You are on page 1of 6

ISET Sidi Bouzid Unit four J.

ZAAFOURI

Type and Click


1) Interacting with your computer
Input devices are the pieces of hardware which allow you to enter information into the
computer. The most common are the keyboard and the mouse. We can also interact with a
computer by using one of these: a light pen, a scanner, a trackball, a graphics tablet, a
joystick or a voice recognition device.

Read these descriptions of three input devices. And guess what are they?
♦This device is used to enter information into the computer. As well as having normal
typewriter keys for characters and a numeric keypad, it may also have function keys and
editing keys for special purposes.
1►………………………………………………
♦This is a device for controlling the cursor and selecting items on the screen. The ball
underneath is rolled in any directions across the surface of a table to move the cursor on the
screen. By clicking a button, the user can activate icons or select items and text.
2►………………………………………………
♦In shape, this input device is similar to an ordinary pen. It works by detecting light from the
computer screen and is used by pointing directly at the screen display. It allows the user to
answer multiple choice questions and to draw diagrams or graphics.
3►………………………………………………

2) About the keyboard

a- The keys (buttons) in a keyboard have different functions (applications) and they can be
classified into five categories.
♦Alphanumeric keys: arranged in the same order as a typewriter. ( numbers from 0 to 9 and
the letters ( a, b, c ,d…))
♦Function keys: used by various programs to instruct the Pc to perform specific tasks, such
as Save, Copy Cut, Paste Help, etc (f1, f2, f3, f4)
♦Numeric keypad: set of numeric or editing keys. The Num LOCK key is used to switch
from numbers to editing functions. (1.2.3….9)
♦Editing keys: cursor and other keys usually used within word processors to page up and
down in a long document or to edit text. ( → ↓ ← ↑)
♦Special keys: used to issue commands or to produce alternative characters in key
combinations. ( keys used in combination: eg ctrl and c / ctrl and v..)
ISET Sidi Bouzid Unit four J. ZAAFOURI

b- Match these descriptions of keyboard components with the names from the box.

arrow keys / return / caps lock / alt / escape / space bar / delete / shift

1) - A long key at the bottom of the keyboard. Each time it is pressed, it produces a blank space.
(...................................)

2) - It moves the cursor to the beginning of a new line. It is also used to confirm commends.
(...................................)

3) - It stops a program without losing the information from the main memory. Sometimes its use
depends on the application. (......................................)

4) - It works in combination with other keys to produce special characters or specific actions.
(..............................)

5) -It removes the character on the left of the cursor or any selected text. (.................................)

6) - It produces UPPER-CASE characters. (......................................)

7) - It moves the cursor horizontally. (.......................................)

8) - They are used to move the cursor as an alternative to the mouse. (.........................)

c. Here are some basic mouse actions. Match the terms in the box with the explanations
below.

Click / double-click / drag

1. Position the pointer on something, then rapidly press and release the button twice (you
do this to load a program, open a document or select text) (.................................)
2. Position the pointer on something, hold down the mouse button and move the mouse to
the desired position, then release the button. (You do this to move an image to a new
location on the screen. (....................................)
3. Position the pointer on something, then press and release the mouse button once. (You do
this to choose an option or to close a window...) (.................................)
ISET Sidi Bouzid Unit four J. ZAAFOURI

The text

Point and Click

1) Typically a mouse is a palm-sized device, slightly smaller than a pack of


cards. On top of the mouse there are one or more buttons for communicating
with the computer. A “tail” or wire extends from the mouse to a connection on
the back of the computer.
2) The mouse is designed to slide around on your desktop. As it moves, it moves
an image on the screen called a pointer or mouse cursor. The pointer usually
looks like an arrow or I bar and it mimics the movement of the mouse on your
desktop.
3) What makes the mouse especially useful is that it is a very quick way to move
around on a screen. Making the same movements with the arrow keys takes
much longer. The mouse also issues instructions to the computer very quickly.
Point to an available option with the cursor, click on the mouse, and the option
has been chosen.
4) Mice are so widely used in graphics applications because they can do things
that are difficult, if not impossible, to do with keyboard keys. For example, the
way you move an image with a mouse is to put the pointer on the object you
want to move, press the mouse button and drag the image from one place on
the screen to another. When you have the image where you want it, you
release the mouse button and the image stays there. Similarly, the mouse is
used to grab one corner of the image (say a square) and stretch it into another
shape (say a rectangle). Both of these actions are so much more difficult to
perform with a keyboard that most graphics programs require a mouse.
ISET Sidi Bouzid Unit four J. ZAAFOURI

Reading Comprehension

TASK 1: Answer the following questions with details from the text.

a- How is the mouse linked to a computer?


►……………………………………………………………………………………………
………………………………………………

b- What does the mouse pointer look like on the screen?


►……………………………………………………………………………………………
………………………………………………
c- The mouse is better in doing certain functions than the keyboard. Explain by giving two
examples.
►……………………………………………………………………………………………
………………………………………………………………………………………………

►……………………………………………………………………………………………
………………………………………………………………………………………………

TASK 2: What do the underlined words in the text refer to?

a- It (P2) refers to: ……………………………………………


b- It (P2) refers to: ……………………………………………
c- They (P4) refers to: ……………………………………………
d- Another (P4) refers to: ……………………………………………

TASK 3: Find in text:

a- Synonyms to:
-resembles (p2) =: ……………………
-uses/ functions (p4) =: ……………………
-form (p4): =……………………
b- Antonyms to:
--separation (p1) ≠: ……………………
- Useless (p3) ≠: ……………………
-slowly (p3) ≠: ……………………
ISET Sidi Bouzid Unit four J. ZAAFOURI

LANGUAGE

TASK 1: Complete with Words from the box. There are two extra words.

until / exchange / change / with / Send / receive /for /connection

E-mail is your personal ……………………………………..to the internet. It allows you to


……………………………………..message with people all over the world. It can include text,
pictures, and even audio and animation. When you set up an account
……………………………………..an ISP , you are given a unique address and anyone can
……………………………….you email. The email you ……………………………………..is
stored on the server of your ISP ……………………………………..you next connect and
download it to your hard disk.

TASK 2: Circle the right alternative

Languages are the medium by which man (communicated / communicate / communicates)

problems to the computer and the easier this communication can be made the (wider / width /

wide) will be the application of computers; the problem of (idealist / ideal / ideally)

communication has still to be solved, although (much/ many/ few) progress has been made.

Throughout the 1960S and 1970s great interest was created in structured programming. Some

large programs consists(on in at)terms of thousands of source statements, and structured

programming could (able/ enables/ enable) such large programs to be subdivided and treated as

many small programs each of which can be written , tested and debugged (separately

/separating /separated) before eventual (integrating /integrated/ integration).


ISET Sidi Bouzid Unit four J. ZAAFOURI

Task 3: All the underlined words contain mistakes correct them in the blanks provided.

The first real calculating machine appeared at ………………..1820 as the result of several
people's experiments. This type of machine, which saves a great deal of time and reducing
………………..the possibility of make ………………..mistakes, depends on a series of ten-
toothed gear wheels.

Ten years later Charles Babbage a ……………….. Englishman designed a machine that was
called “the Analytical Engine”. This machine was an attempt to cut out the human being
altogether, except for providing the machine with the necessity………………..facts about the
problem to be solved.

Task3: Put in the right tense and/or form.

Viruses are human made software programs created specifically to cause damage on personal

computers and networks. The chance of (download)………………one of these computer viruses

over the Internet (increase) ………………dramatically. Typically, you contract a virus by

opening an e-mail (attach) ………………

Some viruses are relatively harmless to individuals. They just attach themselves to outgoing

messages or e-mail themselves to all the people (list) ………………in your address book. Other

viruses are more (destruct) ………………and may stay dormant until a certain date. Then they

spring to life to do their dirty deeds. Sometimes a strange message (to appear) ………………on

your screen, or data and programs may be modified. In the (bad) ………………case, all the

contents of your hard drive may be deleted. These pernicious programs start on one computer,

then replicate (quick) ………………, infecting other computers around the world.

You might also like