《计算机专业英语》.ppt_第1页
《计算机专业英语》.ppt_第2页
《计算机专业英语》.ppt_第3页
《计算机专业英语》.ppt_第4页
《计算机专业英语》.ppt_第5页
已阅读5页,还剩130页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

计算机专业英语,第1篇,计算机专业英语,本课程知识结构,第2篇,第3篇,第4篇,第1篇 基础篇,Chapter 1 Architecture of Computer Systems,Text Any discussion of computer architectures,of how computers and computer systems are organized,designed,and implemented,will inevitably make reference to the “von Neumann architecture” as a basis for comparison,because virtually every electronic computer ever built has been rooted in this architecture.1,第1篇 基础篇,We have strong intuitive feelings about the “von Neumann architecture”, because this is what we have always used.This is “the way computers work”.To comprehend how computer designers conceive,or to appreciate what new choices must be found,it is necessary to have a definitive understanding of what the von Neumann architecture is and is not and what its implications are. The von Neumann architecture based on three ideas:four subsystems,stored program concept and sequential execution of instructions.2,第1篇 基础篇,Four Subsystems According to Von Neumanns preliminary discussion,the generalpurpose computing machine contains four main “organs”.These are identified as relating to arithmetic,memory,control,and connection with the human operator.In other words,they are the arithmetic logic unit,the control unit, the memory,and the inputoutput devices that we see in the classical model of what a computer “looks like”. The control unit(CU),arithmetic logic unit(ALU) and register constitute the central processing unit(CPU),第1篇 基础篇,Four Subsystems According to Von Neumanns preliminary discussion,the generalpurpose computing machine contains four main “organs”.These are identified as relating to arithmetic,memory,control,and connection with the human operator.In other words,they are the arithmetic logic unit,the control unit, the memory,and the inputoutput devices that we see in the classical model of what a computer “looks like”. The control unit(CU),arithmetic logic unit(ALU) and register constitute the central processing unit(CPU),第1篇 基础篇,Stored Program Concept To Von Neumann,the key to building a generalpurpose device lies in its ability to store not only its data and the intermediate results of computation,but also to store the instructions,or orders, which bring about the computation.3In a generalpurpose one, the instructions must be as changeable as the numbers they acted upon. Therefore, why not encode the instructions into numeric form and store instructions and data in the same memory? Von Neumann proposes that programs and data should be stored in the same binarynumber format in the memory device.4,第1篇 基础篇,Usually,this is viewed as the principal contribution provided by Von Neumanns insight into the nature of what a computer should be,which brings the significant breakthrough in the development of the generalpurpose electronic computer used today. That is what we all knowthe concept of a stored program.,第1篇 基础篇, Sequential Execution of Instructions Based on the stored program concept, computers store programs and data in a slowtoaccess storage medium(such as a hard disk) and work on them in a fastaccess, volatile storage medium (RAM).5However, this concept has a perceived bottleneck:it is designed to process instructions one after another instead of using faster parallel processing.6When the program executes,the message seems to appear all at once,but the speed of the computer has deceived you. In fact, one instruction executes in sequence,that is at a time:fetching one instruction from memory,interpreting (decoding) it and executing it. The computer does not go on to the next instruction until the one it is working on is completed.,according to 依照 architecture 体系结构 breakthrough 突破 constitute 组成 decode 译码,解码 encode 编码 fetch 获取 implication 含义 instruction 指令 intuitive 直觉 in sequence 顺次,依次 parallel processing 并行处理 preliminary 初步的,最初的 stored program concept 存储程序概念 sequential 顺序的 subsystem 子系统,第1篇 基础篇,Key Words & Terms,第1篇 基础篇, Text In computer science,the way information is organized in the memory of a computer is called a data structure.1 Its a data type whose values are composed of component elements that are related by some structure. Much of programming involves the storage and retrieval of data. Many of the most efficient algorithms for important problems are based on the use of specific data structures;the efficiency of the algorithm depends on the efficiency of the underlying data structure.2Software design often involves the choice of appropriate data structures. ,Chapter 2 Data Structure,第1篇 基础篇,For example, imagine that you are asked to create a database of names with ABC companys management and employees. To start your work,you make a list of everyone in the company along with their position, as shown in Table 2-1.,第1篇 基础篇,Although this list contains both name and position,it does not tell you which managers are responsible for which workers and so on. If you want your database to represent the relationships between management and employees at ABC,a tree diagram depicted Figure 2-1 is a much better structure for showing the work relationship at ABC.,第1篇 基础篇,These two diagrams are examples of different data structures. If you want to locate the employees record very quickly,you can use the list that keeps the names of the employees in alphabetical order;If you want to see relationships between employees, the tree structure is much better. There are many different data structures that programmers use to organize data in computers. Each data structure has certain operations that naturally fit with data structure. Often these operations are bundled with the data structure and together they are called a data type. An example of several common data structures are array,linked list,stack,queue,binary tree,and hash table.,第1篇 基础篇,List A collection of items accessible one after another beginning at the head and ending at the tail.,Stack A collection of items in which only the most recently added item may be removed. The latest added item is at the top. Basic operations are push and pop. Also known as “last in, first out” or LIFO.,Queue A collection of items in which only the earliest added item may be accessed. Basic operations are add (to the tail) or enqueue and delete (from the head) or dequeue. Delete returns the item removed. Also known as “first in, first out” or FIFO.,第1篇 基础篇,List A collection of items accessible one after another beginning at the head and ending at the tail.,Stack A collection of items in which only the most recently added item may be removed. The latest added item is at the top. Basic operations are push and pop. Also known as “last in, first out” or LIFO.,Queue A collection of items in which only the earliest added item may be accessed. Basic operations are add (to the tail) or enqueue and delete (from the head) or dequeue. Delete returns the item removed. Also known as “first in, first out” or FIFO.,第1篇 基础篇,Tree A data structure accessed beginning at the root node. Each node is either a leaf or an internal node. An internal node has one or more child nodes and is called the parent of its child nodes.3All children of the same node are siblings. Contrary to a physical tree,the root is usually depicted at the top of the structure, and the leaves are depicted at the bottom.,algorithm 算法 alphabetical 按字母顺序的 appropriate 适当的 array 数组 depict 描述 dequeue 出队 diagram 图表 enqueue 入队 hash table 哈希表 queue 队列 retrieval 检索 sibling 兄弟姐妹,同胞 stack 堆栈 ,第1篇 基础篇,Key Words & Terms,FIFO(First In First Out) 先进先出 FIFO(Last In First Out) 后进先出,第1篇 基础篇,Abbreviations,第1篇 基础篇,Chapter 3 File Format,Text In general terms,a file format in the PC world signifies what type of information is contained in a particular file. These are usually designated by the one to four (usually three) characters(the extensions) after the period in a filename.1 ,TXT A file ending in “.TXT” usually designates that the file is a plaintext file. This can contain virtually any type of text a recipe,documentation for software,a book report draft,or whatever. When a file ending in “.TXT” is doubleclicked,a text editor,such as notepad,should appear,allowing you to view and/or edit the contents of the file. ,第1篇 基础篇,PDF If a file has the extension .pdf,then it most likely is in the Portable Document Format (PDF),developed by Adobe Systems,Inc. PDF maintains the original document formatting for both printing and viewing on a multiple computing platforms, including Windows,UNIX and Mac. Although they contain the complete formatting of the original document,including fonts and images, PDF files are highly compressed, allowing complex information to be downloaded efficiently.2 To view PDF files, you must download the Adobe Acrobat Reader,which is free software for viewing and printing Adobe Portable Document Format (PDF) files on major hardware and operating system platforms. ,第1篇 基础篇, For storing digital images,there is a large number of formats too. Most formats were developed for particular programs,some have become the standards,and a few formats were developed specifically for interchanging files between different programs and computers.3 Following are some of the formats most commonly used.,第1篇 基础篇, BMP BMP is the native bitmap file format of the Microsoft Windows environment. It efficiently stores mapped or unmapped RGB graphics data with pixels 1bits,4bits, 8bits,or 24bits in size. BMP is an excellent choice for a simple bitmap format which supports a wide range of RGB image data. Bitmap images can be produced from existing drawings or photographs by “scanners” and edited with “image editing” programs such as Adobe Photoshop.4, GIF A mapped bitmap format developed for file interchange,commonly used for icons and other graphics on the Web.The GIF(Graphic Interchange Format) is limited to 256 colors.A single GIF file can combine several frames together for basic animated motion.A good compression method is built into the format.,第1篇 基础篇, JPEG Named after the Joint Photographic Experts Group,JPEG is a lossy codec for storing and transferring fullcolor digital images thats often used to post photography and artwork on the Web.5JPEG compression takes advantage of the human eyes inability to see minute color changes,removing portions of data from the original picture file.When creating a JPEG file,varying amounts of compression can be selected,depending on the desired file size and image quality. , TIFF TIFF(Tag Image File Format) is a flexible container format for digital still images.It can incorporate various forms of compression (like JPEG),or can be uncompressed.Some digital cameras offer a special TIFF mode for capturing uncompressed photos;however,these files require many times more storage space than JPEGs,and can quickly fill up your cameras available memory.,bitmap 位图文件 camera 照相机,摄像机 codec 多媒体数字信号编解码器 compress 压缩 designate 指明,指定 draft 草图,草稿 extension 扩展名 incorporate 合并 interchange 交换 lossy 有损耗的 motion 运动,移动 notepad 记事本 pixel 像素 platform 平台,第1篇 基础篇,Key Words & Terms,GIF(Graphic Interchange Format) 可交换的图像文件,可交换的图像文件格式 JPEG(Joint Photographic Experts Group)联合图像专家组,一种压缩标准 PDF(Portable Document Format) 便携式文件格式 TIFF(Tag Image File Format) 标签图像文件格式,第1篇 基础篇,Abbreviations,第1篇 基础篇,Text A database management system (DBMS),sometimes just called a database manager,is a program that lets one or more computer users create, access,update and manage the data.1 Technically speaking,it is a software system that uses a standard method of cataloging,retrieving,and running queries on data.,Chapter 4 Database Management System,Databases are usually designed to manage large bodies of information. This involves definition of structures for information storage (data modeling),provision of mechanisms for the manipulation of information (file and systems structure, query processing), concurrency control if the system is shared by users, and providing for the safety of information in the database (crash recovery and security).,第1篇 基础篇,The DBMS manages user requests (and requests from other programs) so that users and other programs are free from having to understand where the data is physically located on storage media and,in a multiuser system,who else may also be accessing the data.2In handling user requests,the DBMS ensures the integrity of the data (that is,making sure it continues to be accessible and is consistently organized as intended) and security (making sure only those with access privileges can access the data). ,第1篇 基础篇, The goal of a DBMS is to provide an environment that is both convenient and efficient to use in retrieving information from the database and storing information into the database.3The most typical DBMS is a Relational Database Management System (RDBMS).The standard user and program interface for RDBMS is the Structured Query Language (SQL).A newer kind of DBMS is the objectoriented database management system (ODBMS)., A DBMS can be thought of as a file manager that manages data in databases rather than files in file systems.In IBMs mainframe operating systems,the nonrelational data managers were (and are,because these legacy application systems are still used) known as access methods.,第1篇 基础篇, A DBMS is usually an inherent part of a database product.On PCs,Microsoft Access is a popular example of a single or small group user DBMS. Microsofts SQL Server is an example of a DBMS that serves database requests from multiple (client) users. Other popular DBMSs are IBMs DB2,Oracles line of database management products, and Sybases products.,catalog 编目,分类 consistently 始终如一地 crash 冲突 database 数据库 definition 定义,解说 inherent 与生俱来的,固有的 integrity 完整性 involving 包括,使陷于 manipulation 处理操作 persistent 持久稳固的 privilege 特权 Provision 供应,预备,防备 retrieve 检索 storage 存储 technically 技术上,第1篇 基础篇,Key Words & Terms,DBMS(database management system) 数据库管理系统 RDBMS(Relational Data (base) Management System) 关系数据(库)管理系统 SQL(Structured Query Language) 结构化查询语言,第1篇 基础篇,Abbreviations,第1篇 基础篇,Chapter 5 IP Address, Text Every computer that communicates over the Internet is assigned an IP address that uniquely identifies the device and distinguishes it from other computers on the Internet.1To make it easier for us to remember,a typical IP address is normally expressed in decimal format as a “dotted decimal number” like 192.168.10.126. But computers communicate in binary form. Look at the same IP address in binary: 11000000.10101000.00001010.01111110 The four numbers in an IP address are called octets, because they each have eight positions when viewed in binary form.,第1篇 基础篇, Every IP address consists of 32 bits,often shown as 4 octets of numbers from 0 to 255 represented in decimal form instead of binary form.2It consists of two parts,the first part of an Internet address identifies the network on which the host resides,while the second part identifies the particular host on the given network. This creates the twolevel addressing hierarchy that is illustrated in Figure 5-1.,第1篇 基础篇,In recent years, the network number field has been referred to as the network prefix because the leading portion of each IP address identifies the network number. All hosts on a given network share the same network prefix but must have a unique host number.3Similarly,any two hosts on different networks must have different network prefixes but may have the same host number. There are 5 different address classes plus certain special addresses. You can determine which class an IP address is in by examining the first 4 bits of the IP address.4,第1篇 基础篇,Default Network:The IP address of 0.0.0.0 is used for the default network. Class A Network:Binary address start with 0, therefore the decimal number can be anyone from 1 to 126. The first 8 bits (the first octet) identify the network and the remaining 24 bits indicate the host within the network. An example of a Class A IP address is 102.168.212.226, where “102” identifies the network and “168.212.226” identifies the host on this network.,第1篇 基础篇, Class B Network:binary addresses start with 10, therefore the decimal number can be anyone from 128 to 191. (The number 127 is reserved for loopback and is used for internal testing on the local machine.5) The first 16 bits (the first two octets) identify the network and the remaining 16 bits indicate the host within the network. An example of a Class B IP address is 168.212.226.204 where “168.212” identifies the network and “226.204” identifies the host on this network.,第1篇 基础篇, Loop back:The IP address 127.0.0.1 is used as the loop back address. This means that it is used by the host computer to send a message back to itself. It is commonly used for troubleshooting and network testing., Class C Network:binary addresses start with 110,therefore the decimal number can be anyone from 192 to 223. The first 24 bits (the first three octets) identify the network and the remaining 8 bits indicate the host within the network. An example of a Class C IP address is 200.168.212.226 where “200.168.212” identifies the network and “226” identifies the host on this network.6,第1篇 基础篇, Class D Network:binary addresses start with 1110, therefore the decimal number can be anyone from 224 to 239. Class D networks are used to support multicasting. Class E Network:binary addresses start with 1111, therefore the decimal number can be anyone from 240 to 255. Class E networks are used for experimentation. They have never been documented or utilized in a standard way., Broadcast:Messages that are intended for all computers on a network are sent as broadcasts.7These messages always use the IP address 255.255.255.255. ,binary 二进制 broadcast 广播 decimal 十进制的,以十为基础的,十进制 distin

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论