计算机英语第四版课文翻译

合集下载

计算机英语 刘艺 王春生 第4版

计算机英语 刘艺 王春生 第4版
三进程间通信在一个网络内不同计算机上甚至使用分时方法在同一台计算机上执行的各种活动或进程必须经常互相通信以便协调行动并完成指定的任务
计算机英语 刘艺 王春生 第4版
The need to share information and resources among different computers has led to linked computer systems, called networks, in which computers are connected so that data can be transferred from machine to machine. In these networks, computer users can exchange messages and share resources such as printing capabilities, software packages, and data storage facilities-that are scattered throughout the system.
从...逐渐形成(发展成)
还有一种网络分类方法,它基于网络的拓扑结构,即计算机相互连接的模式 。总线拓扑结构、环形拓扑结构和星形拓扑结构是3种流行的拓扑结构。其中, 星形网络或许是最古老的,这种网络由一台大型中央计算机服务许多用户的范式 演变而来。
Ⅰ. Network Classifications
网络分类的另一种方式是根据网络的内部运行是基于无专利权保护的设计 还是基于特定实体(如个人或公司)所拥有和控制的革新。前一种类型的网络 称为开放式网络,后一种类型的网络称为封闭式网络,有时也称为专有网络。
Ⅰ. Network Classifications

计算机英语(第4版) 刘艺 课文参考译文

计算机英语(第4版)  刘艺  课文参考译文

《计算机英语(第4版)》参考译文第一单元:计算机与计算机科学课文A:计算机概览一、引言计算机是一种电子设备,它能接收一套指令或一个程序,然后通过对数字数据进行运算或对其他形式的信息进行处理来执行该程序。

要不是由于计算机的发展,现代的高科技世界是不可能产生的。

不同类型和大小的计算机在整个社会被用于存储和处理各种数据,从保密政府文件、银行交易到私人家庭账目。

计算机通过自动化技术开辟了制造业的新纪元,而且它们也增强了现代通信系统的性能。

在几乎每一个研究和应用技术领域,从构建宇宙模型到产生明天的气象报告,计算机都是必要的工具,并且它们的应用本身就开辟了人们推测的新领域。

数据库服务和计算机网络使各种各样的信息源可供使用。

同样的先进技术也使侵犯个人隐私和商业秘密成为可能。

计算机犯罪已经成为作为现代技术代价组成部分的许多风险之一。

二、历史第一台加法机是法国科学家、数学家和哲学家布莱斯•帕斯卡于1642年设计的,它是数字计算机的先驱。

这个装置使用了一系列带有10个齿的轮子,每个齿代表从0到9的一个数字。

轮子互相连接,从而通过按照正确的齿数向前转动轮子,就可以将数字彼此相加。

17世纪70年代,德国哲学家和数学家戈特弗里德•威廉•莱布尼兹对这台机器进行了改良,设计了一台也能做乘法的机器。

法国发明家约瑟夫―玛丽•雅卡尔,在设计自动织机时,使用了穿孔的薄木板来控制复杂图案的编织。

在19世纪80年代期间,美国统计学家赫尔曼•何勒里斯,想出了使用类似雅卡尔的木板那样的穿孔卡片来处理数据的主意。

通过使用一种将穿孔卡片从电触点上移过的系统,他得以为1890年的美国人口普查汇编统计信息。

1、分析机也是在19世纪,英国数学家和发明家查尔斯•巴比奇,提出了现代数字计算机的原理。

他构想出旨在处理复杂数学题的若干机器,如差分机。

许多历史学家认为,巴比奇及其合伙人,数学家奥古斯塔•埃达•拜伦,是现代数字计算机的真正先驱。

巴比奇的设计之一,分析机,具有现代计算机的许多特征。

计算机专业英语教程(第4版)全书译文

计算机专业英语教程(第4版)全书译文

1We have learned that all computers have similar capabilities and perform essentially the same functions, although some might be faster than others. We have also learned that a computer system has input, output, storage, and processing components; that th e processor is the “intelligence” of a computer system; and that a single computer system may have several processors. We have discussed how data are represented inside a computer system in electronic states called bits. We are now ready to expose the inner workings of the nucleus of the computer system — the processor.我们已经知道,所有的计算机都具有相似的能力,并且在本质上执行相同的功能,尽管一些可能会比另一些快一点。

我们也知道,一个计算机系统具有输入,输出,存储和处理部件;处理器是一个计算机系统智能核心,并且一个计算机系统可以有许多个处理器。

我们已经讨论过如何在计算机系统内部,用被称作“位”的电子状态来表现数据,现在我们要弄明白计算机系统的核心,即处理器,的内在的工作方式。

The internal operation of a computer is interesting, but there really is no mystery to it. The mystery is in the minds of those who listen to hearsay and believe science-fiction writer. The computer is a nonthinking electronic device that has to be plugged into an electrical power source, just like a toaster or a lamp.计算机的内部操作很有意思,但确实没有什么神秘可言。

计算机专业英语的第四版课后习题翻译讲课教案

计算机专业英语的第四版课后习题翻译讲课教案

中译英参考答案Unit 1A computer system consists of hardware system and software system. The hardware of the computer is usually divided into three major parts or three primary subsystems: the CPU, the memory subsystem, and the I/O subsystem.The CPU performs many operations and controls computer. The memory subsystem is used to store program being executed by the CPU, along with the program’s data. The I/O subsystem allows the CPU to interact with input and output devices such as the keyboard and monitor of a personal computer. The components of the computer are connected to the buses.The part of the computer that performs the bulk of data processing operations is called the central processing unit and is referred to as the CPU. In microcomputer, it is often called the microprocessor. The CPU is made up of three major parts: control unit, ALU, and register set.Memory is also known as internal memory or main memory. It refers to the circuits in the computer that hold whatever programs and data are available for immediate use by the CPU.I/O subsystem includes I/O devices and interface. There are a wide variety of I/O devices, such as mouse, printer, sensor, disk, and so on. Input-output interface provides a method for transferring information between internal storage and external I/O devices. Peripherals connected to a computer need special communication links for interfacing them with the CPU. The purpose of the communication link is to resolve the differences that exist between the central computer and each peripheral.Unit 2Storage hardware provides permanent storage of information and programs for retrieval by the computer. Hard disk drives store information in magnetic particles embedded in a disk. Usually a permanent part of the computer, hard disk drives can store large amounts of information and retrieve that information very quickly.Although fixed hard drive systems offer faster access and have a higher storage capacity than optical discs, optical disc systems use removable media –a distinct benefit. Optical discs –primary CDs and DVDs – are much more widely used than removable hard drive systems. They are the standard today for software delivery, as well as commonly used for storing high-capacity music and video files. There are also versions of both CD and DVD drives available for home audio and home theater use. Optical discs are commonly referred to as compact discs.CD and DVD discs are read by CD and DVD drives. The speed of a CD or DVD drive is rated as 24x, 32x, 36x, and so on. These labels describe how fast the drive is compared to the first version of that drive. For example, a 36x drive is 36 times the speed of the baseline unit that was originally manufactured. Most optical discs have a title and other text printed only on one side and they are inserted into the drive with the printed side facing up. When inserting such a CD or DVD, be careful not to get dirt, fingerprints, scratches, or anything else that might hinder light reflectivity on the disc’s surface.Unit 3(a) A program is a list of instructions or statements for directing the computer to perform arequired data processing task. Programming is a multistep process for creating that list of instructions.(b) It is important to understand the difference between a class and an object of that class. A class is simply a specification for creating objects. Thus, a single class may create multiple objects.(c) Java is an object-oriented, network-friendly high-lever programming language that allows programmers to build applications that can run on almost any operating system.(d) ActiveX is a set of controls, or reusable components that enables programs or content of almost any type to be embedded within a Web page. Whereas a Java must be downloaded each time you visit a Web site, with ActiveX the component is downloaded only once, then stored on your hard disk for later, repeated use.(e) Programming involves a great deal of creativity. The design is guide to the function or purpose of each component, but the programmer has great flexibility in implementing the design as code. No matter what language is used, each program component involves at least three major aspects: control structures, algorithms, and data structures.Unit 4The software system can be divided into two broad categories: application software and system software. Application software consists of the program for performing tasks particular to the machine’s utilization. In contrast to application software, system software comprises a large number of programs. These programs start up the computer and function as the principle coordinator of all hardware components and application software. Without system software loaded into RAM of your computer, your hardware and application software are useless.System software can be grouped into three basic parts: operating system, utility software, and language translators. The majority of an installation’s utility software consists of programs for performing activities that are fundamental to computer installations yet not included in the operating system. In a sense, utility software consists of software units that extend the capabilities of the operating system.A computer’s OS is the main collection of programs that manage its activities. The primary chores of an OS are management and control. The OS ensures that all actions requested by a user are valid and processed in an orderly fashion. It also manages the computer system’s resources to perform these operations with efficiency and consistency.Application software is the software designed to help you solve problems specific to business or perform specific business tasks. Application software then is the layer of software closest to you. Basically, there are four categories of application software: productivity software, business and specialty software, entertainment software and education/reference software.Unit 5A computer network is often classified as being either a local area network (LAN), a metropolitan area network (WAN), or a wide area network (WAN). The connection of two or more networks is called an internetwork. The worldwide Internet is a well-known example of an internetwork.LANs are privately owned networks within a single building or campus of up to a few kilometers in size. They are widely used to connect personal computers and workstations incompany offices and factories to share resources and exchange information.In general, a given LAN will use only one type of transmission medium. Various topologies are possible for LANs. The most common LAN topologies are bus, ring and star.A MAN is basically a bigger version of a LAN and normally uses similar technology. MAN is designed to extend over an entire city. It may be a single network such as a cable television network, or it may be a means of connecting a number of LANs into a large network so that resources may be shared LAN-to-LAN as well as device-to-device. For example, a company can use a MAN to connect the LANs in all of its offices throughout a city.A W AN spans a large geographical area that may comprise a country, a continent, or even the world. It provides long-distance transmission of data, voice, image, and video information over large geographical area.In contrast to LANs, W ANs may utilize public leased, or private communication devices, usually in combinations, and can therefore span an unlimited number of miles.Unit 6Transmission media are used to transfer messages over a network. For instance, the transmission media used in a network may be a privately owned set of cables, the public phone lines, or a satellite system. Transmission media can either be wired or wireless.The three types of wired media most commonly used to carry messages are twisted-pair wire, coaxial cable, and fiber-optic cable. One of the most successful developments in transmission media in recent years has been fiber optics. Fiber-optic cable is commonly used for the high-speed backbone lines of a network, or for Internet infrastructure.Wireless transmission media have become especially popular in recent years. They support communications in situations in which physical wiring is impractical or inconvenient, as well as facilitate mobility. Wireless media are commonly used to connect devices to a network, to share information between computers, to connect wireless mice to a computer, and for handheld PCs, wireless phones, and other mobile devices. Radio signals transferred through the air are the heart of most types of wireless media. In addition to conventional broadcast radio application, the microwave, cellular, and satellite transmission media also use radio signals to transmit data.Radio transmissions require the use of a transmitter to send the radio signals through the air.A receiver (usually containing some type of antenna) accepts the date at the other end. When a device functions as both a receiver and transmitter, it is commonly called a transceiver or transmitter-receiver.Unit 7(a) Since many database systems users are not computer trained, developers hide the complexity from users through several levels of abstraction, to simplify user’s interactions with the system: physical level, logical level, and view level.(b) A database schema is specified by a set of definitions expressed by a special language called a data-definition language (DDL). The result of compilation of DDL statements is a set of tables that is stored in a special file called data dictionary, or data directory.(c) The structured query language (SQL) is the most widely used and standard query language for relational database management systems. It is a kind of non-procedural language.(d) An entity is a “thing”or “object”in the real world that is distinguishable from otherobjects. For example, each person is an entity, and bank accounts can be considered to be entities. Entities are described in a database by a set of attributes.(e) Data warehouse is one of the newest and hottest buzzwords and concepts in the IT field and the business environment. A data warehouse is a logical collection of information——gathered from many different operational databases——that supports business analysis activities and decision-making tasks.Unit 8Animation is the term used to describe a series of graphical images that are displayed one after the other to simulate movement. Cartoons on television are one example of animation.Video differs from animation in that it usually begins as a continuous stream of visual information that is broken into separate images or frames when the video is recorded. When the frames are projected—typically at a rate of 30 frames per second—the effect is a smooth reconstruction of the original continuous stream of information. As you might imagine, at 30 frames per second, the amount of data involved in displaying a video during a multimedia presentation can require a substantial amount of storage space. Consequently, video data—like audio data—is often compressed. A variety of compression standards exist. Some of the most common video file formats are .avi, .mpeg, .mov, .rm.For multimedia presentation, video may be recorded using a standard (analog) video camera and then converted to digital form as it is input into a computer. Alternatively, the film can be recording digitally using a digital video camera. Streaming video is frequently used on Web pages to reduce file size. Similar to streaming audio, Streaming video files can begin playing once a portion of the video has been downloaded.Unit 9(a) AI is currently being applied in business in the form of knowledge systems, which use human knowledge to solve problems. The most popular type of knowledge-based system is the expert system. An expert system is a computer program that attempts to represent the knowledge of human experts in the form of heuristics. The term heuristic is derived from the same Greek root as the word eureka, which means “to discover”.(b) The user interface enables the manager to enter instructions and information into the expert system and to receive information from it. The instructions specify the parameters that guide the expert system through its reasoning processing. The information is in the form of values assigned to certain variables.(c) The knowledge base contains both facts that describe the problem area and knowledge representation techniques that describe how the facts fit together in a logical manner. The term problem domain is used to describe the problem area.(d) An expert system, also called a knowledge-based system, is an artificial intelligence system that applies reasoning capabilities to reach a conclusion. Expert systems are excellent for diagnostic and prescriptive problems.(e) The DSS is not intended to replace the manager. The computer can be applied to the structured portion of the problem, but the manager is responsible for the unstructured portion——applying judgment or intuition and conducting analyses.Unit 10The linked list (see figure 1) consists of a series of nodes, which are not necessarily adjacent in memory. Each node contains the element and a link to a node containing its successor. We call this the next link. The last cell’s next link references null.To execute printList or find(x) we merely start at the first node in the list and then traverse the list by following the next links. This operation is clearly linear-time, as in the array implementation, although the constant is likely to be larger than if an array implementation were used. The findKth operation is no longer quite as efficient as an array implementation; findKth(i) takes O(i) time and works by traversing down the list in the obvious manner. In practice, this bound is pessimistic, because frequently the calls to findKth are in sorted order (by i). As an example, findKth(2), findKth(3), findKth(4), and findKth(6) can all be executed in one scan down the list.The remove method can be executed in one next reference change. Figure 2 shows the result of deleting the second element in the original list.The insert method requires obtaining a new node from the system by using a new call and then executing two reference maneuvers. The general idea is shown in figure 3. The dashed line represents the old next reference.figure 1figure 2figure 3Unit 11(a) A set is pure if all of its members are sets, all members of its members are sets, and so on. For example, the set containing only the empty set is a nonempty pure set.(b) A language is a describable set of finite strings, drawn from a fixed alphabet. A grammar is one way to "describe" the language. The grammar consists of a finite list of rules, where each rule replaces one substring with another. The string on the left must contain at least one nonterminal. The first string "produces" or "generates" the second. Thus a rule is also called a production.(c) A finite-state machine (FSM) or finite-state automaton(FA)is a mathematical abstraction sometimes used to design digital logic or computer programs. It is a behavior model composed of a finite number of states, transitions between those states, and actions, similar to a flow graph in which one can inspect the way logic runs when certain conditions are met.(d) Sometimes it is inconvenient or impossible to describe a set by listing all of its elements. Another useful way to define a set is by specifying a property that the elements of the set have in common. The notation P(x) is used to denote a sentence or statement P concerning the variable object x. The set defined by P(x) written {x | P(x)}, is just a collection of all the objects for whichP is true.Unit 12(a) Because drawings are typically displayed in 3D, CAD is especially helpful in designing automobiles, aircraft, ships, buildings, electrical circuits (including computer chips), and even clothing.(b) Computer-integrated manufacturing (CIM) is the manufacturing approach of using computers to control the entire production process. This integration allows individual processes to exchange information with each other and initiate actions. Through the integration of computers, manufacturing can be faster and less error-prone, although the main advantage is the ability to create automated manufacturing processes.(c) In addition to supporting decision making, coordination, and control, information system may also help managers and workers analyze problems, visualize complex subjects, and create new products.(d) Knowing the history and evolution of ERP is essential to understanding its current application and its future developments.(e) In addition to monitoring operational activities such as tracking the status of orders and inventory levels, enterprise system also improve organization-wide reporting and decision making.Unit 13(a) There are a wide variety of educational application programs available. Educational software is designed to teach one or more skills, such as reading, math, spelling, a foreign language, world geography, or to help prepare for standardized tests.(b) Electronic business (e-business) is the use of information technology and electronic communication networks to exchange business information and conduct transactions in electronic, paperless form.(c) Word processing software allows you to use computers to create, edit, store, and print documents. You can easily insert, delete, and move words, sentences, and paragraphs——without ever using an eraser.(d) What is a spreadsheet? Spreadsheet software takes its name from the accountant’s columnar worksheet, which it imitates. A spreadsheet is a worksheet consisting of a collection of cells formed by the intersection of rows and columns. Each cell can store one piece of information: a number, word or phrase, or formula.Unit 14(a) A geographic information system (GIS) is a system that captures, stores, analyzes, manages and presents data with reference to geographic location data. In the simplest terms, GIS is the merging of cartography, statistical analysis and database technology.(b) The GPS receiver uses the messages it receives to determine the transit time of each message and computes the distance to each satellite. These distances along with the satellites' locations are used to compute the position of the receiver. This position is then displayed, perhaps with a moving map display or latitude and longitude; elevation information may be included.(c) Virtual reality (VR) is a term that applies to computer-simulated environments that can simulate physical presence in the real world. Most current virtual reality environments areprimarily visual experiences, displayed either on a computer screen or through special stereoscopic displays, but some simulations include additional sensory information, such as sound through speakers or headphones.Unit 15(a) The software development process is sometimes called the software development life cycle (SDLC), because it describes the life of a software product from its conception to its implementation, delivery, use, and maintenance.(b) How can the CMM help your organization? There are three key roles the CMM plays. First, the CMM helps build an understanding of software process by describing the practices that contribute to a level of process maturity. The second role of the CMM is to provide a consistent basis for conducting appraisals of software processes. The CMM’s third key role is to serve as a blueprint for software process improvement.(c) The UML offers a standard way to write a system’s blueprints, including conceptual things such as business processes and system functions as well as concrete things such as programming language statements, database schemas, and reusable software components. The UML represents a collection of the best engineering practices that have proven successful in the modeling of large and complex systems.(d) Object modeling is a technique for identifying objects within the system environment and the relationships between those objects. The object-oriented approach to system development is based on several concepts, such as object, attribute, behavior, encapsulation, class, inheritance, polymorphism, persistence, etc.Unit 16“Security” is an all-encompassing term that describes all the concepts, techniques, and technologies to protect information from unauthorized access. There are several requirements for information security.Confidentiality: hiding data, usually with encryption, to prevent unauthorized viewing and access.Authenticity: the ability to know that the person or system you are communicating with is who or what you think it is.Access control: once a person or system has been authenticated, their ability to access data and use systems is determined by access controls.Data integrity: providing assurance that an information system or data is genuine.Availability: making sure that information is available to users in a secure way.To prevent unauthorized access, some type of identification procedure must be used. These vary from passwords to physical access object (access cards, etc.) to biometric devices that verify some type of personal characteristic, such as a fingerprint.Some of the most secure access control systems address both identification and authentication. Identification involves verifying that the person’s name or other identifying feature is listed as an authorized user; authentication refers to determining whether or not the person is actually who he or she claims to be.Unit 17A distributed system is a collection of independent computers which appear to the users of system as a single computer. Nearly all large software systems are distributed. For example, enterprise-wide business systems must support multiple users running common applications across different sites.A distributed system encompasses a variety of applications, their underlying support software, the hardware they run on, and the communication links connecting the distributed hardware. The largest and best-known distributed system is the set of computers, software, and services comprising the World Wide Web, which is so pervasive that it coexists with and connects to most other existing distributed systems. The most common distributed systems are networked client/server systems. Distributed systems share the general properties described below.●Multiple nodes●Message passing or communication●Resource sharing●Decentralized control●Concurrency or parallelism●Fault tolerance●Heterogeneity●OpennessDistributed systems have many inherent advantages, especially over centralized systems. Some applications are inherent distributed as well. In general, distributed systems:●Yield higher performance●Allow incremental growth●Allow one user to run a program on many different machines in parallel●Provide higher reliability。

计算机英语 刘艺 王春生 第4版

计算机英语 刘艺 王春生 第4版

III Star/Extended Star Topology
• So+do+主语 • So+主语+do
III Star/Extended Star Topology
• So+do+主语 so代表上句中陈述的肯定内容。do可以是 连系动词、情态动词或助动词,且必须与 上句中的谓语动词保持时态的一致,意思 为“…也是如此”。 如:He can speak English very well. So can she. (=She can speak English very well, too.) 她英语也讲得很好。 • So+主语+do
III Star/Extended Star Topology
• In this case, the extended star topology is all but necessary to prevent degraded signals.
• 在这种情况下,【为防止信号衰减】,扩 展星型拓扑结构几乎是必需的。
V. Mesh Topology
• After all, what are the odds a network will fail in multiple times near the same device?
• 毕竟,一个网络在同一个设备附近多次出 故障的可能性有多大呢?
• 虚拟语气是一种特殊的动词形式,表示所 说的话不是一个事实,而只是一种假设、 愿望、建议、怀疑、猜测或不大可能实现 的空想。
• 虚拟语气用在条件状语从句中,通常从句 由连词if 引导。
II Ring Topology
虚拟条件状语从句 a. 与现在事实相反的假设 条件从句用一般过去时(be用were),主 句用should(would/might/could)+动词原形 如:If they were here, they would help you. 如果他们在这儿,会帮助你的。 含义:They are not here, they can’t help you.

计算机专业英语(第四版)

计算机专业英语(第四版)

AA data wareh‎o use is becom‎ing more of a neces‎s ity than an acces‎s ory for a progr‎e ssiv‎e, compe‎titiv‎e, and focus‎e d organ‎izati‎o n.数据仓库对‎于不断进取‎的,具有竞争力‎的,成为关注焦‎点的组织来‎说不是一个‎附属品,而是不可缺‎少的。

A growi‎n g numbe‎r of Web sites‎incor‎p orat‎e multi‎m edia‎, as do compu‎t er softw‎a re and consu‎m er inter‎f aces‎,such as ATM machi‎n es and infor‎m atio‎n kiosk‎s,(像自动取款‎机和信息亭‎那样的越来‎越多的We‎b站点配备‎了多媒体(如计算机多‎媒体软件,客户接口也‎配备了多媒‎体)A neces‎s ary featu‎r e of a DTP packa‎g e, there‎f ore, is a zoom facil‎i ty which‎displ‎a ys a porti‎o n of the docum‎e nt at a large‎r size than norma‎l so as to displ‎a y it at somet‎h ing much close‎r to the resol‎u tion‎of the final‎print‎e d produ‎c t(因此,DTP软件‎包的一个必‎备特征就是‎有缩放工具‎,它可以用比‎正常情况更‎大的尺寸显‎示文件的某‎一部分,从而以更接‎近最终印刷‎结果的分辨‎率来显示这‎些内容)A newer‎scrip‎t ing langu‎a ge incre‎asing‎ly more popul‎a r is PHP and ASP.而更通用的‎,比较新的脚‎本语言是P‎H P 和ASP。

《计算机英语(第4版)》参考译文

《计算机英语(第4版)》参考译文

第一单元:计算机与计算机科学课文A:计算机概览一、引言计算机是一种电子设备,它能接收一套指令或一个程序,然后通过对数字数据进行运算或对其他形式的信息进行处理来执行该程序。

要不是由于计算机的发展,现代的高科技世界是不可能产生的。

不同类型和大小的计算机在整个社会被用于存储和处理各种数据,从保密政府文件、银行交易到私人家庭账目。

计算机通过自动化技术开辟了制造业的新纪元,而且它们也增强了现代通信系统的性能。

在几乎每一个研究和应用技术领域,从构建宇宙模型到产生明天的气象报告,计算机都是必要的工具,并且它们的应用本身就开辟了人们推测的新领域。

数据库服务和计算机网络使各种各样的信息源可供使用。

同样的先进技术也使侵犯个人隐私和商业秘密成为可能。

计算机犯罪已经成为作为现代技术代价组成部分的许多风险之一。

二、历史第一台加法机是法国科学家、数学家和哲学家布莱斯•帕斯卡于1642年设计的,它是数字计算机的先驱。

这个装置使用了一系列带有10个齿的轮子,每个齿代表从0到9的一个数字。

轮子互相连接,从而通过按照正确的齿数向前转动轮子,就可以将数字彼此相加。

17世纪70年代,德国哲学家和数学家戈特弗里德•威廉•莱布尼兹对这台机器进行了改良,设计了一台也能做乘法的机器。

法国发明家约瑟夫―玛丽•雅卡尔,在设计自动织机时,使用了穿孔的薄木板来控制复杂图案的编织。

在19世纪80年代期间,美国统计学家赫尔曼•何勒里斯,想出了使用类似雅卡尔的木板那样的穿孔卡片来处理数据的主意。

通过使用一种将穿孔卡片从电触点上移过的系统,他得以为1890年的美国人口普查汇编统计信息。

1、分析机也是在19世纪,英国数学家和发明家查尔斯•巴比奇,提出了现代数字计算机的原理。

他构想出旨在处理复杂数学题的若干机器,如差分机。

许多历史学家认为,巴比奇及其合伙人,数学家奥古斯塔•埃达•拜伦,是现代数字计算机的真正先驱。

巴比奇的设计之一,分析机,具有现代计算机的许多特征。

计算机英语 课文翻译

计算机英语 课文翻译

云计算指的是能够通过互联网为用户储存并提供资源通道的服务器环境。

家庭和商业用户之所以采用云计算,通常有以下原因:●易获取:在有互联网连接的情况下,数据和/或应用可以通过任何一台电脑或设备传输到全世界。

●节省花费:用户不再需要负担在软件和高端硬件上的花费,例如高速处理器和大容量存储器和存储设备。

●节省空间:用户无需考虑服务器、存储设备以及其他硬件所需的基础空间。

●定制性:为用户提供了灵活性以便于增减实际的计算需要。

云计算允许企业将他们的信息技术基础设施外包出去,或是与第三方供应商合作。

他们自己只需支付他们实际使用的运算容量、存储、带宽,以及应用程序访问。

在这种情况下,企业不需要在设备上或人力上付出太多投资。

智能眼镜,是可穿戴的头戴型设备,它使用户能够查看信息或拍摄照片和能够拍摄投射到用户视野范围内微型屏幕上的视频。

例如,该设备的佩戴者可能正在运行一个应用程序,而他或她通过语音命令或通过触摸它的框架控件,该智能眼镜就可显示航班状态信息。

一些智能眼镜还包括移动应用,如健身跟踪器和GPS。

典型地,该技术使得用户觉得仿佛是从很远的屏幕上看到的这个图像,并且许多可穿戴显示器会覆盖用户正在实时查看的图像顶部,以增强真实性。

例如,Google Glass智能眼镜拥有一个微小的位于右镜片的显示器,用户可以在他们正看到的内容的前方看到投影内容。

Google Glass 通常被连接(通过蓝牙)到智能手机,然后内容(如文本消息、地图和方向、视频电话和网页)从电话传输到显示器上。

Google Glass 同时也拥有一个内部的Web浏览器,并且可以在需要的时候直接接入Wi-Fi热点;在它的框架右侧有一有个可触摸屏用于输入,以及一个骨传导的声音输出系统,使得用户可以听到音频输出。

一些软件可以从网络上直接运行,而非只有安装后才能使用,比如云软件,也称作软件即服务(SaaS)或云件。

云软件可以通过网络向用户传输所需,不论用户身处何地,都可以为其提供网络连接(如果为付费软件,需要交费)。

计算机专业英语教程 第四版 部分翻译和简答题

计算机专业英语教程 第四版 部分翻译和简答题

翻译:1、C++’s advantages include strong typing, operator overloading, and less emphasis on the preprocessor.C++的优点包括强类型,运算符重载和较少地强调预处理器。

2、A program instruction or a piece of data is stored in a specific primary storage location called an address.程序指令和数据是存储在主存中一个特殊的位置,称为地址空间3、A high-level language is an artificial language with which we can write various instructions. This is possible not because computer processors are now so technologically advanced that they can ‘understand’ these langu ages. You should translate from programming languages into machine language which can be understood by the computer processors. Compilers can accomplish this task. This does mean that a high-level language program is not directly executable: it must be compiled to produce processor program, which is executable.高级语言是一门人工的我们可以写入各种各样指令的语言。

计算机英语(课文内容翻译15分)

计算机英语(课文内容翻译15分)

计算机英语课文内容翻译( 15 分)CHAPTER 11.1We build computer to solve problems. Early computer solved mathematical and engineering problems ,and later computers emphasized information processing for business applications. Today, computers alsocontrol machines as diverse as automobile engines, robots, and microwave ovens. A computer system solves a problem from any of these domains by accepting input, processing it, and producing output. Figure 1-1illustrates the function of a computer system.Figure 1-2 shows these componentsin a block diagram. The lines between the blocks represent the flow of information flows from one component to another on the bus, which is simply a group of wires connecting the components. Processing occursin the CPU and main memory. The organization in Figure 1-2, with the components connectedto each other by the bus,is common. However, other configurations are possible as well.The classification just described is basedon physical size as opposed to storage size. A computer system user is generally more concerned with storage size, because thaist a more direct indication of the amount ofuseful work that the hardware can perform.Speed of computationis another characteristic that is important to the user. Generally speaking, users want a fast CPU and large amounts of storage, but a physically small machinefor the I/O devices and main memor.y1.2A processor is a functional unit that interprets and carries out instructions. Every processorcomes with a unique set of operations such as ADD, STORE, or LOAD that represent the processor set. Computers ins designers arefond of calling their computers machines, so theinstruction set is sometimes referred to asmachine instructions and the binary language in which they are written is called machine language! [1] You shouldn 'ctonfuse the processor 'in s truction set with the instructions found in high-level programming languages, such as BASIC or Pascal.The control unit is the functional unit that is responsible for supervising the operation of the entire computer system. In some ways, it is analogous to a telephoneswitch-board with intelligence becauseit makes the connections betweenvarious functional units of the computer system and calls into operation each unit that is required by the program currently in operationThe arithmetic and logic unit (ALU) is the functional unit that provides the computer with logical and computational capabilities. Data are brought into the ALU by the control unit, and the ALU performs whatever arithmetic or logic operations are required to help carry out the instruction1.3Below the L1 cache is the Level 2,or L2 cache. In today ' s P-ecnlatisusmprocessors ,the L2 cacheis usually on the processor chipitself .In fact ,If you could lift the lid of a Pentium or Athlon processor and look atthe silicon die itself under a microscope you might be surprised to find that the biggest percentage of chip areawas taken up by the cache memoriesBelow the L1 cache is the Level 2,or L2 cache. In today 's Pen-ticulamss processors ,the L2 cacheisusually on the processor chipitself .In fact ,If you could lift the lid of a Pentium or Athlon processor and look atthe silicon die itself under a microscope you might be surprised to find that the biggest percentage of chip area was taken up by the cache memorie[s.The virtual memory interface is shown in Fig.1-6. A real memory of 16M bytes and a virtual memory of 2G bytes are shown for illustration; many modern virtual memory systems are much larger than this. Virtual-memory space is divided into equal-sized groups called pages. A page in a modern computer is 1K, 2K, or 4K bytes. Real memory is also divided into the same equal-sizedgroups, called page frames. When information is moved between virtual-memory space and real-memory space, a complete page is moved.Section 3 discussed how virtual memory extends the address spaceof a processor. However, the latency of real memory is too long to support high-performance processors.Even with the high-speed DRAMs used today for real memory, something must be done to overcome this latency problem.CHAPTER 22.1Multiprogramming, which was developed to improve performance, also allows time sharing. Time shared operating systems allow many users (from one to several hundred) to use a computer system inter-leavingly at the same time. Other operating systems types include real time systems and multiprocessor systems.The management of resources in a computer system is another major concern of the operating system. Obviously, a program cannot use a device if that hardwareis unavailable. As we have seen, the operational software oversees the execution of all programs. It also monitors the devices being used. To accomplish this, it establishes a table in which programs are matched against the devices they are using or will use .The operating system checks this table to approve or deny use of a specific device.In effect , the program undergoing execution signals the operating system that an I/O operation is desired, using a specific I/O device. The controlling software calls on the IOCS software to actually complete the I/O operation. Considering the level of I/O activity in most programs, the IOCS instructions are extremely vital.CHAPTER 33.1Selecting a PC for home or business use must begin with the all-important question “What do I want the system to do?” Once you' ve determined what tasks the system will be used for, you must choose among the software and hardware alternatives available. If yo'ure not really sure what you want a system to do, you should think twice about buying one. Computer systems that are configured to match the requirements of certain applications (such as preparing a novel) often perform poorly at ot hers (playing power-hungry multimedia games, for example). You can easily make expensive mistakes if yo'u re uncertain about what you want a system to do.When you take possession of a new computer system, you should find that most of the hardware and software you need are alreadyin place. You' ll need to connect the components and start the systemup;then, you' ll be off and running. If your system does not include a piece of hardware or software that you want itto have, you can usually buy and install it yourself relatively easily.A final, but optional, step in setting up your new system is customizing the settings. Most PCs include options for background images, color schemes, themes, screen savers, screen resolution, the order of items on the menus, and soforth. In Windows, the desktop options are accessible through the Control Panel, as shown in Fig.3-1, You can also use the Control Panel to set up your network and Internet settings.3.2The Windows desktop appears on thescreen after a computerusing the Windows operating system has completed the boot process. The desktop is where documents, folders, programs, and other objects are displayed when they are being used, similar to the way documents and file folders are laid on a desk when they are being used. Thought the appearanceof the Windows desktop can be customized, all desktops contain common elements, such as desktop icons, the taskbar, the Start button, windows, and task buttons (see Fig.3-2).The principle component of the GUI is the window. As mentioned earlier, a window is a rectangular area of information that is displayed on the screen. These windows can contain programs and documents, as well as menus, dialog boxes,icons, and a variety of other types of data.A menu is a set of options--usually text based—from which the user can choose to initiate a desiredaction in a program. At the top of many windows is a menu bar showing the main menu categories (see Fig.3-2). Pull-down menus (also called drop--down menus) display on the screen when the user selects an item on the menu bar. As shown on the right-most screen in Fig.3-2, in some Microsoft programs (such as Windows and someversions of Microsoft Office) a feature called personalizedmenus can be used.CHAPTER 44.1The OSI model is shown in Fig.4-1 (minus the physical medium). This model is based on a proposal developed by the International Standards Organization (ISO) as the first step toward international standardization of the protocols used in the various layers. The model is called the ISO OSI (Open System Interconnection) Reference Model because it deals with connecting open systems—that is, systems that are open for communication with other systems.There are two end-to-end protocols in the transport layer, one of which is TCP (Transmission Control Protocol), another is UDP (User Datagram Protocol). TCP is a connection-oriented protocol that allows a byte stream originating on one machine to be delivered without error on any other machine in the internet.UDP is an unreliable, connectionless protocol for applications that do not want TCP ' s s of flow control and wish to provide their own.The network layer defines an official packet format and protocol called IP (Internet Protocol). The job of the network layer is to deliver IP packets where they are supposed to go.4.2The most widespread topology for LANs designed to function as data communication for theinterconnection of local computer-basedequipment is the star topology, in which the major equipments used to connect a variety of computer-based devices arehubs or switches. Typical LAN product of using the star topology is the most famous Ethernet, which dominates the LAN world toda.yThe 100Base-T Ethernet which is known as Fast Ethernet has the same topology as 10Base-T showing in Fig.4-3. Using this topology, we can build a fast Ethernet and need NICs of 100Mb/s and hub of 100Mb/s and don' t need cabling any more .Switches are basically multi-port bridges, but share some characteristics with routers.Like routers, switches work by dividing up the network into a number of segments, each of which can operate without interference from traffic local to any of the other segments.Switching is performed at layer 2 of the seven-layer model-the same as bridging. Since it is performed at layer 2, the MAC address is used, which is independent of protocol address. Like a bridge, a switch learns which address reside on each of its ports and then switches data appropriately. A switch can be designed using conventional microprocessors or dedicated ASIC (Application-Specific Integrated Circuit) technology.CHAPTER 55.1ARPAnet is abbreviated from “ AdvancedResearch Projects Agency Network ” .Landmark packet-switching network established in 1969. ARPAnet was developed in the 197s0 by BBN and funded by ARPA.It eventually evolved into the Internet. The term ARPAnet was officially retired in 1990.There are two kinds of E-mail protocol used in the Internet. One is Simple Mail Transfer Protocol (SMTP) which accepts incoming connections and copies messagesfrom them into the appropriate mailboxes . Another is Post Office Protocol-3 (POP3) which fetches E-mail from the remote mailbox and stores it on the user ' s local machine to be read later.Telnet is used for remote terminal connection, enabling usersto log in to remote systems and use resources as if they were connected to a local system.5.2Mobile Web use-or wireless Web, as it is frequently referred to-is one of the fastest growing Web applications today. Notebook and handheld devicesfrequently use attached or built-in modems to access the Internet; most mobile phones and pagers have Internet connectivity built in.Another type of dial-up connection is ADSL which is the most common way to access the Internet today. Sometimes ADSL is called as broadband accessing, because it provides more wide bandwidth than that the regular modem provides.Unlike satellite and fixed wireless connections, which use a cable to connect the modem to some type of fixed transceiver, mobile wireless connections allow the device to be moved from place to place. Consequently, most handheld PCs and othermobile devices (like Web-enable cell phones) use a mobile wireless connection and access the Internet through the same wireless network as cell phones and messaging devices.CHAPTER 66.1Until now there has always been a clear division between public and private networks. A public network,like the public telephone system and the Internet, is a large collection of unrelated peers that exchange information more or less freely with each other. The people with access to the public network may or may not have anything in common, and any given person on that network may only communicate with a small fraction of his potential users.Using the Internet for remote accesssaves a lot of money. You'll be able to dial in wherever your Internet service provider (ISP) has a point-of-presence (POP). If you choose an ISP with nationwide POPs, there's a good chance your LAN will be a local phone call away. Some ISPs have expanded internationally as well, or have alliances with ISPs overseas. Even many of the smaller ISPs have toll-free numbers for their roaming users. At the time of this writing, unlimited access dial-up PPP accounts, suitable for business use, are around $25 per month per user.At any rate, well-chosen ISP accounts should be cheaper than settingup a modem pool for remote users and paying thelong-distance bill for roaming users.Eventoll-free access from an ISP is typically cheaper than having your own toll-free number, because ISPs purchase hours in bulk from the long-distance companies.Using our previous example of the customer databasei,t 's easy to seehow a VPN could expand the Intranet application's functionality. Suppose most of your salespeople are on the road, or work from home. There's no reason why they shouldn't be able to use the Internet to access the Web server thahtouses the customer database application. oYu don't want just anyone to be able to access the information, however, and you're also worried about the information itself flowing unencrypted over the Internet. A VPN can provide a secure link between the salesperson's laptop and the Intranet web server running the database, and encrypt the data going between them. VPNsgive you flexibility, and allow practically any corporate network service to be used securely across the Internet.6.2For some time now, large business enterprises have used electronic commerce to conduct their business-to-businesstransactions. Electronic data interchange (EDI) on private networks began in the 1960s, and banks have been using dedicated networkfsor electronic funds transfer (EFT) almost aslong. Recently, however, with the increased awareness and popularity of the Internet, electronic commerce has come to encompass individual consumers as well as businesses of all sizes.To many, electronic commerce is defined as the buying and selling of products and services over the Internet, but there are many more aspects. From its inception, electronic commerce had included the handling of purchase transactions andfunds transfers over computernetworks. Its gr'own now to include the buying and selling of new commodities such as electronic information. And the opportunities for companies seeking to take advantage of thecapabilities of electronic commerce are greater than merely adopting our present view of commerce to performing those same transactions over electronic networks.Electronic commerce is a system that includes not only those transactions that center on buying and selling goods and servicesto directly generate revenue, but alsothose transactions that support revenue generation, such asgenerating demandfor those goods and services, offeringsales support and customer service (see Fig.6-1), or facilitating communications between business partners.。

计算机专业英语教程(第4版)译文8.1

计算机专业英语教程(第4版)译文8.1

计算机专业英语教程(第4版)译文8.1IntroductionMultimedia means, from the user’s perspective, that computer information can be represented through audio and/or video, in addition to text, image, graphics and animation .从用户的观点,多媒体技术意味着,计算机信息不仅可以通过文本、图象、图形和动画,还可以通过音频或者视频表现出来。

For example, using audio and video, a variety of dynamic situations in different areas, such as sport or ornithology lexicon, can often be presented better than just using text and image alone.例如,利用音频或者视频,许多不同领域的动态情形,例如运动场面、鸟类生活,能够比仅仅使用文本和图象更生动形象的表现出来。

The integration of these media into the computer provides additional possibilities for the use of computational power currently available (e.g., for interactive presentation of huge amounts of information ).多媒体与计算机的综合为计算机的普遍应用提供了额外的可行性(例如:大量信息的交互式表现)。

Furthermore, these data can be transmitted though computer andtelecommunication networks, which implies applications in the areas of information distribution and cooperative work.另外,这些数据可以通过意味着信息分工和合作工作。

计算机英语课文翻译

计算机英语课文翻译

第一单元课文A:计算机概览一、引言计算机是一种电子设备,它能接收一套指令或一个程序,然后通过对数值数据进行运算或者对其他形式的信息进行处理来执行该程序。

如果没有计算机的发展,现代的高科技世界是不可能产生的。

在整个社会,不同型号和不同大小的计算机被用于存储和处理各种数据,从政府保密文件、银行交易到私人家庭账目。

计算机通过自动化技术开辟了制造业的新纪元,而且它们也增强了现代通信系统的性能。

在几乎每一个研究和应用技术领域,从构建宇宙模型到产生明天的气象报告,计算机无不是必要的工具,并且它们的应用本身就开辟了人们推测的新领域。

数据库服务和计算机网络使各种各样的信息源可供使用。

同样的先进技术也使侵犯个人隐私和商业秘密成为可能。

计算机犯罪已经成为作为现代技术代价组成部分的许多风险之一。

二、历史第一台加法机,数字计算机的先驱,是1642年由法国科学家、数学家兼哲学家布莱斯•帕斯卡设计的。

这个装置使用了一系列有10个齿的轮子,每个齿代表从0到9的一个数字。

轮子互相连接,从而通过按照正确的齿数向前移动轮子,就可以将数字彼此相加。

在17世纪70年代,德国哲学家兼数学家戈特弗里德•威廉•莱布尼兹对这台机器进行了改良,设计了一台也能做乘法的机器。

法国发明家约瑟夫―玛丽•雅卡尔,在设计自动织机时,使用了穿孔的薄木板来控制复杂图案的编织。

在19世纪80年代期间,美国统计学家赫尔曼•何勒里斯,想出了使用类似雅卡尔的木板那样的穿孔卡片来处理数据的主义。

通过使用一种将穿孔卡片从电触点上移过的系统,他得以为1890年的美国人口普查汇编统计信息。

1、分析机也是在19世纪,英国数学家兼发明家查尔斯•巴比奇,提出了现代数字计算机的原理。

他构想出旨在处理复杂数学题的若干机器,如差分机。

许多历史学家认为巴比奇及其合伙人,数学家奥古斯塔•埃达•拜伦,是现代数字计算机的真正先驱。

巴比奇的设计之一,分析机,具有现代计算机的许多特征。

它有一个以一叠穿孔卡片的形式存在的输入流、一个储存数据的“仓库”、一个进行算术运算的“工厂”和一个产生永久纪录的打印机。

计算机英语第四版课文翻译

计算机英语第四版课文翻译

《计算机英语》参考译文第一单元:计算机与计算机科学课文A:计算机概览一、引言计算机是一种电子设备,它能接收一套指令或一个程序,然后通过对数字数据进行运算或对其他形式的信息进行处理来执行该程序。

要不是由于计算机的发展,现代的高科技世界是不可能产生的。

不同类型和大小的计算机在整个社会被用于存储和处理各种数据,从保密政府文件、银行交易到私人家庭账目。

计算机通过自动化技术开辟了制造业的新纪元,而且它们也增强了现代通信系统的性能。

在几乎每一个研究和应用技术领域,从构建宇宙模型到产生明天的气象报告,计算机都是必要的工具,并且它们的应用本身就开辟了人们推测的新领域。

数据库服务和计算机网络使各种各样的信息源可供使用。

同样的先进技术也使侵犯个人隐私和商业秘密成为可能。

计算机犯罪已经成为作为现代技术代价组成部分的许多风险之一。

二、历史第一台加法机是法国科学家、数学家和哲学家布莱斯?帕斯卡于1642年设计的,它是数字计算机的先驱。

这个装置使用了一系列带有10个齿的轮子,每个齿代表从0到9的一个数字。

轮子互相连接,从而通过按照正确的齿数向前转动轮子,就可以将数字彼此相加。

17世纪70年代,德国哲学家和数学家戈特弗里德?威廉?莱布尼兹对这台机器进行了改良,设计了一台也能做乘法的机器。

法国发明家约瑟夫―玛丽?雅卡尔,在设计自动织机时,使用了穿孔的薄木板来控制复杂图案的编织。

在19世纪80年代期间,美国统计学家赫尔曼?何勒里斯,想出了使用类似雅卡尔的木板那样的穿孔卡片来处理数据的主意。

通过使用一种将穿孔卡片从电触点上移过的系统,他得以为1890年的美国人口普查汇编统计信息。

1、分析机也是在19世纪,英国数学家和发明家查尔斯?巴比奇,提出了现代数字计算机的原理。

他构想出旨在处理复杂数学题的若干机器,如差分机。

许多历史学家认为,巴比奇及其合伙人,数学家奥古斯塔?埃达?拜伦,是现代数字计算机的真正先驱。

巴比奇的设计之一,分析机,具有现代计算机的许多特征。

《计算机专业英语(第4版)》Unit 1 Hardware Knowledge

《计算机专业英语(第4版)》Unit 1 Hardware Knowledge
• Gates did not have a definite study plan while a student at Harvard and spent a lot of time using the school's computers.
2023/12/28
计算机专业英语第4版
14
• Gates stepped down as chief executive officer of Microsoft in January 2000.
• He remained as chairman and created the position of chief software architect.
• In June 2006, Gates announced that he would be transitioning from full-time work at Microsoft to part-time work, and full-time work at the Bill & Melinda Gates Foundation.
four basic units of simplified computer: the input unit, central processing unit (CPU), memory unit, and output unit.
2023/12/28
计算机专业英语第4版
20
2023/12/28
2023/12/28
计算机专业英语第4版
19
1.2 Computer Development
1.2.1 Text A • The hardware of a digital computer system

计算机专业英语教程(第4版)译文6.2

计算机专业英语教程(第4版)译文6.2

计算机专业英语教程(第4版)译文6.2《计算机专业英语教程》(第4版)6.2 Carrier Frequencies and Multiplexing载波频率和多路复用@ Computer networks that use a modulated carrier wave to transmit data are similar to television stations that use a modulated carrier wave to broadcast video.modulated 已调制的使用调制载波发送数据的计算机网络和利用调制载波广播视频信息的电视台相类似。

The similarities provide the intuition needed to understand a fundamental principle:similarity 相似性intuition 直观这一相似性给理解下述基本原理提供了启示:Two or more signals that use different carrier frequencies can be transmitted over a single medium simultaneously without interference.signal 信号simultaneously 同时地interference 干扰两个或多个使用不同载波频率的信号可以在单一介质上同时传输而互不干扰。

@ To understand the principle, consider how television transmission works.为理解这一原理,考虑(有线)电视传输是如何工作的。

Each television station is assigned a channel number on which it broadcasts a signal.channel 频道每个电视台都分配一个频道号,它在该频道上广播信号。

计算机英语 刘艺 王春生 第4版

计算机英语 刘艺 王春生 第4版
最著名的互联网例子是因特网(Internet,注意大写的I)。因特网起源于20世纪 60年代初的研究项目。其目标是发展一种能力,将各种计算机网络连接起来,使它们能 够作为一个不会因局部灾难而瓦解的互联系统运行。 2/34
Introduction
shifted from...to...从...转为 shift from 从...去掉(移开)
一个人如果“站”在一个域的网关处“向外看”云,就会发现各种结构。的确,随着 各种域找到与云建立连接的点,因特网也以有点随意的方式发展着。然而,一种流行的结 10/34 构是,将若干域的网关连接在一起,形成一个由网关组成的区域网络。
Internet Architecture
For instance, a group of universities could choose to pool their resources to construct such a network. In turn, this regional network would be connected 轮流地、依次 to a more global network to which other regional networks attach. In this manner, that portion of the cloud takes on a hierarchical structure (Figure 9A-I).
Internet Architecture
Any message being transmitted to a destination within the domain is handled within the domain; any message being transmitted to a destination outside the domain is directed toward the gateway where it is sent out into the cloud.

计算机英语(课文内容翻译15分)

计算机英语(课文内容翻译15分)

计算机英语课文内容翻译(15分)CHAPTER 11.1We build computer to solve problems. Early computer solved mathematical and engineering problems , and later computers emphasized information processing for business applications. Today, computers also control machines as diverse as automobile engines, robots, and microwave ovens. A computer system solves a problem from any of these domains by accepting input, processing it, and producing output. Figure 1-1 illustrates the function of a computer system.Figure 1-2 shows these components in a block diagram. The lines between the blocks represent the flow of information flows from one component to another on the bus, which is simply a group of wires connecting the components. Processing occurs in the CPU and main memory. The organization in Figure 1-2, with the components connected to each other by the bus, is common. However, other configurations are possible as well.The classification just described is based on physical size as opposed to storage size. A computer system user is generally more concerned with storage size, because that is a more direct indication of the amount of useful work that the hardware can perform.Speed of computation is another characteristic that is important to the user. Generally speaking, users want a fast CPU and large amounts of storage, but a physically small machine for the I/O devices and main memory.1.2A processor is a functional unit that interprets and carries out instructions. Every processor comes with a unique set of oper ations such as ADD, STORE, or LOAD that represent the processor’s instruction set. Computer designers are fond of calling their computers machines, so the instruction set is sometimes referred to as machine instructions and the binary language in which they are written is called machine language! [1]You shouldn’t confuse the processor’s instruction set with the instructions found in high-level programming languages, such as BASIC or Pascal.The control unit is the functional unit that is responsible for supervising the operation of the entire computer system. In some ways, it is analogous to a telephone switch-board with intelligence because it makes the connections between various functional units of the computer system and calls into operation each unit that is required by the program currently in operationThe arithmetic and logic unit (ALU) is the functional unit that provides the computer with logical and computational capabilities. Data are brought into the ALU by the control unit, and the ALU performs whatever arithmetic or logic operations are required to help carry out the instruction1.3Below the L1 cache is the Level 2,or L2 cache. In today’s Pentium-class processors ,the L2 cache is usually on the processor chip itself .In fact ,If you could lift the lid of a Pentium or Athlon processor and look at the silicon die itself under a microscope you might be surprised to find that the biggest percentage of chip area was taken up by the cache memoriesBelow the L1 cache is the Level 2,or L2 cache. In today’s Pentium-class processors ,the L2 cache is usually on the processor chip itself .In fact ,If you could lift the lid of a Pentium or Athlon processor andlook at the silicon die itself under a microscope you might be surprised to find that the biggest percentage of chip area was taken up by the cache memories.[The virtual memory interface is shown in Fig.1-6. A real memory of 16M bytes and a virtual memory of 2G bytes are shown for illustration; many modern virtual memory systems are much larger than this. Virtual-memory space is divided into equal-sized groups called pages. A page in a modern computer is 1K, 2K, or 4K bytes. Real memory is also divided into the same equal-sized groups, called page frames. When information is moved between virtual-memory space and real-memory space, a complete page is moved.Section 3 discussed how virtual memory extends the address space of a processor. However, the latency of real memory is too long to support high-performance processors. Even with the high-speed DRAMs used today for real memory, something must be done to overcome this latency problem.CHAPTER 22.1Multiprogramming, which was developed to improve performance, also allows time sharing. Time shared operating systems allow many users (from one to several hundred) to use a computer system inter-leavingly at the same time. Other operating systems types include real time systems and multiprocessor systems.The management of resources in a computer system is another major concern of the operating system. Obviously, a program cannot use a device if that hardware is unavailable. As we have seen, the operational software oversees the execution of all programs. It also monitors the devices being used. To accomplish this, it establishes a table in which programs are matched against the devices they are using or will use .The operating system checks this table to approve or deny use of a specific device.In effect , the program undergoing execution signals the operating system that an I/O operation is desired, using a specific I/O device. The controlling software calls on the IOCS software to actually complete the I/O operation. Considering the level of I/O activity in most programs, the IOCS instructions are extremely vital.CHAPTER 33.1Selecting a PC for home or business use must begin with the all-important question “What do I want the system to do?”Once you’ve determined what tasks the system will be used for, you must choose among the software and hardware alternatives available. If you’re not really sure what you want a system to do, you should think twice about buying one. Computer systems that are configured to match the requirements of certain applications (such as preparing a novel) often perform poorly at others (playing power-hungry multimedia games, for example). You can easily make expensive mistakes if you’re uncertain about what you want a system to do.When you take possession of a new computer system, you should find that most of the hardware and software you need are already in place. You’ll need to connect the components and start the system up;then, you’ll be off and running. If your system does not include a piece of hardware or software that you want it to have, you can usually buy and install it yourself relatively easily.A final, but optional, step in setting up your new system is customizing the settings. Most PCs include options for background images, color schemes, themes, screen savers, screen resolution, the order of items on the menus, and so forth. In Windows, the desktop options are accessible through the Control Panel, as shown in Fig.3-1, You can also use the Control Panel to set up your network and Internet settings.3.2The Windows desktop appears on the screen after a computer using the Windows operating system has completed the boot process. The desktop is where documents, folders, programs, and other objects are displayed when they are being used, similar to the way documents and file folders are laid on a desk when they are being used. Thought the appearance of the Windows desktop can be customized, all desktops contain common elements, such as desktop icons, the taskbar, the Start button, windows, and task buttons (see Fig.3-2).The principle component of the GUI is the window. As mentioned earlier, a window is a rectangular area of information that is displayed on the screen. These windows can contain programs and documents, as well as menus, dialog boxes,icons, and a variety of other types of data.A menu is a set of options--usually text based—from which the user can choose to initiate a desiredaction in a program. At the top of many windows is a menu bar showing the main menu categories (see Fig.3-2). Pull-down menus (also called drop--down menus) display on the screen when the user selects an item on the menu bar. As shown on the right-most screen in Fig.3-2, in some Microsoft programs (such as Windows and some versions of Microsoft Office) a feature called personalized menus can be used.CHAPTER 44.1The OSI model is shown in Fig.4-1 (minus the physical medium). This model is based on a proposal developed by the International Standards Organization (ISO) as the first step toward international standardization of the protocols used in the various layers. The model is called the ISO OSI (Open System Interconnection) Reference Model because it deals with connecting open systems—that is, systems that are open for communication with other systems.There are two end-to-end protocols in the transport layer, one of which is TCP (Transmission Control Protocol), another is UDP (User Datagram Protocol). TCP is a connection-oriented protocol that allows a byte stream originating on one machine to be delivered without error on any other machine in the internet.UDP is an unreliable, conne ctionless protocol for applications that do not want TCP’s sequencing of flow control and wish to provide their own.The network layer defines an official packet format and protocol called IP (Internet Protocol). The job of the network layer is to deliver IP packets where they are supposed to go.4.2The most widespread topology for LANs designed to function as data communication for the interconnection of local computer-based equipment is the star topology, in which the major equipments used to connect a variety of computer-based devices are hubs or switches. Typical LAN product of using the star topology is the most famous Ethernet, which dominates the LAN world today.The 100Base-T Ethernet which is known as Fast Ethernet has the same topology as 10Base-T showing in Fig.4-3. Using this topology, we can build a fast Ethernet and need NICs of 100Mb/s and hub of 100Mb/s and don’t need cabling any more .Switches are basically multi-port bridges, but share some characteristics with routers. Like routers, switches work by dividing up the network into a number of segments, each of which can operate without interference from traffic local to any of the other segments. Switching is performed at layer 2 of the seven-layer model-the same as bridging. Since it is performed at layer 2, the MAC address is used, which is independent of protocol address. Like a bridge, a switch learns which address reside on each of its ports and then switches data appropriately. A switch can be designed using conventional microprocessors or dedicated ASIC (Application-Specific Integrated Circuit) technology.CHAPTER 55.1ARPAnet is abbreviated from “Advanced Research Projects Agency Network”. Landmark packet-switching network established in 1969. ARPAnet was developed in the 1970s by BBN and funded by ARPA.It eventually evolved into the Internet. The term ARPAnet was officially retired in 1990.There are two kinds of E-mail protocol used in the Internet. One is Simple Mail Transfer Protocol (SMTP) which accepts incoming connections and copies messages from them into the appropriate mailboxes . Another is Post Office Protocol-3 (POP3) which fetches E-mail from the remote mailbox and stores it on the user’s local machine to be read later.Telnet is used for remote terminal connection, enabling users to log in to remote systems and use resources as if they were connected to a local system.5.2Mobile Web use-or wireless Web, as it is frequently referred to-is one of the fastest growing Web applications today. Notebook and handheld devices frequently use attached or built-in modems to access the Internet; most mobile phones and pagers have Internet connectivity built in.Another type of dial-up connection is ADSL which is the most common way to access the Internet today. Sometimes ADSL is called as broadband accessing, because it provides more wide bandwidth than that the regular modem provides.Unlike satellite and fixed wireless connections, which use a cable to connect the modem to some type of fixed transceiver, mobile wireless connections allow the device to be moved from place to place. Consequently, most handheld PCs and other mobile devices (like Web-enable cell phones) use a mobile wireless connection and access the Internet through the same wireless network as cell phones and messaging devices.CHAPTER 66.1Until now there has always been a clear division between public and private networks. A public network, like the public telephone system and the Internet, is a large collection of unrelated peers that exchange information more or less freely with each other. The people with access to the public network may or may not have anything in common, and any given person on that network may only communicate with a small fraction of his potential users.Using the Internet for remote access saves a lot of money. You’ll be able to dial in wherever your Internet service provider (ISP) has a point-of-presence (POP). If you choose an ISP with nationwide POPs, there’s a good chance your LAN will be a local phone call away. Some ISPs have expanded internationally as well, or have alliances with ISPs overseas. Even many of the smaller ISPs have toll-free numbers for their roaming users. At the time of this writing, unlimited access dial-up PPP accounts, suitable for business use, are around $25 per month per user.At any rate, well-chosen ISP accounts should be cheaper than setting up a modem pool for remote users and paying the long-distance bill for roaming users.Even toll-free access from an ISP is typically cheaper than having your own toll-free number, because ISPs purchase hours in bulk from the long-distance companies.Using our previous example of the customer database, it’s easy to see how a VPN could expand the Intranet application’s functionality. Suppose most of your salespeople are on the road, or work from home. There’s no reason why they shouldn’t be able to use the Internet to access the Web server that houses the customer database application. You don’t want just anyone to be able to access the information, however, and you’re also worried about the information itself flowing unencrypted over the Internet. A VPN can provide a secure link between the salesperson’s laptop and the Intranet web server running the database, and encrypt the data going between them. VPNs give you flexibility, and allow practically any corporate network service to be used securely across the Internet.6.2For some time now, large business enterprises have used electronic commerce to conduct their business-to-business transactions. Electronic data interchange (EDI) on private networks began in the 1960s, and banks have been using dedicated networks for electronic funds transfer (EFT) almost as long. Recently, however, with the increased awareness and popularity of the Internet, electronic commerce has come to encompass individual consumers as well as businesses of all sizes.To many, electronic commerce is defined as the buying and selling of products and services over the Internet, but there are many more aspects. From its inception, electronic commerce had included the handling of purchase transactions and funds transfers over computer networks. It’s grown now to include the buying and selling of new commodities such as electronic information. And the opportunities for companies seeking to take advantage of the capabilities of electronic commerce are greater than merely adopting our present view of commerce to performing those same transactions over electronic networks.Electronic commerce is a system that includes not only those transactions that center on buying and selling goods and services to directly generate revenue, but also those transactions that support revenue generation, such as generating demand for those goods and services, offering sales support and customer service (see Fig.6-1), or facilitating communications between business partners.。

(完整版)计算机英语刘艺王春生第4版Unit11A

(完整版)计算机英语刘艺王春生第4版Unit11A
UNIT 11 Cyberculture (计算机文化)
Section A Using E-Mail
1
Cyberculture —Introduction
I. Introduction
E-mail is an electronic system for sending
and receiving messages and files over a
你已经创建和使用签名文件了吗? 你加入任何邮件讨论组(新闻组)了吗? 你知道什么是在邮件讨论组中争论吗? 你知道什么是垃圾邮件吗? 你知道什么是网规吗?
5
Cyberculture— Introduction
E-mail is a form of public communication — — Your readers can purposely or mistakenly send your e-mail messages to countless others. So, you should not say things with e-mail that you would not say openly to your supervisors, coworkers, or clients.
Cyberculture— Introduction
Yes No Score
Can you receive and send messages?
Yes Marks

Can you forward documents to others?
Expert 8-10
Can you receive and send attached documents?
computer network. Compared to the phone or
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

《计算机英语》参考译文第一单元:计算机与计算机科学课文A:计算机概览一、引言计算机是一种电子设备,它能接收一套指令或一个程序,然后通过对数字数据进行运算或对其他形式的信息进行处理来执行该程序。

要不是由于计算机的发展,现代的高科技世界是不可能产生的。

不同类型和大小的计算机在整个社会被用于存储和处理各种数据,从保密政府文件、银行交易到私人家庭账目。

计算机通过自动化技术开辟了制造业的新纪元,而且它们也增强了现代通信系统的性能。

在几乎每一个研究和应用技术领域,从构建宇宙模型到产生明天的气象报告,计算机都是必要的工具,并且它们的应用本身就开辟了人们推测的新领域。

数据库服务和计算机网络使各种各样的信息源可供使用。

同样的先进技术也使侵犯个人隐私和商业秘密成为可能。

计算机犯罪已经成为作为现代技术代价组成部分的许多风险之一。

二、历史第一台加法机是法国科学家、数学家和哲学家布莱斯?帕斯卡于1642年设计的,它是数字计算机的先驱。

这个装置使用了一系列带有10个齿的轮子,每个齿代表从0到9的一个数字。

轮子互相连接,从而通过按照正确的齿数向前转动轮子,就可以将数字彼此相加。

17世纪70年代,德国哲学家和数学家戈特弗里德?威廉?莱布尼兹对这台机器进行了改良,设计了一台也能做乘法的机器。

法国发明家约瑟夫―玛丽?雅卡尔,在设计自动织机时,使用了穿孔的薄木板来控制复杂图案的编织。

在19世纪80年代期间,美国统计学家赫尔曼?何勒里斯,想出了使用类似雅卡尔的木板那样的穿孔卡片来处理数据的主意。

通过使用一种将穿孔卡片从电触点上移过的系统,他得以为1890年的美国人口普查汇编统计信息。

1、分析机也是在19世纪,英国数学家和发明家查尔斯?巴比奇,提出了现代数字计算机的原理。

他构想出旨在处理复杂数学题的若干机器,如差分机。

许多历史学家认为,巴比奇及其合伙人,数学家奥古斯塔?埃达?拜伦,是现代数字计算机的真正先驱。

巴比奇的设计之一,分析机,具有现代计算机的许多特征。

它有一个以一叠穿孔卡片的形式存在的输入流、一个保存数据的“仓库”、一个进行算术运算的“工厂”和一个产生永久性纪录的打印机。

巴比奇未能将这个想法付诸实践,尽管在那个时代它在技术上很可能是可行的。

2、早期的计算机模拟计算机是19世纪末开始制造的。

早期型号是靠转动的轴和齿轮来进行计算的。

用任何其他方法都难以计算的方程近似数值,可以用这样的机器来求得。

开尔文勋爵制造了一台机械潮汐预报器,这实际上就是一台专用模拟计算机。

第一次和第二次世界大战期间,机械模拟计算系统,以及后来的电动模拟计算系统,在潜艇上被用作鱼雷航线预测器,在飞机上被用作轰炸瞄准具的控制器。

有人还设计了另一个系统,用于预测密西西比河流域春天的洪水。

3、电子计算机第二次世界大战期间,以伦敦北面的布莱切利公园为工作地点的一组科学家和数学家,制造了最早的全电子数字计算机之一:“巨人”。

到1943年12月,这个包含了1500个真空管的“巨人”开始运转了。

它被以艾伦?图灵为首的小组用于破译德国用恩尼格码加密的无线电报,他们的尝试大部分是成功的。

除此而外,在美国,约翰?阿塔纳索夫和克利福德?贝里早在1939年就在艾奥瓦州立学院制造了一台原型电子机。

这台原型机和后来的研究工作都是悄悄完成的,而且后来因1945年电子数字积分计算机(ENIAC)的研制而显得相形见绌。

ENIAC被授予了专利。

但是,数十年后,在1973年,当该机被揭露吸收了在阿塔纳索夫―贝里计算机中首次使用的原理后,这项专利被废除了。

图1 A - 1:E N IAC是最早的全电子数字计算机之一。

ENIAC(见图1A-1)含有18,000个真空管,具有每分钟几百次的乘法运算速度,但是,其程序最初是通过导线传送到处理器内的,必须由人工更改。

根据美籍匈牙利数学家约翰?冯?诺伊曼的想法,后来制造的机器带有一个程序存储器。

指令像数据一样存储在“存储器”中,使计算机在执行过程中摆脱了纸带阅读器的速度限制,并使问题在不给计算机重新接线的情况下得以解决。

20世纪50年代末,晶体管在计算机中的应用,标志着比在真空管机器情况下体积小、速度快、用途广的逻辑元件的出现。

由于晶体管使用的功率小得多,寿命也长得多,仅这项发展本身就导致了被称之为第二代计算机的改良机器的产生。

元件变小了,元件的间距也变小了,而且系统的制造成本也变得低得多。

4、集成电路20世纪60年代末,集成电路(见图1A-2)得到采用,从而有可能将许多晶体管制作在一块硅衬底上,晶体管之间用覆镀在适当位置的导线相连接。

集成电路导致价格、尺寸和故障率的进一步降低。

20世纪70年代中期,随着大规模集成电路和后来的超大规模集成电路(微芯片)的采用,成千上万个彼此相连的晶体管被蚀刻在一块硅衬底上,于是微处理器成为现实。

图1 A - 2:集成电路那么,再回过头来看看现代计算机处理开关值的能力:20世纪70年代的计算机一般一次能够处理8个开关值。

也就是说,在每个循环中,它们能处理8个二进制数字或位的数据。

8个位为一组,称为一个字节;每个字节包含256个开与关(或0与1)的可能模式。

每个模式相当于一条指令、一条指令的一部分或者一个特定的数据类型,如一个数字、一个字符或一个图形符号。

例如,11010010这个模式可能是二进制数据——在此情况下代表210这个十进制数字,或者它可能是一条指令,告诉计算机将存储在其交换设备中的数据与存储在存储芯片某个位置的数据进行比较。

一次能处理16、32和64位数据的处理器的研制,提高了计算机的速度。

一台计算机能够处理的全部可识别模式——操作总清单——称为其指令集。

随着现代数字计算机的不断发展,这两个因素——能够同时处理的位数和指令集的大小——在继续增长。

三、硬件不论尺寸大小,现代数字计算机在概念上都是类似的。

然而,根据成本与性能,它们可分为几类:个人计算机或微型计算机,一种成本较低的机器,通常只有桌面大小(尽管“膝上型计算机”小到能够放入公文包,而“掌上型计算机”能够放入口袋);工作站,一种具有增强型图形与通信能力、从而使其对于办公室工作特别有用的微型计算机;小型计算机,一般就个人使用而言太昂贵,其性能适合于工商企业、学校或实验室;以及大型机,一种大型的昂贵机器,具有满足大规模工商企业、政府部门、科研机构或者诸如此类机构需要的能力(其中体积最大、速度最快的称为巨型计算机)。

一台数字计算机不是单一的机器。

确切地说,它是由5个不同的要素组成的系统:(1)中央处理器;(2)输入设备;(3)存储设备;(4)输出设备;以及(5)被称作总线的通信网络,它将系统的所有要素连接起来并将系统与外界连接起来。

四、编程一个程序就是一系列指令,告诉计算机硬件对数据执行什么样的操作。

程序可以内嵌在硬件本身里,或以软件的形式独立存在。

在一些专门或“专用”计算机中,操作指令被嵌入其电路里;常见的例子有计算器、手表、汽车发动机和微波炉中的微型计算机。

另一方面,通用计算机尽管含有一些内置的程序(在只读存储器中)或者指令(在处理器芯片中),但依靠外部程序来执行有用的任务。

计算机一旦被编程,就只能做在任何特定时刻控制它的软件所允许它做的事情。

广泛使用的软件包括一系列各种各样的应用程序——告诉计算机如何执行各种任务的指令。

五、未来的发展计算机发展的一个持续不断的趋势是微小型化,亦即将越来越多的电路元件压缩在越来越小的芯片空间内的努力。

研究人员也在设法利用超导性来提高电路的功能速度。

超导性是在超低温条件下在某些材料中观察到的电阻减小现象。

计算机发展的另一个趋势是“第五代”计算机的研制工作,亦即研制可以解决复杂问题而且其解决方法用“创造性的”这个词来形容或许最终名副其实的计算机,理想的目标是真正的人工智能。

正在积极探索的一条道路是并行处理计算,亦即利用许多芯片来同时执行数个不同的任务。

一种重要的并行处理方法是模仿神经系统结构的神经网络。

另一个持续不断的趋势是计算机联网的增加。

计算机联网现在使用由卫星和电缆链路构成的世界范围的数据通信系统,来将全球的计算机连在一起。

此外,大量的研究工作还投入在探索“光”计算机的可能性上——这种硬件处理的不是电脉冲而是快得多的光脉冲。

第二单元:计算机体系结构课文A:计算机硬件一、引言计算机硬件是计算机运行所需要的设备,由可被物理操纵的部件组成。

这些部件的功能一般分为3个主要类别:输入、输出和存储。

这些类别的部件与微处理器相连接,特别是与计算机的中央处理器相连接。

中央处理器系电子线路,它通过称为总线的线路或电路来提供计算能力和对计算机进行控制。

另一方面,软件是计算机用来处理数据的一套指令,如文字处理程序或电子游戏。

这些程序通常被存储起来,并由计算机硬件调入和调出中央处理器。

软件也控制着硬件如何利用:例如,如何从存储设备中检索信息。

输入与输出硬件的交互是由基本输入/输出系统(BIOS)软件控制的。

尽管微处理器在技术上仍被认为是硬件,但其部分功能也与计算机软件有关系。

既然微处理器同时具有硬件与软件的特征,它们因此经常被称作固件。

二、输入硬件输入硬件由给计算机提供信息和指令的外部设备——亦即计算机中央处理器以外的部件——组成。

光笔是带有光敏端头的输入笔,用来在计算机显示屏上直接写画,或者通过按光笔上的夹子或用光笔接触屏幕来在屏幕上选择信息。

这种笔含有光传感器,用于识别笔所经过的屏幕部分。

鼠标是为一只手抓握而设计的指示设备。

它在底部有一个检测装置(通常是一个圆球),使用户能够通过在一个平面上移动鼠标来控制屏幕上指针或光标的运动。

该装置滑过平面时,光标随着在屏幕上移动。

要在屏幕上选择项目或命令,用户就点击鼠标上的按钮。

操纵杆是由一根杆子组成的指示设备,该杆以向多个方向移动来操纵计算机屏幕上的光标或者其他图形对象。

键盘是一个像打字机的设备,它使用户得以向计算机键入文本和命令。

有些键盘有特殊功能键或集成指示设备,如轨迹球或者可以让用户通过手指的移动来移动屏幕上光标的触敏区。

光扫描仪利用光感应设备将图片或文本等形式的图像转换成计算机能够处理的电子信号。

例如,一张照片可以扫入一台计算机,然后包括在该计算机创建的文本文件中。

两种最常见的扫描仪类型是平板扫描仪和手持式扫描仪,前者类似一台办公室用复印机,后者用手动的方式从要处理的图像上扫过。

麦克风是将声音转换成可被计算机存储、处理和回放的信号的设备。

语音识别模块是将话语转换成计算机能够识别和处理的信息的设备。

调制解调器代表调制器―解调器,是将计算机与电话线连接、允许信息传送给或接收自另一台计算机的设备。

每台发送或接收信息的计算机都必须与调制解调器相连接。

一台计算机发送的信息由调制解调器转换成音频信号,然后通过电话线传送到接收端调制解调器,由其将信号转换成接收端计算机能够理解的信息。

相关文档
最新文档