当前位置:文档之家› 计算机英语第二版清华第8单元

计算机英语第二版清华第8单元

计算机英语第二版清华第8单元
计算机英语第二版清华第8单元

Computer Science in English

Designed and Programmed By

Jiang Tongqiang

Miao Tianshun

Teaching Assisted Courseware

1

Computer Science in English

Chapter 8

An Introduction to Database Systems

2

Chapter 8

I. Pre-reading Questions

1. What are the major disadvantages in a file-processing system?

(1) Data redundancy and inconsistency.

(2) Difficulty in accessing data.

(3) Data isolation.

(4) Integrity problems.

(5) Atomicity problems.

(6) Concurrent-access anomalies.

(7) Security problems.

3

Chapter 8

I. Pre-reading Questions

2. What are the two levels of data independence? Describe each of them.

Reference Key:

There are two levels of data independence:

Physical data independence is the ability to modify the physical schema without causing application programs to be rewritten. Modifications at the physical level are occasionally necessary to improve performance.

Logical data independence is the ability to modify the logical schema without causing application programs to be rewritten. Modifications at the logical level are necessary whenever the logical structure of the database is altered (for example, when money-market accounts are added to a banking system).

4

Chapter 8

I. Pre-reading Questions

3. What are the functions of the structured query language (SQL)?

Reference Key:

(1) Data-definition language (DDL).

(2) Interactive data-manipulation language (DML).

(3) Embedded DML.

(4) View definition.

(5) Authorization.

(6) Integrity.

(7) Transaction control.

5

限制性定语从句that is both convenient and efficient to use in retrieving and storing database information,修饰an environment。其中介词结构in retrieving and storing database information 作状语,表示范围。retrieve恢复,补救。it作形式主句,真正的主语是后面的不定式。1. The primary goal of a DBMS is to provide an environment that is both convenient and efficient to use in retrieving and storing database information.

II. Grammatical Notes to the Text

6

once a failure has occurred and has been detected为由once引导的条件状语从句,插到that 和其引导的宾语从句之间。限制性定语从句that existed prior to the failure 修饰the consistent state;the failure 与a failure 指的是同一件事。prior to:在…之前。

2. In many applications, it is crucial to ensure that, once a failure has occurred and has been detected, the data are restored to the consistent state that existed prior to the failure.

II. Grammatical Notes to the Text

7

both 作主语,指代上一句is the concept of data independence 和the concept of abstract data types。不定式结构to allow users to concentrate on the general structure rather than on low-level implementation details作状语表目的。动词短语concentrate on 带了两个并列的宾语,the general structure与low-level implementation details 由rather than 连接起来。

3. Both hide implementation details from the users, to allow users to concentrate on the general structure, rather than on low-level implementation details.

II. Grammatical Notes to the Text

8

限制性定语that consists of collection of basic objects 修饰a perception of a real world。过去分词短语called entities 作a collection of basic objects is的定语。

4. The entity-relationship (E-R) data model is based on a perception of a real world that consists of a collection of basic objects, called entities, and of relationships among these objects.

II. Grammatical Notes to the Text

9

限制性定语从句to which the contents of a database must conform 修饰constraints。conform to:与…一致,符合。

5. In addition to entities and relationships, the E-R model represents certain constraints to which the contents of a database must conform.

II. Grammatical Notes to the Text

10

该句为祈使句。As an illustration 作状语,表示方式。现在分词短语consisting of customers and of the accounts that these customers have 作定语,修饰a database banking system。其中,非限制性定语从句that these customer have 修饰the accounts。

6. As an illustration, consider part of a database banking system consisting of customers and of the accounts that these customers have.

II. Grammatical Notes to the Text

11

denote:指示,表示…的意义。限制性定语从句that is chosen by the database designer as the

principal means of identifying records within a relation 修饰a candidate key。

7. We shall use the term primary key to denote a candidate key that is chosen by the database designer as the principal means of identifying records within a relation.

II. Grammatical Notes to the Text

12

带有特殊疑问词的不定式结构how to get the data 作动词specify的宾语。限制性定语从句that is not as efficient as that produced by procedural languages 修饰code。其中,第二个that 指的是code 后面的过去分词作主语。

8. However, since a user does not have to specify how to get the data, these languages may generate code that is not as efficient as that produced by procedural languages.

II. Grammatical Notes to the Text

13

介词短语by writing a set of definitions 作状语,表示方式。限制性定语从句that is translated by the DDL compiler to a set of tables 修饰set of definitions,而限制性定语从句that is stored permanently in the data dictionary 则修饰a set of tables。

9. The DBA creates the original database schema by writing a set of definitions that is translated by the DDL compiler to a set of tables that is stored permanently in the data dictionary.

II. Grammatical Notes to the Text

14

either to the data base schema or to the description of the physical storage organization 作状语对象。介词结构by writing a set of definitions 作状语,表示方式,其中a set of definition 后接一个限制性定语从句。

不定式结构to generate modifications to the appropriate internal system tables 为状语。

10. Programmers accomplish the relatively rare modifications either to the database schema or to the description of the physical storage organization by writing a set of definitions that is used by either the DDL compiler or the data-storage and data-definition-language compiler to generate modifications to the appropriate internal system tables

II. Grammatical Notes to the Text

15

限制性定语从句that is consulted by the database system 修饰a special system structure。whenever access to the data is attempted in the system 为让步状语从句。

11. The authorization information is kept in a special system structure that is consulted by the database system whenever access to the data is attempted in the system.

II. Grammatical Notes to the Text

16

interrelate [7intE(:)ri5leit] v. (使)相互关连

provision [prE5viVEn] n. 供应,预备

manipulation [mE7nipju5leiFEn] n. 处理, 操作

crash [krAF] n. 碰撞, 崩溃

unauthorized [5Qn5C:WEraizd] a. 未被授权的, 未经认可的

anomalous [E5nCmElEs] adj. 不规则的, 反常的

advent [5Advent] n. 到来;来临

redundancy [ri5dQndEnsi] n. 冗余

inconsistency [9inkEn`sistEnsi] n. 矛盾

duplicate [5dju:plikeit] adj. 复制的,两重的isolation [7aisEu5leiFEn] n. 隔绝, 孤立, 隔离III. Words Bank to the Text

17

integrity [in5te^riti] n. 完整

constraint [kEn5streint] n. 约束, 强制

atomicity [7AtE5misiti] n. 原子数

crucial [5kru:F(E)l] adj. 极重要的

anomaly [E5nRmEli] n. 不规则,异常,反常respectively [ri5spektivli] adv. 分别地, 各个地withdrawal [wiT5drC:El] n. 收回,撤回supervision [7sju:pE5viVEn] n. 监督, 管理payroll [5peirEul] n. 薪水册

distinguishable [dis5tiN^wiFEbl] adj. 可区别的abstraction [Ab5strAkFEn] n. 提取

III. Words Bank to the Text

18

distinction [dis5tiNkFEn] n. 区别, 差别

teller [5telE(r)] n. (银行)出纳员

schema [5ski:mE] n. 计划,方案

intermediate [7intE5mi:djEt] adj. 中间的n. 媒介invoke [in5vEuk] v. 调用

balance [5bAlEns] n. 结余, 余额

relational [ri5leiFEnEl] adj. 有联系的, 有关系的extraneous [eks5treinjEs] adj. 无关系的, 外来的remedy [5remidi] vt. 补救, 矫正

disallow [disE5laJ] vt. 不准许,禁止transaction [trAn5zAkFEn] n.交易, 事务

III. Words Bank to the Text

19

IV. Exercises

Comprehension

Filling Blanks

Vocabulary

True or False

Matching Terms

Summary

Cloze (Summarizing the Text)

Translating Sentences

Collocation

Answering Questions

Selecting Words

Conceptual Phrases

Translation

20

1. ________ software allows you to create and edit documents.

2. ________ is a activity of moving quickly upward or downward through the text or other screen display.

3. The software which is the layer of software closest to the user is ________ .

1. data model

2. Database System (DBS)

3. database administrator (DBA)

I. Fill in the following blanks.

21

4. The collection of information stored in the database at a particular moment is called an __________ of the database.

5. The ability to modify a schema definition in one level without affecting a schema definition in the next higher level is called data independence. There are two levels of data independence, they are: and ___________.

4.instance

5. physical data independence, logical data independence

I. Fill in the following blanks.

22

1. The primary goal of a DBMS is to provide an environment that is both convenient and efficient to use in retrieving and storing database information.

2. Ensuring backup and recovery of a database is not one of the functions of a database administrator.

3. The use of key fields makes it easier to locate a record in a database.

4. Physical data independence is more difficult to achieve than logical data independence.

5. Data redundancy may lead to higher storage and access cost. In addition, it may lead to data inconsistency.

II. True or False.

1.T

2. F

3. T

4. F

5. T

23

(A)data dictionary (B) data independence (C) data model

(D) database management system (E) data-manipulation language (DML)

III. Matching the terms.

_____ A collection of interrelated files and a set of programs that allow users to access and modify these files.

A collection of conceptual tools for describing data, data relationship, data semantics, and consistency constraints.

The ability to modify a schema definition in one level without affecting a schema definition in the next higher level.

A file that contains metadata—— that is, data about data.

A language that enables users to access or manipulate data as organized by the appropriate data model.

1.D

2. C

3. B

4. A

5. E

24

1. Physical level

2. Logical level

3. View level

IV. List three levels of data abstraction.

25

V. Fill in the blanks with the words given below. Change the form where necessary.

1. His clever of the stock markets makes him lots of money.

manipulation

26

V. Fill in the blanks with the words given below. Change the form where necessary.

2. Thousands of bank employees are facing as their employers cut costs.

redundancy

27

V. Fill in the blanks with the words given below. Change the form where necessary.

3. Scientists hope the work done in collaboration with other researchers may be ________ elsewhere.

duplicated

28

V. Fill in the blanks with the words given below. Change the form where necessary.

4. Separatist movements are a threat to the of the nation.

integrity

29

V. Fill in the blanks with the words given below. Change the form where necessary.

5. There are many different kinds of natural to help overcome winter infections.

remedies

30

V. Fill in the blanks with the words given below. Change the form where necessary.

6. I did not yet make a between the pleasures of reading and of writing fiction.

distinction

31

V. Fill in the blanks with the words given below. Change the form where necessary.

7. If you experience any unusual symptoms after ________ of the treatment then contact your doctor.

withdrawal

32

V. Fill in the blanks with the words given below. Change the form where necessary.

8. There are no ________ on your choice of subject for the essay.

constraints

33

V. Look at the following sentence taken from your reading passage. Just think about what else you can “invoke” and fill in the sentences with the right words.

e.g. The only way in which one object can access the data of another object is by invoking a method of that other object.

34

2. In political matters George Washington went out of his way to avoid invoking the au______ of Christ.

thority

1. The judge invoked an international la______ that protects refugees.

w

35

4. The great magicians of old always invoked their go______ with sacrifice.

ds

3. “Appalachian Spring” by Aaron Copland invoked the at__________ of the wide ope n spaces of the grassland.

mosphere

36

6. The ar_______ he had invoked when he rejected our bail motion.

gument

5. He invoked the na______ of Freud in support of his argument.

ms

37

VII. Choose the best one of the four answers given to fill in each blank.

Database systems are designed to manage large bodies of information. The management of data involves both the definition of structures for the storage of information 1 the provision of mechanisms for the manipulation of information. In 2 , the database system must provide for the safety of the information stored, despite system crashes or attempts at 3 access. The importance of information in most organizations, 4 determines the value of the database, has led to the development of a large body of concepts and techniques for the efficient management of data.

38

The four most 5 types of organizations are the hierarchical, network, relational and object models. The 6 structure depends on the natural organization of the application's data, and 7 the application’s requirements which include transaction rate (speed), reliability, maintainability, scalability, and cost.

39

The strengths of relational DBMS are great flexibility in 8 to ad hoc queries, power to combine information from different sources, simplicity of design and maintenance, and the 9 to add new data and records without disturbing existing programs and applications. However, these systems are 10 slower because they typically require

many accesses to the data stored on disk to carry out the select, join, and project commands.

40

1. A. or B. as well as C. and D. yet

2. A. add B. addition C. adding D. additive

3. A. illegal B. unauthorized C. legal D. authorized

4. A. which B. what C. how D. which

5. A. common B. good C. better D. best

6. A. good B. optimal C. option D. optional

7. A. in B. about C. on D. with

8. A. about B. with C. regard D. over

9. A. able B. capacity C. capability D. ability

10. A. how B. what C. somehow D. somewhat

1. A

2. B

3. A

4. B

5. C

6. C

7. A

8. D

9. D 10.C

41

1. Since the files and application programs are created by different programmers over a long period, the various files are likely to have different formats and the programs may be written in several programming languages.

1. 由于文件和程序是由不同的程序员创建的,因此不同的文件可能采用不同的格式,不同的程序也可能是采用不同的计算机语言来编写。

VIII. Translate the following into English.

42

2. In what follows, we shall see the concepts and algorithms that have been developed for database systems to solve the problems mentioned.

2. 接下来看一看数据库系统为了解决上述问题而提出的概念和算法。

VIII. Translate the following into English.

43

3. Despite the use of simpler structures at the logical level, some complexity remains, because of the large size of the database.

3. 尽管在逻辑层使用了比较简单的结构,但由于数据库的规模巨大,所以仍存在一定程度的复杂性。

VIII. Translate the following into English.

44

4. Returning to the customer-record type definition, note that, in declaring the type customer, we have not declared any variables.

4. 再回过头来看一下customer记录类型的定义。注意,我们只是定义了customer类型而没有定义任何变量。

VIII. Translate the following into English.

45

5. Ensuring the atomicity and durability properties is the responsibility of the database system itself——specifically, of the transaction-management component.

5. 原子性和持久性的保证则是数据库系统自身的任务,更确切一些,是事务管理器的任务。End

VIII. Translate the following into English.

46

计算机英语第三版课文翻译

第一单元:计算机与计算机科学 课文A:计算机概览 一、引言 计算机是一种电子设备,它能接收一套指令或一个程序,然后通过对数字数据进行运算 或对其他形式的信息进行处理来执行该程序。 要不是由于计算机的发展,现代的高科技世界是不可能产生的。不同类型和大小的计算 机在整个社会被用于存储和处理各种数据,从保密政府文件、银行交易到私人家庭账目。计 算机通过自动化技术开辟了制造业的新纪元,而且它们也增强了现代通信系统的性能。在几 乎每一个研究和应用技术领域,从构建宇宙模型到产生明天的气象报告,计算机都是必要的 工具,并且它们的应用本身就开辟了人们推测的新领域。数据库服务和计算机网络使各种各 样的信息源可供使用。同样的先进技术也使侵犯个人隐私和商业秘密成为可能。计算机犯罪 已经成为作为现代技术代价组成部分的许多风险之一。 二、历史 第一台加法机是法国科学家、数学家和哲学家布莱斯.帕斯卡于1642年设计的,它是数 字计算机的先驱。这个装置使用了一系列带有10个齿的轮子,每个齿代表从0到9的一个数字。轮子互相连接,从而通过按照正确的齿数向前转动轮子,就可以将数字彼此相加。17世纪70 年代,德国哲学家和数学家戈特弗里德.威廉.莱布尼兹对这台机器进行了改良,设计了一台 也能做乘法的机器。 法国发明家约瑟夫―玛丽.雅卡尔,在设计自动织机时,使用了穿孔的薄木板来控制复 杂图案的编织。在19世纪80年代期间,美国统计学家赫尔曼.何勒里斯,想出了使用类似雅 卡尔的木板那样的穿孔卡片来处理数据的主意。通过使用一种将穿孔卡片从电触点上移过的 系统,他得以为1890年的美国人口普查汇编统计信息。 1、分析机 也是在19世纪,英国数学家和发明家查尔斯.巴比奇,提出了现代数字计算机的原理。 他构想出旨在处理复杂数学题的若干机器,如差分机。许多历史学家认为,巴比奇及其合伙 人,数学家奥古斯塔.埃达.拜伦,是现代数字计算机的真正先驱。巴比奇的设计之一,分析 机,具有现代计算机的许多特征。它有一个以一叠穿孔卡片的形式存在的输入流、一个保存 数据的“仓库”、一个进行算术运算的“工厂”和一个产生永久性纪录的打印机。巴比奇未 能将这个想法付诸实践,尽管在那个时代它在技术上很可能是可行的。 2、早期的计算机 模拟计算机是19世纪末开始制造的。早期型号是靠转动的轴和齿轮来进行计算的。用任 何其他方法都难以计算的方程近似数值,可以用这样的机器来求得。开尔文勋爵制造了一台 机械潮汐预报器,这实际上就是一台专用模拟计算机。第一次和第二次世界大战期间,机械 模拟计算系统,以及后来的电动模拟计算系统,在潜艇上被用作鱼雷航线预测器,在飞机上 被用作轰炸瞄准具的控制器。有人还设计了另一个系统,用于预测密西西比河流域春天的洪 水。 3、电子计算机 第二次世界大战期间,以伦敦北面的布莱切利公园为工作地点的一组科学家和数学家, 制造了最早的全电子数字计算机之一:“巨人”。到1943年12月,这个包含了1500个真空管 的“巨人”开始运转了。它被以艾伦.图灵为首的小组用于破译德国用恩尼格码加密的无线 电报,他们的尝试大部分是成功的。 除此而外,在美国,约翰.阿塔纳索夫和克利福德.贝里早在1939年就在艾奥瓦州立学院

计算机专业英语教程(第四版)习题答案

计算机专业英语教程(第四版)习题答案
计算机专业英语(第四版)课后习题答案 Unit 1 [Ex 1] Fb5E2RGbCAP [Ex 2] 1. input, storage, processing, and output 2. power; speed; 1. F 2. T 3. T 4. F 5. T 6. T 7. T 8. T 9. T 10.
memoryp1EanqFDPw 3. central processing unit memoryDXDiTa9E3d 5. keyboard; [Ex 3] B. A. central processing unit; 1. F 2. D 2. monitor 3. G 4. C 5. B main memory; 6. A 7. E monitorRTCrpUDGiT 8. H5PCzVD7HxA 4. internal; primary;
1. user
3. data
4. keyboard
5. data processingjLBHrnAILg
6. information [Ex 4] instructions
7. computer
8. memory 3. manipulates 4.
1. input device 2. screen, screen 5. retrievexHAQX74J0X 8. Function
6. code 7. hard copy
[Ex. 5] 新处理器开始 IT 技术的新时代 New Processors Open New Era of IT Technologies Last week, Intel introduced to the public in Russia and other CIS countries a family of processors Intel Xeon E5-2600. They are more powerful and reliable and, importantly, are very economical in terms of energy consumption. Their
1 / 30

计算机专业英语教程(第四版)习题答案解析

计算机专业英语(第四版)课后习题答案 Unit 1 [Ex 1] 1. F 2. T 3. T 4. F 5. T 6. T 7. T 8. T 9. T 10. F [Ex 2] 1. input, storage, processing, and output 2. power; speed; memory 3. central processing unit 4. internal; primary; memory 5. keyboard; central processing unit; main memory; monitor [Ex 3] A. 1. F 2. D 3. G 4. C 5. B 6. A 7. E 8. H B. 1. user 2. monitor 3. data 4. keyboard 5. data processing 6. information 7. computer 8. memory [Ex 4] 1. input device 2. screen, screen 3. manipulates 4. instructions 5. retrieve 6. code 7. hard copy 8. Function [Ex. 5] 新处理器开始IT技术的新时代 New Processors Open New Era of IT Technologies Last week, Intel introduced to the public in Russia and other CIS countries a family of processors Intel Xeon E5-2600. They are more powerful and reliable and, importantly, are very economical in terms of energy consumption. Their presence opens a new era in the field of IT technologies and means that the cloud technology is getting closer. These processors are primarily designed for servers, data centers (DPC) and supercomputers. The emergence of this class of devices is not accidental. According to the regional director of Intel in Russia and other CIS states Dmitri Konash who spoke at the event, the market of IT-technology is developing so rapidly that, according to forecasts, by 2015 there will be 15 billion devices connected to the Internet, and over 3 billion of active users. 上周,英特尔公司向俄罗斯和其它独联体国家的公众推出了英特尔Xeon E5-2600系列处理器,它们更加强大可靠,尤其是在能量消耗方面更加经济实惠。它们的问世意味着IT技术领域开始了一个新时代,标志着云技术距离我们越来越近。 这些处理器主要是为服务器、数字处理中心和超级计算机设计的。这种处理器的出现并非偶然。根据英特尔公司俄罗斯和其他独联体地区负责人Dmitri Konash就此事发表的看法,IT技术市场的发展速度极快,根据预测,到2015年与英特网连接的设施将有150亿,用户超过30亿。 [Ex 6] 1. T 2. T 3. F 4. F 5. T 6. F 7. T 8. F Unit 2 [Ex 1] 1. T 2. F 3. T 4. F 5. T 6. T 7. T 8. F [Ex 2] 1. sizes, shapes, processing capabilities

计算机专业英语的课文与翻译

Unit 8 Computer Networking Text 1 Data Communications The end equipment can be computers, printers, keyboards, CRTs, and so on.They are either generates the digital information for transmission or uses the received digital data. This equipment generally operates digital information internally in word units. DTE is data terminal equipment. A station controller (STACO)is the corresponding unit at the secondaries. At one time, the DTE was the last piece of equipment that belonged to the subscriber in a data link system. Between the DTEs, first is the modem, and then is the communications equipment. The communication equipment is owned and maintained by Telco. Data communications equipment (DCE) accepts the serial data stream from the DTE. And DCE converts it to some form of analog signal suitable for transmission on voice-grade lines. At the receive end, the DCE performs the reverse function. It converts the received analog signal to a serial digital data stream. The simplest form of DCE is a modem (modulator/demodulator) or data set. At the transmit end, the modem can be considered a form of digital-to-analog converter.While at the receive end, it can be considered a form of analog-to-digital converter. 参考译文 数据通信 终端设备可以是计算机、打印机、键盘、CRT等。它们可以生成要发送的数字信息,也可以使用所接收的数字数据。这种设备通常在内部以字为单位处理数字信息。 DTE一般称为数据终端设备。辅助设备一方的相应设备是工作站控制器(STACO)。同时,DTE也是数据链路系统中属于用户端的最后一个设备。在两个DTE之间,先是调制解调器,接着是属于Telco电话公司维护的通信设备。数据通信设备(DCE)从DTE接收串行数据流,并将其转换成适合于在语音线路上发送的某种模拟信号形式。在接收端,DCE完成相反的功能,把接收到的模拟信号转换成串行数字数据流。最简单的DCE是调制解调器或数据传送机。在发送端,调制解调器可以视为一种数/模转换器,而在接收端则可视为一种模/数转换器。 Text 2 Architecture of Computer Networks Computer network is a complex unit, it consists of two or more connected computing units. It is used for the purpose of data communication and resource sharing. Design of a network and its logical structure should comply with a set of design principles. They include: the organization of functions, the description of data formats and procedure. In the following two sections we will discuss two important network architectures, the OSI reference model and the TCP/IP reference model. (1)the OSI reference model The OSI (open systems interconnection) model was created by the ISO. This model is a foundation for comparing protocols; However, more protocols deviate from the rules set up by the OSI model. The OSI model has seven layers. Note that the OSI model itself is not a network architecture.

计算机英语答案(第二版)刘艺 王春生(编)

练习答案 PART ONE Computer Basics Unit 1 My Computer Section A I.Fill in the blanks with the information given in the text: 1.Charles Babbage; Augusta Ada Byron 2.input; output 3.VLSI 4.workstations; mainframes 5.vacuum; transistors 6.instructions; software 7.digit; eight; byte 8.microminiaturization; chip II.Translate the following terms or phrases from English into Chinese and vice versa: 1.artificial intelligence 人工智能 2.paper-tape reader 纸空阅读机 3.optical computer 光学计算机 4.neural network 神经网络 5.instruction set 指令集 6.parallel processing 平行处理 7.difference engine 差分机 8.versatile logical element 通用逻辑器件 9.silicon substrate 硅基 10.vacuum tube 真空管(电子管) 11.t he storage and handling of data 数据的存储与处理 12.very large-scale integrated circuit 超大规模集成电路 13.central processing unit 中央处理器 14.personal computer 个人计算机 15.analogue computer 模拟计算机 16.digital computer 数字计算机 17.general-purpose computer 通用计算机 18.processor chip 处理器芯片 19.operating instructions 操作指令 20.input device 输入设备 III.Fill in each of the blanks with one of the words given in the following list, making changes if necessary: We can define a computer as a device that accepts input, processes data, stores data, and produces output. According to the mode of processing, computers are either analog or digital. They can be classified as mainframes, minicomputers, workstations, or microcomputers. All else (for example, the age of the machine) being equal, this categorization provides some indication of the computer’s speed, size, cost, and abilities.

大学实用计算机英语教程第2版翻译机工版9_中文-1-1

第9单元电子商务 第一部分听力和对话 对话:使用在线支付服务保护消费者的隐私 (Henry非常兴奋地在一家网上书店中发现了自己期待已久的图书,但是当得知系统要 求通过账号支付时,他犹豫了。) Henry: 最近互联网上信用卡账号的公然欺骗无疑为我们敲响了警钟。在进行在线交易时,我们并不知道要把自己的信用卡账号告诉谁。 Mark: 也许你可以使用第三方支付服务来保证在线支付更简单、更安全。 Henry: 什么是第三方支付服务? Sophie: 简单地说,在使用第三方支付服务时,你可以把自己的资金转移到一个在线账号中,然后从那个账号中进行支付。这样就不用把自己的真实信用卡或银号账户信息暴露在网络上了。 Henry: 这种方法听起来更安全。有哪些第三方支付服务可以方便地使用? Mark:在美国最受欢迎的服务是eBay公司掌控的PayPal,但也有一些其他的服务,如https://www.doczj.com/doc/1d13549019.html, Payment等。以最简单的支付为例,例如在线拍卖或简单的网站销售,销售商只需要向买家提供他们的E-mail地址,而买家向销售商的PayPal账号进行适当的支付。Henry: 我明白了。 Sophie: 做出选择之后,建议你留意选择更加安全服务的一些细节。 Henry: 什么是更加安全服务的一些细节呢? Sophie: 首先,阅读隐私政策,并确保自己同意其中的条款。如果不同意,可以继续选择其他的安全服务。此外,确认网站符合权威部门规定的特定的标准(查验同意的盖章)。这些的确都是非常重要但是有时被用户忽略的步骤。 Mark: 当使用第三方支付服务时,Henry,请记住千万不要回复来自第三方支付服务机构发送的要求确认如密码或其他私人身份识别信息等与账号细节相关的电子邮件。这些邮件很可能是身份盗窃骗局,如网络钓鱼。 Henry: 那么,怎样才能更安全地确认或处理我的账号细节呢? Sophie: 如果需要确认或更新账号信息或者修改密码,我建议你可通过个人书签或者在浏览器中直接输入支付服务网站的URL来访问相应的网站。 Henry: 如何进一步确认卖家能够提供有效的支付服务? Mark: 你可以通过查看卖家在几个月或更长的时间内是否为支付服务机构的有效成员来确定。有些网站还允许用户查看卖家的评价,虽然这些评价并不能作为保证,但是却是非常有用的信息。 Sophie: 切记,Henry,不要用自己的账号把资金转移到一个你不认识的人的账号里。这可能是一种高级的资金诈骗。还有,当你要购买一些诸如珠宝或者计算机等昂贵的物品时,尤其是在节假日或者商铺中售出的物品时,需要多加小心。 Henry: 好的。现在我对进行安全在线支付更加有信心了。非常感谢你们的见议。 练习

计算机专业英语全部答案(第三版)

计算机专业英语全部答案(第三版)

Unit1 EX1 1 F 2 T 3 T 4 F 5 T 6 F 7 T 8 T 9 T 10F EX2 Input hardware, storage hardware, processing hardware, output hardware power, speed, memory central processing unit internal, primary, memory keyboard, central processing unit, main memory, monitor EX3 PARTA 1 F 2 D 3 G 4 C 5 B 6 A 7 E 8 H EX3 PART B 1 F 2 E 3 G 4 B 5 A 6 C 7D 8 H EX4 1 input device 2 screen 3 manipulates 4 instructions 5 retrieve 6 codes 7 hardcopy 8 function EX5 1 T 2 T 3 F 4 F 5 T 6 F 7 T 8 T

UNIT2 EX1 1 T 2 F 3 T 4 F 5 T 6 F 7 T 8 F EX2 1 sizes, shapes, processing capabilities 2 supercomputers, mainframe computers, minicomputers, microcomputers 3 mainframe computer 4 microcomputer, storage locations 5 portables, laptop computers, desktop workstations 6 semiconductor 7 CPU, memory, storage, devices, processing, users 8 microprocessor chip EX3 PARTA 1 C 2 A 3 H 4 I 5 E 6 F 7 G 8 J EX3 PARTB 1 capacity 2 device 3 laptop computer 4 Portable computers 5 Silicon 6 semiconductor 7 workstation 8 Voltage, voltage 9 RAM 10ROM EX4 1 portable 2 access 3 main memory

计算机专业英语考试试题及答案

计算机专业英语考试试题及答案 一、判断1.(√)The cpu and memory are located on a special circuit beard in the system unit called the montherbocrd2.(√)the main difference between a supercomputer and a mainframe is that supercomputers are designed to execute a few programs as quickly as possible,whereas mainframes are designedto handle many programs running at the same(but at a slower pace)3.(×)Being computer fluent means that you should be able to build a computer yourself.4.(√)Embedded computers are selfcontained computer devices that have therv own programming and do not receive input5.(√)Currently,the performance of tasks by robot is based on preprinted algorithms1.(×)A web browser is a special device that is installed in your computer that allows it to communicate with devices on a network2.(√)data can be a number a word a picture,or a sound3.(√)strictly defined,a computer is a data processing device4.(√)one of the benefits of becoming computer fluent is being a savvy computer user and consumer and knowing how to avoid viruses the programs that pose treats to computer security 。 5(√)trend-spotting programs,developed for business,have been used to predict criminal activity二.写出中文 1.virtual function虚拟函数2.pointer 指针3.cursor 光标4.package 包裹 5. Boot 引导,自举6 TCP/IP 传输攻之协议/互联网协议7 DNS 域名服务8.HTTP 超文本传

大学实用计算机英语教程翻译-吕云翔-Unit 5

Unit 5 Section A Software Design (软件设计) Design is defined in [IEEE610.12-90] as both “the process of defining the architecture, components, interfaces, and other characteristics of a system or component ” and “the result of that process.” Viewed as a process, software design is the software engineering life cycle activity in which software requirements are analyzed in order to produce a description of the software ’s internal structure that will serve as the basis for its construction. More precisely, a software design (the result) must describe the software architecture -- that is how software is decomposed and organized into components -- and the interfaces between those components. It must also describe the components at a level of detail that enable their construction. Software design plays an important role in developing software: it allows software engineers to produce various models that form a kind of blueprint of the solution to be implemented. We can analyze and evaluate these models to determine whether or not they will allow us to fulfill the various requirements. We can also examine and evaluate various alternative solutions and trade-offs . Finally, we can use the resulting models to plan the subsequent development activities, in addition to using them as input and the starting point of construction and testing. In a standard listing of software life cycle processed such as IEEE/EIA 12207 Software Life Cycle Processes [IEEE 12207.0-96], software design consists of two activities that fit between software requirements analysis and software construction: Software architectural design (sometimes called top level design): describing software ’s top-level structure and organization and identifying the various components. Software detailed design: describing each component sufficiently to allow for its construction.

《计算机英语(第3版)》练习参考答案(5-8)

Unit Five: Software Process Unit Five/Section A I. Fill in the blanks with the information given in the text: 1. off-the-shelf 1 2. exclusive 2 3. cascade 3 4. requirements; integration 4 5. throwaway 5 6. immediate; stable 67. reuse-oriented; framework 78. software; compromises II. Translate the following terms or phrases from English into Chinese and vice versa: 1 1. system specification 系统规格说明 2 2. unit testing 单位(或单元、部件)测试 3 3. software life cycle 软件生命周期(或生存周期) 4 4. system validation testing 系统验证测试 5 5. evolutionary development process 演化开发过程 6 6. simple linear model 简单线性模型 77. program unit 程序单元 88. throwaway prototype 抛弃式原型 99. text formatting 正文格式编排,文本格式化 1010. system evolution 系统演变 1111. 系统设计范例system design paradigm 1212. 需求分析与定义requirements analysis and definition 1313. 探索式编程方法exploratory programming approach 1414. 系统文件编制system documentation 1515. 瀑布模型waterfall model 1616. 系统集成system integration 1717. 商用现成软件commercial off-the-shelf ( 或COTS) software 1818. 基于组件的软件工程component-based software engineering (CBSE) 1919. 软件维护工具software maintenance tool 2020. 软件复用software reuse III. Fill in each of the blanks with one of the words given in the following list, making changes if necessary: There are three different types of software maintenance. Firstly, there is maintenance to repair software faults. Coding errors are usually relatively cheap to correct; design errors are more expensive as they may involve rewriting several program components. Requirements errors are the most expensive to repair because of the extensive system redesign that may be necessary. Secondly, there is maintenance to adapt the software to a different operating environment. This type of

最新计算机专业英语试题及答案(B)

一、Give out the full names for the following abbreviations(写出下列缩写词的全称)(15%) WAN__________________________________________________ HTTP__________________________________________________ NT____________________________________________________ CEO__________________________________________________ DBMS________________________________________________ ISP___________________________________________________ XML__________________________________________________ BIOS_________________________________________________ IT____________________________________________________ WWW_______________________________________________ 二、Match the following words and expressions in the left column with those similar in meaning in the right )(10%) 1. output devices a. 操作系统 2. silicon b. 扩展存储器 3. expanded memory c. 硅 4. database administrator d. 输出设备 5. operating system e. 汇编语言 6. assembly language f. 数据库管理员 7. gateway g. 数字图像处理 8. laser technology h. 网关 9. digital image processing i. 制造过程 10.manufacturing process j. 激光技术 1. ( ) 6. ( ) 2. ( ) 7. ( ) 3. ( ) 8. ( )

计算机英语_学生用书(第二版)姜同强_翻译

翻译:计算机英语(第二版)姜同强——第一章 第1 章计算机系统概述 数字计算机也称为电子计算机或计算机.它无处不在.很难发现有哪个领域没有使用计算机.在本章中.我们将介绍数字计算机、数据类型、计算机的发展和计算机分类, 1 . 1 数字计算机 数字计算机是处理各种计算任务的数字系统.“数字”的意思是计算机中的信息可由具有部分离散值的变量来表示,这些离散值的内部处理是由具有部分离散状态的部件完成的.例如.十进制数字O , l , 2 ,… 9 .即提供了10 个离散值。第一台电子数字计算机产生于20 世纪40年代末,它主要用于数值计算,那时的离散元素即为数字.为了进行数值计算而产生了数字计算机.实际上.如果只使用两种状态.数字计算机的性能将更可靠。因为部件的物理约束和人们的逻辑处理需要.所以数字计算机使用具有两种值的离散数据.这种数据称为二进制。 数字计算机使用只有数字O 和l 的二进制数据系统.一个二进制数字称作位.在数字计算机中用一组二进制表示信息。应用各种编码技术.一组二进制数字不但可以表示二进制数据,而且还可以表示其他离散符号.如十进制数字或字母表中的字母.例如ASCII是用7 位二进制数字表示一个字符。通过合理使用二进制组合和各种编码技术.可产生用于完成各种类型计算的一系列指令。与基数为10 的十进制数相比.二进制数的基数为2 .使用了数字O 和1 .与一个二进制数等值的十进制数可以扩展为包含更多位的二进制数. 计算机系统是由硬件系统和软件系统组成的,硬件系统由看得见、摸得着的物理设备构成.如磁盘和屏幕。软件系统是管理计算机的无形“控制”,是运行在计算机中的所有程序,程序是指令的集台,它告诉硬件应该做什么,通常将计算机硬件分为3 个主要部分:输入和输出设备(I/O 设备)、中央处理器(CPU)和存储器。在第2 章中对硬件部分进行详细介绍.软件可以按其用途分类。应用软件是为诸如会计、娱乐和工程领域之类的处理任务而设计的,如果玩过计算机游戏或用字处理软件输入入过文件内容.则用户已经具有使用应用软件的体验。另一方面.系统软件控制计算机系统,它不仅包括专业人员用于创建应用软件的复杂程序.而且还包括用于启动计算机和提供给其他程序使用的管理程序.这部分内容将在第2 章和第6 章中详细介绍, 1 . 2 数据类型 数字计算机中的二进制信息存储在存储器或处理器的寄存器中。寄存器的内容为数据或控制信息。控制信息为一位或多位.用于表明控制信号的顺序.这些信号用于处理其他寄存器的数据.数据是数字和其他二进制代码信息.通过处理这些数据得到所需的计算结果.下面介绍在数字计算机最常用的数据类型和各种数据类型在计算机的寄存器中如何以二进制代码的形式表示. 数字计算机寄存器中的数据可分类如下; .数值数据常用来表示整数.n位无符号整数.其值的表示范围为O ~-l ;n位带符号整数.其值的表示范围为- ~-1。这两种格式的数据可以用于算术运算。有些数值数据不能表示为整数。这些数值在计算机中用浮点格式表示.典型的如小数部分。计算机中有专用于浮点数的寄存器和指令。 .布尔值TRUE 和FALSE 经常被被使用.这使它们有自己的数据类型一一布尔型和汇编语言指令.常用0 值表示FALSE .用非0 值表示TRUE 。布尔汇编语言 指令可以对布尔数据执行逻辑操作。与逻辑指令每位都产生操作结果不同,布尔指令只产生一个结果。下面举例来说明它们的不同,若A=0000 0010 , B =0000 0001,则二进制数据的逻辑与运算的给果为0000 0000;然而,如果它们是布尔值,因为它们均为非O ,所以A 和B 均为TRUE ,对它们进行布尔与运算给果为TRUE ,用非O 值表示。 .计算机也可处理字符型数据。字符型数据用ASCII、EBCDIC 、UNICODE或其他字符编码标准编码后的二进制数据进行存储。计算机能将若干字符连成串,用一些字符代替其他字符或另行处理字符串,而不是用算术方法或逻辑方法处理字符。有些汇编语言指令集中包含了直接处理字符数据的指令,而另一些汇编语言指令集中则运用其他指令构成例程来达到相同的结果。 1.3 计算机的发展 第一台大型电子计算机是电子数字模拟计算机(ENIAC),它诞生于1946 年.从此计算机经历了4 个发展年代或阶段。每一年代的特点是:与上一年代相比,体积更小,费用更低。 1 .第一代(1944-1958)

计算机专业英语试题含答案

1 6. 计算机专业英语试题 2 I . Vocabulary (词汇)(30 分) (一) .Tran slate the follow ing words and expressio ns into Chi nese (写出下列词组的 汉语。)(共 10 分,每题 1 分) 1. operati ng system _______________________________ 2. white box testi ng _______________________________ 3. hard disk ________________________________ 4. man ageme nt in formatio n system ______________________________ 5. electr onic commerce _______________________________ 6. relati onal database ________________________________ 7. software engin eeri ng ______________________________ 8. .software maintenance _________________________________ 9. menu bar 10. network security (二) .Fill in the blanks with the corresponding English abbreviations. (根据汉语写出相应的 英语缩写。) (共 10分,每 题1分) 2. _ 广域网 4 .文件传送[输]协 6 .面向对象编程 8 .结构化查询语言 10 .开放系统互 (三) Match the following words and expressions in the left column with those similar in meaning in the right 1. applicati on software a. 音频 2. mach ine Ian guage b. 应用软件 3. structured program ming c. 机器语言 4. functional test ing d. 软件测试 5. memory e. 结构化程序设计 6. relati onal database f. 内存 7. firewall g. 功能测试 8. software test ing h. 关系数据库 9. hacker i. 黑客 10. audio j. 防火墙 column.(将左列的词汇与右列相应的汉语匹配。 1.只读存储器 ________________________ 3.传输控制协议 ______________________ 5.通用串行总线 ______________________ 7.集成开发环境 _____________________ 9.数据库管理系统 ____________________ )(10分,每空1分)

相关主题
文本预览
相关文档 最新文档