计算机专业英语第9章

合集下载

计算机英语专业外语第三版unit9

计算机英语专业外语第三版unit9

幻灯片1UNIT 9 The InternetSection AThe Internet幻灯片2The Internet —IntroductionThe most notable example of an internet is the Internet (note the uppercase I ), which originated from research projects going back to the early 1960s. The goal was to develop the ability to link a variety 0f computer networks so that they could function as a connected system that would not be disrupted by local disasters.最著名的互联网例子是因特网(Internet,注意大写的I)。

因特网起源于20世纪60年代初的研究项目。

其目标是发展一种能力,将各种计算机网络连接起来,使它们能够作为一个不会因局部灾难而瓦解的互联系统运行。

幻灯片3The Internet —IntroductionMost of this original work was sponsored by the U.S. government through the Defense Advanced Research Projects Agency (DARPA--pronounced "DAR-pa"), Over the years, the development of the Internet shifted from a defense project to an academic research project, and today it is largely a commercial undertaking that links a worldwide combination of WANs, MANs, and LANs involving millions of computers.最初的工作大多是由美国政府通过国防部高级研究计划局(DARPA——读作“DAR-pa”)发起的。

计算机英语第9章

计算机英语第9章

Chapter 9 Computing Security Learning Objectives:Warm-up:Label the following pictures with the terms in the box:1. router2.search engine 3.modular plug 4. world wide web 5. network controller 6. network graphic 7. network cabinet 8. net wire 9. serverA.______________________B.______________________C. ______________________D._____________________E._____________________F. ______________________G ._____________________H.______________________I. ______________________9.1 An Introduction to Computer SecurityComputer Security is the protection of computing systems and the data that they store or access. The issue of computer security first arose in the 1970s as individuals began to break into telephone systems. As technologyadvanced, computer systems became targets as well. The Federal Bureau of Investigation (FBI 1) made one of its first arrests related to computer hacking in the early 1980s.When talking about computer security, some people think firstly of their credit card numbers, social security numbers 2, and other personal information. Knowing how to protect private information from those who would exploit it is very important. However, that is only one part of computer security. Computer security in a broad sense consists of the three aspects: hardware security, information security and administration security.Ⅰ. Hardware security falls into physical security and emanation security 3. The former concerns protection of computer hardware and associated equipments, such as computers, servers, networks and peripheral equipment, etc. from external physical threats, such as tampering , theft, earthquakes, water, etc. The latter copes with protection against spurious signals 4 emitted by electrical equipments in the system, such as electromagnetic emission from displays and audio emission (sounds from printers, etc).Ⅱ. Information security is made up of communication security and computer security in a narrow sense. The firsthacking [ ♒✌♓☠]n . 非法访问计算机系统和数据库的活动in a broad sense 广义上的 fall into 分为 emanation[ ♏❍☜⏹♏♓☞☜⏹] n . 散发, 发出 associated adj .联合的, 关联的 tamper [ ♦✌❍☐☜] vi .干预, 玩弄 vt .篡改spurious [ ♦☐◆☜❒♓☜♦] adj .伪造的, 假造的 electromagnetic[✋●♏♦❒☜☺❍✌♈⏹✋♦✋ ] adj .电磁的 transmission[♦❒✌⏹❍♓☞☜⏹] n .播送, 发射, 传动1 FBI 联邦调查局2social security number 社会安全号码。

计算机专业英语(computing essentials)第九章key terms

计算机专业英语(computing essentials)第九章key terms
client (251) client/server network system (260)
coaxial cable (244) Communication channel (244) Communication system (243)
computer network (251) connectivity (242)
(254) microwave (245)
modem (247) modulation (247) network administrator (251, 264) network gateway (253) network hub (255)
dispersed locations. A system in which computing power is located and shared at different locations. Converts text-based addresses to IP addresses The most common way in which nodes can be connected to one another and communications can be controlled. A modem that stands apart from the computer and typically is connected by a cable to the computer’s serial port. A private network that connects more than one organization. Transmits data as pulses of light through tiny tubes of glass. A security system designed to protect an organization’s network against external threats. Global positioning system (GPS) devices use location information sent by satellites to uniquely determine the geographic location of the device. Consists of several computers linked to a central host computer, but also are hosts to other, smaller computers or peripheral devices. Local Area Networks used by individuals in their homes and apartments. A large centralized computer, usually a minicomputer or a mainframe. The center or central node for other nodes. A type of wireless connection that uses infrared light waves to communicate over short distances. A modem that consists of a plug-in circuit board inside the system unit. A private network within an organization that resembles the Internet. A unique numeric address for every computer on a network. Networks with nodes that are in close physical proximity Used for standard telephone communication. (see also voiceband) the bandwidth used in special leased lines to connect minicomputers and mainframes

计算机专业英语Unit-9

计算机专业英语Unit-9

计算机专业英语Unit-9Unit 9 Computer VirusText 1 Virus IntroductionExercises1. Multiple choices.(1)A virus is a ( A ).A. programB. computerC. bad manD. beast(2)A virus is a program that reproduces itsown code by ( ABC ).A. adding to the end of a fileB. inserting into the middle of a fileC. simply placing a pointerD. replacing another program(3)( AD )is a type of executable file .A. COM fileB. TXT fileC. JPG fileD. EXE file(4)Similar to viruses, you can also findmalicious code in ( ABC ).A. Trojan HorsesB. wormsC. logic bombsD. Microsoft Word Documents2. Fill in the blanks.(1)A virus is a program that reproduces itsown code by attaching itself to otherexecutable files in such a way that thevirus code is executed when the infectedexecutable file is executed .(2)To attach might mean physically addingto the end of a file, inserting into themiddle of a file, or simply placing apointer to a different location on the disksomewhere where the virus can find it. (3)Similar to viruses, you can also findmalicious code in Trojan Horses, worms,and logic bombs.3. Translate and analyze thefollowing sentences.(1)These self-replicating codes, when caused3by some event, may do a potentiallyharmful act to your computer.句子组成:when引导时间状语从句做插入语,当…的时候.翻译:当这些自复制代码被一些事件触发时,或许会做出一些对你的计算机有潜在危害的行为.(2)More recently, scripts written for Internetweb sites and/or included in E-mail canalso be executed and infected.句子组成:scripts written…省略的定语从句完整形式scripts which were writtened….翻译:现在,为网站编写的或者包括在E-mail 中的脚本也能够被执行和感染。

Unit 09计算机英语

Unit 09计算机英语

expensive item such as a sofa before they purchase it.
Electronic commerce
Disadvantages
Many people also consider shopping a social experience.
社交体验
For instance, they may enjoy going to a shopping mall
Electronic commerce is a system [ that includes 电子商务 not only transactions that center on buying and selling 交易
goods and services to directly generate revenue,
virus
名词 n. [C] 1. 病毒;滤过性病毒 2. 病毒感染 We should be watchful of computer viruses. 警惕 antivirus n. 杀毒软件
spy
名词 n. 1. 间谍;密探[C] She liked the adventures of a spy. 不及物动词 vi. 1. 当间谍;暗中监视;刺探[(+on/upon/into)] We spied on the man. 及物动词 vt. 1. 暗中监视;侦察出 He sent out a party to spy the enemy. 小分队
《计算机英语》
Unit 9 Electronic commerce 电子商务
encrypt [en‘kript] v.加密 encryption n. 【电脑】加密 encryption software

《计算机专业英语》电子教案第9章

《计算机专业英语》电子教案第9章

课后作业
学生将完成作业,巩固和应用本章学习的相关知识,并通过提交作业进行反 馈和评估。
《计算机专业英语》电子 教案第9章
本章将介绍《计算机专业英语》电子教案的第9章内容。从课前预习到课后作 业,全面讲解教学流程。
电子教案第9章概述
第9章介绍了《计算机专业英语》电子教案的整体内容和目标,为学生提供对 本章学习的整体了解。
课前预习
学生将通过阅读教材和在线资源进行课前预习,以增加他们对本课相关知识 的了解。
课堂讲授
1
知识讲解
教师将详细讲解本章的重点知识,并通过示例和案例进行说明。
2
互动讨论
学生将积极参与课堂讨论,提出问题并与教师和其他同学进行交流。
3
小组活动
学生将分组进行多种教学实践活动,如角色扮演和问题解决。
教学实践活动
课外实践
学生将根据本章的内容参与 实践活动,如参观实验室或 研究相关项目。
实地考察
学生将进行实地考察,了解 与本章相关的行业应用和实 际案例。
模拟演练
学生将参与模拟演练,提高 技能和应对各种情况的能力。
评估与反馈
教师将通过测试、讨论和综合评价等方式对学生的学习情况进行评估,并提供反馈和建议。
知识总结与延伸Leabharlann 学生将进行知识总结,并通过课外阅读等方式对本章的相关知识进行进一步延伸。

计算机专业英语(2008影印版)第九章全文翻译

计算机专业英语(2008影印版)第九章全文翻译

第九章P255网络架构描述网络是如何安排和如何协调和共享资源。

网络配置描述了网络的物理安排。

网络策略定义了如何利用信息和资源共享。

网络可以安排或配置几种不同的方式。

这种安排被称为网络的拓扑结构。

四个主要的网络拓扑结构是星型,总线,环形,和层次。

在星型网络中,一些小型计算机或外围设备连接到一个中央单位。

中央单元是网络集线器,通常是一台主机或文件服务器。

通过这个中央单位的所有通信。

控制维持投票站。

也就是说,每个连接设备要求(“调查”)是否有一个消息发送。

每个设备然后又允许发送它的消息。

P258特别是星型拓扑结构的优势之一是它可以用来支持一个分时系统。

也就是说,多个用户可以共享一台中央计算机上的资源(时间)。

星是一种用于连接微机一台主机到一个组织,它允许访问的数据库的共同拓扑。

在总线网络,每个网络中的设备处理其自己的通信控制。

没有电脑主机。

所有沿一个共同的连接电缆通信旅行称为总线或骨干。

作为传递的信息沿总线,它是用于检查每个设备,看看它是否准备好。

通常是连在一起时,只有少数微机总线网络。

这项安排是为共享数据存储不同微型计算机。

上常见的星型网络通常提供更直接的路径共享。

因为星型网络通常提供了一个更直接的路径,共享资源,然而它是比为总线共享这些资源更高效,总线网络很容易安装更便宜。

在环网中,每个设备连接到两个其他设备,形成一个环。

没有中央文件服务器或计算机。

周围环消息传递,直到他们到达正确的目的地。

随着微型计算机的使用,环形网是四个网中用的最不频繁的,然而它经常被用来连接主机,尤其是在广泛的地理区域。

这些大型机往往相当自主操作。

他们执行的大部分或全部自己加工,只偶尔份额与其他主机的数据和方案。

环网在分散的组织中非常有用,因为它用分布式数据处理系统。

也就是说,计算机可以在自己的分散地点执行处理任务。

然而,他们也可以分享彼此的程序,数据,资源和其他资源由几台电脑连接到一个中央主机电脑,就像一个星型网络,分层网络。

IT专业英语UNIT9Database教材教学课件

IT专业英语UNIT9Database教材教学课件

Introduction to Database Management System
Definition
A Database Management System (DBMS) is a software application that provides users with an interface to manage and interact with databases. It allows users to create, modify, retrieve, and delete data from the database.
Database Normalization
The process of organizing the data in a database to minimize data redundancy and improve data integrity.
03
Data Independence
The ability of the data in the database to be accessed and used
IT Professional English Unit9 Database Textbook Teaching Courseware
• Introduction to Database • Relational database • Database design • Database security and maintenance • Development Trends and New
ogies of Database
01
Introduction to Database
Definition and role of databases

计算机专业英语第9章

计算机专业英语第9章

What is a Disk?
Optical disks use a laser beam projection on the disk surface of lands and pits to read data from the disks (See Figure 9-4). The two most common formats of optical disks are CD (Compact Disc) and DVD (Digital Video Disc). Typically, The CD drives can store 650 megabytes of data on one side of a CD, and the faster the CD drive, the faster data can be read from the CD by the computer system. There are three types of CDs: CD-ROM, The CD-R, and CD-RW. CD-ROM (Compact Disc-Read Only Memory) is imprinted by the publisher and cannot be written on or erased by the user. CD-ROMs are sued to distribute large data, for example, loading Microsoft Office application package. CD-R (CD-Recordable), also known as WORM(Write Once, Read Many), can be written to once and afterwards read many times without deterioration but not rewritten or erased. CD-Rs are used to create custom music CDs. CD-RW (Compact Disc ReWritable) can be changed after data is recorded so they are often used to create and edit multimedia presentations.Leabharlann What is a Disk?

计算机专业英语》电子教案第9章

计算机专业英语》电子教案第9章
Chapter 9 The World Wide Web
Computer English
Chapter 9 The World Wide Web
可编辑ppt
9-1
Chapter 9 The World Wide Web
Requirements:
• 理解万维网(World Wide Web)的工作原理; • 能够描述Internet和万维网的特征及其服务; •了解学术论文写作的有关知识。
可rld Wide Web
The invention of the Web brought an extraordinary expansion of digital services to millions of amateur computer users, including color text and pages, formatted text, pictures, animations, video, and sound. In short, the Web makes nearly all the rich elements of human expression needed to establish a commercial marketplace available to nontechnical computer users worldwide.
New Words & Expressions
animation n. 动画
browse v.n.浏览
Hypertext n. 超文本
protocol n. 草案, 协议
extension n.扩展名
supplant vt.排挤掉, 代替
browser n 浏览器

Unit 9 MSDN-计算机专业英语(第2版)-邱晓红-清华大学出版社

Unit 9 MSDN-计算机专业英语(第2版)-邱晓红-清华大学出版社
把…分类 会议 分发 分配 遗产 潜在的传道士
1. History
The service started in 1992, but initially(7) only the Microsoft Developer Network CDROM was available(8). A Level II subscription(9)was added in 1993, that included the MAPI, ODBC, TAPI and VFW SDKs.
假名;化名;(尤指)笔名 提交 捐款人
1. History
The caricature (16) of Dr. GUI was based on a photo of Bob. When he left the MSDN team Dennis Crain took over the Dr. GUI role and added medical humor to the column.
最初地 可利用的 预定
1. History
MSDN2 was opened in November 2004 as a source for Visual Studio 2005 API information, with noteworthy(10) differences being updated web site code, conforming(11) better to web standards and thus giving a long awaited improved support for alternative web browsers to Internet Explorer in the API browser.

unit9-徐娜

unit9-徐娜

Task I
Careers in IT
• Dialogue: Practice With Your Partner
Tom: Jerry, long time no see. How are you doing today? Jerry: So far so good, how about you? I think you must be busy these days. Tom: Yes, I am. Our bank decided to set a new branch in Wenzhou, so there are many preparations need to be done. Jerry: Pretty fair. So you guys are going to buy a great many new computers for that branch? Tom: Partly, but I am not responsible for this part, I am in the charge of setting the new cipher machine. Jerry: Cipher machine, it sounds so mystical. Tom: Ha-ha that is because you are not major in computer science. Jerry: Probably, but for me, it is really a big problem to deal with the computer things. Tom: Really? If you hit this kind of problems next time feel free to call me, it will be my pleasure to give you a hand. Jerry: Wow, it is really good news for me, thank you very much. Oops, its 6pm now. I need to go, my husband is waiting me for dinner, see you next time. Tom: All right, see you.

计算机专业英语Unit 9 Security

计算机专业英语Unit 9  Security
key for symmetric encryption. -- this is easier, since only one party ever needs access to it: the party that needs to decrypt the messages.
Computer English
❖ In services that store encrypted data on behalf of a user (like cloud backup services) when those services leave the decryption key in the hands of the user.
Computer English
Problems with Asymmetric Encryption
❖ The biggest issue with public-key cryptography is making sure you can trust the public key you have.
忠实地,忠贞地
证书; 证明书 不可实行的
碰撞, 抵触, 冲突
Computer English
symmetric encryption asymmetric encryption crypto pblic key private (secret) key brute-forcing end-to-end
❖ Asymmetric encryption(public-key cryptography) takes readable data, scrambles it, and unscrambles it again at the other end.

IT专业英语UNIT9 Database

IT专业英语UNIT9 Database
A database is designed, built, and populate with data for a specific purpose. It has an intended group of users and some preconceived applications in which these users are interested.
UNIT 9 ase
2. Entity-Relationship Model The entity-relationship (E-R) data model uses a collection of basic objects, called entities, andrelationships among these objects. An entity is a “thing” or “object” in the real world that is distinguishable from other objects. The entity-relationship model is widely used in database design.
5. Telecommunication: for keeping records of calls made, generating monthly bills, maintaining balances on prepaid calling cards, and storing information about the communication networks.
4. Airlines: for reservations and schedule information. Airlines were among the first to use databases in a geographically distributed manner.

《计算机英语》第九单元

《计算机英语》第九单元

9.1
主要内容
• 正文 • 生词
— 4—
9.1 Internet Security
Anyone responsible for the security of a trusted network will be concerned when connecting it to a distrusted network. In the case of connections to the Internet this concern may be based largely on anecdotal evidence gleaned from widespread media coverage of security breaches. A closer inspection of the facts and statistics behind some of the media coverage will, however, only serve to deepen that concern. For example, the US National Computer Security Agency (NCSA) asserts that most attacks to computer systems go undetected and unreported, citing attacks made against 9000 Department of Defense computers by the US Defense Information Systems Agency (DISA). These attacks had an 88 percent success rate and went undetected by more than 95 percent of the target organizations. Only 5 percent of the 5 percent that detected an attack, a mere 22 sites, reacted to it.

新编计算机英语教程Chapter 09

新编计算机英语教程Chapter 09

Data Structure - Data Structure Fundamentals
• Abstraction
• Static Versus Dynamic Structures • An important distinction in constructing abstract data structures is whether the structure being simulated is static or dynamic, that is, whether the shape or size of the structure changes over time. For example, if the abstract tool is a list of names, it is important to consider whether the list will remain a fixed size throughout its existence, expand and shrink as names are added and deleted.
Data Structure - Data Structure Fundamentals
• Basic Data Structures- heterogeneous array
• In contrast to a homogeneous array, a heterogeneous array is a block of data items that might be of different types. The items within the block are usually called components.
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

What is aห้องสมุดไป่ตู้Disk?
Floppy disks are portable storage media used to store files (See Figure 9-3). * A floppy disk is made up of flat circular pieces of Mylar plastic rotating within a jacket, and a metal oxide film coating the Mylar plastic. Data is stored as electromagnetic charges on the film and presented by the presence or absence of these charges. The most widely used floppy disk is the 1.44 MB 3.5-inch disk with the storing capacity of 1.44 megabytes (the equivalent of 400 typewritten pages). Such disks are labeled 2HD, which means two-sided, high-density. And they also have a write-protect notch. * When the notch is open, data cannot be added on the disk as to protect against accidentally writing over information on the disk that you want to keep.
What is a Disk?
Various disks are the main part of secondary storage devices for microcomputers (See Figure 9-1). Disks are specially processed plastic or metallic platters used to store information externally and permanently. Commonly used secondary storage devices include hard disks, floppy disks, CDs, etc.Figure 9-2 Comparatively, hard disks take the advantage of capacity and speed (See Figure 9-2). Hard disks embrace internal, cartridge, and pack types. An internal hard disk container is located inside the system unit to store programs, like the operating system and major applications, and large data files as well. * It contains several metallic platters to store data, an access arm and read-write heads to write data to and to read data from the disks, and a motor for rotating the disks. Unlike the fixed internal hard disk, the harddisk cartridge is designed to remove easily.
第9章 Disk
本章要点
What is a Disk? Words and Expressions How To Do:Shopping How To Work:Register Grammar Focus:主谓一致 Text in Chinese:磁盘 Reading Selection:Storage 科技英语翻译方法与技巧(Ⅱ) Practical Writing:申请信
What is a Disk?
Optical disks use a laser beam projection on the disk surface of lands and pits to read data from the disks (See Figure 9-4). The two most common formats of optical disks are CD (Compact Disc) and DVD (Digital Video Disc). Typically, The CD drives can store 650 megabytes of data on one side of a CD, and the faster the CD drive, the faster data can be read from the CD by the computer system. There are three types of CDs: CD-ROM, The CD-R, and CD-RW. CD-ROM (Compact Disc-Read Only Memory) is imprinted by the publisher and cannot be written on or erased by the user. CD-ROMs are sued to distribute large data, for example, loading Microsoft Office application package. CD-R (CD-Recordable), also known as WORM(Write Once, Read Many), can be written to once and afterwards read many times without deterioration but not rewritten or erased. CD-Rs are used to create custom music CDs. CD-RW (Compact Disc ReWritable) can be changed after data is recorded so they are often used to create and edit multimedia presentations.
相关文档
最新文档