U3 Types of computer systems

合集下载

Computer English Unit 3 Computer Language and Programming(计算机英语 第三单元 计算机语言与编程)

Computer English Unit 3 Computer Language and Programming(计算机英语 第三单元 计算机语言与编程)

Unit 3 Computer Language and Programming第三单元:计算机语言与编程Section A Programming Language课文A:编程语言Ⅰ. Introduction一、引言Programming languages, in computer science, are the artificial languages used to write a sequence of instructions (a computer program) that can be run by a computer. 在计算机科学中,编程语言是用于编写可由计算机运行的一系列指令(计算机程序)的人工语言。

Similar to natural languages, such as English, programming languages have a vocabulary, grammar, and syntax.与英语等自然语言相类似,编程语言有词汇、语法和句法。

However, natural languages are not suited for programming computers because they are ambiguous, meaning that their vocabulary and grammatical structure may be interpreted in multiple ways.然而,自然语言不适合为计算机编程,因为它们会引起歧义,也就是说它们的词汇和语法结构可能被用多种方式进行解释。

The languages used to program computers must have simple logical structures, and the rules for their grammar, spelling, and punctuation must be precise.用于计算机编程的语言必须有简单的逻辑结构,它们的语法、拼写和标点符号规则必须精确。

计算机专业英语Unit3

计算机专业英语Unit3

Section 2 Passages
பைடு நூலகம்

Section 3 Skill in Focus


Section 4 Extended Reading


Unit 3 Operation System
Section 1 Situational Dialogue
System Crash 1、在使用计算机的过程中,你遇到过系统崩溃的情况吗, 简单描述一下。
• • • •
Unit 3 Operation System
Section 2 Passage A: Categories of Operating System
1、你所知道的操作系统有哪些 2、你觉得未来操作系统的发展趋势是什么
Unit 3 Section 2 Passage A
• OS • software • application program • resource • error • batch processing • real-time • multi-tasking • multi-user • distributed • time sharing • desktop
• •
• •
Unit 3 Section 1

Zhang Ning: Well, there might many causes for system crash. One of them is software. The simplest operation like installing and uninstalling might cause a crash in system. Problems within the system may also do that, so you have to be very careful when deleting DLL files, modifying Windows registry, or upgrading the operating system. Another cause is the hardware problem. Have you tried backing up the files? It would be a great help in system restoration when the problem doesn’t lie in the hardware. Cheng Hong: The service personnel installed a ghost program for me when I bought the computer. Will I lose the data in my hard disk if it is restored? Qian Liang: Not except the data on C: drive, where files on your desktop or in My Documents are stored. You may move them into other locations with a bootable disk or under DOS if there are any. Cheng Hong: There are a lot of learning materials in My Documents and on the desktop. Would you please help me transfer them? It might save me the trouble of calling for customer services, and what’s more important, I’d learn a lot from you. Qian Liang: No problem.

计算机专业英语Unit 3

计算机专业英语Unit 3

Unit 3Text 11.Match each of the words or phrases with their Chinese meaning.disk 磁盘modem 调制解调器driver 驱动器printer 打印机display 显示器mouse 鼠标keyboard 键盘computer 计算机2.Fill a correct word learned in this text in each of the blanks.(1)The display of the computer is also called______.Screen(2)The function of a ____ is to print the information or data on a piece of paper.printer(3)The keyboard is one of the _____devices.input(4) A modem plays an important role when you want to use the ______.internet3. Translation.(1)我是一个操作员。

I am a computer programmer.(2)什么是电子计算机?What is a electronic computer?(3)我有一个键盘。

I have a keyboard(4)It costs me 4000 Yuan to buy a computer.买一台电脑需要花费我4000元人民币。

(5)I am now finding a file that was deleted by mistake.我正在找一个不小心被我误删的文件。

(6)There was some problems with my mouse. Maybe it’s not clean.我的鼠标器有点问题,也许是它不干净了。

应用英语教程 综合英语3 教师用书U3

应用英语教程 综合英语3 教师用书U3

Unit 3 Internet and Our LifeText AnalysisI. Background information1. About the authorA highly acclaimed writer, Nicholas Carr is a visiting professor of sociology at Williams College in Massachusetts and was the former executive editor of the Harvard Business Review. His works focus on the intersection of technology, economics, and culture and many of his books have been translated into more than twenty-five languages. In 2015, he received the Neil Postman Award for Career Achievement in Public Intellectual Activity from the Media Ecology Association.2. About the textThe abridged article was originally published in the July/August 2008 edition of The Atlantic. It was collected in several anthologies, including The Best American Science and Nature Writing, The Best Spiritual Writing, and The Best Technology Writing. In 2010, it was developed into a book entitle The Shallows: What the Internet Is Doing to Our Brains,which won the Pulitzer Prize finalist.II. General analysis of the textIn the text, the author, while acknowledging the conveniences of the Internet, reflects on the negative effects of the Internet on his own thinking and reading habits.The author introduces the theme of the text by citing his own example, in which he mentions that he was unable to do deep reading. He then elaborates on the conveniences which the Internet has brought him, such as saving him the trouble of searching for information in libraries. The author then continues to cite his own examples and examples of others to illustrate the far-reaching negative influences on people’s thinking and reading patterns. However, despite the changes in their thinking and reading habits due to the Internet, which have obviously made them uncomfortable, they wouldn’t go back to the “good old days.” This indicates that the trend toward a heavy dependence on the Internet might never be reversed, further reflecting the irrevocable changes the Internet has made to us.The layout of the text is as follows.Part Paras. Main ideaIntroduction1The author introduces the theme of the text by mentioning the changes in his thinking and reading habits.Body 2-3The author elaborates on the benefits the Internet has broughthim.4-7The author lists the negative impacts of the Internet by citinghis own examples and examples of others.Conclusion8Despite the negative impacts, the author concludes the advantages of the Internet outweigh its own disadvantages.III. Detailed study of the text1. Now my concentration starts to drift after a page or two.u drift:v. [I] to move, change, or do sth without any plan or purposeu drift around/along etc.Jenni spent the year drifting around Europe.u drift from sth to sthThe conversation drifted from one topic to another.u let your gaze/eyes/thoughts/mind, etc. driftIdly she let her eyes drift over his desk.u drift:v. [I] to move slowly on water or in the airu drift out/toward, etc.The rubber raft drifted out to sea.Smoke drifted up from the jungle ahead of us.2. I get fidgety, lose the thread, begin looking for something else to do.u lose the thread: to stop concentrating so that you do not understand what someone is sayingMore than once she lost the thread and had to ask them to speak more slowly.Arthur paused, feeling he was beginning to lose the thread of his argument.3. Even when I’m not working, I’m as likely as not to be foraging in the Web’s data thickets—reading and writing e-mails, scanning headlines and blog posts, following the updates of social media, watching video streams, downloading music, or just tripping lightly from link to link to link.u trip: v. [I] (literary)to walk, run, or dance with quick light stepsJulie kissed her mother goodbye and tripped off along the road.A girl in a red dress tripped down the hill.u trip: v. [I] to hit sth with your foot by accident so that you fall or almost fallu trip overClary tripped over a cable and broke his foot.u trip onHe tripped on the bottom step.u trip: v. [T] to make someone fall by putting your foot in front of them when they are movingOne guy stuck his foot out and tried to trip me.The referee said Jack was tripped and gave a penalty.4. The advantages of having immediate access to such an incredibly rich and easily searched store of data are many, and they’ve been widely described and duly applauded.u incredible: adj. too strange to be believed, or very difficult to believeIt’s incredible that he survived the fall.I find it almost incredible that no one noticed these errors.u incredible: adj. extremely good, large, or greatThe view is just incredible.There was blood everywhere and the pain was incredible.u incredibly:adv. in a way that is hard to believeThe knife had pierced his heart, but incredibly he was still alive.Incredibly, she had no idea what was going on.5. And what the Net seems to be doing is chipping away my capacity for concentration and contemplation.u chip away:to gradually make sth weaker, smaller, or less effectiveInstead of an outright coup attempt, the rebels want to chip away at her authority.u chip away:to remove small pieces from sth hard by hitting it with a toolUse a hammer to chip away the edge.The edges of the marble step have been chipped away over the years.6. When I mention my troubles with reading to friends, many say they’re suffering from similar afflictions.u affliction: n. sth that causes pain or suffering, especially a medical condition Malnutrition is one of the common afflictions of the poor.Hay fever is an affliction which arrives at an early age.u afflict:v. [T] to affect sb/sth in an unpleasant way, and make them sufferHe must learn to relax more, not be racked by the tortured tenseness that had afflicted him for the past weeks.Venus, however, is afflicted with a lethally hot and corrosive atmosphere.7. I now have almost totally lost the ability to read and absorb a longish article on the Web or in print.u longish:adj. fairly longHe has high cheekbones, and a longish nose.She’s tall, with longish black hair.8. …Friedman elaborated on his comment in a telephone conversation with me. u elaborate:v. [I, T] to give more details or new information about sthHe said he had new evidence, but refused to elaborate any further.u elaborate onMcDonald refused to elaborate on his reasons for resigning.u elaborate:adj.having a lot of small parts or details put together in a complicated wayThe new healthcare plan is the most elaborate yet.Her parents didn’t realize that it was all an elaborate lie.9. He says he was “astonished” and “even irritated” when the woman paused to read the text on the sites she stumbled upon.u stumble upon:to find or discover sth by chance and unexpectedlyIt emerged as the most successful of the dozen experiments, largely because it stumbled upon a different way of doing business.u stumble: v. to hit your foot against sth or put your foot down awkwardly while you are walking or running, so that you almost fallIn her hurry, she stumbled and spilled the milk all over the floor.She stumbled a little on the uneven path.10. I read a lot—or at least I should be reading a lot—only I don’t. I skim. I scroll. u scroll:v. [I] to move information on a computer screen up or down so that you can read itu scroll throughHe scrolled through the document.u scroll up/downCould you scroll down a few lines?u scroll:n. a long piece of paper that can be rolled up, and is used as an official document, especially in past timesThe most ancient scroll can be traced back to early years of their settlement on the continent.The ancient scroll spreads out into a painting.Key to the ExercisesPre-Class Tasks1 Mini-research1. When did the Internet originate and how does it develop?The Internet, a system architecture that has revolutionized communications and methods of commerce by allowing various computer networks around the world to interconnect. Sometimes referred to as a “network of networks,” the Internet emerged in the United States in the 1970s but did not become visible to the general public until the early 1990s.The first computer networks were dedicated special-purpose systems such as SABRE (an airline reservation system) and AUTODIN I (a defense command-and-control system), both designed and implemented in the late 1950s and early 1960s.By the early 1960s computer manufacturers had begun to use semiconductor technology in commercial products, and both conventional batch-processing and time-sharing systems were in place in many large, technologically advanced companies. Time-sharing systems allowed a computer’s resources to be shared in rapid succession with multiple users, cycling through the queue of users so quickly that the computerappeared dedicated to each user’s tasks despite the existence of many others accessing the system “simultaneously.”This led to the notion of sharing computer resources (called host computers or simply hosts) over an entire network. Host-to-host interactions were envisioned, along with access to specialized resources (such as supercomputers and mass storage systems) and interactive access by remote users to the computational powers of time-sharing systems located elsewhere.2. What are the impacts of the Internet on human society?There are 3 ways that the Internet has impacted on human society.Search enginesBefore the advent of search engines, there were not many websites, and users could simply type in the website address to locate a certain website. However, as the number of websites exploded, it became almost impossible to do so. Search engines are web-based tools that allow users to enter keywords and sift through billions of websites to locate information on the World Wide Web.E-commerceE-commerce has helped hasten the transition from street shopping to making purchases from the comfort of your home. Today, with the click of a mouse or a simple voice command, a host of items—from oven gloves to groceries and computers to cell phones—can be ordered for home delivery, often on the same day.Social MediaSocial media websites have become many people’s medium of choice for sharing their musings, photos, videos and a whole lot more. It is estimated that there are more than 4.5 billion social media users around the world. For individuals, social media is used to keep in touch with friends and extended family. For businesses, social media is used to find customers, boost sales, and offer customer service or support.2 Co-learningThis is an open-ended question.3 PresentationThis is an open-ended question.11. neural circuitryThe nervous system i s one of the vital systems in the body. The cells in the nervous system are called neurons. As the primary working units of the brain, they have a unique way of communicating with each other. They need to form an organization or circuit so that they can process specific information.A neural circuit consists of neurons that are interconnected by synapses, the contact points where neurons communicate with each other. Once activated, a neural circuit carries a specific function. And neural circuits connect with each other, forming a large scale brain network, or referred to as ne ural circuitry.2. War and PeaceIt is an epic historical novel by Leo Tolstoy, originally published as Voyna i mir in 1865-1869. This panoramic study of early 19th-century Russian society, noted for its mastery of realistic detail and variety of psychological analysis, is generally regarded as one of the world’s greatest novels.War and Peace is primarily concerned with the histories of five aristocratic families—particularly the Bezukhovs, the Bolkonskys, and the Rostovs—the members of which are portrayed against a vivid background of Russian social life during the war against Napoleon (1805-1814). The theme of war, however, is subordinate to the story of family life, which involves Tolstoy’s optimistic belief in the life-affirming pattern of human existence. The heroine, Natasha Rostova, for example, reaches her greatest fulfillment through her marriage to Pierre Bezukhov and through motherhood. The novel also sets forth a theory of history, concluding that there is a minimum of free choice; all is ruled by an inexorable historical determinism.2Beginning (para. 1)The theme of the text is introduced by mentioning the changes in the author’s thinking and reading habits.Body (paras. 2-7) 1 (paras. 2-3)The benefits/boons that the Internet has brought the author are illustrated.2 (paras. 4-7) The negative impacts of the Internet are listed by citing the author’s own examples and examples of others.Conclusion (para. 8)The advantages of the Internet outweigh its own disadvantages.31.Because the author wants to illustrate the fact that he has been negatively affectedby the Internet.2.The Internet has the major advantage of saving its users a great deal of time, thusboosting people’s life and work efficiency. People can have quick access to loads of information, deal with banking and shopping online, pay the bills, schedule the appointments, book flights and hotel rooms, renew the driver’s license, send invitations and greeting cards, etc.3.They were scattered broadly around the world.4.Here, “scuba diver” and “a guy on a Jet Ski” are used metaphorically to refer tothe traditionally slow thinking process and the swift mode of thinking respectively.Therefore, “scuba diver” and “a guy on a Jet Ski” serve as a sharp contrast between the modes of thinking before and after the advent of the cyber age.5.Because the author wants to cite a specific example to illustrate the fact that BruceFriedman has lost the ability to read or absorb a longish article on the Web or in print.6.Because in the 1990s people used the Internet in a much simpler way and they justused a Web browser to click on the hypertexted words instead of spending a lot of time reading the information on it.7.Because the benefits they get from using the Net make up for the loss of theirability.8.This is an open-ended question.11. immersion2. fidgeted/fidgets3. incredible4. unduly5. contemplate6. aberrant7. voraciously8. pathology9. nuances 10. potency21. Over the past few years, I have felt uncomfortable because someone or something seems to have changed my brain, my nervous system, and memory.2. I used to be able to immerse myself in deep reading, but now I have to force myself to concentrate.3. In the past, it usually took researchers days to read through papers or immerse themselves in periodicals in order to get the research done. Instead, all of this can be done in a matter of minutes.4. It is almost impossible to calculate the amount of time and gasoline the Internet saved me by providing instant access to information and eliminating the need to drive to such places as libraries to search for information.5. Even if I am not working, I will probably still be searching the Web for information.6. Computers’ memory, which is mainly made of silicon, makes the storage and retrieval of information highly efficient. This greatly facilitates users’ thinking.7. I used to immerse myself in the world of literature, exploring slowly and patiently. Now, however, I am used to shallow reading, sacrificing depth for speed.8. As they grow more and more reliant on the Web, they have to work harder to focus their attention on long pieces of writing.9. His thought patterns has become interrupted, meaning that he was only able to read short texts.10. We can’t fully realize the advantages of this networked thinking process because we are comparing it with our old habit of thinking in a linear way.31. drifted2. stumble upon3. decay4. strolled5. longish6. chipped away7. affliction8. conduits9. snippets 10. scroll41. up2. to3. on4. to5. for6. on7. for8. to9. over 10. for11-5: BMDJF 6-10: CKANE21. The sick tiger, the one in the second cage, attacked its trainer.2. We Chinese people are brave and hard-working.3. The plot deals with another eternal theme of human beings, namely love.4. Elizabeth I, the daughter of Henry VIII and Anne Boleyn, became Queen of England in 1558.5. The boy came and gave us the news, that is, the troops would be leaving.6. A century ago, Sigmund Freud formulated his revolutionary theory, that is, dreams are the disguised shadows of our unconscious desires and fears.31. good-humored2. far-reaching3. two-faced4. Deep-sea5. Highly-paid6. one-sided7. long-lasting8. out-of-the-way41.Jack’s mind wandered, and he lost the thread of what his father was saying.2.T he telltale redness around his eyes betrayed the fatigue he was suffering.3.Many people made a point of praising the film’s pithy dialog.4.With the concerted efforts of government, enterprises, and individuals, the chronicunemployment problem in this country has been improved.5.She elaborated on the significance and complexity of this issue in her thesis.6.He laughs loudly when I accuse him of lying.7.Traders are taking a sanguine view of interest-rate prospects.8.Focusing on traditional Chinese handicraft art, the exhibition showcases a rangeof artifacts with Chinese characteristics, including clay figures, paper cuts,shadow puppets, embroidery, and porcelain.This is an open-ended question.One version for reference:The Internet has transformed our way of accessing and sharing information. While enjoying the conveniences it brings us, we are well aware of the potential drawbacks it might have. Therefore, it is necessary to explore how one can make full of the positive sides of the Internet while avoiding the negative sides.First, it is necessary to apply critical thinking to the information we retrieve from the Internet. The Internet has allowed its users instant access to information on virtually any topic. Faced with the tons of information, one must be careful enough to distinguish between correct information and false or even deliberately misleading information. One quick way to do so is to only cite information from authoritative websites and authors of high repute.Second, it is wise to not to expose one’s personal information on the Internet. In the information age, the freedom to share information often means the loss of individual privacy, and one may sometimes feel that he or she lives under observation. This alone gives people the cause for concern. Therefore, it is recommended that one should notpost his or her core personal information, such as one’s name, physical address, or phone number on the Internet.In conclusion, in order to take full advantage of the positive sides of the Internet, it is necessary to treat information from the Internet with caution and protect one’s own core privacy.Text B Internet Ethics and NetiquetteAnonymousWorking with Words and ExpressionsLook up the following words and expressions in a dictionary and find out their meaning in the text.1.Internet ethics means acceptable behavior for using the Internet 网络道德规范2.Internet protocol suite,commonly known as TCP/IP, is the set of communicationprotocols used in the Internet and similar computer networks. The current foundational protocols in the suite are the Transmission Control Protocol (TCP) and the Internet Protocol (IP), as well as the User Datagram Protocol (UDP). 互联网协议群3.Inter alia, a Latin phrase, meaning “among other things.” It can be used whenyou want to say that there are other things involved apart from the one you are mentioning. 除此之外4. A nerd is a person seen as overly intellectual, obsessive, or lacking social skills.Such a person may spend inordinate amounts of time on unpopular, little known, or non-mainstream activities, which are generally either highly technical, abstract, or relating to topics of fiction or fantasy, to the exclusion of more mainstream activities.Additionally, many so-called nerds are described as being shy, quirky, pedantic, and unattractive, and may have difficulty participating in, or even following, sports.乏味落伍的人;电脑迷enet is a worldwide distributed discussion system available on computers. It wasdeveloped from the general-purpose UUCP dial-up network architecture. Tom Truscott and Jim Ellis conceived the idea in 1979, and it was established in 1980.Users read and post messages (called articles or posts, and collectively termed news) to one or more categories, known as newsgroups. Usenet resembles a bulletin board system (BBS) in many respects and is the precursor to Internet forums that are widely used today. Usenet can be superficially regarded as a hybrid between email and web forums. Discussions are threaded, as with web forums and BBSs, though posts are stored on the server sequentially. The name comes from the term “users network.” Usenet网,用户网络(志趣相投的用户用以互发电邮)6.bulletin board is a place on a computer system where users can read messages andadd their own. (计算机)公告栏7.A troll is someone who leaves an intentionally annoying or offensive message onthe internet, in order to upset someone or to get attention or cause trouble. 在互联网发挑衅帖子、制造麻烦的人8.An emoticon is a pictorial representation of a facial expression using punctuationmarks, numbers and letters, usually written to express a person’s feelings or mood.As social media has become widespread, emoticons have played a significant role in communication through technology, and some devices have provided stylized pictures that do not use punctuation. They offer another range of “tone” and feeling through texting that portrays specific emotions through facial gestures while in the midst of text-based cyber communication. 情感符号,表情符号Understanding the Text11.The term “netiquette” is derived from two words: 1) Internet; 2) Etiquette. It is acode of polite behavior that users engage in when they use computer networks connected to the Internet.2.Begun as a vehicle for experimental network research in the mid-1970s, the Internethas become an important national infrastructure supporting an increasingly widespread, multi-disciplinary community of researchers ranging, inter alia, from computer scientists and electrical engineers to mathematicians, physicists, medical researchers, chemists, astronomers and space scientists.3.Etiquette—within wider society—is always changing and evolving, and, therefore,so is netiquette. What constitutes netiquette varies amongst cultures and social groups, and it is difficult to define a definitive list of netiquette which will “hold water” for all countries, cultures and social groups.4.Posting information on a different topic (off-topic discussion), and commercialadvertising (spam), are two examples of “bad” netiquette which can plague these social systems.5.Emoticons inserted into text communications help to defuse misunderstandings andconvey mood. Without the use of an emoticon, a text message may appear “cold”or aggressive. Abbreviations help to save time and effort for commonly written phrases. To make appropriate use of them is to use only when necessary. As said in the text, a heavy use of abbreviation, can sometimes come across as a lack of effort, and within some social interactions, overuse of abbreviation may be viewed as childish and as bad netiquette.21.因此,很明显,网络礼仪是用户在使用连接到互联网的计算机网络时所遵循的一种礼貌行为准则。

新视野大学英语第三版读写教程第二册Unit3翻译

新视野大学英语第三版读写教程第二册Unit3翻译

U3 ACollege life in the Internet age互联网时代的大学生活The college campus, long a place of scholarship and frontiers of new technology, is being transformed into a new age of electronics by a fleet of laptops, smartphones and connectivity 2hours a day.大学校园长久以来都是学术之地,也是新技术的前沿。

现在随着手提电脑和智能手机的大量出现,加上每天2小时不间断的网络连接,大学校园正在转而进入电子设备的新时代。

On a typical modern-day campus, where every building and most outdoor common areas offer wireless Internet access, one student takes her laptop everywhere. In class, she takes notes with it, sometimes instant-messaging or emailing friends if the professor is less than interesting. In her dorm, she instant-messages her roommate sitting just a few feet away. She is tied to her smartphone, which she even uses to text a friend who lives one floor above her, and which supplies music for walks between classes.在典型的现代校园里,每幢建筑和大部分室外公共区域都提供无线互联网接入,学生可以把手提电脑带到任何地方。

Computer Architecture计算机系统结构 知识点详解

Computer Architecture计算机系统结构 知识点详解

Computer Architecture计算机系统结构1. Fundamentals of Computer Architecture 计算机系统结构的基本原理1.1 Layers of Computer System计算机的层次Application Language Machine M5 应用语言机High-Level Language Machine M4 高级语言机Assembly Language Machine M3 汇编语言机Operating System Machine M2 操作系统机Conventional Machine M1 传统机Microprogram Machine M0 微程序机1. 每个层次执行相关的功能子集。

2. 每个层次要依赖于下一个低层去执行更原始的功能。

3. 这就将问题分解成更易处理的子问题。

4. 从M2到M5的层次是虚拟机。

5. 在传统机上的指令(算数、逻辑等)由微程序级的程序实现。

该程序是作为一个解释器,能理解一组简单的操作集合,称为微指令集。

1.2 Computer Architecture and Implementation计算机的系统结构和实现➢Computer Architecture 计算机系统结构Refers to those attributes of a system visible to a programmer, or those attributes have direct impact on logical execution of program.程序员可见,或者对程序执行有直接影响的属性➢Implementation 实现Two components: Organization and hardware. 两个组件:组织和硬件1. Organization(组织): includes high-level aspects of a computer’s design, such as: memory system, bus structure, internal CPU. 组织(组织):包括高级方面的计算机的设计,如:内存系统,总线结构、内部CPU。

计算机专业英语(第3版)

计算机专业英语(第3版)
第三,计算机具有进行判定的电路。
2020/8/16
计算机专业英语(第3版)
8
The control unit (控制单元 )
➢ The control unit is the functional unit that is responsible for supervising the operation of the entire computer system.
形图像、CAD、计算机动画和多媒体应用软件。第 4单元是计算机网络相关知识介绍,包括计算机网
络基础、互联网搜索引擎、无线网络技术及网络安
全。第5单元讲述电子商务方面的内容,有电子商 务基础、EDI和网络广告。第6单元是计算机领域 新技术介绍,包括人工智能、虚拟现实和神经网络。
2020/8/16
计算机专业英语(第3版)
➢ 控制单元是负责监督整个计算机系统操作的功能部件。
➢ The control unit fetches instructions from memory and determines their type or decodes them.
➢ 控制单元从存储器中取出指令,并确定其类型或对之进行译码。
➢ 中央处理器是计算机系统的心脏。它负责实现由程序启动 的全部算术运算和逻辑判断。
➢ The CPU coordinates all the activities of the various components of the computer. It determines which operations should be carried out and in what is the order.
➢ 中央处理器协调计算机各个部件的所有活动。它确定应该 以什么顺序执行哪些操作。

信息技术教案:高一英语必修2Unit3Computers全单元教案

信息技术教案:高一英语必修2Unit3Computers全单元教案

信息技术的发展已经深深地嵌入到我们的生活中。

计算机的出现彻底改变了人们传统的生产方式和生活方式。

现代教育不再是仅限于背书和抄板书,而是花费大量的时间和精力去思考、去分析和去实践。

在这样一个信息时代,教师的角色也随之转变。

我们不仅需要教授知识,还需要培养学生的信息能力,帮助他们理解和利用科技并运用它们支持我们的学习和生活。

高一英语必修2 Unit3 Computers全单元教案是一份非常重要的信息技术教案。

这个单元是有关于计算机和互联网的,向学生介绍了计算机的历史和发展,软件和硬件,以及学习计算机和互联网所需的相关知识。

第一课:Computers in Everyday Life这一课介绍了计算机在生活中的应用以及与人们的生活密切相关的一些软件。

我们可以向学生展示各种各样的工具软件,如视频制作、图片编辑、文档编辑、音频制作等等。

我们也可以通过展示计算机硬件的内部结构来引导学生了解计算机是如何工作的。

第二课:The Development of Computers这一课涵盖了计算机诞生以来的漫长历史。

从最初的机械计算器到现代的个人计算机,这里介绍了计算机的种类、发展和特点。

学生能够学习计算机的历史,了解计算机技术的发展和趋势,以及计算机的应用范围。

第三课:Computer and Society这一课程介绍了计算机在社会生活中的应用,并引导学生思考计算机技术对社会的影响,特别是当它开始影响人们的生活、工作和教育时。

我们将会讨论有关网络安全问题,从而让学生了解如何安全地使用计算机。

第四课:Software这一课介绍了计算机系统中的软件,包括操作系统、应用软件、编译器等等。

学生将了解到不同类型的软件的特点,掌握基本的软件使用技巧。

第五课:Data Storage这一课主要介绍了计算机数据存储,包括内存、硬盘等。

学生将学习如何存储、传输和访问数据,并了解如何保护我们的数据。

第六课:The Internet这一课介绍了互联网的原理和应用。

Types of computer

Types of computer

Colossus – invented in 1940, it was one of the first electronic Computers. It was as big as a room, as were many mainframe computers back then. By the standards of 1940, it was considered a Very fast computer. But in today’s world it is slow. In fact your smartphone is faster. Colossus was designed to decode encrypted German messages in World War II Computers developed very slowly in the beginning because no one could think of an reason to use one. It wasn’t until the 1960’s when companies and universities started to invest in mainframe computers that the world of computer really started to develop quickly.
If processor technology continues to advance at the same pace that it has in the past, then two decades from now we will all be walking around with Tianhe-2's in our pockets… …or perhaps embedded in our contact lenses

电脑结构的简介英语作文

电脑结构的简介英语作文

电脑结构的简介英语作文英文回答:The computer structure is a fundamental concept in computer science that refers to the physical and logical organization of a computer system. It encompasses a wide range of components, including hardware, software, and data, and their interconnections and interactions.The hardware components of a computer system typically include the following:Central processing unit (CPU): The "brain" of the computer, responsible for executing program instructionsand performing calculations.Memory (RAM): Used to store data and instructions that are currently being processed by the CPU.Storage devices (hard drives, solid-state drives,etc.): Long-term storage for data and programs.Input/output (I/O) devices (keyboard, mouse, monitor, etc.): Allow the user to interact with the computer and exchange data.The software components of a computer system include the following:Operating system (OS): Manages the hardware resources and provides basic services to application programs.Application programs (word processors, spreadsheets, etc.): Software designed to perform specific tasks for the user.Data is the information that is stored and processed by a computer system. Data can be of various types, including text, numbers, images, and audio/video files.The computer structure is designed to allow for the efficient flow of data between different components. TheCPU fetches instructions from memory, processes them, and stores the results back in memory. Data is transferred between memory and storage devices as needed. Input and output devices allow the user to interact with the data and programs running on the computer.Overall, the computer structure provides a frameworkfor understanding how a computer system operates and howits components work together to perform various tasks.中文回答:计算机结构是计算机科学中的一个基本概念,它指的是计算机系统的物理和逻辑组织。

计算机专业英语第三版 Unit 3

计算机专业英语第三版 Unit 3

Windows XP Operating System
Passage One
Training target: In this part, our target is to train your reading comprehension. We have made the flexible sentences strong black and marked the subject, predicate and have object of them. Try to grasp the main idea of these sentences.
主语、谓语、宾 语 大连理工大ting System
What is an operating system(OS)? An OS consists of one or more programs that manage the operations of a computer. It controls the operations of the computer equipment, manages resources, provides a user interface, and runs application program. Basically, it performs a number of support functions. Before the program can be executed, it must first be copied into main memory, because the program that controls a computer must be in the main memory. The process of copying a program from disk to memory involves considerable logic. The source of a computer’s logic is software. Thus, if the application program is to be loaded, there must be a program in memory to control the loading process. That program is the operating system. It acts as an interpreter between the different application software programs and your computer. For example, the operating system recognizes input from an input device such as the keyboard, mouse, or microphone; coordinates the display of output on the monitor; instructs a printer how to print information; and manages data, instructions, and information stored on disk .A computer cannot function without an operating system. 大连理工大学出版社 OS (Operating System) abbr. 操作系统 interface n. 界面 execute v. 执行 considerable adj. 相当大的

计算机专业英语第3版unit3PPT课件

计算机专业英语第3版unit3PPT课件
➢ We break the word multimedia into its component part, we get multi—meaning more than one, and media—meaning form of communication.
➢ Those types of media include text, audio sound, static graphics images, animation and full-motion video.
2021/4/4
计算机专业英语(第3版)
4
Audio Sound
➢ The integration of audio sound into a multimedia application can provide the user with information not possible through any other method of communication.
Unit 3 Multimedia and Its Applications
3.1 Multimedia 3.2 Computer Graphics and Images 3.3 Computer Aided Design 3.4 Computer Animation 3.5 Multimedia Software
2021/4/4
计算机专业s the basis for word processing programs and is still the fundamental information used in many multimedia programs.
➢ By displaying text in more than one format, the message a multimedia application is trying to portray can be made more understandable.

Writing Book3u3

Writing Book3u3
7
6. Some people may think that … is to blame for this problem, but its causes go still / far deeper. 7. Admittedly, it may create / give rise to / bring about a host of problems. 三:提出解决方案的常用句式 1 . People have found many solutions / approaches to dealing with this problem. 2. We can figure out many ways to relieve the present crisis.
(8) Born and bred in the city, we cannot see any wild animals, and the program just compensates for it. It provides us with natural scenes and the life of all kinds of wild animals with the explanation of the narrator. We also learn some knowledge about animals, even some plants. So, in my opinion, it is an interesting as well as instructive program.
11
(2) In consequence of your laziness and rudeness, I am forced to dismiss you. (3) The new machine will work twice as fast, thus greatly reducing costs. (4) Due to the fact that all the trains were delayed, the station was crowded with people. (5) Computer vandals can cause real damages. As a consequent/ as a result, the public is taking a serious look at the security of computer systems.

计算机专业英语Unit 3

计算机专业英语Unit 3

Part 1 Listening & Speaking
1. Listen to the following passage and fill in the blanks w ith the words in the box.
Loห้องสมุดไป่ตู้ic programming
imperative functional programming
areplace取代reconfigure重新配置tedious单调乏味transfer转移wizard向导desktop桌面display显示dialup拨号method方法floppydisk软盘removablemedia可移动媒介items项目3
Unit 3 Programming Languages
Replace 取代 Reconfigure 重新配置 Tedious 单调乏味 Transfer 转移 Wizard向导 Desktop桌面 Display显示 Dial-up拨号 Method方法 Floppy disk软盘 Removable media 可移动媒介 Items项目
A: Tony, I just bought a new laptop to replace my old one. But it is tedious to reconfigure the computer. How can I transfer files and settings from the old computer to the new one? B: You can do this by using the “Files and Settings Transfer Wizard” in Windows XP. You can use this wizard to transfer desktop settings, display settings, dial-up connections, and other types of settings. You can find it by clicking Accessories, System Tools. A: Can you tell me more about it ?

计算机专业英语的第四版课后习题翻译

计算机专业英语的第四版课后习题翻译

中译英参考答案Unit 1A computer system consists of hardware system and software system. The hardware of the computer is usually divided into three major parts or three primary subsystems: the CPU, the memory subsystem, and the I/O subsystem.The CPU performs many operations and controls computer. The memory subsystem is used to store program being executed by the CPU, along with the program’s data. The I/O subsystem allows the CPU to interact with input and output devices such as the keyboard and monitor of a personal computer. The components of the computer are connected to the buses.The part of the computer that performs the bulk of data processing operations is called the central processing unit and is referred to as the CPU. In microcomputer, it is often called the microprocessor. The CPU is made up of three major parts: control unit, ALU, and register set.Memory is also known as internal memory or main memory. It refers to the circuits in the computer that hold whatever programs and data are available for immediate use by the CPU.I/O subsystem includes I/O devices and interface. There are a wide variety of I/O devices, such as mouse, printer, sensor, disk, and so on. Input-output interface provides a method for transferring information between internal storage and external I/O devices. Peripherals connected to a computer need special communication links for interfacing them with the CPU. The purpose of the communication link is to resolve the differences that exist between the central computer and each peripheral.Unit 2Storage hardware provides permanent storage of information and programs for retrieval by the computer. Hard disk drives store information in magnetic particles embedded in a disk. Usually a permanent part of the computer, hard disk drives can store large amounts of information and retrieve that information very quickly.Although fixed hard drive systems offer faster access and have a higher storage capacity than optical discs, optical disc systems use removable media – a distinct benefit. Optical discs – primary CDs and DVDs – are much more widely used than removable hard drive systems. They are the standard today for software delivery, as well as commonly used for storing high-capacity music and video files. There are also versions of both CD and DVD drives available for home audio and home theater use. Optical discs are commonly referred to as compact discs.CD and DVD discs are read by CD and DVD drives. The speed of a CD or DVD drive is rated as 24x, 32x, 36x, and so on. These labels describe how fast the drive is compared to the first version of that drive. For example, a 36x drive is 36 times the speed of the baseline unit that was originally manufactured.Most optical discs have a title and other text printed only on one side and they are inserted into the drive with the printed side facing up. When inserting such a CD or DVD, be careful not to get dirt, fingerprints, scratches, or anything else that might hinder light reflectivity on the disc’s surface.Unit 3(a) A program is a list of instructions or statements for directing the computer to perform a required data processing task. Programming is a multistep process for creating that list of instructions.(b) It is important to understand the difference between a class and an object of that class. A class is simply a specification for creating objects. Thus, a single class may create multiple objects.(c) Java is an object-oriented, network-friendly high-lever programming language that allows programmers to build applications that can run on almost any operating system.(d) ActiveX is a set of controls, or reusable components that enables programs or content of almost any type to be embedded within a Web page. Whereas a Java must be downloaded each time you visit a Web site, with ActiveX the component is downloaded only once, then stored on your hard disk for later, repeated use.(e) Programming involves a great deal of creativity. The design is guide to the function or purpose of each component, but the programmer has great flexibility in implementing the design as code. No matter what language is used, each program component involves at least three major aspects: control structures, algorithms, and data structures.Unit 4The software system can be divided into two broad categories: application software and system software. Application software consists of the program for performing tasks particular to the machine’s utilization. In contrast to application software, system software comprises a large number of programs. These programs start up the computer and function as the principle coordinator of all hardware components and application software. Without system software loaded into RAM of your computer, your hardware and application software are useless.System software can be grouped into three basic parts: operating system, utility software, and language translators. The majority of an installation’s utility software consists of programs for performing activities that are fundamental to computer installations yet not included in the operating system. In a sense, utility software consists of software units that extend the capabilities of the operating system.A computer’s OS is the main collection of programs that manage its activities.The primary chores of an OS are management and control. The OS ensures that all actions requested by a user are valid and processed in an orderly fashion. It also manages the computer system’s resources to perform these operations with efficiency and consistency.Application software is the software designed to help you solve problems specific to business or perform specific business tasks. Application software then is the layer of software closest to you. Basically, there are four categories of application software: productivity software, business and specialty software, entertainment software and education/reference software.Unit 5A computer network is often classified as being either a local area network (LAN), a metropolitan area network (WAN), or a wide area network (WAN). The connection of two or more networks is called an internetwork. The worldwide Internet is a well-known example of an internetwork.LANs are privately owned networks within a single building or campus of up to a few kilometers in size. They are widely used to connect personal computers and workstations in company offices and factories to share resources and exchange information.In general, a given LAN will use only one type of transmission medium. Various topologies are possible for LANs. The most common LAN topologies are bus, ring and star.A MAN is basically a bigger version of a LAN and normally uses similar technology. MAN is designed to extend over an entire city. It may be a single network such as a cable television network, or it may be a means of connecting a number of LANs into a large network so that resources may be shared LAN-to-LAN as well as device-to-device. For example, a company can use a MAN to connect the LANs in all of its offices throughout a city.A W AN spans a large geographical area that may comprise a country, a continent, or even the world. It provides long-distance transmission of data, voice, image, and video information over large geographical area.In contrast to LANs, W ANs may utilize public leased, or private communication devices, usually in combinations, and can therefore span an unlimited number of miles.Unit 6Transmission media are used to transfer messages over a network. For instance, the transmission media used in a network may be a privately owned set of cables, the public phone lines, or a satellite system. Transmission media can either be wired or wireless.The three types of wired media most commonly used to carry messages are twisted-pair wire, coaxial cable, and fiber-optic cable. One of the most successful developments in transmission media in recent years has been fiber optics. Fiber-optic cable is commonly used for the high-speed backbone lines of a network, or for Internet infrastructure.Wireless transmission media have become especially popular in recent years. They support communications in situations in which physical wiring is impractical or inconvenient, as well as facilitate mobility. Wireless media are commonly used to connect devices to a network, to share information between computers, to connect wireless mice to a computer, and for handheld PCs, wireless phones, and other mobile devices. Radio signals transferred through the air are the heart of most types of wireless media. In addition to conventional broadcast radio application, the microwave, cellular, and satellite transmission media also use radio signals to transmit data.Radio transmissions require the use of a transmitter to send the radio signals through the air. A receiver (usually containing some type of antenna) accepts the date at the other end. When a device functions as both a receiver and transmitter, it is commonly called a transceiver or transmitter-receiver.Unit 7(a) Since many database systems users are not computer trained, developers hide the complexity from users through several levels of abstraction, to simplify user’s interactions with the system: physical level, logical level, and view level.(b) A database schema is specified by a set of definitions expressed by a special language called a data-definition language (DDL). The result of compilation of DDL statements is a set of tables that is stored in a special file called data dictionary, or data directory.(c) The structured query language (SQL) is the most widely used and standard query language for relational database management systems. It is a kind of non-procedural language.(d) An entity is a “thing” or “object” in the real world that is distinguishable from other objects. For example, each person is an entity, and bank accounts can be considered to be entities. Entities are described in a database by a set of attributes.(e) Data warehouse is one of the newest and hottest buzzwords and concepts in the IT field and the business environment. A data warehouse is a logical collection of information——gathered from many different operational databases——that supports business analysis activities and decision-making tasks.Unit 8Animation is the term used to describe a series of graphical images that are displayed one after the other to simulate movement. Cartoons on television are one example of animation.Video differs from animation in that it usually begins as a continuous stream of visual information that is broken into separate images or frames when the video is recorded. When the frames are projected—typically at a rate of 30 frames per second—the effect is a smooth reconstruction of the original continuous stream of information. As you might imagine, at 30 frames per second, the amount of data involved in displaying a video during a multimedia presentation can require a substantial amount of storage space. Consequently, video data—like audio data—is often compressed. A variety of compression standards exist. Some of the most common video file formats are .avi, .mpeg, .mov, .rm.For multimedia presentation, video may be recorded using a standard (analog) video camera and then converted to digital form as it is input into a computer. Alternatively, the film can be recording digitally using a digital video camera. Streaming video is frequently used on Web pages to reduce file size. Similar to streaming audio, Streaming video files can begin playing once a portion of the video has been downloaded.Unit 9(a) AI is currently being applied in business in the form of knowledge systems, which use human knowledge to solve problems. The most popular type of knowledge-based system is the expert system. An expert system is a computer program that attempts to represent the knowledge of human experts in the form of heuristics. The term heuristic is derived from the same Greek root as the word eureka, which means “to discover”.(b) The user interface enables the manager to enter instructions and information into the expert system and to receive information from it. The instructions specify the parameters that guide the expert system through its reasoning processing. The information is in the form of values assigned to certain variables.(c) The knowledge base contains both facts that describe the problem area and knowledge representation techniques that describe how the facts fit together in a logical manner. The term problem domain is used to describe the problem area.(d) An expert system, also called a knowledge-based system, is an artificial intelligence system that applies reasoning capabilities to reach a conclusion. Expert systems are excellent for diagnostic and prescriptive problems.(e) The DSS is not intended to replace the manager. The computer can be applied to the structured portion of the problem, but the manager is responsible for the unstructured portion——applying judgment or intuition and conducting analyses.Unit 10The linked list (see figure 1) consists of a series of nodes, which are not necessarily adjacent in memory. Each node contains the element and a link to a node containing its successor. We call this the next link. The last cell’s next link references null.To execute printList or find(x) we merely start at the first node in the list and then traverse the list by following the next links. This operation is clearly linear-time, as in the array implementation, although the constant is likely to be larger than if an array implementation were used. The findKth operation is no longer quite as efficient as an array implementation; findKth(i) takes O(i) time and works by traversing down the list in the obvious manner. In practice, this bound is pessimistic, because frequently the calls to findKth are in sorted order (by i). As an example, findKth(2), findKth(3), findKth(4), and findKth(6) can all be executed in one scan down the list.The remove method can be executed in one next reference change. Figure 2 shows the result of deleting the second element in the original list.The insert method requires obtaining a new node from the system by using a new call and then executing two reference maneuvers. The general idea is shown in figure 3. The dashed line represents the old next reference.Unit 11(a) A set is pure if all of its members are sets, all members of its members are sets, and so on. For example, the set containing only the empty set is a nonempty pure set.(b) A language is a describable set of finite strings, drawn from a fixed alphabet. A grammar is one way to "describe" the language. The grammar consists of a finite list of rules, where each rule replaces one substring with another. The string on the left must contain at least one nonterminal. The first string "produces" or "generates" the second. Thus a rule is also called a production.(c) A finite-state machine (FSM) or finite-state automaton(FA)is a mathematical abstraction sometimes used to design digital logic or computer programs. It is a behavior model composed of a finite number of states, transitions between those states, and actions, similar to a flow graph in which one can inspect the way logic runs when certain conditions are met.(d) Sometimes it is inconvenient or impossible to describe a set by listing all of its elements. Another useful way to define a set is by specifying a property that the elements of the set have in common. The notation P(x) is used to denote a sentence or statementP concerning the variable object x. The set defined by P(x) written {x | P(x)}, is just a collection of all the objects for which P is true.Unit 12(a) Because drawings are typically displayed in 3D, CAD is especially helpful in designing automobiles, aircraft, ships, buildings, electrical circuits (including computer chips), and even clothing.(b) Computer-integrated manufacturing (CIM) is the manufacturing approach of using computers to control the entire production process. This integration allows individual processes to exchange information with each other and initiate actions. Through the integration of computers, manufacturing can be faster and less error-prone, although the main advantage is the ability to create automated manufacturing processes.(c) In addition to supporting decision making, coordination, and control, information system may also help managers and workers analyze problems, visualize complex subjects, and create new products.(d) Knowing the history and evolution of ERP is essential to understanding its current application and its future developments.(e) In addition to monitoring operational activities such as tracking the status of orders and inventory levels, enterprise system also improve organization-wide reporting and decision making.Unit 13(a) There are a wide variety of educational application programs available. Educational software is designed to teach one or more skills, such as reading, math, spelling, a foreign language, world geography, or to help prepare for standardized tests.(b) Electronic business (e-business) is the use of information technology and electronic communication networks to exchange business information and conduct transactions in electronic, paperless form.(c) Word processing software allows you to use computers to create, edit, store, and print documents. You can easily insert, delete, and move words, sentences, and paragraphs——without ever using an eraser.(d) What is a spreadsheet? Spreadsheet software takes its name from the accountant’s columnar worksheet, which it imitates. A spreadsheet is a worksheet consisting of a collection of cells formed by the intersection of rows and columns. Each cell can store one piece of information: a number, word or phrase, or formula.Unit 14(a) A geographic information system (GIS) is a system that captures, stores, analyzes, manages and presents data with reference to geographic location data. In the simplest terms, GIS is the merging of cartography, statistical analysis and database technology.(b) The GPS receiver uses the messages it receives to determine the transit time of each message and computes the distance to each satellite. These distances along with the satellites' locations are used to compute the position of the receiver. This position is then displayed, perhaps with a moving map display or latitude and longitude; elevation information may be included.(c) Virtual reality (VR) is a term that applies to computer-simulated environments that can simulate physical presence in the real world. Most current virtual reality environments are primarily visual experiences, displayed either on a computer screen or through special stereoscopic displays, but some simulations include additional sensory information, such as sound through speakers or headphones.Unit 15(a) The software development process is sometimes called the software development life cycle (SDLC), because it describes the life of a software product from its conception to its implementation, delivery, use, and maintenance.(b) How can the CMM help your organization? There are three key roles the CMM plays. First, the CMM helps build an understanding of software process by describing the practices that contribute to a level of process maturity. The second role of the CMM is to provide a consistent basis for conducting appraisals of software processes. The CMM’s third key role is to serve as a blueprint for software process improvement.(c) The UML offers a standard way to write a system’s blueprints, including conceptual things such as business processes and system functions as well as concrete things such as programming language statements, database schemas, and reusable software components. The UML represents a collection of the best engineering practices that have proven successful in the modeling of large and complex systems.(d) Object modeling is a technique for identifying objects within the system environment and the relationships between those objects. The object-oriented approach to system development is based on several concepts, such as object, attribute, behavior, encapsulation, class, inheritance, polymorphism, persistence, etc.Unit 16“Security” is an all-encompassing term that describes all the concepts, techniques, and technologies to protect information from unauthorized access. There are several requirements for information security.Confidentiality: hiding data, usually with encryption, to prevent unauthorized viewing and access.Authenticity: the ability to know that the person or system you are communicating with is who or what you think it is.Access control: once a person or system has been authenticated, their ability to access data and use systems is determined by access controls.Data integrity: providing assurance that an information system or data is genuine.Availability: making sure that information is available to users in a secure way.To prevent unauthorized access, some type of identification procedure must be used. These vary from passwords to physical access object (access cards, etc.) to biometric devices that verify some type of personal characteristic, such as a fingerprint.Some of the most secure access control systems address both identification and authentication. Identification involves verifying that the person’s name or other identifying feature is listed as an authorized user; authentication refers to determining whether or not the person is actually who he or she claims to be.Unit 17A distributed system is a collection of independent computers which appear to the users of system as a single computer. Nearly all large software systems are distributed. For example, enterprise-wide business systems must support multiple users running common applications across different sites.A distributed system encompasses a variety of applications, their underlying support software, the hardware they run on, and the communication links connecting the distributed hardware. The largest and best-known distributed system is the set of computers, software, and services comprising the World Wide Web, which is so pervasive that it coexists with and connects to most other existing distributed systems. The most common distributed systems are networked client/server systems. Distributed systems share the general properties described below.●Multiple nodes●Message passing or communication●Resource sharing●Decentralized control●Concurrency or parallelism●Fault tolerance●Heterogeneity●OpennessDistributed systems have many inherent advantages, especially over centralized systems. Some applications are inherent distributed as well. In general, distributed systems:●Yield higher performance●Allow incremental growth●Allow one user to run a program on many different machines in parallel ●Provide higher reliability● .●●。

012-P3U1A-B-Computer_Structure_and_Function

012-P3U1A-B-Computer_Structure_and_Function
计算机的结构与功能 这一节介绍计算机的内部体系结构,描述了指令如何 存储和译码,并解释了指令执行周期怎样分解成不同的部 分。
P3U1A Computer Structure and Function 计算机结构与功能
At the most basic level, a computer simply executes binarycoded instructions stored in memory. These instructions act upon binary-coded data to produce binary-coded results. For a general-purpose programmable computer, four necessary elements are the memory, central processing unit (CPU, or simply processor), an external processor bus, and an input/output system as indicated in Fig. 3-lA-1.
在简单的计算机中,每条指令可分为四段,每段有四位。 每条指令包括操作代码(或操作码,每条指令有唯一的操作 码)、操作数地址、立即操作数、转换地址。
P3U1A Computer Structure and Function 计算机结构与功能
In a real instruction set there are many more instructions. There is also a much larger number of memory locations in which to store instructions and data. In order to increase the number of memory locations, the address fields and hence the instructions must be longer than 16 bits if we use the same approach. There are a number of ways to increase the addressing range of the microprocessor without increasing the instruction length: variable instruction fields, multiword instructions, multiple addressing modes, variable instruction length. We will not discuss them in detail.

大学生体验英语第四版U3

大学生体验英语第四版U3

Unit 3 CopyrightFamous QuoteIntellectual property has the shelf life of a banana.— Bill GatesBill Gates (1955 —): Chairman, former chief executive officer and cofounder(with Paul Allen) of Microsoft Corporation. He was born in Seattle,Washington USA, later dropped out of Harvard University and created theworld’s leading computer software company, which continually advanced andimproved software technology along the way. With the growth in value ofMicrosoft stock, he has become one of the world’s richest individuals. Heretired in 2008 and intended to devote the rest of his time to the Bill andMelinda Gates Foundation, the wealthiest charity in the world, which is aimedat improving healthcare around the world and reducing extreme poverty.Unit OverviewCopyright is a legal term describing rights given to creators for their literary and artistic works. Nowadays in the digital age, the digital technology and digital communications networks such as the Internet and personal computers have raised challenging issues for copyright protection due to the ease of reproduction, dissemination and storage of copyrighted creative works. In this unit, the status quo of phenomena associated with copyright such as movie and book piracy will be presented, various factors contributing to the phenomena will be discussed, and potential solutions to the copyright infringement problem will be considered. Students will acquire a better and more thorough understanding about copyright protection through various listening, watching, reading and speaking activities. They will also conduct real-life learning projects like surveying college students’ awareness of copyright and debating on “Movie Piracy Sentence: Does the Punishment Fit the Crime” with their peers to put what they have learned in class into use.In this unit, you will∙get to know about copyright protection through listening, watching and reading∙talk about the phenomena of and solutions to copyright infringement through guided activities∙conduct a survey on college students’ awareness of copyrights with your peers∙conduct a debate on “Movie Piracy Sentence: Does the Punishment Fit the Crime” with your peers∙learn useful words and expressions∙learn to reflect on your own learning and comment on that of your peers∙learn to think independently, critically and creativelyBackground InformationCopyrightCopyright is a legal term describing rights given to creators for their literary and artistic works. It begins at the moment of creation when the work of authorship is fixed in a tangible medium. The three elements for copyright ownership and protection are creativity, originality and fixation.Copyright owners hold the exclusive right to use or authorize others to use their literary or artistic works on agreed terms. Literary works include novels, poems, plays, reference works, newspapers and computer programs; databases; films, musical compositions, and choreography, while artistic works cover paintings, drawings, photographs and sculpture; architecture; advertisements, maps and technical drawings. The use of those works can be in the form of reproduction, public performance, recordings, broadcasting and translation or adaptation.Copyright protection includes both economic rights and moral rights. Copyright owners enjoy economic rights with a time limit of 50 years after the creator’s death according to the relevant WIPO (World Intellectual Property Organization) treaties. Such a limit enables both creators and their heirs to benefit financially for a reasonable period of time. Moral rights, on the other hand, involve the right to claim authorship of a work, and the right to oppose changes to it that could harm the creator’s reputation.The primary purpose of copyright law is not so much to protect the interests of the authors/creators, but rather to promote the progress of science and the useful arts--- that is --- knowledge. To accomplish this purpose, copyright ownership encourages authors/creators in their efforts by granting them a temporary monopoly or ownership of exclusive rights for a specified length of time so that their works can be disseminated without fear of unauthorized copying or piracy. This in turn helps increase access to and enhances the enjoyment of culture, knowledge, and entertainment all over the world.The field of copyright and related rights has expanded enormously with the technological progress of the last several decades. Dissemination of works via the Internet is but the latest development which raises new questions concerning copyright. WIPO is deeply involved in the ongoing international debate to shape new standards for copyright protection in cyberspace and setting down international norms aimed at preventing unauthorized access to and use of creative works on the Internet or other digital networks.Topic Preview1. Read the passage on Page X and learn useful expressions related to copyright protection.2. Log on line and search for information concerning copyright protection. List the categories of copyrighted works and collect various examples or real-life cases of copyright infringement in the digital age. Speculate on the reasons why the violation of copyright law, for instance, piracy, commonly exists in the world.Lesson OneLead inTask 1 Describing the PicturesDescribe the pictures first and then discuss whether Goojje has infringed on the copyright of Googleand the reasons behind such an action.Teaching Tips1.This task is designed to prepare students for the topic “Copyright”.2.Ask students to describe the pictures with their peers.3.Here are some questions for students to discuss: What do you know about the world famoussearch engine, Google? What happened to Google China at the beginning of the year of 2010?What is the public’s response to Google’s withdrawal from the Chinese market? What is the public’s response to the emergence of Goojje right after Google’s announcement to withdraw from China? What do you think of Goojje, a website that appears rather similar to Google in terms of logo design?Read through the Supplementary Reading on Page X, and answer the following questions.1.What is copyright?Answer: Copyright is a legal term describing rights given to creators for their literary and artistic works. / Copyright is protection provided by law to the authors/creators of “original works of authorship” exp ressed in any tangible medium.2.What requirements must be met so that copyright ownership and protection is available?Answer: Three requirements must be met, i.e. fixation, originality and minimal creativity.3.According to the relevant WIPO treaties, how long do the economic rights of copyright last?Answer: 50 years after the creator’s death.4.What is the purpose of protecting copyright?Answer: The main purpose is to help increase access to and enhance the enjoyment of culture, knowledge and entertainment all over the world.5.What is the latest development that has raised new questions concerning copyright?Answer:Dissemination of works via the Internet.Read through the words in the left-hand column, and match each of them with the appropriate meaning in the right-hand column.1. copyright A. to make sth. stronger or to make policies, regulations, orpunishments firmer or stricter2. deter B. the act of committing money or capital in order to gain a financialreturn3. toughen C. the illegal copying of things such as books, video tapes, computerprograms and so on4. piracy D. the legal right granted to an author, a composer, a playwright, apublisher, or a distributor to exclusive publication, production,sale, or distribution of a literary, musical, dramatic, or artistic work 5. fake E. made to look valuable or genuine, usually in order to deceivepeople6. investment F to prevent or discourage from acting, as by means of fear or doubt Key: 1-D 2-F 3-A 4-C 5-E 6-BAudio StudioWord Bank1. blockbuster n. a film or book that is very popular and successful, usually because itis very exciting 流行佳作,受到广泛普及和销售量巨大的事物2. renaissance n. a revival of intellectual or artistic achievement and vigor复兴, 复活3. partially adv. happening or existing to some extent, but not completely部分地4. camcorder n. a portable video camera which records both pictures and sound 可携式摄像机5. deterrent n. sth. that prevents people from doing sth. by making them afraid ofwhat will happen to them if they do it威慑6. shelve v. to place or arrange on a shelf 置于架上7. pirate n.v. one who makes use of or reproduces the work of another without authorization 侵犯版权者to make use of or reproduce another’s work without authorization 非法翻印,非法仿制8. speculate v. to make guesses about the nature or identity of sth., or about whatmight happen 推测,思考9. availability n. the condition of being present and ready for use可用性10. devious adj. departing from the correct or accepted way 犯错误的,步入歧途的11. alternative adj. existing outside traditional or established institutions or systems存在于传统或现存体制系统以外的12. exclusive adj. used or owned by only one person or group, and not shared withanyone else 独占的13. stringent adj. very severe or strictly controlled 严厉的,严格的14. sneak v. to take sth. somewhere secretly 偷偷摸摸地做15. duplicate v. to make exact copies of sth. which has been written, drawn, orrecorded onto tape 复制Listen to the audio clip, and choose the right answers to the questions.1.What do you know about Avatar in terms of piracy?A) Large amounts of pirated copies of the movie have been shelved before its China release.B) People can not record the 3D Avatar in cinemas so piracy of it has been deterred.C) Whether the movie is in 3D format contributes a lot to the piracy of it.2.What can we draw from the report about the solution to piracy of movies?A) 3D movies can slow piracy in the filming industry thanks to its high technology.B) Neither the Chinese government nor the U.S. filming industry knows what to do.C) No cooperation has been achieved between the Chinese and U.S. filming industry.sentences after you have completed them.1.Has the 3D format cut down on the amount of movie piracy as Hollywood hopes?2.While this makes the process of filming movies inside the theatre much more difficult, those withknowledge of video equipment can get around the 3D deterrent.3.China has roughly 200 mainland theatres equipped to show 3D films.4.There are hundreds of people with industry “ins” willing to pass along exclusive copies of the filmfor big bucks.5.They’re snuck out of the studios, sent overseas, duplicated a million times and then sold on thestreets./arts/2010-01/05/content_19183820.htmVideo StudioWord Bank1. represent2. informer3. raid4. rampant5. pump6. legitimate7. client8. fuel9. burner10. agenda11. forthwith12. thrive v.n.n.adj.v.adj.n.v.n.n.adv.v.to serve as the official and authorized delegate or agent for 代表a person who tells the police that someone has done sth. illegal 告密者sudden, forcible entry into a place by police in order to look for dangerous criminals or for evidence of sth. illegal, such as drugs or weapons 突然搜索very common and being increasing in an uncontrolled way 猖獗的to draw, deliver or pour forth as if with a pump 注入acceptable according to the law 合法的,合理的a person or company that receives a service from a professionalperson or organization who does this in return for payment 客户, 委托人to support or stimulate the activity or existence of sth. 激起a device which produces heat or a flame, especially as part of acooker, stove, or heater 火炉,火口a list or program of things to be done or considered议事日程immediately 立刻,即刻to make steady progress, to prosper 繁荣Complete the following statements with the phrases given below. Predict what will be talked about in the video. Then check your answers after watching the video clip.get in one ’s way step up wipe out put aside account for1. The Motion Picture Association of America, which represents Hollywood’s major studios, has put aside 150,000 US dollars to reward informers whose tips lead to raids on DVD factories in Asia.2. By some estimates, legitimate sales account for barely half of all the movies and music availablein Taiwan.3. These criminal organizations have guns and knives. If you get in their way , you could be attacked.4. The US government, which has placed Taiwan on a copyright piracy watch list, has also steppedup the pressure.5. Piracy is not something we can wipe out overnight, we have to do it gradually.Watch this part of the video clip. Identify the incorrect information in the following statements, and make corrections where necessary.13. file14. disguise15. mount16. manufacturer17. set18. toughenv. v. v. n. adj. v. to make a formal or legal accusation, complaint, or to request officially 提起申请 to modify the manner or appearance in order to prevent recognition 假扮,化妆 to increase in amount, extent, or intensity 增长 a business or company which makes goods in large quantities to sell 制造商 ready to do sth. or likely to do sth., determined 有准备的,决定的 to make policies, regulations, or punishments firmer or stricter 使更严格1.The Motion Picture Association of America has put aside 150,000 yuan RMB to reward informerswhose tips lead to raids on DVD factories in Asia.Correction:The Motion Picture Association of America has put aside 150,000 US dollars to reward informers whose tips lead to raids on DVD factories in Asia.2.A s Mike Chanoi reports in this week’s “Look at the Business of Film”, movie piracy still runsrampant in America.Correction: A s Mike Chanoi reports in this week’s “Look at the Business of Film”, movie piracy still runs rampant in Asia.3.Taiwan has become one of Asia’s leading centers of CD and DVD manufacturing.Correction: Taiwan has become one of Asia’s leading centers of copyright piracy.4. A huge underground trade is fueled by organized crime, ineffective government and a public withno awareness of copyright protection.Correction: A huge underground trade fueled by organized crime, ineffective government and a public more interested in cheap products than legal ones.5.“We work hard to shoot a film, but it doesn’t sell because the quality is not as good as expected.”Correction:“We work hard to shoot a film, but it doesn’t sell because the pirates get there first.”Watch this part of the video clip and answer the following questions.1.Among the movies and music available in Taiwan, how much do legitimate sales account for?Answer: Barely half.2.How much is the loss just for American Entertainment companies?Answer:Over 750 million dollars a year.3.What will a lot of companies do if the issue is not solved?Answer:They will reexamine their investments in Taiwan.4.What is part of the reason why the trade of pirated products thrives in Taiwan?Answer:Because under Taiwan law, piracy is not considered a “public crime”.5.What have top Asian movie and music stars done concerning piracy?Answer:They have marched to demand action.Source/programs/view/Xn8e7SS6IX0/Speaking WorkshopExpressions & Structures to UseDiscuss with your peers and complete the following tips with the information you have learned in the video clip. Then prepare an oral presentation with the help of the tips.Work with your peers on the situation below and try to come up with a solution to the problem described. You are expected to share your ideas and justify yourself in this process. Use as many phrases from the “Expressions & Structures to Use” box as possible.Situation1.Work in groups of four. One acts as a college student who has recently purchased a movie DVD,music CD, or computer game. The other three group members act as his or her classmate, father/mother, and brother/sister who ask if it is OK to borrow the DVD, CD, or computer game to make a copy for personal use. These three students must present the reasons why they want to do this and state the benefits they may attain from their behaviors. The college student, on the other hand, must try to point out the harmful consequences of those copyright infringement behaviors, persuade them to buy the products themselves and remind them of the importance of copyright protection.2.You have 15 minutes to discuss within your own group.3.Several groups will be selected to present their role plays. The rest of the class will vote for one ofthe group members they feel happiest to support in each group’s performance.Project BulletinWork on the following real-life project with your group members and present your report in the next class.Real-Life ProjectWork in a group of six to eight. As a workgroup from the general Administration of Press and Publication (GAPP) in China, you are assigned to conduct a survey on college students’ awareness of copyright laws. Design a questionnaire which can gather information on the awareness of copyright protection and the consumption of different types of pirated products among college students in terms of gender, age, major and university. Ask students in your university or neighboring ones to fill in the questionnaires. Summarize and analyze the answers, probe into the reasons of the existing phenomena, and draw conclusions or propose solutions from the perspective of copyright owners, the general public and the government respectively. Then present a report on the survey in the next class.Lesson TwoLead inTask 1 BrainstormingTeaching Tips1.This task is designed to arouse students’ interest in the issue of book piracy.2.Ask students to work in groups and fill in the table.3.Encourage students to share their opinions and argue with each other when disagreements occur.pare the reading styles of people (for example in China) before and after they have access tothe Internet. Share your opinions with your peers.Before After2.Suppose you are a writer. You have recently finished writing a novel and a publishing house haspromised to get it published. How are you and the publishing house going to make your book a huge success in sales? What are you and the publishing house going to do to combat piracy of your book? List as many strategies as you can think of and share them with peers.Task 2 Expanding Your VocabularyTeaching Tips1.This task is designed to enlarge students’ vocabulary and improve their ability to explain words inEnglish.2.Ask students to match the words with the correct meaning and memorize the English explanations.Read through the words in the left-hand column, and match each of them with the appropriate meaning in the right-hand column.1. confine A. to try to stop sth. from happening, to struggle against2. stimulate B. exclusive control by one group of the means of producing or selling acommodity or service3. ownership C. to keep within bounds, to restrict4. combat D. an argument or disagreement between people or groups5. lawsuit E. considered to be acceptable because it does not break any laws or rules6. monopoly F. to encourage sth. to begin or develop further7. permissible G. a case in a court of law which concerns a dispute between two peopleor organizations8. dispute H. the state of possessing somethingKey: 1-C 2-F 3-H 4-A 5-G 6-B 7-E 8-DAudio StudioWord Bank1. peek n. a quick look at someone or sth., often secretly 一瞥2. hardback n. a book which has a stiff hard cover 精装书3. device n. an object that has been invented for a particular purpose 装置, 设计4. boost v. to cause sth. to increase, improve, or be more successful 推进, 刺激增长5. pose v. to cause a problem or a danger 引起, 造成6. slump v. to fall suddenly and by a large amount 衰落,萧条7. vampire n. a creature in legends and horror stories that is said to come out ofgraves at night and suck the blood of living people 吸血鬼8. paramount adj. more important than anything else 极为重要的9. novelist n. a person who writes novels (长篇)小说家10. minimize v. to reduce sth. to the lowest possible level, or prevent it increasingbeyond that level 将……减到最少11. shrug v. to raise your shoulders to show that you are not interested in sth. orthat you do not know or care about sth. 耸肩12. release n. a new book, CD, video, or film that has just become available forpeople to buy or see 发行的影片、书刊等13. overstate v. to describe sth. in a way that makes it seem more important orserious than it really is 把……讲得过分,夸大14. purchase v. to obtain in exchange for money or its equivalent, to buy 购买15. bound adj. equipped with a cover or binding 装订的Listen to the audio clip, and choose the right answers to the questions.1.What is the audio clip mainly about?A) Publishers and authors must work together to combat book piracy in the digital age.B) Digital piracy is spreading to books and views vary on how to combat it.C) The future of bookselling relies increasingly on e-books as well as hardback editions.2.What have publishers or authors done to combat e-book piracy?A) Some publishers have encouraged readers to stick with traditional hardback book reading.B) Some authors have sued those file-sharing sites for violation of copyright law.C) Some authors have gone as far as to shrug off e-book technology altogether.Task 2 Checking the FactsListen to the audio clip again, and answer the following questions.1.How many times had Dan brown’s “The Lost Symbol” been downloaded for free within days?Answer:Over 100,000 times.2. What has helped boost demand for e-books?Answer: Electronic reading devices (such as Amazon’s Kindle and the Sony Reader).3. What happened to the idea of artistic ownership on the Internet according to Sherman Alexie?Answer: It has gone away.4. According to recent statistics, who buy more books than those who stick with traditional bound volumes?Answer: Consumers who purchase an e-reader.5. How many books do Kindle owners buy on the site according to the Amazon report?Answer: On average, they buy 3.1 times as many books on the site as other customers./2010/TECH/01/01/ebook.piracy/index.html?iref=allsearchVideo StudioWord Bank1. repository n. a place where sth. is kept safely 贮藏室,宝库2. preview n. an opportunity to see sth. such as a film, exhibition, or inventionbefore it is open or available to the public 预览3. settlement n. an official agreement between two sides who were involved in aconflict or argument 协议4. opt v. to choose sth. or decide to do sth. in preference to anything else选择5. commission n. a group of people who have been appointed to find out about sth.or to control sth. 考察团,调查团6. hearing n. an official meeting which is held in order to collect facts about anincident or problem 听证会7. showcase v. to display or present sth. to its best advantage 展示, 突出地展示8. heritage n. all the qualities, traditions, or features of life there that havecontinued over many years and have been passed on from onegeneration to another 遗留物,传统9. primarily adv. chiefly, mainly 主要地10. ultimately adv. finally, after a long and often complicated series of events 最后,最终11. submission n. a proposal, report, or other document that is formally sent orpresented to someone, so that they can consider or decide about it提交物,意见,建议12. dramatic adj. happening suddenly and being very noticeable and surprising 引人注目的13. regime n. the way that sth. such as an institution, company, or economy isrun, especially when it involves tough or severe action 体制14. authoritarian adj. characterized by or favoring absolute obedience to authority asagainst individual freedom 独裁主义的15. block n.v. sth. that obstructs; an obstacle 障碍物to stop or impede the passage of or movement through sth. 阻碍, 封锁16. circumnavigate v. to go around 绕行, 避开Complete the following statements with the phrases given below. Predict what will be talked about in the video. Then check your answers after watching the video clip.from the user point of view access to opt out ofbe blocked from out of print in the first placegain an advantage1.But then Google started to scan the full text of millions of books that are out of print but are stillin copyright.2.After a lawsuit in the U.S., it has agreed to a $125 million settlement, sharing sales of books withauthors and the rights agency to settle copyright disputes and giving authors just until last Friday to opt out of the service.3.Win for us because we’re satisfying our users and of course from the user point of view, muchmore access, easy access to the world’s information and our universal heritage.4.Google is being rewarded for breaking the law in the first place for doing something that was atfirst not permissible and is now gaining an advantage through such actions.5.But until an agreement can be reached with the EU, European visitors will be blocked fromaccessing the books under dispute although there are simple online services just one Google search away that will allow users to circumnavigate the blocks.Task 2 Checking Your ComprehensionWatch this part of the video clip and answer the following questions.1. For five years, what have users been able to read via Google?Answer: Classic books that are out of copyright and shorter previews of more recent titles.2. What has been agreed on after the lawsuit in the U.S. concerning Google?Answer: A $125 million settlement sharing sales and settling copyright disputes.3. What did Google say about their purpose of scanning books at a European commission hearing?Answer:They said they want to give new life to old books.4. Why might Google’s model not work in Europe?Answer:Because in Europe books remain in copyright until 70 years after the death of the author indicating that books published before 1923 are still in copyright.5. How many books might Google have scanned one day according to the reporter’s prediction?Answer: As many books as we’ll find on the shelves at the British Library.Task 3 Bridging the GapWatch this part of the video clip and complete the following table.Source/video/#/video/tech/2009/09/08/cohen.euro.google.books.itn?iref=allsearch Speaking WorkshopExpressions & Structures to UseTask 1 SummarizingDiscuss with your peers and complete the following tips with the information you have learned in the video clip. Then prepare an oral presentation with the help of the tips.Debate on the motion Movie Piracy Sentence: Does the Punishment Fit the Crime?.Read through the Pros and Cons of the motion provided in the box, and develop your own arguments. During the debate, you are expected to justify yourself, challenge the opposite view and respond to your opponents properly and skillfully.Background: A Montreal man, Geremi Adam, 27, was sentenced to 2½ months behind bars this year for pirating and illegally distributing copyrighted material on the internet. He pleaded guilty to two counts of distributing high-quality, pirated copies of Hollywood film productions.Alternative debate: Without the Internet and other digital technologies, piracy will not be so rampant.Teamwork show。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
相关文档
最新文档