word, you will find other forms of
d. These words have the same general meaning; th
of speech of the word. For each of the forms.
p
and other parts.
The understand English.

adj. alike in some way


n. analogy syn. similar t
The action of light waves is analogous to the action of sound waves.
The analogy between the behavior of the bacteria in the lab and in the human

v. to make something happen by necessity or


adj. compelling yn. oblig
The representativ elled
their personal opposition to it.
The lawyer's plea was made in a compelling manner.

adj. difficult; causing worry or fear


helmin
"l! :.l kttl\.;~~-

v. to enter b
BE +RTIFIED 129

n. intruder
The intrusive bacteria caused his condition

pron adj. likel mething


n. proneness syn. inclined t

tost liquids are prone to contract when frozen.


he is prone to study hard the night before her

prophetic adj. correctly telling about the no.


prophes yn. predictiv
n. prophec
n. prophe
hetic powers were investigated by a team of psy
rilliant student fulfilled his teacher's prophecy that he would be a

reluctant dv. unwillingly


adj. relucan yn. hesitatingly
n. reluctance
not completely satisfied with th ntract, the officials reluctantly
1gn 1.

renown
ned yn. prominence
This school is of great renown.
The renowned conductor made

wWw.ProzheDownload.Com
Talking to Professor Cochrane is probably as close as you can get to time
ling without leaving the current dimension, as his vision stretch
lst century and beyond. His seemingly unshakeal
+ha+ nvthing is possible if you really put your mind to it. In
Telecom) is already sitting on a host of innovations poised to blow your
mind during this century.
-signed for the 21st centu g1 uil
around a chip that holds all th of his passport, bank account, medical
records and driving license. A rding to Cochrane, it's set to r
hopping.
·e ring is already a fully operational prototype, but it will be some
time before you'll be trading your credit card in for the ultimate fashion

It's not just jewellery that's set to g marter. One of the bigge
++. lab is I, •· a way of
oftware programs, networks, telephones and machines with a
intelligence built in. By sensing their environment, they should be
able to develop new capacities as demands change. 'I have software that is
breeding, which is interchanging genes and creating adaptable behavior. Thi
means y the network come alive - it will watch what you do and it
will adapt.
th has taken artificial intelligence one
p machines that ar heir own problems.
hat a human being ·er have dreamed of.
solutions and although we don't understand how they work, but
. We're effectively increasing the speed of evolution', say
hrane.
It's already good to talk, but with artificially intelligent phon nth
way it will be e hrane is at present working on smart phon.
that can transla ngli into German, Jap d Frenc
rocke . What we've
built is a kernel of understanding inside a machin meaning
from the sentence uch a

nlinear approach that sends the English to th


nderstanding kernel in the machine and then fans it out to all the oth
languages simultaneously.

when it
is the do

mmunrcatng.
also in mn an

a eh TV. 'We put people on the Internet and broadcas'


home could actually influen
happening on their

its fingers in multiple pies and has made biotechnology another


ally, I think hospitals are very dangerou
to be. There ar start, we can stop bunginy
up hospital wards by putting people online. has already d
13.

pack for heart attack victims that monitors their progress and upload
. radio link back to the hospital.
nd his

2015, it's likely that we will be eclipsed by a


upercomputer more powerful than the human brain. And if that's go'
minator dancing in your head, don't worry - Cochrane's got i

covered. 'I'd really hate one morning to find myself considered an


this planet. Our inclination is to nurture life and not to destro
it. Before we let loose a bunch of artificial intelligence, we ought to be
thinking through the necessity of building in a number of rules that hold your
life as a human being sacrosanct.'

new ideas th

phone can only inglish int one oth


language at a time.
d. Intelligent ag help deal w
information.
. Watching TV will be a more active pastime in the future.
f. The professor thinks that humanity will be destroyed b

owerful computers in the future.

pletely convinced'.
2. What is stored in the professor
''hat will change dramatically when we start using rings like these:
4. What is th
5. Wha he pro1
olution'.
. What does the professor so

7. What was the result of combining the Internet with


8. developments does the professor suggest in the field of
biotechnology'.
rding t

a. '
b. Smart phone
:. Intelligent agent
d. Rocket science
. R
t. Upload

ii. Most powerful type of compute


iii. Research and d a

iv. Transfer data from a client device to a server computer


nglish into various languages in

ii. Very advanced study


135

ns will soon be bundled together in much th


a uites are today. A major example is the
which will bring customers and supplier
databases and virtual environments, with ID verification, encryption and
fund
automatically producing accounts and auditing. The whol
ill be based on voice processing, allowing a natural
puter, all the Al to carry out the request and voic
ynthesis and visualization technology t
Electronic money will be very secur
nhysical alternatives. E-cash can be completely global and could be used as a
de facto standard. It does not have to be linked to any national
can be independent of local currency fluctuations. Its growing u
will lead to its acceptance on the street and we may hold a large prop
of our total funds in this global electronic cash. People will increasingly bu
direct from customized manufacturers. Shops will be places whe1
ent instantly to
the manufacture

ill change, as many jobs are automated and new job


come In me organizations will
11 here a small of key employees i

ted by contr
right people regardl

aces and a
ideoconferencing and ound
ning. All this will be witl mmunication cabl
high capaci infrared links. The many short-term
e enough space in their homes for an office and ma

Of course, workers can be fully mobile and we could see some peopl
bandon offices completely, roaming the world and staying in touch
en in trains and planes there may be infrared distribution
high bandwidth communication. One tool they may
ave in a few years is effectively a communicator badge. This will give them
a voice link to computers across the network, perhaps on their office desk.
e link, they can access their files and e

computer-based work. Their earphones will oice synthesizers to read


' mail and glasses with a projection m built into the arms and
reflectors on the lenses will allow a head-up display of visual information.
Perhaps by 2010, these glasses could be replaced by an active contact len
that writes pictures directly onto the retina using tiny lasers.

'inall long term, by around 2030, may h


to directly link our
then, giving us so much extra brainpower that we deserve a new nam
romo Cybernetics. In much the same time frame, geneticists may have
:d the first biologically optimized humans, Homo Optimus. It would
mak wizardry
to make something like the Borg, Homo Hybridus, with th dy of an
lympic athlete and a brain literally the size of the planet, the hole global
uperhighway and every machine connected to it. Over ti this new form
may converge with the machine world, a , his thought
vberspace. With a complete m
'ybridus would be completely immortal. '
- entually accept the transition and plain old ome
voluntarily extinct, perhaps as early as 2200.

although in addition
because such a.
but
different applications program

applications programs, ...................


The supervisor program is the most imp
·...... It I referred to

manage the computer's resources, .................. the central


·...................... they establish a user interface and execute and provid
services for applications software, ................... input and outpu
rations are invoked by applications programs, they are carried out by th
r·rating

-en-
italics
-en-
enable encrypt ensure encourag
encod enhance enlar
heighten widen brighten as ten
2. Th :her is using a new program

f SimCity has been made better in many ways.


4. A gateway makes it possible for dissimilar networks to communicate.
5. You can convert data to secret code to make it secure.
6. Make sure the machine is disconnected before you remo
for making your website bright
1, ronic reader ize larger.

0. n vour monitor wider.

7.

In the last ten years, police have installed speed trap units on many b
roads. These contain a radar set, a microprocessor and a camera equipped
radar sends out a beam of radio waves at a frequency of 24
iga hertz. equivalent to a wavelength a car Is moving
towar , the reflected signal will boune ack with a slightly
smaller wa away from the radar, the wa .ill reflect with a
lightlv longer length. The microprocvss h
in wavelength between outgoing and returning signals and
, ·d of each vehicle. If it is above the speed pre-set by the

n then be traced using th nter da


139

th

have now got used to these traps. Th, n when th


approach one to ensure that the camera is not triggered. Th d up again
as soon as they have passed. This is known as 'surfing'. y

two units equipped with digital cameras positioned at a measured distanc


apart. The first unit records the time each
vehicle by its number p'

(OCR information is relayed


sor within th

numbers of those vehicles exceeding the speed limit are relayed


computer matches each vehicle with the
ing mail-merge a standard letter is then printed off addressed to

We can use the -ing form of the verb as a noun. It can be th bjet,
ampl
I. Managing the computer 's resources is an important function of the
tem.
tarts running the user interfac
PC is switched on.
3. Another function of the operatin tem i
services for a
pplication

The -ing form is also used after prepc


4. Without the user being aware of the details, the operating
manages th puter 's resources.
5. We begin on the interaction between a user and a P
operating "
6. We look forward to having cheaper and faster computers.

Managing the computer's resources is an important function of the


operatin
I. task of the supervisor program is to load into memory non
programs as required.
The role of the operating " ommun1

One of the key functions of the operating system is to establish a


user interface.
4. oftware.
the work of mainframe operating
multiple programs and users.
6. The task in mo
user and a PC.
7. One of the most important functions of a computer is to proc
large amounts of data quickly.
or installing more memory is to allow th

infinitiv form.
1. n
. I want to (upgrade r.
d n) with a password.
4. You can find information on the Internet by (use) a search
engine.

5. r Interne'

6. m without (know) the password.


7. in HTML before (design)

I I l (u
eyboard.

:rbs + +

ew developments in computing

T n used to d uch d
allow, let, enable, permit, help

I. A GUI lets you point to icons and click a mouse button to execute
a task.
2.A GUI allows you to use a computer without knowing an

perating system commands.


3. The X-Window System enables Unix-based computers to have a
graphical look andfeel.
4. Voice recognition sofwar disabled users (to) acce
computers.
142 English for Computer Engineering

allow, enable and permit are used with this structure:


+ +

let is used with this structure:


.·rb +

in

nabl m

2. Adding more memory lets your computer (work) faster.

• Windows allows you ............. (display) »

4. Th you........... (type) in upper case.


5. The eature enables you ................ (use) th
numeric keypad to move the mouse pointer
6. ALT + TAB allows you............... (switch) between programs.
7. The Sticky Keys feature helps disabled people (op
two keys si
LT + PRI 'lets you ................. py)

...
This part contains entries for some keywords like flash-cards. In order to
study vocabulary efficiently, you must have a study plan and follow it
arefully.
these flash-cards, direct under the word, you will find other forms of
ame general meaning; they represent
the different parts of speech of the word. For each of the form s, the part
143

using the keyword


and other parts.
rd is then, defined in clear, easy to understand English.
di
ad]. L;4
maKIn, annoymng
yn. irritatin

The aggravating delay was caused by road repairs.


The shortage of work aggravated the crisis in the small town.

. to change from one form or s

wWh nvert to gases.


Th ahrenheit to centigrade can be e ily made.

adj. being able to restore to good condition


n. cur yn. healing
in plants have been well documented.
ills of
adj. weakening
yn. weakenin

The la vings has a debilitating

adj. depleted
n. depletion
144 English for Computer Engineering

he depleted all of her savings to buy the word


he depletion of the Earth's oil reserves poses a threat ur current style of
life.

toxi adj. harmful; mng fatal


yn. po1sonous

toxic wastes is an ongoing problem.


This product has the highest toxicity of any known to

acknowledge v. to know, remember and


n. acknowledgment mething
adj. acknowledged syn. concede
The foreman acknowledged the fact that there had been a mistake in the

desig
n ackn hi llent work.

tranquilit n. calm; quietn


adj. tranquil syn. peacefulness
v. tranquilize
The tranquility of the lake at sunrise inspired a profound sen well-being.

wWw.ProzheDownload.Com
has changed vastly in the nearly
started passing their knowledge
on to students. Introductory computer graphics courses are changing their
us and learning environments. Improvements in hardware and
y coupled with changes in preparation, interest and abilities of
ing the neeo
level rendering
algorithms have migrated int
hardware. Though important knowledge r advanced graphics programmers
most graphics applications programmer ·d to study at this I
much as application programmers ha'
·f assembly level programming. Cour
graphics Application Programmer Inte
hing th' nd high
programming API's. Th were gained in cour
at an undergraduat university, university in multi-day industrial
xperienced p nal program
l) changes in abilities of incoming students.
2) chang in preparation and interest of incoming student.
changes in the principles of the computer graphics.
4) impr in computer graphics related hardware and
technologi

I) integration of 3D graphics and API.


2)applications programmer interfa
'high-level principles, algorithms and tools.
4) low and intermediate-level rendering principles, algorithms, methods and

1) introduct
2
3) undergraduate university
4) graphics application programmers.

l and a half decades ago.


2 g

4) three centuries ago.


147

l) rendering principles.
2)application programmer interfaces.
phics and API.
4) hardware systems and assembly level programming.

l) teaching undergraduate university students.


2) prof un1
3) taking multi-day industrial
4) teaching both undergraduate university students and industrial programmers.

rners ar singly skipping lines a


indow ing need
accordin..., ..., d Wednesday, Novemb 27. 2002. Th
nonprofit pew internet and
rapidly catching on in the imated thirty " million
mer1cans now pa r funds on the web, mor th
number that did so two n any given day, Internet u
likely
und. Thirty-two
online, compared with seventeen percent in 2000. while other activities like
booking travel reservations and making purchases remained more popular
w project found them growing at slower rate. Those surveyed wer
m nience and time
two
I) the estimated number could not be determined at all.
, en millions.
f thirty seven millions.

Who
l) pew internet.

2) American life project.


3) American life project and pew internet.
4) Reuters news agency and pew internet.

l) instant-messaging software users.

instant-r ftware.

1 this
l) online banking grows fast on the wes.
pew internet is a nonprofit organization.
%32% of those surveyed said they did their banking on th

l)it is convenient and save their time.


2) internet is available at their workplace.
it is less expensive to do their banking on the web.
149

4) it is hard to find teller wind

hift from technological nationalism to a more pragmatic strategy of


national mn multinational
ha its economy. with thi
transformation, China s revamped its industrial and chnology poli
from an isolationist approach aimed at achieving technological
independence to become a major producer of computer hardware and a
for information technology p
In 1990, China had only 500,000 PCs in a country of more than 1.2
billion people. By 2000, mainland Chin purchased more than
million PCs in a year. During the same time, China's production of comput
hardware grew from less than USS 1 billion to US$ 23 billion.
ina's policies clearly drew on the developmental approach of other
nomies such as Japan, Korea, Taiwan and Singapore. Each
these became Leaders in different segments of the global computer
industry through the strong support of government industrial and technology

I
D) h transformed i ns.
2)h ormed it' t by globaliz
3) has transformed it's purchase capabilities.
4) moved to more pragmatic strategy of developing it's national capabilities.

2. By reading the above passa

I) isn't dependent to chang


2) has had a rapid growth.
3) has a technological nationalism.
4) has had an isolationist approach.

If
fit
l) computer technology 2)transformation
4) d

IBM is beginning a large scale autonomic-computing initiative designed to


develop computer systems that run with little or no human involvement.
already working on several autonomic computing
d
keep running mponents fail.
lved making thing:
larger, et cetera, without considering reliability, maintainability,
availability etcetera. Autonomic computing would eventually reduce svstem

and would be most useful in re


practical in space. fact, autonomic systems are
years away, although in the ne: r term, autonomic functionality will a
in servers and software.

l) are revolutionary
2) have and oversigh
3) run faster and .ale.
4) have the capa to run with little or no human involvement

l) make them self-healing


2) make them autonomous
3) make them
4) use them in rem

l) for the future


2 -
3) in reach of servers and
4) operating in the computer technology

inux has yet to achieve ularity in the computer game


ming the dominant operating
otion pictures. The Linu
operating system initially found a niche for use in computer generated image
rendering for film. With the success of films such as Toy Story and Titani
most major motion picture studios now employ CGI and strive to reduce the
costs of using this expensive technology. Given the many system
and the numerous applications that support it, filn
r a enure p
nimation nd rendering. Thus, when ntire film industry
adopting Linux to remain cost and performance com e. how can we
help but wonder what new realms Linux may conquer next:

'inu

l) must achieve cost and performance competiti


2) has become the dominant op
reauc
l) computer graphics industr

2) computer generated image


omputer generated industry
4) computer graphics implementation

f th. . .. ?

I) has still new realms to conquer in the futu


2) h ments in the motion picnsr industry.

eys the
igh le N and its compiler in the 1950s
day. The development of Univ

and the rise of the graphical user interface and the creation of th
t are included among the events that shaped modern computing.
ill argue with choices of topics covered for example, an
hapter is devoted to Java, while no mention is made of th
full of fa
an intangible creation that has had a very tangible impact on th
modem world.

l)a book
3) a journal
21. What topic is missing in Go-To?
l)Java 2) fascinating detail
4) development of m

have real im we need II(

the existing borders computer science and economic and management


:iences. Truly interdisciplinary progress in science appears difficul
achieve because of the traditional decomposition into disciplines, which can
into almost separate cultures.
intelligento.1 ,

interdisciplinary thinking has helped to advance e-business. E-busin


implies that information technology must pro
distributed context of economic value creation. Technology push and market
pull both play their role in driving e-business forward.

22. The fi r st par agr aph can best summar ized as:
l) despite the fact interdisciplinary progress in scien
holar try to prove it helpful in
2 into disciplines has brought ab
ulties for researchers developing e-business.
the impression of e-business on economic and management sci
cholars to consider interdisciplinary concept helpful in th
a
4) although intelli arch in e-business ma riouslv affect
other field of om tudents hope ' ollow it up through

23. How does the second par agr aph logically relate to the fi r st? It
I) disagrees with the idea that sciences are to follow the traditional
n.
2 the fundamental

upports the idea tha


nomy.
4) suggests the ways to be studied by the students of computer in relation t

cconomy, management and computer science.

Traditional methods of teaching no longer suffice in this technological

and bright alike grade


through high school, not only are not intimidated by computers, but have
become avid participants in the computer epoch.
Kid implement their curriculum with great
tudent can program musical notes so that the computer

y mn a way. nu
reactor is no longer an enigma to students who can see its workings in
minute detail on a computer. In Wisconsin, the Chippewa Indians ar
studying their ancient and almost forgotten language with the aid of a
computer. More commonly, the computer is used for drilling math and
language concepts so that youngsters may learn at their own speed without
trying the patience of their human teachers. The simplest computers aid th
handicapped, who learn more rapidly from the computer than from humans.
nce irksome, remedial drills and ex s now on computer are conducive
o learning because the machine resp nswers with praise and
to incorrect answers with frowns and
cents have become so
il
their disconcerted parents in the dark. They have shown so much fervor for
computers that they have formed computer clubs, beguile their leisure hours
in computer stores and even attend computer camps. A Boy Scout can get a
computer merit badge. One ingenious young student devised a computer
game for Atari that will
This definitely the computer age. It is expected that in 2-3 years there
will tween » In Amer1can
lanufactures of computers are presently getting tax write-offs for donating

equipment to colleges and universities and are pushing for legislation to


obtain further deductions for contributions to elementary and high

price of computers has steadily fallen to the point where a


small computer for home or office is being sold for less than $100. At that
ountry will

24. The expression traditional methods of teaching in the first sentence


refers to ..................................................................................................................•...·..·
ching
l) technological method
drill
2) teachers, textbovM>
for not learnin
4) teaching th

25. In order to operate a computer, a student does not have to be .


l) musical 2)versatile
in grade school 4) especially bright

26. A computer is a r obot teacher because it 4tee

l) is human
2) teaches machine

4) enables students to learn through mechanical means


27. Accor ding to the passage, one exceedingly clever student has •••.•••••••••
l) overcome a handicap 2) invented a video game
3) learned an Indian language 4) played music on a computer

28. Computer manufactur es donate equipment


]) in 2000
2)to

' al
4)to teach students how to operate computer

29. The author of this ar ticle impli es that ......................


I) traditional methods of teaching 2) computers are
difficult to operate
3) students toda to be smarter than their parent
4 learning today easier than it was in the past

30. In next 2-3 year s it is estimated that the number of computers in


±1
weeeeeeeeeaeeeeeeeeea

1 t

2)continue as it is today
3) be at least twice that of today
4) be considerablv lower 'than the number today

31. The pr ice of a computer is no


l) risin
2)too high for mo
, able for most
4) preventing schools from buying computer
Determi ne the meani ng of the underlined word from the context of above
passage (8) fr om32 to 35.
32. He devised_a computer game and sold it to Atar i.
1) bought 2)played
4

33. M anufactur er s ar e donating_computer s to schools.


l)going 2)deducting
3)giving 4)dedicatin

34. 1 am not ingeni


l) Studiou
3

35. ··r
u in·_student can lear n to oper ate a computer .
l) average 2) brilliant
3) attenti 4) thoughtful

assage 9:
uman memory formerly believed to be rather inefficient, is really mor
phisticated than that of a computer. Researchers approaching th

from a variety of points of view have all concluded that there i


more stored in our minds than has been generally supposed. Dr. Wild
nadian neurosurgeon, proved that by stimulating their brain
electricall,, vents supposedly forgotten for many yea>
uddenly emerged i
memory trace is the term for whatever is the internal
representation of the specific information about the event stored in th
memory. Assumed to have been made by structural changes in the brain, the
memory trace is not suk'
particular time can cause performance at a later time. Most theories include
rength of th riable in th learning

of activity. Repeated references to the same information supports recall. Or,

to say that another way, improved performance is the result of strengthenin


the chemical bonds in the memory.

36. With what topic is the passage mainly concer ned?


I)Neurosurgery 2)Human memory
4

37. Compar ed with a computer , human emory


.1
I) less durable 2) more limited
more compl 4) less dependabl

38. Accor ding to the passage, r esear cher s have concluded that •..•..•.•···•

I) human memo
2) di ·valuabl
,th
4 r memory than wa

39. How did Penfi eld stimulate dr eams and other minor events from the
past?
1) By surgery 2) By repetition
'By electric stimulation 4) By chemical stimulation

40. apacitv for storage in the brain ............•....


l) is not influenced by repetition
2)i imulated by patterns of activity
3)ha a limited combination of relationshir
4

1
2)it iv

it i recall
4) it is probably made by structural changes in the brain

ic technology has produced significant changes in the way tha


human computers and digital pagers, peopl
commun1° d primarily by writing. had to sit down, compos our
though hem down on paper. Ther
also a delay between the expression of our ideas and their recepti
ugh to wait. With technology, hov
mmunication happens in "real time". We don't take time before had t

directly and bluntly. phone or

et overly anxious i anew mail


or page. We want all ur commun1 ion to happen instantaneously.

anges in human'
interactions is not a product of electr o echnology?
1 sless than be for
2 annoyed to wait
3) People communicate more promptl
4) People express things in sophisticated way
time" in the above passage'!
1) dela 2
3) instantaneous

44. The author of this passage pr obably beli eves that the effects of
·chnologv on human communication ar e:
1 2) almost negligibl
4) not well understoc

assage "
"

while infinitely lar


red, green
produce mor

to combine purer, or more saturated, red, green and blue by using


narrowband light filters that select colors more precisely but diminish
brightness at the same time.
- Technologies
hardware necessary to close this gap and mak images more cinema-lik
. .
without the unwanted dimmin rick is to ra primaries
the basic colors that, combined, form all others. By adding Yellow and Cyan
light blue) to standard red, green and blue, a display that could normall
generate about 16.7 million colors would now b
trillion.
ienoa developed a color conversion algorithm that runs in a
ircuit. The algorithm gets a
r example, that the television would origin '
primaries -and finds how to best represent
45. Accord ing to the passage, the Genoa Technologies Ltd. is a company .....
l) producing more colors for it
2) manufacturing TV sets with b
3) that has developed a combination of five primaries.
4) that has tried to bring close the quality of a TV image to that of the
cmema.

46. By adding the two extr a color s, the r atio of the color s that can he
ner ated to those of the old standar d is................................·.
)40to 1. I) l O to 1. 0 to I.
4)90 to 1.

3, =
4) The standard red, green and blue colors.

8. Genoa Color Technologies Ltd. has .........•......


cial microchip.

4) developed a combination of fib's primaries.

49. Accor ding to the passage, Genoa Color Technologies L td. has
managed to .....................of the images.
1 .- and the film ima
he gap b the brigh
n the TV image and 2the film image.
4) diminish the brightn unwanted dimming side effect.
d the unwanted dimming sid
in many parts of
It's probably n . the
next standard-turned-fad will likely be a video-compressible format: MPEG-4.

-4 became an internationally recognized standard in 2000. Th


alen • 1t wa
.
mng group
'nal. Organi

ery compa
an
produce images produced ith (the DVD
recording format), with only one-third to three-eighths the da
ith the new availability of high-quality digital video in manageabl
players and camcorders \with no moving parts ar
well as hard drive-based video jukeboxes holily dozen

music, in their shirt pockets.


Some of these new plavers and camcorders store wideo files in flash
·ure Digital memo1

50. Accor ding to the above passage hat is/ar e th


er pr esent
,.,
echnical standar d(s) in a number of places in the wor ld a r esen t .
l 2
3)MPEG-4 4 i-4 and

s1. What or ganizati on developed t


I) The International Working Group.
2) The Moving Picture Experts
163

3) The Internati
4) The International Organization Standardization.

52. I f you er e asked to identify the most conspicuous quality for M P3


and which of the following would you choose?
1) Secure Digi 2) High quality digital video.
mpact fil 4) Video-compression format

ge 13:
the extensible mark-up language, strue as well as good looKs
·'ings like headlines and
n define things like
he

you can build data, files, Web pages, or documents tha


can he probed with simple questions by relying on semantics and logic
instead of key words that this in turn speeds up any search you need to make.
o make this kind of smart searching possible, one further concept
comes into play: the resource description format ( mng
the relationship between entities. It defines how pi of data are
represented in a series of documents, acting like a dictionary of definitions.
r example: is "spectrum" a scientific term definin
quencies, a slice of opinions of viewpoints i i

r a well-known magazine? The builder of the database gets to


. adopt a definition suggested in some other already defined RDF.
This allows you to define an ontology, or the relationships among RGk
nents, linking various data elements in documents and allowing logical
inferences to be made. An ontology is a "family tree"
concepts; for example, to medical database, all words ending in -oma are
types of cancer.
53. Accor ding to the passage, what i rincipal featur e of the XM L '?
I) Building data files. 2) Formatting th
4) Having the ability to infer.

54. What does the passage reveal to the reader about the two languages?
I)XML is the customary language that has replaced the HTMN
2) HTML and XML are both used but each for different puu

4) That HTML is the customary language for the present that me


replaced by

5. What is meant by an RDF (the Resour ce Descr iption For mat)


tatement?
I)A dictionary.
2
3) A list of data represented in a series of documents.
4) A linking of different data elements in documents that all
inferences to be mad

It turns out that your kids are right once again. According to a re
video games of the kill-or-killed variety is good for their
brain-power.
iot only that: if they are playing these games on the Sony Play station
2to last Christmas and get bored with Ton
their PS2 r and
d m chromo dynamics homewvu.
nd bit of news-using Sony Play stations to build a specialized
mputer was announced by researchers at the National
upercomputing Applications and the computer science department at the
Uni versity of Illinois in Urbana. These tinkerers paid about $50,000 and got
computing power that would otherwise cost at least five times as much. TH-

wanted to learn if the sophisticated graphics processor used in the Sony Pla
o run slick games could also be used to solve big problems in
particle physics.
hardly a threat upercomputung grant I1

achievement illustrates the ' hat c


a leading edge of the computer industry. 'dvances are no longer trickling
down to these devices from grand ut surging up from
pot. Although . to gr
lengths to prevent unusual uses of their consumer equipment ·d that
m

or ding to the passay hat about o n


p1a
I) Kide like to play the kill-or-be-killed video games.
2) Kide get bored soon from games played on the Sony Play station.
3) Kide like to play kill-or-be-killed games on the Sony Play station 2.
4) Unlike the popular opinion, the kill-or-be-killed video games can be goo
for children's brain power.

57. What have the resear chers at the National Center for Super computi ng
pplications and the computer science department at the University of
rbana accomplished wi th the help of Son
1
2)To build a specialized supercomputer.
3) To become a leading edge of computer industry.
4) To pay one fifth of the actual cost for the computer scien
8. By r eading the passage, which of the foll owing can best reveal who a
tinker er may be ?
'hildren playing with Pl ti
archers working at scientific centers.
ducing consumer electroni
. or mmprov
.
pair hing in a casual wa

Within the n ars. rful, cheap sensor


radio-frequency IE
hatting into them); biometri
our u fingerprints walking patterns, or othe
quirks; 1ung ·bedded into all manner of
things, able k u: within meter; and tiny, high-resolution digital still
and erything from cell phones to wallpaper.
data will cascade into government and
corporat and information that are largel
detail will accumulate in database
too scattered numerous-and valuable -to be shut off completely from the res

59. What is meant by cyber spac n on the last line of the passage.
I) Databases. The Internet.
3)The information world. data.

60. If you were asked to choose the best title for the above passage which
oj followi ny
1) The Cheap ' 2) The Tracking Sensors.
he Ubiquitous Sen 4) The Omnipotent Senso.
167

61. The pr incipal featur e of a biometr ic sensor is to identify ..........................


I)A human trait. 2)A physical quirk.
sition. 4)All of the ab

assaf
are in the midst of digitizing their archived films ,
inding and
ticularly
So far, automatic d

mn Kome
now h
are usually a m
The key insight is that scratches should be modeled in a 1

were purely noise added to the image. In addition to


being fast enough to run in real time, the new method keeps the number o
low, so there is li
the hanging rope in your

, 2) Defective Films.
3) Scratchy Films. 4) Digitizing the Archived Films.

lms.

64. what does the passage imply as to the method used?


I) There is a complex scratch model.
2) There is lots manual tuning and false ala
3) They have an improved scheme of a mere 3 to 10 pixels wide.
4) There is a little chance of removing unwanted parts accidentally.

17.
arly days of computers, even sober scientists believed tha
ould become "intelligent" and eventually
That was the promise of artificial intelligence, or AI, in the 1950s. And in
the 1960s. And in the 1970s.
Spectrum e decade vangelists.
mong the manv e ran on the imminenc
was one 20 years ago. It prophesied in June I
programs that mimic human expert's ability to make ould
replace air traffic controllers bv the vear 2000 and d nd s

ally i
topic in cor halls and journal pages. Spectrum wa
will begin to make their way into the world, Illl
people will consider them to be really intelligent after all," wrote Robert
'ahn in 1983. Kahn was one of the founders of the Internet and a former
t the Defense Advanced Re Agency, in
rlington va.

ment of AI turned c

b :s from Cornell University, in Ithaca,


the road to building artificial intelligence bu
hat, we still have a trouble.
t to-line programs it is likely to be a long journ
the journey continues for Al researchers. As for
machines usurping humans, so far computers have made inroads on only a
169

65. I f one had


..ould be th
1,
2) The Evolution of Expert Systems

66. By r eading the passage what is meant by Spectrum'.


1
2
3 hine Intelligence.
4 rite topic in conference halls and journal pages.

1 ificial anpower.
2) Artificial Intelligence ha
The early days of computers are over and nowadays machines usurp
humans.
4 ilding
ere proph

68. The idea of AI has developed since how many decades"?


1) Five 2) Four
Thre 4)T

69. When .Joseph Bates of Corn e


.
n
l what is his tone?
l) ironi 2) realistic
3) idealistic 4
8.
workstation is n nly dependant upon the traffi
of the LAN and the loadin :d of any LAN
rned by its own performance. Network tuning
-s more than remedial repairs. Most Ethernet controllers provide
n throughput of about 1 Mbits/s, or I0 percent of the
at 10

ngineering workstation more than a


few seconds per minute. for gathering the data
assembling it into packets, transmitting the fi and verifying acceptanc
by the recipient. Additionally few have hard di an
ansfer 1.2 Mb of information from disk in memory per
computers whit I can achieve the slow disk

4.4 Mbytes/s, the receiving PC might n


bytes/'s .Although this might seem lik this data transfer rat
is faster than most Ethernet controllers. Floppy driv

70. Perfor mance of a LAN wor kstation...


l) depends only upon it's traffic performance and the speed of LA

2 c but is governed by is own performance.


3 ds on the traffic performance, the loading and speed o

4) does not depend on it's performance but is governed by the loading and
ed of LAN servers.
171

ther net controllers...


2rage throughput much less than the channel capacity .
, have an a rage throughput much more than the channel capacity .
3) have insu t throughput relative to channel capacity .
4) hav throughpu

l) can constantly sustain data rates of about 10 Mbits/s.


2) can not sustain data of Ethernet tran
3) can onlv sustain data rates of Ethernet transceivers for a
4) can tain data ra
minute.

ver the years sin ginning, th ld of AI has made a wholesom


which it i and praise. In the beginning, th
iti field echoed the buil
e will mak hat think; w iant

marvelous robots that could r gnize visual patterns and spoken language
plan compl icated question and pr
professional
tremendous national investment has been made, over the c
more than then three decades. I indeed, I would argue that too large a
fraction of this.
country's public investment in computer science r

compared to other promising opportunitic than the


he diversion of the very b minds of a
generation and much of the efforts of th t academic laboratories.
he by-products of this research effort have been impressive: new data
f representing knowledge, programming languages

milies of computers. As for the main objectives, however, the filed h


accomplished surprisingly little for the time and the investment. One need

k only at the present state of speech recognition and of handwriting


recognition to see how far there is to go, despite how much work has been
done.
t very b s work on Al
4) Too most di
73. Financially ........................................................................................
I) Too much is spent on AI
74. AI has enabled •....•..•..
3) More money much be spent
l gnize pattern
2 gnize spoken languag
histicated questi
4) Nothing of its original objecti

75, AI has been instrumental in development of ..


1) New intelligene
ing machin
ta structures representing knowledg

4) New investments in the field

76. Many university resources were dedicated to .


)AI 2)Computer Families
3) Speech recognition data base 4) Giant brains

77., The author believes ............


l) We should praise AI progress
2) There has been significant developmen
3) There ha more rhetoric than progre

assage 20:
ultimedia technology refers to the integrated processing and dissemination
multiple time-dependent and quality dependen
data and still images. Multimedia
mponen nd d multimedia
enable the exchange multimedia information
tions for distributed multimedia systems can significantl
ions between peopl of
distributed multimedia appli dicin
and distributed. collaboration. · distributed Multimedia
compute

78. SCSI has evolved consider ably in the past few years, leading to diff er ent
-so coexisting at the moment in the mar ketplace. The
fir st gener ation dubbed SCSI (or SCSI-1, though generally it isn't
identified by number ) was a fair ly loose set of electronic standar ds that
failed to ...................simple things lik e connector types, leaving ever,
dor to buil d an inter esting. cr eative, an incompatible incar nation of

l) mainstay manda
3) mantl 4

79. Par titions while leaving the r est of the system


l)enact 2)impair
3)impact 4)int
80. Any operating system is a complex structure; it is impossible to the
structure of most operating systems at runtime.
l)discern 2)discord
3)descend 4)descant

81. In rovides for drivers much the same thing that th


p ·xnansion us provides for circuit boards: a we
Common ...·•··•·•
1) bus 2) peripheral
3) denominato 4) slo

82. Data is any information used to discu or decide something. hen


computers were first ..................
l 2
developed 4

83. Humans can reason heuristically. They do not usually reason in a simple
ep-by-step manner like a computer but reach a/an ......................based on
trial and

4) agreement

84. Most computers have an interrupt feature which allow a program to be


interrupted when they receive a special signal ............ that anyone of a
number of external events, to which they pre programmed to respond
has occurred.
1) indicating 2
mn 4) denouncing
175

85. The centr al pr ocessing unit contains publi c and pr ivate r egister s.
" r ivate r egister s ar e memor y units which can stor e data, but ar e no
·········· ...................................... the computer system user .
I lainable t 2) accessible to
3 ·d by 4) dissipated by

and not necessarily by the computer manufacturer. They are a set of


programs designed to perform cert ain applications which..................
inter nati onall y accepted r ules. I) disagree with
3) embroil with 2) conform t
4) react again

compar ed to the fl ow of water in a pipe.


2)entirely

There's a myth that if we were reall good at


here would be no bugs to catch. If only w uld reall
- eryon top-down
design, decision tables, i we had th
right silver bull ugs. ' he" myth. Ther
are bugs, the myth says, we are bad at what we do; and if we are bad

- ~
ing and -
an admission of failure, which instills a goodly dose of guilt. And the tedium
or testing is just punishment for our errors. Punishment
inhuman
blems that have been kicked around...for forty centuries?
88. The author beli eves that r eally good pr ogr ammer s .....··....
l)always use structured programming
2) write programs with no bugs.
·rfection.
4) almost never feel guilty.

89. According to the passage, testing is ...................................·...


l
not necessary if programming is done right a punishment for
the guilt
4) inhumane
90. It can be infer red from the passage that
I) the author is not a good programmer.
2) human communications problems have not been
ed vet.
3) the author feels guilty about not being telepathic.

91. The author beli eves that pr ogr am bugs .


l) are a consequence of human imperfection.
irable.

assage 22:
Types of Rob s: One way of classifying robots is in
imilarity to hu n automaton is any machine capable of oper
independent! exibl ,.

of an automaton , that can be programmed as th


need arises. An example is a welding robot on th
grammed to participate in other production ope
a flexible machin an
partly select its own goals and mmun1 her agen
ding humans. An android or humanoid is a
tructure approximately resembles a human structure. Finally, a
humanoid with organic structures. Cyborgs have some
imilar to those of humans. Despite all our efforts, however, robot
have a long way to go before they
er the
hundreds of millions of
around the world b
handiwork.

92. An andr oid


I)is a Cyborg with a human-like structure but without any inorganic parts.
is not capable of independent operation.
3) lacks the ability to move freely in i nvironment and should b
placed in position by human operators.
4)i hum ns capable

cently in wide us.

2) are born like human beings and die like human beings.
3) have challenged human beings.
4) are programmable.

94. Which of the following is most pr obably a mobil e r obot?


l) Ali ordinary car 2)A heat-seeking missil
3)A sentry (patrol) robot 4)A machine gun
95. Accor ding to the passage
l) not all human-like have organic structures.
2) there is little that robots can do for human bein
3) Cyborgs may be a threat to human beings.
4) automata are rarely used nowadays.

96. Which of the following CANNOT_be infer r ed fr om the passage?


1) Sophisticated Cyborgs will most probably not be de
future.
2 tall machines are robot.
3 orgs to other typ

r im
athematicians have been trying to tell them apar
2,200 years ago. It is easy enough with small
composite, because it can be divided by 7 and
not divisible by any smaller number
know if a 15-digit number is prime? A procedure has been developed using a
mputer that can determine in at most a few hours whether a I00-digi
number is prime. One expert has estimated that such a feat previously would
have required a century of computer time. The technique initially picks key
rs, that have the potential to divide evenly into the large number. With
made to detect crucial characteristics o
mputer produces a short list of the onl
number ly into the large number. The computer then
.
·o O d .I number by each key number on the list. If none
179

number or hen the large number must be prime.

1 prime num
2 nputer procedure
, uclid, the ancient mathematician
4) Advantages of composite numbers

98. How many centur ies ago did mathematicians fi r st try to distinguish

be een pr i me and composi t e number s?

l 2
3) L han thr

99. The phr ase " tr ying to tell them apar t" mean
l) attempting to explain the system to no mathematicians.
2) seeking a more convenient way t

00. Befor e the technique descr ibed in the passage was developed, how
much time might it have taken t o deter mine whether a I 0O-digit
number was pr
1) 2)100 hours
3)10 vears 4)100 machine-cycl

assage 24:
ir aphics: The history of interactive computer graphics goes back to th
1950s: Pioneers using MIT's Whirlwind computer in the 1950s
-2 compute.' and i II
mechanisms: knobs, dials, keyboard and light pen. In 1963, Ivan Sutherland
developed a system called Sketchpad for the TX-2, which introduced the
constructing hierarchies of objects on a virtual piece
arbitrary magnification on

e .ll
automatically enf ps among
lines dra light pen. This "constrain a kind of
ree-hand uter "straightening out" the approximat
drawings. ning round in an era of computer-driven
displays a metry for computer aided design (
computer aided ) in the automotive and aerosroce
r pilot training.

101. Por tions of which of the foll owing could be sho at arbitral
magnifi cation on a computer scr een?
] ) TX-2 computer 2 hirlwind computer
3) Sketchpad

102. Which of the following computer s wer e used by the fi r st user s of


e computer graphics technology?
1
2
3) Computer aided design (CAD) and computer aided manufacturing '
4) 1BM mainframe computer

103. Which of
art of the or iginal TX-2 computer'
l) knobs, dials and sketchpad
2) keyboard, knobs, dials and sketchpad
3)'-· '
4) clocks and pointers

2
I)I
ut" the approximate drawings.
2) It allows the computer to automatically enforce mathematical relationship
among lines drawn with a light pen.
3

4) It permits th a

assage 25°
omputer Vir uses: As recently as eight years ago, computer viruses wer
considered an urban myth by many. Today the situation is very different. As

ver 1996
.
Iru iter ammed m
can be at le
attributed antivirus producers.
s antivirus p detect the latest and greatest

pr
f viru
simply cannot be detected cost-effecti
anning algorithms. Fortunately, the antivir have responded, a
they have in the past, with an equally creative to the polymorphi
have virus threat. rt ing '
chnique known as generic decryption to detect even the m
polymorphic viruses quickly and cost-effectively.
05. The impr ovements that made vir uses mor e complex and diffi cu
detect wer e.
I) results of self replicating programs.
2) due to th

4
106. Accor ding to the passage, how long ago computer infection fr om
ir uses wasn't common?

3 omputer in mmon.
4 mputer date is not Spe field

,.
107. Under what situation th cunnmn; ru" ould no d cted

I) Employing generic decryption techniques


2) Using polymorphic viruse
3) Avoiding detection by mutating themsel
4) Using traditional antivirus scanning algorithms

author of this passage m


both viruses and antivirus techniques.
2) Evolution of virus •
Ising generic decryption to det
4) All of the ab

uzzy L ogic: The performance of a fuzzy l ontroller is generall


dependent on the choice of the membershi functions and the fuz
inference rules and the membership sets. This process becomes increasingly
difficult if the system is nonlinear or when the number of controller outputs
and

1 o determine membership functions.


2 e the proper membership functions.

110. The deter mination of the infer ence r ules and member ship sets.
l) is not at all difficult under any conditions.
2) is basically simple to do when the system is nonlinear.
3) is very difficult when we have many inputs and outputs to deal with.
4) tends to become really hard
-«se of nonlinearity.

numbers of
ily availabl • In
general, however, few single applications can fully ""
computational power offered b
diminishing return from the assignment of additional processors to parallel
applications, limited maximum application parallelism and fluctuations in
.1
ubmission frequency and in the execution time of applications. Such
provide the motivation for many parallel systems to allo
gramming to improve their perform
applications.
2) very limited use of the full computational power of Para lied systems.
,, unlimited exploitation of parallel system capabilities.
4) a diminishing return from the assignment of additional proc
parallel applications.

112. M ultipr ogr amming is many par all el ·r foffi lance.


l) embedded in / while it will degrade
ed in / and will yield an increase in
3) intrinsic i

4) generally found in / resulting in a degradation of

cience have expanded, two main group:


merged. her the
The pure or theoretical scientist does original research in orde
basic laws of nature that govern our world. The applied
practi · a. r:a

important that the other, however, for the tw

applied scientist finds the "problems" for th


ntist to work on. Let's take a particular problem of the aircraf
industry: heat- resistant metals. Many of the metals and alloys which
perform satisfactorily in a car can not be used in a jet-propelled
alloys must be used, because the jet engine operates at a m
emperature than an automobile engine. The turbine wheel in a tur
ithstand temperatures as high as 1.600 degrees Fahrenheit,
turn to the research metallurgist for the c
nd alloys that would do the job in the j
Dividing scientists into two groups -pure and applied -is only one
road way of classifying them, however. When scientific knowledge was
185

ery limited, there was no need for men to specialize. Today, with the great
cientific kn
s:'ion. And, with finer and finer
e more and more interrelated
entirely in of the others. Many ne
ecialties - geophysi I bi mple - have resulted from
mbining the knowledge

113. The appli ed scientis


I) does original research to understand the basic laws of nature
2)exploits the results of research in empirical problem

3) provides the pure scientist with the basic knowledge


4) is not interested in practical problems

physics and biochemistry have resulted in many sciences


3) Many sciences are the result of the development of biochemistry and
geophysics
4)Two or more
and biochemistry

115. The example given in the thir d par agr aph illustr ates how.
l) pure science operates independently of applied scienc
2) the applied scientist discovers the basic laws of nature
3) applied science defines all the areas in which basic research is don
4) applied science suggests proble

116. The pr oblem discussed in the thir d par agr aph call ed for
I) selecting the best heat -resistant metal from existing metals
2) developing a turbine wheel capable of generating heat up to 1,600 deg
nheit
3) developing metals alloys that would withstand terrific temperature
4) causing the jet engine to operate at higher temperatures

117. The temperature of 1.600 degr ees Fahr enheit is


I) reached by today's big-powered automobile engines
"that which the metal used in today's automobiles can withstand
3) that at which a jet engine may ope
4) that a which a jet engine bums o»

118. In th ample given, the air cr aft designer r epr esent t


l) applied 2) pure scientist
4) skilled mechanic

119. Finer and finer subdivision in the fi eld

l
2 ndence of all the various scienc
3) gre independence of each
4) the d for only one classification of scientis

120. " The horizons of science have expanded" means that


1
2 ·vor
3
4 rzor

" assage 29
has found that evaluating a numt ems on an identical task i
187

for promoting advances in speech recognition research. It therefore


appropriate to use common evaluation for the larger task of spoken
age understanding. The ARPA community selected a flight information
task for the comparison. The Air Travel Information Service centers on a -
relational database derived from the official Airline
ntains fligh (th
number was recently expanded to 4 rs can also inquire about som
other aspects of flights such as 2d and type of aircraft. Program
mnts include AT & T. n .,

i he community knew tha important to collect a large


body of training date that accurately refl pes of qu
Ii a

ommunity enterr
contributing to a common pool Data collection was initially done in a highly
simulated environment in which an "intelligent" wizard rephrased

queries so that a limited system could adequately, answer the questions.


rlowever, the wizard's role has diminished as system capabilities imp

1993, nearly 14,000 spontaneous sentences ha


+ore than half of which have been annotated with reference an
acili ment, training and evaluation.
ndards and Technology
managed the collected data and divided it into training and testing subsets.
Il participating sites used ining set to train their
and their natural -languag ing sub
icial ,, 1992. and mber
.a 'anguage W
published by Morgan
performance.).
1sy to define an evaluation metric for a recognizer, it i
much more difficult to measure system understanding. The commun
decided to evaluate understanding by comparin g a database answer from a
given system against that produced by a trained annotator. To achieve this
goal. researchers had to define precise meanings
phrases, such as "early morning" and "more information".
developers had to adhere closely to these specification to produc
ms to "
workable.

t of
context- independent sentences and another set hich
as the context setting query for the second. Howe he

queries in the order in which they originally occurred; some sentences wer
context- independent, some depended on one or several preceding sentenc
and some were unanswerable given the data -base's limitations. Thi
matches a real user system exchange.
ing system
• » preclude.
systems from using interactive dialogues: the user must initiate all dialogue
and the user and t
to augmen valuations wi that ar
more subjective. Such evaluations would have to be performed dynamically
in a "live" setting where the system's feedback to the user might strongl
influence the user's follow up queries.
ap aluating all systems on
a common d appropriate metric -realistically compare
performane ms under such circu be devised
hut we ar and conside
uch "end -to- end" evaluation paradigms.
189

21. What is effective for pr omoting advances in speech r ecognition


r esear ch?
I) Observing how many systems work on difficult task
2) Noting how the same system work on different '
3) Noting how different systems work on t
4) Observing how numerical systems work on a recognition task

122. What was shown to .


.
mm he community?
I)To gather many samples of questions to be asked by users
2) To build a big body and to train it by accurate data
piece to
4) To make a collection of large users of a train

123. How wer e all systems collecting data in 1993'


I) With the help of another system
2) By using an
'ia modem
"
4)In a semi -automatic manner

124. What did all par taki n


I)A train working with speech I
ubset of dat

ar
125, Why was it not easy to measure system under standing? Because the .........
I) system did not work like a trained set
2) meanings of many phra
3) system did not us
4) system worked against a trained annotator
26. What had all system developer s to do to pr oduce offi cially cor r ec
answer s?

4) Add specifications here in each case.

127. How can systems car ry out inter active dialogue


I) The user must set the initial values
2
dialogues

28. What is the dif fi culty of evaluation wher e the system's feedbacl
ollow up quer ies?
1 devised
2 tem must be set up
3, ., luat
4)Th to be evaluated on different data sets

e30:4

got mn
3usiness" without tremendous foresight, but th
ful. Starting with the Bank of America's Electroni
mnting (ERMA) system and combined with the
gnetic Ink Character Recognition (MICR
the I
the world, GE had the opportunity t
field of data processing. Succeeding developments a
the continuing reluctance of the GE headquz
191

the Computer Department competitively with other companies whose one


and only product was a computer eventually led to the sale of the operation
• poration. This is the story of ·1 +

remembered by the al manager o partment, H.R.


(Barney) Old-field.

129. What was General Electric trying to do with IBM?


I) share Magnetic Ink technology
2) Compete in data processing
3) Generate a coalition with IBM and
4

30. ith r espect to its computer depar tment, GE high offi cials
I ell with Honev well

perations well, in spite of their reluctanc


4 r to compete with singe I-product compani

131. How was GEs computer department, GE high offi cials.


I)It was very promising
2 beginning i uld n
1 Wa only produ
4) it wa to take er other part

first contact with a calculator came in the autumn


hen Ir ical marvel a ten inch slide rule, from th
oop Having mastered that device by my senior year, I was introduced
beautiful and delicate Coradi waveform analyzer. I was never sur
why it Worked, but it had a polished glass ball, a low tech mouse if you will
gimbaled in two dimension uch that it could be guided over a tracing of a
omplex waveform and, produce a frequency
anal picked up by an
accelerometer and reproduced on film by a recording oscilloscope. Later, as
tark Draper's Instrumentation Laboratory, I wa
permitted to manipulate the Vannevar Bush differential analyzer which w
used to solve non-linear differential equations associated with wing flu
of these computing machines, never compl
er workings, but became a reasonably skilled user.

132. The author expr esses that


1) He slides from a 10 inch slope
2) Rules can slide when buying something
3) He bought something called a slide rule
4) MIT Corporation was selling marbles

133. What dose the author say about his wor ks in school
I) He saw a waveform analyzer when he was doing his
2) In his senior year he was developing
3) Calculators were just coming ou
w a certain waveform an

134. How dose the author relate to computin


1
r without knowing their
developing analy
computing machines in his research

rt
computer-aided d gn
(CAD) tools has been instrumental in managing the complexity of I
and the design process. Currently, semiconductor chip design fall
into three distinct phases: be
D. With the rapid advances and acceptance o
areas. CAD vendors are beginning to offer specific to a design phase. "
continuing growth in silicon technologies and integration levels is also
nd-user systems on a single chip. For instance, the
Integrated Information Technology VCP chip for desktop video contains tw
and a digital signal processor), a memory array and a
graphics subsystem. The successful design of such a complex single- chip
requires expertise in di technology areas such as signal
neryption and analog and' designs. These technologies ar
ard to find in a single design h

the IC design proce ay now move thr and


and elect ign automati he
design has moved
ved through various pl n the same design '
a horizontal process in which different d uses may handle different
phase.

135. One ar ea that tool manufactur es concentr ate on is:


I) Producing complete end-user sy
2) Cad tools for behavioral synthesis

136. Why is the


I) Because it requires multiple disciplines for its design

2) Because it is a design for logic synthesis


3)B a digital signal processor

137. What is said about analog RF design?


I)The successful design of it requires the VCP chip
" I t is design requires a diverse technology
It is used in the design of the VCP chip
4) It cannot be handled by '

ompie equires tha

ign is handled by several design house


through multiple ASIC manufacturer
4 vendors perform the fabrication

'L HASHING: This paragraph presents wor in applied


geometric ently access of
metri rmation. Originated in the mid-eighties York
this method
emerged initially a ed obj
recognition in computer vision. Geometric hashing permitted th
or objects from a given model database in scenes, where additional cl utt e r

might be present and the objects might partially occlude each other. The key
observation was that a judicious ch
local inh
rigid #
'it th
metric data retrieval. Although
d object recognition is very difficult to sol general
195

rom. In fact, until recently, computer vision was included among computer
·ience's Grand Challenges. However, numerous successful applications
have emerged for specific tasks and constrained environments. In thi
geometric hashing approach, performance d not degrade linearly with the
ddition of new items to the database. n characterized
techniques. netric hashing's indexing techniqu
database while als
obviating the need y using a
redundan
handles the partial-occlusion problem.

139. Geometr ic hashing method


I)Is a method for moving geometrical object in a picture
2) Is a method for identifying geo
3) Carries out mode-based object
4) Is used for accessing large datab

140. The geometr ic hashing method is par ticular ly good when


I) Objects are being carried from one place to another
ieometrical shapes block each other in a com
ng geometrical computers of a vision
4) Local scenes are being described

2 ashing method
«ing geometry of relevant obJes
4) obviating the use of datab
: Turing,
as an English mathematician and logician who pioneered
computer theory and who contributed important logical
analyses of computer p The son of a British member of the Indian
. Turing " + ' Sherborne school and at King's
bridge. in the first decade
had attempted to eliminate all possible errors from mathematics by
establishing a formal, or purely algorithmic, procedure for establishing truth.
The mathematician Kurt I threw up, an obstacle to this effort with hi
incompletene howed that an
ystem is incomplete in th
truth n-decidable propositions). Turing wa
an algorithmic method of determining
un-decidable, with the ultimate goal of
d that' there canno

nce, that
, contain un-decidabl
illustrate this point, Turing p

possessed the fundamental properties of a modem computing system a finite


program, a large data-storage capacity and a step-by-step mode of
mathematical operation. Turing's work put to the hopes of Da
hi

nd the University of Manchester Automatic Digital Machine


ADAM). He also championed the theory that computers would '
capable of human thought and proposed a simple test, now known as th
Turing test, to assess this capability.
197

42. Alan Tur ing pr oved that


1) Is righ 2)May be ·e

3)ls an idic 4) Was profound

143. Tur ing was..........David ilbert 's belief.


l )Agai 2) Wrong
mplicated with 4) Akin to

.
144. Al an Tur ing had also som per ienc lIl «+·········
1 2
3 4

145. Pick the r ight sentence.


I) Godel's work was incomplete, though algorithmic.
2) Hilbert went to the same school as Turing.
t always UV VIV •

4) Turing was capabl inhumane thoughts.

HL: As a graduate student in ph at th


' ng the late 1940s
gral mputer (WISC). He wen
ud an industry leader in
mainframe design. Though Amdahl's work has focused on computers tha
erve hundreds of concurrent user, to has also pioneered techniques and
ideas that resonate throughout the industry. For instance, Amdahl
" :re the first to use virtually addressed caching, n
tandard in most architectures. Advocating unip
mdahl also propounded what became know
law. Beyond these contributions h mdahl'
the roller-coaster ride of right-tech busin
four d g IBM, Amdahl founded Amdahl tion
Trilogy orporation andor International and Colnmercial Data
where he is now chairman Amdahl was a
mput iety Computer Pioneer award. In
kert-Mauchl rd gnized him for hi
computer architecture, including pipelining.
d and cache memory." Amdahl'
omp arry
ard, the Data Processing mputer
an of the Year and a place in ocessing Hall of
ellow of

146. The man who invented I BM 's System 360 is nov


I) Unemployed, but heads IEEE computer society
2) Dead
3) Chairman of Amdahl Corporation
4) Head of Commercial D

147. Vir tuall y addr essed caching


1) Was invented by IBM under Mr. Amdahl
2)Was first used under supervision of Mr. Amdahl
as first utilized by Amdahl Corporation
4) Became a required standard in architecture

148.
l)a
about from this paragraph
awarded Mr. Amdahl for his pipelining ide
199

4) And Mr. Harry orked on awards for dahl

ard Commi ognized Mr . Amdahl for


I)Looking ahead into cache memory
2) Significant contributions in computer
3) His innovations in outstanding archi
4) Being a recipien

··ODELING LANGUAGE: The Unified Modeling Language (UML) is


intended to consolidate the experience of the object-oriented (00)
community by providing a set of semantic modeling concepts and a
corresponding notation that can provide a standard general-purpos
modeling language for expressing most kinds of models. Its main advantage
over other object-oriented analysis and design notations is th

number of methodologists and


d on yea
leading 00 methods. an be used
on real a
· is not a tiny language, bu
Smalltalk, Java, or needs to accommodate analysis and «d

large ny programming lan


embrace the sys
today (they are no longer in the future) tha
distributed and multilingual. We have made UML as simpl
these n ex ay. W
be straightforward,
of popular methods should learn enough in a day continue working
productively in UML. We feel that UML is better defined that any other
omparable modeling language. It has a self-referential meta-model
ose modeling language should be able to model itself) as well
as a built-in constraint language for defining non-syntactic restrictions. We
have tried to strike a balance between formality and pragmatism. People will
ind flaws, of course; nothing of this size is ever perfect, but that is n
different from most software products. We feel that the languag
and can be repaired and extended easily, if the need arises.

50. The author is mainl


1) Narrating the histo
2) Comparing UML to riented modeling languages.
arguing in defense of UML
4) Presenting a detailed obj of

151. The word " inllerently" as used above is closest in meaning to


which of the foll owing?
I) Apparently 2) Intrinsically
3) Internall 4) Interminabl

152. Which of the foll owing can be infer r ed fr om the text?


1) All kinds of models can be expressed by
2

53. Which of the foll owing is NOT mentioned in the passage?


I
2)UM!'
UML's ability to model concurrency and distribution
4) UML's shortcomings in modeling non-OO details

assage 37:
A mobile agent is program th can migrate under i n
£01

machine to machine in heterogen us network. In other words, an agent can


suspend its execution a
d state to
machine, then resum n the new machine. By migrating t

location of an electronic resource, an agent can access the resource locall


and eliminate the network transfer of all intermediate data. Thus the agen
n if network conditions are poor or th
resource has a low-level in-a-c.
lobile agents move you away from the rigid client/server model
toward a model in which programs communicate as p
clients or servers depending on their current needs. Existing applications f
mobile agents include commerce, active electronic documents and mail,
trieval and workflow. Potential applications include m
distributed applications, particularly those that must run on di
platforms or that must in

has four levels. The lowest level is an API for the available
hanisms. The second level is a server that runs at each network
rmed by the server include: 'Keeping track of the agents
running on its machine and an
--epting incoming agents, authenticating the identity of their own
and passing the authenticated agent to the appropriate interpreter. Th
elects the best transport mechanism for each outgoing agent.
.Providing a flat namespace for agents and allowing agents to send
messages to each other within this nam des th
network location of the agent. The server buff and
he best transport mechanism for outgoing messages.
Providing access to a nonvolatile store so that agents can back up their
.
1: ores the agen

nsing, group communication


n- independent addressing and access control -ar
ide by agents. The most important service agents in the Agent
rototype are resource manage agents" which guard access to critical system
such as the screen, network and disk.
The third level of the Agent TCL architecture consists of an interpreter
r each available language. Finally, the top level of the Agent Tel

154. Which of the following statements is a correct description for agents:


l) Agents run on one machine but can answer queries about their statu
gents provide a framework for incorporating languages.
gents are a kind of interpreter.
4) None of the above

cutin:
agents ar e r estor ed?
I) Fourth level 2) First level
3)Third level 4) Second level

156. Which of the following communication models ar e used by mobile


agents?
1) Strict Client- 2) Connection-less model
4) Distributed model

157. Authenticati on of agents is do by.


l)Agents themsel 2) The security modul
3) The state modu 4) The server at each network

assage 38:
The Power P
· Intel famil
±0.

lining, on-chip instruction and data caches and the capability for issuing
multiple instructions per cycle. The PowerPC has all of these performan
nhancing features. The next paragraphs detail the e
and
many Performance-enhancing If we
ts and addressing modes, the PowerP architecture ha
mplex features than those found in m designs.
following:

ration on floating-point operands.


In the index addressing mode, the ind 1· upda

computed effective address value as a side effect, leaving


value unchanged.
operand
to between the memory and the processor regi
nditional branch instructions decrements a counter and
value has reached 0.

use ful in performing


requires in signal processing tasks, processing lists
aving and restoring processor registers on procedure entry and exit and
ficiently terminating loops, respectively. Using these features yield
shorter programs. PowerPC designers have incorporated these features
without unduly compromising the efficient, streamlined flow of simple
pipelined instructions that is a basic property of RISC machin

ture is the 601 pr


uce h tw twc
architectures; as such, it implements a superset of POWER and Power P
instructions. This allows the 601 to run compiled POWER machin
grams a ell as power PC programs. The second in the

Power PC 601 Pr or he 601 r chip, containing 2.8


in lat
is a 32-bit processor, intended
multiprocessor systems. Different versions are available with proces
cl ock

has a 32K-byte cache on the processor chip for


holding both instructions and data. The cache is organized in eight-wa
·ts. There independent execution units are provided:
unit, a floating-point unit and a branch-processing unit. Up
issued for execution in a clock cycl
operation. The 601 has four pipeline stages for integer instructions and siv
r floating-point instructions.

or also has a
'th. Intended for desktop and portable machines, it

- about 3 watts
:ution units provided can opera
issuing and control hardware, which can issue up to thr
r clock cycle, is somewhat more complex than in the 601. Th

I techniques t high

2) The Pentium and more enhanc eatures compared to th


he P6.
3) The PowerPC has the P6 ha
owerP.
4) The PowerPC and the advanced process rs in the Intel family utili7
similar techniques.

159. Suppose that we intend to mult iply two oper ands and add °'

o the value of a thir d oper and. With equal clock r ates.


I) The Pentium and the P6 are the best for this purpose, because they ar
ble of issuing multiple instructions per cycle.
The PowerPC calculates the result faster than the Pentium and the P6. at a
peed
equal to
3 ter than other RI

160. Which of the followi ng featur es of the Power PC is useful in

ter minating loops effi ciently"?


I) Having the Multiply-add inst
a class of conditional branch instructions, which decrement a
counter and then branch th
has reached.
pecial index addressing mode and the I
instructions.
4)All the ab

01 and the Power PC 603 pr ocessor s, w


an observ e a maj or differ of:
I) The number of independen
2)T1
The number of instructions that can be issued for lock
4) All of the ab

processors are:
1) 32 bit 2)16 bit,
3) 64 bit pr Or 4) composed by two 32-bit processor

163. Which of th
I
2 r
of processors have multiple function units
4) The Power PC architecture has a purely RISC architecture

164. Which of the following processor s can issue up to three instruction


r -clock

603 r

3)601a
or in the PowerPC family

39:
a 4

Ultrasonic is the term used to describe the study of all sound like wav
whose frequency i e the range of normal human hearing. Audibl
sound frequencies extend from about 30 to 20,00
cond). The actual waves and the vibrations produciny
late as 1900 ultrasound wa
with a few specially made whistles; by 1930 it had become an interesting but
mall area of physics research. In the 1960s and 70s. however. it '
z07

far-ranging instrument for fla


a rival to the X ray in medicine and
und-signaling. The range of frequencies availabl
o millions and even billions of hertz (megahertz and

as waves-hunders of meters p f meters per


in solids and 1,500 r 5,000 ft/sec) in water. Mos.
th
mncrea with
that ultrasonic waves are damped far mor
rdinary Sound. For example, an ultrasonic wave of I
quency passing through water will lose half of its intensity over a

) through absorption of the energy by the water; in ai


r which the intensity falls by half would b
audio frequency of 20,000 Hz, the corresponding
distances for water and for air would be about 50 km (30 mil) and 5m (16.5
).
The intense small-scal ibrations o ltrasound are also used
industrially to shake dirt metals. The ultra
transducer, by removing oxides from metal surfaces, aids in the processes of
nd welding. Plastic powders can be molded into small cylinde
by similar techniques. Ultrasound is further used in the atomization of
liquids and even metals and in the precipitation of smoke particles b

Ultra

in surgery and ' xample.


nt into the body, without the nee
nd gallstones.
ide ly used in medical imaging for the diagnosis of dise
tates and the evaluation of internal organs and structures. Becau

handheld
transducer is moved across the part of the body to be scanned, coupled to th
kin with a gel or liquid to prevent air from interferin
und waves. The painless procedure takes anywhere from a few minut
to an hour.

165. Ultrasonic refers to sound lil


I) ls audible
ibration 4 20.000 Hz

166. Starting at about 35years ago, ultr asonic was used for the first time for:
I) Detecting flaws. 2
3) Researching physics tools 4

167. Other uses of ultrasonic includ


1) Used alongside with X-ray
2) Frequency range detection
nd signaling
4) An X-ray rival

168. Sound w.
1 ot have the same refraction property
ery differently
' Are different in the way they lc

169. An industrial use of ultrasonic wav


1) Shaking dirt off deposit
209

4) Liquid if

170. Based on th
sur ger !
D)It
2 ibration

171. What makes ultr asonic useful in obtainin


body or gan?
I) Because sound waves scatter easily
2) It propagates though internal "

Passage 40:
IQ or intelligence quotient is defined as the ratio of a person's mental age to
with the ratio multiplied by 100 to remove the decimal.
hronologic is easily determined; mental age is generally measured by
me kind o tandard test and is not so simple to define.[PI]
In theory, a : measure in individual'
ability to perform intellectual op " reasoning and problem
solving. These intellectual operations ar considered
intelligence. [P2]
In practice, it has impossible to arrive at consensus as to which
f intellectual or intelligence
vithout cultural bias, which is to say that
any IQ posed ha en shown to reflect the culture of the test
k Ir would, it follows, higher c
a test than test takers from a different culture with equal intelligence. [P3]

172. What type of infor mation is included in the fi r st par agr aph?
l)an argument 2)a opinion
a definition 4)a theory

173. Which paragr aph descr ibes the appli cation if h al wor ld?
1) Pl 2) P2
3) P3 4) none

174. What is the next par agr aph discussion at the end of passage?
1) 10 history 2)types of I
3)1Q scores 4)examples and samples

The United Stats does not have a national university, but the idea has been
around for quite some time. George Washington first recommended the idea
to Congress; he even selected an actual site in Washington, D.C., and then
left an endowment for the proposed national university in his will. During
the century following the Revolution, the idea of a national uni
continued to receive the support of various U.S. presidents, and
f the
present century. Although the original idea has not yet been acted upon, it
continues to propose in bills before Congr

175. I n the last line, which item ' he wor d Pr opose mean
l) ask 2)suggest
3)cour 4) present
±11

76. Accor ding to the passage, the nati onal


I) has been around for a while.
2) do.
, is a very recent idea.
4) is an idea that developed during the present century.

177. L ook at the pr opone it in the last line


refer s to.
1) the cause 2) the beginning of the present century
4) the original idea

rg T do which
of the foll owin T mentioned)?
I) He suggested th ncep
2) He chose a I or the national uni
3 r a national uni

179. To impr ove the data handling and addr essing capabilities of their
pr oducts, micr opr ocessor supplier s intr oduced ......................chips in
ear ly 1980s. l) expanded 2) progre
4) improved

180. A useful gener al-pur pose computer nor mally has some type of auxiliary
+or age mechanism for long-ter m............................. of data or pr ograms.
l)archiving
3) compiling 2) operation
4) manipulation
81. The number of components which can be ......................on one chip
deter mines the complexitv of the cir cuit. l)paved
2)evolved
3)stacked 4

single chip.
l 2) advancemen
3 4) impr

Part 2: Read the following par agr aph and select the cor r ect choice for
the missing par ts from 183 to 190. Mar k on your answer sheet.

.ather than thinking in terms of translation or interpretation, it is often mor


·.........(183) to imagine the ..........(184) of a ...............(185) computer or
·............(186) machine whose machine language is L2. If such a machine
could be ......................(187) cheaply enough, there would be no need for
having LI or a marching that ....................(188) programs in LI at all. People
could .....................(189) write their programs intheL2computer
and ha»
av·cute them directly. too is L2 i
(190) to an still
write programs for i

183.
l- concerned
3- convenient 4- ponen

3- entity
85.
I- hypothesis
3- hypercritical

l- virtual
3- practical

3- constructed

l- experiene 2-exempted
3- exclaimed 4- executed

189.
l- readily 2-aptly
3- simple 4- nervously

190.
lexpan
3- might 4- dear

ar t 3: Choose the cor r ect wor d in the following sentences (191 to 210)
191. The fir st windmill s were used for ........·... in Persia in about the 5th
· their use had spr ead thr ough Europe b
l) migration 2) ITigation
3 xhaustion propagation
proposed, most modem machin

2
propel 4

193. There are other applets that enhance web pages in ways that are
more useful than lava lamp. These are called "worker" applets
oecause they labor unseen behind the flashy of web pages.
1) fame 2) color
3)lamp 4)facad

situations where reque


l) eliminate 2
3) sustains 4) dri

) of Pentium as a separate memo


d probably rooted in the behavioral description of the
In-Circuit ) mode.
l) absurd 2 d
3) adamant

ow do vou
know it will ation u wa
l) disrupting 2)jumping
3) undoing 4) proliferating
±15

l)a well-known 2)a,


3)a handy 4)a skilled

198. Computer s ar e machines, designed to pr ocess .


······
pieces of infor mation. l)
electronically, special, preparin
2) electronically, specially, preparing
3) electronic, specially, prepared
4) electronically, specially, prepared
i ll often make ......·... about e:
199. System anal as to
thehelp
operma!
ations mor e effi cient.
2

200. Business in differ ent cities oft en communicate with each


other via their computer .

201. The national website announced tee¢see¢eeee

l) haphazardly
3)advent 4) frail

202. Tr ough his speech, the engineer •••••••••••• r o the pr ogr ammer s.
l) allured 2) celebrated
3) altered 4) modified
203. Chips are more ................
1) baffling emped 2
4 anding

l) resiliene" 2 A

elinquish 4) puzzling

205. The report made some ........···... about the natur e of the conflict.
l) crucial 2)immense
3) prosperous 4

206. The .................. Of gr ammar ar e taught in all


l) amenity 2)hazardou
3) minuscule 4)rudiments

207. Which one is not in the same category :


l) anticipa 2
4

208. Which one is not th nonym of others:


1) agil 2) swif
nimble 4) critical

209. Which one is different from others:


1) tiny
3) titanic 4) enormou

210. Which one is the anto of other s:


1 2) sophisticated
3) intrica- 4) fragile
APPE

h philosophy to server setup and


s phil
erhaps the most critical differentiating factor between the twc
perating : ms.
'Windows encourages you to use the familiar interface, which mean
administering Windows Server 2003 at the server itself. Linux does not rely
on or encourage local use of a graphical interface, in part because it is an

l ·urity risk • ·or


rver tl u to use the graphical interface a
1milar
t the that server t urity holes.
nv server that you to administer it remotely removes this risk.
I u inux server remotely from a desktop
unt, a browser flaw nly the remote desktop use
not th his is why a browser security hole in
Window 2003 us than a browser
rver
ext 2:
nom1 volution similar tc
entered the world
to the information age and has exposed or has come over many .
mic, social & cultural of man's life to profound changes. of

ith each other and a


and g
d rapidly from their ·hich ar
paper documents and are moving to exchanges through enjoyment from
ystems on the base of electronic information.
lectronic learning contains all learning which is accomplished
through Internet or computer and are related to the use of computer
o network with the aim of presentation manage
upport of learning which usually are performed independent
tume a
-learning apply to presentation mplete lessons which in th
f learning rrom n t
.
arnmng serve
.
accomplished online. dh
rnIc

me companies which are doing on the base nic learniny


are reckoned new type of institution which ho learning

world is base in li
human bein ars ag
aused advancement in different sciences. In
±19

that days publication of books and distribution of it wa ry difficult and


low movement and it caused to slow development of sciences after
implification of this term growing of science got very high tend in last
two/tree decades human' change information and if
background to de pment and kn
alizing this information via internet nowadays
an get every kind of info by paying low m
background and infrastructure in modern world, education has been simple
considering that info resource rroctive role in thi
way, matter of digital library ha ha
ssed about main and sub-ba a digital library.

:4:
T ill Joy recommended that think not of one worldwid
web. bu rates and offering
the digital nervou
ystem 's consider how'
influences each ' th

and taping on th ""Veb is the mobile web that we carry


ith us wher f mobile phones, pa
flowing in from the digital

Webs. This will have profound impacts not only for scientific and industrial
research but also for consumer applications.
he Far Web is th ss from afar
smng
.
lack c
r, believes that the Far Web will expand to include virtual world

ensory and actuarial devices. In other words ill soon be plugging


mnt of the digital nervous
nd simulated adventu
The nition and
a-.

me more and more capabl and


-
he voice command

5
mpany n n internal communi

deli
and o
s in each
area and mak ·ially activities that

n organization nervous system has parallel ith our human


nervous system. Every business has some proce
the
wo primary purposes in developing businc.,
understandings. It extends the individual's capacity for analysis the way
machines extend physical capacities, and it combines
individuals to create an company intelligence and act a
together: a digital nervous system seeks to create compan 11
individual llen rve the customer.
digital nervou ystem gi
ability to learn thing they would not otherwise have. To begin creating
a digital nervous ou should fist develop an ideal picture of the
n you need to run your business and to understand your market
nd y you need to know. Develop
a list nportant questions for your business. Then demand tha
y ystems r
do this, develop one that will. If you don't, one or more of your
competitors will.

.
Ing n organization will have the most output if it has a
nervou em which can send the information
need. A digital nervo a un1ty and
processes of an organization by making flo ng
e trading and business parts promote quickly in bein
vital part of your
you to g nd learn vour
something.
digital nervous system provides the opportunity for ideas and
mnn quickl
informative a f activity was fir
nr op n usually is a

economic report which is fixed and does not change. Bu


cs another kind of information is active. Informative activity

with idea that gaining and tran g information i


d
You should make your companies' information availabl
who can use. Providing accurate, precise and useful information for the
is one of the characteristics of a good digital nervou
ystem. They need accurate and useful data for those are the ones who are in
to lead the company and they should not wait for higher authorities t
to these days there was no direct path for McDonald
lling data. Nowadays McDonald use an
information s process selling information in all
whatever is sold, so h
his selling's not supposed information.
d digital nervous system is th
I ideas and suggestions which are offered by it's mid
un
can suggest ideas in detail of how to do the works better and this makes them
xcited.

faced with a main t.

budget deficien., '


fundamental change, to adopt themselves to th
here is a possibility that th
with the job of some of the te
which have the virtual nature. which show
chan 'hich usually occur
un ts.
Computer communication has the ability of providing th
ssibility of learning without limitation proportional to th
and needs. Thi: mpare to the current usual
teaching method which ignores th tudent's needs and places a group in a
and place, is a fundamental way. From the other side, there is a
omputer communication technology affects the
tructure in educational organizations and minimizes physical attendance.

This technology connects many users at the same time and requires further
research and adaptations. Issues such as: advancing internet and using World
:, w'·b in all aspects of every day life, is the most important success in
ars. its uses is to
distanc ucing virtual university. P nd
is one of the essential ele in th
here ar wavs to examin

and grading.
lore about these kinds of evaluation through internet will be explored

Web i
In this proj

is time limit for or


maximum allowed time t ct is written in visual
basi

Text 9.
build mpanies like 1BM and that designed it t
build artner group, that produ
nd dealing in 2001.
ld represent advance wa Ll

connection in world.
ost of companies that with this way seal business informati
write this data with XSI that wireless tools can use them. Most of companies
otorola is one
diagnosis language technology.

.
v1a
aying or saying-writing.
dQ his wa

arch as a sample is dealing good


that this mak mple this way can help an
employee to give com
f these meth
relationship is possible by phone connection in network. Big companies have
been using originality ways to expansion user data access via labor and
ireless tools like mobile in connection CRM. like Sieble system.
'
In . d curit
rvices in Interne'
nd credit and ption (ESP) or
via protection with capsule tha n protect credit and secret information
both.

.
1gno errors. In this language upper and lower cases are same. Usage of end
important and briefly, simplicity of this language makes it

ut simplicity of HTML limits i


tted, they don 't
contamn. from information in her case i
225

re about l and upper cases and

Whereas HT
and suffix asing it ome

. In the fins
L with the same tag and values.
B isn't only for web pages design, i

is a languag create others. You can us


Markup Language and for forming and formatting your documents.
,·al Markup Language that in term called an application XML program
'in tags that explain its data. Now look at the
defines a data, other works would possible to use that. Software with ,+

can design such only work with its information.


Instead of have been astringe in a web page, the label
informati ary, but p

mplete notice to upper and lower cases, end tags and other detail
that HTML user easily ignore them. Howe rely and pernickety
characteristic maybe make to be imagined tha
design personal web pages. But the special power of it le web pag
designer managed data in large scale.

the primary mi
re of
culty to f
teams that address issues that are relevant to both industry and academia.
This approach to applying rigorous research methodologies to solve some of
eates generali
pecific company but to all our
m ly.
The between a
particular Founding or bers of th
hese pr, cipation from the Sponsor.
r management is working directly with
aculty to st strategy tor
transformation. s are addressin
as UP n and Intel Corporation.
The kn process is then
disseminated are daylong workshops; a
-day annual sponsors conference, bi-weekly lunch seminars, site visits, and
orking papers, research briefs, newsletters and other publications.

Th utures Program (CFP) is a partnership between


n1 industry at the forefront of defining the roadmap for
industries. CFP's mission is t

help our industry partners recognize the opportunities and threats from the
changes by understanding the drivers and pace of change, building
technologies that create discontinuous innovation and building th
or such innovation to be meaningful to our partners.
.h industry is witnessing emerging and
destabilizin n industry structure built around centralized
hallenged with i»

manv mn mnd vice versa. Just as the In


.27

wave and Digitization of Multi-media were transforming events, thi


trend in communications is likely to have an even greater impact on industry.
An example of this trend is VoIP, where control over a centralized switching
application is moving to the edge of the network. In what ways will shifting
the network and

transformation is important, equally important business drivers in th


communications industry can accelerate or slow this process. Drivers includ
widespread availability of broadband infrastructure, role of regulation, rol
or enabling capabilities such as privacy and security, and effective business
nd rights management for compani
include alignment across the communications value chain for speedy rollout
f new services.

nd interdependent- th
enterprise nterprise." Disruption
" can dramatic and often
mnexpected impacts upon all the organizations involved. In recent years, a
of terrorism have introduced new and dangerous disruptions to business and
ociety. Although we often think of national security from a governmental
and m i li t a ry p e r s p e c t iv e , b u s in e s s e s play an e x tr e m e ly important
much of a nation's infrastructure is run by the private sector.
(including
study materials), and facilitate discussions amongst academia, governments
and business on these important topics. Several current sponsors hav
provided seed funds for this new area of research, and we seek relationships
with other organizations to further develop both thought leadership and
practical strategies around security of the extended enterprise.
ext 14:
While

.
·rv Ice
h
onlin okseller that launched its site in and quickly took on th
nation's major retailers. In addition to online retailers, B2C h
include services such as online
1ch a
ry.
ome tough times, particularly after

the technology-hea 2000. In the ensuing dotcom


arnage, hundreds and som
experts predicted y r online retail ventur ince then.
however, shop-I>

entity theft, they spent


nd the fu
2010, consumers are nd $329 billion each
rR re, the percentage of
hopping onlin rom 39 percent thi
nt in 2010.
long time, howe mpanies have had a hard time making
dynamic and engaging enough for consumers to want to spend
time on the site and actually spend their money there. That's getting easier as
more and more Americans are connecting to the Internet via broadbana.
.ith
.
usIng
229

In short, although online commerce still represents less than si


all retail sales, its growth and future prospects show that it has
inally become as established and mainstream as a trip to the local mall.

because the stock prices of some of the early pure plays went
through the roof. In the late 90s, dotcoms like Amazon.com and eBay -
which were quickly gaining in size and market capitali
to traditional brick and mortar businesses. In man
- they had th
of maintaining physical stores, little inventory, unlimited access

to capital and little concern about actual earnings. The idea was to get big
fast and worry about profits later. By late 1999, Amazon had a market
pitalization of close to $25 billion, eclipsing some of the largest and mos
stablished companies in America.
mart and Wal-Mart - hoping to cash in on th

. But many never made it to the initial public


pring of 2000. Almost as quickl
dotcom phenomenon took over, the hype over B2C e-commerce di
along with the crumbling Nasdaq. Funding for Internet ventur
dry up and maj mpan1e reel in their bringiny
k under rate fold.
mpanies that spun off their e-commerce operations as separate
businesses were at a disadvantage when "multi-channel
popular in 2002. Those that kept their web operations

l
had a much easier Integratung
ith the rest of their brick and mortar nd systems.
h companies w able, for example, to check local-store
inventory via heir customers to buy online and pick
1p and re ontinues be an
important initiative touay.
Amazon and eBay still dominate online retailing.
growmn
about tl
strong showing over the
2005 holida .,
ailing Amazon and aid. Target uv and Circui
behind.

The world's leading expert on the global software industry and coauthor
seller Microsoft Secrets reveals the inner workings of software giant

like IBM, Microsoft, and Netscape and shows what


nd manage a mpany - in good times and bad -- in th
ly competiti
In th not th
technology, that determines success or failure. Thi
glamorous start-ups have unhappily disco - 1

the well-documen readable and revealing


f research

and consulting with software producers around the world.


Cushman builds on dozens of personal experiences and case studie.
o show how issues of strategy and organization are irrevocably linked with
s, and demonstrates that
is vital to success. At the hear
ushman p
ramework. He argues that companies must adopt one of three basic busin
models: become a products company at one end of the strategic spectrum, a
.
rVIc mpany at the other end, or a hybrid lutions compan
.1n
between.
he author describes the characteristi the different m

as well a
mn goo. find invaluable
treatment of software development issu ranging 1rom
architecture and teams to project management and testing well as twc
hat it takes to create a su tart-up.
ighlights include eight fundamental guideline votential
ftware winners and
knowledge, of ten start-ups that have met with varying degrees of success.

17:

rules, they are generally open


them. Private exchanges are run by a singl
ith established suppliers and cu

Which one your company uses depends on what you want to do. If
you are buying and selling commodity products, public exchanges can be a
good venue in which to find low prices or identify new customers. They'r
also becoming a popular way for a company to unload excess inventory. In
industries, however, suppliers have been reluctant to use public
buyers will aggregate their
n public exchanges include purchasing through requ
buying through catalogs and auctions.
ompanies that use private exchanges prefer them for the closer
nline relationships they can have with preferred customers and suppliers.
o think priva
trades ar
hanges to trade proprietary information
like supplier performance metrics and sales forecasts in addition to o
and invoices. Companies also use private exchanges to establish central
ntrol over purchasing through contracts with established suppliers.

ext 18:
tart with buying so-called indirect supplies like pencil hairs and cop
paper. Most companies start here because it's easier t t up an onlin
catalog of approved office supplies than it i
pecially engineered parts and materials. Plus, you're not a day-to-
day operations while you get your feet wet. While the p n't be as big
used t
it can be significant. The Burli
'· railroad company lopped an estimated 3 percent to 28
and saved money internally by automatiny
purchase orders.

our cost of sales and service. Greensboro, N.C.-based clothing


'anity Fair and Delray Beach, Fla.-based office supply vendor
ilt their online purchasing sites because custome
ext 19:
It's marketing speak for integrating your supply chain, and it's a vision of e-
nirvana. You're not just sharing blueprints or your latest sale
you and your trading partners are giving each other real-time
P, product design, inventory and other systems. Compa
that are doing it say it helps them get new products to market faster, redu

demand.
fully, you and your partners each need
, plan to share, and a
way to deliver that information electronically. That can be a big hurdle when
many companies still do a lot of business by phone and fax. The Goldman
ndustrial Group, a Boston-based manufacturer of machine tools for th

ystem upgrad d for collaboration. II.


the value been
confide partners with 1 ear onli
lt in lavo'

efinitely the units that do purchasing, B2B e-commerce can drasticall


change how buyers do their jobs, especially if your company is one that still

d to be involved with projects that affect how you r and


rders from customers. your
ther department ndiny
ality you're building.
uppliers, distributors and customers, and mak
mething in th or them. B2B e-commerce doesn't onl
change how you do business internally, your partners have to change too.
nd unless you're the 900-pound gorilla in your industry-and sometimes
ur way.

·t21.
actly what you need depends on whether you're a buyer or seller, whether
you're dealing in indirect or direct materials and the extent to which you're
integrating your supply chain. Elements of a B2B system may include
for generating purcha
e , uilding and mant.-: '> T ' '

and processing orders. Depending on what you're trading and how, you'll
want to look for specific features that support your needs. Some of these are
online negotiation capabilities, dynamic pricing software, support for
international transactions and the ability to generate and process bill
2¥ ou'II need
u» with
logistics and other application

# # "
y chain 1

st is also relative. In
ou want to integrate with trading partners, th to spend.
Office Depot, with $11.6 billion in sales in 2000, put it on the Web
r $500,000, and pays $5 million
2001 Forrester Research report pegged th

wWw.ProzheDownload.Com
22:
many people, technology planning is just another name f
ng-term financial planning. While this is a somewhat par
£35

planning. Traditionally

regardless of whether an institution is large or small, public . The


lyze funding needs, gain
ut of sync with the wind unity "
techn gical innovation. Anecdotal evid l •
an institution has dotted n capital
funding for a campuswide network, the envisioned technology may hav
changed sufficiently to render the plan obsolete.
this problem is to earmark a significant amount
ital resources for technology and allov
required. While it may not be possible to justify future
detail, good planning should permit an institution tc
ial resources that it can and should devote to technology for a period
further refinement of this approach is to create a "rapid
p logy perating budget.
- -

.., ed fund rry forward ac I


lish the typ ary flexibilit II
technical in user demand
infrastructure modification, and technology innovations.
Fungibility can also be increased with respect to staffing. Typically
ruggle with the choice of either outsourcing or providing
internal support for technical he problem of recruiting and
retaining qualified staff -- along hanges in required skill-se
es toward selecti
having
technical employe for more than three year me institutions are

++rnover rate remains high, it occurs with greater predictabilit nce with
it enables the in modify
ur mn
ense, a way of introducing fungibilit
that is largely alien to the traditions of higher education and that mal
only in the context of a job market as competitive as that of high technology.

.t 23:
year around this time, Americans lament our low voter turnout rate-
44.9 percent in 1998, putting us 138" in a list of 170 voting nations. Thi
plains the growing interest in Internet voting, which promises to do for
democracy what Amazon.com did for books. Aside from making voting
uld

tons (many private org


notabl conduct internal el
aliforia, Florida, Washington, Iowa, Minnesota
and ' all examining online voting. In California, th
ampaign for Digital Democracy is llecting digit
. ·.:..: that would legalize Intern ing-though
legally valid, at least not yet. Software
e-voting wares have held mock online elections in Iowa, Washington, and
'Virginia. And today, under a pilot project run by the Department of
ting Assistance Program, 350 military personnel posted
as will vote online. If the test goes well
tuallv making onlin vailable for all Americans living abroar
: 37

-voting isn't nearly as radical as it sounds, for two reasons. First ot

all, a large and growing proportion of Americans-about 50 percent of


Washington state's electorate and a quarter of Californians-already mail in
their votes via absentee ballot. Oregon, the most aggre
bolished polling places entirely and n nduc
xclusively by mail. Local jurisdictions in 15 otl . hav
all-mail elections too. Whil
they're based on ou can send pollin
document that wil as your pr

dependent u n making
processes that a particular organization uses. In
have to be made on a daily basis. These decisions range from small to large-
hem and

pany
in th 1me and
of this machine to clarify their needs as well as th
ho research and acquire the copier. The abilit
f thi employees' needs decides the impact of this decision.
An mple of a large-scale decision would be determining what
h
time and energy of the individuals who research the consumer market, a
well as the individuals who try to successfully develop and launch th
product or service. This decision has the potential to make or break a
company depending
th decisions and the pr
individual level. M
aking 1 performed
be done so with increasing frequency given the need for high performance
organizations in a competitive, global market. Group decision making i
defined as the process of arriving at a judgment based upon the input of
multiple individuals. This paper focuses on the group level
making.
s In
as well

ablishing group decision making proficiency. This statement is n


intended to mean that the use of a group decision-making model is a panacea
r group and organizational processes. This statement is merely intended t

mean that a group decision-making model when used appropriately can aid
in the functioning of the group and the organization.

2.3.
The first model is the rational model. This model is based upon an economic
decision making. It is grounded on goals/objectives, alternatives
quences and optimality. The model assumes that complete information
1e made is available and one correct conception of
problem, or decision to be made can be determined.
assumes that th
any alternatives with goals and objectives in mind.
then evaluate the consequences of selecting or not selecting each alternative.
he alternative that provides the maximum utility (i.e., the optimal
vill be selected. The rational model is the baseline against which
llison. 1971: Cheshin
... 39

example of a scenario using a rational model is an executive

group of a company trying to determine which consulting firm t

order to implement a business process reengineering (BPR) effort. Th


der in its industry, and
he b accomplish this hrough re-
. .
ngmneermng. nt consulting 3PR services.
ach fi has advantages and disad ges. I ne execuuv
appr ring how the firm will
mpany to meet its objective. Based upon this evaluation, th
the consulting firm that provides the best means for th
ompany to become a leader in its industry.
The most salient advantage of the rational model is that it utilizes a
logical, sequential approach. Decisions are made deductively by determining
the goals or objectives to be obtained, evaluating the potential alternative..
based on the information at hand and choosing the optimal alternative. In
other words, the model is simple and intuitive in nature.
alient disadvantage. The model
th
° mas, l imism may not be totally r
individuals involved in "h

models into such

The second basic decision-making model considers the preconceived notions


that decision-makers bring to the table in the decision pr
del. In

regard t d by and
wn needs and perceptions. This pro
among the decision makers in order for each one to try to get his or her
perspective to be the one of choice. More specifically, this process in '
each decision-maker trying to sway powerful people within
his or her viewpoint and influence the remaining deci n-mak
1971; Cheshire & Feroz, 1989; Lyles & Thomas, 108 chneider

urthermore litical model does not involve making full

the political model perates based upon negotiation that is often


influenced by power and In fact, information is often withheld in
rder to better maneuver
withheld and subsequ iewpoint is not a k
aspect of this model.
An illustration of the political model in action is a decision to hire a
new manager for the Purchasing Department of a company. A group
the Human Resources (HR) Manager. staff members of th
perations (i.e., wh
ing Department) must make the decision among three
for the position. his or her own needs and
rtain job candidates.
t person to the job, but would
not mind if n innate liking for and understanding of
f HR would help decrease the cycle
. The HR Manager would
lik
r the position, but would prefer someone who do
manage like their previous boss. The Purchasing staff would like to hire the
peration

rector's decisions. The irector would like to hire the third candidate.
gend hey need
neg
perations wh I.
f the Purchasing
approach would meet his needs as well. Ther
nd candidate is hired.
The advantages of the political model remains
e manner in which the
nd i an mmnum1ze nflict. Individuals will always have their
personal biases and agendas that influer
acknowledging this fact in the decision-making process, potential problems
and conflict can be foreseen and minimized. Conflict is also minimized b

in lin
al model has the advantage of emulating
the real world i.e., a cycle of bargaining related to personal
agendas), thi disadvantage, because the best solution or
the nature of bargaining and
maneuvering lding information and ure) can produc
ng-lasting and detrimental.
individual: the d n may
ext 27:
In contrast to the political model, the third basic model of decision making i
more structured. This model is the process model. With the process model
made based upon standard operating
established guidelines within the organization. Actions and behaviors ccnr

in accordance with these procedures or guidelines (Cheshire & Feroz, 1989:


llison, 1971).
lly, the organization of past, present, and futun -+-
ll a his model (Cheshir
llison, 1971). The organization of the past, present and futur
important, because they can be used as a consistent foundation for decision
making. nsidering these time events provides further refinement of the
guidelines that help to determine outcomes.
nformity is an integral part of the process model since it is th
is dealt with during the
tial effecti or the
results of a decision
conformity should no a
lid foundation. In thi h

An example of a scenario involving the process model of decision


making is promoting a Marketing Represent
level. A group comprised of the
ompensation and ·anager me promotion. Sinc
Marketing seen exemplary work
rketing
their
ut to the Marketing Manager that company policy mandates that an
employee can only be promoted one level at a time. Additionally, nc
precedent has been set to justify deviation from this policy. Therefore, the
arketing Representative is promoted to Marketing Representative II.

can model.
is most appr, jud e where the
techn participants fluctu
are inconsistent and not well
he arch 72: 1987; Schmid, Dodd &
ropman
n such an organization, an opportunity to make a decision is
described as a garbage can into which many types of problems and solution
are dropped independently of each other by decision-makers as
and solutions are generated. The problem
n-
hat th
alignment of components
o complete the decision. These components are the combination of option
available at a given time, the combination of problems, th
lutions needing problems, and the external demands on the d
n, March & Olsen. 1972: Lovata. 1987: Schmid.
Tropman
An example of the garbage can model is a company department
trying to deplete its budget before the end of the fiscal year. This department
it. Two weeks after the end of the fiscal year, the department's computer
goes down. Fortunately, the solution (the money from the budget to
replace the computer system), the problem (inoperable computer system)
and the individuals involved ( the employees) are in alignment.
ords, the timing is pe
problem: The employees protected budget money which could
later time, the computer system went down, a
be used to buv
dvantage of the garbage can model is that it provides a
ntation of the non-rational manner in which decisions ar
vithin an organization. Not all decisions are made in a I
en standard fashion. Occasionally, decisions are made on an
ad hoc basis or by "flying by the seat of the pants" when the solutions,
problems and individuals involved in the task happen to align.
Despite its representation of the non-rational, real-world manner in
hich decisions are often made, the garbage can model does have an
.
importan ma. king a

his often can


manner in which are made
organization. are worked on ituations, b' ar
made only when tl ombination of problem solutions and individual
allow th are in alignment). h
alignment of the problems, solutions, and individuals often occurs after the
portunity to make a decision regarding a problem has passed or occur
the problem has been discovered (Coh
1972,
In discussing the ur general models, the issue is not necessarily
which model is the bes one, because they all have advantages and
disadvantages which may work or be ap priate for certain groups and
ituations. The purpose of using models to a group decision making is
to provide a base for comparison. A model is a starting point for evaluating a
d group decision making is a
ne way of evaluating this determine which model. if
any, a ; is using to make d
decision procedure can be analyzed i the impr
the procedure. The procedure can be improved b
blems and acting accordingl
For instane
can be eliminated. Knowing that a group makes decisions by following a
rational model enables the decision makers to expedite the decision process.
These individuals can expedite the process by preparing " a. c

group meetings by becoming familiar with any goals or objectives, po>+o"


Ind consequences of these alternatives as well as potential
optimal choices as they relate to a decision.
that a group follows litical model in making
I. This knowledge can embers in
supporting information for their perspe-
individuals in presenting their viewpoint

Knowing that
he decision procedure.
ndard operati

arch the pre-


their argument or poin
If group members are aware that decisions are made by using a
garbage can model, they at least have the comfort of knowing that these
ome sort of method. Granted the method i mewhat
random and chaotic, but it is a method nonethel
n pr no'

th avoid. They should avoid the curren del tha


ineff
group to try to adopt a different approach (i.e., a new m
It should be pointed out that even if the group decision-making
procedure does not fit one of the aforementioned general models, the pr
"analyzing the decision task in and of itself in order to identify a moat

beneficial. This analysis provides valuable insight into the dynamics of how
decisions are made within the group whether or not one of
actually discovered. The cognitive flow of the group is important to note,
because it enables an understanding of the other group members' rationale
gnitive flow may spawn the creation of a

In group decision making can ' 1.


• are

tarting point for potential improvement. Models aid in a sing th


interaction of group member regarding a judgment procedure. roup
decision making model form to an intangible and abstrac
odels promote the di ery and re an

t 29:
In a sense. dial is not complicated. It is just good conversation, over th
r lives. It is continued, thoughtful exchange about th
things that most matter. It is time to sit. In a dialogue is n
complicated. It i of our homes
a time to ·ther and talk, as the ideas and thoughts come to us, without
agenda, without time pressures. It is the kind of con have
rgotten in the pace of western, modern life, a kind • Iti
learning what we have forgotten. Or, in -
Paula Underwood Spencer, from culture
reminding us of "that which we have forgotten to remember."
n his seminal book on systems thinking, The Fifth Discipline, Pet
nge talks about the important difference between "dialogue," which com

from the Greek dialogos, which means "to draw meaning through," and
"discussion," which has the same root meaning as percussion and concussion
and which suggests the bangin
would add, heads. Senge notes that the dominant mode of communication in
the contemporary organization is that of the crashing together of ideas and
observations and different understandings, rather than drawing those ideas
nd observations and different understandings through a process which
clarifies and deepens our personal and collective understanding.

thinking. A friend of mine often


ribes h
ing only tw talk. Sh
has n he extrovert, but our e:

uch a competitively extroverted culture, real li t is li


ning as an ally, is indeed c 1ltural.

in light of our
dominant patterns of debate, disagreement, discussion and decision, dialogue
eems like pointless meandering, and is most marked by the deficiency o
not "arriving" at any conclusions, of not producing identifiable closure.
ialogue seems to have no structure, no point, and no direction. Even talking
bout it generates a mild sense of panic, particularly among those wh
ha

om-.

p
nded go forth and act in a remarkable I
, co«ordination or checking.
mmunicating

Dialogue should contribute to the development and deepening of a


enuine interest in, curiosity about and concern for the thinking and
around the table. It is a collective process in
· path
+he head of th
ding than any on
We should note that dialogue is a different and often unfamiliar way of being
in communication, and we should acknowledge that and b
prepared for it. If we overlook the unfamiliarity of this mode of
ommunicating, we will also make it unlikely that others can evaluat
accurately i ur organizational lives. Instead we will
mistakenly nal modes (of decisions taken by meetings'
and measure of closure) and judge i

meeting, rather than in the longer and more important time frames of futur
action and alignment.
I am reminded of the many stories of North Americans negotiating
with Asians and considering the process of talking and silence without any
eeming progress, as pointless and unproductive. The same North American
have found the level of accord and speed of implementation quite
mparison with the level of struggle over implementation in
. And seldom do they realize the relationship between th
lowness of speaking and the ease of acting.

a time-consuming and difficult process. Unfortunately, many


tudents spend hours and hours finding a scholarship yet fail to put an equal

amount of effort into their application. The application is by far the mos
important part of your scholarship search, make sure you spend as much
tim ar
Followiny a list of simple tips to help you ensure you submit the
applic and thereby maximize your chances of being

et as much infor mation about the scholar ship a


possible. rit r e-mail the provider of the scholarship to ensure you
h f application procedures and what will be exp
ful applicant. If the scholarship entail find ou

is being funded by a private enterprise, gather as much


as you can about the company, its philosophy and its goals. You
never have too much information.
2) to ensur e tha ou ar e actuall y eli gible for the
cholar ship befor e you embar appli cation pr oce
ubmi er how perfect it may b
r which you are ineligible. Check for any gender, age, nationality
indigenous or other special group restrictions on applications and only apply
if you definitely match the eligibility criteria.
3) Once you have confirmed your eligibility for a particular scholarship and
full application guidelines from the provider, make sur e you
he guidelines to the letter . Common complaints from scholarship

b
properly:
all of the requested documents are not attached;
lication pr esentation i! impor tant. If a list of documents i

requested, supply the documents in the order in which '


Use the same style of writing and pen throughout the ap
legible handwriting and type your application if this is not possible.
r nsur e that your refer ees ar e the appr opr iate people to provide the
kind of infor mation about vou that the selection committee will need to
know. . r research capabilities
n id up
ha
Always make sure that your referees f each and every scholarship
you have applied for in which they ar hey are awar
of the particular requirements of each scholarship, they will be more able to
provide the appropriate information to each scholarship
6) Apply for each scholar ship separ ately. Do not use the same application
to apply for two separate scholarships.
particula
rtainly miss addre: l and particular criteria of the ne
·ach n should be approached as a separate undertaking
7) M ake a checklist for each scholar ship application and check and
double check it befor e you submit the completed application. Ensure that
you have completed all the necessary forms, supplied all the requested
upporting documents in the form required, submitted all statements, nam
and any and all other information requested by the provid
out on a scholarship because your application is incorrect
k hard on it and ensure yourself the best possible cha
wmnnmng a competitive environment.
8) M a ur e you or a nominated

can you narrow the list of possibilities b ntracting for services?


low can you ensure that your organization's business needs will be met':
ne solution is to write and distribute a Request for Proposal (RFP) in th
marketplace.

about your organization, the services and products you need, and
pliers must meet in order to win your business.
of your organization
rve those needs and
lier. In

most important concern is the level of customer service you will


Reasons to r ite a Formal Request for Proposal:
To increa
ns and potentially c

• ir and equal rtunity for providing


• To identify and select qualified organizations capable of supporting high
in the most cost-effective and administratively efficien'
manner possible
e 1n
developing long-term relationships;
• To award opportunities to the most capable and qualifi
whose capabilities and experience can support demands and can grow a

• To outline the terms of a formal working agreement that holds both th


buyer and the supplier liable to certain terms and conditions the legalitiv
h
RFPs are a lot of work, but they're worth it. If you
nurchasing a learning management system that you hoped to use for five
years, it obviously makes sense to find the vendor whose product match
your needs as closely as possibre.
It's certainly easy to take shortcuts. Industry gossip, anecdotal

en million
It's much different than using Consumer Repor
You need to be educated, and there should be no guessing involved.

An ritten document that represents an enormous amount of time


r and money in order to communicate an understanding of th
- 'ness needs of a company to a group of suppliers. Th
represent an interpretation of those needs and involve the expenditure of a
commensurate amount of time and resources on the supplier's part. Properly
developed and written, RFPs are powerful tools for selecting the mo:
a
iat
··o·liers.
This is a nuts and bolts guide to writing an RF
guide is to provid you with practical information about writing and
organizing RFP focusing on their underlying mechanical aspects and
processes. Wheth senior RFP writer, you will find tips
and niques that will ' you.

Text 33
The next generation of distributed computing has arrived. Over the past f

enabled heterogeneous computing environments to share


information over the World-Wide Web. It now offers a simplified m

b 1s not a revolution in distributed is instead a


L application from structured representation of
information to structured representation of inter-applicatie
revolution is i

not then been offering web


s actually new? In an article entitled

or creating open distributed systems, and allow companies and individuals


to quickly and cheaply make their digital a

nterprise application integration


verv diffi in programming languages and
middleware used within organizations. The chanc any two busin

wa
.
sInc there has not been a d winner. Thes
'component for in ulted in a
plethora of custom adapters, one-off integrations, and integration
'middlemen'. In short, interoperability was cumbersome and painful.
Vith web services, any application can be integrated so long as it i
Internet-enabled. The foundation of web services is XML messaginy

mmunication mechanism that any programming language, middl


nlatform can participate in, easing interoperability greatly. Th
standards enjoy widespread industry acceptance, making them very low-risk
adopt. With web services, you can integrate
two businesses, departments, or applications quickly and cost-effecti
The vision for web services predicts that services will register themselves in
public or private business registries. Those web services will full
emselves, including interface structure, business requirement
nd 1

b
mart, in that once a ill
pontaneously invoke other services to accomplish the task and
a completely personal, customized experience. In order for th
dvnamicallv interact. they need to share information al
ntext mntormatuon.
ext 34:
J2EE and .
running variety of hard in32
in frame systems. This portability is an absolute reality toda
because the Java Runtime Environment (JRE), on which J2EE is based, is
available on any platform.
{here is a second, more debatable aspect of portability as well. J2EL
is a standard, and so it supports a variety of impl
IBM, and Sun. The danger in an open standard such

for example, did not have any way to enforce that


did indeed comply with the standard, and thus ther
were numerous problems with portability. In the early days of J2EE ther
were the same problems.
To help with the situation, Sun has built a J2EE compatibility test suit
that J2EE platforms comply with the standards. This test suite
nsures p applicati
18 applie ndor
compatible. There are a myriad of other vend well that are not
rtified".
r opinion is that in reality, J2EE portabilir
ompletely free. It is ridiculous to think that comple»
to the next without any
ake advantage of
vendor-specific features to achieve real-world systems. However--and this is
important--portability is exponentially cheaper and easier with J2EE and the
compatibility test suite than with proprietary solutions, and th
tand behind through vears of consulting with customers using a variety of
12E1 ime, as the J2
.
lutions. UJ om

y way of only runs on Windows, its supported


hardwar , the. ironment. There is no portability at all. It should
en hints tha
platforms. However, a question remains - he
framework will be (or even can
ory has taught us to be
iple platform support. Microsoft ported COM to other platforms, bu

n arv to mak useful. find it hard hat .NET


realit 'e historically
monopolistic stance.

OCSS defines a set of activities necessary t


ftware Il activities culminate in an artifact (or
of an Th nt th
working on the activities. The goal of a software development process is t
acilitate people in their quest to effectively produce a software system.
xtreme Programming (XP)
s Programming h pioneer in the modern m
lightweight p phasizes a single majo
This p cards to capture requirements in user

rocess. X is much more than user stori


wever. Testing frameworks and innovative pre cti

mng 1n grour
addition to the field of software development proc
Cr ystal
Crystal is a lightweight process that contains 20 artifacts. This might sound
like a heavier process than XP but most of the artifacts are informal and can
ak chalk talks" (working problems out on halk board
hese 20 artifacts, only th I syste
documentation are formal. mntc
, 5,000-fo View
n their objecti
eatur e-Dr iven Development
· Development is an incremental approach that uses as few a
feature list, class diagram, sequence charts, and code). Th
cuses development using ' quick
tangible results. Among the contributions thi ass provides is a
:lass diagram template
called domain neutral
component, which differentiates types of classes by colorto aid clas,

designers in developing a domain model.


ational Unifi ed Pr oces
he Rational Unified Process collects man
nalysis and d
RUP is not genera although a lightweight
nfiguration called dx ,'turned upside down) exists. Of course, not all
artifacts are required in either RUP or dx. In fact framework
nfigurable to as few as tw
general
design artifacts because its developers based this proe
ext 36:
An open distance learning information system can be used in order
to provide virtual lectures, virtual conference e work on
institution f useful material
-aper1ences among '
ea 1, and more attractive presentations of the subjects taught. In addition,
well
ul for the education , b
r the svstem: The ,
n web-ba
ha any
j

nd complexity. The managemen mn


limitations of the file-oriented hy :ond problem is the

In our approach, all appli

directly on the file system, while the database maintains annotation abou
heir location.
In this article ome tele-training tools as well as the
LIS and particularly the data
ding the manipulation of
I catalogue the functional characteristics based on
user requirements, describ
information. in our system,
relationships between data manageability
y ransparency and we describe the
that are used for the reliable storing.
present the m and our c
Text 37:
The user and lesson da an important role and needed
pecial attention espec the educational part i
database system had to take into
that were imposed by the
process had to pass
rms and responds that the database system had to keep track of. The
f user registration requests had to be handled with an open-

language words b ade 1n a


formalized way so that everybody ha
web access better compatibility. User database had to keep wait state status
when registering a student for the cross-certification with the secretariat
the department in

the database had to be ready for annual rebuilding-


reutili ared for the next academic year. That means exhau
"· tall data of the past year from the main database.
t that time all outdated data had to b
database keeping in mind all issues that may be needed in the
for better indexing and quicker access and retrieval. In th
year, everything has to be ready to accept all the new data recording withou
though, losing the capabilities to search and link to

records of grades, statistics and ar


system had to be designed to keep alive the most educationally significant
parts of data - the academic partners of the project insisted on that - so that
would be easy to access them in the following years for several reasons. It i
important that the database system provided easy anc

annual datab 1 nd oth


educationally vital information for the better designing and organizing of the
academic year to come.

[ 38:
Learners are busy. They are working at their primary task and have little
time for learning even if the need is urgent. For thi:
sible. If lling

was just released, you will have a low hit rate. To make it as easy as ible
r the learner to access the e-learning lesson, use these approaches:
• Provide a link in the body of the e-mail invitation.
ing thi both the
oration.

with a date rather than a vague time period like "cor


weeks.

then onvenient.
beak rd in the subject line of the e-mail m

network connectivity in the systems that use pr migration a


lution to problems such as load sharing has existed
typicall
perating systems or applications. Because of complexity of adding
ransparent migration to systems originally designed to run stand-alone
since designing new system ith migration in mind from the beginning is
not a realistic option anymore at one hand and need to developing ne
:61

applications because of impossibility of use of existing applications, ha


made process migration an unpopular approach.
the increasing costs of
and th ndard solutions
fmor
ur approach is t . process called twin
twin is resp edirecting communications of th
own twin. But in
and
twins. In can " or more than on m hi
pproach works with ms and applications.

: 40:
We are concerned with the study of autonomy as an essential prerequisi
systems.
of the presen
which
its environment, navigate, avoid
ay, an artifact capable to ensure its survival by itself, with the minimal

tudy deal and orientation)


identification of mobil equipped with
c.. location calcul
from the actual location of the robot. The situation becomes more
ially when the robot makes many turns or the length of the path
..a ases. The task of identifying the location of a mobile vehicl
from external sen
lely sonar based information n of a mobile
robot in a given nontrivial environment.
Localization can be performed by constructing a local
map of the immediate surrounding and matching this with the global map of
the environment.
This is also referred to as perception-based localization where th

ues that naturally occur in the environment are identified and

identifies linear-featur
. ,,
rom 1mprec1s nar data and
performs localization b to the given global map.

wWw.ProzheDownload.Com
Refer enc
]. Brown P. Charles, Noma D Mullen, 'English omputer
University Press. rru.

1. G ft Computer English Dictionary', Microsoft Press, 2002.


]. ' English for Information Technology
p
]. M -Hall, 2002.
]. Internet ite:
]. Internet ite:
]. Internet .careersinsite.org

wWw.ProzheDownload.Com

You might also like