【精品】计算机专业英语_第1页
【精品】计算机专业英语_第2页
【精品】计算机专业英语_第3页
【精品】计算机专业英语_第4页
【精品】计算机专业英语_第5页
已阅读5页,还剩7页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、special termsvacuum tubestransistoric(integrated circuit)lsi/vlsi (large scale intcgi*ation/vcr large scale integration) eniac (electronic numerical integrator and computer) edsac (electronic delay storage automatic computer) binac (binary automatic computer)univac(universal automatic computer)super

2、computermainframemedium-sized computerminicomputermicrocomputeribmdec(digital equipment corporation)cobol(common business oriented language)hp(hewlett packard)multiprogrammingvirtual memorykilo bytemega bytegigabyteterabytepetabyteflopsmicroprocessorbandwidtharchitecture?cpu(central processing unit)

3、memory subsystemi/o subsystemembedded controllerbusaddress busdata buscontrol busi/o deviceinstruction cycleinstruction codesystem clocksynchronizeclock cycledecodeencodebidirectionunidirectionmicroprocessorportmaphierarchyregistertemporaty storage registerprogram counterflag registeroperandinstruct

4、ion set architecturealu(arithmetic logic unit)instruction pipelineromramhigh-order interleavinglow-order interleavingintegerfloating point numbercharacter stringbuffercache memorytri-statedbig endianlittle endianthe most significant bytedimensionrisc(reduced instruction set computer) cisc(complex in

5、struction set computer) interface circuitryinterruptdma(direct memory access)3.digitweightpowerdecimalhexadecimaloctalbinarywhole number partfraction partnumeratordenominatorbch(binary coded hexadecimal)radi xcomplementnegative dataradix complementradix-1 complementsetsubsetempty setuniversal setfin

6、ite setinfinite setunio nintersectioncomplementationnegationadditionmultiplicationxnboolean algebraset algebra4.data structurelinked liststackqueuebinary treehash tableheapgraphcontext-freeefficiencyabstractionreusabilitythe top of the stackthe base of the stackpushpopbacktrackinglifo(last in first

7、outstack pointerthe head(front) of the queue the tail(rear) of the queue head(front) pointer tail(rear) pointercircular queue5.resource allocationuser interfacepartitioning of resources allocation from a poolresource tableresource preemption sequential sharingconcurrent sharingcpu schedulingmemory m

8、anagementprocess management programjobprocesscompilelinkercompilerscripttime sharingreal time osos kernelinterruptos microkernelexceptional situation portabilityextensibilityreliabilitymonolithic6.software engineeringsoftware life cycleeffort versus leverage analysisdesignimplementationtestingobject

9、-orientedwaterfall modelincremental modelprototypeevolutionary prototypingthrowaway prototypingrapid prototypingcase(computcr aided software engineering)passwordspecificationencryptdecryptparadigmmodular designentityupdatedebuggingspreadsheetgui(graphical user interfaces)top-down methodologybottom-u

10、p methodologyoff-the shelfdesign patternframework7.machine languageassembly languagehigh-level languageassemblerinterpretercompilersoftware crisisobjectclassoopinheritanceencapsulationpolymorphismpseudocoderesistoruml(unified modeling language)&internetinternetworkworld wide webweb pagehyperlink

11、htmltcp/ippacker switchingcircuit switchingrouterrouting algorithmprotocolip addressipv4ipv6domain nameurl(uniform resource locator)client/server computingdnshttpsmtppopimapftpssltelnetpingtrace rtethernettoken ring networkhost computerbackboneisp(internet service provider)redundancymetropolitan are

12、a networklocal area networkwide area networkcampus networkbroadbanddsl(digital subscriber line)cable modemintranetextranetmiddlewaredial-upietf(inlcitict engineering task force)9.hypertextdirectory pathanimationaudiovideoxml(extensible markup language)browserweb server softwaredata capturesearch eng

13、inepda(personal digital assistant)attachment 附件uploaddownloadstreaming mediainstant messagingvideo clipcookiemsn (microsoft network)10.computer security 计算机安全interruption 中断interception 截取modification 篡改fabrication 伪造cryptography 密码学data encryption 数据加密plaintext 明文cyphertext 密文public key 公钥secret ke

14、y 私钥electric signature 电子签名data integrity数据完整性hacker黑客des (data encryption system)数据加密系统dce (distributed computing environment)分彳j式计算环境smart card智能卡firewall防火墙icmp (internet control message protocol)网际控制报文协议virus病毒11.object-oriented database血向对彖的数据库relational database 关系数据库plat database非结构化的数据库backu

15、p and recovery 备份和恢复dbms (database management system)数据库管理系统12.multimedia 多媒体dvd (digital video disc)数字化视频光盘cd-rom (compact disc-read only memory)压缩光盘只读存储器midi (musical instrument digital interface)乐器数字接口13.crt (cathode-raytube)阴极射线管pixel像素bitmap位图video monitor视频监视器frame buffer帧缓冲器resolution 分辨率vect

16、or矢量plotter绘图仪key frame关键帧storyboard 剧本scene场呆14.vr (virtual reality)虚拟现实cfd (computational fluid dynamics)计算流体力学api (application programmer interface)应用程序接口1. describe the characteristics of each generation computers. first-generation computers were characterized by the use of vacuum tubes as their

17、 principal electronic component. vacuum tubes are bulky and produce a lot of heat, so first-generation computers were large and required extensive air conditioning to keep them cool. in addition, because vacuum tubes do not operate very fast, these computers were relatively slow. in the second gener

18、ation of computers, transistors replaced vacuum tubes transistors arc smaller and less expensive than vacuum tubes, and they operate faster and produce less heat. hence, with second-generation computers, the size and cost of computers decreased, their speed increased, and their air-conditioning need

19、s were reduced. the technical development that marks the third generation of computers is the use of integrated circuits or ics in computers. one ic replaces many transistors in a computer; result in a continuation of the trends begun in the second generation. these trends include reduced size, redu

20、ced cost, increased speed, and reduced need for air conditioning the fourth generation is characterized by more and more transistors being contained on a silicon chip. first there was large scale integration (lsi), with hundreds and thousands of transistors per chip, then came very large scale integ

21、ration (vlsi), with tens of thousands and hundreds of thousands of transistors the trend continues today: the size and cost of computers decreased, their speed increased, and their air-conditioning needs were reduced2. how are numbers converted from a number base to decimal? numbers areconverted fro

22、m any number base to decimal by noting the weights of each position the weight of the position to the left of the radix point is always the units position in any number system. and it has a weight of radix. the weight of the position to the left of the units position is always the radix1, and so for

23、th. the weight of the position to the right of the radix point is always radix1. the weight of the next position is always the radix二 and so forth the value of each position is the number of this position times its weight. sum the value of each position to form the equivalent decimal.2 describe how

24、to pop an entry on and pop an entry from a linear stack. to push a new entry on the stack, we first adjust the stack pointer to point to the vacancy just beyond the top of the stack and then place the new entry at this location. to pop an entry from the stack, we read the data pointed to by the stac

25、k pointer and then adjust the pointer to point to the next entry down on the stack3. describe the procedure of processing an instruction cycle.the instruction cycle is the microprocessor goes through to process an instruction.a) first the microprocessor fetches, or reads, the instruction from memory

26、.b) then it decodes the instruction, determining which instruction it has fetchedc) finally, it performs the operations necessary to execute the instruction. (some people also include an additional element in the instruction cycle to store results. here, we include that operation as part of the exec

27、ute function.)each of these functionsfetch, decode, and execute-consists of a sequence of one or more operations.4. describe the difference between rom and ram.d) there are two types of memory chips: read only memory(rom) and random access memory(ram).c)data in the rom is only read; data in the ram

28、can be read and writtenf) data and program are stored in the rom beforehand; in the ram data andprogramareloaded randomly.g) data in the rom can not be changed; data in the ram can be changedh) if the power for the rom is turned off, data won't lose; data in the ramwill lose ifthe power for it i

29、s turned off.5. describe the difference between the program and the process. a program is the classical view of a computation. it consists of a set of program units, including program units obtained from libraries, which constitute an object code to be executed a process is an execution of a program

30、 or of a part of a program the program is static and the process is dynamic. the program is stored on the external memory and the process is running in memory. each program can generate one or more processes6. what is the software life cycle? which phase is the most important,and why? (6 points)a) t

31、he software life cycle is shown in the following figure. this figure represents the fact that once software is developed, it enters a cycle of being used and modified that continues for the rest of the softwares life.(2) the development phase is the most important. most of the research in software e

32、ngineering focuses on the development stage of the software life cycle because of the effortersus-benefit leverage experience has shown that a little effort during the development of software can make a tremendous difference when modifications in the software are required.7. summarize each of the fo

33、ur stages within the development phase ofthe software life cycle. the analysis phase concentrates on what the proposed system must accomplish the design phase concentrates on how the system accomplishes its goals. the implementation phase concentrates on the actual construction of the system the tes

34、ting phase concentrates on making sure that the system does what it is intended to do.& what are the problems of software crisis? what are the basicproperties of object-oriented programming? software becomes increasingly expensive, is of insufficient quality, is hare to estimate and schedule, an

35、d is almost impossible to maintain inheritance, encapsulation and polymorphism.9. relate the key technology concepts of the internet there are three extremely important concepts that are the basis for understanding the internet: packet switching, the tcp/ip communications protocol, and client/server

36、 computing3. packet switching is a method of slicing digital messages into parcels called "packets," sending the packets along different communication paths as they become available, and then reassembling the packets once they arrive at their destination tcp/ip answered the problem of what to do with packets on the internet and how to handle them. tcp establishes the connections among sending and receiving web computers, ha

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论