Sei sulla pagina 1di 25

INSTITUTO SUPERIOR TECNOLGICO

NORBERT WIENER

Manual del Alumno


ASIGNATURA: Ingles Tcnico Intermedio
PROGRAMA: S3C
Lima-Per

Manual del Alumno

ndice General
Pag N
1. Vocabulario Tecnico - Power Builder.......................................................... 1
2. Vocabulario Tecnico Power Builder............................................................................... 2
3.

Vocabulario Tecnico Java Script....................................................................................5

4. Vocabulario Tcnico Evaluacin....................................................................................


5. Prctica Calificada............................................................................................................
6. Reading Comprehension Information Systems.......................

7. Vocabulario Tcnico Information Systems................................................................... 7


8. .Vocabulario Tcnico Internet.................................... ....................................................9
9. Vocabulario Tcnico Evaluacin...................................................................................
10. Examen Parcial...................................................................................................................
11. Reading Comprehension - Internet..................................................................................10
12. Reading Comprehension Modeling Data Processing ................................................ 12
13. Vocabulario Tecnico HTML- Front Page-Outlook ....................................................... .15
14. Vocabulario Tecnico Evaluacin...................................................................................
15. Practica Calificada..........................................................................................................
16. Vocabulario Tecnico Assembling...................................................................................18
17. Vocabulario Tecnico Web Graphics Design.................................................................20
18. Vocabulario Tecnico - Evaluacin.....................................................................................22
19. Examen Final ....................................................................................................................
20. Examen Sustitutorio............................................................................................................
.

_____________________________________________________________________________
Curso: Ingles Tecnico Intermedio
Ciclo: V

Manual del Alumno


1
1.Vocabulario Tcnico Power Builder
Handling Power Building Messages
Power Builder errors are usually handled through the System Error event in the application
object. The exact error that occurred is stored in Power Builders Error object structure.
SystemError Event
You already have coded the SystemError application event. The SystemError event is
executed when a serious run time error occurs. If you dont write a System Error script,
PowerBuilder attempts to handle the error by displaying a message box containing the
error number, error message, and Yes and No buttons, so the user can either continue or
stop the application
If the SystemError event has a script, Power Builder executes the script instead of
displaying the message box. In the script for the SystemError event, you usually access the
Error object to determine the error and where the error occurred.
If you want to handle specific errors, usually CHOOSE CASE or IF statements are used.
To halt the application, a HALT or HALT CLOSE is used.
Error Object
In the application SystemError event, you can access the Error object to determine the
error and where the error occurred. To access the error object, statements like the
following are executed:
Int answer
If Error.Number = 1 then
Answer = Messagebos(System Error, &
+ You tried to divide by zero at line &
+ string(Error.Line) &
+ in the &
+ Error.ObjectEvent &
+ event of the &
+ Error.Object &
+ .
End If
The Error object structure is defined below.
Error Object Structure
Error Structure
Variable
Error number

Data Type
Integer

Purpose for Variable


An integer identifying the
PowerBuilder error

Manual del Alumno


Error Text

String

A string containing the text of


The error message.

Error.WindowMenu

String

A string containing the name of the


Window or Menu object in which the
Error occurred.

Error.Object

String

A string containing the name of the


Object in which the error occurred.
If the error occurred in a window or
Menu, Object will be the same as
WindowMenu.

Error.ObjectEvent

String

A string containing the event for


Which the error occurred.

Error.Line

Integer

An integer identifying the line in


Script at which the error occurred.

2. Vocabulario Tcnico Power Builder


Naming Objects PowerBuilder uses seven object types within an application to build its
systesm. The Table below shows the naming conventions for object types.
Naming Object Types
Object Name

Convention

Example

DataWindow Object
Function (global)
Menu
Structure
Query
User Object
Window

d_
f_
m_
s_
q_
u_
w_

d_client
f_display_error
m_client
s_employee
q_clients_for_agent
u_request
w_ancestor

Naming Window Controls


Every window can have several controls. These controls have default names, but should
be renamed to be more descriptive and to make your appliction more manageable.
Control Name

Convention

Example

CheckBox
CommandButton
DataWindow Control
DropDownListBox

cbx_
cb_
dw_
ddlb_

cbx_draft
cb_OK
dw_data
ddlb_agents

Manual del Alumno


EditMask
Window Function
Graph
GroupBox
HscrollBar
Line
ListBox
MultiLineEdit
Oval
Picture
PictureButton
RadioButton
Rectangle
RoundRectangle
SingleLineEdit
StaticText
UserObject
VscrollBarr

em_
wf_
gr_
gb_
hsb_
ln_
lb_
mle_
oval_
p_
pb_
rb_
r_
rr_
sle_
st_
uo_
vsb_

em_phone
wf_sqlerr
gr_income_per_agent
gb_output_choice
hsb_red
ln_shortline
lb_agents
mle_comments
oval_team
p_employee
pb_update
rb_construction
r_rect
rr_screen
sle_customer_name
st_customer_prompt
uo_request
vsb_percent_done

Naming Variables
Every variable has a scope (when it can be accessed) and a data type. The scope should
always be as limited as possible. For example, dont use an instance variable when a local
variable will suffice. Limiting scope will aid in encapsulation, release memory sooner and
make the application easier to maintain.
In the variable scope, x indicates the data-type convention that follows the variable-scope
conventions.
Naming by Scope
The table below describes the conventions for naming by scope.
Variable Scope
Convention
Local
lx_or nothing (a prefix on local variables is
Optional)
Global
gx_
Instance
ix_
Shared
sx_
Argumemnt
ax_

Naming by Data Type


The table below describes the conventions for naming by data type.
Data Type
Convention
Window
MenuItem
DataWindow

w
m
dw

Manual del Alumno


Structure
User Object
Integer
Unsigned integer
Long
Unsigned Long
Boolean
String
Double
Real
Decimal
Date
Time
DateTime

Naming Variable Examples


Lists naming variable examples
Variable Name
sstr_data_points{}
iul_client_id
ss_name
Ii_count
loop_count
li_loop_count
lw_window_instance
as_error

str
uo
i
ui
l
ul
b
s
db
r
dc
d
t
dt or ts (TimeStamp)

Data Type Description


Shared Structure array
Instance of an Unsigned Long
Share string
Instance of an integer
local variable (prefix not required)
local integer (optional prefix added)
local instance of a window variable
argument string (passed)

Object Functions
Along with global functions, functions can be attached to individual objects. The object
prefix should precede the function prefix to indicate a function that is tied to a specific
object.
The following table describes naming object functions.
Naming Object Functions
Function Object Type
Convention
Example
Global Function
f_
f_sql_error
Menu Function
mf_
mf_exit
User Object Function
uf_
uf_request
Window Function
wf_
wf_update

Manual del Alumno


Course: Ingls Tcnico Intermedio
Ciclo: V

5
3. Vocabulario Tcnico Java Script
Java is an addition very welcomed to the set of author tools in Web, but it is only attractive
for the programmers by heart who live in coding night sessions encouraged with pizzas and
sodas. For the rest of us Netscape has developed a reduced version of Java called Java
Script. Yes, it still is programming, but it is a little bit more accessible for those who
arent geek.
The Java Script code goes directly inside the Web page, the same as the HTML labels.
When a browser Netscape 2.0 access the page, the Java Script code is executed and the
program does what it has to do. For example, the program could verify the time and
display the appropriate welcome message. It could also insert a calculator just in the page.
There is no limit for the kind of things it can do. If you are interested to know more about
this, go to the following page:
http://home.netscape.com/comprod/products/navigator/version_2.0/script/index.html
There is gold in those pages: Netscape Gold
With the launch of Navigator 2.0, Netscape has become the swiss knife of general purpose
of Internet. Moreover being one of the best Web browsers, Netscape 2.0 also includes a
program of e-mail, a Usenet news reader and counts with the capacity of handling most of
the other Internet services, including FTP and Gopher. It could also connect some extra
utilities taking advantage of connections like WebFX.
But it wasnt enough for the Web adicts. They wanted More More, so those people from
Netscape, created Netscape Navigator Gold. This version of Navigator has the same
features of the regular version, but it is also included the capacity of editing HTML
documents directly in the browser.
It is a pity that at the moment of printing a book about Netscape Gold it wasnt ready to
use it, which means that we cant talk about any of its functions. But instead of ignoring
this new and useful technology, we will offer a preliminary glance of the features of
Navigator Gold and then you can try it yourself when Netscape will launch it finally.
Dont lose the sight of the Netscape base page- md]http://home.netscape.com/ - searching
news about the launching of Netscape Gold.
How does Netscape Gold Work
When you are playing with the Netscape Editor, dont forget that you will not be working
directly with HTML labels. Instead of this you only have to write the text of your
document and then use the commands of the menu and the keys of the editor tool bar to
format the text. This formatting is the same as adding labels, but Netscape Editor doesnt
display the HTML codes. Instead of that, it onaly shows how does yout text will look like
in a browser . In other words, Netscape Editor is a WYSIWYG display. (WYSIWYG

Manual del Alumno


stands for What You See is What You Get, although some pesimitsts think that it means
When you See it You Will Die of Laughing). Here are some basic steps that you must
follow for each document.
1. Write the text of your document.
2. If you want to give shape to something in the text, sellect it:
if you are going to insert an HTML object as a linking or an
image, place the cursor of th4e editor where you want the
object to appear.
3. Select the command of menu or the key of the appropriate
tool bar.
4. Seldom save the file.
5. Repeat the steps from 1 to 4 until you finish.
Java is a programming language that is used to create software which is executed from a
Web Page.
4. Vocabulario Tcnico Evaluacin
5. Prctica Calificada
6. Reading Comprehension Information Systems Analysis of Goals and Problems
An enterprise has certain goals. It is desirable to analyze its goals and put them in writing.
If everybody understands the goals clearly, the enterprise is more likely to achieve them.
One of the most common forms of human folly is to lose sight of goals.
Goals are used in a control mechanism for an enterprise. They set targets, and the success
in progressing toward those targets is measured. If part of the enterprise falters in its
achievement of goals, this needs to be detected and corrective action taken as quickly as
possible.
Goals should be worded so as to express a precise course of action. Be a market leader
is a vague goal. Increase sales by 30 percent per year is a precise goal. Goals should be
precise where possible. Goals should focus on results. They6 should be decomposable
into work that hs to be done.
Goals should be measurable. In some cases the measure is binary: either the goal has been
achived or not, for example Hire new chief engineer. Where possible, a hard measure
should be applicable. In some cases a soft measure has to be used, for example Improve
market image of the enterprise. The extent to which such a goal has been met may be
established through market research interviewing techniques.
When high-level goals are identified, they should be broken down into lower-level goals
that apply to lower-level departments. Goals are thus associated with the organizational
units of an enterprise:
Organizational unit----------------HAS-----------------------goal.
Exercise 1. Translate the text above and answer the questions the teacher will ask
you.

Manual del Alumno


Course: Ingls Tcnico Intermedio
Ciclo: V

7
7.Vocabulario Tcnico Information System
Process
Evaluate Financial Proposals
Estimate Near-term Earnings
Budget Finances
Receive Funds
Pay Funds
Report Finances
Administer Taxes
Maintain Financial Reg. Policies
Audit Finances
Manage Financial Investments
Plan Human Resources
Acquire Personnel
Position People in Jobs
Terminate/RetirePeople
Plan Career Paths
Develop Skills/Motivation
Manage Individual Emp. Relations
Manage Benefit Programs
Comply with Govt. HR Regulations
Maintain HR Regs. Policies
Determine Production Requirement
Schedule Production

Entities
Employee
Contract Employee
Applicant
HRCompensation Regs, Plans, etc.
HR Benefits Regs & Plans
HR Staffing Requirements & Plans
Job Requesition
Stockholder
Boardmember
Misc.Contacts/VIP
Financial Plans
Accounting Regs, Practice
Ledger Accounts
Customer Purchase Order/Invoice
Customer Payments
Other Income

Organizational Units
Planning
Accounting
Cash Management
Investments
Purchasing
Facilities
Human Resource Development
MIS
Legal
Manufacturing
Quality Assurance
Packaging
Materials Management

Tactical Goals
Improve sales effectiveness
Identify new target market
Improve market penetration
Add distribution channels
Address absenteeism problem
Exploit new technology
Improve information systems
Streamline shop floor operations
Enhance employee training
Enhance customer support
Improve product quality
Expand product line
Upgrade product warrantee

10

Manual del Alumno


Sales Regions
Customer Services
Customer Education
Order Processing
Product Management
Public Relations
Market Research
Distribution
Engineering
Research
Prototype Manufacture
Testing Laboratory

Reduce Inventory Investment


Reduce receivables to 45 days
Improve cashflow management
Locate venture capital
Enhance corporate image

Function
Market Analysis
Product Range Review
Sales Forecasting
Financial Planning
Capital Acquisition
Funds Management
Product Pricing
Product Spec. Maintenance
Materials Requirements
Purchasing
Receiving
Inventory Control
Quality Control
Capacity Planning
Plant Scheduling
Workflow Layout
Materials Control
Sizing and Cutting
Machine Operations
Territory Management
Selling
Sales Administration
Customer Relations
Finished Stock Control
Order Servicing
Packing
Shipping
Creditors & Debtors
Cash Flow
Payroll
Post Accounting
Budget Planning
Profitability Analysis
Personnel Planning

Data Subject
Planning
Budget
Financial
Product
Product Design
Parts Master
Bill of Materials
Open Requirements
Vendor
Procurements
Materials Inventory
Machine Load
Work in Progress
Shop Floor Routines
Customer
Sales
Sales Territory
Fin.Goods Inventory
Orders
Payments
Cost
Salaries

11

Manual del Alumno


Recruiting
Compensation Policy.
Curso: Ingls Tcnico Intermedio
Ciclo: V

9
8. Vocabulario Tcnico Internet/World Wide Web
Anonymous FTP a method for downloading public files using the File Transfer
Protocol (FTP.
ADSL Asymmetric Digital Subscriber Line, a new technology that allows more
data to be sent over existing copper telephone lines.
Arpanet Advanced Research Project Agency, the precursor to the Internet,
ARPANET was a large wide-area network created by the United States.
Bookmark a file containing locations to which you want instant access.
Browser program that lets you explore the hypertext World Wide Web topics.
CGI Common Gateway Interface, CGI is a specification for transferring
information between a World Wide Web server and a CGI program.
Chat real-time communication between two users via computer.
Cyber a prefix used in a growing number of terms to describe new things that are
being made possible by the spread of computers.
DNS Domain Name System (or Service), an Internet service that translates
domain names into IP addresses.
Download to copy a file from a remote computer to your computer.
E-mail electronic mail.
FAQ Frequently Asked Questions, a FAQ is a document that answers questions
about some technical topic.
Frame panel dividing a Web page into sections.
FTP File Transfer Protocol that allows you to copy files from a remote computer
to your local host.
HTML Hyper Text Markup Language.
IP address numeric address written as four numbers separated by periods
(l.l60.lo.240), which identifies a computer or device on a TCP/IP.
Link a link is a reference to another document.
Mbone Multicast Backbone on the Internet, Mbone is an extension to the Internet
to support multicastin-two-way transmission of data between multiple sites.
Network two or more computers connected together in order to communicate and
share resources.
NSFnet a wide-area network developed under the auspices of the National
Science Foundation (NSF). NSFnet is replacing ARPANET as the main
government network linking universities and research facilities.
NSP Network Service Provider, a company that offers direct access to the
Internet backbone and the Network Access Points (NAPs).
PPP Point-to-Point Protocol, a method of connecting a computer to the Internet.
PPP is more stable than the older SLIP protocol and provides error-checking
features.

12

Manual del Alumno


Start page the first page loaded and displayed when you start a browser program.
TCP/IP acronym for Transport Control Protocol/Internet Protocol, the suite of
communications protocols used to connect hosts on the Internet.
TIFF Tagged Image File Format, one of the most widely supported file formats
for storing bit-mapped images on personal computers and Web pages.
Upload to copy a file from your computer to remote computer.
URL uniform resource locator, the address of a World Wide Web page.
VOI a category of software that enables people to use the Internet as the
transmission medium for telephone calls.
VRML Virtual Reality Modeling Language used to create 3D Web pages.
W3C World Wide Web Consortium, the W3C is the chief standards body for
HTTP and HTML.
WAIS Wide Area Information Server, and pron9ounced ways, a program for
finding documents on the Internet. WAIS is rather primitive in its search
capabilities.
WINS Windows Internet Naming Service, software from Microsoft that lets users
locate computers on remote networks automatically.
WWW World Wide Web, a system of Internet servers that support specially
formatted documents.
9. Vocabulario Tcnico Evaluacin
10. Examen Parcial
11. Reading Comprehension Internet
User Account Type
Local user account

Description
Enables a user to log on to a specific computer to gain access
to resources on that computer. Users can gain access to
Resources on another computer if they have a separate
Account on the other computer. These user accounts reside
In the Security Accounts Manager (SAM) of the computer.

Domain user account

Enables a user to log on to the domain to gain access to


Network resources. The user can gain access to network
Resources from any computer on the network with a single
User account and password. These user accounts reside in
The Active Directory, directory service.

Built-in user account

Enables a user to perform acministrative tasks or to gain


Temporary access to network resources. There are twoBuilt-in user accounts, which that cannot be deleted:
Administrator and Guest. The local Administrator and Guest
User accounts reside in SAM and the domain Administrator
And Guest user accounts reside in Active Directory.
Built-in user accounts are automatically created during
Window 2000 installation and the installation of Active
Directory.

13

Manual del Alumno


Naming conventions
Consider the following guidelines for naming conventions:
User logon names for domain user accounts must be unique in Active Director.
Domain user account full names must be unique within the domain in which you
create the user account. Local user account names must be unique on the computer
on which you create the local user account.
User logon names can contain up to 20 uppercase and lowercase characters (the
field accepts more than 20 characters, but Windows 2000 recognizes only 20). You
can use a combination of special and alphanumeric characters to help uniquely
identify user accounts.
If you have a large number of users, your naming convention for logon names
should acc9ommodate employees with duplicate names. The following are some
suggestions for handling duplicate names:
Use the first name and the last initial, and then add additional letters from
the last name to accommodate duplicate names. For examples, for two users named
Judy Lew,one user account logon name could be Judyl and the other Judyle.
In some organizations, it is useful to identify temporary employees by
their user accounts. To do so, you can prefix the user account name with a T and a
dash. For example, T-Judyl.
Password Guidelines
To protect access to the domain or a computer, every user acount should have acomplex
password. This helps to prevent unauthorized individuals from logging on to your domain.
Consider the following guidelines for assigning passwords to user accounts.
Always assign a password for the Administrator account to prevent unauthorized
access to the account.
Determine whether you or the users will control passwords. You can assign unique
passwords for the user accounts and prevent users from changing them, or you can
allow users to enter their own passwords the first time that they log on. In most
cases, users should control their own passwords.
Educate users about the importance of using complex passwords that are hard to
guess:
Avoid using passwords with an obvious association, such as a family
members name.
Use long passwords because they are harder to guess. Passwords can be
up to 128 characters. A minimum length of eight characters is
recommended.
Use a combination of uppercase and lowercase letters and nonalphanumeric characters.

14

Manual del Alumno


Curso: Ingls Tcnico Intermedio
Ciclo: V

12
Reading Comprehension Modeling Data Processing
A Description of the Procedure for Data Modeling
CREATE A DETAILED DATA MODEL
Detailed data modeling is tackled in one business area at a time. Although
described here as a self-contained activity it needs to be an integral part of the Buainess
Area Analysis procedure.
Comprehensive checks on the modeling process are described below which are
sometimes referred to as STABILITY ANALYSIS. The objective is to make the data
model as stable as possible so that it can support major changes in corporate procedures.
Stable data models have had the effect of drastically reducing program maintenance costs.
Preparation
Appoint a data-modeling professional to lead the activity
If a skilled data-modeling professional exists in house
Make him responsible for completion of the model on time.
Else
Employ a consultant skilled in data modeling.
Make him responsible for completion of the model on time.
Appoint one or more in-house professionals to become datamodeling experts.
Appoint an in-house professional to take over the work
from the consultant and be responsible for the model.
Ensure that the necessary tools are installed and working
Install a data modeling tool which synthesizes and normalizes
multiple views of data.
Use an encyclo0pedia-based tool (the one used in the earlier stages
of information engineering) to form an enterprise-wide dictionary,
repository, and coordination tool. The tool which does synthesis
and normalization should preferably be part of the encyclopedia-based
workbench.
Form an end-user committee.
Select end-user participants.

15

Manual del Alumno


End users selected should
Be intelligent
Be creative
Have good human communication skills
Want to understand information-system techniques,
Be highly knowledgeable about their own business areas.
Give the participants a one-day course in the basic principles of database
techniques.
Document a naming convention for the data items
Top-down data modeling
Select the entity types for this business area from the ISP entityRelationthip model.
Enter the primary keys for these entity types.
Add intersection entity types where appropriate (with automated
Assistance).
Add whatever attributes can be identified.
Ensure that the attribute groupings are in Fourth Normal Form.
Enhance this data model with the synthesis and user-checking
Techniques desscribed below.
Data synthesis
THE FOLLOWING STEPS ARE DONE ITERATIVELY UNTIL THE
MODEL IS COMPLETE.
Identify all possible user views of data
Capture all documents that will be derived from the systems.
Capture all documents that will be input to the systems.
Examine ll information requirements identified during the ISP.
Determine by discussion with the end users what types of data they
Want to obtain from the systems, now and in the future.
Determine from the systems analysts whether any new record or
Document requirements are emerging.
Examine existing files, databases, or dictionaries which relate to this
Data.
Plan whether existing files or databases will coexist with new systems
Or be converted. If they will coexist, plan what data is needed in
The new systems to form a bridge with the old systems.
Will application package files or databases coexist with the new systems.
If so, plan what data is needed in the new systems to form a bridge with
The packages.
Do the following for all the above user views
Inspect each input
Employ the naming convention.
Inspect each input to see whether it can be simplified.
Check whether any of the input data items already exist in the

16

Manual del Alumno


Model under a different name or in a slightly different form.
If so ensure that this redundancy is removed.
For each data item check that no different data item in the model
Has the same name.
Be sure that concatenated keys are correctly represented in the
Input to the synthesis process.
Be sure that all attributes entered are dependent on the WHOLE
Of the key which identifies them.
Be sure that all attributes entered as input contain no transitive
Dependencies (no hidden keys).
Question the validity of all links which represent business rules,
As opposed to the natural properties of the data. Could these
Rules be changed in the future?
Question any link with a l cardinality to ask whether it could
Become a many cardinality in the future.
Enter the view into the synthesis tool.
Create a dictionary entry to document the meaning of each data
Item.
Check the synthesized model.
With the user committee, review the data dictionary listing to ensure
That all end users agree about the definitions of the data items.
With the user committee, review the data model to ensure that their data
Requirements can be derived from it.
With the user committee, brainstorm the possible future uses of the data.
For any uses which the model does not serve, create new input to the
New input to the synthesis process.
Description
Brainstorming means that a creative group of individuals attempt to
Produce a stream of ideas without inhibition.
A rule of a brainstorming session is that there can be no implied
Criticism for making an impractical or stupid suggestion. The session
Is intended to generate as many ideas as possible. At the end of the
Session only certain of the ideas will be recorded for possible use.
Examine every attribute field in the model to see whether it could become
A primary key in the future.
Complete the reverse mapping of any links between keys to identify
Any possible MANY-TO-MANY links. Create an extra concatenated
Key to take care of any possible future intersection data.
If candidate keys exist in the data model, ensure that they are in fact likely
To remain candidate keys in the future.
Use fast, computerized redesign after any changes are made to maintain
The interest of the end users.
Ensure that the data modeling is integrated into the BAA procedure.

17

Manual del Alumno

Curso: Ingls Tcnico Intermedio


Ciclo: V

15
Vocabulario Tcnico HTML
1) access counter contador de acceso
2) access provider proveedor de acceso
3) anchor ancla
4) applet miniaplicacin programa de Java
5) arachnerd nerd araa
6) browner visualizador
7) Barney page pgina Barney
8) Body cuerpo
9) Byte-bonding byte chchara
10) Byte ocho bits o un olo caracter
11) Bps bits por segundo
12) Bit-spit - cualquier forma de correspondencia digital.
13) Bit abreviacin de las palabras binario y dgito.
14) Baud baudio transicin de nivel por segundo.
15) Bandwidth ancho de banda.
16) Cyberspace ciber espacio.
17) Cracker un programador que invade otros sistemas de computacin para
arruinarlos o solo por el gusto de hacerlo. Un hacker que ha sucumbido al lado
oscuro de la fuerza
18) Clickstream flujo de clics (ruta que toma una persona al navegar a travs de
world-wide web).
19) Cybersurfer surfeador ciberntico.
20) Century 21 site un site Web que se ha mudado a una nueva ubicacin y ahora
solo contiene un vnculo hacia la nueva direccin.
21) Character reference referencia de carcter. Cdigo de HTML que le permite
insertar caracterres especiales en sus pginas Web (como ).
22) Domain name nombre de dominio que identifica un site particular en Internet.
23) Digerati digeratos, abreviaturas de Literatos digitales (lo selecto de Internet).
24) Dirt road camino de terracera conexin frustrantemente lenta con un site Web.
25) Emoticon cono de emociones.

18

Manual del Alumno


26) External image imagen externa imagen de pgina Web que el visualizador no
puede manejar por lo que asigna la tarea a un programa grfico que despliega la
imagen en una ventana separada.
27) Entity name nombre de entidad cdigo de HTML que le permite insertar
caracteres especiales en sus pginas Web (como ) Los nombres de entidad son
ms fciles de usar que las referencias de carcter, pero no todos los visualizadores
lo manejan.
28) Frames marcos. En Netscape 2.0, reas rectangulares de una pgina web que
contienen segmentos independientes de texto grficos y cdigo HTML. En otras
palabras puede usar los marcos para dividir una sola pgina web en dos o ms
pginas independientes.
29) Frequently Asked Questions Listas de preguntas ms frecuentes.
30) Flooded inundado pgina que ha quedado ilegible debido a una imagen de
fondo mal elegida.
31) Form documento web que se empleas para reunir informacin sobre el lector.
32) Foo, bar palabras que se emplean como marcador de posicin en descripciones e
instrucciones.
33) Geek cerebrito alguien que sabe mucho acerca de computadoras y casi nada
acerca de cualquier otra cosa.
34) Geeking out cuando los cerebritos estn byte-chacharenado y repentinamente
comienzan a jugar con una comutadora durante un evento social que no tiene nada
que ver con computdoras.
35) GIF Graphics Interchange Format )Formato de Intercambio Grfico) Formato
grfico de uso ms comn en web.
36) Gopher sistema que despliega documentos y servic ios de Internet como opciones
de un men .
37) Greenlink vincular en verde usar web con fines lucrativos.
38) Hipertext link vnculo hipertexto.
39) Hosting provider proveedor de hospedaje. Una compaa que le proporciona
espacio de almacenamiento (por lo general a cambio de una cuota) para sus paginas
web.
40) Home page pgina base primer documento web que se despliega al seguir un
vnculo hacia un servidor web.
41) Hit-and-run-page - pgina acierta y corre. Pgina que obtiene un enorme nmero
de aciertos y luego desaparece una semana ms tarde.
42) Hot list lista importante coleccin de vnculos hacia sites interesantes que se
visita con regularidad.
43) Java lenguaje de programacin diseada para crear software que se ejecuta dentro
de una pgina web.
44) Jargonaut jergonauta persona que deliberadamente crea y disemina jerga de
Internet.
45) JPEG Joint Photographic Experts Group (Unin de Expertos en Fotografa)
formato grfico para web.
46) JPIG pgina web que tarda aos en cargarse porque est atiborrada de grficos.
47) Kbps Kilobits por segundo (miles de bits por segundo)
48) Luser ilusuario combinacin de palabras iluso y usuario (alguien que no
sabe lo que est haciendo)

19

Manual del Alumno


49) Link vnculo una palabra o frase que al ser seleccionada, enva al lector a una
pgina diferente o hacia un ancla.
50) Mouse potatoe papanatas del ratn
51) Mbps megabits por segundo millones de bits por segundo.
52) Multimediocridades discos de CD ROM atiborrado con imgenes, sonido y
programas de segunda.
53) Nymrod acronerd persona que insiste convertir en acrnimos todos los
hermanos de cmputo compuesto de varias palabras.
54) Netiquette etiqueta de red- conjunto de reglas diseadas para facilitar
interacciones en internet.
55) Nerd necio individuo que carece de higiene personal y habilidades sociales.
56) Network red coleccin de dos o ms computadoras conectadas por cables
especiales para que puedan compartir recursos como archivos o impresoras.
57) Newbie novato persona nueva en internet.
58) Notwork red atascada.
59) Roadblock letrero pgina web que no tiene otro propsito ms que el de
informarle que no hay nada disponible en este URL, pero que pronto habr algo.
60) Server servidor computadora que se emplea para enviar cosas.
61) Serial line interface protocol protocolo de interfaz de linea serial mtodo de
acceso a internet que permite a su computadora marcar el nmero de un proveedor
de servicio e intercambiar informacin de manera confiable.
62) Sundowner noctmbulo.
63) Target blanco objetivo meta
64) Tags etiquetas comandos de HTML en forma de combinaciones de letras o
palabras rodeadas por corchetes angulares (< >). Le indican a un visualizador
cmo debe desplegar una pgina web.
65) Telnet programa que permite conectarse con otra computadora en Internet y
emplear sus recursos como si existieran dentro de su mquina.
66) Ubiquilink vnculo ubicuo vnculo que se encuentra en la lista importante de
casi todo el mundo.
67) Usenet sistema que distribuye una coleccin de grupos de noticias a travs de
internet.
68) URL esquema de direccionamiento en web que describe la ubicacin exacta de
un recurso de internet.
69) Uniform Resource Locator Localizador Uniforme de Recursos
70) Vanity plate pgina web demasiado extensa que no sirve a ningn propsito til.
71) Vaporlink vnculo al vapor vnculo que apunta hacia una pgina web que no
existe.
72) WWW world wide web and triple W sistema de documentos que contienen
textos grficos y otros elementos de multimedia.
73) VRML - Virtual Reality Modeling Language Lenguaje de Modelado de Realidad
Virtual se emplea para crear sites web con mundos tridimensionales a los que se
pueden entrar empleando un visualizador optimizado para VRML.
74) Web browser visualizador web.
75) Web server servidor web computadora que almacena sus pginas web y las
pone a disposicin de cualquier usuario que disponga de un visualizador tambin se
llama anfitrin web.

20

Manual del Alumno


76) Wrackground image imagen de fondo que arruina una pgina al hacer imposible
la lectora del texto.
77) Web host anfitrin web
78) Yoyow (you own your own words) siglas de usted es propietario de sus
palabras. Se refiere a los derechos de autor que Ud. tiene sobre el texto de sus
pginas web.
14. Vocabulario Tcnico Evaluacin
15. Prctica Calificada

Curso: Ingls Tcnico Intermedio


Ciclo : V

18
16. Vocabulario Tcnico Assembling
Types of I/O Buses
The main types of I/O architecture are:
ISA
Micro channel
EISA
Local Bus
VESA local bus
PCMCIA bus
The difference among these buses consist primarily of the amount of data that they can
transfer at one time and the speed at which they can do it. Each bus architecture is
implemented by a chipset that is connected to the processor bus. Typically, this chipset
also controls the memory bus .
The ISA Bus
ISA, which is an acronym for Industry Standard Architecture, is the bus architecture that
was introduced with the original IBM PC in 1982 and later expanded with the IBM PC/AT.
ISA is the basis of the modern personal computer and the primary architecture used in the
vast majority of PC systems on the market today. It may seem amazing that such an
antiquated architecture is used in todays high-performance systems, but this seems to be
true for reasons of reliability, affordability, and compatibility.
The ISA bus enabled thousands of manufacturers to build systems whose components were
interchangeable. Floppy drives that work in an IBM PC also work in IBM clones, for
example, and video adapters that work in IBM ATs also work in IBM-compatible systems
Based on the 286 CPU chip.
Two versions of the ISA bus exist, based on the number of data bits that can be transferred

21

Manual del Alumno


on the bus at a time. The older version is an 8-bit bus, the newer version is a 16-bit bus.
Both versions of the bus operate at an 8 MHz cycle rate, with data transfers requiring
anywhere from two to eight cycles. Therefore, the theoretical maximum data rate of the
ISA bus is 8M per second, as the following formula shows:
8 MHz x 16 bits = 128 megabits/second
128-megabits/second 2 cycles = 64 megabits/second
64 megabits/second 8 = 8M/second
The bandwidth of the 8-bit bus would be half this figure (4M per second). Remember,
however, that these figures are theoretical maximums, because of I/O bus protocols, the
effective bandwidth is much lower typically by half.
Eisa Bus
EISA is an acronym for extended industry standard architecture. This standard was
announced in September 1988 as a response to IBMs introduction of the MCA bus more
specifically, to the way that IBM wanted to handle licensing of the MCA bus. Vendors did
not feel obligated to pay retroactive royalties on the ISA bus, so they turned their backs on
IBM and created their own buses. The EISA standard was developed by leading computer
manufacturers (minus IBM, of course) and supported by leading software companies. The
first EISA machines started appearing on the market in 1989.
The EISA bus was designed as a successor to the ISA bus, although it has not turned out
quite that way (as evidenced by the appearance of additional bus specifications). The
EISA bus provides 32-bit slots for use with 386DX or higher systems. The EISA slot
enables manufacturers to design adapter cards that have many of the capabilities of MCA
adapters, but the bus also supports adapter cards created for the older ISA standard.
EISA provides markedly faster hard-drive throughput when used with devices such as SCI
bus-mastering hard drive controllers. Compared with 16-bit ISA system architecture.
EISA permits greater system expansion with fewer adapter conflicts.
The EISA bus adds 90 new connections (55 new signals) without increasing the physical
connector size of the 16-bit ISA bus. At first glance, the 32-bit EISA slot looks much like
the 16-bit ISA slot. The EISA adapter, however, has two rows of connectors. The first
row is the same kind used in 16-bit ISA cards, the other, thinner row extends from the 16bit connectors.
To visualize the edge connectors on an EISA card, imagine that you are laying a 1-by-1
inch board on a 2-by-2 inch board in a lumberyard. The edge connector on an EISA board
is about 0.2 inch longer than the connectors on an 8- or 16-bit ISA adapter board. The
longest (and thinnest) connectors on an EISA card pass through the 16-bit part of the slot
and make contact with the 32.bit connectors deeper in the slot.
The physical specifications of an EISA card are as follows:
5 inches (127mm) high
13.13 inches (333.5mm) long
0.5 inch (12.7mm) wide
The EISA bus can handle up to 32 bits of data at an 8.33 MHz cycle rate. Most data
transfers require a minimum of two cycles, although faster cycle rates are possible if an

22

Manual del Alumno


adapter card provides right timing specifications. The maximum bandwidth on the bus is
33M per second, as the following formula shows:
8.33MHz x 32 bits = 266.46 megabits/second
266.56 megabits/second 8 = 33.32M/second.

_____________________________Curso: Ingls Tcnico Intermedio


Ciclo: V

20
17. Vocabulario Tcnico Web Graphics Design
1. 8-bit colour describing colour monitors which use eight bits to control 256
possible shades of grey or 2t56 colours.
2. 24-bit colour describing colour monitors which use eight bits to control each of
the red, green and blue electron guns. This gives 2 5 6 shades for each of the three
colours, allowing a total of 16.7 million colour shades.
3. 32-bit colour describing colour monitors which have 24-bit colour with an
additional 256 possible transparent colour overlays.
4. binary number a number (0 or 1) used in binary arithmetic.
5. graphics a non-character based method of displaying information on a screen,
usually used for displaying pictures. The basic unit from which the display is built
up is the pixel.
Match each of the following words with the appropriate definition.
1.
2.
3.
4.
5.

capture
poster
retouch
airbrush
emulsion

Reading 24-Bit Colour

a
b
c
d
e

light-sensitive substance on the surface of film


device that uses compressed air to spray paint
succeed in representing on film
alter by making minor changes
large printed picture used for advertising purposes

23

Manual del Alumno


Short explanation If your computer has 24-bit colour, then it can display photographic
images in colour on its screen that have natural-looking tones.
Long, long explanation In principle, there is an infinite number of shades available
between a solid colour and pure white. In practice, the human eye can detect somewhere
between 150-200 distinct shades, so as long as youve got more than this, you can produce
an undetectably smooth progression of shades (there are exceptions, but theyre not worth
going into here).
Cheapo computer monitors cant display shades you get solid black or white and nothing
else(in many cases you get black or green). It is possible to fake shades on one of these
monitors by a sort of poor mans halftone process called dithering, but this is useless for
serious image viewing and retouching.
What you need is a computer that can show true shades on its sscreen.
A computer builds up a picture from a series of building blocks called pixels. Each pixel is
a wquare (normally) of a single colour. The more pixels you can divide the picture into,
the higher the resolution of the complete image. The computer organizes itself by
descibing each pixel that it wants to display as a code in the binary mathematical set
(numbers built up from a series of 0s or 1s). Each 0 or 1 is called a bit.
Computers are generally structured to work in groups of eight bits (called a byte). These
eight numbers can be used to count up to 256 shades of grey from black to white, which is
more than enough to satisfy the eye.
A computer which can assign eight bits to desscribe pixels will produce perfect black and
white photographs on its monitor. A monitor that can show all these shades is called a
greyscale display.
Now your eye can detect those 150-200 shades in all three of the colours it can see: red,
green, and blue. If you use eight bits to describe colour, you only get 256 colours, which
isnt enough you get a mildly posterized effect, although the dithering process can
simulate more colours at the expense of quality.
To get the full colour photographic effect on a computer monitor, you need to be able to
generate 256 shades for each colour. This makes eight bits of information per colour,
giving a total of 24 bits. This is the 24-bit colour you keep reading about in computer
magazines. If you take all the possible variations of 256 shades of three colours, you end
up with a possible 16.7 million colour shades.
Some computers, such as the Macintosh, offer 32-bit colour: the spare eight bits can be
used to control transparent overlays of colour you get 256 levels of transparency.
You only really need 24-bit colour if you are going to do colour photographic retouching
on-screen or similar painting on-screen. For linework and picture placing, an 8-bit
colour monitor is perfectly adquate, as you can still define colours for print even if you
cant show them on the screen.

24

Manual del Alumno


Naturally, theres a bottom line in all this, or everyone would be using 24-bit colour. To
start with, you need special circuit boards which plug into your computer and drive the
monitor. An 8-bit board is cheaper than a 32-bit one.
You also need plenty of memory. A typical high resolution colour monitor can display
about a million pixels. The 24 bits that your computer uses to describe each pixel can also
be described as three bytes. To describe a million pixels takes three million bytes. In other
words, a hefty three megaytes of your computers memory is assigned to driving the
screen. With 8-bit colour, you only need one Mb.
Generally, 24-bit colour boards include extra memory and processors to speed up the
display performance.
Vocabulary
detect recognize
dithering a process which makes the transition between shades seem
smoother.
Retouching making minor changes in a photograph.
A mildly posterized effect a slightly crude image
Theres a bottom line it is expensive
Hefty large

22
Exercise 1 Mark True (T) or False (F) in relation to the information in the text.
1. If a computer can generate more than 200 distinct shades of colour, the human eye
will see a perfectly smooth progression of shades.
True / False
2. Everybody should have a computer that can show true shades on its screen. _____
3. A group of eight binary numbers is called a byte. _______
4. Under certain circumstances, 8-bit colour can provide more than 256 colours._____
5. 32-bit colour offers 256 times as many shades of colour as 24-bit colour.
6. To run 24-bit colour, you need three times as much memory to drive the screen as
you do to run 8-bit colour.
18. Vocabulario Tcnico Evaluacin
19. Examen Final
20. Examen Sustituttorio.

25

Manual del Alumno

Potrebbero piacerti anche