计算机专业英语第七章
计算机专业英语及翻译Unit 7
Unit 7 The Fundamentals of ComputerSoftwareText 1 Data StructureA data structure is a data type. Its values are composed of component elements that are related by some structure.Since a data structure is a data type, it has a set of operations on its values. In addition, there may be operations that act on its component elements. The operations of a structured data type might not only act on the values of the data type, they might also act on component elements of the data structure.The data type’s arrays and record s are native to many programming languages. By using the pointer data type and dynamic memory allocation, many programming languages also provide the facilities for constructing linked structures. The first two higher-level abstract data types are stacks and queues. They are extremely important to computing.A stack is a data type. Its major attributes are the way the insertion and deletion of its elements. The only element that can be deleted or removed is the one that was inserted most recently. Such a structure is said to have a last-in/first-out (LIFO) behavior.Queues are familiar to us. The line of people waiting for service at a bank is an example of queues. The main feature of queues is that they follow a first-come/first-served rule. In queues, the earliest element inserted is the first served. In social settings, the rule appeals to our sense of equality and fairness.There are many applications of the first-in/first-out (FIFO) protocol of queues in computing. For example, the line of I/O requests waiting for access to a disk drive might be a queue. The line of computing jobs waiting to be run on a computer system might also be a queue.参考译文数据结构数据结构是一种数据类型,其值是由通过某种结构相互关联的组成元素所构成的。
计算机英语课件Unit 7 Computer Communications
Section A Telecommunications and Computer
Telecommunications allows people around the world to contact one another, to access information instantly, and to communicate from remote areas. Telecommunications usually involves a sender of information and one or more recipients linked by a technology, such as a telephone system, that transmits information from one place to another.Telecommunications devices converts different types of information, such as sound and video, into electronic signals. The signals can then be transmitted by means of media such as telephone wires or radio wns begin with messages that are converted into electronic signals. The signals are then sent over a medium to a receiver, where they are decoded back into a form that the person receiving the message can understand. There are variety of ways to create and decode signals, and many different ways to transmit signals.
计算机专业英语课件E1Unit07
• ___2. Each data package must take the same path over the network while traveling from the sending computer to the receiving computer.
______4. A networking standard for very short-range wireless connections; the devices are automatically connected once they get within the allowable range
______5. A network in which there are multiple connections between the devices on the network so that messages can take any of several possible paths
1.1 Section A: OSI Reference Model: The Driving Force behind Network Communications
• Today there are actually several versions of Ethernet, reflecting advances in technology and higher transfer rates. All, however, share common traits that characterize the Ethernet family. Among these are the format in which data are packaged for transmission, the use of Manchester encoding (a method of representing 0s and 1s in which a 0 is represented by a descending signal and a 1 is represented by an ascending signal) for the actual transmission of bits, and the use of CSMA/CD for controlling the right to transmit.
计算机英语 unit7
• The process of telecommunications • convert information into electronical signals; • send the signals over a medium to a receiver; • receiver decode the signal into a form that can be understand by receiver.
Phrases
Abbreviations
• ISDN 综合业务数字网 Integrated Services Digital Network • DSL 数字用户线路 Digital Subscriber Line
Text and Notes
• Please read the book and listen to teacher carefully!
• The way in Which telecommunications messages can be sent • from one single sender to one receiver (point-to-point)fax message; • from one single sender to many receiver (point-to-multipoint)broadcast.
Homework
• Do exercises of section A; • Read tion B and section C independently
• Wireless Communication Technologies: • cordless phones,cellular radio telephones,walkie-talkies,citizens band radios,pagers,and satellites.
《计算机专业英语》谢希仁第二版-第7章讲义
Requirements:
1. The origins of the programming languages 2. The concepts of computer compilers 3. Main properties of object-orientation 4. 掌握复杂定语从句的翻译技巧
Abbreviations:
OOPL (object-oriented programming language) 面向对 象的程序设计语言
7.1 Introduction to Programming Language
A programming language represents a special vocabulary and a set of grammatical rules for instructing a computer to perform specific tasks. Broadly speaking, it consists of a set of statements or expressions understandable to both people and computers.
近来出现的新的程序设计语言,像C++,微软的Visual C++, Visual Foxpro,和Visual Java,他们都支持面向对象的程 序设计(OOP)技术。OOP这种程序设计要求编程人员不 仅要给出数据结构中的数据类型的定义,还需要给出作用 在这些数据结构之上的操作(函数,或方法)的类型。
程序设计语言是指令计算机实现某些具体任务的一套特殊词汇和一组语法 规则。从广义的角度说,它包括一组既能被人所理解又能被计算机所识别 的声明和表达式。
计算机专业英语Unit7
• ARPAnet • NSF • www • URL • Newsgroup • WAN • TCP/IP • SMTP • POP • NNTP
Signature encryption LAN FTP search engine C/S web page website hacker confidential data
Unit 7 Section 2 Passage A
•
The Internet, originally the ARPAnet (Advanced Research Projects Agency network), began as a military computer network in 1969. Other government agencies and universities created internal networks based on the ARPAnet model. The catalyst for the Internet today was provided by the National Science Foundation (NSF). Rather than have a physical communications connection from each institution to a supercomputing center, the NSF began a “chain” of connections in which institutions would be connected to their “neighbor” computing centers, which all tied into central supercomputing centers. This beginning expanded to a global network of computer networks, which allows computers all over the world to communicate with one another and share information stored at various computer “servers,” either on a local computer or a computer located anywhere in the world. The Internet is not governed by any official body, but there are organizations which work to make the Internet more accessible and useful.
Computer English Unit 7 Computer Communications(计算机英语 第七单元 计算机通信)
UNIT 7 Computer Communications===第七单元:计算机通信Section A Telecommunications and Computers===课文A:电信与计算机Telecommunications allows people around the world to contact one another, to access information instantly, and to communicate from remote areas.===电信使世界各地的人们得以互相联系,即刻获取信息,并从边远地区实施通信。
Telecommunications usually involves a sender of information and one or more recipients linked by a technology, such as a telephone system, that transmits information from one place to another.===电信通常涉及一个信息发送者和一个或多个接收者,他们通过电话系统等把信息从一地发送到另一地的技术相联系。
Telecommunications devices convert different types of information, such as sound and video, into electronic signals.===电信设备将不同类型的信息,如声音和图像,转换成电子信号。
The signals can then be transmitted by means of media such as telephone wires or radio waves.===然后,这些信号就可以通过电话线或无线电波等媒介进行发送。
When a signal reaches its destination, the device on the receiving end converts the electronic signal back into an understandable message, such as sound over a telephone, moving images on a television, or words and pictures on a computer screen.===信号到达目的地后,接收端的设备将电子信号转换回可以理解的信息,如电话中的声音、电视上的活动图像或计算机屏幕上的文字和图片。
计算机专业英语Chapter7
Notes
Although these protocols give the data link layer more freedom about the order in which it may send and receive frames, we have definitely not dropped the requirement that the protocol must deliver packets to the destination network layer in the same order they were passed to the data link layer on the sending machine.
尽管这些协议使得数据链路层在发送和接收帧的顺序上有了更 多的自由,但是我们绝对没有放弃对此的要求,即协议发送包 到目的地网络层的顺序必须和它们在发送方传到数据链路层的 顺序一致。
Reading Material 1 IPV6
Introduction IPv6 Network Architecture IPv6 Communication Fundamentals Internetwork Communications
n.拓扑结构 n.布局 n.合成物 n.以太网络 n.中继器 令牌环 骨干网络 n.协议
Key Words
coaxial fault tolerance concentrator unshielded twisted pair
adj.同轴的 误差,错误范围(容许值) n.集线器 屏蔽双绞线
Reading Material 2 Router
《计算机专业英语》电子教案-第7章
计算机专业英语
7-5
Chapter 7 Programming Languages
计算机专业英语
7-3
Chapter 7 Programming Languages
7.1 Computer Languages
New Words & Expressions:
evolution n. 发展,演变 appropriating 适当的 compiler 编译器 invoke 调用 cryptic 秘密(含义模糊)的 prompt n.提示符 primitive 原始的, interpreter 解释程序 intermediary 中间的 premium 额外费用,奖金 esoteric 深奥的
计算机专业英语
7-9
Chapter 7 Programming Languages
7.2 Object-Oriented Programming
While computers, the hardware, underwent revolution after revolution, using faster and ever more powerful components, the software technology has significantly lagged behind in matching these advances. Hardware technology has been revolutionized several times: from tubes to discrete transistors, resistors and capacitors to board-level integration to integrated circuits. Even integrated circuits have undergone several significant evolutionary steps: from large-scale integration (LSI) technology to very large scale integration (VLSI), and eventually wafer scale integration. Hardware engineering was able to keep up with this pace by developing new techniques to manage the exploding complexity of a
计算机专业英语07 Multimedia
[2]By now you should agree that multimedia isn't any one thing, but a complex entity that involves many things: hardware, software, and the interface where they meet. 第一个that 引导宾语从句作agree的宾语,表示陈 述同意的观点。第二个that引导定语从句,修饰a complex entity。hardware, software, and the interface where they meet 是many things的同位语, 解释many things。where引导定语从句修饰the interface。 not…but…不是……而是……连接两个并列比较的内容。 译文:至少现在你得认同一个观点:多媒体不只是 一件东西,而是包括许多东西的复杂的组合:硬件、软 件和这两者的交互界面。
Figure 7-1 Multimedia
ห้องสมุดไป่ตู้
Yeah, sure. With multimedia, you don 't have to be a passive recipient. You can control. You can interact. You can make it do what you want it to do [3]. It means you can tailor a multimedia presentation to your own needs. You can cut through the chaff and dig directly into the important data in a report, pull together reports and video clips from around the world that interest you. That's the strength of multimedia and what distinguishes it from traditional media like books and television.
计算机专业英语(2008影印版)第七章全文翻译
第七章P181Introduction你如何获取数据到CPU?你如何获得信息?在这里,我们描述了一个最重要的地方与人的计算机接口。
我们输入文字,音乐,甚至讲话,但我们可能从来没有想过我们输入计算机进程之间的关系。
人们理解的语言,它是由字母,数字和标点符号构建。
然而,计算机可以理解只有0和1的二进制的机器语言。
输入设备基本上都是翻译。
输入设备转换数字,字母和行动的人理解成计算机能够处理的形式。
你有没有想过如何处理系统单位的信息转换成一种形式,您可以使用吗?这是输出设备的作用。
虽然输入设备转换系统单元可以处理成什么了解,转换系统的单位处理,我们可以理解成一种输出设备。
输出设备转换成字母,数字,声音,图像,人们可以理解的机器语言。
主管最终用户需要了解最常用的输入设备,包括键盘,鼠标,扫描仪,数码相机,数字化片,语音识别,和MIDI设备。
此外,他们还需要了解最常用的输出设备,包括显示器,打印机和音频输出设备。
和最终用户的需要,要注意组合的输入和输出设备,如传真机,多功能设备,互联网电话和终端。
P182What is inout?输入任何数据或由计算机使用的指令。
他们可以直接从你或从其他来源。
您提供的输入,只要您使用的系统或应用程序。
例如,当使用字处理课程一,你输入的字母和数字的形式和问题,如保存和打印文件中的数据。
所指向的项目,您还可以输入数据,并发出命令,用你的声音。
输入其他来源包括扫描或拍摄的图像。
硬件,输入设备是用来翻译,文字,声音,图像和行动的人了解该系统的单位可以处理成一种形式。
例如,使用字处理器时,您通常使用键盘输入文字和鼠标发出的命令。
除了键盘和鼠标,还有各种各样的其他输入设备。
这些措施包括指向,扫描,图像采集,数字化,音频输入设备。
Keyboard enter通过键盘输入数据,最常见的方式之一。
正如第六章所讲的,键盘转换成数字,字母和特殊字符人们理解成电信号。
这些信号发送,处理,系统单位。
计算机专业英语chapter7
II. Grammatical Notes to the Text
1. Application software is the software designed to help you solve problems specific to business or perform specific business tasks.
该句中single-spaced, justified, and with 1-inch right and left margins 为 后 置 定 语 修 饰 句 子 宾 语 a document。unless引导一个条件状语从句,后接 一个由which引导的非限制性定语从句修饰它。 其中,which指代you alter these default settings。
by keystroke commands和by “clicking”…是并列 的结构,表明打开下拉菜单的方法。后一种方 法的描述中,while和when两个表时间的连接 词指明了操作过程的先后顺序。
II. Grammatical Notes to the Text
5. Toolbars: a toolbar is a row of onscreen buttons, usually appearing immediately below the menu bar, used to activate a variety of functions of the applications program.
Computer Science in English
Teaching Assisted Courseware
Instructor: Fu xiaowei School of Computer Science & Technology Wuhan University of Science & Technology fxwteaching@ 2009.11
计算机专业英语Chapter007
Multiple Choice Questions1. Hard disks store and organize files using all the following, except:A. tracksB. sectorsC. cylindersD. paths2. Which of the following is true about an internal hard disk?A. Variable amount of storageB. Fixed amount of storageC. PortableD. Slow3. On a hard disk each track is divided into invisible wedge-shaped sections called:A. bitsB. plattersC. cylindersD. sectors4. The hard disk's disk surface is scratched and some or all of the data is destroyed when there is a:A. head crashB. cylinder crashC. track crashD. sector crash5. Which of the following is not an example of secondary storage?A. External hard drivesB. RAIDC. RAMD. Flash drives6. An external hard disk:A. is heavy.B. is hard to remove.C. cannot be used in addition to an internal hard disk.D. usually connects to a USB or FireWire port.7. Storage that retains its data after the power is turned off is referred to as:A. volatile storage.B. sequential storage.C. direct storage.D. nonvolatile storage.8. The process of accessing information from secondary storage devices is referred to as:A. backing up.B. restoring.C. writing.D. reading.9. The ____ of a secondary storage device indicates how much data the storage medium can hold.A. accessB. capacityC. memoryD. storage10. Which of the following measures the amount of time required by the storage device to retrieve data and programs?A. Nonvolatile mediaB. CapacityC. Access speedD. RAM11. One way to improve the storage capacity of a hard disk is to:A. format often.B. use file compression.C. increase memory.D. use disk caching.12. This process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU.A. Data compressionB. Data accessC. Disk cachingD. RAID13. Which of the following characteristics about RAID is incorrect?A. expanded storage capabilityB. fast access speedC. highly reliableD. one high-capacity hard disk drive14. Three ways to improve the performance of a hard disk include:A. disk caching, RAID, and file expansion.B. file compression, disk caching, and file encryption.C. disk caching, RAID, and file compression.D. RAID, file compression and disk expansion.15. Which of these is not an example of solid state storage?A. Digital versatile discB. SSDsC. Flash memory cardsD. USB drives16. Smartphones use which of these storage technologies?A. Optical driveB. Solid state driveC. Flash memory cardD. Flash drive17. Optical discs use these to represent data.A. Analog signalsB. Magnetic chargesC. Pits and landsD. Laser beams18. A CD-RW disc:A. can be written to only once.B. can be erased and rewritten.C. cannot be written on.D. cannot be erased.19. All of the following are true of DVD-ROM drives except:A. They are also known as erasable optical discs.B. They can provide over two hours of high-quality video and sound comparable to that found in motion picture theatres.C. They are a type of optical disc.D. DVD-ROM stands for "digital versatile disc–read only memory".20. The standard for high definition optical discs is:A. DVD-RAMB. HD DVDC. Blu-rayD. HD CD21. These discs have a capacity of 50 gigabytes on one side.A. HD DVDB. CDC. DVDD. Blu-Ray22. Solid-state storage devices are different than hard disks in that they:A. have no moving parts.B. have a higher capacity.C. have greater access speed.D. are volatile.23. What is it called when servers on the Internet supply applications as a service, rather thana product?A. Digital versatile computingB. Service computingC. Cloud computingD. Optical computing24. This allows you to upload and store documents on the Internet.A. Cloud storageB. Flash driveC. Solid State storageD. Hard Disk drive25. Which of these is not a mass storage device?A. RAID systemB. File serverC. Optical discD. Organizational cloud storageTrue / False Questions26. Media are the actual physical material that holds the data and programs.True False27. The process of saving information to a secondary storage device is referred to as embedding.True False28. Secondary storage provides temporary or volatile storage.True False29. Hard disks use tracks, sectors, and cylinders to store and organize files.True False30. A smoke particle, fingerprint, dust, or human hair could cause a hard disk head crash. True False31. A hard crash typically occurs on an optical disk when it makes contact with particles on its surface.True False32. External hard drives are used primarily to complement an internal hard disk.True False33. External hard disks use different technology than internal hard disks.True False34. Disk caching improves hard-disk performance by compressing files.True False35. Disk caching uses a combination of hardware and software.True False36. RAID connects several inexpensive hard-disk drives to one another.True False37. File compression is only available on hard disk drives.True False38. CD-ROMs are often used to archive data and to record music downloaded from the Internet.True False39. DVDs have replaced CDs as the standard optical disc.True False40. Blu-ray Discs are the high definition standard and have a far greater capacity than DVDs. True False41. Facebook is an example of cloud storage.True False42. If you have used Google Docs to create a word processing document, you have used cloud computing.True False43. In order to access your documents and files that are stored in the cloud, you must have an Internet connection.True False44. Mass storage devices are specialized high-capacity secondary storage devices designed to store large amounts of data for an organization.True False45. File servers are appropriate devices to use in an enterprise storage system.True FalseFill in the Blank Questions46. _____ speed is the measure of the amount of time required by a storage device to retrieve data and programs.________________________________________47. Tracks are divided into invisible wedge-shaped sections called _____.________________________________________48. Disk _____ improves hard-disk performance by anticipating data needs and reducing time to access data from secondary storage.________________________________________49. A(n) _____ hard disk is typically connected to a USB or FireWire port.________________________________________50. A _____ occurs when a read/write head makes contact with the hard disk's surface or with particles on its surface.________________________________________51. File _____ programs scan files for ways to reduce the amount of required storage.________________________________________52. File _____ expands compressed files.________________________________________53. Due to its expanded storage capability, fast access speed, and high reliability, _____ is often used by Internet servers and large organizations.________________________________________54. USB drives are also known as _____ drives.________________________________________55. _____ memory cards are a form of a solid-state storage device widely used in smartphones, digital media players and GPS navigation systems.________________________________________56. CD-ROM is an example of a(n) _____ type of storage medium.________________________________________57. DVD + R and DVD-R both stand for DVD _____.________________________________________58. Typically a microcomputer uses an _____ hard disk to store the operating system and software applications.________________________________________59. DVD stands for digital versatile disc or digital _____ disc.________________________________________60. The hi-def standard for optical discs is the _____ Disc.________________________________________61. Three common storage options discussed in your text are hard disk, _____, and solid-state storage.________________________________________62. With _____, or online storage, you can access your files from any computer with an Internet connection.________________________________________63. A good way to share files with others is to use a ________, or online, storage service.________________________________________64. Most large organizations store data through a strategy called a(n) _____ to promote efficient and safe use of data across the networks within their organizations.________________________________________Essay Questions65. Discuss the importance and uses of secondary storage devices.66. List and explain some of the important characteristics of secondary storage.67. What causes a head crash to occur?68. Describe a RAID.69. What is solid-state storage? Give examples.70. Briefly discuss the differences between CD, DVD, and Blu-ray discs.71. Describe how file compression works. Explain the advantages of file compression.72. Describe some of the advantages and disadvantages of using cloud computing and cloud storage.73. Describe some of the mass storage devices that support an enterprise storage system.74. What is a storage area network?Multiple Choice Questions1. (p. 189) Hard disks store and organize files using all the following, except:A. tracksB. sectorsC. cylindersD. pathsAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 07-03Topic: Hard Disks2. (p. 190) Which of the following is true about an internal hard disk?A. Variable amount of storageB. Fixed amount of storageC. PortableD. SlowAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-04Topic: Internal Hard Disk3. (p. 189) On a hard disk each track is divided into invisible wedge-shaped sections called:A. bitsB. plattersC. cylindersD. sectorsAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-03Topic: Hard Disks4. (p. 190) The hard disk's disk surface is scratched and some or all of the data is destroyed when there is a:A. head crashB. cylinder crashC. track crashD. sector crashAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 07-03Topic: Hard Disks5. (p. 188) Which of the following is not an example of secondary storage?A. External hard drivesB. RAIDC. RAMD. Flash drivesAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-01Topic: Storage6. (p. 190) An external hard disk:A. is heavy.B. is hard to remove.C. cannot be used in addition to an internal hard disk.D. usually connects to a USB or FireWire port.AACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 07-04Topic: External Hard Drives7. (p. 188) Storage that retains its data after the power is turned off is referred to as:A. volatile storage.B. sequential storage.C. direct storage.D. nonvolatile storage.AACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-01Topic: Storage8. (p. 188-189) The process of accessing information from secondary storage devices is referred to as:A. backing up.B. restoring.C. writing.D. reading.AACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-01Topic: Storage9. (p. 189) The ____ of a secondary storage device indicates how much data the storage medium can hold.A. accessB. capacityC. memoryD. storageAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-01Topic: Storage10. (p. 189) Which of the following measures the amount of time required by the storage device to retrieve data and programs?A. Nonvolatile mediaB. CapacityC. Access speedD. RAMAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-01Topic: Storage11. (p. 190) One way to improve the storage capacity of a hard disk is to:A. format often.B. use file compression.C. increase memory.D. use disk caching.AACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-05Topic: Performance Enhancements12. (p. 190) This process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU.A. Data compressionB. Data accessC. Disk cachingD. RAIDAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-05Topic: Performance Enhancements13. (p. 191) Which of the following characteristics about RAID is incorrect?A. expanded storage capabilityB. fast access speedC. highly reliableD. one high-capacity hard disk driveAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-05Topic: Redundant arrays of inexpensive disks (RAID)14. (p. 190) Three ways to improve the performance of a hard disk include:A. disk caching, RAID, and file expansion.B. file compression, disk caching, and file encryption.C. disk caching, RAID, and file compression.D. RAID, file compression and disk expansion.AACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-05Topic: Performance Enhancements15. (p. 194) Which of these is not an example of solid state storage?A. Digital versatile discB. SSDsC. Flash memory cardsD. USB drivesAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-07Topic: Solid-State Storage16. (p. 194) Smartphones use which of these storage technologies?A. Optical driveB. Solid state driveC. Flash memory cardD. Flash driveAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 07-07Topic: Flash Memory Cards17. (p. 192) Optical discs use these to represent data.A. Analog signalsB. Magnetic chargesC. Pits and landsD. Laser beamsAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 07-06Topic: Optical Discs18. (p. 193) A CD-RW disc:A. can be written to only once.B. can be erased and rewritten.C. cannot be written on.D. cannot be erased.AACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-06Topic: Compact Disc19. (p. 193) All of the following are true of DVD-ROM drives except:A. They are also known as erasable optical discs.B. They can provide over two hours of high-quality video and sound comparable to that found in motion picture theatres.C. They are a type of optical disc.D. DVD-ROM stands for "digital versatile disc–read only memory".AACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 07-06Topic: Digital Versatile Disc20. (p. 193) The standard for high definition optical discs is:A. DVD-RAMB. HD DVDC. Blu-rayD. HD CDAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-06Topic: Blu-ray Disc21. (p. 194) These discs have a capacity of 50 gigabytes on one side.A. HD DVDB. CDC. DVDD. Blu-RayAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 07-06Topic: Blu-ray Disc22. (p. 194) Solid-state storage devices are different than hard disks in that they:A. have no moving parts.B. have a higher capacity.C. have greater access speed.D. are volatile.AACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-07Topic: Solid-State Storage23. (p. 196) What is it called when servers on the Internet supply applications as a service, rather than a product?A. Digital versatile computingB. Service computingC. Cloud computingD. Optical computingAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-08Topic: Cloud storage24. (p. 196) This allows you to upload and store documents on the Internet.A. Cloud storageB. Flash driveC. Solid State storageD. Hard Disk driveAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-08Topic: Cloud storage25. (p. 199) Which of these is not a mass storage device?A. RAID systemB. File serverC. Optical discD. Organizational cloud storageAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-09Topic: Mass Storage DevicesTrue / False Questions26. (p. 189) Media are the actual physical material that holds the data and programs. TRUEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-01Topic: Storage27. (p. 188) The process of saving information to a secondary storage device is referred to as embedding.FALSEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-01Topic: Storage28. (p. 188) Secondary storage provides temporary or volatile storage.FALSEAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-01Topic: Storage29. (p. 189) Hard disks use tracks, sectors, and cylinders to store and organize files.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-03Topic: Hard Disks30. (p. 190) A smoke particle, fingerprint, dust, or human hair could cause a hard disk head crash.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-03Topic: Hard Disks31. (p. 190) A hard crash typically occurs on an optical disk when it makes contact with particles on its surface.FALSEAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-03Topic: Hard Disks32. (p. 190) External hard drives are used primarily to complement an internal hard disk. TRUEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-04Topic: External Hard Drives33. (p. 190) External hard disks use different technology than internal hard disks.FALSEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-04Topic: External Hard Drives34. (p. 190) Disk caching improves hard-disk performance by compressing files.FALSEAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-05Topic: Performance Enhancements35. (p. 191) Disk caching uses a combination of hardware and software.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 07-05Topic: Performance Enhancements36. (p. 191) RAID connects several inexpensive hard-disk drives to one another.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-05Topic: Performance Enhancements37. (p. 191) File compression is only available on hard disk drives.FALSEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-05Topic: Performance Enhancements38. (p. 192) CD-ROMs are often used to archive data and to record music downloaded from the Internet.FALSEAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 07-06Topic: Compact Disc39. (p. 193) DVDs have replaced CDs as the standard optical disc.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-06Topic: Digital Versatile Disc40. (p. 193) Blu-ray Discs are the high definition standard and have a far greater capacity than DVDs.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-06Topic: Blu-ray Disc41. (p. 195-196) Facebook is an example of cloud storage.FALSEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-08Topic: Cloud storage42. (p. 196) If you have used Google Docs to create a word processing document, you have used cloud computing.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-08Topic: Cloud storage43. (p. 196) In order to access your documents and files that are stored in the cloud, you must have an Internet connection.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-08Topic: Cloud storage44. (p. 199) Mass storage devices are specialized high-capacity secondary storage devices designed to store large amounts of data for an organization.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-09Topic: Mass Storage Devices45. (p. 199) File servers are appropriate devices to use in an enterprise storage system. TRUEAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-09Topic: Mass Storage DevicesFill in the Blank Questions46. (p. 189) _____ speed is the measure of the amount of time required by a storage device to retrieve data and programs.AccessAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-01Topic: Storage47. (p. 189) Tracks are divided into invisible wedge-shaped sections called _____.sectorsAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-03Topic: Hard Disks48. (p. 190) Disk _____ improves hard-disk performance by anticipating data needs and reducing time to access data from secondary storage.cachingAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-05Topic: Performance Enhancements49. (p. 190) A(n) _____ hard disk is typically connected to a USB or FireWire port. externalAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-04Topic: External Hard Drives50. (p. 190) A _____ occurs when a read/write head makes contact with the hard disk's surface or with particles on its surface.head crashAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-03Topic: Hard Disks51. (p. 191) File _____ programs scan files for ways to reduce the amount of required storage. compressionAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 07-05Topic: Performance Enhancements52. (p. 191) File _____ expands compressed files.decompressionAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 07-05Topic: Performance Enhancements53. (p. 191) Due to its expanded storage capability, fast access speed, and high reliability, _____ is often used by Internet servers and large organizations.RAIDAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 07-05Topic: Performance Enhancements54. (p. 195) USB drives are also known as _____ drives.flashAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-07Topic: USB Drives55. (p. 194) _____ memory cards are a form of a solid-state storage device widely used in smartphones, digital media players and GPS navigation systems.FlashAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-07Topic: Flash Memory Cards56. (p. 192) CD-ROM is an example of a(n) _____ type of storage medium.opticalAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 07-06Topic: Optical Discs57. (p. 193) DVD + R and DVD-R both stand for DVD _____.recordableAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-06Topic: Digital Versatile Disc58. (p. 190) Typically a microcomputer uses an _____ hard disk to store the operating system and software applications.internalAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-04Topic: Internal Hard Disk59. (p. 193) DVD stands for digital versatile disc or digital _____ disc.videoAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-06Topic: Digital Versatile Disc60. (p. 193) The hi-def standard for optical discs is the _____ Disc.Blu-rayAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-06Topic: Blu-ray Disc61. (p. 192) Three common storage options discussed in your text are hard disk, _____, and solid-state storage.optical discAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-06Topic: Optical Discs62. (p. 196) With _____, or online storage, you can access your files from any computer with an Internet connection.cloudAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-08Topic: Cloud storage63. (p. 196) A good way to share files with others is to use a ________, or online, storage service.cloudAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-08Topic: Cloud storage64. (p. 199) Most large organizations store data through a strategy called a(n) _____ to promote efficient and safe use of data across the networks within their organizations.enterprise storage systemAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-09Topic: Enterprise Storage SystemEssay Questions65. (p. 188) Discuss the importance and uses of secondary storage devices.Secondary storage provides permanent or nonvolatile storage. Using secondary storage devices such as a hard disk drive, data and programs can be retained after the computer has been shut off.AACSB: Reflective ThinkingAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 07-01Topic: Storage66. (p. 189) List and explain some of the important characteristics of secondary storage.Some important characteristics of secondary storage include (1) Media which are the actual physical material that holds the data and programs, (2) Capacity which measures how much a particular storage medium can hold, (3) Storage devices which are the hardware that reads data and programs from storage media. Most also write to storage media and (4) Access speed which measures the amount of time required by the storage device to retrieve data and programs.AACSB: Reflective ThinkingAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 07-01Topic: Storage67. (p. 190) What causes a head crash to occur?A head crash occurs when a read/write head makes contact with the hard disk's surface or with particles on its surface. A head crash is a disaster for a hard disk. The disk surface is scratched and some or all of the data is destroyed. At one time, head crashes were commonplace.AACSB: Reflective ThinkingAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 07-01Topic: Storage68. (p. 191) Describe a RAID.RAID, or redundant array of inexpensive disks, improves performance by expanding external storage, improving access speed, and providing reliable storage. In a RAID, several inexpensive hard-disk drives are connected to one another. The connected hard-disk drives are related or grouped together, and the computer system interacts with the RAID system as though it were a single large-capacity drive. The result is expanded storage capability, fast access speed, and high reliability. For these reasons, RAID is often used by Internet servers and large organizationsAACSB: Reflective ThinkingAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 07-05Topic: Performance Enhancements69. (p. 194) What is solid-state storage? Give examples.Solid-state storage devices have no moving parts. Data and information are stored and retrieved electronically directly from these devices much as they would be from conventional computer memory. Solid-state drives (SSDs) are similar to hard disk drives, but they use solid-state memory instead of magnetic discs to store data. SSDs are faster and more durable than hard disks. SSDs also require less power, which can lead to increased battery life for laptops and mobile devices. SSDs are more expensive and generally have a lower capacity than hard disks, but this is changing as the popularity of SSDs continues to increase. SSDs are widely used for tablet PCs, such as the iPad. Flash memory cards are small solid-state storage devices used in portable devices like smartphones and GPS navigation systems. They are also used to store images from digital cameras and then to transfer the images to a personal computer. USB drives, or flash drives, are so compact they can be transported on a key ring. These drives connect to a computer's USB port to transfer files.AACSB: Reflective ThinkingAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 07-07Topic: Solid-State Storage。
计算机专业英语 -第7章1
Competencies (Page 1 of 2)
Define input Describe keyboard entry, pointing devices, and scanning devices Discuss image capturing devices, including digital cameras, digital video cameras, and audio input devices
Chapter 7
Input and Output
Introduction
Do you ever wonder how information gets into your computer and comes out in a form you can use? Input devices convert what we understand into what the system unit can process. Output devices convert what the system unit has processed into a form that we can understand. Input and output devices are the focus of this chapter.
Page 186
activeactive-matrix monitor (193) A type of flatflat-panel monitor where each pixel is independently activated. (See also thin film transistor (TFT) monitor)有源矩阵显 monitor)有源矩阵显 示器 bar code (187)The vertical zebra-striped zebramarks printed on product containers. bar code reader (187)Contains photoelectric cells that scan or read bar codes. (See also bar code scanner)
计算机专业英语 Unit 7 Software Engineering
SystБайду номын сангаасm Life Cycle Stage
Stages: beginning, ending, something going on in between. End: the requirement to adapt to new business requirements and changing conditions is taxed more and more, users will begin to become dissatisfied with system performance, and business efficiency will start to suffer. At this point, the life cycle of the current system is about to end.
System Life Cycle Stage
Software System Challenge
many systems are late, and many are over budget. A significant proportion of new systems fail to meet the requirements laid down for them, or are abandoned before they are complete. Many businesses neglect to properly train their staff in the use of new information systems, and many simply do not understand the capabilities and limitations of the technology
计算机英语第七章
1 Types
4
1 Types
In the light of their physical size, networks can be divided into local, metropolitan, and wide area networks. Moreover, the connection of two or more networks is called an internetwork. The worldwide Internet is a well-known example of an internetwork.
计算机英语
Chapter 7 Computer Network
1
目录
CONTENT
1 Types 2 Topologies 3 Models 4 Networking Devices 5 Wireless Network
2
Lead in
Computer networks are the combined results of computer technologies and communication technologies.
12
2 Topologies
Star Network
A star network is reliable in the sense that a node can fail without affecting any other node on the network. Its weakness, however, is that failure of the central computer results in a shutdown of the entire network. Additionally, because each node is individually wired to the hub, cable costs can be high.
计算机专业英语Unit 7
Unit 7 The Fundamentals of ComputerSoftwareText 1 Data StructureExercises1. Multiple choices.(1)The attributes of the stack are ( A ).A. FIFOB. LIFOC. queueD. built into their circuitry(2)Queues that occur everyday life can be seen ( ABCD ).A. in an emergency room of a hospitalB. in certain societies lacking equalityC. as people waiting for service at a bankD. as automobiles waiting for a traffic light(3)A stack protocol can be used for ( C ).A. subroutine callsB. operation of arithmetic expressionsC. removing the latest element insertedD. removing the earliest element inserted(4)The operations of a structured data type might act on ( ABCD ).A. a stackB. the values of the data typeC. component elements of the data structureD. a queue2. Decide whether the following statements are True or False.(1)The operations of a structured data type only act on the values of the data type. (×)(2)A stack is a data type whose major attributes are determined by the rules governing theinsertion and deletion of its elements. (√)(3)A stack is a data type whose data structure is said to have a first-in/last-out (FILO)behavior, or protocol. (√)(4)The series of jobs awaiting execution is called a queue. (√)(5)The main feature of queues is that they follow a first-come/first-served rule. (√)3. Translate and analyze the following sentences.(1)A data structure is a data type whose values are composed of component elements thatUnit 7The Fundamentals of Computer Software110are related by some structure.句子组成:whose引导定语从句,composed of…由…组成。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
2011-9-22
16
Linda: Oh, My anti-virus software is the Rising 2008. Emily: Well, if you use the both, the effect will be better. Linda: What can we do about the Internet? Can you give me an example? Emily: Sure. For example, when you access a Web page, the fire wall checks the response against your request. Linda: Oh, I see. It quite meets my need and I will take it. Emily: Here you are, and we can tell you how to install and use it for free. Linda: Thank you very much.
13
7.steadily 8.solution 9.moreover 10.simultaneously 11.multi-purpose 12.constantly 13.scan 14.target 15.forbid 16.correspondence 17.intruder
adv.稳定地,有规则地 n.解决方案,解答 adv.而且,除此之外 adv.同时地 adj.多用途的,多功能的 adv.不变地,经常地 n.扫描 n.目标,对象 v.禁止,不许 n.通信,信件 n.入侵者
2011-9-22
10
Part B: Need to install a firewall
Linda: Hi, I’m waiting for you. Mike: I set off immediately after getting your call. What’s wrong with your computer network? Linda: Thank you. I can’t open the IE Browser. Mike: Is the network settings ok? Linda: Yes, it's correct. Mike: Well, let me check it. Oh,Your computer is infected with virus. Did you install any anti-virus software in your computer? Linda: Yes, My computer is protected by the latest release⑩ of Rising 2008 anti-virus software. Mike: And any firewall? Linda: Oh, no.
2011-9-22
自我繁殖 n.特性,特色,特写 n..传染,传染病 n.损害,危害 隐蔽性 寄生的 破坏性的 adj.良性的,良好的 adj.恶性的
4
17.triggering 18.hidden 19.fearful 20.human
启动,出发,控制 adj.隐藏的 adj.可怕的,严重的 n.人,人类
New Words
n.情形,境遇 v.停止,废止,放弃 n.计算机病毒 adj.有传染性的 vt.恐吓,威胁 n.安全
3
7.code
n.代码,密码,编码 v.编码
8.self-reproduction 9.feature 10.contagion 11.damage 12.concealed 13.parasitic 14.destructive 15.benign 16.malignant
Emily: Welcome to our company. What can I do for you? Linda: I’d like to find a firewall for my computer. Could you tell me some thing about it? Emily: It’s my pleasure. This is a Rising 2008 fire wall. It is a well known firewall production for home use.
Part A 1.rejoice 2.achieve 3.tip 4.item 5.backup 6.irretrievable
2011-9-22
Protect your computer safely
New Words
v.(使)欣喜,(使)高兴 v.完成,达到 n.提示,技巧 n.项目,条款 v.做备份/(计)文件备份 adj.不能挽回的
18
Notes
2011-9-22 11
Mike: You need to install a firewall, so your computer will be safe. Linda: I see. I’ll install a firewall later. Mike: Ok, I'll recover it first.
Part A:
Part A 1.paralysis 2.anxious 3.treatment 4.elimination 5.separately 6.rapidly
2011-9-22
The famous doctor
New Words
n.瘫痪,麻痹 adj.担忧的,渴望的 n.待遇,治疗,处理 n.排除,除去,消除 adv.个别地,分离地 adv.迅速地
2011-9-22 5
Part B: solve problem
(Rings…) Mike: Dazheng Electron Science and Technology Company. May I help you? Linda: Hello, I’m Linda. I think there’s something wrong with my computer. It doesn't work! Mike: Is that the hardware problem or software problem? Linda: I think it is the software problem. The hardware is ok. Mike: Is it a system problem? Linda: No, I think it’s a network. Mike: Don’t worry, Linda. We’ll solve it as soon as possible⑤. Linda: Thank you very much!
Notes
Part B 6.meet one’s need 满足某人的需要 It quite meets my need and I will take it. 它看起来很适合我 ,就它吧。
2011-9-22 17
Lesson 28 Computer safety operation
Part A:
2011-9-22
2
Lesson 25 Computer Virus
Part A:
Part A 1.situation 2.discontinued 3.Computer viruses 4.Infectious 5.threaten 6.security
2011-9-22
Be infected by the virus
计算机专业英语
Specialized Computer English
ter security
Lesson 25 Lesson 26 Lesson 27 Lesson 28 Computer Virus Hacker Firewall and Antivirussoftware Computer safety operation
n.入侵 n.职业,占有 adj.怀恶意的,恶毒的 n.企图,尝试,努力 n.航行器 adj.散步的,普及的 n.附录,附属品 v./n. 诈骗 v./n. 伪装 n.裂缝,漏洞 n.诡计,骗局
2011-9-22
9
Notes
Part A 1.Always 频度副词 总是…… 2、yourself 反身代词也是强调词。还有: ourselves themselves 3、for example 例如…… 还有: such as 4、slow down 这里用作动词:(v)减速 5、has been stolen 已经被偷了。此句为完成时的被动语态。 6、not as(so)…as 同级比较句型 7.password protection 密码保护
Notes
Part A 1.out of work 失业,停止工作 The machine was out of work. 机器出了故障。 2.system halted 系统停止 3.be infected by 感染,沾染上 The wound was infected by germs. 伤口沾染了细菌。 4.carry out 完成,实现,贯彻,执行 Remember to carry out your promise. 记住要履行诺言。
New Words
Part B 1.firewall 防火墙
Notes
Part B 1.set off 出发,动身 We set off at dawn. 我们黎明时动身了。 2.network settings 网络设置 3.latest release 最近版本
2011-9-22
12
Lesson 27 Firewall and Anti-virus Antisoftware
2011-9-22