Professional Documents
Culture Documents
Apunte Inglés Software 2021
Apunte Inglés Software 2021
Inglés
Tecnicatura Superior en
Desarrollo de Software
Programmer
A programmer, computer
programmer, developer, coder,
or software engineer is a person
who writes computer software.
A computer programmer
creates the code for software
applications and operating
systems. After a software
developer designs a computer
program, the programmer writes
code that converts that design
into a set of instructions for the computer. He or she tests the program to look for
errors and then rewrites it until it is error-free. The programmer evaluates
programs, makes updates and adjustments as needed.
1
Introduction to software
Software is just instructions written by a programmer which tells the computer what
to do. Programmers are also known as 'software developers', or just plain
'developers'.
Nothing is simple about software. Software
programs can have millions of lines of code. Even
the process of starting software goes by many
different names in English. Perhaps, the most
correct technical term is 'execute', as in "the man
executed the computer program." Some other
common verbs used to start a software program are
'run', 'launch, and even 'boot' (when the software in
question is an operating system).
Software normally has both features and bugs. When software has a bug, the
program can crash and terminate with a confusing message. This is not good. End
users do not like confusing error messages such as:
Site error: the file /home7/businfc6/public_html/blog/wordpress/wp-
content/plugins/seo-blog/core.php requires the ionCube PHP Loader
ioncube_loader_lin_5.2.so to be installed by the site administrator.
Sometimes when software stops responding you are forced to manually abort the
program yourself by pressing some strange combination of keys such as ctrl-alt-
delete.
[…] Software programs are normally written and compiled for certain hardware
platforms. It is very important that the software is compatible with all the
components of the computer. For instance, you cannot run software written for a
Windows computer on a Macintosh computer or a Linux computer. Actually, you can,
but you need to have special emulation software or a virtual machine installed.
There are two basic kinds of software. The first is closed
source or proprietary software, which you are not free to modify and improve. An
example of this kind of software is Microsoft Windows or Adobe Photoshop.
The other kind of software is called open source software, which is normally free to
use and modify (with some restrictions of course). Examples of this type of software
include most popular programming languages, operating systems such as Linux,
and thousands of applications such as Mozilla Firefox and Open Office.
Adapted from: https://www.english4it.com/module/core/unit/2/reading
2
Actividad
Un determinador + núcleo
Un modificador + núcleo
Dos modificadores + núcleo
Un determinador + un modificador + núcleo
a. La definición de software.
b. Los 4 términos que se suelen utilizar para referirse a “iniciar” un programa.
c. Los dos tipos de software mencionados, sus características y ejemplos.
3
4
Actividades: "What is a Computer?"
Un detenninador + núcleo
Un premodificador + núcleo
Dos premodificadores + núcleo
Un detenninador + un premodificador + núcleo
3. Unir las siguientes palabras y frases extraídas del texto con sus significados:
software
peripherals
mammemory
hard drive (or hard disk)
hardware
input
ports
output
central processing unit (CPU)
a. el cerebro de la computadora
h. componentes fisicos que forman parte del sistema de computadora
c. programas que pueden usarse en un cierto sistema de computadora
d. información que se presenta a la computadora
e. resultados producidos por una computadora
f dispositivos de entrada fijos en la CPU
g. Sección que contiene programas y datos mientras se ejecutan y procesan
h. Dispositivo magnético que guarda información
1. entradas en las que se puede conectar un dispositivo externo
5
Python
Python is an interpreted, multi-paradigm programming language written by Guido van
Rossum in the late 1980's and intended for general programming purposes. Python is
characterized by its encouragement for elegant code. Python is used as the main
programming choice of both Google and Ubuntu.
Java
Java uses a compiler, and is an object-oriented language released in 1995 by Sun
Microsystems. Java is the number one programming language today for many reasons.
First, it is a well-organized language with a strong library of reusable software components.
Second, programs written in Java can run on many different computer architectures and
operating systems because of the use of the JVM ( Java virtual machine ). Sometimes this
is referred to as code portability or even WORA ( write once, run anywhere ). A lot of
computer science theory books written in the past decade use Java in the code examples.
So learning Java syntax is a good idea.
JavaScript
JavaScript is an interpreted, multi-paradigm language. It is basically a language meant to
script behaviors in web browsers and used for things such as web form validation and AJAX
style web applications. The trend in the future seems to be building more and more complex
applications in JavaScript, even simple online games and office suites.
C#
C# is a compiled, object-oriented language written by Microsoft. It is an open specification,
but rarely seen on any non-Windows platform. C# was conceived as Microsoft's premium
language in its .NET Framework. It is very similar to Java in both syntax and nature.
Actividad
1. Extraer y traducir frases sustantivas con distintos modificadores e indicar si los
núcleos están en singular o plural.
2. Leer el texto y mencionar en español al menos 2 características de cada lenguaje
de programación mencionado.
6
Pros & Cons for Home Use: Inkjet vs. Laser
Printers
Inkjet printing creates a digital image by dropping spots of ink onto
paper; laser printers produce digital images by scanning a laser beam
across photoreceptors. So which is the best option?
Inkjet Printers
PROS:
CONS:
7
Laser Printers
PROS:
Laser printers can print faster. High volume users will notice a bigger
difference.
Laser printers produce better, sharper black text. They also handle small
fonts and fine lines in a more favourable way.
Laser printers are the best choice to handle high-volume print jobs.
Although they're more expensive printers, laser toner cartridges print
larger amounts relative to their cost and are less wasteful.
CONS:
Although toner is cheaper in the long run, there are higher upfront costs.
There are more frequent toner leaks.
Laser printers handle a smaller variety of paper or printing materials.
Home laser printers can handle simpler graphics, and smooth
photographs are a challenge.
They are bigger and heavier printers.
Image-heavy documents
Ink catridges
Water damage
Laser printing
Low-capacity paper trays
High-volume print Jobs
8
Learning About Operating Systems
An operating system is a generic term for the multitasking software layer that lets
you perform a wide array of 'lower level tasks' with your computer:
At the heart of an OS is the kernel, which is the lowest level, or core, of the operating
system. The kernel is responsible for all the most basic tasks of an OS such as
controlling the file systems and device drivers.
The most popular OS today is Microsoft Windows, but there are different types of
Windows OSs as well. Each Windows OS is optimized for different users, hardware
configurations, and tasks. There are many more operating systems besides the
various versions of Windows, some perform better tasks than others. Free BSD,
Solaris, Linux and Mac OS X are some good examples of non-Windows operating
systems.
An OS must have at least one kind of user interface. Today there are two major kinds
of user interfaces in use, the command line interface (CLI) and the graphical user
interface (GUI). Typically speaking, GUIs are intended for general use and CLIs are
intended for use by computer engineers and system administrators. […]
Actividad
9
10
Actividad "What's inside a PC system?"
1. Encontrar y traducir frases sustantivas con distintos modificadores e indicar si los núcleos están
en singular o plural.
11
Actividad "The eyes of your computer"
12
13
FRASE SUSTANTIVA
C. Extraer 3 frases sustantivas en las que el núcleo esté acompañado solo por pre-
modificadores.
________________________________________________________________________
________________________________________________________________________
________________________________________________________________________
D. Extraer 3 frases sustantivas en las que el núcleo se encuentre solo.
14
Posmodificadores de sustantivos
15
Actividad
-ED
Adjetivo
calificativo
WhatsApp is a chat app installed on over one billion smartphones. It’s a messenger
app accesible all over the world. And it has great user experience.
Telegram
Morecast
There are plenty of weather apps available that are more accurate and better than the
apps pre-installed on your Android device.
MORECAST is our current favorite weather app at AndroidPIT because it has one of
the prettiest interfaces. It's also one of the most advanced apps featuring options
such as weather comparisons for two cities, and accurate weather information for a
particular route or journey.
16
Actividad
1. Trabajar con el texto “The Different Types of Computer Viruses” y el texto de IOT
Agenda. Identificar y traducir frases sustantivas con distintos posmodificadores.
Harm
e-mail attachments
file downloads
host files
self-replicate
delete
useless
login details
up to date
3. Leer el texto de IOT Agenda y completar el siguiente cuadro con las características
y los usos de cada tipo de computadora:
17
THE DIFFERENT TYPES OF
COMPUTER VIRUSES
The virus can replicate itself and then infect the other files on your computer and
cause more damage. Below is a list of different types of computer viruses and what
they do.
Macro Viruses
These viruses infect the files created with some applications or programs
containing macros such as doc, pps, xls and mdb. They automatically infect the
files with macros and also templates and documents that are contained in the file.
They hide in documents shared through e-mail and networks.
They usually fix themselves inside the computer memory. They get activated every
time the OS runs and infect other opened files. They hide in RAM.
Overwrite Viruses
These types of viruses delete any information in the file infected, leaving them
partially or completely useless once they are infected. Once in the computer, they
replace all the file content but the file size doesn’t change.
18
These viruses mainly replicate or take action once they are executed. When a
certain condition is met, the viruses mentioned will act by infecting the files in the
directory or the folder specified in the AUTOEXEC.BAT. The viruses are generally
found in the hard disk’s root directory, but they keep on changing location.
Directory Virus
They infect the computer’s directory by changing the path indicating file location.
They are usually located in the disk but affect the entire directory.
Multipartite Virus
These type of viruses spread in many different ways. Their actions vary depending
on the OS installed and the presence of certain files. They tend to hide in the
computer’s memory but do not infect the hard disk.
Worm
This is a program similar to a virus and has the ability to self-replicate, which leads
to negative effects on your computer.
Trojans
Trojans can illegally trace important login details belonging to users online. For
example E-Banking is very common among users, therefore, it increases the
vulnerability of tracing your login details whenever your PC is working without any
strong powerful antivirus installed.
Email Virus
This is a virus spread via an email. Such virus will hide in an email and when the
recipient opens the mail, it will infect the computer used.
Browser Hijacker
This virus can spread in many different ways such as a voluntary download. If
infects certain browser functions in form of re-directing the user automatically to
certain sites.
The many types of computer viruses analyzed and their effects are very harmful
and can completely damage your system. Always make sure your system is up to
date and has an antivirus software installed. The antivirus program protects your
computer and all the files containing personal information.
19
Microcomputer
A microcomputer is a complete computer on a smaller scale and is generally a synonym
for the more common term, personal computer or PC, a computer designed for an
individual. A microcomputer contains a microprocessor (a central processing unit on a
microchip), a memory in the form of read-only memory and random access memory, I/O
ports and a bus or system of interconnecting wires housed in a motherboard.
Mainframe
It is a very large and expensive computer capable of supporting hundreds, or even
thousands, of users simultaneously. These are computers similar to
supercomputers. In some ways, mainframes are more powerful because they
support more simultaneous programs. But supercomputers can execute a single
program faster than a mainframe.
Minicomputer
It is a mid-sized computer. In general, a minicomputer is a multiprocessing system
capable of supporting from 4 to about 200 users simultaneously.
Supercomputer
It is the fastest type of computer analyzed. Supercomputers are very expensive
and are employed for specialized applications requiring immense amounts of
mathematical calculations. For example, weather forecasting requires a
supercomputer. Other uses of supercomputers include animated graphics, fluid
dynamic calculations, nuclear energy research, and petroleum exploration.
20
Actividad
1. Ubicar las frases verbales en negrita en Presente simple en el siguiente
cuadro:
Afirmativa
Negativa
Interrogativa
21
What is TikTok and how does it work?
Everything you need to know
TikTok is a social app used to create and share videos. Many videos are music-focused,
with creators using the app's vast catalogue of sound effects, music snippets, and filters
to record short clips. But there's an untold number of videos to discover, with varying
topics. If TikTok sounds familiar, it's because there are many apps similar to it.
The basic function of TikTok is that users can film videos lip-syncing, dancing, or acting
out sketches. Videos - or TikToks - are up to 15 seconds long, but they can also connect
multiple clips for up to 60 seconds of total recording. Users also upload longer videos
recorded outside the app. TikTok also has video editing and customisation tools. Users
have access to a library of songs, effects, filters, and sound bites to add to their videos.
ACTIVIDADES
22
23
Apple Inc., formerly Apple Computer, Inc., is a multinational
corporation that creates consumer electronics, personal
computers, servers, and computer software, and is a digital
distributor of media content. The company also has a chain of
retail stores known as Apple Stores. Apple's core product lines are
the iPhone smart phone, iPad tablet computer, iPod portable
Apple Inc. media players, and Macintosh computer line. Founders Steve
Jobs and Steve Wozniak created Apple Computer on April 1,
1976, and incorporated the company on January 3, 1977, in
Cupertino, California.
For more than three decades, Apple Computer was predominantly a manufacturer of
personal computers, including the Apple II, Macintosh, and Power Mac lines, but it faced
rocky sales and low market share during the 1990s. Jobs, who was ousted from the
company in 1985, returned to Apple in 1996 after his company NeXT was bought by
Apple. The following year he became the company's interim CEO, which later became
permanent. Jobs subsequently instilled a new corporate philosophy of recognizable
products and simple design, starting with the original iMac in 1998.
With the introduction of the successful iPod music player in 2001 and iTunes Music Store
in 2003, Apple established itself as a leader in the consumer electronics and media sales
industries. The company is now also known for its iOS range of smart phone, media
player, and tablet computer products that began with the iPhone, followed by the iPod
Touch and then iPad. As of 30 June 2015, Apple was the largest publicly traded
corporation in the world by market capitalization.
24
The Case of the Killer Robot
This scenario is intended to raise issues of computer ethics and software engineering.
It is based on:
Richard G. Epstein's "Case of the Killer Robot",
Online Ethics Center for Engineering,
National Academy of Engineering
This simplified version of the case-study just considers the actions of a team of
programmers and their managers, leading up to an incident in which someone died. The
original is much longer, and also looks at the actions of journalists, investigators, expert
witnesses, politicians and lawyers after the incident.
The Incident
Bart Matthews worked as a robot operator at Cybernetics Inc. He was killed last May
when the robot he was operating (a Robbie CX30 industrial robot, built by Silicon
Techtronics Inc.) malfunctioned and started to wave its "arm" violently. The robot arm
struck Matthews and killed him almost instantly.
The evidence against him includes three similar handwritten formulas. Each formula
describes the motion of the robot arm in one direction: east-west, north-south and up-
down. Comparing these formulas with the actual program code written by Randy
Samuels, it is clear that he misinterpreted the formulas.
25
Project Management
Randy Samuels and others who worked on the Robbie CX30 project at Silicon
Techtronics Inc. were under tremendous pressure to finish the software by January 1 of
this year. Top level management warned project staff that "heads would roll" if the
January 1 deadline was not met. There was an enormous amount of friction between
robotics division chief Ray Johnson and the Robbie CX30 project manager Sam
Reynolds.
20 extra programmers
Twenty new programmers were added to the Robbie CX30 project on June 12 of last year.
This was just several days after the stormy meeting between Johnson and Reynolds. The
new hires were a disaster. They were inexperienced and disoriented with the development
of the project.
The Interface
An expert in the area of user interfaces was asked to help police reconstruct the accident.
He concluded that it was the interface design and not the flawed software which should
be the culprit in this case. What follows is a part of his report.
This evaluation of the Robbie CX30 user interface is based upon Shneiderman's 'eight
golden rules' of interface design. The Robbie CX30 operator interface violated each and
every one of Shneiderman's rules. Several of these violations were directly responsible
for the accident that ended in the death of the robot operator.
The robot console was a PC with a color monitor and keyboard but no mouse (due to the
dirty conditions of the workplace). This console was embedded in a workstation which
included shelves for manuals and an area for taking notes and for reading manuals.
However, the reading/writing area was quite a distance from the computer screen, and the
operator's chair was poorly designed and too high relative to the console and the
reading/writing area. This placed much strain on the operator's back and also caused
excessive eye strain.
The operator interacted with the robot and made an impact on its behavior by making
choices in a menu system. The main menu consisted of 20 items -- too many, in my
opinion -- and each main menu item had a pull-down submenu associated with it. Some
of the submenus contained as many as 20 items -- again, too many.
26
In addition, the use of color in the interface was very unprofessional: There were too
many colors in too small a space. The contrasts were glaring and the result was severe
eye strain in just fifteen minutes. There was also excessive use of screen flashing and silly
musical effects when erroneous choices or erroneous inputs were made.
While the software module written by Randy Samuels did cause the Robbie CX30 robot
to oscillate out of control and strike its human operator, a good interface design would
have allowed the operator to terminate the erratic robot behavior. Based upon an analysis
of the robot user interface using Shneiderman's eight golden rules, this interface design
expert has come to the conclusion that the interface designer, and not the programmer,
was the guiltier party in this unfortunate fiasco.
Adapted from:
http://syllabus.cs.manchester.ac.uk/ugt/2018/COMP10120/AbridgedKillerRobot.html
Actividad
27
What does the future hold for the PC?
By David Howell July 09, 2015 Future tech
What will your computer look like in ten or twenty years?
Computers are not simply isolated pieces of IT we use. With the burgeoning ideas of the
Internet of Things, computers will simply disappear into our environment.
Andy Hardy, EMEA MD at Code42, says: "The iconic image of a 'computer' in the
traditional sense – the idea of a tower that sits underneath a desk connected to a monitor
– is outdated. Today, our computers are as mobile as we are. This concept of an electronic
device carried with you wherever you go will not go away anytime soon."
Jon Wrennall, CTO in the UK and Ireland at Fujitsu, further commented: "The way we
view computers is already blurred. Most things from washing machines to fridges, to cars
and watches have computers in them.”
"This will continue to the point that we and certainly our children will be perplexed with
the concept of sitting at a keyboard with a screen to use the internet, buy things or control
our environment."
The idea that tomorrow's computer will have a level of intelligence that enables them to
interpret our needs and not simply follow instructions has been developing for some
years. Gartner calls this 'Cognizant' in its paper 'Hype Cycle for Human-Computer
Interaction' which has four stages:
1. Sync Me: Apps, content and information are made available across devices and shared
contextually.
2. See Me: Data is continuously collected about users and their devices to gain an
understanding of users' context.
3. Know Me: Understanding users' wants and needs, and proactively offering products
and services based on pattern recognition and other machine learning approaches.
4. Be Me: Developing intelligent apps and services that act on users' behalf.
Gartner explains: "At the moment, most activity is around the first two stages. As big data
and the Internet of Things (IoT) become more pervasive, the vast amounts of information
28
produced will enable complex systems to become more 'intelligent,' offering brand new
opportunities in the latter two stages.
"This won't be without challenges or risk, however. Critical issues that will have to be
addressed include consumer privacy, quality of execution and becoming a trusted
vendor."
3. Responder en español: ¿Cuáles son las 4 etapas que describe Gartner con
respecto a la interacción entre el hombre y la computadora? Explicar
brevemente casa una de ellas.
29
Google says it won’t use new ways of tracking
you as it phases out browser cookies for ads
PUBLI SHED WED, M AR 3 - Megan Graham@ M E G A N C G R A H A M
Cookies are small pieces of code that websites deliver to a visitor’s browser
and stick around as the person visits other sites. They can be used to track users
across multiple sites to target ads and see how they perform. Google said last
year it should end support for those cookies in Chrome by early 2022 once it
figured out how to address the needs of users, publishers and advertisers and
come up with tools to mitigate workarounds.
Temkin said in the post that other providers “may offer a level of user identity
for ad tracking across the web that we will not — like PII graphs based on
people’s email addresses. We don’t believe these solutions will meet rising
consumer expectations for privacy, nor will they stand up to rapidly evolving
30
regulatory restrictions, and therefore aren’t a sustainable long term investment,”
the blog post says. “Instead, our web products will be powered by privacy-
preserving APIs which prevent individual tracking while still delivering results
for advertisers and publishers.”
ACTIVIDAD
31
Tiempos verbales continuos
Leer las siguientes oraciones y encontrar verbos en presente, pasado o futuro
continuo. Traducir las oraciones.
1. Microsoft is also enhancing the digital inking capabilities in Office. And for
gamers, Microsoft is introducing a new technology called Beam into both
Windows 10 and Xbox One. Beam will allow viewers to interact in real-time with
a player who is streaming a game.
2. If you are looking for the best apps, there are good Android apps available.
3. Owners of iPhones and iPads will find that some older apps will not be working
any more.
4. Microsoft explained exactly how existing games will be running better on an
Xbox One X without a 4K TV.
5. Microsoft is promising that some older games should still run better.
6. Samsung confirmed yesterday that it was working on a smart speaker.
7. Hackers were attacking technology companies with Avast’s CCleaner. What
companies were they targeting? They were infecting machines at Micosoft, Intel
and other top technology companies.
32
Web inventor Sir Tim Berners-Lee
warns of widening digital divide
Rory Cellan-Jones - Technology correspondent
The creator of the web says coronavirus has highlighted the importance of internet
connectivity as a basic right.
Sir Tim Berners-Lee says too many young people do not have internet access
and the digital divide has is widening due to the pandemic.
He called on governments to invest to provide universal broadband by 2030.
"We can't afford not to do it," he wrote in his annual letter to mark the anniversary
of the world wide web.
'A lifeline'
Sir Tim first conceived of the web while he was working at the Cern particle
research lab in 1989.
He says over the last 12 months, it "has proven to be a lifeline that allows us to
adapt and carry on". But, he says, one-third of young people do not have any
internet access and many more lack the quality of connection needed to work or
learn from home.
In an interview with the BBC, he said that as the web became more powerful, the
digital divide had grown wider.
[…] The computer scientist is calling for an acceleration of the push to bring fibre
broadband and better mobile connections to rural areas.
"It should be a much higher priority of both businesses and government," he
says of his home country.
On Tuesday, the Secretary of State for Digital, Oliver Dowden, said the
government was working "tirelessly" with broadband companies to extend
access to hyperfast broadband. "Two years ago, we were about 7% [of premises
with] gigabit-capable broadband. We're now up to about 30%, and I'm confident
by the end of the year that we'll get to 50%.
33
"I will be prioritising the hardest-to-reach places, and we will be setting out a
broadband action plan in about a month or so." […]
ACTIVIDAD
1. Clasificar los verbos en negrita según el tiempo (presente, pasado, futuro),
el aspecto (simple, continuo) o indicar si son verbos modales. Traducirlos
según el contexto.
2. Leer el texto y responder en español:
a. ¿Qué dijo Berners-Lee con respecto al acceso a Internet y qué les pide
a los gobiernos?
b. ¿Cómo se abordará el problema según Oliver Dowden?
34
Social media and censorship in China: how
is it different to the West?
China has disrupted WhatsApp in a censorship drive ahead of the
government's Communist Party meeting next month.
It has only been accessible through virtual private networks (VPNs) at times -
but even some of them are being blocked. Other social media platforms, which
people in the West use every day, are also banned in mainland China. Instead
they're replaced by other ones which the government can monitor.
So what social media platforms are Chinese people able to use?
ACTIVIDADES
1. Clasificar los verbos según el tiempo (presente, pasado, futuro), según el aspecto (simple,
continuo) o indicar si son verbos modales. Traducirlos según el contexto.
2. Mencionar al menos 2 características de cada una de las aplicaciones que se usan en China
en lugar de Whatsapp, Twitter y Google.
35
Concerns over biased algorithms grow as
computers make more decisions
A new report suggests ways to improve the technology and its accountability.
Shara Tibken - Feb. 23, 2021 1:00 p.m. PT
In its report, Greenlining presents three ways for governments and companies to ensure
the technology does a better job. Greenlining recommends that organizations practice
algorithm transparency and accountability; work to develop race-aware algorithms; and
specifically seek to include disadvantaged populations in the algorithm assumptions.
ACTIVIDAD
1. Clasificar los verbos subrayados según el tiempo (presente, pasado, futuro),
según el aspecto (simple, continuo, ) o si son verbos modales.
Traducirlos según el contexto.
2. Leer el texto y responder en español:
a. ¿Para qué inventó Stanford Medicine el algoritmo mencionado y qué problemas
generó?
b. ¿Para qué se usan los algoritmos y por qué se dice que son injustos?
c. ¿Qué recomendaciones brinda el Instituto Greenlining para mejorar los
algoritmos?
36
Tiempos perfectos
1. A security company has issued a warning after its software was compromised by
malicious hackers.
2. Piriform told users that a version of its CCleaner software had been available in August
and September.
3. Piriform's owner, Avast, said it had managed to remove the compromised version before
it had done any harm.
4. There are thousands of Xbox fans who still haven’t upgraded to a 4K TV.
5. By September 12th, Apple will have launched the much-awaited smartphone of the year.
The company has already sent invitations to the event.
6. Facebook has declined Pakistan government's request to link all accounts with the users'
mobile phone numbers.
7. Indian brand Lava has expanded its product portfolio with the launch of its first laptop,
Helium 14. The company has launched the same in association with Intel and Microsoft.
37
How game worlds are preparing
humanitarian workers for high-stakes
scenarios
by David Chandross, The Conversation
This began with the design of massive online role playing games and it
continues with other platforms for living in an altered digital reality with
purposeful activity, such as the platform Second Life.
During pandemic shutdowns, online role playing gamers have still had access
to extensive social connections with many people in virtual worlds. Players
communicated free of charge, with hundreds of other people on the real-time
voice server Discord. The combination of an immersive 3D video game and real-
time voice communications created a reassuring space when the external world
was cut off. But game worlds are not just for recreational community. This form
of immersion has now reached the medical and humanitarian fields as well.
A game world is an alternate world that can transport users to virtual worlds. This
means that in corporate, academic or life coaching settings, people can also
learn and practise extending their skills in virtual space. […]
38
Game worlds can be more fantastical and oriented to increase people’s
enjoyment of learning, particularly when the subject matter is complex. The UN
office for Disaster Risk Reduction and the UN World Food Program
have produced video games for learning about the respective issues they
respond to. Currently with the World Food Program, our team is building a fully
immersive exploration game. We are working on building a game world for UN
staff that will help them learn how to protect the most vulnerable populations and
how to be accountable in their field work. […]
Scholars across the field of digital media are now creating a kind of fusion of the
the human nervous system with technology. What this means is that the boundary
between one and the other will become imaginary, for example, in the instance
of doctors using remote technologies to conduct medical procedures.
But the larger meaning is that as virtual reality continues to mature, we will
gradually live more of our lives in digital space. We've seen many examples of
this through the pandemic, including new uses of Zoom and social media to
replace the workplace and face-to-face contact.
Actividad
1. Encontrar y traducir frases sustantivas con los siguientes modificadores:
Adjetivo en grado comparativo: ____________________________
Adjetivo en grado superlativo: _____________________________
Caso posesivo: __________________________________________
Sustantivo adjetivado: ____________________________________
Adjetivo con ED: ________________________________________
Adjetivo con ING: _______________________________________
3. Leer el artículo sobre los nuevos usos de los videojuegos y la realidad virtual
y completar las oraciones en español con la información ausente:
a. Durante el aislamiento por la pandemia, los jugadores online
________________________________________________. Los jugadores
se comunicaban_________________________________.
b. En contextos corporativos, académicos y de capacitación las personas pueden
___________________________________________________________.
c. La Organización Mundial de la Salud está construyendo dichas simulaciones.
Al usar una cámara de 360 grados
_____________________________________________________________
__________________________________________________________. La
39
Academia de Aprendizaje de la OMS está construyendo
_____________________________________________________________
_____________________________________________________________.
d. Los académicos dentro del área de los medios digitales están
creando_______________________________________________________
_____________________________________________________________.
40
Modo imperativo
Remove Omniboxes.com virus (Easy Removal Guide)
Omniboxes is a browser hijacker that once installed it will change your browser homepage and
default search engine to Omniboxes.com.
Omniboxes homepage enters your computer after you have installed a freeware software (video
recording/streaming, download-managers or PDF creators) that has bundled into their installation
this browser hijacker.
You should always pay attention when installing software because often, a software installer
includes optional installs, such as this Omniboxes.com browser hijacker.
Always opt for the custom installation and deselect anything that is not familiar, especially optional
software that you never wanted to download and install in the first place.
1. You can download AdwCleaner utility from the below link. ADWCLEANER DOWNLOAD LINK
2. Before starting AdwCleaner, close all open programs and internet browsers, then double-click on the
AdwCleaner icon.
3. When the AdwCleaner program opens, click on the “Scan”. AdwCleaner will now start to search for
the “Omniboxes.com” malicious files that may be installed on your computer.
4. To remove the “Omniboxes.com” malicious files that were detected in the previous step, please click
on the “Clean” button.
5. AdwCleaner will now prompt you to save any open files or documents, as the program will need to
reboot the computer. Please do so and then click on the OK button.
41
1. Search for your browser shortcut (Desktop, Taskbar or Start Menu Shortcut), then right click on it and
select Properties.
2. In the Shortcut tab, in the Target field, remove the http://Omniboxes.com/ argument.
1. You can download download Malwarebytes Anti-Malware from the below link.
MALWAREBYTES ANTI-MALWARE DOWNLOAD LINK
2. Once downloaded, close all programs, then double-click on the icon on your desktop named “mbam-
setup-consumer-2.00.xx” to start the installation of Malwarebytes Anti-Malware.
3. When the installation begins, you will see the Malwarebytes Anti-Malware Setup Wizard which will
guide you through the installation process.
4. Once installed, Malwarebytes Anti-Malware will automatically start and you will see a message
stating that you should update the program, and that a scan has never been run on your system. To
start a system scan you can click on the “Fix Now” button.
5. Malwarebytes Anti-Malware will now start scanning your computer for the Omniboxes.com virus.
6. When the scan has completed, you will see a screen showing you the malware infections that
Malwarebytes’ Anti-Malware has detected. To remove the malicious programs that Malwarebytes
Anti-malware has found, click on the “Quarantine All” button, and then click on the “Apply Now”
button.
7. Malwarebytes Anti-Malware will now quarantine all the malicious files and registry keys that it has
found. When removing the files, Malwarebytes Anti-Malware may require a reboot in order to
remove some of them.
42
Installing Oracle Database 12c on Windows
Purpose
This tutorial shows you how to install the Oracle Database 12c software on Microsoft Windows
along with a default instance of an Oracle Database that contains example schemas.
Introduction
The Oracle Universal Installer (OUI) is used to install the Oracle Database software. During
the installation process, OUI will start the Oracle Database Configuration Assistant (DBCA)
which can install a precreated default database that contains example schemas or can
guide you through the process of creating and configuring a customized database.
If you do not create a database during installation, you can invoke DBCA after you have
installed the software.
In this section, you will be downloading the files required to install Oracle database on a
Windows environment.
In this OBE, we install Oracle Database 12c. Accept the license agreement and click the files
under Oracle Database 12c Release ... for Microsoft Windows (x64) to download.
Log into your Oracle web account. If you do not have an Oracle account, click the "Sign Up"
link to create one. Then choose the location where you want to download the .zip files.
After downloading the files, use the default built-in extraction tool provided by Windows, or
tools such as 7-zip to extract the .zip files. In this OBE, we use the built-in extractor to extract
the software files.
Choose the folder of your choice and click Extract. In this OBE, we extract the file to
the F:\windows_db_12c\winx64_12c_database_1of2 folder.
The file winx64_12c_database_2of2.zip must be extracted into the same folder where
the first file was extracted. Right click winx64_12c_database_2of2.zip, select the Extract
All... option and specify the same location where the first file was extracted. In this OBE, we
extract the files to the F:\windows_db_12c\winx64_12c_database_1of2 folder.
Click Extract.
43
Install Ubuntu desktop
1. Overview
The Ubuntu desktop is easy to use, easy to install and includes everything you need for your
organisation, school, home or enterprise. It's also open source, secure, accessible and free to
download.
2. Requirements
You'll need to consider the following before starting the installation:
Connect your laptop to a power source.
Ensure you have at least 5GB of free storage space.
Have access to a DVD or a USB flash drive containing the version of Ubuntu you want to install.
Make sure you have the most recent backup of your data.
A few moments later, after the desktop has loaded, you'll see the welcome window. From here, you
can select your language from a list on the left and choose between either installing Ubuntu directly,
or trying the desktop first.
5. Prepare to install Ubuntu
After choosing to install Ubuntu from the welcome window, you will be asked about updates and third-
party software.
We advise enabling both Download updates and Install third-party software.
Stay connected to the internet so you can get the latest updates while you install Ubuntu.
If you are not connected to the internet, you will be asked to select a wireless network, if
available.
7. Begin installation
After configuring storage, click on the ‘Install Now' button. A small pane will appear with an overview
of the storage options you've chosen, with the chance to go back if the details are incorrect.
Click Continue to fix those changes in place and start the installation process.
44