计算机专业英语2
- 格式:doc
- 大小:61.50 KB
- 文档页数:24
计算机专业英语第二版.........................................................................................ContentsLesson One 1Text:Installation Steps of a Desktop Board 1New Words 4Sentence Explanations 5Grammar:Word-formation in the Computer Fields 5 Exercises(Ⅰ) 8Skill Training:Conversation at an Office 8Exercises(II) 9Reading Materials(A):Information Technology 9Reading Materials(B):Commonly Used Computer Terms 10 Lesson Two 12Text:Peripherals 12New Words 16Sentence Explanations 17Grammar:The Parts of Speech and Their Use 18 Exercises(Ⅰ) 21Skill Training:Key Words 21Exercises(Ⅱ) 21Reading Materials(A):The Features of CD-RW Drive 22 Reading Materials(B):Commonly Used Computer Terms 22 Lesson Three 24Text:Learn a Language Online 24New Words 26Sentence Explanations 27Grammar:Verbs and the Components of a Sentence 27Exercises(Ⅰ) 29Skill Training:Abstract 30Exercises(Ⅱ) 32Reading Materials(A):China Races to Supplant India in Software 32Reading Materials(B):Commonly Used Computer Terms 34Lesson Four 35Text:Internet Morals Watchdog Guards Against Viruses as Well 35New Words 38Sentence Explanations 38Grammar:The Tenses 39Exercises(Ⅰ) 42Then and Now 42Skill Training:Business Card 43Exercises(Ⅱ) 46Reading Materials (A):Dont Bug Me! 46Reading Materials(B):Commonly Used Computer Terms 47Lesson Five 48Text:How the Internet Works 48New Words 50Sentence Explanations 51Grammar:The Passive Voice 52Exercises(Ⅰ) 53Skill Training:Superscription 53Exercises(Ⅱ) 55Reading Materials(A):Google Leading Role of Internet 55Reading Materials(B):Commonly Used Computer Terms 57Lesson Six 58Text:Voice Recognition Not Science Fiction 58New Words 61Sentence Explanations 62Grammar:The Subjunctive Mood 63Exercises(Ⅰ) 65Skill Training:Notice 67Exercises(Ⅱ) 68Reading Materials(A):Using a Modem 68Reading Materials(B):Commonly Used Computer Terms 70 Lesson Seven 71Text:Using Ants as Models for New Distributed Systems 71 New Words 74Sentence Explanations 74Grammar:The Infinitive 75Exercises(Ⅰ) 76Skill Training:The Structure of a Letter 78Exercises(Ⅱ) 81Reading Materials(A):End of the PC Era 81Reading Materials(B):Commonly Used Computer Terms 82 Lesson Eight 84Text:A New Programming Language Java 84New Words 86Sentence Explanations 88Grammar:Past Participle and Present Participle 88Exercises(Ⅰ) 89Skill Training:Commonly-used Opening Sentences and Closing Sentences of Letters 91Exercises(Ⅱ) 92Reading Materials(A):A Mobile Computer Team Services Sick Machines 92Reading Materials(B):Commonly Used Computer Terms 94Lesson Nine 95Text:Plug-and-Play Robots 95New Words 98Sentence Explanations 99Grammar:Gerund 100Exercises(Ⅰ) 101Skill Training:Letter Writing 102Exercises(Ⅱ) 104Reading Materials(A):A Guide to Computers and Plug-ins on the Internet 104Reading Materials(B):Commonly Used Computer Terms 106Lesson Ten 107Text:Caught in the Web of the Internet 107New Words 111Sentence Explanations 112Grammar:Non-finite Forms of Verbs 113Exercises(Ⅰ) 114Skill Training:Introduction to Company Organizations 115Exercises(Ⅱ) 116Reading Materials(A):Eleven Commandments by Bill Gates 117 Reading Materials(B):Commonly Used Computer Terms 118Lesson Eleven 119Text:Hackers Are Enemy Number One on the Internet 119New Words 121Sentence Explanations 122Grammar:Noun Clause 122Exercises(Ⅰ) 124Skill Training:Invitation Card 126Exercises(Ⅱ) 127Reading Materials(A):The Information Superhighway: From Expectationto Realization 127Reading Materials(B):Commonly Used Computer Terms 129Lesson Twelve 131Text:The Challenges of Using Search Agents to Perform Research on the World Wide Web 131New Words 134Sentence Explanations 135Grammar:Adjective Clause 135Exercises(Ⅰ) 137Skill Training:Job Interview 138Exercises(Ⅱ) 139Reading Materials(A):Safe Sex for Your Computer 139Reading Materials(B):Commonly Used Computer Terms 141Lesson Thirteen 143Text:Bill Gates Speech to Tsinghua University 143New Words 146Sentence Explanations 146Grammar:Adverbial Clauses 147Exercises(Ⅰ) 149Skill Training:Resume 151Exercises(Ⅱ) 154Reading Materials(A):Help! How Do I Set Up and Send an Online Resume 154Reading Materials(B):Commonly Used Computer Terms 156Lesson Fourteen 158Text:The Ancient History of the Internet 158New Words 162Sentence Explanations 162Grammar:Inverted Word-order 163Exercises(Ⅰ) 164Skill Training:Personal Statement 166Exercises(Ⅱ) 167Reading Materials(A):Father of Internet Surprised by 600 Million Followers 167Reading Materials(B):Commonly Used Computer Terms 168Lesson Fifteen 170Text:XPs Do-It-Yourself Security 170New Words 172Sentence Explanations 173Grammar:Complex Sentences Analysis 173Exercises(Ⅰ) 175Skill Training:Advertisement 175Exercises(Ⅱ) 176Reading Materials(A):One Number Gets It AllPhone, Fax or Voice Mail 177Reading Materials(B):Commonly Used Computer Terms 179Lesson Sixteen 181Text: Talk of Cooperation Is Out as the Software Industry Prepares forAnother Period of Sweeping Change 181New Words 184Sentence Explanations 184Grammar:Samples of Complex Sentences Analysis 186Exercises(Ⅰ) 187Skill Training:Agreement(Contract) 187Exercises(Ⅱ) 190Reading Materials(A):Just Imagine:What Computers Cant Do 190Reading Materials(B):Commonly Used Computer Terms 192Reference Translation and Answers 194Complex Exercises 270Bibliography 279。
计算机专业英语单元测验(二)班级_______ 学号________ 姓名_________ 成绩__________ I.Decide whether the following statements are true(T) or false(F) in relation tothe information in the text:1.With its software, a computer can store, process and retrieve information, displaymultimedia documents, search the Internet and so on.2.The parts of an operating system can be grouped into five broad functional categories.3.Early computing systems had no operating system. Users had complete access to themachine language.4.Conversational systems were developed in which users could interface directly with thecomputer through terminals. They operate in an interactive or conversational modewith users.5.Multiprogramming operating systems on personal computers can usually support asingle user running multiple programs.6.Errors may occur in the CPU and memory hardware.7.Microsoft Windows is a descendant of MS-DOS and the Windows extensions toMS-DOS developed at Microsoft.8.The 32-bit architecture decreases the process of downsizing mainframe andminicomputer application onto single or networked desktop system.9. C is one of the most popular high-level languages nowadays.10. C gives the same programming leverage as assembly languages.11. C doesn’t let you do chores performed by any assembly languages.ments must appear at the beginning of a program.13.Some systems ignore comments.ments may appear in the middle of a variable name.15.Data type is one of the characteristics of variables.16.Fixed variables maintain their value during the invocation.17. A global variable can only be defined once.18.The global variable’s initial value defaults to 1.II.Match the following key terms to the appropriate definitions:1.Operating system ______________.2.Distributed operating system __________.3.Single program operating systems _________.4.Multiprogramming operating system __________.5.Workplace __________.6.Data ___________.7.Disk drive ___________.8.Display __________.a.The operating systems allow only a single user to run a single program at one time.b.Which controls all the computer’s resources and provides the base upon which theapplication programs can be written.c.The operating systems allow more than one program to be run at the same timeone computer.d.It is one that appears to its users as a traditional uniprocessor system, even thoughis actually composed of multiple processors.e.Provides a window-based user interface for the operating system’s filemanagement functions and allows applications to share data among themselves.f.The device that plays the disk.g.The facts, numbers, letters and images input to a computer.h. A device that is used to give you feedback while you operate the computer and toview the computer’s output.III.Fill in the blanks from using the sentences and definitions found in text:1.Without its ________, a computer is basically a useless lump of metal.2.An operating system is software that manages the overall operation of the computersystem. Its primary purpose is to support ______________.3.In a network operating system, the users are aware of the existence of multiplecomputers and can log in to __________ machines and copy files from one machineanother.4.The types of operating systems include single program, multiprogramming __________,and virtual machine operating systems.5. A ___________ operating system allows a single computer to run two or more differentoperating systems.6.MS-DOS is a single-tasking operating system with a _________________user interface.7.Windows is a ____________ environment that introduces new, more streamlined waysfor you to work with your personal computers.8._________________ was specifically designed for the Intel family of microprocessors.9.The development of C began ______________________________________.10.In C environment, you _______________________________to perform I/O operation.11.The ways to call C are ___________________________________________________.12. A comment begins with ___________and ends with _______________.13.Identifiers can be made up of _____________________________________________.14.The first character is an identifier must be ___________________________________.15.The maximum length of an identifier can be ______________character.16.The initial value of fixed variables is ________________when you don’t explicitlyinitialize them.17.The storage class identifiers which C supports are ______________________________.18.There are ________________ways to create a global variable.IV.Translate the following terms or phrases from English into Chinese and vice versa:1.High level language2.Make a system call3.Tag name4.Storage class5.Global scope6.Function statement7.逻辑语言8.可执行语言9.程序模块10.低级语言11.赋值语句12.计算机程序设计员13.程序设计语言14.运行计算机程序V.Multiple Choice:1.Which of the following is not considered application software? __________a.Spreadsheet programsb.Operating systemc.Word processorsmunications programs2.Which of the following is not a multitasking operating system? __________a.Windowsb.OS/2c.MS-DOSd.System 73. A characteristic of operating system is ___________a.Resource managementb.Error recoveryc.Memory managementd.All of the above4.Which system may have no time constraints?________a.Real-time systemb.Time-share systemc.Batch systemd.All of the above5.The instructions that carry out the processing are called ___________puter programs orsoftwareb.Datarmationputer6.Which of the following is not the basic hardware components of computers _________a.Keyboardb.Displayc.Operating systemd.CPU7.Transistors and magnetic core memory are distinguishing features of which generationof computers? _________a.Firstb.Secondc.Thirdd.Fourth8.Which of the following is not a kind of medium for the storage part of the computerssystem? ___________a.Floppy diskb.Hard disksc.CD-ROM,d.Disk driveVI.Fill in each of the blanks with one of the words given in the following list,These services can be ____________either as “external” or “internal”.The operating system provides external services that help __________ start programs, manage stored data and maintain ____________. You, as the computer user, control these external __________. Using a command-line, menu-driven, or GUI user ___________, an operating system provides you with a way to select the _________ you would like to use. The operating system also helps you find, rename, and delete _______ and other data stored on disk or tape. On many, but not all computer ________, theoperating system, the operating system helps you maintain security by checking your user ID and __________ as well as protecting your data from ___________access and revisions.The operating systems provides __________ services “behind the scenes” to ensure that the computer system functions ___________. These internal services are not generally under your ___________ but instead are controlled by the operating system itself. The operating system controls _________ and output, allocates system resources, manages the ___________ space for programs and data, and _______equipment failureIt lets the programmer express data _______ in a symbolic manner without regard to machine-specific details.The difficulty of writing programs in the _________ language of 0s and 1s led first to the development of assembly language, which allows _________ to use mnemonics for instructions and symbols for variables. Such programs are then ________ by program known as an assemble into the binary encoding used by the _________. Other pieces of system software known as linking loaders ________ pieces of assembled code and load them into the machine’s main _________ unit, where they are then ready for execution.The concept of linking _________ pieces of code was important, since it allowed “libraries” of ___________ to be built up to carry out common tasks—a first ________ toward the increasingly emphasized notion of software _________. Assembly language was found to be sufficiently __________ that higher-level languages( closer to natural languages ) were invented in 1950s for easier, faster ___________; along with them came the need for compilers, programs that translate ___________ language programs into machine code. As programming languages became more __________ and abstract, building efficient compliers that create high-quality code in terms of ___________ speed and storage consumption became an interesting computer science problem in itself. VII.Translate the following passage from English into Chinese:But the really amazing thing is that we’re still only at the dawn of the digital age. In the past two decades, the power of microprocessors has increased more than one million times.But 20 years from now, microprocessors will probably be more than a million times again as powerful as they are today. And they’ll contain up to one billion transistors.Over the next few years the PC will remain the main computing tool for most people, but it will be joined by all kinds of now, microprocessor – powered devices that will make your life even easier. For example, when you’re traveling you‘ll be able to call up your itinerary, send an E-mail postcard, book an appointment with your doctor or balance your bank account using a handheld PC that will know what information you need, and when and where you need it. And you’ll be able to get a map, hotel guide or the news from the Web via new kinds of cell phones.。
Unit Two HardwareSection One Warming Up1.CPU2.Main board3.Mouse4.Printer5.Keyboard6.MonitorSection Two Real WorldFind informationTask I. 1.No, they aren’t.2.He can’t tell the difference between RAM and ROM.3.It stands for Random Access Memory.4.It represents Read Only Memory.5.ROM.Task II. 1. T 2. F 3. F 4. T 5. TWords BuildingTask I. 1. A 2. B 3. A 4. A 5. DTask II.1. confusing2. memorable3. alteration4. difference5. eraseTask III. 1. C 2. F 3. B 4. H 5. G 6. E 7. D 8. A 9. J 10. I Cheer up Your EarsTask I. 1. components 2. difference 3. confused 4. Random 5. switch6. essential7. represent8. alter9. journal; eraseTask II. 1. hard drive 2. monitor 3. sound card 4. video card 5. speakers6. software7. service8. charge9. DVD 10. 8,000Task III. 1. C 2. A 3. A 4. C 5. CTable Talk1. ask you a question2. dust, dirt and liquids3. glass cleaners4. electric shock5. be conducted toSection Three Brighten Y our Eyes中央处理器在一独立使用(非联网状态下)的情况下,计算机的性能绝大部分由以三个计算机部件决定,它们分别是:中央处理器、随机存储器和显示器决定。
Chapter 002 The Internet, the Web, and Electronic Commerce 2-1 Chapter 002 The Internet, the Web, and Electronic Commerce Key
2-2 Multiple Choice Questions
1. (p. 30) Launched in 1969 as a U.S funded project that developed a national computer network, the Internet was initially called __________. A. World Wide Web B. Intranet C. NSFNet D. ARPANET
The Internet was originally called Advanced Research Project Agency Network (ARPANET).
Difficulty: Hard 2. (p. 30) The Web was introduced in 1991 at A. National Aeronautics and Space Administration (NASA). B. Center for European Nuclear Research (CERN). C. Research Center for Nuclear Physics (RCNP). D. National Science Foundation (NSF).
The Web was introduced in 1991 in Switzerland, at the Center for European Nuclear Research (CERN).
Difficulty: Medium 3. (p. 30) The Internet is a(an) _____. A. actual network B. virtual network C. multimedia interface D. domain name
The Internet is the actual physical network. It is made up of wires, cables, and satellites.
Difficulty: Medium
Chapter 002 The Internet, the Web, and Electronic Commerce Key
2-3 4. (p. 30) This enabled graphics, animation, sound, and video to be added to the Internet. A. Web browser B. URI C. Web D. Sharewares
The Web made it possible to add graphics, animations, sound, or video to Internet resources.
Difficulty: Easy 5. (p. 31) The most common way to access the Internet is through A. an Internet service provider (ISP). B. an instant messaging (IM) service. C. an application service provider (ASP). D. Facebook.
ISPs are already connected to the Internet and provide a path or connections for individuals to access the Internet.
Difficulty: Medium 6. (p. 32) Which of the following is not a well-known browser? A. Internet Explorer B. Windows Explorer C. Safari D. Google Chrome
Windows Explorer is not a Web browser.
Difficulty: Easy
Chapter 002 The Internet, the Web, and Electronic Commerce Key
2-4 7. (p. 32) A Web page typically contains _____ which contains the formatting instructions to allow the page to display Internet resources. A. uniform resource locators (URLs) B. top-level domain (TLD) C. Hypertext Markup Language (HTML) D. hyperlinks
The browser displays the contents of a Web page by reading the Hypertext Markup Language (HTML) code contained in the Web page document.
Difficulty: Medium 8. (p. 32) For browsers to connect to a resource on the Internet, the address of the resource must be specified through addresses called _____. A. uniform resource locators (URLs) B. top-level domains (TLDs) C. Hypertext Markup Language (HTML) D. hyperlinks
All resources on the Internet are identified by an address called a uniform resource locator (URL).
Difficulty: Hard
9. (p. 32) In the URL "http://www.simnetonline.com", what is the domain name? A. http://www.simnetonline.com B. simnetonline.com C. simnetonline D. com
A Web page's URL begins with the protocol (http), followed by the domain name (simnetonline.com).
Difficulty: Medium
Chapter 002 The Internet, the Web, and Electronic Commerce Key 2-5 10. (p. 32) In the URL "http://www.simnetonline.com", ".com" is the _____. A. top-level domain (TLD) B. uniform resource locator (URL) C. domain name server (DNS) D. domain name
Top-level domains (TLD) such as .com, .gov, .edu, .mil, and, .net are used to identify the type of organization.
Difficulty: Hard
11. (p. 33) Applets are written in which programming language? A. AJAX B. JavaScript C. HTML D. Java
Java applets can be downloaded quickly and run by most browsers.
Difficulty: Hard
12. (p. 35) Which one of the following has been difficult to enforce due to the fact that over 50 percent of all spam originates from servers outside the United States? A. Spam blockers B. E-mail filter options C. Photo identity D. CAN-SPAM Act
The CAN-SPAM Act of 2003 requires that every marketing-related e-mail provide an opt-out option. When the option is selected, the recipient's e-mail address is to be removed from future mailing lists.
Difficulty: Medium