计算机病毒中英文对照外文翻译文献

计算机病毒中英文对照外文翻译文献
计算机病毒中英文对照外文翻译文献

中英文翻译

COMPUTER VIRUSES

What are computer viruses?

According to Fred Cohen?s well-known definition, a computer virus is a computer program that can infect other computer programs by modifying them in such a way as to include a (possibly evolved) copy of itself. Note that a program does not have to perform outright damage (such as deleting or corrupting files) in order to be called a “virus”. However, Cohen uses the terms within his definition (e.g. “program” and “modify”) a bit differently from the wa y most anti-virus researchers use them, and classifies as viruses some things which most of us would not consider viruses.

Computer viruses are bits of code that damage or erase information, files, or software programs in your computer, much like viruses that infect humans, computer viruses can spread, and your computer can catch a virus when you download an infected file from the Internet or copy an infected file from a diskette. Once the viruses is embedded into your computer?s files, it can immediat ely start to damage or destroy information, or it can wait for a particular date or event to trigger its activity. What are the main types of viruses?

Generally, there are two main classes of viruses. The first class consists of the file Infectors which attach themselves to ordinary program files. These usually infect arbitrary .COM and/or .EXE programs, though some can infect any program for which execution is requested, such as .SYS,.OVL,.PRG,&.MNU files.

File infectors can be either direct action or resident. A direct-action virus selects one or more other programs to infect each other time the program which contains it is executed ,and thereafter infects other programs when “they” are executed (as in the case of the Jerusalem) or when certain other conditions are fulfilled. The Vienna is an example of a direct-action virus. Most other viruses are resident.

The second class is system or boot-record infectors: those viruses, which infect executable code, found in certain system areas on a disk that are not ordinary files. On DOS systems, there are ordinary boot-sector viruses, which infect only the DOS boot sector on diskettes. Examples include Brain, Stoned, Empire, Azusa, and Michelangelo. Such viruses are always resident viruses.

Finally, a few viruses are able to infect both (the Tequila virus is one example). There are often called “multipartite” viruses, though there has been criticism of this name; another name is “boot-and -file” virus.

File system or cluster viruses (e.g. Dir-II) are those that modify directory table entries so that the virus is loaded and executed before the desired program is. Note that the program itself is not physically altered; only the directory entry is. Some consider these infectors to be a third category of viruses, while others consider them to be a sub-category of the file infectors.

What are macro viruses?

Many applications provide the functionality to create macros. A macro is a series of commands to perform some application-specific task. Macros are designed to make life easier, for example, to perform some everyday tasks like text-formatting or spreadsheet calculations.

Macros can be saved as a series of keystrokes (the application record what keys you press); or they can be written in special macro languages (usually based on real programming languages like C and BASIC). Modern applications combine both approaches; and their advanced macro languages are as complex as general purpose programming languages. When the macro language allows files to be modified, it becomes possible to create macros that copy themselves from one file to another. Such self-replicating macros are called macro viruses.

Most macro viruses run under Word for Windows. Since this is a very popular word processor, it provides an effective means for viruses to spread. Most macro viruses are written using the macro language WordBasic. WordBasic is based on the good old BASIC programming language. However, it has many (hundreds of) extensions (for example, to deal with documents: edit, replace string, obtain the name of the current document, open new window, move cursor, etc.).

What is a Trojan horse program?

A type of program that is often confused with viruses is a …Trojan horse? program. This is not a virus, but simply a program (often harmful) that pretends to be something else.

For example, you might download what you think is a new game; but when you run it, it deletes files on your hard drive. Or the third time you start the game, the program E-mail your saved passwords to another person.

Note: simpl y download a file to your computer won?t activate a virus or Trojan horse; you have to execute the code in the file to trigger it. This could mean running a program file, or opening a Word/Excel document in a program (such as Word or Excel) that can execute any macros in the document.

What kind of files can spread viruses?

Viruses have the potential to infect any type of executable code, not just the files that are commonly called “program files”. For example, some viruses infect executable code in the boot sector of floppy disk or in system areas of hard drives. Another type of virus, known as a “macro” virus, can infect word processing and spreadsheet documents that use macros. And it?s possible for HTML documents containing JavaScript or other types of executable code to spread viruses or other malicious code.

Since viruses code must be executed to have any effect, files that the computer treats as pure data are safe. This includes graphics and sound files such as .gif, .jpg, .mp3, .wav, .etc., as well as plain text in .txt files. For example, just viewing picture files won?t infect your computer with a virus. The virus code has to be in a form, such as an .exe program file or a Word .doc file which the computer will

actually try to execute.

How do viruses spread?

The methodology of virus infection was pretty straightforward when first computer viruses such as Lehigh and Jerusalem started appearing. A virus is a small piece of computer code, usually form several bytes to a few tens of bytes, that can do, well, something unexpected. Such viruses attach themselves to executable files—programs, so that the infected program, before proceeding with whatever tasks it is supposed to do, calls the virus code. One of the simplest ways to accomplish that is to append the virus code to the end of the file, and insert a command to the beginning of the program file that would jump right to the beginning of the virus code. After the virus is finished, it jumps back to the point of origination in the program. Such viruses were very popular in the late eighties. The earlier ones only knew how to attach themselves to .Com files, since structure of a .COM file is much simpler than that of an .EXE file—yet another executable file format invented for MS-DOS operating system. The first virus to be closely studied was the Lehigh virus. It attached itself to the file that was loaded by the system at boot time—https://www.360docs.net/doc/fe6542587.html,. the virus did a lot of damage to its host, so after three-four replications it was no longer usable. For that reason, the virus never managed to escape the university network.

When you execute program code that?s infected by a virus, the virus code will also run and try to infect other programs, either on the same computer or on other computers connected to it over a network. And the newly infected programs will try to infect yet more programs.

When you share a copy of an infected file with other computer users, running the file may also infect their computer; and files from those computers may spread the infection to yet more computers.

If your computer if infected with a boot sector virus, the virus tries to write copies of itself to the system areas of floppy disks and hard disks. Then the infected floppy disks may infect other computers that boot from them, and the virus copy on the hard disk will try to infect still more floppies.

Some viruses, known as …multipartite? viruses, and spread both by infecting files

and by infecting the boot areas of floppy disks.

What do viruses do to computers?

Viruses are software programs, and they can do the same things as any other program running on a computer. The accrual effect of any particular virus depends on how it was programmed by the person who wrote the virus.

Some viruses are deliberately designed to damage files or otherwise interfere with your computer?s operation, while other don?t do anything but try to spread themselves around. But even the ones that just spread themselves are harmful, since they damage files and may cause other problems in the process of spreading.

Note that viruses can?t do any damage to hardware: they won?t melt down your CPU, burn out your hard drive, cause your monitor to explode, etc. warnings about viruses that will physically destroy your computer are usually hoaxes, not legitimate virus warnings.

Modern viruses can exist on any system form MS DOS and Window 3.1 to MacOS, UNIX, OS/2, Windows NT. Some are harmless, though hard to catch. They can play a jingle on Christmas or reboot your computer occasionally. Other are more dangerous. They can delete or corrupt your files, format hard drives, or do something of that sort. There are some deadly ones that can spread over networks with or without a host, transmit sensitive information over the network to a third party, or even mess with financial data on-line.

What?s the story on viruses and E-mail?

You can?t get a virus just by reading a plain-text E-mail message or Usenet post. What you have to watch out for are encoded message containing embedded executable code (i.e., JavaScript in HTML message) or message that include an executable file attachment (i.e., an encoded program file or a Word document containing macros).

In order to activate a virus or Trojan horse program, you computer has to execute some type of code .This could be a program attached to an E-mail, a Word document you downloaded from the Internet, or something received on a floppy disk. There?s no special hazard in files attached to Usenet posts or E-mail messages: they?re no more

dangerous than any other file.

What can I do to reduce the chance of getting viruses from E-mail?

Treat any file attachments that might contain executable code as carefully as you would any other new files: save the attachment to disk and then check it with an up-to-date virus scanner before opening the file.

If you E-mail or news software has the ability to automatically execute JavaScript, Word macros, or other executable code contained in or attached to a message, I strongly recommend that you disable this feature.

My personal feeling is that if an executable file shows up unexpectedly attached to an E-mail, you should delete it unless you can positively verify what it is, Who it came from, and why it was sent to you.

The recent outbreak of the Melissa virus was a vivid demonstration of the need to be extremely careful when you receive E-mail with attached files or documents. Just because an E-mail appears to come from someone you trust, this does NOT mean the file is safe or that the supposed sender had anything to do with it.

Some General Tips on Avoiding Virus Infections

1.Install anti-virus software from a well-known, reputable company. UPDATE

it regularly, and USE it regularly.

New viruses come out every single day; an a-v program that hasn?t been

updated for several months will not provide much protection against current

viruses.

2.In addition to scanning for viruses on a regular basis, install an …on access?

scanner (included in most good a-v software packages) and configure it to

start automatically each time you boot your system. This will protect your

system by checking for viruses each time your computer accesses an

executable file.

3.Virus scans any new programs or other files that may contain executable

code before you run or open them, no matter where they come from. There

have been cases of commercially distributed floppy disks and CD-ROMs

spreading virus infections.

4.Anti-virus programs aren?t very good at detecting Trojan horse programs, so

be extremely careful about opening binary files and Word/Excel documents

from unknown or …dubious? sources. This includes posts in binary

newsgroups, downloads from web/ftp sites that aren?t well-known or don?t

have a good reputation, and executable files unexpectedly received as

attachments to E-mail.

5.Be extremely careful about accepting programs or other flies during on-line

chat sessions: this seems to be one of the more common means that people

wind up with virus or Trojan horse problems. And if any other family

members (especially younger ones) use the computer, make sure they know

not to accept any files while using chat.

6.Do regular backups. Some viruses and Trojan horse programs will erase or

corrupt files on your hard drive and a recent backup may be the only way to

recover your data.

Ideally, you should back up your entire system on a regular basis. If this i sn?t practical, at least backup files you can?t afford to lose or that would be difficult to replace: documents, bookmark files, address books, important E-mail, etc.

Dealing with Virus Infections

First, keep in mind “Nick?s First Law of Computer Virus Complaints”:

“Just because your computer is acting strangely or one of your programs doesn?t work right, this does not mean that your computer has a virus.”

1.If you haven?t used a good, up-to-date anti-virus program on your computer,

do that first. Many problems blamed on viruses are actually caused by

software configuration errors or other problems that have nothing to do with

a virus.

2.If you do get infected by a virus, follow the direction in your anti-virus

program for cleaning it. If you have backup copies of the infected files, use

those to restore the files. Check the files you restore to make sure your

backups weren?t infected.

3.for assistance, check the web site and support service for your anti-virus

software.

Note: in general, drastic measures such as formatting your hard drive or using FDISK should be avoided. They are frequently useless at cleaning a virus infection, and may do more harm than good unless you? re very knowledgeable about the effects of the particular virus you?re dealing with.

计算机病毒

什么是计算机病毒?

按照Fred Cohen的广为流传的定义,计算机病毒是一种侵入其他计算机程序中的计算机程序,他通过修改其他的程序从而将(也可能是自身的变形)的复制品嵌入其中。注意一个程序之所以成为“病毒”,并非一定要起彻底的破坏作用(如删除或毁坏文件)。然而,Cohen在他的定义(即“程序”和“修改”)中使用的“病毒”这个术语与大多数反病毒研究人员使用的“病毒”术语有些差别,他把一些我们多数人认为不是病毒的东西也归类为病毒。

计算机病毒是一些能破坏或删除计算机中的信息、文件或程序的代码。正如感染人体的病毒一样,计算机病毒能够扩散。当你的计算机从互联网上下载一个被感染的文件,或者从磁盘上复制一个被感染的文件时,你的计算机就会染上病毒。而一旦病毒进入到你的计算机文件中,它就能马上破坏或摧毁其中的信息,或者等到某个特殊的日期或事件来临时才触发其破坏活动。

个人计算机病毒主要有哪些类型?

一般来说,主要存在着两类计算机病毒。第一类由文件感染型病毒组成,他们将自身依附在普通的程序文件上。这些病毒通常感染任意的.COM和/或EXE文件,尽管有些也感染具有执行功能的文件,如.SYS,.OVL,.PRG和.MNU文件.

文件感染型病毒又可分为“立即执行型”和“驻留型”。立即执行型病毒在含有它的程序每次执行是都对其他的一个或多个文件进行感染,而驻留型病毒在被感染的程序第一次执行时先将自己隐藏在内存中的某个地方,以后当其他程序执行或当某些其他程序特定条件满足时就对它们进行感染(就像耶路撒冷病毒一样)。维也纳病毒是立即执行型病毒的一个例子,大多数其他病毒则是驻留型病毒。

第二类病毒是系统病毒或引导区记录感染型病毒,这些感染可执行代码的病毒出现在磁盘的某些系统区中,而不是普通文件中。在DOS系统中,常见的引导扇区病毒和主引导记录病毒,前者只感染DOS引导扇区,后者感染硬盘的主引导记录和软盘的DOS引导扇区。第二类病毒的例子包括大脑病毒、大麻病毒、帝国病毒、Azusa以及米开郎基罗病毒等,此类病毒通常为驻留型病毒。

另外,有些病毒能感染上述两种对象(如蒸馏酒病毒就是一个例子),这些

病毒常称为“多成分”病毒(尽管这个名字曾遭到过批评),它们的另一个名字是“引导区和文件型”病毒。

文件系统型病毒或“簇”病毒(如Dir-II病毒)是那种修改文件目录表项并且在文件装入、执行前就被装入和执行的病毒。注意,程序本身实际上并没有被修改,只是目录项被修改。有些人把这种感染型病毒看作是第三类病毒,而另一些人把它看作是文件感染型病毒的子类。

什么是宏病毒?

许多应用程序都提供了创建宏的功能。宏是一个完成特定应用任务的命令序列。设计宏的目的是使诸如文本格式化或电子表格计算这样的日常工作更为简单。

宏可以保存成一系列击键(即应用程序记录你按了哪些键),或者它们能够用某些特殊的宏语言像通用程序设计语言一样复杂。当宏语言允许文件被修改时,就有可能建立能将自身从一个文件复制到另一个文件上的宏。这种具有自复制功能的宏称作宏病毒。

大多数的宏病毒都是在Windows的Word软件中运行的,因为Word是一种流行的字处理器,它为病毒的扩散提供了有效的途径。大部分的宏病毒是用WordBasic宏语言编写的。WordBasic基于以前的性能良好的BASIC编程语言,然而它有很多(几百种)扩展功能(如下列文件处理功能:编辑、替换字符串、获取当前文档的名字、打开一个新的窗口、移动光标等)。

什么是特洛伊木马程序?

通常与病毒想混淆的一种程序是特洛伊木马程序.。它不是病毒,仅仅是扮作其他东西的程序(常常是有害的)。

例如,你可能下载了你认为是新游戏的东西,但当你运行它时,它删除了你硬盘上的文件。或者当你第三次运行该游戏时,该程序把你保存了的密码发送给其他人。

注意:仅仅把一个文件下载到你计算机不会激活病毒或特洛伊木马程序。你必须执行文件中的代码才能出触发它。这意味着运行一个程序文件或打开一个可以执行文档中的宏的程序(如Word或Excel)中的Word/Excel文档。

哪些文件可以传播计算机病毒?

计算机病毒有感染任何可执行代码的潜力,不仅仅是通常叫做“程序文件”

计算机病毒

计算机病毒 一、单选:(共55题) 1. 防病毒软件( )所有病毒。 A. 是有时间性的,不能消除 B. 是一种专门工具,可以消除 C. 有的功能很强,可以消除 D. 有的功能很弱,不能消除 参考答案:A 2. 下面关于计算机病毒描述正确的有( )。 A. 计算机病毒是程序,计算机感染病毒后,可以找出病毒程序,进而清除它 B. 只要计算机系统能够使用,就说明没有被病毒感染 C. 只要计算机系统的工作不正常,一定是被病毒感染了 D. 软磁盘写保护后,使用时一般不会被感染上病毒 参考答案:D 3. 下列说法中错误的是( )。 A. 计算机病毒是一种程序 B. 计算机病毒具有潜伏性 C. 计算机病毒是通过运行外来程序传染的 D. 用防病毒卡和查病毒软件能确保微机不受病毒危害 参考答案:D 4. 关于计算机病毒的传播途径,不正确的说法是( )。 A. 通过软件的复制 B. 通过共用软盘 C. 通过共同存放软盘 D. 通过借用他人的软盘 参考答案:C 5. 目前最好的防病毒软件的作用是( )。 A. 检查计算机是否染有病毒,消除已感染的任何病毒 B. 杜绝病毒对计算机的感染 C. 查出计算机已感染的任何病毒,消除其中的一部分 D. 检查计算机是否染有病毒,消除已感染的部分病毒 参考答案:D 6. 文件型病毒传染的对象主要是( )类文件。 A. DBF B. DOC C. COM和EXE D. EXE和DOC 参考答案:C 7. 宏病毒是随着Office软件的广泛使用,有人利用宏语言编制的一种寄生于( )的宏中的计算机病毒。 A. 应用程序 B. 文档或模板 C. 文件夹 D. 具有“隐藏”属性的文件 参考答案:B

中英文参考文献格式

中文参考文献格式 参考文献(即引文出处)的类型以单字母方式标识: M——专著,C——论文集,N——报纸文章,J——期刊文章,D——学位论文,R——报告,S——标准,P——专利;对于不属于上述的文献类型,采用字母“Z”标识。 参考文献一律置于文末。其格式为: (一)专著 示例 [1] 张志建.严复思想研究[M]. 桂林:广西师范大学出版社,1989. [2] 马克思恩格斯全集:第1卷[M]. 北京:人民出版社,1956. [3] [英]蔼理士.性心理学[M]. 潘光旦译注.北京:商务印书馆,1997. (二)论文集 示例 [1] 伍蠡甫.西方文论选[C]. 上海:上海译文出版社,1979. [2] 别林斯基.论俄国中篇小说和果戈里君的中篇小说[A]. 伍蠡甫.西方文论选:下册[C]. 上海:上海译文出版社,1979. 凡引专著的页码,加圆括号置于文中序号之后。 (三)报纸文章 示例 [1] 李大伦.经济全球化的重要性[N]. 光明日报,1998-12-27,(3) (四)期刊文章 示例 [1] 郭英德.元明文学史观散论[J]. 北京师范大学学报(社会科学版),1995(3). (五)学位论文 示例 [1] 刘伟.汉字不同视觉识别方式的理论和实证研究[D]. 北京:北京师范大学心理系,1998. (六)报告 示例 [1] 白秀水,刘敢,任保平. 西安金融、人才、技术三大要素市场培育与发展研究[R]. 西安:陕西师范大学西北经济发展研究中心,1998. (七)、对论文正文中某一特定内容的进一步解释或补充说明性的注释,置于本页地脚,前面用圈码标识。 参考文献的类型 根据GB3469-83《文献类型与文献载体代码》规定,以单字母标识: M——专著(含古籍中的史、志论著) C——论文集 N——报纸文章 J——期刊文章 D——学位论文 R——研究报告 S——标准 P——专利 A——专著、论文集中的析出文献 Z——其他未说明的文献类型 电子文献类型以双字母作为标识: DB——数据库 CP——计算机程序 EB——电子公告

计算机专业毕业设计说明书外文翻译(中英对照)

Talking about security loopholes Richard S. Kraus reference to the core network security business objective is to protect the sustainability of the system and data security, This two of the main threats come from the worm outbreaks, hacking attacks, denial of service attacks, Trojan horse. Worms, hacker attacks problems and loopholes closely linked to, if there is major security loopholes have emerged, the entire Internet will be faced with a major challenge. While traditional Trojan and little security loopholes, but recently many Trojan are clever use of the IE loophole let you browse the website at unknowingly were on the move. Security loopholes in the definition of a lot, I have here is a popular saying: can be used to stem the "thought" can not do, and are safety-related deficiencies. This shortcoming can be a matter of design, code realization of the problem. Different perspective of security loo phole s In the classification of a specific procedure is safe from the many loopholes in classification. 1. Classification from the user groups: ● Public loopholes in the software category. If the loopholes in Windows, IE loophole, and so on. ● specialized software loophole. If Oracle loopholes, Apach e,

中英文论文对照格式

英文论文APA格式 英文论文一些格式要求与国内期刊有所不同。从学术的角度讲,它更加严谨和科学,并且方便电子系统检索和存档。 版面格式

表格 表格的题目格式与正文相同,靠左边,位于表格的上部。题目前加Table后跟数字,表示此文的第几个表格。 表格主体居中,边框粗细采用0.5磅;表格内文字采用Times New Roman,10磅。 举例: Table 1. The capitals, assets and revenue in listed banks

图表和图片 图表和图片的题目格式与正文相同,位于图表和图片的下部。题目前加Figure 后跟数字,表示此文的第几个图表。图表及题目都居中。只允许使用黑白图片和表格。 举例: Figure 1. The Trend of Economic Development 注:Figure与Table都不要缩写。 引用格式与参考文献 1. 在论文中的引用采取插入作者、年份和页数方式,如"Doe (2001, p.10) reported that …" or "This在论文中的引用采取作者和年份插入方式,如"Doe (2001, p.10) reported that …" or "This problem has been studied previously (Smith, 1958, pp.20-25)。文中插入的引用应该与文末参考文献相对应。 举例:Frankly speaking, it is just a simulating one made by the government, or a fake competition, directly speaking. (Gao, 2003, p.220). 2. 在文末参考文献中,姓前名后,姓与名之间以逗号分隔;如有两个作者,以and连接;如有三个或三个以上作者,前面的作者以逗号分隔,最后一个作者以and连接。 3. 参考文献中各项目以“点”分隔,最后以“点”结束。 4. 文末参考文献请按照以下格式:

网络安全外文翻译文献

网络安全外文翻译文献 (文档含英文原文和中文翻译) 翻译: 计算机网络安全与防范 1.1引言 计算机技术的飞速发展提供了一定的技术保障,这意味着计算机应用已经渗透到社会的各个领域。在同一时间,巨大的进步和网络技术的普及,社会带来了巨大的经济利润。然而,在破坏和攻击计算机信息系统的方法已经改变了很多的网络环境下,网络安全问题逐渐成为计算机安全的主流。

1.2网络安全 1.2.1计算机网络安全的概念和特点 计算机网络的安全性被认为是一个综合性的课题,由不同的人,包括计算机科学、网络技术、通讯技术、信息安全技术、应用数学、信息理论组成。作为一个系统性的概念,网络的安全性由物理安全、软件安全、信息安全和流通安全组成。从本质上讲,网络安全是指互联网信息安全。一般来说,安全性、集成性、可用性、可控性是关系到网络信息的相关理论和技术,属于计算机网络安全的研究领域。相反,狭隘“网络信息安全”是指网络安全,这是指保护信息秘密和集成,使用窃听、伪装、欺骗和篡夺系统的安全性漏洞等手段,避免非法活动的相关信息的安全性。总之,我们可以保护用户利益和验证用户的隐私。 计算机网络安全有保密性、完整性、真实性、可靠性、可用性、非抵赖性和可控性的特点。 隐私是指网络信息不会被泄露给非授权用户、实体或程序,但是授权的用户除外,例如,电子邮件仅仅是由收件人打开,其他任何人都不允许私自这样做。隐私通过网络信息传输时,需要得到安全保证。积极的解决方案可能会加密管理信息。虽然可以拦截,但它只是没有任何重要意义的乱码。 完整性是指网络信息可以保持不被修改、破坏,并在存储和传输过程中丢失。诚信保证网络的真实性,这意味着如果信息是由第三方或未经授权的人检查,内容仍然是真实的和没有被改变的。因此保持完整性是信息安全的基本要求。 可靠性信息的真实性主要是确认信息所有者和发件人的身份。 可靠性表明该系统能够在规定的时间和条件下完成相关的功能。这是所有的网络信息系统的建立和运作的基本目标。 可用性表明网络信息可被授权实体访问,并根据自己的需求使用。 不可抵赖性要求所有参加者不能否认或推翻成品的操作和在信息传输过程中的承诺。

中英文论文参考文献标准格式 超详细

超详细中英文论文参考文献标准格式 1、参考文献和注释。按论文中所引用文献或注释编号的顺序列在论文正文之后,参考文献之前。图表或数据必须注明来源和出处。 (参考文献是期刊时,书写格式为: [编号]、作者、文章题目、期刊名(外文可缩写)、年份、卷号、期数、页码。参考文献是图书时,书写格式为: [编号]、作者、书名、出版单位、年份、版次、页码。) 2、附录。包括放在正文内过份冗长的公式推导,以备他人阅读方便所需的辅助性数学工具、重复性数据图表、论文使用的符号意义、单位缩写、程序全文及有关说明等。 参考文献(即引文出处)的类型以单字母方式标识,具体如下: [M]--专著,著作 [C]--论文集(一般指会议发表的论文续集,及一些专题论文集,如《***大学研究生学术论文集》[N]-- 报纸文章 [J]--期刊文章:发表在期刊上的论文,尽管有时我们看到的是从网上下载的(如知网),但它也是发表在期刊上的,你看到的电子期刊仅是其电子版 [D]--学位论文:不区分硕士还是博士论文 [R]--报告:一般在标题中会有"关于****的报告"字样 [S]-- 标准 [P]--专利 [A]--文章:很少用,主要是不属于以上类型的文章 [Z]--对于不属于上述的文献类型,可用字母"Z"标识,但这种情况非常少见 常用的电子文献及载体类型标识: [DB/OL] --联机网上数据(database online) [DB/MT] --磁带数据库(database on magnetic tape) [M/CD] --光盘图书(monograph on CDROM) [CP/DK] --磁盘软件(computer program on disk) [J/OL] --网上期刊(serial online) [EB/OL] --网上电子公告(electronic bulletin board online) 很显然,标识的就是该资源的英文缩写,/前面表示类型,/后面表示资源的载体,如OL表示在线资源 二、参考文献的格式及举例 1.期刊类 【格式】[序号]作者.篇名[J].刊名,出版年份,卷号(期号)起止页码. 【举例】 [1] 周融,任志国,杨尚雷,厉星星.对新形势下毕业设计管理工作的思考与实践[J].电气电子教学学报,2003(6):107-109. [2] 夏鲁惠.高等学校毕业设计(论文)教学情况调研报告[J].高等理科教育,2004(1):46-52. [3] Heider, E.R.& D.C.Oliver. The structure of color space in naming and memory of two languages [J]. Foreign Language Teaching and Research, 1999, (3): 62 67. 2.专著类

计算机专业外文文献翻译6

外文文献翻译(译成中文2000字左右): As research laboratories become more automated,new problems are arising for laboratory managers.Rarely does a laboratory purchase all of its automation from a single equipment vendor. As a result,managers are forced to spend money training their users on numerous different software packages while purchasing support contracts for each. This suggests a problem of scalability. In the ideal world,managers could use the same software package to control systems of any size; from single instruments such as pipettors or readers to large robotic systems with up to hundreds of instruments. If such a software package existed, managers would only have to train users on one platform and would be able to source software support from a single vendor. If automation software is written to be scalable, it must also be flexible. Having a platform that can control systems of any size is far less valuable if the end user cannot control every device type they need to use. Similarly, if the software cannot connect to the customer’s Laboratory Information Management System (LIMS) database,it is of limited usefulness. The ideal automation software platform must therefore have an open architecture to provide such connectivity. Two strong reasons to automate a laboratory are increased throughput and improved robustness. It does not make sense to purchase high-speed automation if the controlling software does not maximize throughput of the system. The ideal automation software, therefore, would make use of redundant devices in the system to increase throughput. For example, let us assume that a plate-reading step is the slowest task in a given method. It would make that if the system operator connected another identical reader into the system, the controller software should be able to use both readers, cutting the total throughput time of the reading step in half. While resource pooling provides a clear throughput advantage, it can also be used to make the system more robust. For example, if one of the two readers were to experience some sort of error, the controlling software should be smart enough to route all samples to the working reader without taking the entire system offline. Now that one embodiment of an ideal automation control platform has been described let us see how the use of C++ helps achieving this ideal possible. DISCUSSION C++: An Object-Oriented Language Developed in 1983 by BjarneStroustrup of Bell Labs,C++ helped propel the concept of object-oriented programming into the mainstream.The term ‘‘object-oriented programming language’’ is a familiar phrase that has been in use for decades. But what does it mean? And why is it relevant for automation software? Essentially, a language that is object-oriented provides three important programming mechanisms:

建设部文献中英文对照

贯彻落实科学发展观大力发展节能与绿色建筑 (2005年2月23日) 中华人民共和国建设部 节能建筑是按节能设计标准进行设计和建造、使其在使用过程中降低能耗的建筑。 绿色建筑是指为人们提供健康、舒适、安全的居住、工作和活动的空间,同时在建筑全生命周期(物料生产,建筑规划、设计、施工、运营维护及拆除过程)中实现高效率地利用资源(能源、土地、水资源、材料)、最低限度地影响环境的建筑物。绿色建筑也有人称之为生态建筑、可持续建筑。 一、发展节能与绿色建筑的重要意义 建筑作为人工环境,是满足人类物质和精神生活需要的重要组成部分。然而,人类对感官享受的过度追求,以及不加节制的开发与建设,使现代建筑不仅疏离了人与自然的天然联系和交流,也给环境和资源带来了沉重的负担。据统计,人类从自然界所获得的50%以上的物质原料用来建造各类建筑及其附属设施,这些建筑在建造与使用过程中又消耗了全球能源的50%左右;在环境总体污染中,与建筑有关的空气污染、光污染、电磁污染等就占了34%;建筑垃圾则占人类活动产生垃圾总量的40%;在发展中国家,剧增的建筑量还造成侵占土地、破坏生态环境等现象日益严重。中国正处于工业化和城镇化快速发展阶段,要在未来15年保持GDP年均增长7%以上,将面临巨大的资源约束瓶颈和环境恶化压力。严峻的事实告诉我们,中国要走可持续发展道路,发展节能与绿色建筑刻不容缓。 绿色建筑通过科学的整体设计,集成绿色配置、自然通风、自然采光、低能耗围护结构、新能源利用、中水回用、绿色建材和智能控制等高新技术,具有选址规划合理、资源利用高效循环、节能措施综合有效、建筑环境健康舒适、废物排放减量无害、建筑功能灵活适宜等六大特点。它不仅可以满足人们的生理和心理需求,而且能源和资源的消耗最为经济合理,对环境的影响最小。 胡锦涛同志指出:要大力发展节能省地型住宅,全面推广节能技术,制定并强制执行节能、节材、节水标准,按照减量化、再利用、资源化的原则,搞好资源综合利用,实现经济社会的可持续发展。温家宝和曾培炎同志也多次指出,建筑节能不仅是经济问题,而且是重要的战略问题。 发展节能与绿色建筑是建设领域贯彻“三个代表”重要思想和十六大精神,认真落实以人为本,全面、协调、可持续的科学发展观,统筹经济社会发展、人与

计算机病毒外文翻译

附录A中英文翻译 With the computer in all areas of social life, the extensive use of computer virus attacks and prevention techniques are expanding. According to reports, the world suffer from computer virus infections and attacks of hundreds of millions of events, which seriously interferes with the normal life of human society, to the computer networks and systems have brought tremendous potential threats and destruction. At the same time, the virus also in the field of war, widely used in the Gulf War, the recent Kosovo war, both sides have used computer viruses to attack enemy, destroy the opponent's computer networks and weapons control systems, to a certain political objectives and military objectives. Can be expected, with the computer, the growing popularity of Internet use, in-depth to prevent computer viruses will be more and more national attention. A computer virus is a group by copying itself to infect other software programs. When the program runs, the embedded virus also will be run and infect other programs. Some viruses do not attack with a malicious code, but more carriers of the virus carrying code, if it is pre-configured environment for excitation, to infection and destruction. Maurice compiled from 80 of the first "worm" virus program so far, the world has appeared in many different types of viruses. It has long been the main goal of computer design is the pursuit of improved information processing capabilities and lower production costs, and inadequate attention to security problems are. The various components of a computer system, interface interface, conversion between various levels, there are many loopholes and weak links. Hardware design even

中英文参考文献格式

中英文参考文献格式! (細節也很重要啊。。)来源:李菲玥的日志 规范的参考文献格式 一、参考文献的类型 参考文献(即引文出处)的类型以单字母方式标识,具体如下: M——专著C——论文集N——报纸文章J——期刊文章 D——学位论文R——报告S——标准P——专利 A——文章 对于不属于上述的文献类型,采用字母“Z”标识。 常用的电子文献及载体类型标识: [DB/OL]——联机网上数据(database online) [DB/MT]——磁带数据库(database on magnetic tape) [M/CD]——光盘图书(monograph on CD ROM) [CP/DK]——磁盘软件(computer program on disk) [J/OL]——网上期刊(serial online) [EB/OL]——网上电子公告(electronic bulletin board online) 对于英文参考文献,还应注意以下两点: ①作者姓名采用“姓在前名在后”原则,具体格式是:姓,名字的首字母. 如:Malcolm R ichard Cowley 应为:Cowley, M.R.,如果有两位作者,第一位作者方式不变,&之后第二位作者名字的首字母放在前面,姓放在后面,如:Frank Norris 与Irving Gordon应为:Norri s, F. & I.Gordon.; ②书名、报刊名使用斜体字,如:Mastering English Literature,English Weekly。二、参考文献的格式及举例 1.期刊类 【格式】[序号]作者.篇名[J].刊名,出版年份,卷号(期号):起止页码. 【举例】 [1] 周融,任志国,杨尚雷,厉星星.对新形势下毕业设计管理工作的思考与实践[J].电气电子教学学报,2003(6):107-109.

计算机专业外文翻译

专业外文翻译 题目JSP Technology Conspectus and Specialties 系(院)计算机系 专业计算机科学与技术 班级 学生姓名 学号 指导教师 职称讲师 二〇一三年五月十六日

JSP Technology Conspectus and Specialties The JSP (Java Server Pages) technology is used by the Sun micro-system issued by the company to develop dynamic Web application technology. With its easy, cross-platform, in many dynamic Web application programming languages, in a short span of a few years, has formed a complete set of standards, and widely used in electronic commerce, etc. In China, the JSP now also got more extensive attention; get a good development, more and more dynamic website to JSP technology. The related technologies of JSP are briefly introduced. The JSP a simple technology can quickly and with the method of generating Web pages. Use the JSP technology Web page can be easily display dynamic content. The JSP technology are designed to make the construction based on Web applications easier and efficient, and these applications and various Web server, application server, the browser and development tools work together. The JSP technology isn't the only dynamic web technology, also not the first one, in the JSP technology existed before the emergence of several excellent dynamic web technologies, such as CGI, ASP, etc. With the introduction of these technologies under dynamic web technology, the development and the JSP. Technical JSP the development background and development history In web brief history, from a world wide web that most of the network information static on stock transactions evolution to acquisition of an operation and infrastructure. In a variety of applications, may be used for based on Web client, look no restrictions. Based on the browser client applications than traditional based on client/server applications has several advantages. These benefits include almost no limit client access and extremely simplified application deployment and management (to update an application, management personnel only need to change the program on a server, not thousands of installation in client applications). So, the software industry is rapidly to build on the client browser multilayer application. The rapid growth of exquisite based Web application requirements development of

医学文献中英文对照

动脉粥样硬化所导致的心脑血管疾病是目前发病率和死亡率较高的疾病之一。在动脉粥样硬化的形成过程中, 内皮细胞病变是其中极其重要的因素,最显著的变化是动脉内皮功能紊乱, 血管内皮细胞的损伤和功能改变是动脉粥样硬化发生的起始阶段。 Cardiovascular and cerebrovascular disease caused by atherosclerosis is one of diseases with higher mortality and morbidity at present . In the formation of atherosclerosis, the endothelial cell lesion is one of the most important factors, in which, the most significant change is endothelial dysfunction. In addition, the injuries and the changes of vascular endothelial cells are the initial factors of atherosclerosis. 许多因素会导致血管内皮细胞受损, 主要包括脂多糖(Lipopolysaccharides , LPS)、炎症介质、氧自由基等。其中脂多糖因其广泛的生物学作用, 越来越引起研究者的关注。LPS 是一种炎症刺激物, 是革兰阴性杆菌细胞壁的主要组成成分,其通过刺激血管内皮细胞,引起其相关细胞因子和炎性因子的表达紊乱,尤其是Ca2+ 和活性氧簇(Reactive Oxygen Species , ROS的合成和释放发生改变诱导细胞氧化应激内环境紊乱。大量研究表明, LPS 直接参与动脉粥样硬化的形成过程, 特别是动脉粥样硬化血管炎症的初始阶段, LPS可通过直接作用或间接影响的方式激活并损伤内皮细胞,从而引 起血管内皮细胞形态与功能的改变。 Many factors induce vascular endothelial cell damage, including lipopolysaccharides (LPS), inflammatory mediators and oxygen free

英文引用及参考文献格式要求

英文引用及参考文献格式要求 一、参考文献的类型 参考文献(即引文出处)的类型以单字母方式标识,具体如下: M——专著C——论文集N——报纸文章 J——期刊文章D——学位论文R——报告 对于不属于上述的文献类型,采用字母“Z”标识。 对于英文参考文献,还应注意以下两点: ①作者姓名采用“姓在前名在后”原则,具体格式是:姓,名字的首字母.如:MalcolmRichardCowley应为:Cowley,M.R.,如果有两位作者,第一位作者方式不变,&之后第二位作者名字的首字母放在前面,姓放在后面,如:FrankNorris与IrvingGordon应为:Norris,F.&I.Gordon.; ②书名、报刊名使用斜体字,如:MasteringEnglishLiterature,EnglishWeekly。 二、参考文献的格式及举例 1.期刊类 【格式】[序号]作者.篇名[J].刊名,出版年份,卷号(期号):起止页码. 【举例】 [1]王海粟.浅议会计信息披露模式[J].财政研究,2004,21(1):56-58. [2]夏鲁惠.高等学校毕业论文教学情况调研报告[J].高等理科教育,2004(1):46-52. [3]Heider,E.R.&D.C.Oliver.Thestructureofcolorspaceinnamingandmemo ryoftwolanguages[J].ForeignLanguageTeachingandResearch,1999,(3):62–6 7. 2.专著类 【格式】[序号]作者.书名[M].出版地:出版社,出版年份:起止页码. 【举例】[4]葛家澍,林志军.现代西方财务会计理论[M].厦门:厦门大学出版社,2001:42. [5]Gill,R.MasteringEnglishLiterature[M].London:Macmillan,1985:42-45. 3.报纸类 【格式】[序号]作者.篇名[N].报纸名,出版日期(版次). 【举例】 [6]李大伦.经济全球化的重要性[N].光明日报,1998-12-27(3). [7]French,W.BetweenSilences:AVoicefromChina[N].AtlanticWeekly,198 715(33). 4.论文集 【格式】[序号]作者.篇名[C].出版地:出版者,出版年份:起始页码. 【举例】 [8]伍蠡甫.西方文论选[C].上海:上海译文出版社,1979:12-17. [9]Spivak,G.“CantheSubalternSpeak?”[A].InC.Nelson&L.Grossberg(e ds.).VictoryinLimbo:Imigism[C].Urbana:UniversityofIllinoisPress,1988, pp.271-313.

计算机专业外文文献及翻译

计算机专业外文文献及翻译 微软Visual Studio 1微软Visual Studio 是微软公司推出的软软软境~可以用软建来平台下的 Visual Studio Visual StudioWindows 软用程序和软软用程序~也可以用软建软服软、智能软软软用程序和网来网 插件。WindowsOffice Visual 是一自微软的个来集成软软软境;,~可以用软软由它来微StudioIDEinteqrated development environment软软窗~软手机窗~、框架、精软架框和微软的支持的控制台和软Windows https://www.360docs.net/doc/fe6542587.html,Silverlight 形用软界面的软用程序以及窗体软用程序~站网~软用程序和软服软网中的本地代软软同托管WindowsWeb 代软。 包含一由个智能感知和代软重构支持的代软软软器。集成的软软工作作软一源代软软软既个Visual Studio 软器又可以作软一台机器软软软器。其他置工具包括一软软内个窗体的软用程序~软软软软~软软软软~网数据软架GUI 构软软软。有乎各软面的件增强功能~包括增加软支持它几个插源代软控制系软;如和SubversionVisual ,添加新的工具集软软和可软化软软器~如并特定于域的软言或用于其他方面的软件软软生命周期SourceSafe 的工具;例如的客软端,软软软源管理器,。Team Foundation Server

支持不同的软程软言的服软方式的软言~允软代软软软器和软软器;在不同程 度上,支持它Visual Studio 几乎所有的软程软言~提供了一软言特定服软的存在。置的软言中包括个内中;通软C/C + +Visual C+,;通软,~,中;通软,,和,;作软+,https://www.360docs.net/doc/fe6542587.html,Visual https://www.360docs.net/doc/fe6542587.html,CVisual CFVisual Studio ,~软支持其他软言~如和等~可通软安软的软言服软。软也支持装独它的2010M,Python,Ruby 和软特定用软提供服软的也是存在的,微 XML/XSLT,HTML/XHTML ,JavaScriptCSS.Visual Studio软~,、,和。Visual BasicVisual JVisual CVisual C++ 微软提供了“直通软”的软件的和,和~Visual Studio 2010Visual BasicVisual CVisual C + +和版本~不需任何软用。、年和软软版~以及Visual Web DeveloperVisual Studio 201020082005 的特定软言版本;、、,、,,~通软微软的下软Visual Studio 2005Visual BasicC++CJ 软~软生免软。划学DreamSpark 2架构 不支持任何软程软言~解方案或工具本软。相反~允软入各软功能。特定的功决它插Visual Studio 能是作软一个软软包的代软。安软~软功能可以服软器得到。装个从提供三软服软,~VSIDESVsSolution它决提供了能软列软的软目和解方案~提供了口和用软界面功能;包括软软~工具软和工它窗; SVsUIShell 具口,和窗~软理它软软包的注。此外~册软可以软软软软和服软之软软软通信。所有的软软器~SVsShellVSIDE

平面设计中英文对照外文翻译文献

(文档含英文原文和中文翻译) 中英文翻译 平面设计 任何时期平面设计可以参照一些艺术和专业学科侧重于视觉传达和介绍。采用多种方式相结合,创造和符号,图像和语句创建一个代表性的想法和信息。平面设计师可以使用印刷,视觉艺术和排版技术产生的最终结果。平面设计常常提到的进程,其中沟通是创造和产品设计。 共同使用的平面设计包括杂志,广告,产品包装和网页设计。例如,可能包括产品包装的标志或其他艺术作品,举办文字和纯粹的设计元素,如形状和颜色统一件。组成的一个最重要的特点,尤其是平面设计在使用前现有材料或不同的元素。 平面设计涵盖了人类历史上诸多领域,在此漫长的历史和在相对最近爆炸视觉传达中的第20和21世纪,人们有时是模糊的区别和重叠的广告艺术,平面设计和美术。毕竟,他们有着许多相同的内容,理论,原则,做法和语言,有时同样的客人或客户。广告艺术的最终目标是出售的商品和服务。在平面

设计,“其实质是使以信息,形成以思想,言论和感觉的经验”。 在唐朝( 618-906 )之间的第4和第7世纪的木块被切断打印纺织品和后重现佛典。阿藏印在868是已知最早的印刷书籍。 在19世纪后期欧洲,尤其是在英国,平面设计开始以独立的运动从美术中分离出来。蒙德里安称为父亲的图形设计。他是一个很好的艺术家,但是他在现代广告中利用现代电网系统在广告、印刷和网络布局网格。 于1849年,在大不列颠亨利科尔成为的主要力量之一在设计教育界,该国政府通告设计在杂志设计和制造的重要性。他组织了大型的展览作为庆祝现代工业技术和维多利亚式的设计。 从1892年至1896年威廉?莫里斯凯尔姆斯科特出版社出版的书籍的一些最重要的平面设计产品和工艺美术运动,并提出了一个非常赚钱的商机就是出版伟大文本论的图书并以高价出售给富人。莫里斯证明了市场的存在使平面设计在他们自己拥有的权利,并帮助开拓者从生产和美术分离设计。这历史相对论是,然而,重要的,因为它为第一次重大的反应对于十九世纪的陈旧的平面设计。莫里斯的工作,以及与其他私营新闻运动,直接影响新艺术风格和间接负责20世纪初非专业性平面设计的事态发展。 谁创造了最初的“平面设计”似乎存在争议。这被归因于英国的设计师和大学教授Richard Guyatt,但另一消息来源于20世纪初美国图书设计师William Addison Dwiggins。 伦敦地铁的标志设计是爱德华约翰斯顿于1916年设计的一个经典的现代而且使用了系统字体设计。 在20世纪20年代,苏联的建构主义应用于“智能生产”在不同领域的生产。个性化的运动艺术在俄罗斯大革命是没有价值的,从而走向以创造物体的功利为目的。他们设计的建筑、剧院集、海报、面料、服装、家具、徽标、菜单等。 Jan Tschichold 在他的1928年书中编纂了新的现代印刷原则,他后来否认他在这本书的法西斯主义哲学主张,但它仍然是非常有影响力。 Tschichold ,包豪斯印刷专家如赫伯特拜耳和拉斯洛莫霍伊一纳吉,和El Lissitzky 是平面设计之父都被我们今天所知。 他们首创的生产技术和文体设备,主要用于整个二十世纪。随后的几年看到平面设计在现代风格获得广泛的接受和应用。第二次世界大战结束后,美国经济的建立更需要平面设计,主要是广告和包装等。移居国外的德国包豪斯设计学院于1937年到芝加哥带来了“大规模生产”极简到美国;引发野火的“现代”建筑和设计。值得注意的名称世纪中叶现代设计包括阿德里安Frutiger ,设计师和Frutiger字体大学;保兰德,从20世纪30年代后期,直到他去世于1996年,采取的原则和适用包豪斯他们受欢迎的广告和标志设计,帮助创造一个独特的办法,美国的欧洲简约而成为一个主要的先驱。平面设计称为企业形象;约瑟夫米勒,罗克曼,设计的海报严重尚未获取1950年代和1960年代时代典型。 从道路标志到技术图表,从备忘录到参考手册,增强了平面设计的知识转让。可读性增强了文字的视觉效果。 设计还可以通过理念或有效的视觉传播帮助销售产品。将它应用到产品和公司识别系统的要素像标志、颜色和文字。连同这些被定义为品牌。品牌已日益成为重要的提供的服务范围,许多平面设计师,企业形象和条件往往是同时交替使用。

相关文档
最新文档