+ All Categories
Home > Documents > Manual del Alumno - Instituto Wiener · Curso: Ingles Tecnico Intermedio Ciclo: V . 3 Manual del...

Manual del Alumno - Instituto Wiener · Curso: Ingles Tecnico Intermedio Ciclo: V . 3 Manual del...

Date post: 27-Sep-2018
Category:
Upload: truongdien
View: 232 times
Download: 0 times
Share this document with a friend
25
INSTITUTO SUPERIOR TECNOLÓGICO NORBERT WIENER Manual del Alumno ASIGNATURA: Ingles Técnico Intermedio PROGRAMA: S3C Lima-Perú
Transcript

INSTITUTO SUPERIOR TECNOLÓGICO NORBERT WIENER

Manual del Alumno

ASIGNATURA: Ingles Técnico Intermedio

PROGRAMA: S3C

Lima-Perú

2

Manual del Alumno

Índice General

Pag N° 1. Vocabulario Tecnico - Power Builder…………….......................................................... 1 2. Vocabulario Tecnico – Power Builder............................................................................... 2

3. Vocabulario Tecnico – Java Script....................................................................................5

4. Vocabulario Técnico – Evaluación....................................................................................

5. Práctica Calificada............................................................................................................

6. Reading Comprehension – Information Systems………………………......................…. 6

7. Vocabulario Técnico – Information Systems................................................................... 7

8. .Vocabulario Técnico – Internet.................................... ....................................................9

9. Vocabulario Técnico – Evaluación...................................................................................

10. Examen Parcial...................................................................................................................

11. Reading Comprehension - Internet..................................................................................10

12. Reading Comprehension – Modeling Data Processing ................................................ 12

13. Vocabulario Tecnico –HTML- Front Page-Outlook ....................................................... .15

14. Vocabulario Tecnico – Evaluación...................................................................................

15. Practica Calificada..........................................................................................................

16. Vocabulario Tecnico – Assembling...................................................................................18

17. Vocabulario Tecnico –Web Graphics Design….................................................................20

18. Vocabulario Tecnico - Evaluación.....................................................................................22

19. Examen Final ....................................................................................................................

20. Examen Sustitutorio............................................................................................................

.

_____________________________________________________________________________ Curso: Ingles Tecnico Intermedio Ciclo: V

3

Manual del Alumno

1

1.Vocabulario Técnico – Power Builder

Handling Power Building Messages

Power Builder errors are usually handled through the System Error event in the application

object. The exact error that occurred is stored in Power Builder’s Error object structure.

SystemError Event

You already have coded the SystemError application event. The SystemError event is

executed when a serious run time error occurs. If you don’t write a System Error script,

PowerBuilder attempts to handle the error by displaying a message box containing the

error number, error message, and Yes and No buttons, so the user can either continue or

stop the application

If the SystemError event has a script, Power Builder executes the script ñinstead of

displaying the message box. In the script for the SystemError event, you usually access the

Error object to determine the error and where the error occurred.

If you want to handle specific errors, usually CHOOSE CASE or IF statements are used.

To halt the application, a HALT or HALT CLOSE is used.

Error Object

In the application SystemError event, you can access the Error object to determine the

error and where the error occurred. To access the error object, statements like the

following are executed:

Int answer

If Error.Number = 1 then

Answer = Messagebos(“System Error”, &

+ “You tried to divide by zero at line “ &

+ string(Error.Line) &

+ “ in the “ &

+ Error.ObjectEvent &

+ “ event of the “ &

+ Error.Object &

+ “.”

End If

The Error object structure is defined below.

Error Object Structure

Error Structure

Variable Data Type Purpose for Variable

Error number Integer An integer identifying the

PowerBuilder error

4

Manual del Alumno

Error Text String A string containing the text of

The error message.

Error.WindowMenu String A string containing the name of the

Window or Menu object in which the

Error occurred.

Error.Object String A string containing the name of the

Object in which the error occurred.

If the error occurred in a window or

Menu, Object will be the same as

WindowMenu.

Error.ObjectEvent String A string containing the event for

Which the error occurred.

Error.Line Integer An integer identifying the line in

Script at which the error occurred.

2. Vocabulario Técnico – Power Builder

Naming Objects – PowerBuilder uses seven object types within an application to build its

systesm. The Table below shows the naming conventions for object types.

Naming Object Types

Object Name Convention Example

DataWindow Object d_ d_client

Function (global) f_ f_display_error

Menu m_ m_client

Structure s_ s_employee

Query q_ q_clients_for_agent

User Object u_ u_request

Window w_ w_ancestor

Naming Window Controls

Every window can have several controls. These controls have default names, but should

be renamed to be more descriptive and to make your appliction more manageable.

Control Name Convention Example

CheckBox cbx_ cbx_draft

CommandButton cb_ cb_OK

DataWindow Control dw_ dw_data

DropDownListBox ddlb_ ddlb_agents

5

Manual del Alumno

EditMask em_ em_phone

Window Function wf_ wf_sqlerr

Graph gr_ gr_income_per_agent

GroupBox gb_ gb_output_choice

HscrollBar hsb_ hsb_red

Line ln_ ln_shortline

ListBox lb_ lb_agents

MultiLineEdit mle_ mle_comments

Oval oval_ oval_team

Picture p_ p_employee

PictureButton pb_ pb_update

RadioButton rb_ rb_construction

Rectangle r_ r_rect

RoundRectangle rr_ rr_screen

SingleLineEdit sle_ sle_customer_name

StaticText st_ st_customer_prompt

UserObject uo_ uo_request

VscrollBarr vsb_ vsb_percent_done

Naming Variables

Every variable has a scope (when it can be accessed) and a data type. The scope should

always be as limited as possible. For example, don’t use an instance variable when a local

variable will suffice. Limiting scope will aid in encapsulation, release memory sooner and

make the application easier to maintain.

In the variable scope, x indicates the data-type convention that follows the variable-scope

conventions.

Naming by Scope

The table below describes the conventions for naming by scope.

Variable Scope Convention

Local lx_or nothing (a prefix on local variables is

Optional)

Global gx_

Instance ix_

Shared sx_

Argumemnt ax_

Naming by Data Type

The table below describes the conventions for naming by data type.

Data Type Convention

Window w

MenuItem m

DataWindow dw

6

Manual del Alumno

Structure str

User Object uo

Integer i

Unsigned integer ui

Long l

Unsigned Long ul

Boolean b

String s

Double db

Real r

Decimal dc

Date d

Time t

DateTime dt or ts (TimeStamp)

Naming Variable Examples

Lists naming variable examples

Variable Name Data Type Description

sstr_data_points{} Shared Structure array

iul_client_id Instance of an Unsigned Long

ss_name Share string

Ii_count Instance of an integer

loop_count local variable (prefix not required)

li_loop_count local integer (optional prefix added)

lw_window_instance local instance of a window variable

as_error argument string (passed)

Object Functions

Along with global functions, functions can be attached to individual objects. The object

prefix should precede the function prefix to indicate a function that is tied to a specific

object.

The following table describes naming object functions.

Naming Object Functions

Function Object Type Convention Example

Global Function f_ f_sql_error

Menu Function mf_ mf_exit

User Object Function uf_ uf_request

Window Function wf_ wf_update

7

Manual del Alumno

Course: Inglés Técnico Intermedio

Ciclo: V

5

3. Vocabulario Técnico – Java Script

Java is an addition very welcomed to the set of author tools in Web, but it is only attractive

for the programmers by heart who live in coding night sessions encouraged with pizzas and

sodas. For the rest of us Netscape has developed a reduced version of Java called Java

Script. Yes, it still is programming, but it is a little bit more accessible for those who

aren’t geek.

The Java Script code goes directly inside the Web page, the same as the HTML labels.

When a browser Netscape 2.0 access the page, the Java Script code is executed and the

program does what it has to do. For example, the program could verify the time and

display the appropriate welcome message. It could also insert a calculator just in the page.

There is no limit for the kind of things it can do. If you are interested to know more about

this, go to the following page:

http://home.netscape.com/comprod/products/navigator/version_2.0/script/index.html

There is gold in those pages: Netscape Gold

With the launch of Navigator 2.0, Netscape has become the swiss knife of general purpose

of Internet. Moreover being one of the best Web browsers, Netscape 2.0 also includes a

program of e-mail, a Usenet news reader and counts with the capacity of handling most of

the other Internet services, including FTP and Gopher. It could also connect some extra

utilities taking advantage of connections like WebFX.

But it wasn’t enough for the Web adicts. They wanted More More, so those people from

Netscape, created Netscape Navigator Gold. This version of Navigator has the same

features of the regular version, but it is also included the capacity of editing HTML

documents directly in the browser.

It is a pity that at the moment of printing a book about Netscape Gold it wasn’t ready to

use it, which means that we can’t talk about any of its functions. But instead of ignoring

this new and useful technology, we will offer a preliminary glance of the features of

Navigator Gold and then you can try it yourself when Netscape will launch it finally.

Don’t lose the sight of the Netscape base page- md]http://home.netscape.com/ - searching

news about the launching of Netscape Gold.

How does Netscape Gold Work

When you are playing with the Netscape Editor, don’t forget that you will not be working

directly with HTML labels. Instead of this you only have to write the text of your

document and then use the commands of the menu and the keys of the editor tool bar to

format the text. This formatting is the same as adding labels, but Netscape Editor doesn’t

display the HTML codes. Instead of that, it onaly shows how does yout text will look like

in a browser . In other words, Netscape Editor is a WYSIWYG display. (WYSIWYG

8

Manual del Alumno

stands for What You See is What You Get, although some pesimitsts think that it means

When you See it You Will Die of Laughing). Here are some basic steps that you must

follow for each document.

1. Write the text of your document.

2. If you want to give shape to something in the text, sellect it:

if you are going to insert an HTML object as a linking or an

image, place the cursor of th4e editor where you want the

object to appear.

3. Select the command of menu or the key of the appropriate

tool bar.

4. Seldom save the file.

5. Repeat the steps from 1 to 4 until you finish.

Java is a programming language that is used to create software which is executed from a

Web Page.

4. Vocabulario Técnico – Evaluación

5. Práctica Calificada

6. Reading Comprehension – Information Systems – Analysis of Goals and Problems

An enterprise has certain goals. It is desirable to analyze its goals and put them in writing.

If everybody understands the goals clearly, the enterprise is more likely to achieve them.

One of the most common forms of human folly is to lose sight of goals.

Goals are used in a control mechanism for an enterprise. They set targets, and the success

in progressing toward those targets is measured. If part of the enterprise falters in its

achievement of goals, this needs to be detected and corrective action taken as quickly as

possible.

Goals should be worded so as to express a precise course of action. “Be a market leader”

is a vague goal. “Increase sales by 30 percent per year” is a precise goal. Goals should be

precise where possible. Goals should focus on results. They6 should be decomposable

into work that hs to be done.

Goals should be measurable. In some cases the measure is binary: either the goal has been

achived or not, for example “Hire new chief engineer.” Where possible, a hard measure

should be applicable. In some cases a soft measure has to be used, for example “Improve

market image of the enterprise.” The extent to which such a goal has been met may be

established through market research interviewing techniques.

When high-level goals are identified, they should be broken down into lower-level goals

that apply to lower-level departments. Goals are thus associated with the organizational

units of an enterprise:

Organizational unit----------------HAS-----------------------goal.

Exercise 1. Translate the text above and answer the questions the teacher will ask

you.

9

Manual del Alumno

Course: Inglés Técnico Intermedio

Ciclo: V

7

7.Vocabulario Técnico – Information System

Process Entities

Evaluate Financial Proposals Employee

Estimate Near-term Earnings Contract Employee

Budget Finances Applicant

Receive Funds HRCompensation Regs, Plans, etc.

Pay Funds HR Benefits Regs & Plans

Report Finances HR Staffing Requirements & Plans

Administer Taxes Job Requesition

Maintain Financial Reg. Policies Stockholder

Audit Finances Boardmember

Manage Financial Investments Misc.Contacts/VIP

Plan Human Resources Financial Plans

Acquire Personnel Accounting Regs, Practice

Position People in Jobs Ledger Accounts

Terminate/RetirePeople Customer Purchase Order/Invoice

Plan Career Paths Customer Payments

Develop Skills/Motivation Other Income

Manage Individual Emp. Relations

Manage Benefit Programs

Comply with Govt. HR Regulations

Maintain HR Regs. Policies

Determine Production Requirement

Schedule Production

Organizational Units Tactical Goals

Planning Improve sales effectiveness

Accounting Identify new target market

Cash Management Improve market penetration

Investments Add distribution channels

Purchasing Address absenteeism problem

Facilities Exploit new technology

Human Resource Development Improve information systems

MIS Streamline shop floor operations

Legal Enhance employee training

Manufacturing Enhance customer support

Quality Assurance Improve product quality

Packaging Expand product line

Materials Management Upgrade product warrantee

10

Manual del Alumno

Sales Regions Reduce Inventory Investment

Customer Services Reduce receivables to 45 days

Customer Education Improve cashflow management

Order Processing Locate venture capital

Product Management Enhance corporate image

Public Relations

Market Research

Distribution

Engineering

Research

Prototype Manufacture

Testing Laboratory

Function Data Subject

Market Analysis Planning

Product Range Review Budget

Sales Forecasting Financial

Financial Planning Product

Capital Acquisition Product Design

Funds Management Parts Master

Product Pricing Bill of Materials

Product Spec. Maintenance Open Requirements

Materials Requirements Vendor

Purchasing Procurements

Receiving Materials Inventory

Inventory Control Machine Load

Quality Control Work in Progress

Capacity Planning Shop Floor Routines

Plant Scheduling Customer

Workflow Layout Sales

Materials Control Sales Territory

Sizing and Cutting Fin.Goods Inventory

Machine Operations Orders

Territory Management Payments

Selling Cost

Sales Administration Salaries

Customer Relations

Finished Stock Control

Order Servicing

Packing

Shipping

Creditors & Debtors

Cash Flow

Payroll

Post Accounting

Budget Planning

Profitability Analysis

Personnel Planning

11

Manual del Alumno

Recruiting

Compensation Policy.

Curso: Inglés Técnico Intermedio

Ciclo: V

9

8. Vocabulario Técnico – Internet/World Wide Web

Anonymous FTP – a method for downloading public files using the File Transfer

Protocol (FTP.

ADSL – Asymmetric Digital Subscriber Line, a new technology that allows more

data to be sent over existing copper telephone lines.

Arpanet – Advanced Research Project Agency, the precursor to the Internet,

ARPANET was a large wide-area network created by the United States.

Bookmark – a file containing locations to which you want instant access.

Browser – program that lets you explore the hypertext World Wide Web topics.

CGI – Common Gateway Interface, CGI is a specification for transferring

information between a World Wide Web server and a CGI program.

Chat – real-time communication between two users via computer.

Cyber – a prefix used in a growing number of terms to describe new things that are

being made possible by the spread of computers.

DNS – Domain Name System (or Service), an Internet service that translates

domain names into IP addresses.

Download – to copy a file from a remote computer to your computer.

E-mail – electronic mail.

FAQ – Frequently Asked Questions, a FAQ is a document that answers questions

about some technical topic.

Frame – panel dividing a Web page into sections.

FTP – File Transfer Protocol that allows you to copy files from a remote computer

to your local host.

HTML – Hyper Text Markup Language.

IP address – numeric address written as four numbers separated by periods

(l.l60.lo.240), which identifies a computer or device on a TCP/IP.

Link – a link is a reference to another document.

Mbone – Multicast Backbone on the Internet, Mbone is an extension to the Internet

to support multicastin-two-way transmission of data between multiple sites.

Network – two or more computers connected together in order to communicate and

share resources.

NSFnet – a wide-area network developed under the auspices of the National

Science Foundation (NSF). NSFnet is replacing ARPANET as the main

government network linking universities and research facilities.

NSP – Network Service Provider, a company that offers direct access to the

Internet backbone and the Network –Access Points (NAPs).

PPP – Point-to-Point Protocol, a method of connecting a computer to the Internet.

PPP is more stable than the older SLIP protocol and provides error-checking

features.

12

Manual del Alumno

Start page – the first page loaded and displayed when you start a browser program.

TCP/IP – acronym for Transport Control Protocol/Internet Protocol, the suite of

communications protocols used to connect hosts on the Internet.

TIFF – Tagged Image File Format, one of the most widely supported file formats

for storing bit-mapped images on personal computers and Web pages.

Upload – to copy a file from your computer to remote computer.

URL – uniform resource locator, the address of a World Wide Web page.

VOI – a category of software that enables people to use the Internet as the

transmission medium for telephone calls.

VRML – Virtual Reality Modeling Language used to create 3D Web pages.

W3C – World Wide Web Consortium, the W3C is the chief standards body for

HTTP and HTML.

WAIS – Wide Area Information Server, and pron9ounced ways, a program for

finding documents on the Internet. WAIS is rather primitive in its search

capabilities.

WINS – Windows Internet Naming Service, software from Microsoft that lets users

locate computers on remote networks automatically.

WWW – World Wide Web, a system of Internet servers that support specially

formatted documents.

9. Vocabulario Técnico – Evaluación

10. Examen Parcial

11. Reading Comprehension – Internet

User Account Type Description

Local user account Enables a user to log on to a specific computer to gain access

to resources on that computer. Users can gain access to

Resources on another computer if they have a separate

Account on the other computer. These user accounts reside

In the Security Accounts Manager (SAM) of the computer.

Domain user account Enables a user to log on to the domain to gain access to

Network resources. The user can gain access to network

Resources from any computer on the network with a single

User account and password. These user accounts reside in

The Active Directory, directory service.

Built-in user account Enables a user to perform acministrative tasks or to gain

Temporary access to network resources. There are two-

Built-in user accounts, which that cannot be deleted:

Administrator and Guest. The local Administrator and Guest

User accounts reside in SAM and the domain Administrator

And Guest user accounts reside in Active Directory.

Built-in user accounts are automatically created during

Window 2000 installation and the installation of Active

Directory.

13

Manual del Alumno

Naming conventions

Consider the following guidelines for naming conventions:

User logon names for domain user accounts must be unique in Active Director.

Domain user account full names must be unique within the domain in which you

create the user account. Local user account names must be unique on the computer

on which you create the local user account.

User logon names can contain up to 20 uppercase and lowercase characters (the

field accepts more than 20 characters, but Windows 2000 recognizes only 20). You

can use a combination of special and alphanumeric characters to help uniquely

identify user accounts.

If you have a large number of users, your naming convention for logon names

should acc9ommodate employees with duplicate names. The following are some

suggestions for handling duplicate names:

- Use the first name and the last initial, and then add additional letters from

the last name to accommodate duplicate names. For examples, for two users named

Judy Lew,one user account logon name could be Judyl and the other Judyle.

- In some organizations, it is useful to identify temporary employees by

their user accounts. To do so, you can prefix the user account name with a T and a

dash. For example, T-Judyl.

Password Guidelines

To protect access to the domain or a computer, every user acount should have acomplex

password. This helps to prevent unauthorized individuals from logging on to your domain.

Consider the following guidelines for assigning passwords to user accounts.

Always assign a password for the Administrator account to prevent unauthorized

access to the account.

Determine whether you or the users will control passwords. You can assign unique

passwords for the user accounts and prevent users from changing them, or you can

allow users to enter their own passwords the first time that they log on. In most

cases, users should control their own passwords.

Educate users about the importance of using complex passwords that are hard to

guess:

- Avoid using passwords with an obvious association, such as a family

member’s name.

- Use long passwords because they are harder to guess. Passwords can be

up to 128 characters. A minimum length of eight characters is

recommended.

- Use a combination of uppercase and lowercase letters and non-

alphanumeric characters.

14

Manual del Alumno

Curso: Inglés Técnico Intermedio

Ciclo: V

12

Reading Comprehension – Modeling Data Processing

A Description of the Procedure for Data Modeling

CREATE A DETAILED DATA MODEL

Detailed data modeling is tackled in one business area at a time. Although

described here as a self-contained activity it needs to be an integral part of the Buainess

Area Analysis procedure.

Comprehensive checks on the modeling process are described below which are

sometimes referred to as STABILITY ANALYSIS. The objective is to make the data

model as stable as possible so that it can support major changes in corporate procedures.

Stable data models have had the effect of drastically reducing program maintenance costs.

Preparation

Appoint a data-modeling professional to lead the activity

If a skilled data-modeling professional exists in house

Make him responsible for completion of the model on time.

Else

Employ a consultant skilled in data modeling.

Make him responsible for completion of the model on time.

Appoint one or more in-house professionals to become data-

modeling experts.

Appoint an in-house professional to take over the work

from the consultant and be responsible for the model.

Ensure that the necessary tools are installed and working

Install a data modeling tool which synthesizes and normalizes

multiple views of data.

Use an encyclo0pedia-based tool (the one used in the earlier stages

of information engineering) to form an enterprise-wide dictionary,

repository, and coordination tool. The tool which does synthesis

and normalization should preferably be part of the encyclopedia-based

workbench.

Form an end-user committee.

Select end-user participants.

15

Manual del Alumno

End users selected should

Be intelligent

Be creative

Have good human communication skills

Want to understand information-system techniques,

Be highly knowledgeable about their own business areas.

Give the participants a one-day course in the basic principles of database

techniques.

Document a naming convention for the data items

Top-down data modeling

Select the entity types for this business area from the ISP entity-

Relationthip model.

Enter the primary keys for these entity types.

Add intersection entity types where appropriate (with automated

Assistance).

Add whatever attributes can be identified.

Ensure that the attribute groupings are in Fourth Normal Form.

Enhance this data model with the synthesis and user-checking

Techniques desscribed below.

Data synthesis

THE FOLLOWING STEPS ARE DONE ITERATIVELY UNTIL THE

MODEL IS COMPLETE.

Identify all possible user views of data

Capture all documents that will be derived from the systems.

Capture all documents that will be input to the systems.

Examine ll information requirements identified during the ISP.

Determine by discussion with the end users what types of data they

Want to obtain from the systems, now and in the future.

Determine from the systems analysts whether any new record or

Document requirements are emerging.

Examine existing files, databases, or dictionaries which relate to this

Data.

Plan whether existing files or databases will coexist with new systems

Or be converted. If they will coexist, plan what data is needed in

The new systems to form a bridge with the old systems.

Will application package files or databases coexist with the new systems.

If so, plan what data is needed in the new systems to form a bridge with

The packages.

Do the following for all the above user views

Inspect each input

Employ the naming convention.

Inspect each input to see whether it can be simplified.

Check whether any of the input data items already exist in the

16

Manual del Alumno

Model under a different name or in a slightly different form.

If so ensure that this redundancy is removed.

For each data item check that no different data item in the model

Has the same name.

Be sure that concatenated keys are correctly represented in the

Input to the synthesis process.

Be sure that all attributes entered are dependent on the WHOLE

Of the key which identifies them.

Be sure that all attributes entered as input contain no transitive

Dependencies (no hidden keys).

Question the validity of all links which represent business rules,

As opposed to the natural properties of the data. Could these

Rules be changed in the future?

Question any link with a “l” cardinality to ask whether it could

Become a “many” cardinality in the future.

Enter the view into the synthesis tool.

Create a dictionary entry to document the meaning of each data

Item.

Check the synthesized model.

With the user committee, review the data dictionary listing to ensure

That all end users agree about the definitions of the data items.

With the user committee, review the data model to ensure that their data

Requirements can be derived from it.

With the user committee, brainstorm the possible future uses of the data.

For any uses which the model does not serve, create new input to the

New input to the synthesis process.

Description

Brainstorming means that a creative group of individuals attempt to

Produce a stream of ideas without inhibition.

A rule of a brainstorming session is that there can be no implied

Criticism for making an impractical or stupid suggestion. The session

Is intended to generate as many ideas as possible. At the end of the

Session only certain of the ideas will be recorded for possible use.

Examine every attribute field in the model to see whether it could become

A primary key in the future.

Complete the reverse mapping of any links between keys to identify

Any possible MANY-TO-MANY links. Create an extra concatenated

Key to take care of any possible future intersection data.

If candidate keys exist in the data model, ensure that they are in fact likely

To remain candidate keys in the future.

Use fast, computerized redesign after any changes are made to maintain

The interest of the end users.

Ensure that the data modeling is integrated into the BAA procedure.

17

Manual del Alumno

Curso: Inglés Técnico Intermedio

Ciclo: V

15

Vocabulario Técnico – HTML

1) access counter –contador de acceso

2) access provider – proveedor de acceso

3) anchor – ancla

4) applet – miniaplicación – programa de Java

5) arachnerd – nerd araña

6) browner – visualizador

7) Barney page – página Barney

8) Body – cuerpo

9) Byte-bonding – byte cháchara

10) Byte – ocho bits o un olo caracter

11) Bps – bits por segundo

12) Bit-spit - cualquier forma de correspondencia digital.

13) Bit – abreviación de las palabras binario y dígito.

14) Baud – baudio – transición de nivel por segundo.

15) Bandwidth – ancho de banda.

16) Cyberspace – ciber espacio.

17) Cracker – un programador que invade otros sistemas de computación para

arruinarlos o solo por el gusto de hacerlo. Un hacker que ha sucumbido al lado

oscuro de la fuerza

18) Clickstream – flujo de clics (ruta que toma una persona al navegar a través de

world-wide web).

19) Cybersurfer – surfeador cibernético.

20) Century 21 site – un site Web que se ha mudado a una nueva ubicación y ahora

solo contiene un vínculo hacia la nueva dirección.

21) Character reference – referencia de carácter. Código de HTML que le permite

insertar caracterres especiales en sus páginas Web (como é).

22) Domain name – nombre de dominio que identifica un site particular en Internet.

23) Digerati – digeratos, abreviaturas de Literatos digitales (lo selecto de Internet).

24) Dirt road – camino de terracería – conexión frustrantemente lenta con un site Web.

25) Emoticon – ícono de emociones.

18

Manual del Alumno

26) External image – imagen externa – imagen de página Web que el visualizador no

puede manejar por lo que asigna la tarea a un programa gráfico que despliega la

imagen en una ventana separada.

27) Entity name – nombre de entidad – código de HTML que le permite insertar

caracteres especiales en sus páginas Web (como ó ) Los nombres de entidad son

más fáciles de usar que las referencias de carácter, pero no todos los visualizadores

lo manejan.

28) Frames – marcos. En Netscape 2.0, áreas rectangulares de una página web que

contienen segmentos independientes de texto gráficos y código HTML. En otras

palabras puede usar los marcos para dividir una sola página web en dos o más

páginas independientes.

29) Frequently Asked Questions – Listas de preguntas más frecuentes.

30) Flooded – inundado – página que ha quedado ilegible debido a una imagen de

fondo mal elegida.

31) Form – documento web que se empleas para reunir información sobre el lector.

32) Foo, bar – palabras que se emplean como marcador de posición en descripciones e

instrucciones.

33) Geek – cerebrito – alguien que sabe mucho acerca de computadoras y casi nada

acerca de cualquier otra cosa.

34) Geeking out – cuando los cerebritos están byte-chacharenado y repentinamente

comienzan a jugar con una comutadora durante un evento social que no tiene nada

que ver con computdoras.

35) GIF – Graphics Interchange Format )Formato de Intercambio Gráfico) – Formato

gráfico de uso más común en web.

36) Gopher – sistema que despliega documentos y servic ios de Internet como opciones

de un menú .

37) Greenlink – vincular en verde – usar web con fines lucrativos.

38) Hipertext link – vínculo hipertexto.

39) Hosting provider – proveedor de hospedaje. Una compañía que le proporciona

espacio de almacenamiento (por lo general a cambio de una cuota) para sus paginas

web.

40) Home page – página base – primer documento web que se despliega al seguir un

vínculo hacia un servidor web.

41) Hit-and-run-page - página acierta y corre. Página que obtiene un enorme número

de aciertos y luego desaparece una semana más tarde.

42) Hot list – lista importante – colección de vínculos hacia sites interesantes que se

visita con regularidad.

43) Java – lenguaje de programación diseñada para crear software que se ejecuta dentro

de una página web.

44) Jargonaut – jergonauta – persona que deliberadamente crea y disemina jerga de

Internet.

45) JPEG – Joint Photographic Experts Group (Unión de Expertos en Fotografía)

formato gráfico para web.

46) JPIG – página web que tarda años en cargarse porque está atiborrada de gráficos.

47) Kbps – Kilobits por segundo (miles de bits por segundo)

48) Luser – ilusuario – combinación de palabras “iluso” y “usuario” (alguien que no

sabe lo que está haciendo)

19

Manual del Alumno

49) Link – vínculo – una palabra o frase que al ser seleccionada, envía al lector a una

página diferente o hacia un ancla.

50) Mouse potatoe – papanatas del ratón

51) Mbps – megabits por segundo – millones de bits por segundo.

52) Multimediocridades – discos de CD –ROM atiborrado con imágenes, sonido y

programas de segunda.

53) Nymrod – acronerd – persona que insiste convertir en acrónimos todos los

hermanos de cómputo compuesto de varias palabras.

54) Netiquette – etiqueta de red- conjunto de reglas diseñadas para facilitar

interacciones en internet.

55) Nerd – necio – individuo que carece de higiene personal y habilidades sociales.

56) Network – red – colección de dos o más computadoras conectadas por cables

especiales para que puedan compartir recursos como archivos o impresoras.

57) Newbie – novato – persona nueva en internet.

58) Notwork – red atascada.

59) Roadblock – letrero – página web que no tiene otro propósito más que el de

informarle que no hay nada disponible en este URL, pero que pronto habrá algo.

60) Server – servidor – computadora que se emplea para enviar cosas.

61) Serial line interface protocol – protocolo de interfaz de linea serial – método de

acceso a internet que permite a su computadora marcar el número de un proveedor

de servicio e intercambiar información de manera confiable.

62) Sundowner – noctámbulo.

63) Target – blanco – objetivo – meta

64) Tags – etiquetas – comandos de HTML en forma de combinaciones de letras o

palabras rodeadas por corchetes angulares (< >). Le indican a un visualizador

cómo debe desplegar una página web.

65) Telnet – programa que permite conectarse con otra computadora en Internet y

emplear sus recursos como si existieran dentro de su máquina.

66) Ubiquilink – vínculo ubicuo – vínculo que se encuentra en la lista importante de

casi todo el mundo.

67) Usenet – sistema que distribuye una colección de grupos de noticias a través de

internet.

68) URL – esquema de direccionamiento en web que describe la ubicación exacta de

un recurso de internet.

69) Uniform Resource Locator – Localizador Uniforme de Recursos

70) Vanity plate – página web demasiado extensa que no sirve a ningún propósito útil.

71) Vaporlink – vínculo al vapor – vínculo que apunta hacia una página web que no

existe.

72) WWW – world wide web and triple “W” – sistema de documentos que contienen

textos gráficos y otros elementos de multimedia.

73) VRML - Virtual Reality Modeling Language – Lenguaje de Modelado de Realidad

Virtual – se emplea para crear sites web con mundos tridimensionales a los que se

pueden entrar empleando un visualizador optimizado para VRML.

74) Web browser – visualizador web.

75) Web server – servidor web – computadora que almacena sus páginas web y las

pone a disposición de cualquier usuario que disponga de un visualizador también se

llama anfitrión web.

20

Manual del Alumno

76) Wrackground image – imagen de fondo que arruina una página al hacer imposible

la lectora del texto.

77) Web host – anfitrión web

78) Yoyow – (you own your own words) – siglas de usted es propietario de sus

palabras. Se refiere a los derechos de autor que Ud. tiene sobre el texto de sus

páginas web.

14. Vocabulario Técnico – Evaluación

15. Práctica Calificada

Curso: Inglés Técnico Intermedio

Ciclo : V

18

16. Vocabulario Técnico – Assembling

Types of I/O Buses

The main types of I/O architecture are:

ISA

Micro channel

EISA

Local Bus

VESA local bus

PCMCIA bus

The difference among these buses consist primarily of the amount of data that they can

transfer at one time and the speed at which they can do it. Each bus architecture is

implemented by a chipset that is connected to the processor bus. Typically, this chipset

also controls the memory bus .

The ISA Bus

ISA, which is an acronym for Industry Standard Architecture, is the bus architecture that

was introduced with the original IBM PC in 1982 and later expanded with the IBM PC/AT.

ISA is the basis of the modern personal computer and the primary architecture used in the

vast majority of PC systems on the market today. It may seem amazing that such an

antiquated architecture is used in today’s high-performance systems, but this seems to be

true for reasons of reliability, affordability, and compatibility.

The ISA bus enabled thousands of manufacturers to build systems whose components were

interchangeable. Floppy drives that work in an IBM PC also work in IBM clones, for

example, and video adapters that work in IBM ATs also work in IBM-compatible systems

Based on the 286 CPU chip.

Two versions of the ISA bus exist, based on the number of data bits that can be transferred

21

Manual del Alumno

on the bus at a time. The older version is an 8-bit bus, the newer version is a 16-bit bus.

Both versions of the bus operate at an 8 MHz cycle rate, with data transfers requiring

anywhere from two to eight cycles. Therefore, the theoretical maximum data rate of the

ISA bus is 8M per second, as the following formula shows:

8 MHz x 16 bits = 128 megabits/second

128-megabits/second 2 cycles = 64 megabits/second

64 megabits/second 8 = 8M/second

The bandwidth of the 8-bit bus would be half this figure (4M per second). Remember,

however, that these figures are theoretical maximums, because of I/O bus protocols, the

effective bandwidth is much lower – typically by half.

Eisa Bus

EISA is an acronym for extended industry standard architecture. This standard was

announced in September 1988 as a response to IBM’s introduction of the MCA bus – more

specifically, to the way that IBM wanted to handle licensing of the MCA bus. Vendors did

not feel obligated to pay retroactive royalties on the ISA bus, so they turned their backs on

IBM and created their own buses. The EISA standard was developed by leading computer

manufacturers (minus IBM, of course) and supported by leading software companies. The

first EISA machines started appearing on the market in 1989.

The EISA bus was designed as a successor to the ISA bus, although it has not turned out

quite that way (as evidenced by the appearance of additional bus specifications). The

EISA bus provides 32-bit slots for use with 386DX or higher systems. The EISA slot

enables manufacturers to design adapter cards that have many of the capabilities of MCA

adapters, but the bus also supports adapter cards created for the older ISA standard.

EISA provides markedly faster hard-drive throughput when used with devices such as SCI

bus-mastering hard drive controllers. Compared with 16-bit ISA system architecture.

EISA permits greater system expansion with fewer adapter conflicts.

The EISA bus adds 90 new connections (55 new signals) without increasing the physical

connector size of the 16-bit ISA bus. At first glance, the 32-bit EISA slot looks much like

the 16-bit ISA slot. The EISA adapter, however, has two rows of connectors. The first

row is the same kind used in 16-bit ISA cards, the other, thinner row extends from the 16-

bit connectors.

To visualize the edge connectors on an EISA card, imagine that you are laying a 1-by-1

inch board on a 2-by-2 inch board in a lumberyard. The edge connector on an EISA board

is about 0.2 inch longer than the connectors on an 8- or 16-bit ISA adapter board. The

longest (and thinnest) connectors on an EISA card pass through the 16-bit part of the slot

and make contact with the 32.bit connectors deeper in the slot.

The physical specifications of an EISA card are as follows:

5 inches (127mm) high

13.13 inches (333.5mm) long

0.5 inch (12.7mm) wide

The EISA bus can handle up to 32 bits of data at an 8.33 MHz cycle rate. Most data

transfers require a minimum of two cycles, although faster cycle rates are possible if an

22

Manual del Alumno

adapter card provides right timing specifications. The maximum bandwidth on the bus is

33M per second, as the following formula shows:

8.33MHz x 32 bits = 266.46 megabits/second

266.56 megabits/second 8 = 33.32M/second.

_____________________________-

Curso: Inglés Técnico Intermedio

Ciclo: V

20

17. Vocabulario Técnico – Web Graphics Design

1. 8-bit colour – describing colour monitors which use eight bits to control 256

possible shades of grey or 2t56 colours.

2. 24-bit colour – describing colour monitors which use eight bits to control each of

the red, green and blue electron guns. This gives 2 5 6 shades for each of the three

colours, allowing a total of 16.7 million colour shades.

3. 32-bit colour – describing colour monitors which have 24-bit colour with an

additional 256 possible transparent colour overlays.

4. binary number – a number (0 or 1) used in binary arithmetic.

5. graphics – a non-character based method of displaying information on a screen,

usually used for displaying pictures. The basic unit from which the display is built

up is the pixel.

Match each of the following words with the appropriate definition.

1. capture a light-sensitive substance on the surface of film

2. poster b device that uses compressed air to spray paint

3. retouch c succeed in representing on film

4. airbrush d alter by making minor changes

5. emulsion e large printed picture used for advertising purposes

Reading – 24-Bit Colour

23

Manual del Alumno

Short explanation – If your computer has 24-bit colour, then it can display photographic

images in colour on its screen that have natural-looking tones.

Long, long explanation – In principle, there is an infinite number of shades available

between a solid colour and pure white. In practice, the human eye can detect somewhere

between 150-200 distinct shades, so as long as you’ve got more than this, you can produce

an undetectably smooth progression of shades (there are exceptions, but they’re not worth

going into here).

Cheapo computer monitors can’t display shades – you get solid black or white and nothing

else(in many cases you get black or green). It is possible to fake shades on one of these

monitors by a sort of poor man’s halftone process called dithering, but this is useless for

serious image viewing and retouching.

What you need is a computer that can show true shades on its sscreen.

A computer builds up a picture from a series of building blocks called pixels. Each pixel is

a wquare (normally) of a single colour. The more pixels you can divide the picture into,

the higher the resolution of the complete image. The computer organizes itself by

descibing each pixel that it wants to display as a code in the binary mathematical set

(numbers built up from a series of 0s or 1s). Each 0 or 1 is called a bit.

Computers are generally structured to work in groups of eight bits (called a byte). These

eight numbers can be used to count up to 256 shades of grey from black to white, which is

more than enough to satisfy the eye.

A computer which can assign eight bits to desscribe pixels will produce perfect black and

white photographs on its monitor. A monitor that can show all these shades is called a

greyscale display.

Now your eye can detect those 150-200 shades in all three of the colours it can see: red,

green, and blue. If you use eight bits to describe colour, you only get 256 colours, which

isn’t enough – you get a mildly posterized effect, although the dithering process can

simulate more colours at the expense of quality.

To get the full colour photographic effect on a computer monitor, you need to be able to

generate 256 shades for each colour. This makes eight bits of information per colour,

giving a total of 24 bits. This is the 24-bit colour you keep reading about in computer

magazines. If you take all the possible variations of 256 shades of three colours, you end

up with a possible 16.7 million colour shades.

Some computers, such as the Macintosh, offer 32-bit colour: the spare eight bits can be

used to control transparent overlays of colour – you get 256 levels of transparency.

You only really need 24-bit colour if you are going to do colour photographic retouching

on-screen or similar “painting” on-screen. For linework and picture placing, an 8-bit

colour monitor is perfectly adquate, as you can still define colours for print even if you

can’t show them on the screen.

24

Manual del Alumno

Naturally, there’s a bottom line in all this, or everyone would be using 24-bit colour. To

start with, you need special circuit boards which plug into your computer and drive the

monitor. An 8-bit board is cheaper than a 32-bit one.

You also need plenty of memory. A typical high resolution colour monitor can display

about a million pixels. The 24 bits that your computer uses to describe each pixel can also

be described as three bytes. To describe a million pixels takes three million bytes. In other

words, a hefty three megaytes of your computer’s memory is assigned to driving the

screen. With 8-bit colour, you only need one Mb.

Generally, 24-bit colour boards include extra memory and processors to speed up the

display performance.

Vocabulary

detect – recognize

dithering – a process which makes the transition between shades seem

smoother.

Retouching – making minor changes in a photograph.

A mildly posterized effect – a slightly crude image

There’s a bottom line – it is expensive

Hefty – large

22

Exercise 1 – Mark True (T) or False (F) in relation to the information in the text.

1. If a computer can generate more than 200 distinct shades of colour, the human eye

will see a perfectly smooth progression of shades. True / False

2. Everybody should have a computer that can show true shades on its screen. _____

3. A group of eight binary numbers is called a byte. _______

4. Under certain circumstances, 8-bit colour can provide more than 256 colours._____

5. 32-bit colour offers 256 times as many shades of colour as 24-bit colour.

6. To run 24-bit colour, you need three times as much memory to drive the screen as

you do to run 8-bit colour.

18. Vocabulario Técnico – Evaluación

19. Examen Final

20. Examen Sustituttorio.

.

25

Manual del Alumno


Recommended