滇池学院计算机专业英语复习资料.doc_第1页
滇池学院计算机专业英语复习资料.doc_第2页
滇池学院计算机专业英语复习资料.doc_第3页
滇池学院计算机专业英语复习资料.doc_第4页
全文预览已结束

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

计算机专业英语复习资料一.名词解释1.Retrieveinformation检索信息 2.Network architecture网络结构3. Web-browsing and e-mail applications网页浏览和电子邮件应用 4.application protocol 应用层协议 5.e-mail routing information 电邮路由信息 6.authoritative name server 授权域名服务器7.datagram communication service 报文通信服务 8.Multipurpose Internet Mail Extensions 多用网络邮件扩展 9. flow control algorithms 流程控制算法 10.check bits 校验位 11. Transmission Control Protocol 传输控制协议 12.User Datagram Protocol 用户数据报协议 13. routing table 路由表 14.Interpret as Command 命令解释1. subscriber access network 客户接入网络 2.Internet backbone 因特网主干网3. Cable Television(CATV) network 电缆电视网络 4.co-axial cable 同轴电缆5.point-to-multipoint optical network点对多点逛网络 6.Logical Link Identifier 逻辑连接标识7. channel capacity 信道容量 8.time-division multiple access 时分多路接入9. Asynchronous Transfer Mode 异步传输模式 10.Full Service Access Network 全功能接入网络11. Generic Framing Procedure 通用帧进程 12.Synchronous Digital Hierarchy 同步数字层13. Quality of Service 服务质量 1. point-to-point connections 点对点连接 2.USB Host Controller Interface USB主机控制器接口3. Bandwidth sharing and allocation 宽带共享和分配 4.Full Speed USB peripherals 全速USB外设5. Enhanced Host Controller Interface 增强型主机控制器接口 6.detachable cable 可分离电缆7. tiered-star topology 层叠星状拓扑结构 8.upstream connection 上行连接 9. Isochronous Data Transfers 同步数据传输 10.Interrupt Data Transfers 中断数据传输11. Bulk Data Transfer 批量数据传输 12. High Mobility Performance Radio Local Area Network 高灵活性无限局域网 1. hypertext-matching analysis 超文本匹配分析 2.Web popularity contest 网站普及性竞争3. Web crawler 网虫 4.research engine 科研引擎 5. Internet Protocol Television 网络协议电视 6.Broadband access 宽带接入7. air broadcast channels 无线广播频道 8.Real-time video on demand 实时随选频道9. client-oriented service 面向客户服务 10.value-added services 增值服务11. service control architecture 服务控制体系 12.conditional-access management 有条件接入管理13. real-time rating engine 实时速率引擎 14.Extensible Markup Language 可扩展标记语言1. Command-line mode 命令行模式 2.Internet Control Message Protocol 网络控制消息协议3. query/response mechanism 询问/解答机制 4.Path discovery 路径发掘5. routing table 路由表 6.Traffic Capture Tools 流量捕获工具7. Protocol analyzer 协议解析器 8.multicast address 多点传送地址9. capture engine 捕获引擎 10.Type-of-Service 服务类型1. utility programs 工具程序 2.Virus triggering phase 病毒触发阶段3. Virus Execution phase 病毒执行阶段 4.executable files 可执行文件 5. Types of Viruses 病毒类型 6.Boot sector virus 引导扇区病毒7. Stealth virus 隐性病毒 8.Polymorphic virus 变异病毒9. mutation engine 变异机制 10.encryption key 加密键11. virus-creation toolkit 病毒制作工具 12.auto-executing macro 自动执行宏13. password-cracking program 密码破解程序 14.Microsoft Internet Information Server 微软网络信息系统15. Digital Immune System 数字免疫系统 16.Security measures 安全机制1. Centralized data processing system 集中式数据处理系统 2.Enterprise-wide network 企域网3. Internet service provide 网络服务提供商 4.incoming IP packet 入网IP包5. default discard policy 默认遗弃方案 6.packet-filtering level 包过滤层 7. user authentication schemes 用户认证机制 8.filtering router 过滤路由器9. Simple Mail Transfer Protocol 简易邮件传输协议 10.screened host firewall 屏蔽主机防火墙11.firewall types and configurations 防火墙类型及配置二.段落翻译P130 Unit4(4段课文:翻译)1.The expectations toward the IPTV (Internet Protocol Television) business rose particularly last year, mainly because of the gradual falling of the technical barriers . Today , IPTV is considered a business Opportunity by telco operators ,not only for the service itself , but also for the prospects it can open up in terms of integration with other services.翻译 :去年业界对IPTV(互联网协议电视)的商业预期大大提高了,主要原因是技术障碍逐渐减少了.今天,通信运营商认为IPTV是一个商业机会, 不仅在于IPTV业务本身,而且还在于IPTV与其他业务的结合可能开创的前景2.On one side,if,in the upcoming years,IPTV will succeed in imposing itself as a leading technology in the TV market,or at least gain a significant share of the TV business,telco operators could expand their roles to a new business area while supporting penetration and ARPU(Average Revenue Per Unit) increase of broadband connections.翻译:一方面,在未来的几年里如果IPTV能够成功地在电视市场上成为一个领先的技术,或者在TV业务方面至少获得一个客观的份额,电信运营商就能够在一个新的商业领域里托大它们的角色,同时支持宽带连接的业务参透与增加每单元的平均收入回报ARPU.3.On the other side,IPTV carries many big challenges for telcos;in fact,to successfully enter this market,they have to:翻译:另一方面,IPTV也给电信运营商带来很多巨大的挑战,事实上,为了成功地进入这个市场,它们必须做到:4.Services,such as network-based PVR,network-based TST,and network VOD distribution require an intense usage of network resources.It is impossible for telco operators to tailor the network architecture in order to grant to all the customers a full usage of all the services at the same time.On the other side,load peaks must be handled,in order to avoid a service falling,which could exclude all the customers from the service fruition.As a consequence it is necessary to implement a quality of service (OoS)management and service control architecture,capable, in the worst scenario,to limit the access to certain service in case of overload of the network devices or the viseo servers.翻译:基于网络的个人视频记录PVR、基于网络的具有类似录像机工能的视频播放TST、网络视频点播VOD的发送,这些业务对网络传输资源的占用量是很打的。电信运营商不可能修改网络的结构来满足所有的用户在同一时间使用所有的业务。另一方面,必须要处理负载高峰的情况,是为了避免一个业务的崩溃,这可能使所有的客户享受不到这种服务。因此必须要是是服务质量QOS的管理和业务控制体系,在最坏的情况下,要限制对某种业务的访问以免导致网络设备或视频服务器过载。P152 Unit5(4段课文:翻译)1.Problems happen! Even when he network is monitored, the equipment is reliable, and the users are careful , things may go wrong . The test of a good network administrator is the ability to analyze, troubleshoot , and correct problems .Besides the processes that are described by some veterans, there are software tools that are available for you to use to solve network connectivity problems. There tools can help in LAN troubleshooting, but are especially helpful in a WAN troubleshooting situation . There commands include the Ping, Tracert, Telnet, Netstat, ARP, and IPconfig ,which are run in command-line mode.翻译:计算机网络出了问题!尽管我们那时刻监视着整个网络,设备是可靠的,并且用户很小心,网络也会发生故障。迫于网络故障导致的公司停工的压力,一个优秀的网络管理员应具备网络数据分析、检测和解决网络故障的能力。出了某些经验丰富的老手所描述的处理步骤外,你还可以借助有效的软件工具来解决网络连接问题。这些工具可用于局域网故障检测,但在广域网的故障分析环境中更加有用处。这些指令包括Ping、Tracert、Telnet、Netstat、Arp和IPconfig,它们都运行在DOS命令行模式下。2. While there are several useful programs for analyzing connectivity,unquestionably Ping is the most commonly used program。The Ping program sends an Internet Control Message Protocol echo request packet to the destination host。 When the echo request packet is received,the remote host immediately returns an echo reply packet to the sending device 。The format of the Ping command is:翻译 虽然有几个检测网络连通性的有用程序,但是毫无疑问Ping 命令是最常用的.主机发送Ping 命令后,该程序就发送一个互联网控制信息协议ICMP的回应请求包给远端目标主机.当远端机收到此回应请求包后,他立即返回一个响应包给源主机.Ping的命令格式如下:4.Once packets leave your network, you have almost no control over the path they actually take to their destination . You may know vary little about the structure of adjacent networks. Path discovery can provide a way to discover who their ISP is, how your ISP is connected to the world ,and some other information.The Tracert command is used to visually see a network packet to get to its destination. It is based on a clever use of the Time-To-Live(TTL) field in the IP packets header. By manipulating the TTL field of the original packet, the program uses information from these ICMP massage to discover path through an.翻译:一旦数据包离开了你的网络计算机,你便几乎失去了对他们如何到达目的端的所经路径的控制。你可能对途中相邻网络的结构知之甚少。路径跟踪提供一种方法,去探知它们的互联网服务提供商ISP是谁,你的服务器提供商ISP怎样与网络连通等等信息。Tracert 指令用于可视化地观看一个网络包如何被发送和接受,一级此包到达目的端所经过的各网段的跳数。它巧妙地利用了IP包头部的生存期TTL字段。通过处理原始包中的TTL字段,从TTL=0后返回的ICMP包中的信息,就可探测此包穿过网络的各种途径。P183 Unit6(4段课文:翻译)1.A trap door is a secret entry point into a program that allows someone that is aware of the trapdoor to gain access without going through the usual security access procedures. Trap doors have been used legitimately for many years by programmer is developing an application that has an authentication procedure,or a long setup, requiring the user to enter many different values to run the application. To debug the program,the developer may wish to gain special privileges or to avoid all the necessary setup and authentication. The programmer may also want to ensure that there is a method of activating the program should something bu wrong with the authentication procedure that is being built into the application. The trap door is code that recognizes some special sequence of input or is triggered by being run from a certain user ID or by an unlikely sequence of events.翻译:陷门是程序的秘密入口点,入侵者可以绕开通常的安全控制机制而直接通过该入口访问程序。陷门并不是一种新技术,事实上很多年以前程序设计人员一直使用该技术来调试或维护自己开发的程序。当程序开发者在开发了一个包含认证机制、或者要用户输入很多不同的口令才可以进入和运行程序的时候,为了避开这些繁琐的认证机制以便于软件开发和调试的顺利进行,程序设计者通常会设置这样的陷门。计算机系统陷门的打开通常是用识别特定输入序列的代码段,或由某一特定用户ID或者特定的时间序列进行激活。2.One of the oldest types of program threat, predating viruses and worms, is the logic bomb. The logic bomb is code embedded in some legitimate program that is set to explode when certain conditions are met.Example of conditions that can be used as triggers for a logic bomb are the presence or absence of certain files, a particular day of the week or date, or a particular user running the application . Once triggered, a bomb may alter or delete data or entire files ,cause a machine halt , or do some other damage. A striking example of how logic bombs can be employed was the case of Tim Lloyd , who was convicted of setting a logic bomb that cost his employer , Omega Engineering, more than $10 million , derailed its corporate growth strategy , and eventually led to the layoff of 80 workers . Ultimately, Lloyd was sentenced to 41 months in prison and ordered to pay $2 million in restitution. 翻译 逻辑炸弹是出现最早的程序威胁类型之一,在病毒和蠕虫出现之前就有了. 逻辑炸弹实际上是嵌在合法程序中的代码段,在某些条件满足的时候该炸弹将引爆.这些引爆逻辑炸弹的条件可能包括特定文件的出现或者消失、星期中的一个特定日子、或者某特定的用户运行了一个程序等。一旦引爆,逻辑炸弹将修改、删除数据和文件,使系统停机或者带来一些其他危害。一个著名的逻辑炸弹的例子是美国的Tim Lloyd的案例 ,他倍指控在自己工作的Omega Engineering公司的网络中设置了逻辑炸弹,造成了超过一千万美元的经济损失。打乱了公司的发展计划,并导致80个工作人员事业。Lloyd被判41个月监禁,并罚款两百万美元。P213214 Unit7(前3段选词填空,后3段填空)1.All traffic from inside to outside must pass through the firewall,and vice versa(反之亦然),must pass through the firewall.This is achieved by physically blocking all access to the local network except via the firewall Various configurations are possible.2.Only authorized traffic,as defined by the local security policy(本地安全策略),will be allowed to pass.Various types of firewalls are used,which implement various types of security policies.3.The firewall itself is immune to penetration(免疫穿透). This implies that use of a trusted system(a computer and operating system that can be verified to implement a given security policy) with a secure operating system.4.A firewall defines a single choke point that keeps unauthorized users of the protected network,prohibits potentially vulnerable services from entering or leaving the network,and provides protection from various kinds of IP spoofing (欺骗)and routing attacks.The use of a single choke point simplifies security management because security capabilities are consolidated on a single system or set of systems.5.The firewall cannot protect against attacks that bypass the firewall,Internal systems may have dial-out(拨号打出) capability to connect to an ISP.An internal LAN may support a modem poll(调制解调器电池)that provides dial-in(拨号打入)capability for traveling employees and telecommuters.6.The firewall cannot protect against the transfer of virus-infected(受病毒感染的) programs or files.Because of the variety operating systems and applications supported inside the perimeter,it would be impractical and perhaps impossible for the firewall to scan all incoming files,e-mail,and messages for viruses.句子翻译(这个不知道是不是)1.In order to enter the IPTV offer business ,a telco has to merge its competencies in broadband services with specific expertise in the media industry 。翻译 为了进入IPTV商务领域 ,一个电信运营商必须将它的宽带服务的能力与媒体产业的专门技术融合 2.The expectations toward the IPTV (Internet Protocol Television) business rose particularly last year,mainly because of the gradual falling of the technical barriers . Today , IPTV is considered a business Opportunity by telco operators ,not only for the service itself , but also for the prospects it can open up in terms of integration with other services.翻译 去年业界对IPTV(互联网协议电视)的商业预期大大提高了,主要原因是技术障碍逐渐减少了.今天,通信运营商认为IPTV是一个商业机会, 不仅在于IPTV业务本身,而且还在于IPTV与其他业务的结合可能开创的前景3. These are the tools that will allow a network administrator or ordinary users to remotely monitor and control the network。 As the old saying goes everything has two sides,you must utilize them on the legality ways, not the hackers guilty way!翻译 以上这些工具都允许网络管理员或普通用户远程监视和控制网络。就像古谚所说的事事皆两面,你必须把这些工具用于合法目的,而不能用于电脑黑客的犯罪行为!4. Consistency among repeated queries gives an indication of the quality of the connection .Thus ,ping answers two basic question 。Do I have a connection? How good is that connection? 翻译 多次重复发送 PING 后收到的多个回应往返时间之间的一致性,标明了网络连接的质量.因此PING 解答了两个基本问题: 此网络设备联通了吗? 联通质量如何?5. These are the tools that will allow a network administra

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论