计算机英语第三版课文翻译
(完整版)Unit3Computers课文翻译
Unit 3 Computers 课文翻译section A我是谁?经过很长时间我已经改变了很多。
1642年我在法国诞生时是一台计算机器。
尽管当时我还年轻,但是我能简化一些复杂的计算题。
我发育缓慢,差不多到了两百年之后,查尔斯·巴比奇才把我制成了一台分析机。
在操作员用穿孔卡为我设计程序之后,我能够进行逻辑“思考”,并且能够比任何人更快地算出答案。
那时,这被当作是一次技术革命,也是我“人工智能”的开始。
在1936年,我真正的父亲,艾伦·图灵写了一本书,讲述了怎样能使我成为一台“通用机器”来解决任何数学难题。
从那时起,我在体积和脑容量方面迅速成长。
到二十世纪四十年代,我已经长得像一间屋子那么大,我不知道是否还会长得更大。
然而,这个现实也使我的设计者很担心。
随着时间的推移,我被做的越来越小。
自二十世纪七十年代以来,我一直被用在办公室和家庭里,先是用作个人电脑,后来又做成便携式。
这些变化只有随着我的存储能力的不断提高才能成为可能。
最初是被存储到电子管,以后是晶体管上,后来是非常小的芯片上。
因此,我已经完全改变了我的形状。
随着我年龄越来越大,我也变得越来越小。
随着时间的推移,我的记忆能力发展的如此之快,就像一头大象一样,我从来不会忘记告诉我的任何事情!我的存储能力变得如此巨大,连我自己都不能相信!但是我总是孤孤单单地站在那里,直到二十世纪六十年代初,人们才给了我一个用网络联成的家庭。
我能够通过万维网和其他人分享我的知识。
从二十世纪七十年代起,我被开发出了很多新的用途。
我在通讯、金融和商业领域变得非常重要。
我还被放在机器人里面,被用来制作移动手机,并且用来帮助做医疗手术。
我还被放置在航空火箭里去探测月球和火星。
不管怎样,我的目标是给人类提供高质量的生活。
现在我充满了幸福感,因为我是人类忠实的朋友并时时给他们提供帮助。
Who Am I我是谁?Over time I have been changed quite a lot.经过一段时间我已经被改变了许多。
计算机英语第三版A篇1 2 3 6 7 12单元课后第一题翻译
计算机英语第三版A篇1 2 3 6 7 12单元课后第一题翻译Unit 11。
根据许多历史学家,现代数字计算机的真正先驱者是查尔斯・巴贝奇和奥古斯塔?埃达?拜伦2。
数字计算机通常是由五种不同的元件组成:中央处理器、输入设备、存储设备,输出设备,总线。
3。
微处理器工作在一个中央处理器的一个芯片上。
这使得在1970年中期年代引进的大规模集成电路和超大规模集成电路的成为可能。
4。
根据课文,现代数字计算机根据成本和性能可分为四大类。
他们是微型计算机、工作站、小型计算机和大型机。
5。
第一批电子计算机,如分别由英国和美国创造的巨人和电子数字积分计算机,使用后来被晶体管给所代替的真空管。
6。
一个程序就是一系列能被电脑执行指令。
它可以被内嵌在硬件本身里,或以软件的形式独立存在。
7。
最小的计算机信息处理单元是二进制数字的缩写――位。
八个位元构成一个字节。
8。
计算机发展的趋势是微小型化,亦即将越来越多的电路元件压缩在越来越小的芯片空间内的努力Unit 21。
计算机硬件的功能一般分为三个主要类别。
他们是输入、输出和存储。
2。
输入与输出硬件的交互是由基本输入/输出系统(BIOS)软件控制的。
3。
这两个最常见的扫描仪是平板扫描仪和手持式扫描仪。
4。
视频显示器通常采取两种形式。
他们是阴极射线管视频屏幕和液晶显示视频屏幕。
5。
在课文中,作者提到的最常用的三种类型的打印机。
他们是点阵式打印机、激光打印机和喷墨打印机。
6。
根据课文,两个主要类型的存储设备是磁盘驱动器和存储器。
7。
可以这样说,有一个稳定的电源对于计算机来说是很重要的因为随机存储器是易失性存储器。
8。
串行连接一次只能传送一段数据然而并行连接可以同时传送数个信息块。
Unit 31。
编程语言是用于编写最终可由计算机处理和运行的一系列指令的人工语言。
2。
我们可以把编程语言分为两种类型:低级语言和高级语言。
3。
机器语言是一种以二进制代码的形式能被计算机直接处理和执行的低级语言。
计算机专业英语 第三版
be very targeted .
微软,IT行业的领导者, 为该行业工作的专业人员 开发出大量的认证项目。 这些认证项目允许你决定 哪些证书是适当的,最适 合你的职业。有超过两百 万IT专业人士具有微软认 证。你能加入他们的行列, 具有微软认证将大大地提 高你的职业能力。值得注 意的是,微软已经调整他 们的项目使其更具针对性。
programs allow you to decide
which certification is
appropriate and best suited for
your career. There are over 2
msoft Certification. You can
Microsoft Certification
❖ MCSE certification (Microsoft Certified Systems Engineer) is an industry standard targeted at the IT professional and provides the skills and training needed to design and implement infrastructure functions based on the Microsoft Windows platform and Microsoft server software such as MCSE Messaging and Security.
❖ 微软认证——系统管理员是为需要掌握基于桌面和服 务器操作系统下管理系统环境技能与知识的IT专业人 员设计的认证。该培训注重管理和解决系统环境问题。 具有这一层次的认证,你就可以从是像MCSA安全和 信息等专业工作。
Exercises[共3页]
82英语中,so that既可以引导一个目的状语从句,也可以引导一个结果状语从句。
请看下例:We asked the professor to speak louder so that we could hear him.我们请教授讲话声再大一些,以便让我们能听清。
(目的状语从句)Mary didn’t plan her time well, so that she didn’t finish the work in time.玛利没有把时间计划好,结果没有按时完成这项工作。
(结果状语从句)[4] In any computer system but especially in personal computers, a file is an entity of data available to system users (including the system itself and its application programs) that is capable of being manipulated as an entity (for example, moved from one file directory to another).本句中,available to system users是一个现在分词短语,作定语,修饰和限定an entity of data。
that is capable of being manipulated as an entity是一个定语从句,也修饰和限定an entity of data。
[5] The organization of data in the record is usually prescribed by the programming language that defines the record’s organization and/or by the application that processes it.本句中,and/or连接了by引导的两个方式状语。
计算机英语第三版(课文翻译+课后答案)
Unit One/Section AI.Fill in the blanks with the information given in the text:1.Charles Babbage;Augusta Ada Byron2.input;output3.VLSI4.workstations;mainframes5.vacuum;transistors6.instructions;software7.digit;eight;byte8.microminiaturization;chipII.Translate the following terms or phrases from English into Chinese and vice versa:1.artificial intelligence人工智能2.paper-tape reader纸带阅读器3.optical computer光计算机4.neural network神经网络5.instruction set指令集6.parallel processing并行处理7.difference engine差分机8.versatile logical element通用逻辑元件9.silicon substrate硅衬底10.vacuum tube真空管11.数据的存储与处理the storage and handling of data12.超大规模集成电路very large-scale integrated circuit13.中央处理器central processing unit14.个人计算机personal computer15.模拟计算机analogue computer16.数字计算机digital computer17.通用计算机general-purpose computer18.处理器芯片processor chip19.操作指令operating instructions20.输入设备input deviceIII.Fill in each of the blanks with one of the words given in the following list,makingchanges if necessary:We can define a computer as a device that accepts input,processes data,stores data,andproduces output.According to the mode of processing,computers are either analog or digital.They can also be classified as mainframes,minicomputers,workstations,or microcomputers.All else(for example,the age of the machine)being equal,this categorization provides someindication of the computer’s speed,size,cost,and abilities.Ever since the advent of computers,there have been constant changes.First-generationcomputers of historic significance,such as UNIVAC(通用自动计算机),introduced in theearly 1950s,were based on vacuum tubes.Second-generation computers,appearing in theearly 1960s,were those in which transistors replaced vacuum tubes.In third-generationcomputers,dating from the 1960s,integrated circuits replaced transistors.In fourth-generationcomputers such as microcomputers,which first appeared in the mid-1970s,large-scaleintegration enabled thousands of circuits to be incorporated on one chip.Fifth-generationcomputers are expected to combine very-large-scale integration with sophisticated approachesto computing,including artificial intelligence and true distributed processing.IV.Translate the following passage from English into Chinese:计算机将变得更加先进,也将变得更加容易使用。
计算机专业英语课文的翻译 中文 (3)[4页]
第3单元软件第一部分听力和对话对话:使用多媒体编辑软件制作电子相册(今天是国庆假日后的第一天,Henry在大厅里遇见了Mark.)Henry: 你好,Mark。
国庆假期过得怎么样?Mark: 非常棒!在假期里我和我的家人去了杭州。
那是一座非常美丽的城市,我们照了许多照片并且用DV拍了许多视频。
Henry: 真的吗?听起来真让人兴奋!所有的这些都将是美好的记忆。
我觉得你可以用这些材料将你在杭州的旅程做成电子相册。
这样你可以在任何时刻在电脑上看到它。
此外,如果你喜欢,你可以将它发布在博客上让更多的人分享你的快乐。
Mark: 噢,这是个好主意!但是我不知道怎样去做。
你愿意帮助我吗?Henry: 抱歉,我也是个外行。
但Sophie很擅长多媒体编辑软件,或许她能帮助你。
Sophie: 根据我的经验,图像软件是必不可少的,Mark。
它能帮助你创建、处理和打印图形。
Henry: 它分很多类型,对吧?Sophie: 是的,它包括绘画软件、照片编辑软件、制图软件、3D图形软件、CAD软件、以及演示软件等。
然而,对于你的情况,Mark,Photoshop这样的照片编辑软件就足够了。
Mark: 噢,是的,我听说过这个非常棒的照片编辑软件。
那这些视频呢?Sophie: 别担心,你可以用视频编辑软件编辑这些视频。
它提供了从摄像机传输视频片段到电脑的工具,,裁减掉不想要的片段,按序列拼接视频片段,添加特殊的视觉效果和音轨。
Henry: 我听说一个名叫Adobe Premiere的这种类型的软件。
Sophie: 没错!除此之外,DVD制作软件提供了能够制作好莱坞风格菜单的工具。
例如,Sonic DVDit、ULead DVD MovieFactory、Apple iDVD,以及Adobe Encore DVD。
Mark: 非常感谢你有益的指导,Sophie。
你能告诉我一些怎样使用它们制作电子相册的细节吗?Sophie: 没为题,如果你有时间,我可以为你展示怎样使用这类型的软件。
计算机专业英语第3版unit3
2011-5-16
计算机专业英语(第3版)
1
3.1 Multimedia
As the name suggests, multimedia is a set of more than one media element used to produce a concrete and more structured way of communication. With growing and very fast changing information technology, multimedia has become a crucial part of computer world.
计算机专业英语(第3版) 11
Notes
[1] As a multimedia programmer, you can choose what font to display text in, how big (or small) it should be, and what color it should be displayed in. “As a multimedia programmer”作状语, “what …, how…, what…”是并列的宾语从句。 译文:一个多媒体程序员可以选择要显示文本的字 体、字号大小以及颜色。
Unit 3 Multimedia and Its Applications
3.1 3.2 3.3 3.4 3.5 Multimedia Computer Graphics and Images Computer Aided Design Computer Animation Multimedia Software
2011-5-16
计算机专业英语(第3版)
计算机英语实用教程(第三版)课件-unit3
计算机英语实用教程
(第三版)
Unit 3 Memory
退出
New WordsNew Βιβλιοθήκη ordsNew Words
New Words
Phrases
Phrases
Abbreviations
Notes
Notes
Notes
Notes
Text A参考译文
Text A参考译文
Text A参考译文
Text A参考译文
Text A参考译文
Exercises
请做课后练习 答案在第二版的附录中
推荐参考图书
《计算机英语教程》,北京,人民邮电出版社:国家级十五规划教材 《电脑英语掌中宝》,南京,东南大学出版社:获“华东地区大学出版社教材专著二等奖” 《计算机专业英语教程》,北京,高等教育出版社 《电子商务专业英语教程》,北京,高等教育出版社 《电脑英语五周通》,西安,西安电子科技大学出版社 《电脑英语词汇通》,北京,人民邮电出版社 《计算机实用英语》,西安,世界图书出版公司 《计算机专业英语教程》,北京,清华大学出版社 《电子商务专业英语教程》,北京,清华大学出版社 《信息管理专业英语教程》,北京,清华大学出版社 《电气工程专业英语教程》,北京,清华大学出版社 《电子商务专业英语实用教程》,杭州,浙江大学出版社 《计算机专业英语教程》,北京,科学出版社 《饭店酒店管理专业英语教程》,北京,清华大学出版社 《法律专业英语教程》,北京,清华大学出版社 《旅游专业英语教程》,北京,清华大学出版社 《大学英语听说新体验(带mp3光盘)》,杭州,浙江大学出版社 《大学英语学习指南》,北京,外语教学与研究出版社 《大学体验英语学与练》(丛书,四册),天津,南开大学出版社 《大学体验英语词汇通》,天津,南开大学出版社
计算机英语(课文内容翻译15分)
计算机英语课文内容翻译( 15 分)CHAPTER 11.1We build computer to solve problems. Early computer solved mathematical and engineering problems ,and later computers emphasized information processing for business applications. Today, computers alsocontrol machines as diverse as automobile engines, robots, and microwave ovens. A computer system solves a problem from any of these domains by accepting input, processing it, and producing output. Figure 1-1illustrates the function of a computer system.Figure 1-2 shows these componentsin a block diagram. The lines between the blocks represent the flow of information flows from one component to another on the bus, which is simply a group of wires connecting the components. Processing occursin the CPU and main memory. The organization in Figure 1-2, with the components connectedto each other by the bus,is common. However, other configurations are possible as well.The classification just described is basedon physical size as opposed to storage size. A computer system user is generally more concerned with storage size, because thaist a more direct indication of the amount ofuseful work that the hardware can perform.Speed of computationis another characteristic that is important to the user. Generally speaking, users want a fast CPU and large amounts of storage, but a physically small machinefor the I/O devices and main memor.y1.2A processor is a functional unit that interprets and carries out instructions. Every processorcomes with a unique set of operations such as ADD, STORE, or LOAD that represent the processor set. Computers ins designers arefond of calling their computers machines, so theinstruction set is sometimes referred to asmachine instructions and the binary language in which they are written is called machine language! [1] You shouldn 'ctonfuse the processor 'in s truction set with the instructions found in high-level programming languages, such as BASIC or Pascal.The control unit is the functional unit that is responsible for supervising the operation of the entire computer system. In some ways, it is analogous to a telephoneswitch-board with intelligence becauseit makes the connections betweenvarious functional units of the computer system and calls into operation each unit that is required by the program currently in operationThe arithmetic and logic unit (ALU) is the functional unit that provides the computer with logical and computational capabilities. Data are brought into the ALU by the control unit, and the ALU performs whatever arithmetic or logic operations are required to help carry out the instruction1.3Below the L1 cache is the Level 2,or L2 cache. In today ' s P-ecnlatisusmprocessors ,the L2 cacheis usually on the processor chipitself .In fact ,If you could lift the lid of a Pentium or Athlon processor and look atthe silicon die itself under a microscope you might be surprised to find that the biggest percentage of chip areawas taken up by the cache memoriesBelow the L1 cache is the Level 2,or L2 cache. In today 's Pen-ticulamss processors ,the L2 cacheisusually on the processor chipitself .In fact ,If you could lift the lid of a Pentium or Athlon processor and look atthe silicon die itself under a microscope you might be surprised to find that the biggest percentage of chip area was taken up by the cache memorie[s.The virtual memory interface is shown in Fig.1-6. A real memory of 16M bytes and a virtual memory of 2G bytes are shown for illustration; many modern virtual memory systems are much larger than this. Virtual-memory space is divided into equal-sized groups called pages. A page in a modern computer is 1K, 2K, or 4K bytes. Real memory is also divided into the same equal-sizedgroups, called page frames. When information is moved between virtual-memory space and real-memory space, a complete page is moved.Section 3 discussed how virtual memory extends the address spaceof a processor. However, the latency of real memory is too long to support high-performance processors.Even with the high-speed DRAMs used today for real memory, something must be done to overcome this latency problem.CHAPTER 22.1Multiprogramming, which was developed to improve performance, also allows time sharing. Time shared operating systems allow many users (from one to several hundred) to use a computer system inter-leavingly at the same time. Other operating systems types include real time systems and multiprocessor systems.The management of resources in a computer system is another major concern of the operating system. Obviously, a program cannot use a device if that hardwareis unavailable. As we have seen, the operational software oversees the execution of all programs. It also monitors the devices being used. To accomplish this, it establishes a table in which programs are matched against the devices they are using or will use .The operating system checks this table to approve or deny use of a specific device.In effect , the program undergoing execution signals the operating system that an I/O operation is desired, using a specific I/O device. The controlling software calls on the IOCS software to actually complete the I/O operation. Considering the level of I/O activity in most programs, the IOCS instructions are extremely vital.CHAPTER 33.1Selecting a PC for home or business use must begin with the all-important question “What do I want the system to do?” Once you' ve determined what tasks the system will be used for, you must choose among the software and hardware alternatives available. If yo'ure not really sure what you want a system to do, you should think twice about buying one. Computer systems that are configured to match the requirements of certain applications (such as preparing a novel) often perform poorly at ot hers (playing power-hungry multimedia games, for example). You can easily make expensive mistakes if yo'u re uncertain about what you want a system to do.When you take possession of a new computer system, you should find that most of the hardware and software you need are alreadyin place. You' ll need to connect the components and start the systemup;then, you' ll be off and running. If your system does not include a piece of hardware or software that you want itto have, you can usually buy and install it yourself relatively easily.A final, but optional, step in setting up your new system is customizing the settings. Most PCs include options for background images, color schemes, themes, screen savers, screen resolution, the order of items on the menus, and soforth. In Windows, the desktop options are accessible through the Control Panel, as shown in Fig.3-1, You can also use the Control Panel to set up your network and Internet settings.3.2The Windows desktop appears on thescreen after a computerusing the Windows operating system has completed the boot process. The desktop is where documents, folders, programs, and other objects are displayed when they are being used, similar to the way documents and file folders are laid on a desk when they are being used. Thought the appearanceof the Windows desktop can be customized, all desktops contain common elements, such as desktop icons, the taskbar, the Start button, windows, and task buttons (see Fig.3-2).The principle component of the GUI is the window. As mentioned earlier, a window is a rectangular area of information that is displayed on the screen. These windows can contain programs and documents, as well as menus, dialog boxes,icons, and a variety of other types of data.A menu is a set of options--usually text based—from which the user can choose to initiate a desiredaction in a program. At the top of many windows is a menu bar showing the main menu categories (see Fig.3-2). Pull-down menus (also called drop--down menus) display on the screen when the user selects an item on the menu bar. As shown on the right-most screen in Fig.3-2, in some Microsoft programs (such as Windows and someversions of Microsoft Office) a feature called personalizedmenus can be used.CHAPTER 44.1The OSI model is shown in Fig.4-1 (minus the physical medium). This model is based on a proposal developed by the International Standards Organization (ISO) as the first step toward international standardization of the protocols used in the various layers. The model is called the ISO OSI (Open System Interconnection) Reference Model because it deals with connecting open systems—that is, systems that are open for communication with other systems.There are two end-to-end protocols in the transport layer, one of which is TCP (Transmission Control Protocol), another is UDP (User Datagram Protocol). TCP is a connection-oriented protocol that allows a byte stream originating on one machine to be delivered without error on any other machine in the internet.UDP is an unreliable, connectionless protocol for applications that do not want TCP ' s s of flow control and wish to provide their own.The network layer defines an official packet format and protocol called IP (Internet Protocol). The job of the network layer is to deliver IP packets where they are supposed to go.4.2The most widespread topology for LANs designed to function as data communication for theinterconnection of local computer-basedequipment is the star topology, in which the major equipments used to connect a variety of computer-based devices arehubs or switches. Typical LAN product of using the star topology is the most famous Ethernet, which dominates the LAN world toda.yThe 100Base-T Ethernet which is known as Fast Ethernet has the same topology as 10Base-T showing in Fig.4-3. Using this topology, we can build a fast Ethernet and need NICs of 100Mb/s and hub of 100Mb/s and don' t need cabling any more .Switches are basically multi-port bridges, but share some characteristics with routers.Like routers, switches work by dividing up the network into a number of segments, each of which can operate without interference from traffic local to any of the other segments.Switching is performed at layer 2 of the seven-layer model-the same as bridging. Since it is performed at layer 2, the MAC address is used, which is independent of protocol address. Like a bridge, a switch learns which address reside on each of its ports and then switches data appropriately. A switch can be designed using conventional microprocessors or dedicated ASIC (Application-Specific Integrated Circuit) technology.CHAPTER 55.1ARPAnet is abbreviated from “ AdvancedResearch Projects Agency Network ” .Landmark packet-switching network established in 1969. ARPAnet was developed in the 197s0 by BBN and funded by ARPA.It eventually evolved into the Internet. The term ARPAnet was officially retired in 1990.There are two kinds of E-mail protocol used in the Internet. One is Simple Mail Transfer Protocol (SMTP) which accepts incoming connections and copies messagesfrom them into the appropriate mailboxes . Another is Post Office Protocol-3 (POP3) which fetches E-mail from the remote mailbox and stores it on the user ' s local machine to be read later.Telnet is used for remote terminal connection, enabling usersto log in to remote systems and use resources as if they were connected to a local system.5.2Mobile Web use-or wireless Web, as it is frequently referred to-is one of the fastest growing Web applications today. Notebook and handheld devicesfrequently use attached or built-in modems to access the Internet; most mobile phones and pagers have Internet connectivity built in.Another type of dial-up connection is ADSL which is the most common way to access the Internet today. Sometimes ADSL is called as broadband accessing, because it provides more wide bandwidth than that the regular modem provides.Unlike satellite and fixed wireless connections, which use a cable to connect the modem to some type of fixed transceiver, mobile wireless connections allow the device to be moved from place to place. Consequently, most handheld PCs and othermobile devices (like Web-enable cell phones) use a mobile wireless connection and access the Internet through the same wireless network as cell phones and messaging devices.CHAPTER 66.1Until now there has always been a clear division between public and private networks. A public network,like the public telephone system and the Internet, is a large collection of unrelated peers that exchange information more or less freely with each other. The people with access to the public network may or may not have anything in common, and any given person on that network may only communicate with a small fraction of his potential users.Using the Internet for remote accesssaves a lot of money. You'll be able to dial in wherever your Internet service provider (ISP) has a point-of-presence (POP). If you choose an ISP with nationwide POPs, there's a good chance your LAN will be a local phone call away. Some ISPs have expanded internationally as well, or have alliances with ISPs overseas. Even many of the smaller ISPs have toll-free numbers for their roaming users. At the time of this writing, unlimited access dial-up PPP accounts, suitable for business use, are around $25 per month per user.At any rate, well-chosen ISP accounts should be cheaper than settingup a modem pool for remote users and paying thelong-distance bill for roaming users.Eventoll-free access from an ISP is typically cheaper than having your own toll-free number, because ISPs purchase hours in bulk from the long-distance companies.Using our previous example of the customer databasei,t 's easy to seehow a VPN could expand the Intranet application's functionality. Suppose most of your salespeople are on the road, or work from home. There's no reason why they shouldn't be able to use the Internet to access the Web server thahtouses the customer database application. oYu don't want just anyone to be able to access the information, however, and you're also worried about the information itself flowing unencrypted over the Internet. A VPN can provide a secure link between the salesperson's laptop and the Intranet web server running the database, and encrypt the data going between them. VPNsgive you flexibility, and allow practically any corporate network service to be used securely across the Internet.6.2For some time now, large business enterprises have used electronic commerce to conduct their business-to-businesstransactions. Electronic data interchange (EDI) on private networks began in the 1960s, and banks have been using dedicated networkfsor electronic funds transfer (EFT) almost aslong. Recently, however, with the increased awareness and popularity of the Internet, electronic commerce has come to encompass individual consumers as well as businesses of all sizes.To many, electronic commerce is defined as the buying and selling of products and services over the Internet, but there are many more aspects. From its inception, electronic commerce had included the handling of purchase transactions andfunds transfers over computernetworks. Its gr'own now to include the buying and selling of new commodities such as electronic information. And the opportunities for companies seeking to take advantage of thecapabilities of electronic commerce are greater than merely adopting our present view of commerce to performing those same transactions over electronic networks.Electronic commerce is a system that includes not only those transactions that center on buying and selling goods and servicesto directly generate revenue, but alsothose transactions that support revenue generation, such asgenerating demandfor those goods and services, offeringsales support and customer service (see Fig.6-1), or facilitating communications between business partners.。
计算机专业英语(第3版)
2020/8/16
计算机专业英语(第3版)
8
The control unit (控制单元 )
➢ The control unit is the functional unit that is responsible for supervising the operation of the entire computer system.
形图像、CAD、计算机动画和多媒体应用软件。第 4单元是计算机网络相关知识介绍,包括计算机网
络基础、互联网搜索引擎、无线网络技术及网络安
全。第5单元讲述电子商务方面的内容,有电子商 务基础、EDI和网络广告。第6单元是计算机领域 新技术介绍,包括人工智能、虚拟现实和神经网络。
2020/8/16
计算机专业英语(第3版)
➢ 控制单元是负责监督整个计算机系统操作的功能部件。
➢ The control unit fetches instructions from memory and determines their type or decodes them.
➢ 控制单元从存储器中取出指令,并确定其类型或对之进行译码。
➢ 中央处理器是计算机系统的心脏。它负责实现由程序启动 的全部算术运算和逻辑判断。
➢ The CPU coordinates all the activities of the various components of the computer. It determines which operations should be carried out and in what is the order.
➢ 中央处理器协调计算机各个部件的所有活动。它确定应该 以什么顺序执行哪些操作。
计算机专业英语第3版unit1
Hardware composition
输入 标题
02
01
04
03
Central Processing Unit
The CPU is the heart of the computer system, responsible for executing instructions and manipulating data.
Device drivers
02
a set of programs that allow the operating system to control peripheral devices, such as printers, scanners, and mice.
File management systems
The internet uses a combination of hardware and software to connect computers and devices together, enabling them to communicate and exchange data.
The internet has revolutionized the way we communicate, access information, and conduct business, making it an integral part of modern life.
Output devices include monitors, printers, speakers, and headphones.
Common input devices include keyboards, mice, trackpads, touchscreens, and scanners.
计算机专业英语第3版unit1
02.02.2021
计算机专业英语(第3版)
10
The steps of executing each instruction
02.02.2021
计算机专业英语(第3版)
4
Block diagram of a digital computer
02.02.2021
计算机专业英语(第3版)
5
Three basic capabilities of computers
First, computers have circuits for performing arithmetic operations, such as: addition, subtraction, division, multiplication and exponentiation.
译文:例如,一条指令要完成两数相加的操作,它就必须知 道:这两个数是什么?这两个数在哪儿?
02.02.2021
计算机专业英语(第3版)
17
Notes
[5] A timer called a clock releases precisely timed electrical signals that provide a regular pulse for the processor’s work. 本句中的“that provide a regular pulse for the processor’s work”修饰electrical signals。
计算机英语(课文内容翻译15分)
计算机英语课文内容翻译(15分)CHAPTER 11.1We build computer to solve problems. Early computer solved mathematical and engineering problems , and later computers emphasized information processing for business applications. Today, computers also control machines as diverse as automobile engines, robots, and microwave ovens. A computer system solves a problem from any of these domains by accepting input, processing it, and producing output. Figure 1-1 illustrates the function of a computer system.Figure 1-2 shows these components in a block diagram. The lines between the blocks represent the flow of information flows from one component to another on the bus, which is simply a group of wires connecting the components. Processing occurs in the CPU and main memory. The organization in Figure 1-2, with the components connected to each other by the bus, is common. However, other configurations are possible as well.The classification just described is based on physical size as opposed to storage size. A computer system user is generally more concerned with storage size, because that is a more direct indication of the amount of useful work that the hardware can perform.Speed of computation is another characteristic that is important to the user. Generally speaking, users want a fast CPU and large amounts of storage, but a physically small machine for the I/O devices and main memory.1.2A processor is a functional unit that interprets and carries out instructions. Every processor comes with a unique set of oper ations such as ADD, STORE, or LOAD that represent the processor’s instruction set. Computer designers are fond of calling their computers machines, so the instruction set is sometimes referred to as machine instructions and the binary language in which they are written is called machine language! [1]You shouldn’t confuse the processor’s instruction set with the instructions found in high-level programming languages, such as BASIC or Pascal.The control unit is the functional unit that is responsible for supervising the operation of the entire computer system. In some ways, it is analogous to a telephone switch-board with intelligence because it makes the connections between various functional units of the computer system and calls into operation each unit that is required by the program currently in operationThe arithmetic and logic unit (ALU) is the functional unit that provides the computer with logical and computational capabilities. Data are brought into the ALU by the control unit, and the ALU performs whatever arithmetic or logic operations are required to help carry out the instruction1.3Below the L1 cache is the Level 2,or L2 cache. In today’s Pentium-class processors ,the L2 cache is usually on the processor chip itself .In fact ,If you could lift the lid of a Pentium or Athlon processor and look at the silicon die itself under a microscope you might be surprised to find that the biggest percentage of chip area was taken up by the cache memoriesBelow the L1 cache is the Level 2,or L2 cache. In today’s Pentium-class processors ,the L2 cache is usually on the processor chip itself .In fact ,If you could lift the lid of a Pentium or Athlon processor andlook at the silicon die itself under a microscope you might be surprised to find that the biggest percentage of chip area was taken up by the cache memories.[The virtual memory interface is shown in Fig.1-6. A real memory of 16M bytes and a virtual memory of 2G bytes are shown for illustration; many modern virtual memory systems are much larger than this. Virtual-memory space is divided into equal-sized groups called pages. A page in a modern computer is 1K, 2K, or 4K bytes. Real memory is also divided into the same equal-sized groups, called page frames. When information is moved between virtual-memory space and real-memory space, a complete page is moved.Section 3 discussed how virtual memory extends the address space of a processor. However, the latency of real memory is too long to support high-performance processors. Even with the high-speed DRAMs used today for real memory, something must be done to overcome this latency problem.CHAPTER 22.1Multiprogramming, which was developed to improve performance, also allows time sharing. Time shared operating systems allow many users (from one to several hundred) to use a computer system inter-leavingly at the same time. Other operating systems types include real time systems and multiprocessor systems.The management of resources in a computer system is another major concern of the operating system. Obviously, a program cannot use a device if that hardware is unavailable. As we have seen, the operational software oversees the execution of all programs. It also monitors the devices being used. To accomplish this, it establishes a table in which programs are matched against the devices they are using or will use .The operating system checks this table to approve or deny use of a specific device.In effect , the program undergoing execution signals the operating system that an I/O operation is desired, using a specific I/O device. The controlling software calls on the IOCS software to actually complete the I/O operation. Considering the level of I/O activity in most programs, the IOCS instructions are extremely vital.CHAPTER 33.1Selecting a PC for home or business use must begin with the all-important question “What do I want the system to do?”Once you’ve determined what tasks the system will be used for, you must choose among the software and hardware alternatives available. If you’re not really sure what you want a system to do, you should think twice about buying one. Computer systems that are configured to match the requirements of certain applications (such as preparing a novel) often perform poorly at others (playing power-hungry multimedia games, for example). You can easily make expensive mistakes if you’re uncertain about what you want a system to do.When you take possession of a new computer system, you should find that most of the hardware and software you need are already in place. You’ll need to connect the components and start the system up;then, you’ll be off and running. If your system does not include a piece of hardware or software that you want it to have, you can usually buy and install it yourself relatively easily.A final, but optional, step in setting up your new system is customizing the settings. Most PCs include options for background images, color schemes, themes, screen savers, screen resolution, the order of items on the menus, and so forth. In Windows, the desktop options are accessible through the Control Panel, as shown in Fig.3-1, You can also use the Control Panel to set up your network and Internet settings.3.2The Windows desktop appears on the screen after a computer using the Windows operating system has completed the boot process. The desktop is where documents, folders, programs, and other objects are displayed when they are being used, similar to the way documents and file folders are laid on a desk when they are being used. Thought the appearance of the Windows desktop can be customized, all desktops contain common elements, such as desktop icons, the taskbar, the Start button, windows, and task buttons (see Fig.3-2).The principle component of the GUI is the window. As mentioned earlier, a window is a rectangular area of information that is displayed on the screen. These windows can contain programs and documents, as well as menus, dialog boxes,icons, and a variety of other types of data.A menu is a set of options--usually text based—from which the user can choose to initiate a desiredaction in a program. At the top of many windows is a menu bar showing the main menu categories (see Fig.3-2). Pull-down menus (also called drop--down menus) display on the screen when the user selects an item on the menu bar. As shown on the right-most screen in Fig.3-2, in some Microsoft programs (such as Windows and some versions of Microsoft Office) a feature called personalized menus can be used.CHAPTER 44.1The OSI model is shown in Fig.4-1 (minus the physical medium). This model is based on a proposal developed by the International Standards Organization (ISO) as the first step toward international standardization of the protocols used in the various layers. The model is called the ISO OSI (Open System Interconnection) Reference Model because it deals with connecting open systems—that is, systems that are open for communication with other systems.There are two end-to-end protocols in the transport layer, one of which is TCP (Transmission Control Protocol), another is UDP (User Datagram Protocol). TCP is a connection-oriented protocol that allows a byte stream originating on one machine to be delivered without error on any other machine in the internet.UDP is an unreliable, conne ctionless protocol for applications that do not want TCP’s sequencing of flow control and wish to provide their own.The network layer defines an official packet format and protocol called IP (Internet Protocol). The job of the network layer is to deliver IP packets where they are supposed to go.4.2The most widespread topology for LANs designed to function as data communication for the interconnection of local computer-based equipment is the star topology, in which the major equipments used to connect a variety of computer-based devices are hubs or switches. Typical LAN product of using the star topology is the most famous Ethernet, which dominates the LAN world today.The 100Base-T Ethernet which is known as Fast Ethernet has the same topology as 10Base-T showing in Fig.4-3. Using this topology, we can build a fast Ethernet and need NICs of 100Mb/s and hub of 100Mb/s and don’t need cabling any more .Switches are basically multi-port bridges, but share some characteristics with routers. Like routers, switches work by dividing up the network into a number of segments, each of which can operate without interference from traffic local to any of the other segments. Switching is performed at layer 2 of the seven-layer model-the same as bridging. Since it is performed at layer 2, the MAC address is used, which is independent of protocol address. Like a bridge, a switch learns which address reside on each of its ports and then switches data appropriately. A switch can be designed using conventional microprocessors or dedicated ASIC (Application-Specific Integrated Circuit) technology.CHAPTER 55.1ARPAnet is abbreviated from “Advanced Research Projects Agency Network”. Landmark packet-switching network established in 1969. ARPAnet was developed in the 1970s by BBN and funded by ARPA.It eventually evolved into the Internet. The term ARPAnet was officially retired in 1990.There are two kinds of E-mail protocol used in the Internet. One is Simple Mail Transfer Protocol (SMTP) which accepts incoming connections and copies messages from them into the appropriate mailboxes . Another is Post Office Protocol-3 (POP3) which fetches E-mail from the remote mailbox and stores it on the user’s local machine to be read later.Telnet is used for remote terminal connection, enabling users to log in to remote systems and use resources as if they were connected to a local system.5.2Mobile Web use-or wireless Web, as it is frequently referred to-is one of the fastest growing Web applications today. Notebook and handheld devices frequently use attached or built-in modems to access the Internet; most mobile phones and pagers have Internet connectivity built in.Another type of dial-up connection is ADSL which is the most common way to access the Internet today. Sometimes ADSL is called as broadband accessing, because it provides more wide bandwidth than that the regular modem provides.Unlike satellite and fixed wireless connections, which use a cable to connect the modem to some type of fixed transceiver, mobile wireless connections allow the device to be moved from place to place. Consequently, most handheld PCs and other mobile devices (like Web-enable cell phones) use a mobile wireless connection and access the Internet through the same wireless network as cell phones and messaging devices.CHAPTER 66.1Until now there has always been a clear division between public and private networks. A public network, like the public telephone system and the Internet, is a large collection of unrelated peers that exchange information more or less freely with each other. The people with access to the public network may or may not have anything in common, and any given person on that network may only communicate with a small fraction of his potential users.Using the Internet for remote access saves a lot of money. You’ll be able to dial in wherever your Internet service provider (ISP) has a point-of-presence (POP). If you choose an ISP with nationwide POPs, there’s a good chance your LAN will be a local phone call away. Some ISPs have expanded internationally as well, or have alliances with ISPs overseas. Even many of the smaller ISPs have toll-free numbers for their roaming users. At the time of this writing, unlimited access dial-up PPP accounts, suitable for business use, are around $25 per month per user.At any rate, well-chosen ISP accounts should be cheaper than setting up a modem pool for remote users and paying the long-distance bill for roaming users.Even toll-free access from an ISP is typically cheaper than having your own toll-free number, because ISPs purchase hours in bulk from the long-distance companies.Using our previous example of the customer database, it’s easy to see how a VPN could expand the Intranet application’s functionality. Suppose most of your salespeople are on the road, or work from home. There’s no reason why they shouldn’t be able to use the Internet to access the Web server that houses the customer database application. You don’t want just anyone to be able to access the information, however, and you’re also worried about the information itself flowing unencrypted over the Internet. A VPN can provide a secure link between the salesperson’s laptop and the Intranet web server running the database, and encrypt the data going between them. VPNs give you flexibility, and allow practically any corporate network service to be used securely across the Internet.6.2For some time now, large business enterprises have used electronic commerce to conduct their business-to-business transactions. Electronic data interchange (EDI) on private networks began in the 1960s, and banks have been using dedicated networks for electronic funds transfer (EFT) almost as long. Recently, however, with the increased awareness and popularity of the Internet, electronic commerce has come to encompass individual consumers as well as businesses of all sizes.To many, electronic commerce is defined as the buying and selling of products and services over the Internet, but there are many more aspects. From its inception, electronic commerce had included the handling of purchase transactions and funds transfers over computer networks. It’s grown now to include the buying and selling of new commodities such as electronic information. And the opportunities for companies seeking to take advantage of the capabilities of electronic commerce are greater than merely adopting our present view of commerce to performing those same transactions over electronic networks.Electronic commerce is a system that includes not only those transactions that center on buying and selling goods and services to directly generate revenue, but also those transactions that support revenue generation, such as generating demand for those goods and services, offering sales support and customer service (see Fig.6-1), or facilitating communications between business partners.。
Exercises_计算机英语(第3版)_[共2页]
244 damage could be very serious for the user, with difficulty to reach legal solutions and/or refunds if the provider resides in a state other than the user’s country.本句中,in the presence of 的意思是“在……情况下”;like misappropriation or illegal appropriation of personal data是对illegal acts的举例说明;if the provider resides in a state other than the user’s country是一个条件状语从句。
在该从句中,other than的意思是“除了;而不是”。
Exercises〖Ex. 1〗根据课文内容回答问题(1) What does cloud computing refer to?(2) What is the difference between cloud computing and the classic client-server model?(3) What does SaaS stand for? What is it used to sometimes?(4) What does performance of the cloud application depend upon?(5) What is the definition of cloud computing the National Institute of Standards and Technology (NIST) provides?(6) Why does a malfunction also affect a large number of users at once?(7) What are the associated risks cloud computing users are exposed to?(8) What is the key characteristic of cloud computing?(9) What does cloud architecture typically involve?(10) What are the two most significant components of cloud computing architecture? Describe them respectively.〖Ex. 2〗阅读下面的短文,回答问题Cloud computing is becoming one of the next industry buzz words. It joins the ranks of terms including: grid computing, utility computing, virtualization, clustering, etc.Cloud computing overlaps some of the concepts of distributed, grid and utility computing, however it does have its own meaning if contextually used correctly. The conceptual overlap is partly due to technology changes, usages and implementations over the years.Trends in usage of the terms from Google searches show cloud computing is a relatively new term introduced in the past year. There has also been a decline in general interest of Grid, Utility and Distributed computing.Likely they will be around in usage for quit a while to come. But cloud computing has become the new buzz word driven largely by marketing and service offerings from big corporate players like Google, IBM and Amazon.(1) What is becoming one of the next industry buzz words?(2) What does cloud computing overlap?(3) What is the reason the author gives for the conceptual overlap?(4) Does cloud computing have its own meaning?(5) What do trends in usage of the terms from Google searches show?。
计算机专业英语第3版unit2
1
2.1 C Language
C is a general-purpose, structured programming language. C was developed in the early 1970s. C might best be described as a “mediumlevel language.” unlike most high-level language, C lets you easily do chores additionally performed by assembly language.
2013-7-8
计算机专业英语(第3版)
5
Three ways of creating a global variable
Create a variable at the top-level with the extern storage class specifier. Create a variable at the head-of block with the extern storage class specifier. Create a variable at the top-level and omit a storage class specifier.
译文:每当程序进入变量说明块时,一个动态持续 变量就会建立。
2013-7-8 计算机专业英语(第3版) 13
Notes
[3] The run-time system initializes fixed variables only once, whereas dynamic variables, if they are declared with an initializer, are reinitialized each time their block is entered. 本句中if引导了一个条件状语从句。“whereas”是一连词, 含义是“反之;而”。 译文:实时系统只初始化一次固定变量,而对于动态变量, 若用初始程序说明,则每当进入动态变量块时,就重新初始 化。
计算机英语第三版课文翻译
第七单元:计算机通信课文A:电信与计算机电信使世界各地的人们得以互相联系,即刻获取信息,并从边远地区实施通信。
电信通常涉及一个信息发送者和一个或多个接收者,他们通过电话系统等把信息从一地发送到另一地的技术相联系。
电信设备将不同类型的信息,如声音和图像,转换成电子信号。
然后,这些信号就可以通过电话线或无线电波等媒介进行发送。
信号到达目的地后,接收端的设备将电子信号转换回可以理解的信息,如电话中的声音、电视上的活动图像或计算机屏幕上的文字和图片。
电信使人们能够在城镇不同地方、国家之间以及向外层空间和从外层空间发送和接收个人信息。
电信也为新闻、数据、信息和娱乐提供了关键的媒介。
电信信息可通过各种方式和设备发送。
信息可由一个发送者发送给一个接收者(点对点),或者由一个发送者发送给多个接收者(点对多点)。
个人通信,如两个人之间的电话对话或传真信息,通常涉及点对点的传输。
通常称为广播的点对多点电信传输,为商业无线电和电视节目播送提供了基础。
电信以信息转换为电子信号为开端。
然后,这些信号通过媒介发送到接收机,并在那里解码,恢复为接收信息的人能够理解的形式。
有各种方法可以生成并解译信号,也有许多不同方法可以传输信号。
电报机与电话机等设备,通过生成调制电脉冲或以系统化方式变化的脉冲,来传递信息。
接下来,这些脉冲通过导线、无线电波或其他媒介发送给接收机,并由其进行解调。
电报机是最早的传递电信信息的方法,它通过将电报电键与金属导体之间的接触(使电流得以流动的两个导体之间的连接)转换成电脉冲而进行工作。
这些脉冲沿着导线发送到接收机,而接收机则将这些脉冲转换成长与短的声音脉冲串,或者在简单的打印设备上打印出来的点与划。
特定的点与划序列代表字母表中的字母。
在早期的电报中,这些序列由电报机操作员进行解译。
这样,电报机操作员就可以发送和接收可拼成词语的字母。
后来的电报机能自动解译字母和数字。
电报机在很大程度上已被其他的电信形式所取代,如传真机和电子邮件,但在世界有些地方,电报机仍然用来发送信息。
计算机英语 机工版 第3版 第五单元翻译
第五单元:软件过程课文A:软件过程模型一、引言一个软件过程是生产出软件产品的一系列活动。
这些活动可能涉及使用一种像Java或C这样的标准编程语言从零开始开发软件。
然而,开发新软件越来越多地使用的方法是,扩展和修改现有系统,以及配置和集成现成软件或系统组件。
一个软件过程模型是对一个软件过程的一种抽象表示。
每个过程模型都从一个特定角度表示一个过程,因此都只提供有关那个过程的部分信息。
本文介绍几种非常通用的过程模型(有时称为过程范例),并从体系结构的角度描述它们。
也就是说,我们看到的是过程的框架,而非具体活动的细节。
这些类属模型不是对软件过程的规定性描述。
确切点说,它们是过程的抽象,可用于解释软件开发的不同方法。
你可以将其视为可扩展和调整以创建更为具体软件工程过程的过程框架。
这里论述的过程模型是瀑布模型、演化开发和基于组件的软件工程。
这3种类属过程模型在当前的软件工程实践中广泛使用。
它们不是互不相容,而是经常一起使用,尤其是在大型系统开发的情况下。
一个较大型系统内的子系统可使用不同的方法开发。
因此,尽管分别讨论这些模型比较方便,但应该明白,实际上它们经常结合使用。
二、瀑布模型最早公布的软件开发过程模型源自比较通用的系统工程过程。
这种模型如图5A-1所示。
由于从一个阶段到另一个阶段的瀑布状级联,该模型称为瀑布模型或软件生命周期。
该模型的主要阶段映射基本的开发活动:1、需求分析与定义。
系统的服务、约束和目标要经过与系统用户的磋商加以确定。
然后,它们得到详细定义并作为系统规格说明。
2、系统与软件设计。
系统设计过程将需求划分成需硬件或软件系统实现的部分。
该过程确立一个总的系统体系结构。
软件设计涉及到确定和描述基本的软件系统抽象及其相互关系。
3、实现与单元测试。
在这个阶段,软件设计被实现为一组程序或程序单元。
单元测试涉及到验证每个单元是否符合其规格说明。
4、集成与系统测试。
单个的程序单元或程序进行集成并作为一个完整系统进行测试,以确保软件需求已得到满足。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
第一单元:计算机与计算机科学课文A:计算机概览一、引言计算机是一种电子设备,它能接收一套指令或一个程序,然后通过对数字数据进行运算或对其他形式的信息进行处理来执行该程序。
要不是由于计算机的发展,现代的高科技世界是不可能产生的。
不同类型和大小的计算机在整个社会被用于存储和处理各种数据,从保密政府文件、银行交易到私人家庭账目。
计算机通过自动化技术开辟了制造业的新纪元,而且它们也增强了现代通信系统的性能。
在几乎每一个研究和应用技术领域,从构建宇宙模型到产生明天的气象报告,计算机都是必要的工具,并且它们的应用本身就开辟了人们推测的新领域。
数据库服务和计算机网络使各种各样的信息源可供使用。
同样的先进技术也使侵犯个人隐私和商业秘密成为可能。
计算机犯罪已经成为作为现代技术代价组成部分的许多风险之一。
二、历史第一台加法机是法国科学家、数学家和哲学家布莱斯.帕斯卡于1642年设计的,它是数字计算机的先驱。
这个装置使用了一系列带有10个齿的轮子,每个齿代表从0到9的一个数字。
轮子互相连接,从而通过按照正确的齿数向前转动轮子,就可以将数字彼此相加。
17世纪70年代,德国哲学家和数学家戈特弗里德.威廉.莱布尼兹对这台机器进行了改良,设计了一台也能做乘法的机器。
法国发明家约瑟夫―玛丽.雅卡尔,在设计自动织机时,使用了穿孔的薄木板来控制复杂图案的编织。
在19世纪80年代期间,美国统计学家赫尔曼.何勒里斯,想出了使用类似雅卡尔的木板那样的穿孔卡片来处理数据的主意。
通过使用一种将穿孔卡片从电触点上移过的系统,他得以为1890年的美国人口普查汇编统计信息。
1、分析机也是在19世纪,英国数学家和发明家查尔斯.巴比奇,提出了现代数字计算机的原理。
他构想出旨在处理复杂数学题的若干机器,如差分机。
许多历史学家认为,巴比奇及其合伙人,数学家奥古斯塔.埃达.拜伦,是现代数字计算机的真正先驱。
巴比奇的设计之一,分析机,具有现代计算机的许多特征。
它有一个以一叠穿孔卡片的形式存在的输入流、一个保存数据的“仓库”、一个进行算术运算的“工厂”和一个产生永久性纪录的打印机。
巴比奇未能将这个想法付诸实践,尽管在那个时代它在技术上很可能是可行的。
2、早期的计算机模拟计算机是19世纪末开始制造的。
早期型号是靠转动的轴和齿轮来进行计算的。
用任何其他方法都难以计算的方程近似数值,可以用这样的机器来求得。
开尔文勋爵制造了一台机械潮汐预报器,这实际上就是一台专用模拟计算机。
第一次和第二次世界大战期间,机械模拟计算系统,以及后来的电动模拟计算系统,在潜艇上被用作鱼雷航线预测器,在飞机上被用作轰炸瞄准具的控制器。
有人还设计了另一个系统,用于预测密西西比河流域春天的洪水。
3、电子计算机第二次世界大战期间,以伦敦北面的布莱切利公园为工作地点的一组科学家和数学家,制造了最早的全电子数字计算机之一:“巨人”。
到1943年12月,这个包含了1500个真空管的“巨人”开始运转了。
它被以艾伦.图灵为首的小组用于破译德国用恩尼格码加密的无线电报,他们的尝试大部分是成功的。
除此而外,在美国,约翰.阿塔纳索夫和克利福德.贝里早在1939年就在艾奥瓦州立学院制造了一台原型电子机。
这台原型机和后来的研究工作都是悄悄完成的,而且后来因1945年电子数字积分计算机(ENIAC)的研制而显得相形见绌。
ENIAC被授予了专利。
但是,数十年后,在1973年,当该机被揭露吸收了在阿塔纳索夫―贝里计算机中首次使用的原理后,这项专利被废除了。
图1 A - 1:E N IAC是最早的全电子数字计算机之一。
ENIAC(见图1A-1)含有18,000个真空管,具有每分钟几百次的乘法运算速度,但是,其程序最初是通过导线传送到处理器内的,必须由人工更改。
根据美籍匈牙利数学家约翰. 冯.诺伊曼的想法,后来制造的机器带有一个程序存储器。
指令像数据一样存储在“存储器”中,使计算机在执行过程中摆脱了纸带阅读器的速度限制,并使问题在不给计算机重新接线的情况下得以解决。
20世纪50年代末,晶体管在计算机中的应用,标志着比在真空管机器情况下体积小、速度快、用途广的逻辑元件的出现。
由于晶体管使用的功率小得多,寿命也长得多,仅这项发展本身就导致了被称之为第二代计算机的改良机器的产生。
元件变小了,元件的间距也变小了,而且系统的制造成本也变得低得多。
4、集成电路20世纪60年代末,集成电路(见图1A-2)得到采用,从而有可能将许多晶体管制作在一块硅衬底上,晶体管之间用覆镀在适当位置的导线相连接。
集成电路导致价格、尺寸和故障率的进一步降低。
20世纪70年代中期,随着大规模集成电路和后来的超大规模集成电路(微芯片)的采用,成千上万个彼此相连的晶体管被蚀刻在一块硅衬底上,于是微处理器成为现实。
图1 A - 2:集成电路那么,再回过头来看看现代计算机处理开关值的能力:20世纪70年代的计算机一般一次能够处理8个开关值。
也就是说,在每个循环中,它们能处理8个二进制数字或位的数据。
8 个位为一组,称为一个字节;每个字节包含256个开与关(或0与1)的可能模式。
每个模式相当于一条指令、一条指令的一部分或者一个特定的数据类型,如一个数字、一个字符或一个图形符号。
例如,11010010这个模式可能是二进制数据——在此情况下代表210这个十进制数字,或者它可能是一条指令,告诉计算机将存储在其交换设备中的数据与存储在存储芯片某个位置的数据进行比较。
一次能处理16、32和64位数据的处理器的研制,提高了计算机的速度。
一台计算机能够处理的全部可识别模式——操作总清单——称为其指令集。
随着现代数字计算机的不断发展,这两个因素——能够同时处理的位数和指令集的大小——在继续增长。
三、硬件不论尺寸大小,现代数字计算机在概念上都是类似的。
然而,根据成本与性能,它们可分为几类:个人计算机或微型计算机,一种成本较低的机器,通常只有桌面大小(尽管“膝上型计算机”小到能够放入公文包,而“掌上型计算机”能够放入口袋);工作站,一种具有增强型图形与通信能力、从而使其对于办公室工作特别有用的微型计算机;小型计算机,一般就个人使用而言太昂贵,其性能适合于工商企业、学校或实验室;以及大型机,一种大型的昂贵机器,具有满足大规模工商企业、政府部门、科研机构或者诸如此类机构需要的能力(其中体积最大、速度最快的称为巨型计算机)。
一台数字计算机不是单一的机器。
确切地说,它是由5个不同的要素组成的系统:(1)中央处理器;(2)输入设备;(3)存储设备;(4)输出设备;以及(5)被称作总线的通信网络,它将系统的所有要素连接起来并将系统与外界连接起来。
四、编程一个程序就是一系列指令,告诉计算机硬件对数据执行什么样的操作。
程序可以内嵌在硬件本身里,或以软件的形式独立存在。
在一些专门或“专用”计算机中,操作指令被嵌入其电路里;常见的例子有计算器、手表、汽车发动机和微波炉中的微型计算机。
另一方面,通用计算机尽管含有一些内置的程序(在只读存储器中)或者指令(在处理器芯片中),但依靠外部程序来执行有用的任务。
计算机一旦被编程,就只能做在任何特定时刻控制它的软件所允许它做的事情。
广泛使用的软件包括一系列各种各样的应用程序——告诉计算机如何执行各种任务的指令。
五、未来的发展计算机发展的一个持续不断的趋势是微小型化,亦即将越来越多的电路元件压缩在越来越小的芯片空间内的努力。
研究人员也在设法利用超导性来提高电路的功能速度。
超导性是在超低温条件下在某些材料中观察到的电阻减小现象。
计算机发展的另一个趋势是“第五代”计算机的研制工作,亦即研制可以解决复杂问题而且其解决方法用“创造性的”这个词来形容或许最终名副其实的计算机,理想的目标是真正的人工智能。
正在积极探索的一条道路是并行处理计算,亦即利用许多芯片来同时执行数个不同的任务。
一种重要的并行处理方法是模仿神经系统结构的神经网络。
另一个持续不断的趋势是计算机联网的增加。
计算机联网现在使用由卫星和电缆链路构成的世界范围的数据通信系统,来将全球的计算机连在一起。
此外,大量的研究工作还投入在探索“光”计算机的可能性上——这种硬件处理的不是电脉冲而是快得多的光脉冲。
第二单元:计算机体系结构课文A:计算机硬件一、引言计算机硬件是计算机运行所需要的设备,由可被物理操纵的部件组成。
这些部件的功能一般分为3个主要类别:输入、输出和存储。
这些类别的部件与微处理器相连接,特别是与计算机的中央处理器相连接。
中央处理器系电子线路,它通过称为总线的线路或电路来提供计算能力和对计算机进行控制。
另一方面,软件是计算机用来处理数据的一套指令,如文字处理程序或电子游戏。
这些程序通常被存储起来,并由计算机硬件调入和调出中央处理器。
软件也控制着硬件如何利用:例如,如何从存储设备中检索信息。
输入与输出硬件的交互是由基本输入/输出系统(BIOS)软件控制的。
尽管微处理器在技术上仍被认为是硬件,但其部分功能也与计算机软件有关系。
既然微处理器同时具有硬件与软件的特征,它们因此经常被称作固件。
二、输入硬件输入硬件由给计算机提供信息和指令的外部设备——亦即计算机中央处理器以外的部件——组成。
光笔是带有光敏端头的输入笔,用来在计算机显示屏上直接写画,或者通过按光笔上的夹子或用光笔接触屏幕来在屏幕上选择信息。
这种笔含有光传感器,用于识别笔所经过的屏幕部分。
鼠标是为一只手抓握而设计的指示设备。
它在底部有一个检测装置(通常是一个圆球),使用户能够通过在一个平面上移动鼠标来控制屏幕上指针或光标的运动。
该装置滑过平面时,光标随着在屏幕上移动。
要在屏幕上选择项目或命令,用户就点击鼠标上的按钮。
操纵杆是由一根杆子组成的指示设备,该杆以向多个方向移动来操纵计算机屏幕上的光标或者其他图形对象。
键盘是一个像打字机的设备,它使用户得以向计算机键入文本和命令。
有些键盘有特殊功能键或集成指示设备,如轨迹球或者可以让用户通过手指的移动来移动屏幕上光标的触敏区。
光扫描仪利用光感应设备将图片或文本等形式的图像转换成计算机能够处理的电子信号。
例如,一张照片可以扫入一台计算机,然后包括在该计算机创建的文本文件中。
两种最常见的扫描仪类型是平板扫描仪和手持式扫描仪,前者类似一台办公室用复印机,后者用手动的方式从要处理的图像上扫过。
麦克风是将声音转换成可被计算机存储、处理和回放的信号的设备。
语音识别模块是将话语转换成计算机能够识别和处理的信息的设备。
调制解调器代表调制器―解调器,是将计算机与电话线连接、允许信息传送给或接收自另一台计算机的设备。
每台发送或接收信息的计算机都必须与调制解调器相连接。
一台计算机发送的信息由调制解调器转换成音频信号,然后通过电话线传送到接收端调制解调器,由其将信号转换成接收端计算机能够理解的信息。