Главная

Популярная публикация

Научная публикация

Случайная публикация

Обратная связь

ТОР 5 статей:

Методические подходы к анализу финансового состояния предприятия

Проблема периодизации русской литературы ХХ века. Краткая характеристика второй половины ХХ века

Ценовые и неценовые факторы

Характеристика шлифовальных кругов и ее маркировка

Служебные части речи. Предлог. Союз. Частицы

КАТЕГОРИИ:






SOFTWARE DOWN ON THE FARM




In the world of agribusiness, the key to success is cutting costs. Because farmers have little or no control over the prices they will receive for their crops, their profit often depends on how little they spend on the production side. In the past, much of this cost-cutting depended on experience, guesswork, and just plain luck. However, today, many farmers are using computers to help them run their businesses. In fact, it has been estimated that almost half of all full-time farmers use a computer to help run the farm.

In managing a farm, computer software is used for a wide variety of tasks, ranging from basic accounting to making decisions about crops. One estimate put the number of software packages available to farmers at close to 2,000. Examples of the applications of computer software on the farm are

- ranking milk cows according to volume of milk produced so that less productive cows can be culled, which may result in a significant reduction in feed costs;

- assisting potato farmers in determining when to apply pesticides to their crops and when to irrigate their fields, depending on the temperature and humidity;

- allowing farmers to draw their fields to scale, indicating crops, drainage problems, pest control problems, fertilizer applications, and other pertinent information, some of which can be obtained from satellite photos, about each field.

While the computer produces important information in the planning process, the fanner still must make the final decisions about when to plant, when to harvest, and when to buy and sell. For farmers who are used to paying over $ 100,000 for their equipment, the cost of a personal computer and the associated software is small potatoes compared to the savings it can produce.

LESSON 5

Exercise 5.1

Translate the following words paying attention to affixes.

Divide, division, divided, indivisible, divisibility; access, accessible, accessing, inaccessible, accessibility; connect, connection, connected, connectivity, connecting, disconnected; volatility; regardless; arrange, arrangement, rearrange, arranged; accomplish, accomplishment, accomplishing, accomplished; burn, burning, burnt; rotate, rotation, rotational, rotated, rotating; oxygen, oxide, dioxide, oxidize, oxidation; new, newer, renew, newest, renewal; mount, mounted, mountable, mounting; sequence, sequent,sequential; instance, instantaneous, instant, instantly.

 

Exercise 5.2

Translate the following sentences paying attention to conditional forms.

1. If the solution is acceptable, the network is reconfigured.

2. If the solution were acceptable, the network would be reconfigured.

3. If the solution had been acceptable, the network would have been reconfigured two days ago.

4. The network will be reconfigured providing the solution is acceptable.

5. The network could be reconfigured if the solution had been acceptable.

6. Had the solution been acceptable, the network could have been reconfigured.

7. Provided the solution was acceptable, they might reconfigure the network

8. They will not reconfigure the network unless the solution is accepted.

9. Were the solutions acceptable, the network could be reconfigured.

10. If I should find an acceptable solution, we would reconfigure the network.

11. I don’t know if the network will be reconfigured.

12. We’d reconfigure the network unless we hadn’t been told not to.

Exercise 5.3

Translate the following sentences paying attention to conditional forms.

1. If more than 20 or 30 processors are used, they end up spending most of their time on notification.

2. One solution would be to use a single shared memory and not to cache data that could be shared.

3. If you‘ve used technologies like Microsoft’s Active Server Pages, you’ll find Java Server Pages (JSP) easy enough to understand.

4. Had Microsoft obeyed the law, we would have had much more innovation and competition over the last seven years.

5. Moreover, much of that lost activity would have focused on the interface between the PC and the Internet – an area where more innovation would have been particularly welcome.

6. Many more people would use Linux operating system if it ran Office, especially an Office no longer subject to Microsoft’s strategy tax.

7. Meanwhile, middleware entrepreneurs could turn to the Office company as a distribution partner, if the Windows company tried to block them, and consumers and developers would be given many more choices.

8. The larger choice among innovations would leave users and developers worse off than if the lawbreaking had never happened.

9. Even if many technologists around the world have a working knowledge of English, if you are trying to sell something to them or support them through a technical crisis, you’ll have more success speaking to them in their own language.

10. The same goes for software, of course, and if you sell software into a global market, you’ll want to customize it to your customer’s requirements.

11. If you had 50 million people who wanted to download LimeWire, they could do it.

12. What would happen, for example, if the recording industry set its sights on LimeWire, as it did on Napster, for copyright violations?

13. Even if the company shuts down, the network it’s helped foster will live on.

14. Provided developers are aware of how VB’s (Visual Basic) error handling works, it’s possible if not easy to make sense of it.

15. If he is logged in on any device, be it desktop computer, cellphone, or PDA, her question will reach him wherever he is, in the office, at home or in between.

16. If unable to do so, such as by finding an alternative processor or network node, it automatically generates an error log and contacts IBM for another solution via Internet or private –network connection.

17. If IBM hasn’t fixed the problem before, human intervention is necessary.

18. Hadn’t antivirus software been set to scan files before they were saved, infection could have occurred.

 

Text A

MEMORY

Internal Memory

The third part of processing/internal memory is the internal memory, which also is made up of computer chips. Internal memory is divided into two major types—random-access memory and read-only memory. Random-access mem­ory (RAM) is the section of memory that is available for storing the instructions to the computer and the symbols that are to be manipulated. It is the internal memory that is accessible to the user; it is called RAM because any area of the memory can be accessed with equal ease regardless of where a piece of infor­mation is located. A shortcoming of RAM is that it is volatile —the memory exists only while the computer is turned on or is connected to the mainframe. This volatility and the limited availability of internal memory require that sec­ondary storage be used to save information before the computer is turned off or is disconnected from the mainframe.

Read-only memory (ROM) is the section of memory that is placed in the computer during the manufacturing process, and it is nonvolatile. This type of memory gives the CPU instructions during the startup or booting process, before the user has given the computer any instructions. When the computer is started up, ROM tells it to go to secondary storage to read instructions into RAM that allow the computer to process data into information. ROM is also useful in managing many of the computer's operations, such as providing the characters on the screen when a key is pressed or results are being displayed.

Secondary Storage

Because of the limited amount of internal storage and the volatility of RAM, some form of storage external to RAM is necessary to permanently store data and programs. This secondary storage usually comes in different forms: magnetic storage media—disks or tapes, optical disks, flash memory and others. With either of these, stored information is accessed by internal memory when the control unit decides that this infor­mation is needed. Because the secondary storage unit must locate the informa­tion, read it from the memory unit, and then transfer it to internal memory, secondary storage is a much slower form of memory than internal memory. However, this slow transfer of information is balanced by the virtually unlimited storage capacity.

Disk secondary storage uses a computer disk to store information as a form of direct-access storage in which information may be accessed in any order, regardless of the order in which the information was stored. A disk is a thin piece of metal or plastic that is covered with an iron oxide whose magnetic direction can be arranged to represent symbols. This magnetic arrange­ment is accomplished by a device known as a disk drive, which spins the disk while reading and writing information onto it. This process of transferring infor­mation to and from the disk is accomplished by the read/write head, which, depending on the type of disk, rides either directly on or immediately above the disk. In a sense, a disk is like a CD that is "played" by the disk drive. However, there are two crucial differences between a computer disk and a CD. First, sig­nals on the computer disk are recorded magnetically rather than by a laser beam burning pits into the surface of the compact disk. Second, the computer can record data on a disk in addition to playing it.

Mainframe computers have large disk packs made up of ten disks, each about the size of a record album. These disk packs usually remain in the disk drive except when a special need requires a transfer. Because these disk packs can hold so much information, many users can store data on a single disk pack. When a user connects to the mainframe, his or her user number tells the com­puter where to look on the disk pack for the user's data.

To store information, personal computers use both, plastic disks, called floppy disks, and metal disks, called hard disks. Floppy disks, which are made of Mylar® and covered with an iron oxide, are easily moved, but they hold only a fraction of the data stored on a hard disk or a mainframe disk pack. For this reason, a user may need several floppies to store all needed data or information. A hard disk is a scaled-down version of a mainframe disk pack. The hard disk rotates at a much faster speed than the floppy and stores a great deal more information.

The optical or video disk, the newest form of secondary storage, can hold billions of characters. Optical disks are similar to compact disks used for music except that they are larger and can hold more information. Magnetic tape that is used for secondary storage can be either reel-to-reel or cassette. Like a disk, tape is covered with iron oxide that is arranged mag­netically to store symbols. A tape can easily store millions of characters. How­ever, it is much slower than a disk for transferring information since the tape must first be mounted on a tape drive, where a read/write head similar to that used on disk drive transfers information to and from the tape. Another draw­back of a tape system is that the information must be accessed in the same sequence in which it was stored on the tape. This type of access is termed sequential access.

A backup is a copy of the information on the disk; it can be used to restore information if an equipment problem causes the disk to fail. Personal computers use a form of tape cartridge to back up hard disks.

Flash memory is a non-volatile computer memory that can be electrically erased and reprogrammed. It is a technology that is primarily used in memory cards and USB flash drives for general storage and transfer of data between computers and other digital products. It is a specific type of EEPROM (Electrically Erasable Programmable Read-Only Memory) that is erased and programmed in large blocks; in early flash the entire chip had to be erased at once.

 

Text B






Не нашли, что искали? Воспользуйтесь поиском:

vikidalka.ru - 2015-2024 год. Все права принадлежат их авторам! Нарушение авторских прав | Нарушение персональных данных