ImageVerifierCode 换一换
格式:DOCX , 页数:13 ,大小:27.82KB ,
资源ID:4512955      下载积分:5 金币
验证码下载
登录下载
邮箱/手机:
图形码:
验证码: 获取验证码
温馨提示:
支付成功后,系统会自动生成账号(用户名为邮箱或者手机号,密码是验证码),方便下次登录下载和查询订单;
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

开通VIP
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.zixin.com.cn/docdown/4512955.html】到电脑端继续下载(重复下载【60天内】不扣币)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

开通VIP折扣优惠下载文档

            查看会员权益                  [ 下载后找不到文档?]

填表反馈(24小时):  下载求助     关注领币    退款申请

开具发票请登录PC端进行申请。


权利声明

1、咨信平台为文档C2C交易模式,即用户上传的文档直接被用户下载,收益归上传人(含作者)所有;本站仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。所展示的作品文档包括内容和图片全部来源于网络用户和作者上传投稿,我们不确定上传用户享有完全著作权,根据《信息网络传播权保护条例》,如果侵犯了您的版权、权益或隐私,请联系我们,核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
2、文档的总页数、文档格式和文档大小以系统显示为准(内容中显示的页数不一定正确),网站客服只以系统显示的页数、文件格式、文档大小作为仲裁依据,个别因单元格分列造成显示页码不一将协商解决,平台无法对文档的真实性、完整性、权威性、准确性、专业性及其观点立场做任何保证或承诺,下载前须认真查看,确认无误后再购买,务必慎重购买;若有违法违纪将进行移交司法处理,若涉侵权平台将进行基本处罚并下架。
3、本站所有内容均由用户上传,付费前请自行鉴别,如您付费,意味着您已接受本站规则且自行承担风险,本站不进行额外附加服务,虚拟产品一经售出概不退款(未进行购买下载可退充值款),文档一经付费(服务费)、不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
4、如你看到网页展示的文档有www.zixin.com.cn水印,是因预览和防盗链等技术需要对页面进行转换压缩成图而已,我们并不对上传的文档进行任何编辑或修改,文档下载后都不会有水印标识(原文档上传前个别存留的除外),下载后原文更清晰;试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓;PPT和DOC文档可被视为“模板”,允许上传人保留章节、目录结构的情况下删减部份的内容;PDF文档不管是原文档转换或图片扫描而得,本站不作要求视为允许,下载前可先查看【教您几个在下载文档中可以更好的避免被坑】。
5、本文档所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用;网站提供的党政主题相关内容(国旗、国徽、党徽--等)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。
6、文档遇到问题,请及时联系平台进行协调解决,联系【微信客服】、【QQ客服】,若有其他问题请点击或扫码反馈【服务填表】;文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“【版权申诉】”,意见反馈和侵权处理邮箱:1219186828@qq.com;也可以拔打客服电话:4009-655-100;投诉/维权电话:18658249818。

注意事项

本文(《计算机英语(第4版)》课后练习参考答案.docx)为本站上传会员【二***】主动上传,咨信网仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知咨信网(发送邮件至1219186828@qq.com、拔打电话4009-655-100或【 微信客服】、【 QQ客服】),核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载【60天内】不扣币。 服务填表

《计算机英语(第4版)》课后练习参考答案.docx

1、Unit Two/Section A I. Fill in the blanks with the information given in the text: 1. input; output; storage 2. Basic Input/Output System 3. flatbed; hand-held 4. LCD-based 5. dot-matrix; inkjet 6. disk; memory 7. volatile 8. serial; parallel II. Translate the following terms or phrases from

2、 English into Chinese and vice versa: 1. function key功能键,操作键,函数键 2. voice recognition module 语音识别模块 3. touch-sensitive region 触敏区 4. address bus 地址总线 5. flatbed scanner 平板扫描仪 6. dot-matrix printer点阵打印机(针式打印机) 7. parallel connection 并行连接 8. cathode ray tube 阴极射线管 9. video game 电子游戏 10. audi

3、o signal 音频信号 11. 操作系统 operating system 12. 液晶显示(器) LCD (liquid crystal display) 13. 喷墨打印机 inkjet printer 14. 数据总线data bus 15. 串行连接 serial connection 16. 易失性存储器volatile memory 17. 激光打印机laser printer 18. 磁盘驱动器disk drive 19. 基本输入 / 输出系统 BIOS (Basic Inpul/Output System) changes if necessary:

4、 An access control mechanism mediates between a user (or a process executing on behalf of a user) and system resources、such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate (验证)a user seeking access. Typically the authemiccition functio

5、n determines whether the user is permitted to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization (授权)d-sbase that specifies what type of access to which resources is all

6、owed for this user. The access control function consults this database to detemine whether to grant access. An auditing function monitors and keeps a record of user accesses to system resources. In practice, a number of com—cmetus may cooperatively share the access control function. All mii,戏 syste

7、ms have at least a rudimentary (基本的),and in many cases a quite robust. access control component. Add-on security packages can add to the witi* access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions.

8、 External devices, such as firewalls, can also provide access control services. IV. Translate the following passage from English into Chinese: 入侵者攻击从温和的到严重的形形色色。在这一系列攻击的温和端,有许多人只是 希望探查互联网,看看那里有什么。在严重端的是试图阅读特许数据、对数据进行未经 授权的修改或扰乱系统的个人。 入侵者的目标是获得进入一个系统的机会,或者增加在一个系统中可以使用的特权 范围。初始攻击大多利用系统或软件的脆弱之处,这些脆弱

9、之处允许用户执行相应的代 码,翻开进入系统的后门。入侵者可对具有某些运行特权的程序实施像缓存溢出这样的 攻击,利用此类攻击获得进入一个系统的机会。 另外,入侵者也试图获取应予保护的信息。在有些情况下,这种信息是以用户口令 的形式存在的。知道了某个其他用户的口令之后,入侵者就可以登录系统并行使赋予合 法用户的所有特权。 Unit Ten/Section B Fill in the blanks with the information given in the text: 1. virus dictionary 2. whitelisting; administrator 3. su

10、spicious behavior 4. memory-resident II. Translate the following terms or phrases from English into Chinese and vice versa: 1. phishing attack网络钓鱼攻击 2. graphics card 显(示)卡 3. heuristic analysis 试探性分析 4. infected file被感染文件 5. virus dictionary 病毒字典 6. 数据捕获data capture 7. 恶意软件 malicious

11、 software 8. 病毒特征代码virus signature 9. 防病毒软件 antivirus software 10. 内存驻留程序 memory-resident program Unit Ten/Section C I. Fill in the blanks with the information given in the text: 1. infection; pay load 2. trapdoor 3. botnet 4. administrator; root II. Translate the following term

12、s or phrases from English into Chinese and vice versa: 1. maintenance hook 维护陷阱 2. multipartite virus 多成分病毒 3. authentication procedure验证过程,认证过程 4. instant messaging 即时通信,即时消息 5. 系统登录程序system login program 6. 逻辑炸弹logic bomb 7. 多威胁恶意软件 multiple-threat malware 8. 源代码 source code 20.

13、视频显示器video displayFill in each of the blanks with one of the words given in the following list, making changes if necessary: CD-ROM stands for compact disc read-only memory. Unlike fh"、: and hard disks, which use magnetic charges to represent Is and Os, omicul discs use reflected light. On a CD-ROM

14、 disc, Is and Os are represented by flat areas and bumpy (高低不平的)areas (called "pits") on its bottom siujhce. The CD-ROM disc is read by a laser that projects a tiny beam of light on these areas. The amount of reflecled light determines whether the area rern’esenls a 1 or a 0. Like a commercial CD f

15、ound in music stores, a CD-ROM is a "read-only" disc. Read-only means it cannot be written on or erased by the user. Thus, you as a user have access only to the data imprinted (压Epl) by the publisher. A single CD-ROM disc can slore 650 megabytes (兆字节)of data. That is ea nival ent to 451 floppy disk

16、s. With that much infdmimicm on a single disc, the time lo reirieve or access the information is very important. An important characteristic of CD-ROM drives is their access rate. III. Translate the following passage from English into Chinese: 调制解调器是在模拟与数字信号之间进行转换的设备。 计算机使用的是数字信号,这种信号由离散单元组成,通常用一

17、系列1和0表示。 模拟信号是连续变化的;声波就是模拟信号的一个例子。 调制解调器经常用于实现计算机之间通过 线的互相通信。 调制解调器将发送端计算机的数字信号转换成可通过 线传输的模拟信号。 信号到达目的地后,另外一个调制解调器重构原来的数字信号,供接收端计算机处 理。 如果两个调制解调器可■同时互相发送数据,那么它们采用的就是全双工工作方式; 如果一次只有一个调制解调器可以发送数据,那么它们采用的那么是半双工工作方式。 Unit Two/Section B Fill in the blanks with the information given in the text:

18、 1. 2. 3. graphical file; scheduler virtual4. sliceII. Translate the following terms or phrases from English into Chinese and vice versa: 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. interrupt handler中断处理程序virtual memory虚拟存储(器),虚存,虚拟内存 context switch上下文转换,语境转换 main memory 主存(储器) bit pattern 位模式外围

19、设备 peripheral device 进程表 process table时间片time slice 图形用户界面 graphical user interface 海量存储器mass storageUnit Six: Database Unit Six/Section AFill in the blanks with the information given in the text: 1. flat2. data3. 4. 5. application; administrators conceptual tables6. 7. fragmented; replica

20、tedstructured 8. entity-relationship; attributes Translate the following terms or phrases from English into Chinese and vice versa: 1. end user最终用户,终端用户 2. atomic operation 原子操作 3. database administrator 数据库管理员 4. relational database model 关系数据库模型

21、5. local data本地数据 6. object-oriented database 面向对象数据库 7. database management system (DBMS)数据库管理系统 8. entity-relationship model (ERM) 实体关系模型 9. distributed database 分布式数据库 10. flat file平面文件 11. 二维表 two-dimensional table 12. 数据属性 data attribute 13. 数据库对象 database object 14. 存储设备 storage devic

22、e 15. 数据类型data type 16. 数据插入与删除 data insertion and deletion 17. 层次数据库模型 hierarchical database model 18. 数据库体系结构 database architecture 19. 关系数据库管理系统 relational database management system (RDBMS) 20. 全局控制总线 global control bus Fill in each of the blanks with one of the words given in the followi

23、ng list, making changes if necessary: A database is any collection of data organized for storage in a computer memory and designed for easy acciss by authorized users. The data may be in the form of text, numbers, or encoded graphics. Small databases were first develoned or funded by the U.S. gover

24、nment for agency or professional use. In the 1960s, some databases became commercially。也likible, but their use was funnelled (传送)through a few so-called research c(mters that collected information inquiries and handled them in batches (批,批量).Online databases—that is, databases available to anyone wh

25、o could link up to them by computer—first appeared in the 1970s. Since their first, exgimentul appearance in the 1950s, databases have become so imDoricml that they can be found in almost cry field of information. Government, military, and industrial dalabcises are often highly restricted, and prof

26、essional databases are usually of limited interest. A wide range of commercial, governmental, and norngfit databases are available to the general public, however, and may be used by anyone who owns or has access to the equiDment that they require. IV. Translate the following passage from English in

27、to Chinese: 在关系数据库中,表的行表示记录(关于不同项的信息集),列表示字段(一个记 录的特定属性)。 在进行搜索时,关系数据库将一个表中的一个字段的信息与另一个表的一个相应字 段的信息进行匹配,以生成将来自这两个表的所要求数据结合起来的另一个表。例如, 如果一个表包含 EMPLOYEE-ID> LAST-NAME、FIRST-NAME 和 HIRE-DATE 字段, 另•个表包含DEPT、EMPLOYEE-ID和SALARY字段,关系数据库可匹配这两个表中 的EMPLOYEE-ID字段,以找到特定的信息,如所有挣到一定薪水的雇员的姓名或所有 在某个日期之后受雇的雇员所属的部门

28、 换言之,关系数据库使用两个表中的匹配值,将一个表中的信息与另一个表中的信 息联系起来。微型计算机数据库产品一般是关系数据库。 Unit Six/Section BFill in the blanks with the information given in the text: 1. commit 2. scheduler 3. shared; exclusive 4. wound-waitTranslate the following terms or phrases from English into Chinese and vice versa: 1. nonvolat

29、ile storage system 非易失性存储系统 2. equipment malfunction 设备故障 3. wound-wait protocol 受伤一等待协议 4. exclusive lock排它锁,互斥(型)锁 5. database integrity 数据库完整性 6. 共享锁 shared lock 7. 数据库实现 database implementation 8. 级联回滚 cascading rollback 9. 数据项 data item 1(). 分时操作系统 time-sharing operating systemUnit Sev

30、en: Computer Networks Unit Seven/Section AFill in the blanks with the information given in the text: 1. MAN 2. open; closed 3. bus 4. token 5. Ethernet 6. client/server 7. equals; temporary 8. network II. Translate the following terms or phrases from English into Chinese and vice v

31、ersa: 1. file server文件服务器 2. carrier sense载波检测,载波监听 3. protocol suite协议组,协议集 4. peer-to-peer model 对等模型 5. bus topology network 总线拓扑网络 6. inter-machine cooperation机器间合作,计算机间合作 7. Ethernet protocol collection 以太网协议集 8. proprietary network 专有网络 9. utility package实用软件包,公用程序包 10. star network

32、星形网络 11. 局域网 local area network (LAN) 12. 令牌环 token ring 13. 无线网络 wireless network 14. 封闭式网络 closed network 15. 环形拓扑结构ring topology 16. 客户机/服务器模型client/server model 17. 网络应用程序 network application 18. 进程间通信 interprocess communication 19. 打印服务器print server 20. 广域网 wide area network (WAN)Fill

33、 in each of the blanks with one of the words given in the following list, making changes if necessary: Computers can communicate with other computers through a series of connections and associated hardware called a network. The udvemme of a network is that data can be exchcmRed rapidly, and softwar

34、e and hardware resources, such as hard-disk s-cice or printers, can be shared. Networks also allow use of a computer by a user who cannot physically access the computer. One type of network, a local area network (LAN), consists of several PCs or works lai io connected to a special computer called a

35、 server, often within the same building or office complex. The server stores and mcmciRes programs and data. A server often contains all of a 淀[worked group's data and enables LAN workstations or PCs to be set up wi由mu large storage capabilities. In this scenario (方案),each PC may have Tocal" memory

36、for example, a hard drive) specific to itself, but the bu/k of storage resides on the server. This rediicis the cost of the workstation or PC because less e—nsise computers can be purchased, and it simplifies the mdintencmce of software because the software resides only on the se*尸 rather than on e

37、ach individual workstation or PC. I. Translate the following passage from English into Chinese: 在计算机科学中,网络是指由通信设备连接在一起的一组计算机及其相关设备。 网络可采用电缆等永久性连接,或者采用通过 或其他通信链路而实现的临时性 连接。 网络可以小到由少数计算机、打印机以及其他设备构成的局域网,也可以由分布在 广大地理区域的许多小型与大型计算机组成。 计算机网络无论大小,其存在的目的均在于为计算机用户提供以电子方式进行信息 通信与传送的方法。 有些类型的通信是简单的用户到用

38、户消息;有些称为分布式过程,可能涉及数台计 算机,以及在执行任务中分担工作量或进行协作。 Unit Seven/Section CFill in the blanks with the information given in the text: 1. repeater 2. data-link 3. gateway 4. routerTranslate the following terms or phrases from English into Chinese and vice versa: 1. destination address 目的地址 2. performanc

39、e degradation 性能退化(或降级) 3. four-interface bridge 4 接 口网桥 4. common bus公共总线,公用总线 5. 数据链路层 data-link layer 6. 协议转换器 protocol converter 7. 开放式系统互连 OSI (Open Systems Interconnection) 8. 物理地址 physical addressUnit Ten: Computer Security Unit Ten/Section AI. Fill in the blanks with the information g

40、iven in the text: 1. confidentiality; availability 2. data 3. authenticity 4. integrity 5. Passive; active 6. availability 7. ease; security 8. assurance II. Translate the following terms or phrases from English into Chinese and vice versa: 1. back叩system备份系统 2. encryption key (加密)

41、密钥 3. data confidentiality 数据机密性 4. system vulnerability系统脆弱性,系统脆弱之处 5. unauthorized access未经授权的访问,越权存取 6. intrusion detection system 入侵检测系统 7. after-action recovery 事后恢复 8. software piracy 软件侵权 9. authorized user 特许用户 10. data unit数据单元,数据单位 11. 软件版本 software version 12. 数据完整性 data integri

42、ty 13. 系统崩溃 system crash 14. 病毒检查软件virus-checking software 15. 综合平安策略comprehensive security strategy 16. 软件配置管理software configuration management 17. 故障隔离 fault isolation 18. 统计数据库 statistical database 19. 保密的加密算法 secure encryption algorithm 20. 数据流 data stream I. Fill in each of the blanks with one of the words given in the following list, making

移动网页_全站_页脚广告1

关于我们      便捷服务       自信AI       AI导航        抽奖活动

©2010-2025 宁波自信网络信息技术有限公司  版权所有

客服电话:4009-655-100  投诉/维权电话:18658249818

gongan.png浙公网安备33021202000488号   

icp.png浙ICP备2021020529号-1  |  浙B2-20240490  

关注我们 :微信公众号    抖音    微博    LOFTER 

客服