86
1 Índice General Pag N° 1. Technical Vocabulary Review 3 2. Reading Comprehension “The Computer” 4 3. Visual C++. Useful Vocabulary 10 4. Reading Comprehension Visual C++ 11 5. Useful Terminology 15 6. Evaluation 7. Project : Hand recognition 18 Ingles 5

Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

1

Índice General

Pag N°1. Technical Vocabulary Review 3

2. Reading Comprehension “The Computer” 4

3. Visual C++. Useful Vocabulary 10

4. Reading Comprehension Visual C++ 11

5. Useful Terminology 15

6. Evaluation

7. Project : Hand recognition 18

8. Information Strategy Planning 20

9. Intermediate Idioms 22

10. Mid-Term Exam

11. Critical Sucess Factor Analysis 26

Ingles 5

Page 2: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

2

12. Business Area Analysis 28

13. SQL 31

14. Internet 36

15. Introduction to HTML 43

16. Evaluation

17. CorelDraw (Technical Vocabulary) 52

18. Reading Comprehension CorelDraw 53

19. Final Exam

Ingles 5

Page 3: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

3

TECHNICAL VOCABULARY REVIEW

1. Worksheet2. Upgrade3. Token4. Track5. Target6. Stack7. Spreadsheet8. Sorting9. Setup10. Row11. Slot12. Loops13. Layer14. Queue15. Knobs16. Joystick17. Plug18. Parsing

19. Offline20. Header21. Garbage22. Freeware23. Overflow24. Node25. Upload26. Release27. Reply28. Log off29. Tic30. Backbone31. Background32. Dummy33. Features34. Feedback35. Footer36. Bias

Ingles 5

Page 4: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

4

1. Store 2. Attach3. Board4. Replace5. Motherboard6. Central Processing

Unit7. Flow8. Keyboard9. Printer10. Device

11. High voltage12. Low voltage13. Switch14. Fixed pattern15. Information

Interchange16. Send17. Code18. Decode19. Display20. Screen

READING COMPREHENSION

The Computer

The computer itself depends on a series of chips, integrated circuits made from silicon that store and porecess information. Chips are attached to boards inside the computer, which can be removed and replaced only by technicians. The most important board is called the system board or motherboard and the most important chip on the system board is the central processing unit, or CPU. The CPU is the computer’s “traffic cop” controlling all the information flowing between the keyboard, the computer itself, the printer, and various other devices you may have connected.

Computer Language . A computer does not understand language in the same way we do. Its language consists of electrical impulses, and it only understands two things : high voltage impulses and low voltage impulses.

Ingles 5

Page 5: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

5

Some people refer to this as “ the switch “ being “on” or “off ” . Ultimately, everything must be converted to a pattern of electrical impulses in order for the computer to understand it.

Each electrical impulse is called a bit short for binary digit. In the computer’s terms, the number 1 represents the switch being on and the number 0 represents the switch being off. Because there are only two possibilities, this is referred to as a binary system.

The computer industry has a standardized code in which each keyboard character – every letter, number and symbol – is represented by a fixed pattern of eight bits, called a byte. The code, known as the American Standard Code for Information Interchange, or ASCII (pronounced “as-key”), is recognized and accepted by hardware and software manufacturers- ASCII code actually uses only seven bits to represent a character ; the eighth bit may be used for some other purpose by the hardware or software, or it may be ignored. Even so, the code is still described as using eight bits. Here, for example, is the word “HELLO” in ASCII code :

1001000 1000101 1001100 1001100 10001111

Incidentally, the codes would be different for lowercase letters.Each time you press a key on a keyboard, you are sending one byte of electrical impulses to the computer, and the computer is decoding it to display the desired character on the screen.

Computer Memory. The computer has two kinds of memory : ROM and RAM. ROM, or read-only memory, contains the computer’s own internal operating

Ingles 5

Page 6: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

6

instructions. The computer “reads”, or uses, the information in ROM to run itself. The user has no access to anything stored in ROM. RAM, or random-access memory, is a temporary work space in which the computer runs your word-processing program and other applications. Unlike ROM, which is permanent memory, anything in RAM is wiped out as soon as you turn off the computer (or experience a power outage). Think of RAM as a desk where you can spread out your work each day but must clean it upat night before leaving.Memory, in the computer’s terms, is measured in thousands or millions of bytes. A thousand bytes is a kilobyte, or K for short. A million bytes is a megabyte (Mg). Actually, because of the eight-bit ASCII code, kilobytes and megabytes are multiples of eight, so a kilobyte is really 1024 bytes, and a megabyte is really 1018 576 bytes- Here are some common RAM memory capacities. The word equivalents are based on an average of five characters per word.

RAM Equivalent to approximately :

512 K 512 000 characters or 102 400 words 1 Mg 1 024 000 characters or 204 800 words 4 Mg 4 096 000 characters or 819 200 words 10 Mg 10 240 000 characters or 2 048 000 words

Storage. Your word processor would not be of much use if you could not store the documents that you prepare, and reprint or edit them later on. Information is permanently stored on disks, which are magnetized to record the bits making up your document. Computers use two types of disk : floppy disks, which are portable,

Ingles 5

Page 7: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

7

and hard disks, which are usually built into the computer itself.

Floppy disks, so named because they are generally flexible enough to bend, are thin plastic disks. Originally, all floppy disks were 8” in diameter; today, the standard sizes are 5 ¼” and 3 ½ “ disks. The smaller 3 ½ disk is sealed in a thicker casing which does not really bend; however, all portable disks are referred to as floppy disks, floppies, or simply diskettes.

The floppy disk is inserted through a slot into a device called a disk drive, which spins the disk and is able to copy information from it (called “reading” the disk) or record new information on it (Called “writing to” the disk).

Information is stored on the disk in sectors, or rings. The disk drive can access any part of the disk without having to go through it sequentially. This is important because information may be stored on a disk in random locations, and the computer must reassemble the information quickly before displaying it on your screen.

Straight out of the box, a floppy disk will fit into any word processor or computer with the correct size of disk drive (3 ½” or 5 ¼” ). But it will not work until a simple step, called formatting, is carried out. Formatting, which takes only about a minute, customizes the disk for the particular brand of machine in which it will be used. The disk can later be reformatted for use in another computer, but the process erases anything stored on it, be very careful not to reformat a disk unless you are willing to lose all the data on it. Hard disks also need to be formatted, but this is normally done when they are installed in the computer and never again.

Ingles 5

Page 8: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

8

Floppy disks require care in handling. They should not be expsed to excesive heat or cold. (Do not leave them in your car, for instance, but they will be safe in the office even if the air-conditioning or heating is turned off over the weekend.) Never touch the surface of the disk, and do not bend it or attach paper clipc or anything similar. Use only felt-tip pens when writing on the label. Do not drop it or drop objects on top of it, and avoid forcing it into a disk drive if it will not go in easily. Most important, since the data on the disk is megnetized, keep the disk away from magnets or magnetic fields – for example, telephones – whcih could scramble the data.

As mentioned, most computers also contain a permanently installed hard disk.The hard disk serves much the same purpose as a floppy disk but stores a great deal more data. Once considered a luxury, hard disks are now generally regarded as essential for storing application programs and the files created with them.The storage capacity of disks is expressed, as discussed earlier, in kilobytes (K) and megabytes (Mg).

As hard disks fill up, files tend to become fragmented-that is, broken up and stored on different parts of the disk-which may result in a loss of performance. Special defragmenting software will read and rewrite the entire disk, putting the files back together.

The KeyboardThe keyboards can be detached from the computer itself. The cable should be long enough to allow you to position the keyboard for your maximum comfort and convenience.

Ingles 5

Page 9: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

9

There are as many keyboards disigns as there are manufactures of word-processing equipment, but they all have some basic things in common.The central part of the keyboard, containing the alphabet letter keys, is essentially the same as the traditional typewriter keyboard. In addition, most computer keyboards also have the following :- Cursor control keys, which are used to move the

cursor around on the screen.- Numeric Keypad, which is used for typing numbers.- Function keys, which are designated to perform

different functions for each software program.

The Monitor There is much more variation in the types and capabilities of monitors than of keyboards. Today, with an enormous range of monitors available, the user can readily choose a model on which adjustments for convienience and safety can easily be made.Many monitors have tilt-and –swivel bases that enable you to select the viewing angle you find most comfortable. You may also want a monitor stand to raise the height of the screen so as to avoid neck fatigue.The screen image is made up of dots, or pixels, in much more the same way that letters on a dot-matrix printer are made up of dots. The more pixels in the display, the greater clarity you can expect.Another factor in the screen’s comfort level is the color. For example, some people who use a monochrome (one-color) monitor may find that a green or amber display is easier on the eyes than a black-and-white screen. If you have a color monitor, your word- processing program may give you options for text and background display colors.

Ingles 5

Page 10: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

10

Exercises

Copy and complete :

1. Chips are ... made from ...2. Each time you press a key on a keyboard the com- puter is ... it to display the desired character on the screen.3. The computer has two kinds of memory : ...4. Memory in the computer’s terms is measured in ...5. Computers use two types of disks : ...

Write (T) true or (F) false :

1. The most important chip on the system board is the C.P.U. ( )2. RAM is permanent memory. ( )3. Floppy disks store more data than hard disks ( )4. Function keys are used for typing numbers. ( )5. Floppy disks are flexible disks ( )

VISUAL C++

Useful Vocabulary

1. Tips2. Startup3. Compiler4. Hide5. View6. Toggle off7. Bookmark8. Debugger9. Choose10. Attach

11. Shut down12. Add13. Current14. Queue15. Tools16. Load17. Hold down18. Class view19. Wizard20. Resources

Ingles 5

Page 11: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

11

21. Custom Build

22. Link23. Page Setup24. Browse info25. Breakpoint26. Properties27. Set Active Project28. Source Control29. Setting30. Batch build

31. Profle32. Source Browser33. Error Lookup34. Customize35. Split36. Docking view37. Technical support38. Quickwatch39. Precompiled

Headers40. Layout

READING COMPREHENSIONVisual C++

“C” is a highly portable programming language.

C++ is a programming language combining the power of object oriented programmning with the efficiency and notional convenience of “C”

Ingles 5

Page 12: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

12

Show tips at StartupThe compiler options /Yc and /Yu (Create and Use specific precompiled header) provide the most efficient precompiled header management.

You can hide Project Workspace window views that you do not use by right clicking on the tab area of the Project Workspace window and toggling off the unnedeed view. You can use the same method to toggle the view back on.

You can press F2 and Shift + F2 to go to the next and previous source-file bookmark.

You should define an assigmennt operator if you define a copy constructor.If you want to see extensions or change what you see in file open/save dialogs, run the Windows Explorer and change its options appropriately. For instance, to see extensions, click Options on the view menu in the Windows Explorer and turn off “Hide file extensions for known files types”.

If your program hangs while running outside the debugger, attach the debugger to your program by choosing Attach to Process.

Avoid using the Terminate Thread and Exit Thread APIS as they inmediately shut down tasks, which may cause memory and resource leaks. These APIS are provided for advanced systems programming only.

You can have multiple projects in a workspace. Use the Insert Project into Workspace command or select the Add to current workspace check box when you create a new project.

Ingles 5

Page 13: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

13

When debugging you can press Alt + 6 to display the Memory Window.

You can use the C++ typeid operator to obtain type information at run time.

Ctrl + Tab cycles through the queue of open Developer Studio Windows (It works like Alt + Tab in Windows)

You can repeat the last Find command in the source Editor by pressing F3.

You can customize AppWizard to create projects most useful to you. Create a new “Custom AppWizard” project to get started.

If you want to see sample code at the same time you are working on your project, create a new project that contains the sample code as part of your workspace.

The source editor can emulate BRIEF (TM) and Epsilon (TM) from the Tools menu, choose Options, then click compatibility.

You must initialize references and non-satic const members in the member – initialization list of the constructor.

To get some new powerful and useful source editor commands, cllick Macros and the Tools menu and load the sample macro file.

Holding down Shift as you draw constrains the shape of an object. For example, it constrains a rectangle to a square or an ellipse to a circle.

Ingles 5

Page 14: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

14

Memory allocated with the C++ operator new ( ) must be freed with operator delete ( ) .

To sort the list of open windows by the ones most recently used (on the windows menu) , click Options on the Tools menu, click the workspace tab, and select the Automatically sort window menu check box.

You can move to the beggining of a line by pressing Home.You can move to the end of a line by pressing End.

With C++ run time type information, you can perform safe typecasts and manipulate type information at run time.

You can press Shift + F5 to stop debugging. You can press Ctrl + Shift + F5 to restart debugging.

You can undo most actions by clicking the Undo button on the standard toolbar.

Before you can change text or graphics, you must first select the item you want to modify.

You can change the color of the selection margin. To do so, choose Options from the Tools menu, then click Format. In the Colors Box, click Selection Margin and select the colors you want.

ASSERT helps you to catch bugs early.

You can find the definitions and references for a symbol by using the browser commands in the pop-up menu.

Ingles 5

Page 15: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

15

USEFUL TERMINOLOGY

Software : General term for any computer program.

Ingles 5

Page 16: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

16

Microsoft : A computer software company specialized in programs and . packages for personal computers.

Editor : A software program that allows a user to make changes to a file.

Compiler : A piece of software that translates a program written in a high level

computer programming.

Debug : To correct errors in a program of system.

Browser : Software that reads and displays Hypertext and hypermedia . documents on the internet.

Internet : An informal shared public network linking UNIX (operating system) and

other computers world-wide using the Internet Protocol. (I. P)

Protocol : An agreement that covers the procedures used to exchange . information between cooperating entities.

Layout : The way in which text and pictures are arranged on a page or screen.

Linker : A path or channel that joins two devices. HELP KEYBOARD

Ingles 5

Page 17: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

17

CATEGORY COMMANDS DESCRIPTION

Build Build Builds the projectDebug Debugbreak Stops program

execution; breaks into the debugger.

Diagram AddRelated Tables Adds related tables to Diagram

Diagram Arrange Tables Arrange tablesEdit Bookmark Drop Drops an Epsilon

bookmarkEdit BrowseNext Displays the next symbolEdit ChartLeft Moves the cursor

one character to the left.

Edit Find Find the specific text.Edit Search Incremental Starts an

incremental search fordward.

Edit WordCapitalize Makes the first character uppercase.

File FileSave Saves the document.

Layout LayoutGuides Changes thegridor guide visibility and granularity.

Query Change QueryDelete Creates a Delete Query

Ingles 5

Page 18: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

18

Tools Cancel Hide Windows or cancels

mades.View Activate CallStack W Active the Call

Stack WindowView Resource Symbols Browses and

Edits thesymbols in theresource file.

WizardBar Wbactron Button A Activates the WizardBar.

Ingles 5

Page 19: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

19

PROJECT

Handrecognition

Description of the project

In the branch DIGITAL Signal and Processing Image, a project is required on the work of sounds and/or images. If the most known example mixing the DIGITAL Signal and Processing Image and the identification several time were already implemented, namely the identification of people thanks to the fingerprints, the identification of a person thanks to the principal lines of the hand remains to be made. Indeed, our experiment did not enable us to find something of already existing in this field.

Constraints

It was very difficult to us to find information concerning the techniques allowing to differentiate the hands from people. There is a technique basing itself on the morphology of the hand and its geometry. Hand that requires a sight of lower part and a side view. The second solution which was discovered, is a biometric manner of identification (definitely more complex than by taking only the lines of the hand). But there, the systems already exist and are commerciables in the form of small boxes where all is integrated.

Technique used First of all, a hand is scanned, which gives us an image. Using method developed with Visual C++, the image is worked for finally obtaining a list of points which can be

Ingles 5

Page 20: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

20

recorded in the data base or be compared with other already existing points in the data base.

   

Studies of Bitmaps

In programming under Visual C++, the format with which the system works the display files in memory is the DIB (Device Independant Bitmap) and as he does not exist class DIB in MFC (but a class BITMAP exists!) we started from class DIB implemented in FingerPrint; it should be noted that there are currently references to such classes in the Microsoft literature (Inside Visual C++ 4th edition and other books also) but we let us have summers confronted with certain problems (unsolved) by binding one of those with the class of the ImageLib bookshop. It should be also said that we were surprised to see that a DIB is represented in the memory with back compared to the original and that it is necessary of this fact of thinking that the origin screen which is in top on the left finds in bottom on the right in memory.  

Ingles 5

Page 21: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

21

INFORMATION STRATEGY PLANNING

Critical Success Factor Analysis

Critical success factors are different from objectives or goals. The following definitions are used in the Center for Information System Research (CISR) at M.I.T

Objectives. Objectives are general statements about the directions in which a firm intends to go, without stating specific targets to be reached at particular points in time.

Goals. Goals are specific targets that are intended to be reached at a given point in time. A goal is thus an operational transformation of one or more objectives.

Critical Success Factors (CSFs) CSFs are the limited number of areas in which satisfactory results will ensure competitive performance for the individual, department, or organization. CSFs are the few key areas where “things must go right” for the business to flourish and the manager’s goals to be attained.

A manager’s goals are the targets he will shoot for. The CSFs are the factors that most affect his success or failure in the pursuit of these goals. A goal is an overall objective; a CSF is what has to be done to achieve that goal. Goals are ends; CSFs are means to those ends.

The mission and purpose statements of an enterprise are often quite different from the critical success factors.

Ingles 5

Page 22: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

22

The former represent long-range vision or an endpoint that the corporation wishes to achieve, whereas goals include statements such as “growth of 30 percent per year,” “increase market share to 40 percent,” and so on; critical success factors relate to the conduct of current operations and the key areas in which high performance is necessary. They give the measures that are necessary in a control system for top management. They need careful and continous measurement and management attention if the organization is to be successful.

A CSF at one level may become a goal at a lower level. For example, a CSF at the top level may be “Retain top-quality managers.” For the personnel department this becomes a goal and the CSFs needeed to achieve this goal are established : For example , “Establish appraisal scheme to recognize exwcutive talent,” “Establish scheme to develop executive loyalty,” “measure effectiveness of bonus / incentive plan”.

In a business the critical success factors relate to those aspects of the business that will ensure competitive performance. They differ greatly from one type of business to another. They differ from one time to another. The external environment can change the critical sucess factors. For example, the petroleum crisis in the late 1970s changed them for the automobile industry. As a small corporation grows, it needs to shift gears and change its critical success factors.

Ingles 5

Page 23: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

23

INTERMEDIATE IDIOMS

1. Up to date : (timely, modern, brought up to the present time.1. This mail-order catalogue is not up to date. It was published several years ago. 2. That new structure is one of the most modern and up-to-date apartment houses in the city.

2. Out of date : (no longer available, current, or in use)1. Silent movies have been out of date for many

years.2. She insists on wearing out-of-date styles of

clothing.

3. To blow up : (to destroy by explosion, to explode)1. When the torpedo struck it, the ship immediately

blew up.2. Why did the soldiers blow up all the bridges

When they retreated? 3. Did they have to blow them all up?

1. To burn out : (to stop functioning, become useless-Said of electrical equipment)

1. There are no lights anywhere in the house. Perhaps a fuse has burned out.

2. We need some new electric light bulbs. Both ofThese bulbs are burned out.

3. If you overload that fuse, you will burn it out.

Ingles 5

Page 24: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

24

1. To break down : (to stop functioning- said generally of motors and similar mechanical objects.)1. Our car broke down, and they had to tow it to a

garage.2. The elevator broke down, and they had to

walkup to the tenth floor.

1. To give up : (to surrender, renounce)1. The enemy gave up without any resistance.2. King Edward VIII gave up his throne in order to

marry the woman he loved.3. Our teacher has tried many times to give up

smoking, but he can't seem to give it up.

1. To cross out : (to cancel – often by marking with crosses) 1. The teacher crossed out several words in my composition.2. Why did you cross out the last kine of your

letter?3. I crossed it out because it was repetitious.

1. To take into account (to take into consideration)1. In judjing her work you should take into account that she has been quite sick recently.2. That salesman never takes into account the

fact that I am very busy.3. The judge took the prisoner’s youth into account

before sentencing him.

1. To make clear : (to explain, clarify)1. The teacher made clear to him that he should never be rude again.2. His explanation made the problem clear to me.3. You must make clear to him that he should

never be rude again.

Ingles 5

Page 25: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

25

1. To look after (to watch, take care of)

1. Grandma will look after the baby while we go to the lecture.2. Who is going to look after your correspondence

while you are away.

1. To look forward to : (to expect, anticipate, usually pleasurably)1. We are looking forward to my uncle’s visit with great pleasure.2. He says that he has nothing to look forward to

except the same monotonous work every day.

1. To fill out : (to complete – said of blanks, forms, etc)1. Every prospective employee must fill out an application blank, giving his name, address, previous position, etc.2. When she applied for her passport, Grace had

fill out a half dozen different forms and had some difficulty in filling them out.

1. No matter: (regardless of)1. No matter how much money he spends on his clothes, he never looks well dressed.2. No matter where that escaped convict tries to

hide, the police will find him.

1. To keep in mind - to bear in mind : (not to forget, remmember)1. Please keep in mind that you promised to call your patient at two o’ clock.2. “You should bear in mind that he is not as

he used to be.” “Ok, I’ll keep it in mind.”

Ingles 5

Page 26: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

26

1. To hold on : (to grasp, hold tightly to something : also, to pause, wait.)1. He held on to my coat sleeve and refused to let

go.2. It’s pretty windy, You’d better hols on to your

hat3. Hold on a minute! I want to speak to you.4. (While telephoning) Hold on a minute while I get

a pencil and paper.

Ingles 5

Page 27: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

27

CRITICAL SUCESS FACTOR ANALYSIS

The computer systems of the past have inundated executives with reports. The typical executive is overwhelmed by information. He asks: Why do I have to wade through all these reports, yet I can’t find most of the information I need to manage the business well?”

Many functional managers have an interest infeeding information to a higher – level manager. The higher-level manager is flooded with this information, yet cannot find the most crtitical pieces of information he needs to detect and solve problems. If not planned well, computers can have the negative effect of causing an overload of not-very-useful information. This problem is felt by high-level executives in all industries, and often their frustration level is high.

Despite this, if you ask an executive what information he needs, he tends to ask for everyting. If you ask what decisions he makes, he can provide a daunting list. In practice, there are a small number of pieces of information that are particularly vritical to an executive’s job and a relatively small number of decisions that are especially important. A technique used with great sucess in a growing number of corporations analyzes

Ingles 5

Page 28: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

28

the critical success factors of the enterprise and its executives.

John F. Rockart originally developed the critical success factor (CSF) approach as a means to understand the information requirements of a chief executive officer. It has subsequently been applied to the enterprise as a whole and extended into a broader planning methodology. It has been made the basis of several consulting practices and has achieved major results where used well.

Ingles 5

Page 29: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

29

BUSINESS AREA ANALYSIS

Business area analysis establishes a detailted frame-work for building an information-based enterprise. It takes one business area at a time and analyzes it in detail. It uses diagrams and matrices to model and record the data and activities in the enterprise and to givea clear understanding of the eleborate and subtle ways in which the information aspects of the enterprise interrelate. The diagrams and matrices are designed to be understood by management, end users, and data processing professionals, and to increase greatly communication among these groups.

Business area analysis uses the knowledge recorded in the encyclopedia and are used in subsequent system design. This detailed model of the enterprise is kept up to date as the enterprise changes and as systems are built. It provides the architectural framework for the information-based enterprise.

Business area analysis is not an end in itself. Its purpose is to facilitate the design of systems and ensure that they work togwther appropriately. There is often pressure to finish the analysis stage or avoid it completely and spend the effort on building much-

Ingles 5

Page 30: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

30

needed systems. However, business area analysis is an essential stage in getting the right information to the right people at the right time.

Objectives of Business Area Analysis

Providea clear understanding of the business and how its activities interrelate.

Provide an architectural framework for the building of systems in an information-based enterprise.

Provide a framework such that separately built systems will work together. This framework consists of :A fully normalized data model which becomes the foundation stone of application design and construction.A model of the business activities and their interdependencies.A linkage of the foregoing models to show what processes use what data.

Trigger the rethinking of procedures in the enterprise so that they are as efficient as possible for the era of desktop computers, information networks, amd flexible databases.

Identify requirements of highest priority for information center activities and system design.

Create an overview so that joint application design sessions can proceed rapidly and coherently.

Characteristics of Business Area Analysis

Business area analysis is conducted for each business area infependendly. It takes from three to six months.

Ingles 5

Page 31: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

31

It has strong end-user involvement. It creates an architectural framework which will

ensure that the separately designed systems will fit together.

The results are stored in the encyclopedia and the encyclopedia tools are used to coordinate the results from different business areas.

Over time the data and process models are kept up to date in the encyclopedia.

The data half of busniness area analysis usses classical data administration and modeling techniques.

It is infependent of technology (because technology will change).

It is infependent of the current systems and procedures (because often they need redesigning).

It tends to cause a rethinking of systems and procedures.

It may cause a rethinking of the organization chart. It needs a high-level executive sponsor prepared to

deal with political problems.

Ingles 5

Page 32: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

32

STRUCTURED QUERY LANGUAGE

SQL allows users to access data in relational database management systems, such as Oracle, Sybase, Informix, Microsoft SQL Server, Access, and others, by allowing users to describe the data the users wishes to see. SQL also allows users to define the data in database, and manipulate that data. Each database management system (DBMS) and database software has different methods for logging in to the database and entering SQL commands.

Table SQL :

A relational database system contains one or more objects called tables. The data or information for the database are stored in these tables. Tables are uniquely identified by their names and are comprised of columns and rows. Columns contain the column name, data type, and any other attributes for the column. Rows contain the records or data for the columns. Create Table

Ingles 5

Page 33: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

33

The create table statement is used to create a new table. To create a new table, enter the keywords “create table” followed by the table name, followed by an open parenthesis, followed by the first column name, followed by the data type for that column, followed by any optional constraints, and followed by a closing parenthesis. It is important to make sure you use an open parenthesis before the beginning table, and a closing parenthesis after the end of the last column definition. Make sure you separate each column definition with a comma. All SQL statements should end with a “;”.

The table and column names must start with a letter and can be followed by letters, numbers, or underscores –not to exceed a total of 30 characters in lenght.Do not use any SQL reserved keywords as names for tables or column names (such as “select”, create”, “insert”, etc.).

Data type specify what the type of data can be for that particular column. If a column called “last_ name” is to be used to hold names, then that particular column should have a “varchar” (variable – lenght character) data type.

Here are the most common Data types :

Char(size) Fixed – length character string. Size is specified in parenthesis. Max 255 bytes.Varchar(size) Variable - length character string. Max size is specified in parenthesis.Number(size) Number value with a max number of column digits specified in parenthesis.

DATA WAREHOUSING WITH SQL SERVER 2000

Ingles 5

Page 34: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

34

Business power comes not from data, but from knowledge. Designed to deliver a powerful set of analysis tools, SQL Server 2000 can help your organization sort through any volume of information and extract real business intelligence – knowledge that the people in your organization can use to make better decisions and create real value. The key : Microsoft Analysis Services, a new feature that significantly extends the already robust OLAP functionality of SQL Server 7.0 to provide a complete end- to-end platform for analysis.

SOPHISTICATED ANALYSIS AT AFFORDABLE PRICES

There was a time when only the largest enterprises could afford the sophisticated analysis tools needed to extract business intelligence from raw data. Microsoft set a new standard when it added OLAP Services to SQL Server 7.0, making those same tools a standard feature for organization of all sizes. Analysis Services makes powerful business analytics even more accessible.

Designed for use by database administrators and application developers, Analysis Services lets anyone with SQL and Microsof Visual Basic Programming experience use OLAP tools to create custom analysis applications. SQL Server 2000 can perform extremely complex and sophisticated analyses on large volumes of data with exceptional data-retrieval performance.

The following additional feature make SQL Server 2000 one of the most powerful business analysis databases on the market today :

Ingles 5

Page 35: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

35

DATA MINING Integrated data mining services will help your company shift through large data sets to uncover hidden patterns and make valuable predictions about future business trends. In combination with Microsoft Commerce Server, SQL Server 2000 will store and analyze click-stream data collected from the Web.

WEB-ENABLED ANALYSIS Two new features – linked OLAP cubes and HTTP access to cubes- make SQL Server 2000 the first database to offer powerful data analysis over the Web. In addition to enabling you to extend your analysis capabilities to partners outside the firewall, these features deliver new value by creating opportunities to sell access to your database to new customers over the Web.

CLOSED LOOP ANALYSIS Analysis is one thing. Action another. Microsoft OLAP Actions, a new feature of Analysis Services, extends the power of business analysis with new functionality that allows knowledge workers to take the conclusions they reach and use them to automatically drive business processes.

A COMPLETE END-TO-END PLATFORM

SQL Server 2000 is a complete database and analysis package, with features that make every aspect of building and maintaining a data warehouse easier and more affordable. With SQL Server 2000, a robust set of tools help you to leverage the most value out of the data you collect and store.

Ingles 5

Page 36: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

36

Useful Vocabulary :

1. Allow2. Log in3. Row4. Follow5. Lenght6. Call7. Hold8. String9. Fix10. Sort11. Feature

12. Size13. Retrieve14. Shift15. Develop16. Package17. Reach18. Enable19. Perform20. Complex21. Customer22. Business

Exercises

Write (T) True or (F) False :

1. SQL doesn´t allow users to manipulate data. ( )2. Each DBMS has the same methods for logging

In to the database. ( )3. Tables are uniquely identified by their names. ( )4. Parentheses aren’t important to create a new table 5. Rows contain the column names. ( )

Ingles 5

Page 37: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

37

INTERNET

What is the Internet?

The packet –switched network that is the focus of this document is the network of networks called the Internet. The internet is a unique collection of networks, mainly in the US, but also throughout the world, most of which are built using the Transmission Control Protocol / Internet Protocol (TPC / IP) protocol suite and all of which share a common name and address space. What does that mean? Basically, that means that the computers on the Internet use compatible communications standards and share the ability to contact each other and exchange data. Users of the Internet communicate mainly via electronic mail (e-mail), via Telnet, a process that allows them to login to a remote host, and via implementations of the File Transfer Protocol (FTP), a protocol that allows them to transfer information on a remote host to their local site.

Ingles 5

Page 38: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

38

Currently, there are more than 100 countries that have some access to the Internet, at least 39,000 networks assigned unique IP network numbers, more than one million hosts known to the domain name system, and at least 5,000,000 users worldwide.

The Internet exists to facilitate the sharing of resources among participating organizations, which include government agencies, educational institutions, and private corporations; to promote collaboration among researchers; and to provide a testbed for new developments in networking.

Today the Internet includes research sites, such as universities and research laboratories; government sites, such as the Environmental Protection Agency and the U.S. Geological Survey; military sites, such as Naval air stations and the U.S. Army Corps of Engineers; commercial sites, such as Xerox, Citbank, and Walt Disney Imagineering; hispitals, libraries, schools; and individuals like you!

Who is in charge of the Internet?

No one is in charge of the Internet. The Internet is a cooperating group of independently administered networks. Each component network on the Internet has its own administrative body, its own policies, and its own procedures and rules. There is no central, overseeing authority for the whole of the Internet.

However, certain government agencies have traditionally been prominent in setting policy that is followed throughout the Internet. Today important policy

Ingles 5

Page 39: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

39

decisions come from the National Science Foundation (NSF), administrator of the National Science Foundation Network (NSFNET).

Although government agencies have traditionally controlled the Internet and still have enormous influence, today there is a large and growing “private” or “commercial” component of the Internet. This component is spearheaded by organizations whose common goal is to establish a part of the Internet that is open to everyone and supports a wider range of traffic, not traffic dedicated only to the support of research or education.This component particularly would like to see the Internet available to meet the full span of everyday business needs.

In addition to influential government agencies, a strong, mostly voluntary, coalition of technically knowledgeable individuals guide the development of the Internet. Innovations that upgrade the technical quality of the Internet are usually worked out coopetatively by the technical community working together under the auspices of a group called the Internet Architecture Board (IAB) . The IAB has recently been included as part of the structrure of the Internet Society (ISOC) (at which time the IAB changed its name from the Internet Activities Board). There is a hierarchy of Task Forces, Areas, and Working Groups under the IAB that address technical problems and develop solutions. Eventually, solutions are agreed upon by the Internet community and the IAB recommends they be implemented. In this way, new additions to the TCP/IP suite of protocol standards are developed, tested, recommended, and implemented. Implementation of such new standards, however, depends on the cooperation and resources of

Ingles 5

Page 40: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

40

each Internet site. There is no mechanism for requiring a site to implement a new standard.

What is part of the Internet?

It is often confusing trying to distinguish so-called “Internet networks” from other networks accessible to the Internet via electronic mail.

Why does it matter if a site is on the Internet or not? If you just want to send an electronic mail (e.mail) message, it probably doesn’t matter to you. However, if you wish to search a database, transfer a file, or use a remote application, it may matter a great deal. Doing all of these things and more is possible on the Internet because Internet computers (or “hosts”) accommodate a set of protocols specifically designed to allow resource sharing across networks.

One generally agreed upon test of whether a site is an Internet site or not is whether it has “IP connectivity”. In fact, you might hear the term “the IP Internet” to refer to hosts reachable in these ways.

One way of testing IP connectivity is to “ping” the host. Ping is a program that uses a required feature of the Internet Control Message Protocol (ICMP) to elicit a response from a specified host or gateway. If you ping a host and it responds, it is on the Internet.

Another common test is to see if a host will open a Telnet connection. Some Internet hosts do not implement the Telnet Protocol, however, so if this test fails, you cannot necessarily conclude that the host is not part of the Internet. A Telnet connection allows you

Ingles 5

Page 41: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

41

to connect to a remote host. That is, given site A that is on the Internet, can site B telnet to it? If so, then site B is also on the Internet. It is quite easy to get pelple to agree on several possible sites A to begin such an experiment. While a site B may implement Telnet, Telnet implementations usually require you to log in once you have made a connection to a remote host. If you do not have an account on the host, disconnect as soon as possible. Hosts do not always welcome random Telnet connections!

APPLICATIONS

From the Internet user’s point of view, access to the network and its services is accomplished by invoking applications programs. It is not necessary for a user to fully understand the details of these application programs. However, it might be helpful to be aware that when these programs are called upon, they use the underlying Internet protocols to provide the user with some particular network service. At the same time, it is also important to realice that having Internet standards for the applications encourages their widespread use in the Internet.

The most popular “traditional” services provided by TCP/ IP are electronic mail, file transfer, and remote login via the Telnet Protocol.

Electronic Mail

Electronic mail, or e-mail, allows a user to send messages electronically to individuals or groups of individuals. In addition, system programs accept and

Ingles 5

Page 42: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

42

store mail messages that come in for users from other hosts. These programs automatically recognize the incoming traffic as electronic mail, translate it to a format compatible with the receiving mail program, and direct the message to the correct recipient. Most users have an online mail file where all messages addressed to them are stored. Internet mail makes mail delivery more reliable. Instead of relying on intermediate machines to relay mail messages, Internet mail delivery operates by having the sender’s machine contact the receiver’s machine directly.

Of course, the Internet is accessible to many othe networks via e-mail. To send mail to some of these networks, you may have to explicitly address a gateway machine, or your message may go through a mail gateway by virtue of the fact that your target host is registered as an MX record in the Internet?s Domain Name System.Although there is a variety of electronic mail software supported by different computer systems, the format described in RFC 822, Standard for the ARPA-Internet Text Messages nationally and internationally. It is important that mail programs on the Internet comform to the Internet standards in their mail headers, especially in their “reply-to” or “from” fields. A non-conformant “reply-to” field will mean that when people reply to a message, their reply won’t be transmitted correctly.

This sections explains some general concepts related to electronic mail and shows some address formats for sending mail to non-Internet networks. However, it is not a user’s guide to a particular mail program and will not explain specific commands for starting a mail program or creating and sending a message. If you are just starting to use the Internet, your systems

Ingles 5

Page 43: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

43

administrator should be able to steer you toward introductory material of this type. If you are a systems administrator installing a mail program, your vendor should have the supporting documentation you will need.

Exercises

I. Write True (T) or False (F)

1. The computers on the Internet share theability to contact each other and exchange data.

2. There is one central authority for the whole of the Internet.

3. A Telnet connection allows you to connect to a remote host.

I. Complete :

1. The Internet is a unique collection of ...2. Users of the Internet communicate mainly

via ...3. The Internet exists to facilitate ...4. One way of testing IP connectivity is to ...

Ingles 5

Page 44: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

44

INTRODUCTION TO HTML

1. What is a Home Page?

A Home Page may refer to a simple one-page document belonging to an individual user, or to the point of entry into a huge site run by a multi-national corporation. It may fit into a single screen, or may be so long that it fills 10 or 20 screens. It may consist of a single text file, or may have dozens of grahics, animations, video, and sound clips, and other items embedded in it, as links to interesting web sites related to ours.

Ingles 5

Page 45: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

45

2. Organizing a Home Page

To build a home page you should know what is it aimed to, so you have to define, at first, what kind of data you want to include into your web site, in fact, it can be published for personal (sharing hobbies), business (advertising, marketing) or institutional purposes. The following are some details you can take into consideration to get losts of visitors :

Do not use so much graphics or so large pictures because it will turn your home page into a slow web site.

Select the appropriate fonts, font sizes and colours, to maket the text as clear as possible.

1. What goes on a Home Page?

A web page can contain the following elements :

TEXT Any written piece of data

Ingles 5

Pictures/ Images Any non-dynamic graphic objectThe origin can be Internet, a scanned graphic data or a gra-phic design. Only GIF abd JPG(JPEG) formats are accepted by a web page.

Animations Graphic sequences of pictures,

which perform a synchronized movement of objects, including rotation and scrolling. Anima-tions are GIF format files.

Page 46: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

46

2. HTMLHTML stands for HyperText Markup Language, and allows to create web pages and links with other web sites. HTML is based on the use of TAGs. These are key words or phrases, enclosed in <angle brakets>, which describe how text and graphics are displayed, and create links between different documents or parts of the same document.

TEXT AND TAG

1. HTML TAGs

When a browser receives the HTML, the tags are translated. It is HTML’s ability to ahndle links

Ingles 5

Video A video sequence; usually anAVI format file.

Sound A sound piece of data, usually in WAV or MID format.

Marquee A scrolling text on the page.

Hyperlink An underlined text, icon, image or animation, that allows to change to another page, web site or internet service.

Page 47: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

47

that makes the Web possible. The World Wide Web (WWW) is essentially an ever-expanding set of interlinked HTML documents and Web browser, like Netscape or Internet Explorer. It is basically a tool that can display these documents and follow up the links embedded in them.

2. BASIC HTML TAGs

To create a web page with HTML you need to run the Notepad and a browser (e.g. Internet Explorer). The first one is to write the program and the second one, to view the web page.Most of TAGs are used in pairs because they need to be opened and then closed, this tells the browser what specific part of the program must be affected by a particular command or formatting.

After the file is finished, it must be saved with the extension .HTM

Starting Tag Ending Tag Action

Ingles 5

<HTML> </HTML> Tells the browser that the information is in

HTML code. Every HTML document startsand ends with these tags.

<HEAD> </HEAD> The header of the docu- ment which usually con- tains the name of the win- dow.

Page 48: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

<HR> No ending tag Draw a horizontal tag.

48

<HEAD>

<

<

<BR>

<

3. CREATING A HTML DOCUMENT

1. Start2. Programs3. Accesories4. Notepad

Remark : maximize the Notepad window if it is necessary.

5. Write the programme6. File (menu bar)

Ingles 5

<TITLE> </TITLE> This text is what appears on the title bar of the brow ser window. It must be written into the HEAD commands.

<BODY> </BODY> Define the start and the end od the contents (main information or data) of the web page.

<! - - > Comment line. This text can be placed anywhere in the program, because it won’t be viewed in the web page.

<BR> No ending tag Stands a line break.

<P> < / P> Define a paragraph.

Page 49: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

49

7. Save8. Select drive, folder, and type the file name.

Remark : By default, Notepad saves as a Text file (.txt), so it is necessary to type the file name and the extension .HTM. (Example : First Web Page.HTM)

9. Save

2. VIEWING A HTML DOCUMENT

1. Launch the browser (e.g. Internet Explorer)2. File (Menu Bar)3. Open4. Browse5. Select drive folder and file6. Open or double click the file name.7. Ok

2. EDITING A HTML DOCUMENT

Any change in the web page will be performed in the notepad, and re-saving the file (File/Save)

3. VIEWING A EDITED HTML DOCUMENT

To view an edited web page, the REFRESH button should be clicked in the browser screen.

4. DEFINING THE HTML DOCUMENT STRUCTURE

Ingles 5

Page 50: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

50

All the HTML documents have a structure of two parts : Title and Body.

5. THE TITLE SECTION

This part of the document allows the user to set a label for the window, and will be displayed at the left side of the browser title bar. Some comments or annotations can also be included in this section (but not displayed). The basic HTML tags needed are : <HEAD>, <TITLE> and <! - >, as follows :

<HEAD><!This web page has been created by Juan Perez, Norbert Wiener Institute-><TITLE> The Norbert Wiener Institute</TITLE></HEAD>

6. THE HTML BODY

This section contains the main data of the web page: all the texts, pictures, links and multimedia objects. The body section is defined with the tags <BODY> and </BODY>. The tag <BODY> can include properties of colour and background.

When a browser reads the text in an HTML document, it ignores all spaces, apart from those between workd, tabs and Enter keypressings. Those special texts between

Ingles 5

Page 51: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

51

<H1> - </H1>, <H2> - </H2>, etc. are called Headings, and will be placed in separate lines by default.

The rest of texts however, needs to be “broken” into separate blocks or paragraphs, or just to start a new line. To succed in this attempt, the user can apply any of these three tags : <BR>, <P> and <HR>, as introduced in the Basic HTML Tags table.

<BR>This is a line Break and marks the start of a new line.

<P>Marks the start of a new paragraph, and places a blank line before it. This tag needs to be closed with </P>.

<HR>HR stands for Horizontal Rule. This tag separates paragraphs by drawing a horizontal line between them.

7. TEXT FORMATTING: FONT SIZE

The <H..> tags are a simple but effective way of creating headings, but when more control over the size of heading text is needed, or the size of a text WITHIN a paragraph is required, the following tag must be used :

Ingles 5

Page 52: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

52

<FONT SIZE = value> (starting tag)</FONT> (ending tag)

The SIZE value can vary from 7 to 2, being 7 the largest size.

8. TEXT FORMATTING: ALIGNING TEXT

Body text and headings are normally aligned to the left, but both can be set in the centre or to the right.

To set the required aligment, you write inside the <H..> or <P> tag, the keyboard ALIGN= followed by CENTER (US spelling), RIGHT or LEFT (default). The keyword goes between quotation marks.

The corresponding </H..> and </P> end the alignment. In case of opening the alignment with the tag <P>, it can also ended with a new <H...> tag.

9. TEXT FORMATTING: FONT

Apart form the FONT SIZE tag used to change the "height" of texts, special fonts (types of letters) can be applied to text using the FONT FACE command as follows :

<FONT FACE=font> (starting tag)</FONT> (ending tag)

Ingles 5

Page 53: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

53

As font the font name must be written between quotation marks, for example :

<FONT FACE=”bookman old style”>Bookman Old Style</FONT>

A range of fonts can be used in a web page.

COREL DRAW

Techincal Vocabulary

1. Vectorial image

Ingles 5

Page 54: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

54

2. Bits map3. Suitable4. Vectorial drawings5. Pitcher6. Shade7. Task8. Arrow9. Drag10. Seeing, Bars of tools11. Reestablishing12. Dialogue squares13. Couple14. Beginning15. Welcome window16. Bar of standard tools17. Box of Tools18. Keeping19. Warning message20. Selected measure21. Increase level22. Zoom23. Width24. Height25. Design26. Stuff27. Profile28. Dregraded filler29. Text flow30. Shape tool31. Arrange32. Uniform fill

READING COMPREHENSION

CorelDraw

Ingles 5

Page 55: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

55

CorelDraw is a program of vectorial drawing that facilitates the creation of professional illustrations : from simple logos to complex technical diagrams. The improved benefits of text use and the tools of writing of Corel Draw will allow you to create projects of great quantity of text, as pamphlets and reports, with more easiness than never.

If you find the world of CorelDraw new, soon you will discover how the new interactive tools and the continuous feedback that offer the programs, allow you to win speed in little time.

When you draw in CorelDraw, your drawing is made up of curves or lines. You make a drawing that is sort of what you want and then manipulate the curves and lines and the nodes that connect them until you get the results you’re after. When you create a closed path, you can then fill it with a color or pattern.

Other things you can do in CorelDraw are : clone your image, create a mirror image, stretch your image, rotate your image, outline your image with the thickness and color of outline you choose, and import other images to add to your image.

Operation of vectorial images and of bit map

The computer programs of images are based on the creation of vectorial graphics or of images of bits map. This section develops the basic concepts of a vectorial program as it is CorelDraw, and it profiles the differences among vectorial images and of bits map.

What is a vectorial image?

Ingles 5

Page 56: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

56

The vectorial images, also called images guided to the object or drawing images, they are defined mathematically in form of series of points united by lines. Each object is an independent entity with such properties as color, it forms, contour, size and position in the screen that you are included in its definition.

The vectorial drawings don’t depend on the resolution. This means that they are shown with the maximum resolutions allowed by the exit device, like they can be the printer or the monitor. As a result, the quality of image of its drawing will be better if it prints it in a printer to 600 points for inch (ppp) that in a printer to 300 ppp.

What is an image of bits map?

Contrary to the vectorial illustration programs, the programs of edition of pictures as Corel PHOTO-PAINT works with images of bits map. If you work with this type of images, you will be able to purify small details, to introduce radical changes and to give bigger intensity to the effects.

The images of bits map are made up of points individuals denominated pixeles (elements of the image) willing and colored in diverse ways to conform a pattern. When increasing the image, you will be able to see the individual squares that compose the complete image.

When increasing the size of a bits map, the individual pixeles also increases, making that the lines anf the forms have a jagged aspect.

Ingles 5

Page 57: Índice General - Instituto Wienerwiener.edu.pe/manuales/CicloV/Ingles5_Carrera.doc  · Web viewHere, for example, is the word “HELLO” in ASCII code : 1001000 1000101 1001100

57

.

Ingles 5