Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
76 views123 pages

English For Computer Engineering

Uploaded by

elifaalkhah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
76 views123 pages

English For Computer Engineering

Uploaded by

elifaalkhah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 123

ENGLISH FOR COMPUTER

ENGINEERING

Dr. Amin Golzari Oskouei


ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

CONTENTS

Preface ................................................................................................................................................................ 3
UNIT 1 ................................................................................................................................................................... 5
UNIT 2 ................................................................................................................................................................. 15
unit 3 .................................................................................................................................................................. 27
UNIT 4 ................................................................................................................................................................. 37
UNIT 5 ................................................................................................................................................................. 42
UNIT 6 ................................................................................................................................................................. 47
UNIT 7 ................................................................................................................................................................. 53
UNIT 8 ................................................................................................................................................................. 58
UNIT 9 ................................................................................................................................................................. 68
UNIT 10 ............................................................................................................................................................... 74
UNIT 11 ............................................................................................................................................................... 79
UNIT 12 ............................................................................................................................................................... 84
UNIT 13 ............................................................................................................................................................... 89
UNIT 14 ............................................................................................................................................................... 98
UNIT 15 .............................................................................................................................................................105
UNIT 16 .............................................................................................................................................................113

2|Page
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

PREFACE

Welcome to this comprehensive guide tailored for students specializing in computer engineering
and related fields such as computer science, IT, and ICT. This PDF has been thoughtfully designed
for those who have completed general English and are now gearing up for university courses. With
16 units at your disposal, the arrangement presented is just one option, recognizing the diverse
preferences of teachers and students who may choose different starting points and progressions.

Each unit within this PDF is meticulously structured, comprising three integral segments: a reading
part, a grammar part, and a vocabulary part, all with a primary focus on cultivating and
enhancing your reading skills. Including grammar is a review and a tool for indexing, ensuring a
well-rounded learning experience.

The primary objective of this PDF is to provide you with a diverse learning experience that
facilitates the recognition of specialized lexical items commonly found in the science and
technical fields. We understand that your goal is not just to refine your reading skills but to gain a
comprehensive understanding of English within the context of computer language.

The passages incorporated into this guide cover a broad spectrum of subject matters, delving into
scientific facts and various facets of computer-related topics. Concurrently, grammatical points
are introduced, enabling you to absorb language usage information as you read, indirectly
enhancing your overall language proficiency.

The exercises and activities within this PDF have been carefully divided into two sections:
Comprehension exercises to evaluate your understanding of the materials and skills development
activities to boost your reading comprehension skills.

Innovative in presentation, this guide engages you in reading comprehension activities while
extracting information from the passages—an essential aspect of your learning journey. The
vocabulary section includes primary and general words and technical terms applicable across
various fields, honing your skills for reading diverse materials.

Definitions and synonyms are provided for most new words, encouraging you to decipher
meanings using an English dictionary for unfamiliar terms actively. Presenting vocabulary items
departs from traditional approaches, exposing you to words through various uses and functions.

To address challenging sections, we've made concerted efforts to offer easily understandable
explanations. We strongly encourage you to review assignments before attending classes, setting
the stage for in-depth comprehension during classroom exercises.

Before delving into the contents, it's crucial to acknowledge that this PDF has been meticulously
prepared and edited by Dr. Amin Golzari Oskouei. The modified PDF serves as an English for
Computer Engineering book authored by M. Yousefkhani, N. Ayat, and A. Faraahi, wherein all
writing and spelling errors have been rectified. Certain content has been added or removed to
enhance its quality.

3|Page
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

Lastly, we sincerely thank Mr. Ilyad Rastafar for their significant contribution in preparing this PDF.
Their efforts are invaluable, and I appreciate their dedication to enhancing your learning
experience.

Embark on this journey enthusiastically, and may this guide pave the way for a robust
understanding of English for computer engineering.

Amin Golzari Oskouei

4|Page
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

UNIT 1

WHAT IS A COMPUTER?
A computer is a machine with an intricate electronic circuit network that operates switches or
magnetizes tiny metal cores. Like the cores, the switches can be in one of two possible states:
on or off, magnetized or demagnetized. The machine can store and manipulate numbers,
letters, and characters. The basic idea of a computer is to make the machine do what we
want by inputting signals that turn certain switches on and turn others off or that magnetize or
do not magnetize the cores.

The primary job of computers is the processing of information. For this reason, computers can
be defined as devices that accept information in the form of instructions called a program
and characters called data, perform mathematical and/or logical operations on the
information, and then supply the results of these operations. The program, or part of it, tells the
computers what to do, and the data, which provide the information needed to solve the
problem, are kept inside the computer in a place called memory.

Computers are thought to have many remarkable powers. However, most large or small
computers have three basic capabilities. First, computers have circuits for performing
arithmetic operations, such as addition, subtraction, division, multiplication, and
exponentiation. Second, computers have a means of communicating with the user. After all,
if we couldn’t feed information in and get results back, these machines wouldn’t be helpful.
However, specific computers (commonly minicomputers and microcomputers) control things
directly, such as robots, aircraft navigation systems, medical instruments, etc.

Some of the most common methods of inputting information are punched cards, magnetic
tape, disks, and terminals. Depending on the medium used in inputting information, the
computer’s input device (a card reader, a tape drive, or a disk drive) reads the information
into the computer.

Two standard devices for outputting information are a printer, which prints the new information
on paper, or a CRT display screen, which shows the results on a TV-like screen.

Third, computers have circuits that can make decisions. The kinds of decisions that computer
circuits can make are not of the type: ‘Who would win a war between two countries?’ or ‘Who
is the richest person in the world?’ Unfortunately, the computer can only decide three things:

5|Page
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

Is one number less than another? Are two numbers equal? and, Is one number greater than
another?

A computer can solve a series of problems and make hundreds, even thousands, of logical
decisions without becoming tired or bored. It can find the solution to a problem in a fraction
of the time it takes a human being to do the job. A computer can replace people in dull,
routine tasks, but it has no originality; it works according to the instructions and cannot exercise
any value judgments. Sometimes, a computer seems to operate like a mechanical ‘brain,’
but human minds limit its achievements. A computer cannot do anything unless someone tells
it what to do and gives it the appropriate information. However, because electric pulses can
move at the speed of light, a computer can perform many arithmetic-logical operations
almost instantaneously. A person can do everything a computer can, but in many cases, that
person would die long before the job was finished.

EXERCISES

1. UNDERSTANDING THE PASSAGE

Decide whether the following statements are True or False (T/F) referring to the text's information.
Then, make the necessary changes so that the false statements become true.

1. A computer can store or handle any data without receiving information.


2. All computers accept and process information in the form of instructions and characters.
3. The information necessary for solving problems is found in the computer's memory.
4. Not all computers can perform arithmetic operations, make decisions, and communicate
in some way with the user.
5. Not all computers can perform arithmetic operations, make decisions, and communicate
in some way with the user.
6. There are many different devices used to feed information into a computer.
7. There are not as many different types of devices used for giving results as there are for
accepting information.
8. Computers can make any decision they are asked to make.
9. Computers can work without stopping to rest unless there is a breakdown.

2. UNDERSTANDING WORDS
Refer back to the text and find synonyms (i.e., words with a similar meaning) for the following
words:

6|Page
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

1. complex (i.e., intricate)

2. fundamental

3. away

4. uninterested

5. accomplishments

Now, refer to the text and find antonyms (i.e., words with an opposite meaning) for the following
words.

6. large (i.e. tiny)

7. receiving

8. reject

9. unusual

10. small

STRUCTURE 1

A: CONTEXTUAL REFERE NCE


Transitional markers are words that link ideas together so that the text is smoother to read. When
pronouns such as it, they, them, I, he, she, which, who, whose, that, such, one, and demonstrative
adjectives such as this, that, these, and those are used as transitional markers. They refer to a word,
or words, mentioned earlier in the sentence or paragraph. Their function is to take your thoughts
back to something already mentioned. Thus, they serve as synonyms or substitutes. Other words
often used to refer backward are the former, the latter, the first, second, etc., and the last.

SAMPLE PARAGRAPH
A computer(1), like any other machine, is used because it(1) does specific jobs better and more
efficiently than humans. It(1) can receive more information(2) and process it(2) faster than any
human. The speed at which a computer works can replace weeks or even months of pencil-and-
paper work. Therefore, computers(3) are used when the time saved offsets their(3) cost, which is
one of the many reasons they(3) are used so much in business, industry, and research.

EXERCISE 1

Using the sample paragraph as a model, draw a rectangle around the word/ words and a circle
around the word/words that the circled words refer to. Then join the O and the □ with arrows:

Computers are electronic machines that process information. They can communicate with the
user, do different arithmetic operations, and make three kinds of decisions. However, they are

7|Page
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

incapable of thinking. They accept data and instructions as input, and after processing it, they
output the results.

EXERCISE 2

Now look back at the text ‘WHAT IS A COMPUTER?’ and find out what the words in bold typeface
refer to.

1. that operate switches

2. which accepts information

3. or part of it

4. which tells the computers

5. which prints the new information

6. which shows the results

7. which can make decisions

8. It can find the solution

9. it has no originality

10. tells it what to do

B: MAKING COMPARISON

1. FORM ATION
There are several ways of showing similarities or differences between or amongst things. The
regular comparative and superlative of descriptive words, whether these are adjectives or
adverbs, is formed as follows:

1. By adding the ending -er and -est to words of one syllable examples:

ABSOLUTE COMPARATIVE SUPERLATIVE


new newer newest
Adjectives old older oldest
big bigger biggest
soon sooner soonest
Adverbs
late later latest

8|Page
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

2. By placing the words more and most in front of words with three or more syllables:

ABSOLUTE COMPARATIVE SUPERLATIVE


interesting more interesting most interesting
Adjectives convenient more convenient most convenient
beautiful more beautiful most beautiful
easily more easily most easily
Adverbs
carefully more carefully most carefully

3. Words with two syllables may be like 1 or 2 above in that they will add the ending -er and -est if
they end in -y or -ly, -ow, -le, and -er. Most of the remaining words take more and most in front of
them:

ABSOLUTE COMPARAT IVE SUPERLATIVE


happy happier happiest
-y
funny funnier funniest
early earlier earliest
-ly
friendly friendlier friendliest
shallow shallower shallowest
-ow
narrow narrower narrowest
able abler ablest
-le
gentle gentler gentlest
-er clever cleverer cleverest

N. B. Two-syllable adverbs ending in -ly take the more or most example

quickly more quickly most quickly

slowly more slowly most slowly

badly more badly most badly

ABSOLUTE COMPARAT IVE SUPERLATIVE

careful more careful most careful


Remaining
careless more careless most careless
descriptive
boring more boring most boring
two-syllable
awful more awful most awful
words
complex more complex most complex

9|Page
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

4. Some common two-syllable adjectives can have either type of formation:

ABSOLUTE COMPARAT IVE SUPERLATIVE

commoner commonest
common
more common most common

handsomer handsomest
handsome
more handsome most handsome

politer politest
polite
more polite most polite

quieter quietest
quiet
more quiet most quiet

5. A few adjectives and adverbs form comparative and superlative using a different stem. These
irregular comparisons are as follows:

ABSOLUTE COMPARAT IVE SUPERLATIVE


bad worse worst
far further/farther furthest/farthest
Adjectives
good better best
many more most
badly worse worst
far further/farther furthest/farthest
Adverbs little less least
much more most
well better best

2. USE IN SENTENCES
There are many reasons for using comparisons in discourse; they may be used to show: a.
equivalence; b. non-equivalence; c. one item compared with others; and d. parallel increase.

EQUIVALENCE
The following words or constructions are used to show equivalence (i.e., the same).

as ... as are similar each

as many … as equal to either

as much …as is like all

10 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

the same … as similar/ly both

similar to equal/ly alike

the same compare to/with

EXAMPLES

1. Third-generation computers can do a thousand times as many calculations

as first-generation computers

2. Microcomputers are as efficient as minicomputers.

3. The term processor is the same as a central processing unit.

4. The digital computer is like a huge cash register.

5. An analog computer and a car speedometer are similar in continuously working out
calculations.

6. A microcomputer can sometimes cost as much as a minicomputer.

7. Both minicomputers and microcomputers can have a memory of 32K bytes.

8. A digital computer can be compared to a large cash register.

9. All computers have the same basic characteristics.

10. a computer's time to solve a problem can equal months of work for a man.

NON-EQUIVALENCE
The following words and/or constructions show non-equivalence (i.e., not the same).

not as … as greater than unequal (ly)

word + er than not as many … as unlike

more … than neither … nor … as not the same as

fewer … than not as much … as not all

less … than not equal to

EXAMPLES

1. Learning a computer language is not as difficult as it seems.

2. A mainframe is bigger and more expensive than a microcomputer.

3. For less than $10,000, you could have a very good microcomputer.

11 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

4. Ten years ago, fewer computers were in use than today.

5. Neither minicomputers nor microcomputers could be as complex as large mainframes.

6. Unlike minicomputers, microcomputers are not very flexible.

7. An analog computer is not the same as a digital computer.

8. Not all businesses have computerized their accounting departments.

THE SUPERLATIVE
The following words and/or constructions show one item compared with others (i.e., the
superlative).

the word + est …

the most …

the least …

EXAMPLES

1. Computer technology is the fastest-growing technology in the world today.

2. Digital computer programming is the most commonly used in data processing for business.

3. BASIC is probably the least difficult computer language to learn.

PARALLEL INCREASE
The following words and/or constructions are used to show a parallel increase (i.e., two
comparatives).

the (word + er) the … the more ...

the (word + er) the … the less …

EXAMPLES

1. The bigger the computer, the more complex the operations it can do.

2. The smaller the problem, the less challenging it is for the computer programmer.

VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.

In these flash cards, you will find other forms of the same word directly under the word. These words
have the same general meaning; they represent the different parts of speech of the word. For

12 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.

The keyword is then defined in straightforward, easy-to-understand English.

arbitrary adj. an action or decision made with little thought, order, or reason

n. arbitrariness syn. haphazard

Her choice of clothing seemed arbitrary.

The teacher arbitrarily decided to give the class a test.

astounding adj. very surprising

v. astound syn. astonishing

The scientists made an astounding discovery.

The fans were astounded by their team’s success.

astute adj. knowledgeable, intelligent, clever

n. astuteness syn. perceptive

He was an astute worker, finishing in half the time it took the others to finish.

They have determined that there could be no chance to finish on time.

petition v. to make a request

n. petition syn. appeal

Canada petitioned the United Nations to consider its case.

The student’s petition was denied.

relinquish v. to give up control

n. relinquishment syn. abdicate

The troubled executive relinquished his control of the company.

Relinquishing his claim to the building will allow the building to be sold.

13 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

resilient adj. strong enough to recover from difficulty or disease

n. resilience syn. tenacious

She has a resilient personality and will soon feel better.

The doctor was surprised by his patient’s resilience.

tempt v. to make it attractive to do something wrong

adj. tempting syn. entice

n. temptation

The idea of getting rich quickly tempted him to invest his life savings.

Desserts are more tempting when one is on a diet.

baffle v. to confuse to a point at which no progress can be made

adj. baffling syn. Puzzle

n. bafflement

The causes of many harmful diseases have baffled doctors for centuries.

That was a baffling question.

14 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

UNIT 2

COMPUTER'S CHARACTERISTICS
Computers are machines designed to process electronically specially prepared pieces of
information, termed data. Handling or manipulating the information given to the computer in such
ways as doing calculations, adding information, or making comparisons is called processing.
Computers comprise millions of electronic devices capable of storing or moving data at enormous
speeds through complex circuits with different functions.

All computers have several characteristics in common, regardless of make or design. Information,
in the form of instructions and data, is given to the machine, after which it acts on it, and a result
is returned. The information to the machine is the input, the internal manipulative operations, the
processing, the result, and the output. These three basic concepts of input, processing, and output
occur in almost every aspect of human life, whether at work or play. For example, in clothing
manufacturing, the input is the cut cloth pieces; the processing is the sewing of these pieces, and
the output is the finished garment.

INPUT COMPUTER OUTPUT

SECOND STORAGE

The figure on the previous page schematically shows a computer system's fundamental hardware
components. The centerpiece is the computer, the processor, or, usually, the Central Processing
Unit (CPU). The term ‘computer’ includes hardware parts in which calculations and other data
manipulations are performed and the high-speed internal memory in which data and calculations
are stored during the actual execution of programs. Attached to the CPU are the various
peripheral devices, such as keyboards and mice (two common examples of input devices). When
data or programs need to be saved for long periods, they are stored on various secondary
memory devices or storage devices such as magnetic tapes or magnetic disks.

Computers have often been considered huge adding machines, but this is a narrow view of their
function. Although a computer can only respond to a certain number of instructions, it is not a
single-purpose machine since these instructions can be combined in infinite sequences. Therefore,
a computer has no known limit on what it can do; its versatility is limited only by the imagination
of those using it.

In the late 1950s and early 1960s, when electronic computers were being developed today, they
were costly to own and run. Moreover, their size and reliability were such that many support
personnel were needed to keep the equipment operating. This has all changed now that
computing power has become portable, more compact, and cheaper.

Computers have significantly changed how many kinds of work are performed in a very short
period. Computers can remove many routine and tedious tasks from our lives, leaving us more

15 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

time for enjoyable, creative work. Computers have created whole new areas of work that did not
exist before their development.

EXERCISES

1. UNDERSTANDING THE PASSAGE


Decide whether the following statements are True or False (T/F) by referring to the information in
the text. Then, make the necessary changes so that the false statements become true.

1. All information to be processed must be prepared so the computer will understand it.

2. Because of the complex electronic circuitry of a computer, data can be either stored or moved
about at high speeds.

3. Not all computers can process data and produce results.

4. The basic concepts of data processing are restricted to computers alone.

5. The processor is the central component of a computer system.

6. All other devices used in a computer system are attached to the CPU.

7. Memory devices are used for storing information.

8. Computers are very much restricted in what they can do.

9. Computers today cost less, are smaller, and need fewer people to operate them than in the
past.

10. Computers haven’t changed our working conditions very much.

2. CONTEXTUAL REFERENCE
Review the text and find out what the words in bold typeface refer to.

1. which are termed data

2. or moving them

3. the machine acts on it

4. they are stored on

5. it is not a single-purpose machine

6. the kinds of things it can do

7. of those using it

8. they were costly to own

16 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

9. Moreover, their size and reliability

10. that did not exist

3. UNDERSTANDING WORDS
Refer back to the text and find synonyms for the following words.

1. called

2. tremendous

3. ideas

4. react

5. take away

Now, refer to the text and find antonyms for the following words.

6. taken away

7. wide

8. limited

9. immovable

10. after

STRUCTURE 2

Word formation - Suffixes

When you are reading, you will come across unfamiliar words. It is often possible to guess the
meanings of these words if you understand how words in English are generally formed.

AFFIXES

PREFIXES + (STEM) + SUFFIXES

An English word can be divided into three parts: a prefix, a stem, and a suffix. Pre- means ‘before’;
a prefix comes before the stem. Consider, for example, the prefix de- (meaning ‘reduce’ or
‘reverse’) in a word like demagnetize (meaning ‘to deprive of magnetism’). A suffix is what is
attached to the end of the stem. Consider as an example the suffix.

-er (meaning ‘someone who’) in programmer (‘the person who programs’). Both prefixes and
suffixes are referred to as affixes.

17 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

Prefixes usually change the word's meaning; for example, un- changes a word to the negative.
Unmagnetizable means ‘not capable of being magnetized.’ On the other hand, suffixes change
the word from one part of speech to another. For example, -ly added to the adjective quick gives
the adverb quickly. Let us now consider some suffixes and their usual meanings.

SUFFIXES

NOUNS VERBS ADJECTIVES ADVERBS

-ance -ize -able -ly


-ence -ate -ible
-or -ify -less
-er -en -ic
-ist -ify -ical
-ness -ish
-ive

EXERCISE 1

Study the following tables and try to find additional examples. Use your dictionary if necessary.

18 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

Noun-forming suffixes
SUFFIX MEANING EXAMPLES
-ance state performance
-ence quality of independence
-er, -or a person who, programmer, operator,
a thing which compiler, accumulator
-ation, -tion the act of execution
-ist, -yst a person who analyst, typist
-ness condition of cleanliness
-ion action/state conversion
-ing activity multiplexing
-ment state, action measurement
-ity state, quality electricity
-ian pertaining to electrician
-ism condition/state magnetism
-dom domain/condition freedom
-ship condition/state relationship, partnership,
friendship
-ary binary

Verb-forming suffixes
SUFFIX MEANING EXAMPLES
-ize computerize
-ate automate, activate, calculate
to make
-ify simplify
-en harden, widen, lengthen

Adverb-forming suffix
SUFFIX MEANING EXAMPLES
electronically, logically,
-ly in the manner of
comparably, helpfully

19 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

Adjective-forming suffixes
SUFFIX MEANING EXAMPLES
-al, -ar, have the quality computational, logical, circular
-ic, -ical magnetic, automatic, electrical,
-able, -ible capable of being comparable, divisible
-ous, -ious like, full of dangerous, religious
-ful characterized by helpful
-less without careless
-ish like yellowish
-ed having computed, punched
-ive quality of interactive
-ing to make or do programming, coding,
processing, multiplexing

EXERCISE 2

Read the following sentences and underline all the suffixes. Then, try to find out what parts of
speech the words are.

1. The systems analyst provides the programmer with the details of the data processing problems.

2. CRT terminals are beneficial interactive devices for office use because of their speed and
quietness.

3. The new microcomputer we purchased does not have a Fortran compiler. It is programmable
Basic only.

4. A computer has an intricate electronic circuit network that operates switches or tiny metal
cores.

5. In large and modern installations, the computer operator sits in front of a screen that shows an
up-to-date summary of the computer jobs as they are being processed.

6. The introduction of terminals and screens has partly replaced punched cards.

7. Binary arithmetic is based on two digits: 0 and 1.

8. Multiplexing is when many electrical signals are combined and carried on only one optical link.

9. Computers are machines designed to process electronically specially prepared information.

10. The computed results were printed in tables.

20 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

EXERCISE 3

Word forms: First, choose the appropriate form of the words to complete the sentences. Then,
check the differences of meaning in your dictionary.

1. operation, operate, operator, operational, operationally, operating

a. A computer can perform mathematical ………..……….. very quickly.

b. One of the first persons to note that the computer is malfunctioning is the computer
………..………..

c. The job of a computer operator is to ………..……….. the various machines in a computer


installation.

d. The new machines in the computer installation are not yet ………..………. .

2. acceptance, accept, accepted, acceptable, acceptably

a. A computer is a device which ………..……….. processes and gives out information.

b. The students are still waiting for their ………..……….. into the Computer Science program.

c. It is ………..……….. to work without a template if the flowcharts are not on file.

3. solution, solve, solvable, solver

a. It may take much time to find a ………..……….. to a complex problem in programming.

b. A computer can ………..……….. a problem faster than any human being.

c. A computer has often been referred to as a problem ………..……….. .

4. remark, remarkably, remarked

a. Today’s computers are ………..……….. faster than their predecessors.

b. Systems analysts will often make ………..……….. about existing programs to help make the
operations more efficient.

c. There have been ………..……….. developments in computer science in the last decade.

21 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

5. communication, communicate, communicable, communicative, communicably

a. A computer must be able to ………..……….. with the user.

b. Fiber optics is a new development in the field of ………..……….. .

c. Some people working in computer installations aren’t very ………..……….. because they are
shy.

6. calculation, calculate, calculating, calculated, calculator, calculable, calculus.

a. A computer can do many kinds of …………………… quickly and accurately

b. ………..……….. is a branch of mathematics for making ………..……….. without using a


………..……….. machine.

c. A computer can ………..……….. numbers much faster than a manual ………..………..

d. Some problems aren’t ………..……….. without logarithm tables.

7. mechanic, mechanism, mechanize, mechanical, mechanically, mechanistic,


mechanics, mechanization, mechanized

a. Today’s computers are less ………..……….. than they used to be.

b. The ………..……….. devices in a computer system operate more slowly than the
electromagnetic devices.

c. The ………..……….. of the brain is highly complex, but unlike a computer, it isn’t.

8. necessity, necessitate, necessary, necessarily, necessities, need, needed

a. Because it is expensive to set up a computer department, it is ………..……….. to budget well


for the basic ………..……….. of the installations.

b. A good programmer isn’t ………..……….. going to be a sound systems analyst.

c. Students’ lack of understanding of the basic concepts in computer science may


………..……….. the instructor to restructure the course.

9. dependence, depend on, dependable, dependably, dependent, dependency, depending

a. The length of time a programmer takes to make a program will vary ………..……….. on the
complexity of the problem and his ability and experience.

22 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

b. One can always ………..……….. a computer to obtain accurate answers because it’s probably
the most ………..……….. machine today.

10. technology, technological, technologically, technologist

a. Computer ………..……….. is a fast growing discipline.

b. The ………..……….. improvements in computers are reducing man’s workload.

11. imagination, imagine, imaginable, imaginative, imaginary

a. A computer is limited in its ability by the ………..……….. of man.

b. Some people are good at inventing ………..……….. stories.

c. It is practically impossible to ………..……….. the speed at which a computer calculates numbers.

12. addition, add, added, additional, additionally, additive

a. Many terminals can be ………..……….. to a primary system if needed.

b. and subtraction are two basic mathematical operations.

c. When buying a system, there is often no ………..……….. charge for the

programs.

13. complication, complicate, complicated, complicating, complicatedly

a. There can be many ………..……….. involved in setting up a computer in an old building.

b. It is sometimes a very ………..……….. process getting into a computer installation for security
reasons.

c. It is sometimes very ………..……….. to explain computer concepts.

14. difference, differ, different, differently, differential, differentiate

a. There isn’t a very big ………..……….. in flowcharting for a program to be written in Cobol or
Fortran.

b. There are many ………..……….. computer manufacturers today, and a buyer must be able to
………..……….. between the advantages and disadvantages of each.

23 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

c. The opinions of programmers on the best way of solving a problem often ………..……….. greatly.

15. reliably, rely on, reliable, reliability

a. Computers are ………..……….. machines.

b. If you don’t know the meaning of a computer term, you cannot always use an ………..………..
all-purpose dictionary for the answer.

c. Computers can do mathematical operations quickly and ………..………...

VOCABULARY SECTION

This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.

In these flash cards, you will find other forms of the same word directly under the word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.

The keyword is then defined in straightforward, easy-to-understand English.

appealing adj. attractive or interesting, able to move feelings

v. appeal syn. alluring

n. appeal

Working abroad is appealing to many people.

Through his speeches, the candidate appealed to the voters.

celebrated adj. acclaimed, well-known, and popular

syn. renowned

The celebrated pianist will give a concert this weekend.

San Francisco is celebrated for its multicultural makeup.

contemporary adj. modern, up-to-date; also a person living at the same time as
another person

n. contemporary syn. current

Contemporary architecture makes excellent use of space.

24 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

Cervantes was a contemporary of Shakespeare.

frail adj. weak in health or body

n. frailty syn. fragile

The frail wings of the newborn bird could not lift it off the ground.

One of the frailties of human beings is laziness.

alter v. to change or make different

n. alteration adj. syn. modify

alterable adj.

altered adv. Alterably

Will the storm alter its course and miss the coast?

Gloria hasn’t made any alterations to her plans.

anticipate v. to think about or prepare for something before

adj. anticipatory syn. predict

adj. anticipated

n. anticipation

No one can anticipate the results of the games.

They planned their vacation with anticipation.

conform v. to follow established rules or patterns of behavior

n. conformity syn. adapt

n. conformist

You must conform to the rules or leave the club.

She has always been a conformist.

25 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

vital adj. of great importance; full of life

n. vitality syn. indispensable

Money is vital to the success of the program.

His intense vitality was easily observable.

26 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

UNIT 3

HARDWARE AND SOFTWARE


Computer systems are devised to use computers effectively to solve environmental problems.
A ‘system’ implies a good mixture of integrated parts to form a useful whole. Computer systems
may be discussed in two parts.

The first part is hardware - the physical, electronic, and electro-mechanical devices
considered and recognized as ‘computers.’ The second part is software - the programs that
control and coordinate the activities of the computer hardware and that direct the processing
of data.

INPUT COMPUTER OUTPUT

SECOND STORAGE

The figure above shows diagrammatically the essential components of computer hardware
joined together in a computer system. The centerpiece is called either the computer, the
processor, or usually the Central Processing Unit (CPU). The term ‘Computer’ refers to parts of
the hardware in which calculations and other data manipulations are performed and to the
internal memory in which data and instructions are stored during the actual execution of
programs. The various peripherals, including input and/or output devices, secondary memory
devices, and so on, are attached to the CPU.

Computer software can be divided into two broad categories - systems and applications. The
former is often referred to as ‘systems.’ When brought into internal memory, these direct the
computer to perform tasks. The latter may be provided with the hardware by a system supplier
as part of a computer product designed to answer a specific need in certain areas. These
complete hardware/software products are called turnkey systems.

The success or failure of any computer depends on the skill with which the hardware and
software components are selected and blended. A poorly chosen system can be a
monstrosity incapable of performing the for which it was initially acquired.

27 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

EXERCISES

1. UNDERSTANDING THE PASSAGE


Indicate whether the following ideas are stated or not stated (S/NS) in the text.

1. A system implies a good mixture of parts working together.

2. Input and output devices operate more slowly than the decision-making devices.

3. The control and arithmetic-logical units are part of the processor.

4. The ‘Computer’ is the hardware.

5. Software is the programs on cards, tapes, and disks.

6. The processor is usually referred to as the CPU.

7. The word ‘computer’ means the processor and the internal memory.

8. Systems software is usually referred to as programs.

9. Complete hardware/software products are called turnkey systems.

10. Computers process specially prepared items of information.

2. CONTEXTUAL REFERENCE
Review the text and find out what the words in bold typeface refer to.

1. Computer systems may be discussed in two parts

2. that are thought of

3. that control and coordinate

4. and that direct the processing

5. in which calculations

6. in which data and instructions

7. The former is often referred to

8. These, when brought into

28 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

9. The latter may be provided along with

10. for which it was initially acquired

3. UNDERSTANDING WORDS
Refer back to the text and find synonyms for the following words.

1. developed

2. infers

3. joined

4. chosen

Now, refer to the text and find antonyms for the following words.

5. segregated

6. useless

7. narrow

8. well

4. WORD FORMS
First, choose the appropriate form of the words to complete the sentences. Then, check the
differences of meaning in your dictionary.

1. integration integrate, integrated, integrating

a. Some computer manufacturers have ………..……….. input and outputdevices into one
terminal.

b. The success of any computer system depends on the ………..……….. all its parts to form a useful
whole

c. input and output devices into one peripheral has reduced

the area needed for a computer installation.

2. coordination, coordinate, coordinated, coordinating, coordinator

a. The control unit of a processor ………..……….. the flow of information between the arithmetic
unit and the memory.

29 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

b. ………..……….. the many activities in a computer department are the job of the department
head.

c. The ………..……….. of a language institute has assistants to help him and may have access to
a computer to help him with………..……….. the many programs, timetables, space, and student
results.

3. diagram, diagrammatic, diagrammatically, diagrammed

a. Very often manufacturers provide ………..……….. representations of the

internal workings of a computer.

b. A ………..……….. is a drawing that shows how something is arranged rather than what it looks
like.

c. A few ideas have been ………..……….. for you in this book.

4. interchange, interchangeable, interchangeably interchanged.

a. The words ‘arithmetic-logic’ and ‘arithmetic-logical’ can be used ………..………..

b. There is often an ………..……….. of ideas among computer scientists.

c. There is a big difference between an input and an output. These can not be ………..………..

5. division, divide, divisible

a. It is often difficult for computer science students to ………..……….. their time up proportionally
between studying and programming.

b. Are all numbers ………..……….. by three?

c. There is always a ………..……….. of labor within a computer company.

STRUCTURE 3

WORD FORMATION – PREFIXES


We have already seen how suffixes change the part of speech of a word. Let us now consider
some prefixes, their usual meanings, and how they change the meanings of English words.

PREFIXES

30 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

NEGATIVE AND
SIZE LOCATION TIME AND NUMBER
POSITIVE
ORDER mono-
un- non- semi- inter- pre- bi-
in- dis- re- mini- super- ante- hex-
micro- trans- fore- oct-
ex- post- multi-
extra-
mid-

EXERCISE 1
Study these tables and try to find additional examples. Use your dictionary if necessary.

Negative and positive prefixes


PREFIX MEANING EXAMPLES
un-, in-, not, unmagnetized, unpunched,
im-, il-, not good enough incomplete, impossible,
ir- not connected with illegal, irregular, irrelevant

non- bad, wrong non-programmable,


non-impact
Negative

mis- opposite feeling, mispronounce, mislead, mislay,


opposite action misunderstand,
dis- against disagree, disconnect
anti- antisocial
de- reduce, reverse demagnetize, decode,
under- too little underestimate
Positive

re- do again reorganize


over- too much overheat

31 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

Prefixes of size
PREFIX MEANING EXAMPLES

semi- half, partly semiconductor


equi- equal equidistant
maxi- big maxi-computer
micro- small microcomputer
mini- little minicomputer
macro- large macroeconomics
mega- large megabyte

Prefixes of location
PREFIX MEANING EXAMPLES
ante-, pre- before antecedent, prefix
prime- first primary, primitive
post- after postdated
retro- backward retroactive

Prefixes of time and order


PREFIX MEANING EXAMPLES

semi- half semicircle


mono- one monochromatic
bi- two binary
tri- three triangle
quad- four quadruple
penta- five pentagon
hex- six hexadecimal
ceptefli- seven September
oct- eight octal
dec- ten decimal
multi- many multiprogramming, multiplexer

Other prefixes

32 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

PREFIX MEANING EXAMPLES


pro- for program
auto- self automatic
co- together coordinate
neo- new neoclassical
pan- all Pan-American

EXERCISES 2
Fill in the blanks with the correct prefix from the following list. Use the glossary at the end of the
book to help you.

multi- deci- sub- inter-

semi- mono- mega- auto

mini- de- inter- prim-

1. byte means one million bytes.

2. ………..……….. plexing is when many electrical signals are combined and carried on only one
optical link.

3. Blocks are separated by marks called ………..……….. block gaps.

4. The number system we use in everyday life is the ………..……….. mal system which has a base
of 10.

5. CRT terminals are beneficial………..……….. active devices for use in airline reservations.

6. Some screens are ………..……….. chromatic, whereas others produce multicolor pictorial
graphics.

7. The complete description of the logical structure of data is called the schema, and the
description of the parts, the ………..……….. schema.

8. The central storage locations of a computer are called its ………..……….. ary storage.

9. The small ferrite rings called cores have two states: either magnetized or ………..………..
magnetized.

10. The introduction of chips or ………..……….. conductor memories made it possible to reduce
the size of the computer.

EXERCISES 3
For each prefix in Structure 3, find at least four words with it in the dictionary.

33 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.

In these flash cards, you will find other forms of the same word directly under the word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.

The keyword is then defined in straightforward, easy-to-understand English.

acclaim n. enthusiastic approval, applause

adj. acclaimed syn. praise

n. acclamation

Issac Stern has won acclaim abroad.

Acclaimed authors often win Pulitzer Prizes.

adverse adj. displeasing, objectionable, or lousy

n. adversary syn. unfavorable

n. adversity

Adverse weather conditions made it challenging to play the game.

His indecision adversely affected his job performance.

autonomous adj. by itself, with no association

n. autonomy syn. independent

Mexico became an autonomous state in 1817.

34 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

Although working closely with the government, all businesses function autonomously.’

disruptive adj. causing confusion and interruption

v. disrupt syn. disturbing

n. disruption

Frequent questions during lectures can be disruptive.

The storm disrupted bus service.

haphazardly adv. having no order or pattern, by chance

adj. haphazard syn. arbitrarily, carelessly

n. haphazardness

It was evident that the house was built haphazardly.

Susan haphazardly completed the assignment.

advent n. the coming or arrival of something

syn. appearance

With the advent of computers, many tasks have been made more accessible.

The newspapers announced the advent of the concert season.

agile adj. able to move quickly and easily

n. agility syn. nimble

n. agileness

Deer are very agile animals.

She moved agilely across the stage.

albeit conj. despite the facts, regardless of the fact

35 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

syn. although

His trip was successful, albeit tiring.

Albeit difficult at times, speaking another language is rewarding.

36 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

UNIT 4

COMPUTERS MAKE THE WORLD


SMALLER AND SMARTER
The ability of tiny computing devices to control complex operations has transformed the way
many tasks are performed, ranging from scientific research to producing consumer products. Tiny
‘computers on a chip’ are used in medical equipment, home appliances, cars, and toys. Workers
use handheld computing devices to collect data at a customer site, generate forms, control
inventory, and serve as desktop organizers.

Not only is computing equipment getting smaller, but it is also getting more sophisticated.
Computers are part of many machines and devices that once required continual human
supervision and control. Today, computers in security systems result in safer environments,
computers in cars improve energy efficiency, and computers in phones provide features such as
call forwarding, call monitoring, and call answering.

These intelligent machines are designed to take over some of the basic tasks previously performed
by people; by so doing, they make life a little easier and a little more pleasant.

Intelligent cards store vital information such as health records, driver’s licenses, bank balances,
etc. Smartphones, cars, and appliances with built-in computers can be programmed to meet
individual needs better.

A bright house has a built-in monitoring system that can turn lights on and off, open and close
windows, operate the oven, and more.

With small computing devices available for performing innovative tasks like cooking dinner,
programming the VCR, and controlling the flow of information in an organization, people can
spend more time doing what they often do best- being creative. Computers can help people
work more creatively.

Multimedia systems are known for their educational and entertainment value, called
‘edutainment.’ Multimedia combines text with sound, video, animation, and graphics, greatly
enhancing user and machine interaction and making information more exciting and appealing
to people. Expert systems software enables computers to ‘think’ like experts.

Medical diagnosis expert systems, for example, can help doctors pinpoint a patient’s illness,
suggest further tests, and prescribe appropriate drugs.

Connectivity enables computers and software that might otherwise be incompatible to


communicate and share resources. Now that computers are proliferating in many areas and
networks are available for people to access data and communicate with others, personal
computers are becoming interpersonal PCs. They can potentially improve how we relate to each
other significantly. Many people today telecommute - that is, use their computers to stay in touch
with the office while working at home. With the proper tools, hospital staff can get a diagnosis

37 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

from a medical expert hundreds or thousands of miles away. Similarly, people with disabilities can
communicate more effectively with others using computers.

Distance learning and videoconferencing are concepts made possible with an electronic
classroom or boardroom accessible to people in remote locations. Vast information databases
are currently available to Internet users, who can send mail messages to each other. The
information superhighway is designed to significantly expand this interactive connectivity so that
people worldwide will have free access to all these resources.

People power is critical to ensuring that hardware, software, and connectivity are effectively
integrated in a socially responsible way. People - computer users and computer professionals -
are the ones who will decide which hardware, software, and networks endure and how significant
an impact they will have on our lives. Ultimately, people's power must be exercised to ensure that
computers are used not only efficiently but in a socially responsible way.

EXERCISES

1. M ARK THE FOLLOWING S TATEMENTS AS TRUE OR FALSE (T/F):


a. Desktop organizers are programs that require desktop computers.

b. Computers are sometimes used to monitor systems that previously needed human supervision.

c. Networking is a way of allowing otherwise incompatible systems to communicate and share


resources.

d. The use of computers prevents people from being creative.

e. Computer users do not have much influence over how computing develops.

2. FIND THE ANSWERS TO THESE QUESTIONS IN THE TEXT.


1. Name some devices that use ‘computers on a chip.’

2. What uses of handheld computers are mentioned in the text?

3. What are the benefits of using computers with the following items?

a. Security systems

b. Cars

c. Phones

4. What smart devices are mentioned in the text?

5. What are smart cards used for?

6. What are the advantages of multimedia?

38 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

7. What can medical expert systems do?

8. How can computers help people with disabilities?

9. What types of computing systems are made available to people in remote locations using
electronic classrooms or boardrooms?

10. What aspects of computing can people's power determine?

3. M ATCH THE TERMS IN T ABLE A WITH THE STAT EMENTS IN TABLE B:

TABLE A

a. Edutainment

b. Multimedia

c. Expert system

d. Telecommute

e. Information superhighway

TABLE B

i. Software that enables computers to ‘think’ like experts

ii. Use computers to stay in touch with the office while working at home

iii. Internet system designed to provide free, interactive access to vast resources for people all over
the world

iv. Multimedia materials with a combination of educational and entertainment content

v. A combination of text with sound, video, animation, and graphics

VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.

In these flash cards, you will find other forms of the same word directly under the word. These words
have the same general meaning; they represent

the different parts of speech of the word. For each of the forms, the part of speech is given. Also,
you can observe two examples of using the keywords and other parts.

The keyword is then defined in straightforward, easy-to-understand English.

39 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

bear v. to produce, to carry; to show; to endure

adv. bearably syn. yield

adj. bearable

This orchard bears many tine harvests of apples.

Although stock prices declined, losses have been bearable for most investors.

block v. to prevent movement, progress, or success

n. blockage syn. obstruct

adj. blocked

The government blocked the sale of the airline.

The streets were flooded due to a blockage in the pipes.

blur v. to make something difficult to see

adj. blurred syn. cloud

adj. blurry

n. blur

The rain blurred everyone’s view of the valley.

The whole accident is just a blur in my mind.

brilliant adj. intensely bright or colorful; intelligent

n. brilliance syn. radiant

Einstein was a brilliant thinker.

She brilliantly solved the problem.

enhance v. to increase positively, such as in value, power, or beauty

n. enhancement syn. strengthen

adj. enhanced

40 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

Passing the exam should enhance your chances of being admitted to college.

The computer enhanced our productivity.

intrigue v. to interest greatly

adj. intriguing syn. fascinate

n. intrigue

He was intrigued by the acclaim that he received.

The intriguing question baffled historians.

shed v. to throw off naturally, to give out

syn. discard

To grow, crabs must shed their shells.

The experiments shed no new information on the cause of the disease.

unique adj. to be the only one of a kind; special

n. uniqueness syn. rare

He was presented with a unique opportunity to attend the conference.

His style of writing is uniquely his own.

41 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

UNIT 5

DATA MINING
Data mining filters through large amounts of raw data for useful information, giving businesses a
competitive edge. This information is made up of meaningful patterns and trends that are already
in the data but were previously unseen.

The most famous tool used in mining is artificial intelligence (AI). AI technologies try to work the
way the human brain works by making intelligent guesses, learning by example, and using
deductive reasoning. Some popular AI methods used in data mining include neural networks,
clustering, and decision trees.

Neural networks look at the rules of using data based on the connections found or on a sample
set of data. As a result, the software continually analyses value. It compares it to the other factors,
and it compares these factors repeatedly until it finds patterns emerging. These patterns are
known as rules. The software then looks for other patterns based on these rules or sends an alarm
when a trigger value is hit.

Clustering divides data into groups based on similar features or limited data ranges. Clusters are
used when data is not labeled favorably to mining. For instance, an insurance company that
wants to find instances of fraud wouldn’t have its records labeled as fraudulent or not fraudulent.
However, after analyzing patterns within clusters, the mining software can start to figure out the
rules that point to which claims are likely to be false.

Decision trees, like clusters, separate the data into subsets and then analyze them to divide them
into further subsets (for a few more levels). The final subsets are small enough that the mining
process can find interesting patterns and relationships within the data.

Once the data to be mined is identified, it should be cleaned. Cleansing data frees it from
duplicate information and erroneous data. Next, the data should be stored uniformly within
relevant categories or fields. Mining tools can work with all types of data storage, from large data
warehouses to smaller desktop databases to fiat files. Data warehouses and data When the
process is complete, the mining software generates a report. An analyst reviews the report to see
if further work needs to be done, such as refining parameters, using other data analysis tools to
examine the data, or even scrapping it if it’s unusable. If no further work is required, the report
proceeds to the decision-makers for appropriate action.

The power of data mining is being used for many purposes, such as analyzing Supreme Court
decisions, discovering patterns in health care, pulling stories about competitors from newswires,
resolving bottlenecks in production processes, and analyzing sequences in the human genetic
makeup. There is no limit to the type of business or study area where data mining can benefit.

EXERCISES

1. M ARK THE FOLLOWING AS TRUE OR FALSE (T/F ):

42 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

a. Data mining is a process of analyzing known patterns in data.

b. Artificial intelligence is commonly used in data mining.

c. In data mining, patterns found while analyzing data are used to analyze the data further.

d. Data mining is used to detect false insurance claims.

e. Data mining is only helpful for a limited range of problems.

2. FIND THE ANSWERS TO THESE QUESTIONS IN THE TEXT.


1. What tool is often used in data mining?

2. What AI method is used for the following processes?

a. Separate data into subsets and then analyze them to divide them into further subsets for many
levels.

b. Continually analyze and compare data until patterns emerge.

c. Divide data into groups based on similar features or limited data ranges.

3. What term is used for the patterns found by neural networks?

4. When are clusters used in data mining?

5. What types of data storage can be used in data mining?

6. What can an analyst do to improve the data mining results?

7. Name some of the ways data mining is currently used.

3. M ATCH THE TERMS IN T ABLE A WITH THE STAT EMENTS IN TABLE B:

TABLE A

a. Data mining

b. AI

c. Cleansed data

d. Data warehouse

TABLE B

i. Storage method of archiving large amounts of data to make it easy to access

ii. Data free from duplicate and erroneous information

iii. A process of filtering through large amounts of raw data for useful information

43 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

iv. A computing tool that tries to operate in a way similar to the human brain

4. COMPLETE THE FOLL OWING DESCRIPTION OF THE DATA MINING PROCESS USING
WORDS FROM THE TEXT:
Large amounts of data stored in data ………..……….. are often used for data ………..……….. The
data is first ………..……….. to remove ………..……….. information and errors. The ………..……….. is
then analyzed using a tool such as ………..……….. An analysis report is then analyzed by an
………..……….. who decides if the ………..……….. need to be refined, other data tools need to
be used, or if the results need to be discarded because they are ………..……….. The analyst passes
the final results to the ………..……….. makers who decide on the ………..……….. action.

VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.

In these flash cards, you will find other forms of the same word directly under the word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.

The keyword is then defined in straightforward, easy-to-understand English.

critical adj. extremely important, very serious, finding fault, to carefully judge

v. criticize syn. crucial

V. critique

n. criticism

n. critic

Adv. critically

It is critical to follow the directions for the experiment precisely, as the instructor indicates.

The runner accepted criticism from his coach very well.

distort v. to change from the original shape or condition, usually in an unnatural way

adj. distorted syn. deform

n. distortion

Time and space are distorted when traveling at the speed of light.

44 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

Distortion of the image from a microscope can be caused by low light.

diverse adj. various; distinct from others

n. diversity syn. different

v. diversify

Freud had many diverse interests in psychology.

The diversity of life forms on Earth makes zoology an exciting study area.

prosperous adj. successful, wealthy

v. prosper syn. thriving

n. prosperity

In the early 1900s, San Francisco was a prosperous city.

Bacteria prosper under the proper conditions.

reveal v. to uncover, to expose

adj. revealing syn. disclose

n. revelation

The president revealed some of his ideas before he gave his speech.

The report made some revelations about the nature of the conflict.

creep v. to move slowly and quietly close to the ground; to begin to happen

adj. creeping syn. crawl

Some mistakes are beginning to creep into his work.

Ivy is a creeping variety of plants.

crush v. to press together to distort the shape or nature of the object completely.

adj. crushed syn. grind

45 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

adj. crushing

n. crush

The machine crushes corn to produce corn meal.

The passage of the legislation was a crushing blow to the president’s program.

46 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

UNIT 6

LINUX
Linux has its roots in a student project. In 1992, an undergraduate called Linus Torvalds was studying
computer science in Helsinki, Finland. Like most computer science courses, a significant
component was taught on (and about) Unix. Unix was the wonder operating system of the 1970s
and 1980s: both a textbook example of operating system design principles and sufficiently robust
to be the standard OS in engineering and scientific computing. But Unix was a commercial
product (licensed by ATET to several resellers) and cost more than a student could pay.

Annoyed by the shortcomings of Minix (a compact Unix clone written as a teaching aid by
professor Andy Tannenbaum), Linus set out to write his own ‘kernel’ - the core of an operating
system that handles memory allocation, talks to hardware devices, and makes sure everything
keeps running. He used the GNU programming tools developed by Richard Stallman’s Free
Software Foundation, an organization of volunteers dedicated to fulfilling Stallman’s ideal of
making good software that anyone could use without paying. When he’d written a basic kernel,
he released the source code to the Linux kernel on the internet.

Source code is essential. It’s the original from which compiled programs are generated. If you
don’t have the source code for a program, you can’t modify it to fix bugs or add new features.
Most software companies won’t sell you their source code or will only do so for an eye-watering
price because they believe that if they make it available, it will destroy their revenue stream.

What happened next was astounding, from the conventional commercial software industry point
of view - and utterly predictable to anyone who knew about the Free Software Foundation.
Programmers (primarily academics and students) began using Linux. They found it didn’t do what
they wanted, so they fixed it. And where they improved it, they sent the improvements to Linus,
who rolled them into the kernel. And Linux began to grow.

There’s a term for this model of software development; it’s called Open Source.

Anyone can have the source code - it’s free (in the sense of free speech, not free beer). Anyone
can contribute to it. If you use it heavily, you may want to extend development or fix bugs in it -
and it is so easy to give your fixes back to the community that most people do so.

An operating system kernel on its own isn’t much use. However, Linux was purposefully designed
as a near-clone of Unix, and there is much software out there that is free and was designed to
compile on Linux. By about 1992, the first ‘distributions’ appeared.

Distribution is the Linux-user term for a complete operating system kit, complete with the utilities
and applications you need to make it do useful things - command interpreters, programming
tools, text editors, typesetting tools, and graphical user interfaces based on the X windowing
system. X is a standard in academic and scientific computing but not hitherto common on PCs;
it’s a complex distributed windowing system on which people implement graphical interfaces like
KDE and Gnome.

47 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

As more and more people learned about Linux, some began to port the Linux kernel to run on
non-standard computers. Because it’s free, Linux is now the most widely-ported operating system.

EXERCISES

1. M ARK THE FOLLOWING S TATEMENTS AS TRUE OR FALSE (T/F):


a. Linux was created in the 1980s.

b. a university student created Minix.

c. Linux is based on Unix.

d. Minix is based on Unix.

e. Linux runs on more types of computers than any other operating system.

2. FIND THE ANSWERS TO THESE QUESTIONS IN THE TEXT.


1. What did Linus Torvalds use to write the Linux kernel?

2. How was the Linux kernel first made available to the general public?

3. What is a programmer likely to do with source code?

4. Why will most software companies not sell you their source code?

5. What utilities and applications are provided in a Linux distribution?

6. What is X?

7. What graphical user interfaces are mentioned in the text?

3. M ATCH THE TERMS IN T ABLE A WITH THE STAT EMENTS IN TABLE B:

TABLE A

a. Kernel

b. Free Software Foundation

c. Source code

d. Open Source

e. A distribution

f. X

TABLE B

48 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

i. A type of software development where any programmer can develop or fix bugs in the software

ii. The original systems program from which compiled programs are generated

iii. A complete operating system kit with the utilities and applications you need to make it do useful
things

iv. A standard distributed windowing system on which people implement graphical interfaces

v. An organization of volunteers dedicated to making good software that anyone could use
without paying

vi. The core of an operating system that handles memory allocation, talks to hardware devices,
and makes sure everything keeps running

4. RE AD THE FOLLOWING TEXT (OPERATING SYSTEMS: HIDDEN SOFTWARE) TO ANSWER


AND TO FIND THE ANSW ERS TO THESE QUESTIO NS:
1. What difference is there between applications software and operating systems?

2. Why is the supervisor program the most essential operating system program?

3. What is the difference between resident and non-resident programs?

4. What are the main functions of an operating system?

OPERATING SYSTEMS: HIDDEN SOFTWARE

When a new computer comes off the factory assembly line, it can do nothing. The hardware
needs software to make it work. Are we talking about application software such as word
processing or spreadsheet software? However, an application software package does not
communicate directly with the hardware. Between the applications software and the hardware
is a software interface - an operating system. An operating system is a set of programs between
applications, software, and the computer hardware.

The most critical program in the operating system, the program that manages the operating
system, is the supervisor program, most of which remains in memory and is thus referred to as
resident. The supervisor controls the entire operating system and loads other operating system
programs (called nonresident) into memory from disk storage only as needed.

An operating system has three main functions: (1) manage the computer’s resources, such as the
central processing unit, memory, disk drives, and printers; (2) establish a user interface; and (3)
execute and provide services for applications software. Keep in mind, however, that much of the
work of an operating system is hidden from the user. In particular, the first listed function, managing
the computer’s resources, is taken care of without the user being aware of the details.
Furthermore, although invoked by an application program, all input and output operations are
carried out by the operating system.

49 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.

In these flash cards, you will find other forms of the same word directly under the word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.

The keyword is then defined in straightforward, easy-to-understand English.

coarse adj. not fine or smooth, not delicate

n. coarseness syn. rough

Sandpaper is a highly coarse material.

Wool clothing has a certain coarseness in texture.

commonplace adj. ordinary

syn. standard

Soon, seeing the person you are talking to on the phone will be commonplace.

Female lawyers are commonplace in the United States.

complex adj. challenging to understand or explain; having many parts

n. complexity syn. complicated

The business people astutely approached the complex production problem.

The universe has a complexity beyond comprehension.

exclusively adv. no one else; nothing else; not shared with others

adj. exclusive syn. restrictively

n. exclusion

50 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

v. exclude

This room is used exclusively by the faculty.

They excluded everyone under the age of 21 from the contest.

immense adj. huge

n. immensity syn. massive

From the mountaintop, you could see the immense valley.

She was immensely interested in the idea of teaching a foreign language.

rigid adj. not easy to bend; firm; inflexible

n. rigidity syn. stiff

The teacher was very rigid in his ideas about class attendance.

He adhered rigidly to his opinions about marriage.

sufficiently adv. enough, in a satisfying manner

n. sufficiency syn. adequately

adj. sufficient

v. suffice

Jenny is sufficiently mature to make her own decisions.

Her income is sufficient for her needs.

clarify adj. to make more easily understood, to make clear

n. clarification syn. explain

Unit 2 in this book clarifies the characters of computers.

A clarification of the government’s position in this matter is necessary.

convenient adj. easy to reach, near; suitable to one’s needs

51 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

n. convenience syn. practical

The student union is convenient to the physical sciences building.

For the convenience of the student body, the library is central.

52 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

UNIT 7

USER INTERFACES
Cheaper and more powerful personal computers are making it possible to perform processor-
intensive tasks on the desktop. Technology breakthroughs, such as speech recognition, enable
new computer interaction methods. The convergence of personal computers and consumer
electronics devices is broadening the base of computer users and placing a new emphasis on
ease of use. Together, these developments will drive the industry in the next few years to build the
first completely new interfaces since SRI International and Xerox’s Palo Alto Research Center did
their pioneering research into Graphical User Interfaces (GUI) in the 1970s.

True, it’s unlikely that you’ll be ready to toss out the keyboard and mouse any time soon; indeed,
a whole cottage industry - inspired by the hyperlinked design of the World Wide Web - has sprung
up to improve today’s graphical user interface. Companies are developing products that
organize information graphically in more intuitive ways. XML-based formats enable users to view
content, including local and network files, within a single browser interface. But the more dramatic
innovations, such as speech recognition, are poised to shake up interface design.

Speech will become a significant component of user interfaces, and applications will be
completely redesigned to incorporate speech input.

With their cramped keyboards and essential handwriting recognition, palm-size and handheld
PCs will benefit from speech technology.

Though speech recognition may never replace other input devices, future interfaces will offer a
combination of input types, a concept known as multimodal input. A mouse is a very efficient
device for desktop navigation, for example, but not for changing the style of a paragraph. Using
a mouse and speech input, a user can point to the appropriate paragraph and then say to the
computer, ‘Make that bold.’ Of course, multimodal interfaces will involve more than just traditional
input devices and speech recognition. Eventually, most PCs will also have handwriting
recognition, Text-to-speech (TTS), the ability to recognize faces or gestures, and even the ability
to observe their surroundings.

Researchers have given sight to PCs running Microsoft Windows using video cameras at The
Intelligent Room, a Massachusetts Institute of Technology’s Artificial Intelligence Lab project. ‘Up
to now, the PC hasn’t cared about the world around it,’ said Rodney A. Brooks, the Director of
MIT’s Artificial Intelligence Lab. Combining computer vision with speech understanding liberates
the user from sitting before a keyboard and screen.

It’s no secret that the amount of information - both on the Internet and within intranets - at the
fingertips of computer users has been expanding rapidly. This information onslaught has led to an
interest in intelligent agents and software assistants that perform tasks such as retrieving and
delivering information and automating repetitive tasks. Agents will make computing significantly
easier. They can be used as Web browsers, helpdesks, and shopping assistants. With the ability to
look and listen, intelligent agents will bring personal computers one step closer to behaving more
like humans.

53 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

This is not an accident. Researchers have long noted that users tend to treat their personal
computers as though they were human. By making computers more social,’ they hope also to
make them easier to use.

As these technologies enter mainstream applications, they will have a marked impact on how we
work with personal computers. Soon, the question will be not ‘What does software look like?’ but
‘How does it behave?’

EXERCISES

1. MARK THE FOLLOWING S TATEMENTS AS TRUE OR FALSE (T/F):


a. Fewer people are using computers because computer functions are becoming integrated into
other electronic devices.

b. Keyboards and mice will soon not be required to use personal computers.

c. There have been no interface design improvements since the GUI's development.

d. Speech recognition is likely to replace other input devices completely.

e. Computer speech and vision will free users from sitting before a keyboard and screen.

f. Intelligent agents will make computers seem more like humans.

2. FIND THE ANSWERS TO THESE QUESTIONS IN THE FOLLOWING TEXT.


1. What developments are driving the development of entirely new interfaces?

2. What has inspired the cottage industry to develop and improve today’s graphical user
interface?

3. In what way have XML-based formats changed the user interface?

4. What type of computers are specific to benefit from speech technology?

5. Name a process where a mouse is particularly useful and a process that is not so helpful.

6. What facilities are multimodal interfaces Likely to offer in the future?

7. What input device will be used to give vision to the user interface?

8. What development has led to an interest in intelligent agents?

9. List ways in which intelligent agents can be used.

54 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

3. MATCH THE TERMS IN T ABLE A WITH THE STAT EMENTS IN TABLE B:

TABLE A

a. GUI

b. Multimodal interface

c. Intelligent agent

d. ITS

e. The Intelligent Room

TABLE B

i. Software assistant that performs tasks such as retrieving and delivering information and
automating repetitive tasks

ii. Text-to-speech

iii. Graphical user interface

iv. A project of the Massachusetts Institute of Technology’s Artificial Intelligence Lab

v. A system that allows users to interact with a computer using a combination of inputs such as
speech recognition, handwriting recognition, text-to-speech, etc.

VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.

In these flash cards, you will find other forms of the same word directly under the word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.

The keyword is then defined in straightforward, easy-to-understand English.

accurate adj. careful and exact

c. accuracy syn. precise

She was able to make accurate observations with the new telescope.

Experiments must be conducted with accuracy.

55 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

dim adj. not bright or clear

v. dim syn. faint

n. dimness

The light was too dim for studying.

The stars dimly lit the evening sky.

gigantic adj. very large

syn. enormous

Reaching the Moon was a gigantic step in space exploration for humankind.

New methods of farming offer gigantic advantages over the old methods.

lasting adj. forever, without end

v. last syn. enduring

Kennedy left a lasting impression on the people who heard his inaugural address.

The introduction of robots will have a lasting effect on industry.

vibrant adj. lively, powerful, full of action, bright

n. vibrance syn. brilliant

His vibrant personality made him well-liked by everyone.

The vibrance of the city is attractive to many individuals.

dominant adj. primary or principal; having or exercising control over something

v. dominate syn. major

n. domination

The dominant life forms of the Paleozoic era lived in the water.

The skyscraper dominated the skyline.

56 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

dormant adj. not growing or producing; asleep

n. dormitory syn. inactive

n. dormancy

The volcano had been dormant for hundreds of years before last month's eruption.

The seniors live in the new dormitory.

drab adj. lacking color; uninteresting, boring

n. drabness syn. colorless

Their clothing was quite drab.

The drabness of the desert made driving less attractive.

selective adj. carefully chosen

adj. select syn. discriminating

v. select

n. selection

n. selectivity

They were very selective when they chose the members of the academic team.

He selected Spanish as his language class.

57 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

UNIT 8

APPLICATION SERVICE PROVIDERS


Suppose your hard disk is packed to bursting point. Suppose the IT department is too busy to fix
your email problems, and your business can’t afford to buy the tools you’d like to develop the
company website. In that case, it's time to consider using an application service provider (ASP).
Rather than installing software on each machine or server within your organization, you rent
applications from the ASP, which provides remote access to the software and manages the
hardware required to run the applications.

There are many advantages to this approach. The havoc caused by viruses makes outsourcing
your email and office suite services an attractive option. It also gives you more flexibility - you pay
for applications as and when needed rather than investing in costly software that you’re tied to
for years. Not having to worry about upgrading to the latest version of your office suite or about
battling with the complexities of managing an email system leaves businesses with mere time. It's
time to focus on what they do best.

However, there are some potential pitfalls. Using applications remotely requires much bandwidth,
which is only available from a broadband connection or a leased line to the ASP. It is also essential
to ensure that the ASP can provide a secure, reliable service that will be available whenever you
need it.

Providing applications and storage space for vast numbers of users requires some powerful
technology on the port of the ASP; this includes security controls and data storage, as well as
providing physical links to customers. Most ASPs don’t own the data centers that store the
information. Instead, they lease space from data storage specialists. In this way, they can be
confident of meeting customers’ increasing storage requirements by buying more space as it’s
needed.

There’s a wide variety of applications available for use via ASPs. Office suite applications and
email services are two of the most generic applications available through ASPs. Large, complex
business applications such as enterprise resource planning tools like SAP are another popular
candidate for delivery through an ASP. Other business services, such as payroll and accounting
systems, are also available. This is particularly beneficial to small businesses likely to overgrow and
don’t want to deal with the problems caused by outgrowing their existing system and moving to
a high-end package. ASPs also offer a means of using specialist tools that would otherwise prove
prohibitively expensive. Small businesses can use such tools for short periods as and when needed
rather than having to buy the software as a permanent investment.

One of the significant barriers for small businesses that want to start in e-commerce is ensuring they
have sufficient resources to cope with sudden significant customer increases. This means having
adequate storage for all your customers’ details and ensuring you have the technology to handle
stock levels, efficient delivery, and significant traffic volumes. It’s rare for an e-commerce business
to handle all of these elements by itself, making this one of the best-established areas of ASP use.
Being able to respond rapidly to changes in the size of your customer base and the type of

58 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

product they want to order from your business demands more flexibility than traditional software
can provide.

EXERCISES

1. USING INFORM ATION FROM THE TEXT, M ARK THE FOLLOWING AS TRUE OR FALSE:
a. Software from an ASP must be installed locally on a user’s computer.

b. You need a high bandwidth connection to use an ASP service.

c. ASPs usually use their own storage space for customers.

d. Using an ASP gives you more flexibility.

e. An e-commerce business usually provides all of the required technology itself.

2. FIND THE ANSWERS TO THESE QUESTIONS IN THE FOLLOWING TEXT.


1. How do you pay for the applications provided by an ASP?

a. no charge

b. charged according to use

c. single payment

2. What two primary services does an ASP provide?

3. How does an ASP ensure that they have enough storage space for the changing needs of
customers?

4. What types of applications are available from ASPs?

5. Why is it beneficial for a small business to be able to rent specialist tools from an ASP?

6. What is one of the best-established areas of ASP use?

3. MATCH THE ITEMS IN T ABLE A WITH THE STAT EMENTS IN TABLE B:

TABLE A

a. Website

b. ASP

c. Virus

d. Office suite

e. Bandwidth

59 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

f. Broadband

g. Datacenter

h. SAP

TABLE B

i. Set of standard programs used in an office

ii. Facility for storing large amounts of information

iii. Capacity of a network connection

iv. High capacity Internet connection

v. Self-replicating program

vi. Common enterprise resource planning tool

vii. Application service provider

viii. Collection of related web pages

4. RE AD THE NEXT PAGE TEXT (UNDERSTANDING M P3) TO FIND THE ANSWERS TO THESE
QUESTIONS.
1. What does MP3 stand for?

2. What is the difference between MP3 and WAV files?

3. What kind of sound does MP3 strip out?

4. What kind of information is included in the tag?

UNDERSTANDING MP3

The name comes from MPEG (pronounced EM-peg), which stands for the Motion Picture Experts
Group. MPEG develops standards for audio and video compression. MP3 is MPEG Audio Layer 3.

MP3 competes with another audio file format called WAV. The critical difference is that MP3 files
are much smaller than WAV files. An MP3 file can store a minute of sound per megabyte, while a
WAV file needs 11 or 12 megabytes to hold the same amount. How does MP3 achieve this
compression? CDs and audio files don’t reproduce every sound of a performance. Instead, they
sample the performance and store a discrete code for each sampled note. A CD or WAV file may
sample a song 44,000 times a second, creating a vast mass of information.

By stripping out sounds most people can’t hear, MP3 significantly reduces the information stored.
For instance, most people can’t hear notes above a frequency of 16kHz, so it eliminates them
from the mix. Similarly, it eliminates quiet sounds masked by noise at the same frequency. The result
is a file that sounds similar to a CD but much smaller. An MP3 file can contain spoken word

60 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

performances, such as radio shows, audiobooks, and music. It can provide information about itself
in a coded block called a tag. The tag may include the performer’s name, a graphic such as an
album cover, the song’s lyrics, the musical genre, and a URL for more details.

5. RE AD THE REST OF NEX T PAGE TEXT (PLAY MP3 FILES) TO FIND THE ANSWERS TO THESE
QUESTIONS:
1. How do you play MP3 files?

2. What does the Windows Media Player file do with an MP3 file?

3. What is a standalone player?

4. What special features can players offer?

5. What information can you obtain by clicking the track info button?

6. What does a skin enable you to do?

7. How do you play music from a CD-ROM on an MP3 player?

8. What hardware and software do you need to make audio CDs?

PLAY MP3 FILES

Most machines today have enough processing power and memory to play MP3s immediately.
Download an MP3 file like any other and click on it in Windows Explorer. The Windows Media Player
will decode the file and route the signals to your sound card and speakers.

OTHER MP3 FEATURES I NCLUDE:


1. Players.

Most standalone players have many features beyond Windows’ default Media Player. Players let
you group songs into playlists to control what music you play and randomize the selections. They
offer spectrum analyzers, graphic equalizers, and frequency displays to control how the music
sounds.

2. Track info.

A track info button gives you the information on the MP3 file’s tag. Other buttons may take you to
a music library where you can organize your MP3 files by performer or genre.

3. Skins or themes.

These programs are designed to change the appearance of the most popular players. They’re
akin to the wallpaper that alters the look of the Windows desktop. With a skin, a player can
become a jukebox, car dashboard, or Star Trek tricorder. Think of them as easily interchangeable
faceplates.

4. Rippers and encoders.

61 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

A ripper program rips songs from a CD in your CD-ROM drive and turns them into WAV files. An
encoder converts WAV files into MP3 files or vice versa. Many MP3 players incorporate rippers and
encoders and can do both steps in one.

5. Recorders.

With a writeable CD-ROM drive, a recorder program lets you create your audio CDs.

STRUCTURE

A. Study this sentence.

1. Using MIDI, computers can communicate with synthesizers.

It contains two clauses. An-ing clause:

using MIDI

and a main clause:

Computers can communicate with synthesizers

We can use an -ing clause, as in example 1, to explain how something happens. The-ing clause
explanation can be placed before or after the main clause, as in example 2.

2. DVD drives read DVDs (by) using blue laser light

We can also use -ing clauses to link a cause and effect.

3. A WAV file may sample a song 44,000 times a second, [cause] creating a vast mass of
information. [effect]

EXERCISE

1. Match each cause and effect. Then, link them with an -ing clause.

CAUSE

1. Computers with MIDI interface boards can be connected to MIDI instruments.

2. Each side of a DVD can have two layers.

3. MP3 removes sounds we can’t hear.

4. You can download single tracks.

5. Each MP3 file has a tag.

6. MP3 players contain several devices.

62 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

7. You can download a skin program.

8. You can legally download some music.

EFFECT

a. This permits extra information and other track details to be stored on the performer.

b. You can create your compilation.

c. This allows you to sample a new group before buying their CD.

d. This gives an enormous storage capacity.

e. This allows the music being played to be stored by the computer and displayed on the monitor.

f. This enables you to change the appearance of your player.

g. These allow you to control the way the music sounds.

h. This produces much smaller files.

B. RELATIVE CLAUSES WITH A PARTICIPLE


Relative clauses with a participle are often used in technical descriptions. They allow you to
provide much information about a noun using as few words as possible.

Study these examples from the Task 3 text.

1. The technology needed to set up a home network

2. PCs equipped with Ethernet adapters

3. Network modem allowing clients to access the Internet simultaneously

4. Data line linking client to server

We can use the passive participle as in examples 1 and 2.

1. The technology needed to set up a home network.

= technology which is needed

2. PCs equipped with Ethernet adapters

= PCs that are equipped

63 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

We can use an active participle as in examples 3 and 4.

3. Network modem allowing clients to access the Internet simultaneously

= modem, which allows clients to access the Internet simultaneously

4. Data line linking client to server

= data line that links client to server

EXERCISES

1. COMPLETE THESE DEFINITIONS WITH THE CORREC T PARTICIPLE OF THE VERB GIVEN IN
BRACKETS.
1. A gateway is an interface ………..……….. (enable) dissimilar communication networks.

2. A bridge is a hardware and software combination ………..……….. (use) to connect the same
type of network.

3. A backbone is a network transmission path ………..……….. (handle) significant data traffic.

4. A router is a particular computer ………..……….. (direct) messages when several networks are
linked.

5. A network is many computers and peripherals ………..……….. (link) together.

6. A LAN is a network ………..……….. (connect) computers over a small distance, such as within a
company.

7. A server is a powerful computer ………..……….. (store) many programs ………..……….. (share)


by all the clients in the network.

8. A client is a network computer ………..……….. (use) for accessing a service on a server.

9. A thin client is a simple computer ………..……….. (comprise) only a processor, memory, display,
keyboard, mouse, and hard drives.

10. A hub is an electronic device ………..……….. (connect) all the data cabling in a network.

2. LINK THESE STATEM ENTS USING A RELATIV E CLAUSE WITH A PARTICIPLE.


1. a. The technology is here today.

b. A home network is needed to set up.

2. a. You only need one network printer.

b. It is connected to the server.

3. a. Her house has a network.

64 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

b. It allows basic file-sharing and multi-player gaming.

4. a. There is a line receiver in the living room.

b . It delivers home entertainment audio to speakers.

5. a. Eve has designed a site.

b. It is dedicated to dance.

6. a. She has built-in links.

b. They connect her site to other dance sites.

7. a. She created the site using a program called Netscape Composer.

b. It is contained in Netscape Communicator.

8. a. At the center of France Telecom’s home of tomorrow is a network.

b. It is accessed through a Palm Pilot-style control pad.

9. a. The network can simulate the owner’s presence.

b. This makes sure vital tasks are carried out in her absence.

10. a. The house has an electronic doorkeeper.

b. It is programmed to recognize you.

c. This gives access to family only

VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.

In these flash cards, direct under the word, you will find other forms of the same word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.

The keyword is then defined in straightforward, easy-to-understand English.

dramatic adj. something that captures the imagination; exciting

v. dramatize syn. emotional

n. drama

65 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

The dramatic finish to the game left us speechless.

The hurricane dramatically changed the coastline.

elaborate adj. something with many parts; fill of details

v. elaborate syn. complex

n. elaboration

An elaborate headdress indicated rank within the Aztec community.

His elaboration of the issue was quite thorough.

hazardous adj. very risky, unsafe

n. hazard syn. dangerous

Handling flammable liquids is hazardous.

There are many hazards involved with starting a business.

minuscule adj. of little consequence; tiny

adj. minute syn. tiny

n. minutia

The building sale had a minuscule effect on the corporation's profits.

Some leaves are covered with minute hairs.

prime v. to make ready; first in importance, time, or quality

adj. primed syn. prepare

adj. prime

n. prime

The directors primed the actors before the performance.

Mozart passed away in the prime of his life.

66 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

rudimentary adj. simple; not complex

n. rudiments syn. basic

He has a rudimentary knowledge of computers.

The rudiments of grammar are taught in all English classes.

vigorous adj. powerful, full of action

n. vigor syn. strong

His vigorous defense of the issues impressed everyone.

He approached his work with vigor.

amenity n. something that makes life easier or more enjoyable

syn. convenience

She had all the amenities of life when she went camping.

One expects many amenities at a five-star hotel.

67 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

UNIT 9

HOW TCP/IP LINKS DISSIMILAR


MACHINES
At the heart of the Internet Protocol (IP) portion of TCP/IP is a concept called the Internet address.
This 32-bit coding system assigns a number to every node on the network. There are various types
of addresses designed for networks of different sizes. However, you can write every address with
numbers identifying the primary network and the sub-networks to which a node is attached.
Besides identifying a node, the address provides a path that gateways can use to route
information from one machine to another.

Although data-delivery systems like Ethernet or X.25 bring packets to any machine electrically
attached to the cable, the IP modules must know each other’s Internet addresses to
communicate. A machine acting as a gateway connecting different TCP/IP networks will have a
different Internet address on each network. Internal look-up tables and software based on
another standard, Resolution Protocol, route the data through a network gateway.

Another piece of software works with the IP-layer programs to move information to the proper
application on the receiving system. This software follows a standard called the User Datagram
Protocol (UDP). You can think of the UDP software as creating a data address in the TCP/IP
message that states precisely what application the data block is supposed to contact at the
address the IP software has described. The UDP software provides the final routing for the data
within the receiving system.

The Transmission Control Protocol (TCP) part of TCP/IP comes into operation once the packet is
delivered to the correct Internet address and application port. Software packages that follow the
TCP standard run on each machine establish a connection to each other and manage the
communication exchanges. A data-delivery system like Ethernet doesn’t promise to deliver a
packet successfully. Neither IP nor UDP knows anything about recovering packets that aren’t
successfully delivered. However, TCP structures and buffers the data flow looks for responses, and
takes action to replace missing data blocks. This concept of data management is called reliable
stream service.

After TCP brings the data packet into a computer, other high-level programs handle it. Some are
enshrined in official US government standards, like the File Transfer Protocol (FTP) and the Simple
Mail Transfer Protocol (SMTP). Suppose you use these standard protocols on different kinds of
computers. In that case, you will at least have ways of quickly transferring files and other kinds of
data.

Conceptually, software that supports the TCP protocol stands alone. It can work with data
received through a serial port, over a packet-switched network, or from a network system like
Ethernet. TCP software doesn’t need to use IP or UDP; it doesn’t have to know they exist. But in
practice, TCP is an integral part of the TCP/IP picture and is most frequently used with those two
protocols.

68 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

EXERCISES

1. M ARK THE FOLLOWIN G STATEMENTS AS TRUE OR FALSE:


a. Internet addresses are an integral part of the IP protocol.

b. Internet addresses can be written as a series of numbers.

c. UDP software provides the final routing for data within the receiving system.

d. UDP recovers packets that aren’t successfully delivered.

e. TCP only works with packet-switched networks.

f. TCP only works when it is combined with IP.

2. FIND THE ANSWERS TO THESE QUESTIONS I N THE FOLLOWING TEXT .


1. What purpose does the Internet address have apart from identifying a node?

2. What data-delivery systems are mentioned in the text?

3. What do IP modules need to know about each other to communicate?

4. How many Internet addresses does a gateway have?

5. What does UDP software do?

6. When does the TCP part of TCP/IP come into operation?

7. What processes are performed by TCP software to provide reliable stream service?

8. What standard protocols are mentioned to deal with the data after TCP brings it into the
computer?

3. M ATCH THE TERMS I N TABLE A WITH THE STATEMENTS IN TABLE B .

TABLE A

a. Internet address

b. Resolution Protocol

c. Look-up table

d. Gateway

e. User Datagram Protocol

f. Transmission Control Protocol

69 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

TABLE B

i. Standard used for software that routes data through a gateway

ii. Standard used by software that moves information to the correct application on the receiving
system of a network

iii. Standard used by software that manages communication exchanges between computers on
the Internet

iv. A 32-bit number identifying a node on an IP network

v. Stored information used to route data through a gateway

vi. A device for connecting dissimilar networks

VOCABULARY SECTION

This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.

In these flash cards, direct under the word, you will find other forms of the same word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.

The keyword is then defined in straightforward, easy-to-understand English.

erratic adj. no regular pattern in thinking or movement; changeable without reason

syn. inconsistent

The artist’s paintings have an erratic quality, some excellent and others mediocre.

The unstable chemical reacted erratically.

exaggerate syn. embellish

adj. exaggerated v. to make something more than what it is

n. exaggeration

The federal government exaggerated the success of its programs.

To say that his business is booming would be an exaggeration.

70 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

burgeon v. grow at a fast pace

adj. burgeoning syn. thrive

The burgeoning population of major cities is creating a demand for more services.

His talent as a pianist burgeoned at the age of 14.

conspicuously adv. attracting attention

adj. conspicuous syn. noticeably

His name was conspicuously absent from the list of winners.

The attorneys were conspicuous for their aggressive manner in the courtroom.

dignitary n. a very important or famous person, usually associated with a high position in
government

syn. notable

Every dignitary in Washington was invited to the wedding.

All of the high-ranking dignitaries attended the economic summit.

elude v. to escape in a tricky way

adj. elusive syn. evade

n. elusiveness

The criminal has eluded the police for months.

Success has been elusive for the team.

exhaust v. to use completely; to expend all energy; very y thorough

adj. exhaustive syn. deplete

adj. exhausting

adj. exhausted

n. exhaustion

They exhausted their energy in 10 minutes.

71 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

Everyone acclaimed the exhaustive report.

facet n. element or component

adj. faceted syn. aspect

The proposal had many beneficial facets.

It was a multifaceted problem that challenged the entire student body.

ample adj. more than enough

syn. sufficient

There is ample evidence that the young man was speeding when the accident occurred.

She was amply paid for the work she completed.

arid adj. having little rain or water

syn. dry

The area known as the Sahara Desert is one of the most arid places in the world.

The valley on the leeward side of the mountain was extremely arid.

defy v. to show little fear or regard for rules or established norms; to challenge

adj. defiant syn. resist

adj. defying

n. defiance

I defy you to find that book in the library’s collection.

The circus performer demonstrated her death-defying routine.

enact v. to pass a law

adj. enacted syn. legislate

n. enactment

Congress enacted the legislation during its last session.

72 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

The enactment of the laws was in the hands of the Senate.

feign v. to pretend, make believe

adj. feigned syn. simulate

She feigned illness when it was time to visit the dentist.

Her unhappiness was feigned.

indiscriminate adj. not chosen carefully; unplanned

syn. arbitrary

The indiscriminate arrangement of the products made the store confusing.

The book’s chapters seem to be organized indiscriminately.

73 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

UNIT 10

EMAIL PROTOCOLS
Although the format of a mail message, as transmitted from one machine to another, is rigidly
defined, different mail protocols transfer and store messages in slightly different ways. The mail
system you’re probably used to employs a combination of SMTP and POP3 to send and receive
mail, respectively. Others may use IMAP4 to retrieve mail, especially with limited or expensive
bandwidth.

Simple Mail Transfer Protocol

SMTP is used to transfer messages between one mail server and another. It’s also used by email
programs on PCs to send mail to the server. SMTP is very straightforward, providing only facilities to
deliver messages to one or more recipients in batch mode. Once a message has been delivered,
it can’t be recalled or canceled. It’s also deleted from the sending server once it’s been delivered.

SMTP uses a ‘push’ operation, meaning that the connection is initiated by the sending server rather
than the receiver. This makes it unsuitable for delivering messages to desktop PCs, which aren’t
guaranteed to be switched on at all times.

In host-based mail systems, such as Unix and Webmail, SMTP is the only protocol the server uses.

Received messages are stored locally and retrieved by the mail program from the local file system.
In the case of Webmail, the message is then translated into HTML and transmitted to your browser.
SMTP is the only protocol for transferring messages between servers. How they’re then stored varies
from system to system.

Post Office Protocol

POP is a message-retrieval protocol used by many PC mail clients to get messages from a server,
typically your ISP’s mail server; it only allows you to download all messages in your mailbox
simultaneously. It works in pull’ mode, with the receiving PC initiating the connection. PC-based
POP3 mail clients can do this automatically at a preset interval. When you use your Webmail
account to access a POP3 mailbox, the mail server opens a connection to the POP3 server just as
a PC-based application would. The messages are copied into your Web mailbox and read via a
browser.

Since POP3 downloads all the messages in your mailbox, there’s an option to leave messages on
the server so that they can be picked up from different machines without losing any. This means
you’ll get every message downloaded every time you connect to the server; if you don’t clean
out your mailbox regularly, this could mean long downloads. When using a Webmail account to
retrieve POP3 mail, be careful about leaving messages on the server - if too many build up, each

74 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

download will take a long time and fill up your inbox. Many Webmail systems won’t recognize
messages you’ve already downloaded, so you’ll get duplicate ones you haven’t deleted.

Internet Mail Access Protocol

IMAP is similar to POP but allows you to choose what messages you download. Initially, only
message headers are retrieved, giving information about the sender and subject. You can then
download just those messages you want to read. You can also delete individual messages from
the server, and some IMAP4 servers let you organize your mail into folders. This shortens download
times, and there’s no danger of losing messages.

EXERCISES

1. M ARK THE FOLLOWING S TATEMENTS AS TRUE OR FALSE:


a. Different mail systems transfer emails in different ways.

b. IMAP4 requires more bandwidth than the other email protocols.

c. SMTP is used for sending emails from a PC to a server.

d. SMTP delivers messages one at a time.

e. SMIP does not allow a delivered message to be canceled.

f. SMTP is only one of many protocols used to send mail between servers.

g. POP protocol allows the user to download one message at a time.

2. FIND THE ANSWERS TO THESE QUESTIONS IN THE FOLLOWING TEXT.


1. Name three different email protocols mentioned in the text.

2. Which email protocol is used to transfer messages between server computers?

3. Why is SMIP unsuitable for delivering messages to desktop PCs?

4. Name two host-based mail systems mentioned in the text.

5. Where are email messages stored in an SMTP system?

6. What happens when you use your Webmail account to access a POP3 mailbox?

7. Give an advantage and a disadvantage of having an option to leave POP3 messages


on the server.

8. What are the advantages of using the IMAP4 protocol?

75 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

3. M ATCH THE TERMS IN T ABLE A WITH THE STAT EMENTS IN TABLE B

TABLE A

a. SMTP

b. ‘Push’ operation

c. POP

d. ‘Pull’ operation IMAP

e. IMAP

TABLE B

i. An email transfer process in which the connection is initiated by the sending computer
rather than the receiving computer.

ii. A mail transfer protocol that initially only retrieves the message headers.

iii. An email transfer process in which the receiving computer initiates the connection.

iv. A simple mail transfer protocol to send messages between servers.

v. A message protocol that downloads all email messages simultaneously.

VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.

In these flash cards, direct under the word, you will find other forms of the same word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.

The keyword is then defined in straightforward, easy-to-understand English.

Withstand v. to fight without surrender; to persist

syn. Survive

She cannot withstand the pressures of her job.

The old building withstood the terrible storm.

Harbor v. to give protection; to not express usually negative desire or opinion

76 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

syn. shelter

He harbors ill feelings for her.

They harbored the political refugee in their home.

Encompass v. to surround; to envelop

syn. include

Her plan of study encompasses every aspect of computer science.

The course encompasses all the literature of the nineteenth century.

Inadvertently adj. inadvertent

adv. by accident; without paying attention; unexpectedly

syn. Carelessly

The reporters had inadvertently failed to include the name of one of the dignitaries.

His inadvertent calculation caused him to derive the wrong answer.

Miraculously adv. caused by something that cannot be explained by the laws of nature

adj. miraculous

n. miracle

syn. astonishingly

Miraculously, he was unharmed after being hit by lightning.

Given the extent of her injuries, it is almost a miracle that she is still alive.

Retrieve v.to find and bring back.

adj. retrieved

syn. recover

n. retrieval

Will Detroit retrieve its status as the world's car manufacturing center?

77 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

This computerized information retrieval system is the most up-to-date system available.

Unwarranted adj. without good reason or cause; inappropriate

syn. Unjustified

His adverse reaction was unwarranted.

The motorist felt that the ticket for the infraction was unwarranted.

Zenith n. the highest point

syn. Apex

He reached the zenith of his profession at a very young age.

The publication of the book represented the zenith of his career.

78 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

UNIT 11

XML TAKES ON HTML


Standard Generalized Markup Language (SGML) is the language that spawned both HTML (Hyper
Text Markup Language) and XML (extensible Markup Language). SGML is not an actual language;
it is a meta-language, a language from which you can create other languages. In this case, it
creates a markup language (encoded instructions for structuring and formatting electronic
document elements).

HTML is an application-specific derivation of SGML. It is a set of codes, generally used for web
pages, that creates electronic documents according to rules established by SGML. HTML is a
language about presenting your information, not the actual data. You can, therefore, say that
HTML is a presentation language.

XML is a subset of SGML, but it is also, like SGML, a meta-language. XML defines a specific method
for creating text formats for data so that files are program-independent and platform-
independent and support internationalization (able to read different languages, etc.). Because
XML is an extensible language, you don’t even have to have a browser to interpret the page.
Applications can parse the XML document and read the information without human intervention.

XML, unlike HTML, is concerned with the identity, meaning, and structure of data. XML is extensible
because it lets website developers create their own set of customized tags for documents. This
ability to define your tags is the main feature of XML, which gives developers more flexibility.

By defining your markup tags, you can explicitly define the content in the document. This makes
XML a more intelligent markup language than HTML. For example, in HTML, you could have a
paragraph tag <p> preceding a paragraph about baseball. Your Web browser sees this tag and
knows to present the following text as a paragraph. However, all your browser knows about the
text is that it is text; it doesn’t know that it is specifically about baseball. In an XML document, you
could define a

<BASEBALL> tag to refer specifically to the text in the paragraph in your document. This way, when
your XML browser examines the document, the document knows what data it contains, and that
makes the content more intelligent. Search engines that use XML data can better find the pages
you are looking for because of the intelligent nature of XML content.

By design, XML does not deal with how the end user displays the data. Because HTML is a
presentation language, XML documents use HTML tags to help handle the visual formatting of the
document. Also, you can use XML in your HTML documents to provide metadata, which is data
about data in the document.

XML will do what HTML initially did to the Web and e-commerce to the Internet. XML and its
associated applications have the potential to blow the roof off the Internet and how we do
business.

79 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

EXERCISES

1. M ARK THE FOLLOWING S TATEMENTS AS TRUE OR FALSE:


a. HTML is no longer valid for creating web pages.

b. SGML is more complex than XML

c. XML files can only be used on Unix systems.

d. XML files can only be read by browser programs

e. HTML is a markup language.

f. Internet searches will be better with XML files.

2. FIND THE ANSWERS TO THESE QUESTIONS IN THE FOLLOWING TEXT.


1. What languages were derived from SGML?

2. What language is used to structure and format document elements?

3. Name two meta-languages.

4. What elements of data is XML (but not HTML) concerned with?

5. What is meant by the term ‘extensible’?

6. What makes XML a more intelligent language than HTML?

7. What does the HTML markup tag, p, indicate?

8. Why can search engines do a better job with XML documents?

9. What type of website is particularly likely to benefit from XML?

3. M ATCH THE TERMS IN T ABLE A WITH THE STAT EMENTS IN TABLE B.

TABLE A

a. Metadata

b. Meta-languages

c. HTML

d. XML

e. Markup language

80 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

TABLE B

ii. Extensible markup language

iii. A coding system used for structuring and formatting documents

iv. Data about data

v. An example of a page presentation Language

vi. A language from which you can create other languages

VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.

In these flash cards, direct under the word, you will find other forms of the same word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.

The keyword is then defined in straightforward, easy-to-understand English.

abuse n. the act of using or treating things incorrectly.

adj. abusive

v. abuse

syn. Misuse

The constant abuse of the environment will have grave consequences in the future.

He received an abusive letter from an irate citizen.

allocation n. a share; a part set aside for a particular purpose; an assignment of portions

adj. allocated

v. allocate

syn. Distribution

His allocation of materials was gradually used up.

Allocating office space in the building was a difficult task.

81 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

conservation n. the act of using carefully; setting aside for future use, favoring traditional
values

v. conserve

n., adj. conservative

n. conservationist

n. conservatism

syn. Preservation

Conservation of forest land is the primary objective of the National Forest Service.

The Republican Party is generally known to be more conservative than the Democratic Party.

feasible adj. able to be done

n. feasibility

syn. possible

It is a feasible design for the high-rise building.

Before they begin the project, a study must be done of its feasibility.

limber adj. to be stretched, easily shaped

syn. flexible

The dancer has a limber body.

She was able to make the limber movements that are required of gymnasts.

preconception n. an opinion formed in advance without experience or knowledge


of something

adj. perceived

v. preconceive

syn. Bias

82 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

It is not easy to overcome preconceptions if we are not open to new ideas. His preconceived
notions about Los Angeles disappeared after he visited the city.

robust adj. showing good health; in good shape

n. robustness

syn. strong

The robust economy is expected to continue growing.

The new product is selling robustly.

antiquated adj. too old to be presently applicable; outmoded

n., adj. antique

n. antiquity

syn. old-fashioned

This antiquated machinery breaks down too frequently.

Their home is filled with antique furniture.

83 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

UNIT 12

BROADBAND COMMUNICATIONS
Integrated Services Digital Network (ISDN)

ISDN services can be carried over existing telephone network infrastructure to terminal adapters
(TAs) in the client machine. A common ISDN interface standard has a digital communications line
consisting of three independent channels: two Bearer (B) channels, each at 64Kbit/s, and one
Data (D) channel at l6Kbit/s. The D channel is used to carry signaling and supervisory information
to the network. In contrast, the B channels carry the data and can be linked to provide a l28Kbit/s
data channel.

Wireless connections

The wireless alternatives come in two forms: satellite and cellular. Satellite systems require the use
of a modem to maintain the upload. Downstream bandwidth is provided via a dedicated satellite
dish, connector hardware, and proprietary software.

Cellular systems use assigned radio frequencies and are based around a network of transmitters
arranged in a cellular network, much like cellular mobile phone systems.

The cable alternative

Cable companies can offer affordable broadband services over copper coaxial or fiber
infrastructure networks. Several customers share the connection on a branch, so connection rates
are variable, unlike ISDN and DSL.

Digital Subscriber Line (DSL)

DSL technology capitalizes on the existing network of copper infrastructure but allows digital
signals to be carried rather than analog. It allows the total bandwidth of the copper twisted-pair
telephone cabling to be utilized.

With splitter-based services, the DSL signal is pulled out from the phone line as it enters your
premises and is wired separately to a DSL modem. This involves additional hardware and
installation by the service provider at the customer site. The shielded option involves no installation,
but the telephone company’s equipment and some of your equipment might need upgrading.

With Asymmetric Digital Subscriber Line (ADSL), most of the duplex bandwidth is devoted to the
downstream direction, with only a tiny proportion of bandwidth available upstream. Much Internet
traffic through the client’s connection, such as Web browsing, downloads, and video streaming,
needs high downstream bandwidth. However, user requests and responses are less significant and
require less upstream. In addition, a small proportion of the downstream bandwidth can be
devoted to voice rather than data, allowing you to hold phone conversations without requiring a
separate line.

84 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

DSL-based services are a very low-cost option compared to other solutions offering similar
bandwidth, so they can be made available to the customer at highly competitive prices.

EXERCISES

1. M ARK THE FOLLOWING S TATEMENTS AS TRUE OR FALSE:


a. ISDN can only operate over a particular digital telephone line.

b. Two ISDN channels can be combined to give the user double the bandwidth.

c. Computers connected to a satellite system do not need a modem.

d. Cellular networks work similarly to mobile phone systems.

e. DSL systems require a particular digital telephone line.

f. DSL systems use analog signals.

g. You need a separate time to hold regular phone conversations on an ADSL system.

2. FIND THE ANSWERS TO THESE QUESTIONS IN THE FOLLOWING TEXT.


1. How many channels does an ISDN system commonly use?

2. What types of wireless systems are named in the text?

3. What do PCs connected to a satellite system use to send data?

4. What types of cables are used in cable network systems?

5. What may need to be upgraded when using a shielded DSL system?

6. Compared to the downstream bandwidth, the upstream bandwidth in an ADSL line is:

a. larger

b. smaller

c. the same

7. Which type of broadband service is the cheapest?

3. M ATCH THE TERMS IN T ABLE A WITH THE STAT EMENTS IN TABLE B.

TABLE A

a. ISDN

b. TA

c. Data channel

85 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

d. Bearer channel

e. DSL

f. Splitter-based services

g. ADSL

TABLE B

i. DSL system that separates the digital signals from the analog signals

ii. Digital channel used to carry ISDN signaling and supervisory information to the network

iii. Device installed on a PC to allow it to receive ISDN signals

iv. Integrated Services Digital Network

v. Asymmetric Digital Subscriber Line

vi. Digital channel used to carry ISDN data

vii. Digital Subscriber Line

VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.

In these flash cards, direct under the word, you will find other forms of the same word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.

The keyword is then defined in straightforward, easy-to-understand English.

assimilate v. to become a part of

n. assimilation

syn. incorporate

The United States of America has assimilated people from around the world.

Assimilation of a new cultural environment can be difficult.

caliber n. the standard of the degree of goodness

86 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

syn. Quality

The high caliber of her work earned her a raise in pay.

Only parts of the highest caliber can be used to repair the spacecraft.

requisite adj. needed for a specific purpose a formal request

v. require

n. requirement

n. requisition

v. requisitions

syn. Required

Here is the list of requisite courses for the master’s degree in biology.

The project team made a requisition for a new set of reference books.

unravel v. to organize; to make clear

n. unraveling

syn. Separate

The detective was not able to unravel the mystery of the missing money.

The unraveling of the Soviet Union took place in the span of a few months.

charisma n. a remarkable quality that endears other people to the person who has this
quality

adj. charismatic

syn. appeal

She has a charisma that no other candidate possesses.

John F. Kennedy was known for his charismatic personality.

endure v. to last; to suffer pain

87 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

adj. endurable

adj. enduring

n. endurance

syn. Persevere

How he can endure living next to the airport is beyond my comprehension.

The endurance displayed by the athlete gave evidence of his rigorous training.

forfeit v. to give up; to have something taken away, usually by rule or regulation

n. forfeit

syn. Relinquish

Usually, it would be best if you forfeited your native country’s citizenship to become a citizen of
another country.

The forfeit occurred because not enough players showed up.

precarious adj. not safe, firm, or steady

syn. hazardous

The diver put himself in a precarious situation among the sharks.

The cup was positioned precariously on the edge of the table.

88 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

UNIT 13

SAFE DATA TRANSFER


Secure transactions across the Internet have three goals. First, the two parties engaging in a
transaction (say, an email or a business purchase) don’t want a third party to be able to read their
transmission. Some form of data encryption is necessary to prevent this. Second, the receiver of
the message should be able to detect whether someone has tampered with it in transit. This calls
for a message-integrity scheme. Finally, both parties must know that they’re communicating with
each other, not an impostor. This is done with user authentication.

Today’s data encryption methods rely on a technique called public-key cryptography.

Everyone using a public-key system has a public key and a private key. Messages are encrypted
and decrypted with these keys. A message encrypted with your public key can only be decrypted
by a system that knows your private key.

For the system to work, two parties engaging in a secure transaction must know each other’s
public keys. Private keys, however, are closely guarded secrets known only to their owners.

When I want to send you an encrypted message, I use your public key to turn my message into
gibberish. Only you can return the gibberish to the original message because only you know your
private key. Public-key cryptography also works in reverse - only your public key can decipher
your private key’s encryption.

To make a message tamper-proof (providing message integrity), the sender runs each message
through a message-digest function. This function within an application produces a number called
a message-authentication code (MAC). The system works because it’s almost impossible for an
altered message to have the same MAC as another message. Also, you can’t take a MAC and
turn it back into the original message.

The software used for a given exchange produces a MAC for a message before it’s encrypted.
Next, it encrypts the MAC with the sender’s private key. It then encrypts both the message and
the encrypted MAC with the recipient’s public key and sends the message.

When the recipient gets the message and decrypts it, they also get an encrypted MAC. The
software takes the message, runs it through the same message-digest function the sender used,
and creates its own MAC. Then, it decrypts the sender’s MAC. The message hasn’t been tampered
with if the two are the same.

The dynamics of the Web dictate that a user- authentication system must exist. This can be done
using digital certificates.

A server authenticates itself to a client by sending an unencrypted ASCII-based digital certificate.


A digital certificate contains information about the company operating the server, including the
server’s public key. The digital certificate is signed by a trusted digital certificate issuer, which
means that the issuer has investigated the company operating the server and believes it to be
legitimate. If the client trusts the issuer, then it can trust the server. The issuer ‘signs’ the certificate

89 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

by generating a MAC for it, then encrypts the MAC with the issuer’s private key. If the client trusts
the issuer, it already knows its public key.

The dynamics and standards of secure transactions will change. However, the three basic tenets
of secure transactions will remain the same. If you understand the basics, you’re already three
steps ahead of everyone else.

EXERCISES

1. M ARK THE FOLLOWING S TATEMENTS AS TRUE OR FALSE:


a. Anyone can decrypt a message encrypted with a public key.

b. To send a secure message, you must know the recipient’s public key.

c. Secure messages usually are encrypted using a private key before they are sent.

d. A message can be reconstructed from its MAC.

e. Two messages can often have the same MAC.

f. A trusted digital certificate issuer should sign a digital certificate.

g. A MAC checks that a message has not been tampered with.

h. The message is decrypted with the recipient’s private key.

i. The recipient receives the message.

j. The message is encrypted with the recipient’s public key.

k. The sender sends the message.

2. FIND THE ANSWERS TO THESE QUESTIONS IN THE FOL LOWING TEXT.


1. What does data encryption provide?

a. privacy

b. integrity

c. authentication

2. A message encrypted with the recipient’s public key can only be decrypted with

a. the sender’s private key

b. the sender’s public key

c. the recipient’s private key

3. What system is commonly used for encryption?

90 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

4. What is the opposite of ‘encrypt’?

5. The message-digest function is used to:

a. authenticate a user

b. create a MAC

c. encrypt a message

6. What information does a digital certificate give to a client?

3. M ATCH THE TERMS IN T ABLE A WITH THE STAT EMENTS IN TABLE B.

TABLE A

a. Gibberish

b. Impostor I

c. Decipher

d. MAC

e. Tenets

f. Tamper

TABLE B

i. Message-authentication code

ii. Principal features

iii. Meaningless data

iv. Person pretending to be someone else

v. Make unauthorized changes

vi. Convert to meaningful data

4. M ATCH THE FUNCTIONS IN TABLE 1 WITH THE KEYS IN TABLE 2.

TABLE 1

a. to encrypt a message for sending

b. to decrypt a received message

c. to encrypt the MAC of a message

91 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

d. to encrypt the MAC of a digital signature

TABLE 2

i. sender’s private key

ii. trusted issuer’s private key

iii. the recipient’s private key

iv. the recipient’s public key

5. RE AD THE WHOLE FOLLOWING PASSAGE (THE AN ATOMY OF A VIRUS) TO FIND THE


ANSWER TO THESE QUESTI ONS.
1. How are computer viruses like biological viruses?

2. What is the effect of a virus patching the operating system?

3. Why are some viruses designed to be loaded into memory?

4. What examples of payload does the writer provide?

5. What kind of programs do virus routine to its function:

Routine

1. misdirection

2. reproduction

3. rigger

4. payload

Function

a. does the damage

b. attacks a copy of itself to another program

c. hides the presence of code

d. decide when and how to activate the payload

THE ANATOMY OF A VIRUS


A biological virus is a tiny, simple organism that infects living cells, known as the host, by attaching
itself to them and using them to reproduce itself. This often causes harm to the host cells.

92 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

Similarly, a computer virus is a minimal program routine that infects a computer system and uses
its resources to reproduce itself. It often does this by patching the operating system to enable it to
detect program files, such as COM or EXE files. It then copies itself into those files. This sometimes
causes harm to the host computer system.

When the user runs an infected program, it is loaded into memory carrying the virus. The virus uses
a common programming technique to stay resident in memory. It can then use a reproduction
routine to infect other programs. This process continues until the computer is switched off.

The virus may also contain a payload that remains dormant until a trigger event activates it, such
as the user pressing a particular key. The payload can have a variety of forms. It might do
something relatively harmless, such as displaying a message on the monitor screen, or it might do
something more destructive, such as deleting files on the hard disk.

When it infects a file, the virus replaces the first instruction in the host program with a command
that changes the typical execution sequence. This type of command is known as a JUMP
command. It causes the virus instructions to be executed before the host program. The virus then
returns control to the host program, which continues with its normal sequence of instructions and
is executed typically.

To be a virus, a program only needs a reproduction routine that enables it to infect other
programs. Viruses can, however, have four main parts. A misdirection routine that enables it to
hide itself; a reproduction routine that allows it to copy itself to other programs; a trigger that
causes the payload to be activated at a particular time or when a particular event takes place;
and a payload that may be a reasonably harmless joke or may be very destructive. A program
that has a payload but does not have a reproduction routine is known as a Trojan.

STRUCTURE

STRUCTURE
A phrasal verb is a verb + preposition combination. For example, look up, take down, and turn
over. Phrasal verbs are common in informal, spoken English. Sometimes, they have a more formal
one-word equivalent, for example, work out = determine.

Often, phrasal verbs have two meanings.

One, we can work out the meaning of the two words separately:

She looked up at the roof.

A special meaning which does not easily relate to the separate meanings of the words:

She looked up a word in the dictionary.

EXERCISES

1. Study these phrasal verbs:

93 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

break into keep at

get into throw away

hack into log on

go about log out

set about find out

keep ahead track down

grow up hand over

phone up shut down

run up

NOW, COMPLETE E ACH BLANK WITH THE APPROPRIATE PHRASAL VERB IN THE CORRECT
FORM. IN SOME CASES, MORE THAN ONE ANSWER IS POSSIBLE.
1. Hackers try to …….…….... passwords so they can penetrate a system.

2. Don’t………….. your password to anyone who asks for it.

3. The police ……..…. Ralph ……..….by talking to his friends and acquaintances.

4. Some hackers………….…. systems to get commercially valuable information.

5. When you………………..to a network, you must provide an ID.

6. How do you………………..hacking into a system?

7. Hackers may ………….….., pretending to be from your company and ask for your
password.

8. Never…………….your credit card receipts where someone can find

them.

9. Ralph was a hacker as a teenager, but he’s ……………. now and become more
responsible.

10 ………………..a system is strictly illegal nowadays.

11. It’s a constant race to…………..of the hackers.

2. REPLACE THE VERB IN ITALICS WITH A PHRAS AL VERB OF SIMILAR M EANING.


1. I don’t discard your credit card receipts; they could help fraudsters.

94 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

2. Trying to penetrate computer systems is against the law.

3. The typical hacker is a young person who has not matured.

4. The best way to begin hacking into a system is to try to get hold of a password.

5. If someone telephones you and asks for your password, don’t

provide it.

6. Hackers closed Hotmail for five hours.

7. Hackers accumulated a telephone bill of $1m for Scotland Yard.

8. The difficult thing was to determine how the website would look.

9. So you won’t forget, record the ID number the support technician gives you.

10. Examine the manufacturers’ websites before you phone for help.

VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.

In these flash cards, direct under the word, you will find other forms of the same word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.

The keyword is then defined in straightforward, easy-to-understand English.

sacrifice n. the act of giving up something of value for the common good

adj. sacrificial

v. sacrifice

syn. Concession

He sacrificed his day off to help clean up the neighborhood.

She made sacrifices to be able to attend the university.

triumph n. a victory; a success

adj. triumphant

95 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

adj. triumphal

v. triumph

syn. Achievement

His career was characterized by one triumph after another.

He triumphed over all of his difficulties.

contaminated adj. to make something impure by adding something dirty or poisonous

v. contaminate

n. contamination

syn. Polluted

This contaminated water supply must be closed to the public.

Bacteria and insects are frequent agents of food contamination.

flourishing adj. active and growing; healthy

v. flourish

syn. thriving

An increase in the minimum wage would harm small, flourishing companies.

A young mind will flourish with the proper guidance.

negligible adj. hardly noticeable; scarcely detectable, to ignore; to give minor attention

adj. neglected

adj. neglectful

adj. negligent

n. neglect

n. negligence

syn. Insignificant

The presence of the first person singular in the poem was almost negligible.

96 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

His negligence caused him to lose all his work on the computer.

97 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

UNIT 14

OBJECT-ORIENTED PROGRAMMING
One of the principal motivations for using OOP is to handle multimedia applications in which such
diverse data types as sound and video can be packaged together into executable modules.
Another is writing program code that’s more intuitive and reusable; in other words, code that
shortens program development time.

Perhaps the key feature of OOP is encapsulation - bundling data and program instructions into
modules called ‘objects.’ Here’s an example of how objects work. Art icons on a display screen
might be called ‘Triangles.’ When the user selects the Triangles icon - an object composed of the
properties of triangles and other data and instructions - a menu might appear on the screen
offering several choices. The choices may be (1) create a new triangle and (2) fetch one already
in storage. The menu, too, is an object, as are its choices. Each time a user selects an object,
instructions inside the object are executed with whatever properties or data the object holds to
get to the next step. Triangle: The application might execute instructions that display several types
of triangles: right, equilateral, isosceles, and so on.

Many industry observers feel that the encapsulation feature of OUP is the natural tool for complex
applications in which speech and moving images are integrated with text and graphics. With
moving images and voice built into the objects themselves, program developers avoid the sticky
problem of deciding how each separate type of data is to be integrated and synchronized into
a working whole.

A second key feature of OOP is inheritance. This allows OOP developers to define one class of
objects, say ‘Rectangles,’ and a specific instance of this class, say ‘Squares’ (a rectangle with
equal sides). Thus, all properties of rectangles - ‘Has four sides’ and ‘Contains four right angles’ are
Squares automatically inherit the two shown here. Inheritance is a valuable property in rapidly
processing business data. For instance, consider a business with a class called ‘Employees at the
Dearborn Plant’ and a specific instance of this class, ‘Welders.’ If employees at the Dearborn plant
are eligible for a specific benefits package, welders automatically qualify. Suppose a welder
named John Smith is later relocated from Dearborn to Birmingham. Revision is simple in Alabama,
where a different benefits package is available. An icon representing John Smith - such as John
Smith’s face - can be selected on the screen and dragged with a mouse to an icon representing
the Birmingham plant. He then automatically ‘inherits’ the Birmingham benefit package.

A third principle behind OOP is polymorphism. Different objects can receive the exact instructions
but deal with them differently. For instance, consider again the triangles example. If the user right-
clicks the mouse on ‘Right triangle,’ a voice clip might explain the properties of right triangles.
However, if the mouse is right-clicked on ‘Equilateral triangle,’ the voice explains the properties of
equilateral triangles instead.

The combination of encapsulation, inheritance, and polymorphism leads to code reusability.


‘Reusable code’ means that new programs can easily be copied and pasted together from old
programs. All one has to do is access a library of objects and stitch them into a working whole.

98 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

This eliminates the need to write code from scratch and then debug it. Code reusability makes
both program development and program maintenance faster.

EXERCISES

1. FIND THE ANSWERS TO THESE QUESTIONS IN THE FOLLOWING TEXT.


1. What advantages of using object-oriented programming are mentioned in the text?

2. What are the three critical features of OOP?

3. What multimedia data types are referred to in the text?

4. List the different types of triangles mentioned in the text.

5. What feature avoids the problem of deciding how each separate data type is
integrated and synchronized into a working whole?

6. What specific type of rectangle is named in the text?

7. What common properties of a rectangle are mentioned in the text?

8. What features are made quicker by code reusability?

2. COMPLETE THE FOLLOWI NG TEXT USING WORDS FROM THE RE ADING TEX T:
Encapsulation, …………and polymorphism are critical features of

….…………. programming.

Encapsulation allows data and program instructions to be bundled together


in………………called objects. Inheritance means that specific of a class of objects
………….. the properties of the class of objects. Polymorphism means that instructions are
treated differently by different……………. The combination of these features of
OOP means that program code is reusable. This speeds up …….…….. and………………of
programs.

3. M ATCH THE TERMS IN T ABLE A WITH THE STATEMENT S IN TABLE B.

TABLE A

a. OOP

b. Encapsulation

c. Object

d. Menu

e. Square

99 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

f. Polymorphism

g. Library

TABLE B

i. An OOP property that allows data and program instructions to be bundled into an object

ii. A list of choices

iii. An OOP property that enables different objects to deal with the same instruction in
different ways

iv. A reusable collection of objects

v. A module containing data and program instructions

vi. Object-Oriented Programming

vii. A rectangle with equal sides

4. RE AD THE NEXT PAGE TEXTS: A, B, AND C THEN:

COMPLETE THIS TABLE. YOU MAY NOT FIND INFORM ATION FOR E ACH SE CTION OF YOUR
TABLE.

A B c

1. job title

2. nature of work

3. formal qualifications

4. personal qualities

5. technical skills

6. how to get started

7. how to make progress

A. HOW TO BECOME A PROGRAMMING EXPERT


The primary requirements for being a good programmer are nothing more than a good memory,
attention to detail, a logical mind and the ability to work through a problem methodically,
breaking tasks down into smaller, more manageable pieces.

100 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

However, it’s not enough to turn up for a job interview with a logical mind as your sole qualification.
An employer wants some formal qualifications and a proven track record. But if you can show
someone an impressive piece of software with your name on it, it will count for more than a string
of academic qualifications.

So, what specific skills are employers looking for? The Windows market is booming, and there’s a
demand for good C, C++, Delphi, Java, Visual Basic, and .net developers. Avoid older languages
such as FORTRAN and COBOL unless you want to work as a contract programmer.

For someone starting, my best advice would be to subscribe to programming magazines such as
Microsoft Systems Journal. Get one or two of the low-cost ‘student’ editions of C++, Visual Basic,
and Delphi. Get a decent book on Windows programming. If you decide programming is for you,
spend more on a training course.

B . How to become a computer consultant

The first key point to realize is that you can’t know everything. However, it would help if you didn’t
become an expert in a field that is too narrow. The second key point is that you must be interested
in your subject. The third key point is to differentiate between contract work and consultancy;
good contractors move from job to job every few months. A consultant is different. A consultant
often works on very small timescales - a few days here, a week there, but often for a care
collection of companies that keep coming back repeatedly.

There’s much work out there for people who know Visual Basic, C++, etc. And many people know
it too, so you have to be better than them. Qualifications are important. Microsoft has a raft of
exams you can take, as do Novell and Cisco; in my experience, these are instrumental pieces of
paper. Exams like Microsoft Certified Systems Engineer (MCSE) are well worth doing. The same
goes for NetWare Certification. However, this won’t guarantee an understanding of the product,
its positioning in the market, how it relates to other products, etc. That’s where the all-important
experience comes in.

Here’s the road map. After leaving university, you get a technical role in a company and spend
your evenings and weekends learning the tools of your trade - and getting your current employer
to pay for your exams. You don’t stay in one company for more than two years. After a couple of
hops like that, you may be able to move into a junior consultancy position in one of the larger
consultancy companies. By 30, you’ve run big projects, rolled out significant solutions, and are
well known. Maybe then it’s time to make the leap and run your life.

C. How to become an IT manager

IT managers manage projects, technology, and people. Any large organization will have at least
one IT manager responsible for ensuring that everyone who needs a PC has one and that it works
properly. This means taking responsibility for the maintenance of servers, installing new software,
and staffing a help desk and a support group. Medium to large companies are also likely to have

101 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

an IT systems manager. They are responsible for developing and implementing computer
software that supports the business's operations. They’re responsible for multiple development
projects and oversee the implementation and support of the systems. Companies will have two
or three significant systems that are probably bought off the shelf and then tailored by an in-house
development team.

Apart from basic hardware and software expertise, an IT manager will typically have over five
years’ experience in the industry. Most are between 30 and 45. Since it managers have to take
responsibility for budgets and for staff, employers look for both of these factors in any potential
recruit.

Nearly all IT managers have at least a first degree if not a second one. Interestingly, many of them
don’t have degrees in computing science. In any case, the best qualification for becoming a
manager is experience. Suppose your personality is such that you’re unlikely to be asked to take
responsibility for a small team or a project. In that case, you can forget being an IT manager. It
would help if you were bright and communicative and could earn your teams' trust. Most of this
can’t be taught, so if you don’t have these skills, divert your career elsewhere.

VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.

In these flash cards, direct under the word, you will find other forms of the same word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.

The keyword is then defined in straightforward, easy-to-understand English

plentiful adj. more than sufficient

n. plenty

syn. Abundant

Examples of Miro’s art are plentiful.

A balanced diet typically provides plenty of the necessary vitamins.

sheltered adj. protected from harmful elements; isolated from reality

n. shelter

v. shelter

102 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

syn. Protected

She has led a sheltered life since her parents have done everything for her.

Everyone looked for shelter from the blazing sun.

account n. a report of an event; money kept in a bank; a statement of something used or


received, usually a financial report

adj. accountable

v. account

n. accounting

n. accountant

syn. story

His account of the incident varied from that of the other witnesses.

We need an accounting of all the money spent.

hue n. color

syn. color

The hue of the sunset was beautiful.

The hue of the room gave it a warm feeling.

intricate adj. having many parts; finely detailed

n. intricacy

syn. complex

The intricate design of the vase made it a valuable piece for her collection.

I cannot begin to understand the intricacies of modern automobile motors.

magnitude n. of significant size or importance, to increase

adj. magnificent

v. magnify

103 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

n. magnification

syn. dimension

The magnitude of shock waves determines the damage that occurs during an earthquake.

The invention of the telephone was a magnificent achievement for humankind.

poll n. questionnaire; a vote of public opinion

n. polling

n. pollster

v. poll

syn. survey

The poll indicated that the conservation of the environment was the number one issue with
college students.

The pollster asked the questions in a nonpartisan manner.

104 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

UNIT 15

BECOMING CERTIFIED
Suppose you’re a support engineer. You’re stuck in a job you don’t like and want to change. One
way of making that change is to improve your marketability to potential employers by upgrading
your skill set. If you train yourself, however, whose training should you undertake? If you need
certificates, whose certificates should they be? Even if you get those certificates, how certain can
you be that your salary will rise? One solution is the range of certifications on offer from Microsoft.

Microsoft offers an extensive array of certification programmers aimed at anyone from the user of
a single program, such as Microsoft Word, to someone who wants to become a certified support
engineer. There are many certificates to study for, too; if you’re the proud holder of any of those
qualifications, you can call yourself a Microsoft Certified Professional (MCP).

Once you’ve decided which track you want to take, you should consider just how qualified you
already are in terms of experience and knowledge. Will you need to go and take some courses
with a training company, or are you the type who can make good use of self-study materials?
How much time do you genuinely have to devote to this? Will your employer pay for your course?
Will it grant you leave to go and do the course - assuming you can find one - on either a full-time
or part-time basis?

The critical question here is experience. This will not only influence the amount of work you’ll have
to do to get up to speed for the exams, but it could also mean the difference between passing
or failing the exam.

While you’re busy learning all you need to know for your certification, the practice exams are an
absolute godsend. They show you the type of questions you’ll encounter, and they familiarize you
with the structure of the exam. This is essential if you want to pass: the exams have time limits, and
you must get used to answering the required questions within the allotted time. It’s as simple as
that.

If you decide a training course will help you, don’t let the course title alone convince you that it
will be suitable or cost-effective. Find out exactly what the course offers and whether there are
prerequisites for attendants. You should also find out what the training company is prepared to
do if attendants don’t have the minimum knowledge necessary to be on the course.

As exams are replaced by ‘updated’ ones, you must upgrade your certification to stay current.

Ultimately, it’s your responsibility to ensure you stay current. If you don’t, you lose your certification
until you take an update.

As a support engineer, you get the satisfaction of knowing that you passed a tough test and the
happy knowledge that your network manager is sweating a bit over the fact that you could be
head-hunted at any time.

105 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

EXERCISES

1. M ARK THE FOLLOWING S TATEMENTS AS TRUE OR FALSE:


a. Microsoft offers an extensive range of certification programmers to study.

b. You must get an advanced certificate before you can call yourself a Microsoft Certified
Professional.

c. All Microsoft training courses involve a period of full-time study.

d. Practice exams allow you to become familiar with the structure of the exams.

e. You can decide on the suitability of a course by its title.

f. It is your responsibility to ensure your certification is updated.

g. Gaining a certificate will likely make you more attractive to other employers.

2. FIND THE ANSWERS TO THESE QUESTIONS IN THE FOLLOWING TEXT.


1. What advice is given to someone stuck in a computing support job?

2. What questions should you ask yourself if you are thinking of getting extra training?

3. What computer program is mentioned in the text?

4. Name two ways of studying that are mentioned in the text.

5. What two factors will be affected by your level of experience?

6. Why is it important to become used to answering exam questions?

7. What factors help you decide whether the course will be suitable or cost-effective?

8. What happens if you don’t upgrade your certification?

3. WHICH QUALIFICATION WOULD BE MOST USEFUL IF YOU WANTED TO DO E ACH OF


THE FOLLOWING:
a. be an operating system expert

b. troubleshoot systems

c. teach computing

d. design business solutions

106 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

4. HOW TO RE AD E ACH OF THE FOLLOWING COMPUTER DEVICE S AND WHAT IS EACH


ONE USED TO:
1. Intel Pentium IV 1.7 GHz processor

2. Giga Main-board (Motherboard)

3.512 MB RAM-bus RDRAM

4.80 GB Hard Disk

5. Embedded Intel 3D Direct AGP video with 64MB SDRAM

6.64-voice wave-table sound

7. NEC 3D multimedia speakers

8.48X CD-ROM drive

9. TDK CD-Writer

10. JAZ drive

11.ZIP drive

12.1.44 MB 3.5” Floppy drive

13.17” color SVGA monitor

14. Microsoft Intelligent-mouse

15.105-key keyboard

16.56 Kb modem

17. Sony USB2 Webcam

18. Sony Microphone

19. Mini-tower Chassis

20. Microsoft Windows XP

21. Microsoft Office XP & Applications

5. HOW TO WRITE A RE SUME OR CURRICULUM V ITAE (CV)?


Resumes and application forms are two ways to provide employers with written evidence of your
qualifications and skills. Generally, the same information appears on a resume and an application
form. The way it is presented differs. Some employers prefer a resume, and others require an
application form. You want to apply for a job. Do you need a resume? That depends on the kind
of job you’re applying for.

107 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

The resume is required for all jobs: professional, technical, administrative, and managerial jobs.

There are many ways of organizing a good resume. Depending on the job, you should choose the
format that best highlights your skills, training, and experience.

When do you use a resume?

•To respond to a want ad.

•To give an employer more information about you than the job application gives.

•To send to a company you’d like to work for.

•To give to an interviewer so they will ask you about the positive things you want to discuss
on your resume.

•To leave with an employer after an interview as a reminder of your skills and abilities.

Tips for a good resume:

Self-information. Completing a background and experience list will give you the information
required to prepare your resume.

If you’ve worked before, list your jobs. Next, write down the work duties for the jobs you’ve listed.
Now, think about the skills or talents required for each work duty. Write them down.

List your hobbies, clubs you belong to, sports you’ve been involved in, school activities, and things
that interest you. Look at the first item on your list.

Think about the skills or talents. A resume must be straightforward to read so that an employer can
see who you are, where you can be reached, what kind of work you can do, and why you’re
qualified. A resume should be short, preferably one page typewritten. It must be error-free. It
includes honest, positive information that is related to your job goal.

A good resume will open the door for an interview. It takes to do that item. Write them all down.
Look at the abilities (talents) identified on your background and experience list. You have talents
that you use every day.

Resumes are required for some jobs and are sometimes required for other jobs. An employer may
have you complete an application form instead of submitting a resume. Occasionally, an
employer may ask you to complete an application in addition to your resume.

When you fill out an application form, complete it entirely and follow all instructions. Do not omit
any requested information, and make sure that the information you provide is correct.

A good resume is concise and written in one page or more, but at most, three pages is enough.
In the following, you will see a sample resume on one page:

Curriculum Vitae (CV)

Name: Ahmad Family: Ahmadi Sex: Male Nationality: IRAN

108 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

Birth date: 1974, 12 Apr Marital Status: Married, one son Tel: 0098-21-33332222

Fax: 0098-21-44442222

Address: No. 311, 3rd St., Valie-asr Sq., Tehran, IRAN P.O.Box: 5436-876 Tehran-IRAN

e-mail: [email protected]

Educational Background

•1995-1999 B.Sc. in Computer Engineering at Michigan University, USA, GPA=16.5

B.Sc. Project: Design and Implementation of MIS system for one hospital

•1991-1995 High School in Mathematics, GPA=18.25

Career Background

•2004-present Apple Company in Tehran, .net Programmer

•2002-2004 SQL Server Trainer in X13 Company in Tehran and Training ICDL and Microsoft
Office

•2001 Network manager of IBM Branch in Tehran

•2003 Translating a book about Computer Maintenance System

Skills

•Programming Languages: .net, VB, C# and, C++, Pascal

•Databases: Oracle, SQL Server, Access

•Operating Systems: Windows 2000, XP

•System Analysis and Design: UML and RUP

•Good in English Reading and Writing

Interesting & Hobbies

•Programming in .net

•Network Programming

•Database Design & Programming

•Studying Computer Books

•Learning English

•Swimming

109 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.

In these flash cards, direct under the word, you will find other forms of the same word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.

The keyword is then defined in straightforward, easy-to-understand English.

analogous adj. alike in some way

n. analogy

syn. similar to

The action of light waves is analogous to the action of sound waves.

The analogy between the behavior of the bacteria in the lab and the human body is unclear.

compel v. to make something happen by necessity or force

adj. compelling

syn. oblige

Despite their opposition, the representatives were compelled to vote in favor of the legislation.

The lawyer’s plea was made compellingly.

formidable adj. difficult; causing worry or fear

syn. overwhelming

Their formidable opponents gave no sign of weakness.

The man’s voice echoed formidably throughout the hallway.

intrude v. to enter by forceful means

adj. intrusive

n. intrusion

110 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

n. intruder

syn. Impose

The intrusive bacteria caused his condition to worsen.

The intrusion of the hazardous gas made it difficult to live in the house.

prone adj. likely to do something

n. proneness

syn. inclined to

Most liquids are prone to contract when frozen.

She is prone to study hard the night before her tests.

prophetic adj. correctly telling about future events.

v prophesy

n. prophecy

n. prophet

syn. predictive

A team of psychologists investigated his prophetic powers.

The brilliant student fulfilled his teacher’s prophecy that he would be a successful doctor.

reluctantly adv. unwillingly

adj. reluctant

n. reluctance

syn. hesitatingly

Although unsatisfied with the contract, the officials reluctantly agreed to sign it.

The electrician was reluctant to estimate the cost of the repair work.

111 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

renown n. fame

adj. renowned

syn. prominence

This school is of great renown.

The renowned conductor made a guest appearance at the concert.

112 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

UNIT 16

FUTURES
Talking to Professor Cochrane is probably as close as you can get to time traveling without leaving
the current dimension, as his vision stretches far into the 21st century and beyond. His seemingly
unshakeable conviction is that anything is possible if you put your mind to it. British Telecom (BT) is
already sitting on a host of innovations poised to blow your mind during this century.

Designed for the 21st century, Peter Cochrane’s signet ring is built around a chip that holds all the
details of his passport, bank account, medical records, and driving license. According to
Cochrane, it’s set to revolutionize shopping.

The ring is already a fully operational prototype. However, it will be some time before you’re
trading your credit card for the ultimate fashion accessory.

It’s not just jewelry that’s set to get smarter. One of the most significant projects at the lab is looking
at artificial intelligence to create software programs, networks, telephones, and machines with a
degree of intelligence built in. By sensing their environment, they should be able to develop new
capacities as demands change. ‘I have software that breeds, interchanges genes, and creates
adaptable behavior. This means you’ll see the network come alive - it will watch what you do and
adapt.’

It doesn’t stop there, however. BT has taken artificial intelligence one step further and created
machines that solve their problems. ‘We’ve created solutions a human could never have
dreamed of. We have solutions, and although we don’t understand how they work, they do work.
We’re effectively increasing the speed of evolution, says Cochrane.

It’s already good to talk, but it will be even better with artificially intelligent phones on the way.
Cochrane works on smartphones that can translate English into German, Japanese, and French
in real-time. ‘Some of it’s rocket science, but many are extremely simple. We’ve built a kernel of
understanding inside a machine that extracts meaning from the sentence itself. We can now do
simple things such as phrase books,’ he says.

The system uses a nonlinear approach that sends the English to the understanding kernel in the
machine and then fans it out to all the other languages simultaneously.

Undoubtedly, Cochrane is putting much faith in intelligent machines, particularly when cutting
through the deluge of information that he says is the downside of the electronic revolution. BT’s
solution is the development of intelligent agents that watch, learn, and start communicating.

It’s not all working down at the lab, however. BT is also involved in an ongoing trial that will
revolutionize our leisure time, mainly how we watch TV. ‘We put people on the Internet and
broadcast TV simultaneously so that the people at home could influence what was happening
on their TV sets. As a result, it became interactive and therefore more active.’

BT has its fingers in multiple pies and has made biotechnology another core focus of R&D. I think
hospitals are dangerous places to be. There are lots of viable alternatives. For a start, we can stop

113 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

bunging up hospital wards by putting people online.’ BT has already developed a pack for heart
attack victims that monitors their progress and uploads information via a radio link back to the
hospital.

So what will the 21st century hold for us if Peter Cochrane and his futurologists have their way?

By 2015, we will likely be eclipsed by a supercomputer more powerful than the human brain. And
if that’s visions of Terminator dancing in your head, don’t worry - Cochrane’s got it covered. ‘I’d
hate one morning to find myself considered an infestation of this planet. We are inclined to nurture
life and not destroy it. Before we let loose a bunch of artificial intelligence, we ought to consider
the necessity of building in several rules that hold your life as a human being sacrosanct.’

EXERCISES

1. M ARK THE FOLLOWING S TATEMENTS AS TRUE OR FALSE:


a. BT has a lot of new ideas that will astound people.

b. Jewellery that can store large amounts of personal (data has started to replace credit
cards.

c. BT’s smartphone can only translate English into one other language simultaneously.

d. Intelligent agents can help users deal with an overload of information.

e. Watching TV will be a more active pastime in the future.

f. The professor thinks that potent computers will destroy humanity in the future

2. FIND THE ANSWERS TO THESE QUESTIONS IN THE FOLLOWING TEXT.


1. Of what is Professor Cochrane wholly convinced?

2. What is stored in the professor’s signet ring?

3. What will change dramatically when we start using rings like these?

4. What is the BT lab developing with artificial intelligence?

5. What effect do the professor’s AI experiments have on evolution?

6. What does the professor see as the negative side of the electronic revolution?

7. What was the result of combining the Internet with TV?

8. What developments does the professor suggest in the field of biotechnology?

9. According to the professor, what will happen by 2015?

114 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

3. M ATCH THE TERMS IN T ABLE A WITH THE STAT EMENTS IN TABLE B.

TABLE A

a. BT

b. Smartphone

c. Intelligent agent

d. Rocket science

e. R&D

f. Upload

g. Supercomputer

TABLE B

i. A computer program that watches, (earns, and communicates with the user

ii. most potent type of computer

iii. Research and development

iv. Transfer data from a client device to a server computer

v. A telephone that can translate English into various languages in real time

vi. British Telecom

vii. Very advanced study

4. RE AD THE NEXT PAGE TEXTS: A, B , AND C, THEN: COMPLETE TABLE .

A B c

1. Area of IT

2. Predictions

3. Comments

TEXT A

Telecom applications will soon be bundled together in much the same way as office application
suites are today. A significant example is the electronic marketplace, which will bring customers

115 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

and suppliers together in intelligent databases and virtual environments with ID verification,
encryption, and translation. It will then implement the billing, taxation, and electronic funds
transfer while automatically producing accounts and auditing. The services will be based on voice
processing, allowing a natural voice interface to talk to the computer, all the AI to carry out the
request, and voice synthesis and visualization technology to get the answer out.

Electronic money will be very secure but much more versatile than physical alternatives. E-cash
can be completely global and used as a de facto standard. It does not have to be linked to any
national currency so it can be independent of local currency fluctuations. Its growing use on the
Net will lead to its acceptance on the street, and we may hold a large proportion of our total
funds in this global electronic cash. People will increasingly buy directly from customized
manufacturers. Shops will be places where people try on clothes, not buy them. Their exact
measurements can be sent instantly to the manufacturer as soon as they have chosen an outfit.
The shops may be paid by the manufacturer instead.

TEXT B

Employment patterns will change as many jobs are automated and new jobs exist to serve new
technologies. Some organizations will follow the virtual company model, where a small core of
key employees is supported by contractors on a project-by-project basis, bringing together the
right people regardless of where they live. The desks they will use will have multiple flat screens,
voice interfaces, computer programs with human-like faces and personalities, full-screen
videoconferencing, and 3D sound positioning. All this will be done without any communication
cables since the system uses high-capacity infrared links. Many short-term contractors may not
have enough space in their homes for an office and may go instead to a new breed of local
telework centers.

Of course, workers can be fully mobile, and we could see some people abandon offices
altogether, roaming the world and staying in touch via satellite systems. Even in trains and planes,
each seat may have infrared distribution to guarantee high bandwidth communication. One tool
they may have in a few years is a communicator badge. This will give them a voice link to
computers across the network, perhaps on their office desk. They can access their files and email
using this voice link and carry out most computer-based work. Their earphones will allow voice
synthesizers to read their mail, and glasses with a projection system built into the arms and
reflectors on the lenses will allow a head-up display of visual information. Perhaps by 2010, these
glasses could be replaced by an active contact lens that writes pictures directly onto the retina
using tiny lasers.

TEXT C

Finally, in the very long term, by around 2030, we may have the technology to directly link our
brain to the ultra-smart computers that will be around then, giving us so much extra brainpower
that we deserve a new name, Homo Cybernetics. In much the same time frame, geneticists may
have created the first biologically optimized humans, Homo Optimus. It would make sense to
combine this expertise with information technology wizardry to make something like the Borg,
Homo hybrids, with the body of an Olympic athlete and a brain the size of the planet, the whole
global superhighway, and every machine connected to it. Over time, this new form may

116 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

converge with the machine world as more and more of his thoughts occur in cyberspace. With a
complete backup on the network, Homo hybridus would be completely immortal. Ordinary
biological humans would eventually accept the transition, and plain old Homo Sapiens could
become voluntarily extinct, perhaps as early as 2200.

1. COMPLETE THE GAPS IN THIS TEXT ON OPERATI NG SYSTEMS USING THE SE LINKING
WORDS AND PHRASES:
although in addition

because such as

but therefore

The user is aware of the effects of different applications programs……….…… operating systems
are invisible to most users. They lie between applications programs,…………….word-processing,
and the hardware.

The supervisor program is the most important. It remains in memory,

……………… it is referred to as resident. Others are called non-residents………. they are loaded
into memory only when needed. Operating systems manage the computer’s
resources,……………….the central processing unit………………….. they establish a user interface
and execute and provide services for applications software, ………..…….. input and output
operations are invoked by applications programs, they are carried out by the operating system.

2. SOME VERBS BEGINNING OR ENDING WITH -EN- HAVE A CAUSATIVE ME ANING.


REPLACE THE WORDS IN ITALICS IN THESE SEN TENCES WITH THE APPR OPRIATE FORM OF
-EN- VERB FROM THIS LIST.
enable encrypt ensure encourage

encode enhance enlarge

heighten widen brighten fasten

1. A MIDI message makes sound into code as 8-bit bytes of digital information.

2. The teacher uses a new program to give children the courage to write stories.

3. The new version of SimCity has been made better in many ways.

4. A gateway makes it possible for dissimilar networks to communicate.

5. You can convert data to secret code to make it secure.

6. Make sure the machine is disconnected before you remove the case.

7. Designers can offer good ideas for making your website brighter.

8. Electronic readers allow you to make the print size larger.

117 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

9. You can make the picture on your monitor wider.

7. RE AD THE FOLLOWIN G PASSAGE (A) AND EXPLAIN HOW SOME DRIVE RS SOLVE THIS
PROBLEM FOR THEMSELV ES.

PASSAGE A

In the last ten years, police have installed speed trap units on many busy roads. These contain a
radar set, a microprocessor, and a camera equipped with a flash. The radar sends out a beam of
radio waves at a frequency of 24 gigahertz. This is equivalent to a wavelength of 1.25 cm. If a car
moves towards the radar, the reflected signal will bounce back with a slightly smaller wavelength.
If away from the radar, the waves will reflect with a slightly longer wavelength. The microprocessor
within the unit measures the difference in wavelength between outgoing and returning signals
and calculates the speed of each vehicle. If it is above the speed pre-set by the police, the
camera takes a picture of the vehicle. The information is stored on a smart card for transfer to the
police computer. The vehicle's owner can then be traced using the Driver and Vehicle Licensing
Center database.

Now compare your answer with the following passage (B):

PASSAGE B

Some drivers have now got used to these traps. They slow down when approaching one to ensure
the camera is not triggered. They speed up again as soon as they have passed. This is known as
‘surfing’. One way of outwitting such motorists is a new computerized system. This consists of two
units with digital cameras positioned at a measured distance apart. The first unit records the time
each vehicle passes it and identifies each vehicle by its number plates using Optical Character
Recognition (OCR) software. This information is relayed to the second unit, which repeats the
exercise. The microprocessor within the second unit then calculates the time each vehicle takes
to travel between the units. The registration numbers of those vehicles exceeding the speed limit
are relayed to police headquarters, where a computer matches each vehicle with the DVLC
database. A standard letter is printed off addend using mail-merge

STRUCTURE

A. -ING FORM AS A NOUN; AFTER PREPOSITIONS


We can use the -ing form of the verb as a noun. It can be the subject, object, or complement of
a sentence. For example:

1. Managing the computer’s resources is an essential operating system function.

2. The operating system starts running the user interface after the PC is switched on.

3. Another function of the operating system is executing and providing services for
applications and software.

118 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

The -ing form is also used after prepositions. This includes when it is a preposition and not part of
the infinitive. For example:

4. Without the user being aware of the details, the operating system manages the
computer’s resources.

5. We begin by focusing on the interaction between a user and a PC operating system.

6. We look forward to having cheaper and faster computers.

EXERCISES

1. REWRITE E ACH OF THESE SENTENCES LIKE THI S:


An essential function of the operating system is to manage the computer’s resources.

Managing the computer’s resources is an essential function of the operating system

1. One task of the supervisory program is to load nonresident programs into memory as
required.

2. The role of the operating system is to communicate directly with the hardware.

3. One of the critical functions of the operating system is establishing a user interface.

4. An additional role is to provide services for applications software.

5. Part of the work of mainframe operating systems is to support multiple programs and
users.

6. in most cases, the task is to facilitate interaction between a single user and a PC.

7. One of the most essential functions of a computer is to process large amounts of data
quickly.

8. The main reason for installing more memory is to allow the computer to process data
faster.

2. COMPLETE THESE SENTE NCES WITH THE CORRECT FORM OF THE VERB:
Infinitive or -ing form.

1. Don’t switch off without (close down) your PC.

2. I want to (upgrade) my computer.

3. He can’t get used to (log on) with a password.

4. You can find information on the Internet by (use) a search engine.

5. He objected to (pay) expensive telephone calls for Internet access.

119 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

6. He tried to (hack into) the system without (know) the password.

7. You needn’t learn how to (program) in HTML before (design) Pages.

8. I look forward to (input) data by voice instead of (use) a keyboard.

B. verbs + object + infinitive

C. verbs + object + to-infinitive

New developments in computing are often designed to make something more manageable.

These verbs are often used to describe such developments:

Allow, let, enable, permit, help

Study these examples:

1. A GUI lets you point to icons and click a mouse button to execute a task.

2. A GUI allows you to use a computer without knowing any operating system commands.

3. The X-Window System enables Unix-based computers to have a graphical look and feel.

4. Voice recognition software helps disabled users (to) access computers.

Allow, enable, and permit are used with this structure:

verb + object + to-infinitive

let is used with this structure:

verb + object + infinitive

help can be used with either structure.

3. COMPLETE THE GAP IN E ACH SENTENCE WITH THE CORRECT FORM OF THE VERB IN
BRACKETS.
1. The Help facility enables users…………… (get) advice on most problems.

2. Adding more memory lets your computer (work) faster.

3. Windows allows you …………. (display) two different folders simultaneously.

4. The Shift key allows you (type) in upper case.

5. The MouseKeys feature enables you ……………. (use) the numeric keypad to move the
mouse pointer.

6. ALT + TAB allows you (switch) between programs.

7. The Sticky Keys feature helps disabled people (operate)

120 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

two keys simultaneously.

8. ALT + PRINT SCREEN lets you (copy) an image of

an active window to the Clipboard.

VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.

In these flash cards, direct under the word, you will find other forms of the same word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.

The keyword is then defined in straightforward, easy-to-understand English.

aggravating adj. making worse; annoying

n. aggravation

v. aggravate

syn. irritating

Road repairs caused the aggravating delay.

The shortage of work aggravated the crisis in the small town.

convert v. to change from one form or state to another

adj. convertible

n. conversion

syn. alter

When boiled, liquids convert to gases.

The conversion from Fahrenheit to centigrade can be easily made.

curative adj. being able to restore to good condition

n. cure

121 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

syn. Healing

The curative properties of certain plants have been well documented.

There is no simple cure for the ills of society.

debilitating adj. weakening

v. debilitate

n. debility

syn. Weakening

The lack of investment savings has a debilitating effect on the economy. The patient’s debility
restricted him to the room.

deplete v. to use up; to reduce greatly

adj. depleted

n. depletion

syn. consume

She depleted all of her savings to buy the word processor.

The depletion of the Earth’s oil reserves poses a threat to our current style of life.

toxic adj. harmful; capable of being fatal

n. toxicity

syn. poisonous

Disposal of toxic wastes is an ongoing problem.

This product has the highest toxicity of any known to science.

acknowledge v. to know, remember, and accept the existence of something

n. acknowledgment adj. acknowledged

syn. concede

122 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei

The foreman acknowledged that there had been a mistake in the design of the house.

The promotion he received was an acknowledgment of his excellent work.

Tranquility n. calm; quietness

adj. tranquil

v. tranquilize

syn. Peacefulness

The tranquility of the lake at sunrise inspired a profound sense of well-being. His tranquil manner of
expression made us all feel more secure.

123 | P a g e

You might also like