| ||||||||
|
| |||||||
Тема 3. COMPUTER USERS1. Make sure you are familiar with these words and phrases: single-user system, multi-user system, authentication, home directory, application-oriented, goal-oriented users, illiterate, scientist, scholars, minutiae, computer-literate.
2. Before you read the text below, discuss these questions: 1) Can you imagine your life without a computer? 2) How do you use a computer in your daily life? 3) Do you like using a computer? Why? 4) How and when did you learn how to use a computer? 5) Are you computer-literate?
Now read the text and check some of your answers.
The Types of Computer Users A user is a person who uses a computer or network service. Users generally use a system or a software product without the technical expertise required to fully understand it. Power users use advanced features of programs, though they are not necessarily capable of computer programming and system administration. A user often has a user account and is identified to the system by a username (or user name). Other terms for username include login name, screenname (or screen name), nickname (or nick) and handle. A user’s account allows a user to authenticate to a system and potentially to receive authorization to access resources provided by or connected to that system; however, authentication does not imply authorization. To log in to an account, a user is typically required to authenticate oneself with a password or other credentials for the purposes of accounting, security, logging, and resource management. Computer systems operate in one of two types based on what kind of users they have: • Single-user systems do not have a concept of several user accounts. • Multi-user systems have such a concept, and require users to identify themselves before using the system. Each user account on a multi-user system typically has a home directory, in which to store files pertaining exclusively to that user's activities, which is protected from access by other users (though a system administrator may have access). User accounts often contain a public user profile, which contains basic information provided by the account's owner. Nowadays nearly all computer users can be divided into three broad categories based on the way they think about computers. The vast majority of computer users are application-oriented. They have training and experience exclusively with commercial software. They understand concepts peculiar to computers such as files, folders, saving, and deleting. They live in a WYSIWYG world; although they may be aware that what they see on the screen is not an entirely accurate representation of what the computer is actually doing, they are not interested in understanding hidden implementations. They are pragmatic, learning as much as they need to get their work done. Nearly all commercial software is targeted at this group of users, who can be considered “computer-literate.” The second largest group consists of goal-oriented users. These users focus exclusively on the goals they want to accomplish and neither understand nor care about the software they use to accomplish those goals. This could be called the “I just want to type a letter” group. They only see the final product. They do not care about, for example, the difference between a word processor document and a PDF image of that same document. They could be described as “computer-illiterate,” even if they work with computers on a regular basis. Many very intelligent people, scientists and scholars, fall into this category. The third and smallest group of computer users — ironically, the original computer users — is comprised of hackers. Hackers are computer-oriented computer users. They have learned how to think like a computer, to understand the processes the computer goes through. They comfortably work with data in “raw” formats such as text files. This does not necessarily mean they are tied down with minutiae of implementation; often they can work at much higher levels of abstraction than other users. Nevertheless if there is a problem their solutions tend to be brittle, with a lot of exposed complexity that makes them unsuitable for non-hacker users.
Study the vocabulary list: expertise n– экспертиза power user – опытный пользователь advanced adj– современный, передовой user account n– учетная запись пользователя identify v– отождествлять, распознавать login n– вход в систему, регистрационное имя login v- подключиться (подключение) [к компьютерной системе или сети] это делается путём ввода идентификационной и аутентификационной информации nickname n- псевдоним authenticate v- аутентифицировать, опознавать, подтверждать authorization n- авторизация credentials n- мандат (учетная запись с параметрами доступа пользователя, сформированными после его успешной аутентификации) accounting - ведение учёта; учёт использования ресурсов (вычислительной системы) homedirectory - 1) начальный [исходный] каталог (в иерархической системе каталогов) 2) домашний каталог (доступный пользователю каталог, который содержит файлы и программы пользователя) store v– хранить, сохранять pertain v– принадлежать, относиться, быть свойственным vast adj - огромный majority n- большинство application-oriented adj- ориентированный на приложения, используемый в приложениях, предназначенный для приложений, прикладной например, application-orientedprogramminglanguage - язык программирования для разработки (ориентированный на разработку) приложений peculiar adj- особенный folder n-папка WYSIWYG - от WhatYouSeeIsWhatYouGet; = wysiwyg «что видишь, то и имеешь» (режим текстовых процессоров и настольных издательских систем) implementation n- выполнение, исполнение, осуществление, реализация map n- 1) карта; план; схема || наносить на карту; составлять карту или схему 2) карта (распределения) || отображать в виде карты (распределения) capabilities n– способности, возможности application n- приложение limitation n- ограничение spreadsheet n – электронная таблица target n– цель, планировать, иметь целью. goal-oriented adj– ориентированный на цель accomplish v– совершать, выполнять precise adj– точный, определенный minutiae n– детали, мелочи brittle adj– ломкий, хрупкий complexity n- сложность unsuitable adj– неподходящий, несоответствующий
1. Practise reading the following words and collocations. a) Store, pertain, though, necessarily, identified, allow, authenticate, potentially, authorization, access, authentication, imply, typically, require, credentials, purposes, accounting, security, target, accomplish, ironically, minutiae. b) Home directory, user profile, account’s owner, technical expertise, power user, advanced features, user account, resource management, vast majority, application-oriented, hidden implementations, computer-literate, computer-illiterate, exposed complexity. c) Single-user system, multi-user system, to store files pertaining exclusively, public user profile, contain basic information, three broad categories, training and experience, concepts peculiar to computers, goal-oriented users, scientists and scholars, computer-oriented users, data in raw formats, entirely accurate representation.
2. Find in the text English equivalents for the following. Технические знания, опытный пользователь, расширенные возможности программ, учетная запись пользователя, идентифицировать, имя пользователя, псевдоним, доступ к ресурсам, авторизация, пароль, бухгалтерский учет, безопасность, домашний каталог, хранение файлов, общедоступный профиль пользователя, подготовка и опыт, компьютерно-грамотный, целевые пользователи, программное обеспечение, компьютерно-неграмотный пользователь, ученые, непригодный для других пользователей.
3. Give the most suitable Russian equivalents for the following expressions. Computer and network system, technical expertise, power users, advanced features of programs, user account, to authenticate to a system, receive authorization, to access resources provided by the system, credentials, home directory, multi-user system, to store files pertaining to, user profile, application-oriented user, WYSIWYG, peculiar to computers, an entirely accurate representation, to be interested in understanding hidden implementations, to target at this group of users, computer (il)literate, goal-oriented users, to accomplish goals, minutiae of implementations, solutions tend to be brittle.
4. Match the following words and phrases to make complete expressions from the text: A
B
5. Match the following words with their synonyms in the brackets: Information, fabricate, complex, keep, amend, emphasize, far, safety, vast (remote, sophisticated, data, security, improve, store, immense, invent, pinpoint)
6. Consult the dictionary and give the Russian equivalents for the following: Information: information flow control; information line; information management system; information networks; information processing; information processor; information provider (IP); information system; information technology (IT); information transfer channel. File: box file; to place smth. on file; file copy; file format; file header; file maintenance; file management; file organization; file processing; file protection; file-recovery utility; file size; to file documents; file name; filing. Home: home banking; home computer; home key; home page.
7. Match the following words with the correct definition from the list below: Multimedia, compatible, edutainment, keyword, warranty, printer, copier, to identify, CAL (Computer Aided Learning),accessory, error, expert system, telecommute, user 1. Person who uses a computer or machine or software. 2. A combination of text with sound, video, animation, and graphics 3. Command word used in a programming language to provide a function. 4. Machine which makes copies of documents. 5. Devices that function correctly together. 6. Extra, add-on device (such as a mouse or printer) which is attached to or used with a computer. 7. Device that produces text or image on paper using ink or toner under the control of a computer. 8. Guarantee or legal document which promises that a machine will work properly or that an item is of good quality. 9. To note who someone is or what something is. 10. Software that enables computers to “think” like experts 11. Use computers to stay in touch with the office while working at home 12. Mistake due to an operator; mistake caused by a hardware or software fault; mistake in a program that prevents a program or system running correctly. 13. The process using information technology to help teaching and enhance the learning process. 14. Multimedia materials with a combination of educational and entertainment content.
8. Complete the sentences using the words from the box. Use each word or expression only once: computer games, voltage, transparent, grid, word processors, CD-ROMs, database, crashed, clipboard, LCD
1. My computer……………and I lost my whole work. 2. Enter the ……………. computer, a technology that has been in development for the last 20 years. 3. .…………….make it easier to write letters and documents. 4. All firms and companies working for us are stored on our…………. 5. In the system, marketed under the name GRID Pad, the computer’s ………….. screen is covered by a sheet of glass with a …………… conductive coating. 6. Nowadays children spend too much time playing…………….. . 7. Many books and dictionaries are on………………. .
9. Translate into Russian: 1.Desktop organisers are programs that require desktop computers. 2. The use of computers prevents people from being creative. 3. They’ve got a new program with 3D graphics to encourage young children to tell stories. 4. I’ve scanned in about a third of these photographs, around 100 paintings, to make a CD. 5. They can also access up-to-the-minute information on stocks, bonds, and mutual funds via the Internet. 6. We rely on teleconferencing. We can hear each other and hold open discussions on the phone just as well as we can in person. 7. The network mainframe is here, so MIS is here as well.8. About a year ago, we created this virtual office environment. 9. We have changed the passwords to prevent hackers getting into the database. 10. All electrical appliances should be properly earthed. 11. The machine takes digitally recorded data and generates an image. 12. If you digitize speech you use an analog-to-digital converter to convert the sound into a series of numbers that can be stored on a disk and then played back. 13. The BASIC keyword PRINT will display text on the screen. 14. The printer is sold with a twelve-month warranty. 15. The warranty covers spare parts but not labor costs. 16. We are using Japanese printers for some of our magazines. 17. The user has to identify himself by using a password before accessing the system. 18. The maintenance engineers have identified the cause of the system failure. 19. The first popular microcomputer should have a user-friendly interface built into its operating system. 20. The use of this file is restricted. 21. The route taken was not the most direct since a lot of nodes were busy. 22. He scanned the map for Teddington. 23. The facsimile machine scans the picture and converts this digital form before transmission.
10. Answer the questions. 1. What is a user? 2. What is a power user? 3. How is a user identified to the system? 4. What are other names for “username”? 5. Does authentication imply authorization? 6. What two kinds of computer systems are mentioned in the text? 7. What is home directory? 8. What do user accounts contain? 9. What three broad categories of users did you learn from the text? Describe them.
11. Say if the statements are true or false. 1. A power user is a computer-illiterate user. 2. A user is identified to the system by a login. 3. To log in to an account, a user is required to authenticate oneself with a username. 4. Multi-user systems have a concept of several user accounts. 5. Each user accounts has a home directory and a public user profile. 6. Goal-oriented users are pragmatic and learn as much as they need to do their work. 7. Application-oriented users could be called “I just want to type a letter” group. 8. Many very intelligent people, scientists and scholars fall in the category of goal-oriented users. 9. Hackers belong to application-oriented group of users. 10. Nearly all commercial software is application-oriented, while most open-source software is hacker-oriented.
12.Make a summary of the text and retell it.
13. Put the lines of the dialogue in the right order and act it. a) Ok, I will try to hep you. So, what’s happened to your computer? b) Hi, Ann. I’m well. It’s nice to hear from you. c) It’s my PC. I’ve been having some problems with it recently. I know you are quite good at computers, so I decided to ask you. As for me, I don’t get a thing in electronic appliances. d) Well, to tell the truth there are a few problems here. First of all, my computer began to shut down unexpectedly. It’s for the first time like this. Secondly, I fail to open some of my files. Thirdly, I can’t listen to music. I am at loss. I suppose my computer has become outdated or something like this. e) I’m sorry to disturb you, but I’ve got a problem and I hope you can help me with it. f) I see. I was sure you are a computer genius. Could you come by? g) Yes, of course. When is it convenient for you? h) It’s OK. What’s the problem? I) See you. Bye. i) The sooner, the better. I’m on holiday this week so you can come over any time. j) Ok, then I will take some software and equipment and come at seven p.m. if that’s all right for you. k) The problems are serious enough. I should visit you and have a look at it. I think the problem of shutting down is connected with overheating. In this case you should change the battery. As for the problem with files it might be viruses. So I will install a reliable anti-virus program. And finally the problem with audio files might be because the player is outdated. l) That’s perfect, thank you. I’ll be waiting for you. See you this evening then. m) Hi, John. How are you doing?– 1
14. Read the dialogue and answer the following question: What problem does Helen have? - Hi, Mark. - Hi, Helen. How are you? - Fine thanks. I need your help Mark. What’s the problem? - I have problems with my computer and I know you are very good at solving them. Yesterday I was writing my essay for tomorrow’s lesson and suddenly my computer crashed and I lost all my work! Do you think it is possible to get it back? - Did you make a back-up copy of your work? - I’m afraid I forgot. - I’m sorry, Helen, but I can’t see any way of getting your essay back. Remember you always have to make a back-up copy of your work. - I know, but I always forget about it. - Do you use a computer a lot at school? - I write all my essay and exercises on the computer but I think mine is not user-friendly. Moreover, it has become obsolete and I have to replace it. - That’s true, technology advances so fast that the computer, which I bought last year, is already old-fashioned. - Do you have access to the Internet at home? - Yes, I do. I send e-mails to my friends around the world. - Do you often use the Internet? - I have access to the Internet at school and I often surf the net to find some information that I need for my work. I must admit it is very absorbing and I can sometimes spend hours on the Internet. - That’s true .You can forget about the whole world while using a computer and the Internet. - All right, I have to go and write a new essay. This time I won’t forget to make an extra copy on a floppy disk. Seeyoulater! - Bye!
15. Translate into English. 1) Пользователь – это человек, пользующийся компьютером или сетью. Чаще всего он не обладает техническими знаниями и не разбирается в компьютерном программировании и системном администрировании. 2) Пользователь часто имеет учетную запись пользователя и идентифицируется в системе с помощью логина. 3) Учетная запись пользователя позволяет ему проходить проверку подлинности в системе и потенциально получить разрешение на доступ к ресурсам, предоставляемых или подключенных к этой системе. 4) Чтобы войти в учетную запись, пользователю, как правило, требуется пароль. 5) Каждая учетная запись пользователя в многопользовательской системе обычно имеет домашний каталог, в котором хранятся файлы, относящиеся исключительно к деятельности этого пользователя и защищенные от других. 8) Учетные записи пользователей часто содержат общедоступный профиль пользователя, который содержит основную информацию, предоставленную владельцем аккаунта. 9) Подавляющее большинство пользователей компьютеров могут быть разделены на три группы: ориентированные на приложения, ориентированные на цель и компьютерно-ориентированные.
16.Work in two groups. The first group is to list all the advantages of a computer. The second is to list all the disadvantages. Then they are to meet compromise. 17. Write how you use computers in your study and in your free time. | ||||||||
| ||||||||
Сайт создан по технологии «Конструктор сайтов e-Publish» |