创建网站宝典英文文献翻译

合集下载

外文文献与翻译

外文文献与翻译

JavaScriptWhen I was a young journeyman programmer, I would learn about every feature of the languages I was using,and I would attempt to use all of those features when I wrote. I suppose it was a way of showing off,and I suppose it worked because I was the guy you went to if you wanted to know how to use a particular feature。

Eventually I figured out that some of those features were more trouble than they were worth。

Some of them were poorly specified, and so were more likely to cause portability problems。

Some resulted in code that was difficult to read or modify. Some induced me to write in a manner that was too tricky and error-prone. And some of those features were design errors。

Sometimes language designers make mistakes。

Most programming languages contain good parts and bad parts. I discovered that I could be a better programmer by using only the good parts and avoiding the bad parts。

商城购物系统设计中英文对照外文翻译文献

商城购物系统设计中英文对照外文翻译文献

商城购物系统设计中英文对照外文翻译文献Abstract: Servlet programs run on the server side, ___ CGI-like technologies, Java Servlet has higher efficiency, easier to use, more powerful ns, better portability, and more cost savings.Keywords: ___, Servlet, HTTP service1.1 n of ServletServlets are Java programs that run on web or n servers. It is a middleware that connects requests from web browsers or other HTTP client programs and databases or ns on HTTP servers. The work of the servlet is to perform the tasks of the Simeon, as shown in Figure 1.1.Figure 1.1 The role of web middleware(1) Read explicit data ______ by end users in HTML forms on the page. However, data may also come from applets or custom HTTP client programs. (2) Read implicit request data sent by the browserFigure 1.1 shows a single arrow from the client to the web server, but in fact, there are two types of data transmitted from the client to the web server, which are explicit data entered by the user in the form and background HTTP n. Both types of data are important. HTTP n includes cookies, media types recognized by browsers, ___.(3) Generate resultsThis process may require accessing a database, performing RMI or EJB calls, calling web services, or directly calculating the corresponding response. The actual data may be stored in a nal database. The database may not understand HTTP or may not be able to return results in HTML form, so web browsers ___ with the database. Even if it can do this, for security reasons, we do not want it to do so. Similar ___, we need the web middleware to extract input data from the HTTP stream, communicate with the n, and embed the results into the document.(4) ___) to usersThis document can be sent in us formats, including text (HTML or XML), binary (GIF graphics), ___ underlying formats, such as gzip. However, HTML is the most commonly used formatso far, so one of the important tasks of Servlet and JSP is to wrap the results in HTML.(5) Send implicit HTTP response data to users总之,动态构建网页可以根据具体情况灵活地生成页面,从而满足客户的需求。

毕业论文英文文献翻译--计算机网络安全浅析(5篇)

毕业论文英文文献翻译--计算机网络安全浅析(5篇)

毕业论文英文文献翻译--计算机网络安全浅析(5篇)第一篇:毕业论文英文文献翻译--计算机网络安全浅析计算机网络安全浅析摘要:针对计算机网络系统存在的安全性和可靠性问题,本文从网络安全的重要性、理论基础、具备功能以及解决措施等方面提出一些见解,并且进行了详细阐述,以使广大用户在计算机网络方面增强安全防范意识。

关键词:计算机网络虚拟专用网技术加密技术防火墙引言:随着计算机网络技术的发展,网络的安全性和可靠性已成为不同使用层次的用户共同关心的问题。

人们都希望自己的网络系统能够更加可靠地运行,不受外来入侵者干扰和破坏。

所以解决好网络的安全性和可靠性问题,是保证网络正常运行的前提和保障。

一、网络安全的重要性。

在信息化飞速发展的今天,计算机网络得到了广泛应用,但随着网络之间的信息传输量的急剧增长,一些机构和部门在得益于网络加快业务运作的同时,其上网的数据也遭到了不同程度的攻击和破坏。

攻击者可以窃听网络上的信息,窃取用户的口令、数据库的信息;还可以篡改数据库内容,伪造用户身份,否认自己的签名。

更有甚者,攻击者可以删除数据库内容,摧毁网络节点,释放计算机病毒等等。

这致使数据的安全性和自身的利益受到了严重的威胁。

根据美国FBI (美国联邦调查局)的调查,美国每年因为网络安全造成的经济损失超过170 亿美元。

75的公司报告财政损失是由于计算机系统的安全问题造成的。

超过50的安全威胁来自内部。

而仅有59的损失可以定量估算。

在中国,针对银行、证券等金融领域的计算机系统的安全问题所造成的经济损失金额已高达数亿元,针对其他行业的网络安全威胁也时有发生。

由此可见,无论是有意的攻击,还是无意的误操作,都将会给系统带来不可估量的损失。

所以,计算机网络必须有足够强的安全措施。

无论是在局域网还是在广域网中,网络的安全措施应是能全方位地针对各种不同的威胁和脆弱性,这样才能确保网络信息的保密性、完整性和可用性。

二、网络安全的理论基础。

国际标准化组织(ISO)曾建议计算机安全的定义为:“计算机系统要保护其硬件、数据不被偶然或故意地泄露、更改和破坏。

外文文献-中文翻译-数据库

外文文献-中文翻译-数据库

外文文献-中文翻译-数据库英文原文2:《DBA Survivor: Become a Rock Star DBA》by Thomas LaRock,Published By Apress.2010You know that a database is a collection of logically related data elements that may be structured in various ways lo meet the multiple processing and retrieval needs of organizations and individuals. There’s nothing new about databases—early ones were chiseled in stone, penned on scrolls, and written on index cards. But now databases are commonly recorded on magnetizable media, and computer programs are required to perform the necessary storage and retrieval operations.Yo u’ll see in the following pages that complex data relationships and linkages may be found in all but the simplest databases. The system software package that handles the difficult tasks associated with creating, accessing, and maintaining database records is called a database management system (DBMS) .The programs in a DBMS package establish an interface between the database itself and the users of the database. (These users may be applications programmers, managers and others with information needs, and various OS programs.)A DBMS can organize, process, and present selected data elements from the database. This capability enables decision makers to search, probe, and query database contents in order to extract answers to nonrecurring and unplanned questions (hat aren't available in regular reports. These questions might initially be vague and / or poorly defined, but peo ple can "browse” through the database until they have the needed information. Inshort, the DBMS will “m anage”the stored data items and assemble the needed items from the common database in response to the queries of those who aren’t10programmers. In a file-oriented system, users needing special information may communicate their needs to a programmer, who, when time permits, will write one or more programs to extract the data and prepare the information[4].The availability of a DBMS, however, offers users a much faster alternative communications path.If the DBMS provides a way to interactively and update the database, as well as interrogate it capability allows for managing personal data-Aces however, it does not automatically leave an audit trail of actions and docs not provide the kinds of control a necessary in a multiuser organization. These-controls arc only available when a set of application programs arc customized for each data entry and updating function.Software for personal computers which perform me of the DBMS functions have been very popular. Personal computers were intended for use by individuals for personal information storage and process- These machines have also been used extensively small enterprises, professionals like doctors, acrylics, engineers, lasers and so on .By the nature of intended usage, database systems on these machines except from several of the requirements of full doge database systems. Since data sharing is not tended, concurrent operations even less so. the fewer can be less complex. Security and integrity maintenance arc de-emphasized or absent. As data limes will be small, performance efficiency is also important. In fact, the only aspect of a database system that is important is data Independence. Data-dependence, as stated earlier, means that applicant programs and user queries need not recognizant physical organization of data on secondary storage. The importance of this aspect, particularly for the personal computer user, is that this greatly simplifies database usage. The user can store, access and manipulate data a( a high level (close to (he application) and be totally shielded from the10low level (close to the machine) details of data organization. We will not discuss details of specific PC DBMS software packages here. Let us summarize in the following the strengths and weaknesses of personal computer data-base software systems:The most obvious positive factor is the user friendliness of the software. A user with no prior computer background would be able to use the system to store personal and professional data, retrieve and perform relayed processing. The user should, of course, satiety himself about the quality of software and the freedom from errors (bugs) so that invest-merits in data arc protected.For the programmer implementing applications with them, the advantage lies in the support for applications development in terms of input screen generations, output report generation etc. offered by theses stems.The main negative point concerns absence of data protection features. Unless encrypted, data cane accessed by whoever has access to the machine Data can be destroyed through mistakes or malicious intent. The second weakness of many of the PC-based systems is that of performance. If data volumes grow up to a few thousands of records, performance could be a bottleneck.For organization where growth in data volumes is expected, availability of. the same or compatible software on large machines should be considered.This is one of the most common misconceptions about database management systems that are used in personal computers. Thoroughly comprehensive and sophisticated business systems can be developed in dBASE, Paradox and other DBMSs. However, they are created by experienced programmers using the DBMS's own programming language. Thai is not the same as users who create and manage personal10files that are not part of the mainstream company system.Transaction Management of DatabaseThe objective of long-duration transactions is to model long-duration, interactive Database access sessions in application environments. The fundamental assumption about short-duration of transactions that underlies the traditional model of transactions is inappropriate for long-duration transactions. The implementation of the traditional model of transactions may cause intolerably long waits when transactions aleph to acquire locks before accessing data, and may also cause a large amount of work to be lost when transactions are backed out in response to user-initiated aborts or system failure situations.The objective of a transaction model is to pro-vide a rigorous basis for automatically enforcing criterion for database consistency for a set of multiple concurrent read and write accesses to the database in the presence of potential system failure situations. The consistency criterion adopted for traditional transactions is the notion of scrializability. Scrializa-bility is enforced in conventional database systems through theuse of locking for automatic concurrency control, and logging for automatic recovery from system failure situations. A “transaction’’ that doesn't provide a basis for automatically enforcing data-base consistency is not really a transaction. To be sure, a long-duration transaction need not adopt seri-alizability as its consistency criterion. However, there must be some consistency criterion.Version System Management of DatabaseDespite a large number of proposals on version support in the context of computer aided design and software engineering, the absence of a consensus on version semantics10has been a key impediment to version support in database systems. Because of the differences between files and databases, it is intuitively clear that the model of versions in database systems cannot be as simple as that adopted in file systems to support software engineering.For data-bases, it may be necessary to manage not only versions of single objects (e.g. a software module, document, but also versions of a collection of objects (e.g. a compound document, a user manual, etc. and perhaps even versions of the schema of database (c.g. a table or a class, a collection of tables or classes).Broadly, there arc three directions of research and development in versioning. First is the notion of a parameterized versioning", that is, designing and implementing a versioning system whose behavior may be tailored by adjusting system parameters This may be the only viable approach, in view of the fact that there are various plausible choices for virtually every single aspect of versioning.The second is to revisit these plausible choices for every aspect of versioning, with the view to discardingsome of themes either impractical or flawed. The third is the investigation into the semantics and implementation of versioning collections of objects and of versioning the database.There is no consensus of the definition of the te rm “management information system”. Some writers prefer alternative terminology such as “information processing system”, "information and decision syste m, “organizational information syste m”, or simply “i nformat ion system” to refer to the computer-based information processing system which supports the operations, management, and decision-making functions of an organization. This text uses “MIS” because i t is descriptive and generally understood; it also frequently uses "information system”instead of ''MIS” t o refer to an organizational information system.10A definition of a management information system, as the term is generally understood, is an integrated, user-machine system for providing information 丨o support operations, management, and decision-making functions in an organization. The system utilizes computer hardware and software; manual procedures: models for analysis planning, control and decision making; and a database. The fact that it is an integrated system does not mean that it is a single, monolithic structure: rather, ii means that the parts fit into an overall design. The elements of the definition arc highlighted below: Computer-based user-machine system.Conceptually, a management information can exist without computer, but it is the power of the computer which makes MIS feasible. The question is not whether computers should be used in management information system, but the extent to whichinformation use should be computerized. The concept of a user-machine system implies that some (asks are best performed humans, while others are best done by machine. The user of an MIS is any person responsible for entering input da(a, instructing the system, or utilizing the information output of the system. For many problems, the user and the computer form a combined system with results obtained through a set of interactions between the computer and the user.User-machine interaction is facilitated by operation in which the user's input-output device (usually a visual display terminal) is connected lo the computer. The computer can be a personal computer serving only one user or a large computer that serves a number of users through terminals connected by communication lines. The user input-output device permits direct input of data and immediate output of results. For instance, a person using The computer interactively in financial planning poses 4t what10if* questions by entering input at the terminal keyboard; the results are displayed on the screen in a few second.The computer-based user-machine characteristics of an MIS affect the knowledge requirements of both system developer and system user, “computer-based” means that the designer of a management information system must have a knowledge of computers and of their use in processing. The “user-machine” concept means the system designer should also understand the capabilities of humans as system components (as information processors) and the behavior of humans as users of information.Information system applications should not require users Co be computer experts. However, users need to be able lo specify(heir information requirements; some understanding of computers, the nature of information, and its use in various management function aids users in this task.Management information system typically provide the basis for integration of organizational information processing. Individual applications within information systems arc developed for and by diverse sets of users. If there are no integrating processes and mechanisms, the individual applications may be inconsistent and incompatible. Data item may be specified differently and may not be compatible across applications that use the same data. There may be redundant development of separate applications when actually a single application could serve more than one need. A user wanting to perform analysis using data from two different applications may find the task very difficult and sometimes impossible.The first step in integration of information system applications is an overall information system plan. Even though application systems are implemented one at a10time, their design can be guided by the overall plan, which determines how they fit in with other functions. In essence, the information system is designed as a planed federation of small systems.Information system integration is also achieved through standards, guidelines, and procedures set by the MIS function. The enforcement of such standards and procedures permit diverse applications to share data, meet audit and control requirements, and be shares by multiple users. For instance, an application may be developed to run on a particular small computer. Standards for integration may dictate that theequipment selected be compatible with the centralized database. The trend in information system design is toward separate application processing form the data used to support it. The separate database is the mechanism by which data items are integrated across many applications and made consistently available to a variety of users. The need for a database in MIS is discussed below.The term “information” and “data” are frequently used interchangeably; However, information is generally defined as data that is meaningful or useful to The recipient. Data items are therefore the raw material for producing information.The underlying concept of a database is that data needs to be managed in order to be available for processing and have appropriate quality. This data management includes both software and organization. The software to create and manage a database is a database management system.When all access to any use of database is controlled through a database management system, all applications utilizing a particular data item access the same data item which is stored in only one place. A single updating of the data item updates it for10all uses. Integration through a database management system requires a central authority for the database. The data can be stored in one central computer or dispersed among several computers; the overriding requirement is that there be an organizational function to exercise control.It is usually insufficient for human recipients to receive only raw data or even summarized data. Data usually needs to be processed and presented in such a way that Che result is directed toward the decision to be made. To do this, processing of dataitems is based on a decision model.For example, an investment decision relative to new capital expenditures might be processed in terms of a capital expenditure decision model.Decision models can be used to support different stages in the decision-making process. “Intelligence’’ models can be used to search for problems and/or opportunities. Models can be used to identify and analyze possible solutions. Choice models such as optimization models maybe used to find the most desirable solution.In other words, multiple approaches are needed to meet a variety of decision situations. The following are examples and the type of model that might be included in an MIS to aid in analysis in support of decision-making; in a comprehensive information system, the decision maker has available a set of general models that can be applied to many analysis and decision situations plus a set of very specific models for unique decisions. Similar models are available tor planning and control. The set of models is the model base for the MIS.Models are generally most effective when the manager can use interactive dialog (o build a plan or to iterate through several decision choices under different conditions.10中文译文2:《数据库幸存者:成为一个摇滚名明星》众所周知,数据库是逻辑上相关的数据元的汇集.这些数据元可以按不同的结构组织起来,以满足单位和个人的多种处理和检索的需要。

英文网站建设方案

英文网站建设方案

英文网站建设方案Building an English WebsiteIntroduction:In today's digital age, having a website is essential for any business or organization. With the rise of globalization, English has become the universal language of communication. Therefore, it is crucial to have an English website to reach a global audience. This proposal aims to outline a comprehensive plan for the development of an English website.I. Website Design and Development:- Choose a user-friendly content management system (CMS) like WordPress, which allows easy website management and updates. - Create a visually appealing design that aligns with the brand identity and target audience.- Ensure the website is responsive, so it can be easily navigated on different devices, including desktops, laptops, tablets, and smartphones.- Incorporate a user-friendly interface with clear and intuitive navigation menus to enhance user experience.II. Content Strategy:- Develop high-quality and relevant content in English that will engage the target audience.- Conduct thorough keyword research to optimize the website for search engines, allowing it to rank higher in search results.- Create a blog section to publish regular articles related to the business or organization's field, attracting more visitors and establishing authority.- Include multimedia content, such as images, videos, and infographics, to make the website more visually appealing and informative.III. Localization and Translation:- Translate all existing content from the original language to English while ensuring accuracy and maintaining the intended meaning.- Localize specific content, such as product descriptions or services, to tailor them to the English-speaking audience.- Provide multilingual support, enabling users to switch between different languages easily.IV. Search Engine Optimization (SEO):- Optimize the website's structure and content with relevant keywords to improve search engine rankings.- Ensure proper meta tags and descriptions are in place for each page to make the website more visible in search results.- Build high-quality backlinks to increase website authority and credibility in the eyes of search engines.- Regularly monitor and analyze website traffic and performance using tools like Google Analytics to identify areas for improvement.V. Social Media Integration:- Integrate social media platforms (such as Facebook, Twitter, LinkedIn, and Instagram) into the website to promote brand awareness and increase website traffic.- Enable social sharing buttons on blog posts and other content to encourage users to share it on their social media profiles,expanding the website's reach.VI. Security:- Ensure the website is secure and protected against cyber threats, such as hacking or malware attacks.- Regularly update and patch the website's CMS, themes, and plugins to prevent any vulnerabilities.- Implement SSL certification to encrypt data transmission between the website and users, ensuring their privacy. Conclusion:Building an English website is crucial for businesses and organizations that aim to connect with a global audience. By following the proposed website development plan, a user-friendly, visually appealing, and optimized English website can be created. With high-quality content, social media integration, and strong SEO strategies, the website will have the potential to attract more visitors and achieve its desired goals.。

建筑英文文献及翻译

建筑英文文献及翻译

建筑英文文献及翻译第一篇:建筑英文文献及翻译外文原文出处: NATO Science for Peace and Security Series C: Environmental Security, 2009, Increasing Seismic Safety by Combining Engineering Technologies and Seismological Data, Pages 147-149动力性能对建筑物的破坏引言:建筑物在地震的作用下,和一些薄弱的建筑结构中,动力学性能扮演了一个很重要的角色。

特别是要满足最基本的震动周期,无论是在设计的新建筑,或者是评估已经有的建筑,使他们可以了解地震的影响。

许多标准(例如:欧标,2003;欧标,2006),建议用简单的表达式来表达一个建筑物的高度和他的基本周期。

这样的表达式被牢记在心,得出标定设计(高尔和乔谱拉人,1997),从而人为的低估了标准周期。

因为这个原因,他们通常提供比较低的设计标准当与那些把设计基础标准牢记在心的人(例:乔普拉本和高尔,2000)。

当后者从已进行仔细建立的数字模型中得到数值(例:克劳利普和皮诺,2004;普里斯特利权威,2007)。

当数字估计与周围震动测量的实验结果相比较,有大的差异,提供非常低的周期标准(例:纳瓦洛苏达权威,2004)。

一个概述不同的方式比较确切的结果刊登在马西和马里奥(2008);另外,一个高级的表达式来指定更有说服力的坚固建筑类型,提出了更加准确的结构参数表(建筑高度,开裂,空隙填实,等等)。

联系基础和上层建筑的震动周期可能发生共振的效果。

这个原因对于他们的振动,可能建筑物和土地在非线性运动下受到到破坏,这个必须被重视。

通常,结构工程师和岩土工程师有不同的观点在共振作用和一些变化的地震活动。

结构工程师们认为尽管建筑物和土壤的自振周期和地震周期都非常的接近。

但对于建筑物周期而言,到底是因为结构还是非结构造成的破坏提出了疑问。

电子商务信用中英文对照外文翻译文献

电子商务信用中英文对照外文翻译文献(文档含英文原文和中文翻译)英文:Towards Enhancing Trust on Chinese E-Commerce Abstract:E-Commerce has been much more popular in western countries where the development of E-Commerce systems has been relatively matured. While the technology and social credit environment are well developed, E-Commerce is relatively new and receives fewer acceptances within commercial industries in China. Building trust has been identified as one of the major concerns in E-Commerce.In this paper, we will develop an computational model, which may be used to improve the trust-building relationship among consumers, retailers and authorities. This model considers a number of factors including direct experiences, customer recommendations, and authority certification, while parties involved in the E-Commerce activities can confidently establish and reliably enhance the trustworthiness.We also conduct a case study on how to improve consumer-retailer trust relationship in an E-Commerce application by the use of the trust model, which is one of functional electronic storefronts with the consideration of trustworthiness in China. In addition, the findings from this research will also be helpful for national policy maker on legislation of Chinese E-Commerce activities.Key Words: Trust, E-Commerce, Trust-building, Computational model, Chinese E-Commerce.I. Introduction“With the rapid development of Internet technology, the landscape of exchanging information and doing business has been com pletely changed”. As a new way of doing business, E-Commerce is increasingly affecting, changing and even replacing the traditional commerce approach. People are increasingly accepting and using E-Commerce than ever before. Without any doubt, many network applications, based on initial Door to Door to B2B, B2C, and C2C models, have a profound influence on the global economy. However most of the development of E-Commerce is primarily achieved within a handful of countries, particularly in countries like US, Japan and some of European countries. Since the advent of the Internet in the late 1990’s in China, various applications can be seen in the following years, which stirred thousands of ambitious young Chinese people to establish their own business on-line with a dream of getting wealthy overnight. Over the past few years, almost 70% of the growth in Internet users from all over the world occurred only in China. However, in terms of E-Commerce development, there is still a gap between China and the developed countries. With the increased popularity of the Internet and the continuous improvement of Internet technologies, the development of E-Commerce has just made an impressive start. What hinder the development of Chinese E-Commerce can be attributed to various problems and barriers. Some of these problems such as payment method, distribution problem, and security issues have been partially alleviated. Unfortunately the consumers’ lack of trust towards E-Retailers has been identified as the biggest barrier that needs to be overcome in long-term.In the paper, we will identify the challenges in developing Chinese E-Commerce and propose a model to cooperate with current E-Commerce system as a mean of enhancing trustworthiness. The paper is organized into 6 sections. Section 2 introduces the current standing of E-Commerce, and then Section 3 briefly reviews the challenges in developing E-Commerce, and examines the “Trust problem”, which is identified as the major obstacle that hinders the spreading of E-Commerce in China. In Section 4, we propose a computational model that can be used to address the trust problem. Section 5 specifically discusses how to apply the model to improve trustworthiness, and gives a case study in Section 6. Section 7 concludes the paper by discussing further directions for improving trust between E-Commerce users.II. Current Chinese E-Commerce Standing(I) Issues in E-CommerceTrust has always been the main concern among most of Chinese E-Commerce companies. On one hand, people are impressed by doing business on-line, but on the other hand they are still worried about using E-Commerce widely. Consequently, a gap appeared between on-line retailers’interest in attracting shoppers to their electronic storefronts and many consumers’ trust in those activities. Nevertheless, researches have shown that the trust problem is not only technical problem, but more of a social problem caused by various reasons. First and foremost, for historical reasons, people may lack of confiden ce with others, therefore it’s quite difficult to puttrust in someone else in the beginning. Secondly, the commercial law and regulation for E-Commerce cannot fully protect the interests of consumers and merchants. Therefore E-Commerce users lack the confidence to take the risk when communicating with an unfamiliar party. Thirdly, the social credit system and payment system in China are still not strong enough when carrying complex E-Commerce transactions, so that on-line business frauds may happen, and harm consumers. Last but not least Internet security and cryptography techniques, which can increase consumers’confidence in on-line activity, are still under development. Due to all these issues, E-Commerce specialists commonly regard that the bottleneck of Chinese E-Commerce is as a trust problem than anything else.(II) Opportunities of Chinese E-CommerceIn 2005, Chinese E-Commerce has been experiencing the upsurge of B2C markets. With the recognition of trust problem, many retailers are experimenting with various trust building strategies to establish trustworthiness towards E-Retailers. Establishing trust between E-Commerce users is a long term process. Apart from more education or training in the long term, we can resort to technology to enhance consumer trust in an unfamiliar E-retailer. One effective method is to participate in third-party assurance programs, which assist consumers in an accessible level of trust they should place in an E-Commerce transaction. In that way, merchants who agree to meet a third party assures standards can either use the assure certified technology, or agree to be bound in some way by the assure procedures or oversight are registered by the assure and permitted to display an identifying logo or assurance seal on their website. Consumers can reveal specific validation of the merchants good-standing with the assure or additional disclosures related to the merchants’ business practices or history. Some theories suggest that trust in an E-retailer can be speci fically defined as consumers’ willingness to accept vulnerability in an on-line transaction based on their positive expectations regarding an E-Retailers future behavior. By evaluating a party’s post behavior and tracking its activities, the party’s futu re behavior can be expected and trust level can be considered so that consumers can make purchasing decision according to the trust level of E-Retailer. In this paper, a third party assurance program that can be cooperated with the current E-Commerce system is proposed. Through tracking E-Retailer ’s activity records, collecting consumer experiences, and recommendations, the computation model is capable of considering the level that consumer can trust an unfamiliar E-Retailer. More detail about the model is described in Section 4.III. Challenges in Developing Chinese E-CommerceChinese E-Markets is undeniably of great potential. E-Markets are not only beneficial for national economy, but also for the global economy, especially since China has entered the World Trade Organization (WTO). However, in terms of developing E-Commerce, there is a gap between China and other developed countries. The primary cause is that the advent of information age has a great impact on the economy of industrialized countrie s, while the social environment and China hasn’t become used to its coming. These can be noticed from various aspects including information infrastructure, barriers of social environment, degree of technologyinnovation, level of awareness, and trustworthiness and so on. Technically, the improvement is obvious, but it’s difficult to catch up in short term for some social problems.(I) Informationization GapCurrent social environment in China is yet to match the rapid informationization. The understanding of the relation and interaction between industrialization and informationization is inadequate. In addition, the importance and urgency of informationization in social and economic development haven’t been fully appreciated. Apart from that, for a long term progress, the awareness and acceptance to informationization are still underway both theoretically and practically.Furthermore, the global information infrastructure are building up, China is not a exception. However, the popularity of informational and electronic facilities in China is still behind the USA, even though 70% of the growth in Internet users occurred in China. That is mainly due to the huge population of China and the imbalanced development of different regions.In terms of the innovation of information technology, China is catching up to the developed countries progressively, although the exploring and utilization of information resources and services are not yet adequate.(II) Social Barriers in E-CommerceIn China, E-Commerce activities are impeded by some social barriers as well. For instance, the law and regulation are not flawless. E-commerce gives a full impetus to social and economic development; in the meantime, it raises some new problems. So we need to address the inadequacy of traditional policy and laws in the new circumstance, and recommend new and effective law and regulation system. E-commerce may cause multi-facet problems, such as legitimacy and authentication of E-currency, E-contract, and E-bill. Taxation is another problem. It includes how to collect business tax and custom; whether new tax and collecting methods are needed for some intangible products (e.g. software, electrical audio and video); how to secure market and prevent monopoly, especially telecommunication monopoly; how to protect privacy and Intellectual Property(IP); how to manage and control export and import of intangible products, and so on.There is a lack of E-Commerce standard. Standardization and legislation is a difficult but important task in developing E-Commerce. For instance, before the E-Signature Standard was invented in China, there was no particular standard to normalize the behaviors on Internet, therefore, it could not setup a standard business environment compatible with international standards, which has a huge impact on integration of individual country and global economy.Another problem associated with E-Commerce is the social credit system and payment system. The present E-Commerce can only be regarded as quasi-E-Commerce. Since the credit system lacks of trust, effective monitoring and payment mechanism. The Internet commodity transaction centers only fulfilled parts of E-Commerce processes, but by no mean to be full processes from pre-purchase to post-purchase. The current distribution system for Chinese E-Commerce is still not satisfied enough. For instance, the delivery of products has yet to be separated frommanufacturing and commercial enterprisers. The incomplete distribution system still responds passively to production and sales departments, where different processing links such as warehousing, transporting and loading functions as independent entities so that the distribution problem has not been solved well at present.In summary, these informationization gaps and social barriers indeed hinder the development of Chinese E-Commerce, but many people consider lack of consumers trust in E-Commerce merchants, technology, social, financial and legal infrastructures of E-Commerce environment as the most concerned issues that affect the development in an individual country, since most traditional cues for assessing trust in physical world are not available on-line.(III)Trust IssueTrust is a catalyst for human cooperation, and it has received considerable attention in the business and social science literature. Lack of trust can result in a waste of time and resources on protecting ourselves against possible harm and thereby clogs up the economy. Consumer’s trust in an E-Retailer can be defined as consumers’willingness to accept vulnerability in an on-line transaction based on their positive expectations in regard with an E-Retailers future behavior. Factors that affect trust in E-Commerce for consumers include security risks, privacy risks, and lack of reliability in E-Commerce processes in general. As pointed by Nielsen, real trust builds through a company’s actual behavior towards its customers over time, and it is seen to be difficult to build and easy to lose. Theoretically, there are three trust-building processes summarized in:1. Knowledge-based trust is described as a form of trust that develops over time as one party learns about intentions, capabilities, and activity experiences. Example can be recommendation, evaluations, and reputations.2. Institutional-based trust relied on the creation of a “trust infrastructure”, of socially recognized third-party intermediaries that certify the trustworthiness of parties in a commercial exchange or actually enforce trustworthy behaviors on the part of one or both partners. Such example is certificate, membership of association.3. Trust transfer happens when one party ascribes trustworthiness to an unfamiliar exchange partner based on that partner’s association with a trusted party.In the ext section, we will describe a computational model, which can be used to facilitate the trust- building process in E-Commerce, particularly for Chinese E-Commerce market.In this paper, we surveyed the E-Commerce activities currently under going in China. We have closely analyzed the gap between the informationization and barriers of Chinese E-Commerce systems. Among the topics of facilitating development of a positive, effective and satisfied E-Commerce system, “trust” is a major issue, which has not received adequate attention in past decades. We have proposed a computational trust model (ERC2G), which can foster a trust relationship between consumers and merchants, and illustrate how to apply the model in a Chinese E-Commerce system. From the case study of EI Computer, we briefly talked about the implementation of E-Commerce systems with the consideration of enhancing trust. However, establishing trust must be a complex process, which involves moreinformation sources, so continuous improving and enhancing the trustworthiness will be the main objective we need to achieve in future work.翻译:提升中国电子商务信用度摘要电子商务在西方国家已经非常流行,并且电子商务系统在这些国家的发展也相对成熟。

(word完整版)Unit 2 Bards of the Internet 课文翻译

Unit 2Bards of the InternetPhillip Elmer—Dewitt1. One of the unintended side effects of the invention of the telephone was that writing went out of style. Oh, sure, there were still full—time scribblers —journalists, academics, professional wordsmiths. And the great centers of commerce still found it useful to keep on hand people who could draft a memo, a brief, a press release or a contract。

But given a choice between picking up a pen or a phone, most folks took the easy route and gave their fingers - and sometimes their mind — a rest。

2。

Which makes what’s happening on the computer networks all the more startling. Every night, when they should be watching television, millions of computer users sit down at their keyboards; dial into CompuServe, Prodigy,America Online or the Internet; and start typing - E-mail, bulletin—board postings, chat messages, rants, diatribes, even short stories and poems. Just when the media of McLuhan were supposed to render obsolete the medium of Shakespeare, the online world is experiencing the greatest boom in letter writing since the 18th century.3. “It is my overwhelming belief that E-mail and computer conferencing is teaching an entire generation about the flexibility and utility of prose,” writes Jon Carroll, a columnist at the San Francisco Chronicle. Patrick Nielsen Hayden, an editor at Tor Books, compares electronic bulletin boards with the “scribblers’ compacts” of the late 18th and early 19th centuries, in which members passed letters from hand to hand, adding a little more at each turn。

英文文献资料网站

有用的英文文献资料网站1.Nova Southeastern University(高权限)入口:ID:hpdlibrary PW:library资源列表:ACP Medicine (2006)AHFS Drug Information? (2006)Basic and Clinical Pharmacology - 9th Ed. (2004)Current Diagnosis & T reatment in Orthopedics - 4th Ed. (2006)Current Medical Diagnosis & T reatment - 45th Ed. (2006)Current Obstetric & Gynecologic Diagnosis & T reatment - 9th Ed. (2003) Delmar's Fundamental & Advanced Nursing Skills - 2nd Ed. (2004) Geriatric Medicine: An Evidence Based Approach - 4th Ed. (2003) Griffith's 5-Minute Clinical Consult - 14th Ed. (2006)Merck Manual - 17th Ed. (1999) Centennial EditionRudolph's Pediatrics - 21st Ed. (2003)Schwartz's Principles of Surgery - 8th Ed. (2005)Smith's General Urology - 16th Ed. (2004)USP DI? Drug Info. for the Health Care Pro. - 26th Ed. (2006)Williams Obstetrics - 22nd Ed. (2005)还有一些免费外文文献网站。

毕业论文英文文献及翻译

精品文档 随意编辑 英文原文 ASP.NET and the .NET Framework

ASP.NET is part of Microsoft's overall .NET framework, which contains a vast set of programming classes designed to satisfy any conceivable programming need. In the following two sections, you learn how ASP.NET fits within the .NET framework, and you learn about the languages you can use in your ASP.NET pages. The .NET Framework Class Library Imagine that you are Microsoft. Imagine that you have to support multiple programming languages—such as Visual Basic, JScript, and C++. A great deal of the functionality of these programming languages overlaps. For example, for each language, you would have to include methods for accessing the file system, working with databases, and manipulating strings. Furthermore, these languages contain similar programming constructs. Every language, for example, can represent loops and conditionals. Even though the syntax of a conditional written in Visual Basic differs from the syntax of a conditional written in C++, the programming function is the same. Finally, most programming languages have similar variable data types. In most languages, you have some means of representing strings and integers, for example. The maximum and minimum size of an integer might depend on the language, but the basic data type is the same. Maintaining all this functionality for multiple languages requires a lot of work. Why keep reinventing the wheel? Wouldn't it be easier to create all this functionality once and use it for every language? The .NET Framework Class Library does exactly that. It consists of a vast set of classes designed to satisfy any conceivable programming need. For example, the .NET framework contains classes for handling database access, working with the file system, manipulating text, and generating graphics. In addition, it contains more specialized classes for performing tasks such as working with regular expressions and handling network protocols. 精品文档 随意编辑 The .NET framework, furthermore, contains classes that represent all the basic variable data types such as strings, integers, bytes, characters, and arrays. Most importantly, for purposes of this book, the .NET Framework Class Library contains classes for building ASP.NET pages. You need to understand, however, that you can access any of the .NET framework classes when you are building your ASP.NET pages. Understanding Namespaces As you might guess, the .NET framework is huge. It contains thousands of classes (over 3,400). Fortunately, the classes are not simply jumbled together. The classes of the .NET framework are organized into a hierarchy of namespaces. ASP Classic Note In previous versions of Active Server Pages, you had access to only five standard classes (the Response, Request, Session, Application, and Server objects). ASP.NET, in contrast, provides you with access to over 3,400 classes! A namespace is a logical grouping of classes. For example, all the classes that relate to working with the file system are gathered together into the System.IO namespace. The namespaces are organized into a hierarchy (a logical tree). At the root of the tree is the System namespace. This namespace contains all the classes for the base data types, such as strings and arrays. It also contains classes for working with random numbers and dates and times. You can uniquely identify any class in the .NET framework by using the full namespace of the class. For example, to uniquely refer to the class that represents a file system file (the File class), you would use the following: System.IO.File System.IO refers to the namespace, and File refers to the particular class. NOTE 精品文档 随意编辑 You can view all the namespaces of the standard classes in the .NET Framework Class Library by viewing the Reference Documentation for the .NET Framework. Standard ASP.NET Namespaces The classes contained in a select number of namespaces are available in your ASP.NET pages by default. (You must explicitly import other namespaces.) These default namespaces contain classes that you use most often in your ASP.NET applications: System— Contains all the base data types and other useful classes such as those related to generating random numbers and working with dates and times. System.Collections— Contains classes for working with standard collection types such as hash tables, and array lists. System.Collections.Specialized— Contains classes that represent specialized collections such as linked lists and string collections. System.Configuration— Contains classes for working with configuration files (Web.config files). System.Text— Contains classes for encoding, decoding, and manipulating the contents of strings. System.Text.RegularExpressions— Contains classes for performing regular expression match and replace operations. System.Web— Contains the basic classes for working with the World Wide Web, including classes for representing browser requests and server responses. System.Web.Caching— Contains classes used for caching the content of pages and classes for performing custom caching operations. System.Web.Security— Contains classes for implementing authentication and authorization such as Forms and Passport authentication. System.Web.SessionState— Contains classes for implementing session state. System.Web.UI— Contains the basic classes used in building the user interface of ASP.NET pages.

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

AjaxAjax is short for ‘‘Asynchronous JavaScript and XML.’’ It is cross-platform. It is effectively open source. It is supported by these versions of the major browsers:■ Internet Explorer 5.0 and up■ Netscape 7 and up■ Firefox, Opera 8+■ Safari 1.2 a nd upAlthough it would be a stretch to call Ajax a new technology, and it is certainly not a programming language, it is an adaptive implementation of preexisting tools to provide an integrated, efficient new tool that can be used to make better, faster, more versatile Web applications.As you may know, Ajax, which is a mix or reformulation of existing technologies, facilitates server interaction with elements of a Web page. This, in turn, results in a more responsive application with lower bandwidth usage, and, hence, lower costs, resulting in a win-win situation for all concerned. It is also these features that make it attractive to the so-called Web 2.0 crowd and, those who are involved in software design and development for mobile handheld devices.Following are the major components of Ajax:■ JavaScript as the scripting language to call functions■ XMLHttpRequest is used for asynchronous data transfer from a server■XHTML and Cascading Style Sheets (CSS) are used for uniform encoding andpresentation cross-platform■ Document Object Model (DOM) is used for precise mapping and data display■ XML and XSLT (although, ironically, does not require use of XML for data fetch andtransfer)Ajax provides that slight margin of advantage to get ahead of the competition. But you must know when to use it, and then use it judiciously. Y ou would tend to defeat one of its appealing features — fast, efficient downloads of small segments of data —if you repeatedly called for updates or refreshes of information. Y ou would constantly be tying up system resources with repeated calls for new data, which may not be new at all (or necessary). Would you, for example, find it necessary to refresh the temperature field every 3 seconds on a weather page? It could be better done where a refresh of that field is only done when the new temperature does not equal the old temperature.Async (asynchronous) just means that requests and data may be exchanged across the Internet from the client Web page to the server and back at any time. The JavaScript object used to do this is called XMLHttpRequest. However, there is no requirement that the asynchronous content be formatted in XML.Let’s take a bit of a deeper look into the XMLHttpRequest object.XMLHttpRequestXMLHttpRequest is an object that has properties (which have values) and methods (which have values to be passed or implemented). Following are some uses of XMLHttpRequest that illustrate its lightning speed:■ Instant translation —This is to the extent that a concept such as a word is synchronously defined among the thousands of existing human languages.■ Smart shopping carts — Allows the user to add, remove, or edit products instantly.■ Immediate saving of data —Why force the user to click ‘‘Submit’’ when this objectallows direct saving of data?■ Server/client side validation — Allows you to validate data input on form controls asdata is typed into each element.Because it is used to send and receive data to the server, the XMLHttpRequest object has three components or properties associated with each instance of it:■ onreadystatechange■ readyState■ responseTextThe onreadystatechange property takes the value that has been returned by the server and stores it in the associated function(), which does the processing of the data returned by the server. This is a multistep process.The first step, the assignment of the function to the onreadystatechange property, follows the standard assignment format:xmlHttp.onreadystatechange=function(){Executable statements}ExecuteThe executable statements within the onreadystatechange property are contained within a selection structure that accepts one of five values from a server, each indicating a different state of the condition of the server in relation to the data request made. These returned values are stored within the readyState property. Each time the readyState property value changes, the onreadystatechange function() also executes. Those of you who are familiar with the OSI model might see a similarity to the request states and the analogous setup maintenance and teardown states of the Session Layer . . . or even Windowing.The current state of the object is determined by value in the readyState attribute. When there is a change (in other words, when a state transition occurs), the value in this field changes as follows:■ The value of 0 would indicate that XMLHttpRequest object is in proper mode to beconstructed.■ A value of 1 allows the send method to set up headers and send them to the serverusing the send() method.■ A value of 2 indicates that the request to the server has been sent.■ A value of 3 indicates the server is processing the request.■ A value of 4 indicates that the data request is complete. This does not necessarilymean that the data has been successfully received. It almost certainly has, but, in theevent that the unexpected occurs, you will see a flagged message come up informingyou of the failure.With the data successfully transferred from server to requestor object, you can then invoke the third property of the onreadystatechange object, which is the responseText property.When the readyState == 4 control of the program shifts downward, the actual data sent back from the server can be retrieved by the following generic syntax:Document.myForm.elementName=xmlHttp.responseText;This is then sent on to the Web page element that requested it without reloading the entire document. The responseText, of course, would be the response from the server in a string value.Ajax and the Mobile WebAjax may become a useful technology for mobile applications for the same reason that it is rapidly expanding in the more sedate market of desktop browsers: It is fast, efficient, bandwidthfriendly,and, because of this, will have cost benefits. Following is a list of browsers in themobile market that support the basic Ajax components of the XMLHttpRequest object and basic JavaScript is generally current:■ Internet Explorer Mobile (also known as Pocket Internet Explorer)■ Safari Mobile (iPhone)■ Opera Mob ile newer than v. 8.x, (but excludes Opera Mini)■ Minimo (Gecko-based)■ OpenWave newer than Mercury■ NetFront newer than v.3.4■ BlazerHowever appealing the features of Ajax might be to the mobile browser market, use alone will not drive the market. Applications developed for mobile devices would synergistically drive growth and would help Ajax achieve an unrivalled dominance in the Mobile Web-browsing experience.There are advances in mobile devices that really minimize the bandwidth demands put on wireless browser communication. Using widgets (which are either the graphical interface on devices, or the slimmed-down application, including content, or a combination of both icon and application) that can be installed onto the mobile device via phone, this provides the focus and simplification required for ease of client use and ease of access to whichever applications are needed because so much of the content is preinstalled.In short, mobile widgets often use components of Ajax, namely the asynchronous data transfer. Some observers prognosticate that, since widgets for mobile devices use one of the key features of Ajax (async data transfer) and since iPhone (which is very popular) also uses Ajax-based widgets, then usage is sure to grow.Ajax Quick ReferenceThe following provides a quick reference for key items discussed in this chapter: ■ Ajax is composed of the existing technologies of HTML, JavaScript, XML, CSS, andasynchronous data transfer.■ XMLHttpRequest allows a Web page to communicate direct ly with a server andupdate the page (page element) even after the page has been loaded.■onreadystatechange property holds the latest value retrieved from the server’s response to the readystate request sent out. These values can be 0 to 4, and reflectvarious states of readiness for the data request sent.■ xmlReq.open(Head, url, async, username, password) is the generic request format.■ xmlReq.send() is the generic send format.■document.getElementById(‘someElement’).innerHTML =xmlHttp.responseText; isused to send retrieved data to a Web page element for which the request wasoriginated.■ Different browsers have different versions of the XMLHttpRequest object.Ajax是“异步JavaScript和XML”的简称。

相关文档
最新文档