IT职业英语翻译答案.doc

上传人:wux****ua 文档编号:9171405 上传时间:2020-04-03 格式:DOC 页数:11 大小:77.51KB
返回 下载 相关 举报
IT职业英语翻译答案.doc_第1页
第1页 / 共11页
IT职业英语翻译答案.doc_第2页
第2页 / 共11页
IT职业英语翻译答案.doc_第3页
第3页 / 共11页
点击查看更多>>
资源描述
IT职业英语答案姓名: 丁志均班级: 软件0801Unit one2. Questions for Discussion1. A CPU is a control center that converts data input to information output, and it is a highly complex, extensive set of electronic circuitry that executes stored program instructions. It consists of two parts: the control unit and the arithmetic/logic unit. 2. Because like an orchestra conductor not playing any musical instrument, a CU does not execute program instructions itself, it just directs other parts of the system to do so. 3. The ALU executes all arithmetic and logical operations. There are four kinds of arithmetic operations: addition, subtraction, multiplication, and division. A logical operation is usually a comparison. The ALU can compare numbers, letters, or special characters. 3. Translation1. 控制器是控制数据流通过处理器的电路,同时它还协调处理器中其他单元活动。2. 在个人电脑和小型工作站上,中央处理器被安置在一个名为微处理器的单个芯片上。3. 现代中央处理器体积小,呈正方形,并在底部嵌有多个金属连接头或金属针。4. 中央处理器被针面向下直接插在主板的中央处理器插槽中。5. 英特尔公司是世界上最大的半导体公司,也是个人电脑上最普遍应用的x86系列微处理器的发明者。Text BVocabulary1. d 2. f 3. h 4. b 5. c 6. a 7. k 8. e 9. j 10. g 11. iClass ActivitiesTrue or False1. T2. F3. T4. F5. TUnit TwoQuestions for Discussion1. A Hard Drive consists of a metal platter which spins very fast. As it spins, the Hard Drive head moves along the platter and can read and write information. The Hard Drive is used for long term and large amounts of storage.2. Because RAM works faster than Hard Drive. When the computer loads file from Hard Drive, it makes a copy of the information from the Hard Drive and places it in RAM, so that when the information is needed, it can be taken out immediately.3. They are both necessary forms of storage.4. Hard Drive is used for long-term and large amounts of storage. Information on the Hard Drive is magnetically encoded, so when the computer is turned off, the information wont be lost. The Hard Drive is relatively cheap, but it is slow. Compared with Hard Drive, RAM is used for short-term storage; the information stored on the RAM is based on electrical signals, so when the computer is turned off, all information on RAM will be gone. The RAM is fast, but it is more expensive than the Hard Drive.5. Because programs will only load a small portion of information from the Hard Drive at a time. 6. This person is comparing apple and orange. He/She needs to see how much RAM their computer has to decide if they have enough.Translation1. 硬盘有一个带有磁介质的硬浅盘,这与磁带和软盘中的软塑料胶片不同。2. 硬盘与盒式录音带没有什么大的差别。两者都使用同样的磁记录技术。3. 硬盘上的信息被储存在极小的磁畴内。而这些磁畴之所以能这么小是因为浅盘的精确度以及介质的速度。4. RAM被视为“随机存取”,是因为你如果知道相较于某存储单元的行与列,那你就可以直接访问任何单元。5. 动态随机存取存储器存储单元中的电容器就像一个漏水的桶。它需要定期刷新,否则就会放电至零。Text BVocabulary1. f 2. l 3. e 4. a 5. c 6. b 7. g 8. j 9. h 10.d 11. k 12. iTrue or False1. F 2. T 3. T 4. F 5. TUnit ThreeQuestions for Discussion1. The motherboard is the flat, rectangular piece of circuit board to which everything seems to connect to for one reason or another. It contains: a microprocessor socket, a chipset, a BIOS chip, a real-time clock and slots or ports for the attachment of various peripherals or support system/hardware.2. The motherboard is a printed circuit board which provides all the connections, pathways and lines connecting the different components of the computer to each other. Turning on the computer automatically starts the BIOS chip up to perform its diagnostic functions, after which it powers up the CPU which in its turn starts powering up the other peripherals (hard disk, operating system, video and audio, etc.).3. The key functions of BIOS chip include: checking power supply, the hard disk drive, operating system, etc. before the computer actually starts “booting up”. After its diagnostic functions are performed, it powers up the CPU.Translation1. 主板就像一块底板,为系统其他部件间的通信提供电力连接,但又和底板不同,主板上还装有中央处理器以及其他子系统和设备。2. 主板的一个重要构件是微处理器的支持性芯片集,它为中央处理器和各种总线及外部元件间提供了支持性接口。3. 几乎所有的主板都包括逻辑和连接器来支持常用的输入设备,例如鼠标和键盘的PS/2接口。4. 插槽是中央处理器与主板相连接的地方。插槽之间互不兼容,这就意味着插槽要与某种特定类型的中央处理器相匹配。Text BVocabulary1. I 2. l 3. j4. f5. h6. k7. c8. b9. a10. d11. e12. gClass ActivitiesTrue or False1. F2. T3. T4. T5. FUnit FourQuestions for Discussion1. Software is a general term for the various kinds of programs used to operate computers and related devices. Software can be thought of as the variable part of a computer and hardware the invariable part.2. Software is often divided into application software, system software, middleware, utility and applets. Application software is programs that do work users are directly interested in. System software includes operating systems and any program that supports application software. Middleware is program that mediates between application and system software or between two different kinds of application software. Utility is a small useful program with limited capability. Applets are small applications that sometimes come with the operating system as accessories.3. Software can be purchased or acquired as shareware (usually intended for sale after a trial period), liteware (shareware with some capabilities disabled), freeware (free software but with copyright restrictions), public domain software (free with no restrictions), and open source (software where the source code is furnished and users agree not to limit the distribution of improvements).4. Some general kinds of application software include productivity software, which includes word processors, spreadsheets, and tools for use by most computer users; presentation software; graphics software for graphic designers; CAD/CAM software; Specialized scientific applications; vertical market or industry-specific software (for example, for banking, insurance, retail, and manufacturing environments); and firmware or microcode.Translation1. 免费软件是指可以无偿使用或选择付费使用的计算机软件。免费软件通常只基于二进制,具有专利性,这也是它与自由软件的区别所在。2. 文字处理软件(更正式的说法为文件准备系统)用于各种可打印材料的创建(包括书写、编辑、格式编排或打印)。3. 固件介于硬件与软件之间。和软件一样,它也是一种由微处理器或者微控制器执行的计算机程序。但是它与一个硬件紧密相连,离开硬件就没有任何意义。4. 中间件是连接软件组件或应用软件的计算机软件。这种软件包括一套扶持性服务,能使一个网络上的一台或多台机器上同时运行的多个进程相互作用。Text BVocabulary1. t2. e3. j4. s5. g6. p7. o8. f9. h10. m11. c12. b13. a14. l15. q16. d17. r18. k19. n20. ITrue or False1. T2. F3. T4. F5. FUnit FiveQuestions for Discussion1. Programming language is classified based on its complexity, and it includes: machine language, assembly language, high-level language and fourth-generation language (4GL).2. To compile the program is to transform a program written in a high-level programming language from source code into object code. The first step is to pass the source code through a compiler, which translates the high-level language instructions into object code. The final step is to pass the object code through a linker. The linker combines modules and gives real values to all symbolic addresses, thereby producing machine code.3. An interpreter is a program that executes instructions written in a high-level language. It translates high-level instructions into an intermediate form, which it then immediately executes without going through the compilation stage during which machine instructions are generated.4. FORTRAN is a particularly good language for processing numerical data, but it does not lend itself very well to organizing large programs. Pascal is very good for writing well-structured and readable programs, but it is not as flexible as the C programming language. C+ embodies powerful object-oriented features, but it is complex and difficult to learn.Translation1. 程序设计语言被用来编写用于具体指定计算机行为的程序,以及精确表达算法,或者作为人类交流的一种模式。2. 大多数程序设计语言都是纯文本格式的,其所使用的文本串包括文字、数字以及标点符号,看起来很像是书面的自然语言。3. 一门语言的句法描述了构成句法正确的程序符号的可能组合。4. C+被广为应用在软件产业中。其中一些应用领域包括系统软件、设备驱动程序、嵌入式软件、高性能服务器和客户应用软件以及娱乐型软件,如视频游戏类。Text BVocabulary1. j2. n3. l4. d5. g6. e7. c8. k9. i10. f11. m12. h13. a14. bTrue or False1. F2. F3. T4. FUnit 63. Questions for Discussion1. Implementing the user interface, sharing hardware among users, allowing users to share data among themselves, preventing users from interfering with one another, scheduling resources among users, facilitating input/output, recovering from errors, accounting for resource usage, facilitating parallel operations, organizing data for secure and rapid access, and handling network communications.2. There are several reasons for abstraction. First, the code needed to control peripheral devices is not standardized. Second, the operating system introduces new functions as it abstracts the hardware. Third, the operating system transforms the computer hardware into multiple virtual computers, each belonging to a different program. Fourth, the operating system can enforce security through abstraction.3. Modern Operating systems generally have following three major goals: to hide details of hardware by creating abstraction; to allocate resources to processes (Manage resources); to provide a pleasant and effective user interface.4. Because operating systems provide a virtual machine to users that is more convenient to use.4. Translation1. 操作系统执行一些基本任务,如识别键盘输入,将输出传送到显示屏上,监视磁盘上的文件和目录,控制磁盘驱动器和打印机等周边设备。2. 操作系统负责电脑的安全以确保未经授权的用户不能访问系统。3. 操作系统提供一个软件平台,其他程序,即应用程序,能够在该平台上运行。4. 操作系统是由可移植的程序代码而不是永久性物理电路构成。5. 当今的系统可以协调上千种不同的打印机、磁盘驱动及特殊周边设备的任何可能组合。Text BVocabulary1. b2. j3. g4. i5. k6. c7. d8. h9. a10. f11. e2. True or False1. T2. T3. F4. T5. FUnit 7Questions for Discussion1. Computer networks are usually classified according to the scale: Personal area network (PAN), Local Area Network (LAN), Campus Area Network (CAN), Metropolitan area network (MAN), or Wide area network (WAN), except the ones mentioned above, there are also other types of network, like Global Area Network (GAN) and Internetwork.2. It contains printers, fax machines, telephones, PDAs or scanners.3. An LAN is a network covering a small geographic area, like a home, office or building. A CAN is a network that connects two or more LANs but that is limited to a specific and contiguous geographical area such as a college campus, industrial complex, or a military base. An MAN is a network that connects two or more Local Area Networks or Campus Area Networks together but does not extend beyond the boundaries of the immediate town/city.Translation1. 连接到广域网的电脑通常是通过公共网络进行连接的,如电话系统。它们也可以通过租用的专线或卫星实现连接。互联网是现存最大的广域网。2.协议规定了一套通用规则和信号,网络上的计算机利用这套规则和信号进行通讯。最常用的局域网协议之一被称之为以太网。3. 城域网覆盖面大于局域网,却小于广域网。城域网通常以使用光纤电缆或其他数字媒介达到高速连接为特征。4. 家域网是一个安装在用户住宅内的网络,它可以连接个人数字装置,将多个电脑及其周边设备、电话、录像机、电视、视频游戏、家庭安全系统、“智能”家电、传真机以及其他用网线连接到网络的数字装置。Text BVocabulary1. d2. c3. i4. a5. g6. h7. b8. f9. eTrue or False1. T2. F3. F4. T5. T6. TUnit 8Questions for Discussion1. Each of the packets contains both the senders Internet address and the receivers address. Any packet is sent first to a gateway computer which reads the destination address and forwards the packet to an adjacent gateway that in turn reads the destination address and so forth across the Internet until one gateway recognizes the packet as belonging to a computer within its immediate neighborhood or domain. That gateway then forwards the packet directly to the computer whose address is specified. The connection-oriented protocol TCP, who keeps track of the packet sequence, puts the packets in the right order. 2. To humans, IP addresses are normally expressed in decimal format as a dotted number; to computers, they are expressed in binary form. 3. The four numbers in an IP addresses are called octets. The two sections are Net and Host. The Net section always contains the first octet; the Host section always contains the lat octet.Translation1. 相对于网际协议只处理数据包,传输控制协议使两个主机能够建立起连接并交换数据流。传输控制协议保证数据的传送以及数据包以它们被发送的相同顺序进行传送。2. 从一个用户的角度来看,协议唯一令人感兴趣的地方就是如果你想要与其他计算机进行通讯,你的计算机或设备必须支持正确的协议。3.第六版网际协议的设计是从连接主机数和数据传输总量两方面实现因特网的稳定增长。4. 数据包的重要特征之一是:除了数据以外,它还包含目标地址。Text BVocabulary1. e2. j3. b4. a5. i6. g7. h8. f9. c10. dTrue or False1. F2. F3. T4. TUnit 9Questions for Discussion1. The Internet is the worlds largest network of networks. When you want to access the resources offered by the Internet, you dont really connect to the Internet; you connect to a network that is eventually connected to the Internet backbone, a network of extremely fast network components. 2. The networks are connected together on a backbone, which forms a network of networks. This backbone is connected to other networks, one of which is the Internet backbone.Translation1. 通过使用标准传输控制协议/网际协议转换数据包进行数据交换的计算机网络,彼此相连,构成了因特网一个全球网络系统。2. 因特网是网络的网络,它由从区域到全球无数的私人、公共、学术、商业及政府网络构成,通过从铜线到光纤电缆再到无线连接等其他技术实现连接。3. 因特网承载着各种各样的信息资源和服务,如电子邮件、在线聊天、文件传输和共享、在线游戏、相互关联的超文本文档以及万维网的其他资源。4. 互联网服务提供商通过一种适用于传输网际协议数据报文的数据传输技术与用户实现连接,例如拨号(上网)、数字用户线路、电缆调制解调器或专用高速连接。Text BVocabulary1. d2. f3. e4. g5. c6. b7. h8. aTrue or False1. T2. T3. F4. TUnit 10Questions for Discussion1. DoS attacks are the nastiest, because they are very easy to launch, difficult (sometimes impossible) to track, and it is not easy to refuse the requests of the attacker, without also refusing legitimate requests for service. The DoS attack program usually makes a connection on some service port, perhaps forging the packets header information that says where the packet came from, and then dropping the connection. It sends more requests to the host than it can handle, causing the legitimate requests not to be served.2. Not running your visible-to-the-world servers at a level too close to capacity; using packet filtering to prevent obviously forged packets from entering into your network address space; keeping up-to-date on security-related patches for your hosts operating systems. 3. The goal of these attacks is to access some resource that your machine should not provide the attacker. There are two types: executing commands illicitly and confidentiality breaches.4. The data diddler is likely the worst sort, since the fact of a break-in might not be immediately obvious. Perhaps he is toying with the numbers in your spreadsheets, or changing the dates in your projections and plans. Maybe he is changing the account numbers for the auto-deposit of certain paychecks. Translation1. 拒绝服务攻击者通常以知名度较高的网站服务器的网站和服务为攻击对象,例如银行,信用卡支付网关,甚至域名根服务器。2. 一个永久性拒绝服务攻击对系统造成的破坏十分之大,以至于需要替换或重装硬件。它利用了受害人硬件无论是路由器、打印机还是其他连接在网络里的硬件的远程管理接口的安全缺陷。3. 2001年2月,爱尔兰政府财政部的服务器受到了拒绝服务攻击,而该攻击是爱尔兰国立梅努斯大学一项学生活动的一部分。财政部正式对校方提出控诉,且若干学生受到了惩戒。Text BVocabulary1. b2. e3. a4. c5. f6. dTrue or False1. F2. F3. TUnit 11Questions for Discussion1. A computer virus is a malicious program that attaches itself to a program or file so it can spread from one computer to another, causing damages as it travels. Almost all viruses are attached to an executable file, if the user run or open them, they will be spread. People continue the spread of a computer virus, mostly unknowingly, by sharing infecting files or sending e-mails with viruses as attachments in the e-mail.2. The difference is, unlike a virus, a worm has the capability to travel without any help from a person. It takes advantage of file or information transport features on your system, which allows it to travel without aid. The biggest danger with a worm is its capability to replicate itself on your system, so it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. The end result in most cases is that the worm consumes too much system memory (or network bandwidth), causing Web servers, network servers and individual computers to stop responding.3. The Trojan horse, at first glance, will appear to be useful software, so people are tricked into opening them, but it will actually do damage once installed or run on your computer.When a Trojan is activated on your computer, the results can vary. Some Trojans are annoying (like changing your desktop, adding silly active desktop icons);Some can cause serious damage by deleting files and destroying information on your system.;Trojans can also create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be compromised.4. A blended threat is a sophisticated attack that bundles some of the worst aspects of viruses, worms, Trojan horses and malicious code into one threat, so it can spread quickly and cause widespread damage. Characteristics of blended threats include: causes harm, propagates by multiple methods, attacks from multiple points and exploits vulnerabilities.Translation1. 最阴险的木马病毒种类之一是一个声称帮你清除病毒而实际上却将病毒引入到你计算机上的程序。2. 七种主要的木马病毒包括:远程访问木马、数据发送木马、破坏性木马、代理木马病毒、文件传输协议木马、安全软件禁用木马以及拒绝服务攻击木马。3. 它使用网络将自己的副本发送给其他节点(网络上的计算机终端),而且不需要任何用户干涉就能做到。4. 蠕虫利用操作系统漏洞进行传播。所有供应商都会提供常规的安全升级,如果这些更新被安装到计算机上就能阻止大部分蠕虫传播到该台计算机上。Text BVocabulary1. o2. i3. n4. k5. h6. m7. d8. b9. l10. p11. f12. a13. c14. g15. j16. eTrue or False1. F2. F3. T4. F5. T6. TUnit 12Questions for Discussion1. A firewall is simply a group of components that collectively form a barrier between two networks. For connecting an organization to the Internet provides a two-way flow of traffic, which is undesirable in many organizations, the firewall is designed to provide some level of separation between an organizations intranet and the Internet.2. First, its not very convenient. Clients behind the firewall must be proxitized (that is, must know how to use the proxy, and be configured to do so) in order to use Internet services, as it doesnt allow anything to pass by default, but needs to have the programs written and turned on in order to begin passing traffic. Second, its also typically the slowest, because more processes need to be started in order to have a request serviced.3. First, by default, the application gateway firewall does not allow anything to pass, but a router of packet filtering firewall will pass all traffic without any sort of restrictions. Second, by employing the method of ACLs, the filtering firewall could enforce security policy with regard to what sorts of access you allow the outside world to have to your internal network, and vice versa. Third, there is less overhead in packet filtering than with an application gateway. At last, the packet filtering gateway is often much faster than its application layer cousins.4. The benefits include providing a measure of protection against your machines that provide services to the Internet (such as a public web server), as well as provide the security of an application layer gateway to the internal network. Additionally, using this method, an attacker, in order to get to services on the internal network, will have to break through the access router, the bastion host, and the choke router.Translation1. 防火墙是一整套安全措施,其设计目的是阻止对网络计算机系统未经授权的电子访问。2. 防火墙也是一个或一套设备,通过设置,且基于一系列规则和标准,防火墙可以允许、拒绝、加密、解密或代理不同安全域间的所有计算机通信。3.一个网络内的防火墙功能与建筑物内带防火门的实体防火墙功能相似。前者用于阻止对私人网络的入侵。后者旨在抑制和延迟建筑内的火灾向周边蔓延。4. 没有适当的设置,防火墙形同虚设。Text BVocabulary1. c2. b3. aTrue or False1. T2. T3. F4. TUnit 13Questions for Discussion1. First, a user composes a message using his mail user agent (MUA) and he types in or selects from an address book, the e-mail address of his correspondent and hits the “send” button. Then, the users MUA formats the message into Internet e-mail format and uses the SMTP to send the message to the local mail transfer agent (MTA). The MTA looks at the destination address provided in the SMTP and looks up this domain name in the Domain Name System (DNS) to find the mail exchange (MX) servers accepting messages for that domain. Then, the DNS server for the correspondents domain responds with an MX record listing the mail exchange servers for that domain. After this
展开阅读全文
相关资源
相关搜索

当前位置:首页 > 图纸专区 > 考试试卷


copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!