【计算机专业文献翻译】数据库构建

合集下载

计算机专业英语及翻译Unit 10

计算机专业英语及翻译Unit 10

Unit 10 Program DesignText 1 Computer LanguagesComputer languages have undergone dramatic evolution since the first electronic computers were built. Early on, programmers worked with the most primitive computer instructions—machine language. These instructions were represented by long strings of ones and zeroes. Soon, assembly language was invented. It maps machine instructions to human-readable mnemonics, such as ADD and MOV.In time, higher-level languages evolved, such as PASCAL, BASIC, COBOL, C, C++, and JA V A. These languages let people work with something approximating words and sentences, such as Let I = 100. These instructions were translated back into machine language by interpreters and compilers. An interpreter translates a program as it reads it, turning the program instructions, or code, directly into actions. A compiler translates the code into an intermediary form. This step is called compiling, and produces an object file. The compiler then invokes a linker, which turns the object file into an executable program.Because interpreters read the code as it is written and execute the code on the spot, interpreters are easy for the programmer to work with. Compilers, however, introduce the extra steps of compiling and linking the code, which is inconvenient. Because the time-consuming task of translating the source code into machine language has already been accomplished, compilers produce a program that is very fast each time it is run.The problems programmers are asked to solve have been changing. Today's programs use sophisticated "user-friendly interfaces," involving multiple windows, menus, and dialog boxes. The programs written to support this new approach are far more complex than those written just ten years ago. Generally, as programming requirements have changed, both languages and the techniques used for writing programs have evolved.参考译文计算机语言自从第一批电子计算机诞生以来,计算机语言已经发生了戏剧性的变化。

数据库有关的中英文翻译

数据库有关的中英文翻译

数据库概论A database consists of a file or a set of files. The information in these files may be broken down into records, each of which consists of one or more fields. Fields are the basic units of data storage, and each field typically contains information pertaining to one aspect or attribute of the entity described by the database. Using keywords and various sorting commands, users can rapidly search, rearrange, group, and select the fields in many records to retrieve or create reports on particular aggregates of data.一个数据库由一个文件或文件集合组成。

这些文件中的信息可分解成一个个记录,每个记录有一个或多个域。

域是数据存储的基本单位,每个域一般含有由数据库描述的属于实体的一个方面或一个特性的信息。

用户使用键盘和各种排序命令,能够快速查找、重排、分组并在查找的许多记录中选择相应的域,建立特定集上的报表。

Database records and files must be organized to allow retrieval of the information. Early systems were arranged sequentially (i.e., alphabetically, numerically, or chronologically); the development of direct-access storage devices made possible random access to data via indexes. Queries are the main way users retrieve database information. Typically, the user provides a string of characters, and the computer searches the database for a corresponding sequence and provides the source materials in which those characters appear. A user can request, for example, all records in which the content of the field for a pe rson’s last name is the word Smith.数据库记录和文件的组织必须确保能对信息进行检索。

计算机专业 英语第三单元翻译

计算机专业 英语第三单元翻译

第三章:Basic Application Softwareanalytical graph 分析图AutoContent wizard 自动制作内容向导basic application 基本应用bulleted list 项目符号列表business suite 商业组合button 按键cell 单元格character effect 角色效应chart 图表column 列computer trainer 计算机教师contextual tab 上下文件标签database 数据库database management system(DBMS) 数据库管理系统database manager 数据库管理器design template 设计模板dialog box 对话框editing 编辑field 字段find and replace 查找与替换font 字形font size 字体大小/尺码form 表单format 编排;格式化formula 公式function 函数galleries 图文集grammar checker 语法检查器home software 家庭软件home suite 家庭组合icons (计算机屏幕上表示命令、程序的)符号, 图像,图标integrated package 集成组件,完整的软件包label 标签master slide 母片menu 菜单menu bar 菜单栏numbered list 编号列表numeric entry 数字输入personal software 个人软件personal suite 个人软件组pointer 指针presentation graphics 演示图片;电子文稿程序productivity suite 生产组合query 查询range 范围recalculation 重算record 记录relational database 关系数据库report 报告ribbons 带状区row 行sheet 单层表单slide 幻灯片software suite 软件组sort 排序;分类specialized application 专业应用specialized suite 专业组件speech recognition 语音识别spelling checker 拼写检查器spreadsheet 电子制表软件table 表格text entry 文字输入thesaurus 同义词词典toolbar 工具栏utility suite 实用程序组what-if analysis 假定分析window 窗口word processor 文字处理器word wrap 自动换行workbook file 工作簿文件worksheet 工作表As we discussed in Chapter 1, t正如我们在第一章讨论的,有两种软件。

数据库 专业英语翻译

数据库 专业英语翻译

数据库数据库(Database)是按照数据结构来组织、存储和管理数据的仓库,它产生于距今五十年前,随着信息技术和市场的发展,特别是二十世纪九十年代以后,数据管理不再仅仅是存储和管理数据,而转变成用户所需要的各种数据管理的方式。

数据库有很多种类型,从最简单的存储有各种数据的表格到能够进行海量数据存储的大型数据库系统都在各个方面得到了广泛的应用.一.数据管理的诞生数据库的历史可以追溯到五十年前,那时的数据管理非常简单。

通过大量的分类、比较和表格绘制的机器运行数百万穿孔卡片来进行数据的处理,其运行结果在纸上打印出来或者制成新的穿孔卡片.而数据管理就是对所有这些穿孔卡片进行物理的储存和处理。

然而,1 9 5 1 年雷明顿兰德公司(Remington Rand Inc.)的一种叫做Univac I 的计算机推出了一种一秒钟可以输入数百条记录的磁带驱动器,从而引发了数据管理的革命。

1956 年IBM生产出第一个磁盘驱动器—- the Model 305 RAMAC.此驱动器有50 个盘片,每个盘片直径是2 英尺,可以储存5MB的数据。

使用磁盘最大的好处是可以随机地存取数据,而穿孔卡片和磁带只能顺序存取数据。

数据库系统的萌芽出现于60 年代。

当时计算机开始广泛地应用于数据管理,对数据的共享提出了越来越高的要求。

传统的文件系统已经不能满足人们的需要。

能够统一管理和共享数据的数据库管理系统(DBMS)应运而生。

数据模型是数据库系统的核心和基础,各种DBMS 软件都是基于某种数据模型的。

所以通常也按照数据模型的特点将传统数据库系统分成网状数据库、层次数据库和关系数据库三类。

二.结构化查询语言(SQL)1974 年,IBM的Ray Boyce和Don Chamberlin将Codd关系数据库的12条准则的数学定义以简单的关键字语法表现出来,里程碑式地提出了SQL (Structured Query Language)语言。

计算机专业外文资料翻译

计算机专业外文资料翻译

英文文献Object persistence and JavaBy Arsalan Saljoughy, , 05/01/97Object durability, or persistence, is the term you often hear used in conjunction with the issue of storing objects in databases. Persistence is expected to operate with transactional integrity, and as such it is subject to strict conditions. (See the Resources section of this article for more information on transaction processing.) In contrast, language services offered through standard language libraries and packages are often free from transactional constraints.As we'll see in this article, evidence suggests that simple Java persistence will likely stem from the language itself, while sophisticated database functionality will be offered by database vendors.No object is an islandIn the real world, you rarely find an object that lacks relations to other objects. Objects are components of object models. The issue of object durability transcends the issue of object model durability and distribution once we make the observation that objects are interconnected by virtue of their relations to one another.The relational approach to data storage tends to aggregate data by type. Rows in a table represent the physical aggregate of objects of the same type on disk. The relationships among objects are then represented by keys that are shared across many tables. Although through database organization, relational databases sometimes allow tables that are likely to be used together to be co-located (or clustered) in the same logical partition, such as a database segment, they have no mechanism to store object relationships in the database. Hence, in order to construct an object model, these relationships are constructed from the existing keys at run time in a process referred to as table joins. This is the same well-known property of the relational databases called data independence. Nearly all variants of object databases offer some mechanism to enhance the performance of a system that involves complex object relationships over traditional relational databases.To query or to navigate?In storing objects on disk, we are faced with the choice of co-locating related objects to better accommodate navigational access, or to store objects in table-like collections that aggregate objects by type to facilitate predicate-based access (queries), or both. The co-location of objects in persistent storage is an area where relational and object-oriented databases widely differ. The choice of the query language is another area of consideration. Structured Query Language (SQL) and extensions of it have provided relational systems with a predicate-basedaccess mechanism. Object Query Language (OQL) is an object variant of SQL, standardized by ODMG, but support for this language is currently scant. Polymorphic methods offer unprecedented elegance in constructing a semantic query for a collection of objects. For example, imagine a polymorphic behavior for acccount called isInGoodStanding. It may return the Boolean true for all accounts in good standing, and false otherwise. Now imagine the elegance of querying the collection of accounts, where inGoodStanding is implemented differently based on business rules, for all accounts in good standing. It may look something like:setOfGoodCustomers = setOfAccounts.query(account.inGoodStanding());While several of the existing object databases are capable of processing such a query style in C++ and Smalltalk, it is difficult for them to do so for larger (say, 500+ gigabytes) collections and more complex query expressions. Several of the relational database companies, such as Oracle and Informix, will soon offer other, SQL-based syntax to achieve the same result. Persistence and typeAn object-oriented language aficionado would say persistence and type are orthogonal properties of an object; that is, persistent and transient objects of the same type can be identical because one property should not influence the other. The alternative view holds that persistence is a behavior supported only by persistable objects and certain behaviors may apply only to persistent objects. The latter approach calls for methods that instruct persistable objects to store and retrieve themselves from persistent storage, while the former affords the application a seamless view of the entire object model -- often by extending the virtual memory system. Canonicalization and language independenceObjects of the same type in a language should be stored in persistent storage with the same layout, regardless of the order in which their interfaces appear. The processes of transforming an object layout to this common format are collectively known as canonicalization of object representation. In compiled languages with static typing (not Java) objects written in the same language, but compiled under different systems, should be identically represented in persistent storage.An extension of canonicalization addresses language-independent object representation. If objects can be represented in a language-independent fashion, it will be possible for different representations of the same object to share the same persistent storage.One mechanism to accomplish this task is to introduce an additional level of indirection through an interface definition language (IDL). Object database interfaces can be made through the IDL and the corresponding data structures. The downside of IDL style bindings is two fold: First, the extra level of indirection always requires an additional level of translation, which impacts the overall performance of the system; second, it limits use of database services that are unique to particular vendors and that might be valuable to application developers.A similar mechanism is to support object services through an extension of the SQL. Relational database vendors and smaller object/relational vendors are proponents of this approach; however, how successful these companies will be in shaping the framework for object storage remains to be seen.But the question remains: Is object persistence part of the object's behavior or is it an external service offered to objects via separate interfaces? How about collections of objects and methods for querying them? Relational, extended relational, and object/relational approaches tend to advocate a separation between language, while object databases -- and the Java language itself -- see persistence as intrinsic to the language:Native Java persistence via serializationObject serialization is the Java language-specific mechanism for the storage and retrieval of Java objects and primitives to streams. It is worthy to note that although commercial third-party libraries for serializing C++ objects have been around for some time, C++ has never offered a native mechanism for object serialization. Here's how to use Java's serialization: // Writing "foo" to a stream (for example, a file)// Step 1. Create an output stream// that is, create bucket to receive the bytesFileOutputStream out = new FileOutputStream("fooFile");// Step 2. Create ObjectOutputStream// that is, create a hose and put its head in the bucketObjectOutputStream os = new ObjectOutputStream(out)// Step 3. Write a string and an object to the stream// that is, let the stream flow into the bucketos.writeObject("foo");os.writeObject(new Foo());// Step 4. Flush the data to its destinationos.flush();The Writeobject method serializes foo and its transitive closure -- that is, all objects that can be referenced from foo within the graph. Within the stream only one copy of the serialized object exists. Other references to the objects are stored as object handles to save space and avoid circular references. The serialized object starts with the class followed by the fields of each class in the inheritance hierarchy.// Reading an object from a stream// Step 1. Create an input streamFileInputStream in = new FileInputStream("fooFile");// Step 2. Create an object input streamObjectInputStream ins = new ObjectInputStream(in);// Step 3. Got to know what you are readingString fooString = (String)ins.readObject();Foo foo = (Foo)s.readObject();Object serialization and securityBy default, serialization writes and reads non-static and non-transient fields from the stream. This characteristic can be used as a security mechanism by declaring fields that may not be serialized as private transient. If a class may not be serialized at all, writeObject and readObject methods should be implemented to throw NoAccessException.Persistence with transactional integrity: Introducing JDBCModeled after X/Open's SQL CLI (Client Level Interface) and Microsoft's ODBC abstractions, Java database connectivity (JDBC) aims to provide a database connectivity mechanism that is independent of the underlying database management system (DBMS).To become JDBC-compliant, drivers need to support at least the ANSI SQL-2 entry-level API, which gives third-party tool vendors and applications enough flexibility for database access.JDBC is designed to be consistent with the rest of the Java system. Vendors are encouraged to write an API that is more strongly typed than ODBC, which affords greater static type-checking at compile time.Here's a description of the most important JDBC interfaces:java.sql.Driver.Manager handles the loading of drivers and provides support for new database connections.java.sql.Connection represents a connection to a particular database.java.sql.Statement acts as a container for executing an SQL statement on a given connection.java.sql.ResultSet controls access to the result set.You can implement a JDBC driver in several ways. The simplest would be to build the driver as a bridge to ODBC. This approach is best suited for tools and applications that do not require high performance. A more extensible design would introduce an extra level of indirection to the DBMS server by providing a JDBC network driver that accesses the DBMS server through a published protocol. The most efficient driver, however, would directly access the DBMS proprietary API.Object databases and Java persistenceA number of ongoing projects in the industry offer Java persistence at the object level. However, as of this writing, Object Design's PSE (Persistent Storage Engine) and PSE Pro are the only fully Java-based, object-oriented database packages available (at least, that I am aware of). Check the Resources section for more information on PSE and PSE Pro.Java development has led to a departure from the traditional development paradigm for software vendors, most notably in the development process timeline. For example, PSE and PSE Pro are developed in a heterogeneous environment. And because there isn't a linking step in the development process, developers have been able to create various functional components independent of each other, which results in better, more reliable object-oriented code.PSE Pro has the ability to recover a corrupted database from an aborted transaction caused by system failure. The classes that are responsible for this added functionality are not present in the PSE release. No other differences exist between the two products. These products are what we call "dribbleware" -- software releases that enhance their functionality by plugging in new components. In the not-so-distant future, the concept of purchasing large, monolithic software would become a thing of the past. The new business environment in cyberspace, together with Java computing, enable users to purchase only those parts of the object model (object graph) they need, resulting in more compact end products.PSE works by post-processing and annotating class files after they have been created by the developer. From PSE's point of view, classes in an object graph are either persistent-capable or persistent-aware. Persistent-capable classes may persist themselves while persistent-aware classes can operate on persistent objects. This distinction is necessary because persistence may not be a desired behavior for certain classes. The class file post-processor makes the following modifications to classes:Modifies the class to inherit from odi.Persistent or odi.util.HashPersistent.Defines the initializeContents() method to load real values into hollow instances of your Persistent subclass. ObjectStore provides methods on the GenericObject class that retrieves each Field type.Be sure to call the correct methods for the fields in your persistent object. A separate method is available for obtaining each type of Field object. ObjectStore calls the initializeContents() method as needed. The method signature is:public void initializeContents(GenericObject genObj)Defines the flushContents() method to copy values from a modified instance (active persistent object) back to the database. ObjectStore provides methods on the GenericObject Be sure to call the correct methods for the fields in your persistent object. A separate method is available for setting each type of Field object. ObjectStore calls the flushContents() method as needed. The method signature is:public void flushContents(GenericObject genObj)Defines the clearContents() method to reset the values of an instance to the default values. This method must set all reference fields that referred to persistent objects to null. ObjectStore calls this method as needed. The method signature is:public void clearContents()Modifies the methods that reference non-static fields to call the Persistent.fetch() and Persistent.dirty() methods as needed. These methods must be called before the contents of persistent objects can be accessed or modified, respectively. While this step is not mandatory, it does provide a systematic way to ensure that the fetch() or dirty() method is called prior to accessing or updating object content.Defines a class that provides schema information about the persistence-capable class.All these steps can be completed either manually or automatically.PSE's transaction semanticYou old-time users of ObjectStore probably will find the database and transaction semantics familiar. There is a system-wide ObjectStore object that initializes the environment and is responsible for system-wide parameters. The Database class offers methods (such as create, open, and close), and the Transaction class has methods to begin, abort, or commit transactions. As with serialization, you need to find an entry point into the object graph. The getRoot and setRoot methods of the Database class serve this function. I think a few examples would be helpful here. This first snippet shows how to initialize ObjectStore:ObjectStore.initialize(serverName, null);try {db = Database.open(dbName, Database.openUpdate);} catch(DatabaseNotFoundException exception) {db = Database.create(dbName, 0664);}This next snippet shows how to start and commit a transaction:Transaction transaction = Transaction.begin(Transaction.update);try {foo = (Foo)db.getRoot("fooHead");} catch(DatabaseRootNotFoundException exception) {db.createRoot("fooHead", new Foo());}mit();The three classes specified above -- Transaction, Database, and ObjectStore -- are fundamental classes for ObjectStore. PSE 1.0 does not support nested transactions, backup and recovery, clustering, large databases, object security beyond what is available in the language, and any type of distribution. What is exciting, however, is all of this functionality will be incrementally added to the same foundation as the product matures.About the authorArsalan Saljoughy is asystems engineer specializing in object technology at Sun Microsystems. He earned his M.S. in mathematics from SUNY at Albany, and subsequently was a research fellow at the University of Berlin. Before joining Sun, he worked as a developer and as an IT consultant to financial services companies.ConclusionAlthough it is still too early to establish which methodology for object persistence in general and Java persistence in particular will be dominant in the future, it is safe to assume that a myriad of such styles will co-exist. The shift of storing objects as objects without disassembly into rows and columns is sure to be slow, but it will happen. In the meantime, we are more likely to see object databases better utilized in advanced engineering and telecommunications applications than in banking and back-office financial applications.英文翻译对象持久化和Java-深入的了解面向对象语言中的对象持久的讨论Arsalan Saljoughy,, 05/01/97对象持久化这个术语你常常会和数据存储一起听到。

【计算机专业文献翻译】基于Java的访问远程数据库的高效的标准软件体系结构

【计算机专业文献翻译】基于Java的访问远程数据库的高效的标准软件体系结构

届毕业设计(论文)英文参考文献英文文献1:Efficiency of standard software architectures for Java-based access to remote databases文献出处,年,Vol.卷(期) Dipartimento di Elettronica ed Informatica, University of Padua, Padua, Italy Accepted 14 December 1998作者:N. Zingirian M.Maresca S. Nalin英文文献2:Performance comparison of dynamic web platforms文献出处,年,Vol.卷(期) Department of Computer Science and Engineering, Indian Institute of Technology-Bombay, Mumbai 400 076, IndiaAT&T Labs, 200 Laurel Ave, Middletown, NJ 07748, USA Received7 August 2002; accepted 7 August 2002作者:Varsha Apte Tony Hansen Paul Reeser学生院系专业名称学生班级学生姓名学生学号学生层次英文文献1译文:基于Java的访问远程数据库的高效的标准软件体系结构摘要:新颖的客户端服务器体系结构利用WEB技术越来越有利于远程数据库存取,其结构是在客户端采取WEB浏览器作为图形用户界面,在服务器端采取传统的SQL数据库管理系统(DBMSs)。

目前,在标准浏览器和具体DBMSs之间的活动是由一定数量的基于上一代浏览器中的Java 虚拟机的软件结构支持。

这些软件结构, 从开放性和灵活性问题看似乎很好, 但在数据库存取方面却存在不足。

【计算机专业文献翻译】题库管理系统

【计算机专业文献翻译】题库管理系统

附录一英文材料While you’re going through the development process, the most important issue is this: Don’t get lost. It’s easy to do. Most of the analysis and design methods are intended to solve the largest of problems. Remember that most projects don’t fit in to that category, so you can usually have successful analysis and design with a relatively small subset of what a method recommends. But some sort of process, no matter how limited, will generally get you on your way in a much better fashion than simply beginning to code.It’s also easy to get stuck, to fall into “analysis paralysis,” where you feel like you can’t move forward because you haven’t nailed down every little detail at the current stage. Remember, no matter how much analysis you do, there are so me things about a system that won’t reveal themselves until design time, and more things that won’t reveal themselves until you’re coding, or not even until a program is up and running. Because of this, it’s crucial to move fairly quickly through analysis and design, and to implement a test of the proposed system.This point is worth emphasizing. Because of the history we’ve had with procedural languages, it is commendable that a team will want to proceed carefully and understand every minute detail before moving design and implementation. Certainly, when creating a DBMS, it pays to understand a customer’s needs thoroughly. But a DBMS is in a class of problems that is very well-posed and well-understood; in many such programs, the database structure is the problem to be tackled. The class of programming problem discussed in this chapter is of the “wild-card” (my term) variety, in which the solution isn’t simply re-forming a well-known solution, but instead involves one or more “wild-card factors”-elements for which there is no well-understood previous solution, and for which research is necessary. Attempting to thoroughly analyze a wildcard problem before moving into design andimplementation results in analysis paralysis because you don’t have enough inform ation to solve this kind of problem during the analysis phase. Solving such a problem requires iteration through the whole cycle, and that requires risk-taking behavior (which makes sense, because you’re trying to do something new and the potential rewards are higher). It may seem like the risk is compounded by “rushing” into a preliminary implementation, but it can instead reduce the risk in a wild-card project because you’re finding out early whether a particular approach to the problem is viable. Product development is risk management.It’s often proposed that you “build one to throw away.” With OOP, you may still throw part of it away, but because code is encapsulated into classes, during the first iteration you will inevitably produce some useful class designs and develop some worthwhile ideas about the system design that do not need to be thrown away. Thus, the first rapid pass at a problem not only produces critical information for the next analysis, design, and implementation iteration, it also creates a code foundation for that iteration.That said, if you’re looking at a methodology that contains tremendous detail and suggests many steps and documents, it’s still difficult to know when to stop. Keep in mind what you’re trying to discover: What are the objects? (How do you partition your project into its component parts?)What are their interfaces? (What messages do you need to be able to send to each object?)If you come up with nothing more than the objects and their interfaces, then you can write a program. For various reasons you might need more descriptions and documents than this, but you can’t get away with any less.The process can be undertaken in five phases, and a phase 0 that is just the initial commitment to using some kind of structure.Phase 0: Make a planYou must first decide what steps you’re going to have in your process. It sounds simple (in fact, all of this sounds simple) and yet people often don’t make this decision before they start coding. If your plan is “let’s jump in and start coding,” fine. (Sometimes that’s appropriat e when you have well-understoodproblem.) At least agree that this is the plan.You might also decide at this phase that some additional process structure is necessary, but not the whole nine yards. Understandab ly enough, some programmers like to work in “vacation mode” in which no structure is imposed on the process of developing their word; “It will be done when it’s done.” This can be appealing for awhile, but I’ve found that having a few milestones along the way helps to focus and galvanize your efforts around those milestones instead of being stuck with the single goal of “finish the project.” In addition, it divides the project into more bite-sized pieces and makes it seem less threatening (plus the milestones offer more opportunities for celebration).When I began to study story structure (so that I will someday write a novel) I was initially resistant to the idea of structure, feeling that when I wrote I simply let it flow onto the page. But I later realized that when I write about computers the structure is clear enough so that I don’t think much about it. But I still structure my work, albeit only semi-consciously in my head. So even if you think that your plan is to just start coding, you still somehow go through the subsequent phases while asking and answering certain questions.The mission statementAny system you build, no matter how complicated, has a fundamental purpose, the business that it’s in, and the basic need that it satisfies. If you can look past the user interface, the hardware- or system-specific details, the coding algorithms and the efficiency problems, you will eventually find the core of its being, simple and straightforward. Like the so-called high concept from a Hollywood movie, you can describe it in one ore two sentences. This pure description is the starting point.The high concept is quite important because it sets the tone for your project; it’s a mission statement. You won’t necessarily get it right the first time (you may be in a later phase of the project before it becomes completely clear), but keep trying until it feels right. For example, in an air-traffic control system to a very small airfield; perhaps there’s only a human controller or none at all. A more useful model won’t concern the solution you’re creating as much as it describes the problem: “Aircraft arrive, unload, service and reload, and depart.”Phase 1: What are we making?It’s necessary to stay focused on the heart of what you’re trying to accomplish in this phase: determine what the system is supposed to do. The most valuable tool for this is a collection of what are called “use cases.” Use cases identify key features in the system that will reveal some of the fundamental classes you’ll be using. These are essentially descriptive answers to questions like:“Who will use this system?”“What can those actors do with the system?”“How does this actor do that with this system?”“How else might this work if someone else were doing this, or if the same actor had a different objective?”(to reveal variations)“What problems might happen while doing this with the system?”(to reveal exceptions)If you are designing an auto-teller, for example, the use case for a particular aspect of the functionality of the system is able to describe what the auto-teller does in every possible situation. Each of these “situations” is referred to as a scenario, and a use case can be considered a collection of scenarios. You can think of a scenario as a question that starts with: “What does the system do if…?” For example, “What does the auto-teller do if a customer has just deposited a check within 24 hours and there’s not enough in the account without the check to provide the desired withdrawal?”Use case diagrams are intentionally simple to prevent you from getting bogged down in system implementation details prematurely:The use cases produce the requirements specifications by determining all the interactions that the user may have with the system. You try to discover a full set of use cases f or your systems, and once you’ve done that you have the core of what the system is supposed to do. The nice thing about focusing on use cases is that they always bring you back to the essentials and keep you from drifting off into issues that aren’t critic al for getting the job done. That is, if you have a full set of use cases you can describe your system and move onto the next phase. You probably won’t get it all figured out perfectly on the first try, but that’s OK. Everything will reveal itself in time, and if you demand a perfect system specificationat this point you’ll get stuck.Phase 2: How will we build it?In this phase you must come up with a design that describes what the classes look like and how they will interact. An excellent technique in determining classes and interactions is the Class-Responsibility-Collaboration (CRC) card. Part of the value of this tool is that it’s so low-tech: you start out with a set of blank 3” by 5” cards, and you write on them. Each card represents a single class, and on the card you write:The name of the class. It’s important that this name capture the essence of what the class does, so that it makes sense at a glance.The “responsibilities” of the class: what it should do. This can typically be summarized by ju st stating the names of the member functions (since those names should be descriptive in a good design), but it does not preclude other notes. If you need to seed the process, look at the problem from a lazy programmer’s standpoint: What objects would you like to magically appear to solve your problem?The “collaborations” of the class: what other classes does it interact with? “Interact” is an intentionally broad term; it could mean aggregation or simply that some other object exists that will perform services for an object of the class. Collaborations should also consider the audience for this class. For example, if you create a class Firecracker, who is going to observe it, a Chemist or a Spectator? The former will want to know what chemicals go into the construction, and the latter will respond to the colors and shapes released when it explodes.You may feel like the cards should be bigger because of all the information you’d like to get on them, but they are intentionally small, not only to keep your classes small but also to keep you from getting into too much detail too early. If you can’t fit all you need to know about a class on a small card, the class is too complex (either you’re getting too detailed, or you should create more than one class). The i deal class should be understood at a glance. The idea of CRC cards is to assist you in coming up with a first cut of the design so that you can get the big picture and then refine your design.One of the great benefits of CRC cards is in communication. It’s best done real-time, in a group, without computers. Each person takes responsibility for several classes (which at first have no names or other information). You run a live simulation by solving one scenario at a time, deciding which messages are sent to the various objects to satisfy each scenario. As you go through this process, you discover the classes that you need along with their responsibilities and collaborations, and you fill out the cards as you do this. When you’ve moved through all the use cases, you should have a fairly complete first cut of your design.Before I began using CRC cards, the most successful consulting experiences I had when coming up with an initial design involved standing in front of a team, who hadn’t built an OOP project bef ore, and drawing objects on a whiteboard. We talked about how the objects should communicate with each other, and erased some of them and replaced them with other objects. Effectively, I was managing all the “CRC cards” on the whiteboard. The team (who kne w what the project was supposed to do) actually created the design; they “owned” the design rather than having it giving it given to them.All I was doing was guiding the process by asking the right questions, trying out the assumptions, and taking the feedback from the team to modify those assumptions. The turn beauty of the process was that the team learned how to do object-oriented design not by reviewing abstract examples, but by working on the one design that was most interesting to them at that moment: theirs.Once you’ve come up with a set of CRC cards, you may want to create a more formal description of your design using UML. You don’t need to use UML .but it can be helpful, especially if you want to put up a diagram on the wall for everyone to ponder, which is a good idea. An alternative to UML is a textual description of the objects and their interfaces, or, depending on your programming languages, the code itself.UML also provides an additional diagramming notation for describing the dynamic model of your system. This is helpful in situations in which the state transitions of a system or subsystem are dominant enough that they need their own diagrams (such as in a control system). You may also need to describe the data structures, for systems or subsystems in which data is a dominant factor (such as a database),You’ll know you’re done with phase 2 when you have described the objects and their interfaces.Well, most of them –there are usually a few that slip through the cracks and don’t make them selves known until phase 3. But that’s OK. All you are concerned with is that you eventually discover all of your objects. It’s nice to discover them early in the process but OOP provides enough structure so that it’s not so bad if you discover them later. In fact, the design of an object tends to happen in five stages, throughout the process of program development.Phase 3: Build the coreThis is the initial conversion from the rough design into a compiling and executing body of code that can be tested, and especially that will prove or disprove your architecture. This is not a one-pass process, but rather the beginning of a series of steps that will iteratively build the system, as you’ll see in phase4.Your goal is to find the core of your system architecture that needs to be implemented in order generate a running system, no matter how incomplete that system is in this initial pass. You’re creating a framework that you can build upon with further iterations. You’re also performing the first of many system integrations and tests, and giving the stakeholders feedback about what their system will look like and how it is progressing. Ideally, you are also exposing some of the critical risks. You’ll probably also discover changes and improvements that can be made to your original architecture – things you would not have learned without implementing the system.Part of building the system is the reality check that you get from testing against your requirements analysis and system specification (in whatever form they exist). Make sure that your tests verify the requirements and use cases. When the core of the system is stable, you’re ready to move on and add more functionality.Phase 4: Iterate the use casesOnce the core framework is running, each feature set you add is a small project in itself. You add a feature set during an iteration, a reasonably short period of development.How big is an iteration? Ideally, each iteration lasts one to three weeks (this can vary based on the implementation language). At the end of that period, you have an integrated, tested system with more functionality than it had before. But what’s particularly interesting is the basis for the iteration: a single use case. Each use case is a package of related functionality that you build into the system all at once, during one iteration. Not only does this give you a better idea of what the scope of a use case should be, but it also gives more validation to the idea of a use case, since the concept isn’t discarded after analysis and design, but instead it is a fundamental until of development throughout the software-building process.You stop iterating when you achieve target functionality or an external deadline arrives and the customer can be satisfied with the current version. (Remember, software is a subscription business.) Because the process is iterative, you have many opportunities to ship a product instead of a single endpoint; open-source projects work exclusively in an iterative, high-feedback environment, which is precisely what makes them successful.An iterative development process is valuable for many reasons. You can reveal and resolve critical risks early, the customers have ample opportunity to change their minds, programmer satisfaction is higher, and the project can be steered with more precision. But an additional important benefit is the feedback to the stakeholders, who can see by the current state of the product exactly where everything lies. This may reduce or eliminate the need for mind-numbing status meetings and increase the confidence and support from the stakeholders.Phase 5: EvolutionThis is the point in the development cycle that has traditionally been called “maintenance,” a catch-all term that can mean everything from “getting it to work the way it was really supposed to in the first place” to “adding features that the customer forgot to mention” to the more traditional “fixing the bugs that show up” and “adding new features as the need arises.” So many misconceptions have been applied to the term “maintenance” t hat it has taken on a slightly deceiving quality, partly because it suggests that you’ve actually build a pristine program and all you need to do is change parts, oil it, and keep it from rusting. Perhaps there’s a better term to describe what’s going on.I’ll use the term evolution. That is, “You won’t get it right the first time, so give yourself the latitude to learn and to go back and make changes.” You might need to make a lot of changes as you learn and understand the problem more deeply. The elegance you’ll produce if you evolve until you get it right willpay off, both in the short and the long term. Evolution is where your program goes from good to great, and where those issues that you didn’t really understand in the first pass become clear. It’s also where your classes can evolve from single-project usage to reusable resources.What is it means to “get it right” isn’t just that the program works according to the requirements and the use cases. It also means that the internal structure of the code makes sense to you, and feels like it fits together well, with no awkward syntax, oversized objects, or ungainly exposed bits of code. In addition, you must have some sense that the program structure will survive the changes that it will inevitably go through during its lifetime, and that those changes can be made easily and cleanly. This is no small feat. You must not only understand what you’re building, but also how the program will evolve (what I call the vector of change). Fortunately, object-oriented programming languages are particularly adapt at supporting this kind of continuing modification –the boundaries created by the objects are what tend to keep the structure from breaking down. They also allow you to make changes –ones that would seem drastic in a procedural program –without causing earthquakesthroughout your code. In fact, support for evolution might be the most important benefit of OOP.英文文献译文整个开发过程时,最重要的问题是:不要迷路。

计算机专业英语名词翻译

计算机专业英语名词翻译

第一章(计算机系统概论)digital computer 数字计算机decimal digits 十进制数字binary 二进制bit 位ASCII 美国国家信息交换标准代码computer system 计算机系统hardware system 硬件系统software system 软件系统I/O devices 输入输出设备central processing unit(CPU) 中央处理器memory 存储器application software 应用软件video game 计算机游戏system software 系统软件register 寄存器floating point data浮点数据Boolean布尔值character data字符数据EBCDIC扩充的二十一进制交换代码punched cards穿孔卡片magnetic tape磁带main memory主存vacuum tubes电子管magnetic drum磁鼓transistors晶体管solid-state devices固体器件magnetic cores磁芯integrated circuit(IC)集成电路silicon chip硅芯片multiprogramming多道程序设计timessharing分时分时技术minicomputers小型计算机mainframe大型计算机large-scaleintegrated(LSI)大规模集成very-large-scale integrated(VLSI)超大规模集成word processing文字处理eletronic spreedsheets电子表格database management programs数据库管理程序desktop publishing桌面印刷personalcomputer(PC)个人计算机microcomputer微型计算机storage capacities存储容量stand-alone computer独立计算机local area network(LAN)局域网peripheral devices外部设备assembly line流水线supercomputer巨型计算机第二章(计算机系统结构)memmory subsystem存储子系统I/O subsystem输入输出子系统bus总线system bus系统总线chip 芯片address bus地址总线instructions指令memory location存储单元data bus数据总线control bus控制总线local bus 局部总线microprocessor微处理器register set寄存器组arithmetic logic unit(ALU)运算器clock cycle时钟周期control unit控制器computer architecture计算机体系结构introduction format指令格式addressing modes寻址方式introduction set指令集internal memory内存main memory主存Random Access Memory(RAM)随机存取存储器Read Only Memory (ROM)只读存储器secondary storage副主存储器vitual memory虚拟存储器Dynamic RAM(DRAM)动态存储器refresh circuitry刷新电路Static RAM(SRAM)静态RAMcache memory高速缓冲存储器masked ROM掩膜ROMPROM可编程RAMEPROM可擦写PROMultraviolet light紫外线EEPROM or EEPROM电擦写PROMbasic input/output system(BIOS)基本输入输出系统flash EEPROM 快闪存储器memory hierarchy 存储器体系结构auxiliary memory 辅助存储器storage memory 存储容量keyboard 键盘alphanumeric key字母数字键function key 功能键cursor key 光标键numeric keypad 数字键mouse 鼠标touch screen触屏infrared ray红外线monitor 监视器display screen显示屏laser printer激光打印机ink-jet printer喷墨打印机dot-matrix printer点针式打印机modem调制解调器input-output interface(I/O interface)输入输出接口peripheral外部设备,外设interrupt中断program counter程序计数器vectored interrupt向量中断nonvectored interrupt非向量中断interrupt vector中断向量Direct Memory Acess(DMA)直接存储器存取timeout超时第三单元(计算机体系结构)parallel processing 并行操作serial operations 串行操作instructions stream 指令流data dream 数据流SISD 单指令单数据流SIMD 单指令多数据流MISD 多指令单数据流MIMD 多指令多数据流pipeline processing 流水线处理combinational circuit 组合电路multiplier 乘法器adder 加法器clock pulse 时钟脉冲vector processing 向量处理one-dimensional array 一维数组scalar processer 标量处理器vector instructions 向量指令CISC 复杂指令集计算机decoder 译码器RISC 精简指令集计算机backward compatibility 向下兼容第四单元(算法与数据结构)algorithm 算法parallel algotithm 并行算法primitive 原语syntax 语法semantics 语义pseudocode 伪码exhaustive search 穷举搜索divide-and-conquer algorithm 分治算法dynamic programming 动态规划bottom-up 自上而下top-down 自下而上array 数组one-dimensional array 一维数组pointer 指针program counter 程序计数器instruction pointer 指令指针list 列表linked list 链表singly-linked list 单向链表double-linked list 双向链表circularly-linked list 循环链表FIFO 先进先出LIFO 后进先出stack 栈push 压栈pop 出栈stack pointer 栈指针queue 队列tree 树root 根level 层次degree of a node 结点的度depth of a tree树的深度binary tree 二叉树traversal 遍历M-way search tree M向搜索树第五章(编程语言)Program 程序Program language 程序设计语言Software engineering 软件工程Pseudocode 伪码Flowchart 流程图Coding 编码Program testing 程序测试Desk-checking 手工检查Documentation 文档User documentation 用户文档Operator documentation 操作员文档Programmer documentation 程序员文档Machine language 机器语言Assembly languages 汇编语言High-level languages 高级语言RAD(rapid application development) 快速应用开发Natural language 自然语言Artificial intelligence(AI) 人工智能Compile 编译Assemble 汇编Source code 源代码Object code 目标代码Linker 连接器Executable file 可执行文件Object-oriented programming 面向对象的程序设计Object 对象Class 类ADT(abstract data type)抽象数据类型Member variable 成员变量Class variable 类变量Member function 成员函数Inheritance 继承Derived class 派生类Overload 超载Message 消息Static binding 静态绑定Dynamic binding 动态绑定Polymorphism 多态性Visual programming 可视化编程Markup language 标记语言HTML(hyper text markup language)超文本标记语言Hyperlink 超链接XML(extensible markup language) 可扩展标记语言Java virtual machine java虚拟机第六章(操作系统)Application software 应用软件System software 系统软件Utility software 实用软件Operating system(OS)操作系统Shell 操作系统的外壳程序Graphical user interface(GUI)图形用户界面Kernel 内核Serial processing 串行处理Job 作业Batch processing 批处理Simple batch systems 简单批处理系统Multiprogrammed batch systems 多道程序批处理系统Monitor 监控程序Scheduler 调度程序Multiprogramming 多道程序Multitasking 多任务Time-sharing systems 分时系统Uniprogramming 单道进程Process 进程Process management 进程管理Process control block 进程控制块Mutual exclusion 互斥Multiprocessing 多处理,多进程Distributed processing 分布式管理Concurrent processes 并发处理Deadlock 死锁Synchronize process同步处理Semaphore 信号量Reusable resource 可复用性资源I/O buffers 输入/输出缓冲区I/O channel 输入/输出通道Deadlock prevention 死锁预防Deadlock detection 死锁检测Deadlock avoidance 死锁避免Virtual memory 虚拟内存Logical reference 逻辑引用Real addresse 实地址Paging 分页Segmentation 分段Virtual address 虚拟地址Physical addresses 物理地址Real-time process 实时处理File management 文件管理Plug and play(PnP) 即插即用第七单元(应用软件)application software 应用软件word processing 字处理软件spreadsheet 电子表格personal finance 个人理财presentation graphic 演示图形database manager 数据库管理软件groupware 群件desktop accessory 桌面辅助工具browsers 浏览区desktop publishing 桌面印刷project management 项目管理CAD 计算机辅助设计CAM 计算机辅助制造multimedia authoring 多媒体发布animation 动画MIDI 乐器数字化接口speech synthesis 语音合成insertion point 插入点scroll bar 滚动条window 窗口menu bar 菜单栏pull-down menu 下拉式菜单Button 按钮toolbar 工具条dialog box 对话框default value 缺省值(默认值)macro 宏OLE 对象链接和嵌入clipboard 剪切板column 列row 行cell 单元格cell address 单元格地址cell pointer 单元格指针formula 公式function 函数bar chart 柱形图line chart 线图pie chart 圆饼图workflow software 工作流软件PIM 个人信息管理软件Web browser 浏览器World Wide Web 万维网home page 主页第八单元(数据库)DBMS 数据库管理系统instance 实例schema 模式physical schema 物理模式存储模式内模式logical schema 逻辑模式概念模式模式subschema 子模式外模式data independence 数据独立性physical data independence 物理数据独立性logical data independence 逻辑数据独立性data model 数据模型entity-relationship model 实体联系模型object-oriented model 面向对象模型semantic data model 语义数据类型functional data model 功能数据模型entity 实体entity set 实体集mapping cardinality 映射基数abstract data type 抽象数据类型attribute 属性relation 关系tuple 元组primary key 主键super key 超健candidate key 候选键foreign key 外键DDL 数据定义语言data dictionary 数据字典DML 数据操纵语言procedure DML 过程化DML nonprocedure DML 非过程化DMLSQL 结构化查询语言view 视图the relational algebra 关系代数the tuple relational calculus 元组关系演算atomicity 原子性consistency 一致性duration 持久性transaction 事物DBA 数据库管理员。

【计算机专业文献翻译】J2EE体系结构

【计算机专业文献翻译】J2EE体系结构

毕业设计(论文)外文翻译要求1、毕业设计(论文)外文翻译应有两篇,总字符数不少于20000,其文献来源应由指导教师选定后以纸质(复印或打印件)形式随同毕业设计(论文)任务书一并发给学生。

复印或打印件上应有指导教师和专业教研室主任的签名和日期。

要求每位学生的外文翻译内容不重复。

2、翻译的外文文献应主要选自学术期刊、学术会议的文章、有关著作及其他相关材料,应与毕业论文(设计)主题相关,并列入毕业论文(设计)的参考文献;在每篇中文译文首页“页脚”处注明原文作者及出处,中文译文后应附外文原文(指导教师提供的原文,论文上应有指导教师和教研室主任签名)。

3、中文译文的基本撰写格式为:题目采用三号黑体字居中打印,正文采用宋体小四号字,行间距一般为固定值20磅,标准字符间距。

页边距为左3 cm,右2.5 cm,上下各2.5 cm,页面统一采用A4纸。

4、封面上的“外文翻译题目”指中文译文的题目;两篇外文文献,按“封面、译文一、外文原文(一)、译文二、外文原文(二)、外文翻译评阅表”的顺序统一装订。

赋予一个对该EJB的本地接口的引用,同时无需处理必不可少的JNDI查找。

●业务委托方法。

在这种方法中,业务接口的Web容器实现明确地托付给相应的EJB。

这具有允许高速缓存和允许故障操作在适当地点被重试的优点。

我们无需担心上述任一情况中的java.rmi.RemoteException捕获。

传输错误不会出现。

在这种体系结构中,和通过EJB来暴露一个远程接口的体系结构不同,EJB的使用仅仅是这种体系结构的一个实现选择而已,而不是一个基本特征。

不用改变总体设计,也不用EJB,就可以实现任何一个业务接口。

长处这种体系结构具有如下这些优点:●它没有分布式EJB应用那么复杂。

●EJB使用不更改应用的基本设计。

在这种体系结构中,只使这样一些对象成为EJB:它们需要一个EJB容器的那些服务。

●EJB使用只强加相当小的性能开销,因为没有远程方法调用或串行化。

【计算机专业文献翻译】优调SQL过程

【计算机专业文献翻译】优调SQL过程

外文资料译文及原文院(系):计算机学院专业:计算机科学与技术班级:2401102学号:20023011059姓名:指导教师:2005年6月简介有关如何调优数据库系统和应用程序的好的建议的来源有很多。

比如OLTP 应用程序的DB2调优技巧(以前在IBM® DB2® 开发者园地上发表)之类的文章通过使用事务和数据并行性以及分析查询方案,给出了从表空间和索引设计到缓冲池的内存分配等方面的建议。

这些方面的内容是性能调优的基础知识。

但是,有关如何组织存储过程自身中的逻辑并着眼于其性能的专门建议却并不多见。

本文就提供了这样一种建议。

尽管本文着重于介绍 SQL 过程,但是这里所提供的大多数信息同样适用于用其它语言编写的在应用程序中或存储过程中嵌入的 SQL 逻辑。

背景知识和术语在深入研究详细问题之前,让我们先想想DB2 中有关过程化 SQL 的一些基本术语和概念。

过程化 SQL 构造(例如标量变量、IF 语句和 WHILE 循环)是在DB2 Universal Database™ (UDB) V7 发行版中引入 DB2 的。

以前的 DB2 发行版支持 C 和Java™ 作为存储过程的语言。

V7 引入了 SQL 存储过程,以及其它许多可以促进 OLTP 应用程序开发的特性(例如临时表、应用程序保存点和标识列)。

当创建 SQL 过程时,DB2 将过程主体中的 SQL 查询与过程逻辑区分开来。

为了使性能最优,SQL 查询被静态地编译成包中的节。

(对于静态编译的查询而言,节主要是由 DB2 优化器为该查询选择的存取方案构成的。

包是节的集合。

在过程的执行期间,每当控制从过程逻辑流向 SQL 语句时,在 DLL 和 DB2 引擎之间就存在“上下文切换”。

(在 DB2 V8 中,SQL 过程是在“不受保护的方式”下运行的,即与 DB2 引擎在相同的寻址空间中。

因此我们这里谈及的上下文切换并不是操作系统级别上的完全的上下文切换,而是指 DB2 中层的更换。

【计算机专业文献翻译】VB与数据库

【计算机专业文献翻译】VB与数据库

附录VB And Database1 VB Database Access MethodVB database visit many ways, under normal circumstances is divided into two categories, and each category there are many ways. Below in tabular form for each of the categories, and each category contains methods.1.1Object Interface (API)VBSQL : through DB-Library visit the Microsoft SQL Server ODBC API : any ODBC data source 16 and 32 DAO / Jet : Jet local / Access.MDB. Index sequence database (ISAM) and any ODBC data source DAO / ODBC Direct : any ODBC data source (after RDO) RDO 2.0 : any ODBC data source (Level I or II) ADO : any ODBC data source and any OLE DB interface through the data source interface1.2Data Control ActData Control : DAO / Jet Data Interface Control Data Interface / Direct ODBC : DAO / ODBC data interface Direct Control Interface RemoteData / RD C : RDO data interface Advanced Data Interface Connector / ADC : ADO data interface Interface2 Several of InterfaceADC (Advanced Data Connector) : Advanced Data Connector. ADO provide bundled data source window to the data binding controls on. ADC is essentially a visit or through direct access remote ADO OLE DB object of a technology, It also supports major applications in the Microsoft IE browser bundled with the data control. It is specifically for the Web browser-based application designed.ADO (Active Data Objects) : Active Data Objects. Yes DAO / RDO the successor product, ADO "expansion" of the DAO and RDO used by the object model, This means that it contains fewer targets, more attributes, methods (parameters), and the incident. ADO is a real visit with the various types of data linking mechanism. ADO designed for a very simple format, through the ODBC interface with the database. Can use any ODBC data source, that is not suitable for SQL Server, Oracle, Access such as database applications, but also for Excel spreadsheets, text files, No graphics files and the data file format is an easy-to-use application program interface layer. ADO isMicrosoft's latest and most powerful data access model designed OLE DB, for any OLE DB data source to provide a high-performance interviews, including data sources and non-relational databases, E-mail and file systems, text and graphics, custom business objects, and so on. ADO in key Internet program for at least the network traffic, and the front-end data sources and the use of at least between the layers, all of which are meant to provide light volume, high-performance interface. So ADO through its internal attributes and methods of providing unified data access interface method.DAO (Data Access Objects) : data access object. Is an object-oriented inte rface to the interface. Through DAO / Jet functi on can access ISAM database, use DAO / ODBC Direct functions can be remote RDO function. DAO use the program code is very simpl e. DAO provide rich cursor (Cursor) type and the result of non-cursor (Cursor-Less) type of res ult sets, with the DDL (data description language) is ver y similar to the function. DAO through ODBC, as a direct link to other databases. connect directly to the Access database. DAO sy stem suitable for single applications or small - scale use of the local distribution. DAO model is to design relational database system archit ecture object class collection. They provide a complete management system for the entire oper.html ation of the properties and methods. including the creation of the database, definition of the tables, the fields and indexes, the establishment of the relationship between the tables, positioning and searching tools such as databa ses.JET (Joint Engine Technology) : data connectivity engine technologies. A workstation is based on the adoption of DAO database access mechanism. Although Microsoft Access can be provided by the ODBC driver visit Jet database However, the use of these drivers functional restrictions. Jet has its own mechanism for the inquiry and the result set handling, and can be the same species or dissimilar data sources for query processing.0DBC (Open Database Connectivity) : open database connectivity. Heterogeneous database for the visit provides a unified interface. ODBC based on SQL (Structured Query Language), and regarded it as the standard database. This interface provides maximum interoperability : an application program through a group of generic code access different database management systems. A software developer in the development of client / server applications will not be binding on a particular database above. ODBC for different database for a corresponding driver, is a recognized source of the data Interface. It fast and light to provide a unified interface and the interface to any ODBC data source optimized for neither.ODBC API : manufacturers to the database designer procedures provide direct access to the database of a group function. Note : The point here is that although the ODBC API provides a lot of convenience and powerful functionality. But usually the ODBC API are relatively hard to learn, but it is very prone to error. Although ODBC API allowed to operate ODBC handle, but they still have to be careful If incorrect use ODBC API, it may result in unpredictable error. For example, if the use of ODBC API code to close the connection or ODBC release handle of any one, Then RemoteData control or RDO behavior will be unpredictable. ODBC handle depositary for the reserve is meaningless, because they are variable.ODBC Direct : DAO is a target based on the new DAO mode its methods and attributes and RDO function the same. Use the DAO code of occasions, can be used to access remote data sources.OLE DB : COM model is the database interface. The bottom is a data access interface interface. Is the third driver for the development of businesses exporting data sources to ADO applications, or for C + + developers development of customized database components. It will be able to handle any type of data. OLE DB application to provide a uniform data access methods, without considering their format and storage. In practical application, which means you can visit diversity presence in the electronic data sheets, text files and even mail server Microsoft Exchang such as the data. OLE DB was not directly call VB.RDC (RemoteData Control) : Remote Data Access Control. RDO right is a bundled component data. Can output the result of specific data sources to control.RDO (Remote Data Objects) : Remote Data Objects. ODBC is one of the object-oriented data access interface, Remote data objects and code sets for use to create and operate a remote ODBC database system for the various components a framework. Set targets and have a database describing the characteristics of the various components used to manipulate the attributes and methods of these components. Can set targets and establish relations between these relations on behalf of the database system, the logical structure. It's easy to use the same style DAO combination provides an interface, ODBC form displayed all the bottom function and flexibility. RDO ODBC API is a shallow interfacing. Is designed to access remote data sources ODBC relations and design. Although the visit RDO Jet or ISAM database is restricted, but it can only work through the existing ODBC driver to access the relational database. However, the RDO has been proved to be many SQL Server, Oracle and other major database developers often choose the best interface. RDO provided to access storedprocedures and complex set of results more and more complex objects, attributes and methods.VBSQL : Visual Basic is structured query language. An API is the interface, almost C DB-Library API the same. VBSQL only support Microsoft's SQL Server. VBSQL fast and light but not for the target interface.3Performance Comparison and Application NoteVB-based SQL Server database system Several visits over the SQL Server specific features. DAOs is based on the object, so it is easy to use, However it from Visual Basic to SQL Server slowest way. ODBC API and VBSQL method is essentially based on the procedures. ODBC API method is common, allow the strongest interoperability, a simple programming, However, the slow pace in VBSQL methods. VBSQL VBSQL Control Methods, provided an important SQL Server front-end applications needed flexibility, strong functions and good performance. It is truly event-driven and error handling capability, fully supports asynchronous processing, and pointing out such calculations. These methods are VBSQL other methods beyond the edge, but its slightly complex programming. RDO ODBC API is located at the top of a layer object model, which rely on ODBC API, ODBC driver and the back-end database engine to achieve. RDO used in the procedures necessary for the short (about 250 KB), fast. RDO equipped with the basic approach of ODBC, most direct enforcement ODBC API function, RDO 4.0/VB included in the VB 5.0 Enterprise Edition, MSRDO32.DLL by Dynamic Link Library is to be achieved. RDO is a synthesis of DAO / Jet, VBSQL / DBLib ODBC and the advantages of the object model, ODBC API includes application layer, designed for in the background (server side) have a database exists on the premise of running, against Oracle and SQL Server specially designed. RDO has the advantage of being fully integrated in VB, can directly access SQL Server stored procedures fully supports T-SQL, T-SQL debugging in the integrated development environment, Visual Database Tools integration, and so on. However, Microsoft has announced that in future no longer be right VBSQL / DBLib upgrade, ODBC API function and general programming method is loved by the people, RDO application will be reduced gradually. As for the actual use of any interface, to a large extent dependent on the user's application specific circumstances. 4VB database principleVB access to the database, it is necessary to analyze specific issues, according to the specific circumstances, conditions, request with the appropriate programs, it should pay attention to the following principles :4.1code reuse and efficiency of the operationFor example : through the use of ODBC data sources connecting to the database, we will be able to transform the various types of databases, instead frequent code changes. VBSQL used by DB-Library will not do. ODBC interface and VB database is not running the most efficient method. Similarly, the use of ADO ODBC interface to the efficiency than RDO.4.2achieve simplicity, ease of maintenanceIf a method to achieve together is very complex, the development will inevitably result in the waste of human and material resources. Moreover, the design application will only support up more complex or more difficult to maintain. For example : local needs ISAM or visit Jet types of data sources, the use of DAO / Jet, and it is not necessary to use the method through ODBC. RDC together to achieve more easily than the RDO.4.3safety principlesThis should be an environment and conditions. For example, the LAN network security better in the WAN thus directly control the use of data such as RDC, This realization together fast and convenient, and WAN needs of a large number of errors caught, As the RDC is not as good as using the wrong RDO easy to control.5Concluding remarksThe data access interface DAO system suitable for single applications or small-scale use of the local distribution, RDO which has been proved to be many SQL Server, Oracle and other major database developers often choose the best interface. ADO DAO / RDO the successor product. ADO 2.0 functional and RDO more similar, but generally speaking, In this model between the two species have a similar relationship mapping. ADO "expansion" of the DAO and RDO by the use of the object model, which means that it contains fewer targets, more attributes, methods and parameters, and the incident.Database Interface is the latest ADO, it is more than DAO and RDO more simple, more flexible object model. For new projects, it should be used as ADO data access interface.However, the ADO is not automatic, and the existing data access application code compatible. When ADO Packaging DAO and RDO the function of the need to change many of the elements of language syntax ADO. In some cases, this will mean that some of the existing code of a function of a simple conversion. In other cases, the best approach might be the use of new functional ADO rewriting the application. Also notethat the current ADO DAO does not support all the functions. ADO include RDO style functionality, and to OLE DB data source interaction, It also includes long-range, and DHTML technologies.Generally speaking, in ADO 1984, Most immediately put DAO application ADO transplant may be premature ADO because the current data do not support the definition (DDL), users, groups. However, if only DAO for client / server applications, and is not dependent on the Jet database engine or not to use DDL, then it could be transplanted to ADO.VB与数据库1 VB访问数据库的方法VB访问数据库的方法很多,一般情况下分成两大类,而每一类又有很多方法。

计算机专业英语的课文与翻译

计算机专业英语的课文与翻译

计算机专业英语的课文与翻译在当今数字化的时代,计算机技术的飞速发展使其成为了各个领域中不可或缺的一部分。

而计算机专业英语,作为连接计算机知识与全球交流的桥梁,其重要性日益凸显。

对于计算机专业的学生和从业者来说,掌握计算机专业英语不仅有助于获取最新的技术资讯,还能促进国际间的技术合作与交流。

我们先来看看计算机专业英语的课文。

这些课文通常涵盖了计算机领域的多个方面,包括硬件、软件、网络、数据库、编程语言等等。

以硬件为例,课文可能会详细介绍计算机的中央处理器(CPU)、内存(Memory)、硬盘(Hard Disk)等组件的工作原理、性能指标以及最新的发展趋势。

软件方面,则可能会涉及操作系统(Operating System)、应用软件(Application Software)、编程软件(Programming Software)等的特点、功能和使用方法。

网络相关的课文,会讲解网络拓扑结构(Network Topology)、网络协议(Network Protocol)、网络安全(Network Security)等重要概念。

数据库部分,可能会探讨关系型数据库(Relational Database)、非关系型数据库(NoSQL Database)、数据存储与检索(Data Storage and Retrieval)等知识。

编程语言的课文,会对常见的编程语言如Python、Java、C++等的语法、特性和应用场景进行阐述。

这些课文往往具有很强的专业性和逻辑性,语言准确、简洁。

为了让读者能够清晰地理解复杂的技术概念,课文中会使用大量的图表、示例和解释。

接下来谈谈计算机专业英语的翻译。

翻译计算机专业英语课文并非易事,需要译者具备扎实的计算机专业知识和良好的英语语言能力。

在翻译过程中,准确理解专业术语是关键。

例如,“bus”在普通英语中是“公共汽车”的意思,但在计算机领域中,它指的是“总线”;“cache”常见释义为“隐藏处”,而在计算机中则表示“高速缓存”。

文献数据库的结构

文献数据库的结构

文献数据库的结构文献数据库的结构,那可真是个复杂又有趣的事儿,就像一座神秘的大迷宫,里面藏着无数的宝贝。

我在图书馆工作的时候,天天和文献数据库打交道。

那数据库就像一个巨大的宝库,存放在机房里,机房里一排排的服务器,闪着小灯,嗡嗡作响,就像一群勤劳的小蜜蜂在工作。

我们的管理员老陈,头发有点花白,眼睛总是盯着那些服务器,就怕它们出啥问题。

他常说:“这数据库可金贵着呢,要是坏了,咱们就像瞎子摸象,啥都找不着。

”这文献数据库啊,有它的存储结构,就像图书馆的书架一样。

有的是层次式结构,一层一层的,就像金字塔。

顶层是大的分类,比如科学、人文啥的,越往下分越细,就像树干分出树枝,树枝又分出小树枝。

我给新来的同事介绍的时候,拿着一张纸画着图说:“你看,这就像家谱一样,每个文献都能找到它的位置。

” 同事挠挠头,笑着说:“还真有点像,不过这家谱可够大的。

”还有网状结构呢,文献之间相互关联,就像蜘蛛网一样。

一个文献可能会和好多其他文献有联系,就像人与人之间的关系。

你在查找一个医学文献的时候,可能会通过链接跳到一个相关的生物学文献,再从那儿又跳到化学相关的,就像在走一条神奇的链子,一环扣一环。

我有次查找资料,顺着这些链接走,越走越远,越看越有意思,感觉自己像个探险家,发现了新大陆。

数据库的索引结构也很关键,就像图书馆的目录。

它能让你快速找到你想要的文献。

有顺序索引,就像按姓氏笔画排序一样,把文献按照一定顺序排好。

还有倒排索引,这可神奇了,就像从反面找东西。

比如你想找某个关键词相关的文献,通过倒排索引一下子就能找到,就像在一群人中找穿红衣服的,一眼就能看到。

我们有个研究员,戴着个厚厚的眼镜,每次查找资料都夸这索引好,他说:“这索引就像我的导航,没有它,我得在文献的海洋里淹死。

”这文献数据库的结构啊,设计得真是巧妙。

它就像一个精心搭建的大厦,每个部分都有它的作用,让我们能在知识的海洋里畅游,找到我们需要的宝贝。

要是没有这么好的结构,我们找文献就像大海捞针,那得多费劲啊。

计算机英文文献加翻译

计算机英文文献加翻译

Management Information System OverviewManagement Information System is that we often say that the MIS, is a human, computers and other information can be composed of the collection, transmission, storage, maintenance and use of the system, emphasizing the management, stressed that the modern information society In the increasingly popular. MIS is a new subject, it across a number of areas, such as scientific management and system science, operations research, statistics and computer science. In these subjects on the basis of formation of information-gathering and processing methods, thereby forming a vertical and horizontal weaving, and systems.The 20th century, along with the vigorous development of the global economy, many economists have proposed a new management theory. In the 1950s, Simon made dependent on information management and decision-making ideas. Wiener published the same period of the control theory, that he is a management control process. 1958, Gail wrote: "The management will lower the cost of timely and accurate information to better control." During this period, accounting for the beginning of the computer, data processing in the term.1970, Walter T. Kenova just to the management information system under a definition of the term: "verbal or written form, at the right time to managers, staff and outside staff for the past, present, the projection of future Enterprise and its environment-related information 原文请找腾讯3249114六,维^论~文.网 no application model, no mention of computer applications.1985, management information systems, the founder of the University of Minnesota professor of management at the Gordon B. Davis to a management information system a more complete definition of "management information system is a computer hardware and software resources, manual operations, analysis, planning , Control and decision-making model and the database - System. It provides information to support enterprises or organizations of the operation, management and decision-making function. "Comprehensive definition of thisExplained that the goal of management information system, functions and composition, but also reflects the management information system at the time of level.With the continuous improvement of science and technology, computer science increasingly mature, the computer has to be our study and work on the run along. Today, computers are already very low price, performance, but great progress, and it was used in many areas, the computer was so popular mainly because of the following aspects: First, the computer can substitute for many of the complex Labor. Second, the computer can greatly enhance people's work efficiency. Third, the computer can save a lot of resources. Fourth, the computer can make sensitive documents more secure.Computer application and popularization of economic and social life in various fields. So that the original old management methods are not suited now more and social development. Many people still remain in the previous manual. This greatly hindered the economic development of mankind. In recent years, with the University of sponsoring scale is growing, the number of students in the school also have increased, resulting in educational administration is the growing complexity of the heavy work, to spend a lot of manpower, material resources, and the existing management of student achievement levels are not high, People have been usin g the traditional method of document management student achievement, the management there are many shortcomings, such as: low efficiency, confidentiality of the poor, and Shijianyichang, will have a large number of documents and data, which is useful for finding, updating andmaintaining Have brought a lot of difficulties. Such a mechanism has been unable to meet the development of the times, schools have become more and more day-to-day management of a bottleneck. In the information age this traditional management methods will inevitably be computer-based information management replaced.As part of the computer application, the use of computers to students student performance information for management, with a manual management of the incomparable advantages for example: rapid retrieval, to find convenient, high reliability and large capacity storage, the confidentiality of good, long life, cost Low. These advantages can greatly improve student performance management students the efficiency of enterprises is also a scientific, standardized management, and an important condition for connecting the world. Therefore, the development of such a set of management software as it is very necessary thing.Design ideas are all for the sake of users, the interface nice, clear and simple operation as far as possible, but also as a practical operating system a good fault-tolerant, the user can misuse a timely manner as possible are given a warning, so that users timely correction . T o take full advantage of the functions of visual FoxPro, design powerful software at the same time, as much as possible to reduce the occupiers system resources.Visual FoxPro the command structure and working methods:Visual FoxPro was originally called FoxBASE, the U.S. Fox Software has introduced a database products, in the run on DOS, compatible with the abase family. Fox Software Microsoft acquisition, to be developed so that it can run on Windows, and changed its name to Visual FoxPro. Visual FoxPro is a powerful relational database rapid application development tool, the use of Visual FoxPro can create a desktop database applications, client / server applications and Web services component-based procedures, while also can use ActiveX controls or API function, and so on Ways to expand the functions of Visual FoxPro.1651First, work methods1. Interactive mode of operation(1) order operationVF in the order window, through an order from the keyboard input of all kinds of ways to complete the operation order.(2) menu operationVF use menus, windows, dialog to achieve the graphical interface features an interactive operation. (3) aid operationVF in the system provides a wide range of user-friendly operation of tools, such as the wizard, design, production, etc..2. Procedure means of implementationVF in the implementation of the procedures is to form a group of orders and programming language, an extension to save. PRG procedures in the document, and then run through the automatic implementation of this order documents and award results are displayed.Second, the structure of command1. Command structure2. VF orders are usually composed of two parts: The first part is the verb order, also known as keywords, for the operation of the designated order functions; second part of the order clause, for an order that the operation targets, operating conditions and other information . VF order form are as follows:3. <Order verb> "<order clause>"4. Order in the format agreed symbols5. VF in the order form and function of the use of the symbol of the unity agreement, the meaning of these symbols are as follows:6. Than that option, angle brackets within the parameters must be based on their format input parameters.7. That may be options, put in brackets the parameters under specific requ ests from users choose to enter its parameters.8. Third, the project manager9. Create a method10. command window: CREA T PROJECT <file name>11. Project Manager12. tab13. All - can display and project management applications of all types of docume nts, "All" tab contains five of its right of the tab in its entirety.14. Data - management application projects in various types of data files, databases, free form, view, query documents.15. Documentation - display 原文请找腾讯3249114六,维^论~文.网 , statements, documents, labels and other documents.16. Category - the tab display and project management applications used in the class library documents, including VF's class library system and the user's own design of the library.17. Code - used in the project management procedures code documents, such as: program files (. PRG), API library and the use of project management for generation of applications (. APP).18. (2) the work area19. The project management work area is displayed and management of all types of document window.20. (3) order button21. Project Manager button to the right of the order of the work area of the document window to provide command.22. 4, project management for the use of23. 1. Order button function24. New - in the work area window selected certain documents, with new orders button on the new document added to the project management window.25. Add - can be used VF "file" menu under the "new" order and the "T ools" menu under the "Wizard" order to create the various independent paper added to the project manager, unified organization with management.26. Laws - may amend the project has been in existence in the various documents, is still to use such documents to modify the design interface.27. Sports - in the work area window to highlight a specific document, will run the paper.28. Mobile - to check the documents removed from the project.29. Even the series - put the item in the relevant documents and even into the application executable file.Database System Design :Database design is the logical database design, according to a forthcoming data classification system and the logic of division-level organizations, is user-oriented. Database design needsof various departments of the integrated enterprise archive data and data needs analysis of the relationship between the various data, in accordance with the DBMS.管理信息系统概要管理信息系统就是我们常说的MIS(Management Information System),是一个由人、计算机等组成的能进行信息的收集、传送、储存、维护和使用的系统,在强调管理,强调信息的现代社会中它越来越得到普及。

英文文献及翻译(计算机专业)

英文文献及翻译(计算机专业)

英文文献及翻译(计算机专业)The increasing complexity of design resources in a net-based collaborative XXX common systems。

design resources can be organized in n with design activities。

A task is formed by a set of activities and resources linked by logical ns。

XXX managementof all design resources and activities via a Task Management System (TMS)。

which is designed to break down tasks and assign resources to task nodes。

This XXX。

2 Task Management System (TMS)TMS is a system designed to manage the tasks and resources involved in a design project。

It poses tasks into smaller subtasks。

XXX management of all design resources and activities。

TMS assigns resources to task nodes。

XXX。

3 Collaborative DesignCollaborative design is a process that XXX a common goal。

In a net-based collaborative design environment。

n XXX n for all design resources and activities。

中英文文献翻译

中英文文献翻译

Database introduction and ACCESS2000The database is the latest technology of data management, and the important branch of computer science. The database , as its name suggests, is the warehouse to preserve the data. The warehouse to store apparatus in computer only, and data to deposit according to sure forms。

The so-called database is refers to the long-term storage the data acquisition which in the computer, organized, may share。

In the database data according to the certain data model organization, the description, and the storage, has a smaller redundance, the higher data independence and the easy extension, and may altogether shine for each kind of user。

The effective management database, frequently has needed some database management systems (DBMS) is the user provides to database operation each kind of order, the tool and the method, including database establishment and recording input, revision, retrieval, demonstration, deletion and statistics。

计算机专业英语第二版课后翻译答案

计算机专业英语第二版课后翻译答案

Unite 1Section A: 1、artificial intelligence 人工智能2、paper-tape reader 纸带阅读器3、Optical computer 光学计算机4、Neural network 神经网络5、Instruction set 指令集6、Parallel processing 并行处理器7、Difference engine差分机8、Versatile logical element 多用途逻辑元件9、Silicon substrate 硅衬底10、Vaccum tube 真空管11、数据的存储与管理the storage and management of data12、超大规模集成电路large-scale integrated circuit13、中央处理器central processing unit14、个人计算机personal computer15、模拟计算机analog computer16、数字计算机digital computer17、通用计算机general purpose computer18、处理器芯片processor chip19、操作指令operating instructions20、输入设备input devicesSection B1、artificial neural network 人工智能神经网络2、Computer architecture 计算机体系结构3、Robust computer program 健壮的计算机程序4、Human-computer interface 人机接口5、Knowledge representation 知识代表6、数值分析numerical analysis7、程序设计环境programming environment8、数据结构data structure9、存储和检索信息store and retrieve information10、虚拟现实virtual realityUnit 2Section A:1、function key 功能键2、V oice recognition module 声音识别调制器3、Touch-sensitive region 触敏扫描仪4、Address bus 地址总线5、Flatbed scanner 平板扫描仪6、Dot-matrix printer 矩阵式打印机7、Parallel connection 并行连接8、Cathode ray tube 阴极射线管9、Video game 电子游戏10、Audio signal 音频信号11、操作系统operating system12、液晶显示liquid crystal display13、喷墨打印机inkjet printer14、数据总线data bus15、串行连接serial connection16、易失性存储器volatile memory17、激光打印机laser printer18、磁盘存储器floppy disc19、基本输入输出系统basic input/output system20、视频显示器video displaySection B:1、interrupt handler 中断处理程序2、Virtual memory 虚拟内存3、Context switch 上下文转换4、Main memory 主存5、Bit pattern 位模式6、外围设备peripheral device7、进程表process table8、时间片time slice9、图形用户界面graphics user interface10、海量存储器mass storageUnit 3Section A:1、storage register 存储寄存器2、Function statement 函数语句3、Program statement 程序语句4、Object-oriented language 面向对象语言5、Assembly language 汇编语言6、Intermediate language 中间语言7、Relational language 关系语言8、Artificial language 人工语言9、Data declaration 数据声明10、SQL 结构化查询语言11、可执行程序executable program12、程序模块program module13、条件语句conditional statement14、赋值语句assignment statement15、逻辑语言logic statement16、机器语言machine language17、函数式语言functional language18、程序设计语言programming language19、运行计算机程序run a omputer program20、计算机程序员computer programmerSection B1、native code 本机代码2、Header file 头文件3、Multithreaded program 多线程程序4、Java-enabled browser 支持Java的浏览器5、Mallicious code6、机器码machine code7、汇编码assembly code8、特洛伊木马程序trojan9、软件包software package10、类层次class hierarchyUnit 4Section A1、inference engine 推理机2、System call 系统调用3、Compiled language 编译执行的语言4、Parellel computing 并行计算5、Pattern matching 模式匹配6、Memory location 存储单元7、Interpreter program 解释程序8、Library routine 库程序9、Intermediate program 中间程序10、Source file 源文件11、解释执行的语言interpreted language12、设备驱动程序device driver13、源程序source program14、调试程序debugger15、目标代码object code16、应用程序application program17、实用程序utility program18、逻辑程序logic program19、黑盒ink cartridge20、程序的存储与执行storage and execution of program Section B1、Messaging model 通信模式2、Common language runtime 通用语言运行时刻(环境)3、Hierarchical namespace 分层的名称空间4、Development community 开发社区5、CORBA 公共对象请求代理体系结构6、基本组件basic components7、元数据标记metadata token8、虚拟机VM virtual machine9、集成开发环境IDE(intergrated development environment)10、简单对象访问协议SOAP(simple object access protocol) Unit 5Section A1、system specification 系统规范2、Unit testing 单元测试3、Software life cycle 软件的生命周期4、System validation process 系统验证过程5、Evolutionary development process 进化发展过程6、Simple linear model 简单线性模型7、Program unit 程序单元8、Throwaway prototype 一次性使用原型9、Text formatting 文本格式10、System evolution 系统演变11、系统设计范例paradigm for system design12、需求分析与定义Requirements analysis and definition13、探索式编程方法exploratory programming approach14、系统文件编制system documentation15、瀑布模型waterfall model16、系统集成system integration17、商用现成软件commercial off-the-shelf software18、基于组件的软件工程component-based software engineering19、软件维护工具software maintenance tool20、软件复用software reuseSection B1、check box 复选框2、Structured design 结构化设计3、Building block 构建模块4、Database schema 数据库模式5、Radio button 单选按钮6、系统建模技术system modeling techniques7、模型驱动开发MDD(model-driven development)8、数据流程图data flow diagram9、下拉式菜单drop-down10、滚动条scroll barUnit 6Section A1、end user 终端用户2、Atomic operation 原子操作3、Database administrator 数据库管理员4、Relational database model 关系数据库模型5、Local data 本地数据6、Object-oriented database 面向对象的数据库7、Database management system 数据库管理系统8、Entity-relationship model 实体关系模型9、Distributed database 分布式数据库10、Flat file 展开文件11、二维表two-dimensional table12、数据属性data attributes13、数据库对象database object14、存储设备storage device15、数据类型data type16、数据插入与删除insertion and deletion17、层次数据库模型hierarchical18、数据库体系结构database architecture19、关系数据库管理系统ralational database management system20、全局控制总线global control busSection B1、nonvolatile storage system 易失性存储系统2、Equitment malfunction 设备故障3、Wound-wait protocol 损伤等待协议4、Exclusive lock 排它锁5、Database integrity 数据库完整性6、共享锁shared lock7、数据库实现database implementation8、级联回滚cascading rollback9、数据项data item10、分时操作系统time sharing operating system ;Unit 7Section A1、microwave radio 微波无线电2、digital television 数字电视3、DSL 数字用户线路4、analog transmission 模拟传输5、on-screen pointer 屏幕上的指针6、computer terminal 计算机终端7、radio telephone 无线电话8、cellular telephone 蜂窝电话,移动电话,手机9、decentralized network 分散型网络10、wire-based internal network 基于导线的内部网络,有线内部网11、光缆fiber-optic cable12、传真机fax machine13、线通信wireless communications14、点对点通信point-to-point communications15、调制电脉冲modulated electrical impulse16、通信卫星communication(s) satellite17、电报电键telegraph key18、传输媒体transmission medium (或media)19、无绳电话cordless telephone20、金属导体metal conductorSection B1、bit map 位图2、parallel port 并行端口3、direct memory access (DMA) 直接存储器存取4、universal serial bus 通用串行总线5、general-purpose register 通用寄存器6、电路板circuit board7、串行通信serial communication8、数码照相机digital camera9、存储映射输入/输出memory-mapped I/O10、有线电视cable televisionUnit 8Section A1、file server 文件服务器2、carrier sense 载波检测3、Protocol suite 协议族4、Peer-to-peer model 点对点模型5、bus topology network 总线拓扑网络6、inter-machine cooperation 计算机间合作7、Ethernet protocol collection 以太网协作集8、Proprietary network 专有网络9、utility package 实用软件包10、star network 星形网络11、局域网local area network (LAN)12、令牌环token ring13、无线网络wireless network14、封闭式网络closed network15、环形拓扑网络ring topology16、客户/服务机模型client/server model17、网络应用程序network application18、进程间通信interprocess communication19、打印服务机printer server20、广域网wide area networkSection B1、routing path 路由选择通路2、dual-ring topology 双环形拓扑结构3、extended star topology 扩展星形拓扑结构4、backbone network 基干网,骨干网5、mesh topology网络拓扑结构6、同轴电缆coaxial cable7、逻辑拓扑结构logical topology8、无冲突连网环境collision-free networking environment9、树形拓扑结构tree topology10、目的地节点destination nodeUnit 9Section A1、cell phone 蜂窝电话,移动电话,手机2、IP address 网际协议地址,IP地址3、autonomous system 自主系统4、dial-up connection 拨号连接5、network identifier 网络标识符6、binary notation 二进制记数法7、mnemonic name 助记名,缩写名8、Internet-wide directory system 因特网范围的目录系统9、name server 名称服务器10、Internet infrastructure 因特网基础结构11、助记地址mnemonic address12、网吧cyber cafe13、宽带因特网访问broadband Internet access14、顶级域名top-level domain (TLD)15、因特网编址Internet addressing16、点分十进制记数法dotted decimal notation17、因特网服务提供商Internet service provider (ISP)18、专用因特网连接dedicated Internet connection19、主机地址host address20、硬件与软件支持hardware and software support Section B1、incoming message 来报,到来的报文2、application layer 应用层3、utility software 实用软件4、sequence number (顺)序号,序列号5、remote login capabilities 远程登录能力6、端口号port number7、软件例程software routine8、传输层transport layer9、文件传送协议FTP(File Transfer Protocol)10、万维网浏览器Web browserUnit 10Section A1、mailing list 邮件发送清单,邮件列表2、proprietary software 专有软件3、cc line 抄送行4、bcc line 密送行5、forwarded e-mail messages 转发的电子邮件6、e-mail convention 电子邮件常规7、click on an icon 点击图标8、confidential document 密件,秘密文件9、classified information 密级信息10、recovered e-mail message 恢复的电子邮件11、常用情感符commonly used emoticon12、已删除电子邮件deleted e-mail13、电子系统electronic system14、附件行Attachments line15、版权法copyright law16、电子邮件网规e-mail netiquette17、信息高速公路information superhighway18、签名文件signature file19、电子数据表程序spreadsheet program20、文字处理软件word processorSection B1、web-authoring software 网络写作软件2、template generator 模版生成程序3、navigation page 导航页面4、corporate logo 公司标识5、splash page 醒目页面,过渡页6、导航条navigation bar7、节点页面node page8、网站地图site map9、可用性测试usability testing10、图形交换格式gif(Graphics Interchange Format)Unit 11Section A1、customized marketing strategy 定制的营销策略2、B2G transaction 企业对政府交易3、mobile telephone 移动电话4、dot-com bust 网络不景气5、smart card 智能卡,灵巧卡6、digital piracy 数字盗版7、dot-com boom 网络繁荣8、C2C transaction 消费者对消费者交易9、Web auction site 拍卖网站10、fingerprint reader 指纹读取器11、射频识别装置radio-frequency identification (RFID) device12、电子数据交换electronic data interchange (EDI)13、库存管理技术inventory management technology14、知识产权intellectual property15、条形码bar code16、货币兑换currency conversion17、电子图书electronic book18、视网膜扫描仪retina scanner19、个人数字助理personal digital assistant (PDA)20、企业对企业电子商务B2B electronic commerceSection B1、software suite 软件套件2、text box 文本框3、virtual checkout counter 虚拟付款台4、static catalog 静态目录5、browser session 浏览器会话期6、动态目录dynamic catalog7、购物车软件shopping cart software8、供应链supply chain9、企业资源计划软件enterprise resource planning (ERP) software10、税率tax rateUnit 12Section A1、encryption program 加密程序2、deletion command 删除命令3、authorized user 授权的用户4、backup copy 备份5、voltage surge 电压浪涌6、circuit breaker 断路器7、electronic component 电子元件(或部件)8、data-entry error 数据输入错误9、electronic break-in 电子入侵10、power line 电力线,输电线11、检测程序detection program12、电源power source13、破坏性计算机程序destructive computer program14、计算机病毒computer virus15、软件侵权software piracy16、硬盘驱动器hard-disk drive17、病毒检查程序virus checker18、主存储器primary storage19、电子公告板electronic bulletin board20、浪涌电压保护器surge protectorSection B1、phishing attack 网络钓鱼攻击2、graphics card 显(示)卡3、heuristic analysis 试探性分析4、infected file 被感染文件5、virus dictionary 病毒字典6、数据捕获data capture7、恶意软件malicious software8、病毒特征代码virus signature9、防病毒软件antivirus software10、内存驻留程序memory-resident program。

计算机专业外文文献及翻译--微软Visual Studio

计算机专业外文文献及翻译--微软Visual Studio

微软Visual Studio1微软Visual StudioVisual Studio 是微软公司推出的开发环境,Visual Studio可以用来创建Windows平台下的Windows应用程序和网络应用程序,也可以用来创建网络服务、智能设备应用程序和Office 插件。

Visual Studio是一个来自微软的集成开发环境IDE(inteqrated development environment),它可以用来开发由微软视窗,视窗手机,Windows CE、.NET框架、.NET精简框架和微软的Silverlight支持的控制台和图形用户界面的应用程序以及Windows窗体应用程序,网站,Web应用程序和网络服务中的本地代码连同托管代码。

Visual Studio包含一个由智能感知和代码重构支持的代码编辑器。

集成的调试工作既作为一个源代码级调试器又可以作为一台机器级调试器。

其他内置工具包括一个窗体设计的GUI应用程序,网页设计师,类设计师,数据库架构设计师。

它有几乎各个层面的插件增强功能,包括增加对支持源代码控制系统(如Subversion和Visual SourceSafe)并添加新的工具集设计和可视化编辑器,如特定于域的语言或用于其他方面的软件开发生命周期的工具(例如Team Foundation Server的客户端:团队资源管理器)。

Visual Studio支持不同的编程语言的服务方式的语言,它允许代码编辑器和调试器(在不同程度上)支持几乎所有的编程语言,提供了一个语言特定服务的存在。

内置的语言中包括C/C + +中(通过Visual C++),(通过Visual ),C#中(通过Visual C#)和F#(作为Visual Studio 2010),为支持其他语言,如M,Python,和Ruby等,可通过安装单独的语言服务。

它也支持的XML/XSLT,HTML/XHTML ,JavaScript和CSS.为特定用户提供服务的Visual Studio也是存在的:微软Visual Basic,Visual J#、Visual C#和Visual C++。

数据库英文参考文献(最新推荐120个)

数据库英文参考文献(最新推荐120个)

由于我国经济的高速发展,计算机科学技术在当前各个科技领域中迅速发展,成为了应用最广泛的技术之一.其中数据库又是计算机科学技术中发展最快,应用最广泛的重要分支之一.它已成为计算机信息系统和计算机应用系统的重要技术基础和支柱。

下面是数据库英文参考文献的分享,希望对你有所帮助。

数据库英文参考文献一:[1]Nú?ez Matías,Weht Ruben,Nú?ez Regueiro Manuel. Searching for electronically two dimensional metals in high-throughput ab initio databases[J]. Computational Materials Science,2020,182.[2]Izabela Karsznia,Marta Przychodzeń,Karolina Sielicka. Methodology of the automatic generalization of buildings, road networks, forests and surface waters: a case study based on the Topographic Objects Database in Poland[J]. Geocarto International,2020,35(7).[3]Alankrit Chaturvedi. Secure Cloud Migration Challenges and Solutions[J]. Journal of Research in Science and Engineering,2020,2(4).[4]Ivana Nin?evi? Pa?ali?,Maja ?uku?i?,Mario Jadri?. Smart city research advances in Southeast Europe[J]. International Journal of Information Management,2020.[5]Jongseong Kim,Unil Yun,Eunchul Yoon,Jerry Chun-Wei Lin,Philippe Fournier-Viger. One scan based high average-utility pattern mining in static and dynamic databases[J]. Future Generation Computer Systems,2020.[6]Jo?o Peixoto Martins,António Andrade-Campos,Sandrine Thuillier. Calibration of Johnson-Cook Model Using Heterogeneous Thermo-Mechanical Tests[J]. Procedia Manufacturing,2020,47.[7]Anna Soriani,Roberto Gemignani,Matteo Strano. A Metamodel for the Management of Large Databases: Toward Industry 4.0 in Metal Forming[J]. Procedia Manufacturing,2020,47.[8]Ayman Elbadawi,Karim Mahmoud,Islam Y. Elgendy,Mohammed Elzeneini,Michael Megaly,Gbolahan Ogunbayo,Mohamed A. Omer,Michelle Albert,Samir Kapadia,Hani Jneid. Racial disparities in the utilization and outcomes of transcatheter mitral valve repair: Insights from a national database[J]. Cardiovascular Revascularization Medicine,2020.[9]Maurizio Boccia,Antonio Sforza,Claudio Sterle. Simple Pattern Minimality Problems: Integer Linear Programming Formulations and Covering-Based Heuristic Solving Approaches[J]. INFORMS Journal on Computing,2020.[10]. Inc.; Patent Issued for Systems And User Interfaces For Dynamic Access Of Multiple Remote Databases And Synchronization Of Data Based On User Rules (USPTO 10,628,448)[J]. Computer Technology Journal,2020.[11]. Bank of America Corporation; Patent Issued for System For Electronic Data Verification, Storage, And Transfer (USPTO 10,628,058)[J]. Computer Technology Journal,2020.[12]. Information Technology - Database Management; Data from Technical University Munich (TU Munich) Advance Knowledge in Database Management (Make the most out of your SIMD investments: counter control flow divergence in compiled query pipelines)[J]. Computer Technology Journal,2020.[13]. Information Technology - Database Management; Studies from Pontifical Catholic University Update Current Data on Database Management (General dynamic Yannakakis: conjunctive queries with theta joins under updates)[J]. Computer Technology Journal,2020.[14]Kimothi Dhananjay,Biyani Pravesh,Hogan James M,Soni Akshay,Kelly Wayne. Learning supervised embeddings for large scale sequence comparisons.[J]. PloS one,2020,15(3).[15]. Information Technology; Studies from University of California San Diego (UCSD) Reveal New Findings on Information Technology (A Physics-constrained Data-driven Approach Based On Locally Convex Reconstruction for Noisy Database)[J]. Information Technology Newsweekly,2020.[16]. Information Technology; Researchers from National Institute of Information and Communications Technology Describe Findings in Information Technology (Efficient Discovery of Weighted Frequent Neighborhood Itemsets in Very Large Spatiotemporal Databases)[J]. Information Technology Newsweekly,2020.[17]. Information Technology; Investigators at Gdansk University of Technology Report Findings in Information Technology (A Framework for Accelerated Optimization of Antennas Using Design Database and Initial Parameter Set Estimation)[J]. Information Technology Newsweekly,2020.[18]. Information Technology; Study Results from Palacky University Update Understanding of Information Technology (Evaluation of Replication Mechanisms on Selected Database Systems)[J]. Information Technology Newsweekly,2020.[19]Runfola Daniel,Anderson Austin,Baier Heather,Crittenden Matt,Dowker Elizabeth,Fuhrig Sydney,Goodman Seth,Grimsley Grace,Layko Rachel,MelvilleGraham,Mulder Maddy,Oberman Rachel,Panganiban Joshua,Peck Andrew,Seitz Leigh,Shea Sylvia,Slevin Hannah,Youngerman Rebecca,Hobbs Lauren. geoBoundaries: A global database of political administrative boundaries.[J]. PloS one,2020,15(4).[20]Dupré Damien,Krumhuber Eva G,Küster Dennis,McKeown Gary J. A performance comparison of eight commercially available automatic classifiers for facial affect recognition.[J]. PloS one,2020,15(4).[21]Partha Pratim Banik,Rappy Saha,Ki-Doo Kim. An Automatic Nucleus Segmentation and CNN Model based Classification Method of White Blood Cell[J]. Expert Systems With Applications,2020,149.[22]Hang Dong,Wei Wang,Frans Coenen,Kaizhu Huang. Knowledge base enrichment by relation learning from social tagging data[J]. Information Sciences,2020,526.[23]Xiaodong Zhao,Dechang Pi,Junfu Chen. Novel trajectory privacy-preserving method based on clustering using differential privacy[J]. Expert Systems With Applications,2020,149.[24]. Information Technology; Researchers at Beijing University of Posts and Telecommunications Have Reported New Data on Information Technology (Mining top-k sequential patterns in transaction database graphs)[J]. Internet Weekly News,2020.[25]Sunil Kumar Sharma. An empirical model (EM: CCO) for clustering, convergence and center optimization in distributive databases[J]. Journal of Ambient Intelligence and Humanized Computing,2020(prepublish).[26]Naryzhny Stanislav,Klopov Nikolay,Ronzhina Natalia,Zorina Elena,Zgoda Victor,Kleyst Olga,Belyakova Natalia,Legina Olga. A database for inventory of proteoform profiles: "2DE-pattern".[J]. Electrophoresis,2020.[27]Noel Varela,Jesus Silva,Fredy Marin Gonzalez,Pablo Palencia,Hugo Hernandez Palma,Omar Bonerge Pineda. Method for the Recovery of Images in Databases of Rice Grains from Visual Content[J]. Procedia Computer Science,2020,170.[28]Ahmad Rabanimotlagh,Prabhu Janakaraj,Pu Wang. Optimal Crowd-Augmented Spectrum Mapping via an Iterative Bayesian Decision Framework[J]. Ad Hoc Networks,2020.[29]Ismail Boucherit,Mohamed Ould Zmirli,Hamza Hentabli,Bakhtiar Affendi Rosdi. Finger vein identification using deeply-fused Convolutional Neural Network[J]. Journal of King Saud University - Computer and Information Sciences,2020.[30]Sachin P. Patel,S.H. Upadhyay. Euclidean Distance based Feature Ranking andSubset Selection for Bearing Fault Diagnosis[J]. Expert Systems With Applications,2020.[31]Julia Fomina,Denis Safikanov,Alexey Artamonov,Evgeniy Tretyakov. Parametric and semantic analytical search indexes in hieroglyphic languages[J]. Procedia Computer Science,2020,169.[32]Selvine G. Mathias,Sebastian Schmied,Daniel Grossmann. An Investigation on Database Connections in OPC UA Applications[J]. Procedia Computer Science,2020,170.[33]Abdourrahmane Mahamane Atto,Alexandre Benoit,Patrick Lambert. Timed-image based deep learning for action recognition in video sequences[J]. Pattern Recognition,2020.[34]Yonis Gulzar,Ali A. Alwan,Abedallah Zaid Abualkishik,Abid Mehmood. A Model for Computing Skyline Data Items in Cloud Incomplete Databases[J]. Procedia Computer Science,2020,170.[35]Xiaohan Yang,Fan Li,Hantao Liu. Deep feature importance awareness based no-reference image quality prediction[J]. Neurocomputing,2020.[36]Dilana Hazer-Rau,Sascha Meudt,Andreas Daucher,Jennifer Spohrs,Holger Hoffmann,Friedhelm Schwenker,Harald C. Traue. The uulmMAC Database—A Multimodal Affective Corpus for Affective Computing in Human-Computer Interaction[J]. Sensors,2020,20(8).[37]Tomá? Pohanka,Vilém Pechanec. Evaluation of Replication Mechanisms on Selected Database Systems[J]. ISPRS International Journal of Geo-Information,2020,9(4).[38]Verheggen Kenneth,Raeder Helge,Berven Frode S,Martens Lennart,Barsnes Harald,Vaudel Marc. Anatomy and evolution of database search engines-a central component of mass spectrometry based proteomic workflows.[J]. Mass spectrometry reviews,2020,39(3).[39]Moscona Leon,Casta?eda Pablo,Masrouha Karim. Citation analysis of the highest-cited articles on developmental dysplasia of the hip.[J]. Journal of pediatric orthopedics. Part B,2020,29(3).[40]Nasseh Daniel,Schneiderbauer Sophie,Lange Michael,Schweizer Diana,Heinemann Volker,Belka Claus,Cadenovic Ranko,Buysse Laurence,Erickson Nicole,Mueller Michael,Kortuem Karsten,Niyazi Maximilian,Marschner Sebastian,Fey Theres. Optimizing the Analytical Value of Oncology-Related Data Based on an In-Memory Analysis Layer: Development and Assessment of the Munich OnlineComprehensive Cancer Analysis Platform.[J]. Journal of medical Internet research,2020,22(4).数据库英文参考文献二:[41]Meiling Chai,Changgeng Li,Hui Huang. A New Indoor Positioning Algorithm of Cellular and Wi-Fi Networks[J]. Journal of Navigation,2020,73(3).[42]Mandy Watson. How to undertake a literature search: a step-by-step guide[J]. British Journal of Nursing,2020,29(7).[43]. Patent Application; "Memorial Facility With Memorabilia, Meeting Room, Secure Memorial Database, And Data Needed For An Interactive Computer Conversation With The Deceased" in Patent Application Approval Process (USPTO 20200089455)[J]. Computer Technology Journal,2020.[44]. Information Technology; Data on Information Technology Detailed by Researchers at Complutense University Madrid (Hr-sql: Extending Sql With Hypothetical Reasoning and Improved Recursion for Current Database Systems)[J]. Computer Technology Journal,2020.[45]. Science - Metabolomics; Study Data from Wake Forest University School of Medicine Update Knowledge of Metabolomics (Software tools, databases and resources in metabolomics: updates from 2018 to 2019)[J]. Computer Technology Journal,2020.[46]. Sigma Computing Inc.; Researchers Submit Patent Application, "GeneratingA Database Query To Dynamically Aggregate Rows Of A Data Set", for Approval (USPTO 20200089796)[J]. Computer Technology Journal,2020.[47]. Machine Learning; Findings on Machine Learning Reported by Investigators at Tongji University (Comparing Machine Learning Algorithms In Predicting Thermal Sensation Using Ashrae Comfort Database Ii)[J]. Computer Technology Journal,2020.[48]. Sigma Computing Inc.; "Generating A Database Query Using A Dimensional Hierarchy Within A Graphical User Interface" in Patent Application Approval Process (USPTO 20200089794)[J]. Computer Technology Journal,2020.[49]Qizhi He,Jiun-Shyan Chen. A physics-constrained data-driven approach based on locally convex reconstruction for noisy database[J]. Computer Methods in Applied Mechanics and Engineering,2020,363.[50]José A. Delgado-Osuna,Carlos García-Martínez,JoséGómez-Barbadillo,Sebastián Ventura. Heuristics for interesting class association rule mining a colorectal cancer database[J]. Information Processing andManagement,2020,57(3).[51]Edival Lima,Thales Vieira,Evandro de Barros Costa. Evaluating deep models for absenteeism prediction of public security agents[J]. Applied Soft Computing Journal,2020,91.[52]S. Fareri,G. Fantoni,F. Chiarello,E. Coli,A. Binda. Estimating Industry 4.0 impact on job profiles and skills using text mining[J]. Computers in Industry,2020,118.[53]Estrela Carlos,Pécora Jesus Djalma,Dami?o Sousa-Neto Manoel. The Contribution of the Brazilian Dental Journal to the Brazilian Scientific Research over 30 Years.[J]. Brazilian dental journal,2020,31(1).[54]van den Oever L B,Vonder M,van Assen M,van Ooijen P M A,de Bock G H,Xie X Q,Vliegenthart R. Application of artificial intelligence in cardiac CT: From basics to clinical practice.[J]. European journal of radiology,2020,128.[55]Li Liu,Deborah Silver,Karen Bemis. Visualizing events in time-varying scientific data[J]. Journal of Visualization,2020,23(2–3).[56]. Information Technology - Database Management; Data on Database Management Discussed by Researchers at Arizona State University (Architecture of a Distributed Storage That Combines File System, Memory and Computation In a Single Layer)[J]. Information Technology Newsweekly,2020.[57]. Information Technology - Database Management; New Findings from Guangzhou Medical University Update Understanding of Database Management (GREG-studying transcriptional regulation using integrative graph databases)[J]. Information Technology Newsweekly,2020.[58]. Technology - Laser Research; Reports from Nicolaus Copernicus University in Torun Add New Data to Findings in Laser Research (Nonlinear optical study of Schiff bases using Z-scan technique)[J]. Journal of Technology,2020.[59]Loeffler Caitlin,Karlsberg Aaron,Martin Lana S,Eskin Eleazar,Koslicki David,Mangul Serghei. Improving the usability and comprehensiveness of microbial databases.[J]. BMC biology,2020,18(1).[60]Caitlin Loeffler,Aaron Karlsberg,Lana S. Martin,Eleazar Eskin,David Koslicki,Serghei Mangul. Improving the usability and comprehensiveness of microbial databases[J]. BMC Biology,2020,18(1).[61]Dean H. Barrett,Aderemi Haruna. Artificial intelligence and machine learningfor targeted energy storage solutions[J]. Current Opinion in Electrochemistry,2020,21.[62]Chenghao Sun. Research on investment decision-making model from the perspective of “Internet of Things + Big data”[J]. Future Generation Computer Systems,2020,107.[63]Sa?a Adamovi?,Vladislav Mi?kovic,Nemanja Ma?ek,Milan Milosavljevi?,Marko ?arac,Muzafer Sara?evi?,Milan Gnjatovi?. An efficient novel approach for iris recognition based on stylometric features and machine learning techniques[J]. Future Generation Computer Systems,2020,107.[64]Olivier Pivert,Etienne Scholly,Grégory Smits,Virginie Thion. Fuzzy quality-Aware queries to graph databases[J]. Information Sciences,2020,521.[65]Javier Fernando Botía Valderrama,Diego José Luis Botía Valderrama. Two cluster validity indices for the LAMDA clustering method[J]. Applied Soft Computing Journal,2020,89.[66]Amer N. Kadri,Marie Bernardo,Steven W. Werns,Amr E. Abbas. TAVR VS. SAVR IN PATIENTS WITH CANCER AND AORTIC STENOSIS: A NATIONWIDE READMISSION DATABASE REGISTRY STUDY[J]. Journal of the American College of Cardiology,2020,75(11).[67]. Information Technology; Findings from P. Sjolund and Co-Authors Update Knowledge of Information Technology (Whole-genome sequencing of human remains to enable genealogy DNA database searches - A case report)[J]. Information Technology Newsweekly,2020.[68]. Information Technology; New Findings from P. Yan and Co-Researchers in the Area of Information Technology Described (BrainEXP: a database featuring with spatiotemporal expression variations and co-expression organizations in human brains)[J]. Information Technology Newsweekly,2020.[69]. IDERA; IDERA Database Tools Expand Support for Cloud-Hosted Databases[J]. Information Technology Newsweekly,2020.[70]Adrienne Warner,David A. Hurley,Jonathan Wheeler,Todd Quinn. Proactive chat in research databases: Inviting new and different questions[J]. The Journal of Academic Librarianship,2020,46(2).[71]Chidentree Treesatayapun. Discrete-time adaptive controller based on IF-THEN rules database for novel architecture of ABB IRB-1400[J]. Journal of the Franklin Institute,2020.[72]Tian Fang,Tan Han,Cheng Zhang,Ya Juan Yao. Research and Construction of the Online Pesticide Information Center and Discovery Platform Based on Web Crawler[J]. Procedia Computer Science,2020,166.[73]Dinusha Vatsalan,Peter Christen,Erhard Rahm. Incremental clustering techniques for multi-party Privacy-Preserving Record Linkage[J]. Data & Knowledge Engineering,2020.[74]Ying Xin Liu,Xi Yuan Li. Design and Implementation of a Business Platform System Based on Java[J]. Procedia Computer Science,2020,166.[75]Akhilesh Kumar Bajpai,Sravanthi Davuluri,Kriti Tiwary,Sithalechumi Narayanan,Sailaja Oguru,Kavyashree Basavaraju,Deena Dayalan,Kavitha Thirumurugan,Kshitish K. Acharya. Systematic comparison of the protein-protein interaction databases from a user's perspective[J]. Journal of Biomedical Informatics,2020,103.[76]P. Raveendra,V. Siva Reddy,G.V. Subbaiah. Vision based weed recognition using LabVIEW environment for agricultural applications[J]. Materials Today: Proceedings,2020,23(Pt 3).[77]Christine Rosati,Emily Bakinowski. Preparing for the Implementation of an Agnis Enabled Data Reporting System and Comprehensive Research Level Data Repository for All Cellular Therapy Patients[J]. Biology of Blood and Marrow Transplantation,2020,26(3).[78]Zeiser Felipe André,da Costa Cristiano André,Zonta Tiago,Marques Nuno M C,Roehe Adriana Vial,Moreno Marcelo,da Rosa Righi Rodrigo. Segmentation of Masses on Mammograms Using Data Augmentation and Deep Learning.[J]. Journal of digital imaging,2020.[79]Dhaked Devendra K,Guasch Laura,Nicklaus Marc C. Tautomer Database: A Comprehensive Resource for Tautomerism Analyses.[J]. Journal of chemical information and modeling,2020,60(3).[80]Pian Cong,Zhang Guangle,Gao Libin,Fan Xiaodan,Li Fei. miR+Pathway: the integration and visualization of miRNA and KEGG pathways.[J]. Briefings in bioinformatics,2020,21(2).数据库英文参考文献三:[81]Marcello W. M. Ribeiro,Alexandre A. B. Lima,Daniel Oliveira. OLAP parallel query processing in clouds with C‐ParGRES[J]. Concurrency and Computation: Practice and Experience,2020,32(7).[82]Li Gao,Peng Lin,Peng Chen,Rui‐Zhi Gao,Hong Yang,Yun He,Jia‐Bo Chen,Yi ‐Ge Luo,Qiong‐Qian Xu,Song‐Wu Liang,Jin‐Han Gu,Zhi‐Guang Huang,Yi‐Wu Dang,Gang Chen. A novel risk signature that combines 10 long noncoding RNAs to predict neuroblastoma prognosis[J]. Journal of Cellular Physiology,2020,235(4).[83]Julia Krzykalla,Axel Benner,Annette Kopp‐Schneider. Exploratory identification of predictive biomarkers in randomized trials with normal endpoints[J]. Statistics in Medicine,2020,39(7).[84]Jianye Ching,Kok-Kwang Phoon. Measuring Similarity between Site-Specific Data and Records from Other Sites[J]. ASCE-ASME Journal of Risk and Uncertainty in Engineering Systems, Part A: Civil Engineering,2020,6(2).[85]Anne Kelly Knowles,Justus Hillebrand,Paul B. Jaskot,Anika Walke. Integrative, Interdisciplinary Database Design for the Spatial Humanities: the Case of the Holocaust Ghettos Project[J]. International Journal of Humanities and Arts Computing,2020,14(1-2).[86]Sheng-Feng Sung,Pei-Ju Lee,Cheng-Yang Hsieh,Wan-Lun Zheng. Medication Use and the Risk of Newly Diagnosed Diabetes in Patients with Epilepsy: A Data Mining Application on a Healthcare Database[J]. Journal of Organizational and End User Computing (JOEUC),2020,32(2).[87]Rashkovits Rami,Lavy Ilana. Students' Difficulties in Identifying the Use of Ternary Relationships in Data Modeling[J]. International Journal of Information and Communication Technology Education (IJICTE,2020,16(2).[88]Yusuf Akhtar,Dipti Prasad Mukherjee. Context-based ensemble classification for the detection of architectural distortion in a digitised mammogram[J]. IET Image Processing,2020,14(4).[89]Gurpreet Kaur,Sukhwinder Singh,Renu Vig. Medical fusion framework using discrete fractional wavelets and non-subsampled directional filter banks[J]. IET Image Processing,2020,14(4).[90]Qian Liu,Bo Jiang,Jia-lei Zhang,Peng Gao,Zhi-jian Xia. Semi-supervised uncorrelated dictionary learning for colour face recognition[J]. IET Computer Vision,2020,14(3).[91]Yipo Huang,Leida Li,Yu Zhou,Bo Hu. No-reference quality assessment for live broadcasting videos in temporal and spatial domains[J]. IET Image Processing,2020,14(4).[92]Panetta Karen,Wan Qianwen,Agaian Sos,Rajeev Srijith,Kamath Shreyas,Rajendran Rahul,Rao Shishir Paramathma,Kaszowska Aleksandra,Taylor Holly A,Samani Arash,Yuan Xin. A Comprehensive Database for Benchmarking Imaging Systems.[J]. IEEE transactions on pattern analysis and machine intelligence,2020,42(3).[93]Rahnev Dobromir,Desender Kobe,Lee Alan L F,Adler William T,Aguilar-Lleyda David,Akdo?an Ba?ak,Arbuzova Polina,Atlas Lauren Y,Balc? Fuat,Bang Ji Won,Bègue Indrit,Birney Damian P,Brady Timothy F,Calder-Travis Joshua,Chetverikov Andrey,Clark Torin K,Davranche Karen,Denison Rachel N,Dildine Troy C,Double Kit S,Duyan Yaln A,Faivre Nathan,Fallow Kaitlyn,Filevich Elisa,Gajdos Thibault,Gallagher Regan M,de Gardelle Vincent,Gherman Sabina,Haddara Nadia,Hainguerlot Marine,Hsu Tzu-Yu,Hu Xiao,Iturrate I?aki,Jaquiery Matt,Kantner Justin,Koculak Marcin,Konishi Mahiko,Ko? Christina,Kvam Peter D,Kwok Sze Chai,Lebreton Ma?l,Lempert Karolina M,Ming Lo Chien,Luo Liang,Maniscalco Brian,Martin Antonio,Massoni Sébastien,Matthews Julian,Mazancieux Audrey,Merfeld Daniel M,O'Hora Denis,Palser Eleanor R,Paulewicz Borys?aw,Pereira Michael,Peters Caroline,Philiastides Marios G,Pfuhl Gerit,Prieto Fernanda,Rausch Manuel,Recht Samuel,Reyes Gabriel,Rouault Marion,Sackur Jér?me,Sadeghi Saeedeh,Samaha Jason,Seow Tricia X F,Shekhar Medha,Sherman Maxine T,Siedlecka Marta,Skóra Zuzanna,Song Chen,Soto David,Sun Sai,van Boxtel Jeroen J A,Wang Shuo,Weidemann Christoph T,Weindel Gabriel,WierzchońMicha?,Xu Xinming,Ye Qun,Yeon Jiwon,Zou Futing,Zylberberg Ariel. The Confidence Database.[J]. Nature human behaviour,2020,4(3).[94]Taipalus Toni. The Effects of Database Complexity on SQL Query Formulation[J]. Journal of Systems and Software,2020(prepublish).[95]. Information Technology; Investigators from Deakin University Target Information Technology (Conjunctive query pattern structures: A relational database model for Formal Concept Analysis)[J]. Computer Technology Journal,2020.[96]. Machine Learning; Findings from Rensselaer Polytechnic Institute Broaden Understanding of Machine Learning (Self Healing Databases for Predictive Risk Analytics In Safety-critical Systems)[J]. Computer Technology Journal,2020.[97]. Science - Library Science; Investigators from Cumhuriyet University Release New Data on Library Science (Scholarly databases under scrutiny)[J]. Computer Technology Journal,2020.[98]. Information Technology; Investigators from Faculty of Computer Science and Engineering Release New Data on Information Technology (FGSA for optimal quality of service based transaction in real-time database systems under different workload condition)[J]. Computer Technology Journal,2020.[99]Muhammad Aqib Javed,M.A. Naveed,Azam Hussain,S. Hussain. Integrated data acquisition, storage and retrieval for glass spherical tokamak (GLAST)[J]. Fusion Engineering and Design,2020,152.[100]Vinay M.S.,Jayant R. Haritsa. Operator implementation of Result Set Dependent KWS scoring functions[J]. Information Systems,2020,89.[101]. Capital One Services LLC; Patent Issued for Computer-Based Systems Configured For Managing Authentication Challenge Questions In A Database And Methods Of Use (USPTO 10,572,653)[J]. Journal of Robotics & Machine Learning,2020.[102]Ikawa Fusao,Michihata Nobuaki. In Reply to Letter to the Editor Regarding "Treatment Risk for Elderly Patients with Unruptured Cerebral Aneurysm from a Nationwide Database in Japan".[J]. World neurosurgery,2020,135.[103]Chen Wei,You Chao. Letter to the Editor Regarding "Treatment Risk for Elderly Patients with Unruptured Cerebral Aneurysm from a Nationwide Database in Japan".[J]. World neurosurgery,2020,135.[104]Zhitao Xiao,Lei Pei,Lei Geng,Ying Sun,Fang Zhang,Jun Wu. Surface Parameter Measurement of Braided Composite Preform Based on Faster R-CNN[J]. Fibers and Polymers,2020,21(3).[105]Xiaoyu Cui,Ruifan Cai,Xiangjun Tang,Zhigang Deng,Xiaogang Jin. Sketch‐based shape‐constrained fireworks simulation in head‐mounted virtual reality[J]. Computer Animation and Virtual Worlds,2020,31(2).[106]Klaus B?hm,Tibor Kubjatko,Daniel Paula,Hans-Georg Schweiger. New developments on EDR (Event Data Recorder) for automated vehicles[J]. Open Engineering,2020,10(1).[107]Ming Li,Ruizhi Chen,Xuan Liao,Bingxuan Guo,Weilong Zhang,Ge Guo. A Precise Indoor Visual Positioning Approach Using a Built Image Feature Database and Single User Image from Smartphone Cameras[J]. Remote Sensing,2020,12(5).[108]Matthew Grewe,Phillip Sexton,David Dellenbach. Use Risk‐Based Asset Prioritization to Develop Accurate Capital Budgets[J]. Opflow,2020,46(3).[109]Jose R. Salvador,D. Mu?oz de la Pe?a,D.R. Ramirez,T. Alamo. Predictive control of a water distribution system based on process historian data[J]. Optimal Control Applications and Methods,2020,41(2).[110]Esmaeil Nourani,Vahideh Reshadat. Association extraction from biomedicalliterature based on representation and transfer learning[J]. Journal of Theoretical Biology,2020,488.[111]Ikram Saima,Ahmad Jamshaid,Durdagi Serdar. Screening of FDA approved drugs for finding potential inhibitors against Granzyme B as a potent drug-repurposing target.[J]. Journal of molecular graphics & modelling,2020,95.[112]Keiron O’Shea,Biswapriya B. Misra. Software tools, databases and resources in metabolomics: updates from 2018 to 2019[J]. Metabolomics,2020,16(D1).[113]. Information Technology; Researchers from Virginia Polytechnic Institute and State University (Virginia Tech) Describe Findings in Information Technology (A database for global soil health assessment)[J]. Energy & Ecology,2020.[114]Moosa Johra Muhammad,Guan Shenheng,Moran Michael F,Ma Bin. Repeat-Preserving Decoy Database for False Discovery Rate Estimation in Peptide Identification.[J]. Journal of proteome research,2020,19(3).[115]Huttunen Janne M J,K?rkk?inen Leo,Honkala Mikko,Lindholm Harri. Deep learning for prediction of cardiac indices from photoplethysmographic waveform: A virtual database approach.[J]. International journal for numerical methods in biomedical engineering,2020,36(3).[116]Kunxia Wang,Guoxin Su,Li Liu,Shu Wang. Wavelet packet analysis for speaker-independent emotion recognition[J]. Neurocomputing,2020.[117]Fusao Ikawa,Nobuaki Michihata. In Reply to Letter to the Editor Regarding “Treatment Risk for Elderly Patients with Unruptured Cerebral Aneurysm from a Nationwide Database in Japan”[J]. World Neurosurgery,2020,135.[118]Wei Chen,Chao You. Letter to the Editor Regarding “Treatment Risk for Elderly Patients with Unruptured Cerebral Aneurysm from a Nationwide Database in Japan”[J]. World Neurosurgery,2020,135.[119]Lindsey A. Parsons,Jonathan A. Jenks,Andrew J. Gregory. Accuracy Assessment of National Land Cover Database Shrubland Products on the Sagebrush Steppe Fringe[J]. Rangeland Ecology & Management,2020,73(2).[120]Jing Hua,Yilu Xu,Jianjun Tang,Jizhong Liu,Jihao Zhang. ECG heartbeat classification in compressive domain for wearable devices[J]. Journal of Systems Architecture,2020,104.以上就是关于数据库英文参考文献的全部内容,希望看完后对你有所启发。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

数据库构建从用户界面要素构建数据库应用,描述数据库为信息的组成部分(数据集),以及连结这些对彼此和对数据库信息的来源的组成部分。

你怎样组织这些片,就是你的数据库应用的结构。

当有很多清楚的方法在数据库应用中组织组成部分时,大多数遵循用下列数字说明的一般的计划:1.用户界面形式在形式上把它完全与其余应用分开的隔离用户界面是一种好想法。

这有几个优势。

通过把用户界面从描述数据库信息的组成部分本身隔离开,你把一种更大的灵活性引入你的设计:转换成你管理数据库信息的方式,不要求你重写你的用户界面;换成用户界面不要求你兑换与数据库合作的你应用的部分。

另外,这类隔离让你发展你能在多应用之间分享的普通形式,因此提供一个一致的用户界面。

通过储存与类库方面的精心设计的形式的联系,你和其他开发者能在现有的基础而不是为每项新工程从头开始建造。

分享形式也使你得以发展应用接口的共同的标准。

关于在数据库应用中创建用户界面的更多信息,参见用户界面的设计。

2.数据控件如果你已经隔离你的用户界面进它自己的形式,你可以使用一个数据模件存放描述数据库信息的零部件( 数据集),以及把这些数据集和你的应用的其它部分连结起来的组成部分。

像用户界面形式一样,你在类库中能分享数据控件,以便他们可能在应用中被重新使用或者共享。

3.数据源在数据模件里的第一条是一个数据源。

在用户界面和从数据库那里描述信息的一数据集之间,数据源担任一导管。

几个意识到数据的关于一个形式的控制能分享一个单个的数据源,在这种情况下在每个控制过程中的展示能够协调以便用户卷轴通过记录,在当前所记的领域的相应价值中被在每个控制过程中展示。

4.数据集你的数据库应用的核心是数据集。

这个组成部分在基础的数据库中代表一套记录。

这些记录可能是来自一份单数据库表,来自一张表多个领域或多个记录,或来自于多个表的视图。

在使用数据集时,你应用逻辑是在数据库缓存内重建的物理表。

当基础的数据库改变时,你可能需要改变数据集控制的数据的方式,但是你的其余应用能继续工作而没有改变。

欲了解关于数据集的共同特性和方法的更多的信息,参见理解数据集5. 数据链接不同的类型的数据集用不同的机制连接基础数据库信息。

在你能建造的数据库时,这些不同的机制,依次构成主要的差别。

链接数据有4 个基本的机制:直接连接一台数据库服务器。

大多数数据集使用一个TCustomConnection 的后台服务对一个数据库服务器建立连接。

在磁盘上使用一个共享的文件。

客户数据集支持在磁盘上使用一个共享的文件工作的能力。

当使用一个共享的文件并不释放连接部分,因为那些客户端知道怎样读写文件。

连接另一个数据集。

客户数据集能够使用被另一个数据集提供的数据工作。

一个TDataSetProvider 组件作为在客户数据集和它的来源数据集之间的一个中介。

这个数据集提供者能存在于客户数据集相同的数据控件,或者可能是在另一台运转机服务器上的一台应用服务器的一部分。

如果提供者是一台应用服务器的一部分,你也需要一个TCustomConnection的特别的后台对应用服务器建立连接。

获得一个来自RDS DataSpace 的对象。

在使用被基于ADO应用服务的多级的数据库,应用ADO数据集能使用一TRDSConnection 的控件排列数据。

有时,这些机制可能集合在一个单独的应用中。

最普通的数据库构成是数据集使用一个连接控件建立对一台数据库服务器的一个连接。

数据集然后从服务器中直接读数据并且到服务器直接编辑。

这被用下列数字说明。

直接连接到服务器:各种类型的数据集使用自己固有的连接部分,这代表了一个单独的数据存取机制:如果数据集是一个BDE数据集(例如TTable,TQuery或者TStoredProc),连接组成部分是一个TDataBase 对象。

你通过确定它的数据库特性把数据集和数据库组成部分连结起来。

当使用BDE数据集时,你不需要明确地增加一个数据库组成部分。

如果你确定数据集的DatabaseName 特性,一个数据库组成部分被在运行时自动为你创建。

如果数据集是一个ADO数据集(例如TADODataSet,TADOTable,TADOQuery或者TADOStoredProc) ,连接组成部分是一个TADOConnection 对象。

你通过确定它的连接特性把数据集和ADO连接组成部分连结起来。

像BDE数据集一样,你不需要明确地增加连接组成部分:改为你能确定数据集的ConnectionString特性。

如果数据集是一个dbExpress数据集(例如TSQLDataSet,TSQLTable,TSQLQuery或者TSQLStoredProc) ,连接组成部分是一个TSQLConnection 对象。

你通过确定它的SQLConnection 特性把数据集和SQL 连接组成部分连结起来。

当使用dbExpress数据集时,你必须明确地增加连接组成部分。

dbExpress数据集和其它数据集之间的另一个差别是dbExpress数据集总是只读和单向的:这表明你只能通过记录说明来操作,并且你不能使用支持数据集方法进行编辑。

如果数据集是InterBase Express数据集(例如TIBDataSet,TIBTable,TIBQuery或者TIBStoredProc) ,连接组成部分是一个TIBDatabase 对象。

你通过确定它的数据库财产把数据集和IB数据库组成部分连结起来。

像dbExpress数据集一样,你必须明确地增加连接组成部分。

除在上面列举的组成部分之外,你能使用一个专业的客户数据集(例如TBDEClientDataSet,TSimpleDataSet或者TIBClientDataSet 用一个数据库连接组成部分)。

当使用这些客户数据集之一时,指定连接组成部分的适当类型为DBConnection 特性的值。

虽然每种类型的数据集使用一个不同的连接组成部分,他们全部执行大多数相同的任务和表面大多数相同的特性,方法和事件。

在各种各样数据库的连接控件上有很多共性,参见连接数据库。

这些构造由单层-层排列或者两层-层排列应用,取决于那些服务器数据库在本地数据库或者远程数据库服务器。

虽然分隔到一个数据模块,但是操作数据库信息的逻辑在实现用户界面的过程中是相同的应用。

你能写的数据库应用的最简单的形式根本不使用数据库服务器。

相反,它使用MyBase,客户数据集的功能把他们保存成文件并且装载来自文件的数据。

这个结构可以用下列数字说明:当使用基于文件方法进行存取,你应用客户数据集的SaveToFile 方法读写磁盘。

SaveToFile使用一个参数,包含那些表被创造(或者改写)的文件名。

当你想要读以前使用SaveToFile方法建的一张表时,使用LoadFromFile方法。

LoadFromFile也使用一个参数,包含表的文件名。

如果你总是从同一文件装载和保存,你能使用FileName特性代替SaveToFile和LoadFromFile方法。

当FileName被调整到一个合理的文件名字时,当客户数据集开放时,数据自动装载;当客户数据集关闭时,数据自动保存到文件中。

这简单的基于文件的结构是单层-层排列的应用,虽然分隔到一个数据模块,但是操作数据库信息的逻辑在实现用户界面的过程中是相同的应用。

这种基于文件的接近有个简单的好处。

没有数据库服务器要安装,使成形,或者部署 (如果你不静态连接在midaslib.dcu,客户数据集内确实需要midas.dll)。

这不需要站点许可证或者数据库管理。

另外,Delphi的一些版本让你可以在任意的XML数据和被一个客户数据集使用的数据包之间进行转变。

因此,基于文件的接近能像使用共享数据集一样使用用XML数据。

关于在XML数据和客户数据集数据包之间转变的信息,参见数据库应用中的XML使用。

这种基于文件的接近没有支持多用户,这种数据集应该完全致力于应用。

数据保留成文件存放在磁盘上,并且在稍后装,但是没有内部保护防止多个用户免受重写彼此的数据文件。

Database ArchitectureDatabase applications are built from user interface elements, components that represent database information (datasets), and components that connect these to each other and to the source of the database information. How you organize these pieces is the architecture of your database application.While there are many distinct ways to organize the components in a database application, most follow the general scheme illustrated in the following figure:The user interface formIt is a good idea to isolate the user interface on a form that is completely separate from the rest of the application. This has several advantages. By isolating the user interface from the components that represent the database information itself, you introduce a greater flexibility into your design: Changes to the way you manage the database information do not require you to rewrite your user interface, and changes to the user interface do not require you to change the portion of your application that works with the database. In addition, this type of isolation lets you develop common forms that you can share between multiple applications, thereby providing a consistent user interface. By storing links to well-designed forms in the Object Repository, you and other developers can build on existing foundations rather than starting over from scratch for each new project. Sharing forms also makes it possible for you to develop corporate standards for application interfaces. For more information about creating the user interface for a database application, see Designing the user interface.The data moduleIf you have isolated your user interface into its own form, you can use a data module to house the components that represent database information (datasets), and the components that connect these datasets to the other parts of your application. Like the user interface forms, you can share data modules in the Object Repository so that they can be reused or shared between applications.The data sourceThe first item in the data module is a data source. The data source acts as a conduit between the user interface and a dataset that represents information from a database. Several data-aware controls on a form can share a single data source, in which case the display in each control is synchronized so that as the user scrolls through records, the corresponding value in the fields for the current record is displayed in each control.The datasetThe heart of your database application is the dataset. This component represents a set of records from the underlying database. These records can be the data from a single database table, a subset of the fields or records in a table, or information from more than one table joined into a single view. By using datasets, your application logic is buffered from restructuring of the physical tables in your databases. When the underlying database changes, you might need to alter the way the dataset component specifies the data it contains, but the rest of your application can continue to work without alteration. For more information on the common properties and methods of datasets, see Understanding datasetsThe data connectionDifferent types of datasets use different mechanisms for connecting to the underlying database information. These different mechanisms, in turn, make up the major differences in the architecture of the database applications you can build. There are four basic mechanisms for connecting to the data:Connecting directly to a database server. Most datasets use a descendant of TCustomConnection to represent the connection to a database server.Using a dedicated file on disk. Client datasets support the ability to work with a dedicated file on disk. No separate connection component is needed when working with a dedicated file because the client dataset itself knows how to read from and write to the file.Connecting to another dataset. Client datasets can work with data provided by another dataset. A TDataSetProvider component serves as an intermediary between the client dataset and its source dataset. This dataset provider can reside in the same data module as the client dataset, or it can be part of an application server running on another machine. If the provider is part of an application server, you also need a special descendant of TCustomConnection to represent the connection to the application server.Obtaining data from an RDS DataSpace object. ADO datasets can use a TRDSConnection component to marshal data in multi-tier database applications that are built using ADO-based application servers.Sometimes, these mechanisms can be combined in a single application.The most common database architecture is the one where the dataset uses a connection component to establish a connection to a database server. The dataset then fetches data directly from the server and posts edits directly to the server. This is illustrated in the following figure.Connecting directly to the database serverEach type of dataset uses its own type of connection component, which represents a single data access mechanism:If the dataset is a BDE dataset such as TTable, TQuery, or TStoredProc, the connection component is a TDataBase object. You connect the dataset to the database component by setting its Database property. You do not need to explicitly add a database component when using BDE dataset. If you set the dataset's DatabaseName property, a database component is created for you automatically at runtime.If the dataset is an ADO dataset such as TADODataSet, TADOTable, TADOQuery, or TADOStoredProc, the connection component is a TADOConnection object. You connect the dataset to the ADO connection component by setting its Connection property. As with BDE datasets, you do not need to explicitly add the connection component: instead you can set the dataset's ConnectionString property.If the dataset is a dbExpress dataset such as TSQLDataSet, TSQLTable, TSQLQuery, or TSQLStoredProc, the connection component is a TSQLConnection object. You connect the dataset to the SQL connection component by setting its SQLConnection property. When using dbExpress datasets, you must explicitly add the connection component. Another difference between dbExpress datasets and the otherdatasets is that dbExpress datasets are always read-only and unidirectional: This means you can only navigate by iterating through the records in order, and you can't use the dataset methods that support editing.If the dataset is an InterBase Express dataset such as TIBDataSet, TIBTable, TIBQuery, or TIBStoredProc, the connection component is a TIBDatabase object. You connect the dataset to the IB database component by setting its Database property. As with dbExpress datasets, you must explicitly add the connection component.In addition to the components listed above, you can use a specialized client dataset such as TBDEClientDataSet, TSimpleDataSet, or TIBClientDataSet with a database connection component. When using one of these client datasets, specify the appropriate type of connection component as the value of the DBConnection property.Although each type of dataset uses a different connection component, they all perform many of the same tasks and surface many of the same properties, methods, and events. For more information on the commonalities among the various database connection components, see Connecting to databasesThis architecture represents either a single-tiered or two-tiered application, depending on whether the database server is a local database such or a remote database server. The logic that manipulates database information is in the same application that implements the user interface, although isolated into a data module.The simplest form of database application you can write does not use a database server at all. Instead, it uses MyBase, the ability of client datasets to save themselves to a file and to load the data from a file. This architecture is illustrated in the following figure:When using this file-based approach, your application writes changes to disk using the client dataset's SaveToFile method. SaveToFile takes one parameter, the name of the file which is created (or overwritten) containing the table. When you want to read a table previously written using the SaveToFile method, use the LoadFromFile method. LoadFromFile also takes one parameter, the name of the file containing the table.If you always load to and save from the same file, you can use the FileNameproperty instead of the SaveToFile and LoadFromFile methods. When FileName is set to a valid file name, the data is automatically loaded from the file when the client dataset is opened and saved to the file when the client dataset is closed.This simple file-based architecture is a single-tiered application. The logic that manipulates database information is in the same application that implements the user interface, although isolated into a data module.The file-based approach has the benefit of simplicity. There is no database server to install, configure, or deploy (If you do not statically link in midaslib.dcu, the client dataset does require midas.dll). There is no need for site licenses or database administration.In addition, some versions of Delphi let you convert between arbitrary XML documents and the data packets that are used by a client dataset. Thus, the file-based approach can be used to work with XML documents as well as dedicated datasets. For information about converting between XML documents and client dataset data packets, see Using XML in database applicationsThe file-based approach offers no support for multiple users. The dataset should be dedicated entirely to the application. Data is saved to files on disk, and loaded at a later time, but there is no built-in protection to prevent multiple users from overwriting each other's data files.For more information about using a client dataset with data stored on disk, see Using a client dataset with file-based data.。

相关文档
最新文档