收藏 分销(赏)

《计算机英语(第4版)》课后练习参考答案.docx

上传人:二*** 文档编号:4512955 上传时间:2024-09-26 格式:DOCX 页数:13 大小:27.82KB
下载 相关 举报
《计算机英语(第4版)》课后练习参考答案.docx_第1页
第1页 / 共13页
本文档共13页,全文阅读请下载到手机保存,查看更方便
资源描述
Unit Two/Section A I. Fill in the blanks with the information given in the text: 1. input; output; storage 2. Basic Input/Output System 3. flatbed; hand-held 4. LCD-based 5. dot-matrix; inkjet 6. disk; memory 7. volatile 8. serial; parallel II. Translate the following terms or phrases from English into Chinese and vice versa: 1. function key功能键,操作键,函数键 2. voice recognition module 语音识别模块 3. touch-sensitive region 触敏区 4. address bus 地址总线 5. flatbed scanner 平板扫描仪 6. dot-matrix printer点阵打印机(针式打印机) 7. parallel connection 并行连接 8. cathode ray tube 阴极射线管 9. video game 电子游戏 10. audio signal 音频信号 11. 操作系统 operating system 12. 液晶显示(器) LCD (liquid crystal display) 13. 喷墨打印机 inkjet printer 14. 数据总线data bus 15. 串行连接 serial connection 16. 易失性存储器volatile memory 17. 激光打印机laser printer 18. 磁盘驱动器disk drive 19. 基本输入 / 输出系统 BIOS (Basic Inpul/Output System) changes if necessary: An access control mechanism mediates between a user (or a process executing on behalf of a user) and system resources、such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate (验证)a user seeking access. Typically the authemiccition function determines whether the user is permitted to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization (授权)d-sbase that specifies what type of access to which resources is allowed for this user. The access control function consults this database to detemine whether to grant access. An auditing function monitors and keeps a record of user accesses to system resources. In practice, a number of com—cmetus may cooperatively share the access control function. All mii,戏 systems have at least a rudimentary (基本的),and in many cases a quite robust. access control component. Add-on security packages can add to the witi* access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services. IV. Translate the following passage from English into Chinese: 入侵者攻击从温和的到严重的形形色色。在这一系列攻击的温和端,有许多人只是 希望探查互联网,看看那里有什么。在严重端的是试图阅读特许数据、对数据进行未经 授权的修改或扰乱系统的个人。 入侵者的目标是获得进入一个系统的机会,或者增加在一个系统中可以使用的特权 范围。初始攻击大多利用系统或软件的脆弱之处,这些脆弱之处允许用户执行相应的代 码,翻开进入系统的后门。入侵者可对具有某些运行特权的程序实施像缓存溢出这样的 攻击,利用此类攻击获得进入一个系统的机会。 另外,入侵者也试图获取应予保护的信息。在有些情况下,这种信息是以用户口令 的形式存在的。知道了某个其他用户的口令之后,入侵者就可以登录系统并行使赋予合 法用户的所有特权。 Unit Ten/Section B Fill in the blanks with the information given in the text: 1. virus dictionary 2. whitelisting; administrator 3. suspicious behavior 4. memory-resident II. Translate the following terms or phrases from English into Chinese and vice versa: 1. phishing attack网络钓鱼攻击 2. graphics card 显(示)卡 3. heuristic analysis 试探性分析 4. infected file被感染文件 5. virus dictionary 病毒字典 6. 数据捕获data capture 7. 恶意软件 malicious software 8. 病毒特征代码virus signature 9. 防病毒软件 antivirus software 10. 内存驻留程序 memory-resident program Unit Ten/Section C I. Fill in the blanks with the information given in the text: 1. infection; pay load 2. trapdoor 3. botnet 4. administrator; root II. Translate the following terms or phrases from English into Chinese and vice versa: 1. maintenance hook 维护陷阱 2. multipartite virus 多成分病毒 3. authentication procedure验证过程,认证过程 4. instant messaging 即时通信,即时消息 5. 系统登录程序system login program 6. 逻辑炸弹logic bomb 7. 多威胁恶意软件 multiple-threat malware 8. 源代码 source code 20. 视频显示器video displayFill in each of the blanks with one of the words given in the following list, making changes if necessary: CD-ROM stands for compact disc read-only memory. Unlike fh"、: and hard disks, which use magnetic charges to represent Is and Os, omicul discs use reflected light. On a CD-ROM disc, Is and Os are represented by flat areas and bumpy (高低不平的)areas (called "pits") on its bottom siujhce. The CD-ROM disc is read by a laser that projects a tiny beam of light on these areas. The amount of reflecled light determines whether the area rern’esenls a 1 or a 0. Like a commercial CD found in music stores, a CD-ROM is a "read-only" disc. Read-only means it cannot be written on or erased by the user. Thus, you as a user have access only to the data imprinted (压Epl) by the publisher. A single CD-ROM disc can slore 650 megabytes (兆字节)of data. That is ea nival ent to 451 floppy disks. With that much infdmimicm on a single disc, the time lo reirieve or access the information is very important. An important characteristic of CD-ROM drives is their access rate. III. Translate the following passage from English into Chinese: 调制解调器是在模拟与数字信号之间进行转换的设备。 计算机使用的是数字信号,这种信号由离散单元组成,通常用一系列1和0表示。 模拟信号是连续变化的;声波就是模拟信号的一个例子。 调制解调器经常用于实现计算机之间通过 线的互相通信。 调制解调器将发送端计算机的数字信号转换成可通过 线传输的模拟信号。 信号到达目的地后,另外一个调制解调器重构原来的数字信号,供接收端计算机处 理。 如果两个调制解调器可■同时互相发送数据,那么它们采用的就是全双工工作方式; 如果一次只有一个调制解调器可以发送数据,那么它们采用的那么是半双工工作方式。 Unit Two/Section B Fill in the blanks with the information given in the text: 1. 2. 3. graphical file; scheduler virtual4. sliceII. Translate the following terms or phrases from English into Chinese and vice versa: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. interrupt handler中断处理程序virtual memory虚拟存储(器),虚存,虚拟内存 context switch上下文转换,语境转换 main memory 主存(储器) bit pattern 位模式外围设备 peripheral device 进程表 process table时间片time slice 图形用户界面 graphical user interface 海量存储器mass storageUnit Six: Database Unit Six/Section AFill in the blanks with the information given in the text: 1. flat2. data3. 4. 5. application; administrators conceptual tables6. 7. fragmented; replicatedstructured 8. entity-relationship; attributes Translate the following terms or phrases from English into Chinese and vice versa: 1. end user最终用户,终端用户 2. atomic operation 原子操作 3. database administrator 数据库管理员 4. relational database model 关系数据库模型 5. local data本地数据 6. object-oriented database 面向对象数据库 7. database management system (DBMS)数据库管理系统 8. entity-relationship model (ERM) 实体关系模型 9. distributed database 分布式数据库 10. flat file平面文件 11. 二维表 two-dimensional table 12. 数据属性 data attribute 13. 数据库对象 database object 14. 存储设备 storage device 15. 数据类型data type 16. 数据插入与删除 data insertion and deletion 17. 层次数据库模型 hierarchical database model 18. 数据库体系结构 database architecture 19. 关系数据库管理系统 relational database management system (RDBMS) 20. 全局控制总线 global control bus Fill in each of the blanks with one of the words given in the following list, making changes if necessary: A database is any collection of data organized for storage in a computer memory and designed for easy acciss by authorized users. The data may be in the form of text, numbers, or encoded graphics. Small databases were first develoned or funded by the U.S. government for agency or professional use. In the 1960s, some databases became commercially。也likible, but their use was funnelled (传送)through a few so-called research c(mters that collected information inquiries and handled them in batches (批,批量).Online databases—that is, databases available to anyone who could link up to them by computer—first appeared in the 1970s. Since their first, exgimentul appearance in the 1950s, databases have become so imDoricml that they can be found in almost cry field of information. Government, military, and industrial dalabcises are often highly restricted, and professional databases are usually of limited interest. A wide range of commercial, governmental, and norngfit databases are available to the general public, however, and may be used by anyone who owns or has access to the equiDment that they require. IV. Translate the following passage from English into Chinese: 在关系数据库中,表的行表示记录(关于不同项的信息集),列表示字段(一个记 录的特定属性)。 在进行搜索时,关系数据库将一个表中的一个字段的信息与另一个表的一个相应字 段的信息进行匹配,以生成将来自这两个表的所要求数据结合起来的另一个表。例如, 如果一个表包含 EMPLOYEE-ID> LAST-NAME、FIRST-NAME 和 HIRE-DATE 字段, 另•个表包含DEPT、EMPLOYEE-ID和SALARY字段,关系数据库可匹配这两个表中 的EMPLOYEE-ID字段,以找到特定的信息,如所有挣到一定薪水的雇员的姓名或所有 在某个日期之后受雇的雇员所属的部门。 换言之,关系数据库使用两个表中的匹配值,将一个表中的信息与另一个表中的信 息联系起来。微型计算机数据库产品一般是关系数据库。 Unit Six/Section BFill in the blanks with the information given in the text: 1. commit 2. scheduler 3. shared; exclusive 4. wound-waitTranslate the following terms or phrases from English into Chinese and vice versa: 1. nonvolatile storage system 非易失性存储系统 2. equipment malfunction 设备故障 3. wound-wait protocol 受伤一等待协议 4. exclusive lock排它锁,互斥(型)锁 5. database integrity 数据库完整性 6. 共享锁 shared lock 7. 数据库实现 database implementation 8. 级联回滚 cascading rollback 9. 数据项 data item 1(). 分时操作系统 time-sharing operating systemUnit Seven: Computer Networks Unit Seven/Section AFill in the blanks with the information given in the text: 1. MAN 2. open; closed 3. bus 4. token 5. Ethernet 6. client/server 7. equals; temporary 8. network II. Translate the following terms or phrases from English into Chinese and vice versa: 1. file server文件服务器 2. carrier sense载波检测,载波监听 3. protocol suite协议组,协议集 4. peer-to-peer model 对等模型 5. bus topology network 总线拓扑网络 6. inter-machine cooperation机器间合作,计算机间合作 7. Ethernet protocol collection 以太网协议集 8. proprietary network 专有网络 9. utility package实用软件包,公用程序包 10. star network 星形网络 11. 局域网 local area network (LAN) 12. 令牌环 token ring 13. 无线网络 wireless network 14. 封闭式网络 closed network 15. 环形拓扑结构ring topology 16. 客户机/服务器模型client/server model 17. 网络应用程序 network application 18. 进程间通信 interprocess communication 19. 打印服务器print server 20. 广域网 wide area network (WAN)Fill in each of the blanks with one of the words given in the following list, making changes if necessary: Computers can communicate with other computers through a series of connections and associated hardware called a network. The udvemme of a network is that data can be exchcmRed rapidly, and software and hardware resources, such as hard-disk s-cice or printers, can be shared. Networks also allow use of a computer by a user who cannot physically access the computer. One type of network, a local area network (LAN), consists of several PCs or works lai io connected to a special computer called a server, often within the same building or office complex. The server stores and mcmciRes programs and data. A server often contains all of a 淀[worked group's data and enables LAN workstations or PCs to be set up wi由mu large storage capabilities. In this scenario (方案),each PC may have Tocal" memory (for example, a hard drive) specific to itself, but the bu/k of storage resides on the server. This rediicis the cost of the workstation or PC because less e—nsise computers can be purchased, and it simplifies the mdintencmce of software because the software resides only on the se*尸 rather than on each individual workstation or PC. I. Translate the following passage from English into Chinese: 在计算机科学中,网络是指由通信设备连接在一起的一组计算机及其相关设备。 网络可采用电缆等永久性连接,或者采用通过 或其他通信链路而实现的临时性 连接。 网络可以小到由少数计算机、打印机以及其他设备构成的局域网,也可以由分布在 广大地理区域的许多小型与大型计算机组成。 计算机网络无论大小,其存在的目的均在于为计算机用户提供以电子方式进行信息 通信与传送的方法。 有些类型的通信是简单的用户到用户消息;有些称为分布式过程,可能涉及数台计 算机,以及在执行任务中分担工作量或进行协作。 Unit Seven/Section CFill in the blanks with the information given in the text: 1. repeater 2. data-link 3. gateway 4. routerTranslate the following terms or phrases from English into Chinese and vice versa: 1. destination address 目的地址 2. performance degradation 性能退化(或降级) 3. four-interface bridge 4 接 口网桥 4. common bus公共总线,公用总线 5. 数据链路层 data-link layer 6. 协议转换器 protocol converter 7. 开放式系统互连 OSI (Open Systems Interconnection) 8. 物理地址 physical addressUnit Ten: Computer Security Unit Ten/Section AI. Fill in the blanks with the information given in the text: 1. confidentiality; availability 2. data 3. authenticity 4. integrity 5. Passive; active 6. availability 7. ease; security 8. assurance II. Translate the following terms or phrases from English into Chinese and vice versa: 1. back叩system备份系统 2. encryption key (加密)密钥 3. data confidentiality 数据机密性 4. system vulnerability系统脆弱性,系统脆弱之处 5. unauthorized access未经授权的访问,越权存取 6. intrusion detection system 入侵检测系统 7. after-action recovery 事后恢复 8. software piracy 软件侵权 9. authorized user 特许用户 10. data unit数据单元,数据单位 11. 软件版本 software version 12. 数据完整性 data integrity 13. 系统崩溃 system crash 14. 病毒检查软件virus-checking software 15. 综合平安策略comprehensive security strategy 16. 软件配置管理software configuration management 17. 故障隔离 fault isolation 18. 统计数据库 statistical database 19. 保密的加密算法 secure encryption algorithm 20. 数据流 data stream I. Fill in each of the blanks with one of the words given in the following list, making
展开阅读全文

开通  VIP会员、SVIP会员  优惠大
下载10份以上建议开通VIP会员
下载20份以上建议开通SVIP会员


开通VIP      成为共赢上传
相似文档                                   自信AI助手自信AI助手

当前位置:首页 > 教育专区 > 其他

移动网页_全站_页脚广告1

关于我们      便捷服务       自信AI       AI导航        抽奖活动

©2010-2025 宁波自信网络信息技术有限公司  版权所有

客服电话:4009-655-100  投诉/维权电话:18658249818

gongan.png浙公网安备33021202000488号   

icp.png浙ICP备2021020529号-1  |  浙B2-20240490  

关注我们 :微信公众号    抖音    微博    LOFTER 

客服