计算机英语 刘艺 王春生 第4版
计算机英语(第4版) 刘艺 课文参考译文

《计算机英语(第4版)》参考译文第一单元:计算机与计算机科学课文A:计算机概览一、引言计算机是一种电子设备,它能接收一套指令或一个程序,然后通过对数字数据进行运算或对其他形式的信息进行处理来执行该程序。
要不是由于计算机的发展,现代的高科技世界是不可能产生的。
不同类型和大小的计算机在整个社会被用于存储和处理各种数据,从保密政府文件、银行交易到私人家庭账目。
计算机通过自动化技术开辟了制造业的新纪元,而且它们也增强了现代通信系统的性能。
在几乎每一个研究和应用技术领域,从构建宇宙模型到产生明天的气象报告,计算机都是必要的工具,并且它们的应用本身就开辟了人们推测的新领域。
数据库服务和计算机网络使各种各样的信息源可供使用。
同样的先进技术也使侵犯个人隐私和商业秘密成为可能。
计算机犯罪已经成为作为现代技术代价组成部分的许多风险之一。
二、历史第一台加法机是法国科学家、数学家和哲学家布莱斯•帕斯卡于1642年设计的,它是数字计算机的先驱。
这个装置使用了一系列带有10个齿的轮子,每个齿代表从0到9的一个数字。
轮子互相连接,从而通过按照正确的齿数向前转动轮子,就可以将数字彼此相加。
17世纪70年代,德国哲学家和数学家戈特弗里德•威廉•莱布尼兹对这台机器进行了改良,设计了一台也能做乘法的机器。
法国发明家约瑟夫―玛丽•雅卡尔,在设计自动织机时,使用了穿孔的薄木板来控制复杂图案的编织。
在19世纪80年代期间,美国统计学家赫尔曼•何勒里斯,想出了使用类似雅卡尔的木板那样的穿孔卡片来处理数据的主意。
通过使用一种将穿孔卡片从电触点上移过的系统,他得以为1890年的美国人口普查汇编统计信息。
1、分析机也是在19世纪,英国数学家和发明家查尔斯•巴比奇,提出了现代数字计算机的原理。
他构想出旨在处理复杂数学题的若干机器,如差分机。
许多历史学家认为,巴比奇及其合伙人,数学家奥古斯塔•埃达•拜伦,是现代数字计算机的真正先驱。
巴比奇的设计之一,分析机,具有现代计算机的许多特征。
计算机专业英语教程(第4版)全书译文

1We have learned that all computers have similar capabilities and perform essentially the same functions, although some might be faster than others. We have also learned that a computer system has input, output, storage, and processing components; that th e processor is the “intelligence” of a computer system; and that a single computer system may have several processors. We have discussed how data are represented inside a computer system in electronic states called bits. We are now ready to expose the inner workings of the nucleus of the computer system — the processor.我们已经知道,所有的计算机都具有相似的能力,并且在本质上执行相同的功能,尽管一些可能会比另一些快一点。
我们也知道,一个计算机系统具有输入,输出,存储和处理部件;处理器是一个计算机系统智能核心,并且一个计算机系统可以有许多个处理器。
我们已经讨论过如何在计算机系统内部,用被称作“位”的电子状态来表现数据,现在我们要弄明白计算机系统的核心,即处理器,的内在的工作方式。
The internal operation of a computer is interesting, but there really is no mystery to it. The mystery is in the minds of those who listen to hearsay and believe science-fiction writer. The computer is a nonthinking electronic device that has to be plugged into an electrical power source, just like a toaster or a lamp.计算机的内部操作很有意思,但确实没有什么神秘可言。
计算机英语 刘艺 王春生 第4版

III Star/Extended Star Topology
• So+do+主语 • So+主语+do
III Star/Extended Star Topology
• So+do+主语 so代表上句中陈述的肯定内容。do可以是 连系动词、情态动词或助动词,且必须与 上句中的谓语动词保持时态的一致,意思 为“…也是如此”。 如:He can speak English very well. So can she. (=She can speak English very well, too.) 她英语也讲得很好。 • So+主语+do
III Star/Extended Star Topology
• In this case, the extended star topology is all but necessary to prevent degraded signals.
• 在这种情况下,【为防止信号衰减】,扩 展星型拓扑结构几乎是必需的。
V. Mesh Topology
• After all, what are the odds a network will fail in multiple times near the same device?
• 毕竟,一个网络在同一个设备附近多次出 故障的可能性有多大呢?
• 虚拟语气是一种特殊的动词形式,表示所 说的话不是一个事实,而只是一种假设、 愿望、建议、怀疑、猜测或不大可能实现 的空想。
• 虚拟语气用在条件状语从句中,通常从句 由连词if 引导。
II Ring Topology
虚拟条件状语从句 a. 与现在事实相反的假设 条件从句用一般过去时(be用were),主 句用should(would/might/could)+动词原形 如:If they were here, they would help you. 如果他们在这儿,会帮助你的。 含义:They are not here, they can’t help you.
计算机英语 刘艺 王春生 第4版Unit 11A

从法律上讲,你通过雇主的计算机网络发送的任何电子 邮件都属于雇主。因此,你的雇主有权阅读你的电子邮 件而无需你知道或得到你的允许。另外,删除的电子邮 件可从公司的服务器上恢复,而且它们可用于法律案件。
11
Cyberculture— Introduction
Increasingly, harassment and discrimination cases hinge on evidence found in e-mails. Careless e-mails about personal relationships or appearances can be saved and used against the sender in a court case. Indiscreet comments about gender, race, or sexual orientation can also have unexpected consequences. Your "harmless" dirty jokes sent to your coworkers might end up being used by a lawyer to prove that you are creating a "hostile workplace environment."
Cyberculture— Introduction
You should also keep in mind that legal constraints shape how e-mail is used in the workplace. E-mail, like any other written document, is protected by copyright law. So, you need to be careful not to use e-mails in any way that might violate copyright law. For example, if you receive an e-mail from a client, you cannot immediately post it to your company's website without that client's permission.
计算机英语 刘艺 王春生 第4版 Unit 8B

• Each level in the hierarchy has representatives at both the origin and the destination, with the representatives at the destination tending to do the reverse of their counterparts at the origin. • 分层结构中的每一层在起始地点和目的地 均有代表,在目的地的代表所做的工作往 往与在起始地点的代表所做的工作相反。 • counterparts:与对方地位相当的人, 与另一 方作用相当的物
• This is handled by assigning unique port numbers to the various units and requiring that the appropriate port number be appended to a message’s address before starting the message on its journey. • 这由以下方法处理:给各个单元分配一个 独特的端口号 ,且要求在报文开始旅途前 (报文发送前)将适当的端口号附加到报 文地址上。
• 这种分隔是必要的,因为一个长报文能阻 塞在因特网站点上的其他报文流,(在因 特网的站点)其上许多报文必须路径相交 。
• ..., the packets are treated as individual, unrelated messages until they reach the transport layer at their final destination. • 直到它们到达最终目的地的传输层,分组 都被作为独立的,无关系的报文来对待。
新编计算机英语课文翻译 王春生 刘艺

在计算机科学中,操作系统是控制计算机的基本软件。
它具有三个主要功能:协调和操纵计算机硬件,如计算机内存、打印机、磁盘、键盘、鼠标和监视器;组织各种存储介质上的文件,如软盘、硬盘、光盘(CD)、数字视盘(DVD)和磁带以及管理硬件错误和数据丢失。
在以掌上电脑和电子游戏机为典型代表的一些计算机中,整个操作系统小到可存储在只读存储器(ROM)中。
对几乎所有的个人电脑、服务器、工作站、大型机以及超级计算机而言,操作系统程序相当大,因此大部分存储在硬盘上。
操作系统的小型引导程序存储在只读存储器上,并在系统启动时提供必要的指令,用于将操作系统的核心装入内存。
操作系统的这个核心部分称为内核,它提供最基本的操作系统服务,如内存管理和文件存取。
在计算机运行的整个时间内,内核一直驻留在内存中。
操作系统的其他部分,如定制实用程序,需要时才装入内存。
二、操作系统如何工作操作系统控制不同的计算机进程,如运行电子表格程序或从计算机内存中存取信息。
一个重要的进程是解释命令,使得用户可以和计算机通信。
一些命令解释器是面向文本的,需要键入命令或通过键盘上的功能键选择命令。
另一些命令解释器使用图形,并允许用户通过指点图标进行通信。
图标是屏幕上的图片,代表特定的命令。
初学者一般会发现面向图形的解释器比较容易使用,但许多有经验的计算机用户更喜欢面向文本的命令解释器,因为它们功能更强。
操作系统可以是单任务的,也可以是多任务的。
较早的单任务操作系统每次只能运行一个进程。
例如,计算机打印文档时,直到打印结束才能开始另外一个进程或响应新的命令。
所有的现代操作系统都是多任务的,可以同时运行数个进程。
然而,在大多数计算机中仅有一个中央处理器(计算机的计算和控制单元),因此多任务操作系统制造了数个进程同时在一个中央处理器上运行的错觉。
制造这种错觉最常用的机制是分时段的多任务处理,靠这种方法每个进程单独运行一段固定的时间。
如果一个进程在分配的时间内没有完成,它就暂停,让另外一个进程运行。
《计算机专业英语(第4版)》Unit 1 Hardware Knowledge

2023/12/28
计算机专业英语第4版
14
• Gates stepped down as chief executive officer of Microsoft in January 2000.
• He remained as chairman and created the position of chief software architect.
• In June 2006, Gates announced that he would be transitioning from full-time work at Microsoft to part-time work, and full-time work at the Bill & Melinda Gates Foundation.
four basic units of simplified computer: the input unit, central processing unit (CPU), memory unit, and output unit.
2023/12/28
计算机专业英语第4版
20
2023/12/28
2023/12/28
计算机专业英语第4版
19
1.2 Computer Development
1.2.1 Text A • The hardware of a digital computer system
计算机英语 刘艺 王春生 第4版Unit 10B

2.
The approaches to combat computer viruses
Virus
dictionary Heuristic analysis
Data captures, port monitoring, other methods
回顾
现在分词作后置定语 被修饰的名词与作定语的动词为主动关系, 表示该动作正在进行或于主句动作同时发生 ,或是经常性行为时,用现在分词做定语。
regular update virus dictionary
3)
Shortcoming
4)
Whitelisting – new method
控制、抑制 Although the dictionary approach can effectively contain virus outbreaks in the right circumstances, virus authors have tried to stay a step ahead of such software by writing "oligomorphic", "polymorphic" and more recently "metamorphic" viruses, which encrypt parts of themselves or otherwise modify themselves as a method of disguise, so as to not match the virus's signature in the dictionary.
…, it could try to emulate the beginning of the code of each new executable that the system invokes before transferring control to that executable. 在将控制权转交给该可执行文件之前,它 可试图模拟系统激活的每个新的可执行文 件一开始的代码。 它先可以试图模拟系统激活的每个新的可 执行文件一开始的代码,之后将控制权转 交给该可执行文件。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Ⅱ. Protocols
As an introduction to the protocol concept, let us consider the problem of coordinating the transmission of messages among computers in a network. Without rules governing this communication, all the computers might insist on transmitting messages at the same time or might fail to relay messages when that assistance is required.
As the simple terminals employed by these users grew into small computers themselves, a star network emerged. A point to emphasize is that the connections between machines in a network do not need to be physical. Wireless networks, using radio broadcast technology, are becoming quite common.
从...逐渐形成(发展成)
还有一种网络分类方法,它基于网络的拓扑结构,即计算机相互连接的模式。 总线拓扑结构、环形拓扑结构和星形拓扑结构是3种流行的拓扑结构。其中,星 形网络或许是最古老的,这种网络由一台大型中央计算机服务许多用户的范式演 变而来。
Ⅰ. Network Classifications
on the contrary
相反,像Novell股份有限公司这样的公司可能选择为其开发的系统保留所有 权,允许公司通过出售或出租这些产品获得收入。基于这类系统的网络属于 封闭式网络的例子。
Ⅰ. Network Classifications
Still another way of classifying networks is based on the topology of the network, which refers to the pattern in which the machines are connected. The bus topology, ring topology, and star topology are three popular topologies. Of these, the star network is perhaps the oldest, having evolved from the paradigm of a large central computer serving many users.
支持这类应用所需的基本软件,已经从简单的实用软件包发展成一个不断扩 展的网络软件系统,该系统提供了一个复杂的网络范围的基础结构。从某种 意义上说,网络软件正在演变成一个网络范围的操作系统。
Ⅰ. Network Classifications
A computer network is often classified as being either a local area network (LAN) , a metropolitan area network (MAN), or a wide area network (WAN). A LAN normally consists of a collection of computers in a single building or building complex. For example, the computers on a university campus or those in a manufacturing plant might be connected by a LAN. n 综合体,集合体
随着这些用户所使用的简单终端本身发展成小型计算机,星形网络也就出现 了。需要强调的一点是,在一个网络中,计算机之间的连接并不一定是物理 连接。使用无线广播技术的无线网络正在变得相当常见。
Ⅱ. Protocols
指导、实施、处理
For a network to function reliably, it is important to establish rules by which network activities are conducted. Such rules are called protocols. By developing and adopting protocol standards, venders are able to build products for network applications that are compatible with products from other venders. Thus, the development of protocol standards is an indispensable process in the development of networking technologies.
Unit 8 Computer Network
Section A Network Fundamentals
The need to share information and resources among different computers has led to linked computer systems, called networks, in which computers are connected so that data can be transferred from machine to machine. In these networks, computer users can exchange messages and share resources such as printing capabilities, software packages, and data storage facilities-that are scattered throughout the system.
因特网属于开放式系统。尤其是,整个因特网的通信是由一组称为 TCP/IP协议组的开放标准来控制的。任何人都可以自由地使用这些标准,而 不需要付费或签署许可协议。
Ⅰ. Network Classifications
In contrast, a company such as Novell Inc. might develop systems for which it chooses to maintain ownership rights, allowing the company to draw income from selling or leasing these products. Networks based on such systems are examples of closed networks.
城域网属于中型网络,如一个覆盖某一社区的网络。广域网连接地理范围更广 的计算机,这些计算机或许在相邻的城市,或许在地球相反的两面。
Ⅰ. Networother means of classifying networks is based on whether the network's internal operation is based on designs that are in the public domain or on innovations owned and controlled by a particular entity such as an individual or a corporation. A network of the former type is called an open network; a network of the latter type is called a closed, or sometimes a proprietary network.
V. 转述、转播 n.帮助、援助、支持
作为对协议概念的介绍,让我们考虑在一个网络的计算机之间协调报文传 输的问题。如果没有控制这种通信的规则,所有的计算机就可能坚持同时传输 报文,或者在需要传递报文时而未能传递。
Ⅱ. Protocols
One approach to solving this problem is the token ring protocol, which was developed by IBM in the 1970s and continues to be a popular protocol in networks based on the ring topology. In this protocol, all the machines in the network transmit messages in only one common direction(Fig. 8A1), meaning that all messages sent over the network move around the ring in the same direction by being forwarded from computer to computer.
网络分类的另一种方式是根据网络的内部运行是基于无专利权保护的设计 还是基于特定实体(如个人或公司)所拥有和控制的革新。前一种类型的网络 称为开放式网络,后一种类型的网络称为封闭式网络,有时也称为专有网络。