计算机专业英语大作业
- 格式:doc
- 大小:74.00 KB
- 文档页数:8
计算机专业英语作业答案(供参考)计算机专业英语作业1第1-3章作业一.Vocabulary( 词汇)(一).Translate the following words and expressions into Chinese(写出下列词组的汉语。
) 1.central processing unit(CPU)中央处理器 2.title bar 标题栏3.operating system 操作系统4.personal computer 个人计算机5.menu bar 菜单栏6.desk publishing 桌面排版7.electronic spreadsheet 电子表格8.hard disk 硬盘9.database 数据库10.Cursor 光标(二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。
)1.随机存储器RAM 2.只读存储器ROM3.传输控制协议TC P 4.数字视频光盘DVD5.通用串行总线USB 6.计算机辅助设计CAD7.计算机辅助制造CAM 8.中央处理器CPU(三).Translate the following Chinese into English.(根据汉语写出相应的英语。
)1.键盘keybord 2.鼠标mouse 3.扫描仪scanner4.打印机printer 5.输入input 6.输出output7.显示器monitor 8.存储器storage 9.数据库database 10.操作系统operating system 11.应用软件application software 12.字处理器word processor 13.网络浏览器web browser二.Tell whether the following statements are true(T) or false(F).(判断正误。
计算机专业英语计算机专业英语 练习练习V ocabulary (一)Translate the following words and expressions into Chinese . 1. O perating system (Operating system (操作系统) 2. white box testing (白盒测试(白盒测试3. hard disk (硬盘)(硬盘) 4. management information system (管理信息系统(管理信息系统5. electronic commerce (电子商务(电子商务6. relational database (关系数据库)(关系数据库)7. software engineering (软件工程(软件工程8. software maintenance (软件维护(软件维护9. menu bar (菜单条(菜单条10. network security (网络安全(网络安全(二)Fill in the blank with the corresponding English abbreviations .1.只读存储器 2.广域网3.传输控制协议 4.文件传送[输]协议5.通用串行总线 6.6.面面向对象编程7.集成开发环境 8.结构化查询语言9.数据库管理系统 010..开放系统互连(三)Match the following words and expressions in the left column with those similar in meaning in the right column .1. application software a .音频2.machine language machine language b .应用软件3.structured programming c .机器语言4。
functional testing functional testing d .软件测试5.memory memory e .结构化程序设计6.relational database relational database f .内存7.firewall firewall g .功能测试8.software testing software testing h .关系数据库9.hacker hacker i .黑客1010..audio audio j.j.防防火墙Translation Translate the following sentences into Chinese1. There are several applications called Web browsers that make it easy to access the World Wide Web, Two of the most popular being Netscape Navigator and Microsoft ’s Internet Explorer. 2. SQL SQL Server Server Server is is is designed designed designed to to to allow allow allow thousands thousands thousands of of of users users users to to to access access access the the database at the same time and is a true client/server database system. 3. During During the the the last last last few few few years, years, years, it it it has has has been been been realized realized realized that that that maintenance maintenance maintenance of of programs is more expensive than development, so reading of programs by humans is as important as writing them. 4. Some Some applications, applications, applications, such such such as as as Word, Word, allow allow for for for several several several windows windows windows in in in a a special special mode mode mode called called called MDI MDI MDI in in in which which which you you you can can can open open open multiple multiple multiple documents documents within the same application. Translate the following paragraph into Chinese Over the last few decades there has been a tremendous growth in information technology technology and and and its its its impact impact impact on on on everyday everyday everyday life. life. Complex Complex software software software systems systems have have become become become critical critical critical to to to the the the operation operation operation of of of many many many systems systems systems in in in areas areas areas such such such as as banking, communications, manufacturing, power generation, and transportation. Progress Progress in in in computer computer computer science science science and and and accumulated accumulated accumulated experience experience with with industrial industrial industrial production production production of of of software software software have have have led led led to to to the the the emergence emergence emergence of of of software software engineering as a separate discipline. The software engineering discipline has been defined as “the application of systematic, disciplined, quantifiable approaches approaches to to to the the the development, development, development, operation, operation, operation, and and and maintenance maintenance maintenance of of of software.software.software.”” that is, the application of engineering to Software. 计算机专业英语练习答案计算机专业英语练习答案Vocabulary1.操作系统.操作系统 2.白盒测试.白盒测试3.硬盘.硬盘 4.管理信息系统.管理信息系统 5.电子商务子商务6.关系数据库.关系数据库 7 7.软件工程.软件工程.软件工程 8.软件维护.软件维护9.菜单栏.菜单栏 1010..网络安全络安全1.ROM (Read Only Memory)2.WAN (Wide Area Network)3.TCP: Transmission Control Protocal4.FTP: File Transmission(Transfer) Protocal5.USB : Universal Serial Bus6.OOP : Object Oriented Programming7。
计算机专业英语大作业Patterns Instruction in Software EngineeringAbstract:The paper deals with a training system with a client-server architecture created for students who are learning to design and implement object-oriented software systems with reusable components, and also targeting those users who wish become accustomed with (or improve their skills related to) software design.The paper briefly presents the design patterns which are to be found in the software library, as well as the manner of applying them.The user of such a system has five types of patterns at his/her disposal (Factory Method, Builder, Command, Mediator, Observer), out of which will be able to chose one/more than one, depending on the requirements of the system proposed for design.1.IntroductionMotto: “The software design patterns help you learn more from other people’s successes than from your own failures”[Mark Johnson] .A software system is a dynamic entity that undergoes multiple changes during its life-cycle, under the influence of factors such as: new user requirements, adding new functionalities, environment adjustment, etc.Therefore, apart from fulfilling those functions which it was designed to fulfill, a software application must be easily changeable, with some of its modules eventually re-used.Having this goal, the application must fulfill certain requirements regarding robustness, mobility, flexibility, scalability, etc.The software design principles are regarded as ways of obtaining the right and re-usable design.By applying abstractization and OOP languages polymorphic techniques, the open-shut principle and the substitution principle (Liskov) upon classes of problems, common solutions were reached –solutions which make up the so-called design patterns.The software patterns facilitate re-using design and architecture.If the design and/orarchitecture of a system were built with design patterns (techniques which have proven efficient), then they will be more accessible and easier to understand by those software developers who build new systems based on old design.The patterns help the software specialist chose that design that makes the system re-usable.In software engineering, “design pattern”(DP) means a solution applicable to a certain type of problems.A design pattern is a description model of how a problem should be solved.A pattern cannot be directly transformed in source code.The purpose of design patterns is to enable a “good”object-oriented design, and more than that –to make it reusable (which is more important than reusing the code, regardless of the fact that reusing the design often implies reusing the code).The quality of software design is proportional to the experience and previous knowledge of the one performing it.An expert applies solutions previously used and proven efficient for similar problems.When the expert finds a solution considered acceptable, he/she uses it again.Design patterns solve specific design problems, making the OO more flexible, elegant and reusable.DP help beginners with software design, proposing patterns based on previous experience.A user who is familiar with the DP-s can apply them instantly in order to solve specific problems, without having to rediscover them.By using the software design patterns while designing an object-oriented architecture, one is guaranteed to obtain system compliance to software engineering principles, while also preserving the qualities of “good design”: reusable, flexible, robust .2.Design PatternsDepending on the DP purpose, the authors of GoF [4] proposed three main categories of patterns: creational patterns, structural patterns and behavioral patterns.These are the most well-known DP, but not the only ones.Other types of patterns emerged –more or less popular –as well as variations of the GoF patterns.A pattern has four essential components:: the name of the DP must describe in a few words a design pattern problem, its solutions and the solution’s effects.2.Problem: describes the situations when the pattern is applicable, explaining the problem as well as its context.3.Solution: describes the components of the design, the relationships between them, the responsibilities of each component and the way they interact.The solution does not describe a specific design for a certain situation or a correct implementation, because a pattern has a general character, referring to a plethora of contexts.The DP presents an abstract description of a problem and a general arrangement of the components (classes and objects) that solve the described problem.4.Effects: refer to the results of applying the pattern, which are very important when we evaluate the alternatives and we estimate the costs and benefits of applying the pattern.The effects of a pattern are also to be perceived in the flexibility, extensibility and portability of a system.DP identifies the classes and instances which participate, their role, collaboration and responsibility sharing between them.The design patterns that the user of the proposed system has at hand are: Factory Method and Builder (from the Creational Patterns category), Command, Mediator and Observer, (from the Behavioral Patterns category).3.The Architecture of the SystemThe platform is designed as a distributed application, providing the option of distance learning/tutoring by means of a computer network or the Internet.The application can be classified as having “three - tier" architecture, the Client part being represented by the configuration module and the tutoring material presentation module.The user connects to the system by means of a Login module, monitored by an Administrator agent (CerberusAgent).After authentication the user may have access to a configuring instrument (if the user connected to the system is the tutor) or to the user interface by means of which the learning material will be presented (if the user is a student).This part of the application will be monitored by an interface agent (InterfaceAgent).The application server contains the agent platform that monitors the student activity, and a web server responsible for delivering the learning material to the user interface (Apache Tomcat).The third level consists of a xml database (Apache Xindice), which stores information about the structure of the course, student models, etc.The MTS training system is designed for students which learn to design and implement object-oriented software systems, with re-usable components, but also for those users who wish to become familiar with (or improve) software design.We present the approach of a multi-agent intelligent platform for tutoring student which provides a Student Model.The “modeling student process”used the overlay architecture (common for many tutoring systems) combined with the Bayesian Theory of Probability .The system’s tasks are distributed among the intelligent agents (software agents), each having clearly specified individual roles as following: administrator (Cerberus Agent); interface (InterfaceAgent); tutor (Tutor Agent); student (Student Agent).Moreover, the system has “three-tier”architecture and was implemented in Java language.We may well imagine software agents attached to every application or tutoring environment, each having an explicit representation of the users’objectives, of their plans and resources.These agents communicate and negotiate with each other in order to fulfill their individual or group objectives.The multi-agent tutoring system (MTS) was designed and implemented within the Computer Science Department, in which research focused upon “modeling”the student with a view to identifying the most suitable methods and tutoring strategies by taking into account individual knowledge and abilities.The user of this kind of system has all five types of previously described patterns at his/her disposal (Factory Method, Builder, Command, Mediator, Observer), out ofwhich will be able to use one or more, depending on the requirements of the system that needs to be designed.Depending on the needs of the user that must fulfill the requirements of the system, one selects from Tutor Agent the design patterns best suited for those functions.The patterns help build the menus of the application and the user interface.Then the database is built, as the user has permanent access to an example of application as similar as possible to the one which needs to be carried out.In order to develop an application, the student must know the Java programming language, must be familiar with MySql data servers and must be able to use the Eclipse platform.The Eclipse platform is an open source framework from IBM which aims to provide a variety of basic services for software developers [6].4.ConclusionsThe system wishes to be a useful working instrument for software application development training, for both students and other types of users.A design pattern together with an example of using that pattern may become a way of working in software design.Moreover, in this case applying design patterns –therefore design principles - in carrying out an object-oriented application results into a reusable design and reusable modules / components.Also, the resulting code enjoys more robustness and flexibility, these two characteristics being essential for developing new modules that would add new functionalities and operations to the application; the design/code of the application is open to extension and closed for changes, according to OCP.Another important aspect relates to the maintenance activities which the designed application will undergo along its life-cycle: they will more cost effective, as no change will disseminate through the entire system, the application code being built so that it isolates the volatile classes (according to the principle of reversing dependencies), the dependencies being in the way”details depend upon abstractization”and not the other way around.The software patterns ensurecompliance to design principles, as they contribute to obtaining a steady and efficient system, and they provide design discipline for st but not least, using such a system in software engineering learning makes the process much more attractive and efficient.The design patterns approach in software engineering training fits the pedagogical Schemas Theory (created by Bartlett at the beginning of the 20th century) .A brief representation of the particular knowledge of the training domain can help the trainee to easier absorb the new information, while the organization and structuring of the knowledge as patterns will guide him/her in finding (remembering) the necessary information in a certain context.We believe that within such an approach one can create a training ontology from Software Engineering.软件工程模式教学摘要:本页处理一种C/S架构旳训练系统, 为学习设计和实行一种面向对象旳用可重用组件旳软件系统旳学生而设计, 也将目旳瞄准那些顾客谁但愿成为(或提高他们旳有关技能)软件设计习惯。
计算机专业英语试题Ⅰ. Vocabulary(词汇)(30分)(一).Translate the following words and expressions into Chinese(写出下列词组的汉语。
)(共10分,每题1分)1. operating system2.requirements analysis3. network security4. data structure5.decision support system6.relational database7.software crisis8. computer virus9.email attachment10.central processing unit ( CPU )(二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。
) (共10分,每题1分)1.数据库管理系统 2.传输控制协议3.多文档界面 4.面向对象编程5.只读存储器 6.数字视频光盘7.计算机辅助设计 8.结构化查询语言9.通用串行总线 10.企业之间的电子商务交易方式(三)Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。
)(10分,每空1分)1. multimedia a. 字处理器2. software life cycle b. 交换机3. structured programming c. 多媒体4. functional testing d. 局域网5. word processor e. 结构化程序设计6. code windows f. 软件生命周期7. firewall g. 功能测试8. LAN h. 代码窗口9. hacker i. 黑客 10. switch j.防火墙1. 6. 2. 7. 3. 8. 4. 9. 5. 10.Ⅱ. Comprehension(阅读理解)(一)Fill in the blanks with suitable words or expressions from the list given below, andchange the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式填空。
计算机专业英语作业:1、请将视频“什么是电脑硬件”中所述内容用英文表示。
2、请将以下英文翻译为中文。
1)Plug and Play, sometimes, abbreviated PnP, is a catchy phrase used to describe devices that work with a computer system as soon as they are connected. The user does not have to manually install drivers for the device or even tell the computer that a new device has been added. Instead the computer automatically recognizes the device, loads new drivers for the hardware if needed, and begins to work with the newly connected device.For example, if you connect a Plug-and-Play mouse to the USB port on your computer, it will begin to work within a few seconds of being plugged in. A non plug-and-play device would require you to go through several steps of installing drivers and setting up the device before it would work.While Plug and Play usually refers to computer peripheral devices, such as keyboards and mice, it can also be used to describe internal hardware. For example, a video card or hard drive may be a Plug and Play device, meaning the computer will recognize it as soon as it is installed. The only difference is that internal components usually require the computer to be turned off when they are installed, while external devices can typically be installed while the computer is running.2)What are some examples of computer peripheral devices?Answer:⏹ A computer peripheral, or peripheral device, is an external object that provides input and output for the computer.⏹Some common input devices include: keyboard, mouse, joystick, pen tablet, MIDI keyboard (musical instrument digital interface数码音响), scanner, digital camera, video camera, microphone.⏹Some common output devices include: monitor, projector, TV screen, printer, plotter, speakers.⏹There are also devices that function as both input and output devices, such as: external hard drives, media card readers, digital camcorders, digital mixers, MIDI equipment.⏹While these are some of the more common peripherals, there are many other kinds as well. Just remember that any external device that provides input to the computer or receives output from the computer is considered a peripheral.3)Binary is a two-digit (Base-2) numerical system, which computers use to store data and compute functions. The reason computers use the binary system is because digital switches inside the computer can only be set to either on or off, which are represented by a 1 or 0. Though the binary system consists of only ones and zeros, the two digits can be used to represent any number.4)There are many types of compact disks. One format is called CD-RWs. They can be recorded on and re-recorded on (rewritten on) as you would do with a floppy disk. Another format is the CD-ROM. The technology for recording on these disks is different form other CDs.5)Stands for "Read-Only Memory." Please do not confuse this term with RAM or a hard drive, as many people already do. ROM is memory containing hardwired instructions that the computer uses when it boots up, before the system software loads. In PCs, the instructions are read from a small program in the ROM, called the BIOS (Basic Input/Output System).6)disk driveA machine that reads data from and writes data onto a disk. A disk drive rotates the disk very fast and has one or more heads that read and write data. There are different types of disk drives for different types of disks. For example, a hard disk drive (HDD) reads and writes hard disks, and a floppy drive (FDD) accesses floppy disks. A magnetic disk drive reads magnetic disks, and an optical drive reads optical disks. Disk drives can be either internal (housed within the computer) or external (housed in a separate box that connects to the computer). Disk drives can be either internal (housed within the computer) or external (housed in a separate box that connects to the computer).7)removable disktype of disk drive in which hard disks are enclosed in plastic or metal cartridges so that they can be removed like floppy disks. Removable disk drives combine the best aspects of hard and floppy disks. They are nearly as capacious and fast as hard disks and have the portability of floppy disks. Their biggest drawback is that they're relatively expensive.8)serial portA port, or interface, that can be used for serial communication, in which only 1 bit is transmitted at a time. A serial port is a general-purpose interface that can be used for almost any type of device, including modems, mice, and printers (although most printers are connected to a parallel port).9)parallel portA parallel interface for connecting an external device such as a printer. Most personalcomputers have both a parallel port and at least one serial port.10)Pseudocode (derived from pseudo and code) is a compact and informal high-level description of a computer programming algorithm that uses the structural conventions of some programming language, but typically omits details that are not essential for the understanding of the algorithm, such as subroutines, variable declarations and system-specific code.11)2.5 Using Function KeysYour computer has 12 function keys, F1 through F12. The functions assigned to these keys differ for each application. You should refer to you software documentation to find out how these keys are used.The [FN] key provides extended functions for the notebook and is always used inconjunction with another key.Fn+F1 SleepThis function will put the E1245 notebook into sleep mode. The LCD will switch off and devices will switch to lower power mode.Fn+F2 Fan ControlThis function will enable or disable the Silent Fan function . This will enable the user to put the fan into quiet mode if the user needs the notebook o be quieter.Fn+F3 Mute V olumeThis function will mute the volume control in Windows and all sound output from the speakers will stop. Pressing this combination again will enable sound output.Fn+F4 LCD/Display-Out SwitchThis function will switch the display configuration for the E1425 -It will cycle between 3 modes depending on operation system settings. These 3 Modes are:LCD Only-Image on the E1425 LCDDisplay Only-Image on external monitorLCD+Display-Image on LCD and external monitor12)课本P89 EX.5 把下列短文翻译成中文。
专业计算机英文作文范文英文,As a computer science major, I have always been passionate about technology and how it can be used to solve complex problems. One of the most fascinating aspects of computer science is the ability to write code that can automate tasks and make our lives easier. For example, I recently worked on a project where I developed a program to analyze large sets of data and generate reports automatically. This not only saved me time, but also improved the accuracy of the reports.Another interesting area of study in computer scienceis artificial intelligence. I find it amazing how machines can be taught to learn and make decisions on their own. For instance, I have been working on a machine learning project where I trained a model to recognize handwritten digits. It was incredible to see the model improve its accuracy over time as it learned from more and more examples.In addition to the technical aspects of computerscience, I also enjoy the problem-solving nature of the field. There is a certain satisfaction that comes with overcoming a challenging programming problem or debugging a piece of code. It's like solving a puzzle, and the feelingof accomplishment when everything finally falls into placeis truly rewarding.Overall, studying computer science has opened my eyesto the endless possibilities of technology and how it canbe used to make a positive impact on the world.中文,作为一名计算机科学专业的学生,我一直对技术和如何用它来解决复杂问题充满热情。
习题+答案2.1Write T or F to each statementT6. An asynchronous device is a clocked device.T7. A latch is an asynchronous device, because it functions at arbitrary times.T8. The repetition of clock pulse can vary from very low rate to very high rate.T9. A synchronous device changes its state only on the arrival of a clock pulse.F10. A clock input may occur at any time.T11. The clock pulses are used to synchronize all operations of the shift register.T13. A unidirectional shift register is capable of shifting in one direction only.F14. In a shift-left register the serial input determines what goes into the leftmost position during the shift register.F15. To provide parallel transfer capability some additional input and output lines should be provided to the shift register.Choose the best answer for each of the following1. How can the output of a logic gate be energized?CA By changing its inputs.B By remaining its inputs unchanged.C By meeting the specific input condition.D By giving a pulse.3. A NAND gate consists of D .A an OR gate followed by an inverterB an AND gate followed by an inverterC an AND gate followed by an OR gateD an inverter followed by an AND gate4. Under what condition is the output of a two-input XOR gate logic-high?BA Its inputs are simultaneously at the same logic level.B Its inputs are simultaneously at opposite logic levels.C Its inputs are logic-low.D its inputs are simultaneously logic-high.2.2Write T or F for each statementT 1. The CPU uses the input and output units to communicate with the outside world.F2. Main memory is sometimes called external memory.F3. After execution the program and the related files of data and files of information will be retained in the main memory for later use.F4. Personal computers have not the features of the larger system..T5. Large systems offer higher processing speeds for user and return more data than PCs. F6. CPUs all size have primary storage, arithmetic logic, and the control section.F7. The output device is the heart of any computer system.T8. The input/output devices and auxiliary storage units of a computer system are called peripherals.F9. The instrument of interpretation and communication between humans and computers system of all sizes is CPU.F10 Special purpose computers can adapted to many situation by giving them an appropriate program.F11 .A minicomputer is the smallest and least expensive type of computer.T12. A special purpose computer performs only one specific task and thus lacks versatility. T13. The larger the system the greater is its processing speed, storage capacity.T14. Mainframe computers are designed to process complex scientific application.T 9. The main memory in a general-purpose computer is made up of RAM integratedcircuit chip.\F 10. When the power is turned on, the program counter is set the first address of thebootstrap loader by the software of the computer.T 11. The read-write heads contact the surface of the floppy disks.T 12. The data on a particular track will be switched automatically onto a spare track by the computer before a catastrophic failure would occur.F 14. The read write heads stay on the same track continuously when the disk drive isWorkingF 16. The possible symbols in the binary numbering system are q to 9.F 17. The decimal value of 16 is represented in 4 bits BCD as 00010101.F 18. Alphanumeric versions of BCD commonly use 6,7or 8 bits to represent characters.F 19. A 6 bit alphanumeric code can represent 128 different characters.F 22. Eight bit codes are limited to representing 128 different characters.T23. An extra check (or parity ) bit is often added to each 6, 7, or 8 bit character represented in storage so that it will be possible to detect coding errors that may occur.T24. If a computer uses an odd parity format to detect errors in character codes, thenevery valid character code will always have an odd number of 1 bits.T25. Processor comes with a unique set of operations called an instruction set.F 26. In an instruction, operands specify the function to be performed.T 27. A processor's job is to retrieve instruction from memory and perform step bystep operations,3.3 True or FalseF1 All operating systems on various computers take the same size.F 2 All operating systems were written in a low level language.T3 The user can't use the computers at all if there is no operating system on the computers.F4 The operating system exists in the lowest layer of a computer.T5 The system calls are provided by the operating system.T 6 A computer's operational software defines the schedule of jobs awaiting execution.F7 Though an operating system can schedule the execution of jobs, it does not manage the availability of I/O devices.T 8 The IOCS component of an operating system controls I/O operations.T9 It is a major problem for the operating system to map the logical file concept onto physical storage devices such as magnetic tape or disk.F10 Files can only be direct access on a disk system.T 11 The logic structure and nomenclature of the different operating systems vary considerable.F12 The form of the system prompt is the same for every kind of operating system 13 You must boot the system, before you use a microcomputer.T14 Spooling is an approach to improving system performance by over aping the input of one job with the output of other jobs.T15 Multiprogramming allows time sharing.T1 6 When they first appeared, the microcomputers were provided with the operating system developed for computers.T17 By using the graphical user interface, what the users need to do is to "point and click" in order to accomplish their tasks.T18 The interface introduced by Windows is the object-oriented user interface.T 19.TMicrosoft failed in betting their future on Windows.Multiple Choice1 A computer's operating system is:Da resource managementb error recoveryc memory managementd all the above2 Which is the generalization of a two-level directory?Da cycle graph directory structureb a tree-structuredc batch systemd all the above3 Which system may have no time constrains?Ca real-time systemb time-share systemc batch systemd all the above4 The more popular micro operating system is:Da MS-DOSb CP/Mc UNIXd all the above5 What languages can be used to develop the operating systems ?Ca A machine language,b An assembly language.c A high level language,d all of the above.6 How does the operating system manage the resources of the computer?a It turns on or off the resources of the computer.b It makes them work together towards some common goals, or objectives.c It controls the way in which these resources are put to work.d It acts directly on the raw hardware.7 The function of an operating system is Da to drive the the raw hardware of the computerb to drive the resources of the computer in accordance with certain objectivesc to provide the higher layers of software with a simplified computerd all of the above11 The graphical user interface provides the users withA a simpler way to interact with their computersB a series of typed commandsC an intuitive sit of graphical icons that allowed the completion of common tasksD an intuitive set of graphical incons for users to "point and click" in order toaccomplish their tasks, so that they didn't have to remember arcane words andcommands anymore12 Windows resemble the Macintosh inA providing a GUI which is introduced by MacintoshB providing a limited means of multitaskingC providing a Windows interface just like the GUID allowing users to load multiple programs and have them run in thebackground while doing other work in a window in the foreground3.4 True or FalseF1 Flowcharting is used primarily for program design and rarely for systems design.T2 When programming in a procedure-oriented language, you should tell the computer'‘what to do' and 'how to do it'.T3 Assembler-level languages use mnemonics to represent instructions.T4 Machine language instructions are composed of a label, an opcode, and an operand.F5 Machine languages must be converted by a compiler to be used by the computer.F6 High-level languages require that programmers work with individual main storage locations.. 5T7 A compiler is translating program that converts high-level languages into machine language.T9 A flowchart loop indicates the repetitive performance of steeps to process data.T10 None of the computers consists of hardware only.F11 Programs written in high-level language can be executed by the computers without the help of a translator program~T13 Each symbolic instruction has one-to-one correspondence with the machine instruction.T14 Writing a program in a high-level language need not take account of the hardwareof the computer.T 15 The opode of an assembly language instruction specifies the operation that is to beperformed by the microprocessor.T 17 The mnemonic for the instruction is the symbolic representation of the actual binary code that the computer directly executes.T 18 A label is on the left of the assembly language statement.T 21 To enable the computer to solve an application problem programmers have to write programs in order to translate the application concepts into computerconcepts.T 22 A class is defined by grouping a user-defined type with all procedures and function that can be applied to it.T 23 The artificial intelligence research community did not agree with the concepts of object-oriented programming when in its early days.F24 Object-oriented programming languages are absolutely different from the LISP programming language.T 25 A program may produce incorrect output even if it runs OK.T 26 An error will occur if a program wants to use a deleted file.F 27 All the errors can be avoided.T 28 A warning will not terminate the program.T 29 Although we could not avoid all the runtime errors, we must take appropriate action when it happens.Match the following terms to the appropriate definition1 program2 programmer3 machine language4 assembler5 source6 object7 interpreter8 compilerA A computer program that translates an instruction into machine language, execute it, and then repeats the process for each instruction in a program until the program is finished.7B The set of statements that make up a computer program.5C A computer program that reads a high-level language instruction.8D A computer-specific set of primitive or elementary instructions that allows people to communicate with a particular computer.3E A set of instruction that tells a computer what to do.1F A program that translates an assembly-level language into machine language4.G Output from a compiler or assembler that is linked with other code to produce executable machine language code.6H A person who creates computer program.23.5True or falseT1 The program specifications are written by the software engineers.F2 Coding a program will consume most of programmer's time and effort.T 3 Programmers should use flowchart and other visual aids when they are designing routines.F4 The goal of the test phase of program development is to "prove" that a particular program has been completely debugged.T 5 More programmers maintain programs rather than code programs.T 6 A structured program is made up of several modules.T 7 "Branching" capability is one the most intriguing properties of a digital computer.。
大学英语计算机专业作文The Importance of Studying Computer Science in University。
In today's digital age, the study of computer science has become increasingly important. As a student majoring in computer science at university, I believe that this field of study is not only fascinating, but also essential for the future of technology and innovation.First and foremost, studying computer science at university provides students with a solid foundation in programming, algorithms, and data structures. These fundamental skills are the building blocks of modern technology and are essential for developing software, applications, and systems. By mastering these skills, students are equipped to tackle complex problems and contribute to the advancement of technology in various fields.Furthermore, computer science is a rapidly evolving field that offers endless opportunities for innovation and creativity. From artificial intelligence to cybersecurity, there are countless areas within computer science that are shaping the future of technology. By studying computer science at university, students have the chance to explore these cutting-edge technologies and contribute to the development of new solutions and advancements.In addition, the demand for computer science professionals is on the rise. As technology continues to play a crucial role in almost every industry, the need for skilled computer scientists is greater than ever. By pursuing a degree in computer science, students are preparing themselves for a wide range of career opportunities, from software development to data analysis to cybersecurity.Moreover, studying computer science at university provides students with valuable problem-solving andcritical thinking skills. The process of designing and implementing software requires logical reasoning, attentionto detail, and the ability to think analytically. These skills are not only essential for a career in computer science, but also transferable to other areas of study and work.In conclusion, studying computer science at university is not only important, but also beneficial for students in today's digital age. With a strong foundation in programming and technology, the opportunities for innovation and career growth are endless. As a computer science major, I am excited to be a part of this dynamic and rapidly evolving field, and I am confident that my studies will prepare me for a successful and fulfilling career in technology.。
计算机专业英语作文英文回答:As a computer science major, I believe that the most important skill to have in this field is problem-solving.In computer science, we are constantly faced with complex problems that require creative and logical thinking to solve. Whether it's debugging a piece of code, optimizingan algorithm, or designing a new software system, theability to think critically and come up with innovative solutions is crucial.For example, in my data structures and algorithms class, we were given a project to implement a sorting algorithm from scratch. At first, I was overwhelmed by the complexity of the task, but I approached it with a systematic and analytical mindset. I researched different sorting algorithms, analyzed their time complexity and space complexity, and eventually came up with a solution that met the project requirements. This experience not only enhancedmy technical skills but also improved my problem-solving abilities.Another essential skill for computer science professionals is communication. Being able to effectively communicate technical concepts to non-technical stakeholders is vital in this field. Whether it's explaining a complex algorithm to a client or collaborating with a cross-functional team on a software development project, clear and concise communication is key to success.For instance, during my internship at a software company, I was tasked with presenting a new feature to the product management team. I had to translate the technical details into layman's terms and effectively convey the benefits of the feature. Through this experience, I learned the importance of tailoring my communication style to different audiences and how to bridge the gap between technical and non-technical individuals.中文回答:作为一名计算机科学专业的学生,我认为在这个领域最重要的技能是问题解决能力。
大学计算机专业英语作文Title: The World of Computer Science: My Journey Through UniversityAs I embarked on my journey into the fascinating realm of computer science in university, I found myself amidst a dynamic and ever-evolving field. The initial excitement of learning the basics of programming languages like Python and Java was quickly followed by the realization of the vastness and complexity of this discipline.My academic journey was filled with challenges and moments of profound discovery. From algorithms and data structures to software engineering and network security, each topic presented new challenges that required critical thinking and problem-solving skills. The courses were rigorous, but the sense of accomplishment after overcoming a difficult assignment or project was immense.One of the most rewarding aspects of studying computer science was the opportunity to work in teams on real-world projects. Collaborating with classmates on developing software solutions or designing websites not only honed mytechnical skills but also taught me the importance of teamwork and communication.Outside the classroom, I actively participated in hackathons and programming competitions, which provided me with an opportunity to apply my knowledge in a competitive environment. These experiences were not only fun but also highly educational, as they allowed me to test my limits and push my boundaries.Moreover, the field of computer science is constantly evolving, with new technologies and innovations emerging every day. This rapid pace of change requires continuous learning and adaptability, which has become an integral part of my academic and professional development.Looking ahead, I am excited about the opportunities that lie ahead in the field of computer science. With the increasing digitization of the world, the demand for skilled computer scientists is on the rise. I am eager to apply my knowledge and skills to contribute to this exciting and rapidly growing field.In conclusion, my journey through computer science in university has been an enriching and rewarding experience. It has not only equipped me with the necessary technical skillsbut has also instilled in me a sense of curiosity and passion for learning and innovation. I am confident that this journey will prepare me well for the challenges and opportunities that lie ahead in the world of computer science.。
计算机专业英语作业(1)一、Translate the following sentences into English or Chinese.1.计算机2.多媒体3.硬件4.软件5.输入设备6.存储器7.外部设备8.处理器9.鼠标10.语音识别11.扫描仪12.寄存器13.Arithmetic and logic unit 14.Binary form15.Control unit 16.Instruction cycle17.Execution cycle 18.Central processing unit 19.Universal serial bus 20.Universal parallel bus二、For each of the following blanks, four choices are given. Choose the most appropriate one.1.A personal computer keyboard includes .a.a typewriter layout and a set of arrow keysb.a numeric keypadC.a Set of function keysd.a11 of above2.A display is a device that is used to display .a.numbers letters b.special charactersc. graphic information d.all of above3.system software includes and .a.operating system and application softwareb.operating system and programming languagec.special—purpose programs and application softwared.OS and special—purpose programs4.Information flows from a computer into a peripheral device as .a.output b.memory c.a program d.input 5.programs are known collectively as .a.secondary storage b.softwarec.stored programs d.hardware6.which is not common feature of most application software?a.menus b.toolbars c.insertion point d.alignment 7.Main memory holds .a.data for processing b.the programc.information d.all of above8.The number of bits that can be Processed at one time is aa.register b.cycle c.word d.PROM 9.Data and instructions are stored in memory at location known asa.address b.byte c.word d.number 10.The central processing unit (CPU) had two parts: and .a.control unit and ALU b.ALU and registerc.register and control unit d.ALU and memory11.A holds enough bits to store a single character.a.word b.bit c.byte d.two bytes 12.A location in memory is accessed by its .a.address b.content c.value d.digit 13.Which is not the actor that some microcomputer are more powerful than others .a.Speed b.capacity c.flexibility d.application 14.The CPU has two main parts 。
计算机专业英语写作范文In the rapidly evolving world of technology, the field of computer science stands as a beacon of innovation and progress. Encompassing a vast array of disciplines, computer science is not merely about programming or machines; it is about understanding the fundamental principles that govern the digital world we inhabit.The essence of computer science lies in the intersection of mathematics, engineering, and problem-solving. Algorithms, the backbone of computer science, are the recipes that dictate how computers perform tasks efficiently and accurately. The beauty of algorithms lies in their simplicity and elegance, often reducing complex problems to manageable chunks.Programming languages, another crucial aspect of computer science, are the tools that enable humans to communicate with machines. From the early days of machine code to the more abstract and user-friendly languages of today, programming has evolved significantly. It is not just about writing code; it is about understanding theunderlying concepts and applying them effectively to solve real-world problems.Data structures, another crucial aspect, are the building blocks of efficient programming. They help organize and manage data in a way that facilitates quick access and manipulation. Knowledge of data structures is crucial for writing efficient and scalable software.Moreover, computer science is at the forefront of innovation in fields like artificial intelligence, machine learning, and cybersecurity. The development of intelligent machines that can learn and adapt, as well as the creation of secure systems that can protect against cyber attacks, are just two examples of the remarkable advancements inthis field.In conclusion, computer science is not just a discipline; it is a way of thinking. It teaches us to approach problems with a logical and analytical mindset, to break them down into manageable parts, and to findefficient solutions. As we enter an era where technology is becoming increasingly intertwined with our lives, the importance of computer science cannot be overstated. It isnot just a tool; it is a critical skill that will help us navigate the digital world and contribute to its continued growth and development.**探索计算机科学领域:一篇英语写作**在科技迅速发展的世界中,计算机科学领域如同创新与进步的灯塔。
计算机专业英语试题及答案1. 选择题1. Which of the following is not a programming language?a) Javab) HTMLc) Pythond) CSS答案: b) HTML2. Which protocol is used for sending and receiving email?a) HTTPSb) FTPc) SMTPd) DNS答案: c) SMTP3. What does the acronym CPU stand for?a) Central Processing Unitb) Computer Processing Unitc) Control Processing Unitd) Central Power Unit答案: a) Central Processing Unit4. Which programming language is commonly used for web development?a) C++b) Javac) JavaScriptd) Swift答案: c) JavaScript5. What does HTML stand for?a) Hyperlinks and Text Markup Languageb) Hyper Text Markup Languagec) Home Tool Markup Languaged) Hyper Text Modeling Language答案: b) Hyper Text Markup Language2. 填空题1. The process of converting high-level programming code into machine code is called ___________.答案: compilation2. HTTP stands for ___________ Transfer Protocol.答案: Hyper Text3. The process of testing software by executing it is called ___________.答案: debugging4. Java is an object-_____________ programming language.答案: oriented5. DNS stands for Domain Name ___________.答案: System3. 简答题1. What is the difference between TCP and UDP?答案: TCP (Transmission Control Protocol) is a connection-oriented protocol, which means it establishes a connection between the sender and receiver before transferring data. It ensures that all packets are received in the correct order and provides error checking. UDP (User Datagram Protocol), on the other hand, is a connectionless protocol that does not establish a direct connection before transmitting data. It does not guarantee packet delivery or order but is faster and more efficient for time-sensitive applications.2. What is the purpose of an operating system?答案: An operating system (OS) is a software that manages computer hardware and software resources and provides common services forcomputer programs. Its primary purpose is to enable the user to interact with the computer and provide a platform for running applications. It manages memory, file systems, input/output devices, and multitasking. The OS also handles system security and resource allocation to ensure optimal performance.4. 解答题请参考下文并给出自己的解答。
计算机专业英语作业答案(供参考)计算机专业英语作业1第1-3章作业一.Vocabulary( 词汇)(一).Translate the following words and expressions into Chinese(写出下列词组的汉语。
)1.central processing unit(CPU)中央处理器 2.title bar 标题栏3.operating system 操作系统 4.personal computer 个人计算机5.menu bar 菜单栏 6.desk publishing 桌面排版7.electronic spreadsheet 电子表格 8.hard disk 硬盘9.database 数据库 10.Cursor 光标(二).Fill in the blanks with the corresponding English abbreviations.(根据汉语写出相应的英语缩写。
)1.随机存储器 RAM 2.只读存储器 ROM3.传输控制协议 TC P 4.数字视频光盘 DVD5.通用串行总线 USB 6.计算机辅助设计 CAD7.计算机辅助制造 CAM 8.中央处理器 CPU(三).Translate the following Chinese into English.(根据汉语写出相应的英语。
)1.键盘 keybord 2.鼠标 mouse 3.扫描仪 scanner4.打印机 printer 5.输入 input 6.输出 output7.显示器 monitor 8.存储器 storage 9.数据库 database10.操作系统 operating system 11.应用软件 application software 12.字处理器 word processor 13.网络浏览器 web browser二.Tell whether the following statements are true(T) or false(F).(判断正误。
计算机专业英语作业:1、请将视频“什么是电脑硬件”中所述内容用英文表示。
For most people, computers are becoming a part of real life, the film will help you konw how it works. Their interior looks very complicated, but if the decomposition of parts, you will see a simple side of computers , This is《computer hardware in Plaining English 》,you see them, they are coming all shapes and sizes,but its work in some ways. In fact, if you can see their internals of computers, You will find that they all have the basic parts,the haddwares,do large part of the works in the computers.to explan,let’s look at some things you know ,like a house.what a great thing in the house is you have full space to put all the iterms.in fact ,many houses have basements.The basement is a good place to store debris.Basement, the more you can store.The same principle applies to computers.We need not boxes and bicycles, but photos, music, documents and plete this task in the computer hard drive rather than in the basement, a computer hard drive, holds all your files will be used later, like basements, like the larger hard drive, the more things you can store. Basement is not perfect, going to the basement to take the things you need to spend much time, maybe put a cupboard on the ground floor can help you solve this problem, you can quickly get the items you want, although the cabinet can not put too many items, at least you do not always go to the basement, in the computer too, The computer can not quickly access to the data stored in the hard disk, because the computer go a long way to gain access to the hard disk data. In the computer memory (RAM) is like a cupboard, RAM's full name is called [random access memory], which allows the computer to access data more quickly and, of course, it also means that the operation of RAM to make your computer faster , but this cupboard (RAM) has a drawback, the memory will be cleared of stored data When every time you restart, of course, to make the house a variety of household appliances can operate at the appropriate time, you must have an Explorer to help you manage these appliances, if the weather is too hot , you maybe need to open the air conditioner to adjust the temperature, when it is dark, you need to turn on the lights. Computers, too, must have a bit Explorer to ensure that all other parts are functioning properly, the Explorer is the processor (CPU), small size of the processor, like a computer exclusive (in charge), it will send and receive information and to assist the software to complete the work. The faster the processor, the faster execution speed of the computer would be, so, let us revisit. Hard drive, like a basement, it can store the information you need. Memory, like a cupboard, which can increase data access speed. Processor, like the Field Explorer, always able to complete the work that we deliver, but also to ensure the normal operation of the various parts. Next time, when you use the computer, think about plain English in the host computer's computer hardware what happened, the various parts of computer hardware complement each other, to help you do all the things I Common Craft's Lee LeFever, "Computer hardware of Plaining English "The film recorded by me, if you need a higher quality video, or need to use the authorization of the film, please contact me website.2、请将以下英文翻译为中文。
网址一:/hub/save-computer-from-Hackers网址二:/hub/What-is-Phishing姓名:**学号:************分校:通州(一)原文1.What is Computer Hacking?Computer hacking is a malicious act, so it is important for your computer and data to protect from Hacking. Computer Hacking refers to the process of making malicious modifications to a software or hardware to accomplish an aim outside the original creator's objective. Hackers are usually expert programmers who usually see hacking as a real life application of their skills.Hacking has become a nuisance in recent times and the protection from hacking has become more complex. Infact, the hackers have become so good that even the software giants are feeling a headache. Nintendo recently reported a loss of $975 million due to privacy and Microsoft has lost an estimated $900 million in five years.Well, the Giants are not the only targets of these hackers, even common individuals are not safe. The dangers range from little thefts to sponsored terrorism. These include stealing personal information and spying your activities. They can get to your secrets and destroy your credit. The dangers are possibly endless.How to protect from HackingPrevention is Better Than Cure. The problem of computer hacking has become really serious. But there are some basic methods which are usually the best to guarantee a Hacker-free system. Here, I am going to introduce some basic tips to save your computer and data from hackers.Using Antivirus SoftwareAntivirus software are one of the basic tools for your data and computer to protect from hacking. Antivirus software act as a protecting net that catches any potential threat before it reaches your system. They can prevent unauthorized access to your computer, protects your system from viruses and cloaks your data ports from intruders searching for any opening. The dangers range from little thefts to sponsored terrorism. These include stealing personal information and spying your activities.Nowadays anti virus software are completely automated. Go for the best when choosing anti virus software and make sure that you scan your system for viruses atleast once a week. Norton antivirus from Symantecis one of the leading products in the industry. Avastis another great antivirus tool to protect from hacking.Using FirewallWhat is a Firewall?A firewall is a set of programs located at the network gateway server which protects a private network from unauthorized access from other networks. The term firewall is originally referred to a wall intended to confine a fire.A firewall protects your computer from offensive websites and potential hackers. It keeps your data and information safe from unwanted intruders. Firewalls are designed to prevent unauthorized access to your network, much like a locked door.Thus firewall is a vital tool for your strategy against hackers so don't forget to set up one for your system. Microsoft has a built-in firewall software but you can also try the Symantec firewall.Using Anti Spyware SoftwareWhat is a Spyware?A spyware is a self installing software which secretly gathers information about a person's computing activities such as surfing habits and viewed sites. Spywares are truly a hacker's tool, not only collecting personal information but also interfering with user control by installing additional software and redirecting web browsers.Anti spyware software are designed to save your computer from hackers. They not only protect your computer by detection and removal of spywares but also preventing automatic installation of these malicious programs. Spysweeperis a great anti spyware software to guarantee a spyware free computer.Email SecurityEmail is one of the leading hacker's tools. Hackers use emails to transmit malicious software to your computer. Emails are usually very cheap which gives the hackers loads of opportunities. One of the basic tips to prevent hacking is to be extra careful with emails. The most important tip is that you should never hand out your real email address to a stranger. Never open an email arriving from an unknown source and never try to open an attachment with an email if you don't know the sender. Aviraantivirus is a useful tool to filter your emails for potential threats as well as provide premium protection for your computer.Software updatesHackers are always searching for security gaps in your system. Anti virus and anti spyware software usually lose their effectiveness with time as new and more advanced malicious programs are created by hackers.Its important to go for the latest security software in the market to guaranteemaximum security from threats. Make sure you frequently check out for software updates or set your software to update automatically.Internet SecurityBeing extra careful while surfing is the best way to protect your computer from hackers. Simple precautions can mean the difference between a secure and vulnerable system. A great way to save yourself from hackers is to avoid visiting hacker controlled sites usually committed to porn, free downloads and online gaming. Also be extra careful while downloading something from an unknown source. Never ignore a security warning about a site. Its better to be safe than sorry.Educate YourselfWhen working for an offensive against hackers, the most important step is to educate yourself. Hacking is a dynamic topic with developments arising every moment. Hackers are intelligent and innovative and you should be prepared for it.Computers are vulnerable. No matter what you do, its impossible to be 100% save. Important data like personal detail and credit card information should never be saved directly on a computer. A password protector is a great way to protect this data.Another great way to secure your computer is to use a password on your computer. Well, it can't really save you if your computer gets stolen (in case of a laptop) but can save you from unauthorized people who can reach to your computer.Windows updateMicrosoft Windows is the best OS which comes with almost all the tools to protect you and your computer from hacking. To make the most of this, it is important to keep your windows updated. An easy way to do this is by checking for updates at Microsoft Windows Update. You can also set your windows security software to check for updates automatically so you don't miss anything. ...2. What is a Phishing Attack?Identity theft has become the new white collar crime and it has grown tremendously. Criminals that steal identities use them in a number of ways. One of the most common tricks is to use a stolen identity to open a line of credit. The line of credit is then depleted by the thief and the actual person receives the bill. Identities are also stolen for malicious intent, such as stealing a military officer’s email credentials in hopes of carrying out fictitious orders to troops.Phishing is a relatively new term to describe ploys used by criminals trying to steal identities. Phishing scams are on the rise:"During 2004, close to 2 million U. S. citizens had their checking accounts raided by cyber-criminals. With the average reported loss per incident estimated at $1200, total losses were close to $2 billion. The incidence of phishing e-mails―e-mails thatattempt to steal a consumer’s user name and password by imitating e-mail from a legitimate financial institution –has risen 4,000 percent over the past six months."•What is Phishing VideoThe term “phishing” is based on the term “fishing”. With fishing you bait a hook and try to catch fish. If you do not receive a bite, you often change the type of bait until you start catching fish. With phishing, the bait is typically an email that appears legitimate. The email typically asks for a bank customer to validate their information, however, the email redirects the customer to a fictitious bank site made to look like the legitimate bank site (James, 2005). The criminals hope the customer will not notice the redirected bank site is fictitious and that they will validate their account information. There are numerous phishing emails used as bait and criminals hope the more bait they use, the greater chances someone will fall for the scam.The key to preventing identity theft is awareness. Financial institutions typically do not ask for account information validation. Any emails that ask for account validation or social security numbers, should be validated. The link contained within the email can be checked for legitimacy. These links often go to bogus sites that can easily be determined by the website link. For example, if you bank at and you receive an email that has a link and takes you to .customer.cz, this should raise suspicion. Phishing scams not only use email, but the telephone is also used. A typical scam involves a telephone call with someone impersonating your credit card company and asking you to validate your social security number, date of birth, etc. Credit card companies already have this information and do not need you to validate it. A simple line of defense is to ask the caller for the credit card company’s number and call them back。
作业2 翻译(词汇篇)Translate the following Chinese into English.1.这根电缆的长度是那根电缆的长度的3倍。
The length of this cable is three times of that one.2.第二代计算机的体积是第一代计算机的体积的1/10.The volume of the second generation of computers is one tenth of the first one.3.新计算机的速度将增加2倍。
The speed of new computers will be increased by two times.4.这根电线的长度比那根电线的长度长20米。
The length of this wire is 20 meters longer than that one.5.这种计算机的使用寿命增加了10年。
The working life of this kind of computer is increased 10 years.6.这种存储器的容量大约是那种存储器的3倍。
The capacity of the storage is about three times of that one.7. 初学者应该先学面向对象技术的基本概念,再学面向对象技术的三大机制,最后再学面向对象的分析与设计。
Firstly, beginners should learn the basic concepts of object-oriented technology, then they learn three mechanism of object-oriented technology, and finally they learn object oriented analysis and design.8.机器人沿西北方向移动了80米。
计算机专业英语大作业Patterns Instruction in Software EngineeringAbstract:The paper deals with a training system with a client-server architecture created for students who are learning to design and implement object-oriented software systems with reusable components, and also targeting those users who wish become accustomed with (or improve their skills related to) software design. The paper briefly presents the design patterns which are to be found in the software library, as well as the manner of applying them. The user of such a system has five types of patterns at his/her disposal (Factory Method, Builder, Command, Mediator, Observer), out of which will be able to chose one/more than one, depending on the requirements of the system proposed for design.1.IntroductionMotto: “The software design patterns help you learn more from other people’s successes than from your own failures” [Mark Johnson] .A software system is a dynamic entity that undergoes multiple changes during its life-cycle, under the influence of factors such as: new user requirements, adding new functionalities, environment adjustment, etc. Therefore, apart from fulfilling those functions which it was designed to fulfill, a software application must be easily changeable, with some of its modules eventually re-used. Having this goal, the application must fulfill certain requirements regarding robustness, mobility, flexibility, scalability, etc. The software design principles are regarded as ways of obtaining the right and re-usable design. By applying abstractization and OOP languages polymorphic techniques, the open-shut principle and the substitution principle (Liskov) upon classes of problems, common solutions were reached – solutions which make up the so-called design patterns. The software patterns facilitate re-using design and architecture. If the design and/or architecture of a system were built with design patterns (techniques which have proven efficient), then they will be more accessible and easier to understand by those software developers who build new systems based on old design. The patterns help the software specialist chose that design that makes the system re-usable. In software engineering, “design pattern” (DP) means a solution applicable to a certain type of problems. A design pattern is a description model of how a problem should be solved. A pattern cannot be directly transformed in source code.The purpose of design patterns is to enable a “good” object-oriented design, and more than that –to make it reusable (which is more important than reusing the code, regardless of the fact that reusing the design often implies reusing the code). The quality of software design is proportional to the experience and previous knowledge of the one performing it. An expert applies solutions previously used and proven efficient for similar problems. When the expert finds a solution considered acceptable, he/sheuses it again. Design patterns solve specific design problems, making the OO more flexible, elegant and reusable. DP help beginners with software design, proposing patterns based on previous experience. A user who is familiar with the DP-s can apply them instantly in order to solve specific problems, without having to rediscover them. By using the software design patterns while designing an object-oriented architecture, one is guaranteed to obtain system compliance to software engineering principles, while also preserving the qualities of “good design”: reusable, flexible, robust .2. Design PatternsDepending on the DP purpose, the authors of GoF [4] proposed three main categories of patterns: creational patterns, structural patterns and behavioral patterns. These are the most well-known DP, but not the only ones. Other types of patterns emerged – more or less popular – as well as variations of the GoF patterns.A pattern has four essential components:1. Name: the name of the DP must describe in a few words a design pattern problem, its solutions and the solution’s effects.2. Problem: describes the situations when the pattern is applicable, explaining the problem as well as its context.3. Solution: describes the components of the design, the relationships between them, the responsibilities of each component and the way they interact. The solution does not describe a specific design for a certain situation or a correct implementation, because a pattern has a general character, referring to a plethora of contexts. The DP presents an abstract description of a problem and a general arrangement of the components (classes and objects) that solve the described problem.4. Effects: refer to the results of applying the pattern, which are very important when we evaluate the alternatives and we estimate the costs and benefits of applying the pattern. The effects of a pattern are also to be perceived in the flexibility, extensibility and portability of a system. DP identifies the classes and instances which participate, their role, collaboration and responsibility sharing between them.The design patterns that the user of the proposed system has at hand are: Factory Method and Builder (from the Creational Patterns category), Command, Mediator and Observer, (from the Behavioral Patterns category).3. The Architecture of the SystemThe platform is designed as a distributed application, providing the option of distance learning/tutoring by means of a computer network or the Internet.The application can be classified as having “three - tier" architecture, the Client part being represented by the configuration module and the tutoring material presentation module. The user connects to the system by means of a Login module, monitored by an Administrator agent (CerberusAgent).After authentication the user may have access to a configuring instrument (if the user connected to the system is the tutor) or to the user interface by means of which thelearning material will be presented (if the user is a student). This part of the application will be monitored by an interface agent (InterfaceAgent).The application server contains the agent platform that monitors the student activity, and a web server responsible for delivering the learning material to the user interface (Apache Tomcat).The third level consists of a xml database (Apache Xindice), which stores information about the structure of the course, student models, etc.The MTS training system is designed for students which learn to design and implement object-oriented software systems, with re-usable components, but also for those users who wish to become familiar with (or improve) software design. We present the approach of a multi-agent intelligent platform for tutoring student which provides a Student Model. The “modeling student process” used the overlay architecture (common for many tutoring systems) combined with the Bayesian Theory of Probability . The system’s tasks are distributed among the intelligent agents (software agents), each having clearly specified individual roles as following: administrator (Cerberus Agent); interface (InterfaceAgent); tutor (Tutor Agent); student (Student Agent). Moreover, the system has “three-tier” architecture and was implemented in Java language. We may well imagine software agents attached to every application or tutoring environment, each having an explicit representation of the users’ objectives, of their plans and resources. These agents communicate and negotiate with each other in order to fulfill their individual or group objectives. The multi-agent tutoring system (MTS) was designed and implemented within the Computer Science Department, in which resear ch focused upon “modeling” the student with a view to identifying the most suitable methods and tutoring strategies by taking into account individual knowledge and abilities.The user of this kind of system has all five types of previously described patterns at his/her disposal (Factory Method, Builder, Command, Mediator, Observer), out of which will be able to use one or more, depending on the requirements of the system that needs to be designed.Depending on the needs of the user that must fulfill the requirements of the system, one selects from Tutor Agent the design patterns best suited for those functions. The patterns help build the menus of the application and the user interface. Then the database is built, as the user has permanent access to an example of application as similar as possible to the one which needs to be carried out. In order to develop an application, the student must know the Java programming language, must be familiar with MySql data servers and must be able to use the Eclipse platform. The Eclipse platform is an open source framework from IBM which aims to provide a variety of basic services for software developers [6].4. ConclusionsThe system wishes to be a useful working instrument for software application development training, for both students and other types of users. A design pattern together with an example of using that pattern may become a way of working insoftware design. Moreover, in this case applying design patterns –therefore design principles - in carrying out an object-oriented application results into a reusable design and reusable modules / components.Also, the resulting code enjoys more robustness and flexibility, these two characteristics being essential for developing new modules that would add new functionalities and operations to the application; the design/code of the application is open to extension and closed for changes, according to OCP.Another important aspect relates to the maintenance activities which the designed application will undergo along its life-cycle: they will more cost effective, as no change will disseminate through the entire system, the application code being built so that it isolates the volatile classes (according to the principle of reversing dependencies), the dependencies being in t he way”details depend upon abstractization” and not the other way around. The software patterns ensure compliance to design principles, as they contribute to obtaining a steady and efficient system, and they provide design discipline for students. Last but not least, using such a system in software engineering learning makes the process much more attractive and efficient. The design patterns approach in software engineering training fits thepedagogical Schemas Theory (created by Bartlett at the beginning of the 20th century) .A brief representation of the particular knowledge of the training domain can help the trainee to easier absorb the new information, while the organization and structuring of the knowledge as patterns will guide him/her in finding (remembering) the necessary information in a certain context. We believe that within such an approach one can create a training ontology from Software Engineering.软件工程模式教学摘要:本页处理一个C/S架构的训练系统,为学习设计和实施一个面向对象的用可重用组件的软件系统的学生而设计,也将目标瞄准那些用户谁希望成为(或提高他们的相关技能)软件设计习惯。