当前位置:文档之家› 计算机专业英语2

计算机专业英语2

计算机专业英语2
计算机专业英语2

Chapter 002 The Internet, the Web, and Electronic Commerce

Multiple Choice Questions

1. (p. 30) Launched in 1969 as a U.S funded project that developed a national computer network, the Internet was initially called __________.

A. World Wide Web

B. Intranet

C. NSFNet

D. ARPANET

The Internet was originally called Advanced Research Project Agency Network (ARPANET). Difficulty: Hard

2. (p. 30) The Web was introduced in 1991 at

A. National Aeronautics and Space Administration (NASA).

B. Center for European Nuclear Research (CERN).

C. Research Center for Nuclear Physics (RCNP).

D. National Science Foundation (NSF).

The Web was introduced in 1991 in Switzerland, at the Center for European Nuclear Research (CERN).

Difficulty: Medium

3. (p. 30) The Internet is a(an) _____.

A. actual network

B. virtual network

C. multimedia interface

D. domain name

The Internet is the actual physical network. It is made up of wires, cables, and satellites. Difficulty: Medium

4. (p. 30) This enabled graphics, animation, sound, and video to be added to the Internet.

A. Web browser

B. URI

C. Web

D. Sharewares

The Web made it possible to add graphics, animations, sound, or video to Internet resources. Difficulty: Easy

5. (p. 31) The most common way to access the Internet is through

A. an Internet service provider (ISP).

B. an instant messaging (IM) service.

C. an application service provider (ASP).

D. Facebook.

ISPs are already connected to the Internet and provide a path or connections for individuals to access the Internet.

Difficulty: Medium

6. (p. 32) Which of the following is not a well-known browser?

A. Internet Explorer

B. Windows Explorer

C. Safari

D. Google Chrome

Windows Explorer is not a Web browser.

Difficulty: Easy

7. (p. 32) A Web page typically contains _____ which contains the formatting instructions to allow the page to display Internet resources.

A. uniform resource locators (URLs)

B. top-level domain (TLD)

C. Hypertext Markup Language (HTML)

D. hyperlinks

The browser displays the contents of a Web page by reading the Hypertext Markup Language (HTML) code contained in the Web page document.

Difficulty: Medium

8. (p. 32) For browsers to connect to a resource on the Internet, the address of the resource must be specified through addresses called _____.

A. uniform resource locators (URLs)

B. top-level domains (TLDs)

C. Hypertext Markup Language (HTML)

D. hyperlinks

All resources on the Internet are identified by an address called a uniform resource locator (URL).

Difficulty: Hard

9. (p. 32) In the URL "https://www.doczj.com/doc/cd9074674.html,", what is the domain name?

A. https://www.doczj.com/doc/cd9074674.html,

B. https://www.doczj.com/doc/cd9074674.html,

C. simnetonline

D. com

A Web page's URL begins with the protocol (http), followed by the domain name (https://www.doczj.com/doc/cd9074674.html,).

Difficulty: Medium

10. (p. 32) In the URL "https://www.doczj.com/doc/cd9074674.html,", ".com" is the _____.

A. top-level domain (TLD)

B. uniform resource locator (URL)

C. domain name server (DNS)

D. domain name

Top-level domains (TLD) such as .com, .gov, .edu, .mil, and, .net are used to identify the type of organization.

Difficulty: Hard

11. (p. 33) Applets are written in which programming language?

A. AJAX

B. JavaScript

C. HTML

D. Java

Java applets can be downloaded quickly and run by most browsers.

Difficulty: Hard

12. (p. 35) Which one of the following has been difficult to enforce due to the fact that over 50 percent of all spam originates from servers outside the United States?

A. Spam blockers

B. E-mail filter options

C. Photo identity

D. CAN-SPAM Act

The CAN-SPAM Act of 2003 requires that every marketing-related e-mail provide an opt-out option. When the option is selected, the recipient's e-mail address is to be removed from future mailing lists.

Difficulty: Medium

13. (p. 38) One of the fastest-growing uses of the Internet is _____, or connecting individuals to one another.

A. social networking

B. instant messaging

C. e-mail

D. blogging

Social networking is one of the fastest-growing uses of the Internet.

Difficulty: Easy

14. (p. 38) Facebook is an example of what type of social networking site?

A. Friend-of-a-friend site

B. Reuniting site

C. Microblog site

D. Common interest site

Reuniting sites, like Facebook, are designed to connect people who have known one another but have lost touch.

Difficulty: Medium

15. (p. 38) Twitter is an example of what type of site?

A. Wiki

B. Blog

C. Microblog

D. Search

A microblog, like Twitter, publishes short sentences that only take a few seconds to write, rather than long stories or posts like a traditional blog.

Difficulty: Easy

16. (p. 44) Which type of search engine presents a list of topics or categories from which you select subtopics until your search is narrowed to a list of Web sites?

A. Directory search

B. Keyword search

C. Metasearch

D. Reference search

In a directory search, you select a category or topics that fits the information you want, and then narrow your search by selecting subtopics until a list of Web sites appears.

Difficulty: Easy

17. (p. 45) Programs that automatically submit your search request to several search engines simultaneously are called ____.

A. metasearch engines

B. Webcrawlers

C. spiders

D. hits

Metasearch engines are programs that automatically submit your search request to several search engines simultaneously.

Difficulty: Medium

18. (p. 45) Which of these sites is an example of a metasearch engine?

A. Google

B. Dogpile

C. Ask

D. Medscape

Dogpile is one of the best known metasearch engines.

Difficulty: Hard

19. (p. 47) This type of e-commerce often resembles the electronic version of the classifieds ads or an auction.

A. B2C

B. C2C

C. C2B

D. B2B

Consumer-to-consumer (C2C) involves individuals selling to individuals. This often takes the form of an electronic version of the classified ads or an auction.

Difficulty: Medium

20. (p. 47) Online banking is an example of what type of e-commerce?

A. B2C

B. C2C

C. C2B

D. B2B

Online banking is one of the most widely used Business-to-Consumer (B2C) e-commerce applications.

Difficulty: Medium

21. (p. 49) Which of these applications is a Web-based application?

A. QuickTime

B. BitTorrent

C. Google Apps

D. PayPal

Google Apps provides free online access to programs with similar capabilities to Microsoft's Word, Excel, and PowerPoint.

Difficulty: Medium

22. (p. 50) Programs that automatically start and operate as a part of your browser are called

A. plug-ins.

B. readers.

C. pop-ups.

D. ActiveX Controls.

Plug-ins are programs that automatically start and operate as a part of your browser.

Difficulty: Easy

23. (p. 48) Parents can use this type of program to block access to selected Web sites.

A. Plug-in

B. FTP

C. BitTorrent

D. Filter

Filters are programs that can monitor use and generate reports detailing the total time spent on the Internet and the time spent at individual Web sites, chat groups, and newsgroups. Difficulty: Medium

24. (p. 51) This method of file transfer has been used for decades and is frequently used for uploading changes to a Web site hosted by an Internet service provider.

A. ASP

B. FTP

C. BitTorrent

D. drop.io

File transfer protocol (FTP) has been used for decades and still remains one of the most popular methods of file transfer.

Difficulty: Medium

25. (p. 51) This method of file transfer distributes file transfers across many different computers.

A. ASP

B. FTP

C. BitTorrent

D. drop.io

BitTorrent distributes file transfers across many different computers for more efficient downloads.

Difficulty: Hard

True / False Questions

26. (p. 30) The Internet connects millions of computers and resources across the world via wires, cables, and satellite.

TRUE

The Internet is the actual physical network. It is made up of wires, cables, and satellites. Difficulty: Easy

27. (p. 30) The Internet and the Web are the same.

FALSE

It is easy to get the Internet and the Web confused, but they are not the same thing. The Internet is the actual network made up of wires, cables, and satellites. The Web is a multimedia interface to the resources available on the Internet.

Difficulty: Medium

28. (p. 31) Users can access the Internet from almost anywhere within a country for a standard fee through national service providers.

TRUE

Users can access the Internet from almost anywhere within the country for a standard fee without incurring long-distance telephone charges.

Difficulty: Easy

29. (p. 32) In order to connect to a Web site, the browser must know only the site's domain name.

FALSE

For browsers to connect to Internet resources, the location or address of the resources must be specified via the URL, which is made up of the protocol and the domain name.

Difficulty: Hard

30. (p. 33) Web pages that contain hypertext markup language commands are typically written in Java.

FALSE

Some Web pages contain Applets, special programming used to add interest and activity. Applets are written in the Java programming language.

Difficulty: Hard

31. (p. 34) Shopping is the most popular Internet activity.

FALSE

Communication is the most popular Internet activity.

Difficulty: Easy

32. (p. 34) Internet communications include e-mail, instant messaging, social networking, blogs, and wikis.

TRUE

Popular types of Internet communications include e-mail, instant messaging, social networking, blogs, and wikis.

Difficulty: Easy

33. (p. 34) E-mail headers usually contain the addresses, subject, and attachments.

TRUE

The e-mail header appears first and typically includes the addresses of the sender, the recipient, and anyone who receives a copy as well as the subject of the e-mail and any attachments.

Difficulty: Easy

34. (p. 35) Attachments to e-mail messages are always safe to open.

FALSE

Unsolicited e-mail may contain computer viruses or other destructive programs. You should never open an e-mail attachment from someone you don't know.

Difficulty: Easy

35. (p. 35) The CAN-SPAM Act has proven to be more effective than spam blockers at preventing unwanted e-mail.

FALSE

The CAN-SPAM Act has had minimal impact since over 50 percent of all spam originates from servers outside the United States.

Difficulty: Hard

36. (p. 38) Instant messaging is text only.

FALSE

Most instant messaging programs include video conferencing features, file sharing, and remote assistance in addition to text capabilities.

Difficulty: Medium

37. (p. 36) drop.io is an example of a social networking site.

FALSE

drop.io is an example of a Web-based file transfer service. Social networking sites such as Facebook, MySpace, and LinkedIn, connect individuals to one another.

Difficulty: Medium

38. (p. 38) Social networking sites only connect individuals who already know each other. FALSE

While reuniting sites such as Classmates Online and Facebook are designed to reconnect people who know each other but have lost touch, other friend-of-a-friend sites like Friendster and MySpace and common interest sites like Flikr and Meetup are designed to bring together people who may not have known each other previously.

Difficulty: Easy

39. (p. 43) A keyword search results in a list of hits.

TRUE

In a keyword search, you enter a keyword or phrase reflecting the information you want. The search engine compares your entry against its database and returns a list of hits.

Difficulty: Easy

40. (p. 44) Using more than one search engine when researching an important topic is not necessary.

FALSE

A recent study by the NEC Research Institute found that any one search engine includes only a fraction of the informational sources on the Web. Therefore, it is highly recommended that you use more than one search engine when researching important topics. Difficulty: Medium 41. (p. 45) To evaluate information you find on the Web, you must consider four factors: authority, accuracy, objectivity, and graphical representation.

FALSE

To evaluate the usefulness of information you find on the Web, you must consider the site's authority, accuracy, objectivity, and currency.

Difficulty: Hard

42. (p. 48) The biggest hurdle for the growth of e-commerce is the evolution of fast, secure, and reliable payment methods for buying goods.

TRUE

The single greatest challenge for e-commerce is the development of fast, secure, and reliable payment methods for purchasing goods.

Difficulty: Easy

43. (p. 47) RealPlayer and Acrobat Reader are classified as plug-ins programs.

TRUE

RealPlayer and Adobe Acrobat Reader are both plug-in programs.

Difficulty: Medium

44. (p. 49) Web utilities are programs used to create Web pages.

FALSE

Web utilities are specialized utility programs that make using the Internet easier and safer. Difficulty: Medium

45. (p. 51) Uploading is the process of copying a file from a Web site to your computer. FALSE

Downloading is the process of copying a file from a Web site to your computer. Uploading is the process of copying a file from your computer to another computer on the Internet. Difficulty: Easy

Fill in the Blank Questions

46. (p. 32) Google Chrome is an example of a Web _____.

browser

Google Chrome is a Web browser.

Difficulty: Easy

47. (p. 32) The protocol _____ is used for Web traffic and is the most widely used Internet protocol.

http

Protocols are rules for exchanging data between computers. The protocol http is the most widely used Web protocol.

Difficulty: Hard

48. (p. 32) In the URL "https://www.doczj.com/doc/cd9074674.html,", "https://www.doczj.com/doc/cd9074674.html," is the _____ name. domain

A Web page's URL begins with the protocol (http), followed by the domain name (https://www.doczj.com/doc/cd9074674.html,).

Difficulty: Medium

49. (p. 32) HTML stands for _____.

Hypertext Markup Language

Hypertext Markup Language (HTML) contains the formatting instructions telling the Web browser how to display the Web page.

Difficulty: Hard

50. (p. 32) A _____ is a link on a Web page that leads to another Web page.

hyperlink

Hyperlinks connect to other Web pages or documents containing related information (including text files, graphics, audio, and video clips).

Difficulty: Medium

51. (p. 33) Special Web browsers called _____ browsers are designed to run on portable devices such as cell phones.

mobile

Mobile browsers are designed to run on portable devices such as cell phones.

Difficulty: Hard

52. (p. 34) The typical e-mail has three basic elements: _____, message, and signature.

header

A typical e-mail message has three basic elements: header, message, and signature.

Difficulty: Easy

53. (p. 34) Unwelcome e-mail is called _____.

spam

Americans receive billions of unwanted and unsolicited e-mails every year. This unwelcome e-mail is called spam.

Difficulty: Easy

54. (p. 38) Some software companies have started providing _______ instant messenger programs that support communication with other instant messaging services.

universal

Many instant messaging services do not support communication with other services. However, some services have started providing universal instant messenger programs that support communication with others.

Difficulty: Hard

55. (p. 39) A _______ publishes short sentences that only take a few seconds to write. microblog

A microblog publishes short sentences that only take a few seconds to write, rather than long stories or posts like a traditional blog.

Difficulty: Medium

56. (p. 39) The most popular microblogging site is _______.

Twitter

Twitter is the most popular microblogging site.

Difficulty: Easy

57. (p. 42) A _______ is a Web site specially designed to allow visitors to fill in missing information or correct inaccuracies.

wiki

Wikis support collaborative writing in which there isn't a single expert author, but rather a community of interested people that builds knowledge over time.

Difficulty: Medium

58. (p. 42) "Wiki" comes from the Hawaiian word for _______.

fast

"Wiki" comes from the Hawaiian word for fast, which describes the simplicity of editing and publishing through wiki software.

Difficulty: Hard

59. (p. 44) A ______ search provides a list of categories or topics as a starting point for your search.

directory

In a directory search, you begin by selecting a category or topic that fits the information that you want. Then you continue to narrow your search by selecting subtopics, until a list of Web sites appears.

Difficulty: Medium

60. (p. 45) https://www.doczj.com/doc/cd9074674.html, is an example of a _____ search engine.

specialized

Specialized search engines focus on subject-specific Web sites.

Difficulty: Medium

61. (p. 46) When evaluating a Web site's content, whether or not the information is up to date is considered part of the _____ element.

currency

A Web site's "currency" is how up to date the site's information is. One way to tell is to check to see if the site specifies the date when the site was updated.

Difficulty: Hard

62. (p. 48) _____ are criminals who specialize in stealing, trading, and using stolen credit cards over the Internet.

Carders

Criminals known as carders specialize in stealing, trading, and using stolen credit cards over the Internet.

Difficulty: Medium

63. (p. 51) Copying files from a Web site to your computer is called _____.

downloading

Using file transfer utility software, you can copy files to your computer from specially configured Web servers. This is called downloading.

Difficulty: Easy

64. (p. 52) A _____ is a collection of utility programs designed to maintain your security and privacy while you are on the Web.

Internet security suite

An Internet security suite is a collection of utility programs designed to maintain your security and privacy while you are on the Web.

Difficulty: Medium

65. (p. 52) Knowledge of HTML is considered essential for the job of a _____.

Webmaster

Employers look for candidates with a bachelor's degree in computer science or information systems and knowledge of common programming languages and Web development software. Knowledge of HTML is considered essential.

Difficulty: Medium

Essay Questions

66. (p. 30) Describe the evolution of the Internet and Web.

The Internet was launched in 1969 when the United States funded a project to develop a national computer network called Advanced Research Project Agency Network (ARPANET). The Internet is a large network that connects together smaller networks all over the globe. Initially, the Internet was all text – no graphics, animations, sound, or video. The Web was introduced in 1991 at the Center for European Nuclear Research (CERN) in Switzerland and added a multimedia interface to the resources available on the Internet.

Difficulty: Easy

计算机英语第三版课文翻译

第一单元:计算机与计算机科学 课文A:计算机概览 一、引言 计算机是一种电子设备,它能接收一套指令或一个程序,然后通过对数字数据进行运算 或对其他形式的信息进行处理来执行该程序。 要不是由于计算机的发展,现代的高科技世界是不可能产生的。不同类型和大小的计算 机在整个社会被用于存储和处理各种数据,从保密政府文件、银行交易到私人家庭账目。计 算机通过自动化技术开辟了制造业的新纪元,而且它们也增强了现代通信系统的性能。在几 乎每一个研究和应用技术领域,从构建宇宙模型到产生明天的气象报告,计算机都是必要的 工具,并且它们的应用本身就开辟了人们推测的新领域。数据库服务和计算机网络使各种各 样的信息源可供使用。同样的先进技术也使侵犯个人隐私和商业秘密成为可能。计算机犯罪 已经成为作为现代技术代价组成部分的许多风险之一。 二、历史 第一台加法机是法国科学家、数学家和哲学家布莱斯.帕斯卡于1642年设计的,它是数 字计算机的先驱。这个装置使用了一系列带有10个齿的轮子,每个齿代表从0到9的一个数字。轮子互相连接,从而通过按照正确的齿数向前转动轮子,就可以将数字彼此相加。17世纪70 年代,德国哲学家和数学家戈特弗里德.威廉.莱布尼兹对这台机器进行了改良,设计了一台 也能做乘法的机器。 法国发明家约瑟夫―玛丽.雅卡尔,在设计自动织机时,使用了穿孔的薄木板来控制复 杂图案的编织。在19世纪80年代期间,美国统计学家赫尔曼.何勒里斯,想出了使用类似雅 卡尔的木板那样的穿孔卡片来处理数据的主意。通过使用一种将穿孔卡片从电触点上移过的 系统,他得以为1890年的美国人口普查汇编统计信息。 1、分析机 也是在19世纪,英国数学家和发明家查尔斯.巴比奇,提出了现代数字计算机的原理。 他构想出旨在处理复杂数学题的若干机器,如差分机。许多历史学家认为,巴比奇及其合伙 人,数学家奥古斯塔.埃达.拜伦,是现代数字计算机的真正先驱。巴比奇的设计之一,分析 机,具有现代计算机的许多特征。它有一个以一叠穿孔卡片的形式存在的输入流、一个保存 数据的“仓库”、一个进行算术运算的“工厂”和一个产生永久性纪录的打印机。巴比奇未 能将这个想法付诸实践,尽管在那个时代它在技术上很可能是可行的。 2、早期的计算机 模拟计算机是19世纪末开始制造的。早期型号是靠转动的轴和齿轮来进行计算的。用任 何其他方法都难以计算的方程近似数值,可以用这样的机器来求得。开尔文勋爵制造了一台 机械潮汐预报器,这实际上就是一台专用模拟计算机。第一次和第二次世界大战期间,机械 模拟计算系统,以及后来的电动模拟计算系统,在潜艇上被用作鱼雷航线预测器,在飞机上 被用作轰炸瞄准具的控制器。有人还设计了另一个系统,用于预测密西西比河流域春天的洪 水。 3、电子计算机 第二次世界大战期间,以伦敦北面的布莱切利公园为工作地点的一组科学家和数学家, 制造了最早的全电子数字计算机之一:“巨人”。到1943年12月,这个包含了1500个真空管 的“巨人”开始运转了。它被以艾伦.图灵为首的小组用于破译德国用恩尼格码加密的无线 电报,他们的尝试大部分是成功的。 除此而外,在美国,约翰.阿塔纳索夫和克利福德.贝里早在1939年就在艾奥瓦州立学院

计算机专业英语教程(第四版)习题答案

计算机专业英语教程(第四版)习题答案
计算机专业英语(第四版)课后习题答案 Unit 1 [Ex 1] Fb5E2RGbCAP [Ex 2] 1. input, storage, processing, and output 2. power; speed; 1. F 2. T 3. T 4. F 5. T 6. T 7. T 8. T 9. T 10.
memoryp1EanqFDPw 3. central processing unit memoryDXDiTa9E3d 5. keyboard; [Ex 3] B. A. central processing unit; 1. F 2. D 2. monitor 3. G 4. C 5. B main memory; 6. A 7. E monitorRTCrpUDGiT 8. H5PCzVD7HxA 4. internal; primary;
1. user
3. data
4. keyboard
5. data processingjLBHrnAILg
6. information [Ex 4] instructions
7. computer
8. memory 3. manipulates 4.
1. input device 2. screen, screen 5. retrievexHAQX74J0X 8. Function
6. code 7. hard copy
[Ex. 5] 新处理器开始 IT 技术的新时代 New Processors Open New Era of IT Technologies Last week, Intel introduced to the public in Russia and other CIS countries a family of processors Intel Xeon E5-2600. They are more powerful and reliable and, importantly, are very economical in terms of energy consumption. Their
1 / 30

计算机专业英语翻译

国家计算机教育认证 计算机英语 计算机英语词汇对译 蒙阴高新电脑学校 资料整理:孙波 IT CFAC gaoxindiannaoxuexiao

2010年9月1日

?PC personal computer 个人计算机 ?IBM International Business Machine 美国国际商用机器公司的公司简称,是最早推出的个人 计算机品牌。 ?Intel 美国英特尔公司,以生产CPU芯片著称。 ?Pentium Intel公司生产的586 CPU芯片,中文译名为“奔腾”。 ?Address地址 ?Agents代理 ?Analog signals模拟信号 ?Applets程序 ?Asynchronous communications port异步通信端口 ?Attachment附件 ?Access time存取时间 ?access存取 ?accuracy准确性 ?ad network cookies广告网络信息记录软件 ?Add-ons 插件 ?Active-matrix主动矩阵 ?Adapter cards适配卡 ?Advanced application高级应用 ?Analytical graph分析图表 ?Analyze分析 ?Animations动画 ?Application software 应用软件 ?Arithmetic operations算术运算 ?Audio-output device音频输出设备 ?Basic application基础程序 ?Binary coding schemes二进制译码方案 ?Binary system二进制系统 ?Bit比特 ?Browser浏览器 ?Bus line总线 ?Backup tape cartridge units备份磁带盒单元 ?Business-to-consumer企业对消费者 ?Bar code条形码 ?Bar code reader条形码读卡器 ?Bus总线 ?Bandwidth带宽 ?Bluetooth蓝牙 ?Broadband宽带 ?Business-to-business企业对企业电子商务 ?cookies-cutter programs信息记录截取程序 ?cookies信息记录程序

计算机专业英语作文

计算机专业英语 系别:数学系 班级:11级计算机二班姓名:徐小凤学号:110312248

Robot Competition From 11th to 13th October 2013, these three days are special for my teammates and me. I took part in the fifth Robot Competition of Anhui province. After continuous efforts, we got the third prize in the end. In April 2013, this competition was announced in our class by Mr He. In that moment, many students registered for the competition. After hardly training, there were only fifteen students remaining. We were divided into five teams. Each included three people. There were three teams taking part in wheel type robot competition (or named intelligent car). And the other two majored in dancing robot. My two roommates and I engaged in the designing of robot dance. We controlled the robots by program. But the program was programmed in BASIC, which is a high level programming language. The problem was that we had never touched to that language besides C or C++. So, we must learn the language before designing the action. It seemed difficult but we had never lost our courage. After seeking enough data from the Internet and the library, we spent about a few weeks to learn it. When we felt the fundamental grammar was easy, we began to design the dancing action. That was the most important and most difficult part. We spent much time on

计算机专业英语的课文与翻译

Unit 8 Computer Networking Text 1 Data Communications The end equipment can be computers, printers, keyboards, CRTs, and so on.They are either generates the digital information for transmission or uses the received digital data. This equipment generally operates digital information internally in word units. DTE is data terminal equipment. A station controller (STACO)is the corresponding unit at the secondaries. At one time, the DTE was the last piece of equipment that belonged to the subscriber in a data link system. Between the DTEs, first is the modem, and then is the communications equipment. The communication equipment is owned and maintained by Telco. Data communications equipment (DCE) accepts the serial data stream from the DTE. And DCE converts it to some form of analog signal suitable for transmission on voice-grade lines. At the receive end, the DCE performs the reverse function. It converts the received analog signal to a serial digital data stream. The simplest form of DCE is a modem (modulator/demodulator) or data set. At the transmit end, the modem can be considered a form of digital-to-analog converter.While at the receive end, it can be considered a form of analog-to-digital converter. 参考译文 数据通信 终端设备可以是计算机、打印机、键盘、CRT等。它们可以生成要发送的数字信息,也可以使用所接收的数字数据。这种设备通常在内部以字为单位处理数字信息。 DTE一般称为数据终端设备。辅助设备一方的相应设备是工作站控制器(STACO)。同时,DTE也是数据链路系统中属于用户端的最后一个设备。在两个DTE之间,先是调制解调器,接着是属于Telco电话公司维护的通信设备。数据通信设备(DCE)从DTE接收串行数据流,并将其转换成适合于在语音线路上发送的某种模拟信号形式。在接收端,DCE完成相反的功能,把接收到的模拟信号转换成串行数字数据流。最简单的DCE是调制解调器或数据传送机。在发送端,调制解调器可以视为一种数/模转换器,而在接收端则可视为一种模/数转换器。 Text 2 Architecture of Computer Networks Computer network is a complex unit, it consists of two or more connected computing units. It is used for the purpose of data communication and resource sharing. Design of a network and its logical structure should comply with a set of design principles. They include: the organization of functions, the description of data formats and procedure. In the following two sections we will discuss two important network architectures, the OSI reference model and the TCP/IP reference model. (1)the OSI reference model The OSI (open systems interconnection) model was created by the ISO. This model is a foundation for comparing protocols; However, more protocols deviate from the rules set up by the OSI model. The OSI model has seven layers. Note that the OSI model itself is not a network architecture.

计算机专业英语2008影印版选择题的翻译加答案

CHAPTER 1 1、A common term that describes the combination of traditional computer and communication technologies is b. information technology 一个描述了传统的计算机和通信技术结合的常见的术语 B.信息技术 2、Procedures are typically documented in manuals written by b. computer specialists 程序一般是___在手册撰写记录的 B.计算机专家 3、Which of the following is an example of connectivity? a. Internet 下列哪一项是连接的一个例子吗? A.互联网 4、Windows XP, windows Vista, and Macintosh OS X are all examples of b. operating systems Windows XP,Windows Vista,和Macintosh OS X都是__的例子 B.操作系统 5、Because of their size and cost, these computers are relatively rare. d. supercomputers 由于它们的尺寸和成本,这些电脑是比较少见的。 D.超级计算机 6、The system component that controls and manipulates data in order to produce information is called the d. microprocessor 系统组成,控制和操纵数据来产生信息称为 D.微处理器 7、A system component that translates data and programs that humans can understand into a form that the computer can process is called a(n) c. output device 一个系统组件,将人类可以理解成计算机能够处理的形式的数据和程序被称为 C.输出设备 8、A CD is an example of a(n) c. optical disc CD是___的简称 C.光盘 9、If you want to communicate a message or persuade other people, you would typically use this type of software. d. presentation 如果你想传达信息或说服别人,你通常会使用这种类型的软件。 D.演示 10、Many experts are predicting that this revolution is expected to dramatically affect the way we communicate and use computer technology. d. wireless

计算机专业英语报告

1.英语学术论文的语言风格特点就(知人方能论世) 为什么我们会读不懂SCI上面的文章呢? 第一,由于SCI里面出现的专业词汇一般都是出现在特定领域,一类是一词对应于一意,另外一类则是一词多义。 其次,名词化结构则是另外另外一个普遍出现的现象,可以看到,复合名词,加前缀和后缀,以及省略现象可谓是漫山遍野,因为文体要求行文简洁、表达客观、内容确切、信息量大、强调存在的事实,一般文章不会夹杂着太多主观看法。 最后,大量使用长句和定语从句SCI论文发表中大量使用长句和定语从句,在论证上起到连接信息和强调信息的作用。广泛使用被动语态SCI论文发表中侧重叙事推理,强调客观准确,第一、二人称使用过多,会造成主观臆断的印象。因此尽量使用第三人称叙述,采用被动语态。名词作定语和缩写词使用频繁SCI论文发表中要求结构紧凑、行文简炼,缩写词和名词作定语的频繁使用,增大了信息密度,简化了句型。 如果我们能逆向思维,转换个角度去看文章,如果你要发表一篇SCI论文,你会怎么去构造你的行为,你如何组织你文章的逻辑,特别是用词方面,口语和一些狸语在一般

情况不应该出现在文章中。还有些中式英语也会极大地影响我们的阅读,例如说足球比赛,可不是我们想象中的football match (之前有次演讲说,英语里面不能有2个名词的情况,在此就举了个例子bicycle man),而应该做football play亦作soccer play。 2.翻译是一门艺术,从某种意义上来讲是没有标准答案的。 这里本人想要想要阐述这样一种观点,翻译是一个不断精进的过程,翻译最初的目的即是为了实现语言之间的一个互相沟通,然而不同的人对一句话,应该会有着不同的理解。这也就有了译者极大的自由发挥性,但是译者必须准确理解原文的基础之上的。 有三个字可以高度概括翻译的精髓“信,达,雅”,想必大家都应该听过。”“信”指意义不背原文,即是译文要准确,不歪曲,不遗漏,也不要随意增减意思;同样可以举个例子?This is a pan in my hand (请问如何翻译呢?) “达”指不拘泥于原文形式,译文通顺明白;这里就涉及到一个直译和意译的关系啦,否则就会出现像bicycle

计算机专业英语全部答案(第三版)

计算机专业英语全部答案(第三版)

Unit1 EX1 1 F 2 T 3 T 4 F 5 T 6 F 7 T 8 T 9 T 10F EX2 Input hardware, storage hardware, processing hardware, output hardware power, speed, memory central processing unit internal, primary, memory keyboard, central processing unit, main memory, monitor EX3 PARTA 1 F 2 D 3 G 4 C 5 B 6 A 7 E 8 H EX3 PART B 1 F 2 E 3 G 4 B 5 A 6 C 7D 8 H EX4 1 input device 2 screen 3 manipulates 4 instructions 5 retrieve 6 codes 7 hardcopy 8 function EX5 1 T 2 T 3 F 4 F 5 T 6 F 7 T 8 T

UNIT2 EX1 1 T 2 F 3 T 4 F 5 T 6 F 7 T 8 F EX2 1 sizes, shapes, processing capabilities 2 supercomputers, mainframe computers, minicomputers, microcomputers 3 mainframe computer 4 microcomputer, storage locations 5 portables, laptop computers, desktop workstations 6 semiconductor 7 CPU, memory, storage, devices, processing, users 8 microprocessor chip EX3 PARTA 1 C 2 A 3 H 4 I 5 E 6 F 7 G 8 J EX3 PARTB 1 capacity 2 device 3 laptop computer 4 Portable computers 5 Silicon 6 semiconductor 7 workstation 8 Voltage, voltage 9 RAM 10ROM EX4 1 portable 2 access 3 main memory

计算机专业英语课文翻译部分(第四版)

1.2 总线互连 总线是连接两个或多个设备的通信通路。总线的关键特征是,它是一条共享传输介质。多个设备连接到总线上,任一个设备发出的信号可以为其他所有连接到总线上的设备所接收。如果两个设备同时传送,它们的信号将会重叠,引起混淆。因此,一次只能有一个设备成功地(利用总线)发送数据。 典型的情况是,总线由多条通信通路或线路组成,每条线(路)能够传送代表二进制1和0的信号。一段时间里,一条线能传送一串二进制数字。总线的几条线放在一起能同时并行传送二进制数字。例如, 一个8位的数据能在8条总线线上传送。 计算机系统包含有多种不同的总线,它们在计算机系统层次结构的各个层次提供部件之间的通路。连接主要计算机部件(处理机, 存储器, I/O)的总线称为系统总线。系统总线通常由50~100条分立的(导)线组成。每条线被赋予一个特定的含义或功能。虽然有许多不同的总线设计,但任何总线上的线都可以分成三个功能组:数据线、地址线和控制线。此外可能还有为连接的模块提供电源的电源线。 数据线提供系统模块间传送数据的路径,这些线组合在一起称为数据总线。典型的数据总线包含8、16或32根线,线的数量称为数据总线的宽度。因为每条线每次传送1位,所以线的数目决定了每次能同时传送多少位。数据总线的宽度是决定系统总体性能的关键因素。 地址线用于指定数据总线上数据的来源和去向。例如,如果处理机希望从存储器中读一个字的数据,它将所需要字的地址放在地址线上。显然,地址总线的宽度决定了系统最大可能的存储器容量。 控制线用来控制对数据线和地址线的访问和使用。由于数据线和地址线被所有部件共享,因此必须用一种方法来控制它们的使用。控制信号在系统模块之间传送命令和定时信息。定时信息指定了数据和地址信息的有效性,命令信号指定了要执行的操作。 大多数计算机系统使用多总线,这些总线通常设计成层次结构。图1.3显示了一个典型的高性能体系结构。一条局部总线把处理机连接到高速缓存控制器,而高速缓存控制器又连接到支持主存储器的系统总线上。高速缓存控制器集成到连接高速总线的桥中。这一总线支持连接到:高速LAN、视频和图形工作站控制器,以及包括SCSI 和FireWire的局部外设总线的接口控制器。低速设备仍然由分开的扩充总线支持,用一个接口来缓冲该扩充总线和高速总线之间的通信流量。 PCI 外部设备互连是流行的高带宽的、独立于处理机的总线,它能够作为中间层或外围设备总线。当前的标准允许在66MHz频率下使用多达64根数据线,其原始传输速率为528MB/s, 或4.224Gbps。PCI被设计成支持各种各样基于微处理机的配置,包括单处理机和多处理机的系统。因此,它提供了一组通用的功能。PCI使用同步时序以及集中式仲裁方案。 在多处理机系统中,一个或多个PCI配置可通过桥接器连接到处理机的系统总线上。系统总线只支持处理机/高速缓存单元、主存储器以及PCI桥接器。使用桥接器使得PCI独立于处理机速度,又提供快速接收和传送数据的能力。 2.1 光存储介质:高密度存储器 2.1.1 光盘 光盘技术最终可能使磁盘和磁带存储淘汰。用这种技术,磁存储器所用的读/写头被两束激光代替。一束激光通过在光盘上刻制微小的凹点,对记录表面进行写;而另一束激光用来从光敏感的记录表面读取数据。由于光束容易被偏转到光盘上所需要的位置,所以不需要存取臂。 对用户而言,光盘正成为最有吸引力的选择。它们(光盘)对环境变化不太敏感,并且它们以每兆字节比磁盘低得多的存储器价格提供更多的直接存取存储器。光盘技术仍在出现,并且还需要稳定;然而,目前有三种主要类型的光盘。它们是CD-ROM、WORM盘和磁光盘。 CD-ROM 1980年引入的,非常成功的CD,或紧密盘是设计来提高音乐的录音重放质量的光盘。为了制作一张CD,把音乐的模拟声音转换成等价的数字声音,并且存储在一张4.72英寸的光盘上。在每张光盘上可以用数字格式(用20亿数字位)记录74分钟的音乐。因为它的巨大存储容量,计算机工业的企业家们立刻认

《计算机英语(第3版)》练习参考答案(5-8)

Unit Five: Software Process Unit Five/Section A I. Fill in the blanks with the information given in the text: 1. off-the-shelf 1 2. exclusive 2 3. cascade 3 4. requirements; integration 4 5. throwaway 5 6. immediate; stable 67. reuse-oriented; framework 78. software; compromises II. Translate the following terms or phrases from English into Chinese and vice versa: 1 1. system specification 系统规格说明 2 2. unit testing 单位(或单元、部件)测试 3 3. software life cycle 软件生命周期(或生存周期) 4 4. system validation testing 系统验证测试 5 5. evolutionary development process 演化开发过程 6 6. simple linear model 简单线性模型 77. program unit 程序单元 88. throwaway prototype 抛弃式原型 99. text formatting 正文格式编排,文本格式化 1010. system evolution 系统演变 1111. 系统设计范例system design paradigm 1212. 需求分析与定义requirements analysis and definition 1313. 探索式编程方法exploratory programming approach 1414. 系统文件编制system documentation 1515. 瀑布模型waterfall model 1616. 系统集成system integration 1717. 商用现成软件commercial off-the-shelf ( 或COTS) software 1818. 基于组件的软件工程component-based software engineering (CBSE) 1919. 软件维护工具software maintenance tool 2020. 软件复用software reuse III. Fill in each of the blanks with one of the words given in the following list, making changes if necessary: There are three different types of software maintenance. Firstly, there is maintenance to repair software faults. Coding errors are usually relatively cheap to correct; design errors are more expensive as they may involve rewriting several program components. Requirements errors are the most expensive to repair because of the extensive system redesign that may be necessary. Secondly, there is maintenance to adapt the software to a different operating environment. This type of

计算机专业英语翻译

计算机专业英语翻译 1.1细看处理器与主存储器 我们已经了解到所有计算机有类似的能力且能执行相同的功能,尽管一些可能比其他的快。我们知道电脑系统有输入、输出、仓储、加工的元件,还知道处理器是计算机系统的“智能”部分,并且知道一个简单的计算机系统可以有几个处理器。我们已经讨论了在电脑系统中数据以被称作位的电子状态来表示。我们现在准备阐释计算机系统核心的内部活动——处理器。 电脑的内部操作很有趣,但真的没有什么奥秘的事。这种神秘性存在于那些道听途说和相信科幻作家的人心中。计算机是不会思考的电子设备,它必须插入电源,就像一台烤面包机或一盏灯。 毫不夸张地讲,市场上有几百种不同类型的计算机在销售。每种类型可能都很复杂,但每个处理器,有时被称为中央处理器或者说CPU,只有两个基本部分:控制单元,算术和逻辑单元。主存储器在处理器的内部发挥着重要作用。这三个——主存、控制单元,算术和逻辑单元——一起工作。让我们来看看他们之间的功能和联系。 与磁辅助存储设备,如磁带、磁盘相比,主存没有移动部件。没有机械的运动,数据可以以电子的速度被存取访问,接近光速。今天大多数电脑的主存使用 DRAM(动态随机访问存储器)技术。先进的DRAM芯片大约有1/8邮票那么大,大约可以储存256,000万位或多于25,600,000字符的数据。 主存储器,或者主存,提供给处理器的程序和数据暂时的存储。在可执行程序或数据 本材料版权归八舍109所有,任何人以任何形式使用请自觉支付版税~

可以被处理之前,所有的程序和数据必须被从输入设备(如VDT)或从辅助存储(如磁盘)转移到主存储器。主要的存储空间总是很少;因此,在一个程序被执行后,它占领的储藏空间会被重新分配给另一个等待执行的程序。 图1 - 1说明了所有的输入/输出(I / O)“读”或“用”主要的存储。图中(输入)探讨是在VDT上。消息被查询的形式,是通过一个渠道到主存储器(如同轴电缆)。消息被解释,处理机从辅助存储设备取出所需的程序和数据。程序和数据被“装好”,或移动,从辅助存储器到主存储器。这是一个无损阅读过程。也就是说,程序和数据被从主要存储器(暂时的)和辅助存储器(永久)中读取。数据根据程序指令被操作,报告被从主存储器写入到打印机。 一个程序指令或一块数据保存在的特定的主存单元被称为地址。地址允许程序指令和数据被存储,访问和加工。每一个地址的内容随着不同程序的执行和新的数据的处理是不断变化的。 主存储器的另一个名字是随机存取存储器,或RAM。一种特殊类型的主存储器,称为只读存储器(ROM),不能被程序员改写。ROM的内容被制造商作为“只读”所固化,设计在芯片的逻辑上,。当你打开微机系统,一个ROM中的程序自动启动计算机系统。然后ROM程序初步显示屏幕提示。 ROM的一种变种是可编程的只读存储器(PROM)。RPOM是让用户能装载“只读”的程序和数据的ROM。一旦一个程序被加载到PROM,它简直从不改变。然而,如果你本材料版权归八舍109所有,任何人以任何形式使用请自觉支付版税~ 需要能够修改内容的PROM,有EPROM,可擦写的PROM。在写操作之前,所有的储存单元必须被删除到同样的初始状态。 一个更具有吸引力的形式的主读存储器是电可擦可编程只读存储器(EEPROM)。在任何时候都可以写入,不需擦除原先内容,且只是更新寻址到的字节或多个字节。

计算机专业英语

计算机专业英语

?PC (Personal Computer) 个人计算机 ?CPU (Central Processing Unit) 中央处理器 ?RAM (Random-Access memory) 随机存储器 ?ROM (Read-Only Memory) 只读存储器 ?BIOS (Basic Input/Output System) 基本输入输出系统 ?IDE (Integrated Drive Electronics) 智能磁盘设备 ?PCI (Peripheral Component Interconnect) 外部设备接口 ?SCSI (Small Computer System Interface) 小型计算机系统接口 ?CD-ROM (Compact Disc, Read-Only Memory) 只读光盘 ?EEPROM (Electrically Erasable Programmable Read-Only Memory) ?电可擦除只读存储器 ?DVD-ROM (Digital Versatile Disc, Read-Only Memory) ?只读数字化视频光盘 ?USB (Universal Serial Bus) 通用串行总线 ?LAN (Local Area Network) 局域网 ?DSL (Digital Subscriber Line) 数字线用户 ?VDSL (Very high bit-rate DSL) 甚高位率数字线用户 ?POST (Power-On Self-Test) 开机自检 ?TFT(Thin-Film Transistro) 薄膜晶体管 ?LCD(Liquid Crystal Display) 液晶显示屏 ?CRT(Cathode Ray Tube) 阴极射线管 ?DLP(Digital Light Processing) 数字光处理技术 ?LCoS(Liquid Crystal On Silicon) 硅基液晶(也缩写为LCOS) ?SED(Surface-conduction Electron-emitter Display) 表面传导电子发射显示?OLED(Organic Light-Emitting Diode) 有机发光二极管 ?PDP(Plasma Display Panel) 等离子显示器

计算机英语_学生用书(第二版)姜同强_翻译

翻译:计算机英语(第二版)姜同强——第一章 第1 章计算机系统概述 数字计算机也称为电子计算机或计算机.它无处不在.很难发现有哪个领域没有使用计算机.在本章中.我们将介绍数字计算机、数据类型、计算机的发展和计算机分类, 1 . 1 数字计算机 数字计算机是处理各种计算任务的数字系统.“数字”的意思是计算机中的信息可由具有部分离散值的变量来表示,这些离散值的内部处理是由具有部分离散状态的部件完成的.例如.十进制数字O , l , 2 ,… 9 .即提供了10 个离散值。第一台电子数字计算机产生于20 世纪40年代末,它主要用于数值计算,那时的离散元素即为数字.为了进行数值计算而产生了数字计算机.实际上.如果只使用两种状态.数字计算机的性能将更可靠。因为部件的物理约束和人们的逻辑处理需要.所以数字计算机使用具有两种值的离散数据.这种数据称为二进制。 数字计算机使用只有数字O 和l 的二进制数据系统.一个二进制数字称作位.在数字计算机中用一组二进制表示信息。应用各种编码技术.一组二进制数字不但可以表示二进制数据,而且还可以表示其他离散符号.如十进制数字或字母表中的字母.例如ASCII是用7 位二进制数字表示一个字符。通过合理使用二进制组合和各种编码技术.可产生用于完成各种类型计算的一系列指令。与基数为10 的十进制数相比.二进制数的基数为2 .使用了数字O 和1 .与一个二进制数等值的十进制数可以扩展为包含更多位的二进制数. 计算机系统是由硬件系统和软件系统组成的,硬件系统由看得见、摸得着的物理设备构成.如磁盘和屏幕。软件系统是管理计算机的无形“控制”,是运行在计算机中的所有程序,程序是指令的集台,它告诉硬件应该做什么,通常将计算机硬件分为3 个主要部分:输入和输出设备(I/O 设备)、中央处理器(CPU)和存储器。在第2 章中对硬件部分进行详细介绍.软件可以按其用途分类。应用软件是为诸如会计、娱乐和工程领域之类的处理任务而设计的,如果玩过计算机游戏或用字处理软件输入入过文件内容.则用户已经具有使用应用软件的体验。另一方面.系统软件控制计算机系统,它不仅包括专业人员用于创建应用软件的复杂程序.而且还包括用于启动计算机和提供给其他程序使用的管理程序.这部分内容将在第2 章和第6 章中详细介绍, 1 . 2 数据类型 数字计算机中的二进制信息存储在存储器或处理器的寄存器中。寄存器的内容为数据或控制信息。控制信息为一位或多位.用于表明控制信号的顺序.这些信号用于处理其他寄存器的数据.数据是数字和其他二进制代码信息.通过处理这些数据得到所需的计算结果.下面介绍在数字计算机最常用的数据类型和各种数据类型在计算机的寄存器中如何以二进制代码的形式表示. 数字计算机寄存器中的数据可分类如下; .数值数据常用来表示整数.n位无符号整数.其值的表示范围为O ~-l ;n位带符号整数.其值的表示范围为- ~-1。这两种格式的数据可以用于算术运算。有些数值数据不能表示为整数。这些数值在计算机中用浮点格式表示.典型的如小数部分。计算机中有专用于浮点数的寄存器和指令。 .布尔值TRUE 和FALSE 经常被被使用.这使它们有自己的数据类型一一布尔型和汇编语言指令.常用0 值表示FALSE .用非0 值表示TRUE 。布尔汇编语言 指令可以对布尔数据执行逻辑操作。与逻辑指令每位都产生操作结果不同,布尔指令只产生一个结果。下面举例来说明它们的不同,若A=0000 0010 , B =0000 0001,则二进制数据的逻辑与运算的给果为0000 0000;然而,如果它们是布尔值,因为它们均为非O ,所以A 和B 均为TRUE ,对它们进行布尔与运算给果为TRUE ,用非O 值表示。 .计算机也可处理字符型数据。字符型数据用ASCII、EBCDIC 、UNICODE或其他字符编码标准编码后的二进制数据进行存储。计算机能将若干字符连成串,用一些字符代替其他字符或另行处理字符串,而不是用算术方法或逻辑方法处理字符。有些汇编语言指令集中包含了直接处理字符数据的指令,而另一些汇编语言指令集中则运用其他指令构成例程来达到相同的结果。 1.3 计算机的发展 第一台大型电子计算机是电子数字模拟计算机(ENIAC),它诞生于1946 年.从此计算机经历了4 个发展年代或阶段。每一年代的特点是:与上一年代相比,体积更小,费用更低。 1 .第一代(1944-1958)

计算机专业英语翻译题

Text A https://www.doczj.com/doc/cd9074674.html,puter is an electronic equipment which can make arithmetic and logical calculation process information rapidly and automatically. 计算机是一种能够高速、自动地进行算术和逻辑运算及信息处理的电子设备。3.The purpose of inventing and developing computer is to make arithmetic calculations rapidly accurately. 发明和开发计算机的目的是使算术运算快速准确。 4.Production management ,data counting,office automation,traffic dispatching,information retrieval all belong to this field. 生产管理,数据统计,办公自动化,通信调度,信息检索都属于这一领域。 5.Real-time means that the time of computer’s calculating and controlling may match the time of controlled object’s practical running or working. 实时意味着计算机的计算和控制的时间符合受控对象的实际运行或工作的时间。Text B 1.Perhaps the most significant date in the history of computers is the year 1936.it was in this year that the first “computer”was developed。It was created by Konrad Zuse and dubbed the ZI Computer. 也许在计算机历史上最显著日期是今年1936.它是在今年的第一个“电脑”被开发,它由康拉德·楚泽创建,并冠以ZI计算机。 2.While expensive, these machines started the trend for computers within common households. 虽然昂贵,这些机器启动电脑的趋势在普通家庭。 3.Two years later ,the Harvard Mark I computer was developed, furthering the science of computing 两年后,哈佛大学马克一号电脑的开发,促进了科学计算。

相关主题
文本预览
相关文档 最新文档