《计算机英语》Unit 10

合集下载

计算机英语的课文翻译第十单元 计算机病毒及防护

计算机英语的课文翻译第十单元 计算机病毒及防护

第十单元计算机病毒及防护Part A计算机病毒计算机病毒是一种人为设计的、故意袭击计算机的可执行程序。

因病毒性质不同,它可能破坏硬盘内容,并且或影响计算机的正常运行。

病毒程序能自我复制。

这就意味着通过自身复制,计算机上的病毒会成倍增加。

这种复制是有意图的;它是病毒程序的一部分。

在大多数情况下,如果感染病毒的文件被执行或被复制到另一台计算机,那么那台计算机也会被同一病毒感染。

病毒程序包含一些指令,这些指令会造成负面的影响,导致计算机遭受从无害到瘫痪的后果。

比如:●文件和数据被删除;●计算机安装程序或应用软件缓慢;●计算机屏幕上的内容和图像发生扭曲,并且会出现奇怪的图像和文本;●磁盘空间和文件名会无缘无故被更改;●系统工具如磁盘扫描程序会丧失功能。

病毒可能会随着任何的软件程序进入计算机系统。

对于因特网用户来说,这种威胁可能来自于通过文件传输协议下载文件,或查阅邮件附件。

一旦病毒进入计算机系统,它会粘附于,或有时甚至替代现存程序。

接着,当用户启动有问题的程序时,病毒也就被执行。

这通常发生在用户无意识的情况下。

一旦计算机被病毒感染,最好的挽救办法是购买杀毒软件包如Norton或McAfee并安装设置及时更新系统。

这些软件包可能不能保证计算机免于最新病毒的侵袭,但是提供了最为可能的解决方法。

你应该经常尝试以下操作:●安装杀毒软件并保持更新。

●定制杀毒软件增强保护。

病毒保护页面有许多链接指导你如何获取、安装和定制病毒扫描杀毒软件。

●安装个人防火墙并保持更新。

●备份重要的文档和数据。

●不要打开或浏览不知来源的邮件。

●警惕收到的邮件附件。

如果你不知道它的来源,删除该信息。

●不要从不信任的来源处下载文件。

●为你的操作系统获取最新补丁和更新材料。

计算机专业英语及翻译Unit 10

计算机专业英语及翻译Unit 10

Unit 10 Program DesignText 1 Computer LanguagesComputer languages have undergone dramatic evolution since the first electronic computers were built. Early on, programmers worked with the most primitive computer instructions—machine language. These instructions were represented by long strings of ones and zeroes. Soon, assembly language was invented. It maps machine instructions to human-readable mnemonics, such as ADD and MOV.In time, higher-level languages evolved, such as PASCAL, BASIC, COBOL, C, C++, and JA V A. These languages let people work with something approximating words and sentences, such as Let I = 100. These instructions were translated back into machine language by interpreters and compilers. An interpreter translates a program as it reads it, turning the program instructions, or code, directly into actions. A compiler translates the code into an intermediary form. This step is called compiling, and produces an object file. The compiler then invokes a linker, which turns the object file into an executable program.Because interpreters read the code as it is written and execute the code on the spot, interpreters are easy for the programmer to work with. Compilers, however, introduce the extra steps of compiling and linking the code, which is inconvenient. Because the time-consuming task of translating the source code into machine language has already been accomplished, compilers produce a program that is very fast each time it is run.The problems programmers are asked to solve have been changing. Today's programs use sophisticated "user-friendly interfaces," involving multiple windows, menus, and dialog boxes. The programs written to support this new approach are far more complex than those written just ten years ago. Generally, as programming requirements have changed, both languages and the techniques used for writing programs have evolved.参考译文计算机语言自从第一批电子计算机诞生以来,计算机语言已经发生了戏剧性的变化。

精品课件-IT专业英语-UNIT10

精品课件-IT专业英语-UNIT10
Application case of LAN
ห้องสมุดไป่ตู้
UNIT 10 Computer Network
K ey P oints
Understanding the fundamental concepts of computer network Mastering the several main network technology Understanding the concepts of different kinds of network Understanding the OSI model
UNIT 10 Computer Network
Computer networking cabling (wired Ethernet as defined by IEEE 802.3) consists of 4 pairs of copper cabling that can be utilized for both voice and data transmission. The use of two wires twisted together helps to reduce crosstalk and electromagnetic induction. The transmission speed ranges from 2 million bits per second to 10 billion bits per second. Twisted pair cabling comes in two forms: unshielded twisted pair (UTP) and shielded twisted-pair (STP). Each form comes in several category ratings, designed for use in various scenarios.

计算机专业英语教程课件-Unit 10 Compilers Principles

计算机专业英语教程课件-Unit 10 Compilers Principles
❖ multithreaded:adj.多线程 的
New Words and Phrases
❖ nontrivial:非平凡的 ❖ optimization:n.最佳化;
最优化
❖ overemphasize:v.过分强 调
❖ parallel:adj.平行的 ❖ prevalence:n.流行,普遍 ❖ prioritize:v.给…优先处理 ❖ rearrange:v.重新排列
Unit 10
Compilers’ Principles
New Words and Phrases
❖ automatically:adv.自动地 ❖ compiler:n.自动编码器;
编辑人 ❖ complex:adj.复杂的;n.
合成物 ❖ compilation:n.聚集;编辑
物 ❖ dynamically:adj.有力的;
❖ misnomer:n.误称;用词 不当
❖ magnitude:n.广大,重要 性
❖ multicore:adj.多心的;多 核的
❖ mathematical:adj.数学上 的,精确的
❖ matrix:n.模型,矩阵
❖ minimize:v.使减到最少
❖ multiple:adj.多样的;复 合的
有一个好的了解后才能开始,而且要有全
The optimization must be correct, th preserve the meaning of the
compiled program,
面的实验和评估来验证我们的直觉。编译
The optimization must improve the performance of manyprogra
❖ simultaneously:adv.同时 发生地

《计算机专业英语》课件第10章

《计算机专业英语》课件第10章

UNIT 10
TEXT Embedded System
An embedded system is a computer system designed for specific control functions within a larger system, often with real-time computing constraints. It is embedded as part of a complete device often including hardware and mechanical parts. By contrast, a general-purpose computer, such as a personal computer (PC), is designed to be flexible and to meet a wide range of end-user needs. Embedded systems control many devices in common use today.
UNIT 10
3. The program instructions written for embedded systems are referred to as firmware, and are stored in readonly memory or Flash memory chips. They run with limited computer hardware resources: little memory, small or nonexistent keyboard or screen.
UNIT 10
The integration of microcontrollers has further increased the applications for which embedded systems are used into areas where traditionally a computer would not have been considered. A general purpose and comparatively low-cost microcontroller may often be programmed to fulfill the same role as a large number of separate components. Although in this context an embedded system is usually more complex than a traditional solution, most of the complexity is contained within the microcontroller itself.

计算机英语实用教程Unit 10

计算机英语实用教程Unit 10

Unit 10 Applications【教学目的】○ Learn about the English terms of Applications: boot,click,notebook,ASP,backup,CD-R,CD-RW and etc.○ Improve the students’ ability to understand the long and difficult sentences in the text.○ Master the key language poi nts and grammatical structures in the text.○ consolidate the technical terms and important professional phrases by doing exercises. 【教学重点难点】○Important technical terms:boot(启动),click(点击),notebook(笔记本电脑),ASP(动态服务器主页),backup (备份),CD-R(可写光盘),CD-RW(可改写光盘),DVD(数字化视频光盘),clipboard (剪贴板),compression(压缩),default setting(默认设置),icon(图标),password(密码),virus(病毒),MPEG (运动图像专家组),OCR(光学字符识别软件),extension(扩展名),cookie(小甜饼),applet(小Java程序),DSL (数字用户线路)○ Difficult sentences:1. Usually used as a marketing term to describe a Web site that is or is intended to be the first place people see when using the Web.2. A computer on the same network as an infected computer or that uses an infected disk (even a floppy) or that downloads and runs an infected program can itself become infected.3. Note also that different platforms have different general levels of resistance; UNIX machines are almost immune, Win ’95 / ’98 / ME is quite vulnerable, and most others lie somewhere in between.4. MPEGA family of multimedia standards developed by the Motion Picture Experts Group, commonly used to refer to audio or visual files saved with MPEG compression schemes.5. EncryptionA process that turns files into gobbledegook so that they cannot be read, other than by programs containing the appropriate password-protected encryption software.6. Applets differ from full-fledged Java applications in that they are not allowed to access certain resources on the local computer, such as files and serial devices (modems, printers, etc.), and are prohibited from communicating with most other computers across a network.7. A common configuration of DSL allows downloads at speeds of up to 1.544 megabits (not megabytes) per second, and uploads at speeds of 128 kilobits per second. This arrangement is called ADSL: Asymmetric Digital Subscriber Line.○ Review the important points of essential Englishwill表示“通常会……”by defaulthave uses for ……【教学步骤】Step OneRead and explain Text A to the students and ask the students to keep in mind the following professional terms:boot(启动):Starting up an OS is booting it.click(点击):To press a mouse button.notebook(笔记本电脑):A notebook is a small laptop with similar price, performance, and battery life.ASP(动态服务器主页):Active Server Pagesbackup(备份):To make a second copy of a file as a safety measure.CD-R(可写光盘):Compact DiskCD-RW(可改写光盘):Compact Disc Re-Writable formatDVD(数字化视频光盘):Digital Video Diskclipboard(剪贴板):A section of a co mputer’s memory where you can temporarily copy chunks of text, data, graphics, or pictures.compression(压缩):A technique to reduce the size of a file in order to make it more manageable and quicker to download.default setting(默认设置):The computer or software settings made by the manufacturer. icon(图标):A small picture displayed on-screen to identify a command or file.password(密码):A code used to gain access (login) to a locked system.virus(病毒):A virus is a program that will seek to duplicate itself in memory and on disks, but in a subtle way that will not immediately be noticed.MPEG (运动图像专家组):Motion Picture Experts GroupOCR(光学字符识别软件):Optical Character Recognition.CSS(层次式样表):Cascading style sheetsextensions(扩展名):Files are identified by a three -letter or -number code, called an extension. cookie(小甜饼):A cookie is a small file that a web page on another machine writes to your personal machine’s disk to store various bits of information.applet(小Java程序):A small Java program that can be embedded in an HTML page.DSL (数字用户线路):Digital Subscriber LineStep TwoHelp the students to analyze the following long difficult sentences:ually used as a marketing term to describe a Web site that is or is intended to be the firstplace people see when using the Web.本句解释portal。

计算机英语章节知识点unit10

计算机英语章节知识点unit10

Unit Ten1networks have been split between wide area networks (WANs)and local area networks (LANs)between---- and :常用于difference, divide choose 和spilt 等词之后I asked him whether there was much difference between British and European law .我问他是否英国法律和欧洲法律有明显的不同。

2.A WAN is a network connected over long-distance telephone lines.Over :穿过,越过,翻到-----另一边Electricity cables stretch over the fields . 电缆穿过了田野。

3.It is now possible to connect up LANs remotely over telephone links so that they look as a single LAN.It 是形式主语,真正的主语是动词不定式connect upSo that : 以便(表示目的)connect up:连接。

Connect up the cells of a battery .联接电池组的各个电池。

4 at least : at any lowest estimate or figure .至少。

It will cost at least five pounds .3 a device that lets the computer talk to the network在make ,let ,have ,see, hear ,watch ,notice ,feel, 等动词后的复合宾语,不定式都不带to,I often hear them sing this song .5 The name TCP/IP refers to a suite of data communication protocols.a suite of: suit [swi:t] 作名词。

《计算机英语》Unit Ten

《计算机英语》Unit Ten

总结: 总结 : (all) in all, in conclusion, in short , in brief, on the whole, to conclude, to sum up 等 Above all, we should avoid deciding what we think about people different from ourselves without first having learned a great deal about them and the kind of they have to live.
2、有时用对比连接词或词组表示后面所说的 就是代替前面所叙述的,这样的连接词有: alternatively, rather, instead, an/the alternative is ..., but, than, it might be better if..., whereas 3、前面说过的内容是正确的,后面以对照形 式进一步说明前述内容正确时,可以用下面的 连接词: but, in spite of, however, despite of , nevertheless, on the other hand, nonetheless, even if , although, even if, though.
逻辑联系语
文章是由句子、句群、段落组成的。在文章的 各个组成部分之间存在一定的逻辑关系,这些 逻辑关系有的时候用一定的语言手段表示出来。 用来表示逻辑关系的语言手段叫逻辑联系语。 他们可以表示列举、增补、转折或对比、原因 或结果、解释、总结等关系。逻辑联系语的形 式比较杂,有副词、介词短语、不定式短语、 句子等。他们在句子里多出现在句首,有时出 现在句中,极少出现在句尾。下面按他们表示 的逻辑关系分别举一些例子。
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

1.2 Computer Virus
• II. Choose the best answer to each of the following questions.
1.1 Computer Security
• II. Choose the best answer to each of the following questions.
C
– 1.What is the primary difference of computer security from some other computer science fields? – A.Its varied objectives – B.Its positive enforceable rules – C.Its negative requirements – D.Its impractical for most computer programs
1.1 Computer Security
1. Introduction
2. Security Architecture 3. Hardware Mechanisms that Protect Computers and Data 4. Secure Operating Systems 5. Secure Coding 6. Applications
1.1 Computer Security
• II. Choose the best answer to each of the following questions. B – 3.Which of the following is NOT argued in the instances of computer security accidents in aviation? – A.Human error – B.Computer malfunction – C.Hackers intruding – D.Electromagnetic interference
– ___1.Computer security is a branch of technology arranged under information security category. – ___2.Physically limiting access to computers is approximately one of the strongest approaches to improve computer security. – ___3.Computer programming strategies are often considered as the most dependent approach for computer security among others. – ___4.In aviation, transmitting unauthorized communications over specific radio frequencies may spoof air traffic controllers or simply disrupt communications altogether. – ___5.The issues of computer security are an indispensable part of maintaining an operational industry.
1.2 Computer Virus
• Exercises • I. Read the following statements carefully, and decide whether they are true (T) or false (F) according to the text.
– ___1.Windows is by far the most popular operating system for virus writers due to their market dominance. – ___2.Bugs in software generally means potential exploits for the spread of viruses. – ___3.The method of using a heuristic algorithm to find viruses can detect viruses which haven’t yet been defined in the current database of known virus ―signatures‖. – ___4.The backups on CD/DVD are always safe because the media becomes read-only and can no longer be affected by a virus. – ___5.Anti-virus software can enhance the underlying capability of host software to prevent viruses transmitting.
1.1 Computer Security
• Complex Sentences
– Original: If the operating environment is not based oin a secure operating system capable of maintaining a domain for its own execution, and capable of protecting application code from malicious subversion, and capable of protecting the system from subverted code, then high degrees of security are understandably not possible.
– Translation:如果操作环境不是基于一个安全的操作系统——能够 维持自己的执行域,并能保护应用程序代码免受恶意破坏,以及 保护系统免受破坏代码损害,那么高安全程度是显然不可能的。
1.1 Computer Security
• Exercises • I. Read the following statements carefully, and decide whether they are true (T) or false (F) according to the text.
1.1 Computer Security
• III. Translating.
– 1. Original: The objective of computer security includes protection of information and property from theft,corruption or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. – Translation: – 2. Original Other accidental and intentional faults have caused significant disruption of safety critical systems throughout the last few decades and dependence on reliable communication and electrical power only jeopardizes computer safety. – Translation:
• Part 2 Simulated Writing: Business Letter • Part 3 Listening and Speaking
– Dialogue: Using Anti-virus Software
– Listening Comprehension: Hacker and Cracker – Dictation: Father of the Mouse — Doug Engelbart
1.2 Computer Virus
1. Introduction
2. Infection Strategies 3. Vulnerability and Countermeasures
4. Disadvantages
1.2 Computer Virus
• Complex Sentences
– Original: Just as genetic diversity in a population decreases the chance of a single disease wiping out a population, the diversity of software systems on a network similarly limits the destructive potential of viruses. – Translation:正像在种群中的遗传多样性降低了某种单一疾病灭绝 种群的可能性,网络中软件系统的多样性也类似地限制了病毒的 破坏性潜力。
1.2 Computer Virus
• II. Choose the best answer to each of the following questions.
B
– 1.Which of the following is RIGHT about the infection strategies of viruses? – A.Viruses may take advantage of present network services to facilitate their spread – B.All original viruses must modify the copies in metamorphic viruses for spread – C.The success of viruses all relies on their fast infection rate to spread – D.All viruses pretend that they are executable files in order to replicate themselves
相关文档
最新文档