Инфоурок Английский язык Другие методич. материалыУчебно-методическое пособие «Английский язык для студентов специальности 09.02.07 «Информационные системы и программирование»

Учебно-методическое пособие «Английский язык для студентов специальности 09.02.07 «Информационные системы и программирование»

Скачать материал

 

 

 

Государственное  бюджетное профессиональное образовательное учреждение Новосибирской области

 

 

Новосибирский химико-технологический колледж

им. Д.И. Менделеева

630102 г. Новосибирск, ул. Садовая, 26,

Тел./факс: (383) 266-00-44, тел.: (383) 266-00-54,

info@nhtk-edu.ru

 

 

 

 

 

 

 

  

УЧЕБНО-МЕТОДИЧЕСКОЕ ПОСОБИЕ

Английский язык

для студентов специальности 09.02.07

«Информационные системы и программирование»

 

 

https://i.ytimg.com/vi/w8SADjGy3-s/maxresdefault.jpg

СОДЕРЖАНИЕ

1.

Tomorrow's Robotics Today……………………………………

4

2.

Top 10 greatest programmers in the world of all time…………

8

3.

Programming facts………………………………………………

11

4.

English verbs of movement on computers………………………

13

5.

The names of keys on a keyboard……………………………….

15

6.

Technical problems before a meeting……………………………

16

7.

WEB page………………………………………………………..

18

8.

Using computers at work…………………………………………

20

9.

How a computer network works………………………………….

22

10.

Code sign/symbol names………………………………………….

24

11.

Best NoSQL Databases…………………………………………...

27

12.

Top 10 programming languages………………………………….

34

13.

Solving a Customer's Server Problem……………………………

39

14.

A Controversial IT Purchase……………………………………...

40

15.

Ten Commandments of Computer Ethics………………………...

41

16.

Top 15 American IT Companies………………………………….

42

17.

Реферирование и аннотирование……………………………….

44

18.

Тексты для реферирования……………………………………..

51

19.

Упражнения по темам…………………………………………...

54

20.

Список источников………………………………………………

58

 

Приложение

 

 


 

"Tomorrow's Robotics Today"

A robot is a machine—especially one programmable by a computer— capable of carrying out a complex series of actions automatically. Robots can be guided by an external control device or the control may be embedded within. Robots may be constructed on the lines of human form, but most robots are machines designed to perform a task with no regard to their aesthetics.

The branch of technology that deals with the design, construction, operation, and application of robots, as well as computer systems for their control, sensory feedback, and information processing is robotics. These technologies deal with automated machines that can take the place of humans in dangerous environments or manufacturing processes, or resemble humans in appearance, behavior, or cognition. Many of today's robots are inspired by nature contributing to the field of bio-inspired robotics. These robots have also created a newer branch of robotics: soft robotics.

Androids

An android is a robot or other artificial being designed to resemble a human, and often made from a flesh-like material. Historically, androids were completely within the domain of science fiction and frequently seen in film and television, but recent advances in robot technology now allow the design of functional and realistic humanoid robots.

Sophia is a social humanoid robot developed by Hong Kong based company Hanson Robotics. Sophia was activated on February 14, 2016, and made her first public appearance at South by Southwest Festival (SXSW) in mid-March 2016 in Austin, Texas, United States. She is able to display more than 60 facial expressions.

Sophia has been covered by media around the globe and has participated in many high-profile interviews. In October 2017, Sophia became a Saudi Arabian citizen, the first robot to receive citizenship of any country. In November 2017, Sophia was named the United Nations Development Programmer's first ever Innovation Champion, and is the first non-human to be given any United Nation title.

Cameras within Sophia's eyes combined with computer algorithms allow her to see. She can follow faces, sustain eye contact, and recognize individuals. She is able to process speech and have conversations using a natural language subsystem. Around January 2018 Sophia was upgraded with functional legs and the ability to walk.

Hiroshi Ishiguro is director of the Intelligent Robotics Laboratory, part of the Department of Systems Innovation in the Graduate School of Engineering Science at Osaka University, Japan. A notable development of the laboratory is the Actroid, a humanoid robot with lifelike appearance and visible behavior such as facial movements.

Ishiguro has made an android that resembles him, called the Geminoid. The Geminoid was among the robots featured by James May in his 5 October 2008 BBC2 documentary on robots Man-Machine in May's series Big Ideas. He also introduced a telecommunication robot called the Telenoid R1. Hiroshi also uses the android to teach his classes at Osaka University of Japan and likes to scare his students by making Geminoid do human-like movements like blinking, "breathing" and fidgeting with his hands. Ishiguro has been listed, in 2011, as one of the 15 Asian Scientists to Watch by Asian Scientist Magazine. In 2018, Ishiguro was interviewed interacting with one of his robots for the documentary on artificial intelligence. http://kordon.org.ua/wp-content/uploads/2017/09/2573c0f49102051b255be36075e1903d.jpg

Whether each of us will have a geminoid in the future remains to be seen. But lifelike androids are already helping Ishiguro and others explore some of the pressing questions in human-robot interaction. What do people expect from robots? What social behaviors should they exhibit? And how do we get their look right? In the coming years, researchers will have to answer these questions to come up with design principles for building the next generation of social robots.

Ishiguro, for his part, believes that robotic telepresence will become a major communication medium over the next decade. Eventually, he speculates, humanlike robots will become truly integrated into society—not just for factory automation or as labor-saving devices but as replacements for someone’s physical presence. A future where androids may become so advanced that we’re unable to distinguish them from ourselves doesn’t frighten Ishiguro.

“Humankind is always trying to replace human abilities with machines. That’s our history,” he says. “I’m doing the same thing. Nothing special”.

Industrial robots

Electronics evolved into the driving force of development with the advent of the first electronic autonomous robots created by William Grey Walter in Bristol, England in 1948, as well as Computer Numerical Control (CNC) machine tools in the late 1940s by John T. Parsons and Frank L. Stulen. The first commercial, digital and programmable robot was built by George Devol in 1954 and was named the Unimate. It was sold to General Motors in 1961 where it was used to lift pieces of hot metal from die casting machines at the Inland Fisher Guide Plant in the West Trenton section of Ewing Township, New Jersey.

Robots have replaced humans] in performing repetitive and dangerous tasks which humans prefer not to do, or are unable to do because of size limitations, or which take place in extreme environments such as outer space or the bottom of the sea. Industrial robots usually consist of a jointed arm (multi-linked manipulator) and an end effector that is attached to a fixed surface. One of the most common type of end effector is a gripper assembly.

The International Organization for Standardization gives a definition of a manipulating industrial robot in ISO 8373: "an automatically controlled, reprogrammable, multipurpose, manipulator programmable in three or more axes, which may be either fixed in place or mobile for use in industrial automation applications." This definition is used by the International Federation of Robotics, the European Robotics Research Network (EURON) and many national standards committees.

Most commonly industrial robots are fixed robotic arms and manipulators used primarily for production and distribution of goods. The term "service robot" is less well-defined. The International Federation of Robotics has proposed a tentative definition, "A service robot is a robot which operates semi- or fully autonomously to perform services useful to the well-being of humans and equipment, excluding manufacturing operations

Mining robots

Mining robots are designed to solve a number of problems currently facing the mining industry, including skills shortages, improving productivity from declining ore grades, and achieving environmental targets. Due to the hazardous nature of mining, in particular underground mining, the prevalence of autonomous, semi-autonomous, and tele-operated robots has greatly increased in recent times. A number of vehicle manufacturers provide autonomous trains, trucks and loaders that will load material, transport it on the mine site to its destination, and unload without requiring human intervention. One of the world's largest mining corporations, Rio Tinto, has recently expanded its autonomous truck fleet to the world's largest, consisting of 150 autonomous Komatsu trucks, operating in Western Australia. Similarly, BHP has announced the expansion of its autonomous drill fleet to the world's largest, 21 autonomous Atlas Copco drills.

Drilling, longwall and rockbreaking machines are now also available as autonomous robots.[168] The Atlas Copco Rig Control System can autonomously execute a drilling plan on a drilling rig, moving the rig into position using GPS, set up the drill rig and drill down to specified depths. Similarly, the Transmin Rocklogic system can automatically plan a path to position a rockbreaker at a selected destination. These systems greatly enhance the safety and efficiency of mining operations.

Swarm robots

Inspired by colonies of insects such as ants and bees, researchers are modeling the behavior of swarms of thousands of tiny robots which together perform a useful task, such as finding something hidden, cleaning, or spying. Each robot is quite simple, but the emergent behavior of the swarm is more complex. The whole set of robots can be considered as one single distributed system, in the same way an ant colony can be considered a superorganism, exhibiting swarm intelligence. The largest swarms so far created include the iRobot swarm, the SRI/Mobile Robots CentiBots project and the Open-source Micro-robotic Project swarm, which are being used to research collective behaviors. Swarms are also more resistant to failure. Whereas one large robot may fail and ruin a mission, a swarm can continue even if several robots fail. This could make them attractive for space exploration missions, where failure is normally extremely costly.

A collaborative robot or cobot is a robot that can safely and effectively interact with human workers while performing simple industrial tasks. However, end-effectors and other environmental conditions may create hazards, and as such risk assessments should be done before using any industrial motion-control application. The collaborative robots most widely used in industries today are manufactured by Universal Robots in Denmark.

Rethink Robotics—founded by Rodney Brooks, previously with iRobot—introduced Baxter in September 2012; as an industrial robot designed to safely interact with neighboring human workers, and be programmable for performing simple tasks. Baxters stop if they detect a human in the way of their robotic arms and have prominent off switches. Intended for sale to small businesses, they are promoted as the robotic analogue of the personal computer As of May 2014, 190 companies in the US have bought Baxters and they are being used commercially in the UK.

TOP 10 GREATEST PROGRAMMERS IN THE WORLD OF ALL TIME

These programmers are the explorer in the IT world and have each contributed something that has completely changed the way human’s access to information and mass media. Let’s start with the lords of the IT world.

 

Dennis Ritchie

Dennis MacAlistair Ritchie was an American computer scientist who “helped shape the digital era”. He created the C programming language and with long-time colleague Ken Thompson, the Unix operating system. Ritchie and Thompson received the Turing Award from the ACM in 1983, the Hamming Medal from the IEEE in 1990 and the National Medal of Technology from President Clinton in 1999. Ritchie was the head of Lucent Technologies System Software Research Department when he retired in 2007.

Dennis Ritchie I'm Programmer

Bjarne Stroustrup

Bjarne Stroustrup is a Danish computer scientist, who is most notable for the creation and development of the C++ programming language. . He is a Distinguished Research Professor and holds the College of Engineering Chair in Computer Science at Texas A&M University, a visiting professor at Columbia University, and works at Morgan Stanley.

James Gosling

James Arthur Gosling, OC is a Canadian computer scientist, best known as the founder and lead designer behind the Java programming language. James has also made major contributions to several other software systems, such as NeWS and Gosling Emacs. Due to his extraordinary achievements, Gosling was elected to Foreign Associate member of the United States National Academy of Engineering.

James-Gosling I'm Programmer

Linus Torvalds

Linus Benedict Torvalds is a Finnish–American software engineer who is the creator and, historically, the principal developer of the Linux kernel. He later became the chief architect of the Linux kernel, and now acts as the project’s coordinator. He also created the revision control system Git as well as the diving log software Subsurface. He was honored, along with Shinya Yamanaka, with the 2012 Millennium Technology Prize by the Technology Academy Finland in recognition of his creation of a new open source operating system for computers leading to the widely used Linux kernel.

Linus-Torvalds i'm programmer

Anders Hejlsberg

Anders Hejlsberg is a prominent Danish software engineer who co-designed several popular and commercially successful programming languages and development tools. He is the creator of popular programming language C#. He was the original author of Turbo Pascal and the chief architect of Delphi. He currently works for Microsoft as the lead architect of C# and core developers on TypeScript.

Anders-Hejlsberg I'm Programmer

Tim Berners-Lee

Sir Timothy John Berners-Lee OM KBE FRS FREng FRSA FBCS, also known as TimBL, is an English engineer and computer scientist, best known as the inventor of the World Wide Web. He made a proposal for an information management system in March 1989 and he implemented the first successful communication between a Hypertext Transfer Protocol (HTTP) client and server via the Internet. Berners-Lee is the director of the World Wide Web Consortium (W3C), which oversees the Web’s continued development.

Tim-Berners-Lee I'm Programmer

Brian Kernighan

Brian Wilson Kernighan is a Canadian computer scientist who worked at Bell Labs alongside Unix creators Ken Thompson and Dennis Ritchie and contributed to the development of Unix. He is also coauthor of the AWK and AMPL programming languages. Kernighan’s name became widely known through co-authorship of the first book on the C programming language with Dennis Ritchie.

Ken Thompson

Kenneth Thompson commonly referred to as ken in hacker circles is an American pioneer of computer science. Having worked at Bell Labs for most of his career, Thompson designed and implemented the original Unix operating system. He also invented the B programming language, the direct predecessor to the C programming language, and was one of the creators and early developers of the Plan 9 operating systems. Since 2006, Thompson works at Google, where he co-invented the Go programming language.

Ken Thompson

Guido van Rossum

Guido van Rossum is a Dutch computer programmer who is best known as the author of the Python programming language. In the Python community, Van Rossum is known as a “Benevolent Dictator For Life” (BDFL), meaning that he continues to oversee the Python development process, making decisions where necessary. He was employed by Google from 2005 until December 7th, 2012. Where he spent half his time developing the Python language. In January 2013, Van Rossum started working for Dropbox.

Donald Knuth

Donald Ervin Knuth is an American computer scientist, mathematician, and Professor Emeritus at Stanford University. He is the author of the multi-volume work The Art of Computer Programming. Knuth has been called the “father” of the analysis of algorithms. Knuth is the creator of the TeX computer typesetting system, the related METAFONT font definition language and rendering system and the Computer Modern family of typefaces.

 

PROGRAMMING FACTS

Here are some very interesting programming facts about computer field and programming languages. Share with your friends for more fun. Let’s see the top 10 coding facts!

·       The first computer programmer was a female, named Ada Lovelace.

·       The first game was created in 1961. Fun facts are that it didn’t earn any money.

·       The first virus was created in 1983.

·       The first computer “bug” was identified in1947 as a dead moth.

·       The first computer was actually a loom called the Jacquard loom, an automated, mechanical loom, which didn’t use any electricity.

·       The first high-level (very close to real English that we use to communicate) programming language was FORTRAN. invented in 1954 by IBM’s John Backus.

·       Computer programming is one of the fastest growing occupations currently.

·       The language name C because it succeeds another language called B.

·       Java was called as Oak from the name of that tree that grew outside the window of James Gosling.

·       Guido van Rossum was also reading the published scripts from Monty Python’s Flying Circus”, a BBC comedy series from the 1970s. Van Rossum thought he needed a name that was short, unique, and slightly mysterious, so he decided to call the language Python.

·           JavaScript is not compiled.

·       Majors related to computer programming are among the highest paying in colleges and universities A programming language is basically a language that allows a human being to communicate with a computer The lifestyle we live today with our tablets, and mobile phones wouldn’t be possible without computer programming.

·       Did you know how many total programming languages? – it’s 698.

·       Most people are intimidated by the thought of learning how to program, however as with anything, the more you practice and repeatedly do that task, the easier it gets.

·       The Java mascot, ‘The Duke’ was created by Joe Palrang. Palrang is the same guy who has worked on the Hollywood blockbuster, Shrek. Duke is celebrated at Oracle.

·       Four states of programmer progress:

a) Complex Programming
b) Making Progress
c) Slow Progress
d) Stuck

·       It is not a tool or magic it is the power to create your Imagination in reality.

·       Programming can learn you a new way of thinking.

·       Perl is sometimes known as the “Swiss-Army knife” of programming languages.

·       APIs are like stars, once a class is there everybody will assume it will always be there.

·       Did you know first computer bug was named due to a real bug as shown in below pic? Grace Hopper recorded the first computer ‘bug’ in the book as she was working for the MARK II computer.

Programmers funny facts are

o    Programmers will start the count from zero, not one.

o    The root is at the top of the tree.

o    Programming and coding are not the same.

o    Programmer says ‘=’ != ‘==’

o    The value of a ‘;’

o    Ctrl + C and Ctrl + V have saved more lives than Batman and Robin.

o    The Ctrl-Z is better than a time machine.

o    That there is one thing called “Constant Variable”.

o    Programmers always looking for a girl who can code.

o    A parent may kill its children if the task assigned to them is no longer needed.

o    Writing cryptic code is deep joy in the soul of a programmer.

o    When you format your hard drive, the files are not deleted.

o    A coder is a person who transforms cola & pizza to code.

o    “Refresh button” of the windows desktop is not some magical tool which keeps your computer healthy.

o    The programmers are the main source of income for eye doctors.

o    If any programmer orders three beers with his fingers, he normally only gets two.

o    Programmers love to code day and night.

o    Sleeping with a problem can actually solve it.

o    When you format your hard drive, the files are not deleted.

o    1 Mbps and 1 MBps internet connection don’t mean the same thing.

o    A programmer is similar to a game of golf. The point is not getting the ball in the hole but how many strokes it takes.

o    A programmer is not a PC repairman.

 

ENGLISH VERBS OF MOVEMENT ON COMPUTERS

Read the following conversation between Peter and Juan about how to add the details from a CV/resume on to a database for candidates applying for job vacancies in their company.From the context, try to guess what the meaning of the words/phrases in bold are. Then do the quiz at the end to check if you are right.

 

Juan: For the vacancy in our department we have to enter all the CV details for the candidates on to the candidates database. Do you know how to do that?

Peter: No, I've never done it before.

Juan: No problem, I'll show you how to complete the form in the database with the details. First of all, you'll need to have both the database and a copy of the CV open on the screen. Now, in the database click on the button that says 'new entry' using the mouse. This takes you to a new screen where you can enter the details.

Peter: Ok.

Juan: Now, at the top you'll see a section called 'candidate details'. You have to enter the candidate's name, date of birth, address etc... here. So, to enter the name, click on the text box next to name, then type in the name using the keyboard. When you have done that, tab down to the next text box for date of birth using the tab key on the keyboard. And type in the date of birth. To move down to the next text box you need to press the tab key again. Continue doing that until you've filled all the text boxes in this section.'

Peter: What next?

Juan: To the right of the 'candidate details' section, there's a box called 'photo'. Go back to the copy of the CV and find the candidate's photo. Click on the photo and then drag or move the photo from the CV onto the candidate database and put it over the photo box and then drop it by taking your finger off the click button on the mouse. Now, the photo has been entered onto the database.

Peter: Is that it?

Juan: No, you have to enter the candidate's job history details. But you don't have to type it in. You can copy and paste it from the CV. But before you do that, you have to go to the 'job history' section on the database. You can't see this section on the screen, because it's at the bottom of the database form. So, you have to scroll down the form until this section is on the screen. Here it is. Now, go back to the CV and highlight using the mouse all the text from the candidate's job history that you want to copy. You highlight or select the text by clicking on the mouse button and with the mouse button still pressed move the cursor to the end of the text that you want copied. Then release the mouse button. To copy the highlighted or selected text, you can either press the right mouse button and click copy in the menu that appears or with the keyboard, hold down the control/Ctrl key and press the key 'C'. Then go back to the 'job history' section on the database and paste it into the text box there. After that, save the form and all the information is on the database.

Peter: It seems simple. But how can I access the information on the database when I'm in an interview?

Juan: Well, you can access all the information on the database on an iPad. To open the database on the iPad, you need to tap on this icon on the screen using your finger. Then, when the database opens, tap on the text box next to name and type in the candidate's full name and press or tap the enter icon and all the candidate's details will appear on the screen. To move or scroll up and down the details in the database, you just need to slide your finger up or down the screen.

Peter: Perfect, thanks.

 

1. When you press a key or a mouse button for more than 1 second, you _____________.   

2. To move your finger while still touching the glass on a touch screen tablet/phone, is_________.  

3. To move through/down text boxes on an online form by the keyboard, you _________.

4. A more common way to say 'press' a button on a mouse, is _____________.   

5. When you select/click on an image or photo and then physically move it on the screen, you ____________.  

6. When you stop holding down a key or mouse button, you _____________. 

7. A different way to say 'click' or 'press' on a touch screen device (e.g. iPad), is _______.  

8. A verb that means to move up or down a web page or document, is  __________. 

9. After moving/dragging a photo on the screen, to put or place it in its new position, you ____________. 

10. Another way to say 'enter' or 'write' words or numbers with a computer, is _________.

11. To copy some of the text from a document, you first have to ______________.

12. To make the keys on a keyboard write letters, numbers etc., you have to __________.

 


 

THE NAMES OF KEYS ON A KEYBOARD

 Computer Function Keys Photo

1 = Delete Key

2 = Backspace Key

3 = Tab Key

4 = Return Key

5 = Caps Lock Key

6 = Shift Key

7 = Control Key

8 = Function Key

9 = Alt Key

10 = Space Bar

11 = Arrow Keys

1. The long key on a keyboard which is used when you want to separate one word from another when writing, is called the __________________.  

2. The key you press once to write in UPPER-CASE/CAPITAL letters, is called the ___________________.   

3. A key that begins with 'C' that is used for shortcuts (like quickly copying some text) in applications, is called the  __________________.

4. A key that is used to make multiple spaces/indent in a text document, is called the ___________________.

5. A key that is used to remove a letter/space which is in front of the cursor on the screen, is called the   _____________.

6. A group of keys which are used to move (up or down, left or right) on a web page or an app, are called the    _________________.

7. A key on a laptop/notebook that when pressed with other keys changes the audio volume, is called the  ___________________. 

8. A key that when pressed and held down will write letters in UPPER-CASE/ CAPITALS, is called the  ________________. 

9. A key that begins with 'A' that is used for shortcuts (to do things quickly) in applications, is called the    __________________.

10. A key that is used to move to a new line when writing in a document, is called the  _____________________. 

11. A key that is used to remove a letter/space which is behind the cursor on the screen, is called the    ________________.

 

TECHNICAL PROBLEMS BEFORE A MEETING

Read the following conversation between Juan and Peter. Peter is having problems with his laptop before giving a short Power Point presentation in a meeting. From the context, try to guess what the meaning of the words/phrases in bold are. Then do the quiz at the end to check if you are right.

 

Juan: 'What's happening Peter, you look frustrated?'

Peter: 'My laptop won't turn on. It was working before, I don't know what's wrong!'

Juan: 'Is it plugged in?'

Peter :'Yeah, I have connected it to the mains electricity, but that shouldn't be important because the laptop's battery still has charge or power.'

Juan: 'Are you sure that the socket in the wall has power? Try to plug it into another socket.'

Peter: 'I've tried that already and the socket has power. I thought that there may be a problem with the power cable, but it's working fine with the other laptop here.'

Juan: 'I had a problem with my desktop computer last year where the wires had come loose in the power cable. So I had to replace the power cable. You can use my laptop to show it.'

Peter: 'Thanks Juan, but I only saved the presentation to my hard drive. So I can't show the presentation on your laptop.'

Juan: 'Can you remember when I had that problem with my laptop in July. When suddenly the screen froze and the laptop wouldn't respond when I pressed any of the keys on the keyboard or when I moved my finger on the touch pad. Sometimes it recovered and I could continue to use the application, but other times it crashed and stopped working completely. So, I had to reboot the laptop. It was so frustrating, because I sometimes lost all of the work I'd been doing. Then the application didn't load at all, so I couldn't even use it then. The IT Engineer told me it was a software fault with the application. So she just reinstalled the application and it's been working fine.'

Peter: 'I'm happy for you, but I don't have any power to the laptop, so it's not a software fault. It seems like a hardware fault.'

 

1. Another way to say 'touch' or 'push' a button or a key, is   ___________________.

 2. The name of the part of a computer where you save/store your applications and documents, is the ___________________.  

3. When talking about computers, people call an electrical, software or hardware 'problem' a   __________________. 

4. Another way to say 'switch on' or 'start' a computer, is   _______________________.

5. The part of a laptop where you move the cursor on the screen with a finger, is called the    _________________.

6. A 'lead' or 'wire' which connects a computer to a printer or a power supply, is called a   

7. A different way to say 'restart' a computer, is    ___________________.

8. A two word verb that means to connect a 'cable' to a computer or to an electrical power supply, is    ___________________.

9. When you can't move the cursor on the screen, the screen is   __________________.

10. A possible reason why a cable isn't working, is   _______________________.

11. Another way to say that an application 'doesn't start', is ___________________.  

12. The hole/holes where a cable is connected to , is called a ____________________.  

13. The buttons on a keyboard that have letters or numbers on them, are called   

14. When an application/program on a computer is damaged/not working correctly, it normally has to be    ______________________.

15. The name of the power supply for a laptop or a mobile phone, is called the  _________________.

16. When a computer or application fails or stops working, it    ____________________.

 

WEB PAGE

 

The web or internet is now used by the majority of people in the world (both at home and at work). There are now over two trillion individual web pages on 500 million different websites (e.g www.blairenglish.com etc...) on the internet. So, it's important to know the English vocabulary of both web pages and how to use web pages when looking at them on a computer.

Looking at a web page

In the below photo of a web page, you will find that different parts are surrounded/enclosed by a red line with a number in red. These red numbers are used below the photo to confirm the name of each part (e.g. 1 = Web Browser).

Focus on the names of these different parts and then do the quiz at the end to check that you both understand their meaning and remember them.

 

Web Page Essentials Diagram

 

 

  • 1 = Web Browser
  • 2 = Minimize/Maximize Buttons
  • 3 = Menu Bar
  • 4 = Tab
  • 5 = Back/Forward Buttons
  • 6 = Web Address
  • 7 = Refresh Button
  • 8 = Scroll Bar
  • 9 = Navigation Bar
  • 10 = Site Search Box
  • 11 = Icons
  • 12 = Link

 

1. A part of the web browser where you can move up and down the web page, is the   _________________.

2. The buttons on a web browser which takes you to previous web pages that you have looked at, are    ________________.

3. A word or sentence on a web page that takes you to a different web page when 'clicked on' or 'pressed', is a   _________________.

4. A list of the different sections/parts of a website, is called a   _________________.

5. The location or 'url' of a web page on the web, is called the    _________________.

6. The place where you can quickly look for content on a website, is called the _______________________.  

7. When you have multiple web pages open on a web browser, the name of each web page is written in a    __________________.

8. The two buttons that are used to make a web browser window disappear or make it cover the full screen, are called the ____________________.  

9. Small images on a web page, are called    __________________.

10. The name of the application used to view/see web pages on a computer, is called a   _______________________.

11. When you want to see the up-to-date content on a web page, you press the  _________________. 

12. To print or change the view in a web browser, you go to the ___________________.  

 

 


 

USING COMPUTERS AT WORK

 

Information Technology (IT) dominates both how we live and work. In most countries, it is impossible to find an office or business that doesn't have any computers. So, it is important to know how to talk about basic office/work IT in English.

Read the following conversation between Jonathan (an operations manager) and Geoff (an external contractor who will be working for two months at the company). Jonathan is explaining to Geoff how to use the computer system in the company. From the context, try to guess what the meaning of the words/phrases in bold are. Then do the quiz at the end to check if you are right.

 

Jonathan: 'This is your first day here. You already know what you have to do with the project. But to do that, you need to have the information that we have on our computer network. So, I'll show how to use your network account on the computer, so you can do your work.'

Geoff: 'Perfect.'

Jonathan: 'The IT department set up your network account last week, so it's ready to use. Here's your user name and password. The first thing that you need to do, is to log in to your network account on the computer. So can you type in the user name and password.'

Geoff: 'Ok, done that.'

Jonathan: 'You're logged in ok. After you've logged in, you will always go to this screen where there are icons of all the applications you have. For example, there are icons for Chrome, Word, email etc... You also have access to the Operations Department Database, which contains data on all the staff and equipment in the company. You don't have access to the Customer Database, but you won't need that to do your job. You also have access to the company's procedures folder. It's the icon at the top right. If you click on it, it will take you to a folder containing lots of Word documents about the different procedures we have in the company. If you click on the file called 'disaster procedures', you can read the procedures we have in place if there is a fire or explosion in one of our factories.'

Geoff: 'Where should I save files like Word documents or Excel spreadsheets?'

Jonathan: 'It's your choice. You can save them to your hard drive on your computer. But you won't be able to access the files from another computer. So it's better to save it to a network drive. Your network account has a drive on the network to save files to. It's the L: drive. If you save files there, you can access them from any computer on the company's network. Also, there's a shared folder on the network for our team. It's called 'Operations Shared Folder' and it's this icon on the screen. You should save any file or document here which other people in the team need to have access to. Some of the files here are password protected. So you can't open them without a password. If you need to access a file that is password protected, tell me and I'll give you the password. Do you have any questions?'

Geoff: 'Yes, I do. Because I'll be visiting lots of factories to do my job, I'm not sure having a desktop computer is the best idea. I can't carry it with me, it's too heavy to move. Would it be possible to have laptop instead? They are designed so you can travel with them.'

Jonathan: 'It was stupid of me not to think about that before. I'll request a laptop for you from the IT department. It'll take 5 days to come, so you'll have to work on the desktop for now. I'll also request a docking station for the laptop, so you can use a normal keyboard and a normal screen when you're using the laptop here at your desk. I forgot to mention that this computer is connected to the printer in front of us. So when you print any document, it will go there.'

 

1. A type of computer that is designed so it can be easily moved, is called a ___________.  

2. A 'document' on a computer like 'report.doc', is also called a ___________________.   

3. A group of computers connected together, is called a   ________________________.

4. A file/document that needs a password to be opened, is   

5. The name of the place where a group of files/documents are stored/saved on a computer is a   ______________________________.

6. A machine that makes paper copies of files/ documents, is called a _______________.  

7. To use a company's computer system, you need to have a ______________________.   

8. The name of the part of a computer where all programs, folders and files are stored, is the   ________________.  

9. A two word verb that means 'to create' and is used with network accounts, is  ___________________. 

10. A formal way to say 'to ask for' something new, is ___________________.  

11. Computer 'programs' like Word or Excel, are commonly called   ________________.

12. A piece of equipment that you enter a laptop into, so you can use the laptop with a normal keyboard and screen, is a    _____________________.

13. A word that means 'the ability to open or read' a file or document, is ___________________.  

14. A computer that is designed to only be used on a desk, is called a _____________.  

 15. To use your network account, you first have to    __________________________.

16. When a person's files and applications are stored on the computer network and not on their local drive/computer, they are on a    __________________________-.

 

 

How a computer network works.

Information Technology (IT) is an important part of any business. Companies normally have a lot of computers that are able to communicate between each other. These computers are able to communicate because they are on a 'computer network'. Although most people have heard about computers networks, they don't know or maybe even don't care what they are and what they actually do. But it is good to have a basic knowledge of what a computer network is, especially when there are problems with it.

Read the following conversation between Juan and Peter. Peter is explaining to Juan how the computer network at their office works.From the context, try to guess what the meaning of the words/phrases in bold are. Then do the quiz.

Juan: 'I know that it sounds stupid, but how is it possible that I can open the same word document on any of the workstations in the office. It doesn't matter which computer I'm on here, I can still open it.'

Peter: 'That's because all the computers or workstations in the office are connected to each other in a network. For our office, this network is called a LAN which is an abbreviation of 'Local Area Network'.'

Juan: 'So every computer I use in the office can access or open any file or document on my computer?'

Peter: 'No, they can't. You can only open files and documents from any computer/workstation you use here, when the file or document is saved on a server and not on your computer. A server is basically a powerful computer on the network which is dedicated to doing one thing, like storing files, or connecting to the internet or running an application etc... All the computers or workstations that people use at their desks can connect to these servers. Any application or file which people want to be shared or used by multiple computers are stored or put on to a server.

If you don't want to share a file with anybody, you can save or store it to the local drive of your computer or laptop. A local drive is the hard drive on your computer. Keeping a file on only your computer's local drive means that you can't open the file from another computer and if the computer breaks, the file is lost. So it's better to save it to your own personal folders on a network drive. This is like a local personal drive for each user of a network, but all files are stored on a file server, a server dedicated to saving/storing files.

In addition, they are all backed up regularly. So even if the file server breaks down, there will always be a copy of all the files or documents stored on a different file server.'

Juan: 'So how does my computer access and open the word document on the file server?'

Peter: 'Well, your computer is connected to the LAN or office's computer network by an ethernet cable at the back of the computer. The ethernet cable is used to send and receive all the data from the computer to the server, other computers, the internet etc.'

Juan: 'Like emails or web pages?'

Peter: 'Yes, when you open a document on a server, the ethernet cable sends the request to the file server and the file server sends the data in the file to your computer through the ethernet cable to your computer. This data comes to your computer in what is called packets. For example, when a file server sends a word document that is on a network drive to your computer, the document is not sent all together, but is divided into small parts which are then sent one by one. When these small parts or packets reach your computer they are reassembled or joined back together and make the document. Data is sent on computer network in packets to make the network run quicker.'

Juan: 'It sounds complicated. But how does the file server know where to send the document or any type of data?'

Peter: 'Well, every computer, server, printer etc... has its own unique address. This is called an IP address. So, that's how a file server knows where to send a word document.'

Juan: 'So, there's a direct ethernet cable from all the computers on the LAN network in the office to the file server?'

Peter: 'No. In most offices, schools etc..., there are too many computers or servers to connect an ethernet cable directly between each one. In our office there are 213 workstations/computers and 13 servers. It would be impossible for each computer to have 225 different ethernet cable. Each computer or server only has one ethernet cable. Those cables connects directly to a device called a switch. A switch is an electronic box that is used to direct the data traffic on the network to the correct IP address. All data is sent from a computer or server to it first. It's like a postman, when it receives the data (like an email, file, update) it reads the IP address of where it wants to go to (which is contained in the data) and sends it to the computer, server, printer on the network with that IP address.'

Juan: 'Makes sense. But what happens if I want to send an email to somebody outside the company?'

Peter: 'Well, the email is divided into packets and these packets are sent from your computer through the ethernet cable to the switch. When the switch reads the IP address in the packets of data and knows that it's not for a computer or server on the LAN network, it sends the packets to the router on the LAN network. A router is another piece of hardware or device on the network that is used to send or receive data traffic from a LAN network (like in our office) to or from computers or servers which are outside the LAN network (like the internet, other companies or other offices).'

Juan: 'So if I open a web page from the internet on my computer here, the data of the web page comes to my computer from the internet through the router, then the switch, then the ethernet cable and finally to my computer?'

Peter: 'Basically, yes. The router is the first place on the LAN network that receives data from outside of the LAN network. The router often has a firewall on it to make sure that any data it receives doesn't contain a virus or words or material which have been banned or prohibited by the company. Some companies ban their staff from accessing some websites and it's this software or program on the router that stops the web page.'

Juan: 'Thanks Peter for explaining it.'

 

1. Computers, mobile phone, servers, cables and switches are all types of ____________.   

2. When a copy of all the data and files of a computer is saved/stored on a different computer, it is    _______________.

3. A powerful computer that is used on a computer network to store/save other computers' data and files, is called a    _______________.

4. A device/machine on a computer network that is used to move data between the different computers and servers, is a   _______________.

5. A type of computer network that is normally used in an office or school, is called a ___________________.   

6. A cable that is used to transport data from one computer to another on a computer network, is called a   ________________.

7. Computer applications and programs are both types of   _________________. 

8. A 'hard drive' or place on a computer where applications or files are stored/saved, is also called a    _________________.

9. The 'small parts' which an email is divided into to be transported on the network, are called    _______________.

10. When a person's files and applications are stored on the computer network and not on their local drive/computer, they are on a   _________________.

11. The name of the software that stops viruses from entering into a computer network, is called a   ___________________.

12. The 'computers' on computer network are often called ________________.   

13. A device/machine where all the data entering and leaving a computer network goes through, is called a  __________________.  

14. The unique name/address that every computer in the world has, is called an ________________.  

Code sign/symbol names.

If you work in any type of Information Technology job (designer/developer/support etc...) you will have to understand how to write or read some type of computer code. In computer code, a lot of different signs and symbols are used. For example, ' ? ' or ' . ' .

People are so used to only having to write these code signs/symbols that they don't actually know what the names of many of these signs/symbols are. For example ' ? ' is called a 'question mark' and ' . ' is called a 'point' or 'dot' with numbers and 'full stop/period' with words. Not knowing these names can be a problem if you are speaking to somebody about computer code.

In the following conversation between two work colleagues, Juan asks Peter what the names are of different signs and symbols used in computer code. The names of the signs and symbols are in bold. Focus on the names of these different signs and symbols and then do the quiz at the end to check that you both understand their meaning and remember them.

Juan: "Do you know what one of the biggest problems is with computer code?"

Peter: "No, what?"

Juan: "I can never remember the names in English of some of the signs or symbols that are used in computer code. It's not a problem when writing the symbol, but you look stupid when you have to write or type the symbol when talking to someone, because you don't know its name. For example, what do you call this symbol ' - '? Is it called a dash?"

Peter: "Yes, the ' - ' is commonly called a dash in computer code, but it is also called a hyphen when writing in both English and in computer code. And you call this symbol ' _ ', an underscore."

Juan: "I knew that. What's the name for the little star symbol?"

Peter: "Do you mean ' * ' this?"

Juan: "Yes."

Peter: "The ' * ' symbol is called an asterisk."

Juan: "And the ' @ ' symbol which you use in email addresses?"

Peter: "The ' @ ' symbol is called an at sign."

Juan: "Another symbol I have seen, is this ' / '."

Peter: "The ' / ' symbol is called forward slash, because its top part is leaning forward."

Juan: "So I suppose the ' \ ' symbol is called backslash because the top part is leaning back?"

Peter: "That's right. It's called backslash."

Juan: "And what do you call this symbol ' # '?"

Peter: "It has many names, it's often called the pound sign in America, but everywhere else, ' # ' is called hash."

Juan: "And the ' ( ' and ' ) ' symbols?"

Peter: "They are called parentheses, although they are sometimes called brackets (but not in America). The ' ( ' symbol is normally called open parenthesis and the ' ) ' symbol, close parenthesis.'

Juan: 'I am confused. I thought that the brackets symbols were ' [ ' and ' ] '?"

Peter: "They are type of brackets, and although they are sometimes called brackets in America, the ' [ ' and ' ] ' symbols are normally called square brackets. There are another two types of brackets that are used. ' < ' and ' > ' are called angle brackets and ' { ' and ' } ' are normally called curly brackets. With all types of brackets, the first bracket is called 'open' and the second bracket is called 'close'. So, for example, ' < ' is called 'open angle bracket' and ' ] ' is called 'close square bracket'. Does that make sense?"

Juan: "I think so."

 

1. The sign/symbol that is called a Forward Slash, is ______________________.  

2. The signs/symbols that are called Curly Brackets, are ___________________. 

3. The sign/symbol that is called an Asterisk, is   _________________________.   

4. The sign/symbol that is called a Hash, is  _____________________________. 

5. The signs/symbols that are called Square Brackets, are __________________.  

6. The sign/symbol that is called an Underscore, is   ______________________. 

7. The sign/symbol that is called a Dash, is _____________________________.  

8. The signs/symbols that are called Parentheses, are   _____________________. 

9. The sign/symbol that is called an At Sign, is    _________________________.

10. The signs/symbols that are called Angle Brackets, are   _________________.     

11. The sign/symbol that is called a Backslash, is   ________________________.

 

More code signs/symbols names

In the following conversation between two work colleagues, Juan continues to ask Peter what the names are of different signs and symbols used in computer code. The names of the signs and symbols are in bold.

Focus on the names of these different signs and symbols and then do the quiz at the end to check that you both understand their meaning and remember them.

Juan: 'There's another symbol that I use all the time, but I don't know what it's called. It's written like this ' ! '.'

Peter: 'The sign ' ! ' is called an exclamation mark.'

Juan: 'Also, is this ' " ' called a speech mark?'

Peter: 'Yes, it can be. ' " ' is more commonly called a quotation mark. There are two types of quotation marks. ' " ' is called a double quotation mark because it has two lines. Where a quotation mark has one line, like this ' ' ', it is called a single quotation mark.'

Juan: 'I thought that ' ' ' was called an apostrophe?'

Peter: 'It is also called an apostrophe. When the symbol is used in writing to show possession of something (e.g. 'this is John's car') or a contraction of two words into one (e.g. it is, is normally contracted into it's), it is called an apostrophe. But when there are two of them and they are used to close a selection of text or calculation (e.g. 'I like cheese'), then they are called single quotation marks.'

Juan: 'That makes sense. Is this ' , ' called a comma?'

Peter: 'That's right.'

Juan: 'And this symbol ' '. I have heard people call it 'and'. Is that its name?'

Peter: 'People often call it the 'and symbol/sign', but the actual name for ' ' is an ampersand.'

Juan: 'And what about this ' : '?'

Peter: 'The ' : ' symbol is called a colon. There is also a similar symbol that instead of having two dots has one dot and a comma below it. It is called a semicolon.'

Juan: 'So, a semicolon is written like this ' ; '?'

Peter: 'That's right. Another symbol that is sometimes used in computer code, is called the pipe or vertical bar. It is a vertical line and is written like this ' | '.'

Juan: 'There are two other symbols which I'd just like to check if I am calling them the right names. This ' $ ' is called the dollar sign, isn't it?'

Peter :'Yes, it is.'

Juan: 'And this ' % ' is called percent?'

Peter: 'It can be, but ' % ' is normally called the percent sign.'

Juan: 'I know that this isn't a sign or symbol, but when there is a gap between two words or numbers with nothing in it, like '   '. What is it called?'

Peter: 'Where there is a blank space between words or numbers like this '   ', it is called a space.'

 

1. The sign/symbol that is called a Colon, is   ___________________________.

2. The sign/symbol that is called a Space, is   ___________________________.

3. The sign/symbol that is called a Quotation mark, is  ____________________.

4. The sign/symbol that is called a Percent sign, is     _____________________.

5. The sign/symbol that is called an Exclamation mark, is _________________.

6. The sign/symbol that is called a Dollar sign, is     ______________________.

7. The sign/symbol that is called a Comma, is     _________________________.

8. The sign/symbol that is called an Apostrophe, is     _____________________.

9. The sign/symbol that is called an Pipe, is     ___________________________.

10. The sign/symbol that is called a Semicolon, is     ______________________.

11. The sign/symbol that is called an Ampersand, is     _____________________.

 

BEST NOSQL DATABASES 2020 – MOST POPULAR AMONG PROGRAMMERS

 

A database is a collection of information that is organized so that it can be easily accessed, managed and updated. Before starting with the most popular NoSQL databases. You must have to know about NoSQL databases. Most of the programmer doesn’t know what it stands for. It’s Not Only SQL.

What is NoSQL database?

NoSQL databases (additionally called Not Only SQL Databases) are non-relational database systems used for storing and retrieving data. In today’s world, we should not store all the data in table format only which has not predefined fixed schemas( fix no of columns). Like User-generated data, GEO location data, IoT generated data, social graphs are examples of real-world data which has been increasing exponentially. These huge amounts of data required lots of processing also. Here, the NoSQL database comes into the picture. Using NoSQL database we can store and retire document, key-value, graph-based data easily & faster. We can easily avoid complex SQL joins operations. Easy to scale horizontally for real-world problems(web and enterprise business applications) using NoSQL DBs. Carlo Strozzi came with NoSQL term in the 1998 year.  The motivation of using NoSQL – the simplicity of design, horizontal scaling to clusters of machines which is difficult to achieve in RDMS databases.

NoSQL Database types

·         Document Databases – These Db usually pair each key with a complex data structure which is called a document. Documents can contain key-array pairs or key-value pairs or even nested documents.  Examples of document NoSQL: MongoDB, Apache CouchDB, ArangoDB, Couchbase, Cosmos DB, IBM Domino, MarkLogic, OrientDB.

·         Key-value stores – Every single item is stored as a Key-value pair. Key-value stores are the most simple database among all NoSQL Databases.  Examples of Key-value NoSQL – Redis, Memcached, Apache Ignite, Riak.

·         Wide-column stores – These types of Databases are optimized for queries over large datasets, and instead of rows, they store columns of data together. Examples of Wide column NoSQL – Cassandra, Hbase, Scylla.

·         Graph stores – These store information about graphs, networks, such as social connections, road maps, transport links. Examples of Graph NoSQL – Neo4j, AllegroGraph.

Best NoSQL Databases 2020

MongoDB

It is an open-source NoSQL database that is document-oriented. MongoDB uses JSON like documents to store any data. It is written in C++.

Cassandra

It was developed at Facebook for an inbox search. Cassandra is a distributed data storage system for handling very large amounts of structured data.

Redis

Redis is the most famous key-value store. Redis is composed in C language. It is authorized under BSD.

HBase

It is a distributed and non-relational database that is designed for the BigTable database by Google.

Neo4j

Neo4j is referred to as a native graph database because it effectively implements the property graph model down to the storage level.

Oracle NoSQL

Oracle NoSQL Database implements a map from user-defined keys to opaque data items.

Amazon DynamoDB

DynamoDB uses a NoSQL database model, which is nonrelational, allowing documents, graphs and columnar among its data models.

Couchbase

Couchbase Server is a NoSQL document database for interactive web applications. It has a flexible data model, is easily scalable, provides consistently high performance.

Memcached

It is an open-source, high-performance, distributed memory caching system intended to speed up dynamic web applications by reducing the database load.

CouchDB

It is an Open Source NoSQL Database which utilizes JSON to store information and JavaScript as its query language.

1. MONGODB

mongoDB-improgrammer

MongoDB is the most well-known among NoSQL Databases. It is an Open-Source database which is Document-oriented. MongoDB is a scalable and accessible database. It is in C++. MongoDB can likewise be utilized as the file system. In MongoDB, JavaScript can be utilized as the query language. By utilizing sharding MongoDB scales horizontally. It is very useful in Popular JavaScript Frameworks. People really enjoying sharding, advanced text searching, gridFS, map-reduce features for the 2020 year. Amazing performance and new features promoted this NoSQL database to 1st place in our list.

 

 

2. CASSANDRA

Cassandra-nosql-database

 

Cassandra was developed at Facebook for inbox search. Cassandra is a distributed data storage system for handling very large amounts of structured data. Generally, these data are spread out across many commodity servers. You can also add storage capacity of your data keeping your service online and you can do this task easily. As all the nodes in a cluster are same, there is no complex configuration to deal with. Cassandra is written in Java. Cassandra Query Language (CQL) is a SQL-like language for querying Cassandra Database. As a result, Cassandra stands 2nd in best open source databases. Cassandra is being used by some of the biggest companies such as Facebook, Twitter, Cisco, Rackspace, eBay, Twitter, Netflix, and more.

 

3. REDIS

redis-improgrammer

Redis(Remote Dictionary Server) is a key-value store. Furthermore, it is the most famous key-value store. Redis has support for some C++, PHP, Ruby, Python, Perl, Scala and so forth. Redis is composed in C language. Furthermore, it is authorized under BSD. Some fun facts about Redis NoSQL Database – It can handle up to 2 ³² keys and was tested in practice to handle at least 250 million keys per instance. It is an in-memory but persistent on-disk database. It means it will store all data in RAM only for backup only use disk(HDD or SSD).

 

4. HBASE

hbase-improgrammer

HBase is a distributed and non-relational database which is designed for the BigTable database by Google. One of the main goals of HBase is to host Billions of rows X millions of columns. You can add servers anytime to increase capacity. And multiple master nodes will ensure high availability of your data. HBase is composed in Java 8. It’s authorized under Apache. Hbase accompanies simple to utilize Java API for customer access also.

5. NEO4J

neo4j

Neo4j is referred to as a native graph database because it effectively implements the property graph model down to the storage level. This means that the data is stored exactly as you whiteboard it, and the database uses pointers to navigate and traverse the graph. Neo4j has both a Community Edition and Enterprise Edition of the database. The Enterprise Edition includes all that Community Edition has to offer, plus extra enterprise requirements such as backups, clustering, and failover abilities.

 

6. ORACLE NOSQL

Oracle Database

Oracle just started NoSQL database with Oracle NoSQL. It’s becoming popular in the year 2018. It less popular compare to MongoDB and Casandra databases. Oracle NoSQL Database implements a map from user-defined keys to opaque data items. Although it records internal version numbers for key/value pairs, it only maintains the single latest version in the store. The version of Oracle, 12c, is designed for the cloud and can be hosted on a single server or multiple servers, and it enables the management of databases holding billions of records. Some of the features of the latest version of Oracle include a grid framework and the use of both physical and logical structures. Oracle Database 18c now provides customers with a high-performance, reliable and secure platform to easily and cost-effectively modernize their transactional and analytical workloads either in the Cloud, or on-premises or in a Hybrid Cloud configuration.

 

7. AMAZON DYNAMODB

Amazon DynamoDB

DynamoDB uses a NoSQL database model, which is nonrelational, allowing documents, graphs and columnar among its data models. Each DynamoDB query is executed by a primary key identified by the user, which uniquely identifies each item. It also relieves the customers from the burden of operating and scaling a distributed database. Hence, hardware provisioning, setup, configuration, replication, software patching, cluster scaling, etc. is managed by Amazon.

8.COUCHBASE

Couchbase

The focus is on the ease of use, embracing the web. It is a NoSQL document store database. Couchbase Server is a NoSQL document database for interactive web applications. It has a flexible data model, is easily scalable, provides consistently high performance. Couchbase Server, JSON documents are used to represent application objects and the relationships between objects.

 

9.MEMCACHED

Memcached

Memcached is an open source, high-performance, distributed memory caching system intended to speed up dynamic web applications by reducing the database load. It is a key-value dictionary of strings, objects, etc., stored in the memory, resulting from database calls, API calls, or page rendering. It is now being used by Netlog, Facebook, Flickr, Wikipedia, Twitter, and YouTube among others.

10.COUCHDB

couchDB-improgrammer

 

CouchDB is an Open Source NoSQL Database which utilizes JSON to store information and JavaScript as its query language. It applies a type of Multi-Version Controlling system for avoiding the blockage of the DB file during writing. It is Erlang. It’s authorized under Apache. It is ranked 1st for Best NoSQL Database 2016 list for popularity.


Before we summarize the article we compare the three databases:

Parameter

Cassandra

MongoDB

HBase

Description

High scalability, strong  security by lowering overall cost of ownership

Traded in JSON format, Schema-less database

Key-value stores which run on top of HDFS

Data Model

Key Spaces

Flexible Schema

Column-Oriented DB

Implementation Language

Java

C++

Java

Query Language

CQL-Cassandra Query Language

Dynamic Object-Based Language and JavaScript

MapReduce

Performance

More Durable and Slight better among the three of them

Less durable compared to Cassandra

Less durable compared to Cassandra

Security

TLS/SSL Encryption
Client Authentication
Authorization

Encryption
Authentication
Auditing
Governance

Thrift Server role
Authentication
Authorization

Replication Methods

Selective Replication Factor

Master Salve Replication

Selective Replication Factor

Competitive Advantage

No chance of Failure and it ensures 100% availability, High-Scalability

Best of Traditional Database, Giant-Ideas

Store Large dataset on top of HDFS, Aggregate and analyze billions of rows in HBase table for online analytics

Application Areas

Used in fraud detection applications. Twitter and Netflix used Cassandra.

Used in a mobile single view, real-time analytics

Used in medical to store the genome sequence, sports, storing match histories for better analytics, Web use Hbase for better customer targetting

Market Metrics

40% of the Fortune Hundred Companies

40 million downloads

7% of the companies in the world

 

Top 10 Programming Languages by google

Google search trends worldwide from January 2019— December 2019.

Google is the best friend of every developer on the planet. So it is fair to analyse the search trends and find the programming languages developers were the most interested in this year. So based on the following parameters, the top programming languages 2020 for businesses came to be these:

·        JavaScript

·        Python

·        Java

·        Go

·        Elixir

·        Ruby

·        Kotlin

·        TypeScript

·        Scala

·        Clojure

 

1.      JavaScript

https://miro.medium.com/max/626/0*9p_VJzDjZy2eZDn6.jpg

·           Average JavaScript Developer Salary in the US as per Indeed: $109,462 per year.

·           Recognized as the most popular top programming language in the Stack Overflow Developer Survey 2019.

·           Most popular programming language on GitHub.

·           It seems that JavaScript has gone down in popularity since the past year as per data from Google trends. The language was almost at the peak score with a rating of 91 in January 2019. In December 2019, we saw a dip in popularity and JavaScript scored only 62 out of 100.

2. Python

https://miro.medium.com/max/626/0*ThFKwCKnyIF_e0ZN.jpg

  • Average Python Developer Salary in the US as per Indeed: $117,503 per year.
  • Python is one of the top object-oriented programming languages and 2nd in the list of Most loved top programming languages as per Stack Overflow developer survey 2019.
  • Also recognized as the most wanted programming language in the StackOverflow Developer survey.
  • Second most active programming language on GitHub.
  • Python’s popularity has significantly dipped since the beginning of 2019. As of December 2019, the language had a rating of 62/100 in Google trends, while it had reached a score of 75 in January.

3. Java

https://miro.medium.com/max/628/1*0jn8ey1U5twP5bS9ySqE2Q.jpeg

  • Average Java Developer salary in the US as per Indeed: $101,929 per year.
  • Java happens to be at the 10th place as one of the most dreaded programming languages in 2019.
  • Third-most active top programming language on GitHub.
  • Java scored a rating of 89 out of 100 in Google trends as of January 2019. In December 2019, the number dropped down to 59. This decrease could be attributed to widespread use of Python as an alternative and the intense competition between Python Vs Java.

4. C

https://miro.medium.com/max/140/1*AOexi6l-6DjrBhb_3Jg6yg.png

  • As per Indeed, the average salary for a C Programmer in the US is $104,905 per year.
  • As per StackOverflow survey 2019, C happens to be the 4th most dreaded programming language.
  • The C programming language is the 8th most active on GitHub, a position it has maintained for two years straight.
  • C’s popularity reached great heights in 2019, and it maintained a consistently high user interest throughout the year. In fact, the TIOBE Index awardrd C as the most popular programming language for 2019.

5. Go

 

https://miro.medium.com/max/1600/0*KSo--yKXP5iijxrM

 

  • Average Go developer salary globally: $109,483 per year. The average salary in the US for this top programming language is $136K per year.
  • Go is the third-most highly paid language globally in the Stack Overflow developer survey 2019.
  • The Go programming language is the fourth most active on GitHub.
  • The google search popularity for Go has remained constant in 2019.

 

 

 

6. Swift

https://miro.medium.com/max/225/1*uHoJolDzrTLdnPW96BehFg.jpeg

  • The Global average salary for a Swift (iOS) developer is $59k. As per Indeed, the average salary for the same profile in the US is $125,252 per year.
  • Swift is the 6th most loved programming language as per Stack Overflow developer Survey 2019.
  • Swift was 10th most active programming language on GitHub for the year 2019.
  • The google search popularity of Swift peaked to a score of 100 in June this year. But it maintained an otherwise consistent search volume throughout the year.

7. Ruby

 

https://miro.medium.com/max/470/0*uGHj6krRdU8taFfR

 

  • Average global salary for development on Ruby: $76k. The average salary for Ruby developers in the US is $123k.
  • Ruby is the sixth most highly paid language globally as per Stack Overflow developer survey 2019.
  • Ruby has maintained the 12th position throughout the year in the list of most active top programming languages in Github.
  • The Ruby programming language maintained its peak popularity between January- April 2019. But it started going down since May and its user interest dropped to 57 by December.

 

8. Kotlin

 

https://miro.medium.com/max/220/0*4jSlrDqN0AB23I0y

·       Average global salary for development on Kotlin: $57k. The average salary for Kotlin developers in the US is $125k.

·       Although Kotlin isn’t one of the most highly paid languages as of right now, its demand as soaring thanks to Google declaring it as the official language for android app development.

·       Kotlin is the 15th most active top programming language on GitHub, having risen by one rank since the last year.

·       Kotlin’s popularity has mostly remained consistent this year. The user interest on this language peak during the month of May. This was possibly due to the I/O 2019 and Google’s declaration of Kotlin being used as a primary language for android app development.

9. TypeScript

https://miro.medium.com/max/1024/0*2juTvhFd3XIvs2ZA

 

  • Average global salary for development on TypeScript: $60k. The average salary for TypeScript developers in the US is $115k.
  • TypeScript is the 10th most popular top programming language as per Stack Overflow developer survey.
  • The Microsoft-nurtured programming language is now the 7th most active on GitHub.
  • The popularity of TypeScript as per Google search peaked for some time in June, July, October and the entire month of November in 2019. TypeScript has witnessed a remarkable rise in user interest this year.

10. Scala

 

https://miro.medium.com/max/493/0*NDOyQGTdw8Oq9BwT

  • Average global salary for development on Scala: $78k. The average salary for Scala developers in the US is $143k.
  • As per Stack Overflow annual developer survey 2019, Scala is the highest-paid programming language in the US, and the 4th most highly paid programming language globally.
  • Scala’s popularity on GitHub has gone down in 2019. It went from being the 12th most active programming language on GitHub in 2018 to the 17th position in the past year.
  • Scala’s popularity in Google search trends peaked for some time in the months of March and August. However, the user interest on Scala started going down since November 2019.

 

Solving a Customer's Server Problem

People often use funny slang and abbreviations in chats and other social situations. Typically, there is also a more relaxed attitude towards grammar as well. The following is a chat transcript between an account manager and a software engineer working at a web hosting company. They are troubleshooting a server problem that affects one of their customers. Please note that you should not use slang with unfamiliar people. Using slang is not professional and can be taken badly by some people. You have been warned!

Account ManagerTIL that certain web page requests are taking forever to load on some of our servers. One client in particular is really pissed off.

Sysadmin: what is the name of the client?

Account Manager: Svensson Trucking Supply

Sysadminbrb i need to be afk for 30 minutes

Account Manager: 30 minutes? this guy is a major client and management says we need to fix this issue asap. they told me you were the 1337 alpha geek who could resolve this issue right away.

Sysadminlol... 1337 alpha geeks need to eat lunch too :P

Account Manager: LMAO that you would eat lunch right now. Please look into the problem BEFORE lunch!

Sysadmin: okay gimme 5 minutes

Time passes...

Account Manager: Did you find the problem?

Sysadmin: wow did i... imho the site was set up by a total n00b. there is a major security hole in their iis web server. someone set up a warez site on a subdomain and there are 100 leeches sucking up all the bandwidth.

Account ManagerWTF. No wonder their site is so slow

Sysadmin: they are using a really old version of iis server. let me upgrade and patch it for them.

Account Manager: Okay. I will call the client and update them on the status.

Time passes...

Sysadmin: okay the server is patched and running normally. now im gonna go eat... 1337 alpha geek ftw!

Account Manager: Nice work! Thanks a million!!!!

Sysadmin: how about telling management to give me a raise since im the only one who knows how to solve client problems?

Account Manager: Wow that's funny. I'm literally ROTFL

Sysadmin: FU

Account Manager: Hahahaha! I'll pretend I didn't hear that. L8R skater.

 


 

A Controversial IT Purchase

People often use funny slang and abbreviations in chats and other social situations. Typically, there is a relaxed attitude towards the rules of grammar. The following is a chat transcript between an older grumpy senior developer and a younger intermediate developer. They are discussing a recent hardware acquisition.

Please note that you should not use slang with unfamiliar people. Using slang is not professional and can be taken badly by some people. You have been warned!

 

*-- The Bunion --*: Did you hear what happened? We had to buy some new hardware last month to run that new killer app that management thought was so important.

Deadly Avenger: Really? What was wrong with the old hardware?

*-- The Bunion --*: It was too old to be used anymore, apparently. I told them the hardware requirements for the new CRM system BEFORE they bought it. Now they need to upgrade the whole internal network as well.

DeadlyAvenger: What are they gonna upgrade to?

*-- The Bunion --*: You won't believe it. A whole truckload of brand new Dell PowerEdge servers with Intel Xeon processors. And a 10 gbps ethernet connection hooking everything together.

DeadlyAvenger: Cool. That sounds like some real leading edge stuff.

*-- The Bunion --*Whatever. We could have saved a lot of money by staying on the old software platform. It was good enough to make any CRM geek happy.

DeadlyAvenger: Let me get this straight. You're complaining about management buying new hardware? The old hardware was totally EOL.

*-- The Bunion --*: It's such a PHB move to spend so much on replacing a perfectly functioning CRM platform. The CTO probably read a shiny pamphlet at a trade show in San Francisco, had a few drinks over dinner, and then immediately signed the contract.

DeadlyAvenger: You might be stuck in the past, but the code monkeys in the developer room will be salivating over the new equipment. Now they can rewrite their spaghetti code into more object-oriented goodness.

*-- The Bunion --*: I don't mean to be a pita, but I checked out the user reviews of that new release and people say it's fundamentally horked. Newer does not always mean better. It doesn't pay to be an early adopter.

DeadlyAvenger: That may well be true. I thought maybe we should have hosted the new application in the cloud. That's what all the trendsetters are doing nowadays. And people from remote offices would like that because they would get quicker load times.

*-- The Bunion --*: The cloud? Are you serious? What about security? You are such a fanboy of every new IT fad that comes along.

DeadlyAvenger: At least I am not a troll. You are trying to start a flame war on the company intranet discussion forum in order to show upper management how much you are trying to save money.

*-- The Bunion --*: Well, we didn't exactly have a great financial year so far. Now the whole IT department will be busy upgrading instead of solving our customers' true needs.

DeadlyAvenger: Admit it. If it were up to you, we'd all still be on mainframes programming COBOL.

*-- The Bunion --*: Hahahaha. Yeah I guess you're right. But saving the company money is the only effective way I know of proving I deserve a raise every year.

DeadlyAvenger: Or you could end up proving that you are a cranky old man and get yourself relocated to the Accounting department ;)

*-- The Bunion --*Whatever. You guys wouldn't last two weeks without me here!

DeadlyAvenger: Maybe you're right. I gotta go now. Bye.

*-- The Bunion --*: Howdy.

 

Ten Commandments of Computer Ethics

Created by the Computer Ethics Institute

 

1. Thou Shalt Not Use A Computer To Harm Other People.

2. Thou Shalt Not Interfere With Other People’s Computer Work.

3. Thou Shalt Not Snoop Around In Other People’s Computer Files.

4. Thou Shalt Not Use A Computer To Steal.

5. Thou Shalt Not Use A Computer To Bear False Witness.

6. Thou Shalt Not Copy Or Use Proprietary Software For Which You have Not Paid.

7. Thou Shalt Not Use Other People’s Computer Resources Without Authorization Or Proper Compensation.

8. Thou Shalt Not Appropriate Other People’s Intellectual Output.

9. Thou Shalt Think About The Social Consequences Of The Program You Are Writing Or The System You Are Designing.

10. Thou Shalt Always Use A Computer In Ways That Insure Consideration And Respect For Your Fellow Humans.


 

Top 15 American IT Companies

For some reason, most of the large IT companies in the world are American. For instance Google, Apple, Microsoft, Facebook, etc. As an IT professional, you are expected to know about big IT corporations, revenue, profits, budgets, and other economic matters. Why?

 

 

Because these things affect your capacity to perform your tasks. The economy tends to go in cycles. In an up cycle, you will get resources to build or improve systems. In a cycle you will be pressured to cut spending and possibly even lay off staff. This is business as usual" and nothing to get excited about. Over the span of your career you will experience many up and down economic cycles.

Studying what the big IT companies do right and wrong will help you think of ideas how to improve your own IT department. No matter if you work for a small company, non-profit organization, or a government institution, you will learn quickly that most decisions are based on money. The best way to implement your "great idea" is to argue that it will save time or increase profits. Trying to argue a point without keeping efficiency, profits and budgets in mind will be difficult.

 

Below is a chart of 15 American IT companies I think are important to know about. The more you know about the business of IT, the better IT professional you will become.

 

Company

Rank

Revenue

Profit

Products

Adobe

443

5,854

871

Graphic Design Software / Flash Media

Advanced Micro Devices

565

4,272

471

CPU / GPU

Apple

3

215,639

14,013

Computer Hardware / Software

Cisco Systems

60

49,247

7,767

Networking Equipment

Dell

41

64,806

2,635

Computer Hardware

Google

27

90,272

8,505

Search / Software

HP

61

48,238

8,761

Computer Hardware / Services

IBM

32

79,919

14,833

Computer Services / Software / Hardware

Intel

47

59,387

11,464

Microprocessors, Components

Microsoft

28

85,320

18,760

Computer Software

Oracle

81

37,047

6,135

Database Software / Services

NVIDIA

387

6,910

-30

GPU / CPU / chipsets

Western Digital

217

12,994

1,382

Hard Disk Drives / Computer Hardware

 


 

РЕФЕРИРОВАНИЕ и АННОТИРОВАНИЕ

Аннотирование и реферирование, или процессы информационной обработки текстов, являются одной из самых широко распространенных письменных форм быстрого извлечения информации и ее смысловой обработки. Основой таких видов деятельности является понимание иностранного текста и навыки перевода научно-технической литературы.

Нужно уметь отделять главное от второстепенного, анализировать и обобщать обрабатываемый материал.

Сущность информационной обработки текстов состоит в кратком и обобщенном изложении содержания первоисточника. Целью информационной обработки текста является извлечение полезной и ценной информации по конкретной проблематике.

Термины «первичные» и «вторичные» тексты появились из теории научно-технической информации. Понятие «первичный», «вторичный» используются как основание классификации информационных документов. Вторичные тексты создаются в результате преобразования исходного, первичного, базового текста. Вторичные тексты – это библиографическое описание, аннотация, реферат, конспект, перевод, рецензия.

Библиографическое описание может быть самостоятельным информационным вторичным документом (используется в библиотечных каталогах и библиографических указателях) или частью другого вторичного документа (используется как вводная часть в аннотациях и рефератах). Библиографическое описание дает все необходимые данные о первичном документе и состоит из следующих элементов в определенной последовательности:

Аннотирование – информационный процесс составления кратких сведений о первоисточнике, первое с ним знакомство, которое позволяет судить о целесообразности его более детального изучения в дальнейшем. Аннотация (от лат. annotatio – замечание) предельно краткое изложение того, о чем можно прочитать в данном первоисточнике. В аннотации (как вторичный текст) перечисляются главные вопросы, проблемы, изложенные в первичном тексте, а также может характеризоваться его структура.

В отличие от реферата, который дает возможность читателю познакомиться с сутью излагаемого в первоисточнике содержания, аннотация не раскрывает содержание документа, в ней не приводятся конкретные данные, описание оборудования, характеристики, методики и т.д., а она дает лишь самое общие представление о его содержании. Аннотация помогает найти необходимую информацию по интересующему вопросу.


 

АЛГОРИТМЫ В ОБУЧЕНИИ АННОТИРОВАНИЮ

И РЕФЕРИРОВАНИЮ

Алгоритм – совокупность автоматических действий для решения данной задачи. При аннотировании и реферировании можно рекомендовать следующие алгоритмы:

а) Прочтите заголовок текста, определите, дает ли он представление о содержании текста.

б) Просмотрите, делится ли статья на разделы (есть ли подзаголовки).

в) Если «да», прочтите подзаголовки, определите, о чем они.

г) Обратите внимание, есть ли рисунки, схемы, таблицы.

д) Если «да», прочтите подписи под ними.

е) Если есть аннотация к тексту, то прочтите ее.

ж) Если «нет», то прочтите первый и последний абзацы текста и по ключевым словам определите о чем текст.

Или, например:

а) Просмотрите текст с целью получения общего представления о тексте в целом.

б) Выделите абзацы, содержащие конкретную информацию по теме статьи, методу проведения работы, результатом работы, применению в конкретной области.

в) Сократите малосущественную информацию в этих абзацах по каждому пункту.

г) Напишите обобщенную основную в форме реферата в соответствии с планом его написания: тема, метод, результаты, выводы, применения.

III. Или при оформлении библиографического описания аннотации и реферата:

а) Укажите заглавие реферируемой статьи на русском языке и языке оригинала.

б) Если есть автор или авторы, напишите их на языке оригинала (помните, что если авторов больше двух, указывается только первый и затем пишется «и др.»).

в) Затем напишите название источника информации на языке оригинала, год, номер, обязательно страницы.

г) Только затем пишется текст аннотации или реферата.

 

Phrases to be used in an annotation

 

ü The passage is an extract from…

ü The extract I am dealing with is taken from…

ü The text under consideration is taken from…

ü The text I am going to comment on is a story by…

ü This extract presents an act from the play…by the English playwright W.

o  Shakespeare.

ü The given passage is an extract from…

ü The plot of the story is concerned with (the upbringing of children…)

ü The subject-matter of the passage is (a description of a certain Mrs. General, a snobbish and pretentious lady…)

ü The story tells of (the tragic fate of a young poet…)

ü The write unfolds the sad story of (a boy who was brought up by distant relatives, cruel and hard-hearted people…)

ü The story gives a deep insight into (the life of the common people, «the little man’s» existence…)

ü This play sums up many burning problems of the time, such as…

ü The story shows the drama of (the character s inner world…)

ü The chapter gives a true picture of (contemporary social and family relations in bourgeois society…)

ü The story depicts (the plight of the city poor, and the striking contrast between their miserable existence and the life of the privileged few…)

ü The action takes place in (an old English estate…)

ü The setting for the play is (a lodging house owned by…)

ü The main characters are…

ü The plot is very simple…

ü The plot, as such, is practically eventless…

ü The story is full of events…

ü These are the main facts that make up the plot of the story.

ü  This is the gist of the extract.

ü Such is the plot of the extract.

 

Phrases to bu used while working with the text

 

ü The story is told in the third person narration (this is third person narration; the narrative is the first person).

ü The story is told from the point of one the characters, namely…

ü The narrator (an onlooker who does not take part in the events but whose keen interest in them is quite obvious).

ü The narrator focuses his attention on…

ü The character s perception of the events permeates the whole story and makes it dramatic (appealing, humorous…)

ü In this story we can observe the conventional sequence of compositional elements: an exposition, a gradual mounting of tension, with final climax and denouement.

ü The opening paragraph presents (an exposition to the story…)

ü It is description of…, an account of…, etc.

ü The story opens with a description of…

ü The opening paragraph introduces (the main characters and gives some details of their life…)

ü The first part of the text which presents an exposition to the events is written in the form of the description blended with a dialogue.

ü The atmosphere and details of living are described convincingly (perfectly, exactly as in life).

ü The landscape is not simply the background (it plays a definite role in the development of the plot; highlights certain features of a character…)

ü The description of (the place of action…) gives a deeper insight into the situation. From this description we understand that (the imaginary state of Winnemac is an artistic incarnation of the exacting American states, with their landscape, customs and history).

ü The basic compositional feature of this story is suspense. It is created by a number of relevant details which intensify the tension of the situation. These details include…

ü This part of the text is written in the form of a narration which conveys the dynamic development of the plot.

ü The tense rhythm of the narration is interrupted by / accentuated by (dialogues in which the reader s attention is drawn to a new topic…)

ü The narration is closely interwoven and interlaced with the monologue of the character which gives an insight into (the character s state of mind…)

ü The next paragraph adds some more details to the reader s knowledge of the situation.

ü The episode of the argument (the character s meeting…) is the climax of the story. This scene is (dramatic; solemnly impressive; humorous…) 

ü The episode presents the crucial point of the story. The reader understands that…

ü The concluding paragraph presents the denouement. Everything is more clear...

ü The story ends with…

ü Two characters are presented in this extract…

ü The personages are given a profound and true-to life psychological characterization.

ü The character is presented as (weak-willed; passive, a man lacking in firmness, helpless, gentle, intelligent, cheerful, tactful, honest in dealing with other people, a person with a clear conscience…).

ü The description brings out (the characteristic features of Mr. X s personality, such as his dignity; his yearning for a new life; his splendid calm..).

ü All the details of his appearance (the full ruddy face, the keen look, the mockingly condensing smile…) speak of man s (sanguine temperament, intelligence, confident dignity, composure, devotion to his convictions, remarkable will-power…)

ü Mr. X s personality is revealed to the full through his own words and the remarks of other personages. He is described as a (cruel, hard-hearted, haughty, greedy, tactless, hypocritical, dishonest, narrow-minded, rude, irritable, ill-bred, fussy…) man.

ü His actions enumerated in the narration characterize him as a (good-natured, sensible, stubborn, reliable, resourceful, persistent, shrewd) person.

ü She is characterized by (reserve, reluctance to allow anybody to get an insight into her inner state…)

ü There were certain traits in her character that were alien to her husband such as…

ü All these details underline (the character s social position, her absolute lack of breeding…)

ü The characters are convincing and well-drawn…

ü The characters are typical and authentic and their psychology is well rendered.

ü The mood prevalent in the extract is (cheerfulness, humour, irony, gloom, nervousness, bleakness, melancholy, happiness…).

ü The tone of the extract is tensely dramatic. The author lays bare the spiritual drama of…

ü The story is full of jokes, witticism, and light-hearted jest.

ü The story is distinguished by its cheerful tone.

ü The extract has a tragic ring.

ü The mood of wretchedness, anxiety permeates the text (The story is permeated with…).

ü The story reflects life, and in life everything is mixed up together: the profound with the trivial, the great with pretty, the tragic with the comic.

ü Minute details add to the matter-of-fact and logical tone of the narration.

ü The author clearly displays his sympathy for the character. With anger and acrimony he shows the triumph of philistines and brutality.

ü The story is filled with deep sympathy for the poor and a bitter harted for the rich.

ü The author’s message is expressed very clearly. The writer raises his voice in defense of (human dignity…).

 

Cliches for working with newspaper articles

ü  The newspaper under review is…№…1999

ü  The article headline reads as follows…

ü  The article is published under the rubric…

ü  The author of the article is…

ü  The subject of the article is…

ü  The main idea of the article is…

ü  The main idea of the article is in the very headline.

ü  The main idea of the article is in the following lines…(words).

ü  It’s a political commentary.

ü  It’s an editorial article.

ü  The main idea of the article is in the last paragraph.

ü  The material is topical.

ü  The material of the article is devoted to…

ü  The material attracts the reader.

ü  The article gives very full attention to this event.

ü  The article deals with the problem of…

ü  The article carries material on (about)…

ü  The opening paragraph conveys the principal item of the article.

ü  The 1st paragraph introduces the main idea of the editorial.

ü  The next part of the article is devoted to (deals with)…

ü  Paragraph 3 discusses…

ü  Further, the author dwells on…

ü  According to the author…

ü  The author speaks in details about…

ü  In compressed form…

ü  The paper gives figures illustrating…

ü  In conclusion the author adds (I should add)…

ü  In conclusion I should mention that…

 

The author:

-       remarks

-       points out that         

-       stresses

-       underlines

-       speaks about … in details

-       also explains that

-       describes

-       states

-       declares

 

INTRODUCTION

ü  The news… provides a front-page story in the paper.

ü  The stories… dominate the front page.

ü  The main front-page news in the paper is…

ü  The paper carries a long/short editorial about…

ü  The news…caused a lot of editorial about…

ü  The news…gets the attention on the front page.

ü  …provides the leading domestic ( international, foreign) news

ü  The leading item of foreign news…

ü  The editorial is concerned with…

ü  The paper comments on…

ü  Another big front-page item concerns…


NEUTRAL

ü  The article draws attention to the fact…

ü  The paper finds a good deal to say…

ü  In the paper’s views…

ü  The author brings out the problem…

ü  The article describes…

ü  The author outlines/points out…

ü  The paper cites as proof of…

ü  The paper addresses its editorial on the problem…to…

ü  The paper comments…

ü  The editorial is mainly concerned with domestic affairs…

ü  The article ends with the comment…

ü  The editorial concludes…

ü  The paper focuses its attention on…

ü  The article highlights the consequences of…

ü  As the paper puts it…

ü  In its comment the paper reviews…

ü  A four-column article on the inside page sums up…

ü  A detailed front-page article summarizes…

FOR

ü  The paper finds a good deal to say in support of…

ü  The paper finds it significant that…

ü  The paper calls for more pressure…

ü  The newspaper is confident that…

ü  The paper aggress that…

ü  The paper strongly believes that…

ü  The paper makes a vigorous call for…

ü  The paper declares its support for…

ü  The paper concludes with a strong appeal for…

ü  The paper expresses approval of / support of…

ü  The editorial expresses the belief (the conviction, the opinion, the view) that…

AGAINST

ü  The author argues that…

ü  The author fails to answer the question…

ü  The paper accuses…

ü  The editorial bitterly attacks…

ü  The paper condemns…

ü  The editorial is sharply critical of…

ü  The article strongly denounced…

ü  The editorial disagrees with…

ü  The paper expresses alarm (concern, disappointment) at…

ü  The paper strongly protects against…

ü  Summing up the… the author regrets that…

ü  The newspaper strongly rejects the idea of…

ü  The paper briefly touches upon…

ü  The paper deals with the problem…

 

 

TEXTS

 

Cryptocurrency

Digital currency is a type of currency available in digital form. It exhibits properties similar to physical currencies, but can allow for instantaneous transactions and borderless transfer-of-ownership. https://avatars.mds.yandex.net/get-zen_doc/59919/pub_5a959c1f1410c3af21df9c80_5a959c8a57906a2922e50c82/scale_1200

Examples include virtual currencies and cryptocurrencies and central bank issued money accounted for in a computer database. Like traditional money, these currencies may be used to buy physical goods and services, but may also be restricted to certain communities such as for use inside an online game or social network.

In early 2009, an anonymous programmer or a group of programmers under an alias Satoshi Nakamoto introduced Bitcoin. Satoshi described it as a ‘peer-to-peer electronic cash system.’ It is completely decentralized, meaning there are no servers involved and no central controlling authority. The concept closely resembles peer-to-peer networks for file sharing.

One of the most important problems that any payment network has to solve is double-spending. It is a fraudulent technique of spending the same amount twice. The traditional solution was a trusted third party - a central server - that kept records of the balances and transactions. However, this method always entailed an authority basically in control of your funds and with all your personal details on hand.

In a decentralized network like Bitcoin, every single participant needs to do this job. This is done via the Blockchain - a public ledger of all transaction that ever happened within the network, available to everyone. Therefore, everyone in the network can see every account’s balance. Every transaction is a file that consists of the sender’s and recipient’s public keys (wallet addresses) and the amount of coins transferred. The transaction also needs to be signed off by the sender with their private key. All of this is just basic cryptography. Eventually, the transaction is broadcasted in the network, but it needs to be confirmed first.

Within a cryptocurrency network, only miners can confirm transactions by solving a cryptographic puzzle. They take transactions, mark them as legitimate and spread them across the network. Afterwards, every node of the network adds it to its database. Once the transaction is confirmed it becomes unforgeable and irreversible and a miner receives a reward, plus the transaction fees.

Cryptocurrencies are so called because the consensus-keeping process is ensured with strong cryptography. This, along with aforementioned factors, makes third parties and blind trust as a concept completely redundant. Many existing digital currencies have not yet seen widespread usage, and may not be easily used or exchanged. Banks generally do not accept or offer services for them.

There are concerns that cryptocurrencies are extremely risky due to their very high volatility and potential for pump and dump schemes. Regulators in several countries have warned against their use and some have taken concrete regulatory measures to dissuade users. The non-cryptocurrencies are all centralized. As such, they may be shut down or seized by a government at any time. The more anonymous a currency is, the more attractive it is to criminals, regardless of the intentions of its creators.

 

Elon Reeve Musk

 

Elon Reeve Musk - American engineer, inventor and investor. Co-founder of PayPal;founder, co-owner, Chief Executive Officer and chief engineer of SpaceX; Chief Executive Officer and chief inspirer of Tesla; was also a member of the Board of Directors of Solar City. Born and raised in Pretoria, South Africa, Musk moved to Canada when he was 17 to attend Queen's University. He transferred to the University of Pennsylvania two years later, where he received an economics degree from the Wharton School and a degree in physics from the College of Arts and Sciences.

At the age of ten, Elon received as a gift his first Commodore VIC-20 computer and learned to program on it. At the age of twelve, he sold for $ 500 his first program – a video game called Blastar. In 1995, Musk and his brother founded Zip2, a company that specialized in software for news companies. In 1999, Zip2 was purchased by Compaq for $ 308 million. Musk received $22 million.

In March 1999, Musk was one of the founders X.com. In 2000 X.com has merged with PayPal. Both systems were engaged in providing personal electronic money transfers via e-mail, and the purpose of the transaction was the merger of both payment systems. This impressive success allowed the company to place its shares on the stock exchange in February 2002 In October 2002 PayPal was bought by eBay for 1.5 billion dollars. At the time of sale Mask owned 12 % of the company, which allowed him to gain $ 180 million.

https://static.life.ru/posts/2017/04/997876/1df47fbce00d8f27079092c5c8f9fc35.jpgIn May 2002, Musk founded his third company — SpaceX, investing in it 100 million dollars. Elon Musk set a goal — to reduce the cost of space flights by 10 times. In January 2016 at the investment forum in Hong Kong, Musk announced that his company hopes to fly to Mars in 2020-2025.

In 2006, he inspired the creation of SolarCity, a solar energy services company. In 2015, Musk co-founded OpenAI, a nonprofit research company that aims to promote friendly artificial intelligence. In July 2016, he co-founded Neuralink, a neurotechnology company focused on developing implantable brain–computer interfaces.

Tesla - American company, based in Palo Alto, California. The company specializes in electric car and solar panel manufacturing. Musk has envisioned a high-speed transportation system known as the Hyperloop, and has proposed a vertical take-off and landing supersonic jet electric aircraft, known as the Musk electric jet.

Rewards. 2007 American Institute of Aeronautics and Astronautics George Low award for the most outstanding contribution in the field of space transportation. Musk was recognized for his design of the Falcon 1, the first privately developed liquid-fuel rocket to reach orbit.

In 2008, Esquire magazine included the Mask in the list of 75 most influential people of the XXI century. The world governing body for aerospace records, presented Musk in 2010 with the highest award in air and space, the FAI Gold Space Medal, for designing the first privately developed rocket to reach orbit. In June 2011, he was awarded the Heinlein prize for his achievements in space commercialization of 500 thousand us dollars. In February of the same year, Forbes magazine included the Mask In the list of 20 most influential American CEOS under the age of forty.

In 2012, Musk was awarded the Royal Aeronautical Society's highest award: a Gold Medal. In November 2013, Fortune magazine named him entrepreneur of the year and the Wall Street Journal named Mask CEO of the year. In 2015, he was awarded IEEE (Ай трипли) Honorary Membership. In June 2016, Business Insider named Musk one of the "Top 10 Business Visionaries Creating Value for the World" along with Mark Zuckerberg and Sal Khan.

In December 2016, Musk was ranked 21st on Forbes list of The World's Most Powerful People. In May 2017, Musk was awarded the Oslo Business for Peace Award. For outstanding services to science on May 9, 2018, Elon Reeve Musk was awarded the membership of the Royal society of London.

According to Elon himself, he was greatly influenced by the cycle of science fiction novels "the Foundation" and the views of Isaac Asimov on the development of outer space as the development and preservation of human existence. Musk has stated that the goals of SpaceX, Tesla, and SolarCity revolve around his vision to change the world and humanity. His goals include reducing global warming through sustainable energy production and consumption, and reducing the risk of human extinction by establishing a human colony on Mars.

 

EXERCISES

Match the verbs with the nouns.

1. recharge

2. click on

3. dial

4. give

5. move

6. print out

7. send and receive

8. take some

a. digital photos

b. faxes

c. a number on your mobile phone

d. a presentation

e. something with the mouse

f. the battery

g. the mouse

h. twenty pages

 

 

 

http://jurmarketing.ru/wp-content/uploads/2014/02/%D0%B7%D0%BD%D0%B0%D0%BA-%D0%B2%D0%BE%D0%BF%D1%80%D0%BE%D1%81%D0%B0.jpgChoose the best verb.

1. To turn on the computer, __________ the "Start" button.

a. touch

b. press

c. switch

2. The printer has __________ of ink.

a. finished

b. ended

c. run out

3. Unfortunately, my scanner isn't __________ at the moment.

a. working

b. going

c. doing

4. Please __________ the CD ROM.

a. insert

b. introduce

c. inject

5. The projector isn't working because it isn't __________.

a. plugged

b. plugged in

c. plugged into

6. The batteries in my digital camera are nearly dead. They need __________.

a. to change b. exchanging c. changing

7. I have to __________ a computer screen for eight hours a day.

a. see

b. look at

c. watch

8. Switch off your computer, and __________ it from the wall socket.

a. de-plug

b. unplug

c. non-plug

9. I turned off the photocopier and ___________ the plug.

a. pulled out

b. extracted

c. took away

10. __________ any key to continue.

a. Kick

b. Smash

c. Hit

 

http://jurmarketing.ru/wp-content/uploads/2014/02/%D0%B7%D0%BD%D0%B0%D0%BA-%D0%B2%D0%BE%D0%BF%D1%80%D0%BE%D1%81%D0%B0.jpgRearrange the letters to make things which can be part of a workstation.

TUCMEPOR  

COMPUTER

TRIRPEN  

 

NASECNR

 

KESD  

 

HACIR  

 

NOPELETHE  

 

 

http://jurmarketing.ru/wp-content/uploads/2014/02/%D0%B7%D0%BD%D0%B0%D0%BA-%D0%B2%D0%BE%D0%BF%D1%80%D0%BE%D1%81%D0%B0.jpgChoose the best word.

1. The mouse moves on a __________.

a. mouse mat

b. mouse carpet

c. mouse table

2. TV and computer screens are usually measured in __________.

a. feet

b. miles

c. inches

3. Before you start work, __________ the height of your chair

a. adjust

b. change

c. rearrange

4. To get sound from your computer, plug in a pair of __________.

a. loudhailers

b. loudspeakers

c. loud voices

22. The computer is connected to the telephone line via a __________.

a. module

b. modem

c. mod

23. You can increase the functions or performance of a computer with an __________.

a. extension card

b. exploding card

c. expansion card

24. Mobile phones and PDAs can communicate with computers via __________.

a. Bluebeard ®

b. Blueberry ®

c. Bluetooth ®

25. There's a spare __________ in the workstation…

a. electric hole

b. power point

c. electrical opening

26. …so you can plug in your mobile phone __________.

a. charger

b. power

c. electrification

27. SD cards can be read in a computer's __________.

a. storage reader

b. memory reader

c. card reader

 

http://jurmarketing.ru/wp-content/uploads/2014/02/%D0%B7%D0%BD%D0%B0%D0%BA-%D0%B2%D0%BE%D0%BF%D1%80%D0%BE%D1%81%D0%B0.jpgHow to scan an image

 

at

connected

file format

handheld

dpi

original

image editing

high

text

low

brightness

contrast

click

adjust

preview (or prescan)

flatbed

OCR software

all-in-one

 

 

 

1. Make sure the scanner is _____________ to the computer.

2. Lift the lid and put the _____________ on the scanner glass.

3. For high image quality, scan _____________ 300 _____________ or higher.

4. The scanning software will automatically do a _____________.

5. If the image is too dark or too light, you can __________ the _____________ and _____________.

6. _____________ "scan".

7. If you scanned _____________, it can be "read" by _____________.

8. If you want to save the image, choose a _____________. JPEG is a good choice for photos.

9. The scanned image can be manipulated using _____________ software.

10. An _____________ printer/scanner can print, scan and copy.

11. Picture A is a _____________ scanner.

12. Picture B is a _____________ scanner.

13. Picture C is a _____________ resolution photograph.

14. Picture D is a _____________ resolution photograph.


 

 

A

C

B

D

 

 

 

 

 

 

 


dpi stands for dots per inch (1 inch = 2.4cm)

OCR stands for Optical Character Recognition

JPEG is pronounced "jay-peg"

 

 

 

 

 

 

 

 

Список литературы

1.

K. Boeckner, P. Charles Brown. Oxford English for Computing. Oxford University Press, 2019.

2.

Jon Marks. Computers and IT. A & C Black _ London. Third edition. – 2017.

3.

Santiago Esteras and Elena Marco Fabré. Professional English in Use ICT. Cambridge University – 2018. Режим доступа: https://www.cambridge.es/en/

4.

Duffy, Vincent G. Handbook of Digital Human Modeling: Research for Applied Ergonomics and Human Factors Engineering. CRC Press. – 2016. ISBN 9781420063523

Интернет - ресурсы:

1.

http://techliter.ru/

2.

https://codeburst.io/

3.

https://lingualeo.com/

4.

https://cyberleninka.ru/

5.

https://www.multitran.ru

6.

https://www.techterms.com

7.

https://www.english4it.com/

8.

http://www.blairenglish.com/

9.

https://www.improgrammer.net/

 

 

 

 

 

 .

 

 

 

 

 

 

 

 

 

 

 

 

 

ПРИЛОЖЕНИЕ

Слово

Перевод

to back up

выполнять резервное копирование

to boot

загружать, загружаться

to burn

записывать на оптический диск

to create

создавать

to compile

компилировать

to compress

сжимать (например, архиватором)

to connect

соединять, подключаться

to cut

вырезать в буфер обмена

to debug

отлаживать

to decrypt

расшифровывать

to delete

удалять

to deploy

развертывать (например, приложение на сервере)

to develop

разрабатывать

to disable

отключать, деактивировать

to disconnect

разъединять, отключаться

to display

отображать

to download

загружать, скачивать

to eject

извлекать (устройство)

to enable

включать, активировать

to encrypt

шифровать, зашифровывать

to execute

исполнять

to format

форматировать

to implement

внедрять, реализовывать

to initialize

приводить в исходное состояние, инициализировать

to install

инсталлировать, устанавливать

to integrate

интегрировать, объединять в одну систему

to link to

ссылаться на что-либо

to load

загружать

to paste

вставлять из буфера обмена

to plug in

подключать

to press (a button)

нажимать (кнопку)

to read

считывать

to reboot

перезагружать, перезагружаться

to restore

восстанавливать

to save

сохранять

to scroll up/down

прокручивать вверх/вниз (например, веб-страницу)

to switch on/off

включать/выключать

to uninstall

деинсталлировать, удалять

to update

обновлять

to upgrade

улучшать, модернизировать

to upload

загружать, закачивать

to verify

проверять

Hardware — аппаратное обеспечение

Слово/Словосочетание

Перевод

a bus

шина

a cable

кабель

a central processing unit (CPU)

центральный процессор

a computer case

корпус системного блока

a device

устройство

a fan

вентилятор охлаждения, кулер

a graphics card (display card, display adapter, graphics adapter)

видеокарта (графический адаптер)

a graphics processing unit (GPU)

графический процессор

a hard disk drive (HDD)

жесткий диск

a laptop

ноутбук, портативный компьютер

a light-emitting diode (LED)

светодиод

a motherboard (mainboard)

материнская плата

a network card

сетевой адаптер (сетевая карта, сетевая плата)

a port

разъем, порт

a power supply unit (PSU)

блок питания

a solid-state drive (SSD)

твердотельный накопитель

a sound card (audio card)

звуковая карта

a storage device

запоминающее устройство, накопитель

a touch screen

сенсорный экран

air cooling

воздушное охлаждение

an expansion card

карта (плата) расширения

an optical disk drive

оптический привод

an uninterruptible power source (UPS)

источник бесперебойного питания

random-access memory (RAM)

оперативная память (ОЗУ)

read-only memory (ROM)

постоянное запоминающее устройство (ПЗУ)

removable media

съемные носители информации

water cooling

водяное охлаждение

output devices:

  • a monitor
  • a printer
  • a speaker
  • headphones

устройства вывода:

  • монитор
  • принтер
  • колонка (акустическая)
  • наушники

input devices:

  • a keyboard
  • a mouse
  • a scanner
  • a digital camera
  • a joystick

устройства ввода:

  • клавиатура
  • мышь
  • сканер
  • цифровая камера
  • джойстик

 


Software — программное обеспечение

Слово/Словосочетание

Перевод

a compiler

компилятор

a database

база данных

a debugger

отладчик

a desktop application/app

приложение для настольного компьютера

a device driver

драйвер устройства

a graphical user interface (GUI)

графический пользовательский интерфейс

a kernel

ядро (например, операционной системы)

a mobile application/app

мобильное приложение

a plug-in (plugin)

плагин, расширение, дополнительный программный модуль

a programming language

язык программирования

a query

запрос

a scroll bar

полоса прокрутки

a snapshot

снимок состояния системы

a spreadsheet

электронная таблица

a status bar

строка состояния

a template

шаблон

a version control system (VCS)

система контроля версий

a web application/app

веб-приложение

a word processor

текстовый процессор

a text editor

текстовый редактор

a utility

утилита (служебная программа)

acceptance testing

приемочное тестирование

agile methodology

гибкая методология разработки

an algorithm

алгоритм

an array

массив

an encoding

кодировка

an enterprise application

корпоративное приложение

an executable (file)

исполняемый файл

an interpreter

интерпретатор

an operating system (OS)

операционная система

application software

прикладное программное обеспечение

aspect-oriented programming (AOP)

аспектно-ориентированное программирование

binary data

двоичные данные

commercial software

платное программное обеспечение

data

данные, информация

data processing

обработка данных

extreme programming

экстремальное программирование

firmware

прошивка, микропрограмма

freeware

бесплатное программное обеспечение

incremental development

инкрементная модель разработки

integrated development environment (IDE)

интегрированная среда разработки

iterative development

итеративная модель разработки

malicious software (malware)

вредоносное программное обеспечение

object-oriented programming (OOP)

объектно-ориентированное программирование

open source software

программное обеспечение с открытым исходным кодом

prototyping

создание прототипа, прототипирование

rapid application development (RAD)

быстрая разработка приложений (методология)

regression testing

регрессионное тестирование

runtime (runtime environment)

среда выполнения кода

server software

серверное программное обеспечение

spiral development

спиральная модель разработки

spyware

программа-шпион, шпионское программное обеспечение

system software

системное программное обеспечение

unit testing

модульное (блочное, компонентное) тестирование

waterfall model

каскадная модель разработки

 


 

Internet — Интернет

Слово/Словосочетание

Перевод

a bookmark

закладка (в браузере)

a bridge

мост

a browser

браузер, обозреватель

a domain

домен

a firewall

брандмауэр, межсетевой экран

a gateway

шлюз

a hyperlink

гиперссылка

a node

узел сети

a packet

пакет

a patch cord

коммутационный кабель, патч-корд

a router

маршрутизатор, роутер

a search engine

поисковая система

a subdomain

поддомен, субдомен

a switch

коммутатор, свитч

a website

веб-сайт, веб-узел

a wireless network

беспроводная сеть

bandwidth

пропускная способность (канала передачи данных)

broadband

широкополосный доступ в Интернет

client-server architecture

клиент-серверная архитектура

cloud computing

облачные вычисления

cloud storage

облачное хранилище данных

dynamic host configuration protocol (DHCP)

протокол динамической настройки узла

domain name system (DNS)

система доменных имен

instant messaging (IM)

обмен мгновенными сообщениями

Internet service provider (ISP)

интернет-провайдер

local area network (LAN)

локальная сеть

latency

задержка, период ожидания

media access control (MAC) address

аппаратный адрес, MAC-адрес

peer-to-peer (P2P)

одноранговая сеть, пиринговая сеть

twisted pair

витая пара

voice over IP (VoIP)

голосовая связь через Интернет, IP-телефония

wide area network (WAN)

глобальная сеть, широкомасштабная сеть

 

Просмотрено: 0%
Просмотрено: 0%
Скачать материал
Скачать материал "Учебно-методическое пособие «Английский язык для студентов специальности 09.02.07 «Информационные системы и программирование»"

Методические разработки к Вашему уроку:

Получите новую специальность за 2 месяца

Заведующий доп. образованием

Получите профессию

Фитнес-тренер

за 6 месяцев

Пройти курс

Рабочие листы
к вашим урокам

Скачать

Скачать материал

Найдите материал к любому уроку, указав свой предмет (категорию), класс, учебник и тему:

6 671 519 материалов в базе

Скачать материал

Другие материалы

Вам будут интересны эти курсы:

Оставьте свой комментарий

Авторизуйтесь, чтобы задавать вопросы.

  • Скачать материал
    • 18.11.2020 4279
    • DOCX 4.3 мбайт
    • 145 скачиваний
    • Оцените материал:
  • Настоящий материал опубликован пользователем Первухина Наталья Валентиновна. Инфоурок является информационным посредником и предоставляет пользователям возможность размещать на сайте методические материалы. Всю ответственность за опубликованные материалы, содержащиеся в них сведения, а также за соблюдение авторских прав несут пользователи, загрузившие материал на сайт

    Если Вы считаете, что материал нарушает авторские права либо по каким-то другим причинам должен быть удален с сайта, Вы можете оставить жалобу на материал.

    Удалить материал
  • Автор материала

    • На сайте: 9 лет и 5 месяцев
    • Подписчики: 5
    • Всего просмотров: 38421
    • Всего материалов: 10

Ваша скидка на курсы

40%
Скидка для нового слушателя. Войдите на сайт, чтобы применить скидку к любому курсу
Курсы со скидкой

Курс профессиональной переподготовки

Менеджер по туризму

Менеджер по туризму

500/1000 ч.

Подать заявку О курсе

Курс профессиональной переподготовки

Английский язык: теория и методика преподавания с применением дистанционных технологий

Учитель английского языка

300 ч. — 1200 ч.

от 7900 руб. от 3650 руб.
Подать заявку О курсе
  • Сейчас обучается 84 человека из 29 регионов
  • Этот курс уже прошли 53 человека

Курс повышения квалификации

Особенности подготовки к сдаче ЕГЭ по английскому языку в условиях реализации ФГОС СОО

36 ч. — 180 ч.

от 1700 руб. от 850 руб.
Подать заявку О курсе
  • Сейчас обучается 205 человек из 47 регионов
  • Этот курс уже прошли 1 251 человек

Курс повышения квалификации

Письмо: методика подготовки учащихся к ОГЭ по английскому языку

36 ч. — 180 ч.

от 1700 руб. от 850 руб.
Подать заявку О курсе
  • Сейчас обучается 72 человека из 32 регионов
  • Этот курс уже прошли 250 человек

Мини-курс

Современные информационные технологии и информационная безопасность

4 ч.

780 руб. 390 руб.
Подать заявку О курсе
  • Этот курс уже прошли 26 человек

Мини-курс

Феноменология в педагогике: основные концепции и их практическое применение

4 ч.

780 руб. 390 руб.
Подать заявку О курсе

Мини-курс

Этапы развития речи: от первых звуков до полноценной коммуникации

4 ч.

780 руб. 390 руб.
Подать заявку О курсе
  • Сейчас обучается 162 человека из 51 региона
  • Этот курс уже прошли 150 человек