Giáo trình Anh văn chuyên ngành (Nghề Quản trị mạng Cao đẳng)

84 21 0
Giáo trình Anh văn chuyên ngành (Nghề Quản trị mạng  Cao đẳng)

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

Thông tin tài liệu

BỘ NÔNG NGHIỆP VÀ PHÁT TRIỂN NÔNG THÔN TRƢỜNG CAO ĐẲNG CƠ ĐIỆN XÂY DỰNG VIỆT XÔ KHOA CÔNG NGHỆ THƠNG TIN VÀ NGOẠI NGỮ GIÁO TRÌNH MƠN HỌC:Anh văn chuyên ngành NGHỀ: QUẢN TRỊ MẠNG TRÌNH ĐỘ: CAO ĐẲNG TUYÊN BỐ BẢN QUYỀN Tài liệu thuộc loại sách giáo trình nên nguồn thơng tin phép dùng nguyên trích dùng cho mục đích đào tạo tham khảo Mọi mục đích khác mang tính lệch lạc sử dụng với mục đích kinh doanh thiếu lành mạnh bị nghiêm cấm Mã Môn học: MH15 LỜI GIỚI THIỆU Để đáp ứng nhu cầu tài liệu học tập ngoại ngữ chuyên ngành cho học sinh - sinh viên giáo trình giảng dạy cho giáo viên trường dạy nghề, Tổ môn Ngoại ngữ Trường Cao đẳng Cơ Điện Xây dựng Việt xơ biên soạn giáo trình “Anh văn chuyên ngành Quản trị mạng” Cuốn giáo trình biên soạn với mục tiêu giúp người học nói viết ứng dụng máy tính sống ngày; phân biệt khác loại máy tính; mơ tả thiết bị nhập/xuất; xác định phím khác bàn phím chức tiếng Anh; học loại ổ đĩa sử dụng vốn từ vựng liên quan đến thiết bị lưu trữ đa phương tiện; biết chức hệ điều hành , đặc tính giao diện đồ họa, loại kết nối mạng; dịch tài liệu ngành Quản trị mạng từ Tiếng Anh sang Tiếng Việt Trong q trình biên soạn, chúng tơiđã tham khảo nhiều tài liệu trường đại học, cao đẳng, chương trình khung Tổng cục dạy nghề ban hành, trường dạy nghề quốc tế City & Guilds, Sunderland – Anh Quốc, tài liệu, tiêu chuẩn nước để đáp ứng yêu cầu thực tế đặt trình thực hành Trang bị cho giáo viên kiến thức chuyên môn hội nhập quốc tế đáp ứng yêu cầu doanh nghiệp Mặc dù có nhiều cố gắng song khơng thể tránh khỏi thiếu sót Rất mong đồng nghiệp bạn đọc đóng góp ý kiến để giáo trình ngày hồn chỉnh hơn./ Chúng tơi xin chân thành cảm ơn! Ninh Bình , ngày tháng năm 2018 Chủ biên: Nhóm tiếng Anh MỤC LỤC I Lời giới thiệu II Mục lục III Vị trí, tính chất mơn học IV Mục tiêu môn học V Nội dung môn học: Chapter 1: Computers today Chapter 2: Input/output devices Chapter Storage devices Chapter 4: Basic software Chapter 5: Creative software Chapter 6: Programming Chapter 7: Computers tomorrow VI Bảng động từ bất quy tắc VII Các từ viết tắt VIII Tài liệu tham khảo TRANG 4 GIÁO TRÌNH MƠN HỌC: ANH VĂN CHUN NGÀNH Mã mơn học: MH15 20 32 39 50 56 64 73 75 76 Vị trí, tính chất mơn học: - Vị trí: Mơn học bố trí sau học xong môn học chung, song song với môn học, mô đun đào tạo chun mơn nghề - Tính chất: Là môn học sở chuyên ngành Mục tiêu môn học: -Về kiến thức: Nắm vốn từ vựng ngữ pháp tiếng Anh chuyên ngành CNTT - Về kỹ năng: + Đọc hiểu thông báo hệ thống phần mềm ứng dụng khai thác cài đặt; + Phát triển kỹ như: đọc hiểu, dịch tài liệu tiếng Anh chuyên ngành Công nghệ thông tin - Về lực tự chủ trách nhiệm: + Đọc hiểu tài liệu đọc thêm tiếng Anh tóm tắt nội dung tài liệu; + Bố trí làm việc khoa học đảm bảo an toàn cho người phương tiện học tập Nội dung môn học: Nội dung tổng quát phân phối thời gian : Số TT I Tên chương, mục Chapter 1: Computer today Computers applications 1.1 Vocabulary 1.2 Match the pictures: computers 1.3 What can computers do? Configuration 2.1 Vocabulary 2.2 What is a computer? 2.3 Minus and Micros Inside the system 3.1 Vocabulary 3.2 What‟s inside a microcomputer? 3.3 Main memory: RAM and ROM 3.4 Your ideal computer system Bits and bytes 4.1 Vocabulary 4.2 Units of memory Tổng số 10 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 Thời gian Lý Thực thuyết hành, tập 0.25 0.25 0.5 0.25 0.25 0.5 0.25 0.25 0.25 0.25 0.25 0.25 0.25 0.25 0.5 0.25 0.25 0.5 0.25 0.25 0.25 0.25 0.25 0.25 Kiểm tra(LT TH) II III IV 4.3 Bits for pictures Buying a computer 5.1 Vocabulary 5.2 Role play Chapter 2: Input/output devices Type and click! -Keyboarb 1.1 Vocabulary 1.2 About the keyboard Image 2.1 Vocabulary 2.2 Scanners: The eyes of computer Monitor 3.1 Vocabulary 3.2 Monitors Printer 4.1 Vocabulary 4.2 Types of Printers * Test Chapter 3: Storage devices Floppies 2.1 Vocabulary 2.2.Types of disks 2.3 Technical details Hard drives 2.1 Vocabulary 2.2 Hard disks Optical breakthrough 3.1 Vocabulary 3.2 Optical disk and drives Test Chapter 4: Basic software Operating system 1.1 Vocabulary 1.2 MS-DOS, Windows The graphiccal user interface 2.1 Vocabulary 2.2 GUIs A walk through word processing 3.1 Vocabulary 3.2 Word – processing facilities Speadsheets 1 10 1 1 1 1.5 1.5 11 1 2 14 1 0.5 1.5 0.5 1.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 1 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 0.5 1.5 0.5 0.5 0.5 1 1.5 0.5 1.5 0.5 0.5 0.5 1 1.5 0.5 1 0.5 0.5 0.5 0.5 0.5 1.5 0.5 1.5 0.5 1.5 0.5 0.5 0.5 0.5 V VI VII 4.1 Vocabulary 4.2 Speadsheets * Test Databases 5.1 Vocabulary 5.2 Basic features of database programs Face of the Internet 6.1 Vocabulary 6.2 Internet software Chapter 5: Creative software Graphics and design 1.1 Vocabulary 1.2 Computer graphics Desktop publishing 2.1 Vocabulary 2.2 Desktop publishing Multimedia 3.1 Vocabulary 3.2 Multimedia magic Chapter 6: Programming Program design 1.1 Vocabulary 1.2 Program design Languages 2.1 Vocabulary 2.2 Programming languages Test Jobs in computing 3.1 Vocabulary 3.2 Jobs in computing Chapter 7: Computers tomorrow Electronic communications 1.1 Vocabulary 1.2 Channels of communication Internet issues 2.1 Vocabulary 2.2 Security and privacy on the Internet LANs and WANs 3.1 Vocabulary 0.5 1.5 1 0.5 1.5 3 1.5 1.5 11 1 1.5 2.5 1.5 2.5 10 0.5 1.5 2 0.5 0.5 1 0.5 0.5 0.5 0.5 0.5 1.5 0.5 1.5 0.5 1.5 0.5 1 0.5 0.5 2.5 1.5 0.5 1.5 0.5 1.5 0.5 1 0.5 0.5 0.5 0.5 1.5 0.5 1.5 0.5 0.5 0.5 0.5 0.5 2.5 1.5 1.5 0.5 0.5 1.5 0.5 0.5 1 3.2.Network configurations New technologies 4.1 Vocabulary 4.2 New technology in the future * Test Total 0.5 2.5 75 0.5 0.5 0.5 0.5 2.5 0.5 30 40 CHAPTER 1: COMPUTER TODAY Mã chƣơng: MH15-01 Mục tiêu: - Liệt kê từ vựng để mô tả cấu trúc máy tính với máy PC cụ thể với cấu hình phổ biến thị trường - Mơ tả đoạn văn để diễn tả thông tin máy tính - Trả lời xác bảng liệt kê cấu hình máy tính kiểm tra dạng trắc nghiệm - Diễn tả cho khách hàng hiểu cấu hình máy khách mua máy tính - Thực thao tác an tồn với máy tính UNIT 1: COMPUTER APPLICATIONS A Match the caption(1-4) with the pictures(a-d) In education, computer can make all the difference Using a cashpoint, or ATM The Internet in your pocket Controlling air traffic _ We are now living in what some people call the digital age, meaning that computers have become an essential part of our lives Young people who have grown up with PCs and mobile phones are often called the digital generation Computers help students to performmathematical operations and improve their maths skills They are used to access the Internet, to basic research and to communicate with other student around the world Teachers use projectors and interactive whiteboards to give presentationsand teach sciences, history or language courses PCs are also used for administrative purposes- schools use word processors to write dispense money to customers by the use letters, and databases to keep records of a PIN-protected card People use a of students and teachers A school Chip and PIN card to pay for goods and website allows teachers to publish services Instead of using a signature to exercises for students to complete verify payments, customers are asked to online.Students can also enroll for enter a four-digit personal courses via the web site and parents can identification number(PIN), the same download official reports number used at cashpoints; this system Mobiles let you make voice calls, send makes transactions more secure texts, email people and download logos, With online banking, clients can easily ringtones or games With a built-in pay bills and transfer money from the camera you can send pictures and make comfort of their homes video calls in face-to- face mode New Airline pilots use computers to help smartphones combine a telephone with them control the plane For example, web access video, a games console, an monitors display data about fuel MP3 player, a personal digital consumption and weather conditions In assistant(PDA) and a GSP navigation airport control towers, computers are system, all in one used to manage radar systems and In banks, computerstore information regulate air traffic On the ground, about the money held by each customer airlines are connected to travel agencies and enable staff to access large by computer Travel agents use databases and to carry out financial computers to find out about the transactions at high speed They also availability of flights, prices, times, control the cashpoints, or ATMs( stopovers and many details automatic teller machines), which B When you read a text, you will often see a new word that you don’t recognize If you can identify what type of word it is( noun, verb, adjective,etc.) it can help you guess the meaning Find the words (1-10) in the text above Can you guess the meaning from the context? Are they nouns, verbs, adjectives or adverbs? Write n,v,adj or adv next to each word Perform(line 6) Digital(line 25) _ Word processor(line 13) Store(line 27) _ Online(line 16) Financial(line 29) Download(line 18) Monitor(line 42) _ Built-in(line 21) 10 Data(line 42) C Match the words in C(1-10) with the correct meanings(a-j) 61 H (Digital Video BroadcastHandheld) can send multimedia(radio, TV and data) to mobile devices Audio programs(music, news, sports, etc.) are also transmitted in a digital radio format called DAB (Digital Audio Broadcasting) Mobile communications Thanks to wireless connectivity, mobile phones and BlackBerrys now let you check your email, browse the Web and connect with home or company intranets, all without wires The use of GPS in cars and PDAs is widespread, so you can easily navigate in a foreigncity or find the nearest petrol station In the next few years, GPS chips will be incorporated into most mobile phones Another trend is wearable computers Can you imagine wearing a PC on your belt and getting email on your sunglasses? Some devices are equipped with a wireless modem, a keypad and a small screen; others are activated by voice The users of wearable technology are sometimes even called cyborgs! The term was invented by Manfred Clynes and Nathan Kline in 1960 to describe cybernetic organisms- begins that are part robot, part human C Read the text again and find the following The device that allows PCs to communicate over telephone lines The practice of working at home and communicating with the office by phone and computer The term that refers to the transmission of audio signals(radio) or audiovisual signals(television) Five advantages digital TV over traditional analogue TV Two systems that let you receive multimedia on your mobile phone The term that means without wires Devices that deliver email and phone services to users on the move The meaning of the term cyborg UNIT 2: INTERNET ISSUES There are many benefits from an open system like the Internet, but one of the risks is that we are often exposed to hackers,who break into computer systems just for fun, to steal information, or to speed viruses ( see note below) So how we go about making our online transactions secure? Security on the Web? Security is crucial when you send confidential information online Consider, for example, the process of buying a book on the Web.You have to type your credit 62 card number into an order form which passes from computer to computer on its way to the online bookstore If one of the intermediary computers is infiltrated by hackers, your data can be copied.To avoid risks, you should set all security alerts to high on your web browser Mozilla Firefox displays a lock when the website is secure and allows you to disable or delete cookies- small files placed on your hard drive by web servers so that they can recognize your PC when you return to their site If you use online banking services, make sure they use digital certificates – files that are like digital identification cards and that identify users and web servers Also be sure to use a browser that is compliant with SSL ( Secure Sockets Layer), a protocol which provides secure transactions Email privacy Similarly, as your email travels across the Net, it is copied temporarily onto many computers in between.This means that it can be read by people who illegally enter computer systems The only way to protect a message is to put it in a sort of virtual envelope – that is, to encode it with some form of encryption A system designed to send email privately is Pretty Good Privacy, a freeware program written by Phil Zimmerman Network security Private networks can be attacked by intruders who attempt to obtain information such as Social Security numbers, bank accounts or research and business reports To protect crucial data, companies hire security consultants who analyze the risks and provide solutions The most common methods of protection are passwords for access control, firewalls and encryption and decryption systems Encryption changes data into a secret code so that only someone with a key can read it Decryption converts encrypted data back into its original form Malware protection Malware ( malicious software) are programs designed to infiltrate or damage your computer, for example viruses, worms, Trojans and spyware A virus can enter a PC via a disc drive – if you insert an infected disc – or via the Internet.A worm is a self-copying program that spreads through email attachments; it replicates itself and sends a copy to everyone in an address book A Trojan horse is disguised as a useful program; it may affect date security Spyware collects information from your PC without your consent Most spyware and adware (software that allows pop-ups-that is, advertisements that suddenly appear on your screen) is included with free downloads If you want to protect your PC, don‟t open email attachments from strangers and take care when downloading files from the Web Remember to update your antivirussoftware as often as possible, since new viruses are being created all the time 63 Note: Originally, all computer enthusiasts and skilled programmers were known as hackers, but during the 1990s, the term hacker became synonymous with cracker- a person who uses technology for criminal aims Nowadays, people often use the word hacker to mean both things In the computer industry, hackers are known as white hats and crackers are called black hats or dark side hackers A Solve the clues and complete the puzzle below Users have to enter a………………to gain access to a network 2.A………………….protects a company intranet from outside attacks A………………….is a person who uses their computer skills to enter computers and networks illegally 4……………….can infect your files and corrupt your hard drive You can download…………………from the Net; this type of software is available of charge but protected by copyright Encoding data so that unauthorized users can‟t read it is known as ……………… This company uses……………….techniques to decode ( or decipher) secret data Most …………….is designed to obtain personal information without the user‟s permission UNIT 3: LANS AND WANS I Network configurations A Look at the FAQs (i-vi) without reading the whole text In pairs, try to answer as many of the questions as you can B Read the whole text and answer these questions What does PAN stand for? What is a network protocol? How you log on to an Internet Service Provider? WIMAX is a type of wireless network What is it used for? What equipment you need to set up a wireless LAN? What are the advantages and disadvantages of wireless networks? 64 i How many types of network are there? Networks are classified according to different criteria:  Geographical area: PANs (Personal Area Networks) typically include a laptop, a mobile phone and a PDA; LANs cover a building; MANs (Metropolitan Area Networks) cover a campus or a city; WANs (Wide Area Networks) cover a country or a continent  Architecture: In a client-server network, a computer acts as a server and stores and distributes information to the other nodes, or clients In a peer-to-peer network, all the computers have the same capabilities – that is, share files and peripherals without requiring a separate server computer  Topology or layout: In a bus network, all the computers are connected to a main cable, or bus In a star network, all data flows through a central hub, a common connection point for the devices in the network In a ring network, all devices are connected to one another in a continuous loop, or ring  Network protocol: This is the language, or set of rules, that computers use to communicate with each other Networks use different protocols For instance, the internet uses TCP/IP ii How I install a wired modem router? A modem router is a device that connects your computer or home LAN to the Internet  Plug one end of the phone cord directly into a phone jack, and the other end into the ADSL port the router  Plug one end of the Ethernet cable into your computer‟s network port and the other end into an Ethernet port on the router  Turn on your computer To set up, or configure, the router, you‟ll need to input some parameters, for example your ISP‟s name and phone number NOTE: A router has various Ethernet ports, so you can connect various PCs to the router via Ethernet cables If you already have a hub or switch connecting a LAN, you only need one cable to connect the hub to the router iii How I log on the Internet Service Provider? You need to type in your username and password Once you are online, you can get email, look for information on the Web, look up IT words in dictionaries, try out new software, and sign up for RSS feeds, newsletters, etc It is important that you remember to log off after using the Internet An open line increases the risk of viruses, and hackers might break into your computer to seal confidential data iv What is wireless networking? 65 Wired networks are linked by Ethernet cables, phone lines and high-speed fiber optic cables Wireless networks, however, use electromagnetic waves, such as radio waves, to transmit data These are the main types of wireless networks:  Satellites – for long distances  WIMAX – for connecting WI-FI hotspots  Bluetooth – for short distances  GSM – for mobile phones v What I need to set up a home wireless LAN? You‟ll need computers equipped with a wireless adapter or wireless card, a wireless access point (a wireless router) and a broadband internet connection vi Which is better, a wired or wireless LAN? Wired LANs are more difficult to install, but they are cheaper, faster and more reliable Wireless networks let you move, or roam, from one access point to another, but they are less secure and subject to interference C In pairs, this network quiz See which pair can fish first This network typically consist of two or more local area networks, covering a large geographical area a LAN b WAN c Intranet 66 This type of network does not have a dedicated server; all the computers are independent a Peer-to-peer b client-server c Metropolitan Area Network On this topology, all devices are connected to the same circuit, forming a continuous loop a Star b ring c bus The language used by computers to communicate with each other on the Internet is called a Ethernet b ADSL c TCP/IP Which cables are used to transfer information for the internet over long distances at high speeds? a Telephone lines b Ethernet cables c fiber optic cables Which device allows several computers on a local network to share an internet connection? a An ADSL port b a router c an Ethernet port Which device serves as a common connection point for devices in a wireless network? a Wireless access point b wired router c wireless adapter Bluetooth is a wireless technology that uses radio waves to transmit data over a Long distances b, medium-range distances c short distances (ten meters or less) II.WANs and satellites Prepare a description of the network below to present to the rest of the class Use PowerPoint if possible Use the Useful language box, the HELP box on to help you Useful language The diagram represents/shows………… This network is made up of/ consists of ……… Two networks are linked up to……… The satellite receives signals from………… The signals are sent on to ………… The purpose of …………is to……… 67 UNIT 4: NEW TECHNOLOGIES New technology in the future ( Future trends) A In pairs, discuss these questions What you think a trend is? What trends in ICT you think will affect our lives in the future? Make a list B Match the texts ( 1-5) with the pictures ( a-e) Which trends from your list in A are mentioned? 68 By all accounts, nanotechnology- the science of making devices from single atoms and molecules- is going to have a huge impact on both business and our daily lives Nano devices are measured in nanometres( one billionth of a metre) and are expected to be used in the following areas  Nanocomputers: Chip makers will make tiny microprocessors with nanotransistors, ranging from 60 to nanometres in size  Nanomedicine: By 2020, scientists believe that nano-sized robots, or nanobots, will be injected into the body‟s bloodstream to treat diseases at the cellular level Nanomaterials: New materials will be made from carbon atoms in the form of natotubes, which are more flexible, resistant and durable than steel or aluminium They will be incorporated into all kinds of products, for example stain-resistant coatings for clothes and scatch-resistant paints for cars Artificial Intelligence(AI) is the science of making intelligent machines and programs The term originated in the 1940s, when Alan Turing said: “A machine has artificial intelligence when there is no discernible difference between the conversation generated by the machine and that of an intelligent person” A typical AI application is robotics One exaple is ASIMO, Honda‟s intelligent humanoid robot Soon, engineers will have built different types of android, with the form and capabilities of humans Another AI application is expert systemsprograms containing everything that an “expert” knows about a subject In a few years, doctors will be using expert system to diagnose illnesses Imagine you are about to take a holiday in Europe You walk out to the garage and talk to your car Recognizing your voice, the car‟s doors unlock On the way to the airport, you stop at an ATM A camera mounted on the bank machine looks you in the eye, recognizes the pattern of your iris and allows you to withdraw cash from your account When you enter the airport, a hidden camera compares the digitized image of your face to that of suspected criminals At the immigration checkpoint, you swipe a card and place your hand on a small metal surface The geometry of your hand matches the code on the card, and the gate opens You‟re on your way Does it soud futuristic? Well, the future is here Biometrics uses computer technology to identify people based on physical characteristics such as fingerprints, facial features, voice, iris and retina patterns Adapted from the Richmond Times- Dispatch 69 Ubiquitous computing, also known as pervasive computing, is a new approach in which computer functions are integrated into everyday life, often in an invisible way Ubiquitous devices can be anything from smartphones to tiny sensors in homs, offices and cars, connected to networks, which allow information to In the ideal smart home, appliances and electronic devices work in sync to keep the house secure For example, when a regular alarm system senses that someone is breaking into the house, it usually alerts the alarm company and then the police A smart home system would further, turning on the lights in the home and the sending a text messaage to the owner‟s phone Motorola Homesight even sends images captured by wireless camera to phones and PCs Smart homes can remember your living patterns, so if you like to listen to be accessed anytime and anywhere-in other words, ubiquitously In the future people will interact naturally with hundreds of these smart devices( objects containing a microchip and memory) every day, each invisibly embedded in our environment and communicating with each other without cables some classical music when you come home from work, your house can that for you automatically They will also know when the house is empty and make sure all appliances are turned off All home devices will be interconnected over a home area network where phones, cable services, home cinemas, touch screens, smart mirrors and even the refrigerator will cooperate to make our lives more comfortable Adapted from www.businessweek.com C.Read the text again and answer these questions 1.Which unit of measurement is used in nanotechnology? 2.What are the advantages of nanotubes over regular materials? What will doctors use expert systems for? What features are analysed by biometrics? Which trend refers to computers embedded in everyday devices, communicating with each other over wireless networks? What will the alarm system if someone breaks into a smart home? How will devices be interconnected inside the smart home? D Find words in the texts with the following meanings a microscopic robot, built with nanotechnology ( text 1)…………………… a robot that resembles a human (text 2)…………………………………… 70 3.biological identification of a person ( text 3)……………………………… integrated; inserted into ( text 4)………………………………………… 5.electrical devices, or machines, used in the home ( text 5)……………… 71 IRREGULAR VERBS These are the most important irregular verbs They can be devided into the following groups ( A-E) A All three froms the same Base Past simple Past participle Bet Bet bet Cost Cost Cost Cut Cut Cut Hit Hit Hit Hurt Hurt Hurt Set Set Set Let Let Let Put Put Put Shut Shut Shut Spread Spread Spread Read Read read B Base = Past simple Beat Beat beaten C Past simple= Past participle Bend Bent Bent Bleed Bled Bled Bring Brought Brought Build Built Built Buy Bought Bought Catch Caught Caught Deal Dealt Dealt Feed Fed fed Feel Felt Felt Fight Fought fought Find Found Found Get Got Got Hang Hung Hung Have Had Had Hear Heard Heard Hold Held Held Keep Kept Kept Lay Laid Laid E All three forms different C Past simple= Past participle Base Past simple Past participle Learn Learnt learnt Leave Left Left Lend Lent Lent Light Lit Lit Lose Lost Lost Make Made Made Mean Meant Meant Meet Met Met Pay Paid Paid Say Said Said Sell Sold Sold Send Sent Sent Shine shone Shone Shoot Shot Shot Sit Sat Sat Sleep Slept Slept Spend Spent Spent Stand Stood Stood Stick Stuck Stuck Strike Struck struck Sweep Swept Swept Teach Taught taught Tell Told Told Think Thought thougt Understand Understood understood Win Won Won D Base= Past participle Become Became Become Come Came Come Run Ran Run 72 Arise Awake Be Begin Bite Blow Break Choose Do Draw Drink Drive Eat Fall Fly Forget Freeze Give Go Grow Hide Know Lie Ride Ring Rise Arose Awoke Was/were Began Bit Blew Broke Chose Did Drew Drank Drove Ate Felt Flew Forgot Froze Gave Went Grew Hid Knew Lay Rode Rang Rose Arisen Awoken Been Begun bitten blown Broken Chosen Done Drawn Drunk Driven eaten Fallen flown forgotten frozen Given Gone Grown Hidden Known lain ridden rung risen See Shake Show Sing Sink Speak Steal Swim Take Tear Throw Wake Wear Write Saw Shook Showed Sang Sank Spoke Stole Swam Took Tore Threw Woke Wore Wrote seen shaken Shown Sung Sunk spoken Stolen Swum Taken Torn Thrown Woken Worn written 73 ACRONYMS AND ABBREVIATIONS ADSL: Asymmetric CU: Control Unit FTP: File Transfer Digital Subscriber Line Protocol AI: Artificial intelligence DTP: Desktop Publishing GB: Gigabyte AIM: AOL Instant DAB: Digital Audio GHz: Gigahertz Messenger Broadcasting ALU:Arithmetic Logic DAW: Digital Audio GIF: Graphic Interchange Unit Workstation Format AMD: Advanced Micro DIMM: Dual In-line GIS: Geographic Devices Memory Module information System ASCII: American DLP: Digital- Light IM: Instant Messaging standard Code for processing Information interchange AT &T: American Dpi:dots per inch ISP: Internet Service Telephone & Telegraph Provider company ATM: Automated Teller DTTV: Digital Terrestrial IT: Information Machine television technology AVI: Audio video DVD-/+ RW: Digital JPG: Joint Photographic Interface Versatile Disc- Rewritable Experts Group BASIC: Beginner‟s AllDVD: Digital Versatile Laser: Light Amplification purpose Symbolic Disc or Digital Video Disc by Stimulated Emission of Instruction Code Radiation Bcc: Blind carbon copy DVD-ROM: Digital LAN: Local Area Network Versatile Disc- Read Only Memory BIOS:Basic Input/Output DVI: Digital Video LCD: Liquid-Crystal system Interface Display Bit: binary digit EPS: Encapsulated MIDI: Musical instrument Postscript Digital interface CAD: Computer- Aided FAQ: Frequently Asked OCR: Optical Character Design Questions Recognition CCD: Charge-coupted GPS: Global System for OS: Operating System devices mobile communication CD: Compact disc GUI: Graphical User PAN: Personal Area Interface Network CD-R: Compact DiscHD- DVD: High PCL: Printer Control Recordable Definition- Digital Language Versatile Disk CPU: Central Processing HDD: Hard Disc Drive PPP: Point to Point Unit Protocol 74 CRT: Cathode Ray Tube CSS: Cascading Style Sheets CTP: Computer to plate HTML: Hypertext Markup Language I/O: Input/output 75 TÀI LIỆU THAM KHẢO- REFERENCES [1] Infotech English for computer users – Santiago Remacha Esteras( Cambridge)- Fou [2] Bài giảng Tiếng Anh công nghệ thông tin dùng cho sinh viên Học viện cơng nghệ bưu viễn thơng Ths Lê Thị Hồng Hạnh , Ths Nguyễn Thị Thiết(2001) [3] English for computer science, Nhà xuất thống kê(1999) [4] Computer studies, G Powers, Heinemann Education(1992) [5] English for IT & Computer Learners, Santiago & Remacha Esteras, Nhà xuất trẻ( 2001) [6] English Vocabulary In Use 1995, Cambridge University Press [7] Collins Cobuild English Grammar, Collins Publishers, London [8] Oxford Advanced Learner’s Distionary ... ngữ chuyên ngành cho học sinh - sinh viên giáo trình giảng dạy cho giáo viên trường dạy nghề, Tổ môn Ngoại ngữ Trường Cao đẳng Cơ Điện Xây dựng Việt xơ biên soạn giáo trình ? ?Anh văn chuyên ngành. .. tiếng Anh; học loại ổ đĩa sử dụng vốn từ vựng liên quan đến thiết bị lưu trữ đa phương tiện; biết chức hệ điều hành , đặc tính giao diện đồ họa, loại kết nối mạng; dịch tài liệu ngành Quản trị mạng. .. Trường Cao đẳng Cơ Điện Xây dựng Việt xơ biên soạn giáo trình ? ?Anh văn chuyên ngành Quản trị mạng? ?? Cuốn giáo trình biên soạn với mục tiêu giúp người học nói viết ứng dụng máy tính sống ngày; phân

Ngày đăng: 27/10/2022, 04:35

Tài liệu cùng người dùng

  • Đang cập nhật ...

Tài liệu liên quan