计算机英语 刘艺 王春生 第4版Unit 11A
计算机英语(第4版) 刘艺 课文参考译文
《计算机英语(第4版)》参考译文第一单元:计算机与计算机科学课文A:计算机概览一、引言计算机是一种电子设备,它能接收一套指令或一个程序,然后通过对数字数据进行运算或对其他形式的信息进行处理来执行该程序。
要不是由于计算机的发展,现代的高科技世界是不可能产生的。
不同类型和大小的计算机在整个社会被用于存储和处理各种数据,从保密政府文件、银行交易到私人家庭账目。
计算机通过自动化技术开辟了制造业的新纪元,而且它们也增强了现代通信系统的性能。
在几乎每一个研究和应用技术领域,从构建宇宙模型到产生明天的气象报告,计算机都是必要的工具,并且它们的应用本身就开辟了人们推测的新领域。
数据库服务和计算机网络使各种各样的信息源可供使用。
同样的先进技术也使侵犯个人隐私和商业秘密成为可能。
计算机犯罪已经成为作为现代技术代价组成部分的许多风险之一。
二、历史第一台加法机是法国科学家、数学家和哲学家布莱斯•帕斯卡于1642年设计的,它是数字计算机的先驱。
这个装置使用了一系列带有10个齿的轮子,每个齿代表从0到9的一个数字。
轮子互相连接,从而通过按照正确的齿数向前转动轮子,就可以将数字彼此相加。
17世纪70年代,德国哲学家和数学家戈特弗里德•威廉•莱布尼兹对这台机器进行了改良,设计了一台也能做乘法的机器。
法国发明家约瑟夫―玛丽•雅卡尔,在设计自动织机时,使用了穿孔的薄木板来控制复杂图案的编织。
在19世纪80年代期间,美国统计学家赫尔曼•何勒里斯,想出了使用类似雅卡尔的木板那样的穿孔卡片来处理数据的主意。
通过使用一种将穿孔卡片从电触点上移过的系统,他得以为1890年的美国人口普查汇编统计信息。
1、分析机也是在19世纪,英国数学家和发明家查尔斯•巴比奇,提出了现代数字计算机的原理。
他构想出旨在处理复杂数学题的若干机器,如差分机。
许多历史学家认为,巴比奇及其合伙人,数学家奥古斯塔•埃达•拜伦,是现代数字计算机的真正先驱。
巴比奇的设计之一,分析机,具有现代计算机的许多特征。
计算机英语 刘艺 王春生 第4版
III Star/Extended Star Topology
• So+do+主语 • So+主语+do
III Star/Extended Star Topology
• So+do+主语 so代表上句中陈述的肯定内容。do可以是 连系动词、情态动词或助动词,且必须与 上句中的谓语动词保持时态的一致,意思 为“…也是如此”。 如:He can speak English very well. So can she. (=She can speak English very well, too.) 她英语也讲得很好。 • So+主语+do
III Star/Extended Star Topology
• In this case, the extended star topology is all but necessary to prevent degraded signals.
• 在这种情况下,【为防止信号衰减】,扩 展星型拓扑结构几乎是必需的。
V. Mesh Topology
• After all, what are the odds a network will fail in multiple times near the same device?
• 毕竟,一个网络在同一个设备附近多次出 故障的可能性有多大呢?
• 虚拟语气是一种特殊的动词形式,表示所 说的话不是一个事实,而只是一种假设、 愿望、建议、怀疑、猜测或不大可能实现 的空想。
• 虚拟语气用在条件状语从句中,通常从句 由连词if 引导。
II Ring Topology
虚拟条件状语从句 a. 与现在事实相反的假设 条件从句用一般过去时(be用were),主 句用should(would/might/could)+动词原形 如:If they were here, they would help you. 如果他们在这儿,会帮助你的。 含义:They are not here, they can’t help you.
计算机专业英语教程(第四版)习题答案
计算机专业英语教程(第四版)习题答案计算机专业英语教程(第四版)习题答案计算机专业英语(第四版)课后习题答案Unit 1 [Ex 1] Fb5E2RGbCAP [Ex 2] 1. input, storage, processing, and output 2. power; speed; 1. F 2. T 3. T 4. F 5. T 6. T 7. T 8. T 9. T 10.memoryp1EanqFDPw 3. central processing unit memoryDXDiTa9E3d 5. keyboard; [Ex 3] B. A. central processing unit; 1. F 2. D 2. monitor 3. G 4. C 5. B main memory; 6. A 7. E monitorRTCrpUDGiT 8. H5PCzVD7HxA 4. internal; primary;1. user3. data4. keyboard5. data processingjLBHrnAILg6. information [Ex 4] instructions7. computer8. memory 3. manipulates 4.1. input device2. screen, screen 5. retrievexHAQX74J0X 8. Function6. code7. hard copy[Ex. 5] 新处理器开始IT 技术的新时代New Processors Open New Era of IT Technologies Last week, Intel introduced to the public in Russia and other CIS countries a family of processors Intel Xeon E5-2600. They are more powerful and reliable and, importantly, are very economical in terms of energy consumption. Their1 / 30presence opens a new era in the field of IT technologies and means that the cloud technology is getting closer.LDAYtRyKfEThese processors are primarily designed for servers, data centers (DPC) and supercomputers. The emergence of this class of devices is not accidental. According to the regional director of Intel in Russia and other CIS states Dmitri Konash who spoke at the event, the market of IT-technology is developing so rapidly that, according to forecasts, by 2015 there will be 15 billion devices connected to the Internet, and over 3 billion of active users.Zzz6ZB2Ltk 上周,英特尔公司向俄罗斯和其它独联体国家的公众推出了英特尔Xeon E5-2600 系列处理器,它们更加强大可靠,尤其是在能量消耗方面更加经济实惠。
计算机专业英语Unit 11
3. Please read the conversation below and learn how to raise a question and how to solve each problem.
B: I'm afraid nobody can tell you what you want. But of course I can tell you some basic things to remember when designing a site. There are rules about the layout and structure .
Part 1 Listening & Speaking
1. Listen to the following passage and fill in the blan ks with the words in the box.
download double-click update installers desktop administrator name website
计算机英语实用教程(第四版)目录介绍
计算机英语实用教程(第四版)目录介绍《计算机英语实用教程(第四版)》是2012年出版的一本图书,作者是刘兆毓、郑家农。
今天店铺在这里为大家介绍计算机英语实用教程(第四版)的目录介绍,欢迎大家阅读!计算机英语实用教程(第四版):基本信息出版社: 清华大学出版社; 第4版 (2010年9月1日)丛书名: 普通高等教育“十一五”国家级规划教材,计算机系列教材平装: 255页语种:英语, 简体中文开本: 16ISBN: 7302227977, 9787302227977条形码: 9787302227977商品尺寸: 25.8 x 18.2 x 1.2 cm商品重量: 422 g品牌: 清华大学出版社ASIN: B00426BSDQ计算机英语实用教程(第四版):编辑推荐《计算机英语实用教程(第4版)》:一共出版了4个版本,累计销售超50万册,得到了广泛的采用。
第四版吸收了反映当前最新技术和应用的内容,共由3部分组成:计算机硬件、计算机软件和计算机应用。
书中对一些较难翻译和理解的句子、单词进行了注释:每一节后面列出关键词汇,给出练习题;每一章后面还列出反映最新技术的一篇阅读材料以及相关词汇;以便提高读者阅读计算机英文文献的水平。
书后附有各节习题答案及译文,供读者参考。
《计算机英语实用教程(第四版)》在保留《计算机英语》基本结构的基础上,进行了课程内容的重新组合.使得读者在学时较少的情况下.同样能够掌握涉及计算机技术基础、系统和应用等各个方面的计算机英语知识。
内容相对精简,学习难度适当下调。
高校教师或读者可以根据自身的实际情况从以上两个版本中选择适合自己的教材。
计算机英语实用教程(第四版):目录参考译文第1章计算机硬件1.1 计算机组成1.2 什么是处理器1.3 存储系统1.4 输入输出(I/O)系统1.5 总线和控制器第2章计算机操作系统2.1 操作系统概述2.2 WINDOWSXP和VISTA2.3 UNIX和LINUX第3章个人计算机(PC)的使用3.1 选择和设置PC系统3.2 使用PC3.3 PC系统维护第4章计算机网络4.1 计算机网络的体系结构4.2 局域网(LAN)4.3 广域网(WAN)第5章因特网5.1 因特网概述5.2 与因特网连接5.3 万维网浏览器和服务器5.4 网络安全第6章因特网应用6.1 电子商务6.2 什么是企业资源计划ERP6.3 关于因特网电话第7章程序设计语言7.1 计算机语言概述7.2 BASIC和可视BASIC7.3 C、C++和C#7.4 标记和脚本语言第8章软件工程8.1 软件开发生命周期模型8.2 需求分析8.3 软件设计和测试8.4 软件维护第9章数据库及其应用9.1 数据库管理系统(DBMS)和管理信息系统(MIS) 9.2 数据库是如何工作的9.3 万维网(WEB)与数据库第10章办公自动化软件10.1 办公自动化软件基本知识10.2 0FFICE WORD 200710.3 0FFICE EXCEL 200710.4 0FFICE POWERPOINT 2007第11章计算机图形学与图像处理技术11.1 引言11.2 图形软件11.3 图像处理操作的层次结构11.4 数字图像文件格式第12章多媒体12.1 什么是多媒体12.2 多媒体的用途12.3 多媒体技术第13章现代工业自动化软件13.1 概述13.2 CAD、CAM和CAE的应用13.3 制造资源计划、MRP-Ⅱ及其他。
计算机英语(第4版)--刘艺--课文参考译文
《计算机英语(第4版)》参考译文第一单元:计算机与计算机科学课文A:计算机概览一、引言计算机是一种电子设备,它能接收一套指令或一个程序,然后通过对数字数据进行运算或对其他形式的信息进行处理来执行该程序。
要不是由于计算机的发展,现代的高科技世界是不可能产生的。
不同类型和大小的计算机在整个社会被用于存储和处理各种数据,从保密政府文件、银行交易到私人家庭账目。
计算机通过自动化技术开辟了制造业的新纪元,而且它们也增强了现代通信系统的性能。
在几乎每一个研究和应用技术领域,从构建宇宙模型到产生明天的气象报告,计算机都是必要的工具,并且它们的应用本身就开辟了人们推测的新领域。
数据库服务和计算机网络使各种各样的信息源可供使用。
同样的先进技术也使侵犯个人隐私和商业秘密成为可能。
计算机犯罪已经成为作为现代技术代价组成部分的许多风险之一。
二、历史第一台加法机是法国科学家、数学家和哲学家布莱斯•帕斯卡于1642年设计的,它是数字计算机的先驱。
这个装置使用了一系列带有10个齿的轮子,每个齿代表从0到9的一个数字。
轮子互相连接,从而通过按照正确的齿数向前转动轮子,就可以将数字彼此相加。
17世纪70年代,德国哲学家和数学家戈特弗里德•威廉•莱布尼兹对这台机器进行了改良,设计了一台也能做乘法的机器。
法国发明家约瑟夫―玛丽•雅卡尔,在设计自动织机时,使用了穿孔的薄木板来控制复杂图案的编织。
在19世纪80年代期间,美国统计学家赫尔曼•何勒里斯,想出了使用类似雅卡尔的木板那样的穿孔卡片来处理数据的主意。
通过使用一种将穿孔卡片从电触点上移过的系统,他得以为1890年的美国人口普查汇编统计信息。
1、分析机也是在19世纪,英国数学家和发明家查尔斯•巴比奇,提出了现代数字计算机的原理。
他构想出旨在处理复杂数学题的若干机器,如差分机。
许多历史学家认为,巴比奇及其合伙人,数学家奥古斯塔•埃达•拜伦,是现代数字计算机的真正先驱。
巴比奇的设计之一,分析机,具有现代计算机的许多特征。
新编计算机英语课文翻译 王春生 刘艺
在计算机科学中,操作系统是控制计算机的基本软件。
它具有三个主要功能:协调和操纵计算机硬件,如计算机内存、打印机、磁盘、键盘、鼠标和监视器;组织各种存储介质上的文件,如软盘、硬盘、光盘(CD)、数字视盘(DVD)和磁带以及管理硬件错误和数据丢失。
在以掌上电脑和电子游戏机为典型代表的一些计算机中,整个操作系统小到可存储在只读存储器(ROM)中。
对几乎所有的个人电脑、服务器、工作站、大型机以及超级计算机而言,操作系统程序相当大,因此大部分存储在硬盘上。
操作系统的小型引导程序存储在只读存储器上,并在系统启动时提供必要的指令,用于将操作系统的核心装入内存。
操作系统的这个核心部分称为内核,它提供最基本的操作系统服务,如内存管理和文件存取。
在计算机运行的整个时间内,内核一直驻留在内存中。
操作系统的其他部分,如定制实用程序,需要时才装入内存。
二、操作系统如何工作操作系统控制不同的计算机进程,如运行电子表格程序或从计算机内存中存取信息。
一个重要的进程是解释命令,使得用户可以和计算机通信。
一些命令解释器是面向文本的,需要键入命令或通过键盘上的功能键选择命令。
另一些命令解释器使用图形,并允许用户通过指点图标进行通信。
图标是屏幕上的图片,代表特定的命令。
初学者一般会发现面向图形的解释器比较容易使用,但许多有经验的计算机用户更喜欢面向文本的命令解释器,因为它们功能更强。
操作系统可以是单任务的,也可以是多任务的。
较早的单任务操作系统每次只能运行一个进程。
例如,计算机打印文档时,直到打印结束才能开始另外一个进程或响应新的命令。
所有的现代操作系统都是多任务的,可以同时运行数个进程。
然而,在大多数计算机中仅有一个中央处理器(计算机的计算和控制单元),因此多任务操作系统制造了数个进程同时在一个中央处理器上运行的错觉。
制造这种错觉最常用的机制是分时段的多任务处理,靠这种方法每个进程单独运行一段固定的时间。
如果一个进程在分配的时间内没有完成,它就暂停,让另外一个进程运行。
《计算机专业英语(第4版)》Unit 1 Hardware Knowledge
2023/12/28
计算机专业英语第4版
14
• Gates stepped down as chief executive officer of Microsoft in January 2000.
• He remained as chairman and created the position of chief software architect.
• In June 2006, Gates announced that he would be transitioning from full-time work at Microsoft to part-time work, and full-time work at the Bill & Melinda Gates Foundation.
four basic units of simplified computer: the input unit, central processing unit (CPU), memory unit, and output unit.
2023/12/28
计算机专业英语第4版
20
2023/12/28
2023/12/28
计算机专业英语第4版
19
1.2 Computer Development
1.2.1 Text A • The hardware of a digital computer system
计算机专业英语教程第四版翻译课后练习题含答案
计算机专业英语教程第四版翻译课后练习题含答案简介《计算机专业英语教程》是针对计算机专业学生编写的一本英语教材。
本书旨在帮助学生通过学习计算机领域的专业英语词汇和语法,提升他们的英语能力和技能。
本文将为读者提供该教材第四版的课后练习题及答案。
第一课练习题1.将下列单词从易到难排序:chip, computer, algorithm, software,desktop2.将下列单词从中文翻译为英文:程序设计,硬件,操作系统,输入,输出3.请解释下列缩略语的全称:RAM,CPU,OS答案1.desktop, chip, computer, software, algorithm2.programming, hardware, operating system, input, output3.RAM(Random Access Memory),CPU(Central Processing Unit),OS(Operating System)第二课练习题1.请翻译下列句子:计算机的功能越来越强大,它可以执行许多任务。
2.请解释下列单词的意思:interface,protocol,server,router答案puters are becoming more and more powerful and they canperform many tasks.2.interface(接口), protocol(协议),server(服务器),router(路由器)第三课练习题1.请将下列单词按字母顺序排列:database,file,program,server,storage2.请填写下列句子的空格:计算机会读取从硬盘 __ (into)内存。
3.请解释下列单词的意思:database,algorithm,client,browser答案1.algorithm,database,file,program,server,storage2.into3.database(数据库),algorithm(算法),client(客户端),browser(浏览器)第四课练习题1.请翻译下列句子:今天我学会了如何编写计算机程序。
计算机英语 刘艺 王春生 第4版
Introduction
shifted from...to...从...转为 shift from 从...去掉(移开)
一个人如果“站”在一个域的网关处“向外看”云,就会发现各种结构。的确,随着 各种域找到与云建立连接的点,因特网也以有点随意的方式发展着。然而,一种流行的结 10/34 构是,将若干域的网关连接在一起,形成一个由网关组成的区域网络。
Internet Architecture
For instance, a group of universities could choose to pool their resources to construct such a network. In turn, this regional network would be connected 轮流地、依次 to a more global network to which other regional networks attach. In this manner, that portion of the cloud takes on a hierarchical structure (Figure 9A-I).
Internet Architecture
Any message being transmitted to a destination within the domain is handled within the domain; any message being transmitted to a destination outside the domain is directed toward the gateway where it is sent out into the cloud.
《计算机英语(第4版)》课后练习参考答案之欧阳歌谷创作
《计算机英语(第4版)》练习参考答案欧阳歌谷(2021.02.01)Unit One: Computer and Computer ScienceUnit One/Section AI.Fill in the blanks with the information given in the text:1.Charles Babbage; Augusta Ada Byron2.input; output3.VLSI4.workstations; mainframes5.vacuum; transistors6.instructions; software7.digit; eight; byte8.microminiaturization; chipII.Translate the following terms or phrases from English into Chinese and vice versa:1.artificial intelligence 人工智能2.paper-tape reader 纸带阅读器3.optical computer 光计算机4.neural network 神经网络5.instruction set 指令集6.parallel processing 并行处理7.difference engine 差分机8.versatile logical element 通用逻辑元件9.silicon substrate 硅衬底10.vacuum tube 真空管11.数据的存储与处理the storage and handling ofdata12.超大规模集成电路very large-scale integratedcircuit13.中央处理器 central processing unit14.个人计算机 personal computer15.模拟计算机 analogue computer16.数字计算机 digital computer17.通用计算机 general-purpose computer18.处理器芯片 processor chip19.操作指令 operating instructions20.输入设备 input deviceIII.Fill in each of the blanks with one of the words given in the following list, making changes if necessary: We can define a computer as a device that accepts input, processes data, stores data, and produces output. According to the mode of processing, computers are either analog or digital.They can also be classified as mainframes, minicomputers, workstations, or microcomputers. All else (for example, the age of the machine) being equal, this categorization provides some indication of the computer’s speed, siz e, cost, and abilities.Ever since the advent of computers, there have been constant changes. First-generation computers of historic significance, such as UNIV AC (通用自动计算机), introduced in the early 1950s, were based onvacuum tubes. Second-generation computers, appearing in the early 1960s, were those in whichtransistors replaced vacuum tubes. In third-generation computers, dating from the1960s,integrated circuits replaced transistors. In fourth-generation computers such asmicrocomputers, which first appeared in the mid-1970s, large-scale integration enabled thousands of circuitsto be incorporated on onechip. Fifth-generation computers are expected to combine very-large-scale integration with sophisticated approaches to computing, including artificial intelligence and true distributed processing.IV.Translate the following passage from English into Chinese:计算机将变得更加先进,也将变得更加容易使用。
计算机英语 刘艺 王春生 第4版
The underlying software required to support such applications has grown from simple utility packages into an expanding system of network software that provides a sophisticated network wide infrastructure. In a sense, network software is evolving into a network wide operating system.
applications that are compatible with products
from other venders. Thus, the development of protocol standards is an indispensable process in the development of networking technologies.
计算机英语 刘艺 王春生 第4版
The need to share information and resources among different computers has led to linked computer systems, called networks, in which computers are connected so that data can be transferred from machine to machine. In these networks, computer users can exchange messages and share resources such as printing capabilities, software packages, and data storage facilities-that are scattered throughout the system.
《计算机英语(第4版)》课后练习参考答案之欧阳道创编
《计算机英语(第4版)》练习参考答案Unit One: Computer and Computer Science Unit One/Section AI.Fill in the blanks with the information givenin the text:1.Charles Babbage; Augusta Ada Byron2.input; output3.VLSI4.workstations; mainframes5.vacuum; transistors6.instructions; software7.digit; eight; byte8.microminiaturization; chipII.Translate the following terms or phrases from English into Chinese and vice versa:1.artificial intelligence 人工智能2.paper-tape reader 纸带阅读器3.optical computer 光计算机4.neural network 神经网络5.instruction set 指令集6.parallel processing 并行处理7.difference engine 差分机8.versatile logical element 通用逻辑元件9.silicon substrate 硅衬底10.vacuum tube 真空管11.数据的存储与处理the storage andhandling of data12.超大规模集成电路very large-scaleintegrated circuit13.中央处理器 central processing unit14.个人计算机 personal computer15.模拟计算机 analogue computer16.数字计算机 digital computer17.通用计算机 general-purpose computer18.处理器芯片 processor chip19.操作指令 operating instructions20.输入设备 input deviceIII.Fill in each of the blanks with one of the words given in the following list, makingchanges if necessary:We can define a computer as a device that accepts input, processes data, stores data, and produces output. According to the mode of processing, computers are either analog or digital. They can also be classified as mainframes, minicomputers, workstations, or microcomputers. All else (for example, the age of the machine) being equal, this categorization providessome indication of the computer’s spee d, size, cost, and abilities.Ever since the advent of computers, there have been constant changes. First-generation computers of historic significance, such as UNIV AC (通用自动计算机), introduced in the early 1950s, were based onvacuum tubes. Second-generation computers, appearing in the early 1960s, were those in whichtransistors replaced vacuum tubes. In third-generation computers, dating from the 1960s,integrated circuits replaced transistors. In fourth-generation computers such asmicrocomputers, which first appeared in the mid-1970s, large-scale integration enabled thousands of circuitsto be incorporated on onechip. Fifth-generation computers are expected to combine very-large-scale integration with sophisticated approaches to computing, including artificial intelligence and true distributed processing.IV.Translate the following passage from English into Chinese:计算机将变得更加先进,也将变得更加容易使用。
计算机英语 刘艺 王春生 第4版 Unit 10A
不仅雇员,而且有些供应商或客户也可能有机会访问公司的计算机 系统。使用自动柜员机(取款机)的银行客户就是一例。像雇员一样,这 些授权的用户可能获取秘密口令,或者找到进行计算机犯罪的其他途径。
Q:What is a hacker? What is the difference between hacker and cracker? (3) “Hackers” and “Crackers” Some people think of these two groups as being the same, but they are not. Hackers are people who gain unauthorized access to a computer system for the fun and challenge of it. Crackers do the same thing but for malicious purposes. They may intend to steal technical information or to introduce what they call a “bomb”—a destructive computer program—into the system.
2、计算机犯罪 计算机犯罪可能采取各种形式,包括: (1)破坏 不满的雇员有时企图破坏计算机、程序或文件。近年来,计算机病 毒已是臭名远扬。病毒是一种程序,在网络和操作系统中“迁移”,并 附加到不同的程序和数据库上。
A variant on the virus is the worm. This destructive program fills a computer system with self-replicating information, clogging the system so that its operations are slowed or stopped. The most infamous is known as the Internet Worm. In 1988, it traveled across North America, stopping thousands of computers along its way.
(完整版)计算机英语刘艺王春生第4版Unit11A
Section A Using E-Mail
1
Cyberculture —Introduction
I. Introduction
E-mail is an electronic system for sending
and receiving messages and files over a
你已经创建和使用签名文件了吗? 你加入任何邮件讨论组(新闻组)了吗? 你知道什么是在邮件讨论组中争论吗? 你知道什么是垃圾邮件吗? 你知道什么是网规吗?
5
Cyberculture— Introduction
E-mail is a form of public communication — — Your readers can purposely or mistakenly send your e-mail messages to countless others. So, you should not say things with e-mail that you would not say openly to your supervisors, coworkers, or clients.
Cyberculture— Introduction
Yes No Score
Can you receive and send messages?
Yes Marks
Can you forward documents to others?
Expert 8-10
Can you receive and send attached documents?
computer network. Compared to the phone or
《计算机英语(第4版)》课后练习A部分第二题答案
《计算机英语(第4版)》课后练习A部分第二题答案计算机英语1. artificial intelligence 人工智能2. paper-tape reader 纸带阅读器3. optical computer 光计算机4. neural network 神经网络5. instruction set 指令集6. parallel processing 并行处理7. difference engine 差分机8. versatile logical element 通用逻辑元件9. silicon substrate 硅衬底10. vacuum tube 真空管11. 数据的存储与处理 the storage and handling of data12. 超大规模集成电路 very large-scale integrated circuit13. 中央处理器 central processing unit14. 个人计算机 personal computer15. 模拟计算机 analogue computer16. 数字计算机 digital computer17. 通用计算机 general-purpose computer18. 处理器芯片 processor chip19. 操作指令 operating instructions20. 输入设备 input device1. function key 功能键,操作键,函数键2. voice recognition module 语音识别模块3. touch-sensitive region 触敏区4. address bus 地址总线5. flatbed scanner 平板扫描仪6. dot-matrix printer 点阵打印机(针式打印机)7. parallel connection 并行连接8. cathode ray tube 阴极射线管9. video game 电子游戏10. audio signal 音频信号11. 操作系统 operating system12. 液晶显示(器) LCD (liquid crystal display)13. 喷墨打印机 inkjet printer14. 数据总线 data bus15. 串行连接 serial connection16. 易失性存储器 volatile memory17. 激光打印机 laser printer18. 磁盘驱动器 disk drive19. 基本输入/输出系统 BIOS (Basic Input/Output System)20. 视频显示器 video display1. storage register 存储寄存器2. function statement 函数语句3. program statement 程序语句4. object-oriented language 面向对象语言5. assembly language 汇编语言6. intermediate language 中间语言,中级语言7. relational language 关系(型)语言8. artificial language 人工语言9. data declaration 数据声明10. Structured Query Language 结构化查询语言11. 可执行程序 executable program12. 程序模块 program module13. 条件语句 conditional statement14. 赋值语句 assignment statement15. 逻辑语言 logic language16. 机器语言 machine language17. 函数式语言 functional language18. 程序设计语言 programming language19. 运行计算机程序 run a computer program20. 计算机程序员 computer programmer1. inference engine 推理机2. system call 系统调用3. compiled language 编译执行的语言4. parallel computing 并行计算5. pattern matching 模式匹配6. memory location 存储单元7. interpreter program 解释程序8. library routine 库程序,程序库例行程序9. intermediate program 中间程序,过渡程序10. source file 源文件11. 解释执行的语言 interpreted language12. 设备驱动程序 device driver13. 源程序 source program14. 调试程序 debugging program15. 目标代码 object code16. 应用程序 application program17. 实用程序 utility program18. 逻辑程序 logic program19. 墨盒 ink cartridge20. 程序的存储与执行 program storage and execution1. system specification 系统规格说明2. unit testing 单位(或单元、部件)测试3. software life cycle 软件生命周期(或生存周期)4. system validation testing 系统验证测试5. evolutionary development process 演化开发过程6. linear model 线性模型7. program unit 程序单元8. throwaway prototype 抛弃式原型9. text formatting 正文格式编排,文本格式化10. system evolution 系统演变11. 系统设计范例 system design paradigm12. 需求分析与定义 requirements analysis and definition13. 探索式编程方法 exploratory programming approach14. 系统文件编制 system documentation15. 瀑布模型 waterfall model16. 系统集成 system integration17. 商用现成软件 commercial off-the-shelf (或COTS) software18. 基于组件的软件工程component-based software engineering (CBSE)19. 软件维护工具 software maintenance tool20. 软件复用 software reuse1. end user 最终用户,终端用户2. atomic operation 原子操作3. database administrator 数据库管理员4. relational database model 关系数据库模型5. local data 本地数据6. object-oriented database 面向对象数据库7. database management system (DBMS) 数据库管理系统8. entity-relationship model (ERM) 实体关系模型9. distributed database 分布式数据库10. flat file 平面文件11. 二维表 two-dimensional table12. 数据属性 data attribute13. 数据库对象 database object14. 存储设备 storage device15. 数据类型 data type16. 数据插入与删除 data insertion and deletion17. 层次数据库模型 hierarchical database model18. 数据库体系结构 database architecture19. 关系数据库管理系统relational database management system (RDBMS)20. 全局控制总线 global control bus1. file server 文件服务器2. carrier sense 载波检测,载波监听3. protocol suite 协议组,协议集4. peer-to-peer model 对等模型5. bus topology network 总线拓扑网络6. inter-machine cooperation 机器间合作,计算机间合作7. Ethernet protocol collection 以太网协议集8. proprietary network 专有网络9. utility package 实用软件包,公用程序包10. star network 星形网络11. 局域网 local area network (LAN)12. 令牌环 token ring13. 无线网络 wireless network14. 封闭式网络 closed network15. 环形拓扑结构 ring topology16. 客户机/服务器模型 client/server model17. 网络应用程序 network application18. 进程间通信 interprocess communication19. 打印服务器 print server20. 广域网 wide area network (WAN)1. cell phone 蜂窝电话,移动电话,手机2. IP address 网际协议地址,IP地址3. autonomous system 自主系统4. dial-up connection 拨号连接5. network identifier 网络标识符6. binary notation 二进制记数法7. mnemonic name 助记名,缩写名8. Internet-wide directory system 因特网范围的目录系统9. name server 名称服务器10. Internet infrastructure 因特网基础结构11. 助记地址 mnemonic address12. 网吧 cyber cafe13. 宽带因特网访问 broadband Internet access14. 顶级域名 top-level domain (TLD)15. 因特网编址 Internet addressing16. 点分十进制记数法 dotted decimal notation17. 因特网服务提供商 Internet service provider (ISP)18. 专用因特网连接 dedicated Internet connection19. 主机地址 host address20. 硬件与软件支持 hardware and software support1. server farm 大型机服务器2. access protocol 存取协议,访问协议3. storage area network 存储区域网(络)4. high-throughput computing 高吞吐(量)计算5. server cluster 服务器集群6. public cloud 公共云7. grid computing 网格计算8. security-aware cloud architecture 具有安全意识的云体系结构9. social networking 社交网络10. utility computing 效用计算11. 云计算提供商 cloud computing provider12. 存储芯片 memory chip13. 基于内部网的私有云 intranet-based private cloud14. 网络带宽 network bandwidth15. 混合云 hybrid cloud16. 磁盘阵列 disk array17. 软件即服务 Software as a Service (SaaS)18. 集群计算 cluster computing19. 虚拟化计算机资源 virtualized computer resources20. 多核处理器 multi-core processor1. backup system 备份系统2. encryption key (加密)密钥3. data confidentiality 数据机密性4. system vulnerability 系统脆弱性,系统脆弱之处5. unauthorized access 未经授权的访问,越权存取6. intrusion detection system 入侵检测系统7. after-action recovery 事后恢复8. software piracy 软件侵权9. authorized user 特许用户10. data unit 数据单元,数据单位11. 软件版本 software version12. 数据完整性 data integrity13. 系统崩溃 system crash14. 病毒检查软件 virus-checking software15. 综合安全策略 comprehensive security strategy16. 软件配置管理 software configuration management17. 故障隔离 fault isolation18. 统计数据库 statistical database19. 保密的加密算法 secure encryption algorithm20. 数据流 data stream1. mailing list 邮件发送清单,邮件列表2. proprietary software 专有软件3. cc line 抄送行4. bcc line 密送行5. forwarded e-mail message 转发的电子邮件6. e-mail convention 电子邮件常规7. click on an icon 点击图标8. confidential document 密件,秘密文件9. classified information 密级信息10. recovered e-mail message 恢复的电子邮件11. 常用情感符 commonly used emoticon12. 已删除电子邮件 deleted e-mail13. 电子系统 electronic system14. 附件行 Attachments line15. 版权法 copyright law16. 电子邮件网规 e-mail netiquette17. 信息高速公路 information superhighway18. 签名文件 signature file19. 电子数据表程序 spreadsheet program20. 文字处理软件 word processor1. customized marketing strategy 定制的营销策略2. B2G transaction 企业对政府交易3. dial-up modem 拨号调制解调器4. dot-com bust 网络不景气5. smart card 智能卡6. digital piracy 数字盗版7. dot-com boom 网络繁荣8. C2C transaction 消费者对消费者交易9. Web auction site 拍卖网站10. fingerprint reader 指纹读取器11. 射频识别装置 radio-frequency identification (RFID) device12. 电子数据交换 electronic data interchange (EDI)13. 库存管理技术 inventory management technology14. 知识产权 intellectual property15. 条形码 bar code16. 货币兑换 currency conversion17. 电子图书 electronic book18. 视网膜扫描仪 retina scanner19. 个人数字助理 personal digital assistant (PDA)20. 企业对企业电子商务 B2B electronic commerce。
计算机专业英语教程(第4版)全书译文
计算机专业英语教程(第4版)全书译文1We have learned that all computers have similar capabilities and perform essentially the same functions, although some might be faster than others. We have also learned that a computer system has input, output, storage, and processing components; that th e processor is the “intelligence” of a computer system; and that a single computer system may have several processors. We have discussed how data are represented inside a computer system in electronic states called bits. We are now ready to expose the inner workings of the nucleus of the computer system — the processor.我们已经知道,所有的计算机都具有相似的能力,并且在本质上执行相同的功能,尽管一些可能会比另一些快一点。
我们也知道,一个计算机系统具有输入,输出,存储和处理部件;处理器是一个计算机系统智能核心,并且一个计算机系统可以有许多个处理器。
我们已经讨论过如何在计算机系统内部,用被称作“位”的电子状态来表现数据,现在我们要弄明白计算机系统的核心,即处理器,的内在的工作方式。
The internal operation of a computer is interesting, but there really is no mystery to it. The mystery is in the minds of those who listen to hearsay and believe science-fiction writer. The computer is a nonthinking electronic device that has to be plugged into an electrical power source, just like a toaster or a lamp.计算机的内部操作很有意思,但确实没有什么神秘可言。
计算机专业英语的第四版课后习题翻译
中译英参考答案Unit 1A computer system consists of hardware system and software system. The hardware of the computer is usually divided into three major parts or three primary subsystems: the CPU, the memory subsystem, and the I/O subsystem.The CPU performs many operations and controls computer. The memory subsystem is used to store program being executed by the CPU, along with the program’s data. The I/O subsystem allows the CPU to interact with input and output devices such as the keyboard and monitor of a personal computer. The components of the computer are connected to the buses.The part of the computer that performs the bulk of data processing operations is called the central processing unit and is referred to as the CPU. In microcomputer, it is often called the microprocessor. The CPU is made up of three major parts: control unit, ALU, and register set.Memory is also known as internal memory or main memory. It refers to the circuits in the computer that hold whatever programs and data are available for immediate use by the CPU.I/O subsystem includes I/O devices and interface. There are a wide variety of I/O devices, such as mouse, printer, sensor, disk, and so on. Input-output interface provides a method for transferring information between internal storage and external I/O devices. Peripherals connected to a computer need special communication links for interfacing them with the CPU. The purpose of the communication link is to resolve the differences that exist between the central computer and each peripheral.Unit 2Storage hardware provides permanent storage of information and programs for retrieval by the computer. Hard disk drives store information in magnetic particles embedded in a disk. Usually a permanent part of the computer, hard disk drives can store large amounts of information and retrieve that information very quickly.Although fixed hard drive systems offer faster access and have a higher storage capacity than optical discs, optical disc systems use removable media – a distinct benefit. Optical discs – primary CDs and DVDs – are much more widely used than removable hard drive systems. They are the standard today for software delivery, as well as commonly used for storing high-capacity music and video files. There are also versions of both CD and DVD drives available for home audio and home theater use. Optical discs are commonly referred to as compact discs.CD and DVD discs are read by CD and DVD drives. The speed of a CD or DVD drive is rated as 24x, 32x, 36x, and so on. These labels describe how fast the drive is compared to the first version of that drive. For example, a 36x drive is 36 times the speed of the baseline unit that was originally manufactured.Most optical discs have a title and other text printed only on one side and they are inserted into the drive with the printed side facing up. When inserting such a CD or DVD, be careful not to get dirt, fingerprints, scratches, or anything else that might hinder light reflectivity on the disc’s surface.Unit 3(a) A program is a list of instructions or statements for directing the computer to perform a required data processing task. Programming is a multistep process for creating that list of instructions.(b) It is important to understand the difference between a class and an object of that class. A class is simply a specification for creating objects. Thus, a single class may create multiple objects.(c) Java is an object-oriented, network-friendly high-lever programming language that allows programmers to build applications that can run on almost any operating system.(d) ActiveX is a set of controls, or reusable components that enables programs or content of almost any type to be embedded within a Web page. Whereas a Java must be downloaded each time you visit a Web site, with ActiveX the component is downloaded only once, then stored on your hard disk for later, repeated use.(e) Programming involves a great deal of creativity. The design is guide to the function or purpose of each component, but the programmer has great flexibility in implementing the design as code. No matter what language is used, each program component involves at least three major aspects: control structures, algorithms, and data structures.Unit 4The software system can be divided into two broad categories: application software and system software. Application software consists of the program for performing tasks particular to the machine’s utilization. In contrast to application software, system software comprises a large number of programs. These programs start up the computer and function as the principle coordinator of all hardware components and application software. Without system software loaded into RAM of your computer, your hardware and application software are useless.System software can be grouped into three basic parts: operating system, utility software, and language translators. The majority of an installation’s utility software consists of programs for performing activities that are fundamental to computer installations yet not included in the operating system. In a sense, utility software consists of software units that extend the capabilities of the operating system.A computer’s OS is the main collection of programs that manage its activities.The primary chores of an OS are management and control. The OS ensures that all actions requested by a user are valid and processed in an orderly fashion. It also manages the computer system’s resources to perform these operations with efficiency and consistency.Application software is the software designed to help you solve problems specific to business or perform specific business tasks. Application software then is the layer of software closest to you. Basically, there are four categories of application software: productivity software, business and specialty software, entertainment software and education/reference software.Unit 5A computer network is often classified as being either a local area network (LAN), a metropolitan area network (WAN), or a wide area network (WAN). The connection of two or more networks is called an internetwork. The worldwide Internet is a well-known example of an internetwork.LANs are privately owned networks within a single building or campus of up to a few kilometers in size. They are widely used to connect personal computers and workstations in company offices and factories to share resources and exchange information.In general, a given LAN will use only one type of transmission medium. Various topologies are possible for LANs. The most common LAN topologies are bus, ring and star.A MAN is basically a bigger version of a LAN and normally uses similar technology. MAN is designed to extend over an entire city. It may be a single network such as a cable television network, or it may be a means of connecting a number of LANs into a large network so that resources may be shared LAN-to-LAN as well as device-to-device. For example, a company can use a MAN to connect the LANs in all of its offices throughout a city.A W AN spans a large geographical area that may comprise a country, a continent, or even the world. It provides long-distance transmission of data, voice, image, and video information over large geographical area.In contrast to LANs, W ANs may utilize public leased, or private communication devices, usually in combinations, and can therefore span an unlimited number of miles.Unit 6Transmission media are used to transfer messages over a network. For instance, the transmission media used in a network may be a privately owned set of cables, the public phone lines, or a satellite system. Transmission media can either be wired or wireless.The three types of wired media most commonly used to carry messages are twisted-pair wire, coaxial cable, and fiber-optic cable. One of the most successful developments in transmission media in recent years has been fiber optics. Fiber-optic cable is commonly used for the high-speed backbone lines of a network, or for Internet infrastructure.Wireless transmission media have become especially popular in recent years. They support communications in situations in which physical wiring is impractical or inconvenient, as well as facilitate mobility. Wireless media are commonly used to connect devices to a network, to share information between computers, to connect wireless mice to a computer, and for handheld PCs, wireless phones, and other mobile devices. Radio signals transferred through the air are the heart of most types of wireless media. In addition to conventional broadcast radio application, the microwave, cellular, and satellite transmission media also use radio signals to transmit data.Radio transmissions require the use of a transmitter to send the radio signals through the air. A receiver (usually containing some type of antenna) accepts the date at the other end. When a device functions as both a receiver and transmitter, it is commonly called a transceiver or transmitter-receiver.Unit 7(a) Since many database systems users are not computer trained, developers hide the complexity from users through several levels of abstraction, to simplify user’s interactions with the system: physical level, logical level, and view level.(b) A database schema is specified by a set of definitions expressed by a special language called a data-definition language (DDL). The result of compilation of DDL statements is a set of tables that is stored in a special file called data dictionary, or data directory.(c) The structured query language (SQL) is the most widely used and standard query language for relational database management systems. It is a kind of non-procedural language.(d) An entity is a “thing” or “object” in the real world that is distinguishable from other objects. For example, each person is an entity, and bank accounts can be considered to be entities. Entities are described in a database by a set of attributes.(e) Data warehouse is one of the newest and hottest buzzwords and concepts in the IT field and the business environment. A data warehouse is a logical collection of information——gathered from many different operational databases——that supports business analysis activities and decision-making tasks.Unit 8Animation is the term used to describe a series of graphical images that are displayed one after the other to simulate movement. Cartoons on television are one example of animation.Video differs from animation in that it usually begins as a continuous stream of visual information that is broken into separate images or frames when the video is recorded. When the frames are projected—typically at a rate of 30 frames per second—the effect is a smooth reconstruction of the original continuous stream of information. As you might imagine, at 30 frames per second, the amount of data involved in displaying a video during a multimedia presentation can require a substantial amount of storage space. Consequently, video data—like audio data—is often compressed. A variety of compression standards exist. Some of the most common video file formats are .avi, .mpeg, .mov, .rm.For multimedia presentation, video may be recorded using a standard (analog) video camera and then converted to digital form as it is input into a computer. Alternatively, the film can be recording digitally using a digital video camera. Streaming video is frequently used on Web pages to reduce file size. Similar to streaming audio, Streaming video files can begin playing once a portion of the video has been downloaded.Unit 9(a) AI is currently being applied in business in the form of knowledge systems, which use human knowledge to solve problems. The most popular type of knowledge-based system is the expert system. An expert system is a computer program that attempts to represent the knowledge of human experts in the form of heuristics. The term heuristic is derived from the same Greek root as the word eureka, which means “to discover”.(b) The user interface enables the manager to enter instructions and information into the expert system and to receive information from it. The instructions specify the parameters that guide the expert system through its reasoning processing. The information is in the form of values assigned to certain variables.(c) The knowledge base contains both facts that describe the problem area and knowledge representation techniques that describe how the facts fit together in a logical manner. The term problem domain is used to describe the problem area.(d) An expert system, also called a knowledge-based system, is an artificial intelligence system that applies reasoning capabilities to reach a conclusion. Expert systems are excellent for diagnostic and prescriptive problems.(e) The DSS is not intended to replace the manager. The computer can be applied to the structured portion of the problem, but the manager is responsible for the unstructured portion——applying judgment or intuition and conducting analyses.Unit 10The linked list (see figure 1) consists of a series of nodes, which are not necessarily adjacent in memory. Each node contains the element and a link to a node containing its successor. We call this the next link. The last cell’s next link references null.To execute printList or find(x) we merely start at the first node in the list and then traverse the list by following the next links. This operation is clearly linear-time, as in the array implementation, although the constant is likely to be larger than if an array implementation were used. The findKth operation is no longer quite as efficient as an array implementation; findKth(i) takes O(i) time and works by traversing down the list in the obvious manner. In practice, this bound is pessimistic, because frequently the calls to findKth are in sorted order (by i). As an example, findKth(2), findKth(3), findKth(4), and findKth(6) can all be executed in one scan down the list.The remove method can be executed in one next reference change. Figure 2 shows the result of deleting the second element in the original list.The insert method requires obtaining a new node from the system by using a new call and then executing two reference maneuvers. The general idea is shown in figure 3. The dashed line represents the old next reference.Unit 11(a) A set is pure if all of its members are sets, all members of its members are sets, and so on. For example, the set containing only the empty set is a nonempty pure set.(b) A language is a describable set of finite strings, drawn from a fixed alphabet. A grammar is one way to "describe" the language. The grammar consists of a finite list of rules, where each rule replaces one substring with another. The string on the left must contain at least one nonterminal. The first string "produces" or "generates" the second. Thus a rule is also called a production.(c) A finite-state machine (FSM) or finite-state automaton(FA)is a mathematical abstraction sometimes used to design digital logic or computer programs. It is a behavior model composed of a finite number of states, transitions between those states, and actions, similar to a flow graph in which one can inspect the way logic runs when certain conditions are met.(d) Sometimes it is inconvenient or impossible to describe a set by listing all of its elements. Another useful way to define a set is by specifying a property that the elements of the set have in common. The notation P(x) is used to denote a sentence or statementP concerning the variable object x. The set defined by P(x) written {x | P(x)}, is just a collection of all the objects for which P is true.Unit 12(a) Because drawings are typically displayed in 3D, CAD is especially helpful in designing automobiles, aircraft, ships, buildings, electrical circuits (including computer chips), and even clothing.(b) Computer-integrated manufacturing (CIM) is the manufacturing approach of using computers to control the entire production process. This integration allows individual processes to exchange information with each other and initiate actions. Through the integration of computers, manufacturing can be faster and less error-prone, although the main advantage is the ability to create automated manufacturing processes.(c) In addition to supporting decision making, coordination, and control, information system may also help managers and workers analyze problems, visualize complex subjects, and create new products.(d) Knowing the history and evolution of ERP is essential to understanding its current application and its future developments.(e) In addition to monitoring operational activities such as tracking the status of orders and inventory levels, enterprise system also improve organization-wide reporting and decision making.Unit 13(a) There are a wide variety of educational application programs available. Educational software is designed to teach one or more skills, such as reading, math, spelling, a foreign language, world geography, or to help prepare for standardized tests.(b) Electronic business (e-business) is the use of information technology and electronic communication networks to exchange business information and conduct transactions in electronic, paperless form.(c) Word processing software allows you to use computers to create, edit, store, and print documents. You can easily insert, delete, and move words, sentences, and paragraphs——without ever using an eraser.(d) What is a spreadsheet? Spreadsheet software takes its name from the accountant’s columnar worksheet, which it imitates. A spreadsheet is a worksheet consisting of a collection of cells formed by the intersection of rows and columns. Each cell can store one piece of information: a number, word or phrase, or formula.Unit 14(a) A geographic information system (GIS) is a system that captures, stores, analyzes, manages and presents data with reference to geographic location data. In the simplest terms, GIS is the merging of cartography, statistical analysis and database technology.(b) The GPS receiver uses the messages it receives to determine the transit time of each message and computes the distance to each satellite. These distances along with the satellites' locations are used to compute the position of the receiver. This position is then displayed, perhaps with a moving map display or latitude and longitude; elevation information may be included.(c) Virtual reality (VR) is a term that applies to computer-simulated environments that can simulate physical presence in the real world. Most current virtual reality environments are primarily visual experiences, displayed either on a computer screen or through special stereoscopic displays, but some simulations include additional sensory information, such as sound through speakers or headphones.Unit 15(a) The software development process is sometimes called the software development life cycle (SDLC), because it describes the life of a software product from its conception to its implementation, delivery, use, and maintenance.(b) How can the CMM help your organization? There are three key roles the CMM plays. First, the CMM helps build an understanding of software process by describing the practices that contribute to a level of process maturity. The second role of the CMM is to provide a consistent basis for conducting appraisals of software processes. The CMM’s third key role is to serve as a blueprint for software process improvement.(c) The UML offers a standard way to write a system’s blueprints, including conceptual things such as business processes and system functions as well as concrete things such as programming language statements, database schemas, and reusable software components. The UML represents a collection of the best engineering practices that have proven successful in the modeling of large and complex systems.(d) Object modeling is a technique for identifying objects within the system environment and the relationships between those objects. The object-oriented approach to system development is based on several concepts, such as object, attribute, behavior, encapsulation, class, inheritance, polymorphism, persistence, etc.Unit 16“Security” is an all-encompassing term that describes all the concepts, techniques, and technologies to protect information from unauthorized access. There are several requirements for information security.Confidentiality: hiding data, usually with encryption, to prevent unauthorized viewing and access.Authenticity: the ability to know that the person or system you are communicating with is who or what you think it is.Access control: once a person or system has been authenticated, their ability to access data and use systems is determined by access controls.Data integrity: providing assurance that an information system or data is genuine.Availability: making sure that information is available to users in a secure way.To prevent unauthorized access, some type of identification procedure must be used. These vary from passwords to physical access object (access cards, etc.) to biometric devices that verify some type of personal characteristic, such as a fingerprint.Some of the most secure access control systems address both identification and authentication. Identification involves verifying that the person’s name or other identifying feature is listed as an authorized user; authentication refers to determining whether or not the person is actually who he or she claims to be.Unit 17A distributed system is a collection of independent computers which appear to the users of system as a single computer. Nearly all large software systems are distributed. For example, enterprise-wide business systems must support multiple users running common applications across different sites.A distributed system encompasses a variety of applications, their underlying support software, the hardware they run on, and the communication links connecting the distributed hardware. The largest and best-known distributed system is the set of computers, software, and services comprising the World Wide Web, which is so pervasive that it coexists with and connects to most other existing distributed systems. The most common distributed systems are networked client/server systems. Distributed systems share the general properties described below.●Multiple nodes●Message passing or communication●Resource sharing●Decentralized control●Concurrency or parallelism●Fault tolerance●Heterogeneity●OpennessDistributed systems have many inherent advantages, especially over centralized systems. Some applications are inherent distributed as well. In general, distributed systems:●Yield higher performance●Allow incremental growth●Allow one user to run a program on many different machines in parallel ●Provide higher reliability● .●●。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
从法律上讲,你通过雇主的计算机网络发送的任何电子 邮件都属于雇主。因此,你的雇主有权阅读你的电子邮 件而无需你知道或得到你的允许。另外,删除的电子邮 件可从公司的服务器上恢复,而且它们可用于法律案件。
11
Cyberculture— Introduction
Increasingly, harassment and discrimination cases hinge on evidence found in e-mails. Careless e-mails about personal relationships or appearances can be saved and used against the sender in a court case. Indiscreet comments about gender, race, or sexual orientation can also have unexpected consequences. Your "harmless" dirty jokes sent to your coworkers might end up being used by a lawyer to prove that you are creating a "hostile workplace environment."
Cyberculture— Introduction
You should also keep in mind that legal constraints shape how e-mail is used in the workplace. E-mail, like any other written document, is protected by copyright law. So, you need to be careful not to use e-mails in any way that might violate copyright law. For example, if you receive an e-mail from a client, you cannot immediately post it to your company's website without that client's permission.
是 否 得分 你会收发消息吗? 你会转发文档给他人吗? 你会收发附件吗? 你把电子邮件分类整理到文件夹中吗? 你会把一封电子邮件发给多个人吗? 得分(是) 8~10分 专家级 7~8分 熟练级 5~6分 入门级 0~5分 需要努力
4
Cyberculture— Introduction
? Have you created and used a signature file
Cyberculture— Introduction
Yes No Score Can you receive and send messages? Yes Marks Can you forward documents to others? Expert 8-10 Can you receive and send attached documents? Achiever 7-8 Do you sort your e-mail messages into folders? Beginner 5-6 Can you send one e-mail message to multiple people? Get to Work 0-5
你还应该记住,法律约束对在工作场所如何使用电子邮件具有决定 性作用。像任何其他的书面文档一样,电子邮件受版权法保护。因 此,你得小心,不要以可能触犯版权法的任何方式使用电子邮件。 例如,如果你收到一位客户的电子邮件,在没有得到该客户允许的 情况下,你不能将电子邮件马上发布到你公司的网站上。
9
Cyberculture— Introduction
Legally, any e-mail you send via the employer's computer network belongs to the employer. So, your employers are within their rights to read your e-mail without your knowledge or permission. Also, deleted e-mails can be retrieved from the company's servers, and they can be used in a legal case.
5
Cyberculture— Introduction
E-mail is a form of public communication — — Your readers can purposely or mistakenly send your e-mail messages to countless others. So, you should not say things with e-mail that you would not say openly to your supervisors, coworkers, or clients.
Also, lawyers and courts treat e-mail as written communication, equivalent to a memo or letter. For example, much of the antitrust case against Microsoft in the late 1990s was built on recovered e-mail messages in which Bill Gates and other executives chatted informally about aggressively competing with other companies.
还有,律师和法庭把电子邮件视为书面通信,将其等同 于备忘录或信函。例如,20世纪90年代末针对微软的反 垄断案在很大程度上就是以恢复的电子邮件为根据的; 在这些电子邮件中,比尔· 盖茨和其他经营主管人员非正 式地聊到与其他公司展开大胆有力的竞争。 10
Cyberculture— Introduction
电子邮件越来越正式——过去,读者会原谅电子邮件 中的打字错误、拼写错误以及失礼,特别是在电子邮件 刚出现并难以使用的时候。今天,读者期待电子邮件更 为正式,能够显示出对其他交流形式所期待的质量。
7
Cyberculture— Introduction
E-mail standards and conventions are still being formed——How e-mail should be used in the workplace is still being worked out. People hold widely different views about the appropriate (and inappropriate) use of e-mail. So, you need to pay close attention to how email is used in your company and your reader’s companies. Many companies are developing policies explaining how e-mail should be used. If your company has a policy on e-mail usage, you should read it and follow it.
电子邮件标准和常规还在形成中——电子邮件在工作场所应该如何使用,这
一点还在探索中。关于电子邮件的适当(以及不适当)使用,人们持有相差甚远 的看法。因此,你需要密切关注在你的公司和你读者的公司中电子邮件是如何使 用的.许多公司正在制订阐述如何使用电子邮件的政策.如果你的公司制定有关于 电子邮件使用的政策,你应该阅读并遵循该政策。 8
UNIT 11
Section A Using E-Mail
Cyberculture (计算机文化)
1
I. Introduction E-mail is an electronic system for sending and receiving messages and files over a computer network. Compared to the phone or paper-based documents, e-mail is still relatively new in the workplace. When you are using email, here are a few guidelines to keep in mind:
你已经创建和使用签名文件了吗? 你加入任何邮件讨论组(新闻组)了吗? 你知道什么是在邮件讨论组中争论吗? 你知道什么是垃圾邮件吗? 你知道什么是网规吗?
Are ng lists (listservs)? you know what flaming is? you know what spam is? you know what netiquette is?
Cyberculture —Introduction
I. 引言 电子邮件是通过计算机网络收发消息及文件的一种电子 系统。不过,与电话或纸质文档相比,电子邮件在工作 场所中仍属于比较新的事物。这里有几条使用电子邮件 2 时需记住的指导原则:
Cyberculture—Introduction
● E-mail is increasingly used for professional purposes --Not long ago, e-mall was considered a secondary form of communication. It was spontaneous and chatty, used mostly for quick comments or nonessential information. Today, e-mail is a principal form of communication in most workplaces, so people expect e-mail messages to be professional and nonfrivolous 电子邮件越来越多地用于专业目的——不久以前,电子 邮件还被视为一种次要的交流形式。那时,它自然并具 有聊天式的风格,大多用于表达未加深思的意见或传递 不重要的信息。今天,电子邮件在大多数工作场所已成 为一种主要的交流形式。因此,人们期待电子邮件具有 3 专业性,不轻薄琐屑。 Spontaneous:adj自发的, 天真率直的,