verb phrases

Upload: deborah-cohen

Post on 08-Mar-2016

11 views

Category:

Documents


0 download

DESCRIPTION

schoolwork

TRANSCRIPT

UNIVERSIDAD DEL VALLE SEDE PALMIRALECTURA DE TEXTOS ACADMICOS EN INGLS 1CLASE FEBRERO 16 DE 2016NOMBRE ________________________________________________________COMPOUND NOUNSThe language of computing in English contains an ever increasing number of compound nouns, that is, a group of two or more nouns which act as a single noun.Examples:Memory capacity an address bus an arithmetic unitInformation systems a bar code scanner

It is important to be able to recognize how such compounds are formed in order to understand what they mean. The exact relationship between the words depends on the particular expression, but all these expressions have one thing in common: the last word in the chain says what the thing is, while the preceding word or group of words describes the thing. So when we read compound nouns, we have to start with the last word and work backwards.

Examples: An address bus is a bus dedicated to address information. The memory capacity of a computer is the capacity of its memory.

A large number of possible meanings can be expressed by compound nouns. For instance, the first noun or group of nouns can tell us what the second noun is made of, what it is for, or what it is part of.

1. Material: the first noun tells us what the second consists of.

Examples: a silicon chip (a chip made of silicon) a ferrite ring (a ring made of ferrite)

2. Function: the first noun tells us what the second noun is for.

Examples: an address bus (a bus dedicated to address information) an input device (a device for inputting) an arithmetic unit (a unit which performs arithmetic functions)

3. Part: the second noun refers to a part of the first noun.

Examples: a computer keyboard (the keyboard of a computer) a monitor screen (the screen of a monitor) a program feature (a feature of a program)

4. Activity or person: the second noun refers to an activity or person related to the first noun. Examples: computer programming (the programming of computers) a computer programmer (a person who programs computers) systems analysis (the analysis of organizational systems) a systems analyst (a person who analyses organizational systems) 5. Multiple nouns: sometimes a compound noun will join together with one or more other nouns to give an expression that has three or four words. In such cases, it is important to examine the expression very carefully to break it into its constituent parts. The secret, as always, is to read the expression from the back towards the front.

Example:a document-image-processing program(a program which processes images of documents) Note: some expressions are written separately, while others are joined by hyphens. There are no clear rules for this. Sometimes you will see the same expression written in different ways in different texts.

Example: document-image-processing program document image-processing program document image processing program

However, it is important to be consistent within a single text.

Exercise 1A device that scans bar codes is called a bar code scanner. What name is given to:

1. a unit that gives a visual display of information on a screen?2. a device that reads magnetic cards?3. a device that plots graphs?4. a device that prints using a laser as the light source? 5. a unit that holds magnetic disks?6. a device that prints using a jet of ink?7. the rate of transmission of data?8. a package for making presentations using multimedia?9. a program which processes data in batches?10. the process for the conversion of disks for computers?

Exercise 2Using the explanations in Exercise 1 as models, write short simple explanationsof the following items:1. an input device2. an optical character reader3. a graphics stylus4. a document sorter5. a fibre optics transmission system6. a sequence control register7. a liquid crystal display8. network configuration information9. a desktop document manager10. a multimedia editing software packageExample answers1. a device that inputs information2. a device that reads optical characters3. a stylus for creating graphics4. a program that sorts documents5. a system for the transmission of fibre optics6. a register for the control of sequences7. a device that displays using liquid crystals8. information for the configuration of a network9. a program for managing documents on top of your desk10. a software package/ a package of software for editing multimediaVERB PHRASESThe simple predicate, or verb, may consist of two or more words. These words are called the verb phrase. A verb phrase is made up of a main verb and one or more helping verbs.

A main verb can stand by itself as the simple predicate of a sentence.

Many different people lived in the American colonies. MAIN VERB (action)

The colonists were hardworking. MAIN VERB (linking)

Helping verbs help the main verb express action or show time.

Ships from England would bring supplies to the settlers. VERB PHRASE (Would is the helping verb.)

COMMON HELPING VERBS

Forms of beis, am, was, are, were, be, been

Forms of dodo, does, did

Forms of havehas, have, had

Othersmay, might, can, should, could, would, shall, will

IDENTIFYING VERB PHRASESUnderline the verb phrase in each sentence. Include main verbs and helping verbs.

1. The colonists would build a home as quickly as possible.2. Wood from nearby forests was used for their homes.3. In later years, some houses were made of brick.4. Poor settlers could make their furniture from the many trees of the forest.5. Wealthy families could order fancy furniture from England.6. The colonists may have brought some tools and household items with them.7. They did eat some new foods, such as corn.8. Most colonists would wear rough, homemade clothing called homespun.9. Adults and children did like games and contests.10. Sometimes, they might fly a kite.11. Colonial children might have become good at familiar games such as marbles and hopscotch.12. You would have recognized some of their favorite playthingsjump ropes, dolls, and other toys.13. Many families would have been the proud owners of pet cats and dogs.14. Farm children might have owned a pet lamb or pony.15. Life in colonial times could be both difficult and fun.

A. Identifying Main Verbs and Helping VerbsUnderline the main verb once and the helping verb twice in each of the following sentences.EXAMPLE I am learning about life in colonial America.1. Master craftsmen would teach young boys certain skills.2. The young boys were called apprentices.3. Some apprentices could learn all about fine furniture.4. Others might be taught about the printing press.5. An especially talented boy would be apprenticed to a lawyer or doctor.6. Some girls were trained as housekeepers or cooks.7. Many children did attend some type of school.8. All should have learned daily living skills from their parents.9. A farm boy would help his father with the chores.10. A girls mother would show her daughter how to spin and weave.

B. Writing Verb PhrasesAdd a helping verb to complete the verb phrase in each sentence below.1. Some families ________________ visit colonial towns such as Williamsburg, Virginia.2. ________________ you toured the Governors Palace there?3. A visitor ________________ see how people in the colonies actually lived.4. You ________________ watch craftsmen making beautiful glass bowls.5. Criminals ________________ placed in stocks in front of the jail.6. ________________ you ever seen pictures of someone with his head and hands locked in the wooden stock?7. ________________ you remember the uniformed soldiers parading around the town?8. All the shops ________________ filled with items from colonial times.9. You ________________ buy a tin whistle or a three-cornered hat.10. The restaurants ________________ filled with people enjoying delicious colonial foods.11. ________________ you ever eaten your dinner by candlelight?12. ________________ you think you would like to visit Williamsburg?

a visual display unit2 a magnetic card reader3 a graph plotter4 a laser printer5 a magnetic disk holder6 a ink jet printer7 a date transmission rate8 a multimedia presentation package9 a batch processing program10 a computer disk conversion process.A linking verb connects the subject with a word that gives information about the subject, such as a condition or relationship. They do not show any action; but, they link the subject with the rest of the sentence. For example, in the sentence "They are a problem," the word "are" is the linking verb that connects "they" and "problem" to show the relationship between the two words.Linking Verb ExamplesHere are examples of linking verbs in sentences with the linking verbs bolded: Williamisexcited about his promotion. Sheappearsupset about the announcement. The eggssmellrotten. Hewentred after tripping on the rug. Your plans for the weddingsoundnice. Youlookexhausted after studying all night. Iamputty in his hands. Mariamight have beenmore forthcoming with the news. Tomactednervous when the teacher found the note. The audiencefellsilent when the conductor walked on stage. Dreamscometrue when we believe in them. The crowdstayedcalm in spite of the imminent threat. All the childrenseemsatisfied with the bouncy castle. Bobfeltsleepy after eating the whole pizza. The cinnamon rollstasteheavenly. Building the houseprovesdifficult for them. Anthonyhas beena dream the last few weeks. The spectatorsremainedsilent after the injury on the field. Hebecamesuspicious when he saw the safe was open. All the kittenswereplayful. The theatergetsdark when the show is about to begin. Some couples are lucky enough togrowold together. Ifeelworthy when the boss compliments me. The weatherwasaccommodating and the party continued. The embersturnashy as they cool. Youare beingvery foolish to believe her. Marywaxednostalgic on her 50th birthday. Your friendmight bedisappointed if you dont go. Sometimes, kidsactfoolish. Wearedismayed about the foreclosure. The testsindicatethat your child is gifted. Martindoeslike very spicy food. Jumping into a pondcould bedangerous. Most childrengetcranky when they are sleepy. After the snowstorm, the roadswereslippery. A flaw in the designappeared to bethe cause of the collapse. The vegetables in the binlookeddisgusting and spoiled. Theyshall behappy ever after. Riding in a carwill besafer with a seat belt. The police departmentis gettingtough on crime. Sheremainsfaithful, even though it has been two years since he left.

TEXT 1 In 1952, a major computing company took a decision to get out of the business of making mainframe computers. They believed that there was only a market for four mainframes in the whole world. That company was IBM. The following year they reversed their decision. In 1980, IBM decided that there was a market for 250,000 PCs, so they set up a special team to develop the first IBM PC. It went on sale in 1981 and set a worldwide standard for IBM-compatibility which, over the next ten years, was only seriously challenged by one other company, Apple Computers. Since then, over seventy million PCs made by IBM and other manufacturers have been sold. Over this period, PCs have become commodity items. Since IBM made the design nonproprietary, anyone can make them. The history of the multi-billion dollar PC industry has been one of mistakes. Xerox Corporation funded the initial research on personal computers in their Palo Alto laboratory in California. However, the company failed to capitalize on this work, and the ideas that they put together went into the operating system developed for Apple's computers. This was a graphical interface: using a mouse, the user clicks on icons which represent the function to be performed. The first IBM PC was developed using existing available electrical components. With IBM's badge on the box it became the standard machine for large corporations to purchase. When IBM were looking for an operating system, they went initially to Digital Research, who were market leaders in command-based operating systems (these are operating systems in which the users type in commands to perform a function). When the collaboration between IBM and Digital Research failed, IBM turned to Bill Gates, then 25 years old, to write their operating system. Bill Gates founded Microsoft on the basis of the development of MS/DOS, the initial operating system for the IBM PC. Digital Research have continued to develop their operating system, DR/DOS, and it is considered by many people to be a better product than Microsoft's. However, without an endorsement from IBM, it has become a minor player in the market. Novell, the leaders in PC networking, now own Digital Research, s things may change. The original IBM PC had a minimum of 16K of memory, but this could be upgraded to 512K if necessary, and ran with a processor speed of 4.77MHz. Ten years later, in 1991, IBM were making PCs with 16Mb of memory, expandable to 64Mb, running with a processor speed of 33MHz. The cost of buying the hardware has come down considerably as the machine's have become commodity items. Large companies are considering running major applications on PCs, something which, ten 4 years ago, no one would have believed possible of a PC. In contrast, many computers in people's homes are just used to play computer games. The widespread availability of computers has in all probability changed the world for ever. The microchip technology which made the PC possible has put chips not only into computers, but also into washing-machines and cars. Some books may never be published in paper form, but may only be made available as part of public databases. Networks of computers are already being used to make information available on a worldwide scale.

TEXT 2The average computer user has between 5 and 15 username/password combinations to log in to email accounts, social networking sites, discussion boards, news and entertainment sites, online stores, online banking accounts, or other websites. For people who use email or other internet applications at work, the number of required username/password combinations may surpass 30. Some of these accounts demand that you use a specific number of symbols and digits, while others require you to change your password every 60 days. When you add to this list the codes needed to access things like ATMs, home alarm systems, padlocks, or voicemail, the number of passwords becomes staggering. The feeling of frustration that results from maintaining a memorized list of login credentials has grown so prevalent that it actually has a name: password fatigue. Having to remember so many different passwords is irritating, but it can also be dangerous. Because it is virtually impossible to remember a unique password for each of these accounts, many people leave handwritten lists of usernames and passwords on or next to their computers. Others solve this problem by using the same password for every account or using extremely simple passwords. While these practices make it easier to remember login information, they also make it exponentially easier for thieves to hack into accounts. Single sign-on (SSO) authentication and password management software can help mitigate this problem, but there are drawbacks to both approaches. SSO authentication can be used for related, but independent software systems. With SSO, users log in once to access a variety of different applications. Users only need to remember one password to log in to the main system; the SSO software then automatically logs the user in to other accounts within the system. SSO software is typically used by large companies, schools, or libraries. Password management software, such as KeePass and Password Safe, is most often used on personal computers. These software programswhich have been built into many major web browsersstore passwords in a remote database and automatically remember users passwords for a variety of sites. The problem with both SSO authentication and password management software is that the feature that makes them useful is also what makes them vulnerable. If a user loses or forgets the password required to log in to SSO software, the user will then lose access to all of the applications linked to the SSO account. Furthermore, if a hacker can crack the SSO password, he or she will then have access to all of the linked accounts. Users who rely on password management software are susceptible to the same problems, but they also incur the added threat of passwords being compromised because of computer theft. Although most websites or network systems allow users to recover or change lost passwords by providing email addresses or answering a prompt, this process can waste time and cause further frustration. What is more, recovering a forgotten password is only a temporary solution; it does not address the larger problem of password fatigue. Some computer scientists have suggested that instead of passwords, computers rely on biometrics. This is a method of recognizing human users based on unique traits, such as fingerprints, voice, or DNA. Biometric identification is currently used by some government agencies and private companies, including the Department of Defense and Disney World. While biometrics would certainly eliminate the need for people to remember passwords, the use of biometrics raises ethical questions concerning privacy and can also be expensive to implement. The problems associated with SSO, password management software, and biometrics continue to stimulate software engineers and computer security experts to search for the cure to password fatigue. Until they find the perfect solution, however, everyone will simply have to rely on the flawed password system currently in place.