




已阅读5页,还剩49页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Translate the following terms or phrases from English into Chinese and vice versa:1. artificial intelligence 人工智能2. paper-tape reader 纸带阅读器3. optical computer 光计算机4. neural network 神经网络5. instruction set 指令集6. parallel processing 并行处理7. difference engine 差分机8. versatile logical element 通用逻辑元件9. silicon substrate 硅衬底10. vacuum tube 真空管11. 数据的存储与处理 the storage and handling of data12. 超大规模集成电路 very large-scale integrated circuit13. 中央处理器 central processing unit14. 个人计算机 personal computer15. 模拟计算机 analogue computer16. 数字计算机 digital computer17. 通用计算机 general-purpose computer18. 处理器芯片 processor chip19. 操作指令 operating instructions20. 输入设备 input device1. function key 功能键,操作键2. voice recognition module 语音识别模块3. touch-sensitive region 触敏区4. address bus 地址总线5. flatbed scanner 平板扫描仪6. dot-matrix printer 点阵打印机(针式打印机)7. parallel connection 并行连接8. cathode ray tube 阴极射线管9. video game 电子游戏10. audio signal 音频信号11. 操作系统 operating system12. 液晶显示(器) LCD (liquid crystal display)13. 喷墨打印机 inkjet printer14. 数据总线 data bus15. 串行连接 serial connection16. 易失性存储器 volatile memory17. 激光打印机 laser printer18. 磁盘驱动器 disk drive19. 基本输入/输出系统 BIOS (Basic Input/Output System)20. 视频显示器 video display1. storage register 存储寄存器2. function statement 函数语句3. program statement 程序语句4. object-oriented language 面向对象语言5. assembly language 汇编语言6. intermediate language 中间语言,中级语言7. relational language 关系(型)语言8. artificial language 人工语言9. data declaration 数据声明10. SQL 结构化查询语言11. 可执行程序 executable program12. 程序模块 program module13. 条件语句 conditional statement14. 赋值语句 assignment statement15. 逻辑语言 logic language16. 机器语言 machine language17. 函数式语言 functional language18. 程序设计语言 programming language19. 运行计算机程序 run a computer program20. 计算机程序员 computer programmer1. inference engine 推理机2. system call 系统调用3. compiled language 编译执行的语言4. parallel computing 并行计算5. pattern matching 模式匹配6. memory location 存储单元7. interpreter program 解释程序8. library routine 库程序,程序库例行程序9. intermediate program 中间程序,过渡程序10. source file 源文件11. 解释执行的语言 interpreted language12. 设备驱动程序 device driver13. 源程序 source program14. 调试程序 debugging program15. 目标代码 object code16. 应用程序 application program17. 实用程序 utility program18. 逻辑程序 logic program19. 墨盒 ink cartridge20. 程序的存储与执行 program storage and execution1. system specification 系统规格说明2. unit testing 单位(或单元、部件)测试3. software life cycle 软件生命周期(或生存周期)4. system validation testing 系统验证测试5. evolutionary development process 演化开发过程6. simple linear model 简单线性模型7. program unit 程序单元8. throwaway prototype 抛弃式原型9. text formatting 正文格式编排,文本格式化10. system evolution 系统演变11. 系统设计范例 system design paradigm12. 需求分析与定义 requirements analysis and definition13. 探索式编程方法 exploratory programming approach14. 系统文件编制 system documentation15. 瀑布模型 waterfall model16. 系统集成 system integration17. 商用现成软件 commercial off-the-shelf (或COTS) software18. 基于组件的软件工程 component-based software engineering (CBSE)19. 软件维护工具 software maintenance tool20. 软件复用 software reuse1. end user 最终用户,终端用户2. atomic operation 原子操作3. database administrator 数据库管理员4. relational database model 关系数据库模型5. local data 本地数据6. object-oriented database 面向对象数据库7. database management system (DBMS) 数据库管理系统8. entity-relationship model (ERM) 实体关系模型9. distributed database 分布式数据库10. flat file 平面文件11. 二维表 two-dimensional table12. 数据属性 data attribute13. 数据库对象 database object14. 存储设备 storage device15. 数据类型 data type16. 数据插入与删除 data insertion and deletion17. 层次数据库模型 hierarchical database model18. 数据库体系结构 database architecture19. 关系数据库管理系统 relational database management system (RDBMS)20. 全局控制总线 global control bus1. backup system 备份系统2. encryption key (加密)密钥3. data confidentiality 数据机密性4. system vulnerability 系统脆弱性,系统脆弱之处5. unauthorized access 未经授权的访问,越权存取6. intrusion detection system 入侵检测系统7. after-action recovery 事后恢复8. software piracy 软件侵权9. authorized user 特许用户10. data unit 数据单元,数据单位11.软件版本 software version12.数据完整性 data integrity13.系统崩溃 system crash14.病毒检查软件 virus-checking software15.综合安全策略 comprehensive security strategy16.软件配置管理 software configuration management 17.故障隔离 fault isolation18.统计数据库 statistical database19.保密的加密算法 secure encryption algorithm20.数据流 data stream1. routing path 路由选择通路2. dual-ring topology 双环形拓扑结构3. extended star topology 扩展星型拓扑结构4. backbone network 基干网,骨干网5. mesh topology 网格拓扑结构6. 同轴电缆 coaxial cable7. 逻辑拓扑结构 logical topology8. 无冲突连网环境 collision-free networking environment9. 树形拓扑结构 tree topology10. 目的地节点 destination node1. destination address 目的地址2. performance degradation 性能退化、降级3. four-interface bridge 4接口网桥4. common bus 公共、公用总线5. 数据链路层 data link layer6. 协议转换器 protocol converter7. 开放式系统互连OSI Open Systems Interconnection8. 物理地址 physical address1. file server 文件服务器2. carrier sense 载波检测,载波监听3. protocol suite 协议组,协议集4. peer-to-peer model 对等模型5. bus topology network 总线拓扑网络6. inter-machine cooperation 机器间合作,计算机间合作7. Ethernet protocol collection 以太网协议集8. proprietary network 专有网络9. utility package 实用软件包,公用程序包10. star network 星形网络11. 局域网 local area network (LAN)12. 令牌环 token ring13. 无线网络 wireless network14. 封闭式网络 closed network15. 环形拓扑结构 ring topology16. 客户机/服务器模型 client/server model17. 网络应用程序 network application18. 进程间通信 interprocess communication19. 打印服务器 print server20. 广域网 wide area network (WAN)1. cell phone 蜂窝电话,移动电话,手机2. IP address 网际协议地址,IP地址3. autonomous system 自主系统4. dial-up connection 拨号连接5. network identifier 网络标识符6. binary notation 二进制记数法7. mnemonic name 助记名,缩写名8. Internet-wide directory system 因特网范围的目录系统9. name server 名称服务器10. Internet infrastructure 因特网基础结构11. 助记地址 mnemonic address12. 网吧 cyber cafe13. 宽带因特网访问 broadband Internet access14. 顶级域名 top-level domain (TLD)15. 因特网编址 Internet addressing16. 点分十进制记数法 dotted decimal notation17. 因特网服务提供商 Internet service provider (ISP)18. 专用因特网连接 dedicated Internet connection19. 主机地址 host address20. 硬件与软件支持 hardware and software support1. mailing list 邮件发送清单,邮件列表2. proprietary software 专有软件3. cc line 抄送行4. bcc line 密送行5. forwarded e-mail messages 转发的电子邮件6. e-mail convention 电子邮件常规7. click on an icon 点击图标8. confidential document 密件,秘密文件9. classified information 密级信息10. recovered e-mail message 恢复的电子邮件11. 常用情感符 commonly used emoticon12. 已删除电子邮件 deleted e-mail13. 电子系统 electronic system14. 附件行 Attachments line15. 版权法 copyright law16. 电子邮件网规 e-mail netiquette17. 信息高速公路 information superhighway18. 签名文件 signature file19. 电子数据表程序 spreadsheet program20. 文字处理软件 word processor1. server farm 大型机服务器2. access protocol 存取、访问协议3.storage area network 存取区域网络4. high-throughput computing 高吞吐量计算5. server cluster 服务器集群6. public cloud 公共云7. grid computing 网格计算8. security-aware cloud architecture 具有安全意识的云体系结构9. social networking 社交网络10. utility computing 效用计算11. 云计算提供商 cloud computing provider12. 存储芯片 memory chips13. 基于内部网的私有云 Intranet-based private clouds14. 网络带宽 network bandwidth15. 混合云 hybrid clouds16. 磁盘阵列 disk array17. 软件即服务 software as service18. 集群计算 cluster computing19. 虚拟化计算机资源 virtualized computer resources20. 多核处理器 multi-core processor1. customized marketing strategy 定制的营销策略2. B2G transaction 企业对政府交易3. mobile telephone 移动电话4. dot-com bust 网络不景气5. smart card 智能卡,灵巧卡6. digital piracy 数字盗版7. dot-com boom 网络繁荣8. C2C transaction 消费者对消费者交易9. Web auction site 拍卖网站10. fingerprint reader 指纹读取器11. 射频识别装置 radio-frequency identification (RFID) device12. 电子数据交换 electronic data interchange (EDI)13. 库存管理技术 inventory management technology14. 知识产权 intellectual property15. 条形码 bar code16. 货币兑换 currency conversion17. 电子图书 electronic book18. 视网膜扫描仪 retina scanner19. 个人数字助理 personal digital assistant (PDA)20. 企业对企业电子商务 B2B electronic commerceIII. Fill in each of the blanks with one of the words given in the following list, makingchanges if necessary:1.We can define a computer as a device that accepts input, processes data, stores data, andproduces output. According to the mode of processing, computers are either analog or digital.They can also be classified as mainframes, minicomputers, workstations, or microcomputers.All else (for example, the age of the machine) being equal, this categorization provides someindication of the computers speed, size, cost, and abilities.Ever since the advent of computers, there have been constant changes. First-generationcomputers of historic significance, such as UNIVAC (通用自动计算机), introduced in theearly 1950s, were based on vacuum tubes. Second-generation computers, appearing in theearly 1960s, were those in which transistors replaced vacuum tubes. In third-generationcomputers, dating from the 1960s, integrated circuits replaced transistors. In fourth-generationcomputers such as microcomputers, which first appeared in the mid-1970s, large-scaleintegration enabled thousands of circuits to be incorporated on one chip. Fifth-generationcomputers are expected to combine very-large-scale integration with sophisticated approachesto computing, including artificial intelligence and true distributed processing.2. CD-ROM stands for compact disc read-only memory. Unlike floppy and hard disks,which use magnetic charges to represent 1s and 0s, optical discs use reflected light. On aCD-ROM disc, 1s and 0s are represented by flat areas and bumpy (高低不平的) areas (called“pits”) on its bottom surface. The CD-ROM disc is read by a laser that projects a tiny beam oflight on these areas. The amount of reflected light determines whether the area represents a 1or a 0.Like a commercial CD found in music stores, a CD-ROM is a “read-only” disc.Read-only means it cannot be written on or erased by the user. Thus, you as a user haveaccess only to the data imprinted (压印) by the publisher.A single CD-ROM disc can store 650 megabytes (兆字节) of data. That is equivalent to451 floppy disks. With that much information on a single disc, the time to retrieve or accessthe information is very important. An important characteristic of CD-ROM drives is theiraccess rate.3. A programming language is a language used to write instructions for the computer. It letsthe programmer express data processing in a symbolic manner without regard tomachine-specific details.The difficulty of writing programs in the machine language of 0s and 1s led first to thedevelopment of assembly language, which allows programmers to use mnemonics (助记符)for instructions and symbols for variables. Such programs are then translated by a programknown as an assembler into the binary encoding used by the computer. Other pieces of systemsoftware known as linking loaders (连接装入程序) combine pieces of assembled code andload them into the machines main memory unit, where they are then ready for execution. Theconcept of linking separate pieces of code was important, since it allowed “libraries” ofprograms to be built up to carry out common tasksa first step toward the increasinglyemphasized notion of software reuse. Assembly language was found to be sufficientlyinconvenient that higher-level languages (closer to natural languages) were invented in the1950s for easier, faster programming; along with them came the need for compilers, programsthat translate high-level language programs into machine code. As programming languagesbecame more powerful and abstract, building efficient compilers that create high-quality codein terms of execution speed and storage consumption became an interesting computer scienceproblem in itself.4. A compiler, in computer science, is a computer program that translates source code intoobject code. Software engineers write source code using high-level programming languagesthat people can understand. Computers cannot directly execute source code, but need acompiler to translate these instructions into a low-level language called machine code.Compilers collect and reorganize (compile) all the instructions in a given set of sourcecode to produce object code. Object code is often the same as or similar to a computersmachine code. If the object code is the same as the machine language, the computer can runthe program immediately after the compiler produces its translation. If the object code is notin machine language, other programssuch as assemblers, binders (联编程序), linkers, andloaders (加载程序)finish the translation.Most computer languages use different versions of compilers for different types ofcomputers or operating systems, so one language may have different compilers for personalcomputers (PC) and Apple Macintosh computers. Many different manufacturers often produceversions of the same programming language, so compilers for a language may vary betweenmanufacturers.5. There are three different types of software maintenance. Firstly, there is maintenance torepair software faults. Coding errors are usually relatively cheap to correct; design errors aremore expensive as they may involve rewriting several program components. Requirementserrors are the most expensive to repair because of the extensive system redesign that may benecessary. Secondly, there is maintenance to adapt the software to a different operatingenvironment. This type of maintenance is required when some aspect of the systemsenvironment such as the hardware, the platform operating system or other support softwarechanges. The application system must be modified to adapt it to cope with these environmentalchanges. And thirdly, there is maintenance to add to or modify the systems functionality.This type of maintenance is necessary when the system requirements change in response toorganizational or business change. The scale of the changes required to the software is oftenmuch greater than for the other types of maintenance. In practice, there isnt a clear-cutdistinction between these types of maintenance. When you adapt the system to a newenvironment, you may add functionality to take advantage of new environmental features.Software faults are often exposed because users use the system in unanticipated ways.Changing the system to accommodate their way of working is the best way to fix these faults.6. A database is any collection of data organized for storage in a computer memory anddesigned for easy access by authorized users. The data may be in the form of text, numbers, orencoded graphics. Small databases were first developed or funded by the U.S. government foragency or professional use. In the 1960s, some databases became commercially available, buttheir use was funnelled (传送) through a few so-called research centers that collectedinformation inquiries and handled them in batches. Online databasesthat is, databasesavailable to anyone who could link up to them by computerfirst appeared in the 1970s.Since their first, experimental appearance in the 1950s, databases have become so importantthat they can be found in almost every field of information. Government, military, andindustrial databases are often highly restricted, and professional databases are usually oflimited interest. A wide range of commercial, governmental, and nonprofit databases areavailable to the general public, however, and may be used by anyone who owns or has accessto the equipment that they require.7. Computers can communicate with other computers through a series of connections andassociated hardware called a network. The advantage of a network is that data can beexchanged rapidly, and software and hardware resources, such as hard-disk space or printers,can be shared. Networks also allow remote use of a computer by a user who cannot physicallyaccess the computer.One type of network, a local area network (LAN), consists of several PCs or workstationsconnected to a special computer called a server, often within the same building or officecomplex. The server stores and manages programs and data. A server often contains all of anetworked groups data and enables LAN workstations or PCs to be set up without largestorage capabilities. In this scenario (方案), each PC may have “local” memory (for example,a hard drive) specific to itself, but the bulk of storage resides on the server. This reduces thecost of the workstation or PC because less expensive computers can be purchased, and itsimplifies the maintenance of software because the software resides only on the server ratherthan on each individual workstation or PC.8. Early computer networks used leased telephone company lines for their connections.Telephone company systems of that time established a single connection between sender andreceiver for each telephone call, and that connection carried all data along a single path. Whena company wanted to connect computers it owned at two different locations, the companyplaced a telephone call to establish the connection, and then connected one computer to eachend of that single connection.The U. S. Defense Department was concerned about the inherent risk of thissingle-channel method for connecting computers, and its researchers developed a differentmethod of sending information through multiple channels. In this method, files and messagesare broken into packets that are labeled electronically with codes for their origins, sequences,and destinations. In 1969, Defense Department researchers in the Advanced Research ProjectsAgency (ARPA) used this network model to connect four computers into a network called theARPANET. The ARPANET was the earliest of the networks that eventually combined tobecome what we now call the Internet. Throughout the 1970s and 1980s, many researchers inthe academic community connected to the ARPANET and contributed to the technological
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025至2030股份商业银行行业市场发展现状及竞争格局与投资价值报告
- 年终工作总结自我评价
- 消防安全月培训教学课件
- 项目管理全流程课件
- 矿山合作协议及承包权转让与执行监管协议
- 离婚法律协议变更与子女抚养权调整执行顾问合同
- 家庭关系调整与财产分配分居协议示范
- 离婚协议补充协议范本:家庭财产分割补充条款
- 离婚房产分割及婚后财产增值补偿协议书
- 砂石料运输合同范本:绿色环保物流合作
- 2025年辅警面试考试试题库目(答案+解析)
- 航运大数据分析与决策支持
- 2025至2030全球及中国两轮组合仪表行业产业运行态势及投资规划深度研究报告
- 2024公路运营领域重大事故隐患判定标准解读学习课件
- 耕地保护培训课件
- MES追溯管理制度
- 质量专项改善管理制度
- T/CHES 79-2022大中型输水渠道工程维修养护规程
- 人工智能智慧体育课件教学
- GA/T 2187-2024法庭科学整体分离痕迹检验规范
- 盗窃谅解赔偿协议书范本
评论
0/150
提交评论