计算机专业英语Unit 9 Security
- 格式:pptx
- 大小:2.91 MB
- 文档页数:30
计算机专业英语教程(第四版)习题答案计算机专业英语教程(第四版)习题答案计算机专业英语(第四版)课后习题答案Unit 1 [Ex 1] Fb5E2RGbCAP [Ex 2] 1. input, storage, processing, and output 2. power; speed; 1. F 2. T 3. T 4. F 5. T 6. T 7. T 8. T 9. T 10.memoryp1EanqFDPw 3. central processing unit memoryDXDiTa9E3d 5. keyboard; [Ex 3] B. A. central processing unit; 1. F 2. D 2. monitor 3. G 4. C 5. B main memory; 6. A 7. E monitorRTCrpUDGiT 8. H5PCzVD7HxA 4. internal; primary;1. user3. data4. keyboard5. data processingjLBHrnAILg6. information [Ex 4] instructions7. computer8. memory 3. manipulates 4.1. input device2. screen, screen 5. retrievexHAQX74J0X 8. Function6. code7. hard copy[Ex. 5] 新处理器开始IT 技术的新时代New Processors Open New Era of IT Technologies Last week, Intel introduced to the public in Russia and other CIS countries a family of processors Intel Xeon E5-2600. They are more powerful and reliable and, importantly, are very economical in terms of energy consumption. Their1 / 30presence opens a new era in the field of IT technologies and means that the cloud technology is getting closer.LDAYtRyKfEThese processors are primarily designed for servers, data centers (DPC) and supercomputers. The emergence of this class of devices is not accidental. According to the regional director of Intel in Russia and other CIS states Dmitri Konash who spoke at the event, the market of IT-technology is developing so rapidly that, according to forecasts, by 2015 there will be 15 billion devices connected to the Internet, and over 3 billion of active users.Zzz6ZB2Ltk 上周,英特尔公司向俄罗斯和其它独联体国家的公众推出了英特尔Xeon E5-2600 系列处理器,它们更加强大可靠,尤其是在能量消耗方面更加经济实惠。
Unit 9 Computer VirusText 1 Virus IntroductionExercises1. Multiple choices.(1) A virus is a ( A ).A. programB. computerC. bad manD. beast(2) A virus is a program that reproduces its own code by ( ABC ).A. adding to the end of a fileB. inserting into the middle of a fileC. simply placing a pointerD. replacing another program(3)( AD )is a type of executable file .A. COM fileB. TXT fileC. JPG fileD. EXE file(4)Similar to viruses, you can also find malicious code in ( ABC ).A. Trojan HorsesB. wormsC. logic bombsD. Microsoft Word Documents2. Fill in the blanks.(1) A virus is a program that reproduces its own code by attaching itself to otherexecutable files in such a way that the virus code is executed when the infectedexecutable file is executed .(2)To attach might mean physically adding to the end of a file, inserting into the middle ofa file, or simply placing a pointer to a different location on the disk somewhere wherethe virus can find it.(3)Similar to viruses, you can also find malicious code in Trojan Horses, worms, andlogic bombs.3. Translate and analyze the following sentences.(1)These self-replicating codes, when caused by some event, may do a potentially harmfula ct to your computer.句子组成:when引导时间状语从句做插入语,当…的时候.翻译:当这些自复制代码被一些事件触发时,或许会做出一些对你的电脑有潜在危害的行为.(2)M ore recently, scripts written for Internet web sites and/or included in E-mail can alsob e executed and infected.句子组成:scripts written…省略的定语从句完整形式scripts which were writtened….翻译:现在,为网站编写的或者包括在E-mail中的脚本也能够被执行和感染。
计算机专业英语全部答案(第三版)Unit1EX11 F2 T3 T4 F5 T6 F7 T 8 T 9 T 10FEX2Input hardware, storage hardware, processing hardware, output hardware power, speed, memorycentral processing unitinternal, primary, memorykeyboard, central processing unit, main memory, monitorEX3 PARTA1 F2 D3 G4 C5 B6 A7 E 8 HEX3 PART B1 F2 E3 G4 B5 A6 C7D 8 HEX41 input device2 screen3 manipulates4 instructions5 retrieve6 codes7 hardcopy8 functionEX51 T2 T3 F4 F5 T6 F7 T 8 TUNIT2EX11 T2 F3 T4 F5 T6 F7 T 8 FEX21 sizes, shapes, processing capabilities2 supercomputers, mainframe computers, minicomputers, microcomputers3 mainframe computer4 microcomputer, storage locations5 portables, laptop computers, desktop workstations6 semiconductor7 CPU, memory, storage, devices, processing, users8 microprocessor chipEX3 PARTA1 C2 A3 H4 I5 E6 F7 G 8 JEX3 PARTB1 capacity2 device3 laptop computer4 Portable computers5 Silicon6 semiconductor7 workstation8 Voltage, voltage9 RAM10ROMEX41 portable2 access3 main memory4 sophisticated programs5 processing capabilities6 instructions7 computation8 computer professionalEX51 T2 T3 F4 F5 F6 T7 F 8 T 9 T 10T11F 12T 13 T 14 TUNIT3EX11 T2 F3 T4 T5 T6 T7 F 8 F 9 T 10 F11T 12F 13F 14TEX21 microprocessor2 bus3 register 4control unit5 processor6 binary7 arithmetic, logic 8 milliseconds, microseconds9 instruction 10execution 11megahertz 12wordsize EX3 PARTA1 F2 A3 J4 C5 D6 E7 H 8 I 9 B 10GEX3 PARTB1 Storage 2chip3 buses4 ALU5 register 6control unit7 machine language 8 binary system 9 bits 10computer programEX41 configuration2 decodes3 data bus4 characters5 converts6 synchronize7 circuitry8 internal clockEX51 T2 F3 F4 T5 F6 F7 T 8 T 9 F 10 FUNIT4EX11 F2 T3 T4 F5 F6 T7 F 8 T 9 T 10 F11T 12T 13F 14F 15T 16F17T 18F 19T 20F21T 22FEX2memoryRAMdiskettes, diskschipsparityexpanded, extendedmonochromecacheROMupdatedEX3 PART A1 B2 E3 C4 J5 I6 H 7A 8 F 9 G 10DEX3 PART Bsecondary storagebufferaccesscodedisketteslotterminalsmotherboardbytescreenEX4desktopsoftwareanimationtransferredsophisticatedcompatiblecacheupgradeEX51 T2 F3 F4 T5 T6 T7 T8 F9 T 10 F11T 12F 13F 14T 15T 16F17F 18F 19F 20T21T 22TUnit 5Ex1:1 T2 T3 F4 T5 F6 F7 F 8 T 9 T 10 T11F 12T 13F 14F 15T 16T17F 18T 19F 20F21T 22T 23TEX2mail, courierhub, starlocal area networkpacketsEthernetkilobits per second, megabits per second, gigabits per second circuit switchingreassembledinternet protocol, transmission control protocol datagramsframesbinary, decimalEX3 part A1 C2 E3 B4 F5 A6 D7 H 8 GEX3 part Bhubzippeddecimalframebinary numberinternetpacketbandwidthEX4forwardedreassembledare encapsulatedcableburstysubmitare retransmittedprotocolEX5IP addressnotationdotted-decimalcomputer networkbackgroundsharedgeographicprivacyExercise to the Passage for ReadingEX6有意为维修技师使用所留被弃的、丢失的或损坏了的数据都进了数据桶。
Chapter1 CompetenciesAfter you have read this chapter, you should be able to:1. Explain the five parts of an information system: people, procedures, software,hardware, and data.2. Distinguish between system software and application software.3. Discuss the three kinds of system software programs.4. Distinguish between basic and specialized application software.5. Identify the four types of computers and the four types of microcomputers.6. Describe the different types of computer hardware including the system unit,input, output, storage, and communication devices.7. Define data and describe document, worksheet, database, and presentation files.8. Explain computer connectivity, the wireless revolution, and the Internet.第一章能力当你阅读本章,你应该能够:1。
解释了信息系统的五个部分:人,程序,软件,硬件和数据。
2。
区分系统软件和应用软件。
3。
讨论了系统软件程序的三种。
4。
区分基本和专门的应用软件。
计算机专业英语试题Ⅰ. Vocabulary(词汇)(30分)(一).Translate the following words and expressions into Chinese(写出下列词组的汉语。
)(共10分,每题1分)1. operating system2.requirements analysis3. network security4. data structure5.decision support system6.relational database7.software crisis8. computer virus9.email attachment10.central processing unit ( CPU )(二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。
) (共10分,每题1分)1.数据库管理系统 2.传输控制协议3.多文档界面 4.面向对象编程5.只读存储器 6.数字视频光盘7.计算机辅助设计 8.结构化查询语言9.通用串行总线 10.企业之间的电子商务交易方式(三)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。
)(10分,每空1分)1. multimedia a. 字处理器2. software life cycle b. 交换机3. structured programming c. 多媒体4. functional testing d. 局域网5. word processor e. 结构化程序设计6. code windows f. 软件生命周期7. firewall g. 功能测试8. LAN h. 代码窗口9. hackeri. 黑客 10. switchj. 防火墙1. 6.2. 7.3. 8.4. 9.5. 10.Ⅱ. Comprehension(阅读理解)(一)Fill in the blanks with suitable words or expressions from the list given below, andchange the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式填空。
《计算机英语》电子教案1、课程概况课程名称:计算机专业英语课程英文名称:Computer English授课班级:计算机1班授课教师:授课地点:多媒体教室教材:计算机英语(第3版)课程类别:必修课2、课程任务与目的本课程的任务和目的是通过对专业英语的学习,掌握计算机相关的英语词汇,具有阅读计算机专业资料的能力,具有一定的专业翻译能力,能够用英语表达专业意义并实现业务沟通。
3、教学内容本课程以Unit 为教学单位,包括以下教学模块:1)播放课文MP3,培养学生专业英语的听力。
2)精讲课文Text A,这些课文既包括基本概念和基础知识,也包括行业应用,同时尽量覆盖行业的主要子领域。
通过对Text A译文详细讲解,让学生掌握阅读理解的方法,培养翻译技能。
3)New Words:学习课文中出现的新词,这些单词既有公共英语中不常使用、而在专业英语中经常出现的单词,也有在专业英语中有特殊含义的单词。
学生由此可以积累专业词汇。
4)Phrases:学习课文中的常用专业英语词组及部分非专业英语词组。
5)Abbreviations:学习课文中出现的、业内人士必须掌握的缩略语。
缩略语在计算机行业中十分重要,必须给予充分的重视。
6)Notes:讲解课文中出现的难句、长句、语法结构复杂的句子。
这有利于学生透彻领会难句的含义,也可以培养学生的阅读理解能力。
7)Exercises:练习巩固部分。
其中,【Ex1.】检查学生对Text A课文的掌握情况;【Ex2.】解释本课学习的核心英语单词意义;【Ex3.】培养学生英文翻译成中文的能力;【Ex4.】熟悉计算机等级考试的真题;【Ex5.】通过短文选词填空,培养学生的篇章阅读能力和对整篇文章的领悟能力。
8)Reading Material:此部分内容为行业相关的材料,供学生课外学习,进一步扩大视野。
4、教学过程(详情附后)5、考核方式与要求1.本课程为考查课,考核方式采用翻译为主的考试方式,要求学生掌握基本的计算机专业词汇以及理解计算机文献。
Multiple Choice Questions1. People that collect and sell personal data are called:A. direct marketersB. fund-raisersC. information resellersD. government agencies2. These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.A. SpywareB. FreewareC. Employee-monitoring softwareD. Cookies3. Small data files that are deposited on a user's hard drive when they visit a Web site are called:A. cookiesB. codesC. cacheD. proxies4. These are used by advertisers to keep track of your Web activity as you move from one site to the next.A. Web bugsB. History filesC. First-party cookiesD. Third-party cookies5. Programs used to secretly record an individual's activities on the Internet are called:A. spywareB. cookiesC. sniffer programsD. keystroke loggers6. Which type of program would likely be used by investigators to record a potential suspects' Internet activities?A. CookieB. Global positioning systemC. Keystroke loggerD. Web bug7. This type of computer criminal creates and distributes malicious programs.A. EmployeeB. HackerC. CrackerD. Keystroke logger8. Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.A. Illusion of anonymityB. Browser cacheC. History filesD. Privacy mode9. Which of the following is not malware?A. Trojan horsesB. VirusesC. WormsD. Ad-Aware10. A program that replicates itself and clogs computers and networks.A. VirusB. WormC. Denial-of-service attackD. Trojan horse11. Free computer games and free screen saver programs are typical carriers of:A. DoSB. wormsC. virusesD. Trojan horses12. Which among the following is a way to shut down an ISP or Web site?A. Denial of service attackB. VirusesC. Trojan horsesD. Worms13. Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?A. Malicious programB. Internet scamC. TheftD. Data manipulation14. The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person.A. Identity theftB. Auction fraudC. CyberbullyingD. Snoopware15. These crimes include the theft of data in the form of confidential information.A. HotspotsB. Blue-collarC. White-collarD. Cyberbullying16. According to which law is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away?A. Digital Millennium Copyright ActB. Computer Abuse Amendments ActC. The Gramm-Leach-Bliley ActD. Computer Fraud and Abuse Act17. Corporations often use this to prevent copyright violations.A. Digital Millennium Copyright ActB. Website encryptionC. Digital rights management (DRM)D. Keystroke loggers18. This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.A. EncryptionB. FirewallC. PasswordD. Dictionary attack19. This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.A. WormB. FakeC. VirusD. Rogue20. The process of coding information to make it unreadable except to those who have a special piece of information known as a key.A. RestrictionB. SecurityC. ProtectionD. Encryption21. A(n) _____ acts as a security buffer between a corporation's private network and all external networks.A. firewallB. passwordC. disaster recovery planD. virus checker22. Which of the following is the most widely used wireless network encryption for home wireless networks?A. WEPB. WPEC. WPAD. WPA223. Which of the following is not a measure to protect computer security?A. Restricting accessB. Encrypting dataC. Copying data and storing it at a remote locationD. Keeping the same password on all systems consistently24. _____ is concerned with protecting software and data from unauthorized tampering or damage.A. Data backupB. Physical securityC. Disaster recovery planD. Data security25. This is a legal concept that gives content creators the right to control use and distribution of their work.A. PiracyB. EthicsC. CopyrightD. Privacy26. This law gives you the right to look at your personal records held by government agencies.A. Gramm-Leach-Bliley ActB. Freedom of Information ActC. Family Educational Rights and Privacy ActD. Computer Fraud and Abuse Act27. Computer criminals that create and spread viruses are punished under this law.A. Gramm-Leach-Bliley ActB. Freedom of Information ActC. Family Educational Rights and Privacy ActD. Computer Fraud and Abuse ActTrue / False Questions28. The essential elements that control how computers are used are laws.True False29. A special telephone directory, called a reverse directory, can be used to get names, addresses, and other details about the people we call.True False30. It is highly likely that each one of us has an electronic profile created by information resellers.True False31. Identity theft and mistaken identity are the same.True False32. Most browsers offer a privacy mode, which ensures that your browsing activity is not recorded on your hard disk.True False33. A trackingcookie is used by an advertising company to keep track of your Web activity as you move from one site to the next.True False34. Web bugs are usually hidden within the HTML code for a Web page or in an e-mail message as an invisible image.True False35. It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for.True False36. Spy removal programs are designed to detect and remove various types of privacy threats. True False37. The archiving and search features of the Web make your online identity available indefinitely.True False38. Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.True False39. Posting personal information such as your birth date, family member names, and home address, doesn't increase your risk of identity theft.True False40. The use of a company's computer time by an employee to run a personal business is common and generally accepted by employers.True False41. Rogue Wi-Fi Hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites.True False42. Biometric scanning devices are used to scan employee identification cards.True False43. Security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.True False44. A dictionary attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.True False45. The most common protocol for Web site encryption is HTTPS (Hyper Text Transfer Protocol Secure).True False46. If copyright-protected music is uploaded to a Web site, it is legal to download it.True False47. Cutting and pasting material from a Web site directly into your own report or paper without giving proper credit to the original source is unethical.True FalseFill in the Blank Questions48. _____, a privacy issue, relates to the responsibility of controlling who is able to use data. ________________________________________49. Using publically available databases, information resellers create _____ and sell them to direct marketers, fundraisers, and others.________________________________________50. _____ is the illegal assumption of someone's identity for the purposes of economic gain. ________________________________________51. _____-party cookies store information about the current session, your general preferences, and your activity on one Web site.________________________________________52. _____-party cookies are used by advertising companies to keep track of your Web activity as you move from one site to the next.________________________________________53. A(n) _____ is someone who creates programs to gain unauthorized access to computer systems for malicious purposes.________________________________________54. _____ bugs are invisible images or HTML code hidden within a Web page or e-mail message and are used to transmit information without your knowledge.________________________________________55. _____ are programs that travel through networks and operating systems and attach themselves to various other programs and databases.________________________________________56. A(n) _____ attack attempts to slow down or stop a computer system or network by sending repetitive requests for information.________________________________________57. A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet _____.________________________________________58. _____ attempts to trick Internet users into thinking a fake but official-looking Web site or e-mail is legitimate.________________________________________59. Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called _____.________________________________________60. _____ is the use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person.________________________________________61. A(n) _____ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information.________________________________________62. _____ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.________________________________________63. _____ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key.________________________________________64. _____ scanning devices use fingerprints and iris scanners to identify individuals.________________________________________65. _____ private networks encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet.________________________________________66. _____ security is concerned with protecting software and data from unauthorized tampering or damage.________________________________________67. As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the _____.________________________________________68. A(n) _____ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.________________________________________69. _____ is representing some other person's work and ideas as your own without giving credit to the original source.________________________________________Essay Questions70. Describe how information about individuals is collected and compiled.71. Explain cookies and identify the difference between first-party cookies and third-party cookies.72. Describe spyware and computer monitoring software.73. Explain how a Web bug works.74. Describe the three most common types of malware, including viruses, worms, and Trojan horses.75. How do firewalls work?76. What are computer ethics?77. Discuss copyright issues as they relate to the Internet, including software piracy and digital rights management, and the Digital Millennium Copyright Act.78. What is plagiarism, and why is it a particular concern today?Multiple Choice Questions1. (p. 244) People that collect and sell personal data are called:A. direct marketersB. fund-raisersC. information resellersD. government agenciesAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-03Topic: Large Databases2. (p. 246) These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.A. SpywareB. FreewareC. Employee-monitoring softwareD. CookiesAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-03Topic: Private Networks3. (p. 247) Small data files that are deposited on a user's hard drive when they visit a Web site are called:A. cookiesB. codesC. cacheD. proxiesAACSB: TechnologyBlooms: UnderstandDifficulty: 1 EasyLearning Outcome: 09-03Topic: The Internet and the Web4. (p. 248) These are used by advertisers to keep track of your Web activity as you move from one site to the next.A. Web bugsB. History filesC. First-party cookiesD. Third-party cookiesAACSB: TechnologyBlooms: UnderstandDifficulty: 1 EasyLearning Outcome: 09-03Topic: The Internet and the Web5. (p. 249) Programs used to secretly record an individual's activities on the Internet are called:A. spywareB. cookiesC. sniffer programsD. keystroke loggersAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-03Topic: The Internet and the Web6. (p. 249) Which type of program would likely be used by investigators to record a potential suspects' Internet activities?A. CookieB. Global positioning systemC. Keystroke loggerD. Web bugAACSB: TechnologyBlooms: EvaluateDifficulty: 3 HardLearning Outcome: 09-03Topic: The Internet and the Web7. (p. 251) This type of computer criminal creates and distributes malicious programs.A. EmployeeB. HackerC. CrackerD. Keystroke loggerAACSB: TechnologyBlooms: AnalyzeDifficulty: 2 MediumLearning Outcome: 09-05Topic: Cybercrime8. (p. 248) Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.A. Illusion of anonymityB. Browser cacheC. History filesD. Privacy modeAACSB: TechnologyBlooms: EvaluateDifficulty: 1 EasyLearning Outcome: 09-03Topic: The Internet and the Web9. (p. 250) Which of the following is not malware?A. Trojan horsesB. VirusesC. WormsD. Ad-AwareAACSB: TechnologyBlooms: EvaluateDifficulty: 2 MediumLearning Outcome: 09-04Topic: The Internet and the Web10. (p. 251) A program that replicates itself and clogs computers and networks.A. VirusB. WormC. Denial-of-service attackD. Trojan horseAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-05Topic: Cybercrime11. (p. 252) Free computer games and free screen saver programs are typical carriers of:A. DoSB. wormsC. virusesD. Trojan horsesAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 09-05Topic: Cybercrime12. (p. 253) Which among the following is a way to shut down an ISP or Web site?A. Denial of service attackB. VirusesC. Trojan horsesD. WormsAACSB: TechnologyBlooms: EvaluateDifficulty: 3 HardLearning Outcome: 09-05Topic: Cybercrime13. (p. 253) Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?A. Malicious programB. Internet scamC. TheftD. Data manipulationAACSB: TechnologyBlooms: EvaluateDifficulty: 1 EasyLearning Outcome: 09-05Topic: Cybercrime14. (p. 253-254) The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person.A. Identity theftB. Auction fraudC. CyberbullyingD. SnoopwareAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-05Topic: Cybercrime15. (p. 254) These crimes include the theft of data in the form of confidential information.A. HotspotsB. Blue-collarC. White-collarD. CyberbullyingAACSB: TechnologyBlooms: AnalyzeDifficulty: 1 EasyLearning Outcome: 09-05Topic: Cybercrime16. (p. 263) According to which law is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away?A. Digital Millennium Copyright ActB. Computer Abuse Amendments ActC. The Gramm-Leach-Bliley ActD. Computer Fraud and Abuse ActAACSB: TechnologyBlooms: EvaluateDifficulty: 2 MediumLearning Outcome: 09-07Topic: Copyright and Digital Rights Management17. (p. 263) Corporations often use this to prevent copyright violations.A. Digital Millennium Copyright ActB. Website encryptionC. Digital rights management (DRM)D. Keystroke loggersAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-07Topic: Copyright and Digital Rights Management18. (p. 256) This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.A. EncryptionB. FirewallC. PasswordD. Dictionary attackAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-06Topic: Measures to Protect Computer Security19. (p. 254) This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.A. WormB. FakeC. VirusD. RogueAACSB: TechnologyBlooms: UnderstandDifficulty: 1 EasyLearning Outcome: 09-05Topic: Cybercrime20. (p. 256-257) The process of coding information to make it unreadable except to those who have a special piece of information known as a key.A. RestrictionB. SecurityC. ProtectionD. EncryptionAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-06Topic: Measures to Protect Computer Security21. (p. 256) A(n) _____ acts as a security buffer between a corporation's private network and all external networks.A. firewallB. passwordC. disaster recovery planD. virus checkerAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-06Topic: Measures to Protect Computer Security22. (p. 260) Which of the following is the most widely used wireless network encryption for home wireless networks?A. WEPB. WPEC. WPAD. WPA2AACSB: TechnologyBlooms: EvaluateDifficulty: 2 MediumLearning Outcome: 09-06Topic: Measures to Protect Computer Security23. (p. 255) Which of the following is not a measure to protect computer security?A. Restricting accessB. Encrypting dataC. Copying data and storing it at a remote locationD. Keeping the same password on all systems consistentlyAACSB: TechnologyBlooms: EvaluateDifficulty: 2 MediumLearning Outcome: 09-06Topic: Measures to Protect Computer Security24. (p. 260) _____ is concerned with protecting software and data from unauthorized tampering or damage.A. Data backupB. Physical securityC. Disaster recovery planD. Data securityAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-06Topic: Measures to Protect Computer Security25. (p. 263) This is a legal concept that gives content creators the right to control use and distribution of their work.A. PiracyB. EthicsC. CopyrightD. PrivacyAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 09-07Topic: Copyright and Digital Rights Management26. (p. 246) This law gives you the right to look at your personal records held by government agencies.A. Gramm-Leach-Bliley ActB. Freedom of Information ActC. Family Educational Rights and Privacy ActD. Computer Fraud and Abuse ActAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-03Topic: Large Databases27. (p. 251) Computer criminals that create and spread viruses are punished under this law.A. Gramm-Leach-Bliley ActB. Freedom of Information ActC. Family Educational Rights and Privacy ActD. Computer Fraud and Abuse ActAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-05Topic: CybercrimeTrue / False Questions28. (p. 263) The essential elements that control how computers are used are laws.FALSEAACSB: TechnologyBlooms: AnalyzeDifficulty: 2 MediumLearning Outcome: 09-07Topic: Ethics29. (p. 244-245) A special telephone directory, called a reverse directory, can be used to get names, addresses, and other details about the people we call.TRUEAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-03Topic: Large Databases30. (p. 244) It is highly likely that each one of us has an electronic profile created by information resellers.TRUEAACSB: TechnologyBlooms: UnderstandDifficulty: 1 EasyLearning Outcome: 09-03Topic: Large Databases31. (p. 245-246) Identity theft and mistaken identity are the same.FALSEAACSB: TechnologyBlooms: AnalyzeDifficulty: 2 MediumLearning Outcome: 09-03Topic: Large Databases32. (p. 248) Most browsers offer a privacy mode, which ensures that your browsing activity is not recorded on your hard disk.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 09-03Topic: The Internet and the Web33. (p. 248) A trackingcookie is used by an advertising company to keep track of your Web activity as you move from one site to the next.TRUEAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-03Topic: The Internet and the Web34. (p. 249) Web bugs are usually hidden within the HTML code for a Web page or in an e-mail message as an invisible image.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-03Topic: The Internet and the Web35. (p. 249) It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for.FALSEAACSB: TechnologyBlooms: ApplyDifficulty: 3 HardLearning Outcome: 09-03Topic: The Internet and the Web36. (p. 249) Spy removal programs are designed to detect and remove various types of privacy threats.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-03Topic: The Internet and the Web37. (p. 250) The archiving and search features of the Web make your online identity available indefinitely.TRUEAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-04Topic: Online Identity38. (p. 251) Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-05Topic: Security39. (p. 245) Posting personal information such as your birth date, family member names, and home address, doesn't increase your risk of identity theft.FALSEAACSB: TechnologyBlooms: UnderstandDifficulty: 1 EasyLearning Outcome: 09-03Topic: Large Databases40. (p. 254) The use of a company's computer time by an employee to run a personal business is common and generally accepted by employers.FALSEAACSB: TechnologyBlooms: UnderstandDifficulty: 1 EasyLearning Outcome: 09-05Topic: Cybercrime41. (p. 254) Rogue Wi-Fi Hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites.TRUEAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-05Topic: Cybercrime42. (p. 255) Biometric scanning devices are used to scan employee identification cards. FALSEAACSB: TechnologyBlooms: EvaluateDifficulty: 1 EasyLearning Outcome: 09-06Topic: Measures to Protect Computer Security43. (p. 251) Security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-05Topic: Security44. (p. 256) A dictionary attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-06Topic: Measures to Protect Computer Security45. (p. 260) The most common protocol for Web site encryption is HTTPS (Hyper Text Transfer Protocol Secure).TRUEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-06Topic: Measures to Protect Computer Security46. (p. 263) If copyright-protected music is uploaded to a Web site, it is legal to download it. FALSEAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-07Topic: Copyright and Digital Rights Management47. (p. 264) Cutting and pasting material from a Web site directly into your own report or paper without giving proper credit to the original source is unethical.TRUEAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-07Topic: PlagiarismFill in the Blank Questions48. (p. 243) _____, a privacy issue, relates to the responsibility of controlling who is able to use data.AccessAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-02Topic: Privacy49. (p. 244) Using publically available databases, information resellers create _____ and sell them to direct marketers, fundraisers, and others.electronic profilesAACSB: TechnologyBlooms: UnderstandDifficulty: 3 HardLearning Outcome: 09-03Topic: Large Databases50. (p. 245) _____ is the illegal assumption of someone's identity for the purposes of economic gain.Identity theftAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-03Topic: Large Databases51. (p. 247) _____-party cookies store information about the current session, your general preferences, and your activity on one Web site.FirstAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-03Topic: The Internet and the Web52. (p. 248) _____-party cookies are used by advertising companies to keep track of your Web activity as you move from one site to the next.ThirdAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-03Topic: The Internet and the Web53. (p. 251) A(n) _____ is someone who creates programs to gain unauthorized access to computer systems for malicious purposes.hackerAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-05Topic: Security。
Lesson1Text AII. Translate the following terms and phrases into Chinese.1. external devices 1. 外部设备2. output device 2. 输出设备3. parallel device 3. 并行设备4. assembly language 4. 汇编语言5. block device 5. 块设备6. floating point 6. 浮点7. data stream 7. 数据流8. input device 8. 输入设备9. integrated circuit 9. 集成电路10. main storage 10. 主存III. Translate the following terms and phrases into English.缩写完整形式中文意义1. ALU Arithmetic/Logic Unit 运算器2. CPU Central Processing Unit或CentralProcessor Unit中央处理器3. CISC Complex Instruction Set Computer 复杂指令集计算机4. DSP Digital Signal Processing 数字信号处理5. EPROM Erasable Programmable Read OnlyMemory 可擦可编程只读存储器6. LED light-emitting diode 发光二级管7. MODEM MOdulator, DEModulator 调制解调器8. RAM Random Access Memory 随机访问存储器9. ROM Read Only Memory 只读存储器10. RISC Reduced Instruction Set Computer 精简指令集计算机IV. Fill in the gaps with the words or phrases chosen from the box. Change the forms where necessary.1. instructions2. devices3. concept4. consuming5. integrated circuits6. space7. fit into8. Information Age9. embedded computer 10.controlV. Translate the following passage into Chinese.计算机能够储存和执行被叫做程序的许多指令,这使其非常通用并不同于计算器。
计算机专业英语词汇指与计算机硬件、软件、⽹络等多⽅⾯有关的英语词汇,主要包括硬件基础、计算机系统维护、计算机⽹络基础、软件、程序设计语⾔、计算机⽹络技术、IT职场英语等词汇。
下⾯为⼤家带来计算机专业英语单词,快来看看吧。
计算机专业英语单词1-10 第⼀单元 Processor 处理机 Primary storage 主存储器 bit 位 hearsay 传说 CPU 中英处理器 control unit 控制部件 arithmetic and logic unit 算术逻辑部件 integral parts 不可缺的部件 tape and disk磁带和磁盘 DRAM动态随机存储器 SRAM静态随机存储器 Register 寄存器 a state of the art ⽬前⼯艺⽔平 chip 芯⽚ VDT 视频显⽰终端 secondary storage 辅助存储器 at a premium⾮常珍贵 reallocate 重新分配 capacity 容量 coaxial cable 同轴电缆 program and data 程序和数据 instruction 指令 location 单元 RAM随机存取存储器 Hardwired 硬连线 EPROM可擦可编程只读存储器 Cache ⾼速缓存 Throughput 吞吐量 read-mostly 以读为主 EEPROM电可擦编程ROM Nonvolatility ⾮易失性 Updatable 可修改的 in place 在适当的 地⽅ semiconductor 半导体 flash memory 闪存 functionality 功能 byte-level 字节级 be referred to as 称作 virtually 事实上 house 存放 expansion 扩充 peripheral 外围的 slot 插槽 power supply 电源 system board 系统板 storage bay 存储机架 floppy 软盘 第⼆单元 optical laser disk 光盘 laser beam激光束 score 刻痕 microscopic pit 微⼩的`凹点 light-sensitive 光敏感的 deflect 偏转 access arm存取臂 inviting 令⼈⼼动的 fluctuation 波动 emerge 显现 stabilize 稳定 gigabyte 千兆字节 cd 光盘 magneto-optical disk 磁光盘 entrepreneur 企业家 video 视频的 拓展阅读: A (Active-matrix)主动矩阵 (Adapter cards)适配卡 (Advanced application)⾼级应⽤ (Analytical graph)分析图表 (Analyze)分析 (Animations)动画 (Application software) 应⽤软件 (Arithmetic operations)算术运算 (Audio-output device)⾳频输出设备 (Access time)存取时间 (access)存取 (accuracy)准确性 (ad network cookies)⼴告⽹络信息记录软件 (administrator)管理员 (Add-ons)插件 (Address)地址 (Agents)代理 (Analog signals)模拟信号 (Applets)程序 (Asynchronous communications port)异步通信端⼝ (Attachment)附件 AGP(accelerated graphics port)加速图形接⼝ ALU (arithmetic-logic unit)算术逻辑单元 AAT(Average Access Time) 平均存取时间 ACL(Access Control Lists)访问控制表 ACK(acknowledgement character)确认字符 ACPI (Advanced Configuration and Power Interface)⾼级配置和电源接⼝ ADC(Analog to Digital Converter)模数转换器 ADSL(Asymmetric Digital Subscriber Line)⾮对称⽤户数字线路 ADT(Abstract Data Type)抽象数据类型 AGP(Accelerated Graphics Port)图形加速端⼝ AI(Artif icial Intelligence)⼈⼯智能 AIFF(Audio Image File Format)声⾳图像⽂件格式 ALU(Arithmetic Logical Unit) 算术逻辑单元 AM(Amplitude Modulation)调幅 ANN(Artificial Neural Network)⼈⼯神经⽹络 ANSI(American National Standard Institute)美国国家标准协会 API(Application Programming Interface)应⽤程序设计接⼝ APPN(Advanced Peer-to-Peer Network)⾼级对等⽹络 ARP(Address Resolution Protocol)地址分辨/ 转换协议 ARPG(Action Role Playing Game)动作⾓⾊扮演游戏 ASCII (American Standard Code for Information Interchange)美国信息交换标准代码 ASP(Active Server Page)活动服务器⽹页 ASP(Application Service Provider)应⽤服务提供商 AST(Average Seek Time)平均访问时间 ATM(asynchronous transfer mode)异步传输模式 ATR (Automatic Target Recognition) ⾃动⽬标识别 AVI (Audio Video Interleaved)声⾳视频接⼝ B (Bar code)条形码 (Bar code reader)条形码读卡器 (Basic application)基础程序 (Binary coding schemes)⼆进制编码⽅案 (Binary system)⼆进制系统 (Bit)⽐特 (Browser)浏览器 (Bus line)总线 (Backup tape cartridge units)备份磁带盒单元 (Bandwidth)带宽 (Bluetooth)蓝⽛ (Broadband)宽带 (Bus)总线 B2B(Busines s to Business)商业机构对商业机构的电⼦商务 B2C(Business to Consumer)商业机构对消费者的电⼦商务 BBS(bulletin board system)电⼦公告牌系统 BER(Bit Error Rate)误码率 BFS (Breadth First Search) ⼴度优先搜索 BGP(Border Gateway Protocol)边缘⽹关协议 BIOS(basic input/output system)基本输⼊输出系统 BISDN(Broadband- Integrated Services Digital Network)宽带综合业务数字⽹ BLU(Basic Link Unit)基本链路单元 BOF(Beginning Of File)⽂件开头 BPS(Bits Per Second)每秒⽐特数 BRI(Basic Rate Interface)基本速率接⼝ BSP(Byte Stream Protocol)字节流协议 BSS(Broadband Switching System)宽带交换系统 C (Cables)连线 (Cell)单元箱 (Chain printer)链式打印机 (Character and recognition device)字符标识识别设备 (Chart)图表 (Chassis)⽀架 (Chip)芯⽚ (Clarity)清晰度 (Closed architecture)封闭式体系结构 (Column)列 (Combination key)结合键 (computer competency)计算机能⼒ (connectivity)连接,结点 (Continuous-speech recognition system)连续语⾔识别系统 (Control unit)操纵单元 (Cordless or wireless mouse)⽆线⿏标 (Cable modems)有线调制解调器 (Channel)信道 (Chat group)谈话群组 (Client)客户端 (Coaxial cable)同轴电缆 (cold site)冷⽹站 (Commerce servers)商业服务器 (Communication channel)信道 (Communication systems)信息系统 CD(Compact disc)光盘 (computer abuse amendments act of 19941994)计算机滥⽤法案 (computer crime)计算机犯罪 (computer ethics)计算机道德 (computer fraud and abuse act of 1986)计算机欺诈和滥⽤法案 (computer matching and privacy protection act of 1988)计算机查找和隐私保护法案 (Computer network)计算机⽹络 (computer support specialist)计算机⽀持专家 (computer technician)计算机技术⼈员 (computer trainer)计算机教师 (Connection device)连接设备 (Connectivity)连接 (cookies-cutter programs)信息记录截取程序 (cookies)信息记录程序 (cracker)解密⾼⼿ (Cyber cash)电⼦货币 (Cyberspace)计算机空间 (chart)图表 (closed architecture )封闭式体系结构 C2C(Consumer-to-consumer)个⼈对个⼈ CPU (central processing unit)中央处理器 CISC (complex instruction set computer)复杂指令集计算机 CRT( cathode-ray tube)阴极射线管 AD(Computer Aided Design)计算机辅助设计 CAE(Computer-Aided Engineering)计算机辅助⼯程 CAI(Computer Aided Instruction)计算机辅助教学 CAM(Computer Aided Manufacturing)计算机辅助管理 CASE(Computer Assisted Software Engineering)计算机辅助软件⼯程 CAT(Computer Aided Test)计算机辅助测试 CATV(Community Antenna Television)有线电视 CB(control bus)控制总线 CCP(Communication Control Procrssor)通信控制处理机 CD(Compact Disc)压缩光盘,只读光盘 CD-R(Compact Disc-Recordable)可录光盘,只写⼀次的光盘 CDFS(Compact Disk File System)密集磁盘⽂件系统 CDMA(Code Division Multiple Access)码分多路访问 CD-MO(Compact Disc-Magneto Optical)磁光式光盘 CD-ROM(compact disc read-only memory)只读光盘 CD-RW(compact disc rewritable)可读写光盘 CGA(Color Graphics Adapter)彩⾊显⽰器 CGI(common gateway interface)公共⽹关接⼝ CI(Computational Intelligence)计算智能 CISC(Complex Instruction Set Computer) 复杂指令集计算机 CMOS(Complementary Metal Oxide Semiconductor)互补⾦属氧化物半导体存储器 COM(Component object model)组件对象模型 CORBA(Common Object Request Broker Architecture)公共对象请求代理结构 CPU(central proces sing unit)中央处理单元 CRC(cyclical redundancy check)循环冗余校验码 CRM(Client Relation Management)客户关系管理 CRT(Cathode-Ray Tube)阴极射线管,显⽰器 CSMA(Carrier Sense Multi -Access)载波侦听多路访问 CSU(Channel Service Unit)信道服务单元 CU(Control Unit)控制单元 D DB(Database)数据库 (database files)数据库⽂件 (Database manager)数据库管理 DBMS(Database manager system)数据库管理系统 (Data bus)数据总线 (Data projector)数码放映机 (Desktop system unit)台式电脑系统单元 (Destination file)⽬标⽂件 (Digital cameras)数码照相机 (Digital notebooks)数字笔记本 (Digital video camera)数码摄影机 (Discrete-speech recognition system)不连续语⾔识别系统 (Document)⽂档 (document files)⽂档⽂件 (Dot-matrix printer)点矩阵式打印机 (Dual-scan monitor)双向扫描显⽰器 (Dumb terminal)⾮智能终端 (data security)数据安全 (Data transmission specifications)数据传输说明 (database administrator)数据库管理员 (Data play)数字播放器 (Demodulation)解调 (denial of service attack)拒绝服务攻击 (Dial-up service)拨号服务 (Digital cash)数字现⾦ (Digital signals)数字信号 (Digital subscriber line)数字⽤户线路 (Digital versatile disc)数字化通⽤磁盘 (Digital video disc)数字化视频光盘 (Direct access)直接存取 (Directory search)⽬录搜索 (disaster recovery plan)灾难恢复计划 (Disk caching)磁盘驱动器⾼速缓存 (Diskette)磁盘 (Disk)磁碟 (Distributed data processing system)分部数据处理系统 (Distributed processing)分布处理 (Domain code)域代码 (Downloading)下载 DVD(Digital Versatile Disc)数字多功能光盘 DVD-R(DVD-Recordable)可写DVD DVD-RAM(DVD- Random Access Memory)DVD随机存取器 DNS(Domain name system)域名服务器 DAC(Digital to Analogue Converter)数模转换器 DAO(Data Access Object)数据访问对象 DAP(Directory Acces s Protocol)⽬录访问协议 DBMS(Database Management System)数据库管理系统 DCE(data communication equipment)数据通信设备 DCE(Distributed Computing Environment)分布式计算环境 DCOM(Distributed COM)分布式组件对象模型 DDB(Distributed DataBase)分布式数据库 DDE(Dynamic Data Exchange)动态数据交换 DDI(Device Driver Interface)设备驱动程序接⼝ DDK(Driver Development Kit)驱动程序开发⼯具包 DDN(Data Digital Network)数据数字⽹ DEC(Digital Equipment Corporation)数字设备公司 DES(Data Encryption Standard)数据加密标准 DFS(Depth First Search) 深度优先搜索 DFS(Distributed File System)分布式⽂件系统 DHCP(Dynamic Host Configuration Protocol)动态主机配置协议 DIB(Dual Independent Bus)双独⽴总线 DIC(Digital Image Control)数字图像控制 DLC(Data Link Control)数据链路控制 DLL(Dynamic Link Library)动态链接库 DLT(Data Link Terminal)数据链路终端 DMA(Direct Memory Access)直接内存访问 DMSP(Distributed Mail System Protocol)分布式电⼦邮件系统协议 DNS(Domain Name System)域名系统 DOM(Document Object Mode)⽂档对象模型 DOS(Disk Operation System)磁盘操作系统 DQDB(Distributed Queue Dual Bus)分布式队列双总线 DRAM(Dynamic Random Access Memory)动态随机存取存储器 DSD(Direct Stream Digital)直接数字信号流 DSL(Digital Subscriber Line)数字⽤户线路 DSM(Distributed Shared Memory)分布式共享内存 DSP(Digital Signal Processing)数字信号处理 DTE(Data Terminal Equipment)数据终端设备 DVD(Digital Versatile Disc)数字多功能盘 DVD-ROM(DVD-Read Only Memory)计算机⽤只读光盘 DVI(Digital Video Interactive)数字视频交互 E (e-book)电⼦阅读器 (Expansion cards)扩展卡 (end user)终端⽤户 (e-cash)电⼦现⾦ (e-commerce)电⼦商务 (electronic cash)电⼦现⾦ (electronic commerce)电⼦商务 (electronic communications privacy act of1986)电⼦通信隐私法案 (encrypting)加密术 (energy star)能源之星 (Enterprise computing)企业计算化 (environment)环境 (Erasable optical disks)可擦除式光盘 (ergonomics)⼈类⼯程学 (ethics)道德规范 (External modem)外置调制解调器 (extranet)企业外部⽹ EC(Embedded Controller)嵌⼊式控制器 EDIF(Electronic Data Interchange Format)电⼦数据交换格式 EEPROM(Erasable and Electrically Programmable ROM)电擦除可编程只读存储器 EGA(Enhanced Graphics Adapter)彩⾊显⽰器,分辨率为 640×350 ,可以显⽰ 16 种颜⾊ EGP(External Gateway Protocol)外部⽹关协议 EISA(Extended Industry Standard Architecture)增强⼯业标准结构 EMS(Expanded Memory Specification)扩充存储器规范 EPH(Electronic payment Handler)电⼦⽀付处理系统 EPROM(Erasable Programmable ROM)可擦除可编程只读存储器 ERP(Enterprise Resource Planning)企业资源计划 ETM(ExTended Memory)扩展存储器 F (Fax machine)传真机 (Field)域 (Find)搜索 (FireWire port)⽕线端⼝ (Firmware)固件 (Flash RAM)闪存 (Flatbed scanner)台式扫描器 (Flat-panel monitor)纯平显⽰器 (floppy disk)软盘 (Formatting toolbar)格式化⼯具条 (Formula)公式 (Forum)论坛 (Function)函数 (fair credit reporting act of 1970)公平信⽤报告法案 (Fiber-optic cable)光纤电缆 (File compression)⽂件压缩 (File decompression)⽂件解压缩 (filter)过滤 (firewall)防⽕墙 (firewall)防⽕墙 (Fixed disk)固定硬盘 (Flash memory)闪存 (Flexible disk)可折叠磁盘 (Floppies)磁盘 (Floppy-disk cartridge)磁盘盒 (Formatting)格式化 (freedom of information act of 1970)信息⾃由法案 (frequency)频率 (frustrated)受挫折 (Full-duplex communication)全双通通信 FAT(File Allocation Table)⽂件分配表 FCB(File Control Block)⽂件控制块 FCFS(First Come First Service)先到先服务 FCS(Frame Check Sequence)帧校验序列 FDD(Floppy Disk Device)软盘驱动器 FDDI(Fiber-optic Data Distribution Inter face)光纤数据分布接⼝ FDM(Frequency-Division Multiplexing)频分多路 FDMA(Frequency Division Multiple Address)频分多址 FEC(Forward Error Correction) 前向纠错 FEK(File Encryption Key)⽂件密钥 FEP(Front Ef fect Processor)前端处理机 FET(Field Effect Transistor)场效应晶体管 FIFO(First In First Out)先进先出 FM(Frequency Modulation)频率调制 FPU(Float Point Unit)浮点部件 FRC(Frame Rate Control)帧频控制 FTAM(File Transfer Access and Management)⽂件传输访问和管理 FTP(File Transfer Protocol)⽂件传输协议 G (General-purpose application)通⽤运⽤程序 (Gigahertz)千兆赫 (Graphic tablet)绘图板 (green pc)绿⾊个⼈计算机 (Group by) 排序 GAL(General Array Logic)通⽤逻辑阵列 GCR(Group-Coded Recording)成组编码记录 GDI(Graphics Device Interface)图形设备接⼝ GIF(Graphics Interchange Format)⼀种图⽚⽂件格式,图形转换格式 GIS(Geographic Information System)地理信息系统 GPI(Graphical Programming Interface)图形编程接⼝ GPIB(General Purpose Interface Bus)通⽤接⼝总线 GPS(Global Positioning System)全球定位系统 GSX(Graphics System Extension)图形系统扩展 GUI(Graphical User Interface)图形⽤户接⼝ H (handheld computer)⼿提电脑 (Hard copy)硬拷贝 (hard disk)硬盘 (hardware)硬件 (Help)帮助 (Host computer)主机 (Home page)主页 (Hyperlink)超链接 (hacker)⿊客 (Half-duplex communication)半双通通信 (Hard-disk cartridge)硬盘盒 (Hard-disk pack)硬盘组 (Head crash)磁头碰撞 (header)标题 (help desk specialist)帮助办公专家 (helper applications)帮助软件 (Hierarchical network)层次型⽹络 (history file)历史⽂件 (hits)匹配记录 (horizontal portal)横向⽤户 (hot site)热⽹站 (Hybrid network)混合⽹络 HPSB (high performance serial bus)⾼性能串⾏总线 HDTV(high-definition television)⾼清晰度电视 HDC(Hard Disk Control)硬盘控制器 HDD(Hard Disk Drive)硬盘驱动器 HDLC(High-level Data Link Control)⾼级数据链路控制 HEX(HEXadecimal)⼗六进制 HPFS(High Performance File System)⾼性能⽂件系统 HPSB(High Performance Serial Bus)⾼性能串⾏总线 HTML(Hyper Text Markup Language)超⽂本标记语⾔ HTTP(Hyper Text Transport Protocol)超⽂本传输协议 I (Image capturing device)图像获取设备 IT(information technology)信息技术 (Ink-jet printer)墨⽔喷射印刷机 (Integrated package)综合性组件 (Intelligent termina)l智能终端设备 (Intergrated circuit)集成电路 (implements )实现接⼝ (Interface cards)接⼝卡 (Internal modem)内部调制解调器 (internet telephony)⽹络电话 (internet terminal)互联⽹终端 (Identification)识别 (i-drive)⽹络硬盘驱动器 (illusion of anonymity)匿名幻想 (index search)索引搜索 (information pushers)信息推送器 (initializing )初始化 (instant messaging)计时信息 (internal hard disk)内置硬盘 (Internet hard drive) ⽹络硬盘驱动器 (intranet)企业内部⽹ ISA (industry standard architecture)⼯业标准结构体系 IRC(internet relay chat)互联⽹多线交谈 IAC(Inter-Application Communications)应⽤间通信 IC(Integrated Circuit)集成电路 ICMP(Internet Control Mes sage Protocol)因特⽹控制消息协议 ICP(Internet Content Provider)因特⽹内容服务提供商,是 ISP中提供信息服务的⼀种机构 IDC(International Development Center)国际开发中⼼ IDE(Integrated Development Environment)集成开发环境 IDL(Interface Definition Language)接⼝定义语⾔ IEEE(Institute of Electrical and Electronics Engineering)电⼦电器⼯程师协会 IGP(Interior Gateway Protocol)内部⽹关协议 IIS(Internet Information Service)因特⽹信息服务 IP(Internet Protocol)因特⽹协议 IPC(Inter-Process Communication)进程间通信 IPSE(Integrated Project Support Environments)集成⼯程⽀持环境 IPX(Internet Packer Exchitecture)互联⽹报⽂分组交换 ISA(Industry Standard Architecture)⼯业标准结构,是 IBM PC/ XT总线标准 ISDN(Integrated Service Digital Network)综合业务数字⽹ ISO(International Standard Organization)国际标准化组织 ISP(Internet Service Provider)因特⽹服务提供者 ITU(International Telecom Union)国际电信联盟 J (joystick)操纵杆 JDBC(Java Database Connectivity) J ava数据库互联 JPEG(Joint Photographic Experts Group)联合图⽚专家组 JSP(Java Server Page) Java 服务器页⾯技术 JVM(Java Virtual Machine)Java虚拟机 K (keyword search)关键字搜索 KB(Kilobyte)千字节 KBPS(Kilobits Per Second)每秒千⽐特 KMS(Knowledge Management System)知识管理系统 L (laser printer)激光打印机 (Layout files)版式⽂件 (Light pen)光笔 (Locate)定位 (Logical operations)逻辑运算 (Lands)凸⾯ (Line of sight communication)视影通信 (Low bandwidth)低带宽 (lurking)潜伏 LCD (liquid crystal display monitor)液晶显⽰器 LAN(Local Area Network)局域⽹ LBA(Logical Block Addressing)逻辑块寻址 LCD(Liquid Crystal Display)液晶显⽰器 LDT(Logic Design Translator)逻辑设计翻译程序 LED(Light Emitting Diode)发光⼆极管 LIFO(Last In First Out)后进先出 LP(Linear Programming)线性规划 LPC(Local Procedure Call)局部过程调⽤ LSIC(Large Scale Integration Circuit)⼤规模集成电路 M (Main board)主板 (Mark sensing)标志检测 (Mechanical mouse)机械⿏标 (Memory)内存 (Menu)菜单 (Menu bar)菜单栏 (Microprocessor)微处理器 (Microseconds)微秒 (Modem card)调制解调器 (Monitor)显⽰器 (Motherboard)主板 (Mouse) ⿏标 (Multifunctional device)多功能设备 (Magnetic tape reels)磁带卷 (Magnetic tape streamers)磁带条 (mailing list)邮件列表 (Medium band)媒质带宽 (metasearch engine)整合搜索引擎 (Microwave)微波 (Modem)解调器 (Modulation)解调 MAN(Metropolitan area network)城域⽹ MICR(magnetic-ink character recognition)磁墨⽔字符识别器 MAC(Medium Access Control)介质访问控制 MAN(Metropolitan Area Network)城域⽹ MBR(Master Boot Record)主引导记录 MC(Memory Card)存储卡⽚ MCA(Micro Channel Architecture)微通道结构 MDA(Monochrome Display Adapter)单⾊显⽰适配卡 MFM(Modified Frequency Modulation)改进调频制 MIB(Management Information Bass)管理信息库 MIDI(Musical Instrument Digital Interface) 乐器数字接⼝ MIMD(Multiple Instruction Stream,Multiple Data Stream)多指令流,多数据流 MIPS(Million Instructions Per Second)每秒百万条指令 MIS(Management Information System)管理信息系统 MISD(Multiple Instruction Stream,Single Data Stream)多指令流,单数据流 MMDS(Multi-channel Multipoint Distribution Service)多波段多点分发服务器 MMU(Memory Management Unit)内存管理单元 MPC(Multimedia PC)多媒体计算机 MPEG(Moving Picture Expert Group) ⼀种视频和⾳频的国际标准格式 MPLS(Multi-Protocol Label Switching)多协议标记交换 MPS(Micro Processor System)微处理器系列 MTBF(Mean Time Between Failures)平均故障间隔时间 MUD(Multiple User Dimension)多⽤户空间 N (Net PC)⽹络计算机 (Network adapter card)⽹卡 (Network personal computer)⽹络个⼈电脑 (Network terminal)⽹络终端 (Notebook computer)笔记本电脑 (Notebook system unit)笔记本系统单元 (Numeric entry)数字输⼊ (national information infrastructure protection act of1996)国际信息保护法案 (national service provider)全国性服务供应商 (Network architecture)⽹络体系结构 (Network bridge)⽹桥 (Network gateway)⽹关 (network manager)⽹络管理员 (newsgroup)新闻组 (no electronic theft act of1997)⽆电⼦盗窃法 (Node)节点 (Nonvolatile storage)⾮易失性存储 NOS(Network operation system)⽹络操作系统 NAOC(No-Account Over Clock)⽆效超频 NAT(Network Address Translation) ⽹络地址转换 NC(Network Computer)⽹络计算机 NDIS(Network Device Interface Speci fication)⽹络设备接⼝规范 NCM(Neural Cognitive Maps)神经元认知图 NFS(Network File System)⽹络⽂件系统 NIS(Network Information Services)⽹络信息服务 NNTP(Network News Transfer Protocol)⽹络新闻传输协议 NOC(Network Operations Center) ⽹络操作中⼼ NSP(Name Server Protocol)名字服务器协议 NTP(Network Time Protocol)⽹络时间协议 NUI(network user identification)⽹络⽤户标识 O (Object embedding)对象嵌⼊ (Object linking)⽬标链接 (Open architecture)开放式体系结构 OS(Operation System)操作系统 (Optical disk)光盘 (Optical mouse)光电⿏标 (Optical scanner)光电扫描仪 (Outline)⼤纲 (off-line browsers)离线浏览器 (Online storage)联机存储 OLE (object linking and embedding)对象链接⼊ OCR(optical-character recognition)字符识别器 OMR(optical-mark recognition)光标阅读器 OA(Of f ice Automation)办公⾃动化 OCR(Optical Character Recognition)光学字符识别 ODBC(Open Database Connectivity)开放式数据库互联 ODI(Open Data- link Interface)开放式数据链路接⼝ OEM(Original Equipment Manufactures)原始设备制造⼚家 OLE(Object Linking and Embedding)对象链接与嵌⼊ OMG(Object Management Group)对象管理组织 OMR(Optical-Mark Recognition)光标阅读器 OOM(Object Oriented Method)⾯向对象⽅法 OOP(Object Oriented Programming)⾯向对象程序设计 ORB(Object Request Broker)对象请求代理 OS(Operating System)操作系统 OSI(Open System Interconnect Reference Model)开放式系统互联参考模型 OSPF(Open Shortest Path First)开发最短路径优先 P (palmtop computer)掌上电脑 (Parallel ports)并⾏端⼝ (Passive-matrix)被动矩阵 (PC card)个⼈计算机卡 (Personal laser printer)个⼈激光打印机 (Personal video recorder card)个⼈视频记录卡 (Photo printer)照⽚打印机 (Pixel)像素 (Platform scanner)平版式扫描仪 (Plotter)绘图仪 (Plug and play)即插即⽤ (Plug-in boards)插件卡 (Pointer)指⽰器 (Pointing stick)指⽰棍 (Port)端⼝ (Portable scanner)便携式扫描仪 (Presentation files)演⽰⽂稿 (Presentation graphics)电⼦⽂稿程序 (Primary storage)主存 (Procedures)规程 (Processor)处理机 (Programming control language)程序控制语⾔ (Packets)数据包 (Parallel data transmission)平⾏数据传输 (Peer-to-peer network system点)对点⽹络系统 (person-person auction site)个⼈对个⼈拍卖站点 (physical security)物理安全 (Pits)凹⾯ (plug-in)插件程序 (privacy )隐私权 (proactive )主动地 (programmer)程序员 (Protocols)协议 (provider)供应商 (project )项⽬⼯程 (proxy server)代理服务 (pull products)推取程序 (push products)推送程序 PDA(personal digital assistant)个⼈数字助理 PCI(peripheral component interconnect)外部设备互连总线 PCMCIA (Personal Memory Card International Association)个⼈计算机存储卡国际协会 PBX(Private Branch Exchange)⽤户级交换机 PC(Personal Computer)个⼈计算机 PCB(Process Control Block)进程控制块 PCI(Peripheral Component Interconnect)外部连接互联,是⼀种局部总线 PCM(Pulse Code Modulation)脉冲编码调制 PCS(Personal Communications Service) 个⼈通信业务 PDA(Personal Digital As sistant)个⼈数字助理 PDF(Portable Document Format)便携式⽂档格式 PDN(Public Data Network)公共数据⽹ PHP(Personal Home Page)个⼈⽹页 PIB(Programmable Input Buffer)可编程输⼊缓冲区 PMMU(Paged Memory Management Unit)页⾯存储管理单元 POP(Post Of f ice Protocol)邮局协议 POST(Power-On Self -Test)加电⾃检 PPP(Peer-Peer Protocol)端对端协议 PPP(Point to Point Protocol)点到点协议 PPSN(Public Packed-Switched Network)公⽤分组交换⽹ PR(Performance Rate)性能⽐率 PROM(Programmable ROM)可编程只读存储器 PSN(Processor Serial Number)处理器序列号 Q QC(Quality Control)质量控制 QLP(Query Language Proces sor)查询语⾔处理器 QoS(Quality of Service)服务质量 R (RAM cache)随机⾼速缓冲器 (Range)范围 (Record)记录 (Relational database)关系数据库 (Replace)替换 (Resolution)分辨率 (Row)⾏ (Read-only)只读 (Reformatting)重组 (regional service provider)区域性服务供应商 (reverse directory)反向⽬录 (right to financial privacy act of 1979)财产隐私法案 (Ring network)环形⽹ RAD(Rapid Application Development)快速应⽤开发 RAI(Remote Application Interface)远程应⽤程序界⾯ RAID(Redundant Array Independent Disk) 冗余列阵磁盘机 RARP(Reverse Address Resolution Protocol)反向地址解析协议 RAM(Random Acces s Memory)随机存储器 RAM(Real Address Mode)实地址模式 RAID(Redundant Arrays of Inexpensive Disks)冗余磁盘阵列技术 RAS(Remote Access Service)远程访问服务 RCP(Remote CoPy)远程复制 RDA(Remote Data Access)远程数据访问 RDO (Remote Data Objects) 远程数据对象 RF(Radio Frequency) 射频,⽆线电频率 RIP(Raster Image Protocol)光栅图像处理器 RIP(Routing Information Protocol)路由选择信息协议 RISC(Reduced Instruction Set Computer)精简指令集计算机 ROM(Read Only Memory)只读存储器 RPC(Remote Procedure Call)远程过程调⽤ RPG(Role Play Games)⾓⾊扮演游戏 RPM(Revolutions Per Minute)转/分 RTS(Request To Send)请求发送 RTSP(Real Time Streaming Protocol) 实时流协议 S (Scanner)扫描器 (Search)查找 (Secondary storage device)辅助存储设备 (Semiconductor)半导体 (Serial ports)串⾏端⼝ (Server)服务器 (Shared laser printer)共享激光打印机 (shakedown test )调试 (Sheet)表格 (Silicon chip)硅⽚ (Slots)插槽 (Smart card)智能卡 (Soft copy)软拷贝 (Software suite)软件协议 (Sorting)排序 (Source file)源⽂件 (Special-purpose application)专⽤⽂件 (Spreadsheet)电⼦数据表 (Standard toolbar)标准⼯具栏 (Supercomputer)巨型机 (System )系统 (System cabinet )系统箱 (System clock)时钟 (System software)系统软件 (Satellite/air connection services)卫星⽆线连接服务 (search engines)搜索引擎 (search providers)搜索供应者 (search services )搜索服务器 (Sectors)扇区 (security)安全 (Sending and receiving devices)发送接收设备 (Sequential access)顺序存取 (Serial data transmission)单向通信 (signature line)签名档 (snoopware)监控软件 (software copyright act of1980)软件版权法案 (software piracy)软件盗版 (Solid-state storage)固态存储器 (specialized search engine)专⽤搜索引擎 (spiders)⽹页爬⾍ (spike)尖峰电压 (Star network)星型⽹ (Strategy)⽅案 (subject)主题 (subscription address)预定地址 (Superdisk)超级磁盘 (surfing)⽹上冲浪 (surgeprotector)浪涌保护器 (systems analyst)系统分析师... SACL(System Access Control List) 系统访问控制列表 SAF(Store And Forward)存储转发 SAP(Service Acces s Point)服务访问点 SCSI(Small Computer System Interface)⼩型计算机系统接⼝ SDLC(Synchronous Data Link Control)同步数据链路控制 SGML(Standard Generalized Markup Language)标准通⽤标记语⾔ SHTTP(Secure Hype Text Transfer Protocol)安全超⽂本传递协议 SMP(Symmetric Multi-Processor)对称式多处理器 SMTP(Simple Mail Transport Protocol)简单邮件传输协议 SNA(System Network Architecture)系统⽹络结构 SNMP(Simple Network Management Protocol)简单⽹络管理协议 SNR(Signal Noise Ratio)信噪⽐ SNTP(Simple Network Time Protocol)简单⽹络时间协议 SONC(System On a Chip)系统集成芯⽚ SONET(Synchronous Optic Network)同步光纤⽹ SPC(Stored-Program Control)存储程序控制 SQL(Structured Query Language)结构化查询语⾔ SRAM(Static Random Access Memory)静态随机存储器 SRPG(Strategies Role Play Games) 战略⾓⾊扮演游戏 SSL(Secure Sockets Layer)安全套接层 STDM(Synchronous Time Division Multiplexing)同步时分复⽤ STG(Shoot Game)射击类游戏 STP(Shielded Twisted-Pair)屏蔽双绞线 SVGA (Super Video Graphics Array) 超级视频图形阵列 T (Table)⼆维表 (Telephony)电话学 (Television boards)电视扩展卡 (Terminal) 终端 (Template)模板 (Text entry)⽂本输⼊ (Thermal printer )热印刷 (Thin client)瘦客 (Toggle key)触发键 (Toolbar)⼯具栏 (Touch screen)触摸屏 (Trackball)球 (TV tuner card)电视调谐卡 (Two-state system))双状态系统 (technical writer)技术协作者 (technostress)重压技术 (telnet)远程登录 (Time-sharing system)分时系统 (Topology)拓扑结构 (Tracks)磁道 (traditional cookies)传统的信息记录程序 (Twisted pair)双绞 TCB(Transmission Control Block)传输控制块 TCP(Transmis sion Control Protocol)传输控制协议 TCP/IP(Transmission Control Protocol / Internet Protocol)传输控制协议/ ⽹间协议 TDM(Time Division Multiplexing)时分多路复⽤ TDMA(Time Division Multiplexing Address)时分多址技术 TDR(Time-Domain Reflectometer)时间域反射测试仪 TFT(Thin Film Transistor Monitor)薄膜晶体管显⽰器 TFTP(Trivial File Transfer Protocol)简单⽂件传送协议 TIFF(Tag Image File Format)标记图形⽂件格式 TIG(Task Interaction Graph)任务交互图 TLI(Transport Layer Interface)传输层接⼝ TM(Traffic Management)业务量管理,流量管理 TPS(Transactions Per Second)(系统)每秒可处理的交易数 TSR(Terminate and Stay Resident)终⽌并驻留 TTL(Transistor-Transistor Logic)晶体管—晶体管逻辑电路 TWX(Teletypewriter Exchange)电传电报交换机 U (Unicode)统⼀字符标准 (uploading)上传 (usenet)世界性新闻组⽹络 UART(Universal Asynchronous Receiver Transmitter)通⽤异步收发器 UDF(Universal Disk Format)通⽤磁盘格式 UDP(User Datagram Protocol)⽤户数据报协议 UHF(Ultra High Frequency)超⾼频 UI(User Interface)⽤户界⾯,⽤户接⼝ UIMS(User Interface Management System)⽤户接⼝管理程序 UNI(User Network Interface)⽤户⽹络接⼝ UPA(Ultra Port Architecture)超级端⼝结构 UPS(Uninterruptible Power Supply)不间断电源 URI(Uniform Resource Identi fier)环球资源标识符 URL(Uniform Resource Locator)统⼀资源定位器 USB(Universal Serial Bus)通⽤串⾏总线 UTP(Unshielded Twisted-Pair)⾮屏蔽双绞线 UXGA(Ultra Extended Graphics Array)超强图形阵列 V (Virtual memory)虚拟内存 (Video display screen)视频显⽰屏 (Voice recognition system)声⾳识别系统 (vertical portal)纵向门户 (video privacy protection act of 1988)视频隐私权保护法案 (virus checker)病毒检测程序 (virus)病毒 (Voiceband)⾳频带宽 (Volatile storage)易失性存储 (voltage surge)电涌 VAD(Virtual Addres s Descriptors)虚拟地址描述符 VAGP(Variable Aperature Grille Pitch) 可变间距光栅 VAN(Value Added Network)增值⽹络 VAP(Value-Added Process)增值处理 VAS(Value-Added Server)增值服务 VAX(Virtual Address eXtension)虚拟地址扩充 VBR(Variable Bit Rate)可变⽐特率 VC(Virtual Circuit)虚拟线路 VCPI(Virtual Control Program Interface)虚拟控制程序接⼝ VDD(Virtual Device Driver s)虚拟设备驱动程序 VDR(Video Disc Recorder)光盘录像机 VDT(Video Display Terminals)视频显⽰终端 VDU(Visual Display Unit)视频显⽰单元 VFS(Virtual File System)虚拟⽂件系统 VGA(Video Graphics Adapter)视频图形适配器 VIS(Video Information System)视频信息系统 VLAN(Virtual LAN)虚拟局域⽹ VLIW(Very Long Instruction Word)超长指令字 VLSI(Very Large Scale Integration)超⼤规模集成 VMS(Virtual Memory System)虚拟存储系统 VOD(Video On Demand)视频点播系统 VON(Voice On Net)⽹上通话 VR(Virtual Reality)虚拟现实 VRML(Virtual Reality Modeling Language)虚拟现实建模语⾔ VRR(Vertical Refresh Rate)垂直刷新率 VTP(Virtual Terminal Protocol)虚拟终端协议 W (Wand reader )条形码读⼊ (Web )⽹络 (Web appliance )环球⽹设备 (Web page)⽹页 (Web site address)⽹络地址 (Web terminal)环球⽹终端 (Webcam)摄像头 (What-if analysis)假定分析 (Wireless revolution)⽆线⾰命 (Word)字长 (Word processing)⽂字处理 (Word wrap)⾃动换⾏ (Worksheet file) ⼯作⽂件 (web auctions)⽹上拍卖 (web broadcasters)⽹络⼴播 (web portals)门户⽹站 (web sites)⽹站 (web storefront creation packages)⽹上商店创建包 (web storefronts)⽹上商店 (web utilities)⽹上应⽤程序 (web-downloading utilities)⽹页下载应⽤程序 (webmaster web)站点管理员 (web)万维⽹ (Wireless modems)⽆线调制解调器 (wireless service provider)⽆线服务供应商 WWW(world wide web)万维⽹ (worm)蠕⾍病毒 (Write-protect notch)写保护⼝ WAN(Wide area network)⼴域⽹ (Web server)Web 服务器 (well-connected )连接良好 (well-known services )公认的服务。
第一章Computer system overview(操作系统概述)I. Pre-reading Questions1.What is a digital computer?The digital computer is a digital system that performs various computational tasks. The word “digital”implies that theinformation in the computer is represented by variables that take a limited number of discrete values. These values are processed internally by components that can maintain a limited number of discrete states. Digital computer is also called electronic computer or computer.2.Are there any differences between the binary number system and the common decimal number system?The decimal digits has ten digits: 0,1,2,…, and 9. The binary number system has two digits: 0 and 1. The binary numbers use a base 2. The decimal digits use a base 10.3.How many types of computers do you know? Name at least four of them. Computers are usually classified into four broad categories: microcomputers, minicomputers, mainframe computers and supercomputers.II Fill in the following blanks.1.Application software is designed to accomplish real-world tasks in fields.2. An 8-bit signed integer can have any value between -128 and 1273. System software controls the computer and enables it to run the hardware and applications software.4. A computer system consists of hardware system and software system .5. List four types of computers: microcomputers, minicomputers , mainframe computers,and supercomputers .III True or False.1. The software system is the physical equipment that you can see and touch. 1.F2. Typically, a data value is set to zero to represent FALSE and 1 value forTRUE. 2. F3. In the earliest general-purpose computer, most input and output media were magnetic disks. 3. F4. Supercomputers are largest, fastest, and most expensive computer available.4.T5. A computer system consists of hardware system and software system. 5. T IV Matching terms.1、(b) CPU The processing unit is at the heart of a computer.2、(c) bit A unit of information conveyed by a single binary digit.3、(a) integrated circuit (IC)A complete electronic circuit that packages transistors and other electronic components on a small silicon chip.4、(d) ASCII A system for encoding characters as binary digits.V Translating Terms.(1) coding techniques 编码技术(2) application software 应用软件(3) floating point data 浮点数据(4) timesharing 分时,分时技术(5) storage capacities 存储容量VI Choose the best one of the four answers given to fill in each blank.This chapter introduces digital computer, data types, the evolution of computers, and types of computers. 1 is known to all, it’s hard to find a field in 2 computers are not being used. Digital computer, also called electronic computer or computer, is a digital system that 3 various computational tasks. Digital computers use the 4 number system, which has two digits: 0 and 1.By usingvarious coding 5 , groups of bits can be made to represent not only binary numbers 6 other discrete symbols, such as decimal digits or letters of the alphabet. A computer system consists of hardware system and software system. Programs tell the hardware what to do. 7 software is designed to accomplish real-world tasks in fields such as accounting, entertainment, and engineering. Computers are usually 8 into four broad categories: microcomputers, minicomputers, mainframe computers, and supercomputers. It’s hard to give a 9 definition to each type because computer speeds and storage 10 change rapidly.1. A. As B. It C. As it D. That2. A. what B. which C. where D. when3. A. performs B. carries C. makes D. integrates4. A. decimal B. binary C. Arabian D. American5. A. technique B. Technology C. techniques D. technologies6. A. instead of B. rather than C. but also D. as well7. A. Application B. System C. Word D. Excel8. A. put B. made C. conducted D. classified9. A. precious B. progress C. proceeding D. precise10. A. capacities B. capable C. capabilities D. capacity1.A2. B3. A4. B5. C6. C7. A8. D9. D 1 0.CVII. Translate the following into English.1.By using various coding techniques, groups of bits can be made to represent not only binary numbers but also other discrete symbols.通过应用各种编码技术。
计算机专业英语全部答案(第三版)Unit1EX11 F2 T3 T4 F5 T6 F7 T 8 T 9 T 10FEX2Input hardware, storage hardware, processing hardware, output hardware power, speed, memorycentral processing unitinternal, primary, memorykeyboard, central processing unit, main memory, monitorEX3 PARTA1 F2 D3 G4 C5 B6 A7 E 8 HEX3 PART B1 F2 E3 G4 B5 A6 C7D 8 HEX41 input device2 screen3 manipulates4 instructions5 retrieve6 codes7 hardcopy8 functionEX51 T2 T3 F4 F5 T6 F7 T 8 TUNIT2EX11 T2 F3 T4 F5 T6 F7 T 8 FEX21 sizes, shapes, processing capabilities2 supercomputers, mainframe computers, minicomputers, microcomputers3 mainframe computer4 microcomputer, storage locations5 portables, laptop computers, desktop workstations6 semiconductor7 CPU, memory, storage, devices, processing, users8 microprocessor chipEX3 PARTA1 C2 A3 H4 I5 E6 F7 G 8 JEX3 PARTB1 capacity2 device3 laptop computer4 Portable computers5 Silicon6 semiconductor7 workstation8 Voltage, voltage9 RAM10ROMEX41 portable2 access3 main memory4 sophisticated programs5 processing capabilities6 instructions7 computation8 computer professionalEX51 T2 T3 F4 F5 F6 T7 F 8 T 9 T 10T11F 12T 13 T 14 TUNIT3EX11 T2 F3 T4 T5 T6 T7 F 8 F 9 T 10 F11T 12F 13F 14TEX21 microprocessor2 bus3 register 4control unit5 processor6 binary7 arithmetic, logic 8 milliseconds, microseconds9 instruction 10execution 11megahertz 12wordsize EX3 PARTA1 F2 A3 J4 C5 D6 E7 H 8 I 9 B 10GEX3 PARTB1 Storage 2chip3 buses4 ALU5 register 6control unit7 machine language 8 binary system 9 bits 10computer programEX41 configuration2 decodes3 data bus4 characters5 converts6 synchronize7 circuitry8 internal clockEX51 T2 F3 F4 T5 F6 F7 T 8 T 9 F 10 FUNIT4EX11 F2 T3 T4 F5 F6 T7 F 8 T 9 T 10 F11T 12T 13F 14F 15T 16F17T 18F 19T 20F21T 22FEX2memoryRAMdiskettes, diskschipsparityexpanded, extendedmonochromecacheROMupdatedEX3 PART A1 B2 E3 C4 J5 I6 H 7A 8 F 9 G 10DEX3 PART Bsecondary storagebufferaccesscodedisketteslotterminalsmotherboardbytescreenEX4desktopsoftwareanimationtransferredsophisticatedcompatiblecacheupgradeEX51 T2 F3 F4 T5 T6 T7 T8 F9 T 10 F11T 12F 13F 14T 15T 16F17F 18F 19F 20T21T 22TUnit 5Ex1:1 T2 T3 F4 T5 F6 F7 F 8 T 9 T 10 T11F 12T 13F 14F 15T 16T17F 18T 19F 20F21T 22T 23TEX2mail, courierhub, starlocal area networkpacketsEthernetkilobits per second, megabits per second, gigabits per second circuit switchingreassembledinternet protocol, transmission control protocol datagramsframesbinary, decimalEX3 part A1 C2 E3 B4 F5 A6 D7 H 8 GEX3 part Bhubzippeddecimalframebinary numberinternetpacketbandwidthEX4forwardedreassembledare encapsulatedcableburstysubmitare retransmittedprotocolEX5IP addressnotationdotted-decimalcomputer networkbackgroundsharedgeographicprivacyExercise to the Passage for ReadingEX6有意为维修技师使用所留被弃的、丢失的或损坏了的数据都进了数据桶。
计算机专业英语单词**Unit 1 the development of computer technologyApprentice学徒n. Numerical数字的a. Integrator积分器n.Installation安装n. Semiconductor半导体n. Numerical数字的a. Share份额n.Mainframe主机n. House给…提供住房v. Stride进步n.Component元件n. Chip芯片n.Miniature微小化v. Circuit电路n.Kit一套n.Hurdle困难n.Simplify简化v.Drop-out辍学n.Fledgling刚刚起步的a. Unprecedented前所未有的a. Spreadsheet电子表格n. Automate自动化v. Band结合v.(与together连用)Novice初学者n.Abruptly突然地ad. Dub配制v.Prestige声望n.Fad时尚n.Retrieve检索v.Legitimate合法的a.**unit 2 computer systemComponent构建n. Calculation预料n. Payroll工资单n. Balance平衡vt. Chequebook账本n. Vary变化v.Diagram图解,图表n. Motherboard主板n. Memory内存n.Storage存储n.Data数据n.Process处理v. 处理过程n. Megabyte兆字节n. Floppy软盘n.Permanent永久性的a. Character字符n.Removable可移动的a. Command指令n.Keyboard键盘n.Remote遥控的a.Monitor监控器,显示器n. Display显示v.Text文本n.Graphical图表的a. Image图像n.Screen屏幕n.Feature(以…为)特征v. Resolution 分辨率n. Co-ordinate坐标n. Refresh刷新v.Specify列举v.Flicker闪烁v.Mouse鼠标n.Invert倒转v.Trackball轨迹球n. Button按钮n.Update改动v.Movement位移n.Printer打印机n.Available可用的a. Modem(modulator/demodulator)调制解调器n.Via通过,以…为媒介prep.**Unit 3 floppy drivesFloppy软磁盘 n. Drive驱动器n.Head磁头n.Diskette磁盘n.Mechanism机械装备,机械作用n.Actuator拖动装置n. Erasure删除n.Minimal最小的a.Spindle主轴n.Torque扭矩n.Compensation补偿,调整n. Sticky粘性的a.Slippery表面光滑的a. Strobe测速仪n.Fluorescent发光的a. Rim轮缘n.Wagon运货车n.Interface接口,界面n. Faceplate面板n. Ribbon丝带n.Weird奇异的a.Daisy菊花链n.Configuration配置n. Configure排列v. Jumper跳线(插座)n. Terminate 终止n. Terminator终端器n. Termination终端器装置n. Echo反射信号n.Resistor电阻器n. Solder焊接v.**unit 4 unx operating systemOverview概论n.Flavor流行,味道n. Hierarchical分层a. Portability轻便n. Kernel内核n.Assembler汇编语言n. Debugger排除故障n. Compiler程序编制器n. Outline概要n.Enforce执行v.Prompt提示,提问n. Time-slicing时间片n. Interval间歇n.Restore恢复v.Remainder余数n. Reside保存v.Swap交换v.Shuttle往复运动v.Degrade降低v.Type打字v.thrash反复地做v.priority优先n.dynamically动态地,高性能的ad.multitasking多任务n. foreground前台,前述事项n. background后台n ampersand符号&(and)n.**unit 5 programming languageSyntax句法n.Punctuation标点n.Execute运行vt.Dumb呆板的a.ManiSequence顺序n. Incorporate结合,吸收vt. Abstract使…抽象化,提取vt. Variable变量n.Constant常数n.Troubleshoot故障寻找v. Assembler汇编语言n. Parameter参数n.Numerical数字的a.Access接近,存取,访问n. Routine惯例n.Compiler自动编码器,编译程序n.Interpreter解释器n. Devise设计,制定v. Underlie成为…的基础v. Streamline做成流线型v. String字符串n.Matrix矩阵n.Facilitate促进v.Icon图标n.Simulate模仿v.Random随机的a.Procedural程序性a. Cyclical循环的a.Footnote注脚n.Script脚本v.Library库n.Function函数,功能n.Segment部分n.Inherit继承v.Spark使闪耀,激励v. Spectrum范围,幅度n.**unit 6 computer application office solutionRecipe秘诀n.Compatible兼容a. Archive存档v.Resolution分辨率n. Pixel像素n.Pitch斜度n.Dock连接v.Serial串行的a.Port端口n.Plug-in插入n.Peripheral外围的a. Interpolate改写v. Duplexing双向的a. Collate 整理v.Staple钉住v.Cropping剪切方法n. Audit查账n./v. Implement实施v. Surge浪涌n./v.** unit 7 A new officeVersion版本n.Suite组件n.Productivity生产力n. Application应用程序n. Betaβ软件测试版本n. Bill宣布v.Ambitious有抱负的a. Release发表v./n. Steer使…朝向…v. Integration 结合n. Unveil新发售v. Initiative率先,提倡n. Sweeping彻底的a. Collaboration合作n. Recognition识别n.Native本机的a.Component组件n.Linchpin关键,中心点n. Move提议,步骤n. Repository资料库n. Pivot要点n.Chart图表n.Integrate结合v.Quote报价n.Ticker股票行情自动收录机n.Workflow工作流程n. Upcoming即将到来的a. Interval间隔n.Say(插于句中)例如v. Personalize使…个性化v. Interactive交互的a. Miscellaneous杂货的,其他的a.Deployment展开n. Routine例行程序n. Tally计算,符合v. Conjunction 结合n.**unit 8 Introduction to browsersBrowser浏览器n.Transfer转移v.Layout布局,装配图n. Hypertext超文本n. Tutorial辅导n.Cursor光标n.Abbreviate缩写v. Format格式n.Access存取,访问n. Session会话n.Rescue营救v.Randomly随机的ad. Navigation导航n. Image图片n.Intuitive直观的a. respectively分别ad. Default默认n.Clickable可点击的a.**unit 9 MultimediaEssentially本质上ad. Integration集成n. Audio音频的a.Static静止的a.Animation动画片n. Capability能力,性能n. Convert变换v.In-line内部的a.Graphics图形n.Conversion转换n.External外部的a.Flexible灵活a.Tailor使适应v.Configure使成型,设置v. Setting环境,领域n. Platform平台n.Native内部的a.Installation装置n. Availability有效,可利用n. Synchronize同步化v. Extension扩展名,辅助设备n.Virtual虚拟的,实际上的a. Originate发起,创办v. Synchronization同步n. Plu** unit 10 local area networkGateway网关n.Formatting格式化n. Backspace后移n.Keystroke击键n.Update使现代化,修改v. Buffer缓冲n.Flexibility灵活性n. Interface界面,接口n. Protocol协议,草药n. Workstation工作站n. Attribute属性,特征n. Vector矢量n.Stand-alone独立的a. Console控制台n.Node节点n.Mainframe主机n.Computational计算的a. Mundane世俗的a.Intense强烈的,高度的a. Router路由器n.Evolve进化v.Forward促进,转交,发送v. Monitor监视,检验v. Traffic通行n.Hierarchical分层的a. Administrator管理人员n. Invisible不可见的a. Elsewhere在别处ad.** unit 11what is the internetInterconnect使相互连接v. Surf冲浪v.Bookmark书签n.Brokerage佣金n.Site网站n.Resume简历n.Pornographic色情的a. Filter过滤v.Evaluate评价v.Praise提出v.Hallow视为神圣v.Database数据库n.Specify指定,详记v. Keyword关键字n.Facility设施,工具n. Ala按… prep.Acronym首字母缩写词n. Newsgroup新闻组n.Forums论坛会n.Target目标n.Index索引n.Bury隐藏,埋葬v.Somewhere在附近,在某处ad. Cyberspace网络空间n. Stuff材料,资料n. Bill账单n.** unit 12 electronic data interchangeEquivalent相等物n.Procurement取得,造成n. Process活动,作用,步骤n. Facilitate推进v. Hitherto迄今ad.Architecture组织,建筑学n. Transmit传送v.Dispatch派送v.Compliance屈服n.Explicit明确的a.Moderately适中的ad. Sophisticated复杂的a. Infrastructure基础n. Retention保持n.Participant参与者n. Implement贯彻,完成v. Advantageous有利的a. Inventory存货n.Distribution分配,销售n. Automate使自动化v.Rationalize使合理化v. Catalyst催化剂n.Boundary边界n.Commence开始,倡导v. Cocomitant伴随a./伴随情况n. Coordinate协调v.Incompatible不能并立adj. Address委托,解决v. Transcription抄写,翻译n. Incidence发生,影响范围n. Transaction交易,业务n.** unit 13 beginners guide to ecommerceMug抢劫v.Interchangeably互换的ad. Issue发布v.Anonymous匿名的a.Transaction买卖n.Merchant商人n.Identity身份n.Merchandise商品n.Indorse=endorse签名v. Encode把…编码v.Cybercash=e-money=emoney电子货币n.Encrypt把…加密v. Receipt收据,接受n. Credit信誉n.Initiate开始v.Transfer移动n.Bond债券n.Corporate共同的a. Ship输送v.Format版式n.Broker经纪人n.Account账目n.Offset抵消v.Template样板模式n. Insurmountable不可逾越的a.Retailer零售商n. Expire到期v.Notify通知v.Transpire发生v. Fraud欺诈n.Lease租用v.Alternative选择n. Access存取v.Ascertain确定v. Legitimate合法的a. Leery多疑的a.Contest对…提出异议v. Chargeback退款n. Expense开支n.Would-be未来的a. Typically向来,普通ad. Stringent严格Eligibility 合格,候选资格n.** unit 14 virusReplicate复制v. Halt停止n.Transmit传播v.Security安全n.Infection感染n. Mechanism机制n. Intrigue激起(sb.的)好奇心v.Payload荷载n.Trigger引发n./v.Overwrite修改v. Sector扇区n.Random随机n.Unresponsive未反应的a. Flash快速n.Bootstrap引导(程序)n. Ultraviolet紫外线n. Dedicated专用的a. Executable可执行的a. Stub片断n.Object对象nFunction函数n.Align排队n.Even偶数的a.Alignment排队n. Chunk块n.Slack闲散的a.Variant变量n.Peculiarity独特性n. Linker连接器n.Fragment碎片n.Allocate分配v.Crucial关键的a. Deem认为v.Hook占用n./v. Interrupt中断n. Descriptor描述n. Privilege特权n. Handler管理器n. Alter改变v.**useful phrases词组Make great/rapid strides 取得很大进步In the form of以…形式 At the rate of以…速度 Be accustomed to习惯于 A matter of大约All levels of各行各业的 A number of许多Be made up of由…构成 Depend upon取决于Be concerned about关心,涉及Refer to称为Take away取下,拿走Up to直到Be locate in/on位于Dial up拨号Associate with与…联合 In addition to此外…还有 Attach to把…附在Be measured in以…为衡量单位 Coat with镀以…For this reason因此Serve as充当Distinct form截然不同 Confuse A with B把A和B相混淆Trick…into哄骗For the most part大部分 Build in插入Equip…with装备In short总之Derive…form由…而来 In total总计,全体A set of一套Carry on继续进行Present sb. With sth.把sth.送给sb.Interact with与…相互作用 Be similar to与…相似 Consist of由…构成Divide…by以…来除Give access to得到,到达,准许出入Be adapted to适应于On the fly匆忙地Be restricted with把…看做一致 Be restricted to仅限 Plug in(可分开用)接上插头通电 By comparison相比之下 Take over接管,占领Sit back放松,休息Take…off除去,跃起By the name of名叫…的 Call for呼吁Build in内建Function as作为…而起作用 Integrate with与…结合 At timed intervals定期的 Beef up加强In conjunction with与…结合 Be similar to与…相似 Figure out算出,解决 Correspond to与…一致 Be likely(unlikely)to/that可能(不可能)发生某事Set up安装Distinguish…form…区分 In doubt拿不准A variety of各种各样的 Plug in接上插头通电 By comparison相比之下Take over接管,占领 Sit back放松Take…off除去,跃起 By the name of名字叫…的 Call for呼叫,要Build in内建Function as作为…而起作用 Integrate with与…结合 At timed intervals定期 Beef up加强In conjunction with与…结合 Be similar to与…相似 Figure out算出Correspond to与…一致 Be likely(unlikely)to/that可能(不可能)发生sth.Set up安Distinguish…from…区分In doubt拿不准A variety of各种各样的 Deal with处理,论谈 Tailor to使适应…的需要Choose to愿意Be concerned with牵涉 In term of就…来说Relieve…from减轻,解除Range from…to从…到…不等 Log in注册,进入In turn依次Split…into分成All over到处Click on单击Start out起始于Communicate with与…通信 Compare with与…相比Contrast with与…对照Together with连同,和…一道 Lead to导致A range of范围Result in导致Be every bit as和…完全一样 Specialize in专门从事…As opposed to相比之下Have difficulty/trouble(in)doing…做sth.有困难End up结束Be capable of能够Consist of由…组成Meet the condition of满足…的条件 Over and over again一再地,反复地Bring to使人复生/恢复知觉 At the end of在…结束Apart from除…之外。
Key Terms Page 1of 6 Key TermsKey TermDefinition3G cellular network (249) A computer network that allows users to download data from the Internet at 400 to 700 Kbps using cell phone technology. analog signal (247) Continuous electronic waves. asymmetric digital subscriber line (ADSL) (248) The most widely used types of DSL. backbone (258) A common connecting cable on which all communications travel along. (see also bus) bandwidth (249) A measurement of the width or capacity of the communication channel. base station (254) A network’s centrally located receiver that interprets incoming radio frequencies and routes communications to the appropriate devices. (see also wireless receiver) bits per second (bps) (247) How transfer speed is measured Bluetooth (245) A short-range wireless communication standard that uses microwaves to transmit data over short distances broadband (250) The bandwidth used for high-capacity transmissions. broadcast radio (245) Uses radio signals to send and receive signals from wireless devices. bus (258) A common connecting cable on which all communications travel along. (see also backbone) bus network (258) Each device in the network handles its own communications control. cable modem (249) Use existing television cables to provide high-speed connections to the Internet. cellular service (249) Offer an alternative for mobile devices and laptops. client (251) A node that requests and uses resources available from other nodes. client/server network system (260) A computer network where one computer coordinates and supplies services to other nodes on the network. coaxial cable (244) A high-frequency transmission cable with a single solid-copper core. Communication channel (244) The actual connecting or transmission medium that carries the message. Communication system (243) An electronic system that transmit data from one location to another computer network (251) A communication system that connects two or more computers so that they can exchange information and share resources. connectivity (242) Using computer networks to link people and resources. demodulation (247) The process of converting from analog to digital. dial-up service (248) Using standard telephone lines and conventional modems to link to the Internet or other computers digital signal (247) A representation of the presence or absence of an electronic pulse – on/off digital subscriber line (DSL) (248) Uses existing telephone lines to provide high-speed connections distributed data processing system Computers that can perform processing tasks at their own Key Terms Page 2of 6 (258) dispersed locations. distributed processing (251) A system in which computing power is located and shared at different locations. domain name server (DNS) (250) Converts text-based addresses to IP addresses Ethernet (253) The most common way in which nodes can be connected to one another and communications can be controlled. external modem (247) A modem that stands apart from the computer and typically is connected by a cable to the computer’s serial port. extranet (262) A private network that connects more than one organization. fiber-optic cable (244) Transmits data as pulses of light through tiny tubes of glass. firewall (263) A security system designed to protect an organization’s network against external threats. global positioning system (GPS) (245) Global positioning system (GPS) devices use location information sent by satellites to uniquely determine the geographic location of the device. hierarchical network (258) Consists of several computers linked to a central host computer, but also are hosts to other, smaller computers or peripheral devices. home network (254) Local Area Networks used by individuals in their homes and apartments. host computer (251) A large centralized computer, usually a minicomputer or a mainframe. hub (251) The center or central node for other nodes. infrared (245) A type of wireless connection that uses infrared light waves to communicate over short distances. internal modem (248) A modem that consists of a plug-in circuit board inside the system unit. intranet (262) A private network within an organization that resembles the Internet. IP address (Internet Protocol address) (250) A unique numeric address for every computer on a network. local area network (LAN) (253) Networks with nodes that are in close physical proximity low bandwidth (250) Used for standard telephone communication. (see also voiceband) medium band (250) the bandwidth used in special leased lines to connect minicomputers and mainframes metropolitan area network (MAN) (254) A network that span distances up to 100 miles. microwave (245) A type of communication uses high-frequency radio waves. modem (247) Modulator-demodulator, enables digital microcomputers to communicate across analog telephone lines. modulation (247) The process of converting from digital to analog. network administrator (251, 264) A computer specialist responsible for efficient network operations and implementation of new networks. network gateway (253) A device that allows one LAN to be linked to other LANs or to larger networks. network hub (255) A central unit in a network, such as a server. Key Terms Page 3of 6 network interface card (NIC) (251) Expansion cards located within the system unit that connect the computer to a network network operating system (NOS) (251) An operating system that control and coordinate the activities of all computers and other devices on a network. node (251) Any device that is connected to a network. packet (250) Data reformatted or broken down into small parts PC Card modem (248) A modem that is a credit card –size expansion board that is inserted into portable computers peer-to-peer network system (261) A network system where nodes have equal authority and can act as both clients and servers. polling (255) A type of communications where each connecting device is asked whether it has a message to send. protocol (250) Rules for exchanging data between computers proxy server (263) A computer through which all communications between the company’s internal n etworks and the outside world must pass. ring network (258) Each device is connected to two other devices, forming a ring with no central computer satellite (245) A type of communication that uses satellites orbiting about 22,000 miles above the earth as microwave relay stations. satellite/air connection service (249) Use satellites and the air to download or send data to users at a rate seven times faster than dial-up connections. server (251) A node that shares resources with other nodes. star network (255) A number of small computers or peripheral devices are linked to a central unit. strategy (260) A way of coordinating the sharing of information and resources T1, T2, T3, T4 lines (248) Special high-speed lines leased from telephone companies. telephone line (244) A type of cable that uses 2, 4, or 8 pairs of copper wire. terminal network (260) A network system where processing power is centralized in one large computer, usually a mainframe. time-sharing system (258) Several users can share resources (time) on a central computer. topology (255) How a network is arranged or configured transfer rate (247) The speed at which data can be transmitted Transmission Control Protocol/Internet Protocol (TCP/IP) (250) The standard protocol for the Internet voiceband (250) Used for standard telephone communication. (see also low bandwidth) wide area network (WAN) (254) A countrywide or worldwide network that spans distances greater than 100 miles. Wi-FI (wireless fidelity) (245) A wireless standard used to connect computers to each other and to the Internet. wireless LAN (WLAN) (254) Local area network that uses wireless devices to connect nodes together. wireless modem (248) A modem that may be internal, external, or a PC Card sends and receives through the air. wireless receiver (254) A network’s centrally located receiver that interprets incoming radio frequencies and routes communications to the appropriate devices. (see also base station) Crossword Puzzle Answers:AcrossNum. Clue Answer 5 Interprets and routs incoming radio frequencies. Base station7 Continuous electronic waves. Analog9 Configuration of a network. topology10 Network interface card. NIC11 Transfer speed or transfer rate. bps12 Short range wireless communication standard. bluetooth14 Measurement of the width of the communication channel. bandwidth DownNum. Clue Answer 1 Node that requests and uses resources available from other nodes. client 2 Each device in the network handles its own communications. Bus network 3 Device that allows links between LANs. Network gateway 4 Process that converts digital to analog. modulation6 Pieces of a message sent over the Internet. packets8 Global positioning system. GPS13 Any device that is connected to a network. node15 Uses existing telephone lines to provide high-speed connections. DSL 16 Central node for other nodes. hubNum Multiple ChoiceAnswers Matching Answers1 C G 2 B B 3 A A 4 D I 5 C H 6 D E 7 B C 8 B J 9 B D 10 D F Open Ended Questions:to another 2.Identify and describe the various physical and wireless communication channels.PhysicalTelephone lines - consist of twisted-pair cable made up of hundreds of copper wires. Coaxial cable- a high-frequency transmission cable with a single solid-copper core. Fiber-optic cable - transmits data as pulses of light through tiny tubes of glass. WirelessInfrared - uses infrared light waves to communicate over short distances. Broadcast radio sends and receive radio signals through transceivers. Microwave - uses high-frequency radio waves. Satellite - uses satellites orbiting above the earth as microwave relay stations. 3.Identify the standard Internet protocol and discuss its essential features.The standard protocol for the Internet is TCP/IP (transmission control protocol/Internet protocol). Every computer on the Internet has a unique numeric address called an IP address. Information is reformatted or broken down into small parts called packets. 4.Define and discuss the four principal network topologies.S tar network - a number of small computers or peripheral devices are linked to a central unit. Bus network - each device in the network handles its own communications control. Ring network - each device is connected to two other devices, forming a ring. Hierarchical network— consists of several computers linked to a central host computer, and also hosts to other, smaller computers or to peripheral devices. 5.Define and discuss the three most common network strategies.Terminal network system,- processing power is centralized in one large computer, usually a mainframe. - use one computer to coordinate and supply services to other Client/server network systems - use one computer to coordinate and supply services to other nodes on the network. Peer-to-peer network system, nodes have equal authority and can act as both clients and servers. Answers to End of Chapter materials Page 5 of 6 Focus Applying Technology Expanding YourKnowledgeWriting AboutTechnologyEthical Electronic Monitoring Digital Rights Management Web Tools Palm How Napster and Gnutella Work Software Tools Home Networking Distributed Computing How Wireless Home Networks Work Hotspots Writing Skills Ethical focusWriting About Technology exercise #1 Electronic Monitoring explores the FBI Carnivore monitoring system and how it affects personal privacy. Writing About Technology exercise #2 Digital Rights Management explores the issue of sharing copyrighted material over the Internet and how it affects software piracy. Applying Technology exercise #3 Palm explores how Palms work with the Internet and looks at the types of information are available. Expanding Your Knowledge #2 How Napster and Gnutella Work looks at the different types of network architectures employed by each program and their efficiencies. Applying Technology exercise #1 Home Networking works with the Making it Work for you section in exploring the different types of home networking and how to configure Applying Technology exercise #2 Distributed Computing has the students research the concept of distributed computing, how it works, and why it is beneficial. Expanding Your Knowledge exercise #1 How Wireless Home Networks Work has the students discover basic features and functionalities of home networking and how they can Expanding Your Knowledge exercise #3 Hotspots has the student explore the technology of public Internet access and what is necessary to use it. 。
计算机专业常用英语词汇总结计算机专业英语词汇指与计算机硬件、软件、网络等多方面有关的英语词汇,主要包括硬件基础、计算机系统维护、计算机网络基础、软件、程序设计语言、计算机网络技术、IT职场英语等词汇。
店铺为大家总结一些计算机常用词汇:compilation 编辑compilation time 编译时间compilation unit 编译单位compilc 编译compile 编辑compile and go 编译及执行compile phase 编译时间compile time 编译时间compile, machine language 机器语言编译compile-time error 编译时期错误compiled resource file 编译资源文件compilei 编译器compiler 编译器compiler defect report 编译器缺失报告compiler diagnostcs 编译程序侦断compiler directive 编译程序定向compiler generatoi 编译程序产生器compiler interface 编译器界面compiler language 编译器语言compiler manager 偏译器经理compiler options 编译器任选compiler vs. interpreter 编译器对编译器compiler, cobol cobol编译器compiler-complier 编译程序的编译程序compilers 编译器compiling duration 编译期间compiling routine 编译例程compiling time 编译时间complement base 互补基点complement instruction 补码指令complement on n n补码complement on n-1 n-1补码complement, diminished 减少补码complement, nines 九补码complement, noughts 0补码complement, ones 1补码complement, tens 10补码complement, two 2补码complementary 补色complementary bipolar ic 互补双极集成电路complementary metal oxide semiconductor (cmos) 互补式金氧半导体complementary mos(cmos) 互补金属氧化半导体complementary operation 互补运算complementary operations 互补运算complementary operator 互补运算子complementary scr(cscr) 互补硅控整流器complementei 补码器complementing 互补complete carry 完全进位complete object 终衍物件complete operation 完全作业complete routine 完全例程completeness 完整性completeness check 完整检查completeness errors (remote computing sy) 完成误差completion code 整体码complex bipolai 复合双极complex constant 复合常数complex data 复合贫籵complex decision-making simulation 复合决策模拟complex instruction set computer (cisc) 复杂指令集计算机complex instruction set computing (cisc) 复杂指令运算complex number 复数complex relocatable expression 复数可重置表示法complex script 复杂脚本complex-bound 复杂系结compliant 相容compliant naming 适用的名称compnter, first generation 第一代计算器component 组件component address 组件地址component code generator 组件程序代码产生器component density 组件密度component derating 分件降低定额component erroi 组件误差component fail impact analysis, cfia 组件失误撞击分析component gallery 组件展示廊component load balancing 组件负载平衡component name 组件名称component object 组件对象component object model 组件对象模型 (com) component object model (com) 组件对象模型component project 组件项目component registrar 组件登录器component selector 组件选取器component services explorer 组件服务总管component site 组件站台component software 组件软件component stress 组件应力component tray 组件匣component video 成分视讯component wizard 组件精灵component, solide-state 固态组件component-based development 组件式软件开发技术compose 撰写compose buffer 撰写缓冲区composite 合成composite black 合成黑色composite cable 复成电境composite conductoi 复合导体composite console 复合控制台composite control 复合控件composite data servicevendoi 复合数据服务贩责者composite display 合成屏幕composite filter 复合滤波器composite module data set 复合模块数据集composite module library 复合模块数据馆composite modules 复合模块composite moniker 复合型composite operator 复合运算子composite video 复合视讯composite video input 复合视讯输入composited circuit 复成电路compositing 复合composition error 组合误差composition file 复合档composition video signal 复合视频信号compound condition 复合条件compound document 复合文件compound document files 复合文件档案compound file 复合档案compound logical element 多逻辑组件compound-assignment operator 复合设定运算子compoundstatement 复合叙述compress 压缩compressed files 压缩档compressed serial link internet protocol, compressed slip 压缩式串连链接因特网协议compressed video vs. facsimile 压缩视频对传真compression 压缩方式compression algorithm 压缩算法compression format 压缩格式compression scheme 压缩方法compression, data 数据压缩compression, zero 零压缩compression/decompression (codec) 编码/译码compressor 压缩器compromise net 协调网络computation, address 地址计算computation, implicit 隐含计算computational stability 计算稳定度computcr-aided dispatch(cad) 计算器辅助发送compute 运算compute mode 计算型computer 计算机;计算器computer & communications research labs (itri) 工研院计算机与通讯工业研究所computer administrative records 计算器管理记录computer aided logistic support (cals) 计算机辅助后勤支持系统computer aided software engineering (case) 计算机辅助软件工程computer animation 计算器电影制作computer application 电脑应用系统computer architecture 电脑体系结构computer bureau 电脑服务中心computer capacity 计算器容量computer cartography 计算器制图法computer center 电脑中心computer center manager 计算器中心管理人computer circuits 计算器电路computer communications 计算机通信computer communications system 计算器通信系统computer conferencing 电子计算器会议computer configuration 计算器组态computer configuration 计算器组态computer console 计算器控制台computer control 计算器控制computer duplex 计算器双工computer emergency response team 电脑紧急应变小组computer equation 计算器方程式computer equipment operation 电脑设备操作computer generated image (imagery, cgi) 计算机产生的影像computer graphics (cg) 计算机图形;计算器制图法computer graphics (cg) 计算器制图法computer graphics interface (cgi) 计算机图形接口computer graphics technology 计算器制图法技术computer image processing 计算器影像处理computer installation (service) 安装计算机 [ 服务 ]computer instruction 计算器指令computer instruction code 计算器指令码computer instruction code 计算器指令码computer instruction set 计算器指令集computer integrated manufacturing (cim) 计算机整合制造computer interface types 计算器分界面类型computer interface unit (ciu) 计算器界面单位computer language 计算器语言computer language symbols 计算器语言符号computer learning 计算器学习computer letter 计算器信件computer logic 计算器逻辑computer memory 计算机内存computer micrographics 计算器微图形computer name 计算机名称computer network 电脑网络computer network components 计算器网络组件computer numerical control 计算器数值控制computer operating procedures manual 电脑操作程序手册computer operation 计算器运算computer operator 电脑操作员computer output microfilm (com) 计算器输出微胶片computer output microfiche 电脑输出缩微胶片computer output microfilm 电脑输出缩微胶卷computer output microfilmer (com) 计算器输出微影机computer output microform 电脑输出缩微方式computer peripherals 计算器外围设备computer power center (cpc) 计算机动力中心computer program 电脑程式computer program origin 计算器程序原始computer programming language 计算器程序语言computer project 电脑计划computer readable medium 电脑可读媒体computer scicnccs (cs) 计算器科学computer service level requirement 电脑服务水平要求computer service orsanization 计算器服务组织computer simulatoi 计算器仿真器computer site preparation 电脑场地准备工作computer storage 计算器储存器computer stores 计算器商店computer system 电脑系统computer system audit 计算器系统审计computer telephony integration (cti) 计算机语音整合computer terminal 电脑终端机computer time 计算器时间computer utility 计算器公用computer virus 电脑病毒computer vision 计算机视觉computer word 计算器字computer-aided design & drafting (cadd) 计算机辅助设计与绘图computer-aided design (cad) 计算机辅助设计computer-aided education (cae) 电脑辅助教育computer-aided engineering (cae) 计算机辅助工程computer-aided experiment (cae) 计算机辅助实验computer-aided instruction (cai) 计算机辅助教学computer-aided manufacturing (cam) 计算机辅助制造computer-aided publishing 电脑辅助出版computer-aided test (cat) 计算机辅助测试computer-assisted learning (cal)计算机辅助学习computer-assisted management 计算器辅助管理computer-assisted publishing 电脑辅助出版computer-assisted software engineering tool 计算机辅助软件工程工具computer-assisted typesetting 电脑辅助排字computer-based automation (cba) 计算器基准自动化computer-based training (cbt) 计算机辅助训练computer-controlled pattern generator 计算器控制型样产生器computer-generated (cg) 计算机合成的computer-generated map 计算器产生地图computer-independent language 计算器通用语言computer-integrated manufacturing (cim) 计算机整合制造computer-mediated communication (cmc) 计算机媒介沟通;计算机中介传播(沟通)computer-operated memory test system 计算器运算记忆测试系统computer-oriented language 机向语言computerarchitecture 计算机结构computerese 计算机文computerization 电脑化computerization requirement 电脑化需求computerization strategy 电脑化策略computerized foreman 计算机化领班computerized hyphenation 计算机化忠诚computerized numerical control (cnc) 计算机化数字控制computerized patient record (cpr) 电子病历computerized tomography 计算机化断层摄影术computer、communication、consumer electronics (3c) 3c多元化技术整合computex computexcomputing 计算computing amplifier 计算放大器computing element 计算组件computing machinery 计算器械computing power 计算能力computing, multiaccess 多重接达计算computor, sensor-based 传感器为基础的系统comsat 通信卫星con 主控台concatenate 序连concatenate data set 序连资料集concatenated key 串连索引键concatenation 序连concatenation character 序连字符concatenation operator 串连运算子concentrated messages 集中信息concentration 集中concentration, data 资料集中concentrator terminal buffer(ctb) 集讯器终端机缓冲器concept coordination 概念协调conceptual data model 概念数据模型conceptual infrastructure 概念基本建设conceptual level 概念级conceptual modei 概念模式conceptual model 概念模型conceptual modeling 概念模拟conceptual schema 概念模式conceptual system design 概念系统设计concert 音乐会concordance 索引concordance program 索引程序concordant 调和排列concrete 具象的concrete syntax 具体语法concrete syntax of sgml sgml的具体语法concrete syntax parameter 具体语法参数concurrcnt 同作concurrency 并行性concurrency mode 同作模态concurrency, executive-system 执行系统同作concurrency, operations(real-time) 实时同作操作concurrency, real-time 实时同作concurrent connections 同时联机concurrent i/o 同作输出入concurrent operating control 同作作业控制concurrent operation 同作运算concurrent processing 同作处理concurrent real-time processing 同作实时处理concurrent/concurrency 并行。
计算机专业英语翻译及课后答案Unit Nine: The InternetUnit Nine/Section AI. Fill in the blanks with the information given in the text:1. research2. ICANN或the Internet Corporation for Assigned Names and Numbers3. router; gateway4. temporary/dial-up; permanent/dedicated5. ISP或Internet service provider6. network; host7. decimal8. mnemonicII. Translate the following terms or phrases from English into Chinese and vice versa:1. cell phone 蜂窝电话,移动电话,手机2. IP address 网际协议地址,IP地址3. autonomous system 自主系统4. dial-up connection 拨号连接5. network identifier 网络标识符6. binary notation 二进制记数法7. mnemonic name 助记名,缩写名8. Internet-wide directory system 因特网范围的目录系统9. name server 名称服务器10. Internet infrastructure 因特网基础结构11. 助记地址mnemonic address12. 网吧cyber cafe13. 宽带因特网访问broadband Internet access14. 顶级域名top-level domain (TLD)15. 因特网编址Internet addressing16. 点分十进制记数法dotted decimal notation17. 因特网服务提供商Internet service provider (ISP)18. 专用因特网连接dedicated Internet connection19. 主机地址host address20. 硬件与软件支持hardware and software supportIII. Fill in each of the blanks with one of the words given in the following list, making changes if necessary:Early computer networks used leased telephone company lines for their connections. Telephone company systems of that time established a single connection between sender and receiver for each telephone call, and that connection carried all data along a single path. Whena company wanted to connect computers it owned at two different locations, the company placed a telephone call to establish the connection, and then connected one computer to eachend of that single connection.The U. S. Defense Department was concerned about the inherent risk of thissingle-channel method for connecting computers, and its researchers developed a differentmethod of sending information through multiple channels. In this method, files and messagesare broken into packets that are labeled electronically with codes for their origins, sequences,and destinations. In 1969, Defense Department researchers in the Advanced Research ProjectsAgency (ARPA) used this network model to connect four computers into a network called theARPANET. The ARPANET was the earliest of the networks that eventually combined to become what we now call the Internet. Throughout the 1970s and 1980s, many researchers in the academic community connected to the ARPANET and contributed to the technological developments that increased its speed and efficiency.IV. Translate the following passage from English into Chinese: 因特网只是提供了将许许多多的计算机连接在一起的物理与逻辑基础结构。
Unit nine1 program performance in one area must be sacrificed for the sake of the general performance of the software.for the sake of ----: 由于-----的缘故,为了-----。
作此意讲时主要是指为了要得到某物,不是指为了什么原因。
He goes to the seaside for the sake of his health .注:在复数名词后面用sake 或sakes 均可,但含义不同go to the seaside for the children`s sake (单数)(意味着孩子们的目的相同)do it for both our sakes (复数)(意味着我们的目的不同)可以改成:go to the seaside for the sake of the childrendo it for the sake of both of us .2 building blocks 程序块3 computability theory 算法修正4 Computer scientists in this field seek to develop techniques for determining the inherent efficiency of algorithms with respect to one another.with respect to : in reference to ; in regard to .inquiries with respect to the best route to take .5 Computer scientists attempt to make it easier for users to access databases,prevent access by unauthorized users,-----attempt to : 作为动词,attempt 比try 更正式,但听起来可能显得做作。