计算机专业英语_chapter_10

合集下载

计算机专业英语及翻译Unit 10

计算机专业英语及翻译Unit 10

Unit 10 Program DesignText 1 Computer LanguagesComputer languages have undergone dramatic evolution since the first electronic computers were built. Early on, programmers worked with the most primitive computer instructions—machine language. These instructions were represented by long strings of ones and zeroes. Soon, assembly language was invented. It maps machine instructions to human-readable mnemonics, such as ADD and MOV.In time, higher-level languages evolved, such as PASCAL, BASIC, COBOL, C, C++, and JA V A. These languages let people work with something approximating words and sentences, such as Let I = 100. These instructions were translated back into machine language by interpreters and compilers. An interpreter translates a program as it reads it, turning the program instructions, or code, directly into actions. A compiler translates the code into an intermediary form. This step is called compiling, and produces an object file. The compiler then invokes a linker, which turns the object file into an executable program.Because interpreters read the code as it is written and execute the code on the spot, interpreters are easy for the programmer to work with. Compilers, however, introduce the extra steps of compiling and linking the code, which is inconvenient. Because the time-consuming task of translating the source code into machine language has already been accomplished, compilers produce a program that is very fast each time it is run.The problems programmers are asked to solve have been changing. Today's programs use sophisticated "user-friendly interfaces," involving multiple windows, menus, and dialog boxes. The programs written to support this new approach are far more complex than those written just ten years ago. Generally, as programming requirements have changed, both languages and the techniques used for writing programs have evolved.参考译文计算机语言自从第一批电子计算机诞生以来,计算机语言已经发生了戏剧性的变化。

专业英语-整理版

专业英语-整理版

Chapter 1 Introduction: Why Project Management?True/False1) Projects have a process orientation. F2) Client interest in a project is highest during the termination and conceptual phases. T Multiple Choice1). A project typically has:A) A defined start and end date.B) A defined start date but no defined end date.C) No defined start but a defined end date.D) No defined start or end date.2) Which of the following statements about project success criteria is best?A) Project cost is an external performance measure.B) Completion time is an internal performance measure.C) Client acceptance is an internal performance measure.D) Client acceptance is often referred to as conducting a quality check.Short Answer1) What changes in the business environment have necessitated a greater use of projectmanagement skills?Chapter 2 The Organizational Context: Strategy, Structure, andCultureTrue/False1) The same project managed in the same fashion may succeed in one organization but failin another. T2) Organizational culture can be influenced in a variety of ways, including by rewardsystems and key organizational members. TMultiple Choice1) Which of the following is not an element of strategic management?A) formulating cross-functional decisionsB) implementing cross-functional decisionsC) evaluating cross-functional decisionsD) eliminating cross-functional decisions2) Companies that are structured by grouping people performing similar activities intodepartments are:A) project organizations.B) functional organizations.C) matrix organizationsD) departmental organizations.Chapter 3 Project SelectionTrue/False1) A simplified scoring model addresses all the weakness of a checklist model for projectscreening. T2) The present value of money is lower the further out in the future I expect to spend it. F Multiple Choice1) An internal operating issue in project screening and selection is:A) expected return on investment.B) change in physical environment.C) patent protection.D) chance that the firm’s goodwill will suffer due to the quality of the finished project.2) A project with the chance for a big payout may be funded if an important criterion is:A) cost.B) opportunity.C) top management pressure.D) risk.Short Answer1) What is the time value of money principle and how does it apply to project selection?P91, the front halfChapter 4 Leadership and the Project ManagerTrue/False1) The most important characteristic of a project leader is ability to inspire. F2) The new leader must make a conscious effort to distance himself from the people beingled. FMultiple Choice1) A project champion is:A) a project manager that always completes projects within the allotted time frame.B) a sponsor in top management that is keenly interested i n the project’s success.C) a project manager that always completes projects within the allotted budget.D) a project manager that always completes projects within the allotted time frame andunder budget.2) Which of the following is a traditional duty of a project champion?A) cheerleaderB) visionaryC) politicianD) technical understandingChapter 5 Scope ManagementTrue/False1) Scope management is the function controlling a project in terms of its goals andobjectives during the execution phase. F2) Scope reporting not only identifies the type of information that will be reported, but alsoto whom it will be reported and with what frequency. TMultiple Choice1) Which of these is not a typical element of a statement of work?A) introduction and backgroundB) a list of activities needed to complete the projectC) technical description of the projectD) timeline and milestones2) In the case of projects developed for external clients, work authorization typicallyaddresses:A) budget linkage.B) audit trail establishment.C) resource requirements.D) contractual obligations.Chapter 6 Project Team Building, Conflict, and Negotiation True/False1) The first step in assembling a project team is to talk to potential team members. F2) Cross-functional cooperation directly influences both the actual implementation of theproject and the team members’ assessment that the project experience was worthwhile. T Multiple Choice1) Project management people skills include:A) team building.B) scheduling.C) budgeting.D) project evaluation.2) Which of these factors does not influence cross-functional cooperation?A) accessibilityB) physical proximityC) rules and proceduresD) self-efficacy.Short Answer1)What are the steps in assembling a project team? Which is most critical? Why? P183Chapter 7 Risk ManagementTrue/False1) The risk is highest in the earliest phase of the project life cycle. T2) Contingency reserves require a construction company to hold back some funds in anaccount just in case something happens that increases the overall project cost. T Multiple Choice1) Risk management is a:A) three stage process.B) four stage process.C) five stage process.D) six stage process2) The probability that legal and managerial structures put together to develop and operatethe project will not perform well is:A) operating risk.B) political risk.C) organizational risk.D) integration risk.Chapter 8 Cost Estimation and BudgetingTrue/False1) Direct costs are those clearly assigned to the aspect of the project that generated the cost.T2) Material is an example of a cost that is recurring, variable and direct. TMultiple Choice1) Which of the following is a direct cost?A) laborB) rentC) depreciation on equipmentD) health benefits2) Workers paid $15.00 per hour with an overhead charge of 1.45 and a personal timeallowance of 1.15, have what total direct labor cost for an 8-hour work day?A) $151.30B) $174.00C) $200.10D) $236.80Chapter 9 Project Scheduling: Networks, Duration Estimation, and Critical Path True/False1) Preceding activities are those that must occur before others can be done. T2) A backward pass is performed when it is necessary to undo some work that has beenperformed in order to complete it properly. FMultiple Choice1) The least amount of float is found:A) in a resource-limited schedule.B) after a burst activity.C) on the critical path.D) after a merge activity.2) An activity has an optimistic time estimate of 15 days, a most likely estimate of 24 days,and a pessimistic estimate of 40 days. What is the expected duration of the activity?A) less than 27 days but greater than or equal to 26 daysB) less than 26 days but greater than or equal to 25 daysC) less than 25 days but greater than or equal to 24 daysD) less than 24 daysChapter 10 Project Scheduling: Lagging, Crashing, and Activity Networks True/False1) Finish to start lags are the same as additional activity slack. F2) The critical path may not contain a dummy activity. TMultiple Choice1) The most common type of logical sequencing between tasks is referred to as the:A) finish to start relationshipB) finish to finish relationship.C) start to start relationship.D) start to finish relationship.2) An activity performed by a subcontractor is scheduled for 20 weeks at an anticipated costof $100,000. Due to slippage on the critical path you need to reduce this activity by three weeks. If the subcontractor informs you that the activity can be completed in 15 weeks for $200,000, what is the slope for the activity?A) $20,000 per weekB) $33,333 per weekC) $5,000 per weekD) $13,333 per weekShort Answer1) What are the strengths and weaknesses of AOA and AON techniques?Chapter 11 Critical Chain Project SchedulingTrue/False1) If people believe that they built extra time into their initial estimates, they are usuallymore likely to begin project work right away. T2) The critical chain is usually the same as the critical path. FMultiple Choice1) The first step in TOC methodology is to:A) identify the constraint.B) exploit the constraint.C) subordinate the system to the constraint.D) elevate the constraint.2) In order to estimate completion of a Gaussian, or lognormal, distributed activity time witha 90% or higher degree of confidence, the time may be overestimated by as much as:A) 20%.B) 80%.C) 160%.D) 200%.Chapter 12 Resource ManagementTrue/False1) All that is needed to create a resource loading calendar is the Work Breakdown Structureand the activity network. T2) In-process inventory represents the amount of work waiting to be completed but delayeddue to unavailable resources. TMultiple Choice1) A project that must be finished by December 31st is:A) time constrained. P381B) resource constrained.C) mix-constrained.D) capacity constrained.2) The amounts of individual resources that a schedule requires during a specific timeperiods is referred to as the resource’s:A) loading.B) capacity.C) constraint.D) drag.Chapter 13 Project Evaluation and ControlTrue/False1) Gap analysis refers to any measurement process that first determines the goals and thenthe degree to which the actual performance lives up to those goals. F2) The project implementation profile assesses the performance of the project team withrespect to 10 critical success factors and can be used on an ongoing project. TMultiple Choice1) The first step in the control cycle is:A) setting a goal.B) measuring progress.C) comparing actual with planned performance.D) taking action.2) The project baseline is established by combining data from the:A) work breakdown structure and the project budget.B) time-phased project budget and the PERT chart.C) S-curve and the project budget.D) time-phased project budget and the work breakdown structure.Chapter 14 Project Close-Out and Termination True or false1) A project that is terminated by extinction is not completed successfully. T2) Closeout activities are typically among the highest priority activities in a project. F Multiple Choice1) The termination of Boeing’s Sonic Cruiser project is an example of:A) termination by extinction.B) termination by addition.C) termination by integration.D) termination by starvation.。

计算机专业英语 -第10章

计算机专业英语 -第10章

Computer Fraud and Abuse Act (289)makes it a crime for unauthorized persons even to view. Copy, or damage data using any computer across state lines. computer monitoring software (283)The most invasive and dangerous type of spyware. They record every activity and keystroke made on a computer system. (see also keystroke logger) cookies (280)Specialized programs that are deposited on a hard disk from Web sites
Introduction
The ubiquitous use of computers and technology prompts some very important questions about use of personal data and privacy. This chapter will cover issues related to the impact of technology on people and how to protect ourselves on the Web.
Page 283
access (278)Relates to the responsibility of those who have data to control who is able to use that data. accuracy (278)Relates to the responsibility of those who collect data to ensure that the data is correct. ad network cookie (282)Software programs that monitor your activities across web sites visited. (see also adware cookie)

计算机专业英语

计算机专业英语

Chapter1 CompetenciesAfter you have read this chapter, you should be able to:1. Explain the five parts of an information system: people, procedures, software,hardware, and data.2. Distinguish between system software and application software.3. Discuss the three kinds of system software programs.4. Distinguish between basic and specialized application software.5. Identify the four types of computers and the four types of microcomputers.6. Describe the different types of computer hardware including the system unit,input, output, storage, and communication devices.7. Define data and describe document, worksheet, database, and presentation files.8. Explain computer connectivity, the wireless revolution, and the Internet.第一章能力当你阅读本章,你应该能够:1。

解释了信息系统的五个部分:人,程序,软件,硬件和数据。

2。

区分系统软件和应用软件。

3。

讨论了系统软件程序的三种。

4。

区分基本和专门的应用软件。

《计算机专业英语》课件第10章

《计算机专业英语》课件第10章

UNIT 10
TEXT Embedded System
An embedded system is a computer system designed for specific control functions within a larger system, often with real-time computing constraints. It is embedded as part of a complete device often including hardware and mechanical parts. By contrast, a general-purpose computer, such as a personal computer (PC), is designed to be flexible and to meet a wide range of end-user needs. Embedded systems control many devices in common use today.
UNIT 10
3. The program instructions written for embedded systems are referred to as firmware, and are stored in readonly memory or Flash memory chips. They run with limited computer hardware resources: little memory, small or nonexistent keyboard or screen.
UNIT 10
The integration of microcontrollers has further increased the applications for which embedded systems are used into areas where traditionally a computer would not have been considered. A general purpose and comparatively low-cost microcontroller may often be programmed to fulfill the same role as a large number of separate components. Although in this context an embedded system is usually more complex than a traditional solution, most of the complexity is contained within the microcontroller itself.

计算机专业英语 复习

计算机专业英语 复习

Chapter 11.Raw, unprocessed facts, including text, numbers, images, and sounds.2.Perform specific tasks related to managing computer resources.h. utilitiesType of application programs that are more narrowly focused on specific disciplines and occupations.f. specializedAlso known as servers. b. midrange computersThe most widely used handheld computers are smartphones and ___.d. PDAsType of memory that is sometimes referred to as temporary storage because its contents will typically be lost if the electrical power to the computer is disrupted. e. RAMThe most important kinds of secondary media are hard disks, solid-state storage, and ___. c. optical disksThe type of solid-state drive widely used for transporting data and information between computers and a variety of specialty devices.g. USBType of file created by electronic spreadsheets to analyze things like budgets and to predict sales.i. worksheetProvides a multimedia interface to the numerous resources available on the Internet.j. WebBook1. Consists of the step-by-step instructions that tell the computer how to do its work.f. program2. Another name for a program.g. software3. Enables the application software to interact with the computer hardware.i. system software4. Type of computer that is small enough to fit on top of or alongside a desk yet is too big to carry around.a. desktop5. A container that houses most of the electronic components that make up a computer system.j. system unit6. Devices that translate the processed information from the computer into a form that humans can understand.d. output7. Unlike hard disks, this type of storage does not have any moving parts, is more reliable, and requires less power.h. solid-state8. The most widely used communication device.b. modem9. A type of a file that might contain, for example, audience handouts, speaker notes, and electronic slides.e. presentation10. A communications system connecting two or more computers.c. networkMultiple Choice1. The rules or guidelines for people to follow when using software are called:Procedures programsRules utilities2. The part of almost all of today’s computer systems that uses the Internet and allows users to greatly expand the capability and usefulness of their information systems.Connectivity hardwareUSB Web3. Specialized programs that are designed to allow particular input or output devices to communicate with the rest of the computer system are known as:basic programs device drivershi defs tablets4. The least powerful, yet the most widely used and fastest-growing type of computer is the: Mainframe microcomputerMidrange supercomputer5. The newest type of computer that is smaller and lighter than a notebook and typically does not have a keyboard but uses a touch sensitive screen for input.Netbook notebookTablet server6. Devices of this type translate data and programs that humans can understand into a form that the computer can process.Input outputsolid state tablet7. The type of secondary storage device that uses rigid metallic platters to store programs and very large data files.hard disk optical disksolid state Web8. Three types of optical discs are CDs, DVDs, and:Flash hi defMagnetic RAM9. The revolution that will dramatically affect the way we communicate and use computer technology.Wireless tablet PCUSB Web10. Type of computing that uses the Internet and the Web to shift many computer activities froma user’s computer to computers on the Internet.Cloud browserInternet WebBook1. The keyboard, mouse, monitor, and system unit are:Hardware output devicesstorage devices software2. Programs that coordinate computer resources, provide an interface, and run applications are known as:application programsoperating systemsstorage systemsutility programs3. A browser is an example of a:general purpose applicationspecialized programsystem applicationutility program4. Although not as powerful as a supercomputer, this type of computer is capable of great processing speeds and data storage.Mainframe midrangeNotebook tablet5. The smallest type of microcomputer:handheldnotebookmidrangetablet6. RAM is a type of:Computer memoryNetwork secondary storage7. Unlike memory, this type of storage holds data and programs even after electrical power to the computer system has been turned off.primaryRAMROMsecondary8. The type of file created by word processors to save, for example, memos, term papers, and letters.databasedocumentpresentationworksheet9. Uses the Internet and the Web to shif t many computer activities from a user’s computer to computers on the Internet.cloud computinghigh definitionnetworkUSB10. The largest network in the world is [the]:FacbeookInternetWebUSBChapter 2Matching1. This project launched the Internet.a. ARPANET2. Programs that provide access to Web resources.b. browsers3. The browser interprets the HTML instructions and displays___.i. Web pages4. Web based e-mail accounts do not require an e-mail program to be installed on your ___.e. computer5. The billions of unwanted and unsolicited e-mail.h. spam6. Photos, lists of personal interests, contact information, and other personal information displayed on Facebook.g. profiles7. Web site designed to allow visitors to fill in missing information or correct inaccuracies.j. wiki8. Evaluate the accuracy of information on the Web by considering authority, accuracy, objectivity and _____.f. currency9. Clients, the Internet, and service providers are basic components of this type of computing.d. cloud10. Type of electronic commerce that involves the sale of a product or service from one business to another.c. B2BBook1. The most popular Internet activity.a. communicating2. The most common way to access the Internet is through a(n).e. ISP3. Transmission of electronic messages over the Internet.c. e-mail4. Type of instant messaging service that supports a variety of different IM services.i. universal5. The premier business-oriented social networking site.f. LinkedIn6. Another name for a blog.j. Web log7. Publishes short sentences that only take a few seconds to write.g. microblog8. Maintain huge databases relating to information provided on the Web and the Internet.h. search services9. Electronic commerce involving individuals selling to individuals.b. C2C10. The basic components of cloud computing are clients, service providers, and the___.d. InternetMultiple Choice1. The Web was introduced in 1991 in Switzerland at the:APIX CERNInternet Spider2. These programs use a URL to connect to Web sites.Browsers spamProtocols utilities3. A type of communication that allows two or more people to contact each other via direct, live communication.e-mailIMsocial networkingWebmail4. The most widely used social networking site:CERNLinkedInTwitterFacebook5. To evaluate the accuracy of information you find on the Web, you should consider the sites’ authority, accuracy, objectivity, and:currencyobjectivitysourcelocation6. The type of electronic commerce in which a business sells a product to the general public.B2BB2CC2C7. This type of computing frees users from owning, maintaining, and storing software and data: networkclouddesktopWeb8. These programs are automatically started and operate as a part of your browser.filtersFTPplug-insspiders9. FTP, Web-based, and BitTorrent are types of:file transferprotocolsspam blockerswikis10. This type of suite can be used to maintain your security and privacy while you are on the Web:browser securityfilterplug-inInternet securityBook1. The network that connects computers all over the world.CERNInternetLANWeb2. The rules for exchanging data between computers.DSLprotocolsWebWWW3. Client-based e-mail accounts require this special program to be installed on your computer. e-mail clienthyperlinkJava4. Communities of individuals who share a common interest typically create Facebook: clientsgroupspagesprofiles5. E-mail that does not require an e-mail program installed on a user's computer is known as:a bloga podcastWebmaila utility6. A very well-known microblog.LinkedInGoogle+TwitterWikipedia7. These programs continually look for new information and update search services’ database programs.filtersIMspiderswikis8. Using a keyword, a search engine returns a list of related sites known as:blogshitspodcastsstrikes9. This is the Internet’s equivalent to traditional cash.digital cashe-commerceiCashInternet dollars10. Using file transfer utility software, you can copy files to your computer from specially configured servers on the Internet. This is called:downloadingfilteringblogginguploadingChapter 3Matching1. Application software can be divided into two categories: basic and ___.h. mobile apps2. This GUI uses a system of ribbons, tabs, and galleries.a. ribbon3. This application can be used to analyze sales trends and also evaluate and graph stock market trends.g. spreadsheet4. A feature of most word processors that enables users to quickly apply predefined formatting characteristics to text.i. styles5. A specialized graphics program for editing or modifying digital photographs.e. image editor6. Bitmap images are also referred to as _____ images.f. raster7. A program that sets up or structures a database.b. DBMS8. Illustration programs are used to create and edit _____ images.j. vector9. Graphics that typically appear as black and white boxes that automatically link mobile devices to a variety of different content including games, text, videos, and web sites.c. QR codes10. A collection of separate application programs bundled together and made available as a group.d. software suiteBooktypically appear below the menu bar and include small graphic elements called _____.a. buttons2. Simplifies the process of making a selection from a list of alternatives by graphically displaying the effect of alternatives before being selected.d. galleries3. A general purpose program that creates text-based documents.j. word processor4. Program that organizes, analyzes, and graphs numeric data.g. spreadsheet5. A collection of related data.c. database6. Also known as a photo editor, this specialized graphics program edits or modifies digital photographs.e. image editor7. The overall site design for a Web site is commonly represented in a graphical site ____.f. map8. A Web site that provides access to specific mobile apps is known as an app _____.h. store9. A type of suite that is stored at a server on the Internet and is available anywhere you can access the Internet.b. cloud10. A type of specialized suite that includes a variety of programs designed to make computing easier and safer.i. utilityMultiple Choice1. The portion of the application that allows you to control and to interact with the program.dialog boxgalleryuser interfacewindow2. The type of gui that uses tabs to organize groups of related items.charactergalleryribbontraditional3. This application software organizes, analyzes, and graphs numeric data.spreadsheetword processordatabasepresentation graphics4. A collection of related data equivalent to an electronic file cabinet:databasespreadsheetword processorpresentation graphics5. These programs allow you to mix text and graphics to create publications of professional quality focusing on page design and layout.image editorspresentation graphicsworkbooksdesktop publishing6. These readers allow mobile devices to use their digital cameras to scan quick response codes.mobile readerscamera scannersRC scannersQR code readers7. A Web site that provides access to specific mobile apps is called a(n):mobile storeapp storeiPhone appssmartphone store8. A collection of separate application programs bundled together and available as a group is a:integrated packagesoftware suiteapp suiteoffice apps9. One downside of using a _________ is that you are dependent on the server providing the application to be available whenever you need it.cloud suiteoffice suiteutility programWindows program10. Google Docs, Zoho, and Microsoft Office Web Apps are examples of:basic applicationscloud suitesutility suitesspecialized applicationsBook1. This type of software works with end users, application software, and computer hardware to handle the majority of technical details.applicationgeneral purposesystemutility2. A rectangular area that can contain a document, program, or message.dialog boxformframewindow3. Programs that create text-based documents.DBMSsuitesspreadsheetsword processors4. Programs that organize, analyze, and graph numeric data such as budgets and financial reports.DBMSsuitesspreadsheetsword processors5. Programs that allow you to mix text and graphics to create publications of professional quality.databasedesktop publishingpresentationproductivity6. The type of image consisting of geometric shapes.bitmaprasterribbonvector7. An online diary or commentary.bitmapblogHTMLvector8. Programs that combine a variety of visual objects to create attractive, visually interesting presentations.DBMSpresentation graphicsspreadsheetword processor9. Graphics that typically appear as black and white boxes that automatically link mobile devices to a variety of different content.QR Codesbitmapsraster imagesvectors10. Also known as an online suite.cloudintegratedofficeutilityChapter 4Matching1. Programs that allow particular input or output devices to communicate with the rest of the computer system.b. device drivers2. Operating systems allow users to interact with application programs and computer hardware through a user ___.e. interface3. This type of interface uses graphical elements such as icons and windows.d. gui4. In a ribbon gui these divide menus into major activity areas.h. tabs5. While there are hundreds of different operating systems, there are only three basic categories: network, stand-alone, and ___.c. embedded6. The most recent Mac OS X version.g. Mountain Lion7. Originally developed by a graduate student at the University of Helsinki, Linus Torvalds, this operating system is a popular and powerful alternative to Windows.f. Linux8. Mobile operating system for many of Hewlett-Packard's smartphones and tablet computers. j. WebOS9. Utility program that reduces the size of files so they require less storage space and can be sent more efficiently over the Internet.i. file compression10. Wizard that provides step-by-step guidance for selecting hardware drivers and installing drivers.a. add a deviceBook1. Programs that perform specific tasks related to managing computer resources.h. utilities2. Restarting a running computer without turning off the power.j. warm boot3. Type of operating system that controls and coordinates networked computers.f. NOS4. An operating system is often referred to as the software environment or___.g. platform5. OS X Lion feature to display and provide direct access to applications.e. Launchpadtype of software that allows a single physical computer to operate as though it were two or more separate and independent computers.i. virtualizationoperating system that that is owned by Google and is one of the fastest-growing mobile operating systems.a. Androidof program that guards computer systems from viruses and other damaging programs.b. antivirus9. If a file cannot be saved on a single track, it has to be____.d. fragmented10. Program that works with the operating system to allow communication between a device and the rest of a computer system is called a device____.c. driverMatching1. This system software coordinates computer resources, provides a user interface, and runs applications.device driveroperating systemtranslatorutility2. Starting or restarting a computer is called:bootingaligninginitializingstartup3. Type of operating system used for handheld devices such as smartphones, cable and satellite television tuner boxes, video game systems, and other small electronics.cellembeddednetworkstand-alone4. The operating system is often referred to as the software environment or the software:desktopserverplatformwindow5. An approach in which a single physical computer can support multiple operating systems that operate independently.simulationhostingmultitaskingvirtualization6. An operating system released in 2012 with a user interface very similar to the interface used with tablets and smartphones with functionality similar to Windows 8.OS X Mountain LionOS X LionLinuxChrome7. An approach that allows a single computer to run multiple operating systems at the same time.multitaskingvirtualization.Windows8. Developed by Apple, based on Mac OS and is used as the platform for the iPhone, iPod touch, and iPad.iOSBlackberry OSAndroidWindows Phone 89. A Windows utility program that locates and eliminates unnecessary fragments and rearranges files and unused disk space to optimize operations.BackupDisk CleanupDisk DefragmenterRestore10. Dangerous programs that can be “caught” in a variety of ways including opening e-mail attachments and downloading software from the Internet.appspamutilityvirusBook1. What type of software works with users, application software, and computer hardware to handle the majority of technical detailsapplicationdesktopLinuxsystem2. The programs that convert programming instructions written by programmers into a language that computers understand and process are language:converterslinguistsmanagerstranslators3. The ability to switch between different applications stored in memory is called:diversionmultitaskingoperational interferenceprogramming4. Graphic representations for a program, type of file, or function:appiconimagesoftware5. This operating system feature is controlled by a mouse and changes shape depending on its current function.dialog boxmenumousepointer6. The operating system based on Linux, designed for Netbook computers, and focused on Internet connectivity through cloud computing:ChromeMacUnixWindows7. The mobile operating system developed by Apple and originally called iPhone OS:AndroidBlackBerry OSiOSMac OS8. A utility program that makes copies of files to be used in case the originals are lost or damaged:Backup and RestoreDisk CleanupDisk DefragmenterCompactor9. A troubleshooting utility that identifies and eliminates nonessential files, frees up valuable disk space, and improves system performance:Backup and RestoreDisk CleanupDisk DefragmenterCompactor10. Windows makes it easy to update drivers with Windows:BackupRestoreDriverUpdateChapter 5Matching1. Another name for a notebook computer.e. laptop2. The smallest computer system unit.d. handheld3. The most widely used character encoding standard that is recognized by virtually every computer system.j. Unicode4. The ALU performs two types of operations: arithmetic and ___.f. logical5. A type of chip that allows a single computer to run two or more operations at the same time.h. multicore6. Additional RAM can be added to a computer system by inserting an expansion module called ___.b. DIMM7. Type of slot on the system board that allows users to expand their systems.c. expansion8. Three types of expansion buses are USB, Firewire, and ___.i. PCIe9. Commonly used specialized ports are SATA, HDMI, MiniDP, S/PDIF and___.g. MIDI10. This adapter plugs into a standard wall outlet to convert AC to DC.a. ACBook1. A type of multiprocessor chip that provides two or more separate and independent CPUs.c. multicore2. A type of memory that is volatile or loses its contents when power is turned off.e. random access3. System board component that provides a connection point for specialized cards or circuit boards.g. slots4. Plastic cards the size of a regular credit card that have an embedded specialty chip.h. smart cards5. A type of memory that improves processing by acting as a temporary high-speed holding area between the memory and the CPU.a. cache6. A type of memory that provides a combination of features of RAM and ROM.b. flash7. A generic term that is associated with the ability to attach any device onto a computer and have it play or work immediately.d. Plug and Play8. This bus connects the CPU to memory on the system board.i. system9. This port can be used to connect many USB devices to the system..j. USB10. This unit plugs into a standard wall outlet and converts AC to DC.f. slateMultiple Choice1. This type of system unit is designed to be placed either horizontally or vertically.desktopnotebooksmartphonetablet pc2. The binary system consists of only two digits: 0 or 1, called a:bitbytecharacternumber3. This controls communications for the entire computer system with every component within the system unit connecting to it.power supplymemoryexpansion slotmotherboard4. Chips are mounted on carrier:chipscircuitspackagesprocessors5. The number of times the CPU can fetch and process data or instructions in one second is known as its:busclock speedcycle ratefrequency rate6. These chips hold the program (sequence of instructions) and data that the CPU is presently processing.cardFlashRAMROM7. These chips have information stored in them that cannot be changed by the user.cardFlashRAMROM8. The expansion card that is used to connect a computer to a network.converterNetwork interfacemodemLAN9. The number of bits that can travel simultaneously down a bus is known as the:bus widthbyte pathdigital widthslate distance10. A socket for external devices to connect to the system unit.chipdockportslotaadcbcdbacBook1. This container houses most of the electrical components for a computer system.carrier packagesystem boardsystem unitUnicode2. A type of notebook, this computer specializes in on-the-go Web browsing and e-mail access.chassisdesktopmedia centernetbook3. The mainboard or motherboard is also known as the:computerboard processormobile systemsystem board4. How many bytes can a 32-bit-word computer access at one time148165. In a microcomputer system, the central processing unit is contained on a single:buschipmoduleRAM6. This type of memory divides large programs into parts and stores the parts on a secondary storage device.directexpandedrandom-accessvirtual7. Also known as NIC, this adapter card is used to connect a computer to a:AIAexpansiongraphicsnetwork8. This provides a pathway to connect parts of the CPU to each other.busPlug and Playwiredwireless9. The specialized port that provides very high-speed connections for large secondary storage devices.eSATAHDMIMIDIMiniDP10. Computers can only recognize this type of electronic signal.analogbusdigitalmaximumcddbbddaacChapter 6Matching1. Type of keyboard that displays an image of a keyboard on a touch screen device.h. virtual2. A type of mouse that is battery-powered and does not use a mouse cord.j. wireless3. Type of screen widely used with tablet PCs, netbooks, and smartphones.g. touch4. Accepts documents consisting of text and/or images and converts them to machine-readable form.c. OCR5. Input device that uses special preprinted characters that can be read by a light source and changed into machine-readable code.f. scanner6. A monitor feature expressed as a matrix of dots or pixels.e. resolution7. Specialized digital video cameras that capture images and send them to a computer for broadcast over the Internet.i. WebCam8. Printer resolution is measured in ___.b. dpi9. Printer connected to the Internet that provides printing services to others on the Internet.a. cloud10. The transmission of telephone calls over computer networks.d. VoIPBook1. Pressing this key turns a feature on or off.i. toggle key2. This type of mouse has a ball on the bottom and is attached with a cord to the system unit.e. mechanical3. A penlike device commonly used with tablet PCs and PDAs.h. stylus4. Bar code readers use either handheld wand readers or platform.g. scanners5. Bar code system used by many electronic cash registers.j. UPC6. Records images digitally on a on a disk or its memoryb. digital camera7. The distance between each pixel.c. dot pitchmonitor feature that is measured by the diagonal length of the viewing area.a. active-display area9. Special-purpose printers for creating maps, images, and architectural and engineering drawings.f. plotters10. A provider of lower-cost options for VoIP.d. MagicJackMultiple Choice1. Keyboard that does not have a physical keyboard, but has the keys displayed on a screen.traditionalnotebookthumbvirtual2. This mouse emits and senses light to detect mouse movements.dynamiccordlessmechanicaloptical3. A penlike device commonly used with tablets and PDAs.joystickpointing stickstyluspointer4. A type of reader that interprets encoded information from credit and debit cards.bankcardchargemaster5. Often used to score standardized multiple-choice tests, this device senses the presence or absence of a mark, such as a pencil mark.CRTOMROCRMFD6. This indicates a monitor’s ability to display colors.contrast ratiodot pitchaspect ratioresolution7. The most common LCD display in which each pixel is independently activated producing a high quality and energy efficient image.AMOLEDLEDCRTTFT-LC8. Using a technology similar to that used in a photocopying machine, this printer employs a light beam to produce images with excellent letter and graphics quality.dot-matrixlaserphotothermal9. This device typically combines the capabilities of a scanner, printer, fax, and copy machine.dot-matrixLFTlaserMFD10. This Internet telephone service provides free domestic calling, supports video as well as audio, and does not require any special equipment.OomaMagicJackSkypeVonage。

计算机专业英语(2008影印版)课后习题答案(包括crossword_puzzle的句子翻译)

计算机专业英语(2008影印版)课后习题答案(包括crossword_puzzle的句子翻译)

Computing Essentials 2008课后练习题答案详解Chapter 1: Information Technology, The Internet, and Y ouCrossword Puzzle Answers: (p22)Across1 、The most essential part of an information system. People信息系统最基本的部分。

人7 、Coordinates computer resources. Operating System协调计算机资源。

操作系统10 、Modifies signals for processing. Modem修改信号以便处理。

调制解调器12 、Data that has been processed by the computer. Information计算机处理过的数据。

信息13 、Unprocessed facts. Data没处理过的事实。

数据14 、Notebook computer that accepts handwritten input.. Tablet PC可以用手写输入的笔记本电脑。

平板电脑DownNum. Clue Answer2 、Uses computers to become more productive. End User使用电脑变得更有效率。

终端用户3 、Rules or guidelines to follow when using software, hardware, and data. Procedures使用软件,硬件和数据时遵循的规则或指引。

指令说明书4 、Created by word processors. Document Files文字处理创建出来的。

文档文件5 、Specialized programs that allow input and output devices to communicate. Device Drivers 允许输入和输出设备通信的专业程序。

计算机专业英语目录

计算机专业英语目录

目录Chapter1 Computer Fundamentals (1)1.1 Four Kinds of Computers (1)1.1.1 Reading Material (4)1.1.2 正文参考译文 (6)1.2 Computer Hardware (7)1.2.1 Reading Material 1 (12)1.2.2 Reading Material 2 (13)1.2.3 正文参考译文 (14)1.3 System Software (16)1.3.1 Reading Material 1 (20)1.3.2 Reading Material 2 (21)1.3.3 正文参考译文 (22)1.4 Application Software (24)1.4.1 Reading Material (28)1.4.2 正文参考译文 (29)Chapter 2 Computer Network (31)2.1 Introduction to Computer Network (31)2.1.1 Reading Material 1 (35)2.1.2 Reading Material 2 (37)2.1.3 正文参考译文 (38)2.2 Data Communications Channels (39)2.2.1 Reading Material (43)2.2.2 正文参考译文 (45)2.3 Main FactorsAffecting Data Transmission (46)2.3.1 Reading Material (50)2.3.2 正文参考译文 (53)2.4 Network Architecture (54)2.4.1 Reading Material (59)2.4.2 正文参考译文 (60)Chapter 3 Internet andE-commerce (62)3.1 Browsers and Communications (62)3.1.1 Reading Material 1 (67)3.1.2 Reading Material 2 (69)3.1.3 正文参考译文 (70)3.2 Search Tools (72)3.2.1 Reading Material 1 (76)3.2.2 Reading Material 2 (81)3.2.3 正文参考译文 (83)3.3 Definitions and Contentof the Electronic Commerce (84)3.3.1 Reading Material 1 (88)3.3.2 Reading Material 2 (93)3.3.3 正文参考译文 (93)3.4 Value Chains in E-commerce (95)3.4.1 Reading Material 1 (99)3.4.2 Reading Material 2 (101)3.4.3 正文参考译文 (102)Chapter 4 Database Fundamentals (104)4.1 Introduction to DBMS (104)4.1.1 Reading Material (109)4.1.2 正文参考译文 (111)4.2 Structure of the Relational Database (113)4.2.1 Reading Material (120)4.2.2 正文参考译文 (122)4.3 Brief Introduction of SQl (126)4.3.1 Reading Material (132)4.3.2 正文参考译文 (133)4.4 Applications of Database (137)4.4.1 Reading Material (140)4.4.2 正文参考译文 (142)Chapter 5 Programming Language (144)5.1 Algorithms and Flowcharts (144)5.1.1 Reading Material 1 (147)5.1.2 Reading Material 2 (148)5.1.3 正文参考译文 (151)计算机专业英语教程VIII5.2 Introduction ofProgramming Languages (152)5.2.1 Reading Material 1 (157)5.2.2 Reading Material 2 (158)5.2.3 正文参考译文 (159)5.3 Object-Oriented Programming (161)5.3.1 Reading Material 1 (164)5.3.2 Reading Material 2 (167)5.3.3 正文参考译文 (169)5.4 Program Debuggingand Program Maintenance (170)5.4.1 Reading Material (174)5.4.2 正文参考译文 (177)Chapter 6 Information Security (179)6.1 Concept of Information Security (179)6.1.1 Reading Material 1 (182)6.1.2 Reading Material 2 (184)6.1.3 正文参考译文 (186)6.2 Computer Viruses (187)6.2.1 Reading Material 1 (192)6.2.2 Reading Material 2 (193)6.2.3 正文参考译文 (194)6.3 Internet Security (195)6.3.1 Reading Material 1 (199)6.3.2 Reading Material 2 (200)6.3.3 正文参考译文 (201)6.4 Secure Networks and Policies (202)6.4.1 Reading Material 1 (205)6.4.2 Reading Material 2 (206)6.4.3 正文参考译文 (208)Chapter 7 Image Processing (209)7.1 Concept of Graphics and Images (209)7.1.1 Reading Material 1 (212)7.1.2 Reading Material 2 (214)7.1.3 正文参考译文 (215)7.2 Introduction to DigitalImage Processing (215)7.2.1 Reading Material 1 (220)7.2.2 Reading Material 2 (222)7.2.3 正文参考译文 (223)7.3 Image Compression (224)7.3.1 Reading Material (227)7.3.2 正文参考译文 (230)7.4 Application of DigitalImage Processing (231)7.4.1 Reading Material 1 (236)7.4.2 Reading Material 2 (237)7.4.3 正文参考译文 (238)参考文献 (239)。

计算机专业英语(第3版)

计算机专业英语(第3版)
➢ 中央处理器是计算机系统的心脏。它负责实现由程序启动 的全部算术运算和逻辑判断。
➢ The CPU coordinates all the activities of the various components of the computer. It determines which operations should be carried out and in what is the order.
2020/8/16
计算机专业英语(第3版)
13
Notes
[4] For example, if an instruction is to perform the operation of adding two numbers, it must know what the two numbers are and where the two numbers are. 这里的“what the two numbers are and where the two numbers are”作宾语,它由两个并列的从句组成。
形图像、CAD、计算机动画和多媒体应用软件。第 4单元是计算机网络相关知识介绍,包括计算机网
络基础、互联网搜索引擎、无线网络技术及网络安
全。第5单元讲述电子商务方面的内容,有电子商 务基础、EDI和网络广告。第6单元是计算机领域 新技术介绍,包括人工智能、虚拟现实和神经网络。
2020/8/16
计算机专业英语(第3版)
第一,计算机具有进行加、减、乘、除及求幂等各种算术运 算的电路。
Second, computers have a means of communicating with the user.
第二,计算机具有与用户通信和功能。

计算机专业英语全部答案(第三版)

计算机专业英语全部答案(第三版)

计算机专业英语全部答案(第三版)Unit1EX11 F2 T3 T4 F5 T6 F7 T 8 T 9 T 10FEX2Input hardware, storage hardware, processing hardware, output hardware power, speed, memorycentral processing unitinternal, primary, memorykeyboard, central processing unit, main memory, monitorEX3 PARTA1 F2 D3 G4 C5 B6 A7 E 8 HEX3 PART B1 F2 E3 G4 B5 A6 C7D 8 HEX41 input device2 screen3 manipulates4 instructions5 retrieve6 codes7 hardcopy8 functionEX51 T2 T3 F4 F5 T6 F7 T 8 TUNIT2EX11 T2 F3 T4 F5 T6 F7 T 8 FEX21 sizes, shapes, processing capabilities2 supercomputers, mainframe computers, minicomputers, microcomputers3 mainframe computer4 microcomputer, storage locations5 portables, laptop computers, desktop workstations6 semiconductor7 CPU, memory, storage, devices, processing, users8 microprocessor chipEX3 PARTA1 C2 A3 H4 I5 E6 F7 G 8 JEX3 PARTB1 capacity2 device3 laptop computer4 Portable computers5 Silicon6 semiconductor7 workstation8 Voltage, voltage9 RAM10ROMEX41 portable2 access3 main memory4 sophisticated programs5 processing capabilities6 instructions7 computation8 computer professionalEX51 T2 T3 F4 F5 F6 T7 F 8 T 9 T 10T11F 12T 13 T 14 TUNIT3EX11 T2 F3 T4 T5 T6 T7 F 8 F 9 T 10 F11T 12F 13F 14TEX21 microprocessor2 bus3 register 4control unit5 processor6 binary7 arithmetic, logic 8 milliseconds, microseconds9 instruction 10execution 11megahertz 12wordsize EX3 PARTA1 F2 A3 J4 C5 D6 E7 H 8 I 9 B 10GEX3 PARTB1 Storage 2chip3 buses4 ALU5 register 6control unit7 machine language 8 binary system 9 bits 10computer programEX41 configuration2 decodes3 data bus4 characters5 converts6 synchronize7 circuitry8 internal clockEX51 T2 F3 F4 T5 F6 F7 T 8 T 9 F 10 FUNIT4EX11 F2 T3 T4 F5 F6 T7 F 8 T 9 T 10 F11T 12T 13F 14F 15T 16F17T 18F 19T 20F21T 22FEX2memoryRAMdiskettes, diskschipsparityexpanded, extendedmonochromecacheROMupdatedEX3 PART A1 B2 E3 C4 J5 I6 H 7A 8 F 9 G 10DEX3 PART Bsecondary storagebufferaccesscodedisketteslotterminalsmotherboardbytescreenEX4desktopsoftwareanimationtransferredsophisticatedcompatiblecacheupgradeEX51 T2 F3 F4 T5 T6 T7 T8 F9 T 10 F11T 12F 13F 14T 15T 16F17F 18F 19F 20T21T 22TUnit 5Ex1:1 T2 T3 F4 T5 F6 F7 F 8 T 9 T 10 T11F 12T 13F 14F 15T 16T17F 18T 19F 20F21T 22T 23TEX2mail, courierhub, starlocal area networkpacketsEthernetkilobits per second, megabits per second, gigabits per second circuit switchingreassembledinternet protocol, transmission control protocol datagramsframesbinary, decimalEX3 part A1 C2 E3 B4 F5 A6 D7 H 8 GEX3 part Bhubzippeddecimalframebinary numberinternetpacketbandwidthEX4forwardedreassembledare encapsulatedcableburstysubmitare retransmittedprotocolEX5IP addressnotationdotted-decimalcomputer networkbackgroundsharedgeographicprivacyExercise to the Passage for ReadingEX6有意为维修技师使用所留被弃的、丢失的或损坏了的数据都进了数据桶。

《计算机专业英语》电子教程讲义资料

《计算机专业英语》电子教程讲义资料
很难确切地说现代计算机是什么时候发明的。从20世纪30年代到40年 代,制造了许多类似计算机的机器。但是这些机器大部分没有今天我们所 说的计算机的所有特征。这些特性是:机器是电子的,具有储存的程序, 而 且是通用的。
计算机专业英语
1-5
Chapter 1 The History and Future of Computers
4. 了解科技英语的特点,掌握科技英语翻译要点
计算机专业英语
1-3
Chapter 1 The History and Future of Computers
Chapter 1 The History and Future of Computers
1.1 The Invention of the Computer
1.1 The Invention of the Computer
1.1.1 The ENIAC
While working on the ENIAC, Eckert and Mauchly were joined by a brilliant mathematician, John von Neuman. Together, they developed the idea of a stored program computer. This machine, called the Electronic Discrete Variable Automatic Computer, or EDVAC, was the first machine whose design included all the characteristics of a computer. It was not completed, however, until 1951.

计算机专业英语

计算机专业英语
2.4 Common DOS Commands(DOS常用命令) 52
2.4.1 dir(文件列表命令) 53
2.4.2 type(显示文件内容) 54
2.4.3 copy(拷贝命令) 54
2.4.4 ren(文件改名命令) 54
2.4.5 del(文件删除命令) 55
7.5.4 Fax(传真) 177
7.6 Professional Terms(专业术语) 179
Exercises(练习) 179
5.2.1 Some Common Events(常用事件) 123
5.2.2 Some Common Controls,Attributes of Controls(常用控件及其属性) 126
5.3 Java 2 128
5.3.1 Java Language Keywords(Java语言关键字) 129
4.4.2 Latest Features(最新特征) 104
4.4.3 Partion Backup and Image It(磁盘分区备份为映像文件) 105
4.4.4 Partition from image(映像文件还原为磁盘分区) 107
4.5 Situation Dialogue(情境对话) 108
3.2 Architecture of Computer Networks(计算机网络结构) 69
3.3 LAN(局域网) 72
3.4 WAN(广域网) 74
3.5 Hardware Concepts of Computer Network(计算机网络硬件设备基础) 76
3.5.1 Net Interface Card(网卡) 76

计算机专业英语第二版课后翻译答案

计算机专业英语第二版课后翻译答案

Unite 1Section A: 1、artificial intelligence 人工智能2、paper-tape reader 纸带阅读器3、Optical computer 光学计算机4、Neural network 神经网络5、Instruction set 指令集6、Parallel processing 并行处理器7、Difference engine差分机8、Versatile logical element 多用途逻辑元件9、Silicon substrate 硅衬底10、Vaccum tube 真空管11、数据的存储与管理the storage and management of data12、超大规模集成电路large-scale integrated circuit13、中央处理器central processing unit14、个人计算机personal computer15、模拟计算机analog computer16、数字计算机digital computer17、通用计算机general purpose computer18、处理器芯片processor chip19、操作指令operating instructions20、输入设备input devicesSection B1、artificial neural network 人工智能神经网络2、Computer architecture 计算机体系结构3、Robust computer program 健壮的计算机程序4、Human-computer interface 人机接口5、Knowledge representation 知识代表6、数值分析numerical analysis7、程序设计环境programming environment8、数据结构data structure9、存储和检索信息store and retrieve information10、虚拟现实virtual realityUnit 2Section A:1、function key 功能键2、V oice recognition module 声音识别调制器3、Touch-sensitive region 触敏扫描仪4、Address bus 地址总线5、Flatbed scanner 平板扫描仪6、Dot-matrix printer 矩阵式打印机7、Parallel connection 并行连接8、Cathode ray tube 阴极射线管9、Video game 电子游戏10、Audio signal 音频信号11、操作系统operating system12、液晶显示liquid crystal display13、喷墨打印机inkjet printer14、数据总线data bus15、串行连接serial connection16、易失性存储器volatile memory17、激光打印机laser printer18、磁盘存储器floppy disc19、基本输入输出系统basic input/output system20、视频显示器video displaySection B:1、interrupt handler 中断处理程序2、Virtual memory 虚拟内存3、Context switch 上下文转换4、Main memory 主存5、Bit pattern 位模式6、外围设备peripheral device7、进程表process table8、时间片time slice9、图形用户界面graphics user interface10、海量存储器mass storageUnit 3Section A:1、storage register 存储寄存器2、Function statement 函数语句3、Program statement 程序语句4、Object-oriented language 面向对象语言5、Assembly language 汇编语言6、Intermediate language 中间语言7、Relational language 关系语言8、Artificial language 人工语言9、Data declaration 数据声明10、SQL 结构化查询语言11、可执行程序executable program12、程序模块program module13、条件语句conditional statement14、赋值语句assignment statement15、逻辑语言logic statement16、机器语言machine language17、函数式语言functional language18、程序设计语言programming language19、运行计算机程序run a omputer program20、计算机程序员computer programmerSection B1、native code 本机代码2、Header file 头文件3、Multithreaded program 多线程程序4、Java-enabled browser 支持Java的浏览器5、Mallicious code6、机器码machine code7、汇编码assembly code8、特洛伊木马程序trojan9、软件包software package10、类层次class hierarchyUnit 4Section A1、inference engine 推理机2、System call 系统调用3、Compiled language 编译执行的语言4、Parellel computing 并行计算5、Pattern matching 模式匹配6、Memory location 存储单元7、Interpreter program 解释程序8、Library routine 库程序9、Intermediate program 中间程序10、Source file 源文件11、解释执行的语言interpreted language12、设备驱动程序device driver13、源程序source program14、调试程序debugger15、目标代码object code16、应用程序application program17、实用程序utility program18、逻辑程序logic program19、黑盒ink cartridge20、程序的存储与执行storage and execution of program Section B1、Messaging model 通信模式2、Common language runtime 通用语言运行时刻(环境)3、Hierarchical namespace 分层的名称空间4、Development community 开发社区5、CORBA 公共对象请求代理体系结构6、基本组件basic components7、元数据标记metadata token8、虚拟机VM virtual machine9、集成开发环境IDE(intergrated development environment)10、简单对象访问协议SOAP(simple object access protocol) Unit 5Section A1、system specification 系统规范2、Unit testing 单元测试3、Software life cycle 软件的生命周期4、System validation process 系统验证过程5、Evolutionary development process 进化发展过程6、Simple linear model 简单线性模型7、Program unit 程序单元8、Throwaway prototype 一次性使用原型9、Text formatting 文本格式10、System evolution 系统演变11、系统设计范例paradigm for system design12、需求分析与定义Requirements analysis and definition13、探索式编程方法exploratory programming approach14、系统文件编制system documentation15、瀑布模型waterfall model16、系统集成system integration17、商用现成软件commercial off-the-shelf software18、基于组件的软件工程component-based software engineering19、软件维护工具software maintenance tool20、软件复用software reuseSection B1、check box 复选框2、Structured design 结构化设计3、Building block 构建模块4、Database schema 数据库模式5、Radio button 单选按钮6、系统建模技术system modeling techniques7、模型驱动开发MDD(model-driven development)8、数据流程图data flow diagram9、下拉式菜单drop-down10、滚动条scroll barUnit 6Section A1、end user 终端用户2、Atomic operation 原子操作3、Database administrator 数据库管理员4、Relational database model 关系数据库模型5、Local data 本地数据6、Object-oriented database 面向对象的数据库7、Database management system 数据库管理系统8、Entity-relationship model 实体关系模型9、Distributed database 分布式数据库10、Flat file 展开文件11、二维表two-dimensional table12、数据属性data attributes13、数据库对象database object14、存储设备storage device15、数据类型data type16、数据插入与删除insertion and deletion17、层次数据库模型hierarchical18、数据库体系结构database architecture19、关系数据库管理系统ralational database management system20、全局控制总线global control busSection B1、nonvolatile storage system 易失性存储系统2、Equitment malfunction 设备故障3、Wound-wait protocol 损伤等待协议4、Exclusive lock 排它锁5、Database integrity 数据库完整性6、共享锁shared lock7、数据库实现database implementation8、级联回滚cascading rollback9、数据项data item10、分时操作系统time sharing operating system ;Unit 7Section A1、microwave radio 微波无线电2、digital television 数字电视3、DSL 数字用户线路4、analog transmission 模拟传输5、on-screen pointer 屏幕上的指针6、computer terminal 计算机终端7、radio telephone 无线电话8、cellular telephone 蜂窝电话,移动电话,手机9、decentralized network 分散型网络10、wire-based internal network 基于导线的内部网络,有线内部网11、光缆fiber-optic cable12、传真机fax machine13、线通信wireless communications14、点对点通信point-to-point communications15、调制电脉冲modulated electrical impulse16、通信卫星communication(s) satellite17、电报电键telegraph key18、传输媒体transmission medium (或media)19、无绳电话cordless telephone20、金属导体metal conductorSection B1、bit map 位图2、parallel port 并行端口3、direct memory access (DMA) 直接存储器存取4、universal serial bus 通用串行总线5、general-purpose register 通用寄存器6、电路板circuit board7、串行通信serial communication8、数码照相机digital camera9、存储映射输入/输出memory-mapped I/O10、有线电视cable televisionUnit 8Section A1、file server 文件服务器2、carrier sense 载波检测3、Protocol suite 协议族4、Peer-to-peer model 点对点模型5、bus topology network 总线拓扑网络6、inter-machine cooperation 计算机间合作7、Ethernet protocol collection 以太网协作集8、Proprietary network 专有网络9、utility package 实用软件包10、star network 星形网络11、局域网local area network (LAN)12、令牌环token ring13、无线网络wireless network14、封闭式网络closed network15、环形拓扑网络ring topology16、客户/服务机模型client/server model17、网络应用程序network application18、进程间通信interprocess communication19、打印服务机printer server20、广域网wide area networkSection B1、routing path 路由选择通路2、dual-ring topology 双环形拓扑结构3、extended star topology 扩展星形拓扑结构4、backbone network 基干网,骨干网5、mesh topology网络拓扑结构6、同轴电缆coaxial cable7、逻辑拓扑结构logical topology8、无冲突连网环境collision-free networking environment9、树形拓扑结构tree topology10、目的地节点destination nodeUnit 9Section A1、cell phone 蜂窝电话,移动电话,手机2、IP address 网际协议地址,IP地址3、autonomous system 自主系统4、dial-up connection 拨号连接5、network identifier 网络标识符6、binary notation 二进制记数法7、mnemonic name 助记名,缩写名8、Internet-wide directory system 因特网范围的目录系统9、name server 名称服务器10、Internet infrastructure 因特网基础结构11、助记地址mnemonic address12、网吧cyber cafe13、宽带因特网访问broadband Internet access14、顶级域名top-level domain (TLD)15、因特网编址Internet addressing16、点分十进制记数法dotted decimal notation17、因特网服务提供商Internet service provider (ISP)18、专用因特网连接dedicated Internet connection19、主机地址host address20、硬件与软件支持hardware and software support Section B1、incoming message 来报,到来的报文2、application layer 应用层3、utility software 实用软件4、sequence number (顺)序号,序列号5、remote login capabilities 远程登录能力6、端口号port number7、软件例程software routine8、传输层transport layer9、文件传送协议FTP(File Transfer Protocol)10、万维网浏览器Web browserUnit 10Section A1、mailing list 邮件发送清单,邮件列表2、proprietary software 专有软件3、cc line 抄送行4、bcc line 密送行5、forwarded e-mail messages 转发的电子邮件6、e-mail convention 电子邮件常规7、click on an icon 点击图标8、confidential document 密件,秘密文件9、classified information 密级信息10、recovered e-mail message 恢复的电子邮件11、常用情感符commonly used emoticon12、已删除电子邮件deleted e-mail13、电子系统electronic system14、附件行Attachments line15、版权法copyright law16、电子邮件网规e-mail netiquette17、信息高速公路information superhighway18、签名文件signature file19、电子数据表程序spreadsheet program20、文字处理软件word processorSection B1、web-authoring software 网络写作软件2、template generator 模版生成程序3、navigation page 导航页面4、corporate logo 公司标识5、splash page 醒目页面,过渡页6、导航条navigation bar7、节点页面node page8、网站地图site map9、可用性测试usability testing10、图形交换格式gif(Graphics Interchange Format)Unit 11Section A1、customized marketing strategy 定制的营销策略2、B2G transaction 企业对政府交易3、mobile telephone 移动电话4、dot-com bust 网络不景气5、smart card 智能卡,灵巧卡6、digital piracy 数字盗版7、dot-com boom 网络繁荣8、C2C transaction 消费者对消费者交易9、Web auction site 拍卖网站10、fingerprint reader 指纹读取器11、射频识别装置radio-frequency identification (RFID) device12、电子数据交换electronic data interchange (EDI)13、库存管理技术inventory management technology14、知识产权intellectual property15、条形码bar code16、货币兑换currency conversion17、电子图书electronic book18、视网膜扫描仪retina scanner19、个人数字助理personal digital assistant (PDA)20、企业对企业电子商务B2B electronic commerceSection B1、software suite 软件套件2、text box 文本框3、virtual checkout counter 虚拟付款台4、static catalog 静态目录5、browser session 浏览器会话期6、动态目录dynamic catalog7、购物车软件shopping cart software8、供应链supply chain9、企业资源计划软件enterprise resource planning (ERP) software10、税率tax rateUnit 12Section A1、encryption program 加密程序2、deletion command 删除命令3、authorized user 授权的用户4、backup copy 备份5、voltage surge 电压浪涌6、circuit breaker 断路器7、electronic component 电子元件(或部件)8、data-entry error 数据输入错误9、electronic break-in 电子入侵10、power line 电力线,输电线11、检测程序detection program12、电源power source13、破坏性计算机程序destructive computer program14、计算机病毒computer virus15、软件侵权software piracy16、硬盘驱动器hard-disk drive17、病毒检查程序virus checker18、主存储器primary storage19、电子公告板electronic bulletin board20、浪涌电压保护器surge protectorSection B1、phishing attack 网络钓鱼攻击2、graphics card 显(示)卡3、heuristic analysis 试探性分析4、infected file 被感染文件5、virus dictionary 病毒字典6、数据捕获data capture7、恶意软件malicious software8、病毒特征代码virus signature9、防病毒软件antivirus software10、内存驻留程序memory-resident program。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Computer English Chapter 10 Computer and Network SecurityKey points:u seful terms and definitions of computer securityDifficult points:d istinguish between four kinds of computer security breachesRequirements:1. Principle of easiest penetration2. The kinds of computer security breaches3. What is firewall4. 了解科技论文标题的写法New Words & Expressions:breach breach 破坏破坏破坏,,缺口involve involve 包含包含包含,,涉及涉及,,也可不译depositor depositor 寄托者寄托者vulnerability vulnerability 弱点弱点弱点,,攻击perimeter perimeter 周围周围周围,,周边penetrate penetrate vt vt vt. . . 攻破攻破攻破,,攻击Exposure Exposure 曝光曝光曝光,,揭露threat n. threat n. 威胁威胁威胁,,恐吓asset asset 资产资产interruption interruption 中断中断中断,,打断interception interception 截取截取modification modification 修改修改fabricate v. fabricate v. 伪造伪造tamper v. tamper v. 篡改篡改spurious adj. spurious adj. 假的假的10.1 Characteristics of Computer Intrusion and Kinds of Security BreachesAbbreviations:10.1.1 入侵计算机的特点Principle of Easiest Penetration. An intruder must be expected to use any available means of penetration. This will not necessarily be the most obvious means, nor will it necessarily be the one against which the most solid defense has been installed.最容易攻破原理最容易攻破原理。

入侵者必定要使用一种可以攻破的方法入侵者必定要使用一种可以攻破的方法,,这种方法既不可能是最常用的可能是最常用的,,也不可能是针对已经采取了最可靠的防范措施的方法也不可能是针对已经采取了最可靠的防范措施的方法。

This principle says that computer security specialists must consider all possible means of penetration, because strengthening one may just make another means more appealing to intruders. We now consider what these means of penetration are.这一原理说明计算机安全专家必须考虑所有可能的攻击方法这一原理说明计算机安全专家必须考虑所有可能的攻击方法。

由于你加强了某一方面了某一方面,,入侵者可能会想出另外的对付方法入侵者可能会想出另外的对付方法。

我们现在就说明这些攻击的方法是什么击的方法是什么。

10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches10.1.2 KINDS OF SECURITY BREACHESIn security, an exposure is a form of possible loss or harm in a computing system; examples of exposures are unauthorized disclosure of data, modification of data, or denial of legitimate access to computing . A vulnerability is a weakness in the security system that might be exploited to cause loss or harm.在计算机系统中在计算机系统中,,暴露是一种使安全完全丧失或受到伤害的一种形式;暴露的例子是非授权的数据公开暴露的例子是非授权的数据公开、、数据修改或拒绝合法的访问计算机算机。

脆弱性是安全系统中的薄弱环节脆弱性是安全系统中的薄弱环节,,它可能引起安全的丧失或伤害。

10.1.2 KINDS OF SECURITY BREACHESA human who exploits a vulnerability perpetrates an attack on the system. Threats to computing systems are circumstances that have the potential to cause loss or harm; human attacks are examples of threats, as are natural disasters, inadvertent human errors, and internal hardware or software flaws. Finally, a control is a protective measure-an action, a device, a procedure, or a technique-that reduces a vulnerability. 人可利用脆弱性对系统进行罪恶的攻击人可利用脆弱性对系统进行罪恶的攻击。

对计算机系统的威胁是引起安全丧失或伤害的环境全丧失或伤害的环境;;人们的攻击是威胁的例子人们的攻击是威胁的例子,,如自然灾害如自然灾害,,人们非故意错误和硬件或软件缺陷等故意错误和硬件或软件缺陷等。

最后最后,,控制是一种保护性措施——控制可以是一种动作可以是一种动作,,一个设备一个设备,,一个过程或一种技术——减少了脆弱性减少了脆弱性。

10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches10.1.2 KINDS OF SECURITY BREACHESThe major assets of computing systems are hardware, software, and data. There are four kinds of threats to the security of a computing system: interruption, interception, modification, and fabrication. The four threats all exploit vulnerabilities of the assets in computing systems. These four threats are shown in Fig.10-1.计算机系统的主要资源是硬件计算机系统的主要资源是硬件、、软件和数据软件和数据。

有四种对计算机安全的威胁全的威胁::中断中断,,截取截取,,篡改和伪造篡改和伪造。

这四种威胁都利用了计算机系统资源的脆弱性机系统资源的脆弱性,,图1010--1表示这四种威胁表示这四种威胁。

10.1 Characteristics of Computer Intrusion and Kinds of Security BreachesF abricationM odification N orm al F lowInterruptionInterceptionFig.10-1 Four classes of System Security Failures10.1.2 KINDS OF SECURITY BREACHES(1)In an interruptio n, an asset of the system becomes lost or unavailable or unusable. An example is malicious destruction of a hardware device, erasure of a program or data file, or failure of an operating system file manager so that it cannot find a particular disk file.(1)(1)在在中断情况下情况下,,系统资源开始丢失系统资源开始丢失,,不可用或不能用不可用或不能用。

例如,蓄意破坏硬件设备蓄意破坏硬件设备,,抹除程序或数据文件或造成操作系统的文件管理程序故障统的文件管理程序故障,,以致不能找到某一磁盘文件以致不能找到某一磁盘文件。

10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches10.1.2 KINDS OF SECURITY BREACHES(2) An interception means that some unauthorized party has gained access to an asset. The outside party can be a person, a program, or a computing system. Examples of this type of failure are illicit copying of program or data files, or wiretapping to obtain data in a network. While a loss may be discovered fairly quickly, a silent interceptor may leave no traces by which the interception can be readily detected.(2)截取是指某一非特许用户掌握了访问资源的权利是指某一非特许用户掌握了访问资源的权利。

相关文档
最新文档