收藏 分销(赏)

《计算机英语(第4版)》课后练习参考答案.docx

上传人:二*** 文档编号:4512955 上传时间:2024-09-26 格式:DOCX 页数:13 大小:27.82KB
下载 相关 举报
《计算机英语(第4版)》课后练习参考答案.docx_第1页
第1页 / 共13页
亲,该文档总共13页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

1、Unit Two/Section AI. Fill in the blanks with the information given in the text:1. input; output; storage2. Basic Input/Output System3. flatbed; hand-held4. LCD-based5. dot-matrix; inkjet6. disk; memory7. volatile8. serial; parallelII. Translate the following terms or phrases from English into Chines

2、e and vice versa:1. function key功能键,操作键,函数键2. voice recognition module 语音识别模块3. touch-sensitive region 触敏区4. address bus 地址总线5. flatbed scanner 平板扫描仪6. dot-matrix printer点阵打印机(针式打印机)7. parallel connection 并行连接8. cathode ray tube 阴极射线管9. video game 电子游戏10. audio signal 音频信号11. 操作系统 operating system12

3、. 液晶显示(器) LCD (liquid crystal display)13. 喷墨打印机 inkjet printer14. 数据总线data bus15. 串行连接 serial connection16. 易失性存储器volatile memory17. 激光打印机laser printer18. 磁盘驱动器disk drive19. 基本输入 / 输出系统 BIOS (Basic Inpul/Output System)changes if necessary:An access control mechanism mediates between a user (or a pro

4、cess executing on behalf of a user) and system resources、such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate (验证)a user seeking access. Typically the authemiccition function determines whether the user is permitted to access the syste

5、m at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization (授权)d-sbase that specifies what type of access to which resources is allowed for this user. The access control function consults this

6、database to detemine whether to grant access. An auditing function monitors and keeps a record of user accesses to system resources.In practice, a number of comcmetus may cooperatively share the access control function. All mii,戏 systems have at least a rudimentary (基本的),and in many cases a quite ro

7、bust. access control component. Add-on security packages can add to the witi* access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access con

8、trol services.IV. Translate the following passage from English into Chinese:入侵者攻击从温和的到严重的形形色色。在这一系列攻击的温和端,有许多人只是 希望探查互联网,看看那里有什么。在严重端的是试图阅读特许数据、对数据进行未经 授权的修改或扰乱系统的个人。入侵者的目标是获得进入一个系统的机会,或者增加在一个系统中可以使用的特权 范围。初始攻击大多利用系统或软件的脆弱之处,这些脆弱之处允许用户执行相应的代 码,翻开进入系统的后门。入侵者可对具有某些运行特权的程序实施像缓存溢出这样的 攻击,利用此类攻击获得进入一个系统的机

9、会。另外,入侵者也试图获取应予保护的信息。在有些情况下,这种信息是以用户口令 的形式存在的。知道了某个其他用户的口令之后,入侵者就可以登录系统并行使赋予合 法用户的所有特权。Unit Ten/Section BFill in the blanks with the information given in the text:1. virus dictionary2. whitelisting; administrator3. suspicious behavior4. memory-residentII. Translate the following terms or phrases fro

10、m English into Chinese and vice versa:1.phishing attack网络钓鱼攻击2.graphics card 显(示)卡3.heuristic analysis 试探性分析4.infected file被感染文件5.virus dictionary 病毒字典6.数据捕获data capture7.恶意软件 malicious software8.病毒特征代码virus signature9.防病毒软件 antivirus software10.内存驻留程序 memory-resident programUnit Ten/Section CI. Fil

11、l in the blanks with the information given in the text:1.infection; pay load2.trapdoor3.botnet4.administrator; rootII. Translate the following terms or phrases from English into Chinese and vice versa:1.maintenance hook维护陷阱2.multipartite virus多成分病毒3.authentication procedure验证过程,认证过程4.instant messagi

12、ng即时通信,即时消息5.系统登录程序system login program6.逻辑炸弹logic bomb7. 多威胁恶意软件 multiple-threat malware8. 源代码 source code20. 视频显示器video displayFill in each of the blanks with one of the words given in the following list, making changes if necessary:CD-ROM stands for compact disc read-only memory. Unlike fh、: and

13、hard disks, which use magnetic charges to represent Is and Os, omicul discs use reflected light. On a CD-ROM disc, Is and Os are represented by flat areas and bumpy (高低不平的)areas (called pits) on its bottom siujhce. The CD-ROM disc is read by a laser that projects a tiny beam of light on these areas.

14、 The amount of reflecled light determines whether the area rernesenls a 1 or a 0.Like a commercial CD found in music stores, a CD-ROM is a read-only disc. Read-only means it cannot be written on or erased by the user. Thus, you as a user have access only to the data imprinted (压Epl) by the publisher

15、.A single CD-ROM disc can slore 650 megabytes (兆字节)of data. That is ea nival ent to 451 floppy disks. With that much infdmimicm on a single disc, the time lo reirieve or access the information is very important. An important characteristic of CD-ROM drives is their access rate.III. Translate the fol

16、lowing passage from English into Chinese:调制解调器是在模拟与数字信号之间进行转换的设备。计算机使用的是数字信号,这种信号由离散单元组成,通常用一系列1和0表示。 模拟信号是连续变化的;声波就是模拟信号的一个例子。调制解调器经常用于实现计算机之间通过 线的互相通信。调制解调器将发送端计算机的数字信号转换成可通过 线传输的模拟信号。信号到达目的地后,另外一个调制解调器重构原来的数字信号,供接收端计算机处 理。如果两个调制解调器可同时互相发送数据,那么它们采用的就是全双工工作方式; 如果一次只有一个调制解调器可以发送数据,那么它们采用的那么是半双工工作方式。

17、Unit Two/Section BFill in the blanks with the information given in the text:1.2.3.graphical file; scheduler virtual4.sliceII. Translate the following terms or phrases from English into Chinese and vice versa:1.2.3.4.5.6.7.8.9.10.interrupt handler中断处理程序virtual memory虚拟存储(器),虚存,虚拟内存 context switch上下文转

18、换,语境转换 main memory 主存(储器)bit pattern 位模式外围设备 peripheral device进程表 process table时间片time slice图形用户界面 graphical user interface 海量存储器mass storageUnit Six: DatabaseUnit Six/Section AFill in the blanks with the information given in the text:1. flat2.data3.4.5.application; administrators conceptual tables6

19、.7.fragmented; replicatedstructured8.entity-relationship; attributesTranslate the following terms or phrases from English into Chinese and vice versa:1. end user最终用户,终端用户2. atomic operation 原子操作3. database administrator 数据库管理员4. relational database model 关系数据库模型5. local data本地数据6. object-oriented da

20、tabase 面向对象数据库7. database management system (DBMS)数据库管理系统8. entity-relationship model (ERM) 实体关系模型9. distributed database 分布式数据库10. flat file平面文件11. 二维表 two-dimensional table12. 数据属性 data attribute13. 数据库对象 database object14. 存储设备 storage device15. 数据类型data type16. 数据插入与删除 data insertion and deletio

21、n17. 层次数据库模型 hierarchical database model18. 数据库体系结构 database architecture19. 关系数据库管理系统 relational database management system (RDBMS)20. 全局控制总线 global control busFill in each of the blanks with one of the words given in the following list, making changes if necessary:A database is any collection of d

22、ata organized for storage in a computer memory and designed for easy acciss by authorized users. The data may be in the form of text, numbers, or encoded graphics. Small databases were first develoned or funded by the U.S. government for agency or professional use. In the 1960s, some databases becam

23、e commercially。也likible, but their use was funnelled (传送)through a few so-called research c(mters that collected information inquiries and handled them in batches (批,批量).Online databasesthat is, databases available to anyone who could link up to them by computerfirst appeared in the1970s. Since thei

24、r first, exgimentul appearance in the 1950s, databases have become so imDoricml that they can be found in almost cry field of information. Government, military, and industrial dalabcises are often highly restricted, and professional databases are usually of limited interest. A wide range of commerci

25、al, governmental, and norngfit databases are available to the general public, however, and may be used by anyone who owns or has access to the equiDment that they require.IV. Translate the following passage from English into Chinese:在关系数据库中,表的行表示记录(关于不同项的信息集),列表示字段(一个记 录的特定属性)。在进行搜索时,关系数据库将一个表中的一个字段

26、的信息与另一个表的一个相应字 段的信息进行匹配,以生成将来自这两个表的所要求数据结合起来的另一个表。例如, 如果一个表包含 EMPLOYEE-ID LAST-NAME、FIRST-NAME 和 HIRE-DATE 字段, 另个表包含DEPT、EMPLOYEE-ID和SALARY字段,关系数据库可匹配这两个表中 的EMPLOYEE-ID字段,以找到特定的信息,如所有挣到一定薪水的雇员的姓名或所有 在某个日期之后受雇的雇员所属的部门。换言之,关系数据库使用两个表中的匹配值,将一个表中的信息与另一个表中的信 息联系起来。微型计算机数据库产品一般是关系数据库。Unit Six/Section BFil

27、l in the blanks with the information given in the text:1. commit2. scheduler3. shared; exclusive4. wound-waitTranslate the following terms or phrases from English into Chinese and vice versa:1. nonvolatile storage system 非易失性存储系统2. equipment malfunction 设备故障3. wound-wait protocol 受伤一等待协议4. exclusive

28、 lock排它锁,互斥(型)锁5. database integrity 数据库完整性6. 共享锁 shared lock7. 数据库实现 database implementation8. 级联回滚 cascading rollback9. 数据项 data item1(). 分时操作系统 time-sharing operating systemUnit Seven: Computer NetworksUnit Seven/Section AFill in the blanks with the information given in the text:1.MAN2.open; clos

29、ed3.bus4.token5.Ethernet6.client/server7.equals; workII. Translate the following terms or phrases from English into Chinese and vice versa:1. file server文件服务器2. carrier sense载波检测,载波监听3. protocol suite协议组,协议集4. peer-to-peer model 对等模型5. bus topology network 总线拓扑网络6. inter-machine cooperation机器间合作,计算机

30、间合作7. Ethernet protocol collection 以太网协议集8. proprietary network 专有网络9. utility package实用软件包,公用程序包10. star network 星形网络11. 局域网 local area network (LAN)12. 令牌环 token ring13. 无线网络 wireless network14. 封闭式网络 closed network15. 环形拓扑结构ring topology16. 客户机/服务器模型client/server model17. 网络应用程序 network applicati

31、on18. 进程间通信 interprocess communication19. 打印服务器print server20. 广域网 wide area network (WAN)Fill in each of the blanks with one of the words given in the following list, making changes if necessary:Computers can communicate with other computers through a series of connections and associated hardware c

32、alled a network. The udvemme of a network is that data can be exchcmRed rapidly, and software and hardware resources, such as hard-disk s-cice or printers, can be shared. Networks also allow use of a computer by a user who cannot physically access the computer.One type of network, a local area netwo

33、rk (LAN), consists of several PCs or works lai io connected to a special computer called a server, often within the same building or office complex. The server stores and mcmciRes programs and data. A server often contains all of a 淀worked groups data and enables LAN workstations or PCs to be set up

34、 wi由mu large storage capabilities. In this scenario (方案),each PC may have Tocal memory (for example, a hard drive) specific to itself, but the bu/k of storage resides on the server. This rediicis the cost of the workstation or PC because less ensise computers can be purchased, and it simplifies the

35、mdintencmce of software because the software resides only on the se*尸 rather than on each individual workstation or PC.I. Translate the following passage from English into Chinese:在计算机科学中,网络是指由通信设备连接在一起的一组计算机及其相关设备。 网络可采用电缆等永久性连接,或者采用通过 或其他通信链路而实现的临时性连接。网络可以小到由少数计算机、打印机以及其他设备构成的局域网,也可以由分布在 广大地理区域的许多

36、小型与大型计算机组成。计算机网络无论大小,其存在的目的均在于为计算机用户提供以电子方式进行信息 通信与传送的方法。有些类型的通信是简单的用户到用户消息;有些称为分布式过程,可能涉及数台计 算机,以及在执行任务中分担工作量或进行协作。Unit Seven/Section CFill in the blanks with the information given in the text:1. repeater2. data-link3. gateway4. routerTranslate the following terms or phrases from English into Chine

37、se and vice versa:1. destination address 目的地址2. performance degradation 性能退化(或降级)3. four-interface bridge 4 接 口网桥4. common bus公共总线,公用总线5. 数据链路层 data-link layer6. 协议转换器 protocol converter7. 开放式系统互连 OSI (Open Systems Interconnection)8. 物理地址 physical addressUnit Ten: Computer SecurityUnit Ten/Section A

38、I. Fill in the blanks with the information given in the text:1. confidentiality; availability2.data3.authenticity4.integrity5.Passive; active6.availability7.ease; security8.assuranceII. Translate the following terms or phrases from English into Chinese and vice versa:1. back叩system备份系统2. encryption

39、key (加密)密钥3. data confidentiality 数据机密性4. system vulnerability系统脆弱性,系统脆弱之处5. unauthorized access未经授权的访问,越权存取6. intrusion detection system 入侵检测系统7. after-action recovery 事后恢复8. software piracy 软件侵权9. authorized user 特许用户10. data unit数据单元,数据单位11. 软件版本 software version12. 数据完整性 data integrity13. 系统崩溃 s

40、ystem crash14. 病毒检查软件virus-checking software15. 综合平安策略comprehensive security strategy16. 软件配置管理software configuration management17. 故障隔离 fault isolation18. 统计数据库 statistical database19. 保密的加密算法 secure encryption algorithm20. 数据流 data streamI. Fill in each of the blanks with one of the words given in the following list, making

展开阅读全文
部分上传会员的收益排行 01、路***(¥15400+),02、曲****(¥15300+),
03、wei****016(¥13200+),04、大***流(¥12600+),
05、Fis****915(¥4200+),06、h****i(¥4100+),
07、Q**(¥3400+),08、自******点(¥2400+),
09、h*****x(¥1400+),10、c****e(¥1100+),
11、be*****ha(¥800+),12、13********8(¥800+)。
相似文档                                   自信AI助手自信AI助手
百度文库年卡

猜你喜欢                                   自信AI导航自信AI导航
搜索标签

当前位置:首页 > 教育专区 > 其他

移动网页_全站_页脚广告1

关于我们      便捷服务       自信AI       AI导航        获赠5币

©2010-2024 宁波自信网络信息技术有限公司  版权所有

客服电话:4008-655-100  投诉/维权电话:4009-655-100

gongan.png浙公网安备33021202000488号   

icp.png浙ICP备2021020529号-1  |  浙B2-20240490  

关注我们 :gzh.png    weibo.png    LOFTER.png 

客服