【计算机专业文献翻译】计算机系统

合集下载

计算机英文文献加翻译

计算机英文文献加翻译

Management Information System Overview Management Information System is that we often say that the MIS, is a human, computers and other information can be composed of the collection, transmission, storage, maintenance and use of the system, system, emphasizing emphasizing the the management, management, management, stressed stressed stressed that that the modern information society In the increasingly popular. MIS is a new subject, it across a number of areas, such as scientific scientific management management management and and and system system system science, science, science, operations operations operations research, research, research, statistics statistics statistics and and and computer computer science. In these subjects on the basis of formation of information-gathering and processing methods, thereby forming a vertical and horizontal weaving, and systems. The 20th century, along with the vigorous development of the global economy, many economists have proposed a new management theory. In the 1950s, Simon made dependent on information management and decision-making ideas. Wiener published the same period of the control theory, that he is a management control process. 1958, Gail wrote: "The management will lower the cost of timely and accurate information to b etter control." During better control." During this period, accounting for the beginning of the computer, data processing in the term.1970, Walter T . Kenova just to the management information system under a definition of the . Kenova just to the management information system under a definition of the term: "verbal or written form, at the right time to managers, staff and outside staff for the past, present, the projection of future Enterprise and its environment-related information 原文请找腾讯3249114六,维^论~文.网 no no application application application model, model, model, no no mention mention of of computer applications. 1985, management information systems, the founder of the University of Minnesota professor of management at the Gordon B. Davis to a management information system a more complete definition of "management information system is a computer hardware and software resources, manual operations, analysis, planning , Control and decision -making model and the database - System. System. It It provides information to to support support enterprises enterprises or or organizations organizations of of the operation, management and decision-making function. "Comprehensive definition of this Explained Explained that that that the the the goal goal goal of of of management management management information information information system, system, system, functions functions functions and and and composition, composition, composition, but but also reflects the management information system at the time of level.With the continuous improvement of science and technology, computer science increasingly mature, the computer has to be our study and work on the run along. Today, computers are already already very low price, performance, but great progress, and it was used in many areas, the very low price, performance, but great progress, and it was used in many areas, the computer computer was was was so so so popular popular popular mainly mainly mainly because because because of of of the the the following following following aspects: aspects: aspects: First, First, First, the the the computer computer computer can can substitute for many of the complex Labor. Second, the computer can greatly enhance people's work work efficiency. efficiency. efficiency. Third, Third, Third, the the the computer computer computer can can can save save save a a a lot lot lot of of of resources. resources. resources. Fourth, Fourth, Fourth, the the the computer computer computer can can make sensitive documents more secure.Computer application and popularization of economic and social life in various fields. So that the original old management methods are not suited now more and social development. Many people still remain in the previous manual. This greatly hindered the economic development of mankind. mankind. In recent years, with the University of sponsoring scale is In recent years, with the University of sponsoring scale is growing, the number of students students in in in the the the school school school also also also have have have increased, increased, increased, resulting resulting resulting in in in educational educational educational administration administration administration is is is the the growing complexity of the heavy work, to spend a lot of manpower, material resources, and the existing management of student achievement levels are not high, People have been usin g the traditional method of document management student achievement, the management there are many shortcomings, such as: low efficiency, confidentiality of the poor, and Shijianyichang, will have a large number of of documents documents documents and and data, which is is useful useful for finding, finding, updating updating and maintaining Have brought a lot of difficulties. Such a mechanism has been unable to meet the development of the times, schools have become more and more day -to-day management of a bottleneck. bottleneck. In In In the the the information information information age age age this this this traditional traditional traditional management management management methods methods methods will will will inevitably inevitably inevitably be be computer-based information management replaced. As As part part part of of of the the the computer computer computer application, application, application, the the the use use use of of of computers computers computers to to to students students students student student student performance performance information for management, with a manual management of the incomparable advantages for example: example: rapid rapid rapid retrieval, retrieval, retrieval, to to to find find find convenient, convenient, convenient, high high high reliability reliability reliability and and and large large large capacity capacity capacity storage, storage, storage, the the confidentiality confidentiality of of of good, good, good, long long long life, life, life, cost cost cost Low. Low. Low. These These These advantages advantages advantages can can can greatly greatly greatly improve improve improve student student performance management students the efficiency of enterprises is also a scientific, standardized standardized management, management, management, and and and an an an important important important condition condition condition for for for connecting connecting connecting the the the world. world. world. Therefore, Therefore, the development of such a set of management software as it is very necessary thing.Design ideas are all for the sake of users, the interface nice, clear and simple operation as far as possible, but also as a practical operating system a good fault-tolerant, the user can misuse a timely manner as possible are given a warning, so that users timely correction . T o take full advantage advantage of the of the functions of visual FoxPro, design p owerful software powerful software at the same time, as much as possible to reduce the occupiers system resources. Visual FoxPro the command structure and working methods: Visual FoxPro was originally originally called called FoxBASE, FoxBASE, the the U.S. U.S. Fox Fox Software has introduced introduced a a database products, products, in in the run on DOS, compatible with the abase family. Fox Fox Software Software Microsoft acquisition, to be developed so that it can run on Windows, and changed its name to Visual FoxPro. Visual FoxPro is a powerful relational database rapid application development tool, tool, the the the use use use of of of Visual Visual Visual FoxPro FoxPro FoxPro can can can create create create a a a desktop desktop desktop database database database applications, applications, applications, client client client / / / server server applications applications and and and Web Web Web services services services component-based component-based component-based procedures, procedures, procedures, while while while also also also can can can use use use ActiveX ActiveX controls or API function, and so on Ways to expand the functions of Visual FoxPro.1651First, work methods 1. Interactive mode of operation (1) order operation VF in the order window, through an order from the keyboard input of all kinds of ways to complete the operation order. (2) menu operation VF use menus, windows, dialog to achieve the graphical interface features an interactive operation. (3) aid operation VF in the system provides a wide range of user-friendly operation of tools, such as the wizard, design, production, etc.. 2. Procedure means of implementation VF in the implementation of the procedures is to form a group of orders and programming language, an extension to save. PRG procedures in the document, and then run through the automatic implementation of this order documents and award results are displayed. Second, the structure of command 1. Command structure 2. VF orders are usually composed of two parts: The first part is the verb order, also known as keywords, for the operation of the designated order functions; second part of the order clause, for an order that the operation targets, operating conditions and other information . VF order form are as follows: 3. <Order verb> "<order clause>" 4. Order in the format agreed symbols 5. 5. VF in the order form and function of the use of the symbol of the unity agreement, the meaning of VF in the order form and function of the use of the symbol of the unity agreement, the meaning of these symbols are as follows: 6. Than that option, angle brackets within the parameters must be based on their format input parameters. 7. That may be options, put in brackets the parameters under specific requ ests from users choose to enter its parameters. 8. Third, the project manager 9. Create a method 10. command window: CREA T PROJECT <file name> T PROJECT <file name> 11. Project Manager 12. tab 13. All - can display and project management applications of all types of docume nts, "All" tab contains five of its right of the tab in its entirety . 14. Data - management application projects in various types of data files, databases, free form, view, query documents. 15. Documentation - display 原文请找腾讯原文请找腾讯3249114六,维^论~文.网 , statements, documents, labels and other documents. 16. Category - the tab display and project management applications used in the class library documents, including VF's class library system and the user's own design of the library. 17. Code - used in the project management procedures code documents, such as: program files (. PRG), API library and the use of project management for generation of applications (. APP). 18. (2) the work area 19. The project management work area is displayed and management of all types of document window. 20. (3) order button 21. Project Manager button to the right of the order of the work area of the document window to provide command. 22. 4, project management for the use of 23. 1. Order button function 24. New - in the work area window selected certain documents, with new orders button on the new document added to the project management window. 25. Add - can be used VF "file" menu under the "new" order and the "T ools" menu under the "Wizard" order to create the various independent paper added to the project manager, unified organization with management. 26. Laws - may amend the project has been in existence in the various documents, is still to use such documents to modify the design interface. 27. Sports - in the work area window to highlight a specific document, will run the paper.28. Mobile - to check the documents removed from the project. 29. 29. Even Even Even the the the series series series - - - put put put the the the item item item in in in the the the relevant relevant relevant documents documents documents and and and even even even into into into the the the application application executable file. Database System Design :Database design is the logical database design, according to a forthcoming data classification system and the logic of division-level organizations, is user-oriented. Database design needs of various departments of the integrated enterprise archive data and data needs analysis of the relationship between the various data, in accordance with the DBMS. 管理信息系统概要管理信息系统概要管理信息系统就是我们常说的MIS (Management Information System ),是一个由人、计算机等组成的能进行信息的收集、传送、储存、维护和使用的系统,在强调管理,强调信息的现代社会中它越来越得到普及。

计算机专业外文文献及翻译微软Visual Studio

计算机专业外文文献及翻译微软Visual Studio

计算机专业外文文献及翻译微软Visual Studio 微软 Visual Studio1 微软 Visual Studio Visual Studio 是微软公司推出的开发环境,Visual Studio 可以用来创建 Windows 平台下的Windows 应用程序和网络应用程序,也可以用来创建网络服务、智能设备应用程序和 Office 插件。

Visual Studio 是一个来自微软的集成开发环境 IDE(inteqrated development environment),它可以用来开发由微软视窗,视窗手机,Windows CE、.NET 框架、.NET 精简框架和微软的 Silverlight 支持的控制台和图形用户界面的应用程序以及 Windows 窗体应用程序,网站,Web 应用程序和网络服务中的本地代码连同托管代码。

Visual Studio 包含一个由智能感知和代码重构支持的代码编辑器。

集成的调试工作既作为一个源代码级调试器又可以作为一台机器级调试器。

其他内置工具包括一个窗体设计的 GUI 应用程序,网页设计师,类设计师,数据库架构设计师。

它有几乎各个层面的插件增强功能,包括增加对支持源代码控制系统(如 Subversion 和 Visual SourceSafe)并添加新的工具集设计和可视化编辑器,如特定于域的语言或用于其他方面的软件开发生命周期的工具(例如 Team Foundation Server 的客户端:团队资源管理器)。

Visual Studio 支持不同的编程语言的服务方式的语言,它允许代码编辑器和调试器(在不同程度上)支持几乎所有的编程语言,提供了一个语言特定服务的存在。

内置的语言中包括 C/C 中(通过Visual C)(通过 Visual ),C,中(通过 Visual C,)和 F,(作为Visual Studio2010),为支持其他语言,如 MPython和 Ruby 等,可通过安装单独的语言服务。

【计算机专业文献翻译】Java系统

【计算机专业文献翻译】Java系统

9.4 翻译The Java I/O SystemCreating a good input/output (I/O) system is one of the more difficult tasks for the language designer.This is evidenced by the number of different approaches. The challenge seems to be in covering all eventualities. Not only are there different sources and sinks of I/O that you want to communicate with (files, the console, network connections, etc.), but you need to talk to them in a wide variety of ways (sequential, random-SQLServer2000, buffered, binary, character, by lines, by words, etc.).The Java library designers attacked this problem by creating lots of classes. In fact, there are so many classes for Java’s I/O system that it can be intimidating at first (ironically, the Java I/O design actually prevents an explosion of classes). There was also a significant change in the I/O library after Java 1.0, when the original byte-oriented library was supplemented with char-oriented, Unicode-based I/O classes. In JDK 1.4, the nio classes (for “new I/O,” a name we’ll still be usi ng years from now) were added for improved performance and functionality. As a result, there are a fair number of classes to learn before you understand enough of Java’s I/O picture that you can use it properly. In addition, it’s rather important to unders tand the evolution history of the I/O library, even if your first reaction is “don’t bother me with history, just show me how to use it!” The problem is that without the historical perspective, you will rapidly become confused with some of the classes and when you should and shouldn’t use them.This chapter will give you an introduction to the variety of I/O classes in the standard Java library and how to use them.The File classBefore getting into the classes that actually read and write data to streams, we’ll look at a utility provided with the library to assist you in handling file directory issues.The File class has a deceiving name; you might think it refers to a file, but it doesn’t. It can represent either the name of a particular file or the names of a set of files in a directory. If it’s a set of files, you can ask for that set using the list( ) method, which returns an array of String. It makessense to return an array rather than one of the flexible container classes, because the number of elements is fixed, and if you want a different directory listing, you just create a different File object. In fact, “FilePath” would have been a better name for the class. This section shows an example of the use of this class, including the associated FilenameFilter interface.A directory listerSuppose you’d like to see a directory listing. The File object can be listed in two ways. If you call list( ) with no arguments, you’ll get the full list that the File object contains. However, if you want a restricted list—for example, if you want all of the files with an extension of .java—then you use a “directory filter,” which is a class that tells how to select the File objects for display.The DirFilter class “implements” the interface FilenameFilter. It’s useful t o see how simple the FilenameFilter interface is:public interface FilenameFilter {boolean accept(File dir, String name);}It says all that this type of object does is provide a method called accept( ). The whole reason behind the creation of this class is to provide the accept( ) method to the list( ) method so that list( ) can “call back” accept( ) to determine which file names should be included in the list. Thus, this structure is often referred to as a callback. More specifically, this is an example of the Strategy Pattern, because list( ) implements basic functionality, and you provide the Strategy in the form of a FilenameFilter in order to complete the algorithm necessary for list( ) to provide its service. Because list( ) takes a FilenameFilter object as its argument, it means that you can pass an object of any class that implements FilenameFilter to choose (even at run time) how the list( ) method will behave. The purpose of a callback is to provide flexibility in the behavior of code.DirFilte r shows that just because an interface contains only a set of methods, you’re not restricted to writing only those methods. (You must at least provide definitions for all the methods in an interface, however.) In this case, the DirFilter constructor is also created.The accept( ) method must accept a File object representing the directory that a particular file is found in, and a String containing the name of that file. You might choose to use or ignore either of these arguments, but you will probably at least use the file name. Remember that the list( ) method is calling accept( ) for each of the file names in the directory object to see which one should be included; this is indicated by the boolean result returned by accept( ).To make sure the element you’re working with is only the file name and contains no path information, all you have to do is take the String object and create a File object out of it, then call getName( ), which strips away all the path information (in a platform-independent way). Then accept( ) uses a regular expression matcher object to see if the regular expression regex matches the name of the file. Using accept( ), the list( ) method returns an array.Input and outputI/O libraries often use the abstraction of a stream, which represents any data source or sink as an object capable of producing or receiving pieces of data. The stream hides the details of what happens to the data inside the actual I/O device.The Java library classes for I/O are divided by input and output, as you can see by looking at the class hierarchy in the JDK documentation. By inheritance, everything derived from the InputStream or Reader classes have basic methods called read( ) for reading a single byte or array of bytes. Likewise, everything derived from OutputStream or Writer classes have basic methods called write( ) for writing a single byte or array of bytes. However, you won’t generally use these methods; they exist so that other classes can use them—these other classes provide a more useful interface. Thus, you’ll rarely create your stream object by using a single class, but instead will layer multiple objects together to provide your desired functionality. The fact that you create more than one object to create a single resulting stream is the primary re ason that Java’s stream library is confusing.It’s helpful to categorize the classes by their functionality. In Java 1.0, the library designers started by deciding that all classes that had anything to do with input would be inherited from InputStream, and all classes that were associated with output would be inherited from OutputStream.Types of InputStreamInputStream’s job is to represent classes that produce input from different sources. These sources can be:1.An array of bytes.2. A String object.3. A file.4. A “pipe,” which works like a physical pipe: You put things in at one end and they come outthe other.5. A sequence of other streams, so you can collect them together into a single stream.6.Other sources, such as an Internet connection. (This is covered in Thinking in EnterpriseJava.)Each of these has an associated subclass of InputStream. In addition, the FilterInputStream is also a type of InputStream, to provide a base class for "decorator" classes that attach attributes or useful interfaces to input streams. This is discussed later.Types of OutputStreamThis category includes the classes that decide where your output will go: an array of bytes (no String, however; presumably, you can create one using the array of bytes), a file, or a “pipe.”In addition, the FilterOutputStream provides a base class for "decorator" classes that attach attributes or useful interfaces to output streams.Adding attributes and useful interfacesThe use of layered objects to dynamically and transparently add responsibilities to individual objects is referred to as the Decorator pattern. (Patterns are the subject of Thinking in Patterns (with Java) at .) The decorator pattern specifies that all objects that wrap around your initial object have the same interface. This makes the basic use of the decorators transparent—you send the same message to an object whether it has been decorated or not. This is the reason for the existence of the “filter” classes in the Java I/O library: The abstract “filter” class is the base class for all thedecorators. (A decorator must have the same interface as the object it decorates, but the decorator can also extend the interface, which occurs in several of the “filter” classes).Decorators are often used when simple subclassing results in a large number of classes in order to satisfy every possible combination that is needed—so many classes that it becomes impractical. The Java I/O library requires many different combinations of features, and this is the justification for using the decorator pattern.There is a drawback to the decorator pattern, however. Decorators give you much more flexibility while you’re writing a program (since you can easily mix and match attributes), but they add complexity to your code. The reason that the Java I/O library is awkward to use is that you must create many classes—the “core” I/O type plus all the decorators—in order to get the single I/O object that you want.The classes that provide the decorator interface to control a particular InputStream or OutputStream are the FilterInputStream and FilterOutputStream, which don’t have very intuitive names. FilterInputStream and FilterOutputStream are derived from the base classes of the I/O library, InputStream and OutputStream, which is the key requirement of the decorator (so that it provides the common interface to all the objects that are being decorated).Reading from an InputStream with FilterInputStreamThe FilterInputStream classes accomplish two significantly different things. DataInputStream allows you to read different types of primitive data as well as String objects. (All the methods start with “read,” such as readByte( ), readFloat( ), etc.) This, along with its companion DataOutputStream, allows you to move primitive data from one place t o another via a stream. These “places” are determined by the classes in TableThe remaining classes modify the way an InputStream behaves internally: whether it’s buffered or unbuffered, if it keeps track of the lines it’s reading (allowing you to ask for line numbers or set the line number), and whether you can push back a single character. The last two classes look a lot like support for building a compiler (that is, they were probably added to support the construction of the Java compiler), so you proba bly won’t use them in general programming.You’ll need to buffer your input almost every time, regardless of the I/O device you’re connecting to, so it would have made more sense for the I/O library to make a special case (or simply a method call) for unbuffered input rather than buffered input.Writing to an OutputStream with FilterOutputStreamThe complement to DataInputStream is DataOutputStream, which formats each of the primitive types and String objects onto a stream in such a way that any DataInputStream, on any machine, can read them. All the methods start with “write,” such as writeByte( ), writeFloat( ), etc.The original intent of PrintStream was to print all of the primitive data types and String objects in a viewable format. This is different from DataOutputStream, whose goal is to put data elements on a stream in a way that DataInputStream can portably reconstruct them.The two important methods in PrintStream are print( ) and println( ), which are overloaded to print all the various types. The difference between print( ) and println( ) is that the latter adds a newline when it’s done.PrintStream can be problematic because it traps all IOExceptions (You must explicitly test the error status with checkError( ), which returns true if an error has occurred). Also, PrintStream doesn’t internationalize properly and doesn’t handle line breaks in a platform-independent way.Readers & WritersJava 1.1 made some significant modifications to the fundamental I/O stream library. When you see the Reader and Writer classes, your first thought (like mine) might be that these were meant to replace the InputStream and OutputStream classes. But that’s not the case. Although some aspectsof the original streams library are deprecated (if you use them you will receive a warning from the compiler), the InputStream and OutputStream classes still provide valuable functionality in the form of byte-oriented I/O, whereas the Reader and Writer classes provide Unicode-compliant,character-based I/O. In addition:1.Java 1.1 added new classes into the InputStream and OutputStream hierarchy, so it’s obviousthose hierarchies weren’t being replaced.2.There are times when you must use classes from the “byte” hierarchy in combination withclasses in the “character” hierarchy. To accomplish this, there are “adapter” classes:InputStreamReader converts an InputStream to a Reader and OutputStreamWriter converts an OutputStream to a Writer.The most important reason for the Reader and Writer hierarchies is for internationalization. The old I/O stream hierarchy supports only 8-bit byte streams and doesn’t handle the 16-bit Unicode characters well. Since Unicode is used for internationalization (and Java’s native char is 16-bit Unicode), the Reader and Writer hierarchies were added to support Unicode in all I/O operations. In addition, the new libraries are designed for faster operations than the old.As is the practice in this book, I will attempt to provide an overview of the classes, but assume that you will use the JDK documentation to determine all the details, such as the exhaustive list of methods.Sources and sinks of dataAlmost all of the original Java I/O stream classes have corresponding Reader and Writer classes to provide native Unicode manipulation. However, there are some places where the byte-oriented InputStreams and OutputStreams are the correct solution;in particular, the java.util.zip libraries are byte-oriented rather than char-oriented. So the most sensible approach to take is to try to use the Reader and Writer c lasses whenever you can, and you’ll discover the situations when you have to use the byte-oriented libraries, because your code won’t compile.Off by itself: RandomSQLServer2000FileRandomSQLServer2000File is used for files containing records of known size so that you can move from one record to another using seek( ), then read or change the records. The records don’t have to be the same size; you just have to be able to determine how big they are and where they are placed in the file.At first it’s a litt le bit hard to believe that RandomSQLServer2000File is not part of the InputStream or OutputStream hierarchy. However, it has no association with those hierarchies other than that ithappens to implement the DataInput and DataOutput interfaces (which are also implemented by DataInputStream and DataOutputStream). It doesn’t even use any of the functionality of the existing InputStream or OutputStream classes; it’s a completely separate class, written from scratch, with all of its own (mostly native) methods. The reason for this may be that RandomSQLServer2000File has essentially different behavior than the other I/O types, since you can move forward and backward within a file. In any event, it stands alone, as a direct descendant of Object.Essentially, a RandomSQLServer2000File works like a DataInputStream pasted together with a DataOutputStream, along with the methods getFilePointer( ) to find out where you are in the file, seek( ) to move to a new point in the file, and length( ) to determine the maximum size of the file. In addition, the constructors require a second argument (identical to fopen( ) in C) indicating whether you are just randomly reading (“r”) or reading and writing (“rw”). There’s no support for write-only files, which could suggest that RandomSQLServer2000File might have worked well if it were inherited from DataInputStream.The seeking methods are available only in RandomSQLServer2000File, which works for files only. BufferedInputStream does allow you to mark( ) a position (whose value is held in a single internal variable) and reset( ) to that position, but this is limited and not very useful.Most, if not all, of the RandomSQLServer2000File functionality is superceded in JDK 1.4 with the nio memory-mapped files.Input streams1. Buffered input fileTo open a file for character input, you use a FileInputReader with a String or a File object as the file name. For speed, you’ll want that file to be buffered so you give the resulting reference to the constructor for a BufferedReader. Since BufferedReader also provides the readLine( ) method, thisis your final object and the interface you read from. When you reach the end of the file, readLine( ) returns null so that is used to break out of the while loop.The String s2 is used to accumulate the entire contents of the file (including newlines that must be added since readLine( ) strips them off). s2 is then used in the later portions of this program. Finally, close( ) is called to close the file. Technically, close( ) will be called when finalize( ) runs, and this is supposed to happen (whether or not garbage collection occurs) as the program exits. However, this has been inconsistently implemented, so the only safe approach is to explicitly call close( ) for files.Section 1b shows how you can wrap System.in for reading console input. System.in is an InputStream, and BufferedReader needs a Reader argument, so InputStreamReader is brought in to perform the adaptation.2. Input from memoryThis section takes the String s2 that now contains the entire contents of the file and uses it to create a StringReader. Then read( ) is used to read each character one at a time and send it out to the console. Note that read( ) returns the next byte as an int and thus it must be cast to a char to print properly.3. Formatted memory inputTo read “formatted” data, you use a DataInputStream, which is a byte-oriented I/O class (rather than char-oriented). Thus you must use all InputStream classes rather than Reader classes. Of course, you can read anything (such as a file) as bytes using InputStream classes, but here a String is used. To convert the String to an array of bytes, which is what is appropriate for a ByteArrayInputStream, String has a getBytes( ) method to do the job. At that point, you have an appropriate InputStream to hand to DataInputStream.If you read the characters from a DataInputStream one byte at a time using readByte( ), any byte value is a legitimate result, so the return value cannot be used to detect the end of input. Instead, you can use the available( ) method to find out how many more characters are available. Here’s an example that shows how to read a file one byte at a time://: c12:TestEOF.java// Testing for end of file while reading a byte at a time.import java.io.*;public class TestEOF {// Throw exceptions to console:public static void main(String[] args)throws IOException {DataInputStream in = new DataInputStream(new BufferedInputStream(new FileInputStream("TestEOF.java")));while(in.available() != 0)System.out.print((char)in.readByte());}} ///:~Note that available( ) works differently depending on what sort of medium you’re reading from; it’s literally “the number of bytes that can be read without blocking.” With a file, this means the whole file, but with a different kind of stream this might not be true, so use it thoughtfully.You could also detect the end of input in cases like these by catching an exception. However, the use of exceptions for control flow is considered a misuse of that feature.4. File outputThis example also shows how to write data to a file. First, a FileWriter is created to connect to the file. You’ll virtually always want to buffer the output by wrapping it in a BufferedWriter (try removing this wrapping to see the impact on the performance—buffering tends to dramatically increase performance of I/O operations). Then for the formatting it’s turned into a PrintWriter. The data file created this way is readable as an ordinary text file.As the lines are written to the file, line numbers are added. Note that LineNumberInputStream is not used, because it’s a silly class and you don’t need it. As shown here, it’s trivial to keep track of your own line numbers.When the input stream is exhausted, readLine( ) re turns null. You’ll see an explicit close( ) for out1, because if you don’t call close() for all your output files, you might discover that the buffers don’t get flushed, so they’re incomplete.Output streamsThe two primary kinds of output streams are separated by the way they write data; one writes it for human consumption, and the other writes it to be reacquired by a DataInputStream. The RandomSQLServer2000File stands alone, although its data format is compatible with the DataInputStream and DataOutputStream.5. Storing and recovering dataA PrintWriter formats data so that it’s readable by a human. However, to output data for recovery by another stream, you use a DataOutputStream to write the data and a DataInputStream to recover the data. Of course, these streams could be anything, but here a file is used, buffered for both reading and writing. DataOutputStream and DataInputStream are byte-oriented and thus require the InputStreams and OutputStreams.If you use a DataOutputStream to write the data, then Java guarantees that you can accurately recover the data using a DataInputStream—regardless of what different platforms write and read the data. This is incredibly valuable, as anyone knows who has spent time worrying aboutplatform-specific data issues. That problem vanishes if you have Java on both platforms.When using a DataOutputStream, the only reliable way to write a String so that it can be recovered by a DataInputStream is to use UTF-8 encoding, accomplished in section 5 of the example using writeUTF( ) and readUTF( ). UTF-8 is a variation on Unicode, which stores all characters in two bytes. If you’re working with ASCII or mostly ASCII characters (which occupy only seven bits), this is a tremendous waste of space and/or bandwidth, so UTF-8 encodes ASCII characters in a single byte, and non-ASCII characters in two or three bytes. In addition, the length of the string is stored in the first two bytes. However, writeUTF( ) and readUTF( ) use a special variation of UTF-8 for Java (which is completely described in the JDK documentation for those methods) , so if youread a string written with writeUTF( ) using a non-Java program, you must write special code in order to read the string properly.With writeUTF( ) and readUTF( ), you can intermingle Strings and other types of data using a DataOutputStream with the knowledge that the Strings will be properly stored as Unicode, and will be easily recoverable with a DataInputStream.The writeDouble( ) stores the double number to the stream and the complementary readDouble( ) recovers it (there are similar methods for reading and writing the other types). But for any of the reading methods to work correctly, you must know the exact placement of the data item in the stream, since it would be equally possible to read the stored double as a simple sequence of bytes, or as a char, etc. So you must either have a fixed format for the data in the file, or extra information must be stored in the file that you parse to determine where the data is located. Note that object serialization (described later in this chapter) may be an easier way to store and retrieve complex data structures.6. Reading and writing random SQLServer2000 filesAs previously noted, the RandomSQLServer2000File is almost totally isolated from the rest of the I/O hierarchy, save for the fact that it implements the DataInput and DataOutput interfaces. So you cannot combine it with any of the aspects of the InputStream and OutputStream subclasses. Even though it might make sense to treat a ByteArrayInputStream as a random-SQLServer2000 element, you can use RandomSQLServer2000File only to open a file. You must assume a RandomSQLServer2000File is properly buffered since you cannot add that.The one option you have is in the second constructor argument: you can open a RandomSQLServer2000File to read (“r”) or read and write (“rw”).Using a RandomSQLServer2000File is like using a combined DataInputStream and DataOutputStream (because it implements the equivalent interfaces). In addition, you can see that seek( ) is used to move about in the file and change one of the values.With the advent of new I/O in JDK 1.4, you may want to consider using memory-mapped files instead of RandomSQLServer2000File.Piped streamsThe PipedInputStream, PipedOutputStream, PipedReader and PipedWriter have been mentioned only briefly in this chapter. This is not to suggest that they aren’t useful, but their value is not apparent until you begin to understand multithreading, since the piped streams are used to communicate between threads.Standard I/OThe term standard I/O refers to the Unix concept (which is reproduced in some form in Windows and many other operating systems) of a single stream of information that is used by a program. All the program’s input can come from stan dard input, all its output can go to standard output, and all of its error messages can be sent to standard error. The value of standard I/O is that programs can easily be chained together, and one program’s standard output can become the standard input fo r another program. This is a powerful tool.Reading from standard inputFollowing the standard I/O model, Java has System.in, System.out, and System.err. Throughout this book, you’ve seen how to write to standard output using System.out, which is already prewrapped as a PrintStream object. System.err is likewise a PrintStream, but System.in is a raw InputStream with no wrapping. This means that although you can use System.out and System.err right away, System.in must be wrapped before you can read from it.译文:Java I/O 系统对编程语言的设计者来说,创建一套好的输入输出(I/O)系统,是一项难度极高的任务。

英文文献及翻译(计算机专业)

英文文献及翻译(计算机专业)

NET-BASED TASK MANAGEMENT SYSTEM Hector Garcia-Molina, Jeffrey D. Ullman, Jennifer WisdomABSTRACTIn net-based collaborative design environment, design resources become more and more varied and complex. Besides common information management systems, design resources can be organized in connection with design activities.A set of activities and resources linked by logic relations can form a task. A task has at least one objective and can be broken down into smaller ones. So a design project can be separated into many subtasks forming a hierarchical structure.Task Management System (TMS) is designed to break down these tasks and assign certain resources to its task nodes.As a result of decomposition.al1 design resources and activities could be managed via this system.KEY WORDS:Collaborative Design, Task Management System (TMS), Task Decomposition, Information Management System1 IntroductionAlong with the rapid upgrade of request for advanced design methods, more and more design tool appeared to support new design methods and forms. Design in a web environment with multi-partners being involved requires a more powerful and efficient management system .Design partners can be located everywhere over the net with their own organizations. They could be mutually independent experts or teams of tens ofemployees. This article discusses a task management system (TMS) which manages design activities and resources by breaking down design objectives and re-organizing design resources in connection with the activities. Comparing with common information management systems (IMS) like product data management system and document management system, TMS can manage the whole design process. It has two tiers which make it much more f1exible in structure.The 1ower tier consists of traditional common IMSS and the upper one fulfills logic activity management through controlling a tree-like structure, allocating design resources and making decisions about how to carry out a design project. Its functioning paradigm varies in different projects depending on the project’s scale and purpose. As a result of this structure, TMS can separate its data model from its logic mode1.It could bring about structure optimization and efficiency improvement, especially in a large scale project.2 Task Management in Net-Based Collaborative Design Environment 2.1 Evolution of the Design EnvironmentDuring a net-based collaborative design process, designers transform their working environment from a single PC desktop to LAN, and even extend to WAN. Each design partner can be a single expert or a combination of many teams of several subjects, even if they are far away from each other geographically. In the net-based collaborative design environment, people from every terminal of the net can exchange their information interactively with each other and send data to authorized roles via their design tools. The Co Design Space is such an environment which provides a set of these tools to help design partners communicate and obtaindesign information. Code sign Space aims at improving the efficiency of collaborative work, making enterprises increase its sensitivity to markets and optimize the configuration of resource.2.2 Management of Resources and Activities in Net-Based Collaborative EnvironmentThe expansion of design environment also caused a new problem of how to organize the resources and design activities in that environment. As the number of design partners increases, resources also increase in direct proportion. But relations between resources increase in square ratio. To organize these resources and their relations needs an integrated management system which can recognize them and provide to designers in case of they are needed.One solution is to use special information management system (IMS).An IMS can provide database, file systems and in/out interfaces to manage a given resource. For example there are several IMS tools in Co Design Space such as Product Data Management System, Document Management System and so on. These systems can provide its special information which design users want.But the structure of design activities is much more complicated than these IM S could manage, because even a simple design project may involve different design resources such as documents, drafts and equipments. Not only product data or documents, design activities also need the support of organizations in design processes. This article puts forward a new design system which attempts to integrate different resources into the related design activities. That is task management system (TMS).3 Task Breakdown Model3.1 Basis of Task BreakdownWhen people set out to accomplish a project, they usually separate it into a sequence of tasks and finish them one by one. Each design project can be regarded as an aggregate of activities, roles and data. Here we define a task as a set of activities and resources and also having at least one objective. Because large tasks can be separated into small ones, if we separate a project target into several lower—level objectives, we define that the project is broken down into subtasks and each objective maps to a subtask. Obviously if each subtask is accomplished, the project is surely finished. So TMS integrates design activities and resources through planning these tasks.Net-based collaborative design mostly aims at products development. Project managers (PM) assign subtasks to designers or design teams who may locate in other cities. The designers and teams execute their own tasks under the constraints which are defined by the PM and negotiated with each other via the collaborative design environment. So the designers and teams are independent collaborative partners and have incompact coupling relationships. They are driven together only by theft design tasks. After the PM have finished decomposing the project, each designer or team leader who has been assigned with a subtask become a 1ow-class PM of his own task. And he can do the same thing as his PM done to him, re-breaking down and re-assigning tasks.So we put forward two rules for Task Breakdown in a net-based environment, incompact coupling and object-driven. Incompact coupling means the less relationship between two tasks. When two subtasks were coupled too tightly, therequirement for communication between their designers will increase a lot. Too much communication wil1 not only waste time and reduce efficiency, but also bring errors. It will become much more difficult to manage project process than usually in this situation. On the other hand every task has its own objective. From the view point of PM of a superior task each subtask could be a black box and how to execute these subtasks is unknown. The PM concerns only the results and constraints of these subtasks, and may never concern what will happen inside it.3.2 Task Breakdown MethodAccording to the above basis, a project can be separated into several subtasks. And when this separating continues, it will finally be decomposed into a task tree. Except the root of the tree is a project, all eaves and branches are subtasks. Since a design project can be separated into a task tree, all its resources can be added to it depending on their relationship. For example, a Small-Sized-Satellite.Design (3SD) project can be broken down into two design objectives as Satellite Hardware. Design (SHD) and Satellite-Software-Exploit (SSE). And it also has two teams. Design team A and design team B which we regard as design resources. When A is assigned to SSE and B to SHD. We break down the project as shown in Fig 1.It is alike to manage other resources in a project in this way. So when we define a collaborative design project’s task model, we should first claim the project’s targets. These targets include functional goals, performance goals, and quality goals and so on. Then we could confirm how to execute this project. Next we can go on to break down it. The project can be separated into two or more subtasks since there are at 1east two partners in a collaborative project. Either wecould separate the project into stepwise tasks, which have time sequence relationships in case of some more complex projects and then break down the stepwise tasks according to their phase-to-phase goals.There is also another trouble in executing a task breakdown. When a task is broken into severa1 subtasks; it is not merely “a simple sum motion”of other tasks. In most cases their subtasks could have more complex relations.To solve this problem we use constraints. There are time sequence constraint (TSC) and logic constraint (LC). The time sequence constraint defines the time relationships among subtasks. The TSC has four different types, FF, FS, SF and SS. F means finish and S presents start. If we say Tabb is FS and lag four days, it means Tb should start no later than four days after Ta is finished.The logic constraint is much more complicated. It defines logic relationship among multiple tasks.Here is given an example:“Task TA is separated into three subtasks, Ta, T b and Tc. But there are two more rules.Tb and Tc can not be executed until Ta is finished.Tb and Tc can not be executed both,that means if Tb was executed, Tc should not be executed, and vice versa. This depends on the result of Ta.”So we say Tb and Tc have a logic constraint. After finishing breaking down the tasks, we can get a task tree as Fig, 2 illustrates.4 TMS Realization4.1 TMS StructureAccording to our discussion about task tree model and task breakdown basis, we can develop a Task Management System (TMS)based on Co Design Space using Java language, JSP technology and Microsoft SQL 2000. The task management system’s structure is shown in Fig. 3.TMS has four main modules namely Task Breakdown, Role Management, Statistics and Query and Data Integration. The Task Breakdown module helps users to work out task tree. Role Management module performs authentication and authorization of access control. Statistics and Query module is an extra tool for users to find more information about their task. The last Data Integration Module provides in/out interface for TMS with its peripheral environment.4.2 Key Points in System Realization4.2.1 Integration with Co Design SpaceCo Design Space is an integrated information management system which stores, shares and processes design data and provides a series of tools to support users. These tools can share all information in the database because they have a universal Data Mode1. Which is defined in an XML (extensible Markup Language) file, and has a hierarchical structure. Based on this XML structure the TMS h data mode1 definition is organized as following.<?xml version= 1.0 encoding= UTF-8’?><!--comment:Common Resource Definitions Above.The Followingare Task Design--><!ELEMENT ProductProcessResource (Prcses?, History?,AsBuiltProduct*,ItemsObj?, Changes?, ManufacturerParts?,SupplierParts?,AttachmentsObj? , Contacts?, PartLibrary?,AdditionalAttributes*)><!ELEMENT Prcses (Prcs+) ><!ELEMENT Prcs (Prcses,PrcsNotes?,PrcsArc*,Contacts?,AdditionalAttributes*,Attachments?)><!ELEM ENT PrcsArc EMPTY><!ELEMENT PrcsNotes(PrcsNote*)><!ELEMENT PrcsNote EMPTY>Notes: Element “Pros” is a task node object, and “Process” is a task set object which contains subtask objects and is belongs to a higher class task object. One task object can have no more than one “Presses” objects. According to this definition, “Prcs”objects are organized in a tree-formation process. The other objects are resources, such as task link object (“Presage”), task notes (“Pros Notes”), and task documents (“Attachments”) .These resources are shared in Co Design database.文章出处:计算机智能研究[J],47卷,2007:647-703基于网络的任务管理系统摘要在网络与设计协同化的环境下,设计资源变得越来越多样化和复杂化。

计算机外文翻译外文文献英文文献数据库系统

计算机外文翻译外文文献英文文献数据库系统

外文资料原文Database Systems1.Introduction to Database SystemToday, more than at any previous time, the success of an organization depends on its ability to acquire accurate and timely data about its operation,to manage this data effectively,and to use it to analyze and guide its activities. Phrases such as the information superhighway have become ubiquitous,and information processing is a rapidly growing multibillion dollar industry 。

The amount of information available to us is literally exploding, and the value of data as an organizational asset is being widely recognized。

This paradox drives the need for increasingly powerful and flexible data management systems 。

A database is a collection of data , typically describing the activities of one or more related organizations . For example , a university database might contain information about the following .●Entities such as students ,faculty , courses ,and classrooms 。

计算机专业英语名词翻译

计算机专业英语名词翻译

第一章(计算机系统概论)digital computer 数字计算机decimal digits 十进制数字binary 二进制bit 位ASCII 美国国家信息交换标准代码computer system 计算机系统hardware system 硬件系统software system 软件系统I/O devices 输入输出设备central processing unit(CPU) 中央处理器memory 存储器application software 应用软件video game 计算机游戏system software 系统软件register 寄存器floating point data浮点数据Boolean布尔值character data字符数据EBCDIC扩充的二十一进制交换代码punched cards穿孔卡片magnetic tape磁带main memory主存vacuum tubes电子管magnetic drum磁鼓transistors晶体管solid-state devices固体器件magnetic cores磁芯integrated circuit(IC)集成电路silicon chip硅芯片multiprogramming多道程序设计timessharing分时分时技术minicomputers小型计算机mainframe大型计算机large-scaleintegrated(LSI)大规模集成very-large-scale integrated(VLSI)超大规模集成word processing文字处理eletronic spreedsheets电子表格database management programs数据库管理程序desktop publishing桌面印刷personalcomputer(PC)个人计算机microcomputer微型计算机storage capacities存储容量stand-alone computer独立计算机local area network(LAN)局域网peripheral devices外部设备assembly line流水线supercomputer巨型计算机第二章(计算机系统结构)memmory subsystem存储子系统I/O subsystem输入输出子系统bus总线system bus系统总线chip 芯片address bus地址总线instructions指令memory location存储单元data bus数据总线control bus控制总线local bus 局部总线microprocessor微处理器register set寄存器组arithmetic logic unit(ALU)运算器clock cycle时钟周期control unit控制器computer architecture计算机体系结构introduction format指令格式addressing modes寻址方式introduction set指令集internal memory内存main memory主存Random Access Memory(RAM)随机存取存储器Read Only Memory (ROM)只读存储器secondary storage副主存储器vitual memory虚拟存储器Dynamic RAM(DRAM)动态存储器refresh circuitry刷新电路Static RAM(SRAM)静态RAMcache memory高速缓冲存储器masked ROM掩膜ROMPROM可编程RAMEPROM可擦写PROMultraviolet light紫外线EEPROM or EEPROM电擦写PROMbasic input/output system(BIOS)基本输入输出系统flash EEPROM 快闪存储器memory hierarchy 存储器体系结构auxiliary memory 辅助存储器storage memory 存储容量keyboard 键盘alphanumeric key字母数字键function key 功能键cursor key 光标键numeric keypad 数字键mouse 鼠标touch screen触屏infrared ray红外线monitor 监视器display screen显示屏laser printer激光打印机ink-jet printer喷墨打印机dot-matrix printer点针式打印机modem调制解调器input-output interface(I/O interface)输入输出接口peripheral外部设备,外设interrupt中断program counter程序计数器vectored interrupt向量中断nonvectored interrupt非向量中断interrupt vector中断向量Direct Memory Acess(DMA)直接存储器存取timeout超时第三单元(计算机体系结构)parallel processing 并行操作serial operations 串行操作instructions stream 指令流data dream 数据流SISD 单指令单数据流SIMD 单指令多数据流MISD 多指令单数据流MIMD 多指令多数据流pipeline processing 流水线处理combinational circuit 组合电路multiplier 乘法器adder 加法器clock pulse 时钟脉冲vector processing 向量处理one-dimensional array 一维数组scalar processer 标量处理器vector instructions 向量指令CISC 复杂指令集计算机decoder 译码器RISC 精简指令集计算机backward compatibility 向下兼容第四单元(算法与数据结构)algorithm 算法parallel algotithm 并行算法primitive 原语syntax 语法semantics 语义pseudocode 伪码exhaustive search 穷举搜索divide-and-conquer algorithm 分治算法dynamic programming 动态规划bottom-up 自上而下top-down 自下而上array 数组one-dimensional array 一维数组pointer 指针program counter 程序计数器instruction pointer 指令指针list 列表linked list 链表singly-linked list 单向链表double-linked list 双向链表circularly-linked list 循环链表FIFO 先进先出LIFO 后进先出stack 栈push 压栈pop 出栈stack pointer 栈指针queue 队列tree 树root 根level 层次degree of a node 结点的度depth of a tree树的深度binary tree 二叉树traversal 遍历M-way search tree M向搜索树第五章(编程语言)Program 程序Program language 程序设计语言Software engineering 软件工程Pseudocode 伪码Flowchart 流程图Coding 编码Program testing 程序测试Desk-checking 手工检查Documentation 文档User documentation 用户文档Operator documentation 操作员文档Programmer documentation 程序员文档Machine language 机器语言Assembly languages 汇编语言High-level languages 高级语言RAD(rapid application development) 快速应用开发Natural language 自然语言Artificial intelligence(AI) 人工智能Compile 编译Assemble 汇编Source code 源代码Object code 目标代码Linker 连接器Executable file 可执行文件Object-oriented programming 面向对象的程序设计Object 对象Class 类ADT(abstract data type)抽象数据类型Member variable 成员变量Class variable 类变量Member function 成员函数Inheritance 继承Derived class 派生类Overload 超载Message 消息Static binding 静态绑定Dynamic binding 动态绑定Polymorphism 多态性Visual programming 可视化编程Markup language 标记语言HTML(hyper text markup language)超文本标记语言Hyperlink 超链接XML(extensible markup language) 可扩展标记语言Java virtual machine java虚拟机第六章(操作系统)Application software 应用软件System software 系统软件Utility software 实用软件Operating system(OS)操作系统Shell 操作系统的外壳程序Graphical user interface(GUI)图形用户界面Kernel 内核Serial processing 串行处理Job 作业Batch processing 批处理Simple batch systems 简单批处理系统Multiprogrammed batch systems 多道程序批处理系统Monitor 监控程序Scheduler 调度程序Multiprogramming 多道程序Multitasking 多任务Time-sharing systems 分时系统Uniprogramming 单道进程Process 进程Process management 进程管理Process control block 进程控制块Mutual exclusion 互斥Multiprocessing 多处理,多进程Distributed processing 分布式管理Concurrent processes 并发处理Deadlock 死锁Synchronize process同步处理Semaphore 信号量Reusable resource 可复用性资源I/O buffers 输入/输出缓冲区I/O channel 输入/输出通道Deadlock prevention 死锁预防Deadlock detection 死锁检测Deadlock avoidance 死锁避免Virtual memory 虚拟内存Logical reference 逻辑引用Real addresse 实地址Paging 分页Segmentation 分段Virtual address 虚拟地址Physical addresses 物理地址Real-time process 实时处理File management 文件管理Plug and play(PnP) 即插即用第七单元(应用软件)application software 应用软件word processing 字处理软件spreadsheet 电子表格personal finance 个人理财presentation graphic 演示图形database manager 数据库管理软件groupware 群件desktop accessory 桌面辅助工具browsers 浏览区desktop publishing 桌面印刷project management 项目管理CAD 计算机辅助设计CAM 计算机辅助制造multimedia authoring 多媒体发布animation 动画MIDI 乐器数字化接口speech synthesis 语音合成insertion point 插入点scroll bar 滚动条window 窗口menu bar 菜单栏pull-down menu 下拉式菜单Button 按钮toolbar 工具条dialog box 对话框default value 缺省值(默认值)macro 宏OLE 对象链接和嵌入clipboard 剪切板column 列row 行cell 单元格cell address 单元格地址cell pointer 单元格指针formula 公式function 函数bar chart 柱形图line chart 线图pie chart 圆饼图workflow software 工作流软件PIM 个人信息管理软件Web browser 浏览器World Wide Web 万维网home page 主页第八单元(数据库)DBMS 数据库管理系统instance 实例schema 模式physical schema 物理模式存储模式内模式logical schema 逻辑模式概念模式模式subschema 子模式外模式data independence 数据独立性physical data independence 物理数据独立性logical data independence 逻辑数据独立性data model 数据模型entity-relationship model 实体联系模型object-oriented model 面向对象模型semantic data model 语义数据类型functional data model 功能数据模型entity 实体entity set 实体集mapping cardinality 映射基数abstract data type 抽象数据类型attribute 属性relation 关系tuple 元组primary key 主键super key 超健candidate key 候选键foreign key 外键DDL 数据定义语言data dictionary 数据字典DML 数据操纵语言procedure DML 过程化DML nonprocedure DML 非过程化DMLSQL 结构化查询语言view 视图the relational algebra 关系代数the tuple relational calculus 元组关系演算atomicity 原子性consistency 一致性duration 持久性transaction 事物DBA 数据库管理员。

计算机操作系统英文论文

计算机操作系统英文论文

Introduction to the operating system of the new technology Abstract:the Operating System (Operating System, referred to as OS) is an important part of a computer System is an important part of the System software, it is responsible for managing the hardware and software resources of the computer System and the working process of the entire computer coordination between System components, systems and between users and the relationship between the user and the user. With the appearance of new technology of the operating system functions on the rise. Operating system as a standard suite must satisfy the needs of users as much as possible, so the system is expanding, function of increasing, and gradually formed from the development tools to system tools and applications of a platform environment. To meet the needs of users. In this paper, in view of the operating system in the core position in the development of computer and technological change has made an analysis of the function of computer operating system, development and classification of simple analysis and elaborationKey words: computer operating system, development,new technology Operating system is to manage all the computer system hardware resources include software and data resources; Control program is running; Improve the man-machine interface; Provide support for other application software, etc., all the computer system resourcesto maximize the role, to provide users with convenient, efficient, friendly service interface.The operating system is a management computer hardware and software resources program, is also the kernel of the computer system and the cornerstone. Operating system have such as management and configuration memory, decided to system resources supply and demand of priorities, control input and output devices, file system and other basic network operation and management affairs. Operating system is to manage all the computer system hardware resources include software and data resources; Control program is running; Improve the man-machine interface; Provide support for other application software, etc., all the computer system resources to maximize the role, to provide users with convenient, efficient, friendly service interface. Operating system is a huge management control procedures, including roughly five aspects of management functions, processes and processor management, operation management, storage management, equipment management, file management. At present the common operating system on microcomputer DOS, OS / 2, UNIX, XENIX, LINUX, Windows, Netware, etc. But all of the operating system with concurrency, sharing, four basic characteristics of virtual property and uncertainty. At present there are many different kinds of operating system, it is difficultto use a single standard unified classification. Divided according to the application field, can be divided into the desktop operating system, server operating system, the host operating system, embedded operating system.1.The basic introduction of the operating system(1)The features of the operating systemManagement of computer system hardware, software, data and other resources, as far as possible to reduce the work of the artificial allocation of resources and people to the machine's intervention, the computer automatically work efficiency into full play.Coordinate the relationship between and in the process of using various resources, make the computer's resources use reasonable scheduling, both low and high speed devices running with each other.To provide users with use of a computer system environment, easy to use parts of a computer system or function. Operating system, through its own procedures to by all the resources of the computer system provides the function of the abstract, the function of the formation and the equivalent of the operating system, and image, provide users with convenient to use the computer.(2)The development of the operating systemOperating system originally intended to provide a simple sorting ability to work, after updating for auxiliary more complex hardwarefacilities and gradual evolution.Starting from the first batch mode, also come time sharing mechanism, in the era of multiprocessor comes, the operating system also will add a multiprocessor coordination function, even the coordination function of distributed systems. The evolution of the other aspects also like this.On the other hand, on a personal computer, personal computer operating system of the road, following the growth of the big computer is becoming more and more complex in hardware, powerful, and practice in the past only large computer functions that it step by step.Manual operation stage. At this stage of the computer, the main components is tube, speed slow, no software, no operating system. User directly using a machine language program, hands-on completely manual operation, the first will be prepared machine program tape into the input, and then start the machine input the program and data into a computer, and then through the switch to start the program running and computing, after the completion of the printer output. The user must be very professional and technical personnel to achieve control of the computer.Batch processing stage. Due to the mid - 1950 - s, the main components replaced by the transistor computer, running speed hadthe very big enhancement, the software also began to develop rapidly, appeared in the early of the operating system, it is the early users to submit the application software for management and monitoring program of the batch.Multiprogramming system phase. As the medium and small-scale integrated circuit widely application in computer systems, the CPU speed is greatly increased, in order to improve the utilization rate of CPU and multiprogramming technology is introduced, and the special support multiprogramming hardware organization, during this period, in order to further improve the efficiency of CPU utilization, a multichannel batch system, time-sharing system, etc., to produce more powerful regulatory process, and quickly developed into an important branch of computer science, is the operating system. Collectively known as the traditional operating system.Modern operating systems. Large-scale, the rapid development of vlsi rapidly, a microprocessor, optimization of computer architecture, computer speed further improved, and the volume is greatly reduced, for personal computers and portable computer appeared and spread. Its the biggest advantage is clear structure, comprehensive functions, and can meet the needs of the many USES and operation aspects.2. New technology of the operating systemFrom the standpoint of the operating system of the new technology, it mainly includes the operating system structure design of the micro kernel technology and operating system software design of the object-oriented technology.(1) The microkernel operating system technologyA prominent thought in the design of modern operating systems is the operating system of the composition and function of more on a higher level to run (i.e., user mode), and leave a small kernel as far as possible, use it to complete the core of the operating system is the most basic function, according to the technology for micro kernel (Microkernel) technology.The microkernel structure(1) Those most basic, the most essential function of the operatingsystem reserved in the kernel(2)Move most of the functionality of the operating system intothe kernel, and each operating system functions exist in theform of a separate server process, and provide services.(3)In user space outside of the kernel including all operatingsystem, service process also includes the user's applicationprocess. Between these processes is the client/server mode.Micro kernel contains the main ingredient(1) Interrupt and the exception handling mechanism(2)Interprocess communication mechanisms(3)The processor scheduling mechanism(4)The basic mechanism of the service functionThe realization of the microkernelMicro kernel implementation "micro" is a major problem and performance requirements of comprehensive consideration. To do "micro" is the key to implementation mechanism and strategy, the concept of separation. Due to the micro kernel is the most important of news communication between processes and the interrupt processing mechanism, the following briefly describes the realization of both.Interprocess communication mechanismsCommunication service for the client and the server is one of the main functions of the micro kernel, is also the foundation of the kernel implement other services. Whether to send the request and the server reply messages are going through the kernel. Process of news communication is generally through the port (port). A process can have one or more ports, each port is actually a message queue or message buffer, they all have a unique port ID (port) and port authority table, the table is pointed out that this process can be interactive communications and which process. Ports ID and kernel power table maintenance.Interrupt processing mechanismMicro-kernel structure separation mechanism will interrupt and the interrupt processing, namely the interrupt mechanism on micro kernel, and put the interrupt handling in user space corresponding service process. Micro kernel interruption mechanism, is mainly responsible for the following work:(1) When an interrupt occurs to identify interrupt;(2) Put the interrupt signal interrupt data structure mapping tothe relevant process;(3) The interrupt is transformed into a message;(4) Send a message to the user space in the process of port, butthe kernel has nothing to do with any interrupt handling.(5) Interrupt handling is to use threads in a system.The advantages of the microkernel structure(1) Safe and reliableThe microkernel to reduce the complexity of the kernel, reduce the probability of failure, and increases the security of the system.(2) The consistency of the interfaceWhen required by the user process services, all based on message communication mode through the kernel to the server process. Therefore, process faces is a unified consistent processescommunication interface.(3) Scalability of the systemSystem scalability is strong, with the emergence of new hardware and software technology, only a few change to the kernel.(4) FlexibilityOperating system has a good modular structure, can independently modify module and can also be free to add and delete function, so the operating system can be tailored according to user's need.(5) CompatibilityMany systems all hope to be able to run on a variety of different processor platform, the micro kernel structure is relatively easy to implement.(6) Provides support for distributed systemsOperating under the microkernel structure system must adopt client/server mode. This model is suitable for distributed systems, can provide support for distributed systems.The main drawback of microkernelUnder the micro-kernel structure, a system service process need more patterns (between user mode and kernel mode conversion) and process address space of the switch, this increases costs, affected the speed of execution.3 .Object-oriented operating system technologyObject-oriented operating system refers to the operating system based on object model. At present, there have been many operating system used the object-oriented technology, such as Windows NT, etc. Object-oriented has become a new generation of an important symbol of the operating system.The core of object-oriented conceptsIs the basic idea of object-oriented to construct the system as a series of collections of objects. The object refers to a set of data and the data of some basic operation encapsulated together formed by an entity. The core of object-oriented concept includes the following aspects:(1) EncapsulationIn object-oriented encapsulation is the meaning of a data set and the data about the operation of the packaging together, form a dynamic entity, namely object. Encapsulated within the request object code and data to be protected.(2) InheritanceInheritance refers to some object can be inherited some features and characteristics of the object.(3) PolymorphismPolymorphism refers to a name a variety of semantics, or the same interface multiple implementations. Polymorphism inobject-oriented languages is implemented by overloading and virtual functions.(4) The messageNews is the way of mutual requests and mutual cooperation between objects. An object through the message to activate another object. The message typically contains a request object identification and information necessary to complete the work.Object-oriented operating systemIn object-oriented operating system, the object as a concurrent units, all system resources, including documents, process and memory blocks are considered to be an object, such as the operating system resources are all accomplished through the use of object services.The advantages of object-oriented operating system:(1)Can reduce operating system throughout its life period whena change is done to the influence of the system itself.For example, if the hardware has changed, will force the operating system also changes, in this case, as long as change the object representing the hardware resources and the operation of the object of service, and those who use only do not need to change the object code.(2)Operating system access to its resources and manipulation are consistent .Operating system to produce an event object, delete, and reference, and it produces reference, delete, and a process object using the same method, which is implemented by using a handle to the object. Handle to the object, refers to the process to a particular object table in the table.(3)Security measures to simplify the operating system.Because all the objects are the same way, so when someone tries to access an object, security operating system will step in and approved, regardless of what the object is.(4)Sharing resources between object for the process provides a convenient and consistent approach.Object handle is used to handle all types of objects. The operating system can by tracking an object, how many handle is opened to determine whether the object is still in use. When it is no longer used, the operating system can delete the object.ConclusionIn the past few decades of revolutionary changes have taken place in the operating system: technological innovation, the expansionof the user experience on the upgrade, application field and the improvement of function. As in the past few decades, over the next 20 years there will be huge changes in operating system. See we now use the operating system is very perfect. Believe that after the technology of the operating system will still continue to improve, will let you use the more convenient. Believe that the operating system in the future will make our life and work more colorful.。

计算机专业外文文献翻译--Linux—网络时代的操作系统

计算机专业外文文献翻译--Linux—网络时代的操作系统

英文参考文献及翻译Linux - Operating system of cybertimesThough for a lot of people , regard Linux as the main operating system to make up huge work station group, finish special effects of " Titanic " make , already can be regarded as and show talent fully. But for Linux, this only numerous news one of. Recently, the manufacturers concerned have announced that support the news of Linux to increase day by day, users' enthusiasm to Linux runs high unprecedentedly too. Then, Linux only have operating system not free more than on earth on 7 year this piece what glamour, get the favors of such numerous important software and hardware manufacturers as the masses of users and Orac le , Informix , HP , Sybase , Corel , Intel , Netscape , Dell ,etc. , OK?1.The background of Linux and characteristicLinux is a kind of " free (Free ) software ": What is called free,mean users can obtain the procedure and source code freely , and can use them freely , including revise or copy etc.. It is a result of cybertimes, numerous technical staff finish its research and development together through Inte rnet, countless user is it test and except fault , can add user expansion function that oneself make conveniently to participate in. As the most outstanding one in free software, Linux has characteristic of the following:(1)Totally follow POSLX standard, expand the network operatingsystem of supporting all AT&T and BSD Unix characteristic. Because of inheritting Unix outstanding design philosophy , and there are clean , stalwart , high-efficient and steady kernels, their all key codes are finished by Li nus Torvalds and other outstanding programmers, without any Unix code of AT&T or Berkeley, so Linu x is not Unix, but Linux and Unix are totally compatible.(2)Real many tasks, multi-user's system, the built-in networksupports, can be with such seamless links as NetWare , Windows NT , OS/2 , Unix ,etc.. Network in various kinds of Unix it tests to be fastest in comparing and assess efficiency. Support such many kinds of files systems as FAT16 , FAT32 , NTFS , Ex t2FS , ISO9600 ,etc. at the same time .(3) Can operate it in many kinds of hardwares platform , including such processors as Alpha , SunSparc , PowerPC , MIPS ,etc., to various kinds of new-type peripheral hardwares, can from distribute on global numerous programmer there getting support rapidly too.(4) To that the hardware requires lower, can obtain very good performance on more low-grade machine , what deserves particular mention is Linux outstanding stability , permitted " year " count often its running times.2.Main application of Linux At present,Now, the application of Linux mainly includes:(1) Internet/Intranet: This is one that Linux was used most at present, it can offer and include Web server , all such Inter net services as Ftp server , Gopher server , SMTP/POP3 mail server , Proxy/Cache server , DNS server ,etc.. Linux kernel supports IPalias , PPP and IPtunneling, these functions can be used for setting up fictitious host computer , fictitious service , VPN (fictitious special-purpose network ) ,etc.. Operating Apache Web server on Linux mainly, the occupation rate of market in 1998 is 49%, far exceeds the sum of such several big companies as Microsoft , Netscape ,etc..(2) Because Linux has outstanding networking ability , it can be usedin calculating distributedly large-scaly, for instance cartoon making , scientific caculation , database and file server ,etc..(3) As realization that is can under low platform fullness of Unix that operate , apply at all levels teaching and research work of universities and colleges extensively, if Mexico government announce middle and primary schools in the whole country dispose Linux and offer Internet service for student already.(4) Tabletop and handling official business appliedly. Application number of people of in this respect at present not so good as Windows of Microsoft far also, reason its lie in Lin ux quantity , desk-top of application software not so good as Windows application far not merely,because the characteristic of the freedom software makes it not almost have advertisement that support (though the function of Star Office is not second to MS Office at the same time, but there are actually few people knowing).3.Can Linux become a kind of major operating system?In the face of the pressure of coming from users that is strengthened day by day, more and more commercial companies transplant its application to Linux platform, comparatively important incident was as follows, in 1998 ①Compaq and HP determine to put forward user of requirement truss up Linux at their servers , IBM and Dell promise to offer customized Linux system to user too. ②Lotus announce, Notes the next edition include one special-purpose edition in Linux. ③Corel Company transplants its famous WordPerfect to on Linux, and free issue. Corel also plans to move the other figure pattern process products to Linux platform completely.④Main database producer: Sybase , Informix , Oracle , CA , IBM have already been transplanted one's own database products to on Linux, or has finished Beta edition, among them Oracle and Informix also offer technical support to their products.4.The gratifying one is, some farsighted domestic corporations have begun to try hard to change this kind of current situation already. Stone Co. not long ago is it invest a huge sum of money to claim , regard Linux as platform develop a Internet/Intranet solution, regard this as the core and launch Stone's system integration business , plan to set up nationwide Linux technical support organization at the same time , take the lead to promote the freedom software application and development in China. In addition domestic computer Company , person who win of China , devoted to Linux relevant software and hardware application of system popularize too. Is it to intensification that Linux know , will have more and more enterprises accede to the ranks that Linux will be used with domestic every enterprise to believe, more software will be planted in Linux platform. Meanwhile, the domestic university should regard Linux as the original version and upgrade already existing Unix content of courses , start with analysing the source code and revising the kernel and train a large number of senior Linux talents, improve our country's own operating system. Having only really grasped the operating system, the software industry of our country could be got rid of and aped sedulously at present, the passive state led by the nose byothers, create conditions for revitalizing the software industry of our country fundamentally.中文翻译Linux—网络时代的操作系统虽然对许多人来说,以Linux作为主要的操作系统组成庞大的工作站群,完成了《泰坦尼克号》的特技制作,已经算是出尽了风头。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

10.2 Some Approaches to Defense10.2.1Basic Security MeasuresAll computer systems need a set of basic security measures. Whether the system is a simple personal computer in your home or a major computer network such as the Internet, it is necessary to protect the hardware and software from theft, destruction, and malicious acts of vandalism. security measures can be as simple as locking the door or as advanced as applying virtually unbreakable encryption techniques to data .Let’s break the basic security ,surveillance, passwords, auditing, access rights, standard systems attacks, and viruses.External security of a computer system or a computer network consists of protecting the equipment from physical damage. Example of physical damage include fire, flood, earthquakes, power sarges, and vandalism. Common sense damage prevention techniques are usually enough in many cases of external security. Rooms containing computer equipment should always be locked. Unauthorized persons should not be allowed into rooms containing computing equipment. Cabling, and the devices that cables plug into, should not be exposed if at all possible.If the equipment needs to be in the open for public access, the equipment should be locked down. Many kinds of anti-theft devices exist for locking cabinets, locking cables to cabinets, locking down keyboards, and locking peripheral devices. For example, one manufacturer makes a device that transmits a wireless signal to a pager should a computer cabinet be opened. The person carrying the pager will know immediately which cabinet is being opened so that security can be sent to the appropriate location.It is also fairly common knowledge not to place expensive computer systems in the basements of buildings. Basements can flood and are flood and are often high humidity locations. Rooms with a large number of external windows are also not advisable. Windows can let in sunshine, which can increase the temperature of a room. Computer equipment typically heats up a windowless room. With the addition of sunlight, the increase in temperature may strain the capacity of any existing air conditioning equipment. As temperatures rise, the life expectancy of computer circuits decreases. Also, external windows can increase the probability of vandalism.To prevent electrical damage to computing equipment, high-quality surge protectors should be used on all devices that require electrical current. The electrical circuits that provide power to devices should be large enough to adequately support the device without placing a strain on the electrical system. Electrical circuits that power up and down causing power fluctuation, such as large motors, should be on circuits separate from the computer devices. Finally, devices that are susceptible to damage from static electricity discharges should be properly grounded.Operational securityOperational security of a computer network involves deciding, and then limiting, who can use the system and when they can use the system, Consider, for example, a large corporation in which there are many levels of employees with varying job descriptions. Employees who do not normally come in contact with sensitive data areas should not have access to sensitive data. For example if an employee simple performs data operations more than likely he or she should not be allowed access to payroll database, but more than likely do not need access to information regarding corporate research programs. A manager of an area would probably have access to muchinformation in his or her department, but his or her access to information in other departments would likely be limited. Finally top-level executive often have access to a wide range of information within a company. However, many companies even limit information access to top-level management.Local area network and database systems provide much flexibly in assigning access tights to individuals or groups of individuals, as you will see shortly. Computer network specialist, along with database administrators and someone at the top levels of management such as the Chief Information Officer(CIO), often decide how to break the company into information access groups, decide who is in each group, and determine what access rights each group has. As you might recall some network operating systems, such as Novell’s Net-Ware and Windows NT, are very good application for creating workgroups and assigning rights.It is also possible to limit access to a system by the time of day or the day of the week. If the primary activity in one part of your business is accessing personnel records, and this activity is only performed during working hours by employee in the personnel or human resources department, then it might be reasonable to disable access to personnel records after working hours, such as from 5:30 p.m. until 7:00 a.m. the next morning. Likewise, the network administrator could also deny access to this system on weekends.It may also be wise to limit remote access to a system during certain times of the day or week. With appropriate limits set, someone dialing in at 2:30 a.m. to transfer funds from one account to another may signal an illegal activity. If all corporate fund transfers can only occur during typical business hours, this restriction would be reasonable to place on dial-in activity.SurveillanceAlthough many individual feel surveillance is an intrusion into an individual’s privacy, many network administrators feel it is a good deterrent to computer vandalism and theft. The proper placement of video cameras in key locations can both deter criminals and be used to identify criminals in the event of vandalism or theft.There are, however, other forms of surveillance in addition to capturing live action with a video camera. For example, placing a transmitter in each computer that sends a signal to a pager if the computer cabinet is opened, is a wireless from of surveillance. Using a form of surveillance called intrusion detection ,many companies electronically monitor data flow and system requests into and out of a system. If unusual activity is noticed, protective action can be taken immediately. Intrusion detection is a growing field of study in network security. Companies that accept merchandise orders using the telephone often monitor each telephone call. Companies claim this form of surveillance can improve the quality of customer service and help settle future disputes.Passwords and ID systemsAlmost every system that stores sensitive or confidential data requires an authorized user to enter a password, personal Identification Number, or some other form of ID before gaining access to the system. Typically, this password or ID is something either remembered by the user or a physical feature of a user, such as a fingerprint. Technology in this area is improving rapidly as companies try to incorporate systems that are less vulnerable to fraud.Perhaps the most common form of protection from unauthorized use of a computer system is the password. Anyone accessing a computer system, banking system, or a long distance telephonesystem is required to enter a passwords are:(1)Online computer accounts;(2)Computer network and main frame computer access at work and school;(3)Long distance telephone credit card use;(4)Twenty-four hour automatic banking services;(5)Access to retirement accounts and banking services;(6)Access to e-mail and voicemail systems; and access to Internet web sites at which acustomer profile is created and stored for future transactions.Although the password is the most common form of identification, it is also one of the weakest. Too often passwords become known, or “misplaced” and fall into the wrong hands.Occasionally a password is written on paper, and the paper is discovered by the wrong people. More often, however, the password is too simple and someone else guesses it.Standard rules that an individual should follow when creating or changing a password include;(1)Change your password often;(2)Pick a good password by using at least eight characters, mixing upper and lowercase if the computer system is case sensitive, and mixing letters with numbers.(3)Don’t choose passwords that are similar to first or last names, pet names , car names,or other choices that can be easily guessed.(4)Don’t share your password with others; doing so invites trouble and misuse.Some computer systems generate random passwords that are very difficult to guess, but are also hard to remember. Often , the user who is given a randomly generated password either changes it to something simpler, making it easier to guess, or writes it down on a piece of paper, defeating the whole purpose of a secret password. Some systems also disallow obvious passwords or already used passwords, thus requiring the user to be creative and select a password that is difficult to guess.A common fallacy among computer system users is that the internal operating system file that stores the login Ids and passwords is susceptible to intrusion. Interestingly, most computer systems store passwords in an encrusted form for which there is no known decryption. How then does the system know when you have entered the correct password? When a user enters his or her login ID and password, the password is encrypted and compared with the entry in the encrypted password file. If the two encrypted passwords match, the login is allowed. Anyone who gets access to this encrypted password file will discover only unreadable text. This encrypted technique explains why . when you forget your password , a computer operator cannot simply read a file and tell you what it is. The computer operator can only reset the password to something new.Since there are so many weaknesses to the password, other forms of identification have emerged. Biometric techniques that scan something about the user, such as voiceprints, eyeprints, and faceprints, appear to be the wave of the future. For example, England has a large database of earprints. Research shows that no two ears are the same, thus an earprint is useful in helping to identify an individual. Fingerprints have long been used to distinguish one individual from another. Now, desktop devices the size of a computer mouse exists can scan a thumbprint and allow or disallow access to a computer system. Likewise, systems exist that can record and digitize your voice. The digital voice pattern is compared to a stored sample and the software determines if the match is close enough for validation. Although retina scans have been portrayed in movies andexist in the real world as security techniques, another eye feature that is unique among all individuals is the iris, or the colored portion of the eye. Some new security devices use the iris, to identify people who are allowed to access a system. Other research has been aimed at digitizing the features of the entire face and comparing this digital representation with a stored image. Companies that manufacture twenty-four hour automatic teller machines are interested in replacing the credit card-sized automatic teller machines(ATM) card and corresponding PIN with something that cannot be stolen, such as a fingerprint, face-print, or eye-print.AuditingAuditing a computer system is often a good deterrent to crime and is useful in apprehending a criminal after a crime has occurred. Computer auditing usually involves software program that monitors every transaction within a system. As each transaction occurs, it is recorded into an electronic log along with the date, time, and owner with the transaction. If an inappropriate transaction is suspected , the electronic log is scanned and the appropriate information is retrieved. In a classic computer crime case that was thwarted because of auditing, a New York man discovered that invoices for an amount under $500 that were sent to local government agencies would be routinely paid without requesting further details. It wasn’t until many months later that a lawyer examining the computer audit trail of payments noticed the pattern of checks under $500 sent to the same individual.Many good computer programs that can audit all transactions on computer system are available. The price paid to purchase, install, and support an audit program can be well worth it if the program can help catch a person performing unaurborized transactions.Access RightsModern computer systems and computer networks allow multiple users to access resources orsuch as files, tapes, printers, and other peripheral devices. Many times, however, the various resources are not supported to be shared, or they should be shared only by a select group. If resource sharing is to be restricted , then a user or network administrator should set the appropriate access rights for a particular resource. Most access rights have two parameters: who and how. The who parameter lists who has access rights to the resource. Typical examples of who include the owner, a select group of users, and the entire user population. The how parameter can specify how a user may access the resource. Typical examples include read, write, edit, execute, append (add date to the end) , and print. For example, a user may create a file an allow all users to access the file, but only with read access rights. The usual system defaults grant the owner of the file full read, write, and execute access so that the user can modify or delete the file at any time. The network administrator can assign supervisor, read, write, create, erase, modify, file scan, and access control rights to a particular user.Modern network operating systems allow network administrators to create workgroups. These workgroups are defined by the network administrator and can contain any form of user grouping as desired. For example, one workgroup might consist of all the employees from marketing and engineering that are currently working on a particular project. Once the workgroup is defined, it is then possible to assign a unique set of access right for this workgroup.Guarding Against VirusesA computer virus is a small program that attaches itself to another program or computer file and when loaded or executed causes programs with a computer. These problems can consist of deleting and corrupting date and program files, or altering operating system components so that computer operation gram is impaired or even halted. A computer that has been invaded by virus program is said to be infected. Since a virus is a computer program it has a binary pattern that is recognizable. Early model virus scanners from the 1980s looked for the unique bit pattern of the virus. More recent virus scanners watch for the actions of virus, such as unusual file changes or directory activity. Some common types of virus include.(1) Parasitic virus: The most common type of virus, a parasitic virus attaches itself to files and then replicates itself once it is in the horst computer’s memory.(2) Boot sector virus: A boost sector virus is stored on a floppy disk. When the disk is loaded into a new machine, the virus moves from the disk into the host system.(3) Stealth virus: A stealth virus hides itself from antivirus software by assuming a binary from that is not detectable by a virus scanner that is looking for unique binary patterns.(4) Polymorphic virus: This virus mutate with every infection, thus making them difficult to locate.(5) Macro virus: Macro are found in spreadsheets and word processing documents. A macro virus is one that hides within an application’s macro and is activated when the macro is executed.A worm is similar to the computer virus. A computer worm is a special type of virus that manages to store itself in a location that can cause the most damage to the resident computer system. Worms usually replicate themselves by transferring from computer to computer via e-mail. Typically a virus or a worm is transported in a Trojan horse. In computer terminology of Trojan horse is a destructive piece of code that hides inside a harmless looking piece of code, such as an e-mail or an application macro.To guard against virus, you can purchase antivirus software that typically checks all of your files periodically and can remove any viruses that are found. As files and e-mail are downloaded and as applications are opened, you may get a message warning of a new virus. To provide effective protection against virus attacks, you need to use antivirus software that includes signaturebased scanning, terminate-stay-resident monitoring, and multi-level generic scanning.The signature-based scanner works by recognizing the unique pattern of a virus. All viruses have a unique bit pattern, much like a strand of DNA. Antivirus product developers and virus researchers catalog the known viruses and their signatures. Signature-based scanners then use these catalog listings to search for viruses on a user’s computer system. Because new viruses are created daily, it is necessary for a user to update the known virus catalog frequently. This up dating is usually accomplished by downloading new virus information from the internet.Stealth viruses and polymorphic virus are designed to elude the detection of signature-based scanners. For these types of viruses, a second antivirus technique is necessary terminate-and-stay resident antivirus software runs in the background while a application that a user is executing runs in the foreground. Terminate-and-stay resident programs can provide a combination of protective services, including real-time monitoring of disk drivers and files, intelligent analysis of virus-like behavior, and stealth and polymorphic virus detection. An advantage of terminate-and-stay-resident antivirus software is its automatic nature a user does not have to activate the software each time a new life is opened or downloaded. One disadvantage of this software is that an always-running virus checker consumes memory and processing resources.And additional disadvantage is that this type of antivirus software can create false alarms. After a number of false alarms, users often disable the terminate-and-stay resident antivirus software.The third antivirus technique that is used to assist scanners and terminate-and-stay resident software is multi-level generic scanning. The technique is a combination of antivirus technique including intelligent checksum analysis and expert system virus analysis. Intelligent checksum analysis and applies a checksum to a file and data set at two major times in a file’s lifetime at the beginning when a file is new (or in a known safe stage) and at a later time after the life has existed for a while. Much like cyclic checksum, the checksum from the file when new is compared with the later checksum to determine if the volves a serious of proprietary algorithms that perform millions of tests on your software then assigns a number of points to the software in question based on the results of these tests, and indicates a virus if a certain point score is achieved.毕业论文之英译汉部分选自计算机专业英语(10.2.1 基本安全措施)所有的计算机系统都需要一套基本安全措施。

相关文档
最新文档