计算机专业英语教程(第4版)译文6.2
计算机专业英语的第四版课后习题翻译讲课教案
![计算机专业英语的第四版课后习题翻译讲课教案](https://img.taocdn.com/s3/m/227e4f8c0c22590102029dcb.png)
中译英参考答案Unit 1A computer system consists of hardware system and software system. The hardware of the computer is usually divided into three major parts or three primary subsystems: the CPU, the memory subsystem, and the I/O subsystem.The CPU performs many operations and controls computer. The memory subsystem is used to store program being executed by the CPU, along with the program’s data. The I/O subsystem allows the CPU to interact with input and output devices such as the keyboard and monitor of a personal computer. The components of the computer are connected to the buses.The part of the computer that performs the bulk of data processing operations is called the central processing unit and is referred to as the CPU. In microcomputer, it is often called the microprocessor. The CPU is made up of three major parts: control unit, ALU, and register set.Memory is also known as internal memory or main memory. It refers to the circuits in the computer that hold whatever programs and data are available for immediate use by the CPU.I/O subsystem includes I/O devices and interface. There are a wide variety of I/O devices, such as mouse, printer, sensor, disk, and so on. Input-output interface provides a method for transferring information between internal storage and external I/O devices. Peripherals connected to a computer need special communication links for interfacing them with the CPU. The purpose of the communication link is to resolve the differences that exist between the central computer and each peripheral.Unit 2Storage hardware provides permanent storage of information and programs for retrieval by the computer. Hard disk drives store information in magnetic particles embedded in a disk. Usually a permanent part of the computer, hard disk drives can store large amounts of information and retrieve that information very quickly.Although fixed hard drive systems offer faster access and have a higher storage capacity than optical discs, optical disc systems use removable media –a distinct benefit. Optical discs –primary CDs and DVDs – are much more widely used than removable hard drive systems. They are the standard today for software delivery, as well as commonly used for storing high-capacity music and video files. There are also versions of both CD and DVD drives available for home audio and home theater use. Optical discs are commonly referred to as compact discs.CD and DVD discs are read by CD and DVD drives. The speed of a CD or DVD drive is rated as 24x, 32x, 36x, and so on. These labels describe how fast the drive is compared to the first version of that drive. For example, a 36x drive is 36 times the speed of the baseline unit that was originally manufactured. Most optical discs have a title and other text printed only on one side and they are inserted into the drive with the printed side facing up. When inserting such a CD or DVD, be careful not to get dirt, fingerprints, scratches, or anything else that might hinder light reflectivity on the disc’s surface.Unit 3(a) A program is a list of instructions or statements for directing the computer to perform arequired data processing task. Programming is a multistep process for creating that list of instructions.(b) It is important to understand the difference between a class and an object of that class. A class is simply a specification for creating objects. Thus, a single class may create multiple objects.(c) Java is an object-oriented, network-friendly high-lever programming language that allows programmers to build applications that can run on almost any operating system.(d) ActiveX is a set of controls, or reusable components that enables programs or content of almost any type to be embedded within a Web page. Whereas a Java must be downloaded each time you visit a Web site, with ActiveX the component is downloaded only once, then stored on your hard disk for later, repeated use.(e) Programming involves a great deal of creativity. The design is guide to the function or purpose of each component, but the programmer has great flexibility in implementing the design as code. No matter what language is used, each program component involves at least three major aspects: control structures, algorithms, and data structures.Unit 4The software system can be divided into two broad categories: application software and system software. Application software consists of the program for performing tasks particular to the machine’s utilization. In contrast to application software, system software comprises a large number of programs. These programs start up the computer and function as the principle coordinator of all hardware components and application software. Without system software loaded into RAM of your computer, your hardware and application software are useless.System software can be grouped into three basic parts: operating system, utility software, and language translators. The majority of an installation’s utility software consists of programs for performing activities that are fundamental to computer installations yet not included in the operating system. In a sense, utility software consists of software units that extend the capabilities of the operating system.A computer’s OS is the main collection of programs that manage its activities. The primary chores of an OS are management and control. The OS ensures that all actions requested by a user are valid and processed in an orderly fashion. It also manages the computer system’s resources to perform these operations with efficiency and consistency.Application software is the software designed to help you solve problems specific to business or perform specific business tasks. Application software then is the layer of software closest to you. Basically, there are four categories of application software: productivity software, business and specialty software, entertainment software and education/reference software.Unit 5A computer network is often classified as being either a local area network (LAN), a metropolitan area network (WAN), or a wide area network (WAN). The connection of two or more networks is called an internetwork. The worldwide Internet is a well-known example of an internetwork.LANs are privately owned networks within a single building or campus of up to a few kilometers in size. They are widely used to connect personal computers and workstations incompany offices and factories to share resources and exchange information.In general, a given LAN will use only one type of transmission medium. Various topologies are possible for LANs. The most common LAN topologies are bus, ring and star.A MAN is basically a bigger version of a LAN and normally uses similar technology. MAN is designed to extend over an entire city. It may be a single network such as a cable television network, or it may be a means of connecting a number of LANs into a large network so that resources may be shared LAN-to-LAN as well as device-to-device. For example, a company can use a MAN to connect the LANs in all of its offices throughout a city.A W AN spans a large geographical area that may comprise a country, a continent, or even the world. It provides long-distance transmission of data, voice, image, and video information over large geographical area.In contrast to LANs, W ANs may utilize public leased, or private communication devices, usually in combinations, and can therefore span an unlimited number of miles.Unit 6Transmission media are used to transfer messages over a network. For instance, the transmission media used in a network may be a privately owned set of cables, the public phone lines, or a satellite system. Transmission media can either be wired or wireless.The three types of wired media most commonly used to carry messages are twisted-pair wire, coaxial cable, and fiber-optic cable. One of the most successful developments in transmission media in recent years has been fiber optics. Fiber-optic cable is commonly used for the high-speed backbone lines of a network, or for Internet infrastructure.Wireless transmission media have become especially popular in recent years. They support communications in situations in which physical wiring is impractical or inconvenient, as well as facilitate mobility. Wireless media are commonly used to connect devices to a network, to share information between computers, to connect wireless mice to a computer, and for handheld PCs, wireless phones, and other mobile devices. Radio signals transferred through the air are the heart of most types of wireless media. In addition to conventional broadcast radio application, the microwave, cellular, and satellite transmission media also use radio signals to transmit data.Radio transmissions require the use of a transmitter to send the radio signals through the air.A receiver (usually containing some type of antenna) accepts the date at the other end. When a device functions as both a receiver and transmitter, it is commonly called a transceiver or transmitter-receiver.Unit 7(a) Since many database systems users are not computer trained, developers hide the complexity from users through several levels of abstraction, to simplify user’s interactions with the system: physical level, logical level, and view level.(b) A database schema is specified by a set of definitions expressed by a special language called a data-definition language (DDL). The result of compilation of DDL statements is a set of tables that is stored in a special file called data dictionary, or data directory.(c) The structured query language (SQL) is the most widely used and standard query language for relational database management systems. It is a kind of non-procedural language.(d) An entity is a “thing”or “object”in the real world that is distinguishable from otherobjects. For example, each person is an entity, and bank accounts can be considered to be entities. Entities are described in a database by a set of attributes.(e) Data warehouse is one of the newest and hottest buzzwords and concepts in the IT field and the business environment. A data warehouse is a logical collection of information——gathered from many different operational databases——that supports business analysis activities and decision-making tasks.Unit 8Animation is the term used to describe a series of graphical images that are displayed one after the other to simulate movement. Cartoons on television are one example of animation.Video differs from animation in that it usually begins as a continuous stream of visual information that is broken into separate images or frames when the video is recorded. When the frames are projected—typically at a rate of 30 frames per second—the effect is a smooth reconstruction of the original continuous stream of information. As you might imagine, at 30 frames per second, the amount of data involved in displaying a video during a multimedia presentation can require a substantial amount of storage space. Consequently, video data—like audio data—is often compressed. A variety of compression standards exist. Some of the most common video file formats are .avi, .mpeg, .mov, .rm.For multimedia presentation, video may be recorded using a standard (analog) video camera and then converted to digital form as it is input into a computer. Alternatively, the film can be recording digitally using a digital video camera. Streaming video is frequently used on Web pages to reduce file size. Similar to streaming audio, Streaming video files can begin playing once a portion of the video has been downloaded.Unit 9(a) AI is currently being applied in business in the form of knowledge systems, which use human knowledge to solve problems. The most popular type of knowledge-based system is the expert system. An expert system is a computer program that attempts to represent the knowledge of human experts in the form of heuristics. The term heuristic is derived from the same Greek root as the word eureka, which means “to discover”.(b) The user interface enables the manager to enter instructions and information into the expert system and to receive information from it. The instructions specify the parameters that guide the expert system through its reasoning processing. The information is in the form of values assigned to certain variables.(c) The knowledge base contains both facts that describe the problem area and knowledge representation techniques that describe how the facts fit together in a logical manner. The term problem domain is used to describe the problem area.(d) An expert system, also called a knowledge-based system, is an artificial intelligence system that applies reasoning capabilities to reach a conclusion. Expert systems are excellent for diagnostic and prescriptive problems.(e) The DSS is not intended to replace the manager. The computer can be applied to the structured portion of the problem, but the manager is responsible for the unstructured portion——applying judgment or intuition and conducting analyses.Unit 10The linked list (see figure 1) consists of a series of nodes, which are not necessarily adjacent in memory. Each node contains the element and a link to a node containing its successor. We call this the next link. The last cell’s next link references null.To execute printList or find(x) we merely start at the first node in the list and then traverse the list by following the next links. This operation is clearly linear-time, as in the array implementation, although the constant is likely to be larger than if an array implementation were used. The findKth operation is no longer quite as efficient as an array implementation; findKth(i) takes O(i) time and works by traversing down the list in the obvious manner. In practice, this bound is pessimistic, because frequently the calls to findKth are in sorted order (by i). As an example, findKth(2), findKth(3), findKth(4), and findKth(6) can all be executed in one scan down the list.The remove method can be executed in one next reference change. Figure 2 shows the result of deleting the second element in the original list.The insert method requires obtaining a new node from the system by using a new call and then executing two reference maneuvers. The general idea is shown in figure 3. The dashed line represents the old next reference.figure 1figure 2figure 3Unit 11(a) A set is pure if all of its members are sets, all members of its members are sets, and so on. For example, the set containing only the empty set is a nonempty pure set.(b) A language is a describable set of finite strings, drawn from a fixed alphabet. A grammar is one way to "describe" the language. The grammar consists of a finite list of rules, where each rule replaces one substring with another. The string on the left must contain at least one nonterminal. The first string "produces" or "generates" the second. Thus a rule is also called a production.(c) A finite-state machine (FSM) or finite-state automaton(FA)is a mathematical abstraction sometimes used to design digital logic or computer programs. It is a behavior model composed of a finite number of states, transitions between those states, and actions, similar to a flow graph in which one can inspect the way logic runs when certain conditions are met.(d) Sometimes it is inconvenient or impossible to describe a set by listing all of its elements. Another useful way to define a set is by specifying a property that the elements of the set have in common. The notation P(x) is used to denote a sentence or statement P concerning the variable object x. The set defined by P(x) written {x | P(x)}, is just a collection of all the objects for whichP is true.Unit 12(a) Because drawings are typically displayed in 3D, CAD is especially helpful in designing automobiles, aircraft, ships, buildings, electrical circuits (including computer chips), and even clothing.(b) Computer-integrated manufacturing (CIM) is the manufacturing approach of using computers to control the entire production process. This integration allows individual processes to exchange information with each other and initiate actions. Through the integration of computers, manufacturing can be faster and less error-prone, although the main advantage is the ability to create automated manufacturing processes.(c) In addition to supporting decision making, coordination, and control, information system may also help managers and workers analyze problems, visualize complex subjects, and create new products.(d) Knowing the history and evolution of ERP is essential to understanding its current application and its future developments.(e) In addition to monitoring operational activities such as tracking the status of orders and inventory levels, enterprise system also improve organization-wide reporting and decision making.Unit 13(a) There are a wide variety of educational application programs available. Educational software is designed to teach one or more skills, such as reading, math, spelling, a foreign language, world geography, or to help prepare for standardized tests.(b) Electronic business (e-business) is the use of information technology and electronic communication networks to exchange business information and conduct transactions in electronic, paperless form.(c) Word processing software allows you to use computers to create, edit, store, and print documents. You can easily insert, delete, and move words, sentences, and paragraphs——without ever using an eraser.(d) What is a spreadsheet? Spreadsheet software takes its name from the accountant’s columnar worksheet, which it imitates. A spreadsheet is a worksheet consisting of a collection of cells formed by the intersection of rows and columns. Each cell can store one piece of information: a number, word or phrase, or formula.Unit 14(a) A geographic information system (GIS) is a system that captures, stores, analyzes, manages and presents data with reference to geographic location data. In the simplest terms, GIS is the merging of cartography, statistical analysis and database technology.(b) The GPS receiver uses the messages it receives to determine the transit time of each message and computes the distance to each satellite. These distances along with the satellites' locations are used to compute the position of the receiver. This position is then displayed, perhaps with a moving map display or latitude and longitude; elevation information may be included.(c) Virtual reality (VR) is a term that applies to computer-simulated environments that can simulate physical presence in the real world. Most current virtual reality environments areprimarily visual experiences, displayed either on a computer screen or through special stereoscopic displays, but some simulations include additional sensory information, such as sound through speakers or headphones.Unit 15(a) The software development process is sometimes called the software development life cycle (SDLC), because it describes the life of a software product from its conception to its implementation, delivery, use, and maintenance.(b) How can the CMM help your organization? There are three key roles the CMM plays. First, the CMM helps build an understanding of software process by describing the practices that contribute to a level of process maturity. The second role of the CMM is to provide a consistent basis for conducting appraisals of software processes. The CMM’s third key role is to serve as a blueprint for software process improvement.(c) The UML offers a standard way to write a system’s blueprints, including conceptual things such as business processes and system functions as well as concrete things such as programming language statements, database schemas, and reusable software components. The UML represents a collection of the best engineering practices that have proven successful in the modeling of large and complex systems.(d) Object modeling is a technique for identifying objects within the system environment and the relationships between those objects. The object-oriented approach to system development is based on several concepts, such as object, attribute, behavior, encapsulation, class, inheritance, polymorphism, persistence, etc.Unit 16“Security” is an all-encompassing term that describes all the concepts, techniques, and technologies to protect information from unauthorized access. There are several requirements for information security.Confidentiality: hiding data, usually with encryption, to prevent unauthorized viewing and access.Authenticity: the ability to know that the person or system you are communicating with is who or what you think it is.Access control: once a person or system has been authenticated, their ability to access data and use systems is determined by access controls.Data integrity: providing assurance that an information system or data is genuine.Availability: making sure that information is available to users in a secure way.To prevent unauthorized access, some type of identification procedure must be used. These vary from passwords to physical access object (access cards, etc.) to biometric devices that verify some type of personal characteristic, such as a fingerprint.Some of the most secure access control systems address both identification and authentication. Identification involves verifying that the person’s name or other identifying feature is listed as an authorized user; authentication refers to determining whether or not the person is actually who he or she claims to be.Unit 17A distributed system is a collection of independent computers which appear to the users of system as a single computer. Nearly all large software systems are distributed. For example, enterprise-wide business systems must support multiple users running common applications across different sites.A distributed system encompasses a variety of applications, their underlying support software, the hardware they run on, and the communication links connecting the distributed hardware. The largest and best-known distributed system is the set of computers, software, and services comprising the World Wide Web, which is so pervasive that it coexists with and connects to most other existing distributed systems. The most common distributed systems are networked client/server systems. Distributed systems share the general properties described below.●Multiple nodes●Message passing or communication●Resource sharing●Decentralized control●Concurrency or parallelism●Fault tolerance●Heterogeneity●OpennessDistributed systems have many inherent advantages, especially over centralized systems. Some applications are inherent distributed as well. In general, distributed systems:●Yield higher performance●Allow incremental growth●Allow one user to run a program on many different machines in parallel●Provide higher reliability。
计算机英语第四版
![计算机英语第四版](https://img.taocdn.com/s3/m/e2009f0e0622192e453610661ed9ad51f01d5411.png)
计算机英语第四版推荐文章解释计算机应用的学习英语热度:解释计算机Windows的学习英语热度:表达数据终端计算机的学习英语热度:描述计算机因特网的学习英语热度: Oracle的数据库管理功能的学习英语热度:下面是店铺整理的计算机英语第四版,希望对大家有帮助。
基本信息版次:1页数:366字数:569000印刷时间:2009-7-1开本:16开纸张:胶版纸印次:1包装:平装丛书名:国际标准书号ISBN:9787302200635内容推荐本书是用英文编写的、按计算机知识结构的层次组成的计算机技术教材,书中内容涉及计算机的技术基础、系统和应用等各个方面,其中包括反映当前最新技术和应用的内容。
本书由4部分组成:计算机和网络基础、因特网及其应用、程序设计和计算机应用。
全书共13章,68节。
书中对一些较难翻译和理解的句子和词语进行了注释;每一节后面列出了关键词汇,给出了练习题,以提高读者阅读计算机英文资料和文献的水平。
书后附有参考译文,供读者学习时参考。
本书可供大专院校学生使用,也可供参加计算机水平考试的考生和广大工程技术人员参考。
目录第一部分计算机和网络基础第1章计算机硬件1.1 计算机组成1.2 什么是处理器?1.3 存储系统1.4 输入输出(I/O)系统1.5 总线和控制器1.6 什么是真正的通用串行总线? 1.7 精简指令系统计算机(RISC)1.8 计算机性能的量度第2章计算机操作系统2.1 操作系统概述2.2 WINDOWS XP和VISTA2.3 UNIX和LINUX2.4 中间件2.5 操作系统内核功能的高速缓存模型第3章个人计算机(PC)的使用3.1 选择和设置PC系统3.2 使用PC3.3 PC系统维护3.4 PC升级第4章计算机网络4.1 计算机网络的体系结构4.2 局域网(LAN)4.3 广域网(WAN)4.4 WINDOWS SERVER 20084.5 关于网络会聚第二部分因特网及其应用第5章因特网5.1 因特网概述5.2 与因特网连接5.3 万维网浏览器和服务器5.4 关于INTERNET25.5 网络安全第6章因特网应用6.1 虚拟专用网()6.2 电子商务6.3 商业网络技术6.4 什么是企业资源计划ERP?6.5 关于因特网电话6.6 万维网和万维网应用的革命6.7 关于AJAX第三部分程序设计第7章程序设计语言7.1 计算机语言概述7.2 流程图7.3 BASIC和可视BASIC7.4 C、C++和C#7.5 标记和脚本语言7.6 关于开源第8章软件工程8.1 软件开发生命周期模型8.2 需求分析8.3 软件设计和测试8.4 软件质量保证8.5 软件维护第9章数据库及其应用9.1 数据库管理系统(DBMS)和管理信息系统(MIS) 9.2 数据库是如何工作的?9.3 SQL SERVER9.4 数据仓库9.5 数据挖掘9.6 万维网(WEB)与数据库第四部分计算机应用第10章办公自动化软件10.1 办公自动化软件基本知识……第11章计算机图形学与图像处理技术第12章多媒体第13章现代工业自动化软件。
计算机专业英语教程(第四版)习题答案
![计算机专业英语教程(第四版)习题答案](https://img.taocdn.com/s3/m/8df8df3111a6f524ccbff121dd36a32d7375c76d.png)
计算机专业英语教程(第四版)习题答案计算机专业英语教程(第四版)习题答案计算机专业英语(第四版)课后习题答案Unit 1 [Ex 1] Fb5E2RGbCAP [Ex 2] 1. input, storage, processing, and output 2. power; speed; 1. F 2. T 3. T 4. F 5. T 6. T 7. T 8. T 9. T 10.memoryp1EanqFDPw 3. central processing unit memoryDXDiTa9E3d 5. keyboard; [Ex 3] B. A. central processing unit; 1. F 2. D 2. monitor 3. G 4. C 5. B main memory; 6. A 7. E monitorRTCrpUDGiT 8. H5PCzVD7HxA 4. internal; primary;1. user3. data4. keyboard5. data processingjLBHrnAILg6. information [Ex 4] instructions7. computer8. memory 3. manipulates 4.1. input device2. screen, screen 5. retrievexHAQX74J0X 8. Function6. code7. hard copy[Ex. 5] 新处理器开始IT 技术的新时代New Processors Open New Era of IT Technologies Last week, Intel introduced to the public in Russia and other CIS countries a family of processors Intel Xeon E5-2600. They are more powerful and reliable and, importantly, are very economical in terms of energy consumption. Their1 / 30presence opens a new era in the field of IT technologies and means that the cloud technology is getting closer.LDAYtRyKfEThese processors are primarily designed for servers, data centers (DPC) and supercomputers. The emergence of this class of devices is not accidental. According to the regional director of Intel in Russia and other CIS states Dmitri Konash who spoke at the event, the market of IT-technology is developing so rapidly that, according to forecasts, by 2015 there will be 15 billion devices connected to the Internet, and over 3 billion of active users.Zzz6ZB2Ltk 上周,英特尔公司向俄罗斯和其它独联体国家的公众推出了英特尔Xeon E5-2600 系列处理器,它们更加强大可靠,尤其是在能量消耗方面更加经济实惠。
计算机专业英语(第四版)
![计算机专业英语(第四版)](https://img.taocdn.com/s3/m/52909157a9956bec0975f46527d3240c8447a12e.png)
AA data wareho use is becoming more of a necess ity than an access ory for a progre ssive, competitive, and focuse d organizatio n.数据仓库对于不断进取的,具有竞争力的,成为关注焦点的组织来说不是一个附属品,而是不可缺少的。
A growin g number of Web sitesincorp orate multim edia, as do comput er softwa re and consum er interf aces,such as ATM machin es and inform ation kiosks,(像自动取款机和信息亭那样的越来越多的Web站点配备了多媒体(如计算机多媒体软件,客户接口也配备了多媒体)A necess ary featur e of a DTP packag e, theref ore, is a zoom facili ty whichdispla ys a portio n of the docume nt at a larger size than normal so as to displa y it at someth ing much closer to the resolu tionof the finalprinte d produc t(因此,DTP软件包的一个必备特征就是有缩放工具,它可以用比正常情况更大的尺寸显示文件的某一部分,从而以更接近最终印刷结果的分辨率来显示这些内容)A newerscript ing langua ge increasingly more popula r is PHP and ASP.而更通用的,比较新的脚本语言是PH P 和ASP。
计算机专业英语教程 第四版 部分专业单词缩写对照
![计算机专业英语教程 第四版 部分专业单词缩写对照](https://img.taocdn.com/s3/m/53a3f9c18bd63186bcebbc6e.png)
CPU 中央处理机DRAM 动态随机存取存储器SRAM 静态随机存取存储器VDT 视频显示终端RAM 随机存取存储器ROM 只读存储器EPROM 可擦可编程只读存储器EEPROM 电可擦可编程只读存储器PCI 外设部件互连VoIP IP电话,网络电话SSI 小规模集成电路LSI 大规模集成电路VLSI 超大规模集成电路CISC 复杂指令集计算机RISC 精简指令集计算机HLL 高级语言IC 集成电路SISD 单指令流单数据流MISD 多指令流单数据流SM 共享存储器SN 无共享SMP 对称多处理MPP 大规模并行处理SIMD 单指令单数据流MIMD 多指令多数据流SPMD 单程序多数据CD 光盘,紧密盘WORM 一次写多次读GB 千兆字节VHS 家用录像系统WWW 环球网,万维网CRT 阴极射线管ESDI 增强型小设备接口USB 通用串行总线VCR 录像机HTML 超文本置标语言XHTML 可扩展超文本置标语言CSS 层叠样式表CGA 彩色图形适配器EGA 增强型图形适配器VGA 视频图形阵列IDE 集成开发环境VM 虚拟机JIT 即时编译程序N.W. 净重G.W. 总重CATV 有线电视RTOS 实时操作系统LAN 局域网WAN 广域网TCP/IP 传输控制协议/互联网协议FTP 文件传输协议DNS 域名系统HTTP 超文本传输协议URL 统一资源定位器ISP Internet服务提供商ISDN 综合服务数字网DSL 数字用户线路XML 可扩展置标语言DTD 文档类型定义XSL 可扩展样式单语言RDF 资源描述格式DOM 文档对象模型SGML 标准通用置标语言URI 统一资源标识符OSI model 开放系统互连模式HDLC 高层数据链路通信PDA 个人数字助理WML 无线置标语言RSS RDF站点摘要PSTN 公用电话交换网RF 射频WDM 波分多路复用DWDM 密集波分多路复用FM 调频SDH 同步数字分层XON/XOFF (传输开)始/停MAC 媒体访问控制BSS 基本服务组(集)DS 分布系统PAN 个人网MAN 城域网DBMS 数据库管理系统SQL 解构式询问语言ANSI 美国国家标准协会DOS 磁盘操作系统CAD 计算机辅助设计CAM 计算机辅助制造CASE 计算机辅助软件工程GIS 地理信息系统OODBMS 面向对象的DBMS CIM 计算机集成制造DIS 数据解释系统ODBC 开放数据库互连API 应用程序设计接口UDA 通用数据访问MDAC 微软数据访问组件ADO ActiveX数据对象OEL DB 对象链接和潜入数据库DAO 数据访问对象RDO 远程数据对象ISAM 索引顺序访问方法MFC 微软公司基础类(库)CLI 调用级接口ISO 国际标准化组织IEC国际电气技术委员会UDF 用户定义格式GHz 千兆赫兹THz 兆兆赫兹ADT模/数转化器DAT 数/模转换器PCM 脉码调制。
计算机专业英语教程 第四版 部分翻译和简答题
![计算机专业英语教程 第四版 部分翻译和简答题](https://img.taocdn.com/s3/m/6000534369eae009581bec14.png)
翻译:1、C++’s advantages include strong typing, operator overloading, and less emphasis on the preprocessor.C++的优点包括强类型,运算符重载和较少地强调预处理器。
2、A program instruction or a piece of data is stored in a specific primary storage location called an address.程序指令和数据是存储在主存中一个特殊的位置,称为地址空间3、A high-level language is an artificial language with which we can write various instructions. This is possible not because computer processors are now so technologically advanced that they can ‘understand’ these langu ages. You should translate from programming languages into machine language which can be understood by the computer processors. Compilers can accomplish this task. This does mean that a high-level language program is not directly executable: it must be compiled to produce processor program, which is executable.高级语言是一门人工的我们可以写入各种各样指令的语言。
计算机专业英语教程(第4版)译文8.1
![计算机专业英语教程(第4版)译文8.1](https://img.taocdn.com/s3/m/24fb8ffec281e53a5902ff8b.png)
计算机专业英语教程(第4版)译文8.1IntroductionMultimedia means, from the user’s perspective, that computer information can be represented through audio and/or video, in addition to text, image, graphics and animation .从用户的观点,多媒体技术意味着,计算机信息不仅可以通过文本、图象、图形和动画,还可以通过音频或者视频表现出来。
For example, using audio and video, a variety of dynamic situations in different areas, such as sport or ornithology lexicon, can often be presented better than just using text and image alone.例如,利用音频或者视频,许多不同领域的动态情形,例如运动场面、鸟类生活,能够比仅仅使用文本和图象更生动形象的表现出来。
The integration of these media into the computer provides additional possibilities for the use of computational power currently available (e.g., for interactive presentation of huge amounts of information ).多媒体与计算机的综合为计算机的普遍应用提供了额外的可行性(例如:大量信息的交互式表现)。
Furthermore, these data can be transmitted though computer andtelecommunication networks, which implies applications in the areas of information distribution and cooperative work.另外,这些数据可以通过意味着信息分工和合作工作。
计算机英语(第4版) 刘艺 课文参考译文
![计算机英语(第4版) 刘艺 课文参考译文](https://img.taocdn.com/s3/m/59b282350912a216147929e7.png)
《计算机英语(第4版)》参考译文第一单元:计算机与计算机科学课文A:计算机概览一、引言计算机是一种电子设备,它能接收一套指令或一个程序,然后通过对数字数据进行运算或对其他形式的信息进行处理来执行该程序。
要不是由于计算机的发展,现代的高科技世界是不可能产生的。
不同类型和大小的计算机在整个社会被用于存储和处理各种数据,从保密政府文件、银行交易到私人家庭账目。
计算机通过自动化技术开辟了制造业的新纪元,而且它们也增强了现代通信系统的性能。
在几乎每一个研究和应用技术领域,从构建宇宙模型到产生明天的气象报告,计算机都是必要的工具,并且它们的应用本身就开辟了人们推测的新领域。
数据库服务和计算机网络使各种各样的信息源可供使用。
同样的先进技术也使侵犯个人隐私和商业秘密成为可能。
计算机犯罪已经成为作为现代技术代价组成部分的许多风险之一。
二、历史第一台加法机是法国科学家、数学家和哲学家布莱斯•帕斯卡于1642年设计的,它是数字计算机的先驱。
这个装置使用了一系列带有10个齿的轮子,每个齿代表从0到9的一个数字。
轮子互相连接,从而通过按照正确的齿数向前转动轮子,就可以将数字彼此相加。
17世纪70年代,德国哲学家和数学家戈特弗里德•威廉•莱布尼兹对这台机器进行了改良,设计了一台也能做乘法的机器。
法国发明家约瑟夫―玛丽•雅卡尔,在设计自动织机时,使用了穿孔的薄木板来控制复杂图案的编织。
在19世纪80年代期间,美国统计学家赫尔曼•何勒里斯,想出了使用类似雅卡尔的木板那样的穿孔卡片来处理数据的主意。
通过使用一种将穿孔卡片从电触点上移过的系统,他得以为1890年的美国人口普查汇编统计信息。
1、分析机也是在19世纪,英国数学家和发明家查尔斯•巴比奇,提出了现代数字计算机的原理。
他构想出旨在处理复杂数学题的若干机器,如差分机。
许多历史学家认为,巴比奇及其合伙人,数学家奥古斯塔•埃达•拜伦,是现代数字计算机的真正先驱。
巴比奇的设计之一,分析机,具有现代计算机的许多特征。
计算机英语第四版课文翻译
![计算机英语第四版课文翻译](https://img.taocdn.com/s3/m/2ad9bb0b336c1eb91a375df6.png)
《计算机英语》参考译文第一单元:计算机与计算机科学课文A:计算机概览一、引言计算机是一种电子设备,它能接收一套指令或一个程序,然后通过对数字数据进行运算或对其他形式的信息进行处理来执行该程序。
要不是由于计算机的发展,现代的高科技世界是不可能产生的。
不同类型和大小的计算机在整个社会被用于存储和处理各种数据,从保密政府文件、银行交易到私人家庭账目。
计算机通过自动化技术开辟了制造业的新纪元,而且它们也增强了现代通信系统的性能。
在几乎每一个研究和应用技术领域,从构建宇宙模型到产生明天的气象报告,计算机都是必要的工具,并且它们的应用本身就开辟了人们推测的新领域。
数据库服务和计算机网络使各种各样的信息源可供使用。
同样的先进技术也使侵犯个人隐私和商业秘密成为可能。
计算机犯罪已经成为作为现代技术代价组成部分的许多风险之一。
二、历史第一台加法机是法国科学家、数学家和哲学家布莱斯?帕斯卡于1642年设计的,它是数字计算机的先驱。
这个装置使用了一系列带有10个齿的轮子,每个齿代表从0到9的一个数字。
轮子互相连接,从而通过按照正确的齿数向前转动轮子,就可以将数字彼此相加。
17世纪70年代,德国哲学家和数学家戈特弗里德?威廉?莱布尼兹对这台机器进行了改良,设计了一台也能做乘法的机器。
法国发明家约瑟夫―玛丽?雅卡尔,在设计自动织机时,使用了穿孔的薄木板来控制复杂图案的编织。
在19世纪80年代期间,美国统计学家赫尔曼?何勒里斯,想出了使用类似雅卡尔的木板那样的穿孔卡片来处理数据的主意。
通过使用一种将穿孔卡片从电触点上移过的系统,他得以为1890年的美国人口普查汇编统计信息。
1、分析机也是在19世纪,英国数学家和发明家查尔斯?巴比奇,提出了现代数字计算机的原理。
他构想出旨在处理复杂数学题的若干机器,如差分机。
许多历史学家认为,巴比奇及其合伙人,数学家奥古斯塔?埃达?拜伦,是现代数字计算机的真正先驱。
巴比奇的设计之一,分析机,具有现代计算机的许多特征。
《计算机专业英语(第4版)》Unit 1 Hardware Knowledge
![《计算机专业英语(第4版)》Unit 1 Hardware Knowledge](https://img.taocdn.com/s3/m/f2c4caa9112de2bd960590c69ec3d5bbfc0ada66.png)
2023/12/28
计算机专业英语第4版
14
• Gates stepped down as chief executive officer of Microsoft in January 2000.
• He remained as chairman and created the position of chief software architect.
• In June 2006, Gates announced that he would be transitioning from full-time work at Microsoft to part-time work, and full-time work at the Bill & Melinda Gates Foundation.
four basic units of simplified computer: the input unit, central processing unit (CPU), memory unit, and output unit.
2023/12/28
计算机专业英语第4版
20
2023/12/28
2023/12/28
计算机专业英语第4版
19
1.2 Computer Development
1.2.1 Text A • The hardware of a digital computer system
计算机专业英语课文翻译
![计算机专业英语课文翻译](https://img.taocdn.com/s3/m/6f652e8a8762caaedd33d4ff.png)
第4章操作系统第一部分阅读和翻译A部分 Windows 71. 简介Windows 7是微软最新发布的windows版本,这一系列微软制造的操作系统主要用于个人电脑,其中包括家庭和商业台式电脑、笔记本电脑、上网本、平板电脑、和媒体中心电脑。
(见图4.1)Windows 7于2009年7月22日开始生产,并在2009年10月22日零售,这个时间距其推出其前任Windows Vista不到三年时间。
与Windows 7相对应的Windows server 2008 R2,也是同年发布。
不像其前一操作系统vista,windows7 引入了大量的新特性,更集中于增量升级的windows线,目标是兼容已经在vista中兼容的应用程序和硬件。
微软在2008年的报告中关注于对于多点触控的支持,以及一个重新设计的windows shell和一个新的任务栏,并将其称之为Superbar,还有一个称之为家庭组的网络系统,注重性能改进。
之前版本的windows 系统中的一些标准的应用程序,包括windows日历,windows邮件,windows movie maker,和windows相片画廊在windows 7中并没有包含进来,而大多数是作为Windows Live Essentials套件单独免费进行提供的。
2. 发展最初,微软计划用一个代号为Blackcomb的windows版本来继承Windows XP(代号惠斯勒)和Windows Server 2003。
微软计划在Blackcomb中设计的主要功能包括在搜索中的加强,查询数据以及一个先进的存储命名系统。
然而,一个临时的,更小的,代号为Longhorn 的版本在2003年发布了。
微软在2003年中旬推迟发布了Blackcomb,但是Longhorn获得了大部分当初试图在Blackcomb中实现的特性。
在2003年,相继有三个主要病毒暴露了windows操作系统的一些漏洞,微软改变了其的发展重点,搁置了Longhorn的主要开发工作,主要开发windows xp和windows server 2003的服务包。
计算机专业英语教程(第4版)译文6.2
![计算机专业英语教程(第4版)译文6.2](https://img.taocdn.com/s3/m/a2620038c381e53a580216fc700abb68a982ad08.png)
计算机专业英语教程(第4版)译文6.2《计算机专业英语教程》(第4版)6.2 Carrier Frequencies and Multiplexing载波频率和多路复用@ Computer networks that use a modulated carrier wave to transmit data are similar to television stations that use a modulated carrier wave to broadcast video.modulated 已调制的使用调制载波发送数据的计算机网络和利用调制载波广播视频信息的电视台相类似。
The similarities provide the intuition needed to understand a fundamental principle:similarity 相似性intuition 直观这一相似性给理解下述基本原理提供了启示:Two or more signals that use different carrier frequencies can be transmitted over a single medium simultaneously without interference.signal 信号simultaneously 同时地interference 干扰两个或多个使用不同载波频率的信号可以在单一介质上同时传输而互不干扰。
@ To understand the principle, consider how television transmission works.为理解这一原理,考虑(有线)电视传输是如何工作的。
Each television station is assigned a channel number on which it broadcasts a signal.channel 频道每个电视台都分配一个频道号,它在该频道上广播信号。
计算机专业英语的第四版课后习题翻译
![计算机专业英语的第四版课后习题翻译](https://img.taocdn.com/s3/m/521d87c348649b6648d7c1c708a1284ac85005fa.png)
计算机专业英语的第四版课后习题翻译中译英参考答案Unit 1A computer system consists of hardware system and software system. The hardware of the computer is usually divided into three major parts or three primary subsystems: the CPU, the memory subsystem, and the I/O subsystem.The CPU performs many operations and controls computer. The memory subsystem is used to store program being executed by the CPU, along with the program’s data. The I/O subsystem allows the CPU to interact with input and output devices such as the keyboard and monitor of a personal computer. The components of the computer are connected to the buses.The part of the computer that performs the bulk of data processing operations is called the central processing unit and is referred to as the CPU. In microcomputer, it is often called the microprocessor. The CPU is made up of three major parts: control unit, ALU, and register set.Memory is also known as internal memory or main memory. It refers to the circuits in the computer that hold whatever programs and data are available for immediate use by the CPU.I/O subsystem includes I/O devices and interface. There are a wide variety of I/O devices, such as mouse, printer, sensor, disk, and so on. Input-output interface provides a method for transferring information between internal storage and externalI/O devices. Peripherals connected to a computer need special communication links for interfacing them with the CPU. The purpose of the communication link is to resolve the differences that exist between the central computer and each peripheral. Unit 2Storage hardware provides permanent storage of information and programs for retrieval by the computer. Hard disk drives store information in magnetic particles embedded in a disk. Usually a permanent part of the computer, hard disk drives can store large amounts of information and retrieve that information very quickly.Although fixed hard drive systems offer faster access and have a higher storage capacity than optical discs, optical disc systems use removable media –a distinct benefit. Optical discs –primary CDs and DVDs – are much more widely used than removable hard drive systems. They are the standard today for software delivery, as well as commonly used for storing high-capacity music and video files. There are also versions of both CD and DVD drives available for home audio and home theater use. Optical discs are commonly referred to as compact discs.CD and DVD discs are read by CD and DVD drives. The speed of a CD or DVD drive is rated as 24x, 32x, 36x, and so on. These labels describe how fast the drive is compared to the first version of that drive. For example, a 36x drive is 36 times the speed of the baseline unit that was originally manufactured. Most optical discs have a title and other text printed only on one side and they are inserted into the drive with the printed side facing up. When inserting such a CD or DVD, be careful not to get dirt, fingerprints, scratches, or anything else that might hinder light reflectivity on the disc’s surface.Unit 3(a) A program is a list of instructions or statements for directing the computer to perform arequired data processing task. Programming is a multistep process for creating that list of instructions.(b) It is important to understand the difference between a class and an object of that class. A class is simply a specification for creating objects. Thus, a single class may create multiple objects.(c) Java is an object-oriented, network-friendly high-lever programming language that allows programmers to build applications that can run on almost any operating system.(d) ActiveX is a set of controls, or reusable components that enables programs or content of almost any type to be embedded within a Web page. Whereas a Java must be downloaded each time you visit a Web site, with ActiveX the component is downloaded only once, then stored on your hard disk for later, repeated use.(e) Programming involves a great deal of creativity. The design is guide to the function or purpose of each component, but the programmer has great flexibility in implementing the design as code. No matter what language is used, each program component involves at least three major aspects: control structures, algorithms, and data structures.Unit 4The software system can be divided into two broad categories: application software and system software. Application software consists of the program for performing tasks particular to the machine’s utilization. In contrast to application software, system software comprises a large number of programs. These programs start up the computer and function as the principle coordinator of all hardware components and application software. Without system software loaded into RAM of your computer, your hardware and application software are useless.System software can be grouped into three basic parts: operating system, utility software, and language translators. The majority of an installation’s utility software consists of programs for performing activities that are fundamental to computer installations yet not included in the operating system. In a sense, utility software consists of software units that extend the capabilities of the operating system.A computer’s OS is the main collection of programs that manage its activities. The primary chores of an OS are management and control. The OS ensures that all actions requested by a user are valid and processed in an orderly fashion. It also manages the computer system’s resources to perform these operations with efficiency and consistency.Application software is the software designed to help you solve problems specific to business or perform specific business tasks. Application software then is the layer of software closest to you. Basically, there are four categories of application software: productivity software, business and specialty software, entertainment software and education/reference software.Unit 5A computer network is often classified as being either a local area network (LAN), a metropolitan area network (W AN), or a wide area network (W AN). The connection of two or more networks is called an internetwork. The worldwide Internet is a well-known example of an internetwork.LANs are privately owned networks within a single building or campus of up to a few kilometers in size. They are widely used to connect personal computers and workstations incompany offices and factories to share resources and exchange information.In general, a given LAN will use only one type of transmission medium. V arious topologies are possible for LANs. The most common LAN topologies are bus, ring and star.A MAN is basically a bigger version of a LAN and normally uses similar technology. MAN is designed to extend over an entire city. It may be a single network such as a cable television network, or it may be a means of connecting a number of LANs into a large network so that resources may be shared LAN-to-LAN as well as device-to-device. For example, a company can use a MAN to connect the LANs in all of its offices throughout a city.A WAN spans a large geographical area that may comprise a country, a continent, or even the world. It provides long-distance transmission of data, voice, image, and video information over large geographical area.In contrast to LANs, W ANs may utilize public leased, or private communication devices, usually in combinations, and can therefore span an unlimited number of miles.Unit 6Transmission media are used to transfer messages over a network. For instance, the transmission media used in a network may be a privately owned set of cables, the public phone lines, or a satellite system. Transmission media can either be wired or wireless.The three types of wired media most commonly used to carry messages are twisted-pair wire, coaxial cable, and fiber-optic cable. One of the most successful developments in transmission media in recent years has been fiber optics. Fiber-optic cable is commonly used for the high-speed backbone lines of a network, or for Internet infrastructure.Wireless transmission media have become especially popular in recent years. They support communications in situations in which physical wiring is impractical or inconvenient, as well as facilitate mobility. Wireless media are commonly used to connect devices to a network, to share information between computers, to connect wireless mice to a computer, and for handheld PCs, wireless phones, and other mobile devices. Radio signals transferred through the air are the heart of most types of wireless media. In addition to conventional broadcast radio application, the microwave, cellular, and satellite transmission media also use radio signals to transmit data.Radio transmissions require the use of a transmitter to send the radio signals through the air.A receiver (usually containing some type of antenna) accepts the date at the other end. When a device functions as both a receiver and transmitter, it is commonly called a transc eiver or transmitter-receiver.Unit 7(a) Since many database systems users are not computer trained, developers hide the complexity from users through several levels of abstraction, to simplify user’s interactions with the system: physical level, logical level, and view level.(b) A database schema is specified by a set of definitions expressed by a special language called a data-definition language (DDL). The result of compilation of DDL statements is a set of tables that is stored in a special file called data dictionary, or data directory.(c) The structured query language (SQL) is the most widely used and standard query language for relational database management systems. It is a kind of non-procedural language.(d) An entity is a ―thing‖or ―object‖in the real world that is distinguishable from otherobjects. For example, each person is an entity, and bank accounts can be considered to be entities. Entities are described in a database by a set of attributes.(e) Data warehouse is one of the newest and hottest buzzwords and concepts in the IT field and the business environment. A data warehouse is a logical collection of information——gathered from many different operational databases——that supports business analysis activities and decision-making tasks.Unit 8Animation is the term used to describe a series of graphical images that are displayed one after the other to simulate movement. Cartoons on television are one example of animation.Video differs from animation in that it usually begins as a continuous stream of visual information that is broken into separate images or frames when the video is recorded. When the frames are projected—typically at a rate of 30 frames per second—the effect is a smooth reconstruction of the original continuous stream of information. As you might imagine, at 30 frames per second, the amount of data involved in displaying a video during a multimedia presentation can require a substantial amount of storage space. Consequently, video data—like audio data—is often compressed. A variety of compression standards exist. Some of the most common video file formats are .avi, .mpeg, .mov, .rm.For multimedia presentation, video may be recorded using a standard (analog) video camera and then converted to digital form as it is input into a computer. Alternatively, the film can be recording digitally using a digital video camera. Streaming video is frequently used on Web pages to reduce file size. Similar to streaming audio, Streaming video files can begin playing once a portion of the video has been downloaded.Unit 9(a) AI is currently being applied in business in the form of knowledge systems, which use human knowledge to solve problems. The most popular type of knowledge-based system is the expert system. An expert system is a computer program that attempts to represent the knowledge of human experts in the form of heuristics. The term heuristic is derived from the same Greek root as the word eureka, which means ―to discover‖.(b) The user interface enables the manager to enter instructions and information into the expert system and to receive information from it. The instructions specify the parameters that guide the expert system through its reasoning processing. The information is in the form of values assigned to certain variables.(c) The knowledge base contains both facts that describe the problem area and knowledge representation techniques that describe how the facts fit together in a logic al manner. The term problem domain is used to describe the problem area.(d) An expert system, also called a knowledge-based system, is an artificial intelligence system that applies reasoning capabilities to reach a conclusion. Expert systems are excellent for diagnostic and prescriptive problems.(e) The DSS is not intended to replace the manager. The computer can be applied to the structured portion of the problem, but the manager is responsible for the unstructured portion——applying judgment or intuition and conducting analyses.Unit 10The linked list (see figure 1) consists of a series of nodes, which are not necessarily adjacent in memory. Each node contains the element and a link to a node containing its successor. We call this the next link. The last cell’s next link references null. To execute printList or find(x) we merely start at the first node in the list and then traverse the list by following the next links. This operation is clearly linear-time, as in the array implementation, although the constant is likely to be larger than if an array implementation were used. The findKth operation is no longer quite as efficient as an array implementation; findKth(i) takesO(i) time and works by traversing down the list in the obvious manner. In practice, this bound is pessimistic, because frequently the calls to findKth are in sorted order (by i). As an example, findKth(2), findKth(3), findKth(4), and findKth(6) can all be executed in one scan down the list.The remove method can be executed in one next reference change. Figure 2 shows the result of deleting the second element in the original list.The insert method requires obtaining a new node from the system by using a new call and then executing two reference maneuvers. The general idea is shown in figure 3. The dashed line represents the old next reference.figure 1figure 2figure 3Unit 11(a) A set is pure if all of its members are sets, all members of its members are sets, and so on. For example, the set containing only the empty set is a nonempty pure set.(b) A language is a describable set of finite strings, drawn from a fixed alphabet. A grammar is one way to "describe" the language. The grammar consists of a finite list of rules, where each rule replaces one substring with another. The string on the left must contain at least one nonterminal. The first string "produces" or "generates" the second. Thus a rule is also called a production.(c) A finite-state machine (FSM) or finite-state automaton(FA)is a mathematical abstraction sometimes used to design digital logic or computer programs. It is a behavior model composed of a finite number of states, transitions between those states, and actions, similar to a flow graph in which one can inspect the way logic runs when certain conditions are met. (d) Sometimes it is inconvenient or impossible to describe a set by listing all of its elements. Another useful way to define a set is by specifying a property that the elements of the set have in common. The notation P(x) is used to denote a sentence or statement P concerning the variable object x. The set defined by P(x) written {x | P(x)}, is just a collection of all the objects for whichP is true.Unit 12(a) Because drawings are typically displayed in 3D, CAD is especially helpful in designing automobiles, aircraft, ships, buildings, electrical circuits (including computer chips), and even clothing.(b) Computer-integrated manufacturing (CIM) is the manufacturing approach of using computers to control the entire production process. This integration allows individual processes to exchange information with each other and initiate actions. Through the integration of computers, manufacturing can be faster and less error-prone, although the main advantage is the ability to create automated manufacturing processes.(c) In addition to supporting decision making, coordination, and control, information system may also help managers and workers analyze problems, visualize complex subjects, and create new products.(d) Knowing the history and evolution of ERP is essential to understanding its current application and its future developments.(e) In addition to monitoring operational activities such as tracking the status of orders and inventory levels, enterprise system also improve organization-wide reporting and decision making.Unit 13(a) There are a wide variety of educational application programs available. Educational software is designed to teach one or more skills, such as reading, math, spelling, a foreign language, world geography, or to help prepare for standardized tests.(b) Electronic business (e-business) is the use of information technology and electronic communication networks to exchange business information and conduct transactions in electronic, paperless form.(c) Word processing software allows you to use computers to create, edit, store, and print documents. You can easily insert, delete, and move words, sentences, and paragraphs——without ever using an eraser.(d) What is a spreadsheet? Spreadsheet software takes its name from the accountant’s columnar worksheet, which it imitates. A spreadsheet is a worksheet consisting of a collection of cells formed by the intersection of rows and columns. Each cell can store one piece of information: a number, word or phrase, or formula.Unit 14(a) A geographic information system (GIS) is a system that captures, stores, analyzes, manages and presents data with reference to geographic location data. In the simplest terms, GIS is the merging of cartography, statistical analysis and database technology.(b) The GPS receiver uses the messages it receives to determine the transit time of each message and computes the distance to each satellite. These distances along with the satellites' locations are used to compute the position of the receiver. This position is then displayed, perhaps with a moving map display or latitude and longitude; elevation information may be included.(c) Virtual reality (VR) is a term that applies to computer-simulated environments that can simulate physical presence in the real world. Most current virtual reality environments areprimarily visual experiences, displayed either on a computer screen or through special stereoscopic displays, but some simulations include additional sensory information, such as sound through speakers or headphones.Unit 15(a) The software development process is sometimes called the software development life cycle (SDLC), because it describes the life of a software product from its conception to its implementation, delivery, use, and maintenance.(b) How can the CMM help your organization? There are three key roles the CMM plays. First, the CMM helps build an understanding of software process by describing the practices that contribute to a level of process maturity. The second role of the CMM is to provide a consistent basis for conducting appraisals of software processes. The CMM’s third key role is to serve as a blueprint for software process improvement.(c) The UML offers a standard way to write a system’s blueprints, including conceptual things such as business processes and system functions as well as concrete things such as programming language statements, database schemas, and reusable software components. The UML represents a collection of the best engineering practices that have proven successful in the modeling of large and complex systems.(d) Object modeling is a technique for identifying objects within the system environment and the relationships between those objects. The object-oriented approach to system development is based on several concepts, such as object, attribute, behavior, encapsulation, class, inheritance, polymorphism, persistence, etc.Unit 16―Security‖ is an all-encompassing term that describes all the concepts, techniques, and technologies to protect information from unauthorized access. There are several requirements for information security.Confidentiality: hiding data, usually with encryption, to prevent unauthorized viewing and access.Authenticity: the ability to know that the person or system you are communicating with is who or what you think it is. Access control: once a person or system has been authenticated, their ability to access data and use systems is determined by access controls.Data integrity: providing assurance that an information system or data is genuine.Availability: making sure that information is available to users in a secure way.To prevent unauthorized access, some type of identification procedure must be used. These vary from passwords to physical access object (access cards, etc.) to biometric devices that verify some type of personal characteristic, such as a fingerprint.Some of the most secure access control systems address both identification and authentication. Identification involves verifying that the person’s name or other identifying feature is listed as an authorized user; authentication refers to determining whether or not the person is actually who he or she claims to be.Unit 17A distributed system is a collection of independent computers which appear to the users of system as a single computer. Nearly all large software systems are distributed. For example, enterprise-wide business systems must support multiple users running common applications ac ross different sites.A distributed system encompasses a variety of applications, their underlying support software, the hardware they run on, and the communication links connecting the distributed hardware. The largest and best-known distributed system is the set of computers, software, and services comprising the World Wide Web, which is so pervasive that it coexists with and connects to most other existing distributed systems. The most common distributed systems are networked client/server systems. Distributed systems share the general properties described below.●Multiple nodes●Message passing or communication●Resource sharing●Decentralized control●Concurrency or parallelism●Fault tolerance●Heterogeneity●OpennessDistributed systems have many inherent advantages, especially over centralized systems. Some applications are inherent distributed as well. In general, distributed systems:●Yield higher performance●Allow incremental growth●Allow one user to run a program on many different machines in parallel●Provide higher reliability。
计算机专业英语教程(完整版)
![计算机专业英语教程(完整版)](https://img.taocdn.com/s3/m/4a3cf20fd15abe23492f4d96.png)
1.1 The Invention of the Computer
1.1.1 The ENIAC Perhaps the most influential of the early computerlike devices was the Electronic Numerical Integrator and Computer, or ENIAC. It was developed by J. Presper Eckert and John Mauchly at the University of Pennsylvania. The project began in 1943 and was completed in 1946. The machine was huge; it weighed 30 tons and contained over 18,000 vacuum tubes. 也许早期最具影响力的类似计算机的装置应该是电子数字积分计算机, 或简称ENIAC。它是由宾夕凡尼亚大学的J. Presper Eckert 和John Mauchly 研制的。该工程于1943年开始,并于1946年完成。这台机 器极其庞大,重达30吨,而且包含18,000多个真空管。
❖ This book is very important to us
3
Key points: useful terms and definitions
of computers Difficult points:
describing the features of computers of each generation
known as 通常所说的,以……著称
Abbreviations:
ENIAC(Electronic Numerical Integrator and Computer) 电子数字积分计算机,ENIAC计算机 EDSAC (Electronic Delay Storage Automatic Computer) 延迟存储电子自动计算机 BINAC (Binary Automatic Computer) 二进制自动计算机 UNIVAC (Universal Automatic Computer) 通用自动计算机
(完整word版)计算机专业英语教程(第5版)翻译完整版
![(完整word版)计算机专业英语教程(第5版)翻译完整版](https://img.taocdn.com/s3/m/eae41c62804d2b160a4ec00f.png)
主存储器,也就是说内存,用于为处理器暂时存放程序和数据。所有的程序和数据在被操作之前必须从输入设备(如VDT)或者辅助存储器转存到主存储器中。主存储器存储容量通常是相当有限的,因此,在一个程序执行结束,它所占用的存储空间必须被重新分配给其它正在等待执行操作的程序。
Figure 1-1 illustrates how all input/output (I/O)is “read to” or “written from” primary storage. In the figure, an inquiry (input) is made on a VDT. The inquiry, in the form of a message, is routed to primary storage over a channel (such as a coaxial cable). The message is interpreted, and the processor initiates action to retrieve the appropriate program and data from secondary storage [3].The program and data are “loaded”, or moves, to primary storage from secondary storage. This is a nondestructive read process. That is, the program and data that are read reside in both primary storage (temporarily) and secondary storage (permanently). The data are manipulated according to program instructions, and a report is written from primary storage to a printer.
计算机专业英语教程(第4版)译文8.1
![计算机专业英语教程(第4版)译文8.1](https://img.taocdn.com/s3/m/78f19d11524de518974b7d1a.png)
IntroductionMultimedia means, from the user’s perspective, that computer information can be represented through audio and/or video, in addition to text, image, graphics and animation .从用户的观点,多媒体技术意味着,电脑信息不仅可以通过文本、图象、图形和动画,还可以通过音频或者视频表现出来。
For example, using audio and video, a variety of dynamic situations in different areas, such as sport or ornithology lexicon, can often be presented better than just using text and image alone.例如,利用音频或者视频,许多不同领域的动态情形,例如运动场面、鸟类生活,能够比仅仅使用文本和图象更生动形象的表现出来。
The integration of these media into the computer provides additional possibilities for the use of computational power currently available (e.g., for interactive presentation of huge amounts of information ).多媒体与电脑的综合为电脑的普遍应用提供了额外的可行性〔例如:大量信息的交互式表现〕。
Furthermore, these data can be transmitted though computer and telecommunication networks, which implies applications in the areas ofinformation distribution and cooperative work.另外,这些数据可以通过意味着信息分工和合作工作。
计算机专业英语教程(第4版)全书译文
![计算机专业英语教程(第4版)全书译文](https://img.taocdn.com/s3/m/8443f2bddc88d0d233d4b14e852458fb770b3880.png)
计算机专业英语教程(第4版)全书译文1We have learned that all computers have similar capabilities and perform essentially the same functions, although some might be faster than others. We have also learned that a computer system has input, output, storage, and processing components; that th e processor is the “intelligence” of a computer system; and that a single computer system may have several processors. We have discussed how data are represented inside a computer system in electronic states called bits. We are now ready to expose the inner workings of the nucleus of the computer system — the processor.我们已经知道,所有的计算机都具有相似的能力,并且在本质上执行相同的功能,尽管一些可能会比另一些快一点。
我们也知道,一个计算机系统具有输入,输出,存储和处理部件;处理器是一个计算机系统智能核心,并且一个计算机系统可以有许多个处理器。
我们已经讨论过如何在计算机系统内部,用被称作“位”的电子状态来表现数据,现在我们要弄明白计算机系统的核心,即处理器,的内在的工作方式。
The internal operation of a computer is interesting, but there really is no mystery to it. The mystery is in the minds of those who listen to hearsay and believe science-fiction writer. The computer is a nonthinking electronic device that has to be plugged into an electrical power source, just like a toaster or a lamp.计算机的内部操作很有意思,但确实没有什么神秘可言。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
《计算机专业英语教程》(第4版)6.2 Carrier Frequencies and Multiplexing载波频率和多路复用@ Computer networks that use a modulated carrier wave to transmit data are similar to television stations that use a modulated carrier wave to broadcast video.modulated 已调制的使用调制载波发送数据的计算机网络和利用调制载波广播视频信息的电视台相类似。
The similarities provide the intuition needed to understand a fundamental principle:similarity 相似性intuition 直观这一相似性给理解下述基本原理提供了启示:Two or more signals that use different carrier frequencies can be transmitted over a single medium simultaneously without interference.signal 信号simultaneously 同时地interference 干扰两个或多个使用不同载波频率的信号可以在单一介质上同时传输而互不干扰。
@ To understand the principle, consider how television transmission works.为理解这一原理,考虑(有线)电视传输是如何工作的。
Each television station is assigned a channel number on which it broadcasts a signal.channel 频道每个电视台都分配一个频道号,它在该频道上广播信号。
In fact, a channel number is merely shorthand for the frequency at which the station's carrier oscillates.shorthand 速记oscillate 振荡事实上,频道号就是电视台载波用的振荡频率的速记。
To receive a transmission, a television receiver must be tuned to the same frequency as the transmitter.tune to 调谐到为接收一个频道传输,电视接收器必须调谐到与发送器相同的频率。
More important, a given city can contain many television stations that all broadcast on separate frequencies simultaneously.更重要的是,一个城市可以有许多电视台,它们彼此在不同的频率上同时广播。
A receiver selects one to receive at any time.一个接收器在任一时间选择接收其中一个。
@ Cable television illustrates that the principle applies to many signals traveling across a wire.有线电视这一例子说明了以上原理应用于许多信号在一根导线上同时传输的情况。
Although a cable subscriber may have only one physical wire that connects to the cable company, the subscriber receives many channels of information simultaneously.虽然一个有线电视用户可能只有一根线连向有线电视公司,但用户可同时收到许多频道的信息。
The signal for one channel does not interfere with the signal for another. 一个频道中的信号不会与另一频道中的信号相互干扰。
@ Computer networks use the principle of separate channels to permit multiple communications to share a single, physical connection.permit 允许计算机网络使用分离频道的原理使多个通信共享单根物理连线。
Each sender transmits a signal using a particular carrier frequency.每个发送器使用一个特定载波频率传输信号。
A receiver configured to accept a carrier at a given frequency will not be affected by signals sent at other frequencies.一个接收器被设置成接收给定频率的载波,它将不会受其它频率信号的影响(或干扰)。
All carriers can pass over the same wire at the same time without interference.所有载波可在同一时间通过同一导线而互不干扰。
Frequency Division Multiplexing 频分多路复用@ Frequency division multiplexing(FDM) is the technical term applied to a network system that uses multiple carrier frequencies to allow independent signals to travel through a medium.频分多路复用(FDM)是使用多个载波频率在一个介质中同时传输多个独立信号的计算机网络系统术语。
FDM technology can be used when sending signals over wire, RF, or optical fiber.当通过导线、RF或光纤发送信号时便可使用FDM技术。
Figure 6-1 illustrates the concept, and shows the hardware components needed for FDM.图6-1说明了这一概念并显示了FDM所需的硬件部件。
@ In theory, as long as each carrier operates at a different frequency than the others, it remains independent.理论上,工作在不同频率上的载波将保持相互独立。
In practice, however, two carriers operating at almost the same frequency or at exact multiples of a frequency can interfere with one another.但实际上,两个频率相近或频率成整倍的载波会彼此干扰。
To avoid problems, engineers who design FDM network systems choose a minimum separation between the carriers.为了避免这些问题,设计FDM网络系统的工程师们在各载波之间选择一个最起码的频率分隔。
The mandate for large gaps between the frequencies assigned to carriers means that underlying hardware used with FDM can tolerate a wide range of frequencies.mandate 授权underlying 相关的tolerate 容纳在各载波频率之间要求有较大的间隔意味着FDM所用的相关硬件能容纳很宽的频率范围。
Consequently, FDM is only used on high-bandwidth transmission channels.因此,FDM仅用于高带宽传输通道中。
In summary, 概括地说,Frequency division multiplexing(FDM) allows multiple pairs of senders and receivers to communicate over a shared medium simultaneously.频分多路复用允许多对发送和接收装置在一个共享介质上同时通信。
The carrier used by each pair operates at a unique frequency that does not interfere with the others.每对装置使用的载波频率唯一的,并彼此互不干扰的频率运行。
Time Division Multiplexing 时分多路复用@ The general alternative to FDM is time division multiplexing (TDM), in which sources sharing a medium take turn.与FDM不同的另一种复用形式是时分多路复用(TDM),按这种方式,各发送源轮流使用共享的通信介质。
For example, some time-division multiplexing hardware use a round-robin scheme in which the multiplesor sends a packet from sourcel, then sends a packet from souces2, and so on.round-robin 循环例如,某些TDM硬件使用循环法方案共享介质,用这种方法,多路复用器先发送源1的一个包,然后发送源2的一个包,如此循环。
Figure 6-2 illustrates the idea.图6-2说明了这种思想。
@ Dividing data into small packets ensures that all sources receive prompt service because it prohibits one source from gaining exclusive access for an arbitrarily long time.arbitraryprompt 立刻地prohibit禁止arbitrarily 任意地exclusive 独占把数据分成许多小包保证了所有源都接受到即时服务,因为它禁止一个源任意长时间独占介质”。