计算机专业英语课文翻译(第四版)

合集下载

计算机英语 刘艺 王春生 第4版

计算机英语 刘艺 王春生 第4版
三进程间通信在一个网络内不同计算机上甚至使用分时方法在同一台计算机上执行的各种活动或进程必须经常互相通信以便协调行动并完成指定的任务
计算机英语 刘艺 王春生 第4版
The need to share information and resources among different computers has led to linked computer systems, called networks, in which computers are connected so that data can be transferred from machine to machine. In these networks, computer users can exchange messages and share resources such as printing capabilities, software packages, and data storage facilities-that are scattered throughout the system.
从...逐渐形成(发展成)
还有一种网络分类方法,它基于网络的拓扑结构,即计算机相互连接的模式 。总线拓扑结构、环形拓扑结构和星形拓扑结构是3种流行的拓扑结构。其中, 星形网络或许是最古老的,这种网络由一台大型中央计算机服务许多用户的范式 演变而来。
Ⅰ. Network Classifications
网络分类的另一种方式是根据网络的内部运行是基于无专利权保护的设计 还是基于特定实体(如个人或公司)所拥有和控制的革新。前一种类型的网络 称为开放式网络,后一种类型的网络称为封闭式网络,有时也称为专有网络。
Ⅰ. Network Classifications

计算机英语(第4版) 刘艺 课文参考译文

计算机英语(第4版)  刘艺  课文参考译文

《计算机英语(第4版)》参考译文第一单元:计算机与计算机科学课文A:计算机概览一、引言计算机是一种电子设备,它能接收一套指令或一个程序,然后通过对数字数据进行运算或对其他形式的信息进行处理来执行该程序。

要不是由于计算机的发展,现代的高科技世界是不可能产生的。

不同类型和大小的计算机在整个社会被用于存储和处理各种数据,从保密政府文件、银行交易到私人家庭账目。

计算机通过自动化技术开辟了制造业的新纪元,而且它们也增强了现代通信系统的性能。

在几乎每一个研究和应用技术领域,从构建宇宙模型到产生明天的气象报告,计算机都是必要的工具,并且它们的应用本身就开辟了人们推测的新领域。

数据库服务和计算机网络使各种各样的信息源可供使用。

同样的先进技术也使侵犯个人隐私和商业秘密成为可能。

计算机犯罪已经成为作为现代技术代价组成部分的许多风险之一。

二、历史第一台加法机是法国科学家、数学家和哲学家布莱斯•帕斯卡于1642年设计的,它是数字计算机的先驱。

这个装置使用了一系列带有10个齿的轮子,每个齿代表从0到9的一个数字。

轮子互相连接,从而通过按照正确的齿数向前转动轮子,就可以将数字彼此相加。

17世纪70年代,德国哲学家和数学家戈特弗里德•威廉•莱布尼兹对这台机器进行了改良,设计了一台也能做乘法的机器。

法国发明家约瑟夫―玛丽•雅卡尔,在设计自动织机时,使用了穿孔的薄木板来控制复杂图案的编织。

在19世纪80年代期间,美国统计学家赫尔曼•何勒里斯,想出了使用类似雅卡尔的木板那样的穿孔卡片来处理数据的主意。

通过使用一种将穿孔卡片从电触点上移过的系统,他得以为1890年的美国人口普查汇编统计信息。

1、分析机也是在19世纪,英国数学家和发明家查尔斯•巴比奇,提出了现代数字计算机的原理。

他构想出旨在处理复杂数学题的若干机器,如差分机。

许多历史学家认为,巴比奇及其合伙人,数学家奥古斯塔•埃达•拜伦,是现代数字计算机的真正先驱。

巴比奇的设计之一,分析机,具有现代计算机的许多特征。

计算机专业英语的第四版课后习题翻译讲课教案

计算机专业英语的第四版课后习题翻译讲课教案

中译英参考答案Unit 1A computer system consists of hardware system and software system. The hardware of the computer is usually divided into three major parts or three primary subsystems: the CPU, the memory subsystem, and the I/O subsystem.The CPU performs many operations and controls computer. The memory subsystem is used to store program being executed by the CPU, along with the program’s data. The I/O subsystem allows the CPU to interact with input and output devices such as the keyboard and monitor of a personal computer. The components of the computer are connected to the buses.The part of the computer that performs the bulk of data processing operations is called the central processing unit and is referred to as the CPU. In microcomputer, it is often called the microprocessor. The CPU is made up of three major parts: control unit, ALU, and register set.Memory is also known as internal memory or main memory. It refers to the circuits in the computer that hold whatever programs and data are available for immediate use by the CPU.I/O subsystem includes I/O devices and interface. There are a wide variety of I/O devices, such as mouse, printer, sensor, disk, and so on. Input-output interface provides a method for transferring information between internal storage and external I/O devices. Peripherals connected to a computer need special communication links for interfacing them with the CPU. The purpose of the communication link is to resolve the differences that exist between the central computer and each peripheral.Unit 2Storage hardware provides permanent storage of information and programs for retrieval by the computer. Hard disk drives store information in magnetic particles embedded in a disk. Usually a permanent part of the computer, hard disk drives can store large amounts of information and retrieve that information very quickly.Although fixed hard drive systems offer faster access and have a higher storage capacity than optical discs, optical disc systems use removable media –a distinct benefit. Optical discs –primary CDs and DVDs – are much more widely used than removable hard drive systems. They are the standard today for software delivery, as well as commonly used for storing high-capacity music and video files. There are also versions of both CD and DVD drives available for home audio and home theater use. Optical discs are commonly referred to as compact discs.CD and DVD discs are read by CD and DVD drives. The speed of a CD or DVD drive is rated as 24x, 32x, 36x, and so on. These labels describe how fast the drive is compared to the first version of that drive. For example, a 36x drive is 36 times the speed of the baseline unit that was originally manufactured. Most optical discs have a title and other text printed only on one side and they are inserted into the drive with the printed side facing up. When inserting such a CD or DVD, be careful not to get dirt, fingerprints, scratches, or anything else that might hinder light reflectivity on the disc’s surface.Unit 3(a) A program is a list of instructions or statements for directing the computer to perform arequired data processing task. Programming is a multistep process for creating that list of instructions.(b) It is important to understand the difference between a class and an object of that class. A class is simply a specification for creating objects. Thus, a single class may create multiple objects.(c) Java is an object-oriented, network-friendly high-lever programming language that allows programmers to build applications that can run on almost any operating system.(d) ActiveX is a set of controls, or reusable components that enables programs or content of almost any type to be embedded within a Web page. Whereas a Java must be downloaded each time you visit a Web site, with ActiveX the component is downloaded only once, then stored on your hard disk for later, repeated use.(e) Programming involves a great deal of creativity. The design is guide to the function or purpose of each component, but the programmer has great flexibility in implementing the design as code. No matter what language is used, each program component involves at least three major aspects: control structures, algorithms, and data structures.Unit 4The software system can be divided into two broad categories: application software and system software. Application software consists of the program for performing tasks particular to the machine’s utilization. In contrast to application software, system software comprises a large number of programs. These programs start up the computer and function as the principle coordinator of all hardware components and application software. Without system software loaded into RAM of your computer, your hardware and application software are useless.System software can be grouped into three basic parts: operating system, utility software, and language translators. The majority of an installation’s utility software consists of programs for performing activities that are fundamental to computer installations yet not included in the operating system. In a sense, utility software consists of software units that extend the capabilities of the operating system.A computer’s OS is the main collection of programs that manage its activities. The primary chores of an OS are management and control. The OS ensures that all actions requested by a user are valid and processed in an orderly fashion. It also manages the computer system’s resources to perform these operations with efficiency and consistency.Application software is the software designed to help you solve problems specific to business or perform specific business tasks. Application software then is the layer of software closest to you. Basically, there are four categories of application software: productivity software, business and specialty software, entertainment software and education/reference software.Unit 5A computer network is often classified as being either a local area network (LAN), a metropolitan area network (WAN), or a wide area network (WAN). The connection of two or more networks is called an internetwork. The worldwide Internet is a well-known example of an internetwork.LANs are privately owned networks within a single building or campus of up to a few kilometers in size. They are widely used to connect personal computers and workstations incompany offices and factories to share resources and exchange information.In general, a given LAN will use only one type of transmission medium. Various topologies are possible for LANs. The most common LAN topologies are bus, ring and star.A MAN is basically a bigger version of a LAN and normally uses similar technology. MAN is designed to extend over an entire city. It may be a single network such as a cable television network, or it may be a means of connecting a number of LANs into a large network so that resources may be shared LAN-to-LAN as well as device-to-device. For example, a company can use a MAN to connect the LANs in all of its offices throughout a city.A W AN spans a large geographical area that may comprise a country, a continent, or even the world. It provides long-distance transmission of data, voice, image, and video information over large geographical area.In contrast to LANs, W ANs may utilize public leased, or private communication devices, usually in combinations, and can therefore span an unlimited number of miles.Unit 6Transmission media are used to transfer messages over a network. For instance, the transmission media used in a network may be a privately owned set of cables, the public phone lines, or a satellite system. Transmission media can either be wired or wireless.The three types of wired media most commonly used to carry messages are twisted-pair wire, coaxial cable, and fiber-optic cable. One of the most successful developments in transmission media in recent years has been fiber optics. Fiber-optic cable is commonly used for the high-speed backbone lines of a network, or for Internet infrastructure.Wireless transmission media have become especially popular in recent years. They support communications in situations in which physical wiring is impractical or inconvenient, as well as facilitate mobility. Wireless media are commonly used to connect devices to a network, to share information between computers, to connect wireless mice to a computer, and for handheld PCs, wireless phones, and other mobile devices. Radio signals transferred through the air are the heart of most types of wireless media. In addition to conventional broadcast radio application, the microwave, cellular, and satellite transmission media also use radio signals to transmit data.Radio transmissions require the use of a transmitter to send the radio signals through the air.A receiver (usually containing some type of antenna) accepts the date at the other end. When a device functions as both a receiver and transmitter, it is commonly called a transceiver or transmitter-receiver.Unit 7(a) Since many database systems users are not computer trained, developers hide the complexity from users through several levels of abstraction, to simplify user’s interactions with the system: physical level, logical level, and view level.(b) A database schema is specified by a set of definitions expressed by a special language called a data-definition language (DDL). The result of compilation of DDL statements is a set of tables that is stored in a special file called data dictionary, or data directory.(c) The structured query language (SQL) is the most widely used and standard query language for relational database management systems. It is a kind of non-procedural language.(d) An entity is a “thing”or “object”in the real world that is distinguishable from otherobjects. For example, each person is an entity, and bank accounts can be considered to be entities. Entities are described in a database by a set of attributes.(e) Data warehouse is one of the newest and hottest buzzwords and concepts in the IT field and the business environment. A data warehouse is a logical collection of information——gathered from many different operational databases——that supports business analysis activities and decision-making tasks.Unit 8Animation is the term used to describe a series of graphical images that are displayed one after the other to simulate movement. Cartoons on television are one example of animation.Video differs from animation in that it usually begins as a continuous stream of visual information that is broken into separate images or frames when the video is recorded. When the frames are projected—typically at a rate of 30 frames per second—the effect is a smooth reconstruction of the original continuous stream of information. As you might imagine, at 30 frames per second, the amount of data involved in displaying a video during a multimedia presentation can require a substantial amount of storage space. Consequently, video data—like audio data—is often compressed. A variety of compression standards exist. Some of the most common video file formats are .avi, .mpeg, .mov, .rm.For multimedia presentation, video may be recorded using a standard (analog) video camera and then converted to digital form as it is input into a computer. Alternatively, the film can be recording digitally using a digital video camera. Streaming video is frequently used on Web pages to reduce file size. Similar to streaming audio, Streaming video files can begin playing once a portion of the video has been downloaded.Unit 9(a) AI is currently being applied in business in the form of knowledge systems, which use human knowledge to solve problems. The most popular type of knowledge-based system is the expert system. An expert system is a computer program that attempts to represent the knowledge of human experts in the form of heuristics. The term heuristic is derived from the same Greek root as the word eureka, which means “to discover”.(b) The user interface enables the manager to enter instructions and information into the expert system and to receive information from it. The instructions specify the parameters that guide the expert system through its reasoning processing. The information is in the form of values assigned to certain variables.(c) The knowledge base contains both facts that describe the problem area and knowledge representation techniques that describe how the facts fit together in a logical manner. The term problem domain is used to describe the problem area.(d) An expert system, also called a knowledge-based system, is an artificial intelligence system that applies reasoning capabilities to reach a conclusion. Expert systems are excellent for diagnostic and prescriptive problems.(e) The DSS is not intended to replace the manager. The computer can be applied to the structured portion of the problem, but the manager is responsible for the unstructured portion——applying judgment or intuition and conducting analyses.Unit 10The linked list (see figure 1) consists of a series of nodes, which are not necessarily adjacent in memory. Each node contains the element and a link to a node containing its successor. We call this the next link. The last cell’s next link references null.To execute printList or find(x) we merely start at the first node in the list and then traverse the list by following the next links. This operation is clearly linear-time, as in the array implementation, although the constant is likely to be larger than if an array implementation were used. The findKth operation is no longer quite as efficient as an array implementation; findKth(i) takes O(i) time and works by traversing down the list in the obvious manner. In practice, this bound is pessimistic, because frequently the calls to findKth are in sorted order (by i). As an example, findKth(2), findKth(3), findKth(4), and findKth(6) can all be executed in one scan down the list.The remove method can be executed in one next reference change. Figure 2 shows the result of deleting the second element in the original list.The insert method requires obtaining a new node from the system by using a new call and then executing two reference maneuvers. The general idea is shown in figure 3. The dashed line represents the old next reference.figure 1figure 2figure 3Unit 11(a) A set is pure if all of its members are sets, all members of its members are sets, and so on. For example, the set containing only the empty set is a nonempty pure set.(b) A language is a describable set of finite strings, drawn from a fixed alphabet. A grammar is one way to "describe" the language. The grammar consists of a finite list of rules, where each rule replaces one substring with another. The string on the left must contain at least one nonterminal. The first string "produces" or "generates" the second. Thus a rule is also called a production.(c) A finite-state machine (FSM) or finite-state automaton(FA)is a mathematical abstraction sometimes used to design digital logic or computer programs. It is a behavior model composed of a finite number of states, transitions between those states, and actions, similar to a flow graph in which one can inspect the way logic runs when certain conditions are met.(d) Sometimes it is inconvenient or impossible to describe a set by listing all of its elements. Another useful way to define a set is by specifying a property that the elements of the set have in common. The notation P(x) is used to denote a sentence or statement P concerning the variable object x. The set defined by P(x) written {x | P(x)}, is just a collection of all the objects for whichP is true.Unit 12(a) Because drawings are typically displayed in 3D, CAD is especially helpful in designing automobiles, aircraft, ships, buildings, electrical circuits (including computer chips), and even clothing.(b) Computer-integrated manufacturing (CIM) is the manufacturing approach of using computers to control the entire production process. This integration allows individual processes to exchange information with each other and initiate actions. Through the integration of computers, manufacturing can be faster and less error-prone, although the main advantage is the ability to create automated manufacturing processes.(c) In addition to supporting decision making, coordination, and control, information system may also help managers and workers analyze problems, visualize complex subjects, and create new products.(d) Knowing the history and evolution of ERP is essential to understanding its current application and its future developments.(e) In addition to monitoring operational activities such as tracking the status of orders and inventory levels, enterprise system also improve organization-wide reporting and decision making.Unit 13(a) There are a wide variety of educational application programs available. Educational software is designed to teach one or more skills, such as reading, math, spelling, a foreign language, world geography, or to help prepare for standardized tests.(b) Electronic business (e-business) is the use of information technology and electronic communication networks to exchange business information and conduct transactions in electronic, paperless form.(c) Word processing software allows you to use computers to create, edit, store, and print documents. You can easily insert, delete, and move words, sentences, and paragraphs——without ever using an eraser.(d) What is a spreadsheet? Spreadsheet software takes its name from the accountant’s columnar worksheet, which it imitates. A spreadsheet is a worksheet consisting of a collection of cells formed by the intersection of rows and columns. Each cell can store one piece of information: a number, word or phrase, or formula.Unit 14(a) A geographic information system (GIS) is a system that captures, stores, analyzes, manages and presents data with reference to geographic location data. In the simplest terms, GIS is the merging of cartography, statistical analysis and database technology.(b) The GPS receiver uses the messages it receives to determine the transit time of each message and computes the distance to each satellite. These distances along with the satellites' locations are used to compute the position of the receiver. This position is then displayed, perhaps with a moving map display or latitude and longitude; elevation information may be included.(c) Virtual reality (VR) is a term that applies to computer-simulated environments that can simulate physical presence in the real world. Most current virtual reality environments areprimarily visual experiences, displayed either on a computer screen or through special stereoscopic displays, but some simulations include additional sensory information, such as sound through speakers or headphones.Unit 15(a) The software development process is sometimes called the software development life cycle (SDLC), because it describes the life of a software product from its conception to its implementation, delivery, use, and maintenance.(b) How can the CMM help your organization? There are three key roles the CMM plays. First, the CMM helps build an understanding of software process by describing the practices that contribute to a level of process maturity. The second role of the CMM is to provide a consistent basis for conducting appraisals of software processes. The CMM’s third key role is to serve as a blueprint for software process improvement.(c) The UML offers a standard way to write a system’s blueprints, including conceptual things such as business processes and system functions as well as concrete things such as programming language statements, database schemas, and reusable software components. The UML represents a collection of the best engineering practices that have proven successful in the modeling of large and complex systems.(d) Object modeling is a technique for identifying objects within the system environment and the relationships between those objects. The object-oriented approach to system development is based on several concepts, such as object, attribute, behavior, encapsulation, class, inheritance, polymorphism, persistence, etc.Unit 16“Security” is an all-encompassing term that describes all the concepts, techniques, and technologies to protect information from unauthorized access. There are several requirements for information security.Confidentiality: hiding data, usually with encryption, to prevent unauthorized viewing and access.Authenticity: the ability to know that the person or system you are communicating with is who or what you think it is.Access control: once a person or system has been authenticated, their ability to access data and use systems is determined by access controls.Data integrity: providing assurance that an information system or data is genuine.Availability: making sure that information is available to users in a secure way.To prevent unauthorized access, some type of identification procedure must be used. These vary from passwords to physical access object (access cards, etc.) to biometric devices that verify some type of personal characteristic, such as a fingerprint.Some of the most secure access control systems address both identification and authentication. Identification involves verifying that the person’s name or other identifying feature is listed as an authorized user; authentication refers to determining whether or not the person is actually who he or she claims to be.Unit 17A distributed system is a collection of independent computers which appear to the users of system as a single computer. Nearly all large software systems are distributed. For example, enterprise-wide business systems must support multiple users running common applications across different sites.A distributed system encompasses a variety of applications, their underlying support software, the hardware they run on, and the communication links connecting the distributed hardware. The largest and best-known distributed system is the set of computers, software, and services comprising the World Wide Web, which is so pervasive that it coexists with and connects to most other existing distributed systems. The most common distributed systems are networked client/server systems. Distributed systems share the general properties described below.●Multiple nodes●Message passing or communication●Resource sharing●Decentralized control●Concurrency or parallelism●Fault tolerance●Heterogeneity●OpennessDistributed systems have many inherent advantages, especially over centralized systems. Some applications are inherent distributed as well. In general, distributed systems:●Yield higher performance●Allow incremental growth●Allow one user to run a program on many different machines in parallel●Provide higher reliability。

计算机专业英语的第四版课后习题翻译讲课教案

计算机专业英语的第四版课后习题翻译讲课教案

中译英参考答案Unit 1A computer system consists of hardware system and software system. The hardware of the computer is usually divided into three major parts or three primary subsystems: the CPU, the memory subsystem, and the I/O subsystem.The CPU performs many operations and controls computer. The memory subsystem is used to store program being executed by the CPU, along with the program’s data. The I/O subsystem allows the CPU to interact with input and output devices such as the keyboard and monitor of a personal computer. The components of the computer are connected to the buses.The part of the computer that performs the bulk of data processing operations is called the central processing unit and is referred to as the CPU. In microcomputer, it is often called the microprocessor. The CPU is made up of three major parts: control unit, ALU, and register set.Memory is also known as internal memory or main memory. It refers to the circuits in the computer that hold whatever programs and data are available for immediate use by the CPU.I/O subsystem includes I/O devices and interface. There are a wide variety of I/O devices, such as mouse, printer, sensor, disk, and so on. Input-output interface provides a method for transferring information between internal storage and external I/O devices. Peripherals connected to a computer need special communication links for interfacing them with the CPU. The purpose of the communication link is to resolve the differences that exist between the central computer and each peripheral.Unit 2Storage hardware provides permanent storage of information and programs for retrieval by the computer. Hard disk drives store information in magnetic particles embedded in a disk. Usually a permanent part of the computer, hard disk drives can store large amounts of information and retrieve that information very quickly.Although fixed hard drive systems offer faster access and have a higher storage capacity than optical discs, optical disc systems use removable media –a distinct benefit. Optical discs –primary CDs and DVDs – are much more widely used than removable hard drive systems. They are the standard today for software delivery, as well as commonly used for storing high-capacity music and video files. There are also versions of both CD and DVD drives available for home audio and home theater use. Optical discs are commonly referred to as compact discs.CD and DVD discs are read by CD and DVD drives. The speed of a CD or DVD drive is rated as 24x, 32x, 36x, and so on. These labels describe how fast the drive is compared to the first version of that drive. For example, a 36x drive is 36 times the speed of the baseline unit that was originally manufactured. Most optical discs have a title and other text printed only on one side and they are inserted into the drive with the printed side facing up. When inserting such a CD or DVD, be careful not to get dirt, fingerprints, scratches, or anything else that might hinder light reflectivity on the disc’s surface.Unit 3(a) A program is a list of instructions or statements for directing the computer to perform arequired data processing task. Programming is a multistep process for creating that list of instructions.(b) It is important to understand the difference between a class and an object of that class. A class is simply a specification for creating objects. Thus, a single class may create multiple objects.(c) Java is an object-oriented, network-friendly high-lever programming language that allows programmers to build applications that can run on almost any operating system.(d) ActiveX is a set of controls, or reusable components that enables programs or content of almost any type to be embedded within a Web page. Whereas a Java must be downloaded each time you visit a Web site, with ActiveX the component is downloaded only once, then stored on your hard disk for later, repeated use.(e) Programming involves a great deal of creativity. The design is guide to the function or purpose of each component, but the programmer has great flexibility in implementing the design as code. No matter what language is used, each program component involves at least three major aspects: control structures, algorithms, and data structures.Unit 4The software system can be divided into two broad categories: application software and system software. Application software consists of the program for performing tasks particular to the machine’s utilization. In contrast to application software, system software comprises a large number of programs. These programs start up the computer and function as the principle coordinator of all hardware components and application software. Without system software loaded into RAM of your computer, your hardware and application software are useless.System software can be grouped into three basic parts: operating system, utility software, and language translators. The majority of an installation’s utility software consists of programs for performing activities that are fundamental to computer installations yet not included in the operating system. In a sense, utility software consists of software units that extend the capabilities of the operating system.A computer’s OS is the main collection of programs that manage its activities. The primary chores of an OS are management and control. The OS ensures that all actions requested by a user are valid and processed in an orderly fashion. It also manages the computer system’s resources to perform these operations with efficiency and consistency.Application software is the software designed to help you solve problems specific to business or perform specific business tasks. Application software then is the layer of software closest to you. Basically, there are four categories of application software: productivity software, business and specialty software, entertainment software and education/reference software.Unit 5A computer network is often classified as being either a local area network (LAN), a metropolitan area network (WAN), or a wide area network (WAN). The connection of two or more networks is called an internetwork. The worldwide Internet is a well-known example of an internetwork.LANs are privately owned networks within a single building or campus of up to a few kilometers in size. They are widely used to connect personal computers and workstations incompany offices and factories to share resources and exchange information.In general, a given LAN will use only one type of transmission medium. Various topologies are possible for LANs. The most common LAN topologies are bus, ring and star.A MAN is basically a bigger version of a LAN and normally uses similar technology. MAN is designed to extend over an entire city. It may be a single network such as a cable television network, or it may be a means of connecting a number of LANs into a large network so that resources may be shared LAN-to-LAN as well as device-to-device. For example, a company can use a MAN to connect the LANs in all of its offices throughout a city.A W AN spans a large geographical area that may comprise a country, a continent, or even the world. It provides long-distance transmission of data, voice, image, and video information over large geographical area.In contrast to LANs, W ANs may utilize public leased, or private communication devices, usually in combinations, and can therefore span an unlimited number of miles.Unit 6Transmission media are used to transfer messages over a network. For instance, the transmission media used in a network may be a privately owned set of cables, the public phone lines, or a satellite system. Transmission media can either be wired or wireless.The three types of wired media most commonly used to carry messages are twisted-pair wire, coaxial cable, and fiber-optic cable. One of the most successful developments in transmission media in recent years has been fiber optics. Fiber-optic cable is commonly used for the high-speed backbone lines of a network, or for Internet infrastructure.Wireless transmission media have become especially popular in recent years. They support communications in situations in which physical wiring is impractical or inconvenient, as well as facilitate mobility. Wireless media are commonly used to connect devices to a network, to share information between computers, to connect wireless mice to a computer, and for handheld PCs, wireless phones, and other mobile devices. Radio signals transferred through the air are the heart of most types of wireless media. In addition to conventional broadcast radio application, the microwave, cellular, and satellite transmission media also use radio signals to transmit data.Radio transmissions require the use of a transmitter to send the radio signals through the air.A receiver (usually containing some type of antenna) accepts the date at the other end. When a device functions as both a receiver and transmitter, it is commonly called a transceiver or transmitter-receiver.Unit 7(a) Since many database systems users are not computer trained, developers hide the complexity from users through several levels of abstraction, to simplify user’s interactions with the system: physical level, logical level, and view level.(b) A database schema is specified by a set of definitions expressed by a special language called a data-definition language (DDL). The result of compilation of DDL statements is a set of tables that is stored in a special file called data dictionary, or data directory.(c) The structured query language (SQL) is the most widely used and standard query language for relational database management systems. It is a kind of non-procedural language.(d) An entity is a “thing”or “object”in the real world that is distinguishable from otherobjects. For example, each person is an entity, and bank accounts can be considered to be entities. Entities are described in a database by a set of attributes.(e) Data warehouse is one of the newest and hottest buzzwords and concepts in the IT field and the business environment. A data warehouse is a logical collection of information——gathered from many different operational databases——that supports business analysis activities and decision-making tasks.Unit 8Animation is the term used to describe a series of graphical images that are displayed one after the other to simulate movement. Cartoons on television are one example of animation.Video differs from animation in that it usually begins as a continuous stream of visual information that is broken into separate images or frames when the video is recorded. When the frames are projected—typically at a rate of 30 frames per second—the effect is a smooth reconstruction of the original continuous stream of information. As you might imagine, at 30 frames per second, the amount of data involved in displaying a video during a multimedia presentation can require a substantial amount of storage space. Consequently, video data—like audio data—is often compressed. A variety of compression standards exist. Some of the most common video file formats are .avi, .mpeg, .mov, .rm.For multimedia presentation, video may be recorded using a standard (analog) video camera and then converted to digital form as it is input into a computer. Alternatively, the film can be recording digitally using a digital video camera. Streaming video is frequently used on Web pages to reduce file size. Similar to streaming audio, Streaming video files can begin playing once a portion of the video has been downloaded.Unit 9(a) AI is currently being applied in business in the form of knowledge systems, which use human knowledge to solve problems. The most popular type of knowledge-based system is the expert system. An expert system is a computer program that attempts to represent the knowledge of human experts in the form of heuristics. The term heuristic is derived from the same Greek root as the word eureka, which means “to discover”.(b) The user interface enables the manager to enter instructions and information into the expert system and to receive information from it. The instructions specify the parameters that guide the expert system through its reasoning processing. The information is in the form of values assigned to certain variables.(c) The knowledge base contains both facts that describe the problem area and knowledge representation techniques that describe how the facts fit together in a logical manner. The term problem domain is used to describe the problem area.(d) An expert system, also called a knowledge-based system, is an artificial intelligence system that applies reasoning capabilities to reach a conclusion. Expert systems are excellent for diagnostic and prescriptive problems.(e) The DSS is not intended to replace the manager. The computer can be applied to the structured portion of the problem, but the manager is responsible for the unstructured portion——applying judgment or intuition and conducting analyses.Unit 10The linked list (see figure 1) consists of a series of nodes, which are not necessarily adjacent in memory. Each node contains the element and a link to a node containing its successor. We call this the next link. The last cell’s next link references null.To execute printList or find(x) we merely start at the first node in the list and then traverse the list by following the next links. This operation is clearly linear-time, as in the array implementation, although the constant is likely to be larger than if an array implementation were used. The findKth operation is no longer quite as efficient as an array implementation; findKth(i) takes O(i) time and works by traversing down the list in the obvious manner. In practice, this bound is pessimistic, because frequently the calls to findKth are in sorted order (by i). As an example, findKth(2), findKth(3), findKth(4), and findKth(6) can all be executed in one scan down the list.The remove method can be executed in one next reference change. Figure 2 shows the result of deleting the second element in the original list.The insert method requires obtaining a new node from the system by using a new call and then executing two reference maneuvers. The general idea is shown in figure 3. The dashed line represents the old next reference.figure 1figure 2figure 3Unit 11(a) A set is pure if all of its members are sets, all members of its members are sets, and so on. For example, the set containing only the empty set is a nonempty pure set.(b) A language is a describable set of finite strings, drawn from a fixed alphabet. A grammar is one way to "describe" the language. The grammar consists of a finite list of rules, where each rule replaces one substring with another. The string on the left must contain at least one nonterminal. The first string "produces" or "generates" the second. Thus a rule is also called a production.(c) A finite-state machine (FSM) or finite-state automaton(FA)is a mathematical abstraction sometimes used to design digital logic or computer programs. It is a behavior model composed of a finite number of states, transitions between those states, and actions, similar to a flow graph in which one can inspect the way logic runs when certain conditions are met.(d) Sometimes it is inconvenient or impossible to describe a set by listing all of its elements. Another useful way to define a set is by specifying a property that the elements of the set have in common. The notation P(x) is used to denote a sentence or statement P concerning the variable object x. The set defined by P(x) written {x | P(x)}, is just a collection of all the objects for whichP is true.Unit 12(a) Because drawings are typically displayed in 3D, CAD is especially helpful in designing automobiles, aircraft, ships, buildings, electrical circuits (including computer chips), and even clothing.(b) Computer-integrated manufacturing (CIM) is the manufacturing approach of using computers to control the entire production process. This integration allows individual processes to exchange information with each other and initiate actions. Through the integration of computers, manufacturing can be faster and less error-prone, although the main advantage is the ability to create automated manufacturing processes.(c) In addition to supporting decision making, coordination, and control, information system may also help managers and workers analyze problems, visualize complex subjects, and create new products.(d) Knowing the history and evolution of ERP is essential to understanding its current application and its future developments.(e) In addition to monitoring operational activities such as tracking the status of orders and inventory levels, enterprise system also improve organization-wide reporting and decision making.Unit 13(a) There are a wide variety of educational application programs available. Educational software is designed to teach one or more skills, such as reading, math, spelling, a foreign language, world geography, or to help prepare for standardized tests.(b) Electronic business (e-business) is the use of information technology and electronic communication networks to exchange business information and conduct transactions in electronic, paperless form.(c) Word processing software allows you to use computers to create, edit, store, and print documents. You can easily insert, delete, and move words, sentences, and paragraphs——without ever using an eraser.(d) What is a spreadsheet? Spreadsheet software takes its name from the accountant’s columnar worksheet, which it imitates. A spreadsheet is a worksheet consisting of a collection of cells formed by the intersection of rows and columns. Each cell can store one piece of information: a number, word or phrase, or formula.Unit 14(a) A geographic information system (GIS) is a system that captures, stores, analyzes, manages and presents data with reference to geographic location data. In the simplest terms, GIS is the merging of cartography, statistical analysis and database technology.(b) The GPS receiver uses the messages it receives to determine the transit time of each message and computes the distance to each satellite. These distances along with the satellites' locations are used to compute the position of the receiver. This position is then displayed, perhaps with a moving map display or latitude and longitude; elevation information may be included.(c) Virtual reality (VR) is a term that applies to computer-simulated environments that can simulate physical presence in the real world. Most current virtual reality environments areprimarily visual experiences, displayed either on a computer screen or through special stereoscopic displays, but some simulations include additional sensory information, such as sound through speakers or headphones.Unit 15(a) The software development process is sometimes called the software development life cycle (SDLC), because it describes the life of a software product from its conception to its implementation, delivery, use, and maintenance.(b) How can the CMM help your organization? There are three key roles the CMM plays. First, the CMM helps build an understanding of software process by describing the practices that contribute to a level of process maturity. The second role of the CMM is to provide a consistent basis for conducting appraisals of software processes. The CMM’s third key role is to serve as a blueprint for software process improvement.(c) The UML offers a standard way to write a system’s blueprints, including conceptual things such as business processes and system functions as well as concrete things such as programming language statements, database schemas, and reusable software components. The UML represents a collection of the best engineering practices that have proven successful in the modeling of large and complex systems.(d) Object modeling is a technique for identifying objects within the system environment and the relationships between those objects. The object-oriented approach to system development is based on several concepts, such as object, attribute, behavior, encapsulation, class, inheritance, polymorphism, persistence, etc.Unit 16“Security” is an all-encompassing term that describes all the concepts, techniques, and technologies to protect information from unauthorized access. There are several requirements for information security.Confidentiality: hiding data, usually with encryption, to prevent unauthorized viewing and access.Authenticity: the ability to know that the person or system you are communicating with is who or what you think it is.Access control: once a person or system has been authenticated, their ability to access data and use systems is determined by access controls.Data integrity: providing assurance that an information system or data is genuine.Availability: making sure that information is available to users in a secure way.To prevent unauthorized access, some type of identification procedure must be used. These vary from passwords to physical access object (access cards, etc.) to biometric devices that verify some type of personal characteristic, such as a fingerprint.Some of the most secure access control systems address both identification and authentication. Identification involves verifying that the person’s name or other identifying feature is listed as an authorized user; authentication refers to determining whether or not the person is actually who he or she claims to be.Unit 17A distributed system is a collection of independent computers which appear to the users of system as a single computer. Nearly all large software systems are distributed. For example, enterprise-wide business systems must support multiple users running common applications across different sites.A distributed system encompasses a variety of applications, their underlying support software, the hardware they run on, and the communication links connecting the distributed hardware. The largest and best-known distributed system is the set of computers, software, and services comprising the World Wide Web, which is so pervasive that it coexists with and connects to most other existing distributed systems. The most common distributed systems are networked client/server systems. Distributed systems share the general properties described below.●Multiple nodes●Message passing or communication●Resource sharing●Decentralized control●Concurrency or parallelism●Fault tolerance●Heterogeneity●OpennessDistributed systems have many inherent advantages, especially over centralized systems. Some applications are inherent distributed as well. In general, distributed systems:●Yield higher performance●Allow incremental growth●Allow one user to run a program on many different machines in parallel●Provide higher reliability。

计算机英语 刘艺 王春生 第4版

计算机英语 刘艺 王春生 第4版

III Star/Extended Star Topology
• So+do+主语 • So+主语+do
III Star/Extended Star Topology
• So+do+主语 so代表上句中陈述的肯定内容。do可以是 连系动词、情态动词或助动词,且必须与 上句中的谓语动词保持时态的一致,意思 为“…也是如此”。 如:He can speak English very well. So can she. (=She can speak English very well, too.) 她英语也讲得很好。 • So+主语+do
III Star/Extended Star Topology
• In this case, the extended star topology is all but necessary to prevent degraded signals.
• 在这种情况下,【为防止信号衰减】,扩 展星型拓扑结构几乎是必需的。
V. Mesh Topology
• After all, what are the odds a network will fail in multiple times near the same device?
• 毕竟,一个网络在同一个设备附近多次出 故障的可能性有多大呢?
• 虚拟语气是一种特殊的动词形式,表示所 说的话不是一个事实,而只是一种假设、 愿望、建议、怀疑、猜测或不大可能实现 的空想。
• 虚拟语气用在条件状语从句中,通常从句 由连词if 引导。
II Ring Topology
虚拟条件状语从句 a. 与现在事实相反的假设 条件从句用一般过去时(be用were),主 句用should(would/might/could)+动词原形 如:If they were here, they would help you. 如果他们在这儿,会帮助你的。 含义:They are not here, they can’t help you.

计算机专业英语(第四版)

计算机专业英语(第四版)

AA data wareh‎o use is becom‎ing more of a neces‎s ity than an acces‎s ory for a progr‎e ssiv‎e, compe‎titiv‎e, and focus‎e d organ‎izati‎o n.数据仓库对‎于不断进取‎的,具有竞争力‎的,成为关注焦‎点的组织来‎说不是一个‎附属品,而是不可缺‎少的。

A growi‎n g numbe‎r of Web sites‎incor‎p orat‎e multi‎m edia‎, as do compu‎t er softw‎a re and consu‎m er inter‎f aces‎,such as ATM machi‎n es and infor‎m atio‎n kiosk‎s,(像自动取款‎机和信息亭‎那样的越来‎越多的We‎b站点配备‎了多媒体(如计算机多‎媒体软件,客户接口也‎配备了多媒‎体)A neces‎s ary featu‎r e of a DTP packa‎g e, there‎f ore, is a zoom facil‎i ty which‎displ‎a ys a porti‎o n of the docum‎e nt at a large‎r size than norma‎l so as to displ‎a y it at somet‎h ing much close‎r to the resol‎u tion‎of the final‎print‎e d produ‎c t(因此,DTP软件‎包的一个必‎备特征就是‎有缩放工具‎,它可以用比‎正常情况更‎大的尺寸显‎示文件的某‎一部分,从而以更接‎近最终印刷‎结果的分辨‎率来显示这‎些内容)A newer‎scrip‎t ing langu‎a ge incre‎asing‎ly more popul‎a r is PHP and ASP.而更通用的‎,比较新的脚‎本语言是P‎H P 和ASP。

计算机专业英语的课文与翻译

计算机专业英语的课文与翻译

Unit 8 Computer NetworkingText 1 Data CommunicationsThe end equipment can be computers, printers, keyboards, CRTs, and so on.They are either generates the digital information for transmission or uses the received digital data. This equipment generally operates digital information internally in word units.DTE is data terminal equipment. A station controller STACO is the corresponding unit at the secondaries. At one time, the DTE was the last piece of equipment that belonged to the subscriber in a data link system. Between the DTEs, first is the modem, and then is the communications equipment. The communication equipment is owned and maintained by Telco. Data communications equipment DCE accepts the serial data stream from the DTE. And DCE converts it to some form of analog signal suitable for transmission on voice-grade lines. At the receive end, the DCE performs the reverse function. It converts the received analog signal to a serial digital data stream. The simplest form of DCE is a modem modulator/demodulator or data set. At the transmit end, the modem can be considered a form of digital-to-analog converter.While at the receive end, it can be considered a form of analog-to-digital converter.参考译文数据通信终端设备可以是计算机、打印机、键盘、CRT等;它们可以生成要发送的数字信息,也可以使用所接收的数字数据;这种设备通常在内部以字为单位处理数字信息;DTE一般称为数据终端设备;辅助设备一方的相应设备是工作站控制器STACO;同时,DTE也是数据链路系统中属于用户端的最后一个设备;在两个DTE之间,先是调制解调器,接着是属于Telco电话公司维护的通信设备;数据通信设备DCE从DTE接收串行数据流,并将其转换成适合于在语音线路上发送的某种模拟信号形式;在接收端,DCE完成相反的功能,把接收到的模拟信号转换成串行数字数据流;最简单的DCE是调制解调器或数据传送机;在发送端,调制解调器可以视为一种数/模转换器,而在接收端则可视为一种模/数转换器;Text 2 Architecture of Computer NetworksComputer network is a complex unit, it consists of two or more connected computing units. It is used for the purpose of data communication and resource sharing. Design of a network and its logical structure should comply with a set of design principles. They include: the organization of functions, the description of data formats and procedure.In the following two sections we will discuss two important network architectures, the OSI reference model and the TCP/IP reference model.(1)the OSI reference modelThe OSI open systems interconnection model was created by the ISO. This model is a foundation for comparing protocols; However, more protocols deviate from the rules set up by the OSI model.The OSI model has seven layers. Note that the OSI model itself is not a network architecture.It just tells what each layer should do. However, ISO has also produced standards for all the layers. Each one has been published as a separate international standard.(2)the TCP/IP reference modelTCP/IP is a communication protocol; it provides many different networking services.The TCP/IP Internet protocol suite is formed from two standards: the TCP Transmission Control Protocol and the IP Internet Protocol. TCP means it is on the transport layer. IP means it is on the network layer. On top of the transport layer is the application layer. It contains all the higher-level protocols. The early ones included virtual terminal TELNET, file transfer FTP, electronic mail SMTP and domain name service DNS.As we know, TCP/IP is the foundation of the Internet.These protocols are continually changing and evolving to support the needs of the user community.参考译文计算机网络结构计算机网络是由两个或多个计算机设备互连而成的一种复合系统,它用于数据通信和资源共享;网络设计及其逻辑结构应该遵循一套设计原则,其中包括:功能的组织以及数据格式和过程的说明;在下面的两小节里,我们将讨论两个重要的网络体系结构,即OSI参考模型和TCP/IP参考模型;(1)OSI参考模型OSI模型开放系统互联参考模型是由国际标准化组织ISO开发的一个建议;相对于其他协议来说,此种模式为基础模式;然而,更多的协议是背离OSI模型的;OSI模型有7层;应该注意的是,OSI模型本身并不是一种网络体系结构,它只是说明每一层应该做什么;然而,ISO还是对各层制定了标准,每一层都是作为一个单独的国际标准来颁布的;(2)TCP/IP参考模型TCP/IP参考模型是一种传输协议,提供了许多不同的网络服务;TCP/IP协议组由TCP传输控制协议和IP网际协议两部分组成;TCP表明是处于传输层,IP意为是在网络层;在传输层上面是应用层;应用层包括所有高层协议;早期的协议包括虚拟终端TELNET、文件传送协议FTP、电子邮件SMTP和域名服务DNS;现在我们知道,TCP/IP协议是因特网的基础;这些协议在用户们的支持下不断地改变和进化着;Text 3 Local Area NetworkA LAN Local area data network is a group of computers. The work devices connected together usually within the same building. By definition, the connections must be high-speed and relatively inexpensive . token ring or Ethernet. For example, a LAN may be used to interconnect workstations distributed around offices within a single building or a group of buildings such as a university campus.LANs consist of carefully selected groups of components hardware and software. They are configured for the specific requirements of the organization. A LAN is generally limited to the size of a department or an organization. And a LAN often consists of 2 to 100 devices. LANs usually contain resources such as servers, printers, and connections to other networks through internetworking devices. The internetworking devices include switches and routers.In the next section we will discuss the structure of the different types of LAN.(1)TopologyMost wide area networks, such as the PSTN, use a mesh sometimes referred to as a network topology. With LANs, however, the limited physical separation of the subscriber DTEs allows simpler topologies to be used. The four topologies in common use are star, bus, ring and hub.The most widespread topology for LANs designed to function as data communication subnetworks for the interconnection of local computer-based equipment is the hub topology. It is a variation of the bus andring.(2)Transmission mediaTwisted pair, coaxial cable and optical fibre are the three main types of transmission medium used for LANs.(3)Medium access control methodsTwo techniques have been adopted for use of the medium access control in the LANs. One is carrier-sense-multiple-access with collision detection, and the other is control token.参考译文局域网局域数据网局域网由若干计算机组成;通常是一幢楼内的工作设备被连接在一起;通过定义可知,这种连接一定是高速并且相对廉价的如:令牌网和以太网;例如,一个局域网可以把一幢楼里或像大学校园内楼群里的各个办公室的工作站连在一起;局域网是由精心挑选的各组设备硬件和软件构成的;它们根据组织的各种特殊需要来配置;局域网的大小一般限制在一个部门或者一个组织,由2~100台电脑组成;局域网经常包含一些资源,如一些服务器和打印机,而且可以通过网络设备与其他的网络连接;这些网络设备包括交换机和路由器等;接下来,我们将讨论不同类型局域网的结构;(1)拓扑结构大多数广域网,如公共电话交换网PSTN,使用网状有时称为网络拓扑结构;而局域网由于用户数据终端设备相距很近,可采用简单的拓扑结构;常用的有星形、总线、环形和集线器等4种拓扑结构;应用最广的、用于互连本部门计算机设备以进行数据通信的局域网拓扑结构是集线器拓扑结构;这种拓扑结构是总线和环形拓扑结构的变种;(2)传输媒体双绞线、同轴电缆和光纤是局域网采用的3种主要传输媒体;(3)媒体访问控制方法局域网中采用了两种媒体访问控制技术,一种是载波侦听多路访问/冲突检测技术CSMA/CD,另一种是令牌控制技术;Text 4 InternetThe Internet is used by millions of people across the world to communicate business and personal information. The Internet is huge. Then we will talk about the difference of “an internet”and “ the Internet”.An internet note the lower case "i" is a computer network. It allows computers with distinctive software and hardware to communicate. Many kinds of computers can be connected to an internet. Each computer can serve a specialized role. It offers a wide variety of services to its users.The Internet is specific kind of internet. In The Internet Passport, the Internet will be defined as the network of networks. It follows a set of rules known as the "Internet Protocol IP suite".But what does this mean to you It means that any computer that is connected to the Internet can communicate with any other Internet computer. From the user's perspective, this works much like the telephone system works. You can dial from your phone to any other phone on the system, no matter what kind of telephone you have; you only need to know the phone number of the person you want to reach.With an Internet connection you can get some of the basic services available are:•E-mail. It’s a fast, easy, and inexpensive way to communicate with other Internet users around the world.•Telnet. It allows a user to log into a remote computer as though it were a local system.•FTP. It allows a user to transfer virtually every kind of file that can be stored on a computer from one Internet-connected computer to another.•Usenet news. It’s a distributed bulletin board which offers a combination news and discussion service on thousands of topics.•World Wide Web . It’s a hypertext interface to Internet information resources. Also, through an Internet connection, you can:•access online library catalogs.•copy computer files or software from archives.•access databases for teaching or research.•obtain free electronic books.•use educational and information services.•use directory services to find Internet users.•access supercomputer sites.It was estimated that at this rapid growth everyone in the world would have an e-mail address in the near future.参考译文互联网因特网是世界上很多人用来进行商业贸易和个人信息交流的网络,它非常巨大;接下来,我们将讨论互联网及因特网;互联网internet注意小写字母i是一种计算机网络,该网络上的计算机在通信时可以使用不同的软件和硬件;多种计算机都可以连入互联网,每台计算机都可以有一独特作用;一个互联网可以向它的用户提供各式各样的业务;因特网Internet是一种专用互联网;因特网在它的证书中定义为网络的网络,该网络使用了一组叫做互联网协议IP组的规则;但对你来说,这意味着什么呢这表明连接到因特网上的计算机可以与因特网上任何其他计算机通信;从用户的角度来看,其工作方式很像电话系统的工作方式;在电话系统内,可以从你的电话机拨打任何其他电话,而不管你使用什么样的电话机,你只需知道对方的电话号码即可;你可以通过因特网得到的基本服务如下:•电子邮件;它是与世界范围内的因特网用户进行联系的一种快速、方便、廉价的交流方式;•远程登录;允许用户连接到远程计算机上,就像这台远程计算机是本地机一样;•文件传输协议;该协议可以将存储在计算机上的各种文件,从因特网上的一台计算机传送给另一台计算机;•新闻组网络系统;一种分布式的电子公告牌,它能提供有关上千种话题的新闻和讨论服务;•万维网;一种因特网信息资源的超文本界面;•访问在线图书馆目录;•从计算机档案库存储器中拷贝文件或软件;•访问教学或科研数据库;•获取免费电子图书;•使用教育和信息服务;•使用目录服务以查找因特网用户;•访问超级计算机站点;估计以这样的高速发展,在不久的将来世界上每个人都将拥有至少一个电子邮件地址;Text 5 The World Wide WebThe World Wide Web also known as or Web is one of the fastest-growing Internet software applications. It is an architectural framework. It linked documents spread out over thousands of machines for accessing all over the Internet.The World Wide Web ties the computers together into a vast collection of interactive multimedia resources. The is a way of exchange information between computers on the Internet.The Web is built around hypertext and hypermedia. A hypertext document has certain keywords or phrases linked to other online documents. A person reading a hypertext document about mobile phone, for example, might be able to select the highlighted word “Nokia 3310”, and he call up another document giving more information about that particular type. With documents intertwined by links into a web of information, you can select paths to browse online resources, a process often referred to as surfing.Hypermedia extends the concept of hypertext to other forms of information. They include: images, sounds, and even video clips. If a person read a hypermedia document about mobile phones, then he might select a video show of a phone and hear the ring of it.The World Wide Web also subsumes previous Internet information systems such as Gopher and FTP. These resources can still be accessed through the Web. But the Web offered by these more restricted connection methods. Now the Web provides a wealth of additional capabilities.Thousands of computers around the world are now connected to the Web. They offer a huge variety of information and services to visitors. These online documents are generally referred to as pages. They are composed and supported by various people and organizations. Web pages are available for an amazing variety of tasks ranging from the playful to the serious. You can get many services access Web pages. For example, you can search database of mailing lists, you can see pictures of your favorite band and their concert schedule, or you can take a “tour” through a foreign country. Thousands of links to new services are added to the Web each day, and its growth has been explosive.参考译文万维网万维网又称或Web是因特网上发展最快的应用软件之一;它是一种结构化框架,用于访问遍布在因特网上的成千上万台机器中的链接文档;万维网把这些计算机连接成了一个巨大的交互式多媒体资源库,它是因特网上的计算机之间进行信息交流的一种方式;Web是用超文本和超媒体设计的;超文本文档中的一些关键词或短语被链接到了其他的在线文档中;例如,某人在阅读一篇有关移动电话的超文本文档时,如果他选择高亮显示的词“诺基亚3310”,就能链接到另一篇有关这一类型移动电话的文章,从而可以获取更多的信息;网络文章通过链接形成了一个网络信息资源库,用户可以选择路径来浏览这些在线资源,这种行为通常被称为“网上冲浪”;超媒体将超文本的概念扩展到了其他的信息形式,其中包括图片、声音,甚至是录像剪辑;在超媒体文档中阅读有关移动电话的文章时,读者可以选择关于该电话的视频演示,还能听见铃声;万维网也包括了以前的因特网信息系统,如Gopher 和FTP;这些资源仍然可以通过网络访问,但是以前那些连接方式的局限性很大,现在的网络提供了许多先辈们没能提供的功能;现在世界上成千上万的计算机都连接到了网络上,而且为访问者提供了相当多的信息和服务;这些由不同的人和组织编写和支持的在线文档被称为网页;Web网页可以跨越从诙谐到严肃的各种风格;通过访问网页,用户可以查看邮件数据库,查阅自己喜爱的乐队的图片和他们的演出时间表,或去国外周游一圈;现在每天都会增加上千种新的服务链接,万维网已经飞速发展起来了;。

计算机专业英语教程 第四版 部分翻译和简答题

计算机专业英语教程 第四版 部分翻译和简答题

翻译:1、C++’s advantages include strong typing, operator overloading, and less emphasis on the preprocessor.C++的优点包括强类型,运算符重载和较少地强调预处理器。

2、A program instruction or a piece of data is stored in a specific primary storage location called an address.程序指令和数据是存储在主存中一个特殊的位置,称为地址空间3、A high-level language is an artificial language with which we can write various instructions. This is possible not because computer processors are now so technologically advanced that they can ‘understand’ these langu ages. You should translate from programming languages into machine language which can be understood by the computer processors. Compilers can accomplish this task. This does mean that a high-level language program is not directly executable: it must be compiled to produce processor program, which is executable.高级语言是一门人工的我们可以写入各种各样指令的语言。

计算机专业英语教程(第4版)译文8.1

计算机专业英语教程(第4版)译文8.1

计算机专业英语教程(第4版)译文8.1IntroductionMultimedia means, from the user’s perspective, that computer information can be represented through audio and/or video, in addition to text, image, graphics and animation .从用户的观点,多媒体技术意味着,计算机信息不仅可以通过文本、图象、图形和动画,还可以通过音频或者视频表现出来。

For example, using audio and video, a variety of dynamic situations in different areas, such as sport or ornithology lexicon, can often be presented better than just using text and image alone.例如,利用音频或者视频,许多不同领域的动态情形,例如运动场面、鸟类生活,能够比仅仅使用文本和图象更生动形象的表现出来。

The integration of these media into the computer provides additional possibilities for the use of computational power currently available (e.g., for interactive presentation of huge amounts of information ).多媒体与计算机的综合为计算机的普遍应用提供了额外的可行性(例如:大量信息的交互式表现)。

Furthermore, these data can be transmitted though computer andtelecommunication networks, which implies applications in the areas of information distribution and cooperative work.另外,这些数据可以通过意味着信息分工和合作工作。

计算机英语第四版课文翻译

计算机英语第四版课文翻译

《计算机英语》参考译文第一单元:计算机与计算机科学课文A:计算机概览一、引言计算机是一种电子设备,它能接收一套指令或一个程序,然后通过对数字数据进行运算或对其他形式的信息进行处理来执行该程序。

要不是由于计算机的发展,现代的高科技世界是不可能产生的。

不同类型和大小的计算机在整个社会被用于存储和处理各种数据,从保密政府文件、银行交易到私人家庭账目。

计算机通过自动化技术开辟了制造业的新纪元,而且它们也增强了现代通信系统的性能。

在几乎每一个研究和应用技术领域,从构建宇宙模型到产生明天的气象报告,计算机都是必要的工具,并且它们的应用本身就开辟了人们推测的新领域。

数据库服务和计算机网络使各种各样的信息源可供使用。

同样的先进技术也使侵犯个人隐私和商业秘密成为可能。

计算机犯罪已经成为作为现代技术代价组成部分的许多风险之一。

二、历史第一台加法机是法国科学家、数学家和哲学家布莱斯?帕斯卡于1642年设计的,它是数字计算机的先驱。

这个装置使用了一系列带有10个齿的轮子,每个齿代表从0到9的一个数字。

轮子互相连接,从而通过按照正确的齿数向前转动轮子,就可以将数字彼此相加。

17世纪70年代,德国哲学家和数学家戈特弗里德?威廉?莱布尼兹对这台机器进行了改良,设计了一台也能做乘法的机器。

法国发明家约瑟夫―玛丽?雅卡尔,在设计自动织机时,使用了穿孔的薄木板来控制复杂图案的编织。

在19世纪80年代期间,美国统计学家赫尔曼?何勒里斯,想出了使用类似雅卡尔的木板那样的穿孔卡片来处理数据的主意。

通过使用一种将穿孔卡片从电触点上移过的系统,他得以为1890年的美国人口普查汇编统计信息。

1、分析机也是在19世纪,英国数学家和发明家查尔斯?巴比奇,提出了现代数字计算机的原理。

他构想出旨在处理复杂数学题的若干机器,如差分机。

许多历史学家认为,巴比奇及其合伙人,数学家奥古斯塔?埃达?拜伦,是现代数字计算机的真正先驱。

巴比奇的设计之一,分析机,具有现代计算机的许多特征。

《计算机专业英语(第4版)》Unit 1 Hardware Knowledge

《计算机专业英语(第4版)》Unit 1 Hardware Knowledge
• Gates did not have a definite study plan while a student at Harvard and spent a lot of time using the school's computers.
2023/12/28
计算机专业英语第4版
14
• Gates stepped down as chief executive officer of Microsoft in January 2000.
• He remained as chairman and created the position of chief software architect.
• In June 2006, Gates announced that he would be transitioning from full-time work at Microsoft to part-time work, and full-time work at the Bill & Melinda Gates Foundation.
four basic units of simplified computer: the input unit, central processing unit (CPU), memory unit, and output unit.
2023/12/28
计算机专业英语第4版
20
2023/12/28
2023/12/28
计算机专业英语第4版
19
1.2 Computer Development
1.2.1 Text A • The hardware of a digital computer system

计算机专业英语教程(第4版)译文6.2

计算机专业英语教程(第4版)译文6.2

计算机专业英语教程(第4版)译文6.2《计算机专业英语教程》(第4版)6.2 Carrier Frequencies and Multiplexing载波频率和多路复用@ Computer networks that use a modulated carrier wave to transmit data are similar to television stations that use a modulated carrier wave to broadcast video.modulated 已调制的使用调制载波发送数据的计算机网络和利用调制载波广播视频信息的电视台相类似。

The similarities provide the intuition needed to understand a fundamental principle:similarity 相似性intuition 直观这一相似性给理解下述基本原理提供了启示:Two or more signals that use different carrier frequencies can be transmitted over a single medium simultaneously without interference.signal 信号simultaneously 同时地interference 干扰两个或多个使用不同载波频率的信号可以在单一介质上同时传输而互不干扰。

@ To understand the principle, consider how television transmission works.为理解这一原理,考虑(有线)电视传输是如何工作的。

Each television station is assigned a channel number on which it broadcasts a signal.channel 频道每个电视台都分配一个频道号,它在该频道上广播信号。

计算机专业英语课文的翻译 中文 (5)[5页]

计算机专业英语课文的翻译 中文 (5)[5页]

第5单元程序开发和编程语言第一部分听力和对话对话:认识Java运行时环境(JRE)和Java虚拟机(JVM)(在Java编程的第一课之前,Mark下载了一个简单的Java小应用程序进行示例学习,但他发现,它无法正常运行。

)Mark:对不起,Henry和Sophie。

你们能帮助我吗?Henry:当然可以。

什么问题?Mark:为什么这个Java小应用程序不能运行?它的源代码是正确的。

Sophie:你的计算机是否安装了Java运行环境[1]?Mark:还没有。

什么是Java运行环境?Henry:简称JRE,是一个由太阳微系统公司开发的软件平台,可以让计算机运行由Java 编程语言编写的Java小应用程序和应用程序。

[2]Sophie:它包含Java虚拟机、Java库和一些其他组件。

Mark:Java虚拟机是做什么用的?Sophie: Java虚拟机(简称JVM)是一套计算机软件程序和数据结构,它使用虚拟机模型来执行其他计算机程序和脚本。

它可以隐藏能够运行程序的计算机硬件的细节。

[3]Mark:JVM和JRE是什么关系?[4]Henry:JVM是JRE的实例,当执行Java程序时开始起作用。

当执行完成后,这个实例具有垃圾回收机制。

JVM与一套能够实现Java API(Application Program Interface,应用程序接口)的标准类库一起发行。

虚拟机和API必须彼此一致,因此它们被捆绑成为JRE.[5]Sophie:因此,这可以被视为一个虚拟的计算机,其中虚拟机是处理器,并且API是用户界面。

Henry: JVM是Java平台一个至关重要的组件。

使用所有平台的相同字节码可将Java描述成“编译一次,到处运行”Mark: 字节码?Henry:是的。

JVM在通常称为Java字节码的一种中间语言上运行,这种中间语言通常是由Java源代码产生的,但也不一定。

打算在JVM上运行的程序,必须编译成这种标准化的可移植的二进制格式。

计算机英语 刘艺 王春生 第4版

计算机英语 刘艺 王春生 第4版

consider the problem of coordinating the
transmissomputers in a
network. Without rules governing this
communication, all the computers might insist on
二、协议
为了网络可靠运行,确立进行网络活动所遵循的规则很重要。这类规则称 为协议。通过开发和采用协议标准,不同厂商制造的网络应用产品能够相互兼 容。因此,在联网技术的开发中,协议标准的开发是一个必不可少的过程。
Ⅱ. Protocols
As an introduction to the protocol concept, let us
在不同计算机之间共享信息和资源的需要,导致了相互连接的计算机系 统的产生。这种相互连接的计算机系统被称为网络。在网络中,计算机连接 在一起,从而数据可以从一台计算机传输到另一台计算机。在网络中,计算 机用户可以交换信息,并共享分散在整个网络系统的资源,如打印能力、软 件包以及数据存储设备。
The underlying software required to support such applications has grown from simple utility packages into an expanding system of network software that provides a sophisticated network wide infrastructure. In a sense, network software is evolving into a network wide operating system.

计算机英语 刘艺 王春生 第4版

计算机英语 刘艺 王春生 第4版
在不同计算机之间共享信息和资源的需要,导致了相互连接的计算机系 统的产生。这种相互连接的计算机系统被称为网络。在网络中,计算机连接 在一起,从而数据可以从一台计算机传输到另一台计算机。在网络中,计算 机用户可以交换信息,并共享分散在整个网络系统的资源,如打印能力、软 件包以及数据存储设备。
The underlying software required to support such applications has grown from simple utility packages into an expanding system of network software that provides a sophisticated network wide infrastructure. In a sense, network software is evolving into a network wide operating system.
applications that are compatible with products
from other venders. Thus, the development of protocol standards is an indispensable process in the development of networking technologies.
计算机英语 刘艺 王春生 第4版
The need to share information and resources among different computers has led to linked computer systems, called networks, in which computers are connected so that data can be transferred from machine to machine. In these networks, computer users can exchange messages and share resources such as printing capabilities, software packages, and data storage facilities-that are scattered throughout the system.

计算机专业英语课文的翻译 中文 (10)[5页]

计算机专业英语课文的翻译 中文 (10)[5页]

第10单元计算机安全与隐私第一部分听力和对话对话:使用杀毒软件(Sophie的电脑不幸感染了恶意的电子邮件附件。

现在,她正努力寻找一些措施,用来有效地治疗和保护她的计算机不受病毒感染。

)Mark:我认为杀毒软件在上网时是一个主要的措施。

Henry:是的。

我同意。

杀毒软件是这样一种实用程序软件,它能够寻找并去除病毒、木马、蠕虫和恶意软件。

它适用于所有类型的计算机和数据存储设备,包括智能手机、平板电脑、个人计算机、闪存、服务器、PC机和Mac机。

Sophie:你能否推荐任何有信誉的杀毒软件让我使用?Mark:没问题。

流行的杀毒软件包括Norton AntiVirus、Kapspersky Anti-Virus、F-Secure Anti-Virus、Windows Defender和Avast等。

Sophie:杀毒软件如何起作用?Henry:现代的杀毒软件在幕后运行,并且企图识别存在于设备内的作为下载、电子邮件、附件或网页的恶意软件。

查找恶意软件的过程有时称为扫描或实现病毒扫描。

要识别恶意软件,杀毒软件可以查找病毒特征值或实现启发式分析。

Sophie:当查到恶意软件后会怎样呢?Mark:当杀毒软件查到恶意软件后,它可以试图去除感染,将这个文件放到隔离区,或仅仅是删除这个文件。

Mark:尽管偶尔查不到,但是杀毒软件和其他的安全软件模块能够不断地删去感染设备的恶意软件。

要点是使用安全软件,但是进行额外的预防措施也很重要,如定期备份数据,并且避开靠不住的软件销售商店。

Sophie:我如何保证我的杀毒软件正在运行?Mark:杀毒软件往往是我们习以为常的数字生活的一部分。

我们假定它已安装并执行它的工作。

Henry:但是杀毒软件可能无意中被禁用。

它的配置可以被通过设法潜入设备的恶意软件所改变。

在试用或订阅到期后,杀毒软件会失效。

保证杀毒软件正确地执行也许需要用户定期的介入。

Mark:而且许多杀毒产品在任务栏或通告区会显示一个图标。

(完整版)计算机英语刘艺王春生第4版Unit11A

(完整版)计算机英语刘艺王春生第4版Unit11A
UNIT 11 Cyberculture (计算机文化)
Section A Using E-Mail
1
Cyberculture —Introduction
I. Introduction
E-mail is an electronic system for sending
and receiving messages and files over a
你已经创建和使用签名文件了吗? 你加入任何邮件讨论组(新闻组)了吗? 你知道什么是在邮件讨论组中争论吗? 你知道什么是垃圾邮件吗? 你知道什么是网规吗?
5
Cyberculture— Introduction
E-mail is a form of public communication — — Your readers can purposely or mistakenly send your e-mail messages to countless others. So, you should not say things with e-mail that you would not say openly to your supervisors, coworkers, or clients.
Cyberculture— Introduction
Yes No Score
Can you receive and send messages?
Yes Marks

Can you forward documents to others?
Expert 8-10
Can you receive and send attached documents?
computer network. Compared to the phone or

计算机专业英语课文的翻译 中文 (4)[4页]

计算机专业英语课文的翻译 中文 (4)[4页]

第4单元操作系统第一部分听力和对话对话:关于操作系统的讨论(Henry想要了解更多有关于操作系统的内容,所以他在课后向Mark和Sophie请教)Henry: 一个操作系统可以实现的确切的功能是什么?Sophie: 它控制包括视觉体验、键盘、鼠标、麦克风以及触摸屏等搜集用户需求的用户接口的关键因素。

Mark:并且在幕后,操作系统忙碌地监控发生在设备内的操作。

Henry: 我了解诸如Wind ows、iOS等很基础的操作系统,但是我认为还有其他的操作系统有很广泛的用途。

Sophie:你说的很对。

操作系统可以根据它们在什么设备上使用来进行分类。

Mark:台式机操作系统是为台式机或者手提电脑而设计。

你在学校、在家或在工作中使用的电脑大部分都配置有台式机操作系统,如Microsoft Wind ows,OS X,或者Chrome OS。

Sophie:另外,像iOS和Android这样的操作系统被定义为移动操作系统,因为它们被设计用于手机、平板电脑、电子书阅读器。

Henry:还有其他的吗?Sophie:当然。

被部署用于网络、文件、应用、数据库、邮件服务器的电脑通常使用可以被多个用户同时使用的分布式网络的服务器操作系统。

Mark:Linux,、UNIX,、Wind ows和OS X服务器都是流行的服务器操作系统。

Henry:太棒了。

操作系统究竟存在于哪里?Mark:在一些诸如手机、电子阅读器的电子设备中,整个操作系统足够小所以可以被储存在只读存储器中。

对于其他大多数的电脑,操作系统很大,所以大部分存储在硬盘上或者固态硬盘上。

Sophie:是的。

在引导程序的过程中,操作系统内核被加载至随机存取存储器中。

内核提供关键的操作系统服务,如内存管理、获取文件。

在电脑运行的过程中,内核一直存在于随机存取存储器中。

其他的部分如定制化工具,被需要的时候会加载至随机存取存储器中。

Henry:我明白了!十分感谢你们。

练习以小组的形式,用右边的其他表达式来替换文中相应的陈述,组成类似的对话。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

1.2 总线互连总线是连接两个或多个设备的通信通路。

总线的关键特征是,它是一条共享传输介质。

多个设备连接到总线上,任一个设备发出的信号可以为其他所有连接到总线上的设备所接收。

如果两个设备同时传送,它们的信号将会重叠,引起混淆。

因此,一次只能有一个设备成功地(利用总线)发送数据。

典型的情况是,总线由多条通信通路或线路组成,每条线(路)能够传送代表二进制1和0的信号。

一段时间里,一条线能传送一串二进制数字。

总线的几条线放在一起能同时并行传送二进制数字。

例如, 一个8位的数据能在8条总线线上传送。

计算机系统包含有多种不同的总线,它们在计算机系统层次结构的各个层次提供部件之间的通路。

连接主要计算机部件(处理机, 存储器, I/O)的总线称为系统总线。

系统总线通常由50~100条分立的(导)线组成。

每条线被赋予一个特定的含义或功能。

虽然有许多不同的总线设计,但任何总线上的线都可以分成三个功能组:数据线、地址线和控制线。

此外可能还有为连接的模块提供电源的电源线。

数据线提供系统模块间传送数据的路径,这些线组合在一起称为数据总线。

典型的数据总线包含8、16或32根线,线的数量称为数据总线的宽度。

因为每条线每次传送1位,所以线的数目决定了每次能同时传送多少位。

数据总线的宽度是决定系统总体性能的关键因素。

地址线用于指定数据总线上数据的来源和去向。

例如,如果处理机希望从存储器中读一个字的数据,它将所需要字的地址放在地址线上。

显然,地址总线的宽度决定了系统最大可能的存储器容量。

控制线用来控制对数据线和地址线的访问和使用。

由于数据线和地址线被所有部件共享,因此必须用一种方法来控制它们的使用。

控制信号在系统模块之间传送命令和定时信息。

定时信息指定了数据和地址信息的有效性,命令信号指定了要执行的操作。

大多数计算机系统使用多总线,这些总线通常设计成层次结构。

图1.3显示了一个典型的高性能体系结构。

一条局部总线把处理机连接到高速缓存控制器,而高速缓存控制器又连接到支持主存储器的系统总线上。

高速缓存控制器集成到连接高速总线的桥中。

这一总线支持连接到:高速LAN、视频和图形工作站控制器,以及包括SCSI 和FireWire的局部外设总线的接口控制器。

低速设备仍然由分开的扩充总线支持,用一个接口来缓冲该扩充总线和高速总线之间的通信流量。

PCI外部设备互连是流行的高带宽的、独立于处理机的总线,它能够作为中间层或外围设备总线。

当前的标准允许在66MHz频率下使用多达64根数据线,其原始传输速率为528MB/s, 或4.224Gbps。

PCI被设计成支持各种各样基于微处理机的配置,包括单处理机和多处理机的系统。

因此,它提供了一组通用的功能。

PCI使用同步时序以及集中式仲裁方案。

在多处理机系统中,一个或多个PCI配置可通过桥接器连接到处理机的系统总线上。

系统总线只支持处理机/高速缓存单元、主存储器以及PCI桥接器。

使用桥接器使得PCI独立于处理机速度,又提供快速接收和传送数据的能力。

2.1 光存储介质:高密度存储器2.1.1 光盘光盘技术最终可能使磁盘和磁带存储淘汰。

用这种技术,磁存储器所用的读/写头被两束激光代替。

一束激光通过在光盘上刻制微小的凹点,对记录表面进行写;而另一束激光用来从光敏感的记录表面读取数据。

由于光束容易被偏转到光盘上所需要的位置,所以不需要存取臂。

对用户而言,光盘正成为最有吸引力的选择。

它们(光盘)对环境变化不太敏感,并且它们以每兆字节比磁盘低得多的存储器价格提供更多的直接存取存储器。

光盘技术仍在出现,并且还需要稳定;然而,目前有三种主要类型的光盘。

它们是CD-ROM、WORM盘和磁光盘。

CD-ROM1980年引入的,非常成功的CD,或紧密盘是设计来提高音乐的录音重放质量的光盘。

为了制作一张CD,把音乐的模拟声音转换成等价的数字声音,并且存储在一张4.72英寸的光盘上。

在每张光盘上可以用数字格式(用20亿数字位)记录74分钟的音乐。

因为它的巨大存储容量,计算机工业的企业家们立刻认识到光盘技术的潜力。

事实上,任何可以被数字化的东西都能存储在光盘上:数据、正文、声音、静止图象、音乐、图形和视频。

CD-ROM(读作C—D—ROM)是音频CD技术的副产品。

CD-ROM代表紧密盘—只读存储器。

该名字隐含了它的应用。

只读光盘与(能长期播放的) 唱片一样,在工厂里“压制”并带着预先录好的内容(如莎士比亚全集,或电影“飘”的前30分钟部分),分发出去。

一旦光盘插入光盘驱动器,正文、视频图像等等就能读入主存进行处理或显示;然而,在只读光盘上的数据是固定的—它们不能被改变。

当然,这是与磁盘的读/写能力不同的。

大量的、低成本直接存取存储器(是光盘使之成为可能)已经打开了通向许多新应用的大门。

WORM盘(即,CD—R)写一次,读多次或WORM光盘被那些面向最终用户的公司用来存储它们自己的专用信息。

一旦数据已写到该介质,它们只能读,不能再更新或改变。

WORM盘有可能替代磁带作为档案存储器。

磁光盘磁光盘有希望使得激光盘成为商业上可行的读/写存储技术。

5*1/4英寸的磁光盘可以存储高达1000Mb。

目前磁光盘太贵且根本未达到用户对磁介质所期望的那种可靠性。

此外,存取时间相对而言比较慢,大约与低档温彻斯特盘相同。

随着光盘技术成熟到可靠,性能价格合算,可读/可写,将来它最终会象现在磁盘、磁带那样统治二级存储器。

2.1.2 数字视盘DVD是新一代光盘存储技术。

用数字视盘技术能把视频、音频和计算机数据都编码到一张紧密盘(CD)上。

一张数字视盘能比传统的CD存储更多的数据。

一张标准的单层、单面数字视盘能存储4.7GB数据;一张两层标准盘把单层、单面的盘增加到8.5GB。

数字视盘可以是双面的,最大存储为17GB/张。

需要一台数字视盘播放器来读数字视盘。

这种播放器已配备成能读较老的光存储技术。

数字视盘技术的提倡者企图用单一的数字视盘数字格式来代替当前的各种数字存储格式(诸如激光盘,CD-ROM,音频CD),所以也称为数字通用盘。

DVD论坛因建立下一代数字多媒体的统一规范而获得最高信息技术工业奖DVD论坛今天宣布,因该论坛成功制定了DVD-ROM规范而获得1997年PC杂志的(制定标准的) 卓越技术奖。

“新的标准特别重要,因为它们承诺把更高级的技术革新和市场兼容性带给今天的技术用户,”PC杂志主编Michael J. Miller说,“DVD-ROM是被选出的激发兴趣的技术,因为它是一种熟悉的格式,它把大量的新计算、新教育、新游戏和新娱乐的可能性带给用户。

”在对DVD-ROM技术的颁奖词中, PC杂志称,DVD将会“代替CD-ROM作为PC内容(即各种软件和资料) 传播的主要手段。

”参加规范开发的三个公司的代表(日立,松下,东芝)代表DVD论坛在11月7日,Las V egas COMDEX '97 举行的庆祝典礼上接受该项奖。

“基于DVD论坛定义的规范的产品现在正在大量运往世界各地的计算机和电子产品市场,并且卓越技术奖增加了市场对成功制定标准的认可,”东芝公司DVD产品部总经理和DVD论坛创办成员Koji Hase说,“我们非常高兴地看到DVD论坛的工作被公认为个人计算机工业中重要的技术成就之一,特别是在1998年因更大的,全球的会员,论坛扩大了它的工作范围。

”“DVD论坛的成员把DVD-ROM规范开发作为最好的技术方法和对市场上客户的最好方法”松下有限公司的DVD商业开发办公室主任Sakon Nagasaki说,“该格式的接受说明了制定标准的努力如何提高整个电子工业的目标。

”除了论坛在开发DVD-ROM和DVD-Video标准的作用外,论坛也提出了可记录DVD 的格式,称为DVD-R和可重写的DVD,称为DVD-RAM,并提交国际标准组织。

定义DVD-Audio规范的工作也正在继续着。

“DVD论坛的任务是,在汇合计算机工业和消费电子产品工业中,通过与最广泛代表性的制造商与技术最终用户小组一起工作,确定从CD技术向DVD技术的平滑过渡的途径。

”日立有限公司执行官之一和DVD论坛DVD-RAM工作组主席Y oshita Tsunoda博士说,“不同工作组已完成三个不同的DVD技术标准的定义,并且我们已开始开发下一代规范的工作,这些规范将很好地提供可兼容产品到下一世纪。

”PC杂志的卓越技术奖的获得者是由编辑、捐助者和PC实验室全体成员组成的小组在几个月的评价和讨论后提名。

PC杂志,卓越技术奖的主办者,是由Ziff-Davis公司出版、有1.175百万冊发行量的杂志。

PC杂志一年印刷出版22次,每季度出CD,并且连续地在环球网上。

3.1 C++和面向对象的程序设计一些面向对象的程序设计概念在语言间渗透。

例如微软Quick Pascal是允许使用对象的第一批语言中的一个。

C++有什么使得它是一种适合于开发面向对象程序的语言?如同先前所提到的,答案是类(class)数据类型。

给该语言建立对象之能力的是建立在C结构类型之上的C++类(class)类型。

还有,C++把另外几个特性引入面向对象的程序设计,这些特性并不包含在简单地利用对象的其他一些语言中。

C++的优点包括强类型、运算符重载和较少地强调预处理。

的确你能使用其他一些产品和采用其他一些语言来进行面向对象的程序设计,但是采用C++的众多好处是显著的。

这是为面向对象的程序设计而设计的语言,并非(现有语言的)式样翻新。

面向对象的程序设计是一种程序设计技术,使得你能把一些概念看作各种各样的对象。

通过使用对象,你能表示要被执行的任务、它们之间的相互作用和必须观察的某些给定的条件。

一种数据结构经常形成某个对象的基础;因此,在C或C++中,结构类型能形成某种基本对象。

与对象的通信,如前提到的,能通过使用消息来完成。

消息的使用类似于在面向过程的程序中对函数的调用。

当某对象收到一个消息时,包含在该对象内的一些方法作出响应。

方法类似于面向过程程序设计的函数。

然而,方法是对象的一部分。

C++的类是对C和C++结构类型的扩充,并且形成了面向对象程序设计所需要的抽象数据类型。

类能包含紧密相关的一些条目,它们共享一些属性。

更正式地说,对象只不过是类的实例。

最终,应该出现包含很多对象类型的类库,你能使用这些对象类型的实例去拼合程序代码。

在你更详细地考察这些术语之前,一个好的主意是熟悉与C++和面向对象程序设计相关的另外几个概念,如同下面几节所述的。

封装封装指的是每个对象把它的成员数据和成员函数(方法)组合成单个结构的方式。

图3-1举例说明了你如何能组合数据域和方法以建立对象。

数据域方法图3-1 为建立对象而组合的数据域和方法典型地,一个对象的描述是一个C++类的一部分,且包括对该对象内部结构的描述、该对象如何与其他对象相关,以及把该对象的功能细节和该类的外部相隔离的某种形式的保护。

相关文档
最新文档