英文翻译范例

英文翻译范例
英文翻译范例

毕业设计(论文)英文翻译

课题名称

系 部

专 业

班 级

学 号

姓 名

指导教师 校内:

校外:

2012年4月5日

原文:

CHARACTERISTICS OF COMPUTER INTRUSION AND KINDS OF SECURITY BREACHES CHARACTERISTICS OF COMPUTER INTRUSION AND KINDS OF SECURITY BREACHES 1.CHARACTERISTICS OF COMPUTER INTRUSION

The target of a crime involving computers may be any piece of the computing system.A computing system is a collection of hardware,software,storage media,data,and persons that an organization uses to do computing tasks.Whereas the obvious target of a bank robbery is cash,a list of names and addresses of depositors might be valuable to a competing bank.The list might be on paper,recorded on a magnetic medium,stored in internal computer memory,or transmitted electronically across a medium such as a telephone line.This multiplicity of targets makes computer security difficult.In any security system,the weakest point is the most serious vulnerability.A robber intent on stealing something from your house will not attempt to penetrate a two-inch thick metal door if a window gives easier access.A sophisticated perimeter physical security system does not compensate for unguarded access by means of a simple telephone line and a modem.The “weakest point” philosophy can be restated as the following principle.

Principle of Easiest Penetration.An intruder must be expected to use any available means of penetration.This will not necessarily be the most obvious means,nor will it necessarily be the one against which the most solid defense has been installed[1].This principle says that computer security specialists must consider all possible means of penetration,because strengthening one may just make another means more appealing to intruders[2].We now consider what these means of penetration are.2.KINDS OF SECURITY BREACHES

In security,an exposure is a form of possible loss or harm in a computing system;examples of exposures are unauthorized disclosure of data,modification of data,or denial of legitimate access to computing.A vulnerability is a weakness in the security system that might be exploited to cause loss or harm.A human who exploits a vulnerability perpetrates an attack on the system.Threats to computing systems are circumstances that have the potential to cause loss or harm;human attacks are examples of threats,as are natural disasters,inadvertent human errors,and internal hardware or software flaws[3].Finally,a control is a protective measure—an action,a device,a procedure,or a technique—that reduces a vulnerability.

The major assets of computing systems are hardware,software,and data.There are four kinds of threats to the security of a computing system:interruption,interception,

modification,and fabrication.The four threats all exploit vulnerabilities of the assets in computing systems.These four threats are shown in Fig.

(1)In an interruption,an asset of the system becomes lost or unavailable or unusable.An example is malicious destruction of a hardware device,erasure of a program or data file,or failure of on operating system file manager so that it cannot find a particular disk file.

(2)An interception means that some unauthorized party has gained access to an asset.The outside party can be a person,a program,or a computing system.Examples of this type of failure are illicit copying of program or data files,or wiretapping to obtain data in a network.While a loss may be discovered fairly quickly,a silent interceptor may leave no traces by which the interception can be readily detected[4].

(3)If an unauthorized party not only accesses but tampers with an asset,the failure becomes a modification.For example,someone might modify the values in a database,alter a program so that it performs an additional computation,or modify data being transmitted electronically.It is even possible for hardware to be modified.Some cases of modification can be detected with simple measures,while other more subtle changes may be almost impossible to detect.

(4)Finally,an unauthorized party might fabricate counterfeit objects for a computing

system.The intruder may wish to add spurious transactions to a network communication system,or add records to an existing data base.Sometimes these additions can be detected as forgeries,but if skillfully done,they are virtually indistinguishable from the real thing.

These four classes of interference with computer activity—interruption,interception,modification,and fabrication—can describe the kinds of exposures possible.

METHODS OF DEFENSE

Computer crime is certain to continue.The goal of computer security is to institute controls that preserve secrecy,integrity,and availability.Sometimes these controls are able to prevent attacks;other less powerful methods can only detect a breach as or after it occurs.

In this section we will survey the controls that attempt to prevent exploitation of the vulnerabilities of computing systems.

Encryption

The most powerful tool in providing computer security is coding.By transforming data so that it is unintelligible to the outside observer,the value of an interception and the possibility of a modification or a fabrication are almost nullified.

Encryption provides secrecy for data.Additionally,encryption can be used to achieve integrity,since data that cannot be read generally also cannot be changed.Furthermore,encryption is important in protocols,which are agreed-upon sequences of actions to accomplish some task.Some protocols ensure availability of resources.Thus,encryption is at the heart of methods for ensuring all three goals of computer security.

Encryption is an important tool in computer security,but one should not overrate its importance.Users must understand that encryption does not solve all computer security problems.Furthermore,if encryption is not used properly,it can have no effect on security or can,in fact,degrade the performance of the entire system.Thus,it is important to know the situations in which encryption is useful and to use it effectively.Software Controls

Programs themselves are the second link in computer security.Programs must be secure enough to exclude outside attack.They must also be developed and maintained so that one can be confident of the dependability of the programs.

Program controls include the following kinds of things:

? Development controls,which are standards under which a program is designed,coded,tested,and maintained

? Operating system controls,which are limitations enforced by the operating system to protect each user from all other users

? Internal program controls that enforce security restrictions,such as access limitations in a database management program

Software controls may use tools such as hardware components,encryption,or information gathering.Software controls generally affect users directly,and so they are often the first aspects of computer security that come to mind.Because they influence the way users interact with a computing system,software controls must be carefully designed.Ease of use and potency are often competing goals in the design of software controls.

3.Hardware Controls

Numerous hardware devices have been invented to assist in computer security.These devices range from hardware implementations of encryption to locks limiting access to theft protection to devices to verify users’ identities.

1)Policies

Some controls on computing systems are achieved through added hardware or software features,as described above.Other controls are matters of policy.In fact,some of the simplest controls,such as frequent changes of passwords,can be achieved at

essentially no cost but with tremendous effect.

Legal and ethical controls are an important part of computer security.The law is slow to evolve,and the technology involving computers has emerged suddenly.Although legal protection is necessary and desirable,it is not as dependable in this area as it would be in more well-understood and long-standing crimes[1].

The area of computer ethics is likewise unclear,not that computer people are unethical,but rather that society in general and the computing community in particular have not adopted formal standards of ethical behavior.Some organizations are attempting to devise codes of ethics for computer professionals.Although these are important,before codes of ethics become widely accepted and therefore effective,the computing community and the general public need to understand what kinds of behavior are inappropriate and why.

2)Physical Controls

Some of the easiest,most effective,and least expensive controls are physical controls.Physical controls include locks on doors,guards at entry points,backup copies of important software and data,and physical site planning that reduces the risk of natural disasters.Often the simple physical controls are overlooked while more sophisticated approaches are sought.

3)Effectiveness of Controls

Merely having controls does no good unless they are used properly.The next section contains a survey of some factors that affect the effectiveness of controls.

◆Awareness of Problem

People using controls must be convinced of the need for security;people will willingly cooperate with security requirements only if they understand why security is appropriate in each specific situation.Many users,however,are unaware of the need for security,especially in situations in which a group has recently undertaken a computing task that was previously performed by a central computing department[2].

◆Likelihood of Use

Of course,no control is effective unless it is used.The lock on a computer room door does no good if people block the door open.During World War II code clerks used outdated codes because then had already learned them and could encode messages rapidly.Unfortunately,the opposite side had already broken some of those codes and could decode those messages easily.

Principle of Effectiveness.Controls must be used to be effective.They must be efficient,easy to use,and appropriate.

This principle implies that computer security controls must be efficient enough,in

terms of time,memory space,human activity,or other resources used,so that using the control does not seriously affect the task being protected.Controls should be selective so that they do not exclude legitimate accesses.

4)Overlapping Controls

Several different controls may apply to one exposure.For example,security for a microcomputer application may be provided by a combination of controls on program access to the data,on physical access to the microcomputer and storage media,and even by file locking to control access to the processing programs[3].

5)Periodic Review

Few controls are permanently effective.Just when the security specialist finds a way to secure assets against certain kinds of attacks,the opposition doubles its efforts in an effort to defeat the security mechanism.Thus,judging the effectiveness of a control is an ongoing task.

译文:

入侵计算机的特点和破坏安全的类型

1.入侵计算机的特点

对计算机犯罪的目标可以是计算机系统的任何部分。计算机系统是指硬件、软件、存储媒体、数据和部门中用计算机去完成计算任务的人的集合。银行抢劫的目标显然是现金,而储户姓名和地址清单对竞争的银行来说是很有价值的。这种清单可以是书面上的、记录在磁介质上的、存储在内存中的或通过像电话线那样的媒体以电子方式传送的。这么多的目标使得处理计算机安全问题很困难。

任何安全系统,最薄弱点是最致命的。一个强盗要偷你房间中的东西,如果破窗而入更容易,他绝不会穿过两英寸厚的铁门。很高级的全范围实物安全系统并不能防范通过电话线和调制解调器这种简单的无设防接入。最“薄弱点”法则可用下述原理描述。

最容易渗入原理。入侵者必定要使用一种可以渗入的方法,这种方法既不一定是最常用的,也不一定是针对已经采取了最可靠防范措施的。

这一原理说明计算机安全专家必须考虑所有可能的攻击方法。也许正是由于你加强了某一方面,入侵者可能会想出另外的对付方法。我们现在就说明这些渗入的方法是什么。

2.破坏安全的类型

在计算机系统中,暴露是一种使计算机系统安全丧失或受到伤害的一种形式;暴露的例子有非授权的数据泄露、数据修改或拒绝合法访问计算机。脆弱性是安全系统中的薄弱环节,它可能引起安全的丧失或伤害。有人会利用脆弱性对系统进行罪恶的攻击。潜在的引起安全丧失或伤害的环境是对计算机系统的威胁;人类的攻击像自然灾害一样是一场灾难,人们非故意错误和硬件或软件缺陷一样是威胁的例子。最后,控制是一种保护性措施(控制可以是一种动作、一个设备、一个过程或一种技术),控制的目的是减少脆弱性。

计算机系统的主要资源是硬件、软件和数据。有4种对计算机安全的威胁:中断、截获、修改和伪造。这4种威胁都利用了计算机系统资源的脆弱性。

(1)在中断情况下,系统资源开始丢失,不可用或不能用。例如,恶意破坏硬件设备,抹除程序或数据文件或造成操作系统的文件管理程序失效,以致不能找到某一磁盘文件。

(2)截获是指某非授权用户掌握了资源访问权。外界用户可以是一个人、一个程序或一个计算机系统。这种威胁的例子如程序或数据文件的非法复制,或私自搭线入网去获取数据。数据丢失可能会很快被发现,但暗中的截获者很可能并不留下任何容易检测的痕迹。

(3)如果非授权用户不仅可以访问而且可以篡改资源,则失效就成为修改了。例如,某人可以修改数据库中的值,更改一个程序、以便完成另外的计算,或修改

正在传送的数据、甚至还可能修改硬件。某些情况下可以用简单的测量手段检测出所做的修改,但某些微妙的修改是不可能检测出来的。

(4)最后,非授权用户可以伪造计算机系统的一些对象。入侵者企图向网络通信系统加入假的事务处理业务,或向现有的数据库加入记录。有时,这些添加的数据可以作为伪造品检测出来,但如果做得很巧妙,这些数据实际上无法与真正的数据分开。

这4种对计算机工作的干扰(中断、截获、修改或伪造)表明了可能出现的几种威胁类型。

防范方法

计算机犯罪肯定还会继续发生。计算机安全防范的目的是对系统进行控制,以保证系统的安全性、完整性和可用性。有时这些控制措施可以防止攻击;另外一些不太有效的方法就只能在事件出现以后将之检测出来。

本节将看到防止计算机系统脆弱性为人所利用的控制方法。

1.加密

保证计算机安全的最有效的工具是编码。将数据进行变换,使外界看起来都是无规律的,这样截获的数据就无用、修改或伪造的可能性都将化为乌有。

加密用于数据保密。加密的数据一般不能读出,也不能更改,因而能保证数据的完整性。另外,加密在协议中也是重要的,因为协议是为完成某项任务而制定的

一系列规定。某些协议保证了资源的可用性。因而加密是为达到3个计算机安全目标所使用的各种方法的核心。

加密是计算机安全的重要工具,但有时也不能对它估计过高。用户应该知道加密并不能解决计算机所有的安全问题,甚至于如果加密使用不当,不但对安全没有作用,还会降低整个系统的性能。因而了解在什么情况下加密有用和有效是很重要的。

2.软件控制

程序本身是计算机安全中的第二个环节,程序必须足够安全以抵御外界攻击。程序的开发和维护必须能保证程序的可信度。

程序控制包括以下几种。

程序设计、编码、测试和维护的标准化行为;

操作系统控制,限制由操作系统强制实施,以防止其他用户对某一用户的干扰;

内部程序控制,强调安全限制,如对数据库管理程序的访问限制。

软件控制要使用如硬件部件、加密或信息采集等工具。一般来讲,软件控制会直接影响用户,因而是计算机安全中首先要考虑的。因为软件控制直接影响了用户与计算机系统交互的方法,故必须认真设计。在进行软件控制设计时,容易使用和效能通常是相互矛盾的两个目标。

3.硬件控制

人们已经研制成了有助于计算机安全的大量硬设备,这些设备包括加密算法的硬件实现、防盗窃的限制访问加锁、验证用户身份的设备。

1)策略

对计算机系统的控制,有些是通过前面所叙述的增加硬件或软件功能来实现的,有些控制可以靠策略来解决。事实上.某些最简单的控制,如频繁更换口令,可以基本上不花钱而得到意想不到的效果。

法律和伦理控制是计算机安全的重要部分。法律的变化是很慢的,而包括计算机在内的技术发展是很快的。尽管需要法律保护,也希望有法律保护,但在这一领域里的法律保护并不像在其他易于理解而又典型的案例中那样可信。

计算机在伦理上同样是不清晰的。这并不是说计算机人员不讲伦理,而是一般说来,社会和实际的计算机界并不承认通常的道德行为标准。某些部门正试图发明用于计算机行业的伦理代码。虽然这些是很重要的,但在伦理代码被广泛接受和有效使用之前,计算机界和公共社会需要了解哪些行为是不适合的以及为什么。

2)实际控制

某些实际控制方法是最容易、最有效和最省钱的。实际控制包括加门锁、在入口处设警卫、重要软件和数据的后备复制以及为减少自然灾害风险所进行的场地设计。在寻求更先进的方法时,人们往往会忽略最简单的控制方法。

3)控制的效用

除非使用得当,否则有些控制并不很有效。下面介绍影响控制效用的一些因素。

认识问题。

使用这些控制方法的人必须认识安全的必要性;人们只有懂得为什么在各种场合下都要考虑安全性时,他们才会按照安全的要求去做。然而,有很多用户没有认识到安全的重要性,特别是在某一部门现承担的计算任务以前都是由计算中心完成的情况下更是如此。

使用的可能性。

当然,控制如果不使用是没有效果的。将计算机房门锁上并不是好办法,因为人们可以把门打开。第二次世界大战期间,编码员使用过时的代码,是由于他们已经学会了使用它们并且能很快地用之对电文编码。不幸的是敌方已经破译了某些代码并且能很容易地译出那些电文。

有效性原理。

必须使用有效、高效的,容易使用而且恰如其分的控制。

这一原理表明,在时间、存储空间、人的活动或其他所用的资源方面,控制计算机的安全必须足够高效,以使得使用控制手段时对所保护的工作影响并不严重。控制方法应该是有选择的,这样可以不排斥合法的计算机访问。

4.重叠控制

几种不同的控制方法可以共同应用到一个方向。例如,微机应用程序的安全可

由对程序访问数据的控制和对计算机和存储媒体的实际访问控制的组合来提供,甚至由对处理程序的控制访问文件加锁来提供,这种状况如图18-3所示。

5.定期评审

控制方法很少是永久有效的。当安全专家刚刚找到了一种抵御某些攻击的方法时,对方又变本加厉地试图挫败这种安全机制。因此,判断一种控制的有效性是一个应持续进行的工作。

2.英文翻译格式和要求

英文 小四号字,单倍行距,首行缩进2个字符,不能定义文档网格。约3千英文单词。 MCU Description SCM is also known as micro-controller (Microcontroller Unit), commonly used letters of the acronym MCU MCU that it was first used in industrial control. Only a single chip by the CPU chip developed from a dedicated processor. The first design is by a large number of peripherals and CPU on a chip in the computer system, smaller, more easily integrated into a complex and demanding on the volume control device which. INTEL's Z80 is the first designed in accordance with this idea processor, then on the development of microcontroller and dedicated processors have parted ways. 一、SCM history SCM was born in the late 20th century, 70, experienced SCM, MCU, SoC three stages. SCM the single chip microcomputer (Single Chip Microcomputer) stage, mainly seeking the best of the best single form of embedded systems architecture. "Innovation model" success, laying the SCM and general computer completely different path of development. In the open road of independent development of embedded systems, Intel Corporation contributed. MCU the micro-controller (Micro Controller Unit) stage, the main direction of technology development: expanding to meet the embedded applications, the target system requirements for the various peripheral circuits and interface circuits, highlight the object of intelligent control.It involves the areas associated with the object system, therefore,the development of MCU's responsibility inevitably falls on electrical, electronics manufacturers. From this point of view, Intel faded MCU development has its objective factors. In the development of MCU, the most famous manufacturers as the number of Philips Corporation. Philips company in embedded applications, its great advantage, the MCS-51 single-chip micro-computer from the rapid development of the micro-controller. Therefore, when we look back at the path of development of embedded systems, do not forget Intel and Philips in History. 二、Embedded Systems Embedded system microcontroller is an independent development path, the MCU important factor in the development stage, is seeking applications to maximize the solution on the chip; Therefore, the development of dedicated single chip SoC trend of the natural form. As the microelectronics, IC design, EDA tools development, application system based on MCU SoC design have greater development. Therefore, the understanding of the microcontroller chip microcomputer can be, extended to the single-chip micro-controller applications. 三、MCU applications SCM now permeate all areas of our lives, which is almost difficult to find traces of the field without SCM. Missile navigation equipment, aircraft, all types of instrument control, computer network communications and data transmission, industrial automation, real-time process control and data processing, extensive use of various smart IC card, civilian luxury car security system, video recorder, camera, fully automatic washing machine control, and program-controlled toys, electronic pet, etc., which are inseparable from the microcontroller. Not to mention the area of robot control, intelligent instruments, medical equipment was. Therefore, the MCU learning, development and application of the large number of computer applications and

英语四级翻译真题和范文答案解析

2013年12月大学英语四级考试翻译题目 许多人喜欢中餐,在中国,烹饪不仅被视为一种技能,而且也被视为一种艺术。精心准备的中餐既可口又好看,烹饪技艺和配料在中国各地差别很大。但好的烹饪都有一个共同点,总是要考虑到颜色、味道、口感和营养(nutrition)。由于食物对健康至关重要,好的厨师总是努力在谷物、肉类和蔬菜之间取得平衡,所以中餐既味美又健康。 Most people like Chinese food. In China, cooking is considered as not only a skill bu t also an art. The well-prepared Chinese food is both delicious and good-looking. Alth ough cooking methods and food ingredient vary wildly in different places of China, it is common for good cuisine to take color, flavor, taste and nutrition into account. Sinc e food is crucial to health, a good chef is insistently trying to seek balance between ce real, meat and vegetable, and accordingly Chinese food is delicious as well as healthy. 信息技术(Information Technology),正在飞速发展,中国公民也越来越重视信息技术,有些学校甚至将信息技术作为必修课程,对这一现象大家持不同观点。一部分人认为这是没有必要的,学生就应该学习传统的课程。另一部分人认为这是应该的,中国就应该与时俱进。不管怎样,信息技术引起广大人民的重视是一件好事。 As China citizens attaching great importance to the rapidly development of Informati on Technology, some college even set it as a compulsory course. Regarding to this ph enomenon, people holding different views. Some people think it is not necessary, for s tudents should learn the traditional curriculum. Another part of people think it is a nee d, because China should keep pace with the times. Anyway, it is a good thing that Inf ormation Technology aroused public concern. "你要茶还是咖啡?"是用餐人常被问到的问题,许多西方人会选咖啡,而中国人则会选茶,相传,中国的一位帝王于五千年前发现了茶,并用来治病,在明清(the qing dynasties)期间,茶馆遍布全国,饮茶在六世纪传到日本,但直到18世纪才传到欧美,如今,茶是世界上最流行的饮料(beverage)之一,茶是中国的瑰宝。也是中国传统和文化的重要组成部分。 "Would you like tea or coffee?" That’s a question people often asked when having meal. Most westerners will choose coff ee, while the Chinese would like to choose tea. According to legend, tea was discove red by a Chinese emperor five thousand years ago, and then was used to cure disease . During the Ming and Qing dynasties, tea houses were all over the country. Tea drin king spread to Japan in the 6th century, but it was not until the 18th century does it s pread to Europe and America. Nowadays, tea is one of the most popular beverage in the world, and it is not only the treasure of China but also an important part of Chine se tradition and culture. 中国结最初是由手工艺人发明的,经过数百年不断的改进,已经成为一种优雅多彩的艺术和工艺。在古代,人们用它来记录事件,但现在主要是用于装饰的目的。“结”在中文里意味着爱情,婚姻和团聚,中国结常常作为礼物交换或

3英文文献及翻译格式示例

哈尔滨工业大学毕业设计(论文) 英文原文(原文也可以直接将PDF版打印) ASSESSING CREDIT OR DETERMINING QUANTITY? THE EVOLVING ROLE OF RATING AGENCIES Lynnette D. Purda* This version: April 21, 2011 Abstract Over the past ten years, credit rating agencies have come under intense criticism from both practitioners and academics, first for their failure to identify problems resulting in bankruptcies at Enron and Worldcom and second for providing overly optimistic ratings for structured finance products. While many investors question the value of rating agencies in light of these criticisms, they have proven remarkably resilient. This paper provides a brief background on how rating agencies secured competitive advantages in evaluating credit quality. It then reviews the empirical evidence on the information content of ratings given these advantages. I argue that the information content of ratings stems from two intertwined sources: 1) information related to credit quality and 2) information related to the firm’s ability to access debt. Based on this evidence, I suggest that the dominant role for ratings today is as a benchmark for financial contracting. In this way, ratings remain influential in establishing the supply and demand of debt securities. 译文 评级机构的发展的作用评估信用还是决定数量? 本文:2011.4.21 摘要 在过去的十年,信用评级机构一直处于来自实践者和学者的激烈的批评中,首先他们未能发现问题,导致安然和世通破产;其次对结构性金融产品提供过于乐观的评级。虽然许多投资者因为这些批评对评级机构的价值提出了质疑,但他们仍然被证明是相当有活力的。这篇文章首先在评估机构如何在信用评级质量中获得竞争优势提供一个简单地背景介绍,然后考虑到这些优势回顾了一些信息内容方面的评级经验证据。个人认为信息内容的评级来自两种交织在一起(错综复杂)的来源:1)和信贷质量相关的信息;2)和公司获取债务资本能力相关的信息。以此为据,我建议当前评级的主导作用是作为基准的金融收缩。以这种方式,在建立债券的供应和需求方面评级仍然是有效的。 - -1

航海英语2580题库中英文对照学习完整翻译版

大连海事大学英语2580题库中英文对照学习完整版 [1]______, as the chemical extinguisher agent, should be used for an electric fire. A. dry chemical or foam B. foam or soda acid C. carbon dioxide or foam D. carbon dioxide or dry chemical KEY: D二氧化碳或干粉灭火器作为化学灭火器,用于扑灭电器火灾。 [2]______: A room on or near the bridge provided with the necessary fittings and furniture for the handling and stowage of charts and where the chronometers are placed. A. Captain’s cabin B. Chief Officer’s locker C. Chartroom D. Pilot’s cabin KEY: C在驾驶台或附近提供必要的装卸设备或用具和海图的存放和天文钟布置的房间叫做海图室。 [3]______:The main center-line structural member, running fore and aft along the bottom of a ship, sometimes referred to as the backbone. A. Frame B. Deckbeam C. Stringer D. Keel KEY: D在船舶底部沿首尾向铺设有时提及当做主骨架的主要首尾结构是龙骨。 [4]______:the vertical distance measured on the vessel’s side amidships from the load water line to the upper side of the freeboard deck or a point corresponding to it. A. Buoyancy B. Freeboard C. Draft D. Displacement KEY: B船中部从载重水线垂直测量到干舷甲板上边缘或相应的点的距离叫干舷。 [5]______20 targets can be tracked at one time. When maximum tracking capacity is reached, no further acquisitions are possible. A. As many as B. So many as C. As much as D. As more as KEY: A一次可以获取多达20个物标,当跟踪能力达到最大时候,就不再录取了。 [6]______amplify charted detail and contain information needed for safe navigation. A. Admiralty Sailing Directions B. Admiralty List of Lights C. Admiralty List of Signals D. Admiralty Notices to Mariners KEY: A英版航路指南详细描述海图的细节和安全航行所包含的信息。 [7]______are published for the correction of Admiralty Charts. A. Admiralty Sailing Directions B. Admiralty List of Lights C. Mariner’s Handbook D. Admiralty Notices to Mariners KEY: D英版航海通告出版是为了英版海图的改正。 [8]______are to be used for dunnage if you load rice. A. wooden planks B. rush mats C. steel bars D. wooden planks and rush mats KEY: D木板和席子被用来做垫舱料,如果你装载大米。 [9]______at 53N3 127E4 moving ely 12kts with cold front from center passing 51N3 126E1 to 51N2 125E4 and warm front from 46N1 128E2 passing 40N2 125E2. A. Low 1002HPA B. Low 1045 HPA C. High 1002 HPA D. High 1045 HPA KEY: A低气压1002百帕,位置53N 127E4向东12节速度移动,伴有冷锋中心经51N3 126E1移至51N2 125E4,伴有暖锋从46N1 128E2 经过40N2 125E2位置。 [10]______causing strong winds and rough sea north west Bay of Biscay. A. Strong low pressure B. Strong high pressure C. Steep pressure gradient D. Steep gradient pressure KEY: C强气压梯度导致了比斯开湾西北的强风和狂狼。 [11]______chart 3994, positions read from this chart should be shifted 0.03 minutes Northward. A. To consider B. To check C. To examine D. To agree with KEY: D为了与3994号海图一致,从这张海图上读出的位置应该向北移动0.03分的距离。[12]______is a full nautical record of a ship’s voyage, written up at the end of each watch by the officer of the watch. A. Sea Protest B. Deck Log C. Accident Report D. Seaman’s Book KEY: B航海日志全面记录了航次的情况,由值班驾驶员在每次值班结束后详细填写记录。 [13]______is not a process of weathering of the oil spilled in the sea water. A. Biodegradation B. Dissolution C. Cleaning up by crew with skimmers D. Oxidation including photooxidation KEY: C船员用浮油刮集船清扫不是一个油溢入海水中的风化过程。 [14]______is not a process of weathering of the oil spilled in the sea water. A. Emulsification B. Sedimentation / Sinking C. Oxidation including photooxidation D. Burning organized by RCC KEY: D由RCC(海上搜救协调中心)组织的燃烧不是一个油溢入海水中的风化过程。 [15]______ is not a process of weathering of the oil spilled in the sea water.

航海及海运专业词汇英语翻译

航海及海运专业词汇英语翻译(B) bulge carrier 散货船 bulge bulk 散货容积大量 bulge container 散货集装箱 bulge eraser 整盘磁带消磁器 bulge frame 船腹肋骨 bulge freighter 散货船 bulge grain carrier 散装谷类运输船 bulge oil carrier 散装油船 bulge oil circuit breaker 多油断路器 bulge oil-carrying ship 散装油船 bulge ore carrier 散装矿砂船 bulge ore-and RoRo carrier 散货、矿砂、滚装三用船bulge test 鼓出试验 bulge test 鼓出试验批量试验 bulge test 批量试验 bulge transport department 散货运输处 bulge viscosity 体积粘性 bulge 不规则突起鼓起处 bulge 侧凸出部 bulge 船侧凸出部;舭部 bulge 桶腰 bulgecarrier 散货船 bulged blading 加厚叶片组 bulging shell 鼓出外板 bulging shell 舭外板 bulging test 鼓出试验 bulk carrier 散货船 bulk and general cargo carrier 散杂货运输船 bulk bauxite carrier 散装矾土船 bulk bauxite carrier 散装铁矾土船 bulk bauxite ore-carrier 铝土矿石船 bulk bead mark 防水壁标志 bulk boat 石油驳船 bulk capacity 散货容积 bulk capacity 散装容积 bulk cargo carrier 散装货船 Bulk Cargo Clause 散装货条款 bulk cargo container 散装货柜 bulk cargo container 散装货柜散装集装箱 Bulk Cargo Container 散装集装箱 bulk cargo hold 散货舱 Bulk Cargo Ship 散装货船

(英语)英语翻译专项习题及答案解析

(英语)英语翻译专项习题及答案解析 一、高中英语翻译 1.高中英语翻译题:Translation: Translate the following sentences into English, using the words given in the brackets. 1.究竟是什么激发小王学习电子工程的积极性?(motivate) 2.网上支付方便了客户,但是牺牲了他们的隐私。(at the cost of) 3.让我的父母非常满意的是,从这个公寓的餐厅可以俯视街对面的世纪公园,从起居室也可以。(so) 4.博物馆疏于管理,展品积灰,门厅冷落,急需改善。(whose) 【答案】 1.What on earth has motivated Xiao Wang’s enthusiasm/ initiative to major in electronic engineering? 2.Online payment brings convenience to consumers at the cost of their privacy. 3.To my parents’ satisfaction, the dining room of this apartment overlooks the Century Park opposite the street and so it is with the sitting room. 或者What makes my parents really satisfy is that they can see the Century Park from the dining room of this apartment, so can they from the living room. 4.This museum is not well managed, whose exhibits are covered with dust, and there are few visitors, so everything is badly in need of improvement. 或The museum whose management is reckless, whose exhibits are piled with dust and whose lobby is deserted, requires immediate improvement. 【解析】 1.motivate sb to do sth 激发某人做某事,on earth究竟,major in 以…为专业,enthusiasm/ initiative热情/积极性,故翻译为What on earth has motivated Xiao Wang’s enthusiasm/ initiative to major in electronic engineering? 2.online payment网上支付,brings convenience to给…带来方便,at the cost of以…为代价,privacy隐私,故翻译为Online payment brings convenience to consumers at the cost of their privacy. 3.To my parents’ satisfaction令我父母满意的是,后者也那样so it is with。也可以用主语从句What makes my parents really satisfy 表语从句thatthey can see the Century Park from the dining room of this apartment。overlooks俯视,opposite the street街对面,living room 起居室。故翻译为To my parents’ satisfaction, the dining room of this apartment overlooks the Century Park opposite the street and so it is with the sitting room.或者What makes my parents really satisfy is that they can see the Century Park from the dining room of this apartment, so can they from the living room. 4.not well managed/ management is reckless疏于管理,be covered with dust/ be piled with dust被灰尘覆盖,few visitors游客稀少,be badly in need of improvement/ requires immediate improvement亟需改善。故翻译为his museum is not well managed, whose exhibits

英文翻译格式要求

河北建筑工程学院 毕业设计(论文)外文资料翻译 系别:机械工程系 专业:机械电子工程 班级:机电(本)091 姓名:张少强 学号: 2009322110 外文出处:English in Mechanical and Electrical Engineering 附件:1、外文原文;2、外文资料翻译译文。 指导教师评语: 签字: 年月日 金属热处理 普遍接受的金属和金属合金的热处理定义是“在某种程度上加热和冷却金属或金属合金,以获得特定的条件和属性。”加热的唯一目的是进行热加工,锻造操作是被排除在这个定义之外的。热处理有时候也用产品表示,同样玻璃和塑料也被排除在这个定义之外。 变换曲线 热处理的基础是在一个单一的图表上绘制的包含三个所有的等温转变曲线或TTT曲线。因为曲线的形状,他们有时候也称为c曲线或s曲线。 TTT曲线绘制,特定的钢在给定的条件下和预定的时间间隔内记录以检查的组织结构转换的

数量。众所周知共析钢(T80)在超过723℃形成的是奥氏体,在此温度下形成的是珠光体。为了形成珠光体碳原子应该分散形成渗碳体。扩散是一个过程需要足够的时间来完成奥氏体向珠光体的转变。我们可以注意到在不同的样本内在任何的温度下数量都在发生变化。这些点被绘制在以时间和温度为轴的坐标内。通过这些点共析钢的变换曲线如图1所示。曲线的左极端代表在任何给定的温度下奥氏体向珠光体的转变。同样的右极端代表完成所需要的时间。这两个曲线之间转换的点代表部分转换。水平线条s M和f M发代表开始和完成的马氏体转变。 热处理工艺的分类 在某些情况下,热处理在技术和使用程序上是分开的。而在其他情况下,,描述或简单的解释是不够的,因为相同的技术常常可以获得不同的目标。例如,应力消除和回火需要相同的设备和利用相同时间和温度循环。然而这是两个不同的过程。 图8.1 T80钢在等温间隔下的热处理图 以下对热处理的描述主要是根据他们之间的关系来安排的。正火指加热铁合金到高于它转变温度上的一个合适温度(通常是50°F到100°F或28℃到56℃)。接下来是在精致空气至少是在低于其转变温度范围下冷却。由此产生的结构和性能和通过完全退火是一样的。对大多数铁合金来说正火和退火是不一样的。 正火通常被用作调节处理,尤其是没有经过高温锻造或其他热加工的精炼粒钢。正火的成功通常由另一个热处理来完成如奥氏体化的淬火、退火或回火。 退火是一个通用术语,它表示一个热处理,包括加热和保持在一个合适的温度后以一个合适的冷却速度冷却。它主要用来软化金属材料,但它同时也会产生其他属性或期望的微观结构。

汉译英格式规范

汉译英翻译格式规范 I 格式规范 1. 正文标题、机构名称、图表格名称和表头中所有单词(除虚词外)的首字母均大 写;但标题为句子的情况除外; 2. 译文中出现的标准、规范名称,单独出现时每个单词首字母均应大写并斜体,不 加引号;在表格中出现时不用斜体; 3. 摄氏度符号统一从“符号”“Times new roman”中找到“°”(位于最右一列)插 入,然后在后面加上大写“C”,即“°C”; 4. 排比和并列的内容,标点应统一。一般做法是中间采用“;”,最后一个采用“.”, 最后一个与倒数第二个之间用“; and”; 5. 数值范围的表示形式应是:110-220 kV,而不是110 kV~220 kV;注意:数字和 连字符之间没有空格,数字和单位之间有空格数字与单位之间要加一个空格,但“°C”、“°F”和“%”除外; 6. 在英文中,百分号应采用英文半角“%”,而不可采用中文全角“%”; 7. 公式中的符号从“插入公式”中选择; 8. 文本框中第一个单词首字母大写; 9. 1号机组和2号机组、一期和二期的表示方法:Unit 1 & 2;Phase I & II; 10. 第x条(款、项)和第y条(款、项)的表示方法:Article x and Article y,即表 示条(款、项)的词不能省略; 11. 文件中出现公式时,公式后说明性文字的“其中”、“式中”统一译为“Where:”, 注意其后加冒号;对公式中的字母和符号进行解释时,采用“-”,其前后均不空格,“-”后的首字母为小写;公式后的说明要用分号,最后采用句号。例如: Where: F sc-short circuit current force (lb/ft); V-velocity; P-gas density. 12. 冒号后首字母小写; 13. 大于号、小于号、等号两边均有空格; 14. 表格的标题和标题栏字体加粗; 15. 注意上下标与原文一致; 16. 直径符号φ的输入方法:插入,符号,字体选择Symbol,然后选择输入φ,并采用 斜体;

【最新推荐】关于商务英语的翻译赏析-范文模板 (1页)

【最新推荐】关于商务英语的翻译赏析-范文模板 本文部分内容来自网络整理,本司不为其真实性负责,如有异议或侵权请及时联系,本司将立即删除! == 本文为word格式,下载后可方便编辑和修改! == 关于商务英语的翻译赏析 【原文】“天山”牌羊绒衫具有色泽鲜艳,手感柔滑,穿着舒适,轻便保 暖等特点。由于该产品质地优良,做工精细,花型、款式新颖,尺码齐全,受 到国外消费者的热烈欢迎。 【译文】"Tianshan" brand cashmere sweaters,characterized by their bright colors,soft feel and light weight,are warm and comfortable to wear.Thanks to/Because of their fine quality,excellent workmanship,novel designs and styles and complete range of sizes,they have gained popularity with consumers abroad. 【点评】汉语中的四字短语读起来铿锵有力,节奏优美,他们的使用是汉 语的一大特点,但汉语中的四字短语会呈现不同的结构,如主谓结构、动宾结构、偏正结构等。本例中的“色彩鲜艳”、“手感柔滑”、“穿着舒适”便是 主谓结构,但英译文将它们分别译成了“bright colors”、“soft feel”和“light weight”,这种结构属于汉语中的偏正结构,即形容词修饰中心名词,这样翻译是为了英语的行文需要而做的改变,因为这里英译文“characterized”之后需要接名词短语。

航海英语302 翻译版

航海英语302 烟囱是套管用于排气管的发动机 1.——is a casing used for exhaust pipe from the engines. A.The funnel烟囱 B.The messroom C.The galley D.The satellite antenna 人造卫星天线装置在塑料圆顶,用来预测天气. 2.——is housed in a plastic dome for weather protection. A.The funnel B.The messroom C.The galley D.The satellite antenna人造卫星天线 厨房是制作美味食物的地方. 3.——is where delicious food is cooked. A.The funnel B.The messroom C.The galley厨房 D.The satellite antenna 食堂是全体船员用餐的地方 4.——is where the crew eat their meals. A.The funnel B.The messroom食堂 C.The galley D.The satellite antenna 锚是用来固定停泊的船只在海底, 使其不可移动. 5.——is used to moor the ship to the seabed to keep it stationary. A.The bulbous bow B.The anchor 锚 C.The bow thruster D.The propeller 船鼻首是圆形水下部件, 位于船前部, 目的是制造更少的水摩擦力, 使船只可以更易于移动. 6.——is a round-shaped underwater part in the front of the ship. The purpose is to create less friction with water so that the ship moves more easily. A.The bulbous bow 球鼻艏 B.The anchor C.The bow thruster D.The propeller 船首推进器装置在船的前方, 位于水下,从而缓和泊位或往斜方向操纵时速度减慢。7.——is placed in the front of the ship under the water, which eases berthing or maneuvering sideways at low speed.

英文中地址格式

中国地址英文书写格式 地址翻译实例 : 宝山区南京路12号3号楼201室 room 201,building No.3,No.12,nan jing road,BaoShan District 如果地方不够可以将3号楼201室写成:3-201 宝山区示范新村37号403室 Room 403,No.37,SiFan Residential Quarter,BaoShan District 中华人民共和国民政部政策研究中心北京河沿大街147号 No.147# HeiYian Street the policy center of civil administration department the People’Republic of China 虹口区西康南路125弄34号201室 Room 201,No.34,Lane 125,XiKang Road(South),HongKou District 北京市崇文区天坛南里西区20楼3单元101 Room 3-101 building No.20,TianTan-NanXiLi Residential ChongWen District BeiJing City 江苏省扬州市宝应县泰山东村102栋204室 Room 204 building No.102, East TaiShan Residential BaoYin County JiangSu Province 473004河南省南阳市中州路42号王坤 Wang Kun Room 42,Zhongzhou Road,Nanyang City,Henan Prov.China 473004 中国四川省江油市川西北矿区采气一队 1 Team CaiQi ChuanXiBei Mining Area JiangYou City SiChuan Province China 中国河北省邢台市群众艺术馆 The Masses Art Centre XinTai City HeBei Prov.China 江苏省吴江市平望镇联北村七组 7 Group LiBei Village PingWang Town WeJiang City JiangSu Province 434000湖北省荆州市红苑大酒店王坤 Wang Kun Hongyuan Hotel,Jingzhou city,Hubei Prov. China 434000 473000河南南阳市八一路272号特钢公司王坤 Wang Kun Special Steel Corp,No.272,Bayi Road,Nanyang City,Henan Prov. China 473000 528400广东中山市东区亨达花园7栋702 王坤 Wang Kun Room 702, 7th Building,Hengda Garden, East District,Zhongshan, China 528400 361012福建省厦门市莲花五村龙昌里34号601室王坤 Wang Kun Room 601, No.34 Long Chang Li,Xiamen, Fujian, China 361012 361004厦门公交总公司承诺办王坤 Mr. Wang Kun Cheng Nuo Ban, Gong Jiao Zong Gong Si Xiamen, Fujian, China 361004 266042山东省青岛市开平路53号国棉四厂二宿舍1号楼2单元204户甲王坤 Mr. Zhou Wangcai NO. 204, A, Building NO. 1,The 2nd Dormitory of the NO. 4 State-owned Textile Factory, 53 Kaiping Road, Qingdao,Shandong, China 266042 英文地址的写法 [英文地址] 中国MPA在线的英文地址:Rome1232,Youth building,No.34 West Beisanhuan Road, Beijing,China 一、寄达城市名的批译: 我国城市有用英文等书写的,也有用汉语拼音书写的。例如“北京”英文写为“Peking”,汉语拼音写为“Beijing”二者虽然都是用拉丁字母,但拼读方法不同,前者是以音 标相拼,而后者则是用声母和韵母相拼的,批译时要注意识别,以免错译。 二、街道地址及单位名称的批译: 常见有英文书写、汉语拼音书写、英文和汉语拼音混合书写三种。 1、英文书写的,例如Address:6 East Changan Avenue PeKing译为北京市东长安街6号; 2、汉语拼音书写的,例如:105 niujie Beijing译为北京市牛街105号; 3、英文、汉语拼音混合书写的,例如:NO.70 dong feng dong Rd.Guangzhou 译为广州东风东路70号。 三、机关、企业等单位的批译: 收件人为机关、企业等单位的,应先译收件人地址,再译单位名称。批译方法为: 1、按中文语序书写的要顺译。 例如:SHANGHAI FOODSTUFFS IMP AND EXP CO. 译为:上海食品进出口公司; 2、以英文介词短语充当定语,一般位于被修饰的名词之后,译在该名词 之前。 例如:Civil Aviation Administration Of China 译为:中国民航局; 3、机关、企业单位的分支机构一般用英文“branch”(分部、分公司等)表示。 例如:Beijing Electron Co. Ltd Xian branch 译为:北京电子有限公司西安分公司。 四、姓名方面: 外国人习惯是名(Firstname)在前,姓(Lastname)在后。若碰到让您一起填的,最好要注意一 下顺序,不过你要是填反了,也没关系。中国银行收支票时是都承认的。 例如:刘刚,可写成GangLiu,也可写成LiuGang。 五、地址翻译——翻译原则:先小后大。 1、中国人喜欢先说大的后说小的,如**区**路**号。 而外国人喜欢先说小的后说大的,如 :**号**路**区,因此您在翻译时就应该先写小的后写大的。例如:中国山东省青岛市四方区洛阳路34号3号楼4单元402户,就要从房开始写 起: Room402,Unit4,Building3,No.34.LuoyangRoad,sifangDistrict,QingdaoCit y,Shandong Prov,China (逗号后面有空格)。 注意:其中路名、公司名、村名等均不用翻译成同意的英文,只要照写拼音就行了。 因为您的支票是中国的邮递员送过来,关键是要他们明白。技术大厦您写成Technology Building,他们可能更迷糊。 注意:填写姓名时,姓在前,名在后,中间空格,首字母大 写。填写地址时,从小地址到大地址,逗号或空格后的第一个字母大写。 A: 室/房Room 村Village 号No. 宿舍Dormitory 楼/层F 住宅区/小区Residential Quater 甲/乙/丙/丁A/B/C/D 巷/弄Lane 单元Unit 楼/栋Building 公司Com./Crop/LTD.CO 厂Factory 酒楼/酒店Hotel 路Road 花园Garden 街Street 信箱Mailbox 区Districtq 县County 镇Town 市City 省Prov. 院Yard 大学College **表示序数词,比如1st、2nd、3rd、4th......如果不会,就用No.***代替,或者直接填数字吧! 另外有一些***里之类难翻译的东西,就直接写拼音***Li。而***东(南、西、北)路,直接用拼音也行,写***East(South、West、North)Road也行。还有,如果地方不够可以 将7栋3012室写成:7-3012。 201室:Room201 12号:No.12 2单元:Unit2 3号楼:BuildingNo.3 长安街:ChangAnstreet 南京路:Nanjingroad 长安公司:ChangAnCompany 宝山区:BaoShanDistrict 赵家酒店:ZhaoJiahotel 钱家花园:Qianjiagarden 孙家县:Sunjiacounty 李家镇:Lijiatown 广州市:Guangzhoucity

相关文档
最新文档