English For Computer Engineering
English For Computer Engineering
ENGINEERING
CONTENTS
Preface ................................................................................................................................................................ 3
UNIT 1 ................................................................................................................................................................... 5
UNIT 2 ................................................................................................................................................................. 15
unit 3 .................................................................................................................................................................. 27
UNIT 4 ................................................................................................................................................................. 37
UNIT 5 ................................................................................................................................................................. 42
UNIT 6 ................................................................................................................................................................. 47
UNIT 7 ................................................................................................................................................................. 53
UNIT 8 ................................................................................................................................................................. 58
UNIT 9 ................................................................................................................................................................. 68
UNIT 10 ............................................................................................................................................................... 74
UNIT 11 ............................................................................................................................................................... 79
UNIT 12 ............................................................................................................................................................... 84
UNIT 13 ............................................................................................................................................................... 89
UNIT 14 ............................................................................................................................................................... 98
UNIT 15 .............................................................................................................................................................105
UNIT 16 .............................................................................................................................................................113
2|Page
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
PREFACE
Welcome to this comprehensive guide tailored for students specializing in computer engineering
and related fields such as computer science, IT, and ICT. This PDF has been thoughtfully designed
for those who have completed general English and are now gearing up for university courses. With
16 units at your disposal, the arrangement presented is just one option, recognizing the diverse
preferences of teachers and students who may choose different starting points and progressions.
Each unit within this PDF is meticulously structured, comprising three integral segments: a reading
part, a grammar part, and a vocabulary part, all with a primary focus on cultivating and
enhancing your reading skills. Including grammar is a review and a tool for indexing, ensuring a
well-rounded learning experience.
The primary objective of this PDF is to provide you with a diverse learning experience that
facilitates the recognition of specialized lexical items commonly found in the science and
technical fields. We understand that your goal is not just to refine your reading skills but to gain a
comprehensive understanding of English within the context of computer language.
The passages incorporated into this guide cover a broad spectrum of subject matters, delving into
scientific facts and various facets of computer-related topics. Concurrently, grammatical points
are introduced, enabling you to absorb language usage information as you read, indirectly
enhancing your overall language proficiency.
The exercises and activities within this PDF have been carefully divided into two sections:
Comprehension exercises to evaluate your understanding of the materials and skills development
activities to boost your reading comprehension skills.
Innovative in presentation, this guide engages you in reading comprehension activities while
extracting information from the passages—an essential aspect of your learning journey. The
vocabulary section includes primary and general words and technical terms applicable across
various fields, honing your skills for reading diverse materials.
Definitions and synonyms are provided for most new words, encouraging you to decipher
meanings using an English dictionary for unfamiliar terms actively. Presenting vocabulary items
departs from traditional approaches, exposing you to words through various uses and functions.
To address challenging sections, we've made concerted efforts to offer easily understandable
explanations. We strongly encourage you to review assignments before attending classes, setting
the stage for in-depth comprehension during classroom exercises.
Before delving into the contents, it's crucial to acknowledge that this PDF has been meticulously
prepared and edited by Dr. Amin Golzari Oskouei. The modified PDF serves as an English for
Computer Engineering book authored by M. Yousefkhani, N. Ayat, and A. Faraahi, wherein all
writing and spelling errors have been rectified. Certain content has been added or removed to
enhance its quality.
3|Page
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
Lastly, we sincerely thank Mr. Ilyad Rastafar for their significant contribution in preparing this PDF.
Their efforts are invaluable, and I appreciate their dedication to enhancing your learning
experience.
Embark on this journey enthusiastically, and may this guide pave the way for a robust
understanding of English for computer engineering.
4|Page
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
UNIT 1
WHAT IS A COMPUTER?
A computer is a machine with an intricate electronic circuit network that operates switches or
magnetizes tiny metal cores. Like the cores, the switches can be in one of two possible states:
on or off, magnetized or demagnetized. The machine can store and manipulate numbers,
letters, and characters. The basic idea of a computer is to make the machine do what we
want by inputting signals that turn certain switches on and turn others off or that magnetize or
do not magnetize the cores.
The primary job of computers is the processing of information. For this reason, computers can
be defined as devices that accept information in the form of instructions called a program
and characters called data, perform mathematical and/or logical operations on the
information, and then supply the results of these operations. The program, or part of it, tells the
computers what to do, and the data, which provide the information needed to solve the
problem, are kept inside the computer in a place called memory.
Computers are thought to have many remarkable powers. However, most large or small
computers have three basic capabilities. First, computers have circuits for performing
arithmetic operations, such as addition, subtraction, division, multiplication, and
exponentiation. Second, computers have a means of communicating with the user. After all,
if we couldn’t feed information in and get results back, these machines wouldn’t be helpful.
However, specific computers (commonly minicomputers and microcomputers) control things
directly, such as robots, aircraft navigation systems, medical instruments, etc.
Some of the most common methods of inputting information are punched cards, magnetic
tape, disks, and terminals. Depending on the medium used in inputting information, the
computer’s input device (a card reader, a tape drive, or a disk drive) reads the information
into the computer.
Two standard devices for outputting information are a printer, which prints the new information
on paper, or a CRT display screen, which shows the results on a TV-like screen.
Third, computers have circuits that can make decisions. The kinds of decisions that computer
circuits can make are not of the type: ‘Who would win a war between two countries?’ or ‘Who
is the richest person in the world?’ Unfortunately, the computer can only decide three things:
5|Page
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
Is one number less than another? Are two numbers equal? and, Is one number greater than
another?
A computer can solve a series of problems and make hundreds, even thousands, of logical
decisions without becoming tired or bored. It can find the solution to a problem in a fraction
of the time it takes a human being to do the job. A computer can replace people in dull,
routine tasks, but it has no originality; it works according to the instructions and cannot exercise
any value judgments. Sometimes, a computer seems to operate like a mechanical ‘brain,’
but human minds limit its achievements. A computer cannot do anything unless someone tells
it what to do and gives it the appropriate information. However, because electric pulses can
move at the speed of light, a computer can perform many arithmetic-logical operations
almost instantaneously. A person can do everything a computer can, but in many cases, that
person would die long before the job was finished.
EXERCISES
Decide whether the following statements are True or False (T/F) referring to the text's information.
Then, make the necessary changes so that the false statements become true.
2. UNDERSTANDING WORDS
Refer back to the text and find synonyms (i.e., words with a similar meaning) for the following
words:
6|Page
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
2. fundamental
3. away
4. uninterested
5. accomplishments
Now, refer to the text and find antonyms (i.e., words with an opposite meaning) for the following
words.
7. receiving
8. reject
9. unusual
10. small
STRUCTURE 1
SAMPLE PARAGRAPH
A computer(1), like any other machine, is used because it(1) does specific jobs better and more
efficiently than humans. It(1) can receive more information(2) and process it(2) faster than any
human. The speed at which a computer works can replace weeks or even months of pencil-and-
paper work. Therefore, computers(3) are used when the time saved offsets their(3) cost, which is
one of the many reasons they(3) are used so much in business, industry, and research.
EXERCISE 1
Using the sample paragraph as a model, draw a rectangle around the word/ words and a circle
around the word/words that the circled words refer to. Then join the O and the □ with arrows:
Computers are electronic machines that process information. They can communicate with the
user, do different arithmetic operations, and make three kinds of decisions. However, they are
7|Page
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
incapable of thinking. They accept data and instructions as input, and after processing it, they
output the results.
EXERCISE 2
Now look back at the text ‘WHAT IS A COMPUTER?’ and find out what the words in bold typeface
refer to.
3. or part of it
9. it has no originality
B: MAKING COMPARISON
1. FORM ATION
There are several ways of showing similarities or differences between or amongst things. The
regular comparative and superlative of descriptive words, whether these are adjectives or
adverbs, is formed as follows:
1. By adding the ending -er and -est to words of one syllable examples:
8|Page
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
2. By placing the words more and most in front of words with three or more syllables:
3. Words with two syllables may be like 1 or 2 above in that they will add the ending -er and -est if
they end in -y or -ly, -ow, -le, and -er. Most of the remaining words take more and most in front of
them:
9|Page
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
commoner commonest
common
more common most common
handsomer handsomest
handsome
more handsome most handsome
politer politest
polite
more polite most polite
quieter quietest
quiet
more quiet most quiet
5. A few adjectives and adverbs form comparative and superlative using a different stem. These
irregular comparisons are as follows:
2. USE IN SENTENCES
There are many reasons for using comparisons in discourse; they may be used to show: a.
equivalence; b. non-equivalence; c. one item compared with others; and d. parallel increase.
EQUIVALENCE
The following words or constructions are used to show equivalence (i.e., the same).
10 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
EXAMPLES
as first-generation computers
5. An analog computer and a car speedometer are similar in continuously working out
calculations.
10. a computer's time to solve a problem can equal months of work for a man.
NON-EQUIVALENCE
The following words and/or constructions show non-equivalence (i.e., not the same).
EXAMPLES
3. For less than $10,000, you could have a very good microcomputer.
11 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
THE SUPERLATIVE
The following words and/or constructions show one item compared with others (i.e., the
superlative).
the most …
the least …
EXAMPLES
2. Digital computer programming is the most commonly used in data processing for business.
PARALLEL INCREASE
The following words and/or constructions are used to show a parallel increase (i.e., two
comparatives).
EXAMPLES
1. The bigger the computer, the more complex the operations it can do.
2. The smaller the problem, the less challenging it is for the computer programmer.
VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.
In these flash cards, you will find other forms of the same word directly under the word. These words
have the same general meaning; they represent the different parts of speech of the word. For
12 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.
arbitrary adj. an action or decision made with little thought, order, or reason
He was an astute worker, finishing in half the time it took the others to finish.
Relinquishing his claim to the building will allow the building to be sold.
13 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
n. temptation
The idea of getting rich quickly tempted him to invest his life savings.
n. bafflement
The causes of many harmful diseases have baffled doctors for centuries.
14 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
UNIT 2
COMPUTER'S CHARACTERISTICS
Computers are machines designed to process electronically specially prepared pieces of
information, termed data. Handling or manipulating the information given to the computer in such
ways as doing calculations, adding information, or making comparisons is called processing.
Computers comprise millions of electronic devices capable of storing or moving data at enormous
speeds through complex circuits with different functions.
All computers have several characteristics in common, regardless of make or design. Information,
in the form of instructions and data, is given to the machine, after which it acts on it, and a result
is returned. The information to the machine is the input, the internal manipulative operations, the
processing, the result, and the output. These three basic concepts of input, processing, and output
occur in almost every aspect of human life, whether at work or play. For example, in clothing
manufacturing, the input is the cut cloth pieces; the processing is the sewing of these pieces, and
the output is the finished garment.
SECOND STORAGE
The figure on the previous page schematically shows a computer system's fundamental hardware
components. The centerpiece is the computer, the processor, or, usually, the Central Processing
Unit (CPU). The term ‘computer’ includes hardware parts in which calculations and other data
manipulations are performed and the high-speed internal memory in which data and calculations
are stored during the actual execution of programs. Attached to the CPU are the various
peripheral devices, such as keyboards and mice (two common examples of input devices). When
data or programs need to be saved for long periods, they are stored on various secondary
memory devices or storage devices such as magnetic tapes or magnetic disks.
Computers have often been considered huge adding machines, but this is a narrow view of their
function. Although a computer can only respond to a certain number of instructions, it is not a
single-purpose machine since these instructions can be combined in infinite sequences. Therefore,
a computer has no known limit on what it can do; its versatility is limited only by the imagination
of those using it.
In the late 1950s and early 1960s, when electronic computers were being developed today, they
were costly to own and run. Moreover, their size and reliability were such that many support
personnel were needed to keep the equipment operating. This has all changed now that
computing power has become portable, more compact, and cheaper.
Computers have significantly changed how many kinds of work are performed in a very short
period. Computers can remove many routine and tedious tasks from our lives, leaving us more
15 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
time for enjoyable, creative work. Computers have created whole new areas of work that did not
exist before their development.
EXERCISES
1. All information to be processed must be prepared so the computer will understand it.
2. Because of the complex electronic circuitry of a computer, data can be either stored or moved
about at high speeds.
6. All other devices used in a computer system are attached to the CPU.
9. Computers today cost less, are smaller, and need fewer people to operate them than in the
past.
2. CONTEXTUAL REFERENCE
Review the text and find out what the words in bold typeface refer to.
2. or moving them
7. of those using it
16 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
3. UNDERSTANDING WORDS
Refer back to the text and find synonyms for the following words.
1. called
2. tremendous
3. ideas
4. react
5. take away
Now, refer to the text and find antonyms for the following words.
6. taken away
7. wide
8. limited
9. immovable
10. after
STRUCTURE 2
When you are reading, you will come across unfamiliar words. It is often possible to guess the
meanings of these words if you understand how words in English are generally formed.
AFFIXES
An English word can be divided into three parts: a prefix, a stem, and a suffix. Pre- means ‘before’;
a prefix comes before the stem. Consider, for example, the prefix de- (meaning ‘reduce’ or
‘reverse’) in a word like demagnetize (meaning ‘to deprive of magnetism’). A suffix is what is
attached to the end of the stem. Consider as an example the suffix.
-er (meaning ‘someone who’) in programmer (‘the person who programs’). Both prefixes and
suffixes are referred to as affixes.
17 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
Prefixes usually change the word's meaning; for example, un- changes a word to the negative.
Unmagnetizable means ‘not capable of being magnetized.’ On the other hand, suffixes change
the word from one part of speech to another. For example, -ly added to the adjective quick gives
the adverb quickly. Let us now consider some suffixes and their usual meanings.
SUFFIXES
EXERCISE 1
Study the following tables and try to find additional examples. Use your dictionary if necessary.
18 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
Noun-forming suffixes
SUFFIX MEANING EXAMPLES
-ance state performance
-ence quality of independence
-er, -or a person who, programmer, operator,
a thing which compiler, accumulator
-ation, -tion the act of execution
-ist, -yst a person who analyst, typist
-ness condition of cleanliness
-ion action/state conversion
-ing activity multiplexing
-ment state, action measurement
-ity state, quality electricity
-ian pertaining to electrician
-ism condition/state magnetism
-dom domain/condition freedom
-ship condition/state relationship, partnership,
friendship
-ary binary
Verb-forming suffixes
SUFFIX MEANING EXAMPLES
-ize computerize
-ate automate, activate, calculate
to make
-ify simplify
-en harden, widen, lengthen
Adverb-forming suffix
SUFFIX MEANING EXAMPLES
electronically, logically,
-ly in the manner of
comparably, helpfully
19 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
Adjective-forming suffixes
SUFFIX MEANING EXAMPLES
-al, -ar, have the quality computational, logical, circular
-ic, -ical magnetic, automatic, electrical,
-able, -ible capable of being comparable, divisible
-ous, -ious like, full of dangerous, religious
-ful characterized by helpful
-less without careless
-ish like yellowish
-ed having computed, punched
-ive quality of interactive
-ing to make or do programming, coding,
processing, multiplexing
EXERCISE 2
Read the following sentences and underline all the suffixes. Then, try to find out what parts of
speech the words are.
1. The systems analyst provides the programmer with the details of the data processing problems.
2. CRT terminals are beneficial interactive devices for office use because of their speed and
quietness.
3. The new microcomputer we purchased does not have a Fortran compiler. It is programmable
Basic only.
4. A computer has an intricate electronic circuit network that operates switches or tiny metal
cores.
5. In large and modern installations, the computer operator sits in front of a screen that shows an
up-to-date summary of the computer jobs as they are being processed.
6. The introduction of terminals and screens has partly replaced punched cards.
8. Multiplexing is when many electrical signals are combined and carried on only one optical link.
20 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
EXERCISE 3
Word forms: First, choose the appropriate form of the words to complete the sentences. Then,
check the differences of meaning in your dictionary.
b. One of the first persons to note that the computer is malfunctioning is the computer
………..………..
d. The new machines in the computer installation are not yet ………..………. .
b. The students are still waiting for their ………..……….. into the Computer Science program.
b. Systems analysts will often make ………..……….. about existing programs to help make the
operations more efficient.
c. There have been ………..……….. developments in computer science in the last decade.
21 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
c. Some people working in computer installations aren’t very ………..……….. because they are
shy.
b. The ………..……….. devices in a computer system operate more slowly than the
electromagnetic devices.
c. The ………..……….. of the brain is highly complex, but unlike a computer, it isn’t.
a. The length of time a programmer takes to make a program will vary ………..……….. on the
complexity of the problem and his ability and experience.
22 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
b. One can always ………..……….. a computer to obtain accurate answers because it’s probably
the most ………..……….. machine today.
programs.
b. It is sometimes a very ………..……….. process getting into a computer installation for security
reasons.
a. There isn’t a very big ………..……….. in flowcharting for a program to be written in Cobol or
Fortran.
b. There are many ………..……….. computer manufacturers today, and a buyer must be able to
………..……….. between the advantages and disadvantages of each.
23 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
c. The opinions of programmers on the best way of solving a problem often ………..……….. greatly.
b. If you don’t know the meaning of a computer term, you cannot always use an ………..………..
all-purpose dictionary for the answer.
VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.
In these flash cards, you will find other forms of the same word directly under the word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.
n. appeal
syn. renowned
contemporary adj. modern, up-to-date; also a person living at the same time as
another person
24 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
The frail wings of the newborn bird could not lift it off the ground.
alterable adj.
Will the storm alter its course and miss the coast?
adj. anticipated
n. anticipation
n. conformist
25 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
26 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
UNIT 3
The first part is hardware - the physical, electronic, and electro-mechanical devices
considered and recognized as ‘computers.’ The second part is software - the programs that
control and coordinate the activities of the computer hardware and that direct the processing
of data.
SECOND STORAGE
The figure above shows diagrammatically the essential components of computer hardware
joined together in a computer system. The centerpiece is called either the computer, the
processor, or usually the Central Processing Unit (CPU). The term ‘Computer’ refers to parts of
the hardware in which calculations and other data manipulations are performed and to the
internal memory in which data and instructions are stored during the actual execution of
programs. The various peripherals, including input and/or output devices, secondary memory
devices, and so on, are attached to the CPU.
Computer software can be divided into two broad categories - systems and applications. The
former is often referred to as ‘systems.’ When brought into internal memory, these direct the
computer to perform tasks. The latter may be provided with the hardware by a system supplier
as part of a computer product designed to answer a specific need in certain areas. These
complete hardware/software products are called turnkey systems.
The success or failure of any computer depends on the skill with which the hardware and
software components are selected and blended. A poorly chosen system can be a
monstrosity incapable of performing the for which it was initially acquired.
27 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
EXERCISES
2. Input and output devices operate more slowly than the decision-making devices.
7. The word ‘computer’ means the processor and the internal memory.
2. CONTEXTUAL REFERENCE
Review the text and find out what the words in bold typeface refer to.
5. in which calculations
28 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
3. UNDERSTANDING WORDS
Refer back to the text and find synonyms for the following words.
1. developed
2. infers
3. joined
4. chosen
Now, refer to the text and find antonyms for the following words.
5. segregated
6. useless
7. narrow
8. well
4. WORD FORMS
First, choose the appropriate form of the words to complete the sentences. Then, check the
differences of meaning in your dictionary.
a. Some computer manufacturers have ………..……….. input and outputdevices into one
terminal.
b. The success of any computer system depends on the ………..……….. all its parts to form a useful
whole
a. The control unit of a processor ………..……….. the flow of information between the arithmetic
unit and the memory.
29 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
b. ………..……….. the many activities in a computer department are the job of the department
head.
c. The ………..……….. of a language institute has assistants to help him and may have access to
a computer to help him with………..……….. the many programs, timetables, space, and student
results.
b. A ………..……….. is a drawing that shows how something is arranged rather than what it looks
like.
c. There is a big difference between an input and an output. These can not be ………..………..
a. It is often difficult for computer science students to ………..……….. their time up proportionally
between studying and programming.
STRUCTURE 3
PREFIXES
30 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
NEGATIVE AND
SIZE LOCATION TIME AND NUMBER
POSITIVE
ORDER mono-
un- non- semi- inter- pre- bi-
in- dis- re- mini- super- ante- hex-
micro- trans- fore- oct-
ex- post- multi-
extra-
mid-
EXERCISE 1
Study these tables and try to find additional examples. Use your dictionary if necessary.
31 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
Prefixes of size
PREFIX MEANING EXAMPLES
Prefixes of location
PREFIX MEANING EXAMPLES
ante-, pre- before antecedent, prefix
prime- first primary, primitive
post- after postdated
retro- backward retroactive
Other prefixes
32 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
EXERCISES 2
Fill in the blanks with the correct prefix from the following list. Use the glossary at the end of the
book to help you.
2. ………..……….. plexing is when many electrical signals are combined and carried on only one
optical link.
4. The number system we use in everyday life is the ………..……….. mal system which has a base
of 10.
5. CRT terminals are beneficial………..……….. active devices for use in airline reservations.
6. Some screens are ………..……….. chromatic, whereas others produce multicolor pictorial
graphics.
7. The complete description of the logical structure of data is called the schema, and the
description of the parts, the ………..……….. schema.
8. The central storage locations of a computer are called its ………..……….. ary storage.
9. The small ferrite rings called cores have two states: either magnetized or ………..………..
magnetized.
10. The introduction of chips or ………..……….. conductor memories made it possible to reduce
the size of the computer.
EXERCISES 3
For each prefix in Structure 3, find at least four words with it in the dictionary.
33 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.
In these flash cards, you will find other forms of the same word directly under the word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.
n. acclamation
n. adversity
34 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
Although working closely with the government, all businesses function autonomously.’
n. disruption
n. haphazardness
syn. appearance
With the advent of computers, many tasks have been made more accessible.
n. agileness
35 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
syn. although
36 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
UNIT 4
Not only is computing equipment getting smaller, but it is also getting more sophisticated.
Computers are part of many machines and devices that once required continual human
supervision and control. Today, computers in security systems result in safer environments,
computers in cars improve energy efficiency, and computers in phones provide features such as
call forwarding, call monitoring, and call answering.
These intelligent machines are designed to take over some of the basic tasks previously performed
by people; by so doing, they make life a little easier and a little more pleasant.
Intelligent cards store vital information such as health records, driver’s licenses, bank balances,
etc. Smartphones, cars, and appliances with built-in computers can be programmed to meet
individual needs better.
A bright house has a built-in monitoring system that can turn lights on and off, open and close
windows, operate the oven, and more.
With small computing devices available for performing innovative tasks like cooking dinner,
programming the VCR, and controlling the flow of information in an organization, people can
spend more time doing what they often do best- being creative. Computers can help people
work more creatively.
Multimedia systems are known for their educational and entertainment value, called
‘edutainment.’ Multimedia combines text with sound, video, animation, and graphics, greatly
enhancing user and machine interaction and making information more exciting and appealing
to people. Expert systems software enables computers to ‘think’ like experts.
Medical diagnosis expert systems, for example, can help doctors pinpoint a patient’s illness,
suggest further tests, and prescribe appropriate drugs.
37 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
from a medical expert hundreds or thousands of miles away. Similarly, people with disabilities can
communicate more effectively with others using computers.
Distance learning and videoconferencing are concepts made possible with an electronic
classroom or boardroom accessible to people in remote locations. Vast information databases
are currently available to Internet users, who can send mail messages to each other. The
information superhighway is designed to significantly expand this interactive connectivity so that
people worldwide will have free access to all these resources.
People power is critical to ensuring that hardware, software, and connectivity are effectively
integrated in a socially responsible way. People - computer users and computer professionals -
are the ones who will decide which hardware, software, and networks endure and how significant
an impact they will have on our lives. Ultimately, people's power must be exercised to ensure that
computers are used not only efficiently but in a socially responsible way.
EXERCISES
b. Computers are sometimes used to monitor systems that previously needed human supervision.
e. Computer users do not have much influence over how computing develops.
3. What are the benefits of using computers with the following items?
a. Security systems
b. Cars
c. Phones
38 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
9. What types of computing systems are made available to people in remote locations using
electronic classrooms or boardrooms?
TABLE A
a. Edutainment
b. Multimedia
c. Expert system
d. Telecommute
e. Information superhighway
TABLE B
ii. Use computers to stay in touch with the office while working at home
iii. Internet system designed to provide free, interactive access to vast resources for people all over
the world
VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.
In these flash cards, you will find other forms of the same word directly under the word. These words
have the same general meaning; they represent
the different parts of speech of the word. For each of the forms, the part of speech is given. Also,
you can observe two examples of using the keywords and other parts.
39 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
adj. bearable
Although stock prices declined, losses have been bearable for most investors.
adj. blocked
adj. blurry
n. blur
adj. enhanced
40 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
Passing the exam should enhance your chances of being admitted to college.
n. intrigue
syn. discard
41 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
UNIT 5
DATA MINING
Data mining filters through large amounts of raw data for useful information, giving businesses a
competitive edge. This information is made up of meaningful patterns and trends that are already
in the data but were previously unseen.
The most famous tool used in mining is artificial intelligence (AI). AI technologies try to work the
way the human brain works by making intelligent guesses, learning by example, and using
deductive reasoning. Some popular AI methods used in data mining include neural networks,
clustering, and decision trees.
Neural networks look at the rules of using data based on the connections found or on a sample
set of data. As a result, the software continually analyses value. It compares it to the other factors,
and it compares these factors repeatedly until it finds patterns emerging. These patterns are
known as rules. The software then looks for other patterns based on these rules or sends an alarm
when a trigger value is hit.
Clustering divides data into groups based on similar features or limited data ranges. Clusters are
used when data is not labeled favorably to mining. For instance, an insurance company that
wants to find instances of fraud wouldn’t have its records labeled as fraudulent or not fraudulent.
However, after analyzing patterns within clusters, the mining software can start to figure out the
rules that point to which claims are likely to be false.
Decision trees, like clusters, separate the data into subsets and then analyze them to divide them
into further subsets (for a few more levels). The final subsets are small enough that the mining
process can find interesting patterns and relationships within the data.
Once the data to be mined is identified, it should be cleaned. Cleansing data frees it from
duplicate information and erroneous data. Next, the data should be stored uniformly within
relevant categories or fields. Mining tools can work with all types of data storage, from large data
warehouses to smaller desktop databases to fiat files. Data warehouses and data When the
process is complete, the mining software generates a report. An analyst reviews the report to see
if further work needs to be done, such as refining parameters, using other data analysis tools to
examine the data, or even scrapping it if it’s unusable. If no further work is required, the report
proceeds to the decision-makers for appropriate action.
The power of data mining is being used for many purposes, such as analyzing Supreme Court
decisions, discovering patterns in health care, pulling stories about competitors from newswires,
resolving bottlenecks in production processes, and analyzing sequences in the human genetic
makeup. There is no limit to the type of business or study area where data mining can benefit.
EXERCISES
42 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
c. In data mining, patterns found while analyzing data are used to analyze the data further.
a. Separate data into subsets and then analyze them to divide them into further subsets for many
levels.
c. Divide data into groups based on similar features or limited data ranges.
TABLE A
a. Data mining
b. AI
c. Cleansed data
d. Data warehouse
TABLE B
iii. A process of filtering through large amounts of raw data for useful information
43 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
iv. A computing tool that tries to operate in a way similar to the human brain
4. COMPLETE THE FOLL OWING DESCRIPTION OF THE DATA MINING PROCESS USING
WORDS FROM THE TEXT:
Large amounts of data stored in data ………..……….. are often used for data ………..……….. The
data is first ………..……….. to remove ………..……….. information and errors. The ………..……….. is
then analyzed using a tool such as ………..……….. An analysis report is then analyzed by an
………..……….. who decides if the ………..……….. need to be refined, other data tools need to
be used, or if the results need to be discarded because they are ………..……….. The analyst passes
the final results to the ………..……….. makers who decide on the ………..……….. action.
VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.
In these flash cards, you will find other forms of the same word directly under the word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.
critical adj. extremely important, very serious, finding fault, to carefully judge
V. critique
n. criticism
n. critic
Adv. critically
It is critical to follow the directions for the experiment precisely, as the instructor indicates.
distort v. to change from the original shape or condition, usually in an unnatural way
n. distortion
Time and space are distorted when traveling at the speed of light.
44 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
v. diversify
The diversity of life forms on Earth makes zoology an exciting study area.
n. prosperity
n. revelation
The president revealed some of his ideas before he gave his speech.
The report made some revelations about the nature of the conflict.
creep v. to move slowly and quietly close to the ground; to begin to happen
crush v. to press together to distort the shape or nature of the object completely.
45 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
adj. crushing
n. crush
The passage of the legislation was a crushing blow to the president’s program.
46 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
UNIT 6
LINUX
Linux has its roots in a student project. In 1992, an undergraduate called Linus Torvalds was studying
computer science in Helsinki, Finland. Like most computer science courses, a significant
component was taught on (and about) Unix. Unix was the wonder operating system of the 1970s
and 1980s: both a textbook example of operating system design principles and sufficiently robust
to be the standard OS in engineering and scientific computing. But Unix was a commercial
product (licensed by ATET to several resellers) and cost more than a student could pay.
Annoyed by the shortcomings of Minix (a compact Unix clone written as a teaching aid by
professor Andy Tannenbaum), Linus set out to write his own ‘kernel’ - the core of an operating
system that handles memory allocation, talks to hardware devices, and makes sure everything
keeps running. He used the GNU programming tools developed by Richard Stallman’s Free
Software Foundation, an organization of volunteers dedicated to fulfilling Stallman’s ideal of
making good software that anyone could use without paying. When he’d written a basic kernel,
he released the source code to the Linux kernel on the internet.
Source code is essential. It’s the original from which compiled programs are generated. If you
don’t have the source code for a program, you can’t modify it to fix bugs or add new features.
Most software companies won’t sell you their source code or will only do so for an eye-watering
price because they believe that if they make it available, it will destroy their revenue stream.
What happened next was astounding, from the conventional commercial software industry point
of view - and utterly predictable to anyone who knew about the Free Software Foundation.
Programmers (primarily academics and students) began using Linux. They found it didn’t do what
they wanted, so they fixed it. And where they improved it, they sent the improvements to Linus,
who rolled them into the kernel. And Linux began to grow.
There’s a term for this model of software development; it’s called Open Source.
Anyone can have the source code - it’s free (in the sense of free speech, not free beer). Anyone
can contribute to it. If you use it heavily, you may want to extend development or fix bugs in it -
and it is so easy to give your fixes back to the community that most people do so.
An operating system kernel on its own isn’t much use. However, Linux was purposefully designed
as a near-clone of Unix, and there is much software out there that is free and was designed to
compile on Linux. By about 1992, the first ‘distributions’ appeared.
Distribution is the Linux-user term for a complete operating system kit, complete with the utilities
and applications you need to make it do useful things - command interpreters, programming
tools, text editors, typesetting tools, and graphical user interfaces based on the X windowing
system. X is a standard in academic and scientific computing but not hitherto common on PCs;
it’s a complex distributed windowing system on which people implement graphical interfaces like
KDE and Gnome.
47 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
As more and more people learned about Linux, some began to port the Linux kernel to run on
non-standard computers. Because it’s free, Linux is now the most widely-ported operating system.
EXERCISES
e. Linux runs on more types of computers than any other operating system.
2. How was the Linux kernel first made available to the general public?
4. Why will most software companies not sell you their source code?
6. What is X?
TABLE A
a. Kernel
c. Source code
d. Open Source
e. A distribution
f. X
TABLE B
48 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
i. A type of software development where any programmer can develop or fix bugs in the software
ii. The original systems program from which compiled programs are generated
iii. A complete operating system kit with the utilities and applications you need to make it do useful
things
iv. A standard distributed windowing system on which people implement graphical interfaces
v. An organization of volunteers dedicated to making good software that anyone could use
without paying
vi. The core of an operating system that handles memory allocation, talks to hardware devices,
and makes sure everything keeps running
2. Why is the supervisor program the most essential operating system program?
When a new computer comes off the factory assembly line, it can do nothing. The hardware
needs software to make it work. Are we talking about application software such as word
processing or spreadsheet software? However, an application software package does not
communicate directly with the hardware. Between the applications software and the hardware
is a software interface - an operating system. An operating system is a set of programs between
applications, software, and the computer hardware.
The most critical program in the operating system, the program that manages the operating
system, is the supervisor program, most of which remains in memory and is thus referred to as
resident. The supervisor controls the entire operating system and loads other operating system
programs (called nonresident) into memory from disk storage only as needed.
An operating system has three main functions: (1) manage the computer’s resources, such as the
central processing unit, memory, disk drives, and printers; (2) establish a user interface; and (3)
execute and provide services for applications software. Keep in mind, however, that much of the
work of an operating system is hidden from the user. In particular, the first listed function, managing
the computer’s resources, is taken care of without the user being aware of the details.
Furthermore, although invoked by an application program, all input and output operations are
carried out by the operating system.
49 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.
In these flash cards, you will find other forms of the same word directly under the word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.
syn. standard
Soon, seeing the person you are talking to on the phone will be commonplace.
exclusively adv. no one else; nothing else; not shared with others
n. exclusion
50 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
v. exclude
The teacher was very rigid in his ideas about class attendance.
adj. sufficient
v. suffice
51 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
52 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
UNIT 7
USER INTERFACES
Cheaper and more powerful personal computers are making it possible to perform processor-
intensive tasks on the desktop. Technology breakthroughs, such as speech recognition, enable
new computer interaction methods. The convergence of personal computers and consumer
electronics devices is broadening the base of computer users and placing a new emphasis on
ease of use. Together, these developments will drive the industry in the next few years to build the
first completely new interfaces since SRI International and Xerox’s Palo Alto Research Center did
their pioneering research into Graphical User Interfaces (GUI) in the 1970s.
True, it’s unlikely that you’ll be ready to toss out the keyboard and mouse any time soon; indeed,
a whole cottage industry - inspired by the hyperlinked design of the World Wide Web - has sprung
up to improve today’s graphical user interface. Companies are developing products that
organize information graphically in more intuitive ways. XML-based formats enable users to view
content, including local and network files, within a single browser interface. But the more dramatic
innovations, such as speech recognition, are poised to shake up interface design.
Speech will become a significant component of user interfaces, and applications will be
completely redesigned to incorporate speech input.
With their cramped keyboards and essential handwriting recognition, palm-size and handheld
PCs will benefit from speech technology.
Though speech recognition may never replace other input devices, future interfaces will offer a
combination of input types, a concept known as multimodal input. A mouse is a very efficient
device for desktop navigation, for example, but not for changing the style of a paragraph. Using
a mouse and speech input, a user can point to the appropriate paragraph and then say to the
computer, ‘Make that bold.’ Of course, multimodal interfaces will involve more than just traditional
input devices and speech recognition. Eventually, most PCs will also have handwriting
recognition, Text-to-speech (TTS), the ability to recognize faces or gestures, and even the ability
to observe their surroundings.
Researchers have given sight to PCs running Microsoft Windows using video cameras at The
Intelligent Room, a Massachusetts Institute of Technology’s Artificial Intelligence Lab project. ‘Up
to now, the PC hasn’t cared about the world around it,’ said Rodney A. Brooks, the Director of
MIT’s Artificial Intelligence Lab. Combining computer vision with speech understanding liberates
the user from sitting before a keyboard and screen.
It’s no secret that the amount of information - both on the Internet and within intranets - at the
fingertips of computer users has been expanding rapidly. This information onslaught has led to an
interest in intelligent agents and software assistants that perform tasks such as retrieving and
delivering information and automating repetitive tasks. Agents will make computing significantly
easier. They can be used as Web browsers, helpdesks, and shopping assistants. With the ability to
look and listen, intelligent agents will bring personal computers one step closer to behaving more
like humans.
53 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
This is not an accident. Researchers have long noted that users tend to treat their personal
computers as though they were human. By making computers more social,’ they hope also to
make them easier to use.
As these technologies enter mainstream applications, they will have a marked impact on how we
work with personal computers. Soon, the question will be not ‘What does software look like?’ but
‘How does it behave?’
EXERCISES
b. Keyboards and mice will soon not be required to use personal computers.
c. There have been no interface design improvements since the GUI's development.
e. Computer speech and vision will free users from sitting before a keyboard and screen.
2. What has inspired the cottage industry to develop and improve today’s graphical user
interface?
5. Name a process where a mouse is particularly useful and a process that is not so helpful.
7. What input device will be used to give vision to the user interface?
54 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
TABLE A
a. GUI
b. Multimodal interface
c. Intelligent agent
d. ITS
TABLE B
i. Software assistant that performs tasks such as retrieving and delivering information and
automating repetitive tasks
ii. Text-to-speech
v. A system that allows users to interact with a computer using a combination of inputs such as
speech recognition, handwriting recognition, text-to-speech, etc.
VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.
In these flash cards, you will find other forms of the same word directly under the word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.
She was able to make accurate observations with the new telescope.
55 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
n. dimness
syn. enormous
Reaching the Moon was a gigantic step in space exploration for humankind.
New methods of farming offer gigantic advantages over the old methods.
Kennedy left a lasting impression on the people who heard his inaugural address.
n. domination
The dominant life forms of the Paleozoic era lived in the water.
56 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
n. dormancy
The volcano had been dormant for hundreds of years before last month's eruption.
v. select
n. selection
n. selectivity
They were very selective when they chose the members of the academic team.
57 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
UNIT 8
There are many advantages to this approach. The havoc caused by viruses makes outsourcing
your email and office suite services an attractive option. It also gives you more flexibility - you pay
for applications as and when needed rather than investing in costly software that you’re tied to
for years. Not having to worry about upgrading to the latest version of your office suite or about
battling with the complexities of managing an email system leaves businesses with mere time. It's
time to focus on what they do best.
However, there are some potential pitfalls. Using applications remotely requires much bandwidth,
which is only available from a broadband connection or a leased line to the ASP. It is also essential
to ensure that the ASP can provide a secure, reliable service that will be available whenever you
need it.
Providing applications and storage space for vast numbers of users requires some powerful
technology on the port of the ASP; this includes security controls and data storage, as well as
providing physical links to customers. Most ASPs don’t own the data centers that store the
information. Instead, they lease space from data storage specialists. In this way, they can be
confident of meeting customers’ increasing storage requirements by buying more space as it’s
needed.
There’s a wide variety of applications available for use via ASPs. Office suite applications and
email services are two of the most generic applications available through ASPs. Large, complex
business applications such as enterprise resource planning tools like SAP are another popular
candidate for delivery through an ASP. Other business services, such as payroll and accounting
systems, are also available. This is particularly beneficial to small businesses likely to overgrow and
don’t want to deal with the problems caused by outgrowing their existing system and moving to
a high-end package. ASPs also offer a means of using specialist tools that would otherwise prove
prohibitively expensive. Small businesses can use such tools for short periods as and when needed
rather than having to buy the software as a permanent investment.
One of the significant barriers for small businesses that want to start in e-commerce is ensuring they
have sufficient resources to cope with sudden significant customer increases. This means having
adequate storage for all your customers’ details and ensuring you have the technology to handle
stock levels, efficient delivery, and significant traffic volumes. It’s rare for an e-commerce business
to handle all of these elements by itself, making this one of the best-established areas of ASP use.
Being able to respond rapidly to changes in the size of your customer base and the type of
58 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
product they want to order from your business demands more flexibility than traditional software
can provide.
EXERCISES
1. USING INFORM ATION FROM THE TEXT, M ARK THE FOLLOWING AS TRUE OR FALSE:
a. Software from an ASP must be installed locally on a user’s computer.
a. no charge
c. single payment
3. How does an ASP ensure that they have enough storage space for the changing needs of
customers?
5. Why is it beneficial for a small business to be able to rent specialist tools from an ASP?
TABLE A
a. Website
b. ASP
c. Virus
d. Office suite
e. Bandwidth
59 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
f. Broadband
g. Datacenter
h. SAP
TABLE B
v. Self-replicating program
4. RE AD THE NEXT PAGE TEXT (UNDERSTANDING M P3) TO FIND THE ANSWERS TO THESE
QUESTIONS.
1. What does MP3 stand for?
UNDERSTANDING MP3
The name comes from MPEG (pronounced EM-peg), which stands for the Motion Picture Experts
Group. MPEG develops standards for audio and video compression. MP3 is MPEG Audio Layer 3.
MP3 competes with another audio file format called WAV. The critical difference is that MP3 files
are much smaller than WAV files. An MP3 file can store a minute of sound per megabyte, while a
WAV file needs 11 or 12 megabytes to hold the same amount. How does MP3 achieve this
compression? CDs and audio files don’t reproduce every sound of a performance. Instead, they
sample the performance and store a discrete code for each sampled note. A CD or WAV file may
sample a song 44,000 times a second, creating a vast mass of information.
By stripping out sounds most people can’t hear, MP3 significantly reduces the information stored.
For instance, most people can’t hear notes above a frequency of 16kHz, so it eliminates them
from the mix. Similarly, it eliminates quiet sounds masked by noise at the same frequency. The result
is a file that sounds similar to a CD but much smaller. An MP3 file can contain spoken word
60 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
performances, such as radio shows, audiobooks, and music. It can provide information about itself
in a coded block called a tag. The tag may include the performer’s name, a graphic such as an
album cover, the song’s lyrics, the musical genre, and a URL for more details.
5. RE AD THE REST OF NEX T PAGE TEXT (PLAY MP3 FILES) TO FIND THE ANSWERS TO THESE
QUESTIONS:
1. How do you play MP3 files?
2. What does the Windows Media Player file do with an MP3 file?
5. What information can you obtain by clicking the track info button?
Most machines today have enough processing power and memory to play MP3s immediately.
Download an MP3 file like any other and click on it in Windows Explorer. The Windows Media Player
will decode the file and route the signals to your sound card and speakers.
Most standalone players have many features beyond Windows’ default Media Player. Players let
you group songs into playlists to control what music you play and randomize the selections. They
offer spectrum analyzers, graphic equalizers, and frequency displays to control how the music
sounds.
2. Track info.
A track info button gives you the information on the MP3 file’s tag. Other buttons may take you to
a music library where you can organize your MP3 files by performer or genre.
3. Skins or themes.
These programs are designed to change the appearance of the most popular players. They’re
akin to the wallpaper that alters the look of the Windows desktop. With a skin, a player can
become a jukebox, car dashboard, or Star Trek tricorder. Think of them as easily interchangeable
faceplates.
61 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
A ripper program rips songs from a CD in your CD-ROM drive and turns them into WAV files. An
encoder converts WAV files into MP3 files or vice versa. Many MP3 players incorporate rippers and
encoders and can do both steps in one.
5. Recorders.
With a writeable CD-ROM drive, a recorder program lets you create your audio CDs.
STRUCTURE
using MIDI
We can use an -ing clause, as in example 1, to explain how something happens. The-ing clause
explanation can be placed before or after the main clause, as in example 2.
3. A WAV file may sample a song 44,000 times a second, [cause] creating a vast mass of
information. [effect]
EXERCISE
1. Match each cause and effect. Then, link them with an -ing clause.
CAUSE
62 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
EFFECT
a. This permits extra information and other track details to be stored on the performer.
c. This allows you to sample a new group before buying their CD.
e. This allows the music being played to be stored by the computer and displayed on the monitor.
63 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
EXERCISES
1. COMPLETE THESE DEFINITIONS WITH THE CORREC T PARTICIPLE OF THE VERB GIVEN IN
BRACKETS.
1. A gateway is an interface ………..……….. (enable) dissimilar communication networks.
2. A bridge is a hardware and software combination ………..……….. (use) to connect the same
type of network.
4. A router is a particular computer ………..……….. (direct) messages when several networks are
linked.
6. A LAN is a network ………..……….. (connect) computers over a small distance, such as within a
company.
9. A thin client is a simple computer ………..……….. (comprise) only a processor, memory, display,
keyboard, mouse, and hard drives.
10. A hub is an electronic device ………..……….. (connect) all the data cabling in a network.
64 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
b. It is dedicated to dance.
b. This makes sure vital tasks are carried out in her absence.
VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.
In these flash cards, direct under the word, you will find other forms of the same word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.
n. drama
65 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
n. elaboration
n. minutia
adj. prime
n. prime
66 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
syn. convenience
She had all the amenities of life when she went camping.
67 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
UNIT 9
Although data-delivery systems like Ethernet or X.25 bring packets to any machine electrically
attached to the cable, the IP modules must know each other’s Internet addresses to
communicate. A machine acting as a gateway connecting different TCP/IP networks will have a
different Internet address on each network. Internal look-up tables and software based on
another standard, Resolution Protocol, route the data through a network gateway.
Another piece of software works with the IP-layer programs to move information to the proper
application on the receiving system. This software follows a standard called the User Datagram
Protocol (UDP). You can think of the UDP software as creating a data address in the TCP/IP
message that states precisely what application the data block is supposed to contact at the
address the IP software has described. The UDP software provides the final routing for the data
within the receiving system.
The Transmission Control Protocol (TCP) part of TCP/IP comes into operation once the packet is
delivered to the correct Internet address and application port. Software packages that follow the
TCP standard run on each machine establish a connection to each other and manage the
communication exchanges. A data-delivery system like Ethernet doesn’t promise to deliver a
packet successfully. Neither IP nor UDP knows anything about recovering packets that aren’t
successfully delivered. However, TCP structures and buffers the data flow looks for responses, and
takes action to replace missing data blocks. This concept of data management is called reliable
stream service.
After TCP brings the data packet into a computer, other high-level programs handle it. Some are
enshrined in official US government standards, like the File Transfer Protocol (FTP) and the Simple
Mail Transfer Protocol (SMTP). Suppose you use these standard protocols on different kinds of
computers. In that case, you will at least have ways of quickly transferring files and other kinds of
data.
Conceptually, software that supports the TCP protocol stands alone. It can work with data
received through a serial port, over a packet-switched network, or from a network system like
Ethernet. TCP software doesn’t need to use IP or UDP; it doesn’t have to know they exist. But in
practice, TCP is an integral part of the TCP/IP picture and is most frequently used with those two
protocols.
68 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
EXERCISES
c. UDP software provides the final routing for data within the receiving system.
7. What processes are performed by TCP software to provide reliable stream service?
8. What standard protocols are mentioned to deal with the data after TCP brings it into the
computer?
TABLE A
a. Internet address
b. Resolution Protocol
c. Look-up table
d. Gateway
69 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
TABLE B
ii. Standard used by software that moves information to the correct application on the receiving
system of a network
iii. Standard used by software that manages communication exchanges between computers on
the Internet
VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.
In these flash cards, direct under the word, you will find other forms of the same word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.
syn. inconsistent
The artist’s paintings have an erratic quality, some excellent and others mediocre.
n. exaggeration
70 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
The burgeoning population of major cities is creating a demand for more services.
The attorneys were conspicuous for their aggressive manner in the courtroom.
dignitary n. a very important or famous person, usually associated with a high position in
government
syn. notable
n. elusiveness
adj. exhausting
adj. exhausted
n. exhaustion
71 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
syn. sufficient
There is ample evidence that the young man was speeding when the accident occurred.
syn. dry
The area known as the Sahara Desert is one of the most arid places in the world.
The valley on the leeward side of the mountain was extremely arid.
defy v. to show little fear or regard for rules or established norms; to challenge
adj. defying
n. defiance
n. enactment
72 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
syn. arbitrary
73 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
UNIT 10
EMAIL PROTOCOLS
Although the format of a mail message, as transmitted from one machine to another, is rigidly
defined, different mail protocols transfer and store messages in slightly different ways. The mail
system you’re probably used to employs a combination of SMTP and POP3 to send and receive
mail, respectively. Others may use IMAP4 to retrieve mail, especially with limited or expensive
bandwidth.
SMTP is used to transfer messages between one mail server and another. It’s also used by email
programs on PCs to send mail to the server. SMTP is very straightforward, providing only facilities to
deliver messages to one or more recipients in batch mode. Once a message has been delivered,
it can’t be recalled or canceled. It’s also deleted from the sending server once it’s been delivered.
SMTP uses a ‘push’ operation, meaning that the connection is initiated by the sending server rather
than the receiver. This makes it unsuitable for delivering messages to desktop PCs, which aren’t
guaranteed to be switched on at all times.
In host-based mail systems, such as Unix and Webmail, SMTP is the only protocol the server uses.
Received messages are stored locally and retrieved by the mail program from the local file system.
In the case of Webmail, the message is then translated into HTML and transmitted to your browser.
SMTP is the only protocol for transferring messages between servers. How they’re then stored varies
from system to system.
POP is a message-retrieval protocol used by many PC mail clients to get messages from a server,
typically your ISP’s mail server; it only allows you to download all messages in your mailbox
simultaneously. It works in pull’ mode, with the receiving PC initiating the connection. PC-based
POP3 mail clients can do this automatically at a preset interval. When you use your Webmail
account to access a POP3 mailbox, the mail server opens a connection to the POP3 server just as
a PC-based application would. The messages are copied into your Web mailbox and read via a
browser.
Since POP3 downloads all the messages in your mailbox, there’s an option to leave messages on
the server so that they can be picked up from different machines without losing any. This means
you’ll get every message downloaded every time you connect to the server; if you don’t clean
out your mailbox regularly, this could mean long downloads. When using a Webmail account to
retrieve POP3 mail, be careful about leaving messages on the server - if too many build up, each
74 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
download will take a long time and fill up your inbox. Many Webmail systems won’t recognize
messages you’ve already downloaded, so you’ll get duplicate ones you haven’t deleted.
IMAP is similar to POP but allows you to choose what messages you download. Initially, only
message headers are retrieved, giving information about the sender and subject. You can then
download just those messages you want to read. You can also delete individual messages from
the server, and some IMAP4 servers let you organize your mail into folders. This shortens download
times, and there’s no danger of losing messages.
EXERCISES
f. SMTP is only one of many protocols used to send mail between servers.
6. What happens when you use your Webmail account to access a POP3 mailbox?
75 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
TABLE A
a. SMTP
b. ‘Push’ operation
c. POP
e. IMAP
TABLE B
i. An email transfer process in which the connection is initiated by the sending computer
rather than the receiving computer.
ii. A mail transfer protocol that initially only retrieves the message headers.
iii. An email transfer process in which the receiving computer initiates the connection.
VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.
In these flash cards, direct under the word, you will find other forms of the same word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.
syn. Survive
76 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
syn. shelter
syn. include
syn. Carelessly
The reporters had inadvertently failed to include the name of one of the dignitaries.
Miraculously adv. caused by something that cannot be explained by the laws of nature
adj. miraculous
n. miracle
syn. astonishingly
Given the extent of her injuries, it is almost a miracle that she is still alive.
adj. retrieved
syn. recover
n. retrieval
Will Detroit retrieve its status as the world's car manufacturing center?
77 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
This computerized information retrieval system is the most up-to-date system available.
syn. Unjustified
The motorist felt that the ticket for the infraction was unwarranted.
syn. Apex
78 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
UNIT 11
HTML is an application-specific derivation of SGML. It is a set of codes, generally used for web
pages, that creates electronic documents according to rules established by SGML. HTML is a
language about presenting your information, not the actual data. You can, therefore, say that
HTML is a presentation language.
XML is a subset of SGML, but it is also, like SGML, a meta-language. XML defines a specific method
for creating text formats for data so that files are program-independent and platform-
independent and support internationalization (able to read different languages, etc.). Because
XML is an extensible language, you don’t even have to have a browser to interpret the page.
Applications can parse the XML document and read the information without human intervention.
XML, unlike HTML, is concerned with the identity, meaning, and structure of data. XML is extensible
because it lets website developers create their own set of customized tags for documents. This
ability to define your tags is the main feature of XML, which gives developers more flexibility.
By defining your markup tags, you can explicitly define the content in the document. This makes
XML a more intelligent markup language than HTML. For example, in HTML, you could have a
paragraph tag <p> preceding a paragraph about baseball. Your Web browser sees this tag and
knows to present the following text as a paragraph. However, all your browser knows about the
text is that it is text; it doesn’t know that it is specifically about baseball. In an XML document, you
could define a
<BASEBALL> tag to refer specifically to the text in the paragraph in your document. This way, when
your XML browser examines the document, the document knows what data it contains, and that
makes the content more intelligent. Search engines that use XML data can better find the pages
you are looking for because of the intelligent nature of XML content.
By design, XML does not deal with how the end user displays the data. Because HTML is a
presentation language, XML documents use HTML tags to help handle the visual formatting of the
document. Also, you can use XML in your HTML documents to provide metadata, which is data
about data in the document.
XML will do what HTML initially did to the Web and e-commerce to the Internet. XML and its
associated applications have the potential to blow the roof off the Internet and how we do
business.
79 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
EXERCISES
TABLE A
a. Metadata
b. Meta-languages
c. HTML
d. XML
e. Markup language
80 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
TABLE B
VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.
In these flash cards, direct under the word, you will find other forms of the same word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.
adj. abusive
v. abuse
syn. Misuse
The constant abuse of the environment will have grave consequences in the future.
allocation n. a share; a part set aside for a particular purpose; an assignment of portions
adj. allocated
v. allocate
syn. Distribution
81 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
conservation n. the act of using carefully; setting aside for future use, favoring traditional
values
v. conserve
n. conservationist
n. conservatism
syn. Preservation
Conservation of forest land is the primary objective of the National Forest Service.
The Republican Party is generally known to be more conservative than the Democratic Party.
n. feasibility
syn. possible
Before they begin the project, a study must be done of its feasibility.
syn. flexible
She was able to make the limber movements that are required of gymnasts.
adj. perceived
v. preconceive
syn. Bias
82 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
It is not easy to overcome preconceptions if we are not open to new ideas. His preconceived
notions about Los Angeles disappeared after he visited the city.
n. robustness
syn. strong
n. antiquity
syn. old-fashioned
83 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
UNIT 12
BROADBAND COMMUNICATIONS
Integrated Services Digital Network (ISDN)
ISDN services can be carried over existing telephone network infrastructure to terminal adapters
(TAs) in the client machine. A common ISDN interface standard has a digital communications line
consisting of three independent channels: two Bearer (B) channels, each at 64Kbit/s, and one
Data (D) channel at l6Kbit/s. The D channel is used to carry signaling and supervisory information
to the network. In contrast, the B channels carry the data and can be linked to provide a l28Kbit/s
data channel.
Wireless connections
The wireless alternatives come in two forms: satellite and cellular. Satellite systems require the use
of a modem to maintain the upload. Downstream bandwidth is provided via a dedicated satellite
dish, connector hardware, and proprietary software.
Cellular systems use assigned radio frequencies and are based around a network of transmitters
arranged in a cellular network, much like cellular mobile phone systems.
Cable companies can offer affordable broadband services over copper coaxial or fiber
infrastructure networks. Several customers share the connection on a branch, so connection rates
are variable, unlike ISDN and DSL.
DSL technology capitalizes on the existing network of copper infrastructure but allows digital
signals to be carried rather than analog. It allows the total bandwidth of the copper twisted-pair
telephone cabling to be utilized.
With splitter-based services, the DSL signal is pulled out from the phone line as it enters your
premises and is wired separately to a DSL modem. This involves additional hardware and
installation by the service provider at the customer site. The shielded option involves no installation,
but the telephone company’s equipment and some of your equipment might need upgrading.
With Asymmetric Digital Subscriber Line (ADSL), most of the duplex bandwidth is devoted to the
downstream direction, with only a tiny proportion of bandwidth available upstream. Much Internet
traffic through the client’s connection, such as Web browsing, downloads, and video streaming,
needs high downstream bandwidth. However, user requests and responses are less significant and
require less upstream. In addition, a small proportion of the downstream bandwidth can be
devoted to voice rather than data, allowing you to hold phone conversations without requiring a
separate line.
84 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
DSL-based services are a very low-cost option compared to other solutions offering similar
bandwidth, so they can be made available to the customer at highly competitive prices.
EXERCISES
b. Two ISDN channels can be combined to give the user double the bandwidth.
g. You need a separate time to hold regular phone conversations on an ADSL system.
6. Compared to the downstream bandwidth, the upstream bandwidth in an ADSL line is:
a. larger
b. smaller
c. the same
TABLE A
a. ISDN
b. TA
c. Data channel
85 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
d. Bearer channel
e. DSL
f. Splitter-based services
g. ADSL
TABLE B
i. DSL system that separates the digital signals from the analog signals
ii. Digital channel used to carry ISDN signaling and supervisory information to the network
VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.
In these flash cards, direct under the word, you will find other forms of the same word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.
n. assimilation
syn. incorporate
The United States of America has assimilated people from around the world.
86 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
syn. Quality
Only parts of the highest caliber can be used to repair the spacecraft.
v. require
n. requirement
n. requisition
v. requisitions
syn. Required
Here is the list of requisite courses for the master’s degree in biology.
The project team made a requisition for a new set of reference books.
n. unraveling
syn. Separate
The detective was not able to unravel the mystery of the missing money.
The unraveling of the Soviet Union took place in the span of a few months.
charisma n. a remarkable quality that endears other people to the person who has this
quality
adj. charismatic
syn. appeal
87 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
adj. endurable
adj. enduring
n. endurance
syn. Persevere
The endurance displayed by the athlete gave evidence of his rigorous training.
forfeit v. to give up; to have something taken away, usually by rule or regulation
n. forfeit
syn. Relinquish
Usually, it would be best if you forfeited your native country’s citizenship to become a citizen of
another country.
syn. hazardous
88 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
UNIT 13
Everyone using a public-key system has a public key and a private key. Messages are encrypted
and decrypted with these keys. A message encrypted with your public key can only be decrypted
by a system that knows your private key.
For the system to work, two parties engaging in a secure transaction must know each other’s
public keys. Private keys, however, are closely guarded secrets known only to their owners.
When I want to send you an encrypted message, I use your public key to turn my message into
gibberish. Only you can return the gibberish to the original message because only you know your
private key. Public-key cryptography also works in reverse - only your public key can decipher
your private key’s encryption.
To make a message tamper-proof (providing message integrity), the sender runs each message
through a message-digest function. This function within an application produces a number called
a message-authentication code (MAC). The system works because it’s almost impossible for an
altered message to have the same MAC as another message. Also, you can’t take a MAC and
turn it back into the original message.
The software used for a given exchange produces a MAC for a message before it’s encrypted.
Next, it encrypts the MAC with the sender’s private key. It then encrypts both the message and
the encrypted MAC with the recipient’s public key and sends the message.
When the recipient gets the message and decrypts it, they also get an encrypted MAC. The
software takes the message, runs it through the same message-digest function the sender used,
and creates its own MAC. Then, it decrypts the sender’s MAC. The message hasn’t been tampered
with if the two are the same.
The dynamics of the Web dictate that a user- authentication system must exist. This can be done
using digital certificates.
89 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
by generating a MAC for it, then encrypts the MAC with the issuer’s private key. If the client trusts
the issuer, it already knows its public key.
The dynamics and standards of secure transactions will change. However, the three basic tenets
of secure transactions will remain the same. If you understand the basics, you’re already three
steps ahead of everyone else.
EXERCISES
b. To send a secure message, you must know the recipient’s public key.
c. Secure messages usually are encrypted using a private key before they are sent.
a. privacy
b. integrity
c. authentication
2. A message encrypted with the recipient’s public key can only be decrypted with
90 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
a. authenticate a user
b. create a MAC
c. encrypt a message
TABLE A
a. Gibberish
b. Impostor I
c. Decipher
d. MAC
e. Tenets
f. Tamper
TABLE B
i. Message-authentication code
TABLE 1
91 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
TABLE 2
Routine
1. misdirection
2. reproduction
3. rigger
4. payload
Function
92 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
Similarly, a computer virus is a minimal program routine that infects a computer system and uses
its resources to reproduce itself. It often does this by patching the operating system to enable it to
detect program files, such as COM or EXE files. It then copies itself into those files. This sometimes
causes harm to the host computer system.
When the user runs an infected program, it is loaded into memory carrying the virus. The virus uses
a common programming technique to stay resident in memory. It can then use a reproduction
routine to infect other programs. This process continues until the computer is switched off.
The virus may also contain a payload that remains dormant until a trigger event activates it, such
as the user pressing a particular key. The payload can have a variety of forms. It might do
something relatively harmless, such as displaying a message on the monitor screen, or it might do
something more destructive, such as deleting files on the hard disk.
When it infects a file, the virus replaces the first instruction in the host program with a command
that changes the typical execution sequence. This type of command is known as a JUMP
command. It causes the virus instructions to be executed before the host program. The virus then
returns control to the host program, which continues with its normal sequence of instructions and
is executed typically.
To be a virus, a program only needs a reproduction routine that enables it to infect other
programs. Viruses can, however, have four main parts. A misdirection routine that enables it to
hide itself; a reproduction routine that allows it to copy itself to other programs; a trigger that
causes the payload to be activated at a particular time or when a particular event takes place;
and a payload that may be a reasonably harmless joke or may be very destructive. A program
that has a payload but does not have a reproduction routine is known as a Trojan.
STRUCTURE
STRUCTURE
A phrasal verb is a verb + preposition combination. For example, look up, take down, and turn
over. Phrasal verbs are common in informal, spoken English. Sometimes, they have a more formal
one-word equivalent, for example, work out = determine.
One, we can work out the meaning of the two words separately:
A special meaning which does not easily relate to the separate meanings of the words:
EXERCISES
93 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
run up
NOW, COMPLETE E ACH BLANK WITH THE APPROPRIATE PHRASAL VERB IN THE CORRECT
FORM. IN SOME CASES, MORE THAN ONE ANSWER IS POSSIBLE.
1. Hackers try to …….…….... passwords so they can penetrate a system.
3. The police ……..…. Ralph ……..….by talking to his friends and acquaintances.
7. Hackers may ………….….., pretending to be from your company and ask for your
password.
them.
9. Ralph was a hacker as a teenager, but he’s ……………. now and become more
responsible.
94 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
4. The best way to begin hacking into a system is to try to get hold of a password.
provide it.
8. The difficult thing was to determine how the website would look.
9. So you won’t forget, record the ID number the support technician gives you.
10. Examine the manufacturers’ websites before you phone for help.
VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.
In these flash cards, direct under the word, you will find other forms of the same word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.
sacrifice n. the act of giving up something of value for the common good
adj. sacrificial
v. sacrifice
syn. Concession
adj. triumphant
95 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
adj. triumphal
v. triumph
syn. Achievement
v. contaminate
n. contamination
syn. Polluted
v. flourish
syn. thriving
negligible adj. hardly noticeable; scarcely detectable, to ignore; to give minor attention
adj. neglected
adj. neglectful
adj. negligent
n. neglect
n. negligence
syn. Insignificant
The presence of the first person singular in the poem was almost negligible.
96 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
His negligence caused him to lose all his work on the computer.
97 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
UNIT 14
OBJECT-ORIENTED PROGRAMMING
One of the principal motivations for using OOP is to handle multimedia applications in which such
diverse data types as sound and video can be packaged together into executable modules.
Another is writing program code that’s more intuitive and reusable; in other words, code that
shortens program development time.
Perhaps the key feature of OOP is encapsulation - bundling data and program instructions into
modules called ‘objects.’ Here’s an example of how objects work. Art icons on a display screen
might be called ‘Triangles.’ When the user selects the Triangles icon - an object composed of the
properties of triangles and other data and instructions - a menu might appear on the screen
offering several choices. The choices may be (1) create a new triangle and (2) fetch one already
in storage. The menu, too, is an object, as are its choices. Each time a user selects an object,
instructions inside the object are executed with whatever properties or data the object holds to
get to the next step. Triangle: The application might execute instructions that display several types
of triangles: right, equilateral, isosceles, and so on.
Many industry observers feel that the encapsulation feature of OUP is the natural tool for complex
applications in which speech and moving images are integrated with text and graphics. With
moving images and voice built into the objects themselves, program developers avoid the sticky
problem of deciding how each separate type of data is to be integrated and synchronized into
a working whole.
A second key feature of OOP is inheritance. This allows OOP developers to define one class of
objects, say ‘Rectangles,’ and a specific instance of this class, say ‘Squares’ (a rectangle with
equal sides). Thus, all properties of rectangles - ‘Has four sides’ and ‘Contains four right angles’ are
Squares automatically inherit the two shown here. Inheritance is a valuable property in rapidly
processing business data. For instance, consider a business with a class called ‘Employees at the
Dearborn Plant’ and a specific instance of this class, ‘Welders.’ If employees at the Dearborn plant
are eligible for a specific benefits package, welders automatically qualify. Suppose a welder
named John Smith is later relocated from Dearborn to Birmingham. Revision is simple in Alabama,
where a different benefits package is available. An icon representing John Smith - such as John
Smith’s face - can be selected on the screen and dragged with a mouse to an icon representing
the Birmingham plant. He then automatically ‘inherits’ the Birmingham benefit package.
A third principle behind OOP is polymorphism. Different objects can receive the exact instructions
but deal with them differently. For instance, consider again the triangles example. If the user right-
clicks the mouse on ‘Right triangle,’ a voice clip might explain the properties of right triangles.
However, if the mouse is right-clicked on ‘Equilateral triangle,’ the voice explains the properties of
equilateral triangles instead.
98 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
This eliminates the need to write code from scratch and then debug it. Code reusability makes
both program development and program maintenance faster.
EXERCISES
5. What feature avoids the problem of deciding how each separate data type is
integrated and synchronized into a working whole?
2. COMPLETE THE FOLLOWI NG TEXT USING WORDS FROM THE RE ADING TEX T:
Encapsulation, …………and polymorphism are critical features of
….…………. programming.
TABLE A
a. OOP
b. Encapsulation
c. Object
d. Menu
e. Square
99 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
f. Polymorphism
g. Library
TABLE B
i. An OOP property that allows data and program instructions to be bundled into an object
iii. An OOP property that enables different objects to deal with the same instruction in
different ways
COMPLETE THIS TABLE. YOU MAY NOT FIND INFORM ATION FOR E ACH SE CTION OF YOUR
TABLE.
A B c
1. job title
2. nature of work
3. formal qualifications
4. personal qualities
5. technical skills
100 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
However, it’s not enough to turn up for a job interview with a logical mind as your sole qualification.
An employer wants some formal qualifications and a proven track record. But if you can show
someone an impressive piece of software with your name on it, it will count for more than a string
of academic qualifications.
So, what specific skills are employers looking for? The Windows market is booming, and there’s a
demand for good C, C++, Delphi, Java, Visual Basic, and .net developers. Avoid older languages
such as FORTRAN and COBOL unless you want to work as a contract programmer.
For someone starting, my best advice would be to subscribe to programming magazines such as
Microsoft Systems Journal. Get one or two of the low-cost ‘student’ editions of C++, Visual Basic,
and Delphi. Get a decent book on Windows programming. If you decide programming is for you,
spend more on a training course.
The first key point to realize is that you can’t know everything. However, it would help if you didn’t
become an expert in a field that is too narrow. The second key point is that you must be interested
in your subject. The third key point is to differentiate between contract work and consultancy;
good contractors move from job to job every few months. A consultant is different. A consultant
often works on very small timescales - a few days here, a week there, but often for a care
collection of companies that keep coming back repeatedly.
There’s much work out there for people who know Visual Basic, C++, etc. And many people know
it too, so you have to be better than them. Qualifications are important. Microsoft has a raft of
exams you can take, as do Novell and Cisco; in my experience, these are instrumental pieces of
paper. Exams like Microsoft Certified Systems Engineer (MCSE) are well worth doing. The same
goes for NetWare Certification. However, this won’t guarantee an understanding of the product,
its positioning in the market, how it relates to other products, etc. That’s where the all-important
experience comes in.
Here’s the road map. After leaving university, you get a technical role in a company and spend
your evenings and weekends learning the tools of your trade - and getting your current employer
to pay for your exams. You don’t stay in one company for more than two years. After a couple of
hops like that, you may be able to move into a junior consultancy position in one of the larger
consultancy companies. By 30, you’ve run big projects, rolled out significant solutions, and are
well known. Maybe then it’s time to make the leap and run your life.
IT managers manage projects, technology, and people. Any large organization will have at least
one IT manager responsible for ensuring that everyone who needs a PC has one and that it works
properly. This means taking responsibility for the maintenance of servers, installing new software,
and staffing a help desk and a support group. Medium to large companies are also likely to have
101 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
an IT systems manager. They are responsible for developing and implementing computer
software that supports the business's operations. They’re responsible for multiple development
projects and oversee the implementation and support of the systems. Companies will have two
or three significant systems that are probably bought off the shelf and then tailored by an in-house
development team.
Apart from basic hardware and software expertise, an IT manager will typically have over five
years’ experience in the industry. Most are between 30 and 45. Since it managers have to take
responsibility for budgets and for staff, employers look for both of these factors in any potential
recruit.
Nearly all IT managers have at least a first degree if not a second one. Interestingly, many of them
don’t have degrees in computing science. In any case, the best qualification for becoming a
manager is experience. Suppose your personality is such that you’re unlikely to be asked to take
responsibility for a small team or a project. In that case, you can forget being an IT manager. It
would help if you were bright and communicative and could earn your teams' trust. Most of this
can’t be taught, so if you don’t have these skills, divert your career elsewhere.
VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.
In these flash cards, direct under the word, you will find other forms of the same word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.
n. plenty
syn. Abundant
n. shelter
v. shelter
102 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
syn. Protected
She has led a sheltered life since her parents have done everything for her.
adj. accountable
v. account
n. accounting
n. accountant
syn. story
His account of the incident varied from that of the other witnesses.
hue n. color
syn. color
n. intricacy
syn. complex
The intricate design of the vase made it a valuable piece for her collection.
adj. magnificent
v. magnify
103 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
n. magnification
syn. dimension
The magnitude of shock waves determines the damage that occurs during an earthquake.
n. polling
n. pollster
v. poll
syn. survey
The poll indicated that the conservation of the environment was the number one issue with
college students.
104 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
UNIT 15
BECOMING CERTIFIED
Suppose you’re a support engineer. You’re stuck in a job you don’t like and want to change. One
way of making that change is to improve your marketability to potential employers by upgrading
your skill set. If you train yourself, however, whose training should you undertake? If you need
certificates, whose certificates should they be? Even if you get those certificates, how certain can
you be that your salary will rise? One solution is the range of certifications on offer from Microsoft.
Microsoft offers an extensive array of certification programmers aimed at anyone from the user of
a single program, such as Microsoft Word, to someone who wants to become a certified support
engineer. There are many certificates to study for, too; if you’re the proud holder of any of those
qualifications, you can call yourself a Microsoft Certified Professional (MCP).
Once you’ve decided which track you want to take, you should consider just how qualified you
already are in terms of experience and knowledge. Will you need to go and take some courses
with a training company, or are you the type who can make good use of self-study materials?
How much time do you genuinely have to devote to this? Will your employer pay for your course?
Will it grant you leave to go and do the course - assuming you can find one - on either a full-time
or part-time basis?
The critical question here is experience. This will not only influence the amount of work you’ll have
to do to get up to speed for the exams, but it could also mean the difference between passing
or failing the exam.
While you’re busy learning all you need to know for your certification, the practice exams are an
absolute godsend. They show you the type of questions you’ll encounter, and they familiarize you
with the structure of the exam. This is essential if you want to pass: the exams have time limits, and
you must get used to answering the required questions within the allotted time. It’s as simple as
that.
If you decide a training course will help you, don’t let the course title alone convince you that it
will be suitable or cost-effective. Find out exactly what the course offers and whether there are
prerequisites for attendants. You should also find out what the training company is prepared to
do if attendants don’t have the minimum knowledge necessary to be on the course.
As exams are replaced by ‘updated’ ones, you must upgrade your certification to stay current.
Ultimately, it’s your responsibility to ensure you stay current. If you don’t, you lose your certification
until you take an update.
As a support engineer, you get the satisfaction of knowing that you passed a tough test and the
happy knowledge that your network manager is sweating a bit over the fact that you could be
head-hunted at any time.
105 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
EXERCISES
b. You must get an advanced certificate before you can call yourself a Microsoft Certified
Professional.
d. Practice exams allow you to become familiar with the structure of the exams.
g. Gaining a certificate will likely make you more attractive to other employers.
2. What questions should you ask yourself if you are thinking of getting extra training?
7. What factors help you decide whether the course will be suitable or cost-effective?
b. troubleshoot systems
c. teach computing
106 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
9. TDK CD-Writer
11.ZIP drive
15.105-key keyboard
16.56 Kb modem
107 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
The resume is required for all jobs: professional, technical, administrative, and managerial jobs.
There are many ways of organizing a good resume. Depending on the job, you should choose the
format that best highlights your skills, training, and experience.
•To give an employer more information about you than the job application gives.
•To give to an interviewer so they will ask you about the positive things you want to discuss
on your resume.
•To leave with an employer after an interview as a reminder of your skills and abilities.
Self-information. Completing a background and experience list will give you the information
required to prepare your resume.
If you’ve worked before, list your jobs. Next, write down the work duties for the jobs you’ve listed.
Now, think about the skills or talents required for each work duty. Write them down.
List your hobbies, clubs you belong to, sports you’ve been involved in, school activities, and things
that interest you. Look at the first item on your list.
Think about the skills or talents. A resume must be straightforward to read so that an employer can
see who you are, where you can be reached, what kind of work you can do, and why you’re
qualified. A resume should be short, preferably one page typewritten. It must be error-free. It
includes honest, positive information that is related to your job goal.
A good resume will open the door for an interview. It takes to do that item. Write them all down.
Look at the abilities (talents) identified on your background and experience list. You have talents
that you use every day.
Resumes are required for some jobs and are sometimes required for other jobs. An employer may
have you complete an application form instead of submitting a resume. Occasionally, an
employer may ask you to complete an application in addition to your resume.
When you fill out an application form, complete it entirely and follow all instructions. Do not omit
any requested information, and make sure that the information you provide is correct.
A good resume is concise and written in one page or more, but at most, three pages is enough.
In the following, you will see a sample resume on one page:
108 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
Birth date: 1974, 12 Apr Marital Status: Married, one son Tel: 0098-21-33332222
Fax: 0098-21-44442222
Address: No. 311, 3rd St., Valie-asr Sq., Tehran, IRAN P.O.Box: 5436-876 Tehran-IRAN
e-mail: [email protected]
Educational Background
B.Sc. Project: Design and Implementation of MIS system for one hospital
Career Background
•2002-2004 SQL Server Trainer in X13 Company in Tehran and Training ICDL and Microsoft
Office
Skills
•Programming in .net
•Network Programming
•Learning English
•Swimming
109 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.
In these flash cards, direct under the word, you will find other forms of the same word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.
n. analogy
syn. similar to
The analogy between the behavior of the bacteria in the lab and the human body is unclear.
adj. compelling
syn. oblige
Despite their opposition, the representatives were compelled to vote in favor of the legislation.
syn. overwhelming
adj. intrusive
n. intrusion
110 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
n. intruder
syn. Impose
The intrusion of the hazardous gas made it difficult to live in the house.
n. proneness
syn. inclined to
v prophesy
n. prophecy
n. prophet
syn. predictive
The brilliant student fulfilled his teacher’s prophecy that he would be a successful doctor.
adj. reluctant
n. reluctance
syn. hesitatingly
Although unsatisfied with the contract, the officials reluctantly agreed to sign it.
The electrician was reluctant to estimate the cost of the repair work.
111 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
renown n. fame
adj. renowned
syn. prominence
112 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
UNIT 16
FUTURES
Talking to Professor Cochrane is probably as close as you can get to time traveling without leaving
the current dimension, as his vision stretches far into the 21st century and beyond. His seemingly
unshakeable conviction is that anything is possible if you put your mind to it. British Telecom (BT) is
already sitting on a host of innovations poised to blow your mind during this century.
Designed for the 21st century, Peter Cochrane’s signet ring is built around a chip that holds all the
details of his passport, bank account, medical records, and driving license. According to
Cochrane, it’s set to revolutionize shopping.
The ring is already a fully operational prototype. However, it will be some time before you’re
trading your credit card for the ultimate fashion accessory.
It’s not just jewelry that’s set to get smarter. One of the most significant projects at the lab is looking
at artificial intelligence to create software programs, networks, telephones, and machines with a
degree of intelligence built in. By sensing their environment, they should be able to develop new
capacities as demands change. ‘I have software that breeds, interchanges genes, and creates
adaptable behavior. This means you’ll see the network come alive - it will watch what you do and
adapt.’
It doesn’t stop there, however. BT has taken artificial intelligence one step further and created
machines that solve their problems. ‘We’ve created solutions a human could never have
dreamed of. We have solutions, and although we don’t understand how they work, they do work.
We’re effectively increasing the speed of evolution, says Cochrane.
It’s already good to talk, but it will be even better with artificially intelligent phones on the way.
Cochrane works on smartphones that can translate English into German, Japanese, and French
in real-time. ‘Some of it’s rocket science, but many are extremely simple. We’ve built a kernel of
understanding inside a machine that extracts meaning from the sentence itself. We can now do
simple things such as phrase books,’ he says.
The system uses a nonlinear approach that sends the English to the understanding kernel in the
machine and then fans it out to all the other languages simultaneously.
Undoubtedly, Cochrane is putting much faith in intelligent machines, particularly when cutting
through the deluge of information that he says is the downside of the electronic revolution. BT’s
solution is the development of intelligent agents that watch, learn, and start communicating.
It’s not all working down at the lab, however. BT is also involved in an ongoing trial that will
revolutionize our leisure time, mainly how we watch TV. ‘We put people on the Internet and
broadcast TV simultaneously so that the people at home could influence what was happening
on their TV sets. As a result, it became interactive and therefore more active.’
BT has its fingers in multiple pies and has made biotechnology another core focus of R&D. I think
hospitals are dangerous places to be. There are lots of viable alternatives. For a start, we can stop
113 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
bunging up hospital wards by putting people online.’ BT has already developed a pack for heart
attack victims that monitors their progress and uploads information via a radio link back to the
hospital.
So what will the 21st century hold for us if Peter Cochrane and his futurologists have their way?
By 2015, we will likely be eclipsed by a supercomputer more powerful than the human brain. And
if that’s visions of Terminator dancing in your head, don’t worry - Cochrane’s got it covered. ‘I’d
hate one morning to find myself considered an infestation of this planet. We are inclined to nurture
life and not destroy it. Before we let loose a bunch of artificial intelligence, we ought to consider
the necessity of building in several rules that hold your life as a human being sacrosanct.’
EXERCISES
b. Jewellery that can store large amounts of personal (data has started to replace credit
cards.
c. BT’s smartphone can only translate English into one other language simultaneously.
f. The professor thinks that potent computers will destroy humanity in the future
3. What will change dramatically when we start using rings like these?
6. What does the professor see as the negative side of the electronic revolution?
114 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
TABLE A
a. BT
b. Smartphone
c. Intelligent agent
d. Rocket science
e. R&D
f. Upload
g. Supercomputer
TABLE B
i. A computer program that watches, (earns, and communicates with the user
v. A telephone that can translate English into various languages in real time
A B c
1. Area of IT
2. Predictions
3. Comments
TEXT A
Telecom applications will soon be bundled together in much the same way as office application
suites are today. A significant example is the electronic marketplace, which will bring customers
115 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
and suppliers together in intelligent databases and virtual environments with ID verification,
encryption, and translation. It will then implement the billing, taxation, and electronic funds
transfer while automatically producing accounts and auditing. The services will be based on voice
processing, allowing a natural voice interface to talk to the computer, all the AI to carry out the
request, and voice synthesis and visualization technology to get the answer out.
Electronic money will be very secure but much more versatile than physical alternatives. E-cash
can be completely global and used as a de facto standard. It does not have to be linked to any
national currency so it can be independent of local currency fluctuations. Its growing use on the
Net will lead to its acceptance on the street, and we may hold a large proportion of our total
funds in this global electronic cash. People will increasingly buy directly from customized
manufacturers. Shops will be places where people try on clothes, not buy them. Their exact
measurements can be sent instantly to the manufacturer as soon as they have chosen an outfit.
The shops may be paid by the manufacturer instead.
TEXT B
Employment patterns will change as many jobs are automated and new jobs exist to serve new
technologies. Some organizations will follow the virtual company model, where a small core of
key employees is supported by contractors on a project-by-project basis, bringing together the
right people regardless of where they live. The desks they will use will have multiple flat screens,
voice interfaces, computer programs with human-like faces and personalities, full-screen
videoconferencing, and 3D sound positioning. All this will be done without any communication
cables since the system uses high-capacity infrared links. Many short-term contractors may not
have enough space in their homes for an office and may go instead to a new breed of local
telework centers.
Of course, workers can be fully mobile, and we could see some people abandon offices
altogether, roaming the world and staying in touch via satellite systems. Even in trains and planes,
each seat may have infrared distribution to guarantee high bandwidth communication. One tool
they may have in a few years is a communicator badge. This will give them a voice link to
computers across the network, perhaps on their office desk. They can access their files and email
using this voice link and carry out most computer-based work. Their earphones will allow voice
synthesizers to read their mail, and glasses with a projection system built into the arms and
reflectors on the lenses will allow a head-up display of visual information. Perhaps by 2010, these
glasses could be replaced by an active contact lens that writes pictures directly onto the retina
using tiny lasers.
TEXT C
Finally, in the very long term, by around 2030, we may have the technology to directly link our
brain to the ultra-smart computers that will be around then, giving us so much extra brainpower
that we deserve a new name, Homo Cybernetics. In much the same time frame, geneticists may
have created the first biologically optimized humans, Homo Optimus. It would make sense to
combine this expertise with information technology wizardry to make something like the Borg,
Homo hybrids, with the body of an Olympic athlete and a brain the size of the planet, the whole
global superhighway, and every machine connected to it. Over time, this new form may
116 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
converge with the machine world as more and more of his thoughts occur in cyberspace. With a
complete backup on the network, Homo hybridus would be completely immortal. Ordinary
biological humans would eventually accept the transition, and plain old Homo Sapiens could
become voluntarily extinct, perhaps as early as 2200.
1. COMPLETE THE GAPS IN THIS TEXT ON OPERATI NG SYSTEMS USING THE SE LINKING
WORDS AND PHRASES:
although in addition
because such as
but therefore
The user is aware of the effects of different applications programs……….…… operating systems
are invisible to most users. They lie between applications programs,…………….word-processing,
and the hardware.
……………… it is referred to as resident. Others are called non-residents………. they are loaded
into memory only when needed. Operating systems manage the computer’s
resources,……………….the central processing unit………………….. they establish a user interface
and execute and provide services for applications software, ………..…….. input and output
operations are invoked by applications programs, they are carried out by the operating system.
1. A MIDI message makes sound into code as 8-bit bytes of digital information.
2. The teacher uses a new program to give children the courage to write stories.
3. The new version of SimCity has been made better in many ways.
6. Make sure the machine is disconnected before you remove the case.
7. Designers can offer good ideas for making your website brighter.
117 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
7. RE AD THE FOLLOWIN G PASSAGE (A) AND EXPLAIN HOW SOME DRIVE RS SOLVE THIS
PROBLEM FOR THEMSELV ES.
PASSAGE A
In the last ten years, police have installed speed trap units on many busy roads. These contain a
radar set, a microprocessor, and a camera equipped with a flash. The radar sends out a beam of
radio waves at a frequency of 24 gigahertz. This is equivalent to a wavelength of 1.25 cm. If a car
moves towards the radar, the reflected signal will bounce back with a slightly smaller wavelength.
If away from the radar, the waves will reflect with a slightly longer wavelength. The microprocessor
within the unit measures the difference in wavelength between outgoing and returning signals
and calculates the speed of each vehicle. If it is above the speed pre-set by the police, the
camera takes a picture of the vehicle. The information is stored on a smart card for transfer to the
police computer. The vehicle's owner can then be traced using the Driver and Vehicle Licensing
Center database.
PASSAGE B
Some drivers have now got used to these traps. They slow down when approaching one to ensure
the camera is not triggered. They speed up again as soon as they have passed. This is known as
‘surfing’. One way of outwitting such motorists is a new computerized system. This consists of two
units with digital cameras positioned at a measured distance apart. The first unit records the time
each vehicle passes it and identifies each vehicle by its number plates using Optical Character
Recognition (OCR) software. This information is relayed to the second unit, which repeats the
exercise. The microprocessor within the second unit then calculates the time each vehicle takes
to travel between the units. The registration numbers of those vehicles exceeding the speed limit
are relayed to police headquarters, where a computer matches each vehicle with the DVLC
database. A standard letter is printed off addend using mail-merge
STRUCTURE
2. The operating system starts running the user interface after the PC is switched on.
3. Another function of the operating system is executing and providing services for
applications and software.
118 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
The -ing form is also used after prepositions. This includes when it is a preposition and not part of
the infinitive. For example:
4. Without the user being aware of the details, the operating system manages the
computer’s resources.
EXERCISES
1. One task of the supervisory program is to load nonresident programs into memory as
required.
2. The role of the operating system is to communicate directly with the hardware.
3. One of the critical functions of the operating system is establishing a user interface.
5. Part of the work of mainframe operating systems is to support multiple programs and
users.
6. in most cases, the task is to facilitate interaction between a single user and a PC.
7. One of the most essential functions of a computer is to process large amounts of data
quickly.
8. The main reason for installing more memory is to allow the computer to process data
faster.
2. COMPLETE THESE SENTE NCES WITH THE CORRECT FORM OF THE VERB:
Infinitive or -ing form.
119 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
New developments in computing are often designed to make something more manageable.
1. A GUI lets you point to icons and click a mouse button to execute a task.
2. A GUI allows you to use a computer without knowing any operating system commands.
3. The X-Window System enables Unix-based computers to have a graphical look and feel.
3. COMPLETE THE GAP IN E ACH SENTENCE WITH THE CORRECT FORM OF THE VERB IN
BRACKETS.
1. The Help facility enables users…………… (get) advice on most problems.
5. The MouseKeys feature enables you ……………. (use) the numeric keypad to move the
mouse pointer.
120 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
VOCABULARY SECTION
This part contains entries for some keywords like flash cards. To study vocabulary efficiently, you
must have a study plan and follow it carefully.
In these flash cards, direct under the word, you will find other forms of the same word. These words
have the same general meaning; they represent the different parts of speech of the word. For
each of the forms, the part of speech is given. Also, you can observe two examples of using the
keywords and other parts.
n. aggravation
v. aggravate
syn. irritating
adj. convertible
n. conversion
syn. alter
n. cure
121 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
syn. Healing
v. debilitate
n. debility
syn. Weakening
The lack of investment savings has a debilitating effect on the economy. The patient’s debility
restricted him to the room.
adj. depleted
n. depletion
syn. consume
The depletion of the Earth’s oil reserves poses a threat to our current style of life.
n. toxicity
syn. poisonous
syn. concede
122 | P a g e
ENGLISH FOR COMPUTER ENGINEERING Dr. Golzari Oskouei
The foreman acknowledged that there had been a mistake in the design of the house.
adj. tranquil
v. tranquilize
syn. Peacefulness
The tranquility of the lake at sunrise inspired a profound sense of well-being. His tranquil manner of
expression made us all feel more secure.
123 | P a g e