文档视界 最新最全的文档下载
当前位置:文档视界 › 计算机专业英语Unit 9

计算机专业英语Unit 9

计算机专业英语Unit 9
计算机专业英语Unit 9

Unit 9 Computer Virus

Text 1 Virus Introduction

Exercises

1. Multiple choices.

(1)A virus is a ( A ).

A. program

B. computer

C. bad man

D. beast

(2)A virus is a program that reproduces its own code by ( ABC ).

A. adding to the end of a file

B. inserting into the middle of a file

C. simply placing a pointer

D. replacing another program

(3)( AD )is a type of executable file .

A. COM file

B. TXT file

C. JPG file

D. EXE file

(4)Similar to viruses, you can also find malicious code in ( ABC ).

A. Trojan Horses

B. worms

C. logic bombs

D. Microsoft Word Documents

2. Fill in the blanks.

(1)A virus is a program that reproduces its own code by attaching itself to other

executable files in such a way that the virus code is executed when the infected

executable file is executed .

(2)To attach might mean physically adding to the end of a file, inserting into the middle of

a file, or simply placing a pointer to a different location on the disk somewhere where

the virus can find it.

(3)Similar to viruses, you can also find malicious code in Trojan Horses, worms, and

logic bombs.

3. Translate and analyze the following sentences.

(1)These self-replicating codes, when caused by some event, may do a potentially harmful

a ct to your computer.

句子组成:when引导时间状语从句做插入语,当…的时候.

翻译:当这些自复制代码被一些事件触发时,或许会做出一些对你的计算机有潜在危害的行为.

(2)M ore recently, scripts written for Internet web sites and/or included in E-mail can also

b e executed and infected.

句子组成:scripts written…省略的定语从句完整形式scripts which were writtened….

翻译:现在,为网站编写的或者包括在E-mail中的脚本也能够被执行和感染。

4. Reading comprehension.

Unit 9 Computer V

irus

2 Viruses can infect any type of executable code, not just the files that are commonly called

―program files‖. V iruses can be spread by:

?Executable code in the boot sector of infected floppy disks

?Executable code in the system area of infected hard drives

?Word processing and spreadsheet documents that use infected macros Infected HTML documents that contain JavaScript or other types of executable code

Since virus code must be executed (run) to have any effect, files that the computer treats as pure data are safe. This includes graphics and sound files such as .gif, .jpg, .mp3, .wav, etc., as well as plain text in .txt files. For example, just viewing picture files won't infect your computer with a virus. The virus code has to be in a form, such as an .exe program file or a Word .doc file, that the computer will actually try to execute.

Answer the following questions according to the article above.

(1)What kind of files can be infected by a virus?

A virus can infect the executable files such as .exe or .com or .doc files,etc.

(2)How about viruses can be spread?

Executable code in the boot sector of infected floppy disks or in the system area of

infected hard drives, word processing and spreadsheet documents that use infected

macros Infected HTML documents that contain JavaScript or other types of executable

code.

Text 2 Virus Behavior – Infection Phase Exercises

1. Multiple choices.

(1)V iruses all have two phases to their execution, the ( A )and the ( C ).

A. infection phase

B. delete phase

C. attack phase

D. create phase

(2)( ABCD ) maybe a certain cause that some viruses infect upon.

A. a day

B. a time

C. an external event on your PC

D. a counter within the virus

(3)Many viruses go resident in the memory like a ( C ).

A. .exe file

B. .com file

C. tsr program

D. data file

(4)Y ou want to ( ABC ) maybe wake up a virus that has residented in memory.

A. copy a file

B. access a diskette

C. execute a program

D. delete a file

(5)Some viruses use ( A ) and ( B ) techniques to hide their existence.

A. stealth

B. polymorphic

C. quickly spread

D. replace a part of system software

V irus Behavior – Infection Phase

3

2. Fill in the blanks.

(1) Viruses come in a great many different forms, but they all potentially have two phases to their execution, the infection phase and the attact phase.

(2) For those not old enough to remember tsr, they were programs that executed under system but stayed in memory instead of ending.

(3) Note that worms often take the opposite approach and spread as fast as possible.

3. Translate and analyze the following sentences.

(1) When the virus executes it has the potential to infect other programs.

句子组成:when 引导时间状语从句 当,,,时 .

翻译:病毒在执行时,能够感染其他程序 .

(2) Some viruses infect other programs each time they are executed; other viruses infect

only upon a certain cause.

句子组成:some …other …引导两个并列句子,一些…其他….。 翻译:一些病毒会在每次被执行时,都感染其他程序;另一些病毒只是在一些特定的触发原因下才能感染其他程序.

(3) Resident viruses frequently take over portions of the system software on the PC to hide

their existence.

句子组成:to hide their existence 不定式做目的状语 take over 代替.

翻译:驻留内存病毒常常代替PC 系统文件的一部分来掩饰它的存在 .

4. Reading comprehension.

Polymorphic viruses use encryption (密码术) or other methods to change how they look. This strategy of changing their appearance helps to defeat antivirus scanning software. Stealth viruses attempt to hide any modifications they have made from antivirus scanning software. For example, stealth viruses sometimes substitute unaltered files and directory table entries for the virus-altered ones, in an attempt to fool antivirus scanning software. Fast infector viruses are capable of infecting any file which is opened, rather than only executed files. Slow infectors only modify files as the files are being created or altered for legitimate reasons, a practice which fools some antivirus software. Sparse infectors only infect at certain intervals dictated by their programming, lessening their chance of creating suspicion on the part of the user.

Choose the best answer.

(1) How can polymorphic viruses defeat antivirus scanning software?(B)

A. resident in memory

B. use encryption

C. hide in other programs

D. use the unaltered files to replace the virus-altered ones

(2) How can stealth viruses fool antivirus scanning software?(C)

A. resident in memory

B. use encryption

C. hide in other programs

Unit 9 Computer V

irus

4 D. use the unaltered files to replace the virus-altered ones

(3)Which kind of virus can only alter files, as the files are being created or altered for

legitimate reasons?(D)

A. polymorphic virus

B. stealth virus

C. fast virus

D. slow virus

(4)A few of viruses only infect at certain intervals dictated by their programming, because

of ___?(A)

A. Don’t let user notice them.

B. They wait for some special programs to infect.

C. No special reason.

D. They want to change how they look.

Text 3 Virus Behavior-Attack Phase

Exercises

1. Multiple choices.

(1)Many viruses do harmful things such as ( ABCD ).

A. deleting files

B. changing random data on your disk

C. simulating typos

D. slowing your PC down

(2)Viruses can delay their attack for ( ABCD ).

A. days

B. weeks

C. months

D. years

(3)If a virus simply reproduce and have no cause for an attack phase, but it will still

( AB ) without your permission.

A. stealing storage

B. pilfer CPU cycles

C. delete files C. play music

(4)Some viruses, with no attack phase, often damage the programs or disks they infect

because they ( AB ).

A. have bugs in them

B. contain poor quality code

C. steal storage

D. show messages on your screen

2. Fill in the blanks.

(1)Many viruses do unpleasant things such as deleting files or changing random data on

your disk.

(2)Most viruses have bugs in them and these bugs often cause unintended negative side

effects.

(3)In addition, even if the virus is perfect, it still steals system resources.

(4)The attack phase is optional, many viruses simply reproduce and have no cause for an

attack phase.

(5)An example, one of the most common past viruses, Stoned, is not intentionally harmful.

3. Translate and analyze the following sentences.

Number of V iruses

5

(1) Just as the infection phase can be caused by some event, the attack phase also has its

own cause.

句子组成:as 引导状语从句. 翻译:如同感染阶段需要一些事件触发一样,攻击阶段也有它自己的触发条件.

(2) In addition, even if the virus is perfect, it still steals system resources.

句子组成:even if 即使,引导条件状语从句;in addition 另外. 翻译:此外,即使病毒设计完美,它仍会盗用系统资源。

(3) This is made worse since viruses that "just infect," with no attack phase, often damage

the programs or disks they infect.

句子组成:since 引导原因状语从句 with no attact phase 插入语. 翻译:有些病毒只会“感染”而没有攻击阶段,但它们会破坏被它们感染的程序或磁盘,这反而更有害.

(4) The original virus tried to hide its own code in an area of 1.2MB diskettes that resulted

in corruption of the entire diskette (this bug was fixed in later versions of the virus).

句子组成:that 引导主语从句表示the original …in an area of 1.2MB diskettes.

翻译:最初的病毒试图把它自身隐藏在1.2MB 的磁盘中从而导致整张磁盘变坏.

4. Reading comprehension.

When you start a program that's infected by a virus, the virus code will execute (run) and try and infect other programs. This can infect the same computer or other computers connected to it on a network. The newly infected programs will try to infect more programs and computers. When you share a copy of an infected file with other computer users, opening the file may also infect their computers; and files from those computers may spread the infection to yet more computers. If your computer is infected with a boot sector virus, the virus tries to write copies of itself to the system areas of floppy disks and hard disks. Then the infected floppy disks may infect other computers that boot from them, and then the virus on the computer will try to infect more floppies inserted into it.

Answer the following two questions according to the article above.

(1) Did you meet any viruses before?

(2) If you have met a virus, do you remember how the virus infected your computer?

Text 4 Number of Viruses

Exercises

1. Multiple choices.

(1) In 2000, the number of viruses topped ( D ).

A. 500

B. 1000

C. 7500

D. 50000

(2) W hat make it is difficult to agree on how to count viruses?(ABCD)

A. new virus arise from an existing virus

B. some viruses can create different versions when they infect other programs

Unit 9 Computer V

irus

6 C. some viruses can use polymorphic technique

D. just a trivial change may create a new virus

(3)The Whale will create ( D ) different versions of itself when it infects files.

A. 30

B. 31

C. 32

D. 33

(4)Now, about ( C ) different viruses account for all the viruses that actually spread in

the wild.

A. 30

B. 150

C. 180

D. 50000

2. Fill in the blanks.

(1) In late 1992, estimates were ranging from 1,000 to 2,300 viruses.

(2) But, this is a trivial change that can be done in less than two minutes resulting in yet another

"new" virus.

(3) Another problem comes from viruses that try to conceal themselves from scanners by mutating.

3. Translate and analyze the following sentences.

(1)The confusion exists partly because it's difficult to agree on how to count viruses.

句子结构:it’s difficult…中it为形式主语代替后面真正的主语to agree on ….

翻译:由于在怎样计算病毒上很难达成一致,所以现在还存在一些混乱.

(2)But, this is a trivial change that can be done in less than two minutes resulting in yet

a nother "new" virus.

句子结构:that引导定语从句修饰change.

翻译:但是,一个在两分钟内可以完成的细微的改动就产生了一种“新”病毒.

(3)Many of the large number of viruses known to exist have not been detected in the wild

but probably exist only in someone's virus collection.

句子结构:not…but…不是…而是…..

翻译:很多病毒虽然还没有被公众检测到,但可能已经在某个人的病毒收集夹中了.

(4)Although the actual number of viruses will probably continue to be hotly debated, what

is clear is that the total number of viruses is increasing, although the active viruses not

quite as rapidly as the numbers might suggest.

句子结构:although表转折,连接词,引导句子.

翻译:虽然关于病毒的实际数量可能会继续进行激烈的争论,但一个很清楚的事实就是病毒的总数在增加。

4. Reading comprehension.

Viruses are software programs; the actual effect of a virus depends on how it was programmed by the person who wrote the virus.

Some viruses are designed to overwrite boot sectors and interfere with your computer's operation (boot viruses), others damage your computers memory operation then try and spread themselves around by picking up e-mail or network addresses off your computer (worm viruses). Still others will wipe files from

How Serious are V iruses? 7

the hard drive and destroy system files (Trojan viruses) and finally there are ones that infect document files, electronic spreadsheets and databases of several popular software packages (Macro viruses).

Viruses can't do any damage to hardware: they won't melt down your CPU, burn out your hard drive, cause your monitor to explode, etc. Warnings about viruses that will physically destroy your computer are usually hoaxes, not legitimate virus warnings.

Make some choices after reading the article above.

(1) The actual effect of a virus depends on ( A ).

A. the person who wrote the virus

B. how much your computer is

C. how to use your computer

D. a special cause

(2) What kind of virus may overwrite boot sectors and interfere with your computer's

operation (boot viruses), others damage?( A )

A. boot virus

B. worm virus

C. Trojan virus

D. Macro virus

(3) A macro virus can not infect ( C ).

A. document files

B. electronic spreadsheets

C. overwrite boot sectors

D. databases of several popular software packages

Text 5 How Serious are Viruses?

Exercises

1. Fill in the blanks.

(1) While serious if you have one, viruses are only one way your data can be damaged.

(2) It's still clear that there are many dangerous occurrences of data corruption from causes other than from viruses.

(3) One just has to take protective steps with anti-virus software and use some common sense when dealing with unknown files.

(4) Because viruses and worms are deliberately written to invade and possibly damage your PC, they are the most difficult threat to guard against.

2. Translate and analyze the following sentences.

(1) While serious if you have one, viruses are only one way your data can be damaged.

句子结构:while 引导原因状语从句,表转折关系. 翻译:虽然如果你的机器被病毒感染会许多威协带来很严重的后果,但那只是你的数据被破坏的其中一种方式.

Unit 9 Computer V

irus

8 (2)It just means that it's foolish to spend much money and time on addressing the threat of

viruses if you've done nothing about the other more likely threats to your files.

句子结构:if引导条件状语从句,表假设;it is means that引导同位语从句。

翻译:只是说,如果没有防范其他会对你文件造成的威胁,而花费过多的时间和金钱来忙

于防范病毒的威胁是不明智的.

(3)One just has to take protective steps with anti-virus software and use some common

sense when dealing with unknown files.

句子结构:;when引导时间状语从句;deal with 处理;has to 不得不.

解释:只能使用杀毒软件采取一些保护措施,或对一些未知类型文件采用一些常规的处理方法.

提高训练——语法知识

不定式

练习

(1)( A )education is the principal way of gaining status in a culture that generally

stresses achievement, skillfulness, and upward mobility.

A. To acquire

B. Acquire

C. Acquires

D. Have acquired

(2)We are planning ( C ) for the entrance examination for postgraduate.

A. registering

B. register

C. to register

D. registered

(3)The most urgent problem now we are facing is ( B ) to learn the needed materials for

the matriculation of postgraduate.

A. make our every effort

B. to make our every effort

C. to our every effort

D. made our efforts

(4)—Where should I send my application?

—The Personnel Office is the place ( C ) it to.

A. sends

B. be sent

C. to be sent

D. to send

(5)( A ) from others, one should take his promise.

A. To get confidence

B. To getting confidence

C. To get confidences

D. Getting to the confidence

提高训练——写作知识

怎样表达自己的感谢

范文

How Serious are V iruses?

9 The author would like to thank Johnson for helping with the architecture design and Per Danvind with helping with implementing the audio proxy. This work is supported by the Centre for Distance-spanning Technology (CDT) and the Swedish Research Institute for Information Tec hnology. 练习

写一篇文章,感谢某位同学在你装配电脑的时候给予的帮助,字数在80~100之间。

计算机专业英语影印版(Computing Essentials 2008)课后答案大全——第八单元Chapter 8 Secondary Storage

Crossword Puzzle Answers: Open Ended Questions: 1.Discuss the traditional and high-capacity floppy disks. The traditional floppy disk is the 1.44 MB 31/2-inch disk. The most common type is labeled 2HD, which means “two-sided, high-density” and have a capacity of 1.44 MB.Floppy disks have a thin exterior jacket made of hard plastic to protect the flexible disk inside. High-capacity disks, also known as floppy-disk cartridges, are rapidly replacing the traditional floppy disk. They are 31/2 inches in diameter, and are able to store more information, are thicker, and require special disk drives. 2.What are the three types of hard disks? Describe three ways to improve hard-disk performance. There are three types of hard disks: internal hard disk, hard-disk cartridge, and hard-disk pack.

计算机专业英语教程(第四版)习题答案

计算机专业英语教程(第四版)习题答案
计算机专业英语(第四版)课后习题答案 Unit 1 [Ex 1] Fb5E2RGbCAP [Ex 2] 1. input, storage, processing, and output 2. power; speed; 1. F 2. T 3. T 4. F 5. T 6. T 7. T 8. T 9. T 10.
memoryp1EanqFDPw 3. central processing unit memoryDXDiTa9E3d 5. keyboard; [Ex 3] B. A. central processing unit; 1. F 2. D 2. monitor 3. G 4. C 5. B main memory; 6. A 7. E monitorRTCrpUDGiT 8. H5PCzVD7HxA 4. internal; primary;
1. user
3. data
4. keyboard
5. data processingjLBHrnAILg
6. information [Ex 4] instructions
7. computer
8. memory 3. manipulates 4.
1. input device 2. screen, screen 5. retrievexHAQX74J0X 8. Function
6. code 7. hard copy
[Ex. 5] 新处理器开始 IT 技术的新时代 New Processors Open New Era of IT Technologies Last week, Intel introduced to the public in Russia and other CIS countries a family of processors Intel Xeon E5-2600. They are more powerful and reliable and, importantly, are very economical in terms of energy consumption. Their
1 / 30

计算机专业英语期末考试考卷A卷答案

2014年上半学期计算机专业英语 期末考试试卷(A卷)答案 一、选择题 Ⅰ. Vocabulary(词汇)(30分) (一).Translate the following words and expressions into Chinese(写出下列词组的汉语。)( 共10分,每题1分) 1. 操作系统 2. 需求分析 3. 网络安全 4. 数据结构 5. 决策支持系统 6. 关系数据库 7. 软件危机 8. 计算机病毒 9. 邮件附件 10.中央处理器(单元) (二).Fill in the blanks with the corresponding English abbreviatio ns.(根据汉语写出相应的英语缩写。) (共10分,每题1分) 1.DBMS 2.TCP 3.MDI 4.OOP

5.ROM 6.VCD 7.CAD 8.SQL 9.USB 10.B2B (三) Match the following words and expressions in the left column with those similar in meaning in the right column.(将左列的词汇与右列相应的汉语匹配。)(10分,每空1分) 1. c 6. h 2. f 7.j 3. e 8. d 4.g 9. i 5. a 1 0. b Ⅱ. Comprehension(阅读理解) (一)

Fill in the blanks with suitable words or expressions from the lis t given below, and change the form where necessary. (从下面方框中选择合适的词或表达,以其适当的形式填空。)(10分, 每空2分) maintain disciplined requirements coding modified (二) Tell whether the following statements are true(T) or false(F) accord ing to the passage A.(根据上文的内容判断下列句子的正误)(10分,每题2分)1.F 2.T 3.F 4.T 5.F (三)、choose the best answer according to the passage B.(根据上文的内容选择正确的答案。(10分,每题2分) 1.B 2.A 3.D 4.B 5.C (四) Choose the best answer according to Passage C.(根据上文的内容选择正确的答案。10分,每题2分) 1.C 2. D 3. A 4. C 5. B Ⅲ.Translation.翻译(30分) (一) Translate the following sentences into Chinese.(将下列句子翻译成汉语。)(共20分,每题5分)

计算机专业英语作文

计算机专业英语 系别:数学系 班级:11级计算机二班姓名:徐小凤学号:110312248

Robot Competition From 11th to 13th October 2013, these three days are special for my teammates and me. I took part in the fifth Robot Competition of Anhui province. After continuous efforts, we got the third prize in the end. In April 2013, this competition was announced in our class by Mr He. In that moment, many students registered for the competition. After hardly training, there were only fifteen students remaining. We were divided into five teams. Each included three people. There were three teams taking part in wheel type robot competition (or named intelligent car). And the other two majored in dancing robot. My two roommates and I engaged in the designing of robot dance. We controlled the robots by program. But the program was programmed in BASIC, which is a high level programming language. The problem was that we had never touched to that language besides C or C++. So, we must learn the language before designing the action. It seemed difficult but we had never lost our courage. After seeking enough data from the Internet and the library, we spent about a few weeks to learn it. When we felt the fundamental grammar was easy, we began to design the dancing action. That was the most important and most difficult part. We spent much time on

计算机专业英语的课文与翻译

Unit 8 Computer Networking Text 1 Data Communications The end equipment can be computers, printers, keyboards, CRTs, and so on.They are either generates the digital information for transmission or uses the received digital data. This equipment generally operates digital information internally in word units. DTE is data terminal equipment. A station controller (STACO)is the corresponding unit at the secondaries. At one time, the DTE was the last piece of equipment that belonged to the subscriber in a data link system. Between the DTEs, first is the modem, and then is the communications equipment. The communication equipment is owned and maintained by Telco. Data communications equipment (DCE) accepts the serial data stream from the DTE. And DCE converts it to some form of analog signal suitable for transmission on voice-grade lines. At the receive end, the DCE performs the reverse function. It converts the received analog signal to a serial digital data stream. The simplest form of DCE is a modem (modulator/demodulator) or data set. At the transmit end, the modem can be considered a form of digital-to-analog converter.While at the receive end, it can be considered a form of analog-to-digital converter. 参考译文 数据通信 终端设备可以是计算机、打印机、键盘、CRT等。它们可以生成要发送的数字信息,也可以使用所接收的数字数据。这种设备通常在内部以字为单位处理数字信息。 DTE一般称为数据终端设备。辅助设备一方的相应设备是工作站控制器(STACO)。同时,DTE也是数据链路系统中属于用户端的最后一个设备。在两个DTE之间,先是调制解调器,接着是属于Telco电话公司维护的通信设备。数据通信设备(DCE)从DTE接收串行数据流,并将其转换成适合于在语音线路上发送的某种模拟信号形式。在接收端,DCE完成相反的功能,把接收到的模拟信号转换成串行数字数据流。最简单的DCE是调制解调器或数据传送机。在发送端,调制解调器可以视为一种数/模转换器,而在接收端则可视为一种模/数转换器。 Text 2 Architecture of Computer Networks Computer network is a complex unit, it consists of two or more connected computing units. It is used for the purpose of data communication and resource sharing. Design of a network and its logical structure should comply with a set of design principles. They include: the organization of functions, the description of data formats and procedure. In the following two sections we will discuss two important network architectures, the OSI reference model and the TCP/IP reference model. (1)the OSI reference model The OSI (open systems interconnection) model was created by the ISO. This model is a foundation for comparing protocols; However, more protocols deviate from the rules set up by the OSI model. The OSI model has seven layers. Note that the OSI model itself is not a network architecture.

计算机专业英语期末考试试卷(A卷)答案

少工学结合创新教程....................... 计算机专业英语 2014年上半学期计算机专业英语 期末考试试卷(A卷)答案 一、选择题 I . Vocabulary(词汇)(30 分) (一).Tran slate the follow ing words and expressi ons into Chin ese( 汉语。)(共10分,每题1分) 1. 操作系统 2. 需求分析 3. 网络安全 4. 数据结构 5. 决策支持系统 6. 关系数据库 7. 软件危机 8. 计算机病毒 9. 邮件附件 10. 中央处理器(单元) (二).Fill in the blanks with the corresponding English abbreviations.( 写出相应的英语缩写。)(共10分,每题1分) 1 . DBMS 2. TCP 3. MDI 4. OOP 5. ROM 6. VCD 7 . CAD 8 . SQL 9 . USB 10. B2B (三) Match the following words and expressions in the left column with those similar in mea ning in the right colum n.(将左列的词汇与右列相应的汉语匹配。写出下列词组的 根据汉语)(10分,每空

1分) 1. c 6. h

1. 开发一个软件产品,开发过程分为五个步骤:需求分析和说明,设计,写代码,测试和维护。 2. 功能测试检验的是用有效的输入是否能够得到所期望的输出。+ 3. EDI指的是两个公司之间通过私有网络使用特定、结构化的格式电子交换商业信息。 4. 一些应用软件,例如Word,允许几个窗口同时在一个叫做MDI的模式下存在,你能够在 一个软件中打开多个文档。 (二)Tran slate the follow ing paragraph into Chi nese. (将下段文章翻译成汉语。)(共10分) 高级语言是一种人造语言,使用它我们可以写不同的指令。这成为可能不是因为计算机处理器如今是如此的技术先进以至于它们可以理解这些语言。你需要将这些语言翻译成计算机处理器能够理解的机器语言。编译器能够完成这项工作。这就意味着高级语言程序不是直接可项目1 3. e 8. d 4. g 9. i 5. a 10. b n . Comprehension(阅读理解) (一) Fill in the bla nks with suitable words or expressi ons from the list give n below ,and change the form where necessary. (从下面方框中选择合适的词或表达,以其适 当的形式填空。)(10分,每空2分) maintain discipli ned requireme nts codi ng modified (二)项目2 项目3 Tell whether the follow ing stateme nts are true(T) or false(F) accord ing to the passage A.(根据上文的内容判断下列句子的正误)(10分,每题2分)项目4 1 . F 2 . T 3 . F 4 . T 5 . F (三)、choose the best answer according to the passage B.(确的答案。(10分,每题2分) 1 . B 2 . A 3 . D 4 . B 5 . C (四)Choose the best answer according to Passage C. 案。10分,每题2分) 1 . C 根据上文的内容选择正 (根据上文的内容选择正确的答 项目5 2. D 3. A 项目6 4. C 5. B 川.Translation. 翻译(30 分) (一)Tran slate the followi ng senten ces in to Chin ese. 20分,每题5分)(将下列句子翻译成汉 语。 ) (共 项目7 项目8 项目9 项目10

计算机专业英语2008影印版选择题的翻译加答案

CHAPTER 1 1、A common term that describes the combination of traditional computer and communication technologies is b. information technology 一个描述了传统的计算机和通信技术结合的常见的术语 B.信息技术 2、Procedures are typically documented in manuals written by b. computer specialists 程序一般是___在手册撰写记录的 B.计算机专家 3、Which of the following is an example of connectivity? a. Internet 下列哪一项是连接的一个例子吗? A.互联网 4、Windows XP, windows Vista, and Macintosh OS X are all examples of b. operating systems Windows XP,Windows Vista,和Macintosh OS X都是__的例子 B.操作系统 5、Because of their size and cost, these computers are relatively rare. d. supercomputers 由于它们的尺寸和成本,这些电脑是比较少见的。 D.超级计算机 6、The system component that controls and manipulates data in order to produce information is called the d. microprocessor 系统组成,控制和操纵数据来产生信息称为 D.微处理器 7、A system component that translates data and programs that humans can understand into a form that the computer can process is called a(n) c. output device 一个系统组件,将人类可以理解成计算机能够处理的形式的数据和程序被称为 C.输出设备 8、A CD is an example of a(n) c. optical disc CD是___的简称 C.光盘 9、If you want to communicate a message or persuade other people, you would typically use this type of software. d. presentation 如果你想传达信息或说服别人,你通常会使用这种类型的软件。 D.演示 10、Many experts are predicting that this revolution is expected to dramatically affect the way we communicate and use computer technology. d. wireless

计算机专业英语报告

1.英语学术论文的语言风格特点就(知人方能论世) 为什么我们会读不懂SCI上面的文章呢? 第一,由于SCI里面出现的专业词汇一般都是出现在特定领域,一类是一词对应于一意,另外一类则是一词多义。 其次,名词化结构则是另外另外一个普遍出现的现象,可以看到,复合名词,加前缀和后缀,以及省略现象可谓是漫山遍野,因为文体要求行文简洁、表达客观、内容确切、信息量大、强调存在的事实,一般文章不会夹杂着太多主观看法。 最后,大量使用长句和定语从句SCI论文发表中大量使用长句和定语从句,在论证上起到连接信息和强调信息的作用。广泛使用被动语态SCI论文发表中侧重叙事推理,强调客观准确,第一、二人称使用过多,会造成主观臆断的印象。因此尽量使用第三人称叙述,采用被动语态。名词作定语和缩写词使用频繁SCI论文发表中要求结构紧凑、行文简炼,缩写词和名词作定语的频繁使用,增大了信息密度,简化了句型。 如果我们能逆向思维,转换个角度去看文章,如果你要发表一篇SCI论文,你会怎么去构造你的行为,你如何组织你文章的逻辑,特别是用词方面,口语和一些狸语在一般

情况不应该出现在文章中。还有些中式英语也会极大地影响我们的阅读,例如说足球比赛,可不是我们想象中的football match (之前有次演讲说,英语里面不能有2个名词的情况,在此就举了个例子bicycle man),而应该做football play亦作soccer play。 2.翻译是一门艺术,从某种意义上来讲是没有标准答案的。 这里本人想要想要阐述这样一种观点,翻译是一个不断精进的过程,翻译最初的目的即是为了实现语言之间的一个互相沟通,然而不同的人对一句话,应该会有着不同的理解。这也就有了译者极大的自由发挥性,但是译者必须准确理解原文的基础之上的。 有三个字可以高度概括翻译的精髓“信,达,雅”,想必大家都应该听过。”“信”指意义不背原文,即是译文要准确,不歪曲,不遗漏,也不要随意增减意思;同样可以举个例子?This is a pan in my hand (请问如何翻译呢?) “达”指不拘泥于原文形式,译文通顺明白;这里就涉及到一个直译和意译的关系啦,否则就会出现像bicycle

计算机专业英语7_8_9_10章

计算机专业英语(2006-2007学年04本) Computing Essentials CHAPTER 7 CONNECTIVITY, THE WIRELESS REVOLUTION, AND COMMUNICATIONS 连接、无线革命和通讯 Connectivity 连接,连接性 Bluetooth 蓝牙(技术) Communication systems 通讯系统 Sending and receiving devices 发送和接受设备 Communication channel 通讯信道 Connection decices 连接设备 Data transmission specification 数据转送规格说明规范 //////////////////////////////////////////////////////////// Concept Check What is the wireless revolution? Describer the four elements of every communication system? //////////////////////////////////////////////////////////// Communication channels 通讯信道 Telephone lines 电话线

Twisted pair 网络双绞线 Coaxial cable 同轴电缆 Microwave 微波 Line of sight communication 视线通讯(微波) Satellite 人造卫星 Fiber-optic cable 光纤电缆 Concept Chack Discuss the types of communication channels. Which is the fastest form of cable communications channels? What is one limitation of microwave communication? Analog signals 模拟信号 Digital signals 数字信号 Modem 调制解调器 Modulation 调制 Demodulation 解调 External modem 外置调制解调器 Internal modem 内置调制解调器 PC card modem Wireless modem 无限调制解调器

计算机专业英语全部答案(第三版)

计算机专业英语全部答案(第三版)

Unit1 EX1 1 F 2 T 3 T 4 F 5 T 6 F 7 T 8 T 9 T 10F EX2 Input hardware, storage hardware, processing hardware, output hardware power, speed, memory central processing unit internal, primary, memory keyboard, central processing unit, main memory, monitor EX3 PARTA 1 F 2 D 3 G 4 C 5 B 6 A 7 E 8 H EX3 PART B 1 F 2 E 3 G 4 B 5 A 6 C 7D 8 H EX4 1 input device 2 screen 3 manipulates 4 instructions 5 retrieve 6 codes 7 hardcopy 8 function EX5 1 T 2 T 3 F 4 F 5 T 6 F 7 T 8 T

UNIT2 EX1 1 T 2 F 3 T 4 F 5 T 6 F 7 T 8 F EX2 1 sizes, shapes, processing capabilities 2 supercomputers, mainframe computers, minicomputers, microcomputers 3 mainframe computer 4 microcomputer, storage locations 5 portables, laptop computers, desktop workstations 6 semiconductor 7 CPU, memory, storage, devices, processing, users 8 microprocessor chip EX3 PARTA 1 C 2 A 3 H 4 I 5 E 6 F 7 G 8 J EX3 PARTB 1 capacity 2 device 3 laptop computer 4 Portable computers 5 Silicon 6 semiconductor 7 workstation 8 Voltage, voltage 9 RAM 10ROM EX4 1 portable 2 access 3 main memory

计算机英语期末考试试题

计算机英语期末考试试题 I. 单选题. (1*20) 1.A computer system includes both _________ and software. A.cable B.memories C.CPU D.hardware 2.The heart of the computer is _________ A.CPU B.BUS C.CAI D.DIV 3.Which is not input device used with microcomputers ? A.Keyboard B.Printer C.touch screen D.Mouse 4.Basically , a computer consists of four components : Central Processing Unit , _________, Input Device and Output Device. A.Memory B.Keyboard C.Monitor D.The Control Unit 5.A _________ is a small , hand-held object that is pushed around a desktop to move the cursor or pointer on the screen or to select choices from menu displayed on screen. A.keyboard B.mouse C.monitor D.printer 6.Which is "删除" in Chinese ? A.shift B.Control C.Insert D.Delete 7.__________ refers to the parts of the computer that you can see and touch. A. Software B. Hardware C. Hardship D. Instruction 8._________ is used to communicate with another computer over telephone lines A. keyboard B .modem C. printer D. Mouse 9.__________is a device that enables the computer to handle sounds. A. network card B. video card C. sound card D. Monitor 10. The display screen is the most common device used to show you what the computer is doing. A. input B. printing C. output D. electronic 11._________ is a word processing tool that helps you to create quality documents. A. Word 2003 B. Outlook 2003 C. Access 2003 D. Excel 2003 12.The first generation of computer lasted from _________ to 1958. A.1965 B.1946 C.1947 D.1970 13._________ is the application of the computer and communications technology to improve the productivity of office workers. A.CAI B.AI C.OA D.CAM 14._________ is a software system based on graphics, which can run under MS-DOS. A.Office B.Mouse C.OS D.Microsoft Windows 15.Generally software can be divided into two types: software system and _________ system. A.hardware B.DOS C.application D.Windows 16.The _________ is the part of the computer where programs and data are stored. A.Input Device B.Memory C.CPU D.CU 17. refers to data storage equipment that allows the stored data to be accessed randomly rather than just in sequence. A.Random Access Memory B.Magnetic tapes C.Disks D.ROM 18.Word processing , of course, relies on perhaps the most basic computer _________ : the keyboard. A.output device B.input device C.storage D.CPU 19._________ refers to any machine capable of representing information from a

计算机专业英语2008影印版句子词语翻译(小抄版)

○1 1.Visual chapter openers and summaries 具视觉效果的开篇和总结 2.On the Web explorations 网络资源 3.Tips 小贴士,小窍门 4.Making IT work for you 为你所用 5.Concept checks and review 检查 6.Key terms 核心词汇 7.Careers in IT 信息技术相关职业 8.Procedures (指令,操作说明) 9.Software (软件) 10.Hardware (硬件) 11.Blocking spam 垃圾邮件过滤软件 12.Speech Recognition 语音识别软件 13.Virus Protection and Internet Security 14.网络安全软件 https://www.docsj.com/doc/6b4136236.html, Tuner Cards and Video Clips 电视卡和视频编辑软件16.Web Cams and Instant Messaging 网络视频摄像头和即时通 讯 17.Music from the Internet 网络音乐下载、上传和编 辑 18.Home Networking 家庭网络 19.Spyware Removal 间谍软件移除工具 20.Job Opportunities 网络就业机会搜索软 件 21.Operation system 操作系统 22.Coordinate resources 协调资源 23.Interface 提供接口 24.Run applications 运行应用程序 25.Utilities 公共实用程序 26.Device drivers 设备驱动程序 27.Browser 浏览器程序 28.Microsoft Office 办公软件 29.Basic application 基础应用程序 https://www.docsj.com/doc/6b4136236.html,itary or Government军事政府 31.Research institute 研究机构 32.Insurance companies 保险公司 33.Mainframe computers 大型机,主机 34.Supercomputers 超级计算机 35.Minicomputers 中型电脑 36.Microcomputers 微机个人计算机 37.Desktop computer 台式电脑 38.Notebook computer, laptop computers 手提式、膝上轻便 电脑 39.Tablet PC 支持手写的平板电脑 40.Handheld computer 掌上电脑 41.Windows mobile 操作系统 42.Electronic Dictionary 电子词典 43.Palm computer 掌上电脑 44.Handheld computer 手持电脑 https://www.docsj.com/doc/6b4136236.html,itary PDA 军用PDA 46.System unit:microprocessor and memory 微处理器 和内存 47.Input/output devices 输入和输出 48.Keyboard 键盘 49.Mouse 鼠标 50.Monitor 显示器printer 打印机 51.Secondary storage 辅助存储器 https://www.docsj.com/doc/6b4136236.html,pact discs (CD) 激光盘 53.Digital versatile or video discs (DVD) 数 字化视频光盘 54.High-definition discs (HDD) 高清盘 55.Document files 文字处理 56.Worksheet files 工作表单 57.Database files 数据库文件 58.Presentation files 演示文件 https://www.docsj.com/doc/6b4136236.html,puter competency refers to acquiring computer-related skills-indispensable tools for today. 2.Present an overview of an information system 概述信息系统 3.Understand these basic parts and how connectivity through the Internet.5大组成部分及如何访问网络 4.Filled out computerized forms, took computerized tests 填写电脑化的表格和考试 5.People are surely the most important part of any information system. 人是信息系统中最重要的组成元素 6.Our lives are touched every day by computers and information systems. 我们的生活每天都要接触计算机、信息系统 分不开 7.Making IT Work for You:present interesting and practical IT applications. 实用 的信息技术应用 8.Tips:suggestions ranging from the basics of keeping your computer system running smoothly to how to protect your privacy while surfing the Web. 关于计算机运用和网上冲 浪安全的提示和建议 9.Careers in IT:provides job descriptions, projected employment demands, educational requirements, current salary ranges, and advancement opportunities. 信息技术相关的 工作 https://www.docsj.com/doc/6b4136236.html,puting Essentials Web site:more information on the Web. 本课本相关的网 络资源 11.Software are the instructions that tell the computer how to process date into the form you want. 软件就是指导计算机把 数据转换成信息的指令 12.In the most case, the words software and programs are interchangeable. 大多时候,软件 和程序的概念是可以互换的 13.系统软件是应用软件和计算机硬件的中 间连接件。 14.The system software is just the mediator between application software and hardware. 15.you have to know to be considered computer competent. 作为计算机能手必须具 备 16.Wireless applications are just the beginning of the wireless revolution. 无线应用开启了无 线革命 17.Central to the concept of connectivity is the network. 连接概念的中心是网络 ○3 1.Integrated Packages 综合程序包 2.Software Suites 软件套组 3.templates 模版 4.Thesaurus 同义词库 5.Word wrap 自动换行 6.Autocorrect: 自动更正 7.Header or Footer 页眉页脚 8.Footnote 脚注 9.Captions, Cross References题注,交叉引 用 10.Table 表格 11.Calculations 计算 12.Functions 函数 13.Analytical graphs or charts 图表 14.What-if analysis 假设分析 15.Query: 查询 https://www.docsj.com/doc/6b4136236.html,municate a message 传递 17.persuade people 说服 18.Professional 专业 19.Productivity suite 商务组件 20.Personal suite 家庭组件 21.Specialized suite 专业组件 22.Utility suite 实用工具组件 1.Integrated package: is a single program that provides the functionality of a word processor, spreadsheet, database manager and more. 独立的集成软件包包括文字处理、表格和数据库管理等功能 2.Presentation: programs that combine a variety of visual objects to create attractive visually interesting presentations. 利用可视化 的图形,创造吸引人的演示效果。 3.Software suites: a collection of separate application programs bundled together and sold as a group. 捆绑一起售卖的多个应用程序 4.Good communication skills and teaching experience, though a teaching degree may not be required, it may be preferred. 沟通技能和 授课经验 5.Experience with the latest software and hardware is essential. 熟悉最新的软件和硬件 6.Seek detail-oriented individuals with IT experience IT经验的细心人 ○5 1.Booting a system 启动电脑 2.Mundane 常规的 3.behind-the-scenes 幕后的 4.Warm boot 热启动Cold boot 冷启动 5.Embedded OS 嵌入式OS https://www.docsj.com/doc/6b4136236.html,work OS 网络OS 7.Stand-alone OS 客户端OS 8.track 磁道 9.concentric ring同心圆 10.contiguous连续相邻的 11.wedge-shaped楔形的 12.sector扇区 13.Norton AntiVirus: 防毒 14.Norton CleanSweep: 系统清理 15.Web CleanUp: 上网痕迹清理 16.GoBack Personal Edition: 恢复设置 17.Norton Utilities: 实用工具 18.Bachelor’s degree 本科学位 19.Practical experience 实战经验 20.Certification from training 认证 21.Good analytical and communication skills 社交技能 1.System software: works with end users, application software, and computer hardware to handle the majority of technical details. 系统软件处理大多数技术细节 2.System software is collection that handle hundreds of technical details with little or no user intervention. 少用户介入的技术细节 3.Managing resources 资源管理 4.Providing character-based or graphical user interface 提供人机界面接口 5. A platform for running applications and supporting multitasking 为应用软件的运行提供系统平台 6.Advanced system security to guard against malicious files and programs, including spyware. 防恶意软件安全系统 7.Three-dimensional workspace capable of displaying transparent cascading windows. 三 维立体、玻璃、瀑布效果 8.Filtering capabilities to provide convenient parental controls by blocking access of objectionable Web sites. 过 滤能力,家长控制 9.Utilities: are designed to make computing easier. 使用计算机更加简单的专业程序 https://www.docsj.com/doc/6b4136236.html,e for: avoid frustrating 11.Internal hard disks crashed 死机 https://www.docsj.com/doc/6b4136236.html,puters freeze up 锁定卡死 13.Operations slow down 系统慢 14.Troubleshooting programs: recognize and correct problems. 自检程序 15.Antivirus programs: guard your computer system against viruses. 防病毒程序 16.Uninstall programs: safely and completely remove unneeded programs. 卸载程序 17.Backup programs: make copies of files. 备 份程序 18.File compression programs: reduce the size of files. 压缩程序 19.Disk Cleanup: a troubleshooting utility that identifies and eliminates nonessential files, frees up valuable disk space. 清理无用文件, 释放磁盘空间 20.A track is a concentric ring.磁道,就是一 个同心圆 21.Each track is divided into wedge-shaped sections called sector. 磁道被分成的楔形,称 为扇区 22.The operating system tries to save a file on a single track across contiguous sectors. 23.Disk Defragmenter: locates and eliminates unnecessary fragments and rearranges files and unused disk space to optimize operations. 去除无用的碎片,重新安排文件,优 化磁盘空间 24.Device driver: work with the operating system to allow communication between the device and the rest of the computer system. 用 于设备和计算机其他组件通信 25.Windows supplies hundreds of different device drivers with its system software. 自带 驱动 ○9 1.Originally intended for voice communication 语音通讯 2.Widely used to support computer communication 计算机通讯 3.Allow a wide variety of nearby devices to communicate without physical connection 设备通讯 4.Allow individuals to connect to the Internet 因特网无线互联 https://www.docsj.com/doc/6b4136236.html,munication channel 信道 6.Connection devices 连接设备 7.Data transmission specifications 数据传输规则 8.Twisted-pair cable 双绞线 9.Made up of copper wires 铜线 10.Coaxial cable 同轴电缆11.made up of a single solid-copper 12.Fiber-optic cable 光纤 13.Physical connections: 物理连接 14.Infrared: 红外线 15.Over short distances 短距离 16.Travel in a straight line 直线 17.In clear view of one another 18.Broadcast radio: 无线电通讯 https://www.docsj.com/doc/6b4136236.html,e radio signals 无线电信号 20.Follow standard Wi-Fi 无线保真 21.Microwave: 微波 https://www.docsj.com/doc/6b4136236.html,e high-frequency radio wave 23.line-of-sight communication 24.Be relayed by stations with dishes or antenna 天线接收传递 25.Bluetooth: 蓝牙技术 26.Pass through walls and nonmetal barriers 具有穿透性 27.Satellite: 卫星通讯 https://www.docsj.com/doc/6b4136236.html,e satellites orbiting about 22000 miles above the earth 29.Offered by Intelsat通讯卫星协会 30.Rotate at a precise point and speed 位置和 速度严格定位 31.External modem 外置调制解调器 32.Internal modem 内置调制解调器 33.PC Card modem 卡式调制解调器 34.Wireless modem 无线上网卡 https://www.docsj.com/doc/6b4136236.html,e for converting the digital signals to analog signals 数字、模拟信号转换 36.Transfer rate: 传输率 37.Bandwidth 带宽 38.Node: any device connected 节点 39.Client: a node uses resource 客户端 40.Server: a node sharing resources and performing specific task 服务器 41.Hub: the central node 集线器 https://www.docsj.com/doc/6b4136236.html,work interface cards: 网卡 https://www.docsj.com/doc/6b4136236.html,work operating systems: 网络OS 44.Distributed processing: 分布处理 45.Local Area Network: 局域网 https://www.docsj.com/doc/6b4136236.html,work gateway 网关 47.Ethernet: 以太网 48.Metropolitan Area Network: 城域网 49.Wide Area Network: 广域网 https://www.docsj.com/doc/6b4136236.html,work configurations 拓扑结构 51.Strategies 策略,模式 https://www.docsj.com/doc/6b4136236.html,puter communications: is the process of sharing data, programs, and information between two or more computers. 计算机之间共享信息数据资源 2.Connectivity: is a concept related to using computer networks to link people and resources to the world of larger computers and Internet. 3.Protocol: a set of communication rules for the exchange of information. 协议是传输信息的规则 https://www.docsj.com/doc/6b4136236.html,work architecture: describes how a network is arranged and how resources are coordinated and shared. 搭建,协调和共享 5.Terminal network: processing power is centralized in one large computer, other terminals connected to this host. 计算机能力 集中在中央主机上,即主机终端联机模式 6.Client/server networks: server nodes coordinate and supply specialized services, and client nodes request the services. 客户端请求 服务,服务器提供服务 7.Peer-to-peer networks: nodes have equal authority and can act as both clients and servers. 各节点角色相同 8.Intranets: a private network within an organization that resembles the Internet. 企业 内部网是一个私有网络 9.Extranets: a private network that connects more than one organization. 企业间的外联网 10.Firewall: a security system designed to protect an organization’s network against external threats. 防范外部威胁 11.Proxy server: a gatekeeper to monitor and evaluate all communication. 代理服务器

相关文档
相关文档 最新文档