II. Fill in the gaps with the appropriative words. 


Мы поможем в написании ваших работ!



ЗНАЕТЕ ЛИ ВЫ?

II. Fill in the gaps with the appropriative words.



1. The_____ of the data may be stored on backing storage.

2. RAM is_____ access memory.

3. Management____ high-quality work.

4. RAM memory is of the ____ type.

5. ROM retains the_____ in it even without power.

6. In the_____ case they are referred to as programmable ROMs.

7. The BIOS controls the computer's_____.

8. The role of the ROM-BIOS is to_______ the fundamental services for

the computer.

9. This device works on_____.

10. The_____ of electric circuit is high.


Words: latter, information, requires, bulk, provide, clarge, volatile, random, peripheral devices, semiconductors,

III. Find the passive constructions in the 4th and 5"' paragraphs and put them into past and future forms.

IV. Give the main idea of the text in one sentence.

V. Decide whether the following statements are true or false.

Then make the necessary changes so that the false statements become true.

1. RAM contents are fixed.

2. ROMs, which are volatile, must have the instruction.

3. A large number of registers write instructions required to solve a particular problem.

4. There are two basic types of memory, namely read/write memory and read only memory'.

5. RAM memory and ROM memory are of the volatile type.

6. The BIOS is die part of RAM that is in active use, all the time the computer is at work.

7. The BIOS communicates with the computer's hardware devices, using whatever detailed command codes each device driver requires.

8. We are referring BIOS to the device control programs.

VI. Translate from Ukrainian into English.

1. Пам'ять з оперативним доступом і читанням визначається як пам'ять випадкового доступу.

2. Є два основних види пам'яті: оперативна і тільки постійна зчитуюча пам'ять.

3. Оперативна пам'ять є там'ятю нестійкого типу.

4. ROM(nocTiima) зберігає: інформацію навіть без енергії,

5. Роль БГОСа(базова система введення/виведення) забезпечувати сервіс, який необхідний комп'ютерові для роботи.

6. Internet

Word List

1. available [a'veilabl] доступний

2. to embrace fim'breis] охоплювати, включати

3. path [pa: 9J стежка, шлях

4. packet switching ['pairitj комутація пакетів

5. to knock out [' nok aut] вибивати, вивести з ладу

6. host computer [housfj головна ЕОМ

7. telnet [telnet] телемережа

8. FTP (File Transfer Protocol) протокол передачі файлів

9. actually ['aektjuoli] фактично, насправді

 

10. drastically [drasstikoli] тут значно

11. refined [ri'faindj вдосконалений

12. to remain [ri'mein] залишатися


13. destination [desti'neijcm] пункт призначення, адресат

14. to intercept [into'sept] перехоплювати

15. i.e. id est (від лат.) тобто

16. fairly [Тєзіі] досить

17. a router [ru:ta] маршрутизатор

18. to encode [in'kaudj шифрувати

19. computer-aided-design автоматизоване проектування

20. Gopher одна з груп новин в Usenet

розроблена в штаті Мічиган

21. Usenet система телеконференції Інтернет

22. Telnet базова мережева послуга

Exercises І. Study this diagram of the Internet. With its help, match these definitions to the correct item on the diagram.

1 a device which selects the best route to send data from one network to another

2 a specialist computer which provides a service to a network

3 a company which provides Internet access

4 a large multi-user computer for processing very large amounts of data

5 computers connected together to share hardware and software

II. Read the text "Internet"

The Internet, a global computer network which embraces millions of users all over the world, began in the United States in 1969 as a military experiment, It was designed to survive a nuclear war. Information sent over the Internet takes the shortest path available from one computer to another. Because of this, any two computers on the Internet will be able to stay in touch with each other as long as there is a single route between them, This technology is called packet switching. Owing to this technology, if some computers on the network are knocked out (by a nuclear explosion, for example), information will just route around them. One such packet-switching network already survived a war. It was the Iraqi computer network which was not knocked out during the Gulf War.


Most of the Internet host computers (more than 50%) are in the United States, while the rest are located in more than 100 other countries. Although the number of host computers can be counted fairly accurately, nobody knows exactly how many people use the Internet, there are millions, and their number is growing by thousands each month worldwide.

The most popular Internet service is e-mail. Most of the people, who have access to the Internet, use the network only for sending and receiving e-mail messages. However, other popular services are available on Ihe Internet: reading USENET News, using the World- Wide Web, telnet, FTP, and Gopher.

In many developing countries the Internet may provide businessmen with a reliable alternative to the expensive and unreliable telecommunication systems of these countries. Commercial users can communicate over the Internet with the rest of the world and can do it very cheaply. When they send e-mail messages, they have only to pay for phone calls to their local service providers, not for calls acrossjheir countries or around the world. But who actually pays for sending e-mail messages over the Internet long distances, around the world? The answer is simple: a user pays his/her service provider a monthly or an hourly fee. Part of this fee goes towards its costs to connect to a larger service provider. And part of the fee got by the larger provider goes to cover its cost of running a worldwide network of wires and wireless stations.

But saving money is only the first step. If people see that they can make money from the Internet, commercial use of this network will drastically increase. For example, some western architecture companies and garment centers already transmit their basic designs and concepts over the Internet into China, where they are reworked and refined by skilled - but inexpensive -Chinese computer-aided-design specialists.

However, some problems remain. The most important is security. When you send an e-mail message to somebody, this message can travel through many different networks and computers. The data are constantly being directed towards its destination by special computers called routers. Because of this, it is possible to get into any of computers along the route, intercept and even change the data being sent over the Internet. In spite of the fact that there are many strong encoding programs available, nearly all the information being sent over the Internet is transmitted without any forms of encoding, i.e. "in the clear". But when it becomes necessary to send important information over the network, these encoding programs may by useful. Some American banks and companies even conduct transactions over the Internet. However, there are still both commercial and technical problems which will take time to be resolved. III. Find in the text "Internet" sentences, containing the following words and word-combinations, then translate the whole sentence. the network is knocked out - мережа виведена з ладу computers are located - комп'ютери розташовані the people have access - люди мають доступ hourly fee - погодинна оплата


drastically increase -значно зросте

are reworked and refined - допрацювати і вдосконалити

intercept and change the data - перехоплювати і змінювати інформацію,

IV. Find in the text Passive Constructions and make them Present, Past or
Future Simple Passive



Поделиться:


Последнее изменение этой страницы: 2017-02-10; просмотров: 197; Нарушение авторского права страницы; Мы поможем в написании вашей работы!

infopedia.su Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Обратная связь - 18.216.239.46 (0.009 с.)