- Учебник: «Английский язык», Биболетова М.З., Денисенко О.А., Трубанева Н.Н.
- Тема: Lesson 4
- 18.11.2020
- 202
- 8
Смотреть ещё
5 011
методических разработок по английскому языку
Перейти в каталог
|
Государственное бюджетное профессиональное образовательное учреждение Новосибирской области |
|
|
|
|
|
Новосибирский химико-технологический колледж им. Д.И. Менделеева |
630102 г. Новосибирск, ул. Садовая, 26, Тел./факс: (383) 266-00-44, тел.: (383) 266-00-54, info@nhtk-edu.ru |
|
УЧЕБНО-МЕТОДИЧЕСКОЕ ПОСОБИЕ
Английский язык
для студентов специальности 09.02.07
«Информационные системы и программирование»
СОДЕРЖАНИЕ
1. |
Tomorrow's Robotics Today…………………………………… |
4 |
2. |
Top 10 greatest programmers in the world of all time………… |
8 |
3. |
Programming facts……………………………………………… |
11 |
4. |
English verbs of movement on computers……………………… |
13 |
5. |
The names of keys on a keyboard………………………………. |
15 |
6. |
Technical problems before a meeting…………………………… |
16 |
7. |
WEB page……………………………………………………….. |
18 |
8. |
Using computers at work………………………………………… |
20 |
9. |
How a computer network works…………………………………. |
22 |
10. |
Code sign/symbol names…………………………………………. |
24 |
11. |
Best NoSQL Databases…………………………………………... |
27 |
12. |
Top 10 programming languages…………………………………. |
34 |
13. |
Solving a Customer's Server Problem…………………………… |
39 |
14. |
A Controversial IT Purchase……………………………………... |
40 |
15. |
Ten Commandments of Computer Ethics………………………... |
41 |
16. |
Top 15 American IT Companies…………………………………. |
42 |
17. |
Реферирование и аннотирование………………………………. |
44 |
18. |
Тексты для реферирования…………………………………….. |
51 |
19. |
Упражнения по темам…………………………………………... |
54 |
20. |
Список источников……………………………………………… |
58 |
|
Приложение |
|
"Tomorrow's Robotics Today"
A robot is a machine—especially one programmable by a computer— capable of carrying out a complex series of actions automatically. Robots can be guided by an external control device or the control may be embedded within. Robots may be constructed on the lines of human form, but most robots are machines designed to perform a task with no regard to their aesthetics.
The branch of technology that deals with the design, construction, operation, and application of robots, as well as computer systems for their control, sensory feedback, and information processing is robotics. These technologies deal with automated machines that can take the place of humans in dangerous environments or manufacturing processes, or resemble humans in appearance, behavior, or cognition. Many of today's robots are inspired by nature contributing to the field of bio-inspired robotics. These robots have also created a newer branch of robotics: soft robotics.
Androids
An android is a robot or other artificial being designed to resemble a human, and often made from a flesh-like material. Historically, androids were completely within the domain of science fiction and frequently seen in film and television, but recent advances in robot technology now allow the design of functional and realistic humanoid robots.
Sophia is a social humanoid robot developed by Hong Kong based company Hanson Robotics. Sophia was activated on February 14, 2016, and made her first public appearance at South by Southwest Festival (SXSW) in mid-March 2016 in Austin, Texas, United States. She is able to display more than 60 facial expressions.
Sophia has been covered by media around the globe and has participated in many high-profile interviews. In October 2017, Sophia became a Saudi Arabian citizen, the first robot to receive citizenship of any country. In November 2017, Sophia was named the United Nations Development Programmer's first ever Innovation Champion, and is the first non-human to be given any United Nation title.
Cameras within Sophia's eyes combined with computer algorithms allow her to see. She can follow faces, sustain eye contact, and recognize individuals. She is able to process speech and have conversations using a natural language subsystem. Around January 2018 Sophia was upgraded with functional legs and the ability to walk.
Hiroshi Ishiguro is director of the Intelligent Robotics Laboratory, part of the Department of Systems Innovation in the Graduate School of Engineering Science at Osaka University, Japan. A notable development of the laboratory is the Actroid, a humanoid robot with lifelike appearance and visible behavior such as facial movements.
Ishiguro has made an android that resembles him, called the Geminoid. The Geminoid was among the robots featured by James May in his 5 October 2008 BBC2 documentary on robots Man-Machine in May's series Big Ideas. He also introduced a telecommunication robot called the Telenoid R1. Hiroshi also uses the android to teach his classes at Osaka University of Japan and likes to scare his students by making Geminoid do human-like movements like blinking, "breathing" and fidgeting with his hands. Ishiguro has been listed, in 2011, as one of the 15 Asian Scientists to Watch by Asian Scientist Magazine. In 2018, Ishiguro was interviewed interacting with one of his robots for the documentary on artificial intelligence.
Whether each of us will have a geminoid in the future remains to be seen. But lifelike androids are already helping Ishiguro and others explore some of the pressing questions in human-robot interaction. What do people expect from robots? What social behaviors should they exhibit? And how do we get their look right? In the coming years, researchers will have to answer these questions to come up with design principles for building the next generation of social robots.
Ishiguro, for his part, believes that robotic telepresence will become a major communication medium over the next decade. Eventually, he speculates, humanlike robots will become truly integrated into society—not just for factory automation or as labor-saving devices but as replacements for someone’s physical presence. A future where androids may become so advanced that we’re unable to distinguish them from ourselves doesn’t frighten Ishiguro.
“Humankind is always trying to replace human abilities with machines. That’s our history,” he says. “I’m doing the same thing. Nothing special”.
Industrial robots
Electronics evolved into the driving force of development with the advent of the first electronic autonomous robots created by William Grey Walter in Bristol, England in 1948, as well as Computer Numerical Control (CNC) machine tools in the late 1940s by John T. Parsons and Frank L. Stulen. The first commercial, digital and programmable robot was built by George Devol in 1954 and was named the Unimate. It was sold to General Motors in 1961 where it was used to lift pieces of hot metal from die casting machines at the Inland Fisher Guide Plant in the West Trenton section of Ewing Township, New Jersey.
Robots have replaced humans] in performing repetitive and dangerous tasks which humans prefer not to do, or are unable to do because of size limitations, or which take place in extreme environments such as outer space or the bottom of the sea. Industrial robots usually consist of a jointed arm (multi-linked manipulator) and an end effector that is attached to a fixed surface. One of the most common type of end effector is a gripper assembly.
The International Organization for Standardization gives a definition of a manipulating industrial robot in ISO 8373: "an automatically controlled, reprogrammable, multipurpose, manipulator programmable in three or more axes, which may be either fixed in place or mobile for use in industrial automation applications." This definition is used by the International Federation of Robotics, the European Robotics Research Network (EURON) and many national standards committees.
Most commonly industrial robots are fixed robotic arms and manipulators used primarily for production and distribution of goods. The term "service robot" is less well-defined. The International Federation of Robotics has proposed a tentative definition, "A service robot is a robot which operates semi- or fully autonomously to perform services useful to the well-being of humans and equipment, excluding manufacturing operations
Mining robots
Mining robots are designed to solve a number of problems currently facing the mining industry, including skills shortages, improving productivity from declining ore grades, and achieving environmental targets. Due to the hazardous nature of mining, in particular underground mining, the prevalence of autonomous, semi-autonomous, and tele-operated robots has greatly increased in recent times. A number of vehicle manufacturers provide autonomous trains, trucks and loaders that will load material, transport it on the mine site to its destination, and unload without requiring human intervention. One of the world's largest mining corporations, Rio Tinto, has recently expanded its autonomous truck fleet to the world's largest, consisting of 150 autonomous Komatsu trucks, operating in Western Australia. Similarly, BHP has announced the expansion of its autonomous drill fleet to the world's largest, 21 autonomous Atlas Copco drills.
Drilling, longwall and rockbreaking machines are now also available as autonomous robots.[168] The Atlas Copco Rig Control System can autonomously execute a drilling plan on a drilling rig, moving the rig into position using GPS, set up the drill rig and drill down to specified depths. Similarly, the Transmin Rocklogic system can automatically plan a path to position a rockbreaker at a selected destination. These systems greatly enhance the safety and efficiency of mining operations.
Swarm robots
Inspired by colonies of insects such as ants and bees, researchers are modeling the behavior of swarms of thousands of tiny robots which together perform a useful task, such as finding something hidden, cleaning, or spying. Each robot is quite simple, but the emergent behavior of the swarm is more complex. The whole set of robots can be considered as one single distributed system, in the same way an ant colony can be considered a superorganism, exhibiting swarm intelligence. The largest swarms so far created include the iRobot swarm, the SRI/Mobile Robots CentiBots project and the Open-source Micro-robotic Project swarm, which are being used to research collective behaviors. Swarms are also more resistant to failure. Whereas one large robot may fail and ruin a mission, a swarm can continue even if several robots fail. This could make them attractive for space exploration missions, where failure is normally extremely costly.
A collaborative robot or cobot is a robot that can safely and effectively interact with human workers while performing simple industrial tasks. However, end-effectors and other environmental conditions may create hazards, and as such risk assessments should be done before using any industrial motion-control application. The collaborative robots most widely used in industries today are manufactured by Universal Robots in Denmark.
Rethink Robotics—founded by Rodney Brooks, previously with iRobot—introduced Baxter in September 2012; as an industrial robot designed to safely interact with neighboring human workers, and be programmable for performing simple tasks. Baxters stop if they detect a human in the way of their robotic arms and have prominent off switches. Intended for sale to small businesses, they are promoted as the robotic analogue of the personal computer As of May 2014, 190 companies in the US have bought Baxters and they are being used commercially in the UK.
TOP 10 GREATEST PROGRAMMERS IN THE WORLD OF ALL TIME
These programmers are the explorer in the IT world and have each contributed something that has completely changed the way human’s access to information and mass media. Let’s start with the lords of the IT world.
Dennis Ritchie Dennis MacAlistair Ritchie was an American computer scientist who “helped shape the digital era”. He created the C programming language and with long-time colleague Ken Thompson, the Unix operating system. Ritchie and Thompson received the Turing Award from the ACM in 1983, the Hamming Medal from the IEEE in 1990 and the National Medal of Technology from President Clinton in 1999. Ritchie was the head of Lucent Technologies System Software Research Department when he retired in 2007. |
|
Bjarne Stroustrup Bjarne Stroustrup is a Danish computer scientist, who is most notable for the creation and development of the C++ programming language. . He is a Distinguished Research Professor and holds the College of Engineering Chair in Computer Science at Texas A&M University, a visiting professor at Columbia University, and works at Morgan Stanley. |
|
James Gosling James Arthur Gosling, OC is a Canadian computer scientist, best known as the founder and lead designer behind the Java programming language. James has also made major contributions to several other software systems, such as NeWS and Gosling Emacs. Due to his extraordinary achievements, Gosling was elected to Foreign Associate member of the United States National Academy of Engineering. |
|
Linus Torvalds Linus Benedict Torvalds is a Finnish–American software engineer who is the creator and, historically, the principal developer of the Linux kernel. He later became the chief architect of the Linux kernel, and now acts as the project’s coordinator. He also created the revision control system Git as well as the diving log software Subsurface. He was honored, along with Shinya Yamanaka, with the 2012 Millennium Technology Prize by the Technology Academy Finland in recognition of his creation of a new open source operating system for computers leading to the widely used Linux kernel. |
|
Anders Hejlsberg Anders Hejlsberg is a prominent Danish software engineer who co-designed several popular and commercially successful programming languages and development tools. He is the creator of popular programming language C#. He was the original author of Turbo Pascal and the chief architect of Delphi. He currently works for Microsoft as the lead architect of C# and core developers on TypeScript. |
|
Sir Timothy John Berners-Lee OM KBE FRS FREng FRSA FBCS, also known as TimBL, is an English engineer and computer scientist, best known as the inventor of the World Wide Web. He made a proposal for an information management system in March 1989 and he implemented the first successful communication between a Hypertext Transfer Protocol (HTTP) client and server via the Internet. Berners-Lee is the director of the World Wide Web Consortium (W3C), which oversees the Web’s continued development. |
|
Brian Wilson Kernighan is a Canadian computer scientist who worked at Bell Labs alongside Unix creators Ken Thompson and Dennis Ritchie and contributed to the development of Unix. He is also coauthor of the AWK and AMPL programming languages. Kernighan’s name became widely known through co-authorship of the first book on the C programming language with Dennis Ritchie. |
|
Kenneth Thompson commonly referred to as ken in hacker circles is an American pioneer of computer science. Having worked at Bell Labs for most of his career, Thompson designed and implemented the original Unix operating system. He also invented the B programming language, the direct predecessor to the C programming language, and was one of the creators and early developers of the Plan 9 operating systems. Since 2006, Thompson works at Google, where he co-invented the Go programming language. |
|
Guido van Rossum is a Dutch computer programmer who is best known as the author of the Python programming language. In the Python community, Van Rossum is known as a “Benevolent Dictator For Life” (BDFL), meaning that he continues to oversee the Python development process, making decisions where necessary. He was employed by Google from 2005 until December 7th, 2012. Where he spent half his time developing the Python language. In January 2013, Van Rossum started working for Dropbox. |
|
Donald Ervin Knuth is an American computer scientist, mathematician, and Professor Emeritus at Stanford University. He is the author of the multi-volume work The Art of Computer Programming. Knuth has been called the “father” of the analysis of algorithms. Knuth is the creator of the TeX computer typesetting system, the related METAFONT font definition language and rendering system and the Computer Modern family of typefaces. |
|
PROGRAMMING FACTS
Here are some very interesting programming facts about computer field and programming languages. Share with your friends for more fun. Let’s see the top 10 coding facts!
· The first computer programmer was a female, named Ada Lovelace.
· The first game was created in 1961. Fun facts are that it didn’t earn any money.
· The first virus was created in 1983.
· The first computer “bug” was identified in1947 as a dead moth.
· The first computer was actually a loom called the Jacquard loom, an automated, mechanical loom, which didn’t use any electricity.
· The first high-level (very close to real English that we use to communicate) programming language was FORTRAN. invented in 1954 by IBM’s John Backus.
· Computer programming is one of the fastest growing occupations currently.
· The language name C because it succeeds another language called B.
· Java was called as Oak from the name of that tree that grew outside the window of James Gosling.
· Guido van Rossum was also reading the published scripts from Monty Python’s Flying Circus”, a BBC comedy series from the 1970s. Van Rossum thought he needed a name that was short, unique, and slightly mysterious, so he decided to call the language Python.
· JavaScript is not compiled.
· Majors related to computer programming are among the highest paying in colleges and universities A programming language is basically a language that allows a human being to communicate with a computer The lifestyle we live today with our tablets, and mobile phones wouldn’t be possible without computer programming.
· Did you know how many total programming languages? – it’s 698.
· Most people are intimidated by the thought of learning how to program, however as with anything, the more you practice and repeatedly do that task, the easier it gets.
· The Java mascot, ‘The Duke’ was created by Joe Palrang. Palrang is the same guy who has worked on the Hollywood blockbuster, Shrek. Duke is celebrated at Oracle.
· Four states of programmer progress:
a) Complex Programming
b) Making Progress
c) Slow Progress
d) Stuck
· It is not a tool or magic it is the power to create your Imagination in reality.
· Programming can learn you a new way of thinking.
· Perl is sometimes known as the “Swiss-Army knife” of programming languages.
· APIs are like stars, once a class is there everybody will assume it will always be there.
· Did you know first computer bug was named due to a real bug as shown in below pic? Grace Hopper recorded the first computer ‘bug’ in the book as she was working for the MARK II computer.
Programmers funny facts are
o Programmers will start the count from zero, not one.
o The root is at the top of the tree.
o Programming and coding are not the same.
o Programmer says ‘=’ != ‘==’
o The value of a ‘;’
o Ctrl + C and Ctrl + V have saved more lives than Batman and Robin.
o The Ctrl-Z is better than a time machine.
o That there is one thing called “Constant Variable”.
o Programmers always looking for a girl who can code.
o A parent may kill its children if the task assigned to them is no longer needed.
o Writing cryptic code is deep joy in the soul of a programmer.
o When you format your hard drive, the files are not deleted.
o A coder is a person who transforms cola & pizza to code.
o “Refresh button” of the windows desktop is not some magical tool which keeps your computer healthy.
o The programmers are the main source of income for eye doctors.
o If any programmer orders three beers with his fingers, he normally only gets two.
o Programmers love to code day and night.
o Sleeping with a problem can actually solve it.
o When you format your hard drive, the files are not deleted.
o 1 Mbps and 1 MBps internet connection don’t mean the same thing.
o A programmer is similar to a game of golf. The point is not getting the ball in the hole but how many strokes it takes.
o A programmer is not a PC repairman.
ENGLISH VERBS OF MOVEMENT ON COMPUTERS
Read the following conversation between Peter and Juan about how to add the details from a CV/resume on to a database for candidates applying for job vacancies in their company.From the context, try to guess what the meaning of the words/phrases in bold are. Then do the quiz at the end to check if you are right.
Juan: For the vacancy in our department we have to enter all the CV details for the candidates on to the candidates database. Do you know how to do that?
Peter: No, I've never done it before.
Juan: No problem, I'll show you how to complete the form in the database with the details. First of all, you'll need to have both the database and a copy of the CV open on the screen. Now, in the database click on the button that says 'new entry' using the mouse. This takes you to a new screen where you can enter the details.
Peter: Ok.
Juan: Now, at the top you'll see a section called 'candidate details'. You have to enter the candidate's name, date of birth, address etc... here. So, to enter the name, click on the text box next to name, then type in the name using the keyboard. When you have done that, tab down to the next text box for date of birth using the tab key on the keyboard. And type in the date of birth. To move down to the next text box you need to press the tab key again. Continue doing that until you've filled all the text boxes in this section.'
Peter: What next?
Juan: To the right of the 'candidate details' section, there's a box called 'photo'. Go back to the copy of the CV and find the candidate's photo. Click on the photo and then drag or move the photo from the CV onto the candidate database and put it over the photo box and then drop it by taking your finger off the click button on the mouse. Now, the photo has been entered onto the database.
Peter: Is that it?
Juan: No, you have to enter the candidate's job history details. But you don't have to type it in. You can copy and paste it from the CV. But before you do that, you have to go to the 'job history' section on the database. You can't see this section on the screen, because it's at the bottom of the database form. So, you have to scroll down the form until this section is on the screen. Here it is. Now, go back to the CV and highlight using the mouse all the text from the candidate's job history that you want to copy. You highlight or select the text by clicking on the mouse button and with the mouse button still pressed move the cursor to the end of the text that you want copied. Then release the mouse button. To copy the highlighted or selected text, you can either press the right mouse button and click copy in the menu that appears or with the keyboard, hold down the control/Ctrl key and press the key 'C'. Then go back to the 'job history' section on the database and paste it into the text box there. After that, save the form and all the information is on the database.
Peter: It seems simple. But how can I access the information on the database when I'm in an interview?
Juan: Well, you can access all the information on the database on an iPad. To open the database on the iPad, you need to tap on this icon on the screen using your finger. Then, when the database opens, tap on the text box next to name and type in the candidate's full name and press or tap the enter icon and all the candidate's details will appear on the screen. To move or scroll up and down the details in the database, you just need to slide your finger up or down the screen.
Peter: Perfect, thanks.
1. When you press a key or a mouse button for more than 1 second, you _____________.
2. To move your finger while still touching the glass on a touch screen tablet/phone, is_________.
3. To move through/down text boxes on an online form by the keyboard, you _________.
4. A more common way to say 'press' a button on a mouse, is _____________.
5. When you select/click on an image or photo and then physically move it on the screen, you ____________.
6. When you stop holding down a key or mouse button, you _____________.
7. A different way to say 'click' or 'press' on a touch screen device (e.g. iPad), is _______.
8. A verb that means to move up or down a web page or document, is __________.
9. After moving/dragging a photo on the screen, to put or place it in its new position, you ____________.
10. Another way to say 'enter' or 'write' words or numbers with a computer, is _________.
11. To copy some of the text from a document, you first have to ______________.
12. To make the keys on a keyboard write letters, numbers etc., you have to __________.
THE NAMES OF KEYS ON A KEYBOARD
1 = Delete Key
2 = Backspace Key
3 = Tab Key
4 = Return Key
5 = Caps Lock Key
6 = Shift Key
7 = Control Key
8 = Function Key
9 = Alt Key
10 = Space Bar
11 = Arrow Keys
1. The long key on a keyboard which is used when you want to separate one word from another when writing, is called the __________________.
2. The key you press once to write in UPPER-CASE/CAPITAL letters, is called the ___________________.
3. A key that begins with 'C' that is used for shortcuts (like quickly copying some text) in applications, is called the __________________.
4. A key that is used to make multiple spaces/indent in a text document, is called the ___________________.
5. A key that is used to remove a letter/space which is in front of the cursor on the screen, is called the _____________.
6. A group of keys which are used to move (up or down, left or right) on a web page or an app, are called the _________________.
7. A key on a laptop/notebook that when pressed with other keys changes the audio volume, is called the ___________________.
8. A key that when pressed and held down will write letters in UPPER-CASE/ CAPITALS, is called the ________________.
9. A key that begins with 'A' that is used for shortcuts (to do things quickly) in applications, is called the __________________.
10. A key that is used to move to a new line when writing in a document, is called the _____________________.
11. A key that is used to remove a letter/space which is behind the cursor on the screen, is called the ________________.
TECHNICAL PROBLEMS BEFORE A MEETING
Read the following conversation between Juan and Peter. Peter is having problems with his laptop before giving a short Power Point presentation in a meeting. From the context, try to guess what the meaning of the words/phrases in bold are. Then do the quiz at the end to check if you are right.
Juan: 'What's happening Peter, you look frustrated?'
Peter: 'My laptop won't turn on. It was working before, I don't know what's wrong!'
Juan: 'Is it plugged in?'
Peter :'Yeah, I have connected it to the mains electricity, but that shouldn't be important because the laptop's battery still has charge or power.'
Juan: 'Are you sure that the socket in the wall has power? Try to plug it into another socket.'
Peter: 'I've tried that already and the socket has power. I thought that there may be a problem with the power cable, but it's working fine with the other laptop here.'
Juan: 'I had a problem with my desktop computer last year where the wires had come loose in the power cable. So I had to replace the power cable. You can use my laptop to show it.'
Peter: 'Thanks Juan, but I only saved the presentation to my hard drive. So I can't show the presentation on your laptop.'
Juan: 'Can you remember when I had that problem with my laptop in July. When suddenly the screen froze and the laptop wouldn't respond when I pressed any of the keys on the keyboard or when I moved my finger on the touch pad. Sometimes it recovered and I could continue to use the application, but other times it crashed and stopped working completely. So, I had to reboot the laptop. It was so frustrating, because I sometimes lost all of the work I'd been doing. Then the application didn't load at all, so I couldn't even use it then. The IT Engineer told me it was a software fault with the application. So she just reinstalled the application and it's been working fine.'
Peter: 'I'm happy for you, but I don't have any power to the laptop, so it's not a software fault. It seems like a hardware fault.'
1. Another way to say 'touch' or 'push' a button or a key, is ___________________.
2. The name of the part of a computer where you save/store your applications and documents, is the ___________________.
3. When talking about computers, people call an electrical, software or hardware 'problem' a __________________.
4. Another way to say 'switch on' or 'start' a computer, is _______________________.
5. The part of a laptop where you move the cursor on the screen with a finger, is called the _________________.
6. A 'lead' or 'wire' which connects a computer to a printer or a power supply, is called a
7. A different way to say 'restart' a computer, is ___________________.
8. A two word verb that means to connect a 'cable' to a computer or to an electrical power supply, is ___________________.
9. When you can't move the cursor on the screen, the screen is __________________.
10. A possible reason why a cable isn't working, is _______________________.
11. Another way to say that an application 'doesn't start', is ___________________.
12. The hole/holes where a cable is connected to , is called a ____________________.
13. The buttons on a keyboard that have letters or numbers on them, are called
14. When an application/program on a computer is damaged/not working correctly, it normally has to be ______________________.
15. The name of the power supply for a laptop or a mobile phone, is called the _________________.
16. When a computer or application fails or stops working, it ____________________.
WEB PAGE
The web or internet is now used by the majority of people in the world (both at home and at work). There are now over two trillion individual web pages on 500 million different websites (e.g www.blairenglish.com etc...) on the internet. So, it's important to know the English vocabulary of both web pages and how to use web pages when looking at them on a computer.
Looking at a web page
In the below photo of a web page, you will find that different parts are surrounded/enclosed by a red line with a number in red. These red numbers are used below the photo to confirm the name of each part (e.g. 1 = Web Browser).
Focus on the names of these different parts and then do the quiz at the end to check that you both understand their meaning and remember them.
1. A part of the web browser where you can move up and down the web page, is the _________________.
2. The buttons on a web browser which takes you to previous web pages that you have looked at, are ________________.
3. A word or sentence on a web page that takes you to a different web page when 'clicked on' or 'pressed', is a _________________.
4. A list of the different sections/parts of a website, is called a _________________.
5. The location or 'url' of a web page on the web, is called the _________________.
6. The place where you can quickly look for content on a website, is called the _______________________.
7. When you have multiple web pages open on a web browser, the name of each web page is written in a __________________.
8. The two buttons that are used to make a web browser window disappear or make it cover the full screen, are called the ____________________.
9. Small images on a web page, are called __________________.
10. The name of the application used to view/see web pages on a computer, is called a _______________________.
11. When you want to see the up-to-date content on a web page, you press the _________________.
12. To print or change the view in a web browser, you go to the ___________________.
USING COMPUTERS AT WORK
Information Technology (IT) dominates both how we live and work. In most countries, it is impossible to find an office or business that doesn't have any computers. So, it is important to know how to talk about basic office/work IT in English.
Read the following conversation between Jonathan (an operations manager) and Geoff (an external contractor who will be working for two months at the company). Jonathan is explaining to Geoff how to use the computer system in the company. From the context, try to guess what the meaning of the words/phrases in bold are. Then do the quiz at the end to check if you are right.
Jonathan: 'This is your first day here. You already know what you have to do with the project. But to do that, you need to have the information that we have on our computer network. So, I'll show how to use your network account on the computer, so you can do your work.'
Geoff: 'Perfect.'
Jonathan: 'The IT department set up your network account last week, so it's ready to use. Here's your user name and password. The first thing that you need to do, is to log in to your network account on the computer. So can you type in the user name and password.'
Geoff: 'Ok, done that.'
Jonathan: 'You're logged in ok. After you've logged in, you will always go to this screen where there are icons of all the applications you have. For example, there are icons for Chrome, Word, email etc... You also have access to the Operations Department Database, which contains data on all the staff and equipment in the company. You don't have access to the Customer Database, but you won't need that to do your job. You also have access to the company's procedures folder. It's the icon at the top right. If you click on it, it will take you to a folder containing lots of Word documents about the different procedures we have in the company. If you click on the file called 'disaster procedures', you can read the procedures we have in place if there is a fire or explosion in one of our factories.'
Geoff: 'Where should I save files like Word documents or Excel spreadsheets?'
Jonathan: 'It's your choice. You can save them to your hard drive on your computer. But you won't be able to access the files from another computer. So it's better to save it to a network drive. Your network account has a drive on the network to save files to. It's the L: drive. If you save files there, you can access them from any computer on the company's network. Also, there's a shared folder on the network for our team. It's called 'Operations Shared Folder' and it's this icon on the screen. You should save any file or document here which other people in the team need to have access to. Some of the files here are password protected. So you can't open them without a password. If you need to access a file that is password protected, tell me and I'll give you the password. Do you have any questions?'
Geoff: 'Yes, I do. Because I'll be visiting lots of factories to do my job, I'm not sure having a desktop computer is the best idea. I can't carry it with me, it's too heavy to move. Would it be possible to have laptop instead? They are designed so you can travel with them.'
Jonathan: 'It was stupid of me not to think about that before. I'll request a laptop for you from the IT department. It'll take 5 days to come, so you'll have to work on the desktop for now. I'll also request a docking station for the laptop, so you can use a normal keyboard and a normal screen when you're using the laptop here at your desk. I forgot to mention that this computer is connected to the printer in front of us. So when you print any document, it will go there.'
1. A type of computer that is designed so it can be easily moved, is called a ___________.
2. A 'document' on a computer like 'report.doc', is also called a ___________________.
3. A group of computers connected together, is called a ________________________.
4. A file/document that needs a password to be opened, is
5. The name of the place where a group of files/documents are stored/saved on a computer is a ______________________________.
6. A machine that makes paper copies of files/ documents, is called a _______________.
7. To use a company's computer system, you need to have a ______________________.
8. The name of the part of a computer where all programs, folders and files are stored, is the ________________.
9. A two word verb that means 'to create' and is used with network accounts, is ___________________.
10. A formal way to say 'to ask for' something new, is ___________________.
11. Computer 'programs' like Word or Excel, are commonly called ________________.
12. A piece of equipment that you enter a laptop into, so you can use the laptop with a normal keyboard and screen, is a _____________________.
13. A word that means 'the ability to open or read' a file or document, is ___________________.
14. A computer that is designed to only be used on a desk, is called a _____________.
15. To use your network account, you first have to __________________________.
16. When a person's files and applications are stored on the computer network and not on their local drive/computer, they are on a __________________________-.
How a computer network works.
Information Technology (IT) is an important part of any business. Companies normally have a lot of computers that are able to communicate between each other. These computers are able to communicate because they are on a 'computer network'. Although most people have heard about computers networks, they don't know or maybe even don't care what they are and what they actually do. But it is good to have a basic knowledge of what a computer network is, especially when there are problems with it.
Read the following conversation between Juan and Peter. Peter is explaining to Juan how the computer network at their office works.From the context, try to guess what the meaning of the words/phrases in bold are. Then do the quiz.
Juan: 'I know that it sounds stupid, but how is it possible that I can open the same word document on any of the workstations in the office. It doesn't matter which computer I'm on here, I can still open it.'
Peter: 'That's because all the computers or workstations in the office are connected to each other in a network. For our office, this network is called a LAN which is an abbreviation of 'Local Area Network'.'
Juan: 'So every computer I use in the office can access or open any file or document on my computer?'
Peter: 'No, they can't. You can only open files and documents from any computer/workstation you use here, when the file or document is saved on a server and not on your computer. A server is basically a powerful computer on the network which is dedicated to doing one thing, like storing files, or connecting to the internet or running an application etc... All the computers or workstations that people use at their desks can connect to these servers. Any application or file which people want to be shared or used by multiple computers are stored or put on to a server.
If you don't want to share a file with anybody, you can save or store it to the local drive of your computer or laptop. A local drive is the hard drive on your computer. Keeping a file on only your computer's local drive means that you can't open the file from another computer and if the computer breaks, the file is lost. So it's better to save it to your own personal folders on a network drive. This is like a local personal drive for each user of a network, but all files are stored on a file server, a server dedicated to saving/storing files.
In addition, they are all backed up regularly. So even if the file server breaks down, there will always be a copy of all the files or documents stored on a different file server.'
Juan: 'So how does my computer access and open the word document on the file server?'
Peter: 'Well, your computer is connected to the LAN or office's computer network by an ethernet cable at the back of the computer. The ethernet cable is used to send and receive all the data from the computer to the server, other computers, the internet etc.'
Juan: 'Like emails or web pages?'
Peter: 'Yes, when you open a document on a server, the ethernet cable sends the request to the file server and the file server sends the data in the file to your computer through the ethernet cable to your computer. This data comes to your computer in what is called packets. For example, when a file server sends a word document that is on a network drive to your computer, the document is not sent all together, but is divided into small parts which are then sent one by one. When these small parts or packets reach your computer they are reassembled or joined back together and make the document. Data is sent on computer network in packets to make the network run quicker.'
Juan: 'It sounds complicated. But how does the file server know where to send the document or any type of data?'
Peter: 'Well, every computer, server, printer etc... has its own unique address. This is called an IP address. So, that's how a file server knows where to send a word document.'
Juan: 'So, there's a direct ethernet cable from all the computers on the LAN network in the office to the file server?'
Peter: 'No. In most offices, schools etc..., there are too many computers or servers to connect an ethernet cable directly between each one. In our office there are 213 workstations/computers and 13 servers. It would be impossible for each computer to have 225 different ethernet cable. Each computer or server only has one ethernet cable. Those cables connects directly to a device called a switch. A switch is an electronic box that is used to direct the data traffic on the network to the correct IP address. All data is sent from a computer or server to it first. It's like a postman, when it receives the data (like an email, file, update) it reads the IP address of where it wants to go to (which is contained in the data) and sends it to the computer, server, printer on the network with that IP address.'
Juan: 'Makes sense. But what happens if I want to send an email to somebody outside the company?'
Peter: 'Well, the email is divided into packets and these packets are sent from your computer through the ethernet cable to the switch. When the switch reads the IP address in the packets of data and knows that it's not for a computer or server on the LAN network, it sends the packets to the router on the LAN network. A router is another piece of hardware or device on the network that is used to send or receive data traffic from a LAN network (like in our office) to or from computers or servers which are outside the LAN network (like the internet, other companies or other offices).'
Juan: 'So if I open a web page from the internet on my computer here, the data of the web page comes to my computer from the internet through the router, then the switch, then the ethernet cable and finally to my computer?'
Peter: 'Basically, yes. The router is the first place on the LAN network that receives data from outside of the LAN network. The router often has a firewall on it to make sure that any data it receives doesn't contain a virus or words or material which have been banned or prohibited by the company. Some companies ban their staff from accessing some websites and it's this software or program on the router that stops the web page.'
Juan: 'Thanks Peter for explaining it.'
1. Computers, mobile phone, servers, cables and switches are all types of ____________.
2. When a copy of all the data and files of a computer is saved/stored on a different computer, it is _______________.
3. A powerful computer that is used on a computer network to store/save other computers' data and files, is called a _______________.
4. A device/machine on a computer network that is used to move data between the different computers and servers, is a _______________.
5. A type of computer network that is normally used in an office or school, is called a ___________________.
6. A cable that is used to transport data from one computer to another on a computer network, is called a ________________.
7. Computer applications and programs are both types of _________________.
8. A 'hard drive' or place on a computer where applications or files are stored/saved, is also called a _________________.
9. The 'small parts' which an email is divided into to be transported on the network, are called _______________.
10. When a person's files and applications are stored on the computer network and not on their local drive/computer, they are on a _________________.
11. The name of the software that stops viruses from entering into a computer network, is called a ___________________.
12. The 'computers' on computer network are often called ________________.
13. A device/machine where all the data entering and leaving a computer network goes through, is called a __________________.
14. The unique name/address that every computer in the world has, is called an ________________.
Code sign/symbol names.
If you work in any type of Information Technology job (designer/developer/support etc...) you will have to understand how to write or read some type of computer code. In computer code, a lot of different signs and symbols are used. For example, ' ? ' or ' . ' .
People are so used to only having to write these code signs/symbols that they don't actually know what the names of many of these signs/symbols are. For example ' ? ' is called a 'question mark' and ' . ' is called a 'point' or 'dot' with numbers and 'full stop/period' with words. Not knowing these names can be a problem if you are speaking to somebody about computer code.
In the following conversation between two work colleagues, Juan asks Peter what the names are of different signs and symbols used in computer code. The names of the signs and symbols are in bold. Focus on the names of these different signs and symbols and then do the quiz at the end to check that you both understand their meaning and remember them.
Juan: "Do you know what one of the biggest problems is with computer code?"
Peter: "No, what?"
Juan: "I can never remember the names in English of some of the signs or symbols that are used in computer code. It's not a problem when writing the symbol, but you look stupid when you have to write or type the symbol when talking to someone, because you don't know its name. For example, what do you call this symbol ' - '? Is it called a dash?"
Peter: "Yes, the ' - ' is commonly called a dash in computer code, but it is also called a hyphen when writing in both English and in computer code. And you call this symbol ' _ ', an underscore."
Juan: "I knew that. What's the name for the little star symbol?"
Peter: "Do you mean ' * ' this?"
Juan: "Yes."
Peter: "The ' * ' symbol is called an asterisk."
Juan: "And the ' @ ' symbol which you use in email addresses?"
Peter: "The ' @ ' symbol is called an at sign."
Juan: "Another symbol I have seen, is this ' / '."
Peter: "The ' / ' symbol is called forward slash, because its top part is leaning forward."
Juan: "So I suppose the ' \ ' symbol is called backslash because the top part is leaning back?"
Peter: "That's right. It's called backslash."
Juan: "And what do you call this symbol ' # '?"
Peter: "It has many names, it's often called the pound sign in America, but everywhere else, ' # ' is called hash."
Juan: "And the ' ( ' and ' ) ' symbols?"
Peter: "They are called parentheses, although they are sometimes called brackets (but not in America). The ' ( ' symbol is normally called open parenthesis and the ' ) ' symbol, close parenthesis.'
Juan: 'I am confused. I thought that the brackets symbols were ' [ ' and ' ] '?"
Peter: "They are type of brackets, and although they are sometimes called brackets in America, the ' [ ' and ' ] ' symbols are normally called square brackets. There are another two types of brackets that are used. ' < ' and ' > ' are called angle brackets and ' { ' and ' } ' are normally called curly brackets. With all types of brackets, the first bracket is called 'open' and the second bracket is called 'close'. So, for example, ' < ' is called 'open angle bracket' and ' ] ' is called 'close square bracket'. Does that make sense?"
Juan: "I think so."
1. The sign/symbol that is called a Forward Slash, is ______________________.
2. The signs/symbols that are called Curly Brackets, are ___________________.
3. The sign/symbol that is called an Asterisk, is _________________________.
4. The sign/symbol that is called a Hash, is _____________________________.
5. The signs/symbols that are called Square Brackets, are __________________.
6. The sign/symbol that is called an Underscore, is ______________________.
7. The sign/symbol that is called a Dash, is _____________________________.
8. The signs/symbols that are called Parentheses, are _____________________.
9. The sign/symbol that is called an At Sign, is _________________________.
10. The signs/symbols that are called Angle Brackets, are _________________.
11. The sign/symbol that is called a Backslash, is ________________________.
More code signs/symbols names
In the following conversation between two work colleagues, Juan continues to ask Peter what the names are of different signs and symbols used in computer code. The names of the signs and symbols are in bold.
Focus on the names of these different signs and symbols and then do the quiz at the end to check that you both understand their meaning and remember them.
Juan: 'There's another symbol that I use all the time, but I don't know what it's called. It's written like this ' ! '.'
Peter: 'The sign ' ! ' is called an exclamation mark.'
Juan: 'Also, is this ' " ' called a speech mark?'
Peter: 'Yes, it can be. ' " ' is more commonly called a quotation mark. There are two types of quotation marks. ' " ' is called a double quotation mark because it has two lines. Where a quotation mark has one line, like this ' ' ', it is called a single quotation mark.'
Juan: 'I thought that ' ' ' was called an apostrophe?'
Peter: 'It is also called an apostrophe. When the symbol is used in writing to show possession of something (e.g. 'this is John's car') or a contraction of two words into one (e.g. it is, is normally contracted into it's), it is called an apostrophe. But when there are two of them and they are used to close a selection of text or calculation (e.g. 'I like cheese'), then they are called single quotation marks.'
Juan: 'That makes sense. Is this ' , ' called a comma?'
Peter: 'That's right.'
Juan: 'And this symbol ' & '. I have heard people call it 'and'. Is that its name?'
Peter: 'People often call it the 'and symbol/sign', but the actual name for ' & ' is an ampersand.'
Juan: 'And what about this ' : '?'
Peter: 'The ' : ' symbol is called a colon. There is also a similar symbol that instead of having two dots has one dot and a comma below it. It is called a semicolon.'
Juan: 'So, a semicolon is written like this ' ; '?'
Peter: 'That's right. Another symbol that is sometimes used in computer code, is called the pipe or vertical bar. It is a vertical line and is written like this ' | '.'
Juan: 'There are two other symbols which I'd just like to check if I am calling them the right names. This ' $ ' is called the dollar sign, isn't it?'
Peter :'Yes, it is.'
Juan: 'And this ' % ' is called percent?'
Peter: 'It can be, but ' % ' is normally called the percent sign.'
Juan: 'I know that this isn't a sign or symbol, but when there is a gap between two words or numbers with nothing in it, like ' '. What is it called?'
Peter: 'Where there is a blank space between words or numbers like this ' ', it is called a space.'
1. The sign/symbol that is called a Colon, is ___________________________.
2. The sign/symbol that is called a Space, is ___________________________.
3. The sign/symbol that is called a Quotation mark, is ____________________.
4. The sign/symbol that is called a Percent sign, is _____________________.
5. The sign/symbol that is called an Exclamation mark, is _________________.
6. The sign/symbol that is called a Dollar sign, is ______________________.
7. The sign/symbol that is called a Comma, is _________________________.
8. The sign/symbol that is called an Apostrophe, is _____________________.
9. The sign/symbol that is called an Pipe, is ___________________________.
10. The sign/symbol that is called a Semicolon, is ______________________.
11. The sign/symbol that is called an Ampersand, is _____________________.
BEST NOSQL DATABASES 2020 – MOST POPULAR AMONG PROGRAMMERS
A database is a collection of information that is organized so that it can be easily accessed, managed and updated. Before starting with the most popular NoSQL databases. You must have to know about NoSQL databases. Most of the programmer doesn’t know what it stands for. It’s Not Only SQL.
What is NoSQL database?
NoSQL databases (additionally called Not Only SQL Databases) are non-relational database systems used for storing and retrieving data. In today’s world, we should not store all the data in table format only which has not predefined fixed schemas( fix no of columns). Like User-generated data, GEO location data, IoT generated data, social graphs are examples of real-world data which has been increasing exponentially. These huge amounts of data required lots of processing also. Here, the NoSQL database comes into the picture. Using NoSQL database we can store and retire document, key-value, graph-based data easily & faster. We can easily avoid complex SQL joins operations. Easy to scale horizontally for real-world problems(web and enterprise business applications) using NoSQL DBs. Carlo Strozzi came with NoSQL term in the 1998 year. The motivation of using NoSQL – the simplicity of design, horizontal scaling to clusters of machines which is difficult to achieve in RDMS databases.
NoSQL Database types
· Document Databases – These Db usually pair each key with a complex data structure which is called a document. Documents can contain key-array pairs or key-value pairs or even nested documents. Examples of document NoSQL: MongoDB, Apache CouchDB, ArangoDB, Couchbase, Cosmos DB, IBM Domino, MarkLogic, OrientDB.
· Key-value stores – Every single item is stored as a Key-value pair. Key-value stores are the most simple database among all NoSQL Databases. Examples of Key-value NoSQL – Redis, Memcached, Apache Ignite, Riak.
· Wide-column stores – These types of Databases are optimized for queries over large datasets, and instead of rows, they store columns of data together. Examples of Wide column NoSQL – Cassandra, Hbase, Scylla.
· Graph stores – These store information about graphs, networks, such as social connections, road maps, transport links. Examples of Graph NoSQL – Neo4j, AllegroGraph.
Best NoSQL Databases 2020
MongoDB
It is an open-source NoSQL database that is document-oriented. MongoDB uses JSON like documents to store any data. It is written in C++.
Cassandra
It was developed at Facebook for an inbox search. Cassandra is a distributed data storage system for handling very large amounts of structured data.
Redis
Redis is the most famous key-value store. Redis is composed in C language. It is authorized under BSD.
HBase
It is a distributed and non-relational database that is designed for the BigTable database by Google.
Neo4j
Neo4j is referred to as a native graph database because it effectively implements the property graph model down to the storage level.
Oracle NoSQL
Oracle NoSQL Database implements a map from user-defined keys to opaque data items.
Amazon DynamoDB
DynamoDB uses a NoSQL database model, which is nonrelational, allowing documents, graphs and columnar among its data models.
Couchbase
Couchbase Server is a NoSQL document database for interactive web applications. It has a flexible data model, is easily scalable, provides consistently high performance.
Memcached
It is an open-source, high-performance, distributed memory caching system intended to speed up dynamic web applications by reducing the database load.
CouchDB
It is an Open Source NoSQL Database which utilizes JSON to store information and JavaScript as its query language.
1. MONGODB
MongoDB is the most well-known among NoSQL Databases. It is an Open-Source database which is Document-oriented. MongoDB is a scalable and accessible database. It is in C++. MongoDB can likewise be utilized as the file system. In MongoDB, JavaScript can be utilized as the query language. By utilizing sharding MongoDB scales horizontally. It is very useful in Popular JavaScript Frameworks. People really enjoying sharding, advanced text searching, gridFS, map-reduce features for the 2020 year. Amazing performance and new features promoted this NoSQL database to 1st place in our list.
2. CASSANDRA
Cassandra was developed at Facebook for inbox search. Cassandra is a distributed data storage system for handling very large amounts of structured data. Generally, these data are spread out across many commodity servers. You can also add storage capacity of your data keeping your service online and you can do this task easily. As all the nodes in a cluster are same, there is no complex configuration to deal with. Cassandra is written in Java. Cassandra Query Language (CQL) is a SQL-like language for querying Cassandra Database. As a result, Cassandra stands 2nd in best open source databases. Cassandra is being used by some of the biggest companies such as Facebook, Twitter, Cisco, Rackspace, eBay, Twitter, Netflix, and more.
3. REDIS
Redis(Remote Dictionary Server) is a key-value store. Furthermore, it is the most famous key-value store. Redis has support for some C++, PHP, Ruby, Python, Perl, Scala and so forth. Redis is composed in C language. Furthermore, it is authorized under BSD. Some fun facts about Redis NoSQL Database – It can handle up to 2 ³² keys and was tested in practice to handle at least 250 million keys per instance. It is an in-memory but persistent on-disk database. It means it will store all data in RAM only for backup only use disk(HDD or SSD).
4. HBASE
HBase is a distributed and non-relational database which is designed for the BigTable database by Google. One of the main goals of HBase is to host Billions of rows X millions of columns. You can add servers anytime to increase capacity. And multiple master nodes will ensure high availability of your data. HBase is composed in Java 8. It’s authorized under Apache. Hbase accompanies simple to utilize Java API for customer access also.
5. NEO4J
Neo4j is referred to as a native graph database because it effectively implements the property graph model down to the storage level. This means that the data is stored exactly as you whiteboard it, and the database uses pointers to navigate and traverse the graph. Neo4j has both a Community Edition and Enterprise Edition of the database. The Enterprise Edition includes all that Community Edition has to offer, plus extra enterprise requirements such as backups, clustering, and failover abilities.
6. ORACLE NOSQL
Oracle just started NoSQL database with Oracle NoSQL. It’s becoming popular in the year 2018. It less popular compare to MongoDB and Casandra databases. Oracle NoSQL Database implements a map from user-defined keys to opaque data items. Although it records internal version numbers for key/value pairs, it only maintains the single latest version in the store. The version of Oracle, 12c, is designed for the cloud and can be hosted on a single server or multiple servers, and it enables the management of databases holding billions of records. Some of the features of the latest version of Oracle include a grid framework and the use of both physical and logical structures. Oracle Database 18c now provides customers with a high-performance, reliable and secure platform to easily and cost-effectively modernize their transactional and analytical workloads either in the Cloud, or on-premises or in a Hybrid Cloud configuration.
7. AMAZON DYNAMODB
DynamoDB uses a NoSQL database model, which is nonrelational, allowing documents, graphs and columnar among its data models. Each DynamoDB query is executed by a primary key identified by the user, which uniquely identifies each item. It also relieves the customers from the burden of operating and scaling a distributed database. Hence, hardware provisioning, setup, configuration, replication, software patching, cluster scaling, etc. is managed by Amazon.
8.COUCHBASE
The focus is on the ease of use, embracing the web. It is a NoSQL document store database. Couchbase Server is a NoSQL document database for interactive web applications. It has a flexible data model, is easily scalable, provides consistently high performance. Couchbase Server, JSON documents are used to represent application objects and the relationships between objects.
9.MEMCACHED
Memcached is an open source, high-performance, distributed memory caching system intended to speed up dynamic web applications by reducing the database load. It is a key-value dictionary of strings, objects, etc., stored in the memory, resulting from database calls, API calls, or page rendering. It is now being used by Netlog, Facebook, Flickr, Wikipedia, Twitter, and YouTube among others.
10.COUCHDB
CouchDB is an Open Source NoSQL Database which utilizes JSON to store information and JavaScript as its query language. It applies a type of Multi-Version Controlling system for avoiding the blockage of the DB file during writing. It is Erlang. It’s authorized under Apache. It is ranked 1st for Best NoSQL Database 2016 list for popularity.
Before we summarize the article we compare the three databases:
Parameter |
Cassandra |
MongoDB |
HBase |
Description |
High scalability, strong security by lowering overall cost of ownership |
Traded in JSON format, Schema-less database |
Key-value stores which run on top of HDFS |
Data Model |
Key Spaces |
Flexible Schema |
Column-Oriented DB |
Implementation Language |
Java |
C++ |
Java |
Query Language |
CQL-Cassandra Query Language |
Dynamic Object-Based Language and JavaScript |
MapReduce |
Performance |
More Durable and Slight better among the three of them |
Less durable compared to Cassandra |
Less durable compared to Cassandra |
Security |
TLS/SSL Encryption |
Encryption |
Thrift Server role |
Replication Methods |
Selective Replication Factor |
Master Salve Replication |
Selective Replication Factor |
Competitive Advantage |
No chance of Failure and it ensures 100% availability, High-Scalability |
Best of Traditional Database, Giant-Ideas |
Store Large dataset on top of HDFS, Aggregate and analyze billions of rows in HBase table for online analytics |
Application Areas |
Used in fraud detection applications. Twitter and Netflix used Cassandra. |
Used in a mobile single view, real-time analytics |
Used in medical to store the genome sequence, sports, storing match histories for better analytics, Web use Hbase for better customer targetting |
Market Metrics |
40% of the Fortune Hundred Companies |
40 million downloads |
7% of the companies in the world |
Google search trends worldwide from January 2019— December 2019.
Google is the best friend of every developer on the planet. So it is fair to analyse the search trends and find the programming languages developers were the most interested in this year. So based on the following parameters, the top programming languages 2020 for businesses came to be these:
· JavaScript
· Python
· Java
· Go
· Elixir
· Ruby
· Kotlin
· TypeScript
· Scala
· Clojure
1. JavaScript
· Average JavaScript Developer Salary in the US as per Indeed: $109,462 per year.
· Recognized as the most popular top programming language in the Stack Overflow Developer Survey 2019.
· Most popular programming language on GitHub.
· It seems that JavaScript has gone down in popularity since the past year as per data from Google trends. The language was almost at the peak score with a rating of 91 in January 2019. In December 2019, we saw a dip in popularity and JavaScript scored only 62 out of 100.
2. Python
3. Java
4. C
5. Go
6. Swift
7. Ruby
8. Kotlin
· Average global salary for development on Kotlin: $57k. The average salary for Kotlin developers in the US is $125k.
· Although Kotlin isn’t one of the most highly paid languages as of right now, its demand as soaring thanks to Google declaring it as the official language for android app development.
· Kotlin is the 15th most active top programming language on GitHub, having risen by one rank since the last year.
· Kotlin’s popularity has mostly remained consistent this year. The user interest on this language peak during the month of May. This was possibly due to the I/O 2019 and Google’s declaration of Kotlin being used as a primary language for android app development.
9. TypeScript
10. Scala
Solving a Customer's Server Problem
People often use funny slang and abbreviations in chats and other social situations. Typically, there is also a more relaxed attitude towards grammar as well. The following is a chat transcript between an account manager and a software engineer working at a web hosting company. They are troubleshooting a server problem that affects one of their customers. Please note that you should not use slang with unfamiliar people. Using slang is not professional and can be taken badly by some people. You have been warned!
Account Manager: TIL that certain web page requests are taking forever to load on some of our servers. One client in particular is really pissed off.
Sysadmin: what is the name of the client?
Account Manager: Svensson Trucking Supply
Sysadmin: brb i need to be afk for 30 minutes
Account Manager: 30 minutes? this guy is a major client and management says we need to fix this issue asap. they told me you were the 1337 alpha geek who could resolve this issue right away.
Sysadmin: lol... 1337 alpha geeks need to eat lunch too :P
Account Manager: LMAO that you would eat lunch right now. Please look into the problem BEFORE lunch!
Sysadmin: okay gimme 5 minutes
Time passes...
Account Manager: Did you find the problem?
Sysadmin: wow did i... imho the site was set up by a total n00b. there is a major security hole in their iis web server. someone set up a warez site on a subdomain and there are 100 leeches sucking up all the bandwidth.
Account Manager: WTF. No wonder their site is so slow
Sysadmin: they are using a really old version of iis server. let me upgrade and patch it for them.
Account Manager: Okay. I will call the client and update them on the status.
Time passes...
Sysadmin: okay the server is patched and running normally. now im gonna go eat... 1337 alpha geek ftw!
Account Manager: Nice work! Thanks a million!!!!
Sysadmin: how about telling management to give me a raise since im the only one who knows how to solve client problems?
Account Manager: Wow that's funny. I'm literally ROTFL
Sysadmin: FU
Account Manager: Hahahaha! I'll pretend I didn't hear that. L8R skater.
A Controversial IT Purchase
People often use funny slang and abbreviations in chats and other social situations. Typically, there is a relaxed attitude towards the rules of grammar. The following is a chat transcript between an older grumpy senior developer and a younger intermediate developer. They are discussing a recent hardware acquisition.
Please note that you should not use slang with unfamiliar people. Using slang is not professional and can be taken badly by some people. You have been warned!
*-- The Bunion --*: Did you hear what happened? We had to buy some new hardware last month to run that new killer app that management thought was so important.
Deadly Avenger: Really? What was wrong with the old hardware?
*-- The Bunion --*: It was too old to be used anymore, apparently. I told them the hardware requirements for the new CRM system BEFORE they bought it. Now they need to upgrade the whole internal network as well.
DeadlyAvenger: What are they gonna upgrade to?
*-- The Bunion --*: You won't believe it. A whole truckload of brand new Dell PowerEdge servers with Intel Xeon processors. And a 10 gbps ethernet connection hooking everything together.
DeadlyAvenger: Cool. That sounds like some real leading edge stuff.
*-- The Bunion --*: Whatever. We could have saved a lot of money by staying on the old software platform. It was good enough to make any CRM geek happy.
DeadlyAvenger: Let me get this straight. You're complaining about management buying new hardware? The old hardware was totally EOL.
*-- The Bunion --*: It's such a PHB move to spend so much on replacing a perfectly functioning CRM platform. The CTO probably read a shiny pamphlet at a trade show in San Francisco, had a few drinks over dinner, and then immediately signed the contract.
DeadlyAvenger: You might be stuck in the past, but the code monkeys in the developer room will be salivating over the new equipment. Now they can rewrite their spaghetti code into more object-oriented goodness.
*-- The Bunion --*: I don't mean to be a pita, but I checked out the user reviews of that new release and people say it's fundamentally horked. Newer does not always mean better. It doesn't pay to be an early adopter.
DeadlyAvenger: That may well be true. I thought maybe we should have hosted the new application in the cloud. That's what all the trendsetters are doing nowadays. And people from remote offices would like that because they would get quicker load times.
*-- The Bunion --*: The cloud? Are you serious? What about security? You are such a fanboy of every new IT fad that comes along.
DeadlyAvenger: At least I am not a troll. You are trying to start a flame war on the company intranet discussion forum in order to show upper management how much you are trying to save money.
*-- The Bunion --*: Well, we didn't exactly have a great financial year so far. Now the whole IT department will be busy upgrading instead of solving our customers' true needs.
DeadlyAvenger: Admit it. If it were up to you, we'd all still be on mainframes programming COBOL.
*-- The Bunion --*: Hahahaha. Yeah I guess you're right. But saving the company money is the only effective way I know of proving I deserve a raise every year.
DeadlyAvenger: Or you could end up proving that you are a cranky old man and get yourself relocated to the Accounting department ;)
*-- The Bunion --*: Whatever. You guys wouldn't last two weeks without me here!
DeadlyAvenger: Maybe you're right. I gotta go now. Bye.
*-- The Bunion --*: Howdy.
Ten Commandments of Computer Ethics
Created by the Computer Ethics Institute
1. Thou Shalt Not Use A Computer To Harm Other People.
2. Thou Shalt Not Interfere With Other People’s Computer Work.
3. Thou Shalt Not Snoop Around In Other People’s Computer Files.
4. Thou Shalt Not Use A Computer To Steal.
5. Thou Shalt Not Use A Computer To Bear False Witness.
6. Thou Shalt Not Copy Or Use Proprietary Software For Which You have Not Paid.
7. Thou Shalt Not Use Other People’s Computer Resources Without Authorization Or Proper Compensation.
8. Thou Shalt Not Appropriate Other People’s Intellectual Output.
9. Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or The System You Are Designing.
10. Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect For Your Fellow Humans.
Top 15 American IT Companies
For some reason, most of the large IT companies in the world are American. For instance Google, Apple, Microsoft, Facebook, etc. As an IT professional, you are expected to know about big IT corporations, revenue, profits, budgets, and other economic matters. Why?
Because these things affect your capacity to perform your tasks. The economy tends to go in cycles. In an up cycle, you will get resources to build or improve systems. In a cycle you will be pressured to cut spending and possibly even lay off staff. This is business as usual" and nothing to get excited about. Over the span of your career you will experience many up and down economic cycles.
Studying what the big IT companies do right and wrong will help you think of ideas how to improve your own IT department. No matter if you work for a small company, non-profit organization, or a government institution, you will learn quickly that most decisions are based on money. The best way to implement your "great idea" is to argue that it will save time or increase profits. Trying to argue a point without keeping efficiency, profits and budgets in mind will be difficult.
Below is a chart of 15 American IT companies I think are important to know about. The more you know about the business of IT, the better IT professional you will become.
Company |
Rank |
Revenue |
Profit |
Products |
443 |
5,854 |
871 |
Graphic Design Software / Flash Media |
|
565 |
4,272 |
471 |
CPU / GPU |
|
3 |
215,639 |
14,013 |
Computer Hardware / Software |
|
Cisco Systems |
60 |
49,247 |
7,767 |
Networking Equipment |
41 |
64,806 |
2,635 |
Computer Hardware |
|
27 |
90,272 |
8,505 |
Search / Software |
|
61 |
48,238 |
8,761 |
Computer Hardware / Services |
|
32 |
79,919 |
14,833 |
Computer Services / Software / Hardware |
|
47 |
59,387 |
11,464 |
Microprocessors, Components |
|
28 |
85,320 |
18,760 |
Computer Software |
|
81 |
37,047 |
6,135 |
Database Software / Services |
|
387 |
6,910 |
-30 |
GPU / CPU / chipsets |
|
217 |
12,994 |
1,382 |
Hard Disk Drives / Computer Hardware |
РЕФЕРИРОВАНИЕ и АННОТИРОВАНИЕ
Аннотирование и реферирование, или процессы информационной обработки текстов, являются одной из самых широко распространенных письменных форм быстрого извлечения информации и ее смысловой обработки. Основой таких видов деятельности является понимание иностранного текста и навыки перевода научно-технической литературы.
Нужно уметь отделять главное от второстепенного, анализировать и обобщать обрабатываемый материал.
Сущность информационной обработки текстов состоит в кратком и обобщенном изложении содержания первоисточника. Целью информационной обработки текста является извлечение полезной и ценной информации по конкретной проблематике.
Термины «первичные» и «вторичные» тексты появились из теории научно-технической информации. Понятие «первичный», «вторичный» используются как основание классификации информационных документов. Вторичные тексты создаются в результате преобразования исходного, первичного, базового текста. Вторичные тексты – это библиографическое описание, аннотация, реферат, конспект, перевод, рецензия.
Библиографическое описание может быть самостоятельным информационным вторичным документом (используется в библиотечных каталогах и библиографических указателях) или частью другого вторичного документа (используется как вводная часть в аннотациях и рефератах). Библиографическое описание дает все необходимые данные о первичном документе и состоит из следующих элементов в определенной последовательности:
Аннотирование – информационный процесс составления кратких сведений о первоисточнике, первое с ним знакомство, которое позволяет судить о целесообразности его более детального изучения в дальнейшем. Аннотация (от лат. annotatio – замечание) предельно краткое изложение того, о чем можно прочитать в данном первоисточнике. В аннотации (как вторичный текст) перечисляются главные вопросы, проблемы, изложенные в первичном тексте, а также может характеризоваться его структура.
В отличие от реферата, который дает возможность читателю познакомиться с сутью излагаемого в первоисточнике содержания, аннотация не раскрывает содержание документа, в ней не приводятся конкретные данные, описание оборудования, характеристики, методики и т.д., а она дает лишь самое общие представление о его содержании. Аннотация помогает найти необходимую информацию по интересующему вопросу.
АЛГОРИТМЫ В ОБУЧЕНИИ АННОТИРОВАНИЮ
И РЕФЕРИРОВАНИЮ
Алгоритм – совокупность автоматических действий для решения данной задачи. При аннотировании и реферировании можно рекомендовать следующие алгоритмы:
а) Прочтите заголовок текста, определите, дает ли он представление о содержании текста.
б) Просмотрите, делится ли статья на разделы (есть ли подзаголовки).
в) Если «да», прочтите подзаголовки, определите, о чем они.
г) Обратите внимание, есть ли рисунки, схемы, таблицы.
д) Если «да», прочтите подписи под ними.
е) Если есть аннотация к тексту, то прочтите ее.
ж) Если «нет», то прочтите первый и последний абзацы текста и по ключевым словам определите о чем текст.
Или, например:
а) Просмотрите текст с целью получения общего представления о тексте в целом.
б) Выделите абзацы, содержащие конкретную информацию по теме статьи, методу проведения работы, результатом работы, применению в конкретной области.
в) Сократите малосущественную информацию в этих абзацах по каждому пункту.
г) Напишите обобщенную основную в форме реферата в соответствии с планом его написания: тема, метод, результаты, выводы, применения.
III. Или при оформлении библиографического описания аннотации и реферата:
а) Укажите заглавие реферируемой статьи на русском языке и языке оригинала.
б) Если есть автор или авторы, напишите их на языке оригинала (помните, что если авторов больше двух, указывается только первый и затем пишется «и др.»).
в) Затем напишите название источника информации на языке оригинала, год, номер, обязательно страницы.
г) Только затем пишется текст аннотации или реферата.
Phrases to be used in an annotation
ü The passage is an extract from…
ü The extract I am dealing with is taken from…
ü The text under consideration is taken from…
ü The text I am going to comment on is a story by…
ü This extract presents an act from the play…by the English playwright W.
o Shakespeare.
ü The given passage is an extract from…
ü The plot of the story is concerned with (the upbringing of children…)
ü The subject-matter of the passage is (a description of a certain Mrs. General, a snobbish and pretentious lady…)
ü The story tells of (the tragic fate of a young poet…)
ü The write unfolds the sad story of (a boy who was brought up by distant relatives, cruel and hard-hearted people…)
ü The story gives a deep insight into (the life of the common people, «the little man’s» existence…)
ü This play sums up many burning problems of the time, such as…
ü The story shows the drama of (the character s inner world…)
ü The chapter gives a true picture of (contemporary social and family relations in bourgeois society…)
ü The story depicts (the plight of the city poor, and the striking contrast between their miserable existence and the life of the privileged few…)
ü The action takes place in (an old English estate…)
ü The setting for the play is (a lodging house owned by…)
ü The main characters are…
ü The plot is very simple…
ü The plot, as such, is practically eventless…
ü The story is full of events…
ü These are the main facts that make up the plot of the story.
ü This is the gist of the extract.
ü Such is the plot of the extract.
Phrases to bu used while working with the text
ü The story is told in the third person narration (this is third person narration; the narrative is the first person).
ü The story is told from the point of one the characters, namely…
ü The narrator (an onlooker who does not take part in the events but whose keen interest in them is quite obvious).
ü The narrator focuses his attention on…
ü The character s perception of the events permeates the whole story and makes it dramatic (appealing, humorous…)
ü In this story we can observe the conventional sequence of compositional elements: an exposition, a gradual mounting of tension, with final climax and denouement.
ü The opening paragraph presents (an exposition to the story…)
ü It is description of…, an account of…, etc.
ü The story opens with a description of…
ü The opening paragraph introduces (the main characters and gives some details of their life…)
ü The first part of the text which presents an exposition to the events is written in the form of the description blended with a dialogue.
ü The atmosphere and details of living are described convincingly (perfectly, exactly as in life).
ü The landscape is not simply the background (it plays a definite role in the development of the plot; highlights certain features of a character…)
ü The description of (the place of action…) gives a deeper insight into the situation. From this description we understand that (the imaginary state of Winnemac is an artistic incarnation of the exacting American states, with their landscape, customs and history).
ü The basic compositional feature of this story is suspense. It is created by a number of relevant details which intensify the tension of the situation. These details include…
ü This part of the text is written in the form of a narration which conveys the dynamic development of the plot.
ü The tense rhythm of the narration is interrupted by / accentuated by (dialogues in which the reader s attention is drawn to a new topic…)
ü The narration is closely interwoven and interlaced with the monologue of the character which gives an insight into (the character s state of mind…)
ü The next paragraph adds some more details to the reader s knowledge of the situation.
ü The episode of the argument (the character s meeting…) is the climax of the story. This scene is (dramatic; solemnly impressive; humorous…)
ü The episode presents the crucial point of the story. The reader understands that…
ü The concluding paragraph presents the denouement. Everything is more clear...
ü The story ends with…
ü Two characters are presented in this extract…
ü The personages are given a profound and true-to life psychological characterization.
ü The character is presented as (weak-willed; passive, a man lacking in firmness, helpless, gentle, intelligent, cheerful, tactful, honest in dealing with other people, a person with a clear conscience…).
ü The description brings out (the characteristic features of Mr. X s personality, such as his dignity; his yearning for a new life; his splendid calm..).
ü All the details of his appearance (the full ruddy face, the keen look, the mockingly condensing smile…) speak of man s (sanguine temperament, intelligence, confident dignity, composure, devotion to his convictions, remarkable will-power…)
ü Mr. X s personality is revealed to the full through his own words and the remarks of other personages. He is described as a (cruel, hard-hearted, haughty, greedy, tactless, hypocritical, dishonest, narrow-minded, rude, irritable, ill-bred, fussy…) man.
ü His actions enumerated in the narration characterize him as a (good-natured, sensible, stubborn, reliable, resourceful, persistent, shrewd) person.
ü She is characterized by (reserve, reluctance to allow anybody to get an insight into her inner state…)
ü There were certain traits in her character that were alien to her husband such as…
ü All these details underline (the character s social position, her absolute lack of breeding…)
ü The characters are convincing and well-drawn…
ü The characters are typical and authentic and their psychology is well rendered.
ü The mood prevalent in the extract is (cheerfulness, humour, irony, gloom, nervousness, bleakness, melancholy, happiness…).
ü The tone of the extract is tensely dramatic. The author lays bare the spiritual drama of…
ü The story is full of jokes, witticism, and light-hearted jest.
ü The story is distinguished by its cheerful tone.
ü The extract has a tragic ring.
ü The mood of wretchedness, anxiety permeates the text (The story is permeated with…).
ü The story reflects life, and in life everything is mixed up together: the profound with the trivial, the great with pretty, the tragic with the comic.
ü Minute details add to the matter-of-fact and logical tone of the narration.
ü The author clearly displays his sympathy for the character. With anger and acrimony he shows the triumph of philistines and brutality.
ü The story is filled with deep sympathy for the poor and a bitter harted for the rich.
ü The author’s message is expressed very clearly. The writer raises his voice in defense of (human dignity…).
Cliches for working with newspaper articles
ü The newspaper under review is…№…1999
ü The article headline reads as follows…
ü The article is published under the rubric…
ü The author of the article is…
ü The subject of the article is…
ü The main idea of the article is…
ü The main idea of the article is in the very headline.
ü The main idea of the article is in the following lines…(words).
ü It’s a political commentary.
ü It’s an editorial article.
ü The main idea of the article is in the last paragraph.
ü The material is topical.
ü The material of the article is devoted to…
ü The material attracts the reader.
ü The article gives very full attention to this event.
ü The article deals with the problem of…
ü The article carries material on (about)…
ü The opening paragraph conveys the principal item of the article.
ü The 1st paragraph introduces the main idea of the editorial.
ü The next part of the article is devoted to (deals with)…
ü Paragraph 3 discusses…
ü Further, the author dwells on…
ü According to the author…
ü The author speaks in details about…
ü In compressed form…
ü The paper gives figures illustrating…
ü In conclusion the author adds (I should add)…
ü In conclusion I should mention that…
The author:
- remarks
- points out that
- stresses
- underlines
- speaks about … in details
- also explains that
- describes
- states
- declares
INTRODUCTION
ü The news… provides a front-page story in the paper.
ü The stories… dominate the front page.
ü The main front-page news in the paper is…
ü The paper carries a long/short editorial about…
ü The news…caused a lot of editorial about…
ü The news…gets the attention on the front page.
ü …provides the leading domestic ( international, foreign) news
ü The leading item of foreign news…
ü The editorial is concerned with…
ü The paper comments on…
ü Another big front-page item concerns…
NEUTRAL
ü The article draws attention to the fact…
ü The paper finds a good deal to say…
ü In the paper’s views…
ü The author brings out the problem…
ü The article describes…
ü The author outlines/points out…
ü The paper cites as proof of…
ü The paper addresses its editorial on the problem…to…
ü The paper comments…
ü The editorial is mainly concerned with domestic affairs…
ü The article ends with the comment…
ü The editorial concludes…
ü The paper focuses its attention on…
ü The article highlights the consequences of…
ü As the paper puts it…
ü In its comment the paper reviews…
ü A four-column article on the inside page sums up…
ü A detailed front-page article summarizes…
FOR
ü The paper finds a good deal to say in support of…
ü The paper finds it significant that…
ü The paper calls for more pressure…
ü The newspaper is confident that…
ü The paper aggress that…
ü The paper strongly believes that…
ü The paper makes a vigorous call for…
ü The paper declares its support for…
ü The paper concludes with a strong appeal for…
ü The paper expresses approval of / support of…
ü The editorial expresses the belief (the conviction, the opinion, the view) that…
AGAINST
ü The author argues that…
ü The author fails to answer the question…
ü The paper accuses…
ü The editorial bitterly attacks…
ü The paper condemns…
ü The editorial is sharply critical of…
ü The article strongly denounced…
ü The editorial disagrees with…
ü The paper expresses alarm (concern, disappointment) at…
ü The paper strongly protects against…
ü Summing up the… the author regrets that…
ü The newspaper strongly rejects the idea of…
ü The paper briefly touches upon…
ü The paper deals with the problem…
TEXTS
Cryptocurrency
Digital currency is a type of currency available in digital form. It exhibits properties similar to physical currencies, but can allow for instantaneous transactions and borderless transfer-of-ownership.
Examples include virtual currencies and cryptocurrencies and central bank issued money accounted for in a computer database. Like traditional money, these currencies may be used to buy physical goods and services, but may also be restricted to certain communities such as for use inside an online game or social network.
In early 2009, an anonymous programmer or a group of programmers under an alias Satoshi Nakamoto introduced Bitcoin. Satoshi described it as a ‘peer-to-peer electronic cash system.’ It is completely decentralized, meaning there are no servers involved and no central controlling authority. The concept closely resembles peer-to-peer networks for file sharing.
One of the most important problems that any payment network has to solve is double-spending. It is a fraudulent technique of spending the same amount twice. The traditional solution was a trusted third party - a central server - that kept records of the balances and transactions. However, this method always entailed an authority basically in control of your funds and with all your personal details on hand.
In a decentralized network like Bitcoin, every single participant needs to do this job. This is done via the Blockchain - a public ledger of all transaction that ever happened within the network, available to everyone. Therefore, everyone in the network can see every account’s balance. Every transaction is a file that consists of the sender’s and recipient’s public keys (wallet addresses) and the amount of coins transferred. The transaction also needs to be signed off by the sender with their private key. All of this is just basic cryptography. Eventually, the transaction is broadcasted in the network, but it needs to be confirmed first.
Within a cryptocurrency network, only miners can confirm transactions by solving a cryptographic puzzle. They take transactions, mark them as legitimate and spread them across the network. Afterwards, every node of the network adds it to its database. Once the transaction is confirmed it becomes unforgeable and irreversible and a miner receives a reward, plus the transaction fees.
Cryptocurrencies are so called because the consensus-keeping process is ensured with strong cryptography. This, along with aforementioned factors, makes third parties and blind trust as a concept completely redundant. Many existing digital currencies have not yet seen widespread usage, and may not be easily used or exchanged. Banks generally do not accept or offer services for them.
There are concerns that cryptocurrencies are extremely risky due to their very high volatility and potential for pump and dump schemes. Regulators in several countries have warned against their use and some have taken concrete regulatory measures to dissuade users. The non-cryptocurrencies are all centralized. As such, they may be shut down or seized by a government at any time. The more anonymous a currency is, the more attractive it is to criminals, regardless of the intentions of its creators.
Elon Reeve Musk
Elon Reeve Musk - American engineer, inventor and investor. Co-founder of PayPal;founder, co-owner, Chief Executive Officer and chief engineer of SpaceX; Chief Executive Officer and chief inspirer of Tesla; was also a member of the Board of Directors of Solar City. Born and raised in Pretoria, South Africa, Musk moved to Canada when he was 17 to attend Queen's University. He transferred to the University of Pennsylvania two years later, where he received an economics degree from the Wharton School and a degree in physics from the College of Arts and Sciences.
At the age of ten, Elon received as a gift his first Commodore VIC-20 computer and learned to program on it. At the age of twelve, he sold for $ 500 his first program – a video game called Blastar. In 1995, Musk and his brother founded Zip2, a company that specialized in software for news companies. In 1999, Zip2 was purchased by Compaq for $ 308 million. Musk received $22 million.
In March 1999, Musk was one of the founders X.com. In 2000 X.com has merged with PayPal. Both systems were engaged in providing personal electronic money transfers via e-mail, and the purpose of the transaction was the merger of both payment systems. This impressive success allowed the company to place its shares on the stock exchange in February 2002 In October 2002 PayPal was bought by eBay for 1.5 billion dollars. At the time of sale Mask owned 12 % of the company, which allowed him to gain $ 180 million.
In May 2002, Musk founded his third company — SpaceX, investing in it 100 million dollars. Elon Musk set a goal — to reduce the cost of space flights by 10 times. In January 2016 at the investment forum in Hong Kong, Musk announced that his company hopes to fly to Mars in 2020-2025.
In 2006, he inspired the creation of SolarCity, a solar energy services company. In 2015, Musk co-founded OpenAI, a nonprofit research company that aims to promote friendly artificial intelligence. In July 2016, he co-founded Neuralink, a neurotechnology company focused on developing implantable brain–computer interfaces.
Tesla - American company, based in Palo Alto, California. The company specializes in electric car and solar panel manufacturing. Musk has envisioned a high-speed transportation system known as the Hyperloop, and has proposed a vertical take-off and landing supersonic jet electric aircraft, known as the Musk electric jet.
Rewards. 2007 American Institute of Aeronautics and Astronautics George Low award for the most outstanding contribution in the field of space transportation. Musk was recognized for his design of the Falcon 1, the first privately developed liquid-fuel rocket to reach orbit.
In 2008, Esquire magazine included the Mask in the list of 75 most influential people of the XXI century. The world governing body for aerospace records, presented Musk in 2010 with the highest award in air and space, the FAI Gold Space Medal, for designing the first privately developed rocket to reach orbit. In June 2011, he was awarded the Heinlein prize for his achievements in space commercialization of 500 thousand us dollars. In February of the same year, Forbes magazine included the Mask In the list of 20 most influential American CEOS under the age of forty.
In 2012, Musk was awarded the Royal Aeronautical Society's highest award: a Gold Medal. In November 2013, Fortune magazine named him entrepreneur of the year and the Wall Street Journal named Mask CEO of the year. In 2015, he was awarded IEEE (Ай трипли) Honorary Membership. In June 2016, Business Insider named Musk one of the "Top 10 Business Visionaries Creating Value for the World" along with Mark Zuckerberg and Sal Khan.
In December 2016, Musk was ranked 21st on Forbes list of The World's Most Powerful People. In May 2017, Musk was awarded the Oslo Business for Peace Award. For outstanding services to science on May 9, 2018, Elon Reeve Musk was awarded the membership of the Royal society of London.
According to Elon himself, he was greatly influenced by the cycle of science fiction novels "the Foundation" and the views of Isaac Asimov on the development of outer space as the development and preservation of human existence. Musk has stated that the goals of SpaceX, Tesla, and SolarCity revolve around his vision to change the world and humanity. His goals include reducing global warming through sustainable energy production and consumption, and reducing the risk of human extinction by establishing a human colony on Mars.
EXERCISES
Match the verbs with the nouns.
1. recharge 2. click on 3. dial 4. give 5. move 6. print out 7. send and receive 8. take some |
a. digital photos b. faxes c. a number on your mobile phone d. a presentation e. something with the mouse f. the battery g. the mouse h. twenty pages |
|
|
Choose the best verb.
1. To turn on the computer, __________ the "Start" button. |
||||
a. touch |
b. press |
c. switch |
||
2. The printer has __________ of ink. |
||||
a. finished |
b. ended |
c. run out |
||
3. Unfortunately, my scanner isn't __________ at the moment. |
||||
a. working |
b. going |
c. doing |
||
4. Please __________ the CD ROM. |
||||
a. insert |
b. introduce |
c. inject |
||
5. The projector isn't working because it isn't __________. |
||||
a. plugged |
b. plugged in |
c. plugged into |
||
6. The batteries in my digital camera are nearly dead. They need __________. |
||||
a. to change b. exchanging c. changing |
||||
7. I have to __________ a computer screen for eight hours a day. |
||||
a. see |
b. look at |
c. watch |
||
8. Switch off your computer, and __________ it from the wall socket. |
||||
a. de-plug |
b. unplug |
c. non-plug |
||
9. I turned off the photocopier and ___________ the plug. |
||||
a. pulled out |
b. extracted |
c. took away |
||
10. __________ any key to continue. |
||||
a. Kick |
b. Smash |
c. Hit |
||
Rearrange the letters to make things which can be part of a workstation.
TUCMEPOR |
COMPUTER |
TRIRPEN |
|
NASECNR |
|
KESD |
|
HACIR |
|
NOPELETHE |
|
Choose the best word.
1. The mouse moves on a __________. |
||
a. mouse mat |
b. mouse carpet |
c. mouse table |
2. TV and computer screens are usually measured in __________. |
||
a. feet |
b. miles |
c. inches |
3. Before you start work, __________ the height of your chair |
||
a. adjust |
b. change |
c. rearrange |
4. To get sound from your computer, plug in a pair of __________. |
||
a. loudhailers |
b. loudspeakers |
c. loud voices |
22. The computer is connected to the telephone line via a __________. |
||
a. module |
b. modem |
c. mod |
23. You can increase the functions or performance of a computer with an __________. |
||
a. extension card |
b. exploding card |
c. expansion card |
24. Mobile phones and PDAs can communicate with computers via __________. |
||
a. Bluebeard ® |
b. Blueberry ® |
c. Bluetooth ® |
25. There's a spare __________ in the workstation… |
||
a. electric hole |
b. power point |
c. electrical opening |
26. …so you can plug in your mobile phone __________. |
||
a. charger |
b. power |
c. electrification |
27. SD cards can be read in a computer's __________. |
||
a. storage reader |
b. memory reader |
c. card reader |
How to scan an image
at |
connected |
file format |
handheld |
dpi |
original |
image editing |
high |
text |
low |
brightness |
contrast |
click |
adjust |
preview (or prescan) |
flatbed |
OCR software |
all-in-one |
|
|
1. Make sure the scanner is _____________ to the computer.
2. Lift the lid and put the _____________ on the scanner glass.
3. For high image quality, scan _____________ 300 _____________ or higher.
4. The scanning software will automatically do a _____________.
5. If the image is too dark or too light, you can __________ the _____________ and _____________.
6. _____________ "scan".
7. If you scanned _____________, it can be "read" by _____________.
8. If you want to save the image, choose a _____________. JPEG is a good choice for photos.
9. The scanned image can be manipulated using _____________ software.
10. An _____________ printer/scanner can print, scan and copy.
11. Picture A is a _____________ scanner.
12. Picture B is a _____________ scanner.
13. Picture C is a _____________ resolution photograph.
14. Picture D is a _____________ resolution photograph.
A |
C |
|
|
B |
D |
|
|
dpi stands for dots per inch (1 inch = 2.4cm)
OCR stands for Optical Character Recognition
JPEG is pronounced "jay-peg"
Список литературы |
|
1. |
K. Boeckner, P. Charles Brown. Oxford English for Computing. Oxford University Press, 2019. |
2. |
Jon Marks. Computers and IT. A & C Black _ London. Third edition. – 2017. |
3. |
Santiago Esteras and Elena Marco Fabré. Professional English in Use ICT. Cambridge University – 2018. Режим доступа: https://www.cambridge.es/en/ |
4. |
Duffy, Vincent G. Handbook of Digital Human Modeling: Research for Applied Ergonomics and Human Factors Engineering. CRC Press. – 2016. ISBN 9781420063523 |
Интернет - ресурсы: |
|
1. |
|
2. |
|
3. |
|
4. |
|
5. |
|
6. |
|
7. |
|
8. |
|
9. |
.
ПРИЛОЖЕНИЕ
Слово |
Перевод |
to back up |
выполнять резервное копирование |
to boot |
загружать, загружаться |
to burn |
записывать на оптический диск |
to create |
создавать |
to compile |
компилировать |
to compress |
сжимать (например, архиватором) |
to connect |
соединять, подключаться |
to cut |
вырезать в буфер обмена |
to debug |
отлаживать |
to decrypt |
расшифровывать |
to delete |
удалять |
to deploy |
развертывать (например, приложение на сервере) |
to develop |
разрабатывать |
to disable |
отключать, деактивировать |
to disconnect |
разъединять, отключаться |
to display |
отображать |
to download |
загружать, скачивать |
to eject |
извлекать (устройство) |
to enable |
включать, активировать |
to encrypt |
шифровать, зашифровывать |
to execute |
исполнять |
to format |
форматировать |
to implement |
внедрять, реализовывать |
to initialize |
приводить в исходное состояние, инициализировать |
to install |
инсталлировать, устанавливать |
to integrate |
интегрировать, объединять в одну систему |
to link to |
ссылаться на что-либо |
to load |
загружать |
to paste |
вставлять из буфера обмена |
to plug in |
подключать |
to press (a button) |
нажимать (кнопку) |
to read |
считывать |
to reboot |
перезагружать, перезагружаться |
to restore |
восстанавливать |
to save |
сохранять |
to scroll up/down |
прокручивать вверх/вниз (например, веб-страницу) |
to switch on/off |
включать/выключать |
to uninstall |
деинсталлировать, удалять |
to update |
обновлять |
to upgrade |
улучшать, модернизировать |
to upload |
загружать, закачивать |
to verify |
проверять |
Hardware — аппаратное обеспечение
Слово/Словосочетание |
Перевод |
a bus |
шина |
a cable |
кабель |
a central processing unit (CPU) |
центральный процессор |
a computer case |
корпус системного блока |
a device |
устройство |
a fan |
вентилятор охлаждения, кулер |
a graphics card (display card, display adapter, graphics adapter) |
видеокарта (графический адаптер) |
a graphics processing unit (GPU) |
графический процессор |
a hard disk drive (HDD) |
жесткий диск |
a laptop |
ноутбук, портативный компьютер |
a light-emitting diode (LED) |
светодиод |
a motherboard (mainboard) |
материнская плата |
a network card |
сетевой адаптер (сетевая карта, сетевая плата) |
a port |
разъем, порт |
a power supply unit (PSU) |
блок питания |
a solid-state drive (SSD) |
твердотельный накопитель |
a sound card (audio card) |
звуковая карта |
a storage device |
запоминающее устройство, накопитель |
a touch screen |
сенсорный экран |
air cooling |
воздушное охлаждение |
an expansion card |
карта (плата) расширения |
an optical disk drive |
оптический привод |
an uninterruptible power source (UPS) |
источник бесперебойного питания |
random-access memory (RAM) |
оперативная память (ОЗУ) |
read-only memory (ROM) |
постоянное запоминающее устройство (ПЗУ) |
removable media |
съемные носители информации |
water cooling |
водяное охлаждение |
output devices:
|
устройства вывода:
|
input devices:
|
устройства ввода:
|
Software — программное обеспечение
Слово/Словосочетание |
Перевод |
a compiler |
компилятор |
a database |
база данных |
a debugger |
отладчик |
a desktop application/app |
приложение для настольного компьютера |
a device driver |
драйвер устройства |
a graphical user interface (GUI) |
графический пользовательский интерфейс |
a kernel |
ядро (например, операционной системы) |
a mobile application/app |
мобильное приложение |
a plug-in (plugin) |
плагин, расширение, дополнительный программный модуль |
a programming language |
язык программирования |
a query |
запрос |
a scroll bar |
полоса прокрутки |
a snapshot |
снимок состояния системы |
a spreadsheet |
электронная таблица |
a status bar |
строка состояния |
a template |
шаблон |
a version control system (VCS) |
система контроля версий |
a web application/app |
веб-приложение |
a word processor |
текстовый процессор |
a text editor |
текстовый редактор |
a utility |
утилита (служебная программа) |
acceptance testing |
приемочное тестирование |
agile methodology |
гибкая методология разработки |
an algorithm |
алгоритм |
an array |
массив |
an encoding |
кодировка |
an enterprise application |
корпоративное приложение |
an executable (file) |
исполняемый файл |
an interpreter |
интерпретатор |
an operating system (OS) |
операционная система |
application software |
прикладное программное обеспечение |
aspect-oriented programming (AOP) |
аспектно-ориентированное программирование |
binary data |
двоичные данные |
commercial software |
платное программное обеспечение |
data |
данные, информация |
data processing |
обработка данных |
extreme programming |
экстремальное программирование |
firmware |
прошивка, микропрограмма |
freeware |
бесплатное программное обеспечение |
incremental development |
инкрементная модель разработки |
integrated development environment (IDE) |
интегрированная среда разработки |
iterative development |
итеративная модель разработки |
malicious software (malware) |
вредоносное программное обеспечение |
object-oriented programming (OOP) |
объектно-ориентированное программирование |
open source software |
программное обеспечение с открытым исходным кодом |
prototyping |
создание прототипа, прототипирование |
rapid application development (RAD) |
быстрая разработка приложений (методология) |
regression testing |
регрессионное тестирование |
runtime (runtime environment) |
среда выполнения кода |
server software |
серверное программное обеспечение |
spiral development |
спиральная модель разработки |
spyware |
программа-шпион, шпионское программное обеспечение |
system software |
системное программное обеспечение |
unit testing |
модульное (блочное, компонентное) тестирование |
waterfall model |
каскадная модель разработки |
Internet — Интернет
Слово/Словосочетание |
Перевод |
a bookmark |
закладка (в браузере) |
a bridge |
мост |
a browser |
браузер, обозреватель |
a domain |
домен |
a firewall |
брандмауэр, межсетевой экран |
a gateway |
шлюз |
a hyperlink |
гиперссылка |
a node |
узел сети |
a packet |
пакет |
a patch cord |
коммутационный кабель, патч-корд |
a router |
маршрутизатор, роутер |
a search engine |
поисковая система |
a subdomain |
поддомен, субдомен |
a switch |
коммутатор, свитч |
a website |
веб-сайт, веб-узел |
a wireless network |
беспроводная сеть |
bandwidth |
пропускная способность (канала передачи данных) |
broadband |
широкополосный доступ в Интернет |
client-server architecture |
клиент-серверная архитектура |
cloud computing |
облачные вычисления |
cloud storage |
облачное хранилище данных |
dynamic host configuration protocol (DHCP) |
протокол динамической настройки узла |
domain name system (DNS) |
система доменных имен |
instant messaging (IM) |
обмен мгновенными сообщениями |
Internet service provider (ISP) |
интернет-провайдер |
local area network (LAN) |
локальная сеть |
latency |
задержка, период ожидания |
media access control (MAC) address |
аппаратный адрес, MAC-адрес |
peer-to-peer (P2P) |
одноранговая сеть, пиринговая сеть |
twisted pair |
витая пара |
voice over IP (VoIP) |
голосовая связь через Интернет, IP-телефония |
wide area network (WAN) |
глобальная сеть, широкомасштабная сеть |
В нашем каталоге доступно 75 356 рабочих листов
Перейти в каталогПолучите новую специальность за 2 месяца
Получите профессию
за 6 месяцев
Пройти курс
Рабочие листы
к вашим урокам
Скачать
6 671 519 материалов в базе
Настоящий материал опубликован пользователем Первухина Наталья Валентиновна. Инфоурок является информационным посредником и предоставляет пользователям возможность размещать на сайте методические материалы. Всю ответственность за опубликованные материалы, содержащиеся в них сведения, а также за соблюдение авторских прав несут пользователи, загрузившие материал на сайт
Если Вы считаете, что материал нарушает авторские права либо по каким-то другим причинам должен быть удален с сайта, Вы можете оставить жалобу на материал.
Удалить материалВаша скидка на курсы
40%Курс профессиональной переподготовки
300 ч. — 1200 ч.
Курс повышения квалификации
36 ч. — 180 ч.
Курс повышения квалификации
36 ч. — 180 ч.
Мини-курс
4 ч.
Мини-курс
4 ч.
Мини-курс
4 ч.
Оставьте свой комментарий
Авторизуйтесь, чтобы задавать вопросы.