




已阅读5页,还剩6页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
IT职业英语答案姓名: 丁志均班级: 软件0801Unit one2. Questions for Discussion1. A CPU is a control center that converts data input to information output, and it is a highly complex, extensive set of electronic circuitry that executes stored program instructions. It consists of two parts: the control unit and the arithmetic/logic unit. 2. Because like an orchestra conductor not playing any musical instrument, a CU does not execute program instructions itself, it just directs other parts of the system to do so. 3. The ALU executes all arithmetic and logical operations. There are four kinds of arithmetic operations: addition, subtraction, multiplication, and division. A logical operation is usually a comparison. The ALU can compare numbers, letters, or special characters. 3. Translation1. 控制器是控制数据流通过处理器的电路,同时它还协调处理器中其他单元活动。2. 在个人电脑和小型工作站上,中央处理器被安置在一个名为微处理器的单个芯片上。3. 现代中央处理器体积小,呈正方形,并在底部嵌有多个金属连接头或金属针。4. 中央处理器被针面向下直接插在主板的中央处理器插槽中。5. 英特尔公司是世界上最大的半导体公司,也是个人电脑上最普遍应用的x86系列微处理器的发明者。Text BVocabulary1. d 2. f 3. h 4. b 5. c 6. a 7. k 8. e 9. j 10. g 11. iClass ActivitiesTrue or False1. T2. F3. T4. F5. TUnit TwoQuestions for Discussion1. A Hard Drive consists of a metal platter which spins very fast. As it spins, the Hard Drive head moves along the platter and can read and write information. The Hard Drive is used for long term and large amounts of storage.2. Because RAM works faster than Hard Drive. When the computer loads file from Hard Drive, it makes a copy of the information from the Hard Drive and places it in RAM, so that when the information is needed, it can be taken out immediately.3. They are both necessary forms of storage.4. Hard Drive is used for long-term and large amounts of storage. Information on the Hard Drive is magnetically encoded, so when the computer is turned off, the information wont be lost. The Hard Drive is relatively cheap, but it is slow. Compared with Hard Drive, RAM is used for short-term storage; the information stored on the RAM is based on electrical signals, so when the computer is turned off, all information on RAM will be gone. The RAM is fast, but it is more expensive than the Hard Drive.5. Because programs will only load a small portion of information from the Hard Drive at a time. 6. This person is comparing apple and orange. He/She needs to see how much RAM their computer has to decide if they have enough.Translation1. 硬盘有一个带有磁介质的硬浅盘,这与磁带和软盘中的软塑料胶片不同。2. 硬盘与盒式录音带没有什么大的差别。两者都使用同样的磁记录技术。3. 硬盘上的信息被储存在极小的磁畴内。而这些磁畴之所以能这么小是因为浅盘的精确度以及介质的速度。4. RAM被视为“随机存取”,是因为你如果知道相较于某存储单元的行与列,那你就可以直接访问任何单元。5. 动态随机存取存储器存储单元中的电容器就像一个漏水的桶。它需要定期刷新,否则就会放电至零。Text BVocabulary1. f 2. l 3. e 4. a 5. c 6. b 7. g 8. j 9. h 10.d 11. k 12. iTrue or False1. F 2. T 3. T 4. F 5. TUnit ThreeQuestions for Discussion1. The motherboard is the flat, rectangular piece of circuit board to which everything seems to connect to for one reason or another. It contains: a microprocessor socket, a chipset, a BIOS chip, a real-time clock and slots or ports for the attachment of various peripherals or support system/hardware.2. The motherboard is a printed circuit board which provides all the connections, pathways and lines connecting the different components of the computer to each other. Turning on the computer automatically starts the BIOS chip up to perform its diagnostic functions, after which it powers up the CPU which in its turn starts powering up the other peripherals (hard disk, operating system, video and audio, etc.).3. The key functions of BIOS chip include: checking power supply, the hard disk drive, operating system, etc. before the computer actually starts “booting up”. After its diagnostic functions are performed, it powers up the CPU.Translation1. 主板就像一块底板,为系统其他部件间的通信提供电力连接,但又和底板不同,主板上还装有中央处理器以及其他子系统和设备。2. 主板的一个重要构件是微处理器的支持性芯片集,它为中央处理器和各种总线及外部元件间提供了支持性接口。3. 几乎所有的主板都包括逻辑和连接器来支持常用的输入设备,例如鼠标和键盘的PS/2接口。4. 插槽是中央处理器与主板相连接的地方。插槽之间互不兼容,这就意味着插槽要与某种特定类型的中央处理器相匹配。Text BVocabulary1. I 2. l 3. j4. f5. h6. k7. c8. b9. a10. d11. e12. gClass ActivitiesTrue or False1. F2. T3. T4. T5. FUnit FourQuestions for Discussion1. Software is a general term for the various kinds of programs used to operate computers and related devices. Software can be thought of as the variable part of a computer and hardware the invariable part.2. Software is often divided into application software, system software, middleware, utility and applets. Application software is programs that do work users are directly interested in. System software includes operating systems and any program that supports application software. Middleware is program that mediates between application and system software or between two different kinds of application software. Utility is a small useful program with limited capability. Applets are small applications that sometimes come with the operating system as accessories.3. Software can be purchased or acquired as shareware (usually intended for sale after a trial period), liteware (shareware with some capabilities disabled), freeware (free software but with copyright restrictions), public domain software (free with no restrictions), and open source (software where the source code is furnished and users agree not to limit the distribution of improvements).4. Some general kinds of application software include productivity software, which includes word processors, spreadsheets, and tools for use by most computer users; presentation software; graphics software for graphic designers; CAD/CAM software; Specialized scientific applications; vertical market or industry-specific software (for example, for banking, insurance, retail, and manufacturing environments); and firmware or microcode.Translation1. 免费软件是指可以无偿使用或选择付费使用的计算机软件。免费软件通常只基于二进制,具有专利性,这也是它与自由软件的区别所在。2. 文字处理软件(更正式的说法为文件准备系统)用于各种可打印材料的创建(包括书写、编辑、格式编排或打印)。3. 固件介于硬件与软件之间。和软件一样,它也是一种由微处理器或者微控制器执行的计算机程序。但是它与一个硬件紧密相连,离开硬件就没有任何意义。4. 中间件是连接软件组件或应用软件的计算机软件。这种软件包括一套扶持性服务,能使一个网络上的一台或多台机器上同时运行的多个进程相互作用。Text BVocabulary1. t2. e3. j4. s5. g6. p7. o8. f9. h10. m11. c12. b13. a14. l15. q16. d17. r18. k19. n20. ITrue or False1. T2. F3. T4. F5. FUnit FiveQuestions for Discussion1. Programming language is classified based on its complexity, and it includes: machine language, assembly language, high-level language and fourth-generation language (4GL).2. To compile the program is to transform a program written in a high-level programming language from source code into object code. The first step is to pass the source code through a compiler, which translates the high-level language instructions into object code. The final step is to pass the object code through a linker. The linker combines modules and gives real values to all symbolic addresses, thereby producing machine code.3. An interpreter is a program that executes instructions written in a high-level language. It translates high-level instructions into an intermediate form, which it then immediately executes without going through the compilation stage during which machine instructions are generated.4. FORTRAN is a particularly good language for processing numerical data, but it does not lend itself very well to organizing large programs. Pascal is very good for writing well-structured and readable programs, but it is not as flexible as the C programming language. C+ embodies powerful object-oriented features, but it is complex and difficult to learn.Translation1. 程序设计语言被用来编写用于具体指定计算机行为的程序,以及精确表达算法,或者作为人类交流的一种模式。2. 大多数程序设计语言都是纯文本格式的,其所使用的文本串包括文字、数字以及标点符号,看起来很像是书面的自然语言。3. 一门语言的句法描述了构成句法正确的程序符号的可能组合。4. C+被广为应用在软件产业中。其中一些应用领域包括系统软件、设备驱动程序、嵌入式软件、高性能服务器和客户应用软件以及娱乐型软件,如视频游戏类。Text BVocabulary1. j2. n3. l4. d5. g6. e7. c8. k9. i10. f11. m12. h13. a14. bTrue or False1. F2. F3. T4. FUnit 63. Questions for Discussion1. Implementing the user interface, sharing hardware among users, allowing users to share data among themselves, preventing users from interfering with one another, scheduling resources among users, facilitating input/output, recovering from errors, accounting for resource usage, facilitating parallel operations, organizing data for secure and rapid access, and handling network communications.2. There are several reasons for abstraction. First, the code needed to control peripheral devices is not standardized. Second, the operating system introduces new functions as it abstracts the hardware. Third, the operating system transforms the computer hardware into multiple virtual computers, each belonging to a different program. Fourth, the operating system can enforce security through abstraction.3. Modern Operating systems generally have following three major goals: to hide details of hardware by creating abstraction; to allocate resources to processes (Manage resources); to provide a pleasant and effective user interface.4. Because operating systems provide a virtual machine to users that is more convenient to use.4. Translation1. 操作系统执行一些基本任务,如识别键盘输入,将输出传送到显示屏上,监视磁盘上的文件和目录,控制磁盘驱动器和打印机等周边设备。2. 操作系统负责电脑的安全以确保未经授权的用户不能访问系统。3. 操作系统提供一个软件平台,其他程序,即应用程序,能够在该平台上运行。4. 操作系统是由可移植的程序代码而不是永久性物理电路构成。5. 当今的系统可以协调上千种不同的打印机、磁盘驱动及特殊周边设备的任何可能组合。Text BVocabulary1. b2. j3. g4. i5. k6. c7. d8. h9. a10. f11. e2. True or False1. T2. T3. F4. T5. FUnit 7Questions for Discussion1. Computer networks are usually classified according to the scale: Personal area network (PAN), Local Area Network (LAN), Campus Area Network (CAN), Metropolitan area network (MAN), or Wide area network (WAN), except the ones mentioned above, there are also other types of network, like Global Area Network (GAN) and Internetwork.2. It contains printers, fax machines, telephones, PDAs or scanners.3. An LAN is a network covering a small geographic area, like a home, office or building. A CAN is a network that connects two or more LANs but that is limited to a specific and contiguous geographical area such as a college campus, industrial complex, or a military base. An MAN is a network that connects two or more Local Area Networks or Campus Area Networks together but does not extend beyond the boundaries of the immediate town/city.Translation1. 连接到广域网的电脑通常是通过公共网络进行连接的,如电话系统。它们也可以通过租用的专线或卫星实现连接。互联网是现存最大的广域网。2.协议规定了一套通用规则和信号,网络上的计算机利用这套规则和信号进行通讯。最常用的局域网协议之一被称之为以太网。3. 城域网覆盖面大于局域网,却小于广域网。城域网通常以使用光纤电缆或其他数字媒介达到高速连接为特征。4. 家域网是一个安装在用户住宅内的网络,它可以连接个人数字装置,将多个电脑及其周边设备、电话、录像机、电视、视频游戏、家庭安全系统、“智能”家电、传真机以及其他用网线连接到网络的数字装置。Text BVocabulary1. d2. c3. i4. a5. g6. h7. b8. f9. eTrue or False1. T2. F3. F4. T5. T6. TUnit 8Questions for Discussion1. Each of the packets contains both the senders Internet address and the receivers address. Any packet is sent first to a gateway computer which reads the destination address and forwards the packet to an adjacent gateway that in turn reads the destination address and so forth across the Internet until one gateway recognizes the packet as belonging to a computer within its immediate neighborhood or domain. That gateway then forwards the packet directly to the computer whose address is specified. The connection-oriented protocol TCP, who keeps track of the packet sequence, puts the packets in the right order. 2. To humans, IP addresses are normally expressed in decimal format as a dotted number; to computers, they are expressed in binary form. 3. The four numbers in an IP addresses are called octets. The two sections are Net and Host. The Net section always contains the first octet; the Host section always contains the lat octet.Translation1. 相对于网际协议只处理数据包,传输控制协议使两个主机能够建立起连接并交换数据流。传输控制协议保证数据的传送以及数据包以它们被发送的相同顺序进行传送。2. 从一个用户的角度来看,协议唯一令人感兴趣的地方就是如果你想要与其他计算机进行通讯,你的计算机或设备必须支持正确的协议。3.第六版网际协议的设计是从连接主机数和数据传输总量两方面实现因特网的稳定增长。4. 数据包的重要特征之一是:除了数据以外,它还包含目标地址。Text BVocabulary1. e2. j3. b4. a5. i6. g7. h8. f9. c10. dTrue or False1. F2. F3. T4. TUnit 9Questions for Discussion1. The Internet is the worlds largest network of networks. When you want to access the resources offered by the Internet, you dont really connect to the Internet; you connect to a network that is eventually connected to the Internet backbone, a network of extremely fast network components. 2. The networks are connected together on a backbone, which forms a network of networks. This backbone is connected to other networks, one of which is the Internet backbone.Translation1. 通过使用标准传输控制协议/网际协议转换数据包进行数据交换的计算机网络,彼此相连,构成了因特网一个全球网络系统。2. 因特网是网络的网络,它由从区域到全球无数的私人、公共、学术、商业及政府网络构成,通过从铜线到光纤电缆再到无线连接等其他技术实现连接。3. 因特网承载着各种各样的信息资源和服务,如电子邮件、在线聊天、文件传输和共享、在线游戏、相互关联的超文本文档以及万维网的其他资源。4. 互联网服务提供商通过一种适用于传输网际协议数据报文的数据传输技术与用户实现连接,例如拨号(上网)、数字用户线路、电缆调制解调器或专用高速连接。Text BVocabulary1. d2. f3. e4. g5. c6. b7. h8. aTrue or False1. T2. T3. F4. TUnit 10Questions for Discussion1. DoS attacks are the nastiest, because they are very easy to launch, difficult (sometimes impossible) to track, and it is not easy to refuse the requests of the attacker, without also refusing legitimate requests for service. The DoS attack program usually makes a connection on some service port, perhaps forging the packets header information that says where the packet came from, and then dropping the connection. It sends more requests to the host than it can handle, causing the legitimate requests not to be served.2. Not running your visible-to-the-world servers at a level too close to capacity; using packet filtering to prevent obviously forged packets from entering into your network address space; keeping up-to-date on security-related patches for your hosts operating systems. 3. The goal of these attacks is to access some resource that your machine should not provide the attacker. There are two types: executing commands illicitly and confidentiality breaches.4. The data diddler is likely the worst sort, since the fact of a break-in might not be immediately obvious. Perhaps he is toying with the numbers in your spreadsheets, or changing the dates in your projections and plans. Maybe he is changing the account numbers for the auto-deposit of certain paychecks. Translation1. 拒绝服务攻击者通常以知名度较高的网站服务器的网站和服务为攻击对象,例如银行,信用卡支付网关,甚至域名根服务器。2. 一个永久性拒绝服务攻击对系统造成的破坏十分之大,以至于需要替换或重装硬件。它利用了受害人硬件无论是路由器、打印机还是其他连接在网络里的硬件的远程管理接口的安全缺陷。3. 2001年2月,爱尔兰政府财政部的服务器受到了拒绝服务攻击,而该攻击是爱尔兰国立梅努斯大学一项学生活动的一部分。财政部正式对校方提出控诉,且若干学生受到了惩戒。Text BVocabulary1. b2. e3. a4. c5. f6. dTrue or False1. F2. F3. TUnit 11Questions for Discussion1. A computer virus is a malicious program that attaches itself to a program or file so it can spread from one computer to another, causing damages as it travels. Almost all viruses are attached to an executable file, if the user run or open them, they will be spread. People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.2. The difference is, unlike a virus, a worm has the capability to travel without any help from a person. It takes advantage of file or information transport features on your system, which allows it to travel without aid. The biggest danger with a worm is its capability to replicate itself on your system, so it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. The end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding.3. The Trojan horse, at first glance, will appear to be useful software, so people are tricked into opening them, but it will actually do damage once installed or run on your computer.When a Trojan is activated on your computer, the results can vary. Some Trojans are annoying (like changing your desktop, adding silly active desktop icons);Some can cause serious damage by deleting files and destroying information on your system.;Trojans can also create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised.4. A blended threat is a sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one threat, so it can spread quickly and cause widespread damage. Characteristics of blended threats include: causes harm, propagates by multiple methods, attacks from multiple points and exploits vulnerabilities.Translation1. 最阴险的木马病毒种类之一是一个声称帮你清除病毒而实际上却将病毒引入到你计算机上的程序。2. 七种主要的木马病毒包括:远程访问木马、数据发送木马、破坏性木马、代理木马病毒、文件传输协议木马、安全软件禁用木马以及拒绝服务攻击木马。3. 它使用网络将自己的副本发送给其他节点(网络上的计算机终端),而且不需要任何用户干涉就能做到。4. 蠕虫利用操作系统漏洞进行传播。所有供应商都会提供常规的安全升级,如果这些更新被安装到计算机上就能阻止大部分蠕虫传播到该台计算机上。Text BVocabulary1. o2. i3. n4. k5. h6. m7. d8. b9. l10. p11. f12. a13. c14. g15. j16. eTrue or False1. F2. F3. T4. F5. T6. TUnit 12Questions for Discussion1. A firewall is simply a group of components that collectively form a barrier between two networks. For connecting an organization to the Internet provides a two-way flow of traffic, which is undesirable in many organizations, the firewall is designed to provide some level of separation between an organizations intranet and the Internet.2. First, its not very convenient. Clients behind the firewall must be proxitized (that is, must know how to use the proxy, and be configured to do so) in order to use Internet services, as it doesnt allow anything to pass by default, but needs to have the programs written and turned on in order to begin passing traffic. Second, its also typically the slowest, because more processes need to be started in order to have a request serviced.3. First, by default, the appli
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年初级导游证考试知识点总结与预测题
- 2025年医学影像技术专家认证模拟题及解析
- 2025年养老评估师考试高频考点梳理
- 拉毛拉条灰施工课件
- 2025年进排气系统:进排气管项目合作计划书
- 抢救患者应急预案课件
- 2025年日用及医用橡胶制品项目合作计划书
- 华大新高考联盟2026届高三上学期9月教学质量测评英语试卷(含答案无听力原文及音频)
- 贵州省黔西南布依族苗族自治州兴义市2024-2025学年三年级下学期期末数学试题
- 家政保育员题库及答案
- HAD+101.09-1990滨海核电厂厂址设计基准洪水的确定
- 中核集团中辐院招聘笔试真题2022
- 2024年湖南省高中学业水平合格考物理试卷真题(含答案详解)
- 水机空调安装合同范本
- 本校学生对学校食堂满意度调查问卷
- 泡沫箱子合同范本
- 智能制造装备与集成 课件 02 智能制造架构与装备
- 典范英语7the king of football概括
- 2024-2029全球及中国土豆泥行业市场发展分析及前景趋势与投资发展研究报告
- 我和我的祖国歌词
- 新人教版初二上册(八上)数学全册课件
评论
0/150
提交评论