当前位置:文档之家› 英语大作业

英语大作业

英语大作业
英语大作业

题目:Uses of Computer Networks 班级:自094

姓名:徐慧娟学号:091415420 李艳芳 091415438

Uses of Computer Networks

Before we start to examine the technical issues in detail, it is worth devoting some time to pointing out why people are interested in computer networks and what they can be used for. After all, if nobody were interested in computer networks, few of them would be built. We will start with traditional uses at companies and for individuals and then move on to recent developments regarding mobile users and home networking.

1. Business Applications

Many companies have a substantial number of computers. For example, a company may have separate computers to monitor production, keep track of inventories, and do the payroll. Initially, each of these computers may have worked in isolation from the others, but at some point, management may have decided to connect them to be able to extract and correlate information about the entire company.

Put in slightly more general form, the issue here is resource sharing, and the goal is to make all programs, equipment, and especially data available to anyone on the network without regard to the physical location of the resource and the user. An obvious and widespread example is having a group of office workers share a common printer. None of the individuals really needs a private printer, and a high-volume networked printer is often cheaper, faster, and easier to maintain than a large collection of individual printers.

However, probably even more important than sharing physical resources such as printers, scanners, and CD burners, is sharing information. Every large and medium-sized company and many small companies are vitally dependent on computerized information. Most companies have customer records, inventories, accounts receivable, financial statements, tax information, and much more online. If all of its computers went down, a bank could not last more than five minutes. A modern manufacturing plant, with a computer-controlled assembly line, would not last even that long. Even a small travel agency or three-person law firm is now highly dependent on computer networks for allowing employees to access relevant information and documents instantly.

For smaller companies, all the computers are likely to be in a single office or perhaps a single building, but for larger ones, the computers and employees may be scattered over dozens of offices and plants in many countries. Nevertheless, a sales person in New York might sometimes need access to a product inventory database in Singapore. In other words, the

mere fact that a user happens to be 15,000 km away from his data should not prevent him from using the data as though they were local. This goal may be summarized by saying that it is an attempt to end the ''tyranny of geography.''

In the simplest of terms, one can imagine a company's information system as consisting of one or more databases and some number of employees who need to access them remotely. In this model, the data are stored on powerful computers called servers. Often these are centrally housed and maintained by a system administrator. In contrast, the employees have simpler machines, called clients, on their desks, with which they access remote data, for example, to include in spreadsheets they are constructing. (Sometimes we will refer to the human user of the client machine as the ''client,'' but it should be clear from the context whether we mean the computer or its user.) The client and server machines are connected by a network, as illustrated in Fig. 1-1. Note that we have shown the network as a simple oval, without any detail. We will use this form when we mean a network in the abstract sense. When more detail is required, it will be provided.

Figure 1-1. A network with two clients and one server.

This whole arrangement is called the client-server model. It is widely used and forms the basis of much network usage. It is applicable when the client and server are both in the same building (e.g., belong to the same company), but also when they are far apart. For example, when a person at home accesses a page on the World Wide Web, the same model is employed, with the remote Web server being the server and the user's personal computer being the client. Under most conditions, one server can handle a large number of clients.

If we look at the client-server model in detail, we see that two processes are involved, one on the client machine and one on the server machine. Communication takes the form of the client process sending a

message over the network to the server process. The client process then waits for a reply message. When the server process gets the request, it performs the requested work or looks up the requested data and sends back a reply. These messages are shown in Fig. 1-2.

Figure 1-2. The client-server model involves requests and replies.

A second goal of setting up a computer network has to do with people rather than information or even computers. A computer network can provide a powerful communication medium among employees. Virtually every company that has two or more computers now has e-mail (electronic mail), which employees generally use for a great deal of daily communication. In fact, a common gripe around the water cooler is how much e-mail everyone has to deal with, much of it meaningless because bosses have discovered that they can send the same (often content-free) message to all their subordinates at the push of a button.

But e-mail is not the only form of improved communication made possible by computer networks. With a network, it is easy for two or more people who work far apart to write a report together. When one worker makes a change to an online document, the others can see the change immediately, instead of waiting several days for a letter. Such a speedup makes cooperation among far-flung groups of people easy where it previously had been impossible.

Yet another form of computer-assisted communication is videoconferencing. Using this technology, employees at distant locations can hold a meeting, seeing and hearing each other and even writing on a shared virtual blackboard. Videoconferencing is a powerful tool for eliminating the cost and time previously devoted to travel. It is sometimes said that communication and transportation are having a race, and whichever wins will make the other obsolete.

A third goal for increasingly many companies is doing business electronically with other companies, especially suppliers and customers. For example, manufacturers of automobiles, aircraft, and computers, among others, buy subsystems from a variety of suppliers and then assemble the parts. Using computer networks, manufacturers can place orders

electronically as needed. Being able to place orders in real time (i.e., as needed) reduces the need for large inventories and enhances efficiency.

A fourth goal that is starting to become more important is doing business with consumers over the Internet. Airlines, bookstores, and music vendors have discovered that many customers like the convenience of shopping from home. Consequently, many companies provide catalogs of their goods and services online and take orders on-line. This sector is expected to grow quickly in the future. It is called e-commerce (electronic commerce).

2. Home Applications

In 1977, Ken Olsen was president of the Digital Equipment Corporation, then the number two computer vendor in the world (after IBM). When asked why Digital was not going after the personal computer market in a big way, he said: ''There is no reason for any individual to have a computer in his home.'' History showed otherwise and Digital no longer exists. Why do people buy computers for home use? Initially, for word processing and games, but in recent years that picture has changed radically. Probably the biggest reason now is for Internet access. Some of the more popular uses of the Internet for home users are as follows:

1.Access to remote information.

2.Person-to-person communication.

3.Interactive entertainment.

4.Electronic commerce.

Access to remote information comes in many forms. It can be surfing the World Wide Web for information or just for fun. Information available includes the arts, business, cooking, government, health, history, hobbies, recreation, science, sports, travel, and many others. Fun comes in too many ways to mention, plus some ways that are better left unmentioned.

Many newspapers have gone on-line and can be personalized. For example, it is sometimes possible to tell a newspaper that you want everything about corrupt politicians, big fires, scandals involving celebrities, and epidemics, but no football, thank you. Sometimes it is even possible to have the selected articles downloaded to your hard disk while you sleep or printed on your printer just before breakfast. As this trend continues, it will cause massive unemployment among 12-year-old paperboys, but newspapers like it because distribution has always been the weakest link in the whole production chain.

The next step beyond newspapers (plus magazines and scientific journals) is the on-line digital library. Many professional organizations, such as the ACM (https://www.doczj.com/doc/6213952625.html,) and the IEEE Computer Society (https://www.doczj.com/doc/6213952625.html,), already have many journals and conference proceedings on-line. Other groups are following rapidly. Depending on the cost, size, and weight of book-sized notebook computers, printed books may become obsolete. Skeptics should take note of the effect the printing press had on the medieval illuminated manuscript.

All of the above applications involve interactions between a person and a remote database full of information. The second broad category of network use is person-to-person communication, basically the 21st century's answer to the 19th century's telephone. E-mail is already used on a daily basis by millions of people all over the world and its use is growing rapidly. It already routinely contains audio and video as well as text and pictures. Smell may take a while.

Any teenager worth his or her salt is addicted to instant messaging. This facility, derived from the UNIX talk program in use since around 1970, allows two people to type messages at each other in real time. A multiperson version of this idea is the chat room, in which a group of people can type messages for all to see.

Worldwide newsgroups, with discussions on every conceivable topic, are already commonplace among a select group of people, and this phenomenon will grow to include the population at large. These discussions, in which one person posts a message and all the other subscribers to the newsgroup can read it, run the gamut from humorous to impassioned. Unlike chat rooms, newsgroups are not real time and messages are saved so that when someone comes back from vacation, all messages that have been posted in the meanwhile are patiently waiting for reading.

Another type of person-to-person communication often goes by the name of peer-to-peer communication, to distinguish it from the client-server model (Parameswaran et al., 2001). In this form, individuals who form a loose group can communicate with others in the group, as shown in Fig. 1-3. Every person can, in principle, communicate with one or more other people; there is no fixed division into clients and servers.

Figure 1-3. In a peer-to-peer system there are no fixed clients and servers.

Peer-to-peer communication really hit the big time around 2000 with a service called Napster, which at its peak had over 50 million music fans swapping music, in what was probably the biggest copyright infringement in all of recorded history (Lam and Tan, 2001; and Macedonia, 2000). The idea was fairly simple. Members registered the music they had on their hard disks in a central database maintained on the Napster server. If a member wanted a song, he checked the database to see who had it and went directly there to get it. By not actually keeping any music on its machines, Napster argued that it was not infringing anyone's copyright. The courts did not agree and shut it down.

However, the next generation of peer-to-peer systems eliminates the central database by having each user maintain his own database locally, as well as providing a list of other nearby people who are members of the system. A new user can then go to any existing member to see what he has and get a list of other members to inspect for more music and more names. This lookup process can be repeated indefinitely to build up a large local database of what is out there. It is an activity that would get tedious for people but is one at which computers excel.

Legal applications for peer-to-peer communication also exist. For example, fans sharing public domain music or sample tracks that new bands have released for publicity purposes, families sharing photos, movies, and genealogical information, and teenagers playing multiperson on-line games. In fact, one of the most popular Internet applications of all, e-mail, is inherently peer-to-peer. This form of communication is expected to grow considerably in the future.

Electronic crime is not restricted to copyright law. Another hot area is electronic gambling. Computers have been simulating things for decades. Why not simulate slot machines, roulette wheels, blackjack dealers, and more gambling equipment? Well, because it is illegal in a lot of places.

The trouble is, gambling is legal in a lot of other places (England, for example) and casino owners there have grasped the potential for Internet gambling. What happens if the gambler and the casino are in different countries, with conflicting laws? Good question.

Other communication-oriented applications include using the Internet to carry telephone calls, video phone, and Internet radio, three rapidly growing areas. Another application is telelearning, meaning attending 8 A.M. classes without the inconvenience of having to get out of bed first. In the long run, the use of networks to enhance human-to-human communication may prove more important than any of the others.

Our third category is entertainment, which is a huge and growing industry. The killer application here (the one that may drive all the rest) is video on demand. A decade or so hence, it may be possible to select any movie or television program ever made, in any country, and have it displayed on your screen instantly. New films may become interactive, where the user is occasionally prompted for the story direction (should Macbeth murder Duncan or just bide his time?) with alternative scenarios provided for all cases. Live television may also become interactive, with the audience participating in quiz shows, choosing among contestants, and so on.

On the other hand, maybe the killer application will not be video on demand. Maybe it will be game playing. Already we have multiperson real-time simulation games, like hide-and-seek in a virtual dungeon, and flight simulators with the players on one team trying to shoot down the players on the opposing team. If games are played with goggles and three-dimensional real-time, photographic-quality moving images, we have a kind of worldwide shared virtual reality.

Our fourth category is electronic commerce in the broadest sense of the term. Home shopping is already popular and enables users to inspect the on-line catalogs of thousands of companies. Some of these catalogs will soon provide the ability to get an instant video on any product by just clicking on the product's name. After the customer buys a product electronically but cannot figure out how to use it, on-line technical support may be consulted.

Another area in which e-commerce is already happening is access to financial institutions. Many people already pay their bills, manage their bank accounts, and handle their investments electronically. This will surely grow as networks become more secure.

One area that virtually nobody foresaw is electronic flea markets (e-flea?). On-line auctions of second-hand goods have become a massive industry. Unlike traditional e-commerce, which follows the client-server model, on-line auctions are more of a peer-to-peer system, sort of consumer-to-consumer. Some of these forms of e-commerce have acquired cute little tags based on the fact that ''to'' and ''2'' are pronounced the same. The most popular ones are listed in Fig. 1-4.

Figure 1-4. Some forms of e-commerce.

No doubt the range of uses of computer networks will grow rapidly in the future, and probably in ways no one can now foresee. After all, how many people in 1990 predicted that teenagers tediously typing short text messages on mobile phones while riding buses would be an immense money maker for telephone companies in 10 years? But short message service is very profitable.

Computer networks may become hugely important to people who are geographically challenged, giving them the same access to services as people living in the middle of a big city. Telelearning may radically affect education; universities may go national or international. Telemedicine is only now starting to catch on (e.g., remote patient monitoring) but may become much more important. But the killer application may be something mundane, like using the webcam in your refrigerator to see if you have to buy milk on the way home from work.

3. Mobile Users

Mobile computers, such as notebook computers and personal digital assistants (PDAs), are one of the fastest-growing segments of the computer industry. Many owners of these computers have desktop machines back at the office and want to be connected to their home base even when away from home or en route. Since having a wired connection is impossible in cars and airplanes, there is a lot of interest in wireless networks. In this section we will briefly look at some of the uses of wireless networks.

Why would anyone want one? A common reason is the portable office. People on the road often want to use their portable electronic equipment to send and receive telephone calls, faxes, and electronic mail, surf the Web, access remote files, and log on to remote machines. And they want to do this from anywhere on land, sea, or air. For example, at computer conferences these days, the organizers often set up a wireless network in the conference area. Anyone with a notebook computer and a wireless modem can just turn the computer on and be connected to the Internet, as though the computer were plugged into a wired network. Similarly, some universities have installed wireless networks on campus so students can sit under the trees and consult the library's card catalog or read their e-mail.

Wireless networks are of great value to fleets of trucks, taxis, delivery vehicles, and repairpersons for keeping in contact with home. For example, in many cities, taxi drivers are independent businessmen, rather than being employees of a taxi company. In some of these cities, the taxis have a display the driver can see. When a customer calls up, a central dispatcher types in the pickup and destination points. This information is displayed on the drivers' displays and a beep sounds. The first driver to hit a button on the display gets the call.

Wireless networks are also important to the military. If you have to be able to fight a war anywhere on earth on short notice, counting on using the local networking infrastructure is probably not a good idea. It is better to bring your own.

Although wireless networking and mobile computing are often related, they are not identical, as Fig. 1-5 shows. Here we see a distinction between fixed wireless and mobile wireless. Even notebook computers are sometimes wired. For example, if a traveler plugs a notebook computer into the telephone jack in a hotel room, he has mobility without a wireless network.

Figure 1-5. Combinations of wireless networks and mobile computing.

On the other hand, some wireless computers are not mobile. An important example is a company that owns an older building lacking network

cabling, and which wants to connect its computers. Installing a wireless network may require little more than buying a small box with some electronics, unpacking it, and plugging it in. This solution may be far cheaper than having workmen put in cable ducts to wire the building.

But of course, there are also the true mobile, wireless applications, ranging from the portable office to people walking around a store with a PDA doing inventory. At many busy airports, car rental return clerks work in the parking lot with wireless portable computers. They type in the license plate number of returning cars, and their portable, which has a built-in printer, calls the main computer, gets the rental information, and prints out the bill on the spot.

As wireless technology becomes more widespread, numerous other applications are likely to emerge. Let us take a quick look at some of the possibilities. Wireless parking meters have advantages for both users and city governments. The meters could accept credit or debit cards with instant verification over the wireless link. When a meter expires, it could check for the presence of a car (by bouncing a signal off it) and report the expiration to the police. It has been estimated that city governments in the U.S. alone could collect an additional $10 billion this way (Harte et al., 2000). Furthermore, better parking enforcement would help the environment, as drivers who knew their illegal parking was sure to be caught might use public transport instead.

Food, drink, and other vending machines are found everywhere. However, the food does not get into the machines by magic. Periodically, someone comes by with a truck to fill them. If the vending machines issued a wireless report once a day announcing their current inventories, the truck driver would know which machines needed servicing and how much of which product to bring. This information could lead to more efficient route planning. Of course, this information could be sent over a standard telephone line as well, but giving every vending machine a fixed telephone connection for one call a day is expensive on account of the fixed monthly charge.

Another area in which wireless could save money is utility meter reading. If electricity, gas, water, and other meters in people's homes were to report usage over a wireless network, there would be no need to send out meter readers. Similarly, wireless smoke detectors could call the fire department instead of making a big noise (which has little value if no one is home). As the cost of both the radio devices and the air time drops, more and more measurement and reporting will be done with wireless networks.

A whole different application area for wireless networks is the expected merger of cell phones and PDAs into tiny wireless computers. A first attempt was tiny wireless PDAs that could display stripped-down Web pages on their even tinier screens. This system, called WAP 1.0 (Wireless Application Protocol) failed, mostly due to the microscopic screens, low bandwidth, and poor service. But newer devices and services will be better with WAP 2.0.

One area in which these devices may excel is called m-commerce (mobile-commerce) (Senn, 2000). The driving force behind this phenomenon consists of an amalgam of wireless PDA manufacturers and network operators who are trying hard to figure out how to get a piece of the e-commerce pie. One of their hopes is to use wireless PDAs for banking and shopping. One idea is to use the wireless PDAs as a kind of electronic wallet, authorizing payments in stores, as a replacement for cash and credit cards. The charge then appears on the mobile phone bill. From the store's point of view, this scheme may save them most of the credit card company's fee, which can be several percent. Of course, this plan may backfire, since customers in a store might use their PDAs to check out competitors' prices before buying. Worse yet, telephone companies might offer PDAs with bar code readers that allow a customer to scan a product in a store and then instantaneously get a detailed report on where else it can be purchased and at what price.

Since the network operator knows where the user is, some services are intentionally location dependent. For example, it may be possible to ask for a nearby bookstore or Chinese restaurant. Mobile maps are another candidate. So are very local weather forecasts (''When is it going to stop raining in my backyard?''). No doubt many other applications appear as these devices become more widespread.

One huge thing that m-commerce has going for it is that mobile phone users are accustomed to paying for everything (in contrast to Internet users, who expect everything to be free). If an Internet Web site charged a fee to allow its customers to pay by credit card, there would be an immense howling noise from the users. If a mobile phone operator allowed people to pay for items in a store by using the phone and then tacked on a fee for this convenience, it would probably be accepted as normal. Time will tell.

A little further out in time are personal area networks and wearable computers. IBM has developed a watch that runs Linux (including the X11 windowing system) and has wireless connectivity to the Internet for sending and receiving e-mail (Narayanaswami et al., 2002). In the future,

people may exchange business cards just by exposing their watches to each other. Wearable wireless computers may give people access to secure rooms the same way magnetic stripe cards do now (possibly in combination with a PIN code or biometric measurement). These watches may also be able to retrieve information relevant to the user's current location (e.g., local restaurants). The possibilities are endless.

Smart watches with radios have been part of our mental space since their appearance in the Dick Tracy comic strip in 1946. But smart dust? Researchers at Berkeley have packed a wireless computer into a cube 1 mm on edge (Warneke et al., 2001). Potential applications include tracking inventory, packages, and even small birds, rodents, and insects.

4. Social Issues

The widespread introduction of networking has introduced new social, ethical, and political problems. Let us just briefly mention a few of them;

a thorough study would require a full book, at least. A popular feature of many networks are newsgroups or bulletin boards whereby people can exchange messages with like-minded individuals. As long as the subjects are restricted to technical topics or hobbies like gardening, not too many problems will arise.

The trouble comes when newsgroups are set up on topics that people actually care about, like politics, religion, or sex. Views posted to such groups may be deeply offensive to some people. Worse yet, they may not be politically correct. Furthermore, messages need not be limited to text. High-resolution color photographs and even short video clips can now easily be transmitted over computer networks. Some people take a live-and-let-live view, but others feel that posting certain material (e.g., attacks on particular countries or religions, pornography, etc.) is simply unacceptable and must be censored. Different countries have different and conflicting laws in this area. Thus, the debate rages.

People have sued network operators, claiming that they are responsible for the contents of what they carry, just as newspapers and magazines are. The inevitable response is that a network is like a telephone company or the post office and cannot be expected to police what its users say. Stronger yet, were network operators to censor messages, they would likely delete everything containing even the slightest possibility of them being sued, and thus violate their users' rights to free speech. It is probably safe to say that this debate will go on for a while.

Another fun area is employee rights versus employer rights. Many people read and write e-mail at work. Many employers have claimed the right to read and possibly censor employee messages, including messages sent from a home computer after work. Not all employees agree with this.

Even if employers have power over employees, does this relationship also govern universities and students? How about high schools and students? In 1994, Carnegie-Mellon University decided to turn off the incoming message stream for several newsgroups dealing with sex because the university felt the material was inappropriate for minors (i.e., those few students under 18). The fallout from this event took years to settle.

Another key topic is government versus citizen. The FBI has installed a system at many Internet service providers to snoop on all incoming and outgoing e-mail for nuggets of interest to it (Blaze and Bellovin, 2000; Sobel, 2001; and Zacks, 2001). The system was originally called Carnivore but bad publicity caused it to be renamed to the more innocent-sounding DCS1000. But its goal is still to spy on millions of people in the hope of finding information about illegal activities. Unfortunately, the Fourth Amendment to the U.S. Constitution prohibits government searches without a search warrant. Whether these 54 words, written in the 18th century, still carry any weight in the 21st century is a matter that may keep the courts busy until the 22nd century.

The government does not have a monopoly on threatening people's privacy. The private sector does its bit too. For example, small files called cookies that Web browsers store on users' computers allow companies to track users' activities in cyberspace and also may allow credit card numbers, social security numbers, and other confidential information to leak all over the Internet (Berghel, 2001).

Computer networks offer the potential for sending anonymous messages. In some situations, this capability may be desirable. For example, it provides a way for students, soldiers, employees, and citizens to blow the whistle on illegal behavior on the part of professors, officers, superiors, and politicians without fear of reprisals. On the other hand, in the United States and most other democracies, the law specifically permits an accused person the right to confront and challenge his accuser in court. Anonymous accusations cannot be used as evidence.

In short, computer networks, like the printing press 500 years ago, allow ordinary citizens to distribute their views in different ways and to different audiences than were previously possible. This new-found freedom brings with it many unsolved social, political, and moral issues.

Along with the good comes the bad. Life seems to be like that. The Internet makes it possible to find information quickly, but a lot of it is ill-informed, misleading, or downright wrong. The medical advice you plucked from the Internet may have come from a Nobel Prize winner or from a high school dropout. Computer networks have also introduced new kinds of antisocial and criminal behavior. Electronic junk mail (spam) has become a part of life because people have collected millions of e-mail addresses and sell them on CD-ROMs to would-be marketeers. E-mail messages containing active content (basically programs or macros that execute on the receiver's machine) can contain viruses that wreak havoc.

Identity theft is becoming a serious problem as thieves collect enough information about a victim to obtain get credit cards and other documents in the victim's name. Finally, being able to transmit music and video digitally has opened the door to massive copyright violations that are hard to catch and enforce.

A lot of these problems could be solved if the computer industry took computer security seriously. If all messages were encrypted and authenticated, it would be harder to commit mischief. This technology is well established and we will study it in detail in Chap. 8. The problem is that hardware and software vendors know that putting in security features costs money and their customers are not demanding such features. In addition, a substantial number of the problems are caused by buggy software, which occurs because vendors keep adding more and more features to their programs, which inevitably means more code and thus more bugs.

A tax on new features might help, but that is probably a tough sell in some quarters. A refund for defective software might be nice, except it would bankrupt the entire software industry in the first year.

数学专业英语课后答案

2.1 数学、方程与比例 (1)数学来源于人类的社会实践,包括工农业的劳动,商业、军事和科学技术研究等活动。 Mathematics comes from man’s social practice, for example, industrial and agricultural production, commercial activities, military operations and scientific and technological researches. (2)如果没有运用数学,任何一个科学技术分支都不可能正常地发展。 No modern scientific and technological branches could be regularly developed without the application of mathematics. (3)符号在数学中起着非常重要的作用,它常用于表示概念和命题。Notations are a special and powerful tool of mathematics and are used to express conceptions and propositions very often. (4)17 世纪之前,人们局限于初等数学,即几何、三角和代数,那时只考虑常数。 Before 17th century, man confined himself to the elementary mathematics, i. e. , geometry, trigonometry and algebra, in which only the constants were considered. (5)方程与算数的等式不同在于它含有可以参加运算的未知量。 Equation is different from arithmetic identity in that it contains unknown quantity which can join operations. (6)方程又称为条件等式,因为其中的未知量通常只允许取某些特定的值。Equipment is called an equation of condition in that it is true only for certain values of unknown quantities in it. (7)方程很有用,可以用它来解决许多实际应用问题。 Equations are of very great use. We can use equations in many mathematical problems. (8)解方程时要进行一系列移项和同解变形,最后求出它的根,即未知量的值。To solve the equation means to move and change the terms about without making the equation untrue, until the root of the equation is obtained, which is the value of unknown term. 2.2 几何与三角 (1)许多专家都认为数学是学习其他科学技术的必备基础和先决条件。 Many experts recognize that mathematics is the necessary foundation and prerequisite of studying other science technology. (2)西方国家的专家认为几何起源于巴比伦和埃及人的土地测量技术,其实中国古代的数学家对几何做了许多出色的研究。 The western experts think that geometry had its origin in the measurements by the Babylonians and Egyptians of their lands. Infect, the ancient Chinese mathematicians made much remarkable study for geometry. (3)几何的学习使学生在思考问题时更周密和审慎,他们将不会盲目接受任何结论。 In studying geometry, the student is taught to think clearly and critically and he is led away from the practice of blind acceptance of any conclusions. (4)数学培养学生的分析问题的能力,使他们能应用毅力、创造性和逻辑推理来解决问题。

南开大学20秋学期《大学英语(一)》在线作业答案资料2

[南开大学]20秋学期《大学英语(一)》在线作业 提示:请认真学习本资料,并完成课程复习!!100 一、单选题 (共 50 道试题,共 100 分) 1.She ( )work next Monday. A.is starting B.starts C.started [本题参考选择是]:A 2.The quality inspector ____ finished products carefully to make sure each was in good condition. A.looked over B.found out C.held up D.stuck to [本题参考选择是]:A 3.I go swimming on ( ) Thursdays for two hours. A./ B.a C.an [本题参考选择是]:A 4.( ) people are my friends. ( ) people are my husband's friends. A.These, Those B.This, That C.Here, There [本题参考选择是]:A 5.Do you have( ) friends in Shanghai? A.many B.any C.not [本题参考选择是]:B 6.A:( ), Polly? B:I'd like a glass of wine, thank you. A.Do you want B.What would you like C.What you like [本题参考选择是]:B 7.I'm a nurse. I work ( )David ( )the same hospital.

专业英语大作业

专业英语大作业 一:英译汉 翻译范围TCP/IP Illustrated, V olume 1: The Protocols 5.1~5.5 15.1~15.2 第5章RARP:逆地址解析协议 5.1简介 5.2 RARP报文格式 5.3 RARP示例 5.4 RARP服务的设计 5.5小结 练习 5.1简介 一个拥有本地磁盘的系统通常是从磁盘文件读取配置文件中获取其IP地址。但一个没有磁盘的系统,如X终端或无盘工作站,需要一些其它方式去获得其IP地址。 每个系统在网络上都有一个唯一的硬件地址,由网络接口的制造商分配。 RARP的原则是无盘系统从接口卡上读取其独特的硬件地址,并发送RARP请求(网络上的广播帧)要求别人对无盘系统的IP地址(使用RARP回应)进行应答。 虽然这个概念很简单,执行往往比ARP更难,在本章后面会描述其原因。 RARP的正式规范是RFC 903。 5.2 RARP报文格式 RARP报文的格式几乎与ARP报文是相同的(图4.3)。唯一的区别是,RARP 的请求或应答帧类型为0×8035,并且在操作层RARP请求值为3、RARP应答值为4。 图4-3 ARP在网络上请求与应答报文的格式 与ARP一样,RARP服务器请求是广播和RARP应答通常是单播。 5.3 RARP示例 在我们的网络,我们可以强制sun主机从网络引导,而不是它的本地磁盘。 如果我们在主机bsdi上运行RARP服务器和tcpdump,我们得到如图5.1所示的输出。我们使用-e参数去标记tcpdump的打印硬件地址:

图5.1 RARP请求和应答。 该RARP请求是广播(1号线)的,第2行的RARP应答是单播的。第2行的输出,“at sun”,意味着RARP应答包含了主机sun(140.252.13.33)的IP地址。 在第3行,我们看到,一旦sun接收其IP地址,它会发出一个TFTP读请求(RRQ)的文件8CFCOD21.SUN4C。(TFTP是简单文件传输协议,我们在第15章进行详细描述)。在文件名中的8个十六进制数字是sun主机的IP地址140.252.13.33的十六进制表示形式。这是在RARP应答中返回的IP地址。该文件名的其余部分,后缀SUN4C表示系统正在引导的类型。 Tcpdump表示第3行是一个长度为65的IP数据报,而不是一个UDP数据报(实际上它确实是),因为我们运行tcpdump命令使用-e参数,看硬件级别的地址。另一点,在图5.1要注意的是在第2行的以太网帧的长度似乎比最小较短(我们所说的是在4.5节60字节)。原因是我们的系统,该系统上运行的tcpdump 发送该以太网帧(BSDI)。该应用程序rarpd,写42字节到BSD分组过滤器装置(14字节的以太网报头和28字节的RARP应答),这是什么的tcpdump收到的副本。但以太网设备驱动程序垫这个短帧的最小尺寸为传输(60 )。如果我们在另一个系统上已经运行的tcpdump ,长度会是60。 我们可以看到在这个例子,当这种无盘系统接收在RARP应答它的IP地址,它会发出一个TFTP请求来读取一个引导映像。在这一点上,我们不会进入其他详细介绍无盘系统是如何引导自己。(第16章介绍了使用RARP ,BOOTP和TFTP无盘X终端的引导顺序。) 图5.2表示出了如果有在网络上没有RARP服务器所得到的数据包。每个数据包的目的地址为以太网的广播地址。以太网地址跟随的是目标硬件地址,并按照发送端的硬件地址发送。

大学英语期末大作业(参考答案)

大学英语1考试卷 总分:100分 简答题 1、将下列句子翻译成汉语 1.We can do a lot of things onlinesuch assearching for information and communicating with friendsno matter how far.答案:我们可以在网上做很多事情,例如寻找信息及和朋友沟通,不管相距多远。 2.Some people seem tohave their own ability in learning language答案:有些人在学习语言方面似乎有自己的天赋. 3.It is necessary for them to learn the language in order to communicate with these people and to learn from them.答案:为了与这些人进行交流,向他们学习,学习这门语言是必要的 4.Our likes and dislikes, tastes and preferences that hide in our choices of such activities such as reading books, going to the cinema, camping, or certain cultural pursuits, are all related to social background and learning experiences.答案:我们的好恶、品位、喜好决定了我们是选择看书、看电影、露营或某种文化追求,这又同社会环境和学习经验有关。 5.Occasionally, for a formal party or dinner, an invitation requires an answer,either in writing or by telephone. 答案:偶尔,一个正式的聚会或晚宴, 被邀请人是需要做出明确答复的, 无论是通过书面或者电话. 选择性答案2:应邀出席正式宴会或晚餐,不管是用书面还是用电话,有时是要回复的。(意思差不多,哪个通顺写哪个吧) 6.They not only like playing or watching games, but also like talking about them, or even thinking about them. 答案:他们不仅喜欢玩游戏、看游戏,而且喜欢谈论和思考它们。 7.There are plenty out there that are good and plenty that are bad. 答案:那里有很多是好的,很多是坏的。 8.Yet putting off something we know we should do is a bad habit to get into. 答案:然而,拖延我们知道应该做的事就会染上一个坏习惯。 9.And don’t you feel stressed and worried when you have to hurry?

专业英语部分习题答案参考.doc

b-毗喘pyridine 巴比妥酸:barbituric acid 比电导conductance 不规则的:irregular 崩解剂disintegrant C--萃取extraction 成团:ogglomerotion 测量仪measurement 肠液:intestinol fluid d-胆固醇cholestero 对映体:enontiomer 电极electrode 代谢:metobolism f-反相渗透reverse osmosis 分布:disposition g-构象:conformotion 固化:solidize 卜-甲苯toluene 静脉注:introvenous injection 挤压:compress 聚集:aggregate 胶囊capsule I一粒子:particle 立体选择性:stereoselectivity 利用率:availability 灭菌产品sterile products n—粘合剂odhesive P—偏振光:polarized light 片剂tablet 酉己剂elixir 排泄:excretion q一起女台原料starting materials(raw materials) q 醛aldehyde 「一溶解度:solubility 乳剂emulsion 润滑剂lubricant s-释放:release 渗液solution 生物膜:biologic membrane 生物碱okoloid, t…糖浆syrup 甜味剂sweetener w-丸剂pill 微生物microorganism 胃液:gastric fluid 稳定态:steady-state x-?旋光异构现象:optical isomerism 悬浮液suspension 香味剂flavor 稀释剂diluent 形状:shape 吸收absorption 消除:elimination y-胰岛素insulin 压片:tablet compression z-中间体intermediote 重结晶recrystallization 左旋:levorotation 蒸徭distillation 组织tissue a-asymmetric carb on 不对称碳absorption 吸收action 动作odhesive 粘合剂c-contamination 污染chirality:手性compress 压缩composite 合成的compressibility:可压缩性compaction:压紧contaminotion specialize 特殊污染conductivity 电导率control控制clinical:临床的 d- design:设计dry:干燥delivery:传送 e-巳xtgnd:延长epoxide:环氧化物 f- formulation:$ij 剂fluidity:流动性function:功能 g- geometric isomerism:几何异构 h- hormone 激素hydrolysis diastereoisomer:水解非对映异构体 heterogeneous catalyst 多相催化剂, i- irrigating 冲洗 m- metabolite代谢物medication药物治疗medicine内服药mill:研磨measure 尺寸mix:混合microorganisms 微生物 o- ophthalmic 眼药 p- polysaccharide 多糖peptide 肽plosmo 血浆penicillin 青霉素, precursor:前体partition coefficient:狭义分配系数pharmaceutical 制药的 parenteral 注射药物pycogens 热源procedure:程序 q- quality 性质quantity 数量 s- steroid 笛类steric effect:空间效应stereoselectivity:^体选择性 screening:过筛sustain :维持

英语大作业

《自动化专业英语》翻译大作业 所选文字出处:选自论文《PLC的发展和应用》 班级:学号:姓名:成绩: PLC全名为可编程控制器,定义是种数字运算操作的电子系统,专为在工业环境应用而设计的,主要结构由电源,中央处理单元,存储器,输入输出接口电路,功能模块,通信模块组成。PLC具有通用性强、使用方便、适应面广、抗干扰性强、编程简单等特点,在军事、国防、航空航天、交通、工业生产中的地位,在可预见的将来中是无法取代的。PLC有很多流派,我国的PLC研发、生产和应用发展很快,尤其在应用方面更为突出。 PLC的发展历程和主要流派 在工业生产过程中,大量的开关量顺序控制,它按照逻辑条件进行顺序动作,并按照逻辑关系进行连锁保护动作的控制,及大量离散量的数据采集。传统上,这些功能是通过气动或电气控制系统来实现的。1968年美国GM(通用汽车)公司提出取代继电气控制装置的要求,第二年,美国数字公司研制出了基于集成电路和电子技术的控制装置,首次采用程序化的手段应用于电气控制,这就是第一代可编程序控制器,称Programmable Controller(PC)。个人计算机(简称PC)发展起来后,为了方便,也为了反映可编程控制器的功能特点,可编程序控制器定名为Programmable Logic Controller(PLC),现在,仍常常将PLC简称PC。PLC的定义有许多种。国际电工委员会(IEC)对PLC的定义是:可编程控制器是一种数字运算操作的电子系统,专为在工业环境下应用而设计。它采用可编程序的存贮器,用来在其内部存贮执行逻辑运算、顺序控制、定时、计数和算术运算等操作的指令,并通过数字的、模拟的输入和输出,控制各种类型的机械或生产过程。可编程序控制器及其有关设备,都应按易于与工业控制系统形成一个整体,易于扩充其功能的原则设计。上世纪80年代至90年代中期,是PLC发展最快的时期,年增长率一直保持为30~40%。在这时期,PLC在处理模拟量能力、数字运算能力、人机接口能力和网络能力得到大幅度提高,PLC逐渐进入过程控制领域,在某些应用上取代了在过程控制领域处于统治地位的DCS系统。在世界上200多家PLC厂商,400多品种的PLC产品大体可以按地域分成三个流派:一个流派是美国产品,一个流派是欧洲产品,还有一个流派是日本产品。同一地区的产品相互借鉴的比较多,相互影响比较大,技术参透比较深,面临的主要市场相同,拥护要求接近,这一切就使得同一地域的PLC产品表现出比较多的相似性。美国PLC技术的形成与欧洲PLC技术的形成是在相互隔离的情况下,独自研究开发获得的,因此美国的PLC产品与欧洲的PLC产品常表现出来明显的差异性。日本的PLC技术是由美国引进的,因此日本的产品对美国的产品有一定的继承性。世界上比较先进的PLC生产厂家有德国的的西门子、日本的三菱、美国的A-B公司等等。

大学英语B大作业 (2)

10108 大学英语(B) 一、单选题 What is NOT mentioned in US education system?(B) 选择一项: A. major courses B. teaching methods C. self-discipline of the students D. comparison with Chinese students 2.Which of the following statements is TRUE?(C) 选择一项: A. There are fewer and fewer universities and private colleges in America. B. The academic advisor is in charge of the student's living conditions. C. Required core classes are taken in the first school year. D. The student must stick to his majors throughout his college time. 3.About the courses in US colleges, which of the following is NOT TRUE?(C) 选择一项: A. Subjects of arts, sciences and languages are taken by most first year students. B. There are a number of other courses for students to choose from besides their major ones. C. Students would still get certain credits if they do not attend the courses. D. A typical course load means the credits of courses a student has for one semester. 4.If students have problems in finding jobs, they can turn to _____ for help.(B) 选择一项: A. academic advisors B. the Career Counseling and Placement Office C. some fraternities D. no organization 5.The successful college students probably are the following EXCEPT______.(A) 选择一项: A. self-centered B. active members of society during school C. members of some fraternities D. those who know how to control themselves 6.The fact that wife beating was legal in America in 1850 shows that ____C______. 选择一项: A. America's legal system was in favor of the husband B. American husbands didn't love their wives C. American wives were servants to their husbands

电子商务英语题库(南开大学在线作业题库)

《1609》在线作业 1. TPN refers to() A. Trading Process Network Post B. Trading Price Network Post C. Trading Price Net Position D. Trading Process Nigation Post 满分:2 分得分:2 A 2. Transaction broker provides a ()payment mechanism for buyers and sellers to settle a transaction. A. direct B. indirect C. auction D. third party 满分:2 分得分:2 D 3. A search engine reads its () of sites and site information around the world for particular items searched on by users. A. webpage B. database C. attachment D. password 满分:2 分得分:2 B 4. business models have taken on greater importance recently as a form of intellectural property that can be protected with a () A. password B. system C. patent D. strategy 满分:2 分得分:2 C 5. one of the best mesurements for what sells well on the Internet is () A. common sense B. technology C. quality D. marketing 满分:2 分得分:2 A

网络教育英语专业 [西南大学网络教育《大学英语一》大作业答案]

1、(5) Which of the following is not true? ADick stayed at a nice hotel in the center of the city. BDick didn't work on the first night of his arrival. CDick forgot to send his wife a telegram. DDick wanted to go back to his hotel in a taxi. 正确答案C 2、题目Reading comprehension 1(4) Who would send him the name and address of his hotel? AThe manager of his hotel. BThe police office. CThe taxi driver. DHis wife.

正确答案D 3、题目Reading comprehension 1(3)Where did Dick stay in New York? A In the center of the city. BIn a hotel. CIn a restaurant. DAt his friend's house. 正确答案B 4、题目Reading comprehension 1(2) Why did his wife want a telegram from him? ABecause she didn’t know his address yet

BBecause she wanted to go to New York, too CBecause she might send him another telegram DBecause she couldn't leave her husband by himself in New York. 正确答案A 5、1) Dick flew to New York because _________. Ahe went there for a holiday Bhe had work there Che went there for sightseeing D his home was there 正确答案B

大学英语三离线作业答案

大学英语三离线作业答 案 Document serial number【NL89WT-NY98YT-NC8CB-NNUUT-NUT108】

离线作业试卷列表2 一、单选? 1.第一部分:交际用语(共5小题;每小题3分,满分15分)- Would you be interested in seeing a film tonight- ____C______?分值:3 A. Not at all.??? B. Are you sure??? C. Great! I'd love to ??? D. You're welcome.???? 2.第一部分:交际用语(共5小题;每小题3分,满分15分)- Excuse me, could you tell me the way to P eople's Square- ____B______?分值:3 A. I don't understand you.??? B. Sorry, I'm a stranger here.??? C. Why don't you take a taxi??? D. Don't bother me.???? 3.第四部分:完形填空(共10小题;每小题1分,满分10分)30?C 分值:1 A. on mind??? B. in heart??? C. in mind??? D. on your mind???? 4.第四部分:完形填空(共10小题;每小题1分,满分10分)29 B?分值:1 A. with??? B. for??? C. to??? D. in???? 5.第四部分:完形填空(共10小题;每小题1分,满分10分)28 B?分值:1 A. impossible??? B. wonderful??? C. incapable??? D. practical???? 6.第一部分:交际用语(共5小题;每小题3分,满分15分)- I've got the first prize in the dancing ____C______?分值:3 A. You're welcome.??? B. It's very kind of you.??? C. Please accept my congratulations.??? D. Oh, really, I can't believe my ears.???? 7.第一部分:交际用语(共5小题;每小题3分,满分15分)- I've passed the ___D_______?分值:3 A. What a pity!??? B. I have the examination.??? C. Come on.??? D. Congratulations.???? 8.第一部分:交际用语(共5小题;每小题3分,满分15分)- I'm suffering from a ________A__?分值:3

数学专业英语课后答案

2.1数学、方程与比例 词组翻译 1.数学分支branches of mathematics,算数arithmetics,几何学geometry,代数学algebra,三角学trigonometry,高等数学higher mathematics,初等数学elementary mathematics,高等代数higher algebra,数学分析mathematical analysis,函数论function theory,微分方程differential equation 2.命题proposition,公理axiom,公设postulate,定义definition,定理theorem,引理lemma,推论deduction 3.形form,数number,数字numeral,数值numerical value,图形figure,公式formula,符号notation(symbol),记法/记号sign,图表chart 4.概念conception,相等equality,成立/真true,不成立/不真untrue,等式equation,恒等式identity,条件等式equation of condition,项/术语term,集set,函数function,常数constant,方程equation,线性方程linear equation,二次方程quadratic equation 5.运算operation,加法addition,减法subtraction,乘法multiplication,除法division,证明proof,推理deduction,逻辑推理logical deduction 6.测量土地to measure land,推导定理to deduce theorems,指定的运算indicated operation,获得结论to obtain the conclusions,占据中心地位to occupy the centric place 汉译英 (1)数学来源于人类的社会实践,包括工农业的劳动,商业、军事和科学技术研究等活动。 Mathematics comes from man’s social practice, for example, industrial and agricultural production, commercial activities, military operations and scientific and technological researches. (2)如果没有运用数学,任何一个科学技术分支都不可能正常地发展。 No modern scientific and technological branches could be regularly developed without the application of mathematics. (3)符号在数学中起着非常重要的作用,它常用于表示概念和命题。 Notations are a special and powerful tool of mathematics and are used to express conceptions and propositions very often. (4)17 世纪之前,人们局限于初等数学,即几何、三角和代数,那时只考虑常数。 Before 17th century, man confined himself to the elementary mathematics, i. e. , geometry, trigonometry and algebra, in which only the constants were considered. (5)方程与算数的等式不同在于它含有可以参加运算的未知量。 Equation is different from arithmetic identity in that it contains unknown quantity which can join operations. (6)方程又称为条件等式,因为其中的未知量通常只允许取某些特定的值。Equipment is called an equation of condition in that it is true only for certain values of unknown quantities in it. (7)方程很有用,可以用它来解决许多实际应用问题。

大学英语作业答案完整版

Exercises 1.When and where shall we ___A____. A.meet B. met C. to meet D. meeting A.You __D_____show more respect for your elders. A.can B. could C. would D. must 3. It is necessary that I ___D____ return the books to him tomorrow. A. will B. can C. may D. should 4. She __B_____ to school by school bus at eight in the morning. A. go B. goes C. went D. gone 5. What __C_____the notice say? A. is, say B. is, said C. did, say D. does, say 6. I’ll tell her after Ruby __B____. A. leave B. leaves C. left D. is leaving 7. We __D_____ the result tomorrow. A. know B. knew C. has known D. will know 8. On November 1 we __D_____ in this house for thirty years. A. live B. will have C. are living D. will have been living 9. It __B_____ to rain soon. A. is B. is going C. will D. shall 10. Mary ___C_____ a dress when she cut her finger.

专业英语部分习题答案参考

b--吡啶pyridine 巴比妥酸:barbituric acid比电导conductance 不规则的:irregular 崩解剂disintegrant c--萃取extraction 成团:agglomeration 测量仪measurement 肠液:intestinal fluid d--胆固醇cholestero 对映体:enantiomer 电极electrode 代谢:metabolism f--反相渗透reverse osmosis 分布:disposition g--构象:conformation 固化:solidize j--甲苯toluene 静脉注:intravenous injection 挤压:compress 聚集:aggregate 胶囊capsule l--粒子:particle 立体选择性:stereoselectivity 利用率:availability m--灭菌产品sterile products n--粘合剂adhesive p--偏振光:polarized light 片剂tablet 配剂elixir 排泄:excretion q--起始原料starting materials(raw materials) q醛aldehyde r--溶解度:solubility 乳剂emulsion 润滑剂lubricant s--释放:release 渗液solution 生物膜:biologic membrane 生物碱alkaloid, t---糖浆syrup 甜味剂sweetener w--丸剂pill 微生物microorganism 胃液:gastric fluid 稳定态:steady-state x--旋光异构现象:optical isomerism 悬浮液suspension 香味剂flavor 稀释剂diluent 形状:shape 吸收:absorption 消除:elimination y--胰岛素insulin 压片:tablet compression z--中间体intermediate 重结晶recrystallization 左旋:levorotation 蒸馏distillation 组织tissue a--asymmetric carbon不对称碳absorption吸收action动作adhesive粘合剂c--contamination污染chirality:手性compress压缩composite合成的compressibility:可压缩性compaction:压紧contamination specialize特殊污染conductivity电导率control:控制clinical:临床的 d--design:设计dry:干燥delivery:传送 e-- extend:延长epoxide:环氧化物 f-- formulation:制剂fluidity:流动性f unction:功能 g--geometric isomerism:几何异构 h-- hormone激素hydrolysis diastereoisomer:水解非对映异构体 heterogeneous catalyst多相催化剂, i--irrigating冲洗 m-- metabolite代谢物medication药物治疗medicine内服药mill:研磨measure尺寸mix:混合microorganisms微生物 o--ophthalmic眼药 p-- polysaccharide多糖peptide肽plasma血浆penicillin青霉素,precursor:前体partition coefficient:狭义分配系数pharmaceutical制药的parenteral注射药物pycogens热源procedure:程序 q-- quality性质quantity数量 s-- steroid甾类steric effect:空间效应stereoselectivity:立体选择性screening:过筛sustain :维持 t-- treat治疗therapy:治疗 u--uniformity目标v--vaccine疫苗

专业英语大作业样本

lesson 10 P1 P2 The mould designer is frequently confronted with a component design that incorporates a recess or projection which prevents the simple removal of the molding from the mould. The mould design for this type of component is inevitably more complex than for the in line of draw component, as it necessitates the removal of that part of the impression which forms the undercut prior to ejection ①. The splits can be incorporated in the mould design in several ways. The designer considers more complex systems where the splits are retained on the mould plate and actuated automatically. There are two basic designs: sliding and angled-lift splits. In both designs there are moving parts and it is necessary to arrange for (i) guiding the splits in the desired direction, (ii) actuating the splits, and (iii) securely locking the splits in position prior to the material being injection into the moul d②. 模具设计师经常面临的一个组成部分的设计,包括凹槽或投影,防止简单去除成型模具。因为脱模前要先抽出形成侧型芯的那部分型腔,这类零件的模具设计比直接脱模的零件复杂的多。 滑块可纳入模具设计的几种方法。设计师认为,更复杂的系统,滑块将自动保留并驱动在模板中。有两个个基本的设计思路:滑动和斜滑块。 在两者的设计中都有活动零件,而且有必要安排:沿着正确方向导向滑块,驱动滑块,在材料注射进模具之前安全地锁紧滑块。 Lesson 1 The injection molding and machine 1.1The injection molding 2Injection molding is principally used for the production of the thermoplastic parts, although some progress has been made in developing a method for injection molding some thermosetting materials. The problem of injecting a melted plastic into a mold cavity from a reservoir of melted material has been extremely difficult to solve for thermosetting plastics which cure and harden under such conditions within a few minute s①. The principle of injection molding is quite similar to that of die-casting. The process consists of feeding a plastic compound in powdered or granular from a hopper through metering and melting stages and then injecting it into a mol d②. After a brief cooling period, the mold is opened and the solidified part ejected. Injection-molding machines can be arranged for manual operation, automatic single-cycle operation, and full automatic operation. The advantage of injection molding are: (i) a high molding speed adapted for mass production is possible; (ii) there is a wide choice of thermoplastic materials providing a variety of useful properties; (iii) it is

相关主题
文本预览
相关文档 最新文档