《计算机英语(第4版)》课后练习参考答案课件

余年寄山水
960次浏览
2020年08月19日 03:37
最佳经验
本文由作者推荐

切格瓦拉语录-联欢晚会主持词



Unit FourSection B
I. Fill in the blanks with the information given in the text:
1.
2.
3.
Information engineering emphasizes a modeling tool called entity relationship diagrams.
One of the disadvantages of model-driven development is the long duration of projects.
Unlike structured analysis and design and information engineering, object-oriented
analysis and design attempt to emerge the data and process concerns into singular constructs
called objects.
4. Unlike logical models, physical models show not only what a system is or does , but also
how the system is physically and technically implemented.

II. Translate the following terms or phrases from English into Chinese and vice versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
check box 复选框,选择框,校验框
structured design 结构化设计
building block 积木块,构建模块,构件
database schema 数据库模式
radio button 单选(按)钮
系统建模技术 system modeling technique
模型驱动开发 model-driven development
数据流程图 data flow diagram
下拉式菜单 drop-down (或pull- down) menu
10. 滚动条 scroll bar

Unit Five: Software Process
Unit FiveSection A
I. Fill in the blanks with the information given in the text:
1. New software may be developed from scratch or through the use of existing systems and
off-the-shelf software or system components.
2. The three generic process models discussed in the text are often complementary rather than
mutually exclusive, especially for large system development.


3. The waterfall model is so named because of the cascade from one phase to another in the
software development process.
4. The fundamental development activities of the waterfall model are requirements analysis
and definition, system and software design, implementation and unit testing, integration and
system testing, and operation and maintenance.
5. The two fundamental types of evolutionary development are exploratory development and
throwaway prototyping.
6. The evolutionary approach is often more effective than the waterfall approach in producing
systems that meet the immediate needs of customers, but it is difficult to establish a(n)
stable system architecture using this approach.
7. CBSE is a(n) reuse-oriented approach to software development, which relies on a large
base of reusable software components and an integrating framework for these components.
8. While CBSE can reduce the amount of software to be developed and the associated cost
and risks, it cannot avoid requirements compromises which may lead to a system that does
not meet the real needs of users.

II. Translate the following terms or phrases from English into Chinese and vice versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
system specification 系统规格说明
unit testing 单位(或单元、部件)测试
software life cycle 软件生命周期(或生存周期)
system validation testing 系统验证测试
evolutionary development process 演化开发过程
linear model 线性模型
program unit 程序单元
throwaway prototype 抛弃式原型
text formatting 正文格式编排,文本格式化
10. system evolution 系统演变
11. 系统设计范例 system design paradigm
12. 需求分析与定义 requirements analysis and definition
13. 探索式编程方法 exploratory programming approach
14. 系统文件编制 system documentation


15. 瀑布模型 waterfall model
16. 系统集成 system integration
17. 商用现成软件 commercial off-the-shelf (或COTS) software
18. 基于组件的软件工程 component-based software engineering (CBSE)
19. 软件维护工具 software maintenance tool
20. 软件复用 software reuse

IV. Translate the following passage from English into Chinese:
Software processes are complex and, like all intellectual and creative processes, rely on
people making decisions and judgments. Because of the need for judgment and creativity,
attempts to automate software processes have met with limited success. Computer-aided
software engineering (CASE) tools can support some process activities. However, there is no
possibility, at least in the next few years, of more extensive automation where software takes
over creative design from the engineers involved in the software process.
One reason the effectiveness of CASE tools is limited is because of the immense
diversity of software processes. There is no ideal process, and many organization have
developed their own approach to software development. Processes have evolved to exploit the
capabilities of the people in an organization and the specific characteristics of the systems that
are being developed. For some systems, a very structured development process is required
while for others a flexible, agile process is likely to be more effective.
软件过程比较 复杂,而且像所有其他的智能和创造性过程一样,依靠人们作出决定
和判断。由于需要判断和创造性,使 软件过程自动化的尝试只取得了有限的成功。计算
机辅助软件工程工具可支持软件过程的某些活动。然而 ,至少是在未来几年内,不可能
实现更广泛的软件过程自动化,使软件能够接替参与软件过程的工程师来 从事创造性设
计。
计算机辅助软件工程工具的有效性有限,原因之一是软件过程多种多样。不 存在理
想的过程,而且许多组织机构发展了自己的软件开发方法。软件过程不断演变,以利用
组 织机构中的人员的能力和开发中的系统的具体特点。对于一些系统来说,需要的是一
个高度结构化的开发 过程,而对于另外一些系统来说,一个灵活敏捷的过程很可能更为
有效。


Unit Six: Database
Unit SixSection A
I. Fill in the blanks with the information given in the text:
1. Data storage traditionally used individual, unrelated files, sometimes called flat files.
2. According to the text, a DBMS is a combination of five components: hardware, software,
data, users, and procedures.
3. As far as a DBMS is concerned, users can refer to both end users and application programs,
and end users can refer to both database administrators and normal user.
4. The three-level architecture for a DBMS discussed in the text consists of the internal,
conceptual, and external levels.
5. In the relational database models, data is organized in two-dimensional tables called
relations.
6. A distributed database can be classified either as a fragmented distributed database or as a
replicated distributed database.
7. While trying to keep the advantages of the relational model, an object-oriented database
allows applications to access structured data.
8. An important step in the design of a database involves the building of a(n)
entity- relationship model that defines the entities for which some information must be
maintained, the attributes of these entities, and the relationship between these entities.

II. Translate the following terms or phrases from English into Chinese and vice versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
end user 最终用户,终端用户
atomic operation 原子操作
database administrator 数据库管理员
relational database model 关系数据库模型
local data 本地数据
object-oriented database 面向对象数据库
database management system (DBMS) 数据库管理系统
entity- relationship model (ERM) 实体关系模型
distributed database 分布式数据库
10. flat file 平面文件


11. 二维表 two-dimensional table
12. 数据属性 data attribute
13. 数据库对象 database object
14. 存储设备 storage device
15. 数据类型 data type
16. 数据插入与删除 data insertion and deletion
17. 层次数据库模型 hierarchical database model
18. 数据库体系结构 database architecture
19. 关系数据库管理系统 relational database management system (RDBMS)
20. 全局控制总线 global control bus


IV. Translate the following passage from English into Chinese:
In a relational database, the rows of a table represent records (collections of information
about separate items) and the columns represent fields (particular attributes of a record). In
conducting searches, a relational database matches information from a field in one table with
information in a corresponding field of another table to produce a third table that combines
requested data from both tables. For example, if one table contains the fields EMPLOYEE-ID,
LAST-NAME, FIRST-NAME, and HIRE- DATE, and another table contains the fields DEPT,
EMPLOYEE-ID, and SALARY, a relational database can match the EMPLOYEE-ID fields in
the two tables to find such information as the names of all employees earning a certain salary
or the departments of all employees hired after a certain date. In other words, a relational
database uses matching values in two tables to relate information in one to information in the
other. Microcomputer database products typically are relational databases.
在关系数据库中,表的 行表示记录(关于不同项的信息集),列表示字段(一个记
录的特定属性)。在进行搜索时,关系数据库 将一个表中的一个字段的信息与另一个表
的一个相应字段的信息进行匹配,以生成将来自这两个表的所要 求数据结合起来的另一
个表。例如,如果一个表包含EMPLOYEE-ID、LAST- NAME、FIRST-NAME和
HIRE- DATE字段,另一个表包含DEPT、EMPLOYEE- ID和SALARY字段,关系数据
库可匹配这两个表中的EMPLOYEE-ID字段,以找到特定的 信息,如所有挣到一定薪水
的雇员的姓名或所有在某个日期之后受雇的雇员所属的部门。换言之,关系数 据库使用


两个表中的匹配值,将一个表中的信息与另一个表中的信息联系起来。微型计算 机数据
库产品一般是关系数据库。

Unit SixSection B
I. Fill in the blanks with the information given in the text:
1. The commit point is the point at which all the steps in a transaction have been recorded in
the log of the DBMS.
2. A large DBMS often contain a scheduler to coordinate time-sharing among transactions in
much the same way that a time-sharing operating system coordinates interweaving of
processes.
3. The items within a database that are currently being used by some transaction are marked
with locks. There are two common types of locks: shared locks and exclusive locks.
4. With the wound- wait protocol, if an older transaction requires access to an item that is
locked by a younger transaction is forced to release all of its data items, and its activities are
rolled back.

II. Translate the following terms or phrases from English into Chinese and vice versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
nonvolatile storage system 非易失性存储系统
equipment malfunction 设备故障
wound-wait protocol 受伤―等待协议
exclusive lock 排它锁,互斥(型)锁
database integrity 数据库完整性
共享锁 shared lock
数据库实现 database implementation
级联回滚 cascading rollback
数据项 data item
10. 分时操作系统 time-sharing operating system




Unit Seven: Computer Networks
Unit SevenSection A
I. Fill in the blanks with the information given in the text:
1. According to the geographical area covered, a computer network is often classified as either
a LAN, a (n) MAN, or a WAN.
2. A network can also be classified as either a (n) open network or a (n) closed network
according to whether its internal operation is based on designs in the public domain or on
innovations owned and controlled by a particular entity.
3. A network can also be classified according to its topology. Among the most popular
topologies are the bus topology, ring topology, and star topology.
4. A popular protocol in networks based on the ring topology is the token ring protocol
developed by IBM in the 1970s.
5. In a (n) Ethernet system, the right to transmit messages is controlled by the protocol known
as CSMACD.
6. The clientserver model for interprocess communication defines the basic roles played by
the processes as either a client or a server.
7. The peer-to-peer model involves two processes communicating as equals and usually
executing on a (n) temporary basis.
8. Although it is often used, the term peer-to-peer network is not very appropriate.

II. Translate the following terms or phrases from English into Chinese and vice versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
file server 文件服务器
carrier sense 载波检测,载波监听
protocol suite 协议组,协议集
peer-to- peer model 对等模型
bus topology network 总线拓扑网络
inter-machine cooperation 机器间合作,计算机间合作
Ethernet protocol collection 以太网协议集
proprietary network 专有网络
utility package 实用软件包,公用程序包
10. star network 星形网络


11. 局域网 local area network (LAN)
12. 令牌环 token ring
13. 无线网络 wireless network
14. 封闭式网络 closed network
15. 环形拓扑结构 ring topology
16. 客户机/服务器模型 clientserver model
17. 网络应用程序 network application
18. 进程间通信 interprocess communication
19. 打印服务器 print server
20. 广域网 wide area network (WAN)

IV. Translate the following passage from English into Chinese:
A network, in computer science, is a group of computers and associated devices that are
connected by communications facilities. A network can involve permanent connections, such
as cables, or temporary connections made through telephone or other communications links. A
network can be as small as a local area network consisting of a new computers, printers, and
other devices, or it can consist of many small and large computers distributed over a vast
geographic area. Small or large, a computer network exists to provide computer users with the
means of communicating and transferring information electronically. Some types of
communication are simple user-to-user messages; others, of the type known as distributed
processes, can involve several computers and the sharing of workloads or cooperative (合作的)
efforts in performing a task.
在计算机科学中,网络是指 由通信设备连接在一起的一组计算机及其相关设备。网
络可采用电缆等永久性连接,或者采用通过电话或 其他通信链路而实现的临时性连接。
网络可以小到由少数计算机、打印机以及其他设备构成的局域网,也 可以由分布在广大
地理区域的许多小型与大型计算机组成。计算机网络无论大小,其存在的目的均在于为
计算机用户提供以电子方式进行信息通信与传送的方法。有些类型的通信是简单的用户
到用户消 息;有些称为分布式过程,可能涉及数台计算机,以及在执行任务中分担工作
量或进行协作。


Unit SevenSection B
I. Fill in the blanks with the information given in the text:
1. In the bus topology, a terminator should be installed at each end of the bus or main cable.
2. As compared with the star topology, the extended star topology adds sub-central devices
instead of connecting all devices to a central unit.
3. The hierarchical topology, also referred to as the tree topology, is much like the star
topology, except that it doesn’t use a (n) central node.
4. A truly redundant network can be created with the mesh topology.

II. Translate the following terms or phrases from English into Chinese and vice versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
routing path 路由选择通路
dual-ring topology 双环形拓扑结构
extended star topology 扩展星形拓扑结构
backbone network 基干网,骨干网
mesh topology 网格拓扑结构
同轴电缆 coaxial cable
逻辑拓扑结构 logical topology
无冲突连网环境 collision-free networking environment
树形拓扑结构 tree topology
10. 目的地节点 destination node

Unit Eight: The Internet
Unit EightSection A
I. Fill in the blanks with the information given in the text:
1. The Internet originated from research projects going back to the early 1960s.
2. The establishment of domains on the Internet is overseen by a nonprofit corporation called
ICANN或the Internet Corporation for Assigned Names and Numbers.
3. A registered domain can be attached to the existing Internet by means of a (n) router which
is often referred to as the gateway of the domain.
4. A user typically connects to the Internet in one of two ways: temporarydial-up


connections and permanentdedicated connections.
5. A (n) ISP或Internet service provider is a company that provides Internet access and
other services to customers.
6. An IP address is a 32-bit address made up of two parts: the network identifier and the host
address, identifying the domain in which a computer resides and the particular computer
within the domain respectively.
7. IP address are traditionally written in dotted decimal notation.
8. For ease of memorization, each domain is also assigned a unique mnemonic address known
as a domain name.

II. Translate the following terms or phrases from English into Chinese and vice versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
cell phone 蜂窝电话,移动电话,手机
IP address 网际协议地址,IP地址
autonomous system 自主系统
dial-up connection 拨号连接
network identifier 网络标识符
binary notation 二进制记数法
mnemonic name 助记名,缩写名
Internet-wide directory system 因特网范围的目录系统
name server 名称服务器
10. Internet infrastructure 因特网基础结构
11. 助记地址 mnemonic address
12. 网吧 cyber cafe
13. 宽带因特网访问 broadband Internet access
14. 顶级域名 top-level domain (TLD)
15. 因特网编址 Internet addressing
16. 点分十进制记数法 dotted decimal notation
17. 因特网服务提供商 Internet service provider (ISP)
18. 专用因特网连接 dedicated Internet connection
19. 主机地址 host address
20. 硬件与软件支持 hardware and software support



IV. Translate the following passage from English into Chinese:
The internet provides only the physical and logical infrastructure that connects millions
of computers together. Many believe that the World Wide Web (WWW, or simply the Web)
provides the killer application (制胜法宝) for this global network. The Web is considered the
content of the Internet, providing all sorts of information by using a rich set of tools that
manage and link text, graphics, sound, and video. Providing and viewing information on the
Web is accomplished server applications and client applications.
If you’ve already explored the Web, you’ll recognize the client-side application as the
Web browser. A Web browser receives, interprets, and displays pages of information from the
Web. The user can navigate within pages, jump to other pages by clicking hypertext links, and
point to just about any page on the Web. < br>因特网只是提供了将许许多多的计算机连接在一起的物理与逻辑基础结构。不少人
认为,是万维网 (WWW或简称the Web)为这个全球网络提供了“制胜法宝”。万维网
被视为因特网的内容,它 通过使用管理与链接文本、图形、声音和视频的一套丰富工具
来提供各种信息。在万维网上提供和查看信 息,是使用服务器应用程序和客户应用程序
完成的。
如果你已经探索过万维网,你就会看出客 户端应用程序就是万维网浏览器。万维网
浏览器接收、解释和显示来自万维网的网页信息。用户可以在网 页之内浏览,可以通过
点击超文本链接跳到其他网页,也可以指向万维网上的几乎任何网页。

Unit EightSection B
I. Fill in the blanks with the information given in the text:
1. For an outgoing message, the four layers of software involved in Internet communication
work in the order of the application layer, the transport layer, the network layer, and the
link layer; for an incoming message, it is just the opposite.
2. The transport layer converts long messages into packets compatible with the Internet
before their transmission and reassembles them at the destination.
3. The packets related to a common message may follow different paths through the Internet.
4. Only the link and network layers are involved at the intermediate stops during a packet’s
journey to its final destination.



II. Translate the following terms or phrases from English into Chinese and vice versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
incoming message 来报,到来的报文
application layer 应用层
utility software 实用软件
sequence number (顺)序号,序列号
remote login capabilities 远程登录能力
端口号 port number
软件例程 software routine
传输层 transport layer
文件传送协议 FTP(File Transfer Protocol)
10. 万维网浏览器 Web browser

Unit Nine: Mobile and Cloud Computing
Unit NineSection A
I. Fill in the blanks with the information given in the text:
1. The concept of cloud computing has evolved from cluster, grid, and utility computing.
2. A public cloud is built over the Internet and can be accessed by any user who has paid for
the service.
3. A private cloud is built within the domain of a (n) intranet owned by a single organization.
4. A (n) hybrid cloud is built with both public and private clouds.
5. Generally speaking, private clouds are easier to manage, and public clouds are easier to
access.
6. The rapid progress in multi- core CPUs, memory chip, and disk arrays has made it possible
to built faster data centers with huge amounts of storage space.
7. One of the design objectives for cloud computing is shifting computing from desktops
data centers
8. The Internet cloud is envisioned as a massive cluster of servers, which can be physical
machines or VMs.

to


II. Translate the following terms or phrases from English into Chinese and vice versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
server farm 大型机服务器
access protocol 存取协议,访问协议
storage area network 存储区域网(络)
high-throughput computing 高吞吐(量)计算
server cluster 服务器集群
public cloud 公共云
grid computing 网格计算
security-aware cloud architecture 具有安全意识的云体系结构
social networking 社交网络
10. utility computing 效用计算
11. 云计算提供商 cloud computing provider
12. 存储芯片 memory chip
13. 基于内部网的私有云 intranet-based private cloud
14. 网络带宽 network bandwidth
15. 混合云 hybrid cloud
16. 磁盘阵列 disk array
17. 软件即服务 Software as a Service (SaaS)
18. 集群计算 cluster computing
19. 虚拟化计算机资源 virtualized computer resources
20. 多核处理器 multi-core processor

IV. Translate the following passage from English into Chinese:
Cloud computing applies a virtualized platform with elastic resources on demand by
provisioning hardware, software, and data sets dynamically. The idea is to move desktop
computing to a service-oriented platform using server cluster and huge databases at data
centers. Cloud computing leverages its low cost and simplicity to benefit both users and
providers. Machines virtualization has enabled such cost-effectiveness. Cloud computing
intends to satisfy many user applications simultaneously. The cloud ecosystem (生态系统)
must be designed to be secure, trustworthy, and dependable. Some computer users think of the
cloud as a centralized resource pool. Others consider the cloud to be a servers used.


Traditionally, a distributed computing system tends to be owned and operated by an
autonomous administrative domain (e. g., a research laboratory or company) for on-premises
(机构内部的) computing needs. However, these traditional systems have encountered several
performance bottlenecks (瓶颈): constant system maintenance, poor utilization, and increasing
costs associated with hardwaresoftware upgrades (升级). Cloud computing as an on-demand
computing paradigm resolves or relieves us from these problems.
云计算动态供应硬件、软件和数据集,以此方式按需应用 一个拥有弹性资源的虚拟
化平台。其目的是通过在数据中心使用服务器集群和巨型数据库而将桌面计算转 移到一
个面向服务的平台。云计算充分利用其低成本与简单的特性既惠及用户也惠及提供商。
机 器虚拟化使这样的成本效益成为可能。云计算意在同时满足许多用户应用程序的需
要。云生态系统必须设 计得具有安全性、可信性和可靠性。有些计算机用户将云视为一
个集中式资源池,而另外一些计算机用户 则认为云是一个在所用的各个服务器上实行分
布式计算的服务器集群。
传统上,一个分布式计 算系统往往由一个自主管理域(如一个研究实验室或公司)
为内部计算需要而拥有和使用。然而,这些传 统系统遭遇数个性能瓶颈:系统维护需要
不断进行;利用率差;与硬件/软件升级有关的费用日益增长。 作为一种按需计算范式,
云计算可解决这些问题或可使我们摆脱这些问题。

Unit NineSection B
I. Fill in the blanks with the information given in the text:
1. Supportive technologies for the IoT are divided into two categories: enabling and
synergistic technologies.
2. Contemporary devices that lend support to ubiquitous computing include smartphones,
tablet computers, sensor networks, RFID tags, smart cards, and GPS devices.
3. The architecture of an IoT consists of sensing devices connected to various applications via
mobile networks, the Internet, and processing clouds.
4. A typical wireless sensor network consists of spatially distributed autonomous sensors to
cooperatively monitor physical or environmental conditions.

II. Translate the following terms or phrases from English into Chinese and vice versa:
1. computer vision 计算机视觉


2.
3.
4.
5.
6.
7.
8.
9.
ubiquitous computing 普适计算
command line 命令行
data logging system 数据记录(或登录)系统
augmented reality 增强现实
移动网络 mobile network
平板电脑 tablet computer
物联网 Internet of Things
智能电网 smart power grid
10. 传感器融合 sensor fusion

Unit Ten: Computer Security
Unit TenSection A
I. Fill in the blanks with the information given in the text:
1. The CIA triad used to define computer security objectives consists of confidentiality,
integrity, and availability.
2. In computer security, integrity covers the two related concepts of data integrity and system
integrity.
3. In addition to the CIA triad, two of the most commonly mentioned concepts concerning
security objectives are authenticity and accountability.
4. Security concerns with respect to data encompass availability, secrecy, and integrity
5. Passive network security attacks attempt to learn or make use of information from the
system without affecting system resources, whereas active attacks attempt to alter system
resources or affect their operation.
6. A key threat to software is an attack on availability
7. In developing a security policy, a security manager must balance ease of use against
security against cost of failure and recovery.
8. In the context of computer security, assurance is the degree of confidence one has that the
security measures work as intended.

II. Translate the following terms or phrases from English into Chinese and vice versa:


1.
2.
3.
4.
5.
6.
7.
8.
9.
backup system 备份系统
encryption key (加密)密钥
data confidentiality 数据机密性
system vulnerability 系统脆弱性,系统脆弱之处
unauthorized access 未经授权的访问,越权存取
intrusion detection system 入侵检测系统
after-action recovery 事后恢复
software piracy 软件侵权
authorized user 特许用户
10. data unit 数据单元,数据单位
11. 软件版本 software version
12. 数据完整性 data integrity
13. 系统崩溃 system crash
14. 病毒检查软件 virus- checking software
15. 综合安全策略 comprehensive security strategy
16. 软件配置管理 software configuration management
17. 故障隔离 fault isolation
18. 统计数据库 statistical database
19. 保密的加密算法 secure encryption algorithm
20. 数据流 data stream

IV. Translate the following passage from English into Chinese:
Intruder (入侵者) attacks range from the benign (良性的,温和的) to the serious. At the
begin end of the scale, there are many people who simply wish to explore internets and see
what is out there. At the serious end are individuals who are attempting to read privileged data,
perform unauthorized modifications to data, or disrupt the system.
The objective of the intruder is to gain access to a system or to increase the range of
privileges accessible on a system. Most initial attacks use system or software vulnerabilities
that allow a user to execute code that opens a back door into the system. Intruders can get
access to a system by exploiting attacks such as buffer overflows (缓存溢出) on a program
that runs with certain privileges.


Alternatively, the intruder attempts to acquire information that should have been
protected. In some cases, this information is in the form of a user password. With knowledge
of some other users’ password, an intruder can log in to a system and exercise all the
privileges accorded to the legitimate user.
入侵者攻击从温和的到严重的形形色色。在这一系列攻击的温和端,有许多人只是
希望探查互联网,看看那里有什么。在严重端的是试图阅读特许数据、对数据进行未经
授权的修改或扰乱 系统的个人。
入侵者的目标是获得进入一个系统的机会,或者增加在一个系统中可以使用的特权
范围。初始攻击大多利用系统或软件的脆弱之处,这些脆弱之处允许用户执行相应的代
码,打开进入系 统的后门。入侵者可对具有某些运行特权的程序实施像缓存溢出这样的
攻击,利用此类攻击获得进入一个 系统的机会。
另外,入侵者也试图获取应予保护的信息。在有些情况下,这种信息是以用户口令
的形式存在的。知道了某个其他用户的口令之后,入侵者就可以登录系统并行使赋予合
法用户的所有特 权。

Unit TenSection B
I. Fill in the blanks with the information given in the text:
1. Most commercial antivirus software uses both the virus dictionary approach and the
suspicious behavior approach with emphasis on the virus dictionary approach.
2. An emerging technique to deal with malware in general is whitelisting which prevents
execution of all computer code except that which has been previously identified as trustworthy
by the system administrator.
3. Instead of attempting to identify known viruses, the suspicious behavior approach
provides protection against brand-new viruses that do not yet exist in any virus dictionaries.
4. Usually one should have only one type of memory-resident antivirus software installed on
a single computer.

II. Translate the following terms or phrases from English into Chinese and vice versa:
1.
2.
3.
phishing attack 网络钓鱼攻击
graphics card 显(示)卡
heuristic analysis 试探性分析


4.
5.
6.
7.
8.
9.
infected file 被感染文件
virus dictionary 病毒字典
数据捕获 data capture
恶意软件 malicious software
病毒特征代码 virus signature
防病毒软件 antivirus software
10. 内存驻留程序 memory-resident program

Unit Eleven: Cyberculture
Unit ElevenSection B
I. Fill in the blanks with the information given in the text:
1. When professional website designers determine the number of levels in a website, a
guideline usually followed is that there should be a maximum of three links for the most
important information.
2. A website has a few different kinds of webpages: the homepage, node pages, basic pages,
navigation pages, and the optional splash page.
3. According to the text, the five principles of design for the interface of a website are balance,
alignment, grouping, consistency, and contrast.
4. Before uploading your website, you should do some usability testing to ensure quality.

II. Translate the following terms or phrases from English into Chinese and vice versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
web- authoring software 网络写作软件
template generator 模版生成程序
navigation page 导航页面
corporate logo 公司标识
splash page 醒目页面,过渡页
导航条 navigation bar
节点页面 node page
网站地图 site map
可用性测试 usability testing


10. 图形交换格式 gif(Graphics Interchange Format)

Unit Twelve: Electronic Commerce
Unit TwelveSection B
I. Fill in the blanks with the information given in the text:
1. All electronic commerce sites must at least provide a catalog display, shopping cart
capabilities, and transaction processing.
2. Small commerce sites can use a(n) static catalog while larger commerce sites are more
likely to use a(n) dynamic catalog.
3. A shopping cart is sometimes called a shopping bag or shopping basket.
4. At checkout, the online shopper’s Web browser software and the seller’s Web server
software both switch into a secure state of communication.

II. Translate the following terms or phrases from English into Chinese and vice versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
software suite 软件套件
text box 文本框
virtual checkout counter 虚拟付款台
static catalog 静态目录
browser session 浏览器会话期
动态目录 dynamic catalog
购物车软件 shopping cart software
供应链 supply chain
企业资源计划软件 enterprise resource planning (ERP) software
10. 税率 tax rate

上海海事大学专科-仓库管理员年终总结


描写植物的作文-经销商合同


幼儿园对联-会计专业毕业论文


中国历届国家领导人-亲情的名言


胃寒症状-江西高招网


陕西中医学院图书馆-班会流程


黄冈人事考试-国际关系学院研究生


小学黑板报设计-四川大学招生信息网