英文assignment写法

合集下载

电器电子的英文说明书写法

电器电子的英文说明书写法

电器、电子产品说明书英译的特点和技巧。

(参考教材P202-210)1 概述电器、电子产品说明书是科技文体的一种,它以传递产品的有用信息为主要目的,内容主要包括:前言、部件、基本功能、使用指南,故障排除等。

其中,基本功能和使用指南是主体部分。

一些简单易用的电器、电子产品,其说明书也相对简略。

电器、电子产品说明书译文的预期功能主要是提供商品特点和使用信息,通过让译语用户了解产品的性能、特点、用途、使用和保管等方面,促使其完成购买行为。

2 电器、电子产品说明书英译的特点特点概括起来包括:准确性(accuracy)、简明性(conciseness)、客观性(objectivity)等。

2.1 准确性电器、电子产品说明书是为了指导读者正确使用产品而写,它传递的信息(例如:各种数据、图表)首先必须科学准确。

在英译过程中,必须把信息内容如实准确地翻译出来,显化原文隐含的信息,消除歧义。

一些专业术语、固定用语和习惯说法必须表达得准确、地道,例如在翻译数码相机说明书时会遇到这样一些术语:镜头后盖(ear lens cap)、三角架(tripod)、数码变焦(digital zoom)、快门帘幕(shutter curtain)、曝光不足(under exposure)、取景器(view finder)等,需按专业说法表达出来,不可任意生造。

2.2 简明性简明性特点表现为:(1)内容条目简洁明了,步骤清晰,逻辑性强。

(2)常用缩略形式。

例如:液晶显示(Liquid Crystal Display) 常缩写成LCD;发光二极管(Light Emitting Diode) 常缩写成LED;中央处理器(Central Processing Unit) 常缩写成CPU;自动对焦(Auto focus)常缩写成AF;手动对焦(Manual focus)常缩写成MF2.3 客观性电器、电子产品说明书将该产品的相关内容客观地呈现出来,引导读者按照一定的思维逻辑循序渐进,知道该做什么,怎么做,进而了解和正确使用该产品。

英文转让合同范本

英文转让合同范本

英文转让合同范本Assignment AgreementThis Assignment Agreement (the "Agreement") is made and entered into as of [date], and between [assignor's name] (the "Assignor") and [assignee's name] (the "Assignee").WHEREAS, the Assignor is the owner of certn rights and interests in [the subject matter of the assignment];NOW, THEREFORE, in consideration of the mutual covenants and agreements contned herein, and other good and valuable consideration, the receipt and sufficiency of which are here acknowledged, the Assignor here assigns, transfers and conveys to the Assignee, and the Assignee here accepts, all of the Assignor's rights, and interests in and to the [the subject matter of the assignment], subject to the terms and conditions set forth herein.1. Assignment of Rights. The Assignor here assigns, transfers and conveys to the Assignee all of the Assignor's rights, and interests in and to the [the subject matter of the assignment], including but not limited to [list the specific rights or interests being assigned].2. Consideration. In consideration of the assignment of the rights and interests herein, the Assignee shall pay to the Assignor the sum of [amount of consideration], or such other consideration as may be agreed upon the parties in writing.3. Representations and Warranties. The Assignor represents and warrants to the Assignee that:The Assignor has the right and power to assign and transfer the rights and interests herein;The assignment and transfer of the rights and interests herein do not violate any agreement or other obligation to which the Assignor is a party;The rights and interests being assigned and transferred hereunder are free and clear of any liens, encumbrances or clms;The Assignor will provide such cooperation and assistance as may be reasonably requested the Assignee to effectuate the intent of this Agreement.4. Assignee's Representations and Warranties. The Assignee represents and warrants to the Assignor that:The Assignee has the right and capacity to accept the assignment and transfer of the rights and interests herein;The acceptance and transfer of the rights and interests herein will not violate any agreement or other obligation to which the Assignee is a party;The Assignee will perform and discharge all of the obligations and liabilities of the Assignor hereunder.5. Conditions Precedent. The obligations of the parties hereunder are subject to the satisfaction or wver of the following conditions:The representations and warranties of the Assignor and the Assignee contned herein shall be true and correct in all material respects as of the date hereof and as of the date of any closing hereunder;All necessary consents, approvals and authorizations of all third parties with respect to the assignment and transfer contemplated here shall have been obtned and shall be in full force and effect;The Assignee shall have executed and delivered to the Assignor such other documents and instruments as may be reasonably requested the Assignor to evidence the assignment and transfer contemplated here.6. Termination. This Agreement shall terminate upon the earlier to occur of the following events:The pletion of the assignment and transfer of the rights and interests herein in accordance with the terms hereof;The written agreement of the parties hereto to terminate this Agreement;The assignment and transfer of the rights and interests herein shall have been rescinded or voided for any reason.7. Notices. All notices, requests, demands and other munications hereunder shall be in writing and shall be delivered personally or sent registered orcertified , postage prepd, to the parties at the following addresses (or such other addresses as may be designated notice given hereunder):If to the Assignor: [address];If to the Assignee: [address].8. Governing Law. This Agreement shall be governed and construed in accordance with the laws of the [jurisdiction], without regard to the conflicts of laws principles thereof.9. Entire Agreement. This Agreement constitutes the entire agreement between the parties hereto with respect to the subject matter hereof and supersedes all prior agreements and understandings, whether oral or written, between the parties hereto.10. Amendment. This Agreement may be amended, modified or supplemented only a written instrument executed the parties hereto.11. Wver. No flure or delay any party hereto in exercising any right, power or privilege hereunder shall operate as a wver thereof, nor shall any single or partial exercise of any such right, power or privilege preclude any other or further exercise thereof or the exercise of any other right, power or privilege.12. Severability. If any provision of this Agreement is held to be invalid, illegal or unenforceable, the remnder of this Agreement shall nevertheless be enforceable, and the parties shall use their mercially reasonable efforts to effect a mercially reasonable substitute therefor.IN WITNESS WHEREOF, the parties hereto have executed this Assignment Agreement as of the date first above written.[ASSIGNOR'S NAME][ASSIGNOR'S SIGNATURE][ASSIGNOR'S TITLE][ASSIGNEE'S NAME][ASSIGNEE'S SIGNATURE][ASSIGNEE'S TITLE]。

assignment词根词缀

assignment词根词缀

在撰写一篇关于“assignment”词根词缀的文章之前,让我们先深入了解一下这个主题。

我们需要了解“assignment”是什么意思,以及它的词根和词缀分别代表什么含义。

接下来,我们将探讨“assignment”在不同领域和语境中的应用,以及它所涉及的深层含义和广泛影响。

我们会回顾和总结所学内容,以便全面和深刻地理解“assignment”这一主题。

1. “assignment”是什么意思?“assignment”这个词源自拉丁词根“assignare”,意为“指派”或“分派”。

在英文中,这个词通常表示指定特定的任务、工作或责任给某人,也可以指分配特定的任务或活动。

“assignment”还可以指代布置的作业、任务或项目。

2. 词根词缀含义解析在“assignment”这一词中,“assign-”是词根,代表指派或分派的意思。

而后缀“-ment”则表示名词形式,将动词转化为名词,表示行为、结果或状态。

我们可以理解“assignment”为指派的行为或状态,或指派所得到的任务、职责或作业。

3. “assignment”在不同领域和语境中的应用在教育领域,“assignment”通常指代老师布置给学生的作业或任务。

而在职场中,“assignment”可能指派给员工的特定责任或工作任务。

在法律上,“assignment”也具有特定的含义,指代将权利或债务转让给他人的行为。

在项目管理、军事领域等领域中,“assignment”也有着特定的应用和含义。

4. 个人观点和理解在我看来,“assignment”不仅仅是简单的任务分配,它背后蕴含着领导能力、责任担当和团队合作的重要意义。

在现代社会中,“assignment”更多地呈现为一种团队协作和角色分工的体现,是一种高效管理和资源配置的重要手段。

5. 总结和回顾通过本文的探讨,我们对“assignment”这一主题有了全面、深刻和灵活的理解。

我们了解了它的词根词缀含义、不同领域和语境中的应用,以及个人观点和理解。

如何写Assignment

如何写Assignment

如何写Assignment我们的assignment通常分为两种形式,一是essay,一是report。

二者在形式上有所差别,但大体相同。

一篇assignment上面会对写成essay还是report格式作出明确要求。

在阅读题目时,请尽量仔细。

澳洲代写英国代写代写assignment相同点:1、字体:Times New Roman,字号:小四,行距:1.5倍。

请有写作之前就把这些格式调好,以避免写好后再调会出现一些意想不到的情况。

2、段与段之间隔行。

每段不要求像中文写作那样空两格,而是直接顶格写。

下面还有一些相同点,我在两种文体分开讨论时,再涉及。

区别:Essay:Essay的写作相对report要简单一些。

通常只包括三个部分,Introduction, Main Body, Conclusion. Introduction 包括topic的背景介绍和文章要解决的主要问题。

一般占总字数的10%左右。

Main Body是主体部分,占总字数80%左右。

如果题目中作了具体要求,就根据题目提到的几个方面来逐一讨论就可以了。

有的题目没有作具体要求,就根据自己的构思来写。

但要求有逻辑性。

Conclusion也是占10%,在这一段里把文章中的主要观点用一到两句话概括出来。

Essay 可以不写题目,不要把小标题加粗。

Report:它的写法大体上和essay差不多,但要求要严格一些。

第一:标题页:包括标题和executive summary. 在Executive summary中是对文章的摘要。

这个大家都知道怎么写我就不多说了。

这两个东西一般是单独占一页第二:主体部分。

Report的主体部分,前三个和essay差不多,只是在conclusion后还有一部分就是recommendations.是对提出的问题的建议。

如果题目中没有单独要求,一般就按照这几部分来写,但有的题目会作出规定。

请按题目要求写哪几部分来写。

下面来说referenceReference 是老师最看重的,所以请一定注意。

英文Assignment和Dissertation的写作细节(珍藏版)

英文Assignment和Dissertation的写作细节(珍藏版)

英文Assignment和Dissertation的写作细节(珍藏版)Dissertation一、Dissertation大体结构1.首先是Cover Page,即封面,包括论文的题目,作者姓名,所在学院,学校和上交时间等信息。

2.Declaration,也就是声明,“我声明,所有成果除了我已经注释的,其他均为我自己的研究成果,没有剽窃他人的”,之后是上交时间,指导导师,签名,学院等。

3.Acknowledgment,写要感谢的人,导师是必须要感谢的,当然还可以感谢其他人,这个随意。

4.Content,目录,这个要两端对其,整体格式一致,用Word中的目录索引功能自动生成。

一般三级目录就可以了。

比如3,3.1,3.1.2。

5.List of Figures,也就是所有图片的一个目录,包括所有在论文中出现的图片标题,不要把图片也贴上,只要标题。

比如:1.1 XXXX标题名称2.1 XXXX标题名称6.List of T ables,和上面类似,就是表格的目录。

(注:以上内容的页码为罗马数字,从下面的Abstract开始,为阿拉伯数字并从1重新开始,这个在word中可以设置。

目录第一条从Introduction开始,而不是Abstract,切记。

)7.Abstract,也就是摘要。

一般50-60页的论文摘要1页以内即可,最好控制在半页到3/4页,不要多。

8.Introduction,介绍部分。

9.Background 或者Literature Review,题目只要涉及这些方面即可,一般是这两个。

内容也是。

(具体写作我后面会具体说)。

10.Proposed Method也就是主体部分,题目自定或者问问导师,但是内容是你的研究成果的描述。

11.Analytical and T est Results,分析和测试结果,题目自定,内容主要就是测试结果。

12.Discussion,对结果产生的分析和解释,也有并入上面的一说。

英语论文格式

英语论文格式

英语论文格式 Revised as of 23 November 2020英文论文的格式通常,学校发的论文写作规定会对一篇Assignment应该写成Essay还是 Report格式作出明确要求。

两种格式的相同之处:1、字体:Times New Roman,字号:小四,行距:倍(也有双倍间距的)。

请有写作之前就把这些格式调好,以避免写好后再调节,会造成不必要的麻烦。

2、段落之间空一行,每段不要求像中文写作那样空两格,而是直接顶格写。

两种格式的不同之处:一、Essay?Essay 的写作相对Report要简单一些。

通常只包括三个部分,绪论(Introduction), 主体(Main Body),结论(Conclusion)。

绪论(Introduction)包括选题(topic)的背景介绍和文章要解决的主要问题,通常占总字数的 10%左右。

主体(Main Body)占总字数80%左右。

如果题目中作了具体要求,就根据题目提到的几个方面来逐一讨论就可以了。

有的题目没有作具体要求,就根据自己的构思来写。

但要求有逻辑性。

结论(Conclusion)也是占10%,在这一段里把文章中的主要观点用一到两句话概括出来。

Essay 可以不写题目,不要把小标题加粗。

二、Report:它的写法大体上和essay差不多,但要求要严格一些。

1、标题页:包括标题和executive summary. Executive summary是对文章的摘要,这两个部分一般是单独占一页。

2、主体部分:Report的主体部分,前三个和essay差不多,只是在conclusion后还有一部分就是recommendations,是对提出的问题的建议。

如果题目中没有单独要求,一般就按照这几部分来写,但有的题目会作出规定。

请按题目要求写哪几部分来写。

Reference?Reference 是几乎所有老师最看重的,所以请一定注意。

1、不管前面的主体部分最后一页剩多少空格,reference都要另起一页写;2、每条reference之间要空一行。

网络基础Assignment(英文)

网络基础Assignment(英文)

1.Present the OSI layered model. (Outcome 4.1)(1)Present the seven layers of the OSI model.Following is a figure for the seven layers.Figure 1-1 The seven layers(2)The function of each layer.Table 1-1 The function of seven layers(3)The relationship of layers.Moving from the top, down - messages get larger and larger. A message is passed down, and the lower layer adds a header to it. This is called encapsulation, because it is like placing an object into a capsule. The header is sometimes called a wrapper. Each successive lower layer encapsulates what it receives from the layer above it. Moving from the bottom, up - messages get smaller and smaller. A message is first stripped of it's header, and then the inner contents (the "data" portion) is passed up. This is "decapsulation" but no one uses that term. Each successive upper layer receives the data message from the layer below, and then strips off it's own header and passes the data up.2.Explain the role of drivers in a network, discussing their relationship to the NOS and OSI model. (Outcome 4.2)(1)The function of drivers in a network.LAN drivers direct the function of the hardware used to transfer data to and from computers in the LAN. These drivers come in many types, and they can be installed on a user's computer or on a shared server. Network hardware devices, which might need LAN drivers to function, include network routers, modems, network cards, or network card adapters.(2)Drivers’ relationship to the Windows server 2003.Drivers are one kinds of software help communication between Win 2003 and hardware. The connecting hardware can never work without the matching driver. In usually, Win 2003 owns the driver. It can update the driver by the “Windows Update”from the control platform. If it didn’t owns the driver, then it need the CD which as the additional with the hardware, or search and download from the internet.(3)Drivers’ relationship to the OSI model.Different driver works on different layer. The File system driver works on application layer, session and presentation layers. The gate way works on the Transport layer. The router works on the Network layer. The switch works on the Data link layer. The repeater works on Physical layer.3.Discuss how drivers are selected and implemented for various network components; install NIC driver and demonstrate how to remove and update. (Outcome4.3)(1)Discuss how drivers are selected and implemented for sound card, network interface card and video card.Every computer has its own drivers includes sound card, network interface card and video card and so on. When we buy the computer, a CD/DVD contain drivers will be give us. We can use the CD/DVDs to select and implement the drivers. And we can download some driver software to check out whether our computer lack of drivers, then select the driver and implement it.(2)Install Microsoft Loopback Adapter driver.Following are the figures for install steps:Figure 3-1 Installation1Figure 3-2 Installation2Figure 3-3 Installation3Figure 3-4 Installation4Figure 3-5 Installation5Figure 3-6 Installation6Figure 3-7 Installation7Figure 3-8 Installation8(3)Remove and update the Microsoft Loopback Adapter driver. Following are figures show the steps for remove and update:Figure 3-9 Step1Figure 3-10 Step2Figure 3-11 Remove and update4.Explain the detailed operation of different IEEE 802.N network configurations. (Outcome 4.4)Table 4-1 The detailed operation of different IEEE 802.N5.Refer the 802 protocols to the existing OSI layers. (Outcome 4.5)(1)The IEEE 802 model.IEEE 802 refers to a family of IEEE standards dealing with local area networks and metropolitan area networks.More specifically, the IEEE 802 standards are restricted to networks carrying variable-size packets. (By contrast, in cell relay networks data is transmitted in short, uniformly sized units called cells. Isochronous networks, where data is transmitted as a steady stream of octets, or groups of octets, at regular time intervals, are also out of the scope of this standard.) The number 802 was simply the next free number IEEE could assign,[1] though “802” is sometimes associated with the date the first me eting was held — February 1980.The services and protocols specified in IEEE 802 map to the lower two layers (Data Link and Physical) of the seven-layer OSI networking reference model. In fact, IEEE 802 splits the OSI Data Link Layer into two sub-layers named Logical Link Control (LLC) and Media Access Control (MAC), so that the layers can be listed like this:Data link layer⏹LLC Sublayer⏹MAC SublayerPhysical layerThe IEEE 802 family of standards is maintained by the IEEE 802 LAN/MAN Standards Committee (LMSC). The most widely used standards are for the Ethernet family, Token Ring, Wireless LAN, Bridging and Virtual Bridged LANs. An individual Working Group provides the focus for each area.(2)Compare the 802 protocols with the OSI layers.Figure 5-1 ComparisonThe main thing to note is that the original OSI model didn't include a "medium access" layer because the assumption was made that all networks would be made of point-to-point lines. Boy, were they wrong. They later hacked a medium access control sublayer into the data link layer.Basically, the OSI physical layer corresponds to the IEEE 802 physical layer. Then, the OSI data link layer corresponds to the 802 LLC and MAC layers.(3)Define and explain the data link layer in IEEE Project 802.The bottom two OSI layers, the physical layer and the data-link layer, define how multiple computers can use the network simultaneously without interfering with each other.The IEEE 802 project incorporated the specifications in those two layers to create standards that have defined the dominant LAN environments. Figure 5.8 shows the data-link layer and its two sublayers.After deciding that more detail was needed at the data-link layer, the 802 standards committee divided the data-link layer into two sublayers:Logical Link Control (LLC) Establishing and terminating links, controlling frametraffic, sequencing frames, and acknowledging frames●Media Access Control (MAC) Managing media access, delimiting frames,checking frame errors, and recognizing frame addressesLogical Link Control (LLC) SublayerThe LLC sublayer manages data-link communication and defines the use of logical interface points called service access points (SAP). Other computers can refer to and use SAPs to transfer information from the LLC sublayer to the upper OSI layers. Category 802.2 defines these standards.Media Access Control (MAC) SublayerAs Figure 5.9 indicates, the MAC sublayer is the lower of the two sublayers, providing shared access to the physical layer for the computers' NICs. The MAC layer communicates directly with the NIC and is responsible for delivering error-free data between two computers on the network.6.Relate how architecture influences access and control of the network and draw out merits of different architectures. (Outcome 4.6)(1)Explain CSMA/CD and Token Passing access and control method.a)CSMA/CDCarrier sense multiple access with collision detection (CSMA/CD) is a Media Access Control method in which:● A carrier sensing scheme is used.● A transmitting data station that detects another signal while transmitting a frame,stops transmitting that frame, transmits a jam signal, and then waits for a random time interval before trying to resend the frame.CSMA/CD is a modification of pure carrier senses multiple accesses (CSMA). CSMA/CD is used to improve CSMA performance by terminating transmission as soon as a collision is detected, thus shortening the time required before a retry can be attempted.b)Token PassingIn telecommunication, token passing is a channel access method where a signal called a token is passed between nodes that authorizes the node to communicate. The mostwell-known examples are token ring and ARCNET.Token passing schemes provide round-robin scheduling, and if the packets are equally sized, the scheduling is max-min fair. The advantage over contention based channel access is that collisions are eliminated, and that the channel bandwidth can be fully utilized without idle time when demand is heavy. The disadvantage is that even when demand is light, a station wishing to transmit must wait for the token, increasing latency.(2)Relate how architecture influences CSMA/CD and Token Passing.In the CSMA/CD media-access scheme, network devices contend for use of the physical network medium. CSMA/CD is therefore sometimes called contention access. Examples of LANs that use the CSMA/CD media-access scheme are Ethernet/IEEE 802.3 networks, including 100BaseT.In the token-passing media-access scheme, network devices access the physical medium based on possession of a token. Examples of LANs that use the token-passing media-access scheme are Token Ring/IEEE 802.5 and FDDI.(3)Draw out merits of Ethernet, Token Ring and ArcNet.a)Merits of EthernetConceptually Simple:Ethernet is simply daisy-chained together with coax cable and "T" adapters. There are usually no hubs, transceivers, or other devices used.Relatively Inexpensive:Due to the simplicity inherent in the design of Ethernet, it can be an inexpensive technology to implement.Noise Immunity:The coaxial cable used in a Ethernet network is very well shielded, and has a very high immunity from electrical noise caused by outside sources.b)Merits of Token RingToken Ring networks are deterministic in nature. In English, this means that the nodes may only transmit at certain, well defined times. This eliminates incidents of two or more nodes transmitting at the same time and corrupting each other's transmission(collisions). The elimination of collisions results in a network where data almost always gets to its destination on the first attempt, greatly reducing retransmissions which waste bandwidth. The end result is a higher effective bandwidth at the same wire speed.c)Merits of ArcNetARCNET added a small delay on an inactive network as a sending station waited to receive the token, but Ethernet's performance degraded drastically if too many peers attempted to broadcast at the same time, due to the time required for the slower processors of the day to process and recover from collisions.[citation needed] ARCNET had slightly lower best-case performance (viewed by a single stream), but was much more predictable. ARCNET also has the advantage that it achieved its best aggregate performance under the highest loading, approaching asymptotically its maximum throughput.7.Describe scenarios where one architecture might be favored over another. (Outcome 4.7)(1)Describe the features, cabling and components of Ethernet, Token Ring, Apple Talk and ArcNet.a)EthernetTable 7-1 The features of EthernetTable 7-2 The cablingComponentsIn an Ethernet LAN, the components include NIC, switch, hubs, router, and the cables.b)Token RingA Token Ring network includes the following features:•Star-wired ring topology•Token-passing access method•Shielded and unshielded twisted-pair (IBM Types 1, 2, and 3) cabling •Transfer rates of 4 and 16 Mbps•Baseband transmission•802.5 specificationsCablingThe STP or UTP cable to a hub connects computers on a Token Ring network. Figure 3.28 shows cable length limits for three types of cabling. Token Rings use IBM Type 1, 2, and 3 cabling. Most networks use IBM Cabling System Type 3 UTP cabling. ComponentsIn a Token Ring network, the components include Hub, Cabling, Connectors, Patch Cables, Media Filters, Patch Panels, Repeaters, Fiber-Optic Cable.c)Apple TalkFeatures•LocalTalk networks, which have a single network number and can have as many as 254 nodes. (They are actually limited to 32 or fewer nodes because of media capacity.)•EtherTalk and TokenTalk networks, which can be assigned a network range sothat the network can have more nodes. EtherTalk and TokenTalk networks can have as many as 253 nodes for every number in the network range, for a maximum of 16.5 million nodes.LocalTalk networks, which each must be in a single zone. Each EtherTalk and TokenTalk network can have multiple zones, and individual nodes on a network can be configured to be in any one of the network's associated zones.CablingSTP cabling is most often used in a bus or tree topology. A LocalTalk network supports a maximum of 32 devices.Because of LocalTalk's limitations, manufacturers other than Apple are often preferred for cabling. Farallon PhoneNet, for example, can handle 254 devices. PhoneNet uses telephone cable and connectors and can be implemented as a bus network or plugged into a central wiring hub to form a star topology.ComponentAppleTalk networks are arranged hierarchically. Four basic components form the basis of an AppleTalk network: sockets, nodes, networks, and zones.d)ArcNetFeaturesDeterministic Performance - Users Can Calculate the Worst Case Node to Node Message TimeLogical Ring - Nodes Automatically Find Their Neighbor to Create A Ring Automatic Reconfiguration - A New Node Joins the Ring Automatically Without Software InterventionBroadcast and Directed MessagesMulti-Master with Automatic Token GenerationCabling Options - Coaxial, Fiber, EIA-485 Twisted PairHigh Speed - Standard 2.5 Mbps, Optionally 19 kbps to 10 MbpsLow Cost ChipsLow Protocol Overhead - 3 or 4 Bytes—Good Usage of Available Bandwidth Variable Packet Size - 0 to 507 BytesBit Rate Scalable up to 10 Mbps—Grows with Your ApplicationHigh Noise ImmunityEasy/Simple Manageable Technology—No Special Development Tools Required CablingThe standard cabling used for ArcNet is 93-ohm RG-62 A/U, coaxial cable. ArcNet also supports twisted-pair and fiber-optic media. The distances between computers vary, depending on the cabling and the topology.(2)Describe appropriate application scenarios of Ethernet, Token Ring, Apple Talk and ArcNet.a)EthernetNearly all scenarios can use the Ethernet, it is so popular in the world, but its limitation is that if many people want to connect the Ethernet in a area, the speed will be slow down.b)Token RingToken Ring networks give the benefit of a very fast. deterministic network, but require a major commitment to properly plan and maintain. Before choosing Token Ring as the technology for a particular project, it is very important to ensure that the organization has the ability to commit the time and resources necessary. Not doing so is basically a recipe for disaster.c)Apple talkAppleTalk is the Apple network architecture and is included in the Macintosh operating system software. Figure 7-1 shows a typical AppleTalk network configuration. This means that network capabilities are built into every Macintosh. It is used for sharing information and print etc.Figure 7-1 Apple talk networkd)ArcNetDatapoint Corporation developed the Attached Resource Computer Network (ArcNet) in 1977. Figure 7-2 shows a star-wired ArcNet. It is a simple, inexpensive, flexible network architecture designed for workgroup-size networks. The first ArcNet cards were shipped in 1983.Figure 7-2 Simple star-wired ArcNet8.Discuss the role of packets and how they are built up from their various components, giving an example where data packets are transmitted through different layers of the OSI model. (Outcome 5.1)(1)Discuss the role of the frame and how it is built up from its components.In computer networking, a frame is a data packet on the Layer 2 of the OSI model. A frame is "the unit of transmission in a link layer protocol, and consists of a link-layer header followed by a packet." Examples are Ethernet frames (maximum 1500 byte plus overhead), PPP frames and V.42 modem frames.The Ethernet II frame is a standard format for data transmitted via an Ethernet network. The frame refers to a collection of byte values in specified locations that identify the frame sender, the intended receiver, the data payload and an error-check value. Packaging data into frames such as this enables data to be sent via a packet-switching network rather than requiring a constant end-to-end connection. (2)Discuss the role of the packet and how it is built up from its components. Packets are constructed in such a way that layers for each protocol used for a particular connection are wrapped around the packets, like the layers of skin on an onion.At each layer (except perhaps at the application layer), a packet has two parts: theheader and the body. The header contains protocol information relevant to that layer, while the body contains the data for that layer, which often consists of a whole packet from the next layer in the stack. Each layer treats the information it gets from the layer above it as data, and applies its own header to this data. At each layer, the packet contains all of the information passed from the higher layer; nothing is lost. This process of preserving the data while attaching a new header is known as encapsulation.(3)Discuss the role of the segment and how it is built up from its components. Transmission Control Protocol accepts data from a data stream, segments it into chunks, and adds a TCP header creating a TCP segment. The TCP segment is then encapsulated into an Internet Protocol (IP) datagram. A TCP segment is "the packet of information that TCP uses to exchange data with its peers."A TCP segment consists of a segment header and a data section. The TCP header contains 10 mandatory fields, and an optional extension field (Options, pink background in table).The data section follows the header. Its contents are the payload data carried for the application. The length of the data section is not specified in the TCP segment header. It can be calculated by subtracting the combined length of the TCP header and the encapsulating IP header from the total IP datagram length (specified in the IP header).(4)Taking network layer for example, describe how data packets are transmitted through Transmission layer, Network layer and Data Link layer.a)Layer 4: Transport Layer•Manages end-to-end message delivery in network•Provides reliable and sequential packet delivery through error recovery and flow control mechanisms•Provides connectionless oriented packet deliveryb)Layer 3: Network Layer•Determines how data are transferred between network devices•Routes packets according to unique network device addresses•Provides flow and congestion control to prevent network resource depletionc)Layer 2: Data Link Layer•Defines procedures for operating the communication links•Frames packets•Detects and corrects packets transmit errors9.Discuss the role of protocols at different layers of the OSI model, describing the function of specific protocols. (Outcome 5.2)(1)Discuss the role of protocols at physical layer, data link layer, network layer, transport layer, session layer, presentation layer and application layer of the OSI model.Figure 9-1 The protocols at physical layera)Medium-access protocolsDefines the addressing that distinguishes each node an a NetWare network.b)Internetwork Packet Exchange (IPX)Defines the addressing schemes used on a NetWare network.c)Sequenced Packet Exchange (SPX)Provides security and reliability to the IPX protocol.d)Routing Information Protocol (RIP)Facilitates the exchange of routing information on a NetWare network.e)Service Advertising Protocol (SAP)Allows service-providing nodes to advertise their services and addresses.f)NetWare Core Protocol (NCP)Defines the connection control and service request encoding that make possible the interaction between clients and servers(2)Describe the function of FTP, HTTP, TELNET, SMPT, TCP, UDP, IP, ARP and ICMP.a)FTPFile Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host to another host over a TCP-based network, such as the Internet. FTP is built on client-server architecture and uses separate control and data connections between the client and server. FTP users may authenticate themselves using a clear-text sign-in protocol but can connect anonymously if the server is configured to allow it.b)HTTPThe Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. HTTP is the foundation of data communication for the World Wide Web.c)TELNETTelnet is a network protocol used on the Internet or local area networks to provide a bidirectional interactive text-oriented communications facility using a virtual terminal connection. User data is interspersed in-band with Telnet control information in an 8-bit byte oriented data connection over the Transmission Control Protocol (TCP). d)SMTPSMTP is a standard electronic-mail protocol that handles the sending of mail from one SMTP to another SMTP server. To accomplish the transport, the SMTP server has its own MX (mail exchanger) record in the DNS database that corresponds to the domain for which it is configured to receive mail.e)TCPThe Transmission Control Protocol (TCP) is one of the core protocols of the Internet Protocol Suite. TCP is one of the two original components of the suite, complementing the Internet Protocol (IP), and therefore the entire suite is commonly referred to as TCP/IP. TCP provides reliable, ordered delivery of a stream of bytes from a program on one computer to another program on another computer. TCP is the protocol that major Internet applications such as the World Wide Web, email, remote administration and file transfer rely on. Other applications, which do not requirereliable data stream service, may use the User Datagram Protocol (UDP), which provides a datagram service that emphasizes reduced latency over reliability.f)UDPUDP uses a best-effort delivery system, similar to how first class and lower postal services of the Indian Postal Service work. With a first class letter (post card), you place the destination address and put it in your mailbox, and hope that it arrives at the destination.g)IPThe Internet Protocol (IP) is the principal communications protocol used for relaying datagrams (packets) across an internetwork using the Internet Protocol Suite. Responsible for routing packets across network boundaries, it is the primary protocol that establishes the Internet.IP is the primary protocol in the Internet Layer of the Internet Protocol Suite and has the task of delivering datagrams from the source host to the destination host solely based on their addresses. For this purpose, IP defines addressing methods and structures for datagram encapsulation.h)ARPThe Address Resolution Protocol (ARP) is an Internet layer protocol that helps TCP/IP network components find other devices in the same broadcast domain.ARP resolves an IP address of a destination to the MAC address of the destination on the same data link layer medium, such as Ethernet. Remember that for two devices to talk to each other in Ethernet (as with most layer 2 technologies), the data link layer uses a physical address (MAC) to differentiate the machines on the segment. When Ethernet devices talk to each other at the data link layer, they need to know each other MAC addressesi)ICMPICMP provides network diagnostic functions and error reporting. One of the most used IP commands is the Packet Internet Grouper (PING) command. When a host PINGS another client, it sends an ICMP ECHO request, and the receiving host responds with an ICMP ECHO REPLY. PING checks network connectivity on clientsand routers. ICMP also provides a little network help for routers. When a router is being overloaded with route requests, the router sends a source quench message to all clients on the network, instructing them to slow their data requests to the router.10.Explain examples of transmission between different network layers. (Outcome 5.3)(1)Explain the process of data transmission how host A sends the data via different layers.Figure 10-1 The process of data transmission1When host A sends a message to host B, the message moves down the successive layers of host A, from the application layer to the presentation layer, to the session layer, etc., until it reaches the physical layer. It is then transmitted across the communication line between host A and node X, and moves up the three layers of node X and down again. Then it is transmitted to node Y where it goes through the same procedure, and finally is transmitted to host B, where it moves up its seven layers, until it arrives at the application layer of host B.(2)Explain the process of data transmission how host B receives the data via different layers.Figure 10-2 The process of data transmission2System B receives the request on Layer 1, and begins the decapsulation process, stripping the Layer 1 headers and footers off to reveal the Layer 2 information, and so forth, all the way up to the 7th layer.ConclusionAfter finished this assignment, I know the OSI layered model, the role of drivers in a network, and their relationship to the NOS and OSI model function of drivers in a network. I know how drivers are selected and implemented for various network components. I learn how to install, remove and update NIC driver. I know the detailed operation of different IEEE 802.N network configurations, the 802 protocols to the existing OSI layers, how architecture influences access and control of the network and merits of different architectures. I understand some scenarios where architecture might be favored over another, the role of packets and how they are built up from their various components. I also know the example where data packets are transmitted through different layers of the OSI model, the role of protocols at different layers of the OSI model, the function of specific protocols examples of transmission between different network layers.Through this assignment, I learn a lot.Reference/wiki/OSI_model#Cross-layer_functions [Accessed on June 25, 2011]/wiki/IEEE_802 [Accessed on June 25, 2011]/ccna/internetworking/lanprotocols.html [Accessed on June 25, 2011]/wiki/Token_passing [Accessed on June 25, 2011]/wiki/Carrier_sense_multiple_access_with_collision_detection /wiki/ARCnet [Accessed on June 25, 2011]/~cyh/cis370/ebook/ch03f.htm [Accessed on June 25, 2011] http://docstore.mik.ua/orelly/networking_2ndEd/fire/ch04_01.htm [Accessed on June 25, 2011]/wiki/Transmission_Control_Protocol#TCP_segment_structure [Accessed on June 25, 2011]/n_plus_certifications/protocol_tcp_ip_udp_ftp_t ftp_smtp.htm [Accessed on June 25, 2011]。

英语论文格式

英语论文格式

英文论文的格式通常,学校发的论文写作规定会对一篇Assignment应该写成Essay还是 Report格式作出明确要求。

两种格式的相同之处:?1、字体:Times New Roman,字号:小四,行距:倍(也有双倍间距的)。

请有写作之前就把这些格式调好,以避免写好后再调节,会造成不必要的麻烦。

2、段落之间空一行,每段不要求像中文写作那样空两格,而是直接顶格写。

?两种格式的不同之处:?一、Essay?Essay 的写作相对Report要简单一些。

通常只包括三个部分,绪论(Introduction), 主体(Main Body),结论(Conclusion)。

绪论(Introduction)包括选题(topic)的背景介绍和文章要解决的主要问题,通常占总字数的 10%左右。

主体(Main Body)占总字数80%左右。

如果题目中作了具体要求,就根据题目提到的几个方面来逐一讨论就可以了。

有的题目没有作具体要求,就根据自己的构思来写。

但要求有逻辑性。

结论(Conclusion)也是占10%,在这一段里把文章中的主要观点用一到两句话概括出来。

Essay 可以不写题目,不要把小标题加粗。

二、Report:?它的写法大体上和essay差不多,但要求要严格一些。

?1、标题页:包括标题和executive summary. Executive summary是对文章的摘要,这两个部分一般是单独占一页。

?2、主体部分:Report的主体部分,前三个和essay差不多,只是在conclusion后还有一部分就是recommendations,是对提出的问题的建议。

?如果题目中没有单独要求,一般就按照这几部分来写,但有的题目会作出规定。

请按题目要求写哪几部分来写。

?Reference?Reference 是几乎所有老师最看重的,所以请一定注意。

?1、不管前面的主体部分最后一页剩多少空格,reference都要另起一页写;?2、每条reference之间要空一行。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

英文Assignment的写作细节(别说留学生天天就是花天酒地的玩,我们比你们要辛苦)来源:王嘉煊Sylvia的日志我们的assignment通常分为两种形式,一是essay,一是report。

二者在形式上有所差别,但大体相同。

一篇assignment上面会对写成essay还是report格式作出明确要求。

在阅读题目时,请尽量仔细相同点:1、字体:Times New Roman,字号:小四,行距:1.5倍。

请有写作之前就把这些格式调好,以避免写好后再调会出现一些意想不到的情况。

2、段与段之间隔行。

每段不要求像中文写作那样空两格,而是直接顶格写。

下面还有一些相同点,我在两种文体分开讨论时,再涉及。

区别:Essay:Essay的写作相对report要简单一些。

通常只包括三个部分,Introduction, Main Body, Conclusion. Introduction 包括topic的背景介绍和文章要解决的主要问题。

一般占总字数的10%左右。

Main Body是主体部分,占总字数80%左右。

如果题目中作了具体要求,就根据题目提到的几个方面来逐一讨论就可以了。

有的题目没有作具体要求,就根据自己的构思来写。

但要求有逻辑性。

Conclusion也是占10%,在这一段里把文章中的主要观点用一到两句话概括出来。

Essay 可以不写题目,不要把小标题加粗。

Reference的写作是两种形式都要涉及的,我放在最后来详细说。

Report:它的写法大体上和essay差不多,但要求要严格一些。

第一:标题页:包括标题和executive summary. 在Executive summary中是对文章的摘要。

这个大家都知道怎么写我就不多说了。

这两个东西一般是单独占一页第二:主体部分。

Report的主体部分,前三个和essay差不多,只是在conclusion后还有一部分就是recommendations.是对提出的问题的建议。

如果题目中没有单独要求,一般就按照这几部分来写,但有的题目会作出规定。

请按题目要求写哪几部分来写。

下面来说referenceReference 是老师最看重的,所以请一定注意。

1、不管前面的主体部分最后一页剩多少空格,reference都要另起一页写2、每条reference之间要空一行。

如果一条reference一排写不完,那么下面的几排提行时要和第一排三格。

基本格式请参照我发过来的referencing 里面的要求。

3、References 的排列要按字母顺序排列。

可以用网址的reference放在最后。

4、引用分为直接引用和间接引用。

直接引用就是用了文章或书中的原话。

请在出现的作者后面以(年代,页码)的形式标注。

没有出现作者就在引用的句子后面用(作者名,年代,页码)的形式标注。

间接引用就是参照发文章或书中的观点,引用方法与直接引用形式一样,只是不需要标注页码。

总之referencesq绝对不能出现编造的情况,一定要真实。

国外对这个问题查得很严。

一旦查出有作假或抄袭情况,有可能就要被开除学籍。

另外还有一些更细节的要求,我附在下面,请仔细阅读。

写作注意事项:文章里禁止用缩写,例如:can’t, don’t, didn’t, wouldn’t 应该写成cannot,do not,d id not,would not。

每段之间空一行,首句不空格避免用口语词汇和表达方法,例如:a little bit,well…I will talk about….避免使用太过生僻的赐予,但用词要专业不要从句套从句,句子如果过长,就改成短句,这样意思表达更清楚文章的INTRODUCTION要阐明自己的观点和立场,也就是你的THESIS STATEMENT,尽量不要在文章或段落的开头使用问句。

专业知识和词汇使用要正确文章字数控制在规定字数内,不得多于或少于150举例非常重要,但是要符合论点按照文章要求写,没有要求Abstract或者标题的就不用写。

行距1.5倍,Basic Font:Times New Roman 12pt文章里禁止使用第一人称或第二人称,保持论证的客观性Reference的重要性国外对于版权和他人的知识版权的保护非常重视,如果非法摘抄他人的作品肯能会引起法律责任。

学校会有一个扫描文章系统,收到的文章都要上传到网上统一进行扫描。

扫描系统非常庞大,它连接了各个国家的主要电子图书馆,所以一般你能抄到的东西,他都可以扫描出来,如果扫描结果显示你抄袭的文章字数超过你文章总数的10%,则证明你整篇文章都是抄袭的。

比如你文章字数是1000字,那么如果扫描由101字是抄的,则证明你整篇文章都是抄的。

(不同学校具体要求不一样)什么是抄袭?引用和摘抄他人的idea,文章(就算一句话),没有做references的或者格式错误的ref erence都算抄袭!Reference个种类我们要做的reference有2种,一种是in-text reference 也就是在文章里的reference,一种是在文章最后出现的reference, 也就是reference list。

写一篇论文,2种reference都要出现,也就是说做完in-text reference,还要做最后的reference list。

Reference的格式详见英文版。

Reference wizard 网站:/apa5/apawiz.html进入个网站,只要按照他要求的内容输入,他的系统会自动生成一个完整的reference,不过那只是reference list,不是in-text reference. In-text reference 还是需要自己完成。

另外那个网站只能提供简单格式的reference,复杂的reference还是需要参考英文版文件。

一般来说一份1000字的文章,至少需要8个references,2000字需要12-15个左右,各位可以到国外大学图书馆的网站上照着相关的书,然后安上去就好了。

(关于这个数量问题,根据我的经验,可以不一定严格要求,但不能太少。

一般1000字的写4个或5个,2000字的写10个左右。

当然如果你本来就有这么多个的话就更好了。

我这里说的是最少情况)再次强调!!!引用他人的任何东西一定要做好references!!!论文写作要求格式要求行距:1.5倍页边距:Word 默认字体:Times New Roman字体大小:12(小四)标题字体可加粗每段落之间空一行每段直接写,无需空格在每页的右下角插入页数写作要求Abstract (序)1-2段字数为文章的的10-15%,例如,一篇文章要求2000字,那么abstract一般写200-300字,除非特殊要求Abstract的目的就是让读者知道你的在你的文章里写了些什么Abstract的开头要用1-2自己的语言总结和解释文章的题目,简单来说就是用自己的话把文章的题目写一遍Abstract细节是概括你在你的文章里都写了什么,每个论点就用2-3句话总结Abstract的结尾就是写总结和延伸你的所有论点和整个的大标题不是每篇作业都要求写abstract,一般情况下都不要求,除非老师特殊写明要写abstra ct。

Introduction(开头)字数为文章总数的10%,例如,一篇文章要求2000字,那么introduction一般写200-250字Introduction只用一段即可,不可以分成2段写Introduction的第1-2句是解释文章题目,单来说就是用自己的话把文章的题目写一遍接下来的用2句话左右介绍一下文章题目的背景Introduction主要是写你将要在你的文章里写些什么,用2-3句话来概括所有的论点,每个论点用几个词即可,例如:In this easy, firstly, I will discuss…, and then I will…, thirdly, I will…一般来说,老师给的题目都很宽,可以写很多方面,但是你要选其中一点来写,这样文章才能讨论的深入,如果文章写的很笼统的话,肯定会不合格Introduction最后不需要总结句Body(文章的讨论部分,也是文章的主体)每一个论点都必须用一段来写,换句话说,每个段落只能出现一个论点,出现2个会被扣分在body的部分里不能出现I,he,she等人称,除在举例中。

每一段话都有要introduction,explanation,examples。

接下来重点讲这4部分如何写: Introduction:用1-2句写你这段的主要的论点或者是ideaExplanation:用1-2句解释你的论点Examples:举例支持你的论点,这部分要重点写,举例在文章中很重要,举例可以用名人说的话,专业的文章里例子,或者自己的亲身经历。

有时老师会要求要用自己的亲身经历作为例子Body一般有3-6个论点,如果文章的字数在1000-3000字,所以body就一般有2-6段每段最好是有联系,层层深入Conclusion字数字数为文章总数的10%,例如,一篇文章要求2000字,那么conclusion一般写200-250字Conclusion只用一段即可,不可以分成2段写Conclusion的第1-2句是解释文章题目,单来说就是用自己的话把文章的题目写一遍 Conclusion主要是总结你文章中的论点,每个论点要用一句话Conclusion最后一句要延伸一下,但是在conclusion里不能出现新的论点Introduction和conclusion的区别Introduction是讲你在文章里要写什么东西,所以只要用几个词概括你个论点Conclusion是用1句话总结你的每个论点,要比introduction详细些Introduction需要介绍题目的背景,conclusion责不用,只需要概括总结题目RecommendationRecommendation是写文章标题的缺陷一般只要写一个论点,提出解决办法,如何消除这个弱点,格式和body段落的要求是一样的:introduction,explanation,example和用一句话做个conclusion 一般都不写recommendation,除非老师特殊要求。

Dissertation的写作方法看这里/viewthread.php?tid=33919。

相关文档
最新文档