计算机专业英语的课文与翻译之令狐文艳创作
宋世风俗 日知录原文加翻译之令狐文艳创作

《宋史》言士大夫忠义之气,至于五季变化殆尽。
宋之初兴,范质、王溥犹有馀憾。
艺祖首褒韩通,次表卫融,以示意向。
真、仁之世,田锡、王禹、范仲淹、欧阳修、唐介诸贤,以直言谠论倡于朝。
于是中外荐绅知以名节为高,廉耻相尚,尽去五季之陋。
故靖康之变,志士投袂起而勤王,临难不屈,所在有之。
及宋之亡,忠节相望。
呜呼!观哀、平之可以变而为东京,五代之可以变而为宋,则知天下无不可变之风俗也。
《剥》上九之言硕果也,阳穷于上,则复生于下矣。
令狐文艳《宋史》上说,当官的忠诚和豪义的气概,到了五代的时候,都改变得差不多了;宋朝刚建立时,范质、王溥仍有遗憾。
赵匡胤最褒奖韩通,挨下来就是卫融了,用来表达他的意愿。
宋真宗、宋仁宗的时候,田锡、王禹偁、范仲淹、欧阳修、唐介众位贤能的人才,在朝廷倡导正直的言论,从此之后,朝廷内外的缙绅,知道用高尚的名节、正直而知耻崇尚对方,完全消除了五代的丑陋的风气。
因此靖康之变时,有志之士奋发而起义为皇帝献身,面临危难也不屈服,所在的各地都有这样的人。
等到宋朝灭亡,忠义有气节的人士互相指望扶持。
啊!我看西汉哀帝和平帝可以被王莽所灭并定都东京,五代可以灭亡变为宋朝,就知道了世上没有不可以改变的风俗了。
《周易》《剥》卦上多次说炼丹时,上面的火星灭了,那么又会在下面重燃。
人君御物之方,莫大乎抑浮止竟。
宋自仁宗在位四十徐年。
虽所用或非其人,而风俗醇厚,好尚端方,论世之士谓之君子道长。
及神宗朝荆公秉政,骤奖趋媚之徒,深锄异己之辈。
邓绾、李定、舒、蹇序辰、王子韶诸奸,一时擢用,而士大夫有“十钻”之目。
干进之流,乘机抵隙。
驯至绍圣、崇宁,而党祸大起,国事日非,膏育之疾遂不可治。
後之人但言其农田、水利、青苗、保甲诸法为百姓害,而不知其移人心、变士心为朝廷之害。
其害于百姓者,可以一日而更,而其害于朝廷者历数十百年,滔滔之势一位而不可反矣。
李应中谓:“自王安石用事,陷溺人心,至今不自知觉。
人趋利而不知义,则主势日孤。
高中英语必修3课文逐句翻译(人教新课标)之令狐文艳创作

高中英语必修3课文逐句翻译(人教新课标)之令狐文艳创作snow.(节日里)整个国度到处是盛开的樱花,看上去就像覆盖了一层粉红色的雪。
People love to get together to eat , drink and have fun with each other. 人们喜欢聚在一起吃、喝、玩耍。
节日让我们享受生活,Festivals let us enjoy life, be proud of our customs and forget our work for a little while.让我们为自己的习俗而自豪,还可以暂时忘掉工作中的烦恼。
2.令狐文艳3.必修三Unit 1 A SAD LOVE STORY一段伤心的爱情故事Li Fang was heart-broken.李方的心都碎了。
It was Valentine’s Day and Hu Jin had said she would meet him at the coffee shop after work. 这天是情人节,胡瑾说她下班后会在咖啡馆和他见面的。
But she didn’t turn up. 可现在她却不见人影。
She could be with her friends right now laughing at him. 也许她这会儿跟朋友在一起,正在取笑他呢。
She said she would be there at seven o’clock,令狐文艳and he thought she would keep her word. 她说她会在7点到达,他(李方)认为她会守信用的。
He had looked forward to meeting her all day, and now he was alone with his roses and chocolates, like a fool. 他一整天都期盼着见到她,而现在他拿着玫瑰花和巧克力独自一人守候着,像个傻瓜一样。
the_cask_of_Amontillado_翻译之令狐文艳创作

the cask of Amontillado Edgar Allan Poe令狐文艳阿芒提拉多的水桶埃德加艾伦坡福吐纳托对我百般迫害,我都尽量忍在心头,可是一旦他胆敢侮辱我,我就发誓要报仇了,您早就摸熟我生性脾气,总不见得当我说说吓唬人。
总有一天我要报仇雪恨;这个注意坚定不移,既然拿定主意不改,就没想到会出危险。
我不仅要给他吃吃苦头,还要干得绝了后患。
报仇的自己得到报应,这笔仇就没了清。
复仇的不让冤家知道是谁害他,这笔仇也没了清。
不消说,我一言一语,一举一动都没引起福吐纳托怀疑是存心不良。
还是照常对他笑脸相迎,可他没看出如今我是想到要送他命才笑呢。
福吐纳托这人在某些方面虽令人尊重,甚至令人敬畏,可就是有个弱点。
他自夸是品酒老手。
意大利人没几个具有真正行家的气质。
他们的热诚,多半都用来随机应变,看风使舵,好让英国和奥地利的大财主上当。
谈到古画和珠宝方面,福吐纳托跟他同胞一样,夸夸其谈,不过谈到陈酒方面,倒是真正识货。
这点我跟他大致相同——对意大利葡萄酒,我也算内行,只要办得到的话,就大量买进。
在热闹的狂欢节里,有天傍晚,正当暮色苍茫,我碰到了这位朋友。
他亲热的招呼我,因为他肚里灌饱了酒。
这家伙扮成小丑,身穿杂色条纹紧身衣,头戴圆尖帽,上面系着铃铛。
我看见他真是高兴极了,不由想握着他的手久久不放。
我对他说:“老兄啊,幸会,幸会。
你今天气色真是好到极点。
我弄到一大桶所谓白葡萄酒(西班牙蒙蒂利亚生产的一种甜酒),可我不放心。
”“怎的?”他说,“白葡萄酒?一大桶?不见得吧!在狂欢节期间哪弄得到?”“我不放心,”我答道,“我真笨透了,居然没跟你商量,就照白葡萄酒的价钱全付清了。
找又找不到你,可又生怕错过这笔买卖。
”“白葡萄酒!”“我不放心。
”“白葡萄酒!”“我一定得放下这条心!”“白葡萄酒!”“瞧你有事,我正想去找卢克雷西呢。
只有他才能品酒。
他会告诉我——”“可有些傻瓜硬说他眼力跟你不相上下呢。
”“快,咱们走吧。
初中英语全部课文之令狐文艳创作

初一上册Unit 1 My name’s Gina.令狐文艳Language Goals: Introduce yourself;Greet people; Ask for and give telephone number1. My name is Jenny Green. My phone number is 281-9176.My friend is Gina Smith. Her phone number is 232-4672.2. I’m Dale Miller and my frie nd is Eric Brown. His telephone number is 357-5689.My telephone number is 358-6344.3. My name is Mary Brown. My friend is in China. Her name is Zhang Mingming. My phone number is257-8900 and her number is 929-3155.Unit 2 This is my sister. Language Goals: Introduce people; Identify peopleMy FamilyHi, I’m Jenny, Here are two nice photos of my family. My grandfather and grandmother are in the first photo. These are my parents, Alan and Mary. In the next picture are my brothers, Bob and Eric. These two girls are my sister Cindy and cousin Helen. Coco is in my family too。
英语入门基础学习(免费版)之令狐文艳创作

英语学习攻略令狐文艳学习是件苦差事,自己不努力,资料再好也白搭。
不过还是希望这些有趣的句子能给你的学习带去些许的乐趣800个有趣句子帮你记忆7000个单词。
1. With my own ears I clearly heard the heart beat of the nuclear bomb. 我亲耳清楚地听到原子弹的心脏的跳动。
2. Next year the bearded bear will bear a dear baby in the rear. 明年,长胡子的熊将在后方产一头可爱的小崽。
3. Early I searched through the earth for earthenware so as to research in earthquake. 早先我在泥土中搜寻陶器以研究地震。
31. The maximum plus or minus the minimum makes minute difference. 最大值加上或者减去最小值只产生极小的差异。
32. The witty witness withdraws his words within minutes without any reason. 诙谐的证人在几分钟之内无故地收回了他说的话。
33. The cake maker shakes a naked snake with the quaking rake without sake. 蛋糕制造者无缘无故地用抖动的耙子摇一条赤裸的蛇。
34. By the crook, the cook looked through a cookbook before making hooked cookies. 在溪边,厨子在做钩形饼干之前查阅了一本食谱。
35. The writer writes the white book quitequietly in quilt. 作家在被子里十分平静地写白皮书。
仁爱英语九年级上册Unit1-Unit2课文翻译之令狐文艳创作

仁爱英语九年级上册Unit 1-Unit 2课文翻译令狐文艳Unit 1 The changing world变化中的世界Topic 1 Our country has developed rapidly我国发展迅速Section A1a:(After a long holiday, Kangkang is happy to see his friends.)(长假过后,康康很高兴会见到他的朋友们。
)Hi, Jane! Did you have a令狐文艳good summer holiday?你好,简,你暑假过得愉快吗?Yes. What about you?是的,你呢?Not bad. Rita, you have just come back from your hometown. How was your trip?不错。
丽塔,你刚从家乡回来,你的旅行怎么样?Great! I went to many places near my home in India. Great changes have taken place there and my hometown has become more and more beautiful. Where have you been, Jane? 好极令狐文艳了!在印度,我去了我家附近的很多地方。
那里发生了很大的变化,而且我的家乡变得越来越美丽了。
简,你去哪里了?I have been to Mount Huang with my parents. It's a beautiful place. But there were so many people that I couldn't find a good place to take photos. And where have you been, Kangkang ? 我和我的父母去过黄山,那是一个美丽的地方。
Topic D-3 Transaction Cycles之令狐文艳创作

It is far better, and easier in the long run, if you can relate general principles to each audit area rather than learning long lists of tests. This is partly because long lists of test are almost impossible to remember clearly and accurately and partly because the examiner might give you a slightly unusual situation which will require the approach to be modified slightly.Control objectives for all systems:Only authorized transactions are promptly recorded at the correct amount in the appropriate accounts in the proper accountingperiod, that access to assets is only in accordance with proper authorization and that recorded assets are compared with existing assets. Detailed control activities are often similar across sales, purchases and other areas and include for example: ·Sequential numbering ·Batch and control totals ·Controlaccounts ·Authorization REVENU ECYCLE Con trol objectives(1)To ensure that all sales revenues are included in the accounting records (2)to ensure that sales revenues included in the records are accurately stated(3)to minimise losses through bad debts and/or returns Segregation of duties(1)Accepting customer orders (2)Despatch department (3)Invoicing (4)Receiving and recording cash Authorisation and approval controls-examples(1)Check orders against credit limits (2)Orders should be authorised in writing (3)Sales invoices should be authorised in writing (4)Writing off bad debts should be authorised in writing.Physical controls-examples(1)Record orders on pre-numbered documents(2)No goods to be despatched without a despatch note (3)Goods returned should be used to prepare credit notes.Arithmetical controls-examples(1)Check calculations on invoices (2)Send statements to customers regularly (3)Identify overdue debts using age analysis (4)Chase customers for overdue debts.Segregation controls-examples (1)Credit notes should be authorised by someone unconnected with despatch or sales ledger functions (2)Sales invoices andcredit notes should be checked (prices, calculations etc) by a person other than the one preparing the invoice (3)Sales ledger personnel should be independent of despatch and cash receipt anisation controls-examples(1)Sequence checks on pre-numbered documents(2)Reconciliation of control account.Items to test·Customers vetted before credit is given ·Orders vetted against credit limits ·Goods despatched only against approvedcustomer orders ·All despatches and returns should be invoiced and recorded correctly (sales orders linked to despatch notes, linked to sales invoices; returns checked for quality andlogged)·Invoices/credit notes accurately prepared form price lists, customer trading termsetc ·Invoices prepared form despatch notes only ·Credit notes, bad debts and adjustments backed by appropriate documentation andauthorisation ·Salestransactions posted completely and accurately to ledgeraccounts ·Reconciliation of control account ·Chasing of overdue balances ·Segregation of duties.Analytical review procedures·Fluctuations in sales levels ·Cut-offproblems Check disclosure (eg, segmental information).Note that one approach to designing tests of control is to list the documents involved in the system, and think of tests for each document. This is illustrated below for a salessystem.Test for evidence of approval. Test for evidence of a sequence check. Test for:(1)Evidence that a GRN is raised for all sales returns accepted.(2)Evidence of a sequence check. Test for: (1)Serial numbering. (2)Evidence of a sequence check. (3)Evidence of matching sales invoices to despatch notes andcustomer orders. (4)Correct accounting. Test for: (1)Evidence of approval and matching to GRN. (2)Correct accounting. Test for evidence of authorisation of adjustments to sales ledger Test for: (1)Evidence of review of reconciliation to sales ledger.(2)Evidence of authorisation of adjustments to sales ledger control account.The point made in the previous chapter applies here with equal force: though detailed, these descriptions of accounting systems and controls are of great examinationimportance.1.Introduction This chapter covers controls over payroll, and the assets of cash, inventory and non-current assets which must be safeguarded and used properly for companypurposes.2.Payroll·Control objectives ·To ensure that payments made represent value received for authorised work ·to ensure that payroll costs are completely and accurately recorded in the financial statements Segregation controls –examples ·Wages/sala riesdepartment should be separate from receipts or paymentsfunctions. ·Duties of wages staff should be rotated during theyear. ·The employee making up the pay packets should be different from the employee preparing the payroll. ·Periodic surprise attendance at payouts.Physical controls –examples ·Supervision of clock cards and timingdevices ·Control over unclaimed wages Authorisation and approval controls – examples ·Writtenauthorisation to employ or dismiss any employee, or to change rates of pay ·Authorisation ofovertime ·An independent official should check the payroll and signit ·Employees should sign for their wages ·Wages cheque should carry twosignatures.Arithmetical and accounting controls –examples ·A sample of calculations should bechecked ·Control accounts should be maintained Personnel controls - example ·A wagessupervisor should be appointed Management controls -example ·Overall checks to highlight major discrepancies (eg, check against budget)Items totest ·time re cords properly maintained andauthorised ·starters, leavers and changes in rates properly authorised by a department independent of the payroll department ·overtime, bonuses and commissions properly authorised andchecked ·deductions properly calculated andrecorded ·changes to tax rates, allowances properly authorised and correctly implemented ·correct amounts paid to tax authorities and other externalorganisations ·appropriate amounts recovered from external organisations ·total payroll authorised ·adequate security over cash transmissions ·payroll totals correctly posted to ledger accounts ·segregation of duties.3.Cash system·To ensure that all cash receipts are properly collected, recorded andbanked ·to ensure that payments made to suppliers are in respect of authorised invoicesonly ·to ensure that amounts charged to the band statement are authorised ·to ensure that receipts and payments are recorded accurately and completely in the accounting records. Controls over cash receipts post. Controls over cash collected by the sales force. Controls over cash sales. Controls over banking. Controls over cheque payments. Band reconciliations. Controls overpetty cash. Items to test·proper controls over receipts in the form of till receipts, other cash takings, cheques and creditcards ·prompt banding of notes, coins, cheques and credit card vouchers ·reconciliation of cash receipts(eg, to tillrolls)·Proper controls over opening of mail, including log of cheques received ·Reconciliati on of log to bankingrecords ·Agreement of receipts to remittance advices ·All receipts properly recorded and posted tocorrect ledgeraccounts ·Reconciliation of receivables controlaccount ·Secure storage of unused cheques, etc·all cheques accurately prepared on the basis of approved documentation authorised limits for chequesignatories ·Bank transfers properly authorised against supportingdocumentation ·direct debits and standing orders properly authorised and monitored ·All payments properly recorded andposted to correct ledgeraccounts ·reconciliation of payables controlaccount ·Segregation ofduties ·Regular bank reconciliations.4.Other systemsInventories Control objectives·to ensure that inventory consumption and inventory transfers are correctly and completely recorded ·to ensure that inventory figures in the income statement and balance sheet are correctly stated ·To ensure that physical amounts of inventory heldreconcile to book quantities ·To minimise loss and wastage of inventory.Items to test·Inventory requisitions are based on authorised reorderlevels ·sequentially numbered goods received notes ·goods in are properly inspected ·Goods rejected are properly recorded and credit notes chased ·All movements of inventory properly recorded ·Inventory records reconciled to physicalquantities ·Issues to work in progress properly and consistentlyvalued ·All inventory issues correctly authorised ·Adequate security in holding inventories areas ·Segregation ofduties.Non-current assets Control objectives·to ensure that non-current assets are correctly recorded, adequately secured and properly maintained ·To ensure that acquisitions and disposals of non-current assets are properly authorised ·To ensure that acquisitions and disposals of non-current assets are for the most favourable price possible.Items totest·all acquisitions properly authorised ·all acquisitions accuratelyrecorded ·depreciation calculations should be properly authorised, consistent and appropriate ·all assets safeguarded ·all assets logged in register ·regular reconciliation of physical assets to register ·all title deeds securely stored ·all disposals properlyauthorised ·disposals at arm’s length to ensure best price ·all disposals properlyrecorded ·segregation of duties.Investments Control objectives·to ensure secure title to the investment ·to ensure that all income accruing is received.Items to test·defined authorisation system for acquisitions and disposals ·all acquisitions and disposals correctly recorded ·all investment income monitored and chased ·control accounts maintained and regularly reconciled ·segregation of duties.History Exam Question Analysis(Q1/J2006)1 (a)Statethe control objectives for the ordering, despatch and invoicing of goods. (5 marks)(b)Atlantis Standard Goods (ASG) Ltd has a year end of 30 June 2006. ASG is a retailer of kitchen appliances such as washing machines, fridges and microwaves.All sales are made via the company’s Internet site with dispatch and delivery of goods to the customer’s house made using ASG’s vehicles. Appliances are purchased from many different manufacturers. The process of making a sale is as follows: (1)Potential customers visit ASG’s website and select the kitchen appliance that they require. The website ordering system accesses the stock specification file to obtain details of products ASG sells.(2)When the customer chooses an appliance, order information including price, item and quantity required are stored in the orders pending file. (3)Online authorisation of credit card details is obtained from the customer’s credit card company automatically by ASG’s computer systems.(4)Following authorisation, the sales amount is transferred to the computerised sales day book. At the end of each day the total from this ledger is transferred to the nominal ledger. (5)Reimbursement of the sales amount is obtained from each credit card company monthly, less the appropriate commission charged by the credit card company. (6)Following authorisation of the credit card, order details are transferred to a goods awaiting despatch file and allocated a unique order reference code. Order detailsare automatically transferred to the dispatch department’s computer system. (7)In the despatch department, goods are obtained from the physical stock, placed on ASG vehicles and the computerised stock system updated. Order information is downloaded on a hand held computer with a writable screen. (8)On delivery, the customer signs for the goods on the hand held computer. On return to ASG’s warehouse, images of the customer signature are uploaded to the orders file which is then flagged as ‘order complete’.This year’s audit planning documentation states that a substantive approach will be taken on the audit.Required:Tabulate the audit tests you should carry out on the sales and despatch system, explaining the reason for each test. (15 marks)(20 marks)[答疑编号10403101:针对该题提问]1 (a)Control objectives Ordering of goods – Goods are only supplied to authorised customers –Orders are recorded correctly regarding price, quantity, item and customer details Despatch andinvoicing of goods – Orders are despatched to the correct customer – All despatches are correctly recorded – Despatches only relate to goods ordered and paid for by customers – Invoices raised relate to goods supplied by the company(b)Audit tests on sales and despatch systemNote to candidates: The focus of the answer should be on substantive tests. Compliance tests are allowable where they relate to the system described.(Q3/D2001)3 (a)Errors and misappropriations Errors and misappropriations that may occur if purchases and capital expenditure are not properly controlled include:(i)Purchases for goods and capital items the company cannot use resulting in wasted resources and operational difficulties. (ii)Not obtaining the best prices available. (iii)Purchases for goods and capital items for the personal use of staff (i.e., misappropriation). (iv)Incorrect recording and classification of purchases and capital items. (v)Non-payment for, or overpayment in respect of, purchases and capital items.(vi)Payment for purchases and capital items not received due to suppliers issuing fictitious invoices.(vii)Purchase of goods and capital items from suppliers with whom internal staff collude to pay inflated prices (segregation ofduties is necessary to prevent this).(b)Report to management (i)Weakness and consequences: The overall structure of the system is complex, resulting in wasted management time in classifying purchases and capital items.Recommendation: That the systems should be simplified to avoid management time being spent onwhat are essentially clerical duties. The budget setting process should be more realistic to avoid the need to classify capital items as purchases. (ii)Weakness and consequences: There is an out of date ordering system and an informal method of inputting changes. This results in wasted time in correcting orders produced automatically. Recommendation: That the system be updated . the time spent making adjustments is almost certainly greater than the time it would take to update the system. (iii)Weakness and consequences: Buyers. consortium system and changes to orders: changes to orders are made by the production controller.s junior managers and the buyers. consortium system can only be used by them. This represents a lack of segregation of duties; those with access to the assets (those involved in production)should not also be able to execute the transaction (which should be done by the buying department). Whilst collusion with the buyers. Consortium seems unlikely, it is possible that goods the company does not need at all could be purchased. Recommendation: That the buying department take over the responsibility for dealing with the buyers. consortiumand that staff operating the system are properly trained in its use. (iv)Weakness and consequences: The buyers. consortium system is taking up a large amount of system space and may be causing problems with other systems. Recommendation: That additional space be made to accommodate the system and that the software is investigated by systems engineers to establish the optimum technical solution.(v)Weakness and consequences: Only part of the buying takes place using the consortium which may be inefficient.Recommendation: That a review of the effectiveness of the use of the consortium be undertaken to establish whether to move more purchasing to the system.(vi)Weakness and consequences: The systems for budgeting and authorising capital expenditure and purchases are structurally weak as staff appear to find it necessary to circumvent the rules in order to do their jobs; the systems are also operating inefficiently as unauthorised capital expenditure is regularly incurred. It appears on the face of it that the structural problems are giving rise to the operational difficulties, although the operational difficultiesmay be independent of the structural weaknesses. Recommendation: That the structure and operation of both of the systems be reviewed in detail in the light of the operation of the business as a whole.Note: Answers might also be presented in a columnar format.[答疑编号10403102:针对该题提问]3 (a)Internal control systems are designed, amongst other things, to prevent error and misappropriation.Required:Describe the errors and misappropriations that may occur if purchases and capital expenditure are not properly controlled. (5 marks)(b)Cosmo is a high-quality, private motor manufacturing company. It has recently joined a consortium for the purchase of parts. Cosmo.s purchases and capital expenditure systems are not integrated.Purchases and capital expenditure There are complex internal rules relating to what constitutes a purchase, and what constitutes capital expenditure and the budgets for both are tightly controlled. Problems associated with the internal rules result in a significant number of manual adjustments to the management accounts which take up an excessive amount of management time. The systemfor authorising capital expenditure is not well controlled which results in some capital items being acquired without proper consideration, at the monthly meetings of the capital expenditure committee. Purchase orders Purchase orders are generated automatically by the computerised inventory system when inventory levels fall below a given level in the context of scheduled production. This system does not work well because the system uses outdated purchasing and production patterns and many manual adjustments are required. The orders are reviewed by the production controller and her junior managers and changes are made informally by junior clerical staff in the production controller.s department. Some of the purchases are input into the buying consortium system which shows the optimum supplier for any combination of cost, delivery time and specification. This system has only been in operation for a few months. The system takes up a substantial amount of disk space on the company.s computers and is suspected of causing problems in other systems. It is difficult to use and so far, only two of the production controller.s junior managers are able to use it. As aresult, the parts ordered through the system are sometimes of the incorrect specification or are delivered late. The remaining purchases are ordered directly from manufacturers, as before, through a reasonably well-controlled buying department.Required:Set out, in a form suitable for inclusion in a report to management, the weaknesses, potential consequences and your recommendations relating to the purchases and capital expenditure systems of Cosmo.(15 marks)(20 marks)。
计算机专业英语课文(第四版)全文翻译

1.2 总线互连总线是连接两个或多个设备的通信通路。
总线的关键特征是,它是一条共享传输介质。
多个设备连接到总线上,任一个设备发出的信号可以为其他所有连接到总线上的设备所接收。
如果两个设备同时传送,它们的信号将会重叠,引起混淆。
因此,一次只能有一个设备成功地(利用总线)发送数据。
典型的情况是,总线由多条通信通路或线路组成,每条线(路)能够传送代表二进制1和0的信号。
一段时间里,一条线能传送一串二进制数字。
总线的几条线放在一起能同时并行传送二进制数字。
例如, 一个8位的数据能在8条总线线上传送。
计算机系统包含有多种不同的总线,它们在计算机系统层次结构的各个层次提供部件之间的通路。
连接主要计算机部件(处理机, 存储器, I/O)的总线称为系统总线。
系统总线通常由50~100条分立的(导)线组成。
每条线被赋予一个特定的含义或功能。
虽然有许多不同的总线设计,但任何总线上的线都可以分成三个功能组:数据线、地址线和控制线。
此外可能还有为连接的模块提供电源的电源线。
数据线提供系统模块间传送数据的路径,这些线组合在一起称为数据总线。
典型的数据总线包含8、16或32根线,线的数量称为数据总线的宽度。
因为每条线每次传送1位,所以线的数目决定了每次能同时传送多少位。
数据总线的宽度是决定系统总体性能的关键因素。
地址线用于指定数据总线上数据的来源和去向。
例如,如果处理机希望从存储器中读一个字的数据,它将所需要字的地址放在地址线上。
显然,地址总线的宽度决定了系统最大可能的存储器容量。
控制线用来控制对数据线和地址线的访问和使用。
由于数据线和地址线被所有部件共享,因此必须用一种方法来控制它们的使用。
控制信号在系统模块之间传送命令和定时信息。
定时信息指定了数据和地址信息的有效性,命令信号指定了要执行的操作。
大多数计算机系统使用多总线,这些总线通常设计成层次结构。
图1.3显示了一个典型的高性能体系结构。
一条局部总线把处理机连接到高速缓存控制器,而高速缓存控制器又连接到支持主存储器的系统总线上。
计算机英语教程译文作者吕云翔杨雪林珣_12_中文

第12章计算机的未来第一部分阅读和翻译A部分移动网络1.简介移动网络指的是连接到互联网的应用程序的使用,或是基于浏览器来接入互联网的移动设备,例如智能手机或者平板电脑,连接到的一个无线网络。
传统的,网络访问都是通过固定线路服务实现的。
然而,越来越多的便携设备和无线设备接入到网络。
2008年,移动设备接入到网络的数量首次超过了台式电脑的接入网络数量,成为了固定网络到移动网络的重要里程碑。
事实上,从2007年较大尺寸的多点触控手机的兴起,以及最近2010年才兴起的多点触控平板电脑,很大程度的推动向移动网络接入时代的转变。
这两个平台都更有利于互联网接入和比以前更好的带给用户基于浏览器或基于应用的体验。
随着移动浏览器直接访问移动设备的硬件(包括加速器和GPS芯片),以及基于浏览器的应用程序的性能提高(速度和容量),预计移动网络应用程序和本地应用程序之前的区别变得越来越模糊。
持久存储和复杂的用户界面图形功能将可能进一步减少需要特定平台的本地应用程序的发展。
一旦用户无法区分本地和移动网络应用,那移动网络将一般是指移动设备的网络接入或移动设备网络应用程序的使用。
今天,移动网络依旧面临着互通性和可用性方面的问题。
互通性问题是由于移动设备、移动操作系统和浏览器的多样化。
而实用性问题则重点在于手机因素中比较小的物理尺寸的问题(有限的屏幕分辨率和用户输入/操作限制)。
2.移动互联网“移动互联网”是指从移动设备接入到互联网,例如一个智能手机或笔记本通过集成的功能或通过一个独立的设备(如USB调试解调器或PCMCIA卡)接入到互联网。
今天,USB调制解调器是HSPA(3.5G)调制解调器。
许多用户利用无线设备提供的通过3G、GPRS或CSD的网络接入,来将他们的智能手机“绑定”到笔记本或PC。
3.标准标准的发展是去实现可应用于提高互通性、实用性和围绕于移动网络使用的可介入问题的方法。
移动网络倡议(MWI)是由W3C提出的倡议,用来发展相关于移动网络的最好的实践和技术。
裕兴新概念英语第二册笔记第93课之令狐文艳创作

Lesson 93 A noble gift 崇高的礼物令狐文艳Where was the Statue of Liberty made?One of the most famous monuments in the world, the Statue of Liberty, was presented to the United States of America in the nineteenth century by the people of France. The great statue, which was designed by the sculptor Auguste Bartholdi, took ten years to complete. The actual figure was made of copper supported by a metal framework which had been especially constructed by Eiffel. Before it could be transported to the United States, a site had to be found for it and a pedestal had to be built. The site chosen was an island at the entrance of New York Harbour. By 1884, a statue which was 151 feet tall had been erected in Paris. The following year, it was taken to pieces and sent to America. By the end of October 1886, the statue had been put together again and it was officially presented to the American people byBartholdi. Ever since then, the great monument has been a symbol of liberty for the millions of people who have passed through New York Harbour to make their homes in America.参考译文世界上最著名的纪念碑之一的自由女神雕像是在19世纪时由法国人民赠送给美国的。
赤壁赋全文解释和重点字词翻译之令狐文艳创作

《赤壁赋》令狐文艳学案一、字词释义:通假字❖属,通“嘱”,劝酒❖缪,通“缭”,盘绕❖“冯”,通“凭借”,乘❖“籍”,通“藉”,狼藉古今异义❖美人古义:美好的理想今义:美貌的人❖凌古义:越过今义:欺辱❖子古义:对人的尊称今义:儿子一词多意❖望❖七月既望:农历每月十五❖西望夏口:眺望❖虚❖浩浩乎如冯虚御风:太空❖盈虚者如彼:月缺❖然❖其声呜呜然:形容词词尾❖何为其然也:这样❖歌❖歌窈窕之章:唱❖歌曰:歌词❖依歌而和之:歌曲的声调或节拍词类活用❖舞幽壑之潜蛟,泣孤舟之嫠(lí)妇。
❖舞、泣:使动用法,使…起舞;使…哭泣❖乌鹊南飞❖南,名词做状语,向南❖况吾与子渔樵于江渚之上❖渔、樵,名词动用,打渔,砍柴❖侣鱼虾而友麋鹿❖侣、友,名词的意动,以…为侣;以…为字词解释:❖扣舷而歌之:扣舷,敲着船舷边.❖击空明兮溯流光:击,划破;空明,月光下的清波;溯,逆流而上;流光,月光浮动.❖渺渺兮予怀:予怀,我的心;渺渺,悠远的样子.❖倚歌而和之:倚,循,依;和,伴奏.❖如怨如慕:怨,哀怨;慕,思慕.❖不绝如缕:不绝,不断;缕,细丝.❖舞,泣:使动.使...舞;使...泣❖愀燃:忧郁凄伧的样子.❖正襟危坐:整理衣襟;端正坐立.❖此非孟德之困于周郎者乎?:这不是曹操被周瑜围困的地方吗?;于,被.❖方,当.❖旌旗蔽空:蔽,遮蔽.❖酾酒临江:酾酒,斟酒;临,面对.❖横槊赋诗:横,横执;槊,长矛;赋,吟.❖渔樵于江渚之上:渔樵,名词用作动词,打猎砍柴.渚,江边.❖侣,友:意动;以..为伴侣;以..为朋友.❖寄蜉蝣于天地:寄,寄托;蜉蝣,生命极短暂的昆虫,比喻人生短暂.像蜉蝣那样,把短暂的生命寄托在天地之间.❖须臾:片刻❖挟:偕同❖抱明月而长终:抱,同;长终,永世长存.❖骤得:多有所得,马上实现.❖托遗响于悲风:托,寄托;遗响,余音,指萧声.把自己的无奈通过萧声寄托在这悲凉的秋风中❖逝者如斯:逝,往,流逝;斯,此,指水.流去的水好比这样不断的滚滚流去.盈虚者如彼:盈,月圆;虚,月缺;彼,那样.盖将自其变化者而观之:盖,表假设,假若;自,从。
《阿伽门农》剧本之令狐文艳创作

阿伽门农令狐文艳编剧(古希腊)埃斯库罗斯翻译罗念生剧本根据Edward Fraenkel :Aeschylus: Agamemnon, Oxford, 1950参考注释Walter Headlam: Agamemnon of Aeschylus, Cambridge, 1952J.D.Denniston&D.Page: Aeschylus: Agamemnon,Oxford, 1957人物(以上场先后为序)守望人阿耳戈斯(Argos)(阿伽门农都城)兵士歌队由十二个阿耳戈斯长老组成仆人数人阿耳戈斯王宫的仆人克吕泰墨斯特拉(Klytaimutra)阿伽门农(Agamemnon)的妻子,埃癸斯托斯(Aigisthos)的情妇传令官阿伽门农的传令官阿伽门农阿耳戈斯和密刻奈(Mykenai)的国王侍女数人克吕泰墨斯特拉的侍女卡珊德拉阿伽门农的侍妾,特洛亚(Troia)女俘虏埃癸斯托斯阿伽门农的堂弟兄卫兵若干人埃癸斯托斯的卫兵布景阿耳戈斯王宫前院,宫前有神像和祭坛。
时代英雄时代。
(公元前十二世纪初叶)一开场[守望人在王宫屋顶上出现。
守望人我祈求众神解除我长年守望的辛苦,一年来我像一头狗似的,支着两肘趴在阿特瑞代(Atreidai)的屋顶上;这样,我认识了夜里聚会的群星,认识了那些闪烁的君王,他们在天空很显眼,给人们带来夏季和冬天。
今夜里,我照常观望信号火炬——那火光将从特洛亚带来消息,报告那都城的陷落——因为一个有男人气魄,盼望胜利的女人是这样命令我的。
当我躺在夜里不让我入睡的,给露水打湿了的这只榻上的时候——迷梦也不来拜望,因为恐惧代替睡眠站在旁边,使我不能紧闭着眼睛睡一睡——当我想唱唱歌,哼哼调子,挤一点歌汁来医治我的瞌睡病的时候,我就为这个家的不幸而悲叹,这个家料理得不像从前那样好了。
但愿此刻有火光在黑暗中出现,报告好消息,使我侥幸的摆脱这辛苦
7人英语话剧剧本-Net Friend,互联网交友令狐文艳Summary:Is it correct to make friends on the Internet? Will it be dangerous? Bill, Hillary's younger brother, is a rude and impolite boy. Everyone in his school doesn't like him. However, he really wants to have a girlfriend, so he asks his sister to help him. Then Hillary pretended to be Bill on net and met a nice girl, Monica. Three months later, Hillary asked Monica to go out with "Bill" (Her brother), and arranged everything for them. When they met each other at McDonald's, Monica found that Bill wasn't the one who she talked to on net. Then...Finally, Monica understands that it's very dangerous to date with strangers and trusts everything of which her net-friend told her. And we all should be very careful when we're on net.Scene I(In school cafeteria, students are having lunch)Bill: Hey, Jessie. (He pushed her shoulder very rudely) Can I join you?(Jessie didn't say a Word, and Bill just sat down)Bill: Wow! Wow! Wow! You are wearing a nice dress today!Jessie: Thanks!Bill: Oh! What a beautiful hair clip. Where did you buy it?(Jessie didn't say anything..)Bill: Hey, you have a nice watch.(He held her hand strongly and Jessie got angry.) Jessie: Don't touch me! I don't want to talk to you. Leave me alone!(Bill stood up and walked toward Carol.Bill sat down beside Carol without asking her)Bill: Hey, beautiful! How could you eat so little! It's not good for your health! Take this!(Bill wanted Carol to eat his food)Carol: No.Bill: Take it! (He was very rude and the plate fell down.)Carol: Hey! What are you doing! This is my new skirt! Bill: I'm sorry!Carol: Go away! You're such a rude guy!(Carol went away.)Bill: Did I do something wrong?(He talked to himself)Scene II(In Hillary's room. Hillary was surfing the net)Bill: Sis....Bill: Hillary!Hillary: Oh! Hi! Bill! How long have you been sitting there? Are you trying to scare me?(Bill didn't say a Word.)Hillary: Bill? What's wrong with you? What happened? Bill: I tried to draw some girls' attention but they just ignored me!Hillary: Hmm....Maybe the way you used was wrong.Bill: Yeah, maybe. But I don't know how to attract them. Hillary, I just want to have a girlfriend? Hillary: Girlfriend?Bill: Yeah.Hillary: Let me see what I can do.Bill: So, can you help me?Hillary: Ok! Since you really want to have a girlfriend, I'll try to help you.Bill: Great! Thank you! You are a doll!(At this moment, Hillary's net-friend is calling her.) Hillary: Oh.. My net-friend!Bill: Ok! Waiting for your good news!(Bill left Hillary's room and Hillary was thinking how she helped Bill.)Hillary: Yeah! That's it! I can pretend to be Bill and find a girlfriend on the Internet!(She opened the PC and saw a girl's name "Monica"...) Hillary: (Laughing......) Monica!(A little bit surprised)Hillary: (Talked to herself) It is the same name as the girl of Clinton's sexual scandal. Hmm. Let me send a message to her.Hillary: Hi! I'm Bill! Glad to meet you!Monica: Hello, Bill! , Glad to meet you, too. I'm a college student, and you?Hillary: Me threeMonica: (Laughing...) You're a humorous person! Hillary: Thanks! I guess you're a female, aren't you? Monica: Yes, I am.Hillary: (Talked to herself) Great! She's a girl. Monica: And you?Hillary: Oh... I'm a "boy"Monica: Which school club are you in?Hillary: Computer Information Club.Monica: Oh! Really? So you must be a computer expert! Hillary: You can say that again.Monica: You know I'm interested in computers, too. So, can you teach me or tell me something about them? Hillary: Sure! It's my pleasure!( .....Two hours later .....)Hillary: Oh! It's interesting to chat with you. Monica: Yeah! I'm very happy, too.IIiIIaiy: Will you be here tomorrow? At the same time? Monica: I think so, I hope we can meet again.Hillary: Ok, I'll be here tomorrow, Bye! Bye!Monica: Bye!Saying: From then on, Monica and Hillary continue chatting with each other after school.(At Monica's room. As soon as Monica came back home from school,she started surfing the net. Then, her mom came into her room.She knocked her door, but no oneanswered the door) Mom: I'm coming!Mom: Oh! Monica, my darling! I've just baked some cookies. Want some?Monica: No, thanks! I have something important to do. Mom: What are you busy doing?Monica: I'm surfing the net and talking to my net-friend.Mom: Net-friends!! They are strangers. You even don't know who they are. I read from the newspapers. Lot's of things happened on net. You should be more careful and you have to watch out for your net-friends, You're so youngMonica: Ok.. ok. .I know, Mom. Don't worry about me. (Mom walked out her room. and Monica saw Hillary) Monica: Hello! Bill!Hillary: Hi! Monica! How's school today?Monica: Wonderful! It's really a nice day!Hillary: Monica! I think we've known each other for a long time. And I just wonder whether you would go out with me?Monica: (Talk to herself) Go out with him?Monica: Sure, I would like to. I think you're a polite and humorous person. It may be interesting to go out with you!Hillary: That's great! How about we meeting at McDonald's on Ming-Chang Road this weekend?Monica: All right! It's a deal! But how can I recognize you?Hilillary: I'll wear a blue shirt, blue jeans, a blue caps and also carry a blue knapsack. Besides, I'll stand beside the trash can.Monica: All in blue! Wow! Ok! That will be easy for me to recognize you.Hillary: Yeah! I'll be waiting for you!Monica: Ok! See youMonica: (Talk to herself) Ha! I'm looking forward to it!Hillary: (Talk to herself) Yes, I made it. I'm going to tell Bill this good news!ScenceIII(At McDonald's, Bill was waiting for Monica.A few minutes later, Monica saw Bill and walked toward Bill)Monica: Hi... Are you Bill?Bill: Yes, I am. You're Monica?Monica: Yeah.. that's right.Bill: You look great!Monica: You're not bad, either. Hey, Let's find a table!Bill: Yeah! How about that one? I've ordered some things.(They found a table and began talking.)Monica: Bill!Bill: Monica!Bill: Oh! Lady first!Monica: Bill, have you already finished your computer report?Bill: Uh...Uh... Did I tell you that?Monica: Yes, you did. You said it was about how to kill virus. Did you find out how to do that?Bill: Kill virus? That's easy for me. I'm a genius. Just use a knife.Monica: A knife?Bill: Yeah! Knife can kill everything.Monica: What are you talking about? Alright! Alright! Forget it! And how about the novel we discussed last week?Bill: Novel? I've read so many novels, which one? Monica: "The old man and the sea", don't you forget? What happened to that old man?Bill: Yeah! That old man! He caught a big fish and then became a hero.Monica: Hmm. He has a strong will, doesn't he? He never gives up anything. And how about the fish?Bill: Did you forget? He cooked the fish and ate it! Monica: And~~it's delicious, right?Bill: You got it! It's very delicious!Monica: Nonsense! The fish was eaten by the sharks . You're not Bill, are you?Bill: Of course I'm Bill. "B~I-L-L"Monica: But you seem different from the way you are on net. Who are you for God's sake?Bill: Ok. I tell you the truth. I'm Bill, but not the one you talked to on net. That was my sister, Hillary. Monica: Are you kidding me?Bill: No, that's true. I really want to have a girlfriend, so she helped me out. She met you on net and thought you're a nice girl. So she arranged us to meet each other.Monica: That means both of you tricked me?Bill: So what? That's Hillary's idea.Monica: You. ..You..... (She is very angry)Monica: Gosh! I was tricked for such a long time!Scence IV(Monica left McDonald angrily)(At Monica's room, again.)Monica: (Crying) How foolish I was! What on earth was I doing? (Still crying) I think I need someone to talk to.(She looked around and saw the time)Monica: Ah, 8:30. It's "Paula's Time."(She turned on the TV)Paula: Welcome to "Paula's Time" I'm Paula Jones, not Dow Jones. Today we'll discuss some net problems. Nowadays Internet helps modern people live more convenient lives, get the latest information. You can say that we live in an Internet world. However, some bad guys made use of Internet to do illegal deals or trick people. So, today we will listen to some friends' problems and help them solve it. Our hot line number is 111-1234. Please dial it as soon as possible. I'm waiting for your call-in. OK. Who's the first friend?Monica: Hi, Paula, I'm Monica.Paula: Yes, Monica, what do you want to share with us? Monica: I met a girl, Hillary, on net three months ago.She pretended to be her brother, Bill, and chatted with me. But I didn't know the truth until yesterday that we arranged to meet each other. He told me that Hillary surfed the net to help him find a girlfriend. And that was me. I felt I was tricked and I was very sad. Do you think I'm wrong?Paula: It seems like Bill takes special interests in Monica just like our president. Monica, it's a serious and common social problem in modern society. Lots of people want to make friends on the Internet. But you must be careful. On the net, people use nicknames to protect themselves, or even trick others to do something bad. Everyone on the net wears a mask. Sometimes it's evil that hides under the mask. So you had better watch out. Never date with strangers by yourself. Strangers are dangerous.Monica: Thanks, Paula. You do help me a lot. I know what I should do now.(Suddenly someone is calling Monica on net)Starr: Hi! Monica! I'm Starr. May I make friends with you?Monica: Oh! No! Not again!(Lights out)The End。
计算机专业英语教程(第4版)全书译文

计算机专业英语教程(第4版)全书译文第1章:介绍计算机专业英语教程(第4版)全书是一本为计算机专业学生编写的英语教材。
本书旨在帮助学生提高英语水平,特别是在计算机领域的专业术语和技能方面。
本书是由经验丰富的专业人士编写的,其中包含了大量的案例研究和实践活动,以帮助学生更好地理解和应用所学知识。
第2章:计算机基础知识本章介绍了计算机的基础知识,包括计算机的组成部分、工作原理以及常见的计算机系统和网络。
通过学习这些内容,学生将能够了解计算机的主要组成部分以及它们之间的相互作用关系。
第3章:软件工程这一章节主要介绍了软件工程的基本概念和原则。
学生将学习软件生命周期、软件开发过程以及不同的软件工程方法和模型。
此外,本章还探讨了软件测试和质量保证的重要性。
第4章:数据库管理系统数据库管理系统是计算机专业中的重要主题。
本章介绍了数据库的基本概念和原理,包括数据库设计、数据模型和查询语言。
学生将通过学习数据库的相关内容,了解数据库在计算机领域中的应用以及其重要性。
第5章:计算机网络计算机网络是现代计算机技术中的关键领域。
本章讲解了计算机网络的基本概念、协议和技术,包括局域网、广域网和互联网。
学生将通过学习计算机网络的知识,了解网络通信的原理和实现方式,并掌握网络管理和安全方面的基本技能。
第6章:人工智能人工智能是计算机科学中的前沿领域,对计算机专业学生来说具有重要的意义。
本章介绍了人工智能的基本概念、算法和应用领域。
学生将通过学习人工智能的知识,了解智能系统的模型和设计原理,以及在现实生活中的实际应用。
第7章:计算机图形学计算机图形学是计算机专业的重要分支之一。
本章介绍了计算机图形学的基本原理和技术,包括图像处理、渲染和动画等方面。
学生将通过学习计算机图形学的知识,了解图形图像的生成和处理过程,掌握图形设计和开发的基本技能。
第8章:计算机安全计算机安全是计算机专业中的一个重要议题。
本章主要介绍了计算机安全的基本概念和技术,包括身份认证、访问控制和网络安全等方面。
新概念英语第三册课文之令狐文艳创作

新概念英语第三册课文 top令狐文艳Lesson1A puma at largePumas are large, cat-like animals which are foundin America. When reports came into London Zoo that a wild puma had been spotted forty-five miles south of London, they were not taken seriously. However, as the evidence began to accumulate, experts from the Zoofelt obliged(感激) to investigate, for the descriptions given by people who claimed to have seen the puma were extraordinarily(非常地,格外地)similar.The hunt for the puma began in a small village where a woman picking blackberries saw 'a large cat' only five yards away from her. It immediately ran away when she saw it, and experts confirmed(证实,证明)that a puma will not attack a human being unless it is cornered(adj.被困得走投无路的). The search proved difficult, for the puma was often observed at oneplace in the morning and at another place twenty miles away in the evening. Wherever it went, it left behind it a trail(足迹) of dead deer and small animals like rabbits. Paw(爪子) prints were seen in a number of places and puma fur(皮毛) was found clinging (紧贴着)to bushes(灌木丛). Several people complained of 'cat-like noises' at night and a businessman on a fishing trip saw the puma up a tree. The experts were now fully convinced that the animal was a puma, but where had it come from ? As no pumas had been reported missing from any zoo in the country, this one must have been in the possession of a private collector and somehow managed to escape. The hunt went on for several weeks, but the puma was not caught. It is disturbing to think that a dangerous wild animal is still at large in the quiet countryside.Lesson 2 Thirteen equals oneOur vicar is always raising money for one cause or another, but he has never managed to get enough money to have the church clock repaired. The big clock which used to strike the hours day and night was damaged many years ago and has been silent ever since. Onenight, however, our vicar woke up with a start: the clock was striking the hours! Looking at his watch, he saw that it was one o'clock, but the bell struck thirteen times before it stopped. Armed with a torch, the vicar went up into the clock tower to see what was going on. In the torchlight, he caught sight of a figure whom he immediately recognized as Bill Wilkins, our local grocer. 'Whatever are you doing up hereBill ?' asked the vicar in surprise.' I'm trying to repair the bell,' answered Bill.' I've been coming up here night after night for weeks now. You see, I was hoping to give you a surprise.''You certainly did give me a surprise!' said the vicar. 'You've probably woken up everyone in the village as well. Still, I'm glad the bell is working again.''That's the trouble,vicar,' answered Bill. 'It's working all right, butI'm afraid that at one o'clock it will strike thirteen times and there's nothing I can do about it.''We'll get used to that Bill,' said the vicar. 'Thirteen is not as good as one but it's better than nothing. Now let's go downstairs and have a cup of tea.'Lesson 3 An unknown goddessSome time ago,an interesting discovery was made by archaeologists on the Aegean(adj.爱琴海的;n.)island of Kea.An American team explored a temple which stands in an ancient city on the promontory of Ayia Irini.The city at one time must have been prosperous,for it enjoyed a high level of civilization.Houses--often three storeys high--were built of stone.They had large rooms with beautifully decorated walls.The city was even equipped with a drainage system,for a great many clay pipes were found beneath the narrow streets.The temple which the archaeologists explored was used as a place of worship from the fifteenth century B.C. until Roman times. In the most sacred room of the temple, clay fragments of fifteen statues were found. Each of these represented a goddess and had, at one time, been painted. The body of one statue was found among remains dating from the fifteenth century B.C. Its missing head happened to be among remains of the fifth century B.C. This head must have been found in Classical times and carefully preserved. It was very old and precious even then. When the archaeologistsreconstructed the fragments, they were amazed to find that the goddess turned out to be a very modern-looking woman. She stood three feet high and her hands rested on her hip. She was wearing a full-length skirt which swept the ground. Despite her great age, she was very graceful indeed, but, so far, the archaeologists have been unable to discover her identity.Lesson4 The double life of Alfred BloggsThese days, people who do manual work often receive far more money than people who work in offices. People who work in offices are frequently referred to as' white collar workers' for the simple reason that they usually wear a collar and tie to go to work. Such is human nature, that a great many people are often willing to sacrifice higher pay for the privilege of becoming white collar workers. This can give rise to curious situations, as it did in the case of Alfred Bloggs who worked as a dustman for the Ellesmere Corporation. When he got married, Alf was too embarrassed to say anything to his wife about his job. He simply told her that he worked for the Corporation. Every morning, he left home dressed in a smart blacksuit. He then changed into overalls(n.工作服) and spent the next eight hours as a dustman. Before returning home at night, he took a shower and changed back into his suit. Alf did this for over two years and his fellow dustmen kept his secret. Alf's wife has never discovered that she married a dustman and she never will, for Alf has just found another job. Hewill soon be working in an office. He will be earning only half as much as he used to, but he feels that his rise in status is well worth the loss of money. From now on, he will wear a suit all day and others will call him 'Mr. Bloggs', not 'Alf'.Lesson 5 The factsEditors of newspapers and magazines often go to extremes to provide their readers with unimportant facts and statistics. Last year a journalist had been instructed by a well-known magazine to write anarticle on the president's palace in a new African republic. When the article arrived, the editor read the first sentence and then refused to publish it. The article began: 'Hundreds of steps lead to the high wall which surrounds the president's palace.' Theeditor at oncesent the journalist a fax instructinghim to find out the exact number of steps and theheight of the wall. The journalist immediately setout to obtain these important facts, but he took along time to send them. Meanwhile, the editor was getting impatient, for the magazine would soon go to press. He sent the journalist two urgent telegrams,but received no reply. He sent yet another telegram informing the journalist that if he did not reply soon he would be fired. When the journalist again failed to reply, the editor reluctantly published the article as it had originally been written. A week later, theeditor at last received a telegram from the journalist. Not only had the poor man been arrested, but he had been sent to prison as well. However, he had at last been allowed to send a cable in which he informed the editor that he had been arrested while counting the 1084 steps leading to the 15-foot wall which surrounded the president's palace.Lesson 6 Smash-and-grabThe expensive shops in a famous arcade nearPiccadilly were just opening. At this time of themorning, the arcade was almost empty. Mr Taylor, the owner of a jewellery shop was admiring a new window display. Two of his assistants had been working busily since 8 o'clock and had only just finished. Diamond necklaces and rings had been beautifully arranged on a background of black velvet. After gazing at the display for several minutes, Mr Taylor went back into his shop.The silence was suddenly broken when a large car, with its headlights on and its horn blaring, roared down the arcade. It came to a stop outside thejeweler's. One man stayed at the wheel while two others with black stockings over their faces jumped out and smashed the window of the shop with iron bars. While this was going on, Mr Taylor was upstairs. He and his staff began throwing furniture out of the window. Chairs and tables went flying into the arcade. One of the thieves was struck by a heavy statue, but he was too busy helping himself to diamonds to notice any pain. The raid was all over in three minutes, for the men scrambled back into the car and it moved off at a fantastic speed. Just as it was leaving, MrTaylor rushed out and ran after it throwing ashtrays and vases, but it was impossible to stop the thieves. They had got away with thousands of pounds worth of diamonds.Lesson 7 Mutilated ladiesChildren often have far more sense than their elders. This simple truth was demonstrated rather dramatically during a civil defence exercise in asmall town in Canada. Most of the inhabitants were asked to take part in the exercise during which they had to pretend that their city had been bombed. Air-raid warnings were sounded and thousands of peoplewent into special air-raid shelters. Doctors andnurses remained above ground while Police patrolledthe streets in case anyone tried to leave the shelters too soon.The police did not have much to do because the citizens took the exercise seriously. They stayed underground for twenty minutes and waited for thesiren to sound again. On leaving the air-raid shelters, they saw that doctors and nurses were busy. A greatmany people had volunteered to act as casualties. Theatrical make-up and artificial blood had been usedto make the injuries look realistic. A lot of People were lying 'dead' in the streets. The living helped to carry the dead and wounded to special stations. AChild of six was brought in by two adults. The child was supposed to be dead. With theatrical make-up onhis face, he looked as if he had died of shock. Some people were so moved by the sight that they began to cry. However, the child suddenly sat up and a doctor asked him to comment on his death. The child looked around for a moment and said, 'I think they're all crazy!'Lesson8 A famous monasteryThe Great St Bernard Pass connects Switzerland to Italy. At 2470 metres, it is the highest mountain pass in Europe. The famous monastery of St Bernard, which was founded in the eleventh century, lies about a mile away. For hundreds of years, St Bernard dogs havesaved the lives of travellers crossing the dangerous Pass. These friendly dogs, which were first brought from Asia, were used as watch-dogs even in Roman times.Now that a tunnel has been built through the mountains, the Pass is less dangerous, but each year, the dogsare still sent out into the snow whenever a travelleris in difficulty. Despite the new tunnel, there arestill a few people who rashly attempt to cross the Pass on foot.During the summer months, the monastery is very busy, for it is visited by thousands of people who cross the Pass in cars, As there are so many people about, the dogs have to be kept in a special enclosure. In winter, however, life at the monastery is quite different. The temperature drops to -30 and very few people attempt to cross the Pass. The monks Prefer winter to summer for they have more privacy. The dogs have greater freedom, too, for they are allowed to wander outside their enclosure. The only regularvisitors to the monastery in winter are parties of skiers who go there at Christmas and Easter. These young people, who love the peace of the mountains, always receive a warm.Welcome at St Bernard's monastery.Lesson9By now, a rocket will have set off on its 35million mile trip to Mars and scientists must be waiting anxiously for the results. The rocket will be travelling for six months before it reaches the planet.It contains a number of scientific instruments, including a television camera. Any pictures that are taken will have to travel for three minutes beforethey reach the earth. If the pictures are successful, they may solve a number of problems about Mars and provide information about the markings on its surface which, nearly 100 years ago, the astronomer, Schiaparelli, thought to be canals.It will be a long time before any landing on Mars can be attempted. This will only be possible when scientists have learnt a lot more about the atmosphere that surrounds the planet. If a satellite can one day be put into orbit round Mars, scientists will be able to find out a great deal. An interesting suggestionfor measuring the atmosphere around Mars has been put forward. A rubber ball containing a radio transmittercould be dropped from a satellite so that it wouldfall towards the surface of the planet. The radiowould signal the rate which the ball was slowed down and scientists would be able to calculate how densethe atmosphere is. It may even be possible to drop a capsule containing scientific instruments on to the planet's surface. Only when a great deal more information has been obtained, will it be possible to plan a manned trip to Mars.Les son10 The loss of TitanicThe great ship, Titanic, sailed for New York from Southampton on April 10th, 1912. She was carrying 1316 passengers and a crew of 89l. Even by modern standards, the 46,000 ton Titanic was a colossal ship. At that time, however, she was not only the largest ship that had ever been built, but was regarded as unsinkable,for she had sixteen water- tight compartments. Even if two of these were flooded, she would still be able to float. The tragic sinking of this great liner will always be remembered, for she went down on her first voyage with heavy loss of life.Four days after setting out, while the Titanic was sailing across the icy waters of the North Atlantic, a huge iceberg was suddenly spotted by a look-out. After the alarm had been given, the great ship turned sharply to avoid a direct collision. The Titanic turned just in time, narrowly missing the immense wall of ice which rose over 100 feet out of the water beside her. Suddenly, there was a slight trembling sound from below, and the captain went down to see what had happened. The noise had been so faint that no one thought that the ship had been damaged. Below, the captain realized to his horror that the Titanic was sinking rapidly, for five of her sixteen water-tight compartments had already been flooded ! The order to abandon ship was given and hundreds of people plunged into the icy water. As there were not enough life-boats for everybody, 1500 lives were lost.Lesson11 Not guiltyGoing through the Customs is a tiresome business. The strangest thing about it is that really honest people are often made to feel guilty. The hardened professional smuggler, on the other hand, is nevertroubled by such feelings, even if he has five hundred gold watches hidden in his suitcase. When I returned from abroad recently, a particularly officious young Customs Officer clearly regarded me as asmuggler.'Have you anything to declare?' he asked, looking me in the eye.'No,' Iansweredconfidently.'Would you mind unlocking this suitcase please ?''Not at all,' I answered.The Officer went through the case with great care. All the thingsI had packed so carefully were soon in a dreadful mess.I felt sure I would never be able to close the case again. Suddenly, I saw the Officer's face light up. He had spotted a tiny bottle at the bottom of my case and he pounced on it with delight.'Perfume, eh?' he asked sarcastically. 'You should have declared that.' Perfume is not exempt from import duty.''But it isn't perfume,' I said.' It's hair-oil.' Then I added with a smile,' It's a strange mixture I make myself.' As I expected, he did not believe me.'Try it!' I said encouragingly.The Officer unscrewed the cap and putthe bottle to his nostrils. He was greeted by an unpleasant smell which convinced him that I wastelling the truth. A few minutes later, I was able to hurry away with precious chalk-marks on my baggage. Lesson12 Life on a desert islandMost of us have formed an unrealistic picture of life on a desert island. We sometimes imagine a desert island to be a sort of paradise where the sun always shines. Life there is simple and good.Ripe fruit falls from the trees and you never have to work. The other side of the picture is quite the opposite. Life on a desert island is wretched. You either starve to death or live like Robinson Crusoe, waiting for a boat which never comes. Perhaps there is an element of truth in both these pictures, but few of us have had the opportunity to find out.Two men who recently spent five days on a coral island wished they had stayed there longer. They were taking a badly damaged boat from the Virgin Islands to Miami to have it repaired. During the journey, their boat began to sink. They quickly loaded a small rubber dinghy with food, matches, and tins of beer and rowed for a few miles across the Caribbean until theyarrived at a tiny coral island. There were hardly any trees on the island and there was no water, but this did not prove to be a problem. The men collected rain-water in the rubber dinghy. As they had brought a spear gun with them, they had plenty to eat. They caught lobster and fish every day, and, as one of them put it 'ate like kings'. When a passing tanker rescued them five days later, both men were genuinely sorry that they had to leave.Lesson13 It’s only meAfter her husband had gone to work, Mrs Richards sent her children to school and went upstairs to her bedroom. She was too excited to do any housework that morning, for in the evening she would be going to a fancy dress party with her husband. She intended to dress up as a ghost and as she had made her costume the night before, she was impatient to try it on. Though the costume consisted only of a sheet, it was very effective. After putting it on, Mrs Richards went downstairs. She wanted to find out whether it would be comfortable to wear.Just as Mrs Richards was entering the dining-room, there was a knock on the front door. She knew that it must be the baker. She had told him to come straightin if ever she failed to open the door and to leave the bread on the kitchen table. Not wanting tofrighten the poor man, Mrs Richards quickly hid in the small store-room under the stairs. She heard the front door open and heavy footsteps in the hall. Suddenly the door of the store-room was opened and a man entered. Mrs Richards realized that it must be the man from the Electricity Board who had come to read the meter. She tried to explain the situation, saying'It's only me', but it was too late. The man let out a cry and jumped back several paces. When Mrs Richards walked towards him, he fled, slamming the door behind him.Lesson14 A noble gangsterThere was a time when the owners of shop and businesses in Chicago had to pay large sums of money to gangsters in return for' protection' If the money was not paid promptly, the gangsters would quickly put a man out of business by destroying his shop.Obtaining 'protechon money' is not a modern crime. As long ago as the fourteenth century, an Englishman, Sir John Hawkwood, made the remarkable discovery that people would rather pay large sums of money than have their life work destroyed by gangsters.Six hundred years ago, Sir John Hawkwood arrived in Italy with a band of soldiers and settled near Florence. He soon made a name for himself and came to be known to the Italians as Giovanni Acuto. Whenever the Italian city-states were at war with each other, Hawkwood used to hire his soldiers to princes who were willing to pay the high price he demanded. In times of peace, when business was bad, Hawkwood and his men would march into a city-state and, after burning down a few farms, would offer to go away if protection money was paid to them. Hawkwood made large sums of money in this way. In spite of this, the Italians regarded him as a sort of hero. When he died at the age of eighty, the Florentines gave him a statefuneral and had a picture painted which was dedicated to the memory of 'the most valiant soldier and most notable leader, Signor Giovanni Haukodue'。
电脑专业英语词汇之令狐文艳创作

《电脑专业英语》1.file n. 文件;v. 保存文件mand n. 命令,指令e v. 使用,用途4.program n. 程序5.line n. (数据,程序)行,线路6.if conj. 如果7.display vt. 显示,显示器8.set v. 设置,n. 集合9.key n. 键,关键字,关键码10.list n. 列表,显示,v. 打印11.by prep. 凭,靠,沿12.press v. 按,压13.with prep. 用,与,随着14.format n. 格式15.change v. 更换,改变,变动16.cursor n. 光标17.directory n. 目录,索引簿18.from prep. 从,来自,以来19.menu n. 菜单,目录20.option n. 任选,选择,可选项21.character n. 字符,符号,特性22.current n. 电流23.type n. 型,类型;v. 打印24.screen n. 屏幕,屏;v. 屏蔽25.specify v. 指定,规定,确定26.move v. 移动27.disk n. 盘,磁盘28.text n. 正文,文本29.drive v. 驱动;n. 驱动器30.see v. 看,看出,查看 n. 名,名称;vt. 命名32.record n. 记录33.box n. 箱,匣,(逻辑)框34.database n. 数据库35.help v. & n. 帮助36.memory n. 记忆存储,存储器37.which pron. 哪个,a. 那一个38.all a. 全,全部;ad. 完全39.on ad. 接通,导电,开40.copy n. 复制,v. 拷贝41.shell n. 壳,外壳42.delete vt. 删除,删去,作废43.enter v. 键入,送入44.margin n. 余量,边缘,边际45.mark n. 标记;vt. 加标记46.also ad. & conj. 也,亦,还47.do v. 做,干;n. 循环rmation n. 信息,情报49.choose v. 挑选,选择,选定50.select vt. 选择51.group n. 组,群52.first a. & ad. & n. 第一,首先53.field n. 字段,域,栏,场54.procedure n. 过程,程序,工序55.print v. 打印,印刷56.return v. 返回,回送57.number n. 数字,号码;vt. 编号58.selected a. 精选的59.want v. 需要,应该,缺少60.window n. 窗口61.message n. 信息,消息,电文62.dialog n. & vt. 对话63.example n. 例子,实例64.create vt. 创立,建立65.insert vt. 插入66.related a. 相关的67.item n. 项,项目,条款68.edit vt. 编辑,编排,编篡69.marked a. 有记号的70.area n. (区)域,面积,方面71.parameter n. 参数,参变量72.then ad. & conj. 那时,则73.variable a. 可变的;n. 变量74.tab n. 制表键75.up ad. 上,向上,a. 高的76.string n. 行,字符串77.each a. & ad. 各(自),每个78.active a. 激活的,活动的79.topic n. 题目,论题80.start v. 起动,开始,启动81.mode n. 态,方式,模82.selection n. 选择83.function n. 函数,功能,操作84.word n. 字(词),单词85.make vt. 制造,形成,接通86.right a. 右边的,正确的120.open v. 打开,开启,断开121.add v. & n. 加,增加,添122.enable vt. 启动,恢复正常操作123.operation n. 操作,运算,动作124.erase v. 擦除,取消,删除125.filename n. 文件名126.search v. 检索,查询,搜索127.another a. 另一个,别的st a. & n. 最后(的)129.column n. 列,柱,栏130.after prep. & ad. 以后,后面131.prompt n. & v. 提示132.two n. & a. 二,两,双133.execute v. 实行,实施134.about ad. 关于,大约,附近135.escape v. 逃避,逸出,换码136.error n. 错误,误差,差错137.currently ad. 目前,现在138.extension n. 扩充,延伸139.same a. 同样的,相同的140.status n. 状态,态,状况141.run v. 运行,运转,操作142.argument n. 变元,自变量143.statement n. 语句,陈述,命题144.shift v. 转义,换档,移位145.store n. & vt. 存储,存储器146.scroll vt. 上滚(卷);n. 纸卷147.replace vt. 替换,置换,代换148.macro n. 宏,宏功能,宏指令149.page n. 页面,页,版面150.quit v. 退出,结束151.define vt. 定义,规定,分辨152.reference n. & a. 参考;参考的153.other a. 别的,另外的154.while conj. 当…的时候155.pressing n. & a. 压制;紧急的156.restore vt. 恢复,复原157.top n. 顶,尖端158.how ad. 如何,怎样,多么159.color n. 颜色,色彩,(彩)色160.allow v. 允许,容许161.block n. (字,信息,数据)块162.decimal n. & a. 十进制;十进制的163.main a. 主要的164.definition n. 定义,确实,清晰度165.between prep. 在…之间,中间166.optional a. 任选的,可选的167.date n. 日期168.remove v. 除去,移动169.arrow n. 箭头,指针bel n. 标签,标号,标识符171.within prep. 在…以内172.issue v. 发行,出版,流出173.different a. 不同的,各种各样的174.available a. 可用的175.returned a. 退回的176.associate v. 相联,联想,关联177.attribute n. 属性,标志,表征178.dos 磁盘操作系统179.before prep. 以前,前,先180.order n. & vt. 指令,次序;排序181.modify vt. 修改,改变,变址182.array n. 数组,阵列183.mouse n. 鼠标器184.note n. 注解,注释185.locate vt. 定位186.video n. 视频,电视187.printer n. 打印机,印刷机188.bar n. 条,杆,棒189.bottom n. & a. 底,基础;底下的190.carriage n. 滑架,托架191.content n. 含量,容量,内容192.either a. & pron. 任何一个,各193.ok ad. & a. 对,好;全对194.space n. 空格键,空间195.editor n. 编辑程序196.exist vi. 存在,生存,有197.scope n. 范围,显示器198.paragraph n. 段(落),节,短讯199.multi (词头)多200.clear v. 清除,弄干净201.exit n. & vi. 出口;退出202.report vt. & n. 报告,报表203.execution n. 执行204.backup n. 备份,后备,后援205.version n. 版本206.find v. 寻找,发现207.pointer n. 指针,指示字208.subset n. 子集,子设备209.keyboard n. 键盘244.except prep. 除…之外,除非245.turn v. & n. 转,转动;圈,匝246.back n. 背面,反向,底座247.sure a. & ad. 确实的;的确248.section n. 节,段,区域249.follow v. 跟随,跟踪250.split v. 分开,分离251.need v. 必须,需要252.access n. 存取,选取,接近253.additional a. 附加的,辅助的254.cancel v. 删除,取消,作废255.document n. 文献,资料,文件256.case n. 情况,场合257.numeric n. & a. 数字的,分数258.go vi. 运行,达到259.load n. & v. 装入,负载,寄存260.try n. (尝)试,试验261.size n. 尺寸,大小,容量262.entire a. & n. 完全的;总体263.leave v. 离开,留下264.history n. 历史265.second n. & a. 秒,第二(的) 266.reflow v. & n. 回流,逆流267.output n. 输出,输出设备268.out n. & a. 输入,在外269.both a. & ad. 两,双,都270.install vt. 安装271.source n. 源,电源,源点272.way n. 路线,途径,状态273.assign vt. 赋值,指定,分派274.support vt. 支援,支持,配套275.specific a. 特殊的,具体的276.join v. & n. 连接,并(运算) 277.expand v. 扩充,扩展,展开278.like a. 类似的,同样的279.diskette n. 软磁盘,软盘片280.skip v. 跳跃(定位),跳过281.application n. 应用282.confirmation n. 认可283.whether conj. 无论,不管284.hold v. 保持285.click n. “卡搭”声,插销286.write v. 写,存入287.byte n. (二进制的)字节288.abbreviate vt. 缩写,省略289.show v. 显示,呈现,出示290.otherwise ad. & a. 另外291.working n. 工作,操作,作业292.delimiter n. 定界符,分界符293.location n. 定位,(存储器)单元294.perform v. 执行,完成295.graphic n. & a. 图形;图形的296.read v. 读,读阅297.confirm vt. 证实,确认298.sort v. 分类,排序299.clause n. 条款,项目,子句300.once ad. & n. 只一次,一旦301.however conj. 然而,可是302.extend v. 扩充303.look v. 看,查看304.starting a. 起始的305.now ad. & n. 此刻,现在306.original n. & a. 原文;原(初)始的307.correspond vi. 通信(联系)308.property n. 性(质),特征309.several a. & n. 若干个,几个310.learn v. 学习,训练311.cause n. 原因,理由312.bracket n. (方)括号,等级313.omit vt. 省略,删去,遗漏314.running a. 运行着的,游动的315.sub-directory n. 子目录316.edge n. 棱,边,边缘,界限317.form n. 格式,表格,方式318.instruction n. 指令,指导319.ascii n. 美国信息交换标准码320.below a. & prep. 下列的;低于321.standard n. 标准322.occurrence n. 出现,发生323.lock n. & v. 锁,封闭;自动跟踪324.append vt. 附加,增补325.destination n. 目的地,接收站326.password n. 口令,保密字327.point n. 点,小数点,句号328.variety n. 变化,种类,品种329.many a. & n. 许多,多数330.buffer n. 缓冲器eful a. 有用的332.object n. 对象,目标,物体333.again ad. 再,又,重新,也v. & a. 完成;完整的370.past a. 过去的,结束的371.match v. 比较,匹配,符合372.recover v. 恢复,回收373.always ad. 总是,一直,始终374.require v. 需要,要求375.opening n. 打开,断路,孔work n. & vt. 网络;联网377.sign n. 符号,信号,记号378.release vt. & n. 释放,核发,版379.three a. & n. 三(的)380.recall vt. 撤消,复活,检索381.deletion n. 删去(部分),删除382.fixed a. 固定的,不变的383.amount vt. & n. 总计;合计384.alias n. 别名,代号,标记385.quote n. & v. 引号;加引号386.correct a. & vt. 正确的;改正387.else ad. & conj. 否则,此外388.maximum n. & a. 最大(的),最高389.under prep. 在…下面(之下) 390.take v. 取,拿391.switching n. 开关,转接,交换392.element n. 元件,元素,码元393.modification n. 改变,修改394.modified a. 修改的,变更的395.input n. 输入,输入设备396.uppercase n. 大写字母397.plus prep. 加,加上,外加398.found v. 建立,创办399.debug vt. 调试400.force v. & n. 强制;压力,强度401.lowercase n. 下档,小写体402.just ad. 恰好403.undo vt. 取消,废除404.environ vt. 围绕,包围405.why ad. 为什么406.temporary a. 暂时的,临时的407.put v. 存放(记录),放置408.instead ad. (来)代替,当作409.encounter v. & n. 遇到,碰到410.across prep. 交叉,越过411.matching n. 匹配,调整412.wildcard n. 通配符413.spill v. 漏出,溢出,漏失414.level n. 水平,级,层次415.browse v. 浏览416.speech n. 说话,言语,语音417.occur vi. 发生,出现,存在418.memo n. 备忘录419.prior a. 先验的,优先的420.loaded a. 有负载的421.length n. (字,记录,块)长度422.round v. 舍入,四舍五入423.variant n. & a. 变体,易变的424.floppy n. 软磁盘425.machine n. 机器,计算机426.square n. & a. 正方形;方形的427.supply vt. & n. 电源,供给428.home n. & a. 家,出发点429.normal a. & n. 正常,标准430.onto prep. 向…,到…上431.during prep. 在…期间432.module n. 模块(程序设计)433.monochrome n. 单色434.assistance n. 辅助设备,帮助435.tell n. 讲,说,教,计算436.library n. (程序…)库,图书馆437.demonstration n. (公开)表演,示范438.stack n. 栈,堆栈,存储栈439.even a. & ad. 偶数的;甚至440.evaluate v. 估计,估算,求值441.times n. 次数442.previously ad. 以前,预先443.directly ad. 直接地,立即444.logical a. 逻辑的,逻辑“或”445.template n. 标准框,样板,模板446.calling n. 呼叫,调用,调入ter a. 更后的,后面的448.driver n. 驱动器,驱动程序449.therefore ad. & conj. 因此,所以450.saving a. 保存的451.detail n. 元件,零件,细节452.linker n. 连接程序453.loop n. 圈,环;(程序)循环,回路454.process vt. 处理,进程,加工455.scheme n. 方案,计划,图456.every a. 每个,全体,所有的457.refer v. 访问,引用,涉及458.possible a. 可能的,潜在的的,abc的492.branch n. 分支,支线;v. 转换493.resume v. 重(新)开(始)494.multiple a. 多次的,复杂的495.monitor n. 监视器,监督程序496.configuration n. 配置497.replacement n. 替换,置换,更新498.required a. 需要的499.macros n. 宏命令(指令)500.table n. 表501.loss n. 损耗,损失502.batch n. 批,批量,成批503.exact a. 正确的504.aboveboard ad. & a. 照直,公开的505.activate vt. & n. 使激活,驱动506.around ad. & prep. 周围,围绕507.slow a. & ad. 慢速的508.floating a. 浮动的,浮点的509.refresh v. 刷新,更新,再生510.stop v. 停止,停机511.pass v. 传送,传递,遍(数)512.public a. 公用的,公共的513.eject n. 弹出514.ignore vt. 不管,忽略不计515.share v. 共享,共用516.sequence n. 顺序,时序,序列517.consist vi. 符合,包括518.step n. 步,步骤,步长,档519.double a. 两倍的,成双的e vi. 来,到,出现521.lower a. 下部的,低级的522.describe vt. 描述,沿…运行523.count v. 计数,计算524.pop v. 上托,弹出(栈)525.valid a. 有效的526.suspend v. 中止,暂停,挂起527.enhance vt. 增强,放大,夸张528.separate v. & a. 分隔,分离,各自的529.echo n. 回波,反射波530.necessary a. 必要的,必然的531.greater than 大于532.able a. 能…的,有能力的533.marking n. 标记,记号,传号534.ask v. 请求,需要535.term n. 项,条款,术语536.bring v. 引起,产生,拿来537.warning n. & a. 报警,预告538.less a. & ad. 更小,更少539.whose pron. 谁的ment n. & vi. 注解,注释541.effect n. 效率,作用,效能542.expanding a. 扩展的,扩充的543.on-line a. 联机的544.reorder v. (按序)排列,排序545.direct a. 直接的546.enclose vt. 封闭,密封,围住,包装547.reset vt. 复位,置“0”548.various a. 不同的,各种各样的549.paper n. 纸,文件,论文550.prevent v. 防止,预防551.side n. (旁)边,面,侧(面)552.push v. 推,按,压,进(栈)553.programming n. 程序设计,编程序554.upper a. 上的,上部的555.row n. 行556.pressed a. 加压的,压缩的557.temporarily ad. 暂时558.day n. 日,天,白天,时代559.repaint vt. 重画560.redefine vt. 重新规定(定义)561.relation n. 关系,关系式562.dimension n. 尺寸,维,因次563.boundary n. 边界,界限,约束564.zoom v. 变焦距565.initialize v. 初始化566.personal a. 个人的,自身的567.hello int. & v. 喂!;呼叫568.true a. & n. 真,实,选中569.wish v. & n. 祝愿,希望570.font n. 铅字,字形571.know v. 知道,了解,认识572.convert v. 转换,变换573.global n. 全局,全程,全局符574.still a. & n. & v. 静止的;静;平静575.installation n. 安装,装配576.invoke vt. 调用,请求577.interactive a. 交互式,交互的578.described a. 被看到的,被发现的579.century n. 世纪580.literal a. 文字的提要618.well n. & a. 井;好,良好619.link n. & v. 链接;连接,联络620.according to a. 按照,根据621.identify v. 识别,辨认622.designated a. 指定的,特指的623.pertain vi. 附属,属于,关于624.expansion n. 展开,展开式625.incompatible a. 不兼容的626.blinking n. 闪烁627.month n. 月份628.precede v. 先于629.readily ad. 容易地,不勉强630.transportable a. 可移动的631.appropriately ad. 适当地632.routine n. 程序,例行程序633.ready a. 就绪,准备好的634.listing n. 列表,编目635.newly ad. 新近,重新636.year n. (一)年,年度,年龄637.contact n. 接触,触点638.session n. 对话,通话639.own a. & v. 自己的;拥有640.redraw vt. 再拉641.here ad. 在这里642.manual a. 手工的,手动的643.particular a. 特定的,特别的644.rectangle n. 矩形645.additive a. & n. 相加的;附加物646.similar a. 相似的647.assembly n. 汇编,安装,装配648.copyright n. 版权649.description n. 描述650.retrieve v. 检索651.mistake n. 错误652.produce v. 生产,制造653.ram 随机存取存储器654.exception n. 例外,异常,异议655.digit n. 数字,位数,位656.reverse v. & a. 反向的,逆657.minimum n. & a. 最小(的),最低658.enough a. & ad. 足够的,充足的659.although conj. 虽然,即使660.reindex v. & n. 变换(改变)符号661.third a. & n. 第三,三分之一662.red a. & n. 红色(的)663.along prep. & ad. 沿着664.test n. & v. 测试665.small a. 小的,小型的666.feed v. 馈给,(打印机)进纸pany n. & v. 公司;交际,交往668.movie n. 影片,电影(院)pile vt. 编译670.frequently ad. 常常,频繁地671.undefined a. 未定义的672.state n. & vt. 状态;确定673.tick v;n. 滴答(响);勾号(√) 674.accept vt. 接受,认可,同意675.intense a. 强烈的,高度的676.documentation n. 文件编制,文本677.asterisk n. 星号(*)678.easily ad. 容易地,轻易地679.become v. 成为,变成,适宜680.address vt. & n. 寻址;地址681.interface n. 接口682.pause vi. 暂停683.repeat v. 重复684.restart v. 重新启动,再启动685.assumed a. 假定的686.speed n. 速度687.entry n. 输入,项(目),入口bine v. 组合,联合anize v. 组织,创办,成立690.finished a. 完成的691.mixed a. 混合的692.permit v. 许可,容许693.formatting n. 格式化694.root n. 根695.symbol n. 符号,记号696.binary n. & a. 二进制;双态的697.whenever ad. & conj. 随时698.reach v. & n. 范围,达到范围699.caution n. & v. 警告,注意700.subtotal n. & v. 小计,求部分和701.card n. 卡片,插件(板)702.general a. 通用的703.associated a. 联合的,相联的704.transfer v. 传送,转换,转移705.connect v. 连接706.partition v. 划分,分区,部分的,受操纵的741.period n. 周期742.huge a. 巨大的,非常的743.determined a. 坚决的,毅然的744.trailing n. & a. 结尾;尾随的745.seek v. 查找,寻找,探求746.introduction n. 入门,介绍,引进747.indent v. 缩排748.base n. 基,底,基地址749.integer n. 整数750.attempt vt. & n. 尝试,试验751.twice n. & ad. 两次,两倍于752.formed a. & n. 成形753.subscript n. 注脚,下标754.tiny a. 微小的,微量的755.model n. 模型,样机,型号756.correction n. 校正,修正757.rating n. 定额,标称值758.secondary a. 辅助的,第二的759.opened a. 开路的,断开的760.limit n. 极限,限界761.sun n. 太阳,日762.translate v. 翻译,转换,平移763.reason n. 原因,理由764.colon n. 冒号“:”765.avoid vt. 避免,取消,无效766.range n. 范围,域,区域767.allocate vt. 分配768.wordperfect a. 一字不错地熟记的769.simply ad. 简单地,单纯地770.verify vt. 鉴定,检验,核对771.manner n. 方法,样式,惯例772.direction n. 方向,定向,指向773.portion n. & vt. 部分;分配774.emulator n. 仿真器,仿真程序775.successful a. 成功的776.applied a. 适用的,外加的777.sum n. 和,合计,总额778.achieve vt. 完成,实现779.together ad. 一同,共同,相互780.affect vt. 影响,改变,感动781.delay v. 延迟782.free a. 自由的,空闲的783.properly ad. 真正地,适当地784.kind n. 种类,属,级,等785.splitting n. 分区(裂)786.feature n. 特征,特点787.console n. 控制台,操作台788.operate v. 操作,运算789.kernel n. 内核(核心)程序790.easy a. & ad. 容易的;容易地791.modifier n. 修改量,变址数792.invalid a. 无效的piler n. 编译程序(器)794.dot n. 点795.beep n. 蜂鸣声,嘀嘀声796.face n. 面,表面797.random a. 随机的798.facility n. 设施,装备,便利799.heading n. 标题800.asynchronous a. 异步的,非同步的801.series n. 序列,系列,串联802.individual a. 个别的,单个的803.explain v. 阐明,解释804.paste n. 湖,胶,膏805.welcome vt. & n. 欢迎806.six n. & a. 六(个)(的)807.early a. & ad. 早期,初期808.wrap v. & n. 包装,缠绕809.blue a. & n. 蓝(色),青色810.queue v. & n. 排队,队列811.interrupt v. & n. 中断812.respect n. & vt. 遵守,关系813.converted a. 转换的,变换的mon a. 公用的815.hyphen n. 连字符,短线816.serial a. 串行的,串联的817.loading n. 装入,加载,存放818.retain vt. 保持,维持819.setup n. 安排,准备,配置820.freeze v. 冻结,结冰821.intend vt. 打算,设计822.explanation n. 说明,注解,注释823.certain a. 确实的,确定的824.zap v. 迅速离去,击溃825.archive vt. 归档826.negative a. 负的,否定的827.image n. 图像,影像,映像828.platform n. 平台,台架829.often ad. 经常,往往,屡次悬而未决的,未定的864.divide v. 除865.boot n. 引导,靴866.hide v. 隐藏,隐蔽867.half n. & a. & ad. 一半,半个868.magenta n. & a. 深红色(的) 869.leading n. & a. 引导(的)870.wrong a. & ad. n. 错误(的) 871.today n. & ad. 今天872.least a. & ad. 最小(的)873.opposite a. & n. & ad. 相反的874.white a. & n. 白色(的)875.override v. & n. 超越,克服876.brown a. & n. 褐色(的),棕色877.hex a. & n. 六角形的878.rest n. & v. 剩余,休息879.damage n. & vt. 损伤,故障880.instant a. 立刻的,直接的881.reserved a. 保留的,预订的882.technology n. 工艺,技术,制造学883.handle n. 处理,句柄884.apply v. 应用,适用于,作用885.stand v. 处于(状态),保持886.payment n. 支付,付款887.kilobyte n. 千字节(kb)888.parenthesis n. 括弧,圆括号889.scan v. 扫描,扫视,搜索890.locating n. 定位,查找891.developer n. 开发者,显影剂892.murder n. 弄坏,毁掉893.flush v. 弄平,使齐平894.unlock v. 开锁,打开895.movement n. 传送,移动896.consecutive a. 连续的,连贯的897.collection n. 集合,聚集,画卷898.front a. 前面的,正面的899.addressing n. 寻址900.prefix n. 前缀901.carousel n. 圆盘传送带902.safety n. 安全,保险903.static a. 静态的,不变的904.background n. 背景,底色,基础905.product n. (乘)积,产品906.assignment n. 赋值,分配907.bad a. 坏的,不良的908.declare v. 说明909.adjust vt. 调整,调节,控制910.recognize v. 识别911.route n. 路线,路由912.respectively ad. 分别地913.unsuccessful a. 不成功的,失败的914.received a. 被接收的,公认的915.navigate v. 导航,驾驶916.considered a. 考虑过的,被尊重的917.due a. 到期的,应付(给)的918.recently ad. 近来919.room n. 房间,空间920.descend v. 下降,落下921.fact n. 事实922.alter v. 改变,修改923.track n. 磁道,轨道924.precedence n. 优先权925.skeleton n. 骨架,框架926.log n. & v. 记录,存入927.star n. 星形,星号928.hot a. 热的929.replaceable a. 可替换的930.accessible a. 可以使用的931.involve vt. 涉及,卷入,占用932.configure vt. 使成形933.question n. 问题934.green n. & a. 绿色绿色的935.entirely ad. 完全地,彻底地936.helpful a. 有帮助的,有用的937.middle a. 中间的938.declared a. 承认的,申报的press vt. 压缩,精减940.graphically ad. 用图表表示941.auto a. 自动的942.automatic a. 自动的943.aligned a. 对准的,均衡的944.anywhere ad. 在任何地方945.terminal n. 终端,端子946.door n. 舱门,入口,孔947.expire v. 终止,期满948.resolution n. 分辨率949.local a. 局部的,本地的950.semicolon n. 分号(;)951.reread vt. 重读952.overwrite v. 重写也不987.mono a. & n. 单音的988.slide v. & n. 滑动,滑动触头989.abort v. & n. 中断,故障990.jump v. & n. 转移991.toward prep. 朝(着…方向)992.throughout prep. 贯穿,整,遍993.via prep. 经过,经由994.among prep. 在…之中,中间995.neither a. & pron. (两者)都不yer n. & v. 层,涂层997.scatter v. 散射,分散,散布998.attention n. 注意(信号)999.convention n. 常规,约定,协定1000.conventional a. 常规的,习惯的1001.tool n. 工具,刀1002.handler n. 处理程序1003.processor n. 处理机,处理程序1004.desktop a. 台式的1005.build v. 建造,建立,组合1006.windowing n. 开窗口1007.development n. 开发,研制,显影1008.exceed v. 超过,大于1009.understand v. 懂,明白(了),理解1010.horizontal a. 水平的,横向的1011.alphabetically ad. 按字母表顺序1012.meet v. “与”,符合,满足1013.protect vt. 保护1014.reserve vt. 保留,预定,预约1015.clock n. 时钟,计时器,同步1016.manifest vt. 表明,显示,显现1017.safe a. 安全的,可靠的1018.disconnect vt. 拆接,断开,拆线1019.clockwise a. 顺时针的1020.eliminate vt. 除去,消除,切断1021.actual a. 实际的,现实的1022.declaration n. 说明,申报1023.probably ad. 多半,很可能1024.ring n. & v. 环,圈;按铃1025.cover vt. 盖,罩,套1026.indicator n. 指示器,指示灯1027.apple n. 苹果1028.icon n. 图符,象征1029.consideration n. 考虑,研究,讨论1030.skill n. 技巧1031.picture n. 图象,画面yout n. 布置,布局,安排1033.suggest vt. 建议,提议,暗示1034.convenient a. 方便的,便利的1035.instruct vt. 讲授,命令1036.appendix n. 附录1037.medium n. & a. 媒体;中等的1038.truncate vt. 截尾,截断1039.inhibit vt. 禁止1040.nearly ad. 近乎,差不多,几乎1041.warn vt. 警告,警戒,预告1042.underline n. 下划线1043.register n. 寄存器1044.stuff n. & vt. 材料;装入1045.exclude vt. 排除,除去1046.destroy vt. 破坏,毁坏,打破1047.calculation n. 计算,统计,估计1048.angle n. 角,角度1049.lexical a. 辞典的,词法的1050.decide v. (使)判定,判断1051.trouble n. 故障1052.processing n. (数据)处理,加工1053.customer n. 顾客,客户1054.port n. 端口,进出口1055.discuss vt. 讨论,论述1056.segment n. 段,片段,图块1057.filing n. (文件的)整理汇集1058.identically ad. 相等,恒等1059.market n. 市场,行情,销路1060.valuable a. 有价值的,贵重的1061.limited a. 有限的,(受)限制的1062.trying a. 费劲的,困难的1063.heap n. 堆阵1064.grey n. & a. 灰色;灰色的1065.permanently ad. 永久地,持久地1066.accelerator n. 加速装置,加速剂1067.originally ad. 原来,最初1068.ability n. 性能,能力,效率1069.internally ad. 在内(部) 1070.derelict vt. 中途淘汰1071.redirect vt. 重定向1072.reside vi. 驻留1073.header n. 首部,标题,报头1074.extra a. 特别的,额外的1075.repeated a. 重复的1109.mainframe n. 主机,大型机1110.debugger n. 调试程序1111.diacritical a. 区分的,辩别的1112.confidential a. 机密的1113.trace v. 跟踪,追踪1114.division n. 除,除法,(程序)部分1115.regular a. 正则的,正规的1116.implicit a. 隐式的1117.mention vt. & n. 叙述,说到1118.near ad. & prep. 领近,接近1119.fifth n. & a. 第五,五分之一1120.seven n. & a. 七(个)1121.whereas conj. 面,其实,既然1122.review v. & n. (再)检查1123.whatever pron. & a. 无论什么1124.transform v. & n. 变换,变换式1125.align v. & n. 定位,对准1126.yellow a. & n. 黄色(的)1127.assist v. & n. 加速,帮助1128.finish v. & n. 完成,结束1129.micro a. & n. 微的,百万分之一1130.beyond prep. 超过,那边1131.against prep. 反对,阻止1132.upon prep. 依据,遵照1133.service n. & vt. 服务,业务1134.little a. 小的,少量的1135.exhaust v. 取尽,用完1136.choice n. 选择,精品1137.sounding a. 发声的1138.develop v. 发展,研制,显影1139.holding n. 保持,固定,存储1140.alpha n. 希腊字母α,未知数1141.constant n. 常数1142.warranty n. 保证(书),授权1143.stay v. 停止,停留1144.industry n. 工业1145.trigger n. & v. 触发器;触发1146.lesson n. 功课,教训1147.handling n. 处理,操纵1148.treat v. 处理,加工1149.busy a. 忙碌的,占线的age n. 应用,使用,用法1151.difficult a. 困难的,不容易的1152.failure n. 失效,故障,失败munication n. 通信1154.building n. 建造,建筑,房屋1155.ally v. 联合,与…关联1156.exclamation n. 惊叹(号)1157.turning a. 转弯的,旋转的1158.whole a. 全部的,整个的1159.parent n. 双亲,父代1160.connection n. 连接(法)1161.connectivity n. 连通性,联络性1162.translation n. 翻译,变换,平移1163.dynamic a. 动态的,动力的1164.foreground n. 前台1165.preserve vt. 保存,维持1166.vice n. 缺点,毛病,错误1167.necessarily ad. 必定,当然1168.circle n. 圆,圈,循环,周期1169.differ vi. 不同,不一致1170.stationary a. 静止的,平稳的1171.extract vt. 抽取,摘录,开方1172.unrecognized a. 未被认出的1173.thereafter ad. 此后,据此1174.inverse a. 反向的,逆的1175.spell v. 拼写1176.limiting n. (电路参数)限制处理1177.restructure vt. 调整,重新组织1178.delimit vt. 定界,定义1179.pay v. 付款,支付1180.separately ad. 分别地1181.classify vt. 分类,分级1182.interfere vi. 干涉,干扰,冲突1183.mind n. 愿望,想法,智力1184.individually ad. 个别地,单独地1185.vertical a. 垂直的,立(式)的1186.undesirable a. 不合乎需要的1187.lot n. 一块(批,组,套)1188.piece n. 一块,部分,段1189.unavailable a. 不能利用的1190.unlike a. 不象的,不同的1191.sit v. 位于,安装1192.insufficient a. 不足的,不适当的1193.map n. & vt. 图;映射,变址1194.figure n. 数字;图,图形,形状1195.prepare v. 准备1196.consider v. 考虑,认为,设想1197.detect vt. 检测1198.convenience n. 方便,便利1230.specialize v. (使)专门化1231.fail n. 故障,失效1232.primarily ad. 首先,起初,原来1233.sequentially ad. 顺序地1234.client n. 顾客,买主1235.runtime n. 运行时间1236.fix v. 固定,定影1237.author n. 程序设计者,作者1238.programmer n. 程序设计人员mercial a. 商业的,经济的1240.particularly ad. 特别,格外,尤其1241.low a. 低的,浅的,弱的1242.sheet n. (图)表,纸,片1243.employee n. 雇员1244.legal a. 合法的,法律的1245.qualified a. 合格的,受限制的1246.context n. 上下文,来龙去脉1247.involved a. 有关的1248.conditional a. 有条件的1249.halfway a. 中途的,不彻底的1250.oriented a. 有向的,定向的1251.pair n. (一)对,一双1252.week n. (一)星期,(一)周1253.suppressed vt. 抑制,取消1254.subroutine n. 子程序1255.bracketed a. 加括号的1256.manually ad. 用手,手动地1257.preset vt. 预置1258.autoindex n. 自动变址(数) 1259.restrict vt. 约束,限制1260.performance n. 性能,实绩1261.showing n. 显示,表现1262.ever ad. 在任何时候,曾经1263.distribution n. 分布,分配1264.denote vt. 指示,意味着,代表1265.cash n. 现金1266.repeatedly ad. 重复地1267.replicate vt. 重复,复制1268.mega n. 兆,百万1269.conform vi. 遵从,符合1270.rebuild v. 重建,修复,改造1271.certainty n. 必然,确实1272.controller n. 控制器1273.pseudo a. 假的,伪的,冒充的1274.manage v. 管理,经营,使用1275.administrator n. 管理人,行政人员1276.ensemble n. 总体,集合体1277.bus n. 总线,信息通路1278.allowable a. 容许的,承认的1279.limitations n. 限制,边界1280.restriction n. 限制,约束,节流1281.height n. 高度1282.remainder n. 余数,余项,剩余1283.traverse v. 横渡,横过,横断anization n. 结构,机构,公司1285.resulting a. 结果的,合成的1286.solution n. 解,解法,解答1287.external a. 外部的1288.adequate a. 足够的,充分的1289.interpretability n. 配合动作性1290.vary v. 变化,变换1291.gap n. 间隙,间隔,缝隙1292.indexing n. 变址,标引,加下标1293.board n. 板,插件板1294.package n. 插件,(软件)包1295.insertion n. 插入,嵌入,插页1296.intervene vi插入,干涉1297.conflict v. 冲突,碰头1298.really a. 真正地,确实地1299.overflow v. 溢出,上溢1300.charge n. 电荷,充电,负荷1301.phone n. 电话,电话机,音素1302.virtual a. 虚(拟)的,虚拟pose v. 组成,构成,构图1304.snapshot n. 抽点打印1305.sensitivity n. 灵敏度1306.familiar a. 熟悉的,惯用的1307.mach n. 马赫(速度单位)1308.incorrect a. 错误的,不正确的1309.cut v. 割,切1310.lowest a. 最低的,最小的1311.simple a. 简单的1312.subsequent a. 后来的,其次的1313.capitalized a. 大写的pact a. 紧致的,压缩的1315.plain n. 明码1316.noted a. 著名的1317.desirable a. 所希望的,称心的1318.substitution n. 代替,替换,置换1351.ellipsis n. 省略符号,省略(法) 1352.ship n. 舰,船1353.british a. & n. 英国的;英国人1354.parallel a. 并行1355.custom a. & n. 常规的,惯例;用户1356.congratulation n. 祝贺1357.protection n. 保护1358.glass n. 玻璃1359.pattern n. 模式1360.insure v. 保证,保障1361.stopping n. 停止,制动(状态) 1362.factory n. 工厂,制造厂1363.implement n. & vt. 工具;执行,实现1364.effort n. 工作,研究计划1365.worker n. 工作人员1366.ampersand n. &号(and)1367.deal v. 处理,分配,交易1368.power n. 功率,电源,幂1369.difficulty n. 困难,难点1370.lose n. 失去,损失1371.magic n. 魔术,幻术1372.proprietary a. 专有的1373.aware a. 知道的,察觉到的1374.numerous a. 为数众多的,无数的1375.vowel n. 元音,母音1376.closely a. 精密地,仔细地1377.accuracy n. 精确度,准确度1378.traditional a. 传统的,惯例的1379.synchronization n. 同步1380.fragment n. 片段,段,分段1381.primary a. 原始的,主要的1382.safely ad. 安全地,确实地1383.habit n. 习惯prise vt. 包括,由…组成ndler n. 兰德勒舞曲1386.absence n. 缺少,没有1387.revolutionize vt. 变革,彻底改革1388.constantly ad. 不变地,经常地1389.seldom ad. 不常,很少,难得1390.unfortunately ad. 不幸,遗憾地1391.expunge vt. 擦除,删掉1392.security n. 安全性,保密性1393.touch v. & n. 按,揿,触;触力1394.contrast n. 反差,对比,对比度1395.invent vt. 创造,想象1396.reflect v. 反射1397.undone a. 未完成的1398.unshift v. 未移动,不移档plex a. & n. 复杂的;复数plexity n. 复杂性,复杂度1401.creation n. 创造,创作1402.unknown a. 未知的,无名的1403.greatly ad. 大大地,非常1404.cost n. 值,价值,成本1405.degrade v. 降低,减少,递降1406.suggestion n. 暗示,提醒1407.real n. 实数,实的,实型1408.experimentation n. 实验(工作,法) 1409.experiment n. 实验,试验(研究) 1410.substantial a. 实质的,真正的1411.solely ad. 独自,单独,只1412.announce vt. 发表,宣布1413.squeeze v. 挤压1414.distribute vt. 分布,配线,配给1415.negate vt. 否定,求反,“非”1416.capture vt. 俘获,捕捉1417.father n. 父,上层(树节点的) 1418.reinstate vt. 复原,恢复1419.tutorial a. 指导的1420.nicety n. 细节,精细1421.roll n. & v. 案卷;卷动,滚动1422.exponent n. 指数,阶,幂1423.exponential a. 指数的,幂的,阶的1424.prefer vt. 更喜欢,宁愿plicated v. 使复杂化,使混乱1426.reactivate v. 使恢复活动1427.spread v. 展开,传播1428.synchronize v. 使同步1429.formation n. 构造,结构,形成1430.widely ad. 广泛,很远ma n. 逗号“,”,逗点1432.very ad. 很,非常,最1433.unnecessary a. 不必要的,多余的1434.unchanged a. 不变的1435.cross n. 交叉,十字准线1436.yet ad. 还,仍然,至今1437.slowly ad. 缓慢地1438.inexperienced a. 不熟练的,外行的1439.noninteractive a. 不相关的,非交互的1440.unwanted a. 不需要的,多余的立地1474.continuously ad. 连续不断地1475.shield v. 屏蔽,罩,防护1476.glance n. 闪烁1477.happening n. 事件,偶然发生的事1478.transaction n. 事项,事务,学报1479.emulation n. 仿真,仿效1480.strike v. 敲,击1481.dump v. (内存信息)转储1482.occasionally ad. 偶尔(地),不时1483.tension n. 张力1484.probable a. 概率的,可能的1485.talent n. 才能,技能,人才1486.financial a. 财务的,金融的1487.meter n. 仪表,米1488.logged a. 记录的,浸透的1489.ware n. 仪器,商品1490.disregard vt. 轻视,把…忽略不计1491.waiting a. 等待的1492.preceding a. 先的,以前的parison n. 比较,对照1494.advanced a. 先进的,预先的1495.rate n. 比率,速率,费率1496.fly v. 飞,跳过1497.programmable a. 可编程的1498.definable a. 可定义的,可确定的1499.readable a. 可读的1500.recoverable a. 可恢复的,可回收的1501.possibility n. 可能性1502.finisher n. 成品机1503.applicable a. 可适用的,合适的1504.printable a. 可印刷的1505.executable a. 可执行的1506.essentially ad. 实质上,本来1507.confuse vt. 使混乱,干扰1508.familiarize vt. 使熟悉,使通俗化1509.employe vt. 使用,花费1510.suitable a. 适合的,相适宜的1511.generation n. (世)代,(发展)阶段1512.quality n. 质量,性质,属性1513.defective a. 故障的,有毛病的1514.interpretable a. 彼此协作的1515.interest n. 兴趣,注意,影响1516.fourscore n. 八十1517.teach v. 教,讲授1518.procedural a. 程序上的1519.phrase n. 短语,成语1520.specifically ad. 特别地,逐一地1521.penalty n. 惩罚,罚款,负担1522.violate vt. 违犯,妨碍,破坏1523.indefinitely ad. 无限地,无穷地1524.major a. 较大的,主要的1525.higher a. 较高的1526.wise a. 聪明的1527.becoming a. 合适的,相称的1528.equally ad. 相等地,相同地1529.enjoy vt. 享受,欣赏,喜爱1530.forth ad. 向前1531.disappear vi. 消失1532.crop v. 切,剪切1533.diagonally ad. 斜(对)beled a. 有标号的1535.decision n. 判定,决定,决策1536.effective a. 有效的1537.significant a. 有效的,有意义的1538.avail v. & n. 有益于;利益1539.hang v. 中止,暂停,挂起1540.craze n. & v. 裂纹开裂1541.consequently ad. 因此,从而1542.introduce vt. 引进,引导1543.team n. 队,小组1544.visual a. 视觉的,直观的1545.acknowledgment n. 接收(收妥),承认1546.efficiently ad. 有效地1547.predict vt. 预测,预言1548.anticipate vt. 预先考虑,抢…先1549.bypass n. 旁路1550.nature n. 自然,天然1551.natural a. 自然的1552.grant vt. 允许,授权1553.logarithm n. 对数1554.reappears vi. 再现,重现1555.reload vt. 再装入1556.occupy vt. 占有,充满1557.photograph n. 照片;v.照相1558.terminating n. 终止,终结,收信1559.resolve v. 分辨,解像1560.unsafe v. 恢复1561.separator n. 分隔符1562.hierarchical a. 分级的,分层的。
计算机专业英语的课文与翻译之欧阳文创编

Unit 8 Computer NetworkingText 1Text 2 Data CommunicationsThe end equipmentcan be computers, printers, keyboards, CRTs, and so on.They are either generates the digital information for transmission oruses the received digital data. This equipment generally operates digital information internally in word units.DTE is data terminal equipment. A station controller (STACO)is the corresponding unit at the secondaries. At one time, the DTE was the last piece of equipment that belonged to the subscriber in a data link system. Between the DTEs, first is the modem, and then is the communications equipment. The communication equipment is owned and maintained by Telco. Data communications equipment (DCE) accepts the serial data stream from the DTE. And DCE converts it to some form of analog signal suitable for transmission on voice-grade lines. At thereceive end, the DCE performs the reverse function. It converts the received analog signal to a serial digital data stream. The simplest form of DCE is a modem (modulator/demodulator) or data set. At the transmit end, the modem can be considered a form of digital-to-analog converter.While at the receive end, it can be considered a form of analog-to-digital converter.参考译文数据通信终端设备可以是计算机、打印机、键盘、CRT等。
《科技英语》课后习题答案之令狐文艳创作

e.g. The two things are the same in outward form but different in essence.
essence: n. 2) extract obtained from a substance by taking out as much of the mass as possible
reason: v. to form or try to reach conclusions by connected thought; to think out
e.g. (1) Man’s ability to reason makes him different from the animal. (2) I reason in this way about the matter.
infinite: a. without limits; having no bounds; (number that cannot be calculated)
e.g. infinite space.
In contrast to the linear chain of reasoning for sequential games, a game with simultaneous moves involves a logical circle. (Para.7)
计算机英语(第4版) 刘艺 课文参考译文

《计算机英语(第4版)》参考译文第一单元:计算机与计算机科学课文A:计算机概览一、引言计算机是一种电子设备,它能接收一套指令或一个程序,然后通过对数字数据进行运算或对其他形式的信息进行处理来执行该程序。
要不是由于计算机的发展,现代的高科技世界是不可能产生的。
不同类型和大小的计算机在整个社会被用于存储和处理各种数据,从保密政府文件、银行交易到私人家庭账目。
计算机通过自动化技术开辟了制造业的新纪元,而且它们也增强了现代通信系统的性能。
在几乎每一个研究和应用技术领域,从构建宇宙模型到产生明天的气象报告,计算机都是必要的工具,并且它们的应用本身就开辟了人们推测的新领域。
数据库服务和计算机网络使各种各样的信息源可供使用。
同样的先进技术也使侵犯个人隐私和商业秘密成为可能。
计算机犯罪已经成为作为现代技术代价组成部分的许多风险之一。
二、历史第一台加法机是法国科学家、数学家和哲学家布莱斯•帕斯卡于1642年设计的,它是数字计算机的先驱。
这个装置使用了一系列带有10个齿的轮子,每个齿代表从0到9的一个数字。
轮子互相连接,从而通过按照正确的齿数向前转动轮子,就可以将数字彼此相加。
17世纪70年代,德国哲学家和数学家戈特弗里德•威廉•莱布尼兹对这台机器进行了改良,设计了一台也能做乘法的机器。
法国发明家约瑟夫―玛丽•雅卡尔,在设计自动织机时,使用了穿孔的薄木板来控制复杂图案的编织。
在19世纪80年代期间,美国统计学家赫尔曼•何勒里斯,想出了使用类似雅卡尔的木板那样的穿孔卡片来处理数据的主意。
通过使用一种将穿孔卡片从电触点上移过的系统,他得以为1890年的美国人口普查汇编统计信息。
1、分析机也是在19世纪,英国数学家和发明家查尔斯•巴比奇,提出了现代数字计算机的原理。
他构想出旨在处理复杂数学题的若干机器,如差分机。
许多历史学家认为,巴比奇及其合伙人,数学家奥古斯塔•埃达•拜伦,是现代数字计算机的真正先驱。
巴比奇的设计之一,分析机,具有现代计算机的许多特征。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Unit 8 Computer NetworkingText 1令狐文艳Text 2 Data CommunicationsThe end equipmentcan be computers, printers, keyboards, CRTs, and so on.They are either generates the digital information for transmission oruses the received digital data. This equipment generally operates digital information internally in word units.DTE is data terminal equipment. A station controller (STACO)is the corresponding unit at the secondaries. At one time, the DTE was the last piece of equipment that belonged to the subscriber in a data link system. Between the DTEs, first is the modem, and then is the communications equipment. The communication equipment is owned and maintained by Telco. Data communications equipment (DCE) accepts the serial data stream from the DTE. And DCE converts it to some form of analog signal suitable for transmission on voice-grade lines. At the receive end, the DCE performs the reverse function. It converts the received analog signal to a serial digital data stream.The simplest form of DCE is a modem (modulator/demodulator) or data set. At the transmit end, the modem can be considered a form of digital-to-analog converter.While at the receive end, it can be considered a form of analog-to-digital converter.参考译文数据通信终端设备可以是计算机、打印机、键盘、CRT等。
它们可以生成要发送的数字信息,也可以使用所接收的数字数据。
这种设备通常在内部以字为单位处理数字信息。
DTE一般称为数据终端设备。
辅助设备一方的相应设备是工作站控制器(STACO)。
同时,DTE也是数据链路系统中属于用户端的最后一个设备。
在两个DTE之间,先是调制解调器,接着是属于Telco电话公司维护的通信设备。
数据通信设备(DCE)从DTE接收串行数据流,并将其转换成适合于在语音线路上发送的某种模拟信号形式。
在接收端,DCE完成相反的功能,把接收到的模拟信号转换成串行数字数据流。
最简单的DCE是调制解调器或数据传送机。
在发送端,调制解调器可以视为一种数/模转换器,而在接收端则可视为一种模/数转换器。
Text 3 Architecture of Computer Networks Computer network is a complex unit, it consists oftwo or more connected computing units. It is used for the purpose of data communication and resource sharing. Design of a network and its logical structure should comply with a set of design principles. They include: the organization of functions, the description of data formats and procedure.In the following two sections we will discuss two important network architectures, the OSI reference model and the TCP/IP reference model.(1)the OSI reference modelThe OSI (open systems interconnection) model was created by the ISO. This model is a foundation for comparing protocols; However, more protocols deviate from the rules set up by the OSI model.The OSI model has seven layers. Note that the OSI model itself is not a network architecture.It just tells what each layer should do. However, ISO has also produced standards for all the layers. Each one has been published as a separate international standard.(2)the TCP/IP reference modelTCP/IP is a communication protocol; it provides many different networking services.The TCP/IP Internet protocol suite is formed fromtwo standards: the TCP (Transmission Control Protocol) and the IP (Internet Protocol). TCP means it is on the transport layer. IP means it is on the network layer. On top of the transport layer is the application layer. It contains all the higher-level protocols. The early ones included virtual terminal (TELNET), file transfer (FTP), electronic mail (SMTP)and domain name service (DNS).As we know, TCP/IP is the foundation of the Internet.These protocols are continually changing and evolving to support the needs of the user community.参考译文计算机网络结构计算机网络是由两个或多个计算机设备互连而成的一种复合系统,它用于数据通信和资源共享。
网络设计及其逻辑结构应该遵循一套设计原则,其中包括:功能的组织以及数据格式和过程的说明。
在下面的两小节里,我们将讨论两个重要的网络体系结构,即OSI参考模型和TCP/IP参考模型。
(1)OSI参考模型OSI模型(开放系统互联参考模型)是由国际标准化组织(ISO)开发的一个建议。
相对于其他协议来说,此种模式为基础模式。
然而,更多的协议是背离OSI模型的。
OSI模型有7层。
应该注意的是,OSI模型本身并不是一种网络体系结构,它只是说明每一层应该做什么。
然而,ISO还是对各层制定了标准,每一层都是作为一个单独的国际标准来颁布的。
(2)TCP/IP参考模型TCP/IP参考模型是一种传输协议,提供了许多不同的网络服务。
TCP/IP协议组由TCP(传输控制协议)和IP(网际协议)两部分组成。
TCP表明是处于传输层,IP意为是在网络层。
在传输层上面是应用层。
应用层包括所有高层协议。
早期的协议包括虚拟终端TELNET、文件传送协议FTP、电子邮件SMTP和域名服务DNS。
现在我们知道,TCP/IP协议是因特网的基础。
这些协议在用户们的支持下不断地改变和进化着。
Text 4 Local Area NetworkA LAN (Local area data network) is a group of computers. The work devices connected together usually within the same building. By definition, the connections must be high-speed and relatively inexpensive (e.g. token ring or Ethernet). For example, a LAN may be used to interconnect workstations distributed around offices within a single building ora group of buildings such as a university campus.LANs consist of carefully selected groups of components (hardware and software). They are configured for the specific requirements of the organization. A LAN is generally limited to the size of a department or an organization. And a LAN often consists of 2 to 100 devices. LANs usually contain resources such as servers, printers, and connections to other networks through internetworking devices. The internetworking devices include switches and routers.In the next section we will discuss the structure of the different types of LAN.(1)TopologyMost wide area networks, such as the PSTN, use a mesh (sometimes referred to as a network) topology.With LANs, however, the limited physical separation of the subscriber DTEs allows simpler topologies to be used. The four topologies in common use are star, bus, ring and hub.The most widespread topology for LANs designed to function as data communication subnetworks for the interconnection of local computer-based equipment is the hub topology. It is a variation of the bus andring.(2)Transmission mediaTwisted pair, coaxial cable and optical fibre are the three main types of transmission medium used for LANs.(3)Medium access control methodsTwo techniques have been adopted for use of the medium access control in the LANs. One is carrier-sense-multiple-access with collision detection, and the other is control token.参考译文局域网局域数据网(局域网)由若干计算机组成。