计算机专业英语Unit-9

计算机专业英语Unit-9
计算机专业英语Unit-9

计算机专业英语Unit-9

Unit 9 Computer Virus

Text 1 Virus Introduction

Exercises

1. Multiple choices.

(1)A virus is a ( A ).

A. program

B. computer

C. bad man

D. beast

(2)A virus is a program that reproduces its

own code by ( ABC ).

A. adding to the end of a file

B. inserting into the middle of a file

C. simply placing a pointer

D. replacing another program

(3)( AD )is a type of executable file .

A. COM file

B. TXT file

C. JPG file

D. EXE file

(4)Similar to viruses, you can also find

malicious code in ( ABC ).

A. Trojan Horses

B. worms

C. logic bombs

D. Microsoft Word Documents

2. Fill in the blanks.

(1)A virus is a program that reproduces its

own code by attaching itself to other

executable files in such a way that the

virus code is executed when the infected

executable file is executed .

(2)To attach might mean physically adding

to the end of a file, inserting into the

middle of a file, or simply placing a

pointer to a different location on the disk

somewhere where the virus can find it. (3)Similar to viruses, you can also find

malicious code in Trojan Horses, worms,

and logic bombs.

3. Translate and analyze the

following sentences.

(1)These self-replicating codes, when caused

3

by some event, may do a potentially

harmful act to your computer.

句子组成:when引导时间状语从句做插入语,当…的时候.

翻译:当这些自复制代码被一些事件触发时,或许会做出一些对你的计算机有潜在危害的行为.

(2)More recently, scripts written for Internet

web sites and/or included in E-mail can

also be executed and infected.

句子组成:scripts written…省略的定语从句完整形式scripts which were writtened….

翻译:现在,为网站编写的或者包括在E-mail 中的脚本也能够被执行和感染。

4. Reading comprehension.

Viruses can infect any type of executable code, not just the files that are commonly called “program files”. Viruses can be spread by:?Executable code in the boot sector of

infected floppy disks

?Executable code in the system area of

4

infected hard drives

?Word processing and spreadsheet

documents that use infected macros

Infected HTML documents that contain

JavaScript or other types of executable

code

Since virus code must be executed (run) to have any effect, files that the computer treats as pure data are safe. This includes graphics and sound files such as .gif, .jpg, .mp3, .wav, etc., as well as plain text in .txt files. For example, just viewing picture files won't infect your computer with a virus. The virus code has to be in a form, such as an .exe program file or a Word .doc file, that the computer will actually try to execute. Answer the following questions according to the article above.

(1)What kind of files can be infected by a

virus?

A virus can infect the executable files such

5

as .exe or .com or .doc files,etc.

(2)How about viruses can be spread? Executable code in the boot sector of

infected floppy disks or in the system area

of infected hard drives, word processing

and spreadsheet documents that use

infected macros Infected HTML

documents that contain JavaScript or

other types of executable code.

Text 2 Virus Behavior – Infection Phase Exercises

1. Multiple choices.

(1)Viruses all have two phases to their

execution, the ( A ) and the ( C ).

A. infection phase

B. delete phase

C. attack phase

D. create phase

(2)( ABCD ) maybe a certain cause that some

viruses infect upon.

A. a day

B. a time

C. an external event on your PC

6

D. a counter within the virus

(3)Many viruses go resident in the memory

like a ( C ).

A. .exe file

B. .com file

C. tsr program

D. data file

(4)You want to ( ABC )maybe wake up a

virus that has residented in memory.

A. copy a file

B. access a diskette

C. execute a program

D. delete a file

(5)Some viruses use ( A )and ( B )

techniques to hide their existence.

A. stealth

B. polymorphic

C. quickly spread

D. replace a part of system software

2. Fill in the blanks.

(1)Viruses come in a great many different

forms, but they all potentially have two

phases to their execution, the infection

7

phase and the attact phase.

(2)For those not old enough to remember tsr,

they were programs that executed under

system but stayed in memory instead of

ending.

(3)Note that worms often take the opposite

approach and spread as fast as possible.

3. Translate and analyze the

following sentences.

(1)When the virus executes it has the

potential to infect other programs.

句子组成:when引导时间状语从句当,,,时.

翻译:病毒在执行时,能够感染其他程序.

(2)Some viruses infect other programs each

time they are executed; other viruses

infect only upon a certain cause.

句子组成:some…other…引导两个并列句子,一些…其他….。

8

翻译:一些病毒会在每次被执行时,都感染其他程序;另一些病毒只是在一些特定的触发原因下才能感染其他程序.

(3)Resident viruses frequently take over

portions of the system software on the PC

to hide their existence.

句子组成:to hide their existence不定式做目的状语take over 代替.

翻译:驻留内存病毒常常代替PC系统文件的一部分来掩饰它的存在.

4. Reading comprehension. Polymorphic viruses use encryption (密码术) or other methods to change how they look. This strategy of changing their appearance helps to defeat antivirus scanning software. Stealth viruses attempt to hide any modifications they have made from antivirus scanning software. For example, stealth viruses sometimes substitute unaltered files and directory table entries for the virus-altered ones, in an attempt to fool antivirus

9

scanning software. Fast infector viruses are capable of infecting any file which is opened, rather than only executed files. Slow infectors only modify files as the files are being created or altered for legitimate reasons, a practice which fools some antivirus software. Sparse infectors only infect at certain intervals dictated by their programming, lessening their chance of creating suspicion on the part of the user.

Choose the best answer.

(1)How can polymorphic viruses defeat

antivirus scanning software?(B)

A. resident in memory

B. use encryption

C. hide in other programs

D. use the unaltered files to replace the virus-altered ones

(2)How can stealth viruses fool antivirus

scanning software?(C)

A. resident in memory

10

B. use encryption

C. hide in other programs

D. use the unaltered files to replace the virus-altered ones

(3)Which kind of virus can only alter files,

as the files are being created or altered

for legitimate reasons?(D)

A. polymorphic virus

B. stealth virus

C. fast virus

D. slow virus

(4)A few of viruses only infect at certain

intervals dictated by their programming,

because of ___?(A)

A. Don’t let user notice them.

B. They wait for some special programs to infect.

C. No special reason.

D. They want to change how they look.

Text 3 Virus Behavior-Attack Phase Exercises

1. Multiple choices.

11

(1)Many viruses do harmful things such as

( ABCD ).

A. deleting files

B. changing random data on your disk

C. simulating typos

D. slowing your PC down

(2)Viruses can delay their attack for

( ABCD ).

A. days

B. weeks

C. months

D. years

(3)If a virus simply reproduce and have no

cause for an attack phase, but it will still

( AB ) without your permission.

A. stealing storage

B. pilfer CPU cycles

C. delete files C. play music

(4)Some viruses, with no attack phase, often

damage the programs or disks they infect

because they ( AB ).

A. have bugs in them

B. contain poor

12

quality code

C. steal storage

D. show messages on your screen

2. Fill in the blanks.

(1)Many viruses do unpleasant things such

as deleting files or changing random data

on your disk.

(2)Most viruses have bugs in them and these

bugs often cause unintended negative side

effects.

(3)In addition, even if the virus is perfect, it

still steals system resources.

(4)The attack phase is optional, many

viruses simply reproduce and have no

cause for an attack phase.

(5)An example, one of the most common

past viruses, Stoned, is not intentionally

harmful.

3. Translate and analyze the

following sentences.

13

(1)Just as the infection phase can be caused

by some event, the attack phase also has

its own cause.

句子组成:as引导状语从句.

翻译:如同感染阶段需要一些事件触发一样,攻击阶段也有它自己的触发条件.

(2)In addition, even if the virus is perfect, it

still steals system resources.

句子组成:even if 即使,引导条件状语从句;in addition 另外.

翻译:此外,即使病毒设计完美,它仍会盗用系统资源。

(3)This is made worse since viruses that

"just infect," with no attack phase, often

damage the programs or disks they infect.

句子组成:since引导原因状语从句with no attact phase 插入语.

翻译:有些病毒只会“感染”而没有攻击阶段,但它们会破坏被它们感染的程序或磁盘,这反而更有害.

14

(4)The original virus tried to hide its own

code in an area of 1.2MB diskettes that

resulted in corruption of the entire

diskette (this bug was fixed in later

versions of the virus).

句子组成:that引导主语从句表示the original…in an area of 1.2MB diskettes.

翻译:最初的病毒试图把它自身隐藏在1.2MB 的磁盘中从而导致整张磁盘变坏.

4. Reading comprehension.

When you start a program that's infected by a virus, the virus code will execute (run) and try and infect other programs. This can infect the same computer or other computers connected to it on a network. The newly infected programs will try to infect more programs and computers. When you share a copy of an infected file with other computer users, opening the file may also infect their computers; and files from those computers may spread the infection to yet more

15

computers. If your computer is infected with a boot sector virus, the virus tries to write copies of itself to the system areas of floppy disks and hard disks. Then the infected floppy disks may infect other computers that boot from them, and then the virus on the computer will try to infect more floppies inserted into it.

Answer the following two questions according to the article above.

(1)Did you meet any viruses before?

(2)If you have met a virus, do you remember

how the virus infected your computer?

Text 4 Number of Viruses

Exercises

1. Multiple choices.

(1)In 2000, the number of viruses topped

( D ).

A. 500

B. 1000

C. 7500

D. 50000

16

(2)What make it is difficult to agree on how

to count viruses?(ABCD)

A. new virus arise from an existing virus

B. some viruses can create different versions when they infect other programs

C. some viruses can use polymorphic technique

D. just a trivial change may create a new virus

(3)The Whale will create ( D )different

versions of itself when it infects files.

A. 30

B. 31

C. 32

D. 33

(4)Now, about ( C ) different viruses account

for all the viruses that actually spread in

the wild.

A. 30

B. 150

C. 180

D. 50000

2. Fill in the blanks.

(1) In late 1992, estimates were ranging from

17

1,000 to 2,300 viruses.

(2) But, this is a trivial change that can be done in less than two minutes resulting in yet another "new" virus.

(3) Another problem comes from viruses that try to conceal themselves from scanners by mutating.

3. Translate and analyze the

following sentences.

(1)The confusion exists partly because it's

difficult to agree on how to count viruses.

句子结构:it’s difficult…中it为形式主语代替后面真正的主语to agree on ….

翻译:由于在怎样计算病毒上很难达成一致,所以现在还存在一些混乱.

(2)But, this is a trivial change that can be

done in less than two minutes resulting in

yet another "new" virus.

句子结构:that引导定语从句修饰change.

翻译:但是,一个在两分钟内可以完成的细微

18

的改动就产生了一种“新”病毒.

(3)Many of the large number of viruses

known to exist have not been detected in

the wild but probably exist only in

someone's virus collection.

句子结构:not…but…不是…而是…..

翻译:很多病毒虽然还没有被公众检测到,但可能已经在某个人的病毒收集夹中了.

(4)Although the actual number of viruses

will probably continue to be hotly

debated, what is clear is that the total

number of viruses is increasing, although

the active viruses not quite as rapidly as

the numbers might suggest.

句子结构:although表转折,连接词,引导句子.

翻译:虽然关于病毒的实际数量可能会继续进行激烈的争论,但一个很清楚的事实就是病毒的总数在增加。

4. Reading comprehension.

19

Viruses are software programs; the actual effect of a virus depends on how it was programmed by the person who wrote the virus. Some viruses are designed to overwrite boot sectors and interfere with your computer's operation (boot viruses), others damage your computers memory operation then try and spread themselves around by picking up e-mail or network addresses off your computer (worm viruses). Still others will wipe files from the hard drive and destroy system files (Trojan viruses) and finally there are ones that infect document files, electronic spreadsheets and databases of several popular software packages (Macro viruses). Viruses can't do any damage to hardware: they won't melt down your CPU, burn out your hard drive, cause your monitor to explode, etc. Warnings about viruses that will physically destroy your computer are usually hoaxes, not legitimate virus warnings.

20

计算机专业英语复习题完整版

计算机专业英语复习题标准化管理处编码[BBX968T-XBB8968-NNJ668-MM9N]

1.home page 主页 2.graphical user interface (GUI) 图形用户界面 3.artificial intelligence 人工智能 4.carbon copy 打字副本 5.field 字段 6.software suite 软件套装 7.desktop operating system 桌面操作系统 https://www.360docs.net/doc/549715242.html,ser printer 激光打印机 9.machine language 机器语言 10.relational database 关系数据库 11.menu bar 菜单栏 12.secondary storage 辅助存储器;二级存储器 13.system software 系统软件 二、 1.内存 memory 2.输入设备 input device 3.扬声器 speaker

4.局域网 local-area network 5.传输控制协议 transmission control protocol 6.集成电路 integrated circuits 7.上下文敏感 context sensitive 8.微处理器 microprocessor 9.只读存储器 Read-only memory 10.触摸屏 touch screen 11.像素 pixel 12.多媒体 multimedia 13.自动换行 word wrap 三

_________.

A、people B、OS C、keyboards D、procedures E、software ( abc ) 2、For microcomputer, there are three basic system units: ____________ . A、Desktop system units B、Notebook system units C、Personal digital assistant system units D、Arithmetic-logic units ( a ) 3、Language translators convert programming statements into__________. A、machine languages B、UNIX C、service programs D、operating systems ( b ) 4、The ____________is a list of commands or options from which you can choose. A、icon B、menu C、window D、pointer ( a ) 5、Database management systems are comprised of tables that are made of rows called __________ and columns called __________ . A、fields, records B、ranges, sheets C、records, fields D、 records, ranges ( abcd )6、The four main computer operations are _________.

计算机专业英语翻译

初学者的BIOS 1.介绍 在基本输入输出系统(BIOS)是一个在PC,它是基于主板上的芯片存储程序本质集。它作为一间计算机的硬件和操作系统的媒介。如果没有BIOS中,电脑的操作系统将没有办法沟通,或利用,对硬件的控制。 换句话说,在BIOS是任何计算机的重要组成部分。如果它的选项设置不当,可能会减缓的BIOS多达 40%的个人电脑了。不幸的是,新的处理器和主板芯片组的发布,BIOS选项继续变得更加混乱。因此,许多经验丰富的技术人员仍然感到困惑的术语股价和混乱的选项在现代计算机的BIOS设置程序进行。 不过没关系,因为倍频为您提供帮助!每一个母板和/或计算机制造商采用了不同的BIOS,所以我们将在优化的一个例子板,华硕A7N8X - E的豪华BIOS 中所涉及的步骤。我选择了这个特殊的华硕主机板,因为这样的板后,许多人模仿。此外,A7N8X - E是华硕最热门的车型之一,它的推出已有近两年,至今依然是出售AMD系统今天。显然,无论您使用的主板会从这个模式的差异,但你仍然可以得到一个从调整,可以使各种各样的例子感觉。 请记住,改变个人电脑的BIOS设置不当,可能会导致电脑故障。如果发生这种情况,一个BIOS复位需要执行返回到默认:“。出厂设置”(读未优化)这通常是激活主板上的,这是说起来容易做,然后与许多笔记本电脑跳线!这里没有讨论应该有一个在任何PC上的负面影响,但请遵循每个步骤明确。 很多,如戴尔,惠普,Gateway和大型电脑制造商美光限制的选项提供给最终用户在BIOS中,以减少不明智的“修补”和由此产生的支持电话。因此,您可能无法照顾到提到这些主要个人电脑厂商在这里的高级设置一定的优势。

计算机专业英语第4次作业

计算机专业英语第4次作业 1.Windows gives you more control over the__A___ your work. A:operation B:way C:energy D:power 2.Tea or coffee ? Which is your___A___? A:preference B:confusion C:puzzle D:mixture 3.Programs that can destroy another computer's programs are called__D_. A:games B:computer languages C:bugs D:viruses 4.You were _C___ to us by our associates. A:told B:suggest C:recommended D:informed 5.You should be able to tell the meaning of this word from its ___C____. A:company B:conclusion C:context D:communication 6.___B___ refers to the parts of the computer that you can see and touch. A:Software

B:Hardware C:Hardship D:Instruction 7.___C______that, I could do it much better. A:If I do B:If I were do C:Were I to do D:Were I do 8.A network is a group of computers linked by communication lines . 正确 9.Most RAM is temporary, losing its contents when the computer's power is turned off. 正确 10.A program is a series of instruction that guides a computer through a process. 正确 11.写出下列术语的英文或中文意思。 1 message encryption 参考答案: 1 信息加密(术) 2 客户机-服务器结构 2 client-server architecture 3 关系数据库 3 relational database 4 microwave radio 4 微波无线电 5 digital television 5 数字电视 12:[论述题]12.阅读下列短文,从A、B、C、D四个选项中,选出最佳选项。 For every man in the Civil War who died in battle, two or three men died of disease. Doctors of that time knew very little about causes of sickness or ways of preventing it. Thousands of men in poor health became soldiers. Hundreds of others had never had childhood diseases. Many of these soldiers could not withstand the epidemics of measles, mumps, and whooping cough that went through the camps. Army life was hard. Soldiers got few fruits or vegetables. There was no milk unless they happened to find a cow. Neither their clothes nor their shelters protected the troops from rain, snow, and cold. Sickness and disease were spread by insects, rats, and impure drinking water. Often the men drank straight from muddy streams. Gunshot wounds were serious, as in any war,

计算机专业英语作文

计算机专业英语 系别:数学系 班级:11级计算机二班姓名:徐小凤学号:110312248

Robot Competition From 11th to 13th October 2013, these three days are special for my teammates and me. I took part in the fifth Robot Competition of Anhui province. After continuous efforts, we got the third prize in the end. In April 2013, this competition was announced in our class by Mr He. In that moment, many students registered for the competition. After hardly training, there were only fifteen students remaining. We were divided into five teams. Each included three people. There were three teams taking part in wheel type robot competition (or named intelligent car). And the other two majored in dancing robot. My two roommates and I engaged in the designing of robot dance. We controlled the robots by program. But the program was programmed in BASIC, which is a high level programming language. The problem was that we had never touched to that language besides C or C++. So, we must learn the language before designing the action. It seemed difficult but we had never lost our courage. After seeking enough data from the Internet and the library, we spent about a few weeks to learn it. When we felt the fundamental grammar was easy, we began to design the dancing action. That was the most important and most difficult part. We spent much time on

计算机专业英语复习题

1.判断题 ()1. Operating system first appeared during the third computer generation. ()2. Unlike the other buses, the address bus always receives data from the CPU; the CPU never reads the address bus. ()3. The main operations of set algebra are complementation, union and intersection. ()4. If an empty stack is popped, we say the stack overflows, which is normally an error. ()5. The CPU can be shared in a sequential manner only. ()6. Freeware is free software with no restriction. ()7. When writing data to memory, the CPU first outputs the data onto the data bus, then outputs the address onto the address bus. ()8.The FORTRAN programming language was developed during the first computer generation. ()9.A stack is a dynamic set that obeys the FIFO property. ()10.Two popular strategies for resource allocation are static allocation and dynamic allocation. ()11.The CPU can be shared in a sequential manner only. ()12. A program written in the assembly language of one microprocessor can run on a computer that has a different microprocessor. ()13. Object-oriented programming(OOP) is a programming language model organized around “objects” rather than “actions” and data rather than logic. ()14. FORTRAN is a particularly good language for processing numerical data, but it does not lend itself very well to organizing large programs. ()15. C++ and Smalltalk are two of the more popular object-oriented programming language. 2.词汇 Vacuum tube 真空管general purpose 通用transistor 晶体管 :大规模集成电路)Large Scale Integrated Circuit(LSI. VLSI(Very Large Scale Integrated Circuit):超大规模集成电路 Mainframe 大型机medium-sized computer 中型机minicomputer 小型机 Microcomputer 小型机 machine language 机器语言assembly language 汇编语言high-level language 高级语言Multiprogramming 多道程序设计virtual memory 虚拟存储time-share 分时 Batch system 批处理系统interactive system 交互式系统 Instruction cycle 指令周期 Address bus, data bus, control bus Internal register内部寄存器external register 外部寄存器flag register标志寄存器 Instruction register 指令寄存器program counter程序计数器combinatorial logic组合逻辑Control signal 控制信号instruction code指令代码instruction pipeline指令流水线Bidirectional 双向的unidirectional 单向的 ALU(Arithmetic Logic Unit) 算术逻辑单元

计算机专业英语Unit_9

Unit 9 Computer Virus Text 1 Virus Introduction Exercises 1. Multiple choices. (1) A virus is a ( A ). A. program B. computer C. bad man D. beast (2) A virus is a program that reproduces its own code by ( ABC ). A. adding to the end of a file B. inserting into the middle of a file C. simply placing a pointer D. replacing another program (3)( AD )is a type of executable file . A. COM file B. TXT file C. JPG file D. EXE file (4)Similar to viruses, you can also find malicious code in ( ABC ). A. Trojan Horses B. worms C. logic bombs D. Microsoft Word Documents 2. Fill in the blanks. (1) A virus is a program that reproduces its own code by attaching itself to other executable files in such a way that the virus code is executed when the infected executable file is executed . (2)To attach might mean physically adding to the end of a file, inserting into the middle of a file, or simply placing a pointer to a different location on the disk somewhere where the virus can find it. (3)Similar to viruses, you can also find malicious code in Trojan Horses, worms, and logic bombs. 3. Translate and analyze the following sentences. (1)These self-replicating codes, when caused by some event, may do a potentially harmful a ct to your computer. 句子组成:when引导时间状语从句做插入语,当…的时候. 翻译:当这些自复制代码被一些事件触发时,或许会做出一些对你的计算机有潜在危害的行为. (2)M ore recently, scripts written for Internet web sites and/or included in E-mail can also b e executed and infected. 句子组成:scripts written…省略的定语从句完整形式scripts which were writtened…. 翻译:现在,为网站编写的或者包括在E-mail中的脚本也能够被执行和感染。 4. Reading comprehension.

计算机专业英语作业及答案

计算机专业英语作业答案(供参考) 计算机专业英语作业1 第1-3章作业一.( 词汇) (一).(写出下列词组的汉语。) 1.()中央处理器 2 标题栏 3.操作系统4.个人计算机 5.菜单栏6.桌面排版 7.电子表格8.硬盘 9.数据库10.光标 (二)..(根据汉语写出相应的英语缩写。) 1.随机存储器2.只读存储器 3.传输控制协议P 4.数字视频光盘5.通用串行总线6.计算机辅助设计7.计算机辅助制造8.中央处理器 (三)..(根据汉语写出相应的英语。) 1.键盘2.鼠标3.扫描仪 4.打印机5.输入6.输出 7.显示器8.存储器9.数据库 10.操作系统11.应用软件 12.字处理器13.网络浏览器 二.(T) (F).(判断正误。) 1., . (√)

2.'s . (√) 3.: . (√) 4. a 2000 . (×) 5.( ) a . (√) 6. , a . (√) 7. , ’s . (×) 8. ’t . (×) 9. . (×) 10. . (×). 三..(将左列的词汇与右列相应的汉语匹配。) (一). 1. () a. 操作系统 2. b. 输入. 3. ( ) c. 只读存储器 4. ( ) d. 应用软件 5. e. 中央处理器 6. f. 系统软件 7. g. 硬件 8. h. 随机存储器 9. i. 内存 10. j. 输出 1.e 6. j 2.g 7.a 3.h 8. d 4.c 9. f 5.b 10. i (二) . 1. a

2. b a 3. c 4 d a 0 1 5. e a 6. f 7. g 8. h a 9. i a 1.d 6. a 2.g 7.f 3.h 8. c 4.b 9. e 5.i 四., . (从下面方框中选择合适的词或表达,以其适当的形式填空。) 1. () . , a . , . , , . , . 2. , , . , a a a , a , a , a . , , . a , , a . , 1-2-3 . a , a ( ) . 3.

计算机专业英语第3章在线测试

A B C D The data, when they are not encrypted, are called A B C D A virus is a A B C D Many viruses go resident in the memory like a ( ). A B C D Now, about ( ) different viruses account for all the viruses that actually spread in t A B C D

C、attack phase D、create phase 2、( ) maybe a certain cause that some viruses infect upon. A、a day B、a time C、an external event on your PC D、a counter within the virus 3、Many viruses do harmful things such as ( ). A、deleting files B、simulating typos C、slowing your PC down D、changing random data on your disk 4、If a virus simply reproduce and have no cause for an attack phase, but it will still ( ) without your permission. A、stealing storage B、pilfer CPU cycles C、del_ete files D、play music 5、Some viruses, with no attack phase, often damage the programs or disks they infect bec ause they ( ). A、have bugs in them B、contain poor quality code C、steal storage D、show messages on your screen 第三题、判断题(每题1分,5道题共5分)

计算机专业英语试题

计算机英语试题 一、词汇(选择一个最合适的词汇,将对应的英文字母填入空格内。每题1分,共10分) 1、____ refers to the parts of the computer that you can see and touch. A. Software B. Hardware C. Hardship D. Instruction 2、primary memory which is stored on chips located ____. A. on the motherboard B. outside C. inside the processor D. on the CPU 3、The display screen is the most common ____ device used to show you what the computer is doing. A. input B. printing C. output D. electronic 4、Windows gives you more control over the ____ you work. A. operation B. way C. energy D. power 5、The most important program on any computer is ____. A. Operating System B. Virus C. software D. Office 2000 6、There are ____ separate products that form the Windows 2000。 A. only one B. two C. three D. four 7、C might best be ____ as a 'medium-level language'. A. developed B. decoded C. programmed D. described 8、Anti-Virus protects your computer from viruses by ____ your computer's memory and disk devices. A. deleting B. changing C. scanning D. replacing 9、Multimedia will become increasingly ____ throughout every aspect of our lives. A. pass B. precise C. permit D. pervasive 10、Communication through the Internet, the____ performs the reverse function. A. A station controller (STACO) B. DTE C. Data communications equipment (DCE) D. CRT 一、词汇(选择一个最合适的词汇,将对应的英文字母填入空格内。每题2分,共20分) 1、A is used to communicate with another computer over telephone lines. A. keyboard B. modem C. mouse D. printer 2、A is a device that enables the computer to handle sounds. A. network card B. video card C. sound card D. monitor 3、is a word processing tool that helps you to create quality documents. A. Word 2000 B. Outlook 2000 C. Access 2000 D. Excel 2000 4、is a fast and powerful operating system, based on the UNIX O.S. A. Windows 2000 B. Office 2000 C. Windows 98 D. Linux 5、The OSI model has layers. A. four B. five C. six D. seven 6、The purpose of the is to provide fully integrated analog services to users. 1

计算机专业英语词句考试重点

, .在整个社会,不同型号和不同大小的计算机被用于存储和处理各种数据,从政府保密文件、银行交易到私人家庭账目。 .计算机犯罪已经成为作为现代技术代价组成部分的许多风险之一。 , . 二次世界大战期间,以伦敦北面的布莱切利公园为工作地点的一组科学家和数学家, 制造了最早的全电子数字计算机之一:“巨人”。 a ””. 指令像数据一样存储在“存储器”中,使计算机在执行过程中摆脱了纸带阅读器的速度限制,并使问题在不给计算机重新接线的情况下得以解决。 a . 一台计算机能够处理的全部可识别模式——操作总清单——称为指令集。 . 无论尺寸大小,现代数字计算机在概念上都是类似的。 a . 小型计算机,一般就个人使用而言太昂贵,其性能适合于工商,学校和实验室。 a 1970s a . 20世纪70年代中期,随着大规模集成电路和后来的超大规模集成电路(微芯片)的采用,成千上万个彼此相连的晶体管被蚀刻在一块硅衬底上,于是微处理器成为现实。 A a 256 . 8个位为一组,称为一个字节;每个字节包含256个开与关的可能模式. 1, , a , a a . 另一方面,软件是计算机用来处理数据的一套指令,如文字处理程序或电子游戏。 3 , , , . 两种最常见的扫描仪类型是平板扫描仪和手持式扫描仪,前者类似一台办公室用复印机,后者用手动的方式从要处理的图像上扫过。 4.A , , a a a . 调制解调器代表调制器―解调器,是将计算机与电话线连接、允许信息传送给或接收自另一台计算机的设备。 5 , , . 一台计算机发送的信息由调制解调器转换成音频信号,然后通过电话线传送到接收端调制解调器,由其将信号转换成接收端计算机能够理解的信息。 6 a a , , , , . 串行连接是一根或一组导线,用于将信息从中央处理器传送到外部设备,如鼠标、键盘、调制解调器、扫描仪和一些类型的打印机。 7. , , ’s (), , . 这些类别的部件与微处理器相连接,特别是与计算机的中央处理器相连接。中央处理器系电子线路,它通过称为总线的线路或电路来提供计算能力和对计算机进行控制。 8.A a a a . 总线提供了一种常见的互连系统。它由一组导线或电路组成,在计算机的内部组成部分之间协调和移动信息。 1 a (a ) a . 在计算机科学中,编程语言是用于编写可由计算机运行的一系列指令(计算机程序)的人工语言。

计算机专业英语作业(1).

计算机专业英语作业(1 一、Translate the following sentences into English or Chinese. 1.计算机 2.多媒体 3.硬件 4.软件 5.输入设备 6.存储器 7.外部设备8.处理器 9.鼠标10.语音识别 11.扫描仪12.寄存器 13.Arithmetic and logic unit 14.Binary form 15.Control unit 16.Instruction cycle 17.Execution cycle 18.Central processing unit 19.Universal serial bus 20.Universal parallel bus 二、For each of the following blanks, four choices are given. Choose the most appropriate one. 1.A personal computer keyboard includes . a.a typewriter layout and a set of arrow keys

b.a numeric keypad C.a Set of function keys d.a11 of above 2.A display is a device that is used to display . a.numbers letters b.special characters c. graphic information d.all of above 3.system software includes and . a.operating system and application software b.operating system and programming language c.special—purpose programs and application software d.OS and special—purpose programs https://www.360docs.net/doc/549715242.html,rmation flows from a computer into a peripheral device as . a.output b.memory c.a program d.input 5.programs are known collectively as .

计算机专业英语教程参考答案

计算机专业英语练习参考答案 Unit 1 [Ex 1] 1..F 2.T 3.T 4.F 5.T 6.T 7.T 8.T 9.T 10.F [Ex 2] 1.input, storage, processing, and output 2. power, speed, memory 3. central processing unit 4. internal, primary, memory 5. keyboard, central processing unit, main memory, monitor [Ex 3] A. 1.F 2.D 3.G 4.C 5.B 6.E 7.H 8.A B. https://www.360docs.net/doc/549715242.html,er 2.monitor 3.data 4.keyboard 5.data processing 6. information https://www.360docs.net/doc/549715242.html,puter 8.memory [Ex 4] 1.input device 2. screen, screen 3.manipulates 4.instructions 5.retrieve

6.code 7.hard copy 8.function/code/instruction [Ex 5] 1.T 2.T 3.F 4.F 5.T 6.F 7.T 8.F Unit 2 [Ex 1] 1.T 2.F 3.T 4.F 5.T 6.T 7.T 8.F [Ex 2] 1. sizes, shapes, processing capabilities 2. supercomputer, mainframe computer, minicomputers, microcomputers 3. mainframe computer 4.microcomputers, storage locations 5. portables, laptop computers/ notebook/palm-sized computer, desktop workstations 6.semiconductor 7. CPU, memory, storage, devices, processing, users 8. microprocessor ship [Ex 3] A. 1.C 2.A 3.H 4.I 5.E 6.F 7.G 8.B

【精品】计算机专业英语的重要性

计算机专业英语的作用 崔艳红 (吉林省畜牧业学校,吉林白城) [摘要]计算机现今已被广泛应用到各个领域,在使用计算机过程中可 能会碰到各种各样的专业术语,特别是那些英文缩写常让我们不知所措,但是当你掌握计算机英语知识后你会发现这些问题就会迎刃而 解。 [关键词]计算机英语操作系统术语学应用软件 随着当今社会的发展,计算机已成为现代科学技术的重要标志,它本着对自动、高速、准确无误地进行信息加工、存贮、传送和输出信息的特点已被人们广泛应用,而计算机专业英语也随之变得尤为重要。它不仅是计算机专业人员的必修课,也是世界上IT人员必备的课程;现在已成为每个大中专和本科院校必需开设的课程之一;一个在计算机方面颇有造诣的人对于计算机专业英语也应该是精通的。人们越来越领悟到了计算机专业英语的举足轻重的地位,那么它到底具有哪些作用呢?还是让我们从计算机专业英语的常用知识说起吧。 一、在DOS命令中,如果没有计算机专业英语的知识能够完全理解的,例如:logoff(注销命令),iexpress(木马捆绑工具,系统自带 ), Nslookup(IP 地址侦测器) ,history (查看自己下过的命令) ,su (权限转换为指定使用者 )。上述命令如果没有计算机专业英语的知识是难以理解的;试想一下,你就是有足够的英语的底子也不会把它分析得这么透彻吧。 二、计算机操作系统的安装,没有计算机英语知识,你能顺得完成安装 disk 吗?假如你在安装操作系统时出现了下面两个句子,你将会如何处理呢?

boot failure, insert system disk and press enter ,(磁盘启动失败,请插入系统盘并且按回车键),Windows could not start because the following file is missing or corrupt ( Windows无法启动,因为下列文件丢失或损坏)。 三、计算机英语知识无时无刻不在我们身边,常用的办公软件Word、Powepoint、Excel是最贴近我们生活的,然而它们的应用也蕴藏着大量的计算机英语知识。例如常见的快捷键Ctrl+N ,Ctrl+C,Ctrl+A,Ctrl+s这四个快捷键中Ctrl是control的缩写,是键盘上的控制键,N、C、A、S分别是单词new、copy、all、save的缩写,它们的英语意思分别是新建、复制、全部、保存的意思,那么用在命令当中不也是这样的意思吗,可见计算机英语知识对于我们身边的办公软件使用也是大有好处的。 四、由于计算机已经被人们认可,它在教育界的地位也逐步升高,甚至有些人认为:“一位优秀的好老师,必须能做出新颖性的精典课件,”许多老师非常喜欢利用flash制作课件,可是当用到Action语句时,就不会了,怎么也学懂,例如:random(产生0到指定数间的随机数),scroll(文本框中的起始滚动行),String(将参数转换成字符串),targetPath(返回指定实例MC的路径字符串)等等。通过这样一个简单的例子会使我们认识到没有过硬的计算机英语知识也很难制作出引人入胜的课件。 五、许多计算机的操作命令都来自我们经常用到的一些英语的词汇, 如果英语基础不好,对这些命令、名词、概念是无法进行理解的。如果英语基础好对这些词也要仔细揣摩才能加以理解。例如:DEL(删除文件命令)=Delete (检查磁盘(删除),CLS(清除屏幕命令)=Clear S creen(清除屏幕),CHKDSK

计算机专业英语作业

计算机专业英语作业: 1、请将视频“什么是电脑硬件”中所述内容用英文表示。 For most people, computers are becoming a part of real life, the film will help you konw how it works. Their interior looks very complicated, but if the decomposition of parts, you will see a simple side of computers , This is《computer hardware in Plaining English 》,you see them, they are coming all shapes and sizes,but its work in some ways. In fact, if you can see their internals of computers, You will find that they all have the basic parts,the haddwares,do large part of the works in the computers.to explan,let’s look at some things you know ,like a house.what a great thing in the house is you have full space to put all the iterms.in fact ,many houses have basements.The basement is a good place to store debris.Basement, the more you can store.The same principle applies to computers.We need not boxes and bicycles, but photos, music, documents and https://www.360docs.net/doc/549715242.html,plete this task in the computer hard drive rather than in the basement, a computer hard drive, holds all your files will be used later, like basements, like the larger hard drive, the more things you can store. Basement is not perfect, going to the basement to take the things you need to spend much time, maybe put a cupboard on the ground floor can help you solve this problem, you can quickly get the items you want, although the cabinet can not put too many items, at least you do not always go to the basement, in the computer too, The computer can not quickly access to the data stored in the hard disk, because the computer go a long way to gain access to the hard disk data. In the computer memory (RAM) is like a cupboard, RAM's full name is called [random access memory], which allows the computer to access data more quickly and, of course, it also means that the operation of RAM to make your computer faster , but this cupboard (RAM) has a drawback, the memory will be cleared of stored data When every time you restart, of course, to make the house a variety of household appliances can operate at the appropriate time, you must have an Explorer to help you manage these appliances, if the weather is too hot , you maybe need to open the air conditioner to adjust the temperature, when it is dark, you need to turn on the lights. Computers, too, must have a bit Explorer to ensure that all other parts are functioning properly, the Explorer is the processor (CPU), small size of the processor, like a computer exclusive (in charge), it will send and receive information and to assist the software to complete the work. The faster the processor, the faster execution speed of the computer would be, so, let us revisit. Hard drive, like a basement, it can store the information you need. Memory, like a cupboard, which can increase data access speed. Processor, like the Field Explorer, always able to complete the work that we deliver, but also to ensure the normal operation of the various parts. Next time, when you use the computer, think about plain English in the host computer's computer hardware what happened, the various parts of computer hardware complement each other, to help you do all the things I Common Craft's Lee LeFever, "Computer hardware of Plaining English "The film recorded by me, if you need a higher quality video, or need to use the authorization of the film, please contact me https://www.360docs.net/doc/549715242.html, website. 2、请将以下英文翻译为中文。

相关文档
最新文档