计算机专业英语大作业

网址一:https://www.360docs.net/doc/ef19030095.html,/hub/save-computer-from-Hackers

网址二:https://www.360docs.net/doc/ef19030095.html,/hub/What-is-Phishing

姓名:**

学号:************

分校:通州

(一)原文

1.

What is Computer Hacking?

Computer hacking is a malicious act, so it is important for your computer and data to protect from Hacking. Computer Hacking refers to the process of making malicious modifications to a software or hardware to accomplish an aim outside the original creator's objective. Hackers are usually expert programmers who usually see hacking as a real life application of their skills.

Hacking has become a nuisance in recent times and the protection from hacking has become more complex. Infact, the hackers have become so good that even the software giants are feeling a headache. Nintendo recently reported a loss of $975 million due to privacy and Microsoft has lost an estimated $900 million in five years.

Well, the Giants are not the only targets of these hackers, even common individuals are not safe. The dangers range from little thefts to sponsored terrorism. These include stealing personal information and spying your activities. They can get to your secrets and destroy your credit. The dangers are possibly endless.

How to protect from Hacking

Prevention is Better Than Cure. The problem of computer hacking has become really serious. But there are some basic methods which are usually the best to guarantee a Hacker-free system. Here, I am going to introduce some basic tips to save your computer and data from hackers.

Using Antivirus Software

Antivirus software are one of the basic tools for your data and computer to protect from hacking. Antivirus software act as a protecting net that catches any potential threat before it reaches your system. They can prevent unauthorized access to your computer, protects your system from viruses and cloaks your data ports from intruders searching for any opening. The dangers range from little thefts to sponsored terrorism. These include stealing personal information and spying your activities.

Nowadays anti virus software are completely automated. Go for the best when choosing anti virus software and make sure that you scan your system for viruses atleast once a week. Norton antivirus from Symantecis one of the leading products in the industry. Avastis another great antivirus tool to protect from hacking.

Using Firewall

What is a Firewall?

A firewall is a set of programs located at the network gateway server which protects a private network from unauthorized access from other networks. The term firewall is originally referred to a wall intended to confine a fire.

A firewall protects your computer from offensive websites and potential hackers. It keeps your data and information safe from unwanted intruders. Firewalls are designed to prevent unauthorized access to your network, much like a locked door.Thus firewall is a vital tool for your strategy against hackers so don't forget to set up one for your system. Microsoft has a built-in firewall software but you can also try the Symantec firewall.

Using Anti Spyware Software

What is a Spyware?

A spyware is a self installing software which secretly gathers information about a person's computing activities such as surfing habits and viewed sites. Spywares are truly a hacker's tool, not only collecting personal information but also interfering with user control by installing additional software and redirecting web browsers.

Anti spyware software are designed to save your computer from hackers. They not only protect your computer by detection and removal of spywares but also preventing automatic installation of these malicious programs. Spysweeperis a great anti spyware software to guarantee a spyware free computer.

Email Security

Email is one of the leading hacker's tools. Hackers use emails to transmit malicious software to your computer. Emails are usually very cheap which gives the hackers loads of opportunities. One of the basic tips to prevent hacking is to be extra careful with emails. The most important tip is that you should never hand out your real email address to a stranger. Never open an email arriving from an unknown source and never try to open an attachment with an email if you don't know the sender. Aviraantivirus is a useful tool to filter your emails for potential threats as well as provide premium protection for your computer.

Software updates

Hackers are always searching for security gaps in your system. Anti virus and anti spyware software usually lose their effectiveness with time as new and more advanced malicious programs are created by hackers.

Its important to go for the latest security software in the market to guarantee

maximum security from threats. Make sure you frequently check out for software updates or set your software to update automatically.

Internet Security

Being extra careful while surfing is the best way to protect your computer from hackers. Simple precautions can mean the difference between a secure and vulnerable system. A great way to save yourself from hackers is to avoid visiting hacker controlled sites usually committed to porn, free downloads and online gaming. Also be extra careful while downloading something from an unknown source. Never ignore a security warning about a site. Its better to be safe than sorry.

Educate Yourself

When working for an offensive against hackers, the most important step is to educate yourself. Hacking is a dynamic topic with developments arising every moment. Hackers are intelligent and innovative and you should be prepared for it.

Computers are vulnerable. No matter what you do, its impossible to be 100% save. Important data like personal detail and credit card information should never be saved directly on a computer. A password protector is a great way to protect this data.

Another great way to secure your computer is to use a password on your computer. Well, it can't really save you if your computer gets stolen (in case of a laptop) but can save you from unauthorized people who can reach to your computer.

Windows update

Microsoft Windows is the best OS which comes with almost all the tools to protect you and your computer from hacking. To make the most of this, it is important to keep your windows updated. An easy way to do this is by checking for updates at Microsoft Windows Update. You can also set your windows security software to check for updates automatically so you don't miss anything. ...

2. What is a Phishing Attack?

Identity theft has become the new white collar crime and it has grown tremendously. Criminals that steal identities use them in a number of ways. One of the most common tricks is to use a stolen identity to open a line of credit. The line of credit is then depleted by the thief and the actual person receives the bill. Identities are also stolen for malicious intent, such as stealing a military officer’s email credentials in hopes of carrying out fictitious orders to troops.

Phishing is a relatively new term to describe ploys used by criminals trying to steal identities. Phishing scams are on the rise:

"During 2004, close to 2 million U. S. citizens had their checking accounts raided by cyber-criminals. With the average reported loss per incident estimated at $1200, total losses were close to $2 billion. The incidence of phishing e-mails―e-mails that

attempt to steal a consumer’s user name and password by imitating e-mail from a legitimate financial institution –has risen 4,000 percent over the past six months."

•What is Phishing Video

The term “phishing” is based on the term “fishing”. With fishing you bait a hook and try to catch fish. If you do not receive a bite, you often change the type of bait until you start catching fish. With phishing, the bait is typically an email that appears legitimate. The email typically asks for a bank customer to validate their information, however, the email redirects the customer to a fictitious bank site made to look like the legitimate bank site (James, 2005). The criminals hope the customer will not notice the redirected bank site is fictitious and that they will validate their account information. There are numerous phishing emails used as bait and criminals hope the more bait they use, the greater chances someone will fall for the scam.

The key to preventing identity theft is awareness. Financial institutions typically do not ask for account information validation. Any emails that ask for account validation or social security numbers, should be validated. The link contained within the email can be checked for legitimacy. These links often go to bogus sites that can easily be determined by the website link. For example, if you bank at https://www.360docs.net/doc/ef19030095.html, and you receive an email that has a link and takes you to https://www.360docs.net/doc/ef19030095.html,.customer.cz, this should raise suspicion. Phishing scams not only use email, but the telephone is also used. A typical scam involves a telephone call with someone impersonating your credit card company and asking you to validate your social security number, date of birth, etc. Credit card companies already have this information and do not need you to validate it. A simple line of defense is to ask the caller for the credit card company’s number and call them back。

Reference: James, L. (2005). Phishing exposed. Rockland, MA: Syngress Publishing.

(二)生词

1.loss 亏损

2.terrorism 恐怖主义

3.spying 间谍活动

4.destroy 摧毁

5.to guarantee 保障

6.potential 潜在的

7.intruders 入侵者

8.Firewall 防火墙

9.gateway server 网关服务器

10.collecting 搜集

11.interfering 妨碍

12.browsers 浏览器

13.Protection 保护

14.created by 由...创建

15.frequently 频繁的

16.updates 升级,更新

17.precautions 防御措施

18.difference 差异不同

19.vulnerable 易受攻击的

20.controlled 控制,约束

21.warning about 警告

22.developments 发展

23.save 补救

24.unauthorized 未经授权的

25.automatically 自动的

26.miss 错过

27.anything 任何事

28.Phishing Attack网络钓鱼

29.crime 犯罪

30.identities 身份

https://www.360docs.net/doc/ef19030095.html,lion 百万

32.total losses 全部损失

33.financial institution 金融机构

34.account 账户

35.awareness 意识

36.impersonating 模仿

37.validate 验证

(三)句子

https://www.360docs.net/doc/ef19030095.html,puter hacking is a malicious act, so it is important for your computer and data to protect from Hacking.翻译:计算机黑客是一种恶意行为,因此对你的计算机而言保护数据免受黑客进入是很重要的。(复合句)。

2. Infact, the hackers have become so good that even the software giants are feeling

a headache. Nintendo recently reported a loss of $975 million due to privacy and Microsoft has lost an estimated $900 million in five years.翻译:事实上,黑客变得这样好,甚至软件巨头都感到头痛。任天堂最近报道损失了975 万元,微软由于隐私被暴漏

五年之间失去了900 万美元。(复合句).

3.The dangers range from little thefts to sponsored terrorism. These include stealing personal information and spying your activities.翻译:小盗窃来的危险范围为资助恐怖主义。其中包括窃取个人信息和间谍活动。(复合句).

4.They can get to your secrets and destroy your credit.翻译:他们能得到你的密码,并摧毁你的信誉。(并列句)

5.The problem of computer hacking has become really serious. But there are some basic methods which are usually the best to guarantee a Hacker-free system翻译:电脑黑客问题已非常严重。但也有一些基本方法,这通常是最好的,以保证免受黑客攻击的系统。(并列句)

6.Here, I am going to introduce some basic tips to save your computer and data from hackers.翻译:在这里,我将介绍一些基本技巧,以保护您的计算机不被黑客窃取的数据。(简单句)

7.Antivirus software are one of the basic tools for your data and computer to protect from hacking.翻译:防病毒软件是您的数据和计算机防止黑客攻击的基本工具之一。(并列句)8.Anti spyware software are designed to save your computer from hackers. 翻译:反间谍软件是为了保护您的计算机免受黑客攻击。(简单句)

9.Hackers use emails to transmit malicious software to your computer.翻译:黑客利用电子邮件到您的计算机发送恶意软件。(简单句)

10.Hackers are always searching for security gaps in your system.翻译:黑客们一直在寻找您的系统安全漏洞。(简单句)

11.Being extra careful while surfing is the best way to protect your computer from hackers. Simple precautions can mean the difference between a secure and vulnerable system.翻译:在冲浪时格外小心的是最好的保护您的计算机免受黑客攻击。简单的预防措施可能意味着一个安全和易受攻击的系统之间的差异。(复合句)

12.You can also set your windows security software to check for updates automatically so you don't miss anything. ...翻译:您还可以设置您的windows 安全软件的自动检查更新所以你不要错过任何东西。...(并列句)

13. Identity theft has become the new white collar crime and it has grown tremendously.翻译:身分偷窃成为了新的白领罪行,并且它在巨大地增长。(并列句)

14.Phishing is a relatively new term to describe ploys used by criminals trying to steal identities.翻译:网络钓鱼是一个相对较新的形容犯罪分子试图盗窃身份所使用的一个名称。(简单句)

15.close to 2 million U. S. citizens had their checking accounts raided by

cyber-criminals. With the average reported loss per incident estimated at $1200, total

losses were close to $2 billion.翻译:近2百万个美国公民的支票帐户通过网络犯罪被偷袭。平均每个事件的损失估计在$1200,总损失接近于$2十亿。(复合句)

16. The term “phishing” is based on the term “fishing”.翻译"网络钓鱼"一词基于"钓鱼"一词。(简单句)

17.The key to preventing identity theft is awareness.翻译:防止身份信息窃取的关键是提高认识。(简单句)

18.A typical scam involves a telephone call with someone impersonating your credit card company and asking you to validate your social security number, date of birth, etc.翻译:典型的诈骗案涉及一个电话有人冒充您的信用卡公司,并要求您验证您的出生的社会保障号、日期、等。(并列句)

(四)翻译全文

1. 什么是电脑黑客?

计算机黑客是一种恶意行为,因此对你的计算机而言保护数据免受黑客进入是很重要的。计算机黑客进入指的是制作软件或硬件,以完成原始创建者的目的以外的目的恶意修改的过程黑客是通常专家程序员通常看到黑客作为现实生活应用他们的技能。

黑客技术已在最近一段时期成为滋扰和从黑客保护已变得更加复杂。事实上,黑客变得这样厉害,甚至令软件巨头也感到头疼。任天堂最近报道损失975 万元,微软由于隐私被暴漏五年之间失去了900 万美元。

那么,巨人是不是这些黑客的唯一目标,即使是普通个人也并不安全。危险范围小盗窃赞助的恐怖主义。这些措施包括窃取个人信息和刺探你的活动。他们能得到你的秘密,并摧毁你的信誉。这样的危险可能是无止境的。

如何保护免受黑客进入

预防胜于治疗。电脑黑客已经成为非常严重的问题。但也有一些基本方法,这通常是最好的,以保证黑客免费的系统。在这里,我将介绍一些基本技巧,以节省您的计算机和黑客窃取的数据。

使用防病毒软件

防病毒软件是您的数据和计算机防止黑客攻击的基本工具之一。防病毒软件作为保护网,以达到您的系统之前捕捉任何潜在的威胁。他们可以防止未经授权的访问到您的计算机、保护您的系统免受病毒和遮盖的入侵者寻找任何开放数据端口。小盗窃来的危险范围为资助恐怖主义。其中包括窃取个人信息和间谍活动。

如今反病毒软件是完全自动生成。去为计算机选择最佳防病毒软件时,确保您的系统至少每周扫描一次。诺顿防病毒从赛门铁克是业内的主导产品之一。Avast 是另一个大防病毒工具保护免受黑客攻击。

使用防火墙

什么是防火墙?

防火墙是一个位于保护来自其他网络的未经授权的访问的专用网络的网络网关服务器的程序设置。长期防火墙是原本打算只火墙上。

防火墙保护您的计算机免受访问不良网站和潜在的黑客。它使您的数据和信息免受有害的入侵者。防火墙,旨在防止未经授权的访问到您的网络,很像锁着的门。因此,防火墙是您免受黑客的攻击,所以别忘了要建立一个为您的系统的战略的重要工具。微软有一个内置的防火墙软件,但您也可以尝试赛门铁克防火墙。

使用反间谍软件

什么是间谍软件?

间谍软件是一个安装软件,暗中收集信息如冲浪习惯一个人的计算活动并浏览网站的自我。间谍软件是真正的黑客工具,不仅收集个人信息,而且也干扰通过安装额外的软件和重定向的 web 浏览器的用户控件。

反间谍软件是为了保护您的计算机免受黑客攻击。他们不仅保护您的计算机的检测和删除间谍软件,同时防止这些恶意程序自动安装。Spysweeper 是一个反间谍软件,保证免费间谍软件的计算机的伟大。

电子邮件安全

电子邮件是领先的黑客的工具之一。黑客利用电子邮件到您的计算机发送恶意软件。电子邮件通常很便宜,这就给黑客负载机会。防止黑客入侵的基本技巧之一,要格外小心用电子邮件。最重要的秘诀是,你应该永远不会失控真实的电子邮件地址,一个陌生人。切勿打开到达来源不明的电子邮件,并从未尝试打开电子邮件附件,如果你不知道发件人。Avira的防毒是一个有用的工具来过滤潜在的威胁您的电子邮件,以及为您的计算机提供优质保护。

软件更新

黑客们一直在寻找您的系统安全漏洞。反病毒和反间谍软件通常会随着时间的推移失去其有效性,为新的和更先进的的恶意程序被黑客创建。

重要的是在市场上的最新的安全软件,保证最大的安全威胁。确保你经常检查软件更新或自动更新您的软件。

互联网安全

在冲浪时格外小心是最好的保护您的计算机免受黑客攻击。简单的预防措施可能意味着一个安全和易受攻击的系统之间的差异。保存自己免受黑客攻击的好方法是避免访问控制的黑客网站通常致力于色情、免费下载和在线游戏。此外从未知来源下载东西时要格外小心。永远不能忽视有关站点的安全警告。其更好地只怕万一。

教育自己

对黑客的进攻时,最重要的一步是要教育自己。黑客是与发展所产生的每一个瞬间的动态主题。黑客智能和创新,你应该为它准备。

计算机是脆弱的。无论你做什么,其根本不可能做到100%保存。详细个人和信用卡信息等重要数据不应该直接保存在电脑上。密码保护是一个伟大的方式来保护这些数据。

另一个伟大的方式来保护您的计算机使用您的计算机上的密码。那么,它不能真正挽救你,如果你的电脑被盗(一台笔记本电脑的情况下),但可以节省你从未经授权的人可以达到您的计算机。

Windows 更新

微软视窗是带有保护您和您的计算机免受黑客的几乎所有工具的最佳操作系统。若要使此最大,务必保持 windows 更新。要执行此操作的简单方法是通过检查 Microsoft Windows 更新的更新。您还可以设置您的 windows 安全软件的自动检查更新所以你不要错过任何东西。...

2. 什么是网络钓鱼

身分偷窃成为了新的白领罪行,并且它在巨大地增长。窃取身分的罪犯以多种方式使用它们。其中一个最常见的伎俩是使用一个被窃取的身分打开信贷额度。然后信贷额度由窃贼耗尽,并且实际人接受票据。身分为恶意意向也被窃取,例如窃取一位军官的电子邮件证件希望对队伍执行虚拟命令。

网络钓鱼是一个相对较新的形容犯罪分子试图盗窃身份所使用的一个名称。网络钓鱼诈欺有上涨的趋势:

在2004年期间,“近2百万个美国公民的支票帐户通过网络犯罪被偷袭。平均每个事件的损失估计在$1200,总损失接近于$2十亿。网络钓鱼试图由从合法的财政机关的仿效电子邮件窃取消费者的用户名和密码网络钓鱼电子邮件的发生在过去六个月上升了4,000%”。(詹姆斯2005年,页。2)

什么是网络钓鱼视频

"网络钓鱼"一词基于"钓鱼"一词。你用钓鱼饵和钩抓鱼。如果你没有收到鱼咬钩,经常改变你的诱饵类型直到你开始钓到鱼。网络钓鱼、饵通常是看似合法的电子邮件。电子邮件通常要求银行客户验证它们的信息,但是,电子邮件重新发送给客户的虚假银行网站看上去是一个合法的银行网站(詹姆斯,2005年)。罪犯希望客户不会注意到重新发送的银行网点是虚拟的,他们将验证他们的帐户信息,也不会通知客户。有许多网络钓鱼电子邮件作为诱饵但是罪犯希望他们使用更多的诱饵,那更加大了有人相信这个骗局。

防止身份信息被窃取的关键是提高认识。金融机构通常不要求进行账户信息验证。应验证帐户验证或社会安全号码,要求的任何电子邮件。包含在电子邮件中的链接可以检查的合法性。这些链接经常去虚假网站,可以很容易由网站的链接。例如:如果你在银行

https://www.360docs.net/doc/ef19030095.html,,并且您将收到一封电子邮件,并链接将您带到

https://www.360docs.net/doc/ef19030095.html,.customer.cz,这应该引起怀疑了。不仅可以使用电子邮件、网络钓鱼诈骗,但也使用电话。典型的诈骗案涉及一个电话有人冒充您的信用卡公司,并要求您验证您的出生的社会保障号、日期、等。信用卡公司已有此信息,并不需要您对其进行验证。一个简单的防线是问对方的信用卡公司的数量及回电。

参考:詹姆斯,L.(2005)。网络钓鱼。罗克兰,MA:Syngress出版。

计算机专业英语作业及答案

计算机专业英语作业答案(供参考) 计算机专业英语作业1 第1-3章作业一.( 词汇) (一).(写出下列词组的汉语。) 1.()中央处理器 2 标题栏 3.操作系统4.个人计算机 5.菜单栏6.桌面排版 7.电子表格8.硬盘 9.数据库10.光标 (二)..(根据汉语写出相应的英语缩写。) 1.随机存储器2.只读存储器 3.传输控制协议P 4.数字视频光盘5.通用串行总线6.计算机辅助设计7.计算机辅助制造8.中央处理器 (三)..(根据汉语写出相应的英语。) 1.键盘2.鼠标3.扫描仪 4.打印机5.输入6.输出 7.显示器8.存储器9.数据库 10.操作系统11.应用软件 12.字处理器13.网络浏览器 二.(T) (F).(判断正误。) 1., . (√)

2.'s . (√) 3.: . (√) 4. a 2000 . (×) 5.( ) a . (√) 6. , a . (√) 7. , ’s . (×) 8. ’t . (×) 9. . (×) 10. . (×). 三..(将左列的词汇与右列相应的汉语匹配。) (一). 1. () a. 操作系统 2. b. 输入. 3. ( ) c. 只读存储器 4. ( ) d. 应用软件 5. e. 中央处理器 6. f. 系统软件 7. g. 硬件 8. h. 随机存储器 9. i. 内存 10. j. 输出 1.e 6. j 2.g 7.a 3.h 8. d 4.c 9. f 5.b 10. i (二) . 1. a

2. b a 3. c 4 d a 0 1 5. e a 6. f 7. g 8. h a 9. i a 1.d 6. a 2.g 7.f 3.h 8. c 4.b 9. e 5.i 四., . (从下面方框中选择合适的词或表达,以其适当的形式填空。) 1. () . , a . , . , , . , . 2. , , . , a a a , a , a , a . , , . a , , a . , 1-2-3 . a , a ( ) . 3.

计算机专业英语试题及答案

计算机专业英语试题 Ⅰ. Vocabulary(词汇)(30分) (一).Translate the following words and expressions into Chinese(写出下列词组的汉语。)(共10分,每题1分) 1. operating system 2.requirements analysis 3. network security 4. data structure 5.decision support system 6.relational database 7.software crisis 8. computer virus 9.email attachment 10.central processing unit ( CPU ) (二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。) (共10分,每题1分) 1.数据库管理系统 2.传输控制协议 3.多文档界面 4.面向对象编程 5.只读存储器 6.数字视频光盘 7.计算机辅助设计 8.结构化查询语言 9.通用串行总线 10.企业之间的电子商务交易方式 (三)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。)(10分,每空1分) 1. multimedia a. 字处理器 2. software life cycle b. 交换机 3. structured programming c. 多媒体 4. functional testing d. 局域网 5. word processor e. 结构化程序设计 6. code windows f. 软件生命周期 7. firewall g. 功能测试 8. LAN h. 代码窗口

国家开发大学计算机专业理工英语3——模拟题

国家开发大学 计算机专业理工英语3—模拟题 交际用语(单选题) 1、— Could you give me your phone number? —_______ 正确选项1.Sure. My phone number is 135—5674—5633.(V) 2、— Could you recommend some famous buildings to visit in China? —_______ 正确选项1.I highly recommend the Bird’s Nest.(V) 3、— Happy New Year to you! — ________ 正确选项1.The same to you .(V) 4、— Hello, HR Department, Mandy speaking. — Good morning._______ 正确选项1.This is Henry.(V) 5、— I heard you had attended an activity for environmental protection. Can you talk about it?

— __________ 正确选项1.Certainly, I'd like to. It is about the Earth Hour.(V) 6、— I wonder if you could help me? —__________________ 正确选项1.Certainly.(V) 7、— Smoking may result in many diseases like cancer. — _______________ 正确选项1.Oh, that is so terrible!(V) 8、— Some cars are really expensive. — _______________ 正确选项1.Certainly they are. They burn less gas.(V) 9、— What do you think of the documentary Protecting the Earth? — ________ It has attracted lots of TV audiences. 正确选项1.Pretty good .(V) 10、—What do you think of waste sorting? —_______________ 正确选项1.I think sorting is necessary.(V) 11、— What’s the weather like in your hometown?

计算机专业英语大作业

网址一:https://www.360docs.net/doc/ef19030095.html,/hub/save-computer-from-Hackers 网址二:https://www.360docs.net/doc/ef19030095.html,/hub/What-is-Phishing 姓名:** 学号:************ 分校:通州 (一)原文 1. What is Computer Hacking? Computer hacking is a malicious act, so it is important for your computer and data to protect from Hacking. Computer Hacking refers to the process of making malicious modifications to a software or hardware to accomplish an aim outside the original creator's objective. Hackers are usually expert programmers who usually see hacking as a real life application of their skills. Hacking has become a nuisance in recent times and the protection from hacking has become more complex. Infact, the hackers have become so good that even the software giants are feeling a headache. Nintendo recently reported a loss of $975 million due to privacy and Microsoft has lost an estimated $900 million in five years. Well, the Giants are not the only targets of these hackers, even common individuals are not safe. The dangers range from little thefts to sponsored terrorism. These include stealing personal information and spying your activities. They can get to your secrets and destroy your credit. The dangers are possibly endless. How to protect from Hacking Prevention is Better Than Cure. The problem of computer hacking has become really serious. But there are some basic methods which are usually the best to guarantee a Hacker-free system. Here, I am going to introduce some basic tips to save your computer and data from hackers. Using Antivirus Software Antivirus software are one of the basic tools for your data and computer to protect from hacking. Antivirus software act as a protecting net that catches any potential threat before it reaches your system. They can prevent unauthorized access to your computer, protects your system from viruses and cloaks your data ports from intruders searching for any opening. The dangers range from little thefts to sponsored terrorism. These include stealing personal information and spying your activities.

计算机专业英语

计算机专业英语 (总分:45.00,做题时间:90分钟) 一、{{B}}单项选择题{{/B}}(总题数:41,分数:45.00) 1.The Web Browser is a simple program that enables a computer to ______ and view pages on the Web. (分数:1.00) A.downfall B.downgrade C.downward D.download √ 解析:题目的大意是说:网页浏览器是一种能够使计算机下载并显示网页的简单程序。选项中提供的几个单词的拼写比较接近,只有download(下载)比较符合题意。downfall是坠落的意思,downgrade是下坡、降级的意思,downward是向下的意思。 2.E-mail is a fast, cheap and convenient way to ______ messages locally and internationally. (分数:1.00) A.give and get B.put and get C.send and receive √ D.get in and get out 解析:题目的大意是说:电子邮件是一种收发本地和全球信息的快速、廉价、方便的方式。收发电子邮件使用send and receive(发生和接收),其他三种写法不适合用在收发电子邮件中。 3.Header and footer are strings of text that are placed at the ______ of each page of a document. (分数:1.00) A.left or right B.up or down C.above or below D.top or bottom √ 解析:题目的大意是:页眉和页脚是放在文档每一页顶部和底部的字符串。在计算机屏幕或纸张等介质上,上下和左右分别使用top or bottom和left or right。up or down是向上或向下的意思,above or below 是指某物体的上面或下面。 4.It is important to have the ______ positioned correctly before you type characters. (分数:1.00) A.cursor √ B.line C.light D.dot 解析:题目的大意是:打字前将光标正确定位是很重要的。此处要使用cursor(光标)这个单词,line:线,light:光笔,dot:点,都不合适。 5.The ______ page is the introductory page of a set Web pages. (分数:1.00) A.First B.Home √ C.Head D.Host 解析:题目的大意是:主页是一组网页中的前导性页面。在互联网中,主页有固定的写法:Home page。First:第一个,Head:头部,Host:主机。

计算机专业英语试卷

计算机专业英语试卷 一、单项选择题 1、在计算机科学中,以下哪个术语指的是一种将复杂问题分解为更小、更易于处理的部分的方法? A.算法 B.编码 C.解析 D.抽象 2、以下哪个单词代表一个程序的指令序列? A.函数 B.进程 C.算法 D.变量 3、在计算机网络中,以下哪个术语表示通过特定协议在计算机之间

传输数据? A.链接 B.路由 C.数据包 D.协议 二、阅读理解题 阅读以下文章,并回答问题: 人工智能(AI)是计算机科学的一个分支,致力于研究如何使计算机能够像人类一样思考、学习和解决问题。在AI中,深度学习是一种强大的技术,它利用神经网络模型来模拟人类大脑的活动。通过大量的数据训练,深度学习模型可以识别图像、语音、文本等,并从中提取有用的信息。例如,在图像识别中,深度学习模型可以识别出图像中的物体;在语音识别中,它可以识别出说话者的声音并转化为文字;在自然语言处理中,它可以理解人类语言的含义并作出相应的回应。 4、以上文章主要介绍了什么?

A.人工智能的定义和目的 B.深度学习的定义和功能 C.计算机科学的分支和研究方向 D. AI的应用和发展趋势 41、在上述文章中,“深度学习”的作用是什么? A.模拟人类大脑的活动 B.识别并处理图像、语音和文本等有用的信息 C.研究如何使计算机像人类一样思考、学习和解决问题 D.以上都是。 三、完形填空题 阅读以下句子,并选择正确的单词完成句子: The ___________ of data is an important issue in the digital age. We need to ensure that our data is ___________ and secure. A. handling; protected

计算机专业英语试题含答案

计算机专业英语试题2 Ⅰ. Vocabulary(词汇)(30分) (一).Translate the following words and expressions into Chinese(写出下列词组的汉语。)(共10分,每题1分) 1.operating system 2.white box testing 3.hard disk 4.management information system 5.electronic commerce 6.relational database 7.software engineering 8. software maintenance 9. menu bar 10.network security (二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。) (共10分,每题1分) 1.只读存储器 2.广域网 3.传输控制协议 4.文件传送[输]协议 5.通用串行总线 6.面向对象编程 7.集成开发环境 8.结构化查询语言 9.数据库管理系统 10.开放系统互连 (三)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。)(10分,每空1分) 1. application software a. 音频 2. machine language b. 应用软件 3. structured programming c. 机器语言 4. functional testing d. 软件测试 5. memory e. 结构化程序设计 6. relational database f. 内存 7. firewall g. 功能测试 8. software testing h. 关系数据库 9. hacker i. 黑客 10. audio j. 防火墙 1. 6.

计算机专业英语习题+答案

习题+答案 2.1 Write T or F to each statement T6. An asynchronous device is a clocked device. T7. A latch is an asynchronous device, because it functions at arbitrary times. T8. The repetition of clock pulse can vary from very low rate to very high rate. T9. A synchronous device changes its state only on the arrival of a clock pulse. F10. A clock input may occur at any time. T11. The clock pulses are used to synchronize all operations of the shift register. T13. A unidirectional shift register is capable of shifting in one direction only. F14. In a shift-left register the serial input determines what goes into the leftmost position during the shift register. F15. To provide parallel transfer capability some additional input and output lines should be provided to the shift register. Choose the best answer for each of the following 1. How can the output of a logic gate be energized?C A By changing its inputs. B By remaining its inputs unchanged. C By meeting the specific input condition. D By giving a pulse. 3. A NAND gate consists of D . A an OR gate followed by an inverter B an AND gate followed by an inverter C an AN D gate followed by an OR gate D an inverter followed by an AND gate 4. Under what condition is the output of a two-input XOR gate logic-high?B A Its inputs are simultaneously at the same logic level. B Its inputs are simultaneously at opposite logic levels. C Its inputs are logic-low. D its inputs are simultaneously logic-high. 2.2 Write T or F for each statement T 1. The CPU uses the input and output units to communicate with the outside world. F2. Main memory is sometimes called external memory. F3. After execution the program and the related files of data and files of information will be retained in the main memory for later use. F4. Personal computers have not the features of the larger system.. T5. Large systems offer higher processing speeds for user and return more data than PCs. F6. CPUs all size have primary storage, arithmetic logic, and the control section.

计算机专业英语答案

计算机专业英语答案 【篇一:计算机专业英语试题及答案(b)】 the following abbreviations(写出下列缩写词的全称)(15%) wan__________________________________________________ http__________________________________________________ nt____________________________________________________ ceo__________________________________________________ dbms________________________________________________ isp___________________________________________________ xml__________________________________________________ bios_________________________________________________ it____________________________________________________二、match the following words and expressions in the left column with those similar in meaning in the right )(10%) 1. output devices a. 操作系统 2. silicon b. 扩展存储器 3. expanded memory c. 硅 4. database administratord. 输出设备 5. operating system e. 汇编语言 6. assembly language f. 数据库管理员 7. gatewayg. 数字图像处理 8. laser technologyh. 网关 9. digital image processingi. 制造过程 10.manufacturing process j. 激光技术 1. () 6. () 2. () 7. () 3. () 8. () 4. () 9. () 5. () 10.() 三、translate the following phrases into english(将下列短语翻译成

专业英语大作业翻译计算机基础知识

专业英语大作业翻译计算机基础知识 计算机基础知识是指人们需要了解和掌握的关于计算机科学和 技术的基本概念、原理和技能。在当今数字化时代,计算机基础知识对于人们来说至关重要,无论是在工作中还是日常生活中,几乎都离不开计算机的使用。 首先,了解计算机的组成是计算机基础知识的核心。计算机由硬件和软件两个部分组成。硬件包括中央处理器(CPU)、内存、存储设备、输入设备和输出设备等。软件则包括操作系统、应用软件和系统软件等。掌握计算机的组成结构可以帮助我们更好地理解计算机的工作原理和运行机制。 其次,计算机网络是计算机基础知识中的重要部分。计算机网络是通过通信设备和通信介质将多台计算机连接在一起,实现信息的交互和资源的共享。了解计算机网络的分类、拓扑结构和通信协议等内容可以帮助我们更好地理解网络的工作机制和网络安全的重要性。 另外,操作系统是计算机基础知识中的关键概念之一。操作系统是计算机的核心软件,它负责管理计算机的硬件资源、控制程序的执行和提供用户与计算机之间的接口。理解操作系统的功能和特点,以及掌握常见的操作系统如Windows和Linux的使用方法,对于提高计算机的效率和安全性至关重要。

此外,编程语言也是计算机基础知识中的重要内容。编程语言是人与计算机之间进行交流的工具,它可以用来编写计算机程序。掌握常见的编程语言如C、C++、Java和Python等,可以帮助我们实现自己的创意和想法,并解决实际问题。 除了以上几个方面,还有许多其他的计算机基础知识,如数据库管理、算法与数据结构、计算机图形学等。这些知识对于计算机专业的学生来说尤为重要,可以帮助他们建立扎实的计算机基础,并为未来的学习和工作打下坚实的基础。 总之,计算机基础知识是现代社会中不可或缺的重要知识。了解和掌握计算机的组成、网络、操作系统和编程语言等基础知识,对于人们在数字化时代中的发展和应对各种问题都至关重要。无论是计算机专业的学生还是非专业人士,都应该重视计算机基础知识的学习和应用。

计算机专业英语题库-自考本科

完型填空: Many modern operating systems consider files 1 a collection of bytes. At a higher level, where the content of the file is being 2 , these 3 digits may represent integer values or text characters, or anything else. It is 4 to the program using the file to understand the meaning and internal layout of information in the file and present it to a user as 5 meaningful information ( like text, images, sounds). At any instant 6 time, a file might have a size, normally expressed in bytes, that indicates how much storage is 7 with the file. In most modern 8 systems the size can be any whole number up to a system limit. However, the general 9 of a file does not require that its instant size has any real meaning, unless the data within the file happens to 10 to data within a pool of persistent storage. Given Words: more as associated lenght considered operating binary correspond up in definition move 1.as 2.considered 3.binary 4.up 5.more 6.in 7.associated 8.operating 9.definition 10correspond 每个阅读理解的下方都有答案大家主要看答案问的什么答案选哪个就行,到时有个印象能选出来就行! 阅读理解 A microcomputer is a desktop or notebook size computing device that uses a microprocessor as its Central Processing Unit, or CPU. Microcomputers are also called Personal Computers (PCs), home computers, small business computers, and micros. The smallest, most compact are called laptops. When they first appeared, they were considered single user devices, and they were capable of handling only four, eight, or 16 bits of information at one time. More recently the distinction between microcomputers and large, mainframe computers (as well as the smaller mainframe type systems called minicomputers) has become blurred, as newer microcomputer models have increased the speed and data handling capabilities of their CPUs into the 32 bit, or even 64 bit multiuser range. Microcomputers are designed for use in homes, schools, and office settings. Within the home, they can serve both as a tool for home management (balancing the family checkbook, structuring the family budget, indexing recipes) and as a recreational device (playing computer games, cataloging records and books) School children can use microcomputers for doing their homework, and in fact many public schools now employ the devices for programmed learning and computer literacy courses. Small businesses may purchase microcomputers for word processing, bookkeeping, and the storage and handling of mailing lists. A minicomputer is a mid-level computer built to perform complex computations

计算机专业英语期末试题及答案A

信息工程学院学院计算机专业英语课程期末考试试卷A : : button: Panel: structure: table: : 8.hypermedia: 9.information superhighway: language: :::::. : a . 数据库管理系统 b. 应用程序设计接口 c . 基本输入/输出系统 d. 数字视频光盘 e .互联网服务提供商 f . 中央处理单元

: g . 结构化查询语言: . h .直接存储器存取: i .超文本传输协议: j .万维网 For a Web user, the home page is the first Web page that is displayed after starting a Web browser like Netscape's Navigator or Microsoft's Internet Explorer. The browser is usually preset so that the home page is the first page of the browser manufacturer. However, you can set it to open to any Web site. For example, you can specify that or be your home page. You can also specify that there be no home page (a blank space will be displayed) in which case you choose the first page from your bookmark list or enter a Web address. For a Web site developer, a home page is the first page presented when a user selects a site on the World Wide Web. The usual address for a Web site is the home page address, although you can enter the address (Uniform Resource Locator) of any page and have that page sent to you. 1. Home pages for a Web user or a Web site developer have the same meanings.( ) 2. The home page displayed on a Web browser is usually preset by the browser manufacturer. ( ) 3. The home page for a Web user can be reset to any Web site you prefer. ( ) 4. You have to enter or select Web addresses every time with a blank space on your Web browser. ( ) 5. Web addresses usually lead to relative home pages. ( )

计算机专业英语作业

计算机专业英语作业: 1、请将视频“什么是电脑硬件”中所述内容用英文表示。 2、请将以下英文翻译为中文。 1)Plug and Play, sometimes, abbreviated(简略的、缩写) PnP, is a catchy(动人的、易记住的) phrase( [freiz] 短语、习语) used to describe devices(设备、装备) that work with a computer system as soon as(与……一样)they are connected(链接的、有关系的). The user does not have to manually(手动的、用手) install drivers(驱动) for the device(装置、策略) or even tell the computer that a new device has been added. Instead the computer automatically(自动的、机械的) recognizes the device, loads new drivers for the hardware if needed, and begins to work with the newly connected device(链接设备), 即插即用,缩写为PnP,这是一个容易记住的短语,它用来描述与计算机操作系统连接工作有关的设备。用户不需要为设备手动安装驱动,甚至于不需要告诉计算机已经添加了饿一个新的设备。计算机自动识别设备,如果需要为硬件加载一个新的驱动,并且开始工作在新的连接设备上。 For example, if you connect a Plug-and-Play mouse to the USB port on your computer, it will begin to work within a few seconds of being plugged(拥塞的、接通电源) in. A non plug-and-play device would require you to go through several steps of installing drivers and setting up the device before it would work. 例如,如果你在你的电脑上的USB接口连接了一个即插即用的鼠标,它开始工作时接通电源只需要几秒钟。没有一个即插即用设备要求你通过一连串的步骤来安装驱动,也不需要在工作之前安装设备。 While Plug and Play usually refers(涉及、参考、委托) to computer peripheral(外围的、次要的) devices, such as keyboards and mice, it can also be used to describe internal(内部的) hardware. For example, a video card or hard drive may be a Plug and Play device, meaning the computer will recognize it as soon as it is installed. The only difference is that internal components(组件、部件) usually require the computer to be turned off when they are installed, while external(外部的、表面的) devices can typically( ['tipikəli]代表性的、特色的) be installed while the computer is running. 即插即用设备通常涉及(指)计算机周边的设备,如键盘和鼠标,它也可以用于描述计算机内部的硬件。例如,一个视频卡、硬盘可能也是一种即插即用设备,这意味着计算机将会迅速识别出他们并安装。唯一的不同就是:内部的组件通常需要在它们(即插即用设备)安装时关闭计算机,而外部设备通常可以在计算机运行时进行安装。 2)What are some examples of computer peripheral([pə'rifərəl] 外围的、次要的) devices? 问:有哪些关于计算机外围设备的例子? Answer: ⏹ A computer peripheral, or peripheral device, is an external(内部的) object that provides input and output for the computer. 一个电脑外围,或者外围设备,是一种提供了输入输出的计算机内部对象 ⏹Some common input devices include: keyboard, mouse, joystick(操纵杆、控制杆), pen tablet(写字板), MIDI keyboard (musical instrument(仪器、工具) digital(数字的、手指的) interface数码音响), scanner, digital camera, video camera, microphone(麦克风).

相关主题
相关文档
最新文档