计算机专业英语Unit 8
- 格式:doc
- 大小:65.50 KB
- 文档页数:9
Unit 8 Computer NetworkingT ext 1 Data Communications Exercises1. Fill in the blanks with appropriate words according to the text.(1)The end equipment is either __generates the digital information for transmission_or_ uses the received digital data.(2)When digital data are transmitted, they are _in serial form_.(3)_DTE___ is data terminal equipment.(4)_STACO is the corresponding unit at the secondaries.(5)Between the DTEs, first is _the modems_, and then is the communicationsequipment__.(6)_DCE__ accepts the serial data stream from the DTE.(7)At the transmit end, the modem can be considered a form of _digital-to-analog_converter, while at the receive end, it can be considered a form ofanalog-to-digital__ converter.(8)DCE converts the received_ analog signal_ to a serial digital data stream_.2. Multiple choices.(1)The end equipment in a communication system includes _ABCD_.A. computersB. CRTsC. printersD. keyboards(2)The equipment B_D__.A. manipulates digital information internally in serial formB. manipulates digital information internally in word unitsC. transfers the number of bits in parallelD. transfers the number of bits in serial form(3)DTE is __BD_.A. Digital T-carrierB. data terminal equipmentC. satelliteD. the last piece of equipment that belonged to the subscriber in a data link system(4)There are AB_ between the DTEs.A. the modemB. communications equipmentC. digital-to-analog converterD. will be replaced by an updated standard3. Translate and analyze the following sentences.(5)This equipment generally operates digital information internally in word units.句子组成:in word units介词短语作方式状语修饰operates翻译:_这种设备通常在内部以字为单位处理数字信息_____(6)It converts the received analog signal to a serial digital data stream.句子组成:convert……to指将……转换成……翻译:它把接收到的模拟信号转换成串行数字数据流(7)Data communications equipment (DCE) accepts the serial data stream from theDTE.句子组成:from the DTE修饰动词accept翻译:数据通信设备(DCE)从DTE接收串行数据流Reading comprehension.Security is an important consideration in the Internet world. The computer has a way of knowing who you are. Most LANs or mainframes require each user to log in, or sign on to the system. To do this, you should type in your user ID before a prompt. Y ou are then prompted for a password. Passwords are special codes you use to “lock” your account. Obviously you need to be careful about protecting your password if you are building nuclear power plants or something, but what about the rest of us? A student recently got some help from her friend on email. She gave him her password to a class account, and he wrote it down. Apparently some of his buddies found the password and logged in using the student’s user ID and password, and sent a very obscene message to the class. The student nearly lost her account, because she had been sloppy with her password.Change you password regularly!Some hints:∙Don’t use your dog’s name. People will guess it.∙Don’t use words in English, people can hook up spell checkers.∙Consider combining words and numbers.Answer the following questions according to the article above.(8)What does the passage mainly discuss?Security is an important consideration in the Internet world.(9)According to the passage, we know security is an important consideration __in theInternet world_.(10)Why the author thinks that is important to protect your password if you are buildingnuclear power plant or something?Because the password may be used by other people(11)At last, the author give some hints, what are they?They are: first, don’t use your dog’s name. People will guess it. Second,don’t use words in English, people can hook up spell checkers. And last, consider combining words and numbers.Text 2 Architecture of Computer Networks Exercises1. Fill in the blanks with appropriate words according to the text.(12)Computer network is a complex unit, it consists of two or more connectedcomputing units.(13)Design of a network and its logical structure should comply with a set of designprinciples.(14)Two important network architectures are: the OSI reference model and the TCP/IPreference model.(15)The _OSI__ model was created by the ISO.(16)Note that the OSI model itself is not a network architecture__.(17)TCP/IP is a communication protocol, it provides many different networkingservices.(18)The TCP/IP Internet protocol suite is formed from two standards :_the TCP__ andthe IP__.(19)__TCP/IP__ is the foundation of the Internet as we know it today.(20)TCP means it is on the __transport__ layer and IP means it is on the __network__layer separately.2. Decide whether the following statements are True or False.(21)Design of a network and its logical structure should comply with a set of designprinciples. ( √ )(22)The OSI model was not created by the ISO. ( × )(23)The network architecture is a layer-based. ( √ )(24)The OSI model is a foundation for all comparing protocols. ( × )(25)The OSI model is a network architecture. ( × )(26)The TCP/IP Internet protocol suite is formed from three standards. ( × )(27)TCP means it is on the network layer and IP means it is on the transport layerseparately. ( × )3. Translate and analyze the following sentences.(28)It is used for the purpose of data communication and resource sharing.句子组成:it 代指计算机网络,for引导的短语结构修饰used翻译:_它用于数据通信和资源共享。
Unit eight1 composed of people,equipment,computers,documentation,and so forth)composed of :出现过so forth2 The juxtaposition of software and engineering was intended to be provocative.intend to /for : 打算。
What do you intend to do =what do you intend for doing ?3 .our aspirations were at the boundary of what we could do successfullyat the boundary of :在---范围之内。
Opposite : beyond the boundary of 超出---范围之内If something is beyond the boundary of human knowledge, man can know nothing about it .一些时超过了人的智力范围,人将无所适从。
4 software engineering emerged as the organizing force to overcome the barriers that threatened our progress.force to : to compel ,constrain .迫使,限制police forced him to confess.5 oftware engineering has not been able to keep up with the speed of advancementskeep up with : keep up with sb /sth 保持联系----try to keep up with old friends far away6is of insufficient quality,of 有时和一个名词词组来描写某事,来代替使用的形容词。
Unit 8 Computer NetworkingT ext 1 Data Communications Exercises1. Fill in the blanks with appropriate words according to the text.(1)The end equipment is either __generates the digital information for transmission_or_ uses the received digital data.(2)When digital data are transmitted, they are _in serial form_.(3)_DTE___ is data terminal equipment.(4)_STACO is the corresponding unit at the secondaries.(5)Between the DTEs, first is _the modems_, and then is the communicationsequipment__.(6)_DCE__ accepts the serial data stream from the DTE.(7)At the transmit end, the modem can be considered a form of _digital-to-analog_converter, while at the receive end, it can be considered a form ofanalog-to-digital__ converter.(8)DCE converts the received_ analog signal_ to a serial digital data stream_.2. Multiple choices.(1)The end equipment in a communication system includes _ABCD_.A. computersB. CRTsC. printersD. keyboards(2)The equipment B_D__.A. manipulates digital information internally in serial formB. manipulates digital information internally in word unitsC. transfers the number of bits in parallelD. transfers the number of bits in serial form(3)DTE is __BD_.A. Digital T-carrierB. data terminal equipmentC. satelliteD. the last piece of equipment that belonged to the subscriber in a data link system(4)There are AB_ between the DTEs.A. the modemB. communications equipmentC. digital-to-analog converterD. will be replaced by an updated standard3. Translate and analyze the following sentences.(5)This equipment generally operates digital information internally in word units.句子组成:in word units介词短语作方式状语修饰operates翻译:_这种设备通常在内部以字为单位处理数字信息_____(6)It converts the received analog signal to a serial digital data stream.句子组成:convert……to指将……转换成……翻译:它把接收到的模拟信号转换成串行数字数据流(7)Data communications equipment (DCE) accepts the serial data stream from theDTE.句子组成:from the DTE修饰动词accept翻译:数据通信设备(DCE)从DTE接收串行数据流Reading comprehension.Security is an important consideration in the Internet world. The computer has a way of knowing who you are. Most LANs or mainframes require each user to log in, or sign on to the system. To do this, you should type in your user ID before a prompt. Y ou are then prompted for a password. Passwords are special codes you use to “lock” your account. Obviously you need to be careful about protecting your password if you are building nuclear power plants or something, but what about the rest of us? A student recently got some help from her friend on email. She gave him her password to a class account, and he wrote it down. Apparently some of his buddies found the password and logged in using the student’s user ID and password, and sent a very obscene message to the class. The student nearly lost her account, because she had been sloppy with her password.Change you password regularly!Some hints:∙Don’t use your dog’s name. People will guess it.∙Don’t use words in English, people can hook up spell checkers.∙Consider combining words and numbers.Answer the following questions according to the article above.(8)What does the passage mainly discuss?Security is an important consideration in the Internet world.(9)According to the passage, we know security is an important consideration __in theInternet world_.(10)Why the author thinks that is important to protect your password if you are buildingnuclear power plant or something?Because the password may be used by other people(11)At last, the author give some hints, what are they?They are: first, don’t use your dog’s name. People will guess it. Second,don’t use words in English, people can hook up spell checkers. And last, consider combining words and numbers.Text 2 Architecture of Computer Networks Exercises1. Fill in the blanks with appropriate words according to the text.(12)Computer network is a complex unit, it consists of two or more connectedcomputing units.(13)Design of a network and its logical structure should comply with a set of designprinciples.(14)Two important network architectures are: the OSI reference model and the TCP/IPreference model.(15)The _OSI__ model was created by the ISO.(16)Note that the OSI model itself is not a network architecture__.(17)TCP/IP is a communication protocol, it provides many different networkingservices.(18)The TCP/IP Internet protocol suite is formed from two standards :_the TCP__ andthe IP__.(19)__TCP/IP__ is the foundation of the Internet as we know it today.(20)TCP means it is on the __transport__ layer and IP means it is on the __network__layer separately.2. Decide whether the following statements are True or False.(21)Design of a network and its logical structure should comply with a set of designprinciples. ( √ )(22)The OSI model was not created by the ISO. ( × )(23)The network architecture is a layer-based. ( √ )(24)The OSI model is a foundation for all comparing protocols. ( × )(25)The OSI model is a network architecture. ( × )(26)The TCP/IP Internet protocol suite is formed from three standards. ( × )(27)TCP means it is on the network layer and IP means it is on the transport layerseparately. ( × )3. Translate and analyze the following sentences.(28)It is used for the purpose of data communication and resource sharing.句子组成:it 代指计算机网络,for引导的短语结构修饰used翻译:_它用于数据通信和资源共享。