南邮计算机学院—专业英语大作业

合集下载

期末作业

期末作业

南京邮电大学通达学院 2013/2014学年第一学期《专业英语(自学)》期末大作业专业信息管理与信息系统班级 46 学号姓名一二三四五六总分主题内容语法结构文采创新满分20 20 20 20 10 10得分Writing(100分)You will find several topics in the following lists. Please choose one of them and write a short paper to explain your own opinion.Requirements:(1) Name the paper by yourself;(2) Your own opinion should be clearly put forward.(3)Try to find some articles via the internet or journals as references.(4) More than 1200 words.Topics:0.“People often complain that products are not made to last. They feel that making products that wear out fairly quickly wastes both natural and human resources. What they fail to see, however, is that such manufacturing practices keep costs down for the c onsumer and stimulate demand.”Which do you find more compelling: the complaint about products that do not last or the response to it? Explain your position using relevant reasons and/or examples drawn from your own experience, observations, or reading.1.“Manufacturers are responsible for ensuring that their products are safe. If a product injures someone, for whatever reason, the manufacturer should be held legally and financially accountable for the injury.” Discuss the extent to which you agree or disagree with the opinion expressed above. Support your point of view with reasons and/or examples from your own experience, observations, or reading.2.Analysis of Issue Questions: “Studies have found that employees of not-for-profit organizations and charities are often more highly motivated than employees of for-profit corporations to perform well at work when their performance is not being monitored or evaluated. Interviews with employees of not-for-profit organizations suggest that the reason for their greater motivation is the belief that their work helps to improve society. Because they believe in the importance of their work, they have personal reasons to perform well, even when no financial reward is present. Thus, if our corporation began donating a significant portion of its profits to humanitarian causes, ouremployees’ motivation and productivity would increase substantially and our overall profits would increase as well.” What do you think about this point? Explain why?3.“All companies should inv est heavily in advertising because high-quality advertising can sell almost any product or service.” Discuss the extent to which you agree or disagree with the opinion expressed above. Support your point of view with reasons and/or examples from your own experience, observations, or reading.4.Analysis of Issue Questions: “Employers should have no right to obtain information about their employees’ health or other aspects of their personal lives without the employees’permission.” Which opinion do you prefer? Explain why?5.Analysis of Issue Questions: “Businesses and other organizations have overemphasized the importance of working as a team. Clearly, in any human group, it is the strong individual, the person with the most commitment and energy, who gets things done.” Which opinion do you prefer? Explain why?6.“Instead of relying on the advice of outside experts, organizations should place greater value on the advice that can come only from their own highly experienced employees.”Discuss the extent to which you agree or disagree with the opinion stated above. Support your views with reasons and/or examples from your own experience, observations, or reading.7.“When judging the qualifications of potential employees, business employers should rely solely on objective information, such as a candidate’s résumé and education. Personal interviews are much too subjective and are therefore not a valid basis on which to judge a person’s qualifications for a job.” Discuss the extent to which you agree or disagree with the opinion stated above. Support your views with reasons and/or examples from your own experience, observations, or reading.8.“Most people today place too much emphasis on satisfying their immediate desires. The overall quality of life would be greatly improved if we all focused instead on meeting our long-term needs.”Discuss the extent to which you agree or disagree with the opinion stated above. Support your views with reasons and/or examples from your own experience, observations, or reading.9.Analysis of Issue Questions: “If the primary duty and concern of a corporation is to make money, then conflict is inevitable when the corporation must also acknowledge a duty to serve society.” Which opinion do you prefer? Explain why?Market demand and resource maintenance“People often complain that products are not made to last. They feel that making products that wear out fairly quickly wastes both natural and human resources. What they fail to see, however, is that such manufacturing practices keep costs down for the consumer and stimulate demand."Which do you find more compelling, the complaint about products that do not last or the response to it? Explain your position, using relevant reasons and/or examples from your own experience, observations, or reading.The issue about the advantages and disadvantages for products to wear is a complex one. Different people hold different views due to their different angles. Many people feel that making products that wear out fairly quickly wastes both natural and human resources. On the other hand, it can be noted that such manufacturing practices keep costs down for the consumer and stimulate demand. In this discussion, I shall present arguments that favor the later statement and refute the first statement.As we know, no need, no consumption. Consumption and demand driven the economic development of a society, when a city or a country's consumption level increase, which will greatly that the city or the country's economic development is gradually progress and development, which shows that people in a good, progress direction, represent life is getting better and better. If people always meet the state, without the demand, the economy will remain stagnant, enterprises, factories, shops will not be able to run production,which is a kind of economic crisis. So, economic development cannot do without consumption, consumption cannot do without the demand, and the demand for lower cost to products and on the natural resources and human resources needs. It is not satisfactory to both sides.The product will be a waste of natural resources and human resources that should have a lot of explanation . First of all, products do need to wear out in order for newer, more innovative products to replace them. This is how the economy and technology progress. For example, in the computer industry, new technology is developed and older technology is replaced every two years.This is called the two-year cycle in the industry and this cycle has a tremendous effect to drive the research and development of computer industry to reach one peak after another. People may complain that their computers easily break and soon after two or three years they have to buy new computers. However they do also realize that the new computers they purchase are much more powerful, innovative, yet at roughly the same price as their old computers two years ago. This is a perfect exampleshowing how the cyclic replacement of older products can help stimulate demand and as a result, stimulate research and development of more innovative products and eventually keep the costs down.I find the response to the complaint more compelling. Although the complaint is valid, it is most often the case the building a product to last forever will indeed cost more than the average consumer is willing to pay. Creating such a product would require more materials and/or more heavy-duty wear resistant materials which inherently are more expensive. Another factor that would drive costs up is the fact that demand for products would decrease. The demand would decrease since people do not have to replace old products with new products as often. With the increased variable costs for materials combined with a reduction in the production volume associated with lower demand, manufacturers must raise prices to break even or maintain the current level of profits.Although a few producers may make products to last, it is understandable how these companies can be driven out of existence. If a new competitor enters the market with a similar product that has a shorter life but a substantially lower price, then they will probably steal major portions of the other company's market share. The effects depend heavily upon the consumer’s perception of quality and what the customers requirements from the product actually are.For example, consumers may decide between two types of automobiles. One car may be built to last a long time but may not have the performance or be as comfortable as another car that is cheaper. So most consumers would purchase the cheaper car even though it may not last-as long as the heavy-duty car. Consumers may not realize that the more expensive car is of higher quality in the sense that it will last longer and will not be willing to pay the extra cost.Consumer decisions also depend on what consumers are actually looking for in a product. Consumers typically get tired of driving the same car for many years and want to buy new cars fairly often. This tendency forces producers to keep costs low enough to allow low enough prices for people to buy cars often. People don’t want cars to last forever. In conclusion, producers are in the situation that they're in due to external forces from the consumers. Producers must compete and they have found the best way satisfy the majority of the consumers.In addition, manufacturing products that would wear out in some period is not a waste of human resources. In fact, in computer industry, a lot of innovative ideas aregenerated during the manufacturing process and these new ideas enable us to make newer and better products.Products that wear do not necessarily have poor quality. I believe that the most important factor to consider is if the new product is innovative enough to satisfy p eople’s needs. As long as innovation is generated and people’s needs are satisfied, no human resources are wasted. The group of people who feel that making products that wear out fairly quickly wastes human resources assume without justification that manufacturing products that wear out is not innovative and productive, which is just not true.Renewal is a common social phenomenon, when things are bad, people will buy new instead, when something old and not broken, people often because the market of new products tempted to buy new products to replace the old products, this update although the behavior of seem to squander natural resources and human resources, but only through the circulation and development so as to promote the economy, the important role of these natural resources and human resources to play really makes people benefit.Finally, I believe that manufacturing products that would wear out is not a waste of natural resources. Today, a lot of the older products can be recycled and reused. And recycle industry in turn creates millions of jobs that help propel the advancements of economy.Therefore, the world economic development will become better and better,people's lives will gradually entered a new milepost.Admittedly, products that wear out extremely easily and quickly are not good for either the consumer or the economy. However, there exists an optimal point how quickly a product should wear out in order to stimulate economy and lower costs.Therefore, based on the reasons mentioned above, I believe that manufacturing practices that make products that reasonably wear out can indeed help keep costs down for the consumer and stimulate demand, and they do not necessarily waste human and natural resources.。

计算机专业英语作业及答案

计算机专业英语作业及答案

计算机专业英语作业答案(供参考)计算机专业英语作业1第1-3章作业一.Vocabulary( 词汇)(一).Translate the following words and expressions into Chinese(写出下列词组的汉语。

) 1.central processing unit(CPU)中央处理器 2.title bar 标题栏3.operating system 操作系统4.personal computer 个人计算机5.menu bar 菜单栏6.desk publishing 桌面排版7.electronic spreadsheet 电子表格8.hard disk 硬盘9.database 数据库10.Cursor 光标(二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。

)1.随机存储器RAM 2.只读存储器ROM3.传输控制协议TC P 4.数字视频光盘DVD5.通用串行总线USB 6.计算机辅助设计CAD7.计算机辅助制造CAM 8.中央处理器CPU(三).Translate the following Chinese into English.(根据汉语写出相应的英语。

)1.键盘keybord 2.鼠标mouse 3.扫描仪scanner4.打印机printer 5.输入input 6.输出output7.显示器monitor 8.存储器storage 9.数据库database 10.操作系统operating system 11.应用软件application software 12.字处理器word processor 13.网络浏览器web browser二.Tell whether the following statements are true(T) or false(F).(判断正误。

南邮计算机学院—专业英语大作业

南邮计算机学院—专业英语大作业

一:英译汉翻译的内容:《Computer_Networks_4th_Edition》书中的第四章的第六节(1-3小节)和第八节。

4.6蓝牙1994年,L.M.Ericsson公司对于“在无电缆情况下将它的移动电话和其他设备(比如PDA)连接起来”产生了浓厚的兴趣。

它与其他四个公司(IBM、英特尔、诺基亚和东芝),组成了一个团体SIG(特别兴趣集团)联盟来开发一个无线标准,用于将计算机和通信设备或附加部件通过短距离的、低功耗的、低成本的无线电波相互连接起来。

这个项目被命名为蓝牙(Bluetooth),该名字来源于北欧的一个海盗王Harald Blaatand(Bluetooth)II(940~981),他统一(即征服)了丹麦和挪威。

虽然最初的想法只是要去掉设备之间的电缆,但是,很快它便扩大了范畴,开始侵入到无线LAN的领地中去了。

尽管这样的改变使得该标准更加有应用价值,但是这也造成了与802.11进行竞争的局面。

更加糟糕的是,这两个系统还会相互电场干扰。

同时值得注意的是,Hewlett-Packard曾经在几年以前引入了一个红外网络,一边将计算机的外围设备通过无线的方式连接起来,但遗憾的是,这种网络并没有真正大规模的流行起来。

尽管如此,到1999年7月,蓝牙SIG发布了一份1500页的规范(1.0版本)。

此后不久正在考虑无线个人域网络(PAN)的IEEE标准组织802.15采纳了蓝牙的文档作为它的基础,并开始对它进行修订。

这件事情虽然看起来非常怪异,因为802.15在对一项已经有了细致规范,但无非兼容实现(还需要进一步调整)的技术进行了标准化,然而,历史表明,通过一个像IEEE这样的中立机构来管理一个开放的标准往往有助于一项技术的推广和应用。

更为精确地来说,我们应该注意到,蓝牙规范是针对整个系统的,从物理层到应用层,面面俱到。

IEEE802.15委员会仅对物理层和数据链路层进行了标准化,协议栈中的其他部分并没有纳入到它的规范之中尽管IEEE于2002年批准了第一个PAN标准802.15.1,然而,蓝牙SIG仍然在积极的改进它的方案。

《专业英语》课程作业

《专业英语》课程作业

步京侄宛a琴《专业英语》课程作业学生姓名____________________________学号 __________________________院系 _________________________专业 __________________________任课教师____________________________二0一五年六月一、英译中(英文科技资料翻译)原文:An operating system is the software which acts as an interface between a user of a computer and the computer hardware.The purpose of an operating system is to provide an environment in which a user may execute program. The primary goal of an operating system is thus to make the computer system convenient to use. A secondary goal is to use the computer hardware in an efficient way.We can view an operating system as a resource allocator. A computer system has many resources which may be required to solve a problem: CPU time, memory space, , input/output(I/O) devices, and so on.The operating system acts as the manager of these resources and allocates them to specific programs and users as necessary for their tasks. Since there may be many, possibly conflicting, requests for resources, the o/s must decide which requests are allocated resources to operate the computer system fairly and efficiently. Multimedia means, from the user ' perspective, that computer information can be represented through audio and/or video, in addition to text, image, graphics and animation .The integration of these media into the computer provides additional possibilities for the use of computational power currently available (e.g., for interactive presentation of huge amounts of information ). Furthermore, these data can be transmitted though computer and telecommunication networks, which implies applications in the areas of information distribution and cooperative work.Multimedia provides the possibility for a spectrum of new applications, many of which are in place today.A multimedia system distinguishes itself from other systems through several properties. We elaborate on the most important properties such as combination of the media, media-independence, computer control and integration.Not every arbitrary combination of media justifies the usage of the term multimedia.A simple text processing program with incorporated images is often called a multimedia application because two media are processed through one program.But one should talk about multimedia only when both continuous and discrete media are utilized.A text processing program with incorporated images is therefore not a multimedia application.An important aspect of different media is their level of independence from each other. In general, there is a request for independence of different media, but multimedia may require several levels of independence. On the one hand, a computer-controlled video recorder stores audio and video information, but there is an inherently tight connection between the two types of media. Both media are coupled together through the common storage medium of the tape. On the other hand, for the purpose of presentations, the combination of DAT recorder (Digital Audio Tape) signals and computer-available text satisfies the request for media-independence.Early computers were(physically) very large machines run from a console.The programmer wouldwrite a program and then operate the program directly from the operator Software sdchs console. as assemblers, loaders, and compilers improved on the convenience of programming the system, but also required substantial set-up time. To reduce the setup time, operators were hired and similar jobs were batched together.Batch systems allowed automatic job sequencing by a resident monitor and improved the overall utilization of the computer greatly.The computer no longer had to wait for human operation. CPU utilization was still low, however, because of the slow speed of the I/O devices relative to the CPU. Offline operation of slow devices was tried.Buffering was another approach to improving system performance by overlapping the input, output, and computation of a single job. Finally, spooling allowed the CPU to overlap the input of one job with the computation and output of other jobs.Spooling also provides a pool of jobs which have been read and are waiting to be run. This job pool supports the concept of multiprogramming. With multiprogramming, several jobs are kept in memory at one time; the CPU is switched back and forth between them in order to increase CPU utilization and to decrease the total real time needed to execute a job.Multiprogramming, which was developed to improve performance, also allows time sharing.Time-shared operating systems allow many users (from one to several hundred) to use a computer system interactive at the same time. As the system switches rapidly from one user to the next, each user is given the impression that he has his own computer. Other operating systems types include real-time systems and multiprocessor systems.A real-time system is often used as control device in a dedicated application. Sensors bring data to the computer. The computer must analyze the data and possibly adjust controls to modify the sensor inputs. Systems, which control scientific experiments, medical computer systems, industrial control systems, and some display systems are real-time systems. A real-time operating system has well-defined fixed time constraints . Processing must be done within the defined constraints, or the system will fail.A multiprocessor system has more than one CPU. The obvious advantages would appear to be greater computing power and reliability. There are various types of operating systems for multiprocessors and multicomputers. It is more or less possible to distinguish two kinds of operating systems for multiple CPU systems: Loosely coupled, such as network operating system and distributed o/s, and tightly coupled, such as parallel o/s. As we shall see, loosely and tightly-coupled s/w is rought analogous to loosely and tight-coupledh/w.The operating system must ensure correct operation of the computer system. To prevent user programs from interfering with the proper operation of the system, the h/w was modified to create two modes: user mode and monitor mode. Various instructions(such as I/O instructions and halt instructions) are privileged and can only be executed in monitor mode. The memory in which the monitor resides must also be protected from modification by the user. A time prevents infinite loops. Once these changes (dual mode, privilegedinstructions, memory protection, timer interrupt) have been made to the basic computer architecture, it is possible to write a correct operating system.译文:操作系统是作为计算机用户和计算机硬件之间接口的软件。

练习参考答案 许艺 南邮计算机英语

练习参考答案      许艺    南邮计算机英语

《计算机英语(第4版)》练习参考答案Unit One: Computer and Computer ScienceUnit One/Section AI.Fill in the blanks with the information given in the text:1. Charles Babbage; Augusta Ada Byron2. input; output3. VLSI4. workstations; mainframes5. vacuum; transistors6. instructions; software7. digit; eight; byte8. microminiaturization; chipII.Translate the following terms or phrases from English into Chinese and vice versa:1. artificial intelligence 人工智能2. paper-tape reader 纸带阅读器3. optical computer 光计算机4. neural network 神经网络5. instruction set 指令集6. parallel processing 并行处理7. difference engine 差分机8. versatile logical element 通用逻辑元件9. silicon substrate 硅衬底10. vacuum tube 真空管11. 数据的存储与处理the storage and handling of data12. 超大规模集成电路very large-scale integrated circuit13. 中央处理器central processing unit14. 个人计算机personal computer15. 模拟计算机analogue computer16. 数字计算机digital computer17. 通用计算机general-purpose computer18. 处理器芯片processor chip19. 操作指令operating instructions20. 输入设备input deviceIII.Fill in each of the blanks with one of the words given in the following list, making changes if necessary:We can define a computer as a device that accepts input, processes data, stores data, and produces output. According to the mode of processing, computers are either analog or digital.They can also be classified as mainframes, minicomputers, workstations, or microcomputers.All else (for example, the age of the machine) being equal, this categorization provides some indication of the compu ter’s speed, size, cost, and abilities.Ever since the advent of computers, there have been constant changes. First-generation computers of historic significance, such as UNIVAC(通用自动计算机), introduced in the early 1950s, were based on vacuum tubes. Second-generation computers, appearing in the early 1960s, were those in which transistors replaced vacuum tubes. In third-generation computers, dating from the 1960s, integrated circuits replaced transistors. In fourth-generation computers such as microcomputers, which first appeared in the mid-1970s, large-scale integration enabled thousands of circuits to be incorporated on one chip. Fifth-generation computers are expected to combine very-large-scale integration with sophisticated approaches to computing, including artificial intelligence and true distributed processing.IV. Translate the following passage from English into Chinese:计算机将变得更加先进,也将变得更加容易使用。

邮电高职计算机英语参考试卷

邮电高职计算机英语参考试卷

参考试卷(一)一、写出以下单词的中文意思(每小题0.5分,共10分)1 access n. 11 address n.2 bandwidth n. 12 benchmark n.3 chip n. 13 class n.4 configuration n. 14 configure vt.5 designate vt. 15 detect vt.6 Ethernet n. 16 execute vt.7 frequency n. 17 function n.8 infinite a. 18 information n.9 multimedia n. 19 multithreaded a.10 prompt n. 20 query n.二、根据给出的中文意思,写出单词(每小题0.5分,共10分)1 应用程序11 应用2 位;比特12 位图3 剪贴板13 命令4 光标,指针14 循环5 设备15 诊断6 解释,说明16 输出;出口7 处理,操作17 网络集线器8 接口,界面18 内联网9 对象19 操作符;操作员10 替换,取代,代替20 电阻三、根据给出的短语,写出中文意思(每小题1分,共10分)1 flat panel monitor2 dot pitch3 sound card4 graphics accelerator5 memory stick6 black toner7 parallel port8 a series of9 graphics adapter.10 clock speed四、根据给出的中文意思,写出短语(每小题1分,共10分)1 向后兼容2 对话框3 空格键4 回车键5 文档恢复6 关机7 幻灯片设计8 任务面板9 打印预览10 大纲视图五、写出以下缩略语的完整形式和中文意思(每小题1分,共10分)缩略语完整形式中文意思1 CPU2 DSP3 DRAM4 XML5 GUI6 3D7 USB8 SDRAM9 SQL10 ATM六、根据后面的英文解释,填写适当的英语(每小题2分,共10分)1 __________: To remove (recorded material) from a magnetic tape or other storage medium:2 __________: A fireproof wall used as a barrier to prevent the spread of fire.3 __________: A list, displayed on a monitor, of options available to a computer user.4 __________: A minute slice of a semiconducting material, such as silicon or germanium, doped and otherwise processed to have specified electrical characteristics, especially before it is developed into an electronic component or integrated circuit.5 __________: The even or odd quality of the number of 1's or 0's in a binary code, often used to determine the integrity of data especially after transmission.七、把以下句子翻译为中文(每小题3分,共30分)1Floppies do not hold too much data, but most computers are capable of reading them.2Optical fiber is thin filaments of glass through which light beams are transmitted.3The principal types of printers include dot-matrix, daisy wheel, inkjet, and laser.4 A printer is an essential part of the computer if you want a hard copy of your work.5Intelligence is the computational part of the ability to achieve goals in the world.6Ribbon is an inked strip of cloth used for making an impression, as in a typewriter.7 A router may create or maintain a table of the available routes and their conditions.8ALGOL was one of the first programming languages to encourage structured programming.9File names are generally followed by a period and three letters, called an extension.10If something is portable it can be easily moved from one type of computer to another.试卷一参考答案一、写出以下单词的中文意思(每小题0.5分,共10分)1 access n. 访问,存取11 address n. 地址2 bandwidth n. 带宽12 benchmark n. 基准;基准测试,基准程序3 chip n. 芯片13 class n. 类4 configuration n. 配置14 configure vt. 配置5 designate vt. 指明,指出,指定15 detect vt. 检测,发现,发觉6 Ethernet n. 以太网16 execute vt. 执行,完成7 frequency n. 频率,周率,发生次数17 function n. 函数8 infinite a. 无限的,极大的18 information n. 信息9 multimedia n. 多媒体19 multithreaded a. 多线程的10 prompt n. 提示,提示符20 query n. 查询,询问二、根据给出的中文意思,写出单词(每小题0.5分,共10分)1 应用程序application n. 11 应用apply vt.2 位;比特bit n. 12 位图bitmap n.3 剪贴板clipboard n. 13 命令command n.4 光标,指针cursor n. 14 循环cycle n5 设备device n.15 诊断diagnose vt.6 解释,说明explain vt. 16 输出;出口export vt.7 处理,操作handle vt. 17 网络集线器hub n.8 接口,界面interface n.18 内联网intranet n.9 对象object n. 19 操作符;操作员o perator n.10 替换,取代,代替replace vt. 20 电阻resistance n.三、根据给出的短语,写出中文意思(每小题1分,共10分)1 flat panel monitor 平板显示器2 dot pitch 点距3 sound card 声卡4 graphics accelerator 图形加速器5 memory stick 内存棒6 black toner 墨粉7 parallel port 并口8 a series of 一系列9 graphics adapter. 图形适配器10 clock speed 时钟速率四、根据给出的中文意思,写出短语(每小题1分,共10分)1 向后兼容backwards compatible2 对话框dialog box3 空格键space key4 回车键enter key5 文档恢复document recovery6 关机shut down7 幻灯片设计slide design8 任务面板task pane9 打印预览print preview10 大纲视图outline view五、写出以下缩略语的完整形式和中文意思(每小题1分,共10分)缩略语完整形式中文意思1 CPU Central Process Unit 中央处理器2 DSP Digital Signal Processing 数字信号处理3 DRAM Dynamic RAM 动态存储器4 XML Extensible Markup Language 可扩展标识语言5 GUI Graphical User Interfaces 图形用户界面6 3D 3 Dimension 三维7 USB Universal Serial Bus 通用串行总线架构8 SDRAM Synchronous Dynamic RAM 同步动态存储器9 SQL Structured Query Language 结构化查询语言10 ATM automatic Teller Machines 自动取款机,自动柜员机六、根据后面的英文解释,填写适当的英语(每小题2分,共10分)1 erase2 firewall3 menu4 chip5 parity七、把以下句子翻译为中文(每小题3分,共30分)1软盘不能保存太多的数据,但绝大多数计算机都能够读取它们的信息。

计算机专业英语special_eng[rongcanf]

计算机专业英语special_eng[rongcanf]

NJUPT – China
7
Chap. 1 Introduction:
1.2 History of operating systems
– – – – 1. 1945-55, Vacuum Tubes and Plug-boards; 2. 1955-65, Transistors and Batch Systems; Word-oriented, Character-oriented; Input >>> 1401 tape >>> 7094 computing >>> Output 1401 tape >>> – 3. 1965-80, ICs and Multiprogramming; – Integrate Circuits. – Multiprogramming:
– 1. Preempt-able and Non-preempt-able resources;
• Non-preempt-able resources, //可抢占与不可抢占; • e.g. CD-R >>>
– Take it away from burning state will cause garbled CD; – 2. Resource Acquisition;
2006年12月29日星期五
NetWorks
NJUPT – China
14
1.10 Metric Units
Exponential 10^ 3 10^ 6 10^ 9 10^ 12 Prefix KiloMega-. /megə/ Giga-. /gi'ga/ Tera-
2006年12月29日星期五

03南京邮电大学《专业英语》作业翻译

03南京邮电大学《专业英语》作业翻译
(14.2-5)
(r) [ +( (14.2-6)
假设
《k
将式14.2-4和式14.2-6代入式14.2-5得到
+c.c.+ +c.c.
+ u [ +( +c.c)]×[ + +c.c.]=0(14.2-7)
通过研究发现,当满足布拉格条件时,
K2-K1=K(14.2-8)
空间累积的能量交换就会发生。
(14.2-13)
其中
(14.2-14)
If we wish to reconstruct picture 1, we illuminate the hologram with the corresponding reference wave k2(ie, the same reference wave used to record it ),as discussed above.如果我们想重建图片1,我们照亮了相应的参考波幼(即相同的参考波用来记录它)全息图,如上所述。This reference wave will encounter in the crystal, not only the desired hologram n1(r) but also hologram n1(r).这将遇到参考波在晶体中,不仅所需的全息图n1(注册商标),而且也全息n1(注册商标)。Any light scattered from hologram n1(r) in the direction of k1 thus constitutes (noisy) crosstalk, which degrades the information contents of picture 1.从全息图n1分散的任何光线(r)在这样的k1构成(噪音)串扰,从而影响了图片1的信息内容的方向。This crosstalk places a fundamental limit on the number of holograms and their stored information contents.这种串扰重视数量的全息图的基本限制和所存储的信息内容。To quantify this argument, we will derive an expression for the power radiated along k1 due to the undesirable scattering of the reference beam employed (k2) off the“wrong”hologram of picture 2-n1(r).The equations describing this process were derived in (14.2-9) and are reproduced here for the incident (A2) and the diffracted (A1) beams ((((((((公式)))))))))) where the grating vector K=k2-k1 is that of hologram 2 and we took (())=0.The direction k1 is , according to Figure 14-6,the same for both n11(r) and n12(r),since the“picture”direction is the same for all the recorded holograms.为了量化这一论点,我们会得出一个沿k1由于就业(k2)的关闭“错误”的图片2全息图- n1参考光束不良散射辐射的功率表达式(注册商标)。该方程描述了这一进程衍生(14.2-9)和转载的事件(A2)和衍射(格A1)这里横梁

南京邮电大学研究生英语口语复试题

南京邮电大学研究生英语口语复试题

南京邮电大学研究生英语口语复试题南京邮电大学学院:现代邮政学院专业:计算机技术英语口语考试过程:英语自我介绍(2min)→抽题目英译汉(5min)→对话(5min)英语口语题目:1、为什么报考南京邮电大学?2、你的家乡是哪里,你喜欢你家乡的什么3、读过的书;是否做过研究4、Where will you get your bachelor's degree;please introduce your university5、最敬佩的人是谁6、去过什么有趣地方7、介绍本科专业8、为这次复试做了哪些准备9、喜欢什么天气、什么季节10、喜欢什么歌手11、你来过南京吗,你喜欢去哪里旅游学院:电光学院专业:光学工程英语口语考试过程:英语自我介绍(5min)→抽一小段话阅读(1min)→翻译(1min)学院:电子与光学工程、微电子学院专业:电路与系统学硕英语口语考试过程:抽题,观看一段英文视频(类似新闻的形式,大约3分钟),然后用中英双语总结。

→老师根据视频内容提问(大约2-3个)英语口语题目:1、关于狂犬病病毒话题(病因,后果,全球对该病毒的研究)2、关于整容话题(行业情况,人对整容的态度)学院:通信与信息工程学院专业:电子与通信工程英语口语考试过程:英语自我介绍(2min)→老师随机问问题(4min)英语口语题目:1、你的家乡是哪里?介绍你们家乡的美景或美食2、读过的书,并且介绍这本书的内容3、(南京考生)高中选择的学习模式是什么?高考考了多少分……4、为什么会考研?有没有什么契机5、为什么会选择考南京邮电大学?6、你觉得南京是一个什么样的城市7、本科的专业是什么?8、大学是哪里的?大学的环境怎么样?学院:电光学院专业:电通学硕英语口语考试过程:英语自我介绍(3min)→读故事回答故事相关问题(3min)英语口语问题:具体口语问题根据故事决定学院:通信与信息工程学院专业:信号与信息处理学硕英语口语考试过程:英语自我介绍(5min)→抽题目回答问题(5min)→翻译词汇(3min)英语口语题目:1、你的家乡是哪里2、读过的书3、你去过哪些著名的地方4、介绍一些5G的概念翻译:deep learning学院:自动化学院、人工智能学院专业:控制工程英语口语考试过程:英语自我介绍(3min)→抽题目回答问题(3min)→翻译英文文献(4min)英语口语题目:01、你对南京的印象如何02、你对南京邮电大学的印象如何03、你为什么选择南邮04、你之前本科读什么专业,是否跨考05、简单介绍一下你本科学校06、说说你本科四年的生活07、有什么兴趣爱好与优劣势08、研究生期间的规划是什么09、你参加过什么比赛获得过哪些奖项10、为什么选择读研究生翻译:Machine Learning;deep learning;convolutional neural network;data mining;Networked control。

计算机专业英语作业

计算机专业英语作业

计算机专业英语作业:1、请将视频“什么是电脑硬件”中所述内容用英文表示。

2、请将以下英文翻译为中文。

1)Plug and Play, sometimes, abbreviated(简略的、缩写) PnP, is a catchy(动人的、易记住的) phrase( [freiz] 短语、习语) used to describe devices(设备、装备) that work with a computer system as soon as(与……一样)they are connected(链接的、有关系的). The user does not have to manually(手动的、用手) install drivers(驱动) for the device(装置、策略) or even tell the computer that a new device has been added. Instead the computer automatically(自动的、机械的) recognizes the device, loads new drivers for the hardware if needed, and begins to work with the newly connected device(链接设备),即插即用,缩写为PnP,这是一个容易记住的短语,它用来描述与计算机操作系统连接工作有关的设备。

用户不需要为设备手动安装驱动,甚至于不需要告诉计算机已经添加了饿一个新的设备。

计算机自动识别设备,如果需要为硬件加载一个新的驱动,并且开始工作在新的连接设备上。

For example, if you connect a Plug-and-Play mouse to the USB port on your computer, it will begin to work within a few seconds of being plugged(拥塞的、接通电源) in. A non plug-and-play device would require you to go through several steps of installing drivers and setting up the device before it would work.例如,如果你在你的电脑上的USB接口连接了一个即插即用的鼠标,它开始工作时接通电源只需要几秒钟。

计算机专业英语作业

计算机专业英语作业

计算机专业英语计算机专业英语 练习练习V ocabulary (一)Translate the following words and expressions into Chinese . 1. O perating system (Operating system (操作系统) 2. white box testing (白盒测试(白盒测试3. hard disk (硬盘)(硬盘) 4. management information system (管理信息系统(管理信息系统5. electronic commerce (电子商务(电子商务6. relational database (关系数据库)(关系数据库)7. software engineering (软件工程(软件工程8. software maintenance (软件维护(软件维护9. menu bar (菜单条(菜单条10. network security (网络安全(网络安全(二)Fill in the blank with the corresponding English abbreviations .1.只读存储器 2.广域网3.传输控制协议 4.文件传送[输]协议5.通用串行总线 6.6.面面向对象编程7.集成开发环境 8.结构化查询语言9.数据库管理系统 010..开放系统互连(三)Match the following words and expressions in the left column with those similar in meaning in the right column .1. application software a .音频2.machine language machine language b .应用软件3.structured programming c .机器语言4。

functional testing functional testing d .软件测试5.memory memory e .结构化程序设计6.relational database relational database f .内存7.firewall firewall g .功能测试8.software testing software testing h .关系数据库9.hacker hacker i .黑客1010..audio audio j.j.防防火墙Translation Translate the following sentences into Chinese1. There are several applications called Web browsers that make it easy to access the World Wide Web, Two of the most popular being Netscape Navigator and Microsoft ’s Internet Explorer. 2. SQL SQL Server Server Server is is is designed designed designed to to to allow allow allow thousands thousands thousands of of of users users users to to to access access access the the database at the same time and is a true client/server database system. 3. During During the the the last last last few few few years, years, years, it it it has has has been been been realized realized realized that that that maintenance maintenance maintenance of of programs is more expensive than development, so reading of programs by humans is as important as writing them. 4. Some Some applications, applications, applications, such such such as as as Word, Word, allow allow for for for several several several windows windows windows in in in a a special special mode mode mode called called called MDI MDI MDI in in in which which which you you you can can can open open open multiple multiple multiple documents documents within the same application.  Translate the following paragraph into Chinese Over the last few decades there has been a tremendous growth in information technology technology and and and its its its impact impact impact on on on everyday everyday everyday life. life. Complex Complex software software software systems systems have have become become become critical critical critical to to to the the the operation operation operation of of of many many many systems systems systems in in in areas areas areas such such such as as banking, communications, manufacturing, power generation, and transportation. Progress Progress in in in computer computer computer science science science and and and accumulated accumulated accumulated experience experience with with industrial industrial industrial production production production of of of software software software have have have led led led to to to the the the emergence emergence emergence of of of software software engineering as a separate discipline. The software engineering discipline has been defined as “the application of systematic, disciplined, quantifiable approaches approaches to to to the the the development, development, development, operation, operation, operation, and and and maintenance maintenance maintenance of of of software.software.software.”” that is, the application of engineering to Software. 计算机专业英语练习答案计算机专业英语练习答案Vocabulary1.操作系统.操作系统 2.白盒测试.白盒测试3.硬盘.硬盘 4.管理信息系统.管理信息系统 5.电子商务子商务6.关系数据库.关系数据库 7 7.软件工程.软件工程.软件工程 8.软件维护.软件维护9.菜单栏.菜单栏 1010..网络安全络安全1.ROM (Read Only Memory)2.WAN (Wide Area Network)3.TCP: Transmission Control Protocal4.FTP: File Transmission(Transfer) Protocal5.USB : Universal Serial Bus6.OOP : Object Oriented Programming7。

《计算机专业英语》习题参考答案

《计算机专业英语》习题参考答案

《计算机专业英语》习题参考答案Lesson 1I.1. Operating System2. Fetch-evaluate-execute3. Front-side bus4. Dual-core processor5. Basic Input/Output System(BIOS)II.1. 指令是特定各式的二进制数列,它们对于每台机器都是唯一的。

2. CPU是中央处理单元的简称,每个字母分开发音。

3. 大多数计算在中央处理器中进行。

4. 双核是指一个处理器上有两个完整运算内核的CPU。

5. 处理器:是微处理器或CPU的缩写。

6. 集成电路:即芯片,是由半导体材料制成的一种电子设备。

III.1. F2. T3. TIV.1.ALU, CU, Register2.memory3.processor4.the CPULesson 2I.1.Static Random Access Memory(SRAM)2.Dynamic Random Access Memory(DRAM)3.Virtual Memory4.Physical Memory5.Level 1 Cache6.Level 2 Cache7.HDD access speedII.1.动态随机存储器之所以称为“动态”是因为它每秒钟被刷新数千次。

2.RAM:是计算机中存储操作系统、应用程序和当前正是用数据的地方。

3.ROM由计算机中一小块长寿命电池供电。

4.RAM缓存是由高速静态随机存储器构成的存储器。

III.1. F2. F3. F4. TIV.1. non-volatile2. compiler3. volatile4. DRAMLesson 3I.1. Motherboard2. PC Case3. Hard Disk Drive(HDD)4. Optical mouse5. RAM6. Mobile DiskII.1.PC是有很多组件构成的一个系统。

2023年计算机专业英语大作业

2023年计算机专业英语大作业

计算机专业英语大作业Patterns Instruction in Software EngineeringAbstract:The paper deals with a training system with a client-server architecture created for students who are learning to design and implement object-oriented software systems with reusable components, and also targeting those users who wish become accustomed with (or improve their skills related to) software design.The paper briefly presents the design patterns which are to be found in the software library, as well as the manner of applying them.The user of such a system has five types of patterns at his/her disposal (Factory Method, Builder, Command, Mediator, Observer), out of which will be able to chose one/more than one, depending on the requirements of the system proposed for design.1.IntroductionMotto: “The software design patterns help you learn more from other people’s successes than from your own failures”[Mark Johnson] .A software system is a dynamic entity that undergoes multiple changes during its life-cycle, under the influence of factors such as: new user requirements, adding new functionalities, environment adjustment, etc.Therefore, apart from fulfilling those functions which it was designed to fulfill, a software application must be easily changeable, with some of its modules eventually re-used.Having this goal, the application must fulfill certain requirements regarding robustness, mobility, flexibility, scalability, etc.The software design principles are regarded as ways of obtaining the right and re-usable design.By applying abstractization and OOP languages polymorphic techniques, the open-shut principle and the substitution principle (Liskov) upon classes of problems, common solutions were reached –solutions which make up the so-called design patterns.The software patterns facilitate re-using design and architecture.If the design and/orarchitecture of a system were built with design patterns (techniques which have proven efficient), then they will be more accessible and easier to understand by those software developers who build new systems based on old design.The patterns help the software specialist chose that design that makes the system re-usable.In software engineering, “design pattern”(DP) means a solution applicable to a certain type of problems.A design pattern is a description model of how a problem should be solved.A pattern cannot be directly transformed in source code.The purpose of design patterns is to enable a “good”object-oriented design, and more than that –to make it reusable (which is more important than reusing the code, regardless of the fact that reusing the design often implies reusing the code).The quality of software design is proportional to the experience and previous knowledge of the one performing it.An expert applies solutions previously used and proven efficient for similar problems.When the expert finds a solution considered acceptable, he/she uses it again.Design patterns solve specific design problems, making the OO more flexible, elegant and reusable.DP help beginners with software design, proposing patterns based on previous experience.A user who is familiar with the DP-s can apply them instantly in order to solve specific problems, without having to rediscover them.By using the software design patterns while designing an object-oriented architecture, one is guaranteed to obtain system compliance to software engineering principles, while also preserving the qualities of “good design”: reusable, flexible, robust .2.Design PatternsDepending on the DP purpose, the authors of GoF [4] proposed three main categories of patterns: creational patterns, structural patterns and behavioral patterns.These are the most well-known DP, but not the only ones.Other types of patterns emerged –more or less popular –as well as variations of the GoF patterns.A pattern has four essential components:: the name of the DP must describe in a few words a design pattern problem, its solutions and the solution’s effects.2.Problem: describes the situations when the pattern is applicable, explaining the problem as well as its context.3.Solution: describes the components of the design, the relationships between them, the responsibilities of each component and the way they interact.The solution does not describe a specific design for a certain situation or a correct implementation, because a pattern has a general character, referring to a plethora of contexts.The DP presents an abstract description of a problem and a general arrangement of the components (classes and objects) that solve the described problem.4.Effects: refer to the results of applying the pattern, which are very important when we evaluate the alternatives and we estimate the costs and benefits of applying the pattern.The effects of a pattern are also to be perceived in the flexibility, extensibility and portability of a system.DP identifies the classes and instances which participate, their role, collaboration and responsibility sharing between them.The design patterns that the user of the proposed system has at hand are: Factory Method and Builder (from the Creational Patterns category), Command, Mediator and Observer, (from the Behavioral Patterns category).3.The Architecture of the SystemThe platform is designed as a distributed application, providing the option of distance learning/tutoring by means of a computer network or the Internet.The application can be classified as having “three - tier" architecture, the Client part being represented by the configuration module and the tutoring material presentation module.The user connects to the system by means of a Login module, monitored by an Administrator agent (CerberusAgent).After authentication the user may have access to a configuring instrument (if the user connected to the system is the tutor) or to the user interface by means of which the learning material will be presented (if the user is a student).This part of the application will be monitored by an interface agent (InterfaceAgent).The application server contains the agent platform that monitors the student activity, and a web server responsible for delivering the learning material to the user interface (Apache Tomcat).The third level consists of a xml database (Apache Xindice), which stores information about the structure of the course, student models, etc.The MTS training system is designed for students which learn to design and implement object-oriented software systems, with re-usable components, but also for those users who wish to become familiar with (or improve) software design.We present the approach of a multi-agent intelligent platform for tutoring student which provides a Student Model.The “modeling student process”used the overlay architecture (common for many tutoring systems) combined with the Bayesian Theory of Probability .The system’s tasks are distributed among the intelligent agents (software agents), each having clearly specified individual roles as following: administrator (Cerberus Agent); interface (InterfaceAgent); tutor (Tutor Agent); student (Student Agent).Moreover, the system has “three-tier”architecture and was implemented in Java language.We may well imagine software agents attached to every application or tutoring environment, each having an explicit representation of the users’objectives, of their plans and resources.These agents communicate and negotiate with each other in order to fulfill their individual or group objectives.The multi-agent tutoring system (MTS) was designed and implemented within the Computer Science Department, in which research focused upon “modeling”the student with a view to identifying the most suitable methods and tutoring strategies by taking into account individual knowledge and abilities.The user of this kind of system has all five types of previously described patterns at his/her disposal (Factory Method, Builder, Command, Mediator, Observer), out ofwhich will be able to use one or more, depending on the requirements of the system that needs to be designed.Depending on the needs of the user that must fulfill the requirements of the system, one selects from Tutor Agent the design patterns best suited for those functions.The patterns help build the menus of the application and the user interface.Then the database is built, as the user has permanent access to an example of application as similar as possible to the one which needs to be carried out.In order to develop an application, the student must know the Java programming language, must be familiar with MySql data servers and must be able to use the Eclipse platform.The Eclipse platform is an open source framework from IBM which aims to provide a variety of basic services for software developers [6].4.ConclusionsThe system wishes to be a useful working instrument for software application development training, for both students and other types of users.A design pattern together with an example of using that pattern may become a way of working in software design.Moreover, in this case applying design patterns –therefore design principles - in carrying out an object-oriented application results into a reusable design and reusable modules / components.Also, the resulting code enjoys more robustness and flexibility, these two characteristics being essential for developing new modules that would add new functionalities and operations to the application; the design/code of the application is open to extension and closed for changes, according to OCP.Another important aspect relates to the maintenance activities which the designed application will undergo along its life-cycle: they will more cost effective, as no change will disseminate through the entire system, the application code being built so that it isolates the volatile classes (according to the principle of reversing dependencies), the dependencies being in the way”details depend upon abstractization”and not the other way around.The software patterns ensurecompliance to design principles, as they contribute to obtaining a steady and efficient system, and they provide design discipline for st but not least, using such a system in software engineering learning makes the process much more attractive and efficient.The design patterns approach in software engineering training fits the pedagogical Schemas Theory (created by Bartlett at the beginning of the 20th century) .A brief representation of the particular knowledge of the training domain can help the trainee to easier absorb the new information, while the organization and structuring of the knowledge as patterns will guide him/her in finding (remembering) the necessary information in a certain context.We believe that within such an approach one can create a training ontology from Software Engineering.软件工程模式教学摘要:本页处理一种C/S架构旳训练系统, 为学习设计和实行一种面向对象旳用可重用组件旳软件系统旳学生而设计, 也将目旳瞄准那些顾客谁但愿成为(或提高他们旳有关技能)软件设计习惯。

07南京邮电大学《专业英语》作业翻译

07南京邮电大学《专业英语》作业翻译

Part ONE :1.rate equations速率方程2.Coherence length相干长度3.Multi-hologram recording多全息记录4.Crosstalk串扰5.Electrooptic amplitude modulation 电光幅度调制6.Frequency spectrum频谱7.Dielectric constant介电常数8.Threshold value阈值9.Index of refraction折射率10.Quantum-Well Laser量子阱激光器11.DC current-voltage characteristics直流电流电压特性12.Gain coefficient增益系数13.Optical data storage光学数据存储14.Optoelectronics光电子学15.Transmission factor传输因子16.Phase modulation 相位调制17.Resonant circuit谐振电路18.Transit-Time 迁移时间19.Polarizer 起偏器20.retardation bias 延迟偏移21.Transverse electrooptic modulators横向电光调制器22.Traveling-wave modulators行波调制器23.Optical polarization光偏振24.Optical phase velocity光学相速度25.Crystal axis晶轴26.Modulated optical carrier调制光载波27.Propagation vector传播矢量28.V olume holograms体积全息照相29.Electrooptic crystal电光晶体30.Data-Bearing hologram数据方位全息图31.Object beam 物光32.Reference beam 参考光33.Incident beam 入射光34.Diffracted beam 衍射光35.Bragg diffraction布拉格衍射36.diffraction grating衍射光栅37.K space K空间38.Reconstruction 重构39.Wavelength multiplexing波长复用40.Diffraction efficiency衍射效率41.Reflection efficiency反射效率42.Demultiplexers分离器43.Dense wavelength division multiplexing密集波分复用44.Collimating lens准直透镜45.Coupling lens 耦合棱镜46.DFB分布反馈(激光器)47.Single mode fiber单模光纤48.Optical communication光通信49.Broadband access networks宽带接入网50.Passive optical networks无源光网络51.EPON 以太网无源光网络52.GPON 吉比特无源光网络53.A TM(Asynchronous Transfer Mode)异步传输模式54.ONT 光网络终端55.ONU 光网络单元56.FTTH光纤到户57.FTTB光纤到大楼58.FTTC光纤到路边59.Digital subscriber line数字用户线60.Hybrid fiber coaxial cable( HFC) 光纤同轴电缆混合网61.Optical line terminal(0LT) 光线路终端62.Optical distribution network(ODN) 光分配网络63.PSTN公用交换电话网64.Data encryption standard(DES) 数据加密标准65.Advanced encryption standard(AES) 高级加密标准66.Hybrid star-ring architecture混合星环结构67.Optical switch光开关68.EDFA掺铒光纤放大器69.Multi-point control protocol (MPCP) 多点控制协议70.Frequency spectrum 频谱71.CHAP(Challenge-Handshake Authentication Protocol)挑战握手协议72.Fiber Bragg grating sensor system光纤布拉格光栅传感系统73.SNR信噪比74.Microelectronics微电子75.Electro-fluidic microsystem modeling 电流体微系统模型76.Downstream traffic 下行通道77.Upstream traffic 上行通道78.Frame relay 帧中继79.Physical layer 物理层80.VHDL硬件描述语言81.Dynamic 动态的82.Digtal kernel 数字内核83.Splitter 分路器84.Transparency 幻灯片85.Photopolymer 光敏聚合物86.Dispersion 色散87.Bit rate 比特率88.Symmetric 对此89.Asymmetric 不对此90.Simultaneous simulation 实时仿真91.Mixed-signal 混合信号92.Multi-language simulation 多语言仿真93.Amplitude 振幅94.V alue boundaries 价带95.Virtual test 虚拟测试96.System-on-chip design系统级芯片设计97.Sub-system 子系统98.Analog kernel模拟内核99.Scatter 散射100.Feedback 反馈Part TWO:量子阱激光器的阻抗特性摘要:基于一个简单速率方程的模型,我们得出量子阱激光器阻抗在阈值附近的理论表达式。

计算机专业英语作业(1)

计算机专业英语作业(1)

计算机专业英语作业(1)一、Translate the following sentences into English or Chinese.1.计算机2.多媒体3.硬件4.软件5.输入设备6.存储器7.外部设备8.处理器9.鼠标10.语音识别11.扫描仪12.寄存器13.Arithmetic and logic unit 14.Binary form15.Control unit 16.Instruction cycle17.Execution cycle 18.Central processing unit 19.Universal serial bus 20.Universal parallel bus二、For each of the following blanks, four choices are given. Choose the most appropriate one.1.A personal computer keyboard includes .a.a typewriter layout and a set of arrow keysb.a numeric keypadC.a Set of function keysd.a11 of above2.A display is a device that is used to display .a.numbers letters b.special charactersc. graphic information d.all of above3.system software includes and .a.operating system and application softwareb.operating system and programming languagec.special—purpose programs and application softwared.OS and special—purpose programs4.Information flows from a computer into a peripheral device as .a.output b.memory c.a program d.input 5.programs are known collectively as .a.secondary storage b.softwarec.stored programs d.hardware6.which is not common feature of most application software?a.menus b.toolbars c.insertion point d.alignment 7.Main memory holds .a.data for processing b.the programc.information d.all of above8.The number of bits that can be Processed at one time is aa.register b.cycle c.word d.PROM 9.Data and instructions are stored in memory at location known asa.address b.byte c.word d.number 10.The central processing unit (CPU) had two parts: and .a.control unit and ALU b.ALU and registerc.register and control unit d.ALU and memory11.A holds enough bits to store a single character.a.word b.bit c.byte d.two bytes 12.A location in memory is accessed by its .a.address b.content c.value d.digit 13.Which is not the actor that some microcomputer are more powerful than others .a.Speed b.capacity c.flexibility d.application 14.The CPU has two main parts 。

计算机专业英语练习试卷3(题后含答案及解析)

计算机专业英语练习试卷3(题后含答案及解析)

计算机专业英语练习试卷3(题后含答案及解析) 题型有:1. 选择题选择题(每小题1分,共75分)下列各题A、B、C、D四个选项中,只有一个选项是正确的,请将此选项涂写在答题卡相应位置上,答在试卷上不得分。

1.______ is permanently stored in the computer and provides a link between the hardware and other programs that run on the PC.A.InterfaceB.Operating systemC.InternetD.Applicaion software正确答案:B解析:译文的含义是:( )永久存储在计算机中,在硬件和PC机上运行的其他程序之间,提供联系。

选项A、B、C、D的含义分别是接口、操作系统、因特网、应用软件。

选项B符合题意,为所选。

知识模块:计算机专业英语2.______ is not a linear structure.A.GraphB.QueueC.StackD.I-dimension array正确答案:A解析:译文的含义是:( )不是线性结构。

选项A、B、C、D的含义分别是图、队列、栈、I维数组。

选项A符合题意,为所选。

知识模块:计算机专业英语3.______ is the sending and receiving of the messages by computer. It is a fast, low-cost way of communicating worldwide.A.LANB.Post officeC.E-MailD.I-dimension array正确答案:C解析:译文的含义是:( )通过计算机收发消息,它是快速的、低成本的与世界通信的方式。

选项A、B、C、D的含义分别是局域网、邮局、电子邮件、I 维数组。

选项C符合题意,为所选。

知识模块:计算机专业英语4.The ______ is a collection of computers connected together by phone lines allows for the global sharing of information.A.interfaceB.InternetC.LAND.WWW正确答案:B解析:译文的含义是:( )是通过电话线互联的计算机的集合,使得全球信息共享成为可能。

南邮02级计算机通信专业《通信英语》科考试复习指导

南邮02级计算机通信专业《通信英语》科考试复习指导

南邮05级通信工程专业《专业英语》科测试复习指导一、测试范围全教材有16个单元(Unit1~Unit16),本次测试主要考到的单元有:Unit 1 The Principle of PCMUnit 2 Asynchronous Serial Data TransmissionUnit 4 InternetUnit 8 The Development of Paging SystemUnit 9 Cellular Mobile Telephone SystemUnit 14 The Public Telecommunication NetworkUnit 16 Current Situation and the Future in the Telecommunication World二、测试题型及分数比例参见后面的模拟测试练习题三、各测试单元中重点复习的内容如下:Unit 1:第一段中从:Practical equipments-------------至本段结束。

第三段全段,并关注其中两个句子:一个是从25行的“It is therelationship of……到27行的communication engineer.”另一个是从“31行的Alternative examples-----至-----so is the noise power.”第五段中从:So far in this-------至or even 120 separate channels.Unit 2:第一段中从:This interface is-----至----------and receiver is necessary.第二段中从:The fundamental problem-----至------units into characters。

第五段全段。

并关注其中一个句子:从30行的“The transmitter----至------33行的until all bits have been transmitted.”第六段全段。

05南京邮电大学《专业英语》作业翻译

05南京邮电大学《专业英语》作业翻译

基于全息光栅叠加光敏复用器摘要——一个光敏基于两个重叠全息光栅解复用器的结构,提出并首次展示。

分路器由两相干光束集得一个全息记录来构造。

在拟议的计划,两个不同的渠道,光学信号的耦合通过衍射方法两光栅叠加成一个共同的单模光纤(SMF)。

耦合光谱通道通过调整单模光纤的空间位置进行选择。

两个连接到相同光纤上的光谱通道之间的波长分离可以通过改变全息光栅形成的角度来控制。

关键词汇——解复用器,光敏,叠加全息光栅。

一.引言在光通信领域,密集波分复用多路复用(DWDM)系统中已经提出,试图以增加数据容量光波通信,由于多渠道同时维持在现有的通信网络,因此无需额外的光纤。

许多技术可用于多路解复用器。

自由空间(散装)光栅最近引起广泛注意。

这种设备与其他设备如光纤光栅相比,优点是它们不需要任何环形,并增加通道数以及非常低的串扰。

值得注意的是,在以波分复用叠加为目的的红外光聚合物全息光栅已经成功报道。

高性能多路器和复用器使用这种全息设备将被网络变得更加复杂的DWDM系统所需要。

在这段文字中,一个DWDM系统的双波段信号分离器的新方案被提出并实验证实。

为解复用的全息光栅已被几个研究小组,包括我们组建议使用。

在全息分路器的基础上,感光树脂具有制作简便,高信道容量,低串扰的各种优势。

我们的全息光栅,通过两个信号干扰一个参考光束光束在一个光敏进行记录。

在弱调制制度下,由于单次散射现象使每个光栅折射波独立。

对于单波长,衍射光栅有两个不同方向的入射光。

由于入射波波长多渠道,叠加两个全息光栅,然后分成两个组,其中有两个不同波长的传播渠道,可以在同一个方向。

因此,该设备可以作为一个双频段分路器并且连接两种波长组成部分纳入相同的输出光纤。

建议的结构可能会发现DWDM系统的各种应用。

图1。

配置的叠加全息光栅。

(a)叠加记录方法。

(b)布拉格双频衍射条件。

对于单波长光波,衍射光栅使其衍射至在两个不同方向.对于入射波的多波长的情况,两个全息光栅叠加,然后分成两个组,其中有两个不同波长的传播渠道,可以在同一方向。

计算机专业英语大作业

计算机专业英语大作业

网址一:/hub/save-computer-from-Hackers网址二:/hub/What-is-Phishing姓名:**学号:************分校:通州(一)原文1.What is Computer Hacking?Computer hacking is a malicious act, so it is important for your computer and data to protect from Hacking. Computer Hacking refers to the process of making malicious modifications to a software or hardware to accomplish an aim outside the original creator's objective. Hackers are usually expert programmers who usually see hacking as a real life application of their skills.Hacking has become a nuisance in recent times and the protection from hacking has become more complex. Infact, the hackers have become so good that even the software giants are feeling a headache. Nintendo recently reported a loss of $975 million due to privacy and Microsoft has lost an estimated $900 million in five years.Well, the Giants are not the only targets of these hackers, even common individuals are not safe. The dangers range from little thefts to sponsored terrorism. These include stealing personal information and spying your activities. They can get to your secrets and destroy your credit. The dangers are possibly endless.How to protect from HackingPrevention is Better Than Cure. The problem of computer hacking has become really serious. But there are some basic methods which are usually the best to guarantee a Hacker-free system. Here, I am going to introduce some basic tips to save your computer and data from hackers.Using Antivirus SoftwareAntivirus software are one of the basic tools for your data and computer to protect from hacking. Antivirus software act as a protecting net that catches any potential threat before it reaches your system. They can prevent unauthorized access to your computer, protects your system from viruses and cloaks your data ports from intruders searching for any opening. The dangers range from little thefts to sponsored terrorism. These include stealing personal information and spying your activities.Nowadays anti virus software are completely automated. Go for the best when choosing anti virus software and make sure that you scan your system for viruses atleast once a week. Norton antivirus from Symantecis one of the leading products in the industry. Avastis another great antivirus tool to protect from hacking.Using FirewallWhat is a Firewall?A firewall is a set of programs located at the network gateway server which protects a private network from unauthorized access from other networks. The term firewall is originally referred to a wall intended to confine a fire.A firewall protects your computer from offensive websites and potential hackers. It keeps your data and information safe from unwanted intruders. Firewalls are designed to prevent unauthorized access to your network, much like a locked door.Thus firewall is a vital tool for your strategy against hackers so don't forget to set up one for your system. Microsoft has a built-in firewall software but you can also try the Symantec firewall.Using Anti Spyware SoftwareWhat is a Spyware?A spyware is a self installing software which secretly gathers information about a person's computing activities such as surfing habits and viewed sites. Spywares are truly a hacker's tool, not only collecting personal information but also interfering with user control by installing additional software and redirecting web browsers.Anti spyware software are designed to save your computer from hackers. They not only protect your computer by detection and removal of spywares but also preventing automatic installation of these malicious programs. Spysweeperis a great anti spyware software to guarantee a spyware free computer.Email SecurityEmail is one of the leading hacker's tools. Hackers use emails to transmit malicious software to your computer. Emails are usually very cheap which gives the hackers loads of opportunities. One of the basic tips to prevent hacking is to be extra careful with emails. The most important tip is that you should never hand out your real email address to a stranger. Never open an email arriving from an unknown source and never try to open an attachment with an email if you don't know the sender. Aviraantivirus is a useful tool to filter your emails for potential threats as well as provide premium protection for your computer.Software updatesHackers are always searching for security gaps in your system. Anti virus and anti spyware software usually lose their effectiveness with time as new and more advanced malicious programs are created by hackers.Its important to go for the latest security software in the market to guaranteemaximum security from threats. Make sure you frequently check out for software updates or set your software to update automatically.Internet SecurityBeing extra careful while surfing is the best way to protect your computer from hackers. Simple precautions can mean the difference between a secure and vulnerable system. A great way to save yourself from hackers is to avoid visiting hacker controlled sites usually committed to porn, free downloads and online gaming. Also be extra careful while downloading something from an unknown source. Never ignore a security warning about a site. Its better to be safe than sorry.Educate YourselfWhen working for an offensive against hackers, the most important step is to educate yourself. Hacking is a dynamic topic with developments arising every moment. Hackers are intelligent and innovative and you should be prepared for it.Computers are vulnerable. No matter what you do, its impossible to be 100% save. Important data like personal detail and credit card information should never be saved directly on a computer. A password protector is a great way to protect this data.Another great way to secure your computer is to use a password on your computer. Well, it can't really save you if your computer gets stolen (in case of a laptop) but can save you from unauthorized people who can reach to your computer.Windows updateMicrosoft Windows is the best OS which comes with almost all the tools to protect you and your computer from hacking. To make the most of this, it is important to keep your windows updated. An easy way to do this is by checking for updates at Microsoft Windows Update. You can also set your windows security software to check for updates automatically so you don't miss anything. ...2. What is a Phishing Attack?Identity theft has become the new white collar crime and it has grown tremendously. Criminals that steal identities use them in a number of ways. One of the most common tricks is to use a stolen identity to open a line of credit. The line of credit is then depleted by the thief and the actual person receives the bill. Identities are also stolen for malicious intent, such as stealing a military officer’s email credentials in hopes of carrying out fictitious orders to troops.Phishing is a relatively new term to describe ploys used by criminals trying to steal identities. Phishing scams are on the rise:"During 2004, close to 2 million U. S. citizens had their checking accounts raided by cyber-criminals. With the average reported loss per incident estimated at $1200, total losses were close to $2 billion. The incidence of phishing e-mails―e-mails thatattempt to steal a consumer’s user name and password by imitating e-mail from a legitimate financial institution –has risen 4,000 percent over the past six months."•What is Phishing VideoThe term “phishing” is based on the term “fishing”. With fishing you bait a hook and try to catch fish. If you do not receive a bite, you often change the type of bait until you start catching fish. With phishing, the bait is typically an email that appears legitimate. The email typically asks for a bank customer to validate their information, however, the email redirects the customer to a fictitious bank site made to look like the legitimate bank site (James, 2005). The criminals hope the customer will not notice the redirected bank site is fictitious and that they will validate their account information. There are numerous phishing emails used as bait and criminals hope the more bait they use, the greater chances someone will fall for the scam.The key to preventing identity theft is awareness. Financial institutions typically do not ask for account information validation. Any emails that ask for account validation or social security numbers, should be validated. The link contained within the email can be checked for legitimacy. These links often go to bogus sites that can easily be determined by the website link. For example, if you bank at and you receive an email that has a link and takes you to .customer.cz, this should raise suspicion. Phishing scams not only use email, but the telephone is also used. A typical scam involves a telephone call with someone impersonating your credit card company and asking you to validate your social security number, date of birth, etc. Credit card companies already have this information and do not need you to validate it. A simple line of defense is to ask the caller for the credit card company’s number and call them back。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

一:英译汉翻译的内容:《Computer_Networks_4th_Edition》书中的第四章的第六节(1-3小节)和第八节。

4.6蓝牙1994年,L.M.Ericsson公司对于“在无电缆情况下将它的移动电话和其他设备(比如PDA)连接起来”产生了浓厚的兴趣。

它与其他四个公司(IBM、英特尔、诺基亚和东芝),组成了一个团体SIG(特别兴趣集团)联盟来开发一个无线标准,用于将计算机和通信设备或附加部件通过短距离的、低功耗的、低成本的无线电波相互连接起来。

这个项目被命名为蓝牙(Bluetooth),该名字来源于北欧的一个海盗王Harald Blaatand(Bluetooth)II(940~981),他统一(即征服)了丹麦和挪威。

虽然最初的想法只是要去掉设备之间的电缆,但是,很快它便扩大了范畴,开始侵入到无线LAN的领地中去了。

尽管这样的改变使得该标准更加有应用价值,但是这也造成了与802.11进行竞争的局面。

更加糟糕的是,这两个系统还会相互电场干扰。

同时值得注意的是,Hewlett-Packard曾经在几年以前引入了一个红外网络,一边将计算机的外围设备通过无线的方式连接起来,但遗憾的是,这种网络并没有真正大规模的流行起来。

尽管如此,到1999年7月,蓝牙SIG发布了一份1500页的规范(1.0版本)。

此后不久正在考虑无线个人域网络(PAN)的IEEE标准组织802.15采纳了蓝牙的文档作为它的基础,并开始对它进行修订。

这件事情虽然看起来非常怪异,因为802.15在对一项已经有了细致规范,但无非兼容实现(还需要进一步调整)的技术进行了标准化,然而,历史表明,通过一个像IEEE这样的中立机构来管理一个开放的标准往往有助于一项技术的推广和应用。

更为精确地来说,我们应该注意到,蓝牙规范是针对整个系统的,从物理层到应用层,面面俱到。

IEEE802.15委员会仅对物理层和数据链路层进行了标准化,协议栈中的其他部分并没有纳入到它的规范之中尽管IEEE于2002年批准了第一个PAN标准802.15.1,然而,蓝牙SIG仍然在积极的改进它的方案。

蓝牙SIG和IEEE的版本并不完全一样,期望在不久的将来它们会汇聚到同一个标准上。

4.6.1 蓝牙的体系结构作为学习蓝牙系统的开始,我们首先快速的浏览一下蓝牙系统中所包含的内容以及它所针对的目标。

蓝牙系统的基本单元式一个微微网(piconet),微微网包含一个主节点,以及10米距离之内至多7个活动的从节点。

在同一个大的房间中可以同时存在多个微微网络,它们甚至可以通过一个桥节点连接起来,如图4.35所示。

一组相互连接的微微网称为一个分散网(scatternet)。

图4.35 两个微微网连接起来构成一个分散网在一个微微网中,除了7个活动的从节点以外,还可以有多达255个静观节点(parked node)。

所谓静观节点是指这样的设备主节点已将它们切换到一个低功耗状态,以便降低它们的电源消耗。

一个处于静观状态的设备,除了响应主节点的激活或者指示信号以外,不做其他任何事情。

在活动状态和静止状态之间,还有两种中间电源状态;限制(hold)和监听(sniff)状态,但这两种状态不是我们这里所关心的。

这种主/从模式的设计理由是,设计者期望将一个完整的蓝牙芯片的实现代缴降低到5美元以下。

其直接后果是,从设备基本上都是一些哑设备,只能完成一些主节点告诉它们该做的事情实际上,微微网是一个中心化的TDM系统,主节点控制了时钟,它决定了每个时槽中哪个设备可以进行通信。

所有的通信都是在主节点和从节点之间进行的,从节点与从节点之间的直接通信室不可能的。

4.6.2蓝牙应用大多数网络协议只是为通信个体提供通信,至于用这些协议来做哪些事情,这是应用设计者们应该考虑的问题。

例如,802.11并没有规定用户得使用他们的笔记本电脑来收发邮件、浏览web页面,或者别的事情。

与此相反,蓝牙V1.1规范列出了13种需要支持的专门应用,并且为每一种应用提供了不同的协议栈。

不幸的是,这种做法导致了极大地复杂性,这里我们部队这些协议栈进行讨论,仅在图4.36中列出这13种应用。

这里的应用也被称为应用轮廓(profile)。

通过粗略的看一看这些轮廓,我们会更加清楚的了解到蓝牙SIG努力要达到的目标。

英文名称中文名称说明Generic access 一般访问针对链路管理的过程Service discovery 服务发现用于发现所也提供的服务的协议Serial port 串行端口用于代替串行端口电缆Generic object exchange 一般的对象交换为对象移动过程定义“客户-服务器”关系LAN access LAN访问在移动计算机和固定LAN之间的协议Dial-up networking 拨号联网允许一台笔记本计算机通过移动电话进行呼叫Fax 传真允许一台移动的传真机与一部移动电话进行通话Cordless telephony 无绳电话将一个手持话机与本地的基站连接起来Intercom 内部通信联络系统数字步话机Headset 头戴通话允许免提的话音通信Object push 对象推送提供一种交换简单对象的方法File transfer 文件传送提供一种更为通用的文件传送设施Synchronization 同步允许一个PDA与另一台计算机进行数据同步图4.36 蓝牙应用轮廓第一个应用轮廓是一般的访问,它实际上并不是一个应用,而是其他实际应用赖以存在的基础。

它的主要任务是为主从节点之间建立和维护安全的链路(通信)提供一种方法。

另一个相对比较通用的应用是服务发现轮廓,蓝牙设备利用该服务可以发现其他设备提供哪些服务。

所有的蓝牙设备都应该实现这两个轮廓。

其余的轮廓都是可选的。

串行端口轮廓是一个传输协议,其他大多数轮廓会用到该协议。

串行端口轮廓模拟一条串行线,对于那些老的使用串行线的应用程序,该轮廓特别有用。

一般的对象交换轮廓为数据移动操作定义了客户-服务器关系。

客户发现这样的数据移动操作,然而,从设备既可以是客户,也可以使服务器。

如同串行端口轮廓一样,它是其他一些轮廓的基础。

接下来的三个轮廓都是针对网络连接的。

LAN访问轮廓使得一个蓝牙设备可以连接到一个固定的网络中,它直接与802.11竞争。

拨号联网轮廓是蓝牙整个工程的最初动机。

它使得一台笔记本电脑可以连接到一部移动电话上(该电话包含一个内置的无线调制解调器)。

传真轮廓与拨号联网轮廓类似,只不过,它允许无线传真机利用移动电话来发送和接收传真,两者之间无需连接。

接下来的三个轮廓都是针对电话的。

无绳电话轮廓提供了一种办法将无绳电话的手持机与基站连接起来。

目前,大多数无绳电话不能当做移动电话来使用,但是在将来,无绳电话和移动电话可能会合并起来。

内部通信联络系统轮廓使得两部电话就像步话机那样连接起来。

最后,头戴通话轮廓为头戴设备和基站之间提供了免提话音通信的能力,例如,在驾驶汽车的时候就是一部免提电话。

剩下的三个轮廓都被用于在两个无线设备之间实际交换对象。

这些对象可以使名片,图片或者数据文件。

尤其,同步轮廓的主要用途是,当一个PDA或者笔记本计算机离开家的时候,通过通过同步轮廓可以将数据装到PDA或者笔记本电脑中,而当它回到家里的时候,又可以将数据收集回来。

真的有必要分清楚所有这些应用的细节,并且为每一种应用提供不同的协议栈吗?也许并没有这个必要,但是,由于存在许多个不同的工作组,他们分别在设计该标准的不同部分,因此,每个工作组都关注它自己特定的问题,从而形成了它自己的轮廓。

你可以把这看成是Cnoway法则在起作用(在1968年4月份的Datamation杂志上,Melvin Conway评述说,如果你安排n个人编写一个编译器,那么,你将会得到一个n步的编译器,或者更一般地,软件结构反映出了编写该软件的小组的结构)。

或许蓝牙标准根本不用13个协议栈,两个就可以了,一个用于文件传输,另一个用于流式的实时通信。

4.6.3 蓝牙协议栈蓝牙标准有许多协议,它们按照松散的方式被组织到各层中。

层的结构并不遵从OSI 模型,或TCP/IP模型,或802模型。

然而,IEEE正在修订蓝牙标准,以便强行将它们纳入到802模型中。

经过802委员会修改之后的蓝牙基本协议结构如图4.37所示。

应用/轮廓其它RFcomm 电话服务发现音频音频LLC逻辑链路控制适应协议(链路管理器)基带物理无线电图4.37 802.15版本的蓝牙协议结构最底层是物理无线电层,它很好的对应了OSI和802中的物理层。

该层处理与无线电传送和调制有关的问题。

在这一层上的许多考虑都涉及到如何使系统的造价更加低廉,以便形成巨大的市场。

基带层有点类似于MAC子层,但是也包含了物理层的要素。

它涉及到主节点如何控制时槽,以及这些时槽如何组织成帧。

接下来一层是一组多少有些相关的协议。

链路管理器负责在设备之间建立逻辑信道,包括电源管理、认证和服务质量。

逻辑链路控制适应协议(L2CAP)为上面各层屏蔽了传输细节。

它类似于标准的802LLC子层,但从技术上讲有所不同。

对于音频协议和控制协议,正如其名字所表示的,它们分别处理与音频和控制相关的事宜。

上层应用可以直接操控着两个协议,而不必通过L2CAP协议。

再往上一层是中间件层,它是由许多不同的协议混合而成的。

为了与802的其他网络保持兼容,IEEE将802LLC插在这里。

RFcomm、电话和服务发现协议都是这里的专门协议。

RFcomm(Radio Frequency communication,无线电频率通信,或者射频通信)是指模拟PC 上用于连接键盘、鼠标、调制解调器,及其他设备的标准串口通信。

它的设备意图是允许传统的设备更加容易的使用它。

电话协议是一个实时协议,用于三种面向话音的轮廓。

它也管理呼叫的建立个终止。

最后,服务发现协议可以用来找到网络内的服务。

最上层是应用和轮廓所在的地方。

它们利用底层上的协议来完成它们的任务。

每个应用都有它自己的专用协议子集。

特定的设备,比如头戴设备,通常只包含其应用所需的那些协议,而不会包含其他的协议。

在下面的小节中,我们将介绍蓝牙协议栈中最低的三个层,因为这三层大致对应于物理层和MAC子层。

4.8本章小结一些网络具有一个用于所有通信的单个信道。

在这些网络中,关键设计问题是希望用它的竞争站之间的这个通道的分配。

无数的信道分配算法已经被设计出来。

图4.52概括了一些比较重要的信道分配方法。

方法说明FDM 为每个站专门分配一段频WDM 针对光纤的动态FDM方案TDM 为每个站分配一个时槽纯的ALOHA 任何时候都不进行同步传输分槽的ALOHA 在明确定义的时槽内随机传输1-持续CSMA 标准的载波检测多路访问非持续的CSMA 当信道被检测到忙的时候随机延迟P-持续CSMA CSMA,但是持续的概率为PCSMA/CD CSMA,但是在检测到冲突之后就放弃位图用一个位图进行轮循二进制倒计数在所有准备就绪的站中,下一个编号是最大的站树径协议(tree walk)通过选择机制来减少竞争MACA、MACAW 无线LAN协议以太网支持二进制指数后退算法的CSMA/CDFHSS 调频扩频DSSS 直接序列扩频CSMA/CA 避免冲突的CSMA图4.52 公用信道的系统和信道分配方法最简单的分配方案是FDM和TDM。

相关文档
最新文档