As Figure 1 shows, once the necessary data and instruction are in memory, the central processing unit performs the following four steps for each instruction: 1 The control unit fetches gets the instruction from memory.
That is, the ALU is given control and performs the actual operation on the date. Steps 3 and 4 together are called execution time, or E-time. The combination of Itime and E-time is called the machine cycle. What operation does the control unit perform on the data?
Where does the ALU store the results of its operations? What happens to the results eventually? What is the machine cycle?
Registers hold data immediately required, Main memory stores data required in the near future PCs can process ina millionth of a second. Supercomputers cunt process ina billionth of a second. Lach pair contains a contrast, We can show this by linking them as follows: 1 The data bus is bidirectional, whereas the address bus is unidirectional.
Registers hold data immediately required. In contrast, main memory stores data required in the near futtre 3 PCs can process in a millionth of a second, but supercomputers can process in a billionth af a secorad Link each of these pairs of contrasting statements using whereas. Laser printers ure quiet. Handheld computers fit into your pocket. Supercomputers oecupy a whole room, 4. High-level languages are easy to understand, Machine code is very difficult to understand.
Basic is a simple language. Older computers were less powerfull nd quite expensive. An analyst analyses problems and finds solutions. A programmer turns these solutions into computer programs. Agraphics package produces images and designs. Explain to your partner how to convert a number from one system to another.
You can write down the steps and show them to your partner, bul you must explain each step in English. The CPU interrupts its tasks. Working in groups, try to add to these lists of current and possible future applications. Read one of these texts on developments in computing, and make notes in the table below. Would you know her blood type, her allergies, the prescription drugs she takes? Probably not. Even family members may not have this information, or be too distraught themsalves to provide needed 3 medical information.
Enter the MediCard, a plastic card that has an embedded chip containing all that patient information. Small computers that can read the cards are installed in ambulances and in hospital emergency rooms. This system is working successfully in sore communities. The biggest problem is making sure that people carry their cards at all times. One of the mast important steps in computing technology in the coming yaars is likely to be return to mechanical methods.
What are micra-machines going to be used for? Obvious applications are sensors, gyros and drug delivery. The idea of using a micro-machine to deliver drugs is getting a bit closer to more sci-fi applications.
Only a step further is the idea of building insect-sized robots that could do difficult jobs in very small places. Swallowing an ant-sized machine to cure you or putting one inside some failed machinery seams like a really good idea! From a remote location a consumer will be able to manoeuvre and view products along rows in a warehouse. Similarly, from a convenient office 4 security guard can patrol 5 corridors and offices in remote locations. Air traffic controllers may someday work like this.
Microlaser scanner glasses project computer-generated images directly into the contraller's eyes, immersing the controller in a thtee-dimensional scene showing all the aircraft in the area.
Using virtual reality headsets and gloves, doctors and medical students will be able to experiment with new procedures on sirnulated patients rather than real ones. Many more people will join the Internet. Doctors will experiment with new procedures on simulated patients. Micro-machines are going to be used for drug delivery. Task 6 Task 7 Task 8 Make predictions about these things. Compare your answers with other students in your group. Palmtop computers All children will suse them.
They will bbe connected to the school's network be the internet, an! A eybersage will be on call to help with problems or provide information Listen to Part 1 of the recording, The speaker argues in favour of these developments. Note down the main points she makes. GH Task 6 Listen to Part 2. Note down the muim points she makes.
Now listen to the whole recording, What reasons do of thetr main points? Predict how computers will affect our future lives in one of these areas—health, shopping, or money, Work in groups, A, B, and C.
Read one of these texts on the impact of computers on one aspeet of daily life, Make notes in the table below: Development Date Details HEALTH Body chips In the next decade we can have miniature computers inside us to monitor, and even regulate, our blood pressure, heart rate, and cholesterol.
Such a chip would include a microprocessor, sensors, and a radio frequency device that would permit accurate read-outs of vital statistics. All this would happen, of course, without taking» any blood or attaching any external devices to the body. But this is just the beginning. Experts foresee, within twenty years, implanted chips that can correct our abilityto 10 interact with the world. Once implanted, the chip is invisible, unlike a hearing aid. A more common implant would be a chip to correct visual signals, No more glasses!
Text MONEY Electronic cash Bank customers can now download monay from their account to an electronic wallet, a smart card, using specially designed phone equipped with a smart card reader. To download cash you have to enter your PIN. One bank has developed a multi-currency payment engine which allows on-line retailers to sell their goods in sixteen countries, with customers paying in their local 9 currency.
With these developments, coins and nates are likely to disappear. Language work: will and would Compare these examples of predictions. A bodychip will include a microprocessor A bodychip would inchede « microprocessor A common implant will be « chip to correet visual signals.
For example: A body chip woul incleude a microprocessor first we have to develop bocly chips The National Grid would link all schools and colleges. Write other predictions of your own about the cybercity. Speaking Work in pairs, A and B, Explain to each other a new development which may replace passports at border controls. Student A Your information is on page Student BB. Your information is on page Problem-solving In groups, discuss how future developments in computing could help solve the problems of people whe: 1 cannot hear 2 cannol see 3 cannot use their arms and legs.
Integrated circuits or the first minicomputer? Check your answers using this data on the development of computing. Computer generati Dates Technology rst 58 vacuum tubes valves Second transistors: Third integrated circuits ICs Fourth microprocessors First electronic computer built ansistor invented First commercial computer put on sule First minicomputer First Apple Macintosh First palmtop developed Work in pairs, What do you think will be the next important developments in computing?
Make a list Yom is head of Tin large company. In Part 1 of the interview he talks ubout past developments in his own company. Listen arid fill in the gaps in this table. What kind of drive did it have? By how much did electrical load drop each yea Why did it drop? What changes were there in staffing? What was the problem with hardware in the early day abe Listen to Part 2 of the interview.
We're going to live in the web browser ertvironment a lot more. Things wil get cheaper and faster. Tthirak speech recagnition could be big.
Computer teaching may be used more. Tt may happen, islave going to happen It w ll probably happens It could happen. It might happen. It's possibility Isfare not going to happen ts untkely to happen. Give 1 Computers will replace teachers. Computers will direct surgical operations. Camputers will replace bus drivers. Money will be replaced by smart cards.
Speecl will be the main way of inputting data. Computers will talk back to you. The first generation of computers were operated by valves, 2. Describe how develapments in computing will affect homes in the future. Discuss how you can prevent these events. Someone copies software only you are authorized to use. How many ways can you think of for protecting a computer from unauthorized use? Note down your ideas and compare your list with another student Listening: Access systems Listen to this recording and make notes about each type of access system in the tabl Access system Examples What you have What you know Whoyouure Reading: Viruses Try lo answer thes 1 What is a computer virus?
How are viruses spread? What do you think these words in the passage mean? Hash line 10 gobbledegook line 15 dormant line 19 eradicate line 31 3 Why is it dillicult. The Maltese Amoeba is a computer virus. Viruses are programs which are written deliberately ta damage data. Viruses can hide themselves in a computer system. They attach thernselves to the operating system and can wipe out all your data or turn it into gobbledegook, When the Cascade virus attacks, all «5 the letters in a file fall into a heap at the bottom of the screen.
For example, the Jerusalem B virus is activated every Friday the 13th 20 and erases any file yau try to load from your disk. The Michelangela virus was programmed to become active on March 6th , the th birthday of Michelangelo, It attacked computer systems thraughout the world, turning data on hard disks into nonsense.
The best form of treatment is prevention. Use an antivirus program to check a floppy before using it. Always download email attachments onto a floppy and check for viruses. Ifyou do catch a virus, there are antivirus programs ta hunt down 20 and eradicate the virus.
The problem is that around new viruses appear every month and you must constantly update your antivirus package to deal with these new forms. Download email attachments onto a floppy.
Don't use a floppy without checking i We can make them stronger by adding always and never. Always downoad email attachments onto a floppy. You mustn't tse a floppy without checking i Task 6 Rewrite this advice using must or mustn't.
Always make a backup copy of all your important tiles. Always virus-check an email attach ment before opening it Task 7 Write two rules about cach of these topics.
List some of the jobs you know in computing. Compare your lists with other students in the class. Which of the jobs listed would you like to make your career? Explain why to others in your group. Reading: Computing jobs Work in groups of three, A. B, and C, Read these descriptions of jobs in computing and make notes about the main responsibilities Group A Read descriptions Group B.
Makes a detailed analysis of the employer's requirements and work patterns to prepare a report on different options for using information technology. This may involve consideration of hardware as well as saftware.
Either uses standard computer packages or writes a specification for programme: to adapt existing software or to prepare new software. May oversee the implementation and testing of a system and acts asa link between the user and the programmer.
Job Main responsibilities Systems analyst Studtes employer's requirements and working patterns: Reports on different options. Writes specifications for programmers.
Converts the system analyst's specification to a logical series of stops. Translates these into the appropriate computer language. Often compites programs from libraries or sub-programs, combining these to make up a complete systems program, Designs, tests, and improves programs for computer-aided design and manufacture, business applications, computer networks, and games.
Discusses computing needs with the client to ensure that a suitable system can be supplied. Organizes the sale and delivery and, if necessary, installation and testing.
May arrange support or training, maintenance, and consultation. Must have sufficient technical knowledge. Some specialize in software which handles the basic operation of the computers. This involves the use of machine codes and specialized low-level computer languages.
Most handle applications software. May sort out problems encountered by users. Solving problems may involve amending an area of code in the software, retrieving files and data lost when a system crashes, and a basic knowledge of hardware.
May specialize in the internal operating systems using low level computer language, or in applications programs. May specialize in one aspect of the work,. May specialize in different areas: reswarch and development, design, manufacturing.
Has to be aware of cost, efficiency, safety, and environmental factors, as well as engineering aspect: 6 Network Support Person Maintains the link between PCs and workstations connected in a network. Uses telecommunications, software, and electronic skills, and knowledge of the networking software to locate and correct faults. This may involve work with the controlling software, on the wiring, printed circuit boards, software or microchips on a file server, or on cables either within or outside the building.
They must have normal colour vision, We can describe the desirable requirements like this. Which of the three candidates do you think is m Educated to degree level, candidates should Office, Novell networks.
Graduated this year. Write your own CV on the same model. If you are still student, you may invent work experience for the purpose of this task. To find out more, amuil your CV to: steve.
Listen to Part 1 of the interview and find the answers to these questions, 1 Which division of the company does Bill work for? What problem is there because old and new sys List three ways in which the syst What development is making a difference to the company? What is Bill's view on the chance of a paper-tree offic sare running together sare protected, AON the future? Language work: Revision Task 4 Put the verbs in brackets into the correct tense.
Wohere do you work? How lon have you be What do you do? Student B-Your job description ison page Problem-solving Study this diagram which shows some of the stall in large data processing department, Use the information to complete the gaps this text. The data is then ready to be processed by the computer.
A analyse browse debug delete edit install open run save select B data databases documents files folders hardware folders needs options programs requirements sollware texts. Unit 22 Change binary to decimal, Step 1 place values 8 4.
Clicking again elears dhe bus. This purtly depends on the number of dots which muke up the image. Bao Tram. Jose Angel Castillo. Mark J. Burton II. Valdomero Timoteo. Cosmin Marc. Jamal Al-deen. Hieu Nguyen Trung. KeNikthyan Nicholas. Mikelyn Anderson. Ghada Hamila.
Grace Facu. Jyoti Nahata. On Sympathy Oxford English Monographs. Oxford Picture Dictionary: English Arabic. Oxford guide to English grammar. Oxford Guide to English Grammar. Oxford Dictionary of English mobipocket. Oxford English-Greek Learner's Dictionary.
The Oxford Hindi-English Dictionary. Recommend Documents. Basic English for Computing: Teacher's Book Basic English for Computing: Student's Book As far as possible, examples in the context of computing are used. The presentation is usually followed by two practice tasks. The first task s usually more controlled, and the second a freer and therefore more demanding activity, Depending on the level of your class, you may want to do these tasks orally in class, before the students write, or you may prefer to approach them asindividual written exercises.
The problems have been chosen to interest the students, and to allow ther to use their knowledge of computing, The reading and listening texts in each unit, and from earlier units, should provide most of the English terms they need, and the Language work sections should provide the means of expression, You may wish to revise language you anticipate will be useful.
Do not interfere toomuch unless communication has broken down completely. It isin making an effort to understand and be understood that language is best acquired. There are many approaches to correcting written work. If you wish to experiment with peer correction where students mark each other's work, ask students to mark lightly witha pencil dot any item in their partner's work which they donot understand or think may be incorrect. Each student should then return the work to his or her partner.
If the partner does not agree that there isa problem, you can then intervene. In the early units, they are mainly information exchange, but in the later units there are examples of opinion-exchange tasks. Like the Problem-solving tasks, these activities provide opportunities for students to develop strategies for coping with not understanding and not being understood.
Get them to keep ther own vocabulary notebooks in which they record not only the meaning of key terms in computing, but examples of their usage. Encourage students to spend a few minutes every day learning new words. Regular vocabulary tests area stimulus for students to make the effort to do this.
You can use these tasks in the textbook as, vocabulary tests. They are spaced at five unit intervals and summarize the key terms presented in preceding units. Present ways in which students can record and store their growing computing vocabulary. Mikelyn Anderson. Nur Madinah Bahar. Jose Juan Garcia Molina. Jamal Al-deen. Bruno Lc.
Pata Tigo. Cosmin Marc. Himanshu Mishra. Mark J. Burton II. Arif Hidayat. Karpov Peter. Jose Angel Castillo. Advika Bhavsar. Popular in Computer Engineering. Abie Tama. Monkey Intensive Music. Ramesh Mallai. Anonymous Legions. Anu Ishwarya. Prabha Karan. Packt Publishing. Chris Fenton. Prashant Bansal. Edgar Dauzon. Shaik Shaikshavali. Muthu Kumaravel. Mahmoud Al. Muhd Izzat Syamim Mazlan. Quick navigation Home.
0コメント