【2019年整理】计算机专业英语第10章
计算机英语的课文翻译第十单元 计算机病毒及防护

第十单元计算机病毒及防护Part A计算机病毒计算机病毒是一种人为设计的、故意袭击计算机的可执行程序。
因病毒性质不同,它可能破坏硬盘内容,并且或影响计算机的正常运行。
病毒程序能自我复制。
这就意味着通过自身复制,计算机上的病毒会成倍增加。
这种复制是有意图的;它是病毒程序的一部分。
在大多数情况下,如果感染病毒的文件被执行或被复制到另一台计算机,那么那台计算机也会被同一病毒感染。
病毒程序包含一些指令,这些指令会造成负面的影响,导致计算机遭受从无害到瘫痪的后果。
比如:●文件和数据被删除;●计算机安装程序或应用软件缓慢;●计算机屏幕上的内容和图像发生扭曲,并且会出现奇怪的图像和文本;●磁盘空间和文件名会无缘无故被更改;●系统工具如磁盘扫描程序会丧失功能。
病毒可能会随着任何的软件程序进入计算机系统。
对于因特网用户来说,这种威胁可能来自于通过文件传输协议下载文件,或查阅邮件附件。
一旦病毒进入计算机系统,它会粘附于,或有时甚至替代现存程序。
接着,当用户启动有问题的程序时,病毒也就被执行。
这通常发生在用户无意识的情况下。
一旦计算机被病毒感染,最好的挽救办法是购买杀毒软件包如Norton或McAfee并安装设置及时更新系统。
这些软件包可能不能保证计算机免于最新病毒的侵袭,但是提供了最为可能的解决方法。
你应该经常尝试以下操作:●安装杀毒软件并保持更新。
●定制杀毒软件增强保护。
病毒保护页面有许多链接指导你如何获取、安装和定制病毒扫描杀毒软件。
●安装个人防火墙并保持更新。
●备份重要的文档和数据。
●不要打开或浏览不知来源的邮件。
●警惕收到的邮件附件。
如果你不知道它的来源,删除该信息。
●不要从不信任的来源处下载文件。
●为你的操作系统获取最新补丁和更新材料。
《计算机英语》课件Chapter 10 Internet

10.1 Internet
A majority of widely accessible information on the Internet consists of inter-linked hypertext documents and other resources of the World Wide Web (WWW).
10.5 Domain Name System
The Domain Name System (DNS) is a hierarchical naming system for computers, services, or any resource participating in the Internet.
S afari
O pera
F irefox
IE
பைடு நூலகம்
F igu re 10 -6 W eb b row sers
N etscape N avigator
10.3.2 The World Wide Web
Through keyword-driven Internet research using search engines like
Bcc. Stands for “blind carbon copy”. This is similar to the Cc: feature, except that Bcc: recipients are invisible to all of the other recipients of the message.
《计算机英语》课件Chapter 10 Internet
Chapter 10 Internet
Objective After reading this chapter, you should be able to: Master Internet, Web, TCP/IP, E-mail, FTP, and Telnet terms. Know how to access the Internet. Know how to send E-mail. Explain IP address, DNS, Search Engines. Describe Some of Web utilities.
计算机专业英语教程课件-Unit 10 Compilers Principles

New Words and Phrases
❖ nontrivial:非平凡的 ❖ optimization:n.最佳化;
最优化
❖ overemphasize:v.过分强 调
❖ parallel:adj.平行的 ❖ prevalence:n.流行,普遍 ❖ prioritize:v.给…优先处理 ❖ rearrange:v.重新排列
Unit 10
Compilers’ Principles
New Words and Phrases
❖ automatically:adv.自动地 ❖ compiler:n.自动编码器;
编辑人 ❖ complex:adj.复杂的;n.
合成物 ❖ compilation:n.聚集;编辑
物 ❖ dynamically:adj.有力的;
❖ misnomer:n.误称;用词 不当
❖ magnitude:n.广大,重要 性
❖ multicore:adj.多心的;多 核的
❖ mathematical:adj.数学上 的,精确的
❖ matrix:n.模型,矩阵
❖ minimize:v.使减到最少
❖ multiple:adj.多样的;复 合的
有一个好的了解后才能开始,而且要有全
The optimization must be correct, th preserve the meaning of the
compiled program,
面的实验和评估来验证我们的直觉。编译
The optimization must improve the performance of manyprogra
❖ simultaneously:adv.同时 发生地
计算机英语章节知识点unit10

Unit Ten1networks have been split between wide area networks (WANs)and local area networks (LANs)between---- and :常用于difference, divide choose 和spilt 等词之后I asked him whether there was much difference between British and European law .我问他是否英国法律和欧洲法律有明显的不同。
2.A WAN is a network connected over long-distance telephone lines.Over :穿过,越过,翻到-----另一边Electricity cables stretch over the fields . 电缆穿过了田野。
3.It is now possible to connect up LANs remotely over telephone links so that they look as a single LAN.It 是形式主语,真正的主语是动词不定式connect upSo that : 以便(表示目的)connect up:连接。
Connect up the cells of a battery .联接电池组的各个电池。
4 at least : at any lowest estimate or figure .至少。
It will cost at least five pounds .3 a device that lets the computer talk to the network在make ,let ,have ,see, hear ,watch ,notice ,feel, 等动词后的复合宾语,不定式都不带to,I often hear them sing this song .5 The name TCP/IP refers to a suite of data communication protocols.a suite of: suit [swi:t] 作名词。
19- Internet Infrastructure(计算机专业英语(第二版))

Internet Infrastructure
Warm-up Exercises
1. Where does the name "Internet" comes from? 2. Who owns the Internet?
interconnected 互相连接的 host computer 主机 oversee 监督,审Internet Service Provider (ISP) 因特网服务提供者 local area network (LAN)局域网 Point of Presence (POP) 电话接入网点 Network Access Points (NAPs) 网络接入点
agree to all intercommunicate with each other at the NAPs.
In this way, every computer on the Internet connects to every other.
Key Terms
ISP ISP(Internet service provider) is a company which provides other companies or individuals with access to, or presence on, the Internet. Most ISPs are also Internet Access Providers; extra services include help with design, creation and administration of World-Wide Web sites, training, and administration of intranets. POP (point of presence) is a site where there exists a collection of telecommunications equipment, usually modems, digital leased lines and multiprotocol routers. An Internet access provider may operate several PoPs distributed throughout their area of operation to increase the chance that their subscribers will be able to reach one with a local telephone call. The alternative is for them to use virtual PoPs (virtual points of presence) via some third Party.
《计算机专业英语》第10章在线测试

《计算机专业英语》第10章在线测试《计算机专业英语》第10章在线测试《计算机专业英语》第10章在线测试剩余时间:59:56答题须知:1、本卷满分20分。
2、答完题后,请⼀定要单击下⾯的“交卷”按钮交卷,否则⽆法记录本试卷的成绩。
3、在交卷之前,不要刷新本⽹页,否则你的答题结果将会被清空。
第⼀题、单项选择题(每题1分,5道题共5分)1、The abbreviation HTTP stands for Hypertext ________ Protocol.A、TransferB、TransportationC、TransmissionD、Transition2、To access a page on the WWW, one needs a ________ that usually consists of three parts: a controller, a method, and an interpreter.A、routerB、codeC、passwordD、browser3、_____ is an architectural framework.A、httpB、wwwC、ftpD、dns4、_____ is built around hypertext and hypermedia.A、DNSB、HTTPC、The WebD、FTP5、__________is a network protocol used to transfer data from one computer to another through a network such as t he Internet.A、SMTPB、HttpC、DNSD、FTP第⼆题、多项选择题(每题2分,5道题共10分)1、Hypermedia include ( )A、soundsB、video clipsC、textD、flashE、vidoeF、images2、The World Wide Web also subsumes previous Internet information systems such as ( ).A、GopherB、TelnetC、FTPD、Ftp3、The Internet carries various information resources and services, such as ______________________________ and the inter-linked hypertext documentsA、electronic mailB、online chatC、file transferD、file sharingE、online gamingF、talking4、The World Wide Web is a huge set of ________, linked by hyperlinks and URLs.A、interlinked documentsB、imagesC、flashD、all kinds of dataE、pages5、The web browsers which is normal used, such as________________.A、Internet ExplorerB、FirefoxC、Apple SafariD、OpraE、ICQ第三题、判断题(每题1分,5道题共5分)1、It was estimated that at this rapid growth everyone in the world would have an e-mail address in the near future.正确错误2、The World Wide Web is an architectural framework.正确错误3、The World Wide Web ties the information together into a big collection of interactive multimedia resources.正确错误4、Hypertext extends the concept of hypermedia to other forms of information.正确错误5、Previously the Web provides a wealth of additional capabilities.正确错误交卷恭喜,交卷操作成功完成!你本次进⾏的《计算机专业英语》第10章在线测试的得分为20分(满分20分),本次成绩已⼊库。
2019年计算机英语___各章重点.doc

Lesson 1PCI (Peripheral Component Interconnect) 外部设备接口AGP (Accelerated Graphics Port) 加速图形接口IEEE (Institute of Electrical & Electronic Engineers) 电器与电子工程协会DVD-ROM (Digital Versatile Disc,Read-Only Memory) 数字视频只读光盘USB (Universal Serial Bus) 通用串行总线CMOS (Complementary Metal Oxide Semiconductor) 互补金属氧化物半导体LAN (Local Area Network) 局域网Commercial software 商业软件Virtual memory 虚拟内存Parallel 并行接口Motherboard 主板The BIOS looks at the sequence of storage devices identified as boot devices in the CMOS Setup..“Boot ”is short for “bootstrap”, as in the old phrase “Lift yourself up by your bootstraps”. BIOS把指定的存储设备序列课程CMOS Setup中的引导设备,“Boot”是“bootstrap”的缩写,像老短语“自我提升”的意思。
Lesson 2TFT (Thin-Film Transistor) 薄膜晶体管LCD (Liquid Crystal Display) 液晶显示屏CRT (Cathode Ray Tube) 阴极射线管DLP (Digital Light Processing) 数字光处理技术PDP (Plasma Display Panel) 等离子显示器Plasma display 等离子显示Distortion 失真Smearing 拖尾效应Arcade machine 游戏机Redraw 刷新屏幕Aspect ratio 纵横比Odd-numbered lines 奇数行even-numbered lines 偶数行Tube 显像管A visual display unit ,often called simply a monitor or display , is a piece of electrical equipment which displays images generated from the video output of devices such as computers without producing a permanent a permanent record.可视显示单元通常简单地被称为监视器或显示器,它是一个电子设备,用来显示由视频输出设备(如计算机)产生的图像,但不会产生一个持久的记录。
《计算机英语》Unit 10

1.2 Computer Virus
• II. Choose the best answer to each of the following questions.
1.1 Computer Security
• II. Choose the best answer to each of the following questions.
C
– 1.What is the primary difference of computer security from some other computer science fields? – A.Its varied objectives – B.Its positive enforceable rules – C.Its negative requirements – D.Its impractical for most computer programs
1.1 Computer Security
1. Introduction
2. Security Architecture 3. Hardware Mechanisms that Protect Computers and Data 4. Secure Operating Systems 5. Secure Coding 6. Applications
1.1 Computer Security
• II. Choose the best answer to each of the following questions. B – 3.Which of the following is NOT argued in the instances of computer security accidents in aviation? – A.Human error – B.Computer malfunction – C.Hackers intruding – D.Electromagnetic interference
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
modification 修改
fabricate v. 伪造
tamper v. 篡改
spurious adj. 假的
Abbreviations:
计算机专业英语
10-4
Chapter 10 Computer and Network Security
10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches
involve 包含,涉及,也可不译
depositor 寄托者
vulnerability 弱点,攻击
perimeter 周围,周边 penetrate vt. 攻破,攻击
Exposure 曝光,揭露 threat n. 威胁,恐吓
asset 资产
interruption 中断,打断
interception 截取
10.1.1 入侵计算机的特点
Principle of Easiest Penetration. An intruder must be expected to use any available means of penetration. This will not necessarily be the most obvious means, nor will it necessarily be the one against which the most solid defense has been installed.
最容易攻破原理。入侵者必定要使用一种可以攻破的方法,这种方法既不 可能是最常用的,也不可能是针对已经采取了最可靠的防范措施的方法。
This principle says that computer security specialists must consider all possible means of penetration, because strengthening one may just make another means more appealing to intruders. We now consider what these means of penetration are.
计算机专业英语
10-3
Chapter 10 Computer and Network Security
10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches
New Words & Expressions:
breach 破坏,缺口
Difficult points: distinguish between four
kinds of computer security breaches
计算机专业英语
10-2
Chapter 10 Computer and Network Security
Requirements:
1. Principle of easiest penetration 2. The kinds of computer security breaches 3. What is firewall 4. 了解科技论文标题的写法
10.1.2 KINDS OF SECURITY BREACHES
In security, an exposure is a form of possible loss or harm in a computing system; examples of exposures are unauthorized disclosure of data, modification of data, or denial of legitimate access to computing . A vulnerability is a weakness in the security system that might be exploited to cause loss or harm.
10.1.2 KINDS OF SECURITY BREACHES
A human who exploits a vulnerability perpetrates an attack on the system. Threats to computing systems are circumstances that have the potential to cause loss or harm; human attacks are examples of threats, as are natural disasters, inadvertent human errors, and internal hardware or software flaws. Finally, a control is a protective measure-an action, a device, a procedure, or a technique-that reduces a vulnerability.
这一原理说明计算机安全专家必须考虑所有可能的攻击方法。由于你加强
了某一方面,入侵者可能会想出另外的对付方法。我们现在就说明这些攻
击的方法是什么。
计算机专业英语
10-5
Chapter 10 Computer and Network Security
10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches
在计算机系统中,暴露是一种使安全完全丧失或受到伤害的一种形式; 暴露的例子是非授权的数据公开、数据修改或拒绝合法的访问计算机。 脆弱性是安全系统中的薄弱环节,它可能引起安全的丧失或伤害。
计算机专业英语
10-6
Chapter 10y
10.1 Characteristics of Computer Intrusion and Kinds of Security Breaches
Computer English
Chapter 10 Computer and Network Security
Chapter 10 Computer and Network Security
Key points: useful terms and definitions
of computer security