計算機專業英語文章
計算機專業英語篇一:計算機專業英語
1.1ACloserLookattheProcessorandPrimaryStorage
仔細看看處理器和主儲存器
Wehavelearnedthatallcomputershavesimilarcapabilitiesandperformessentiallythesamefunctions,althoughsomemightbefasterthanothers.Wehavealsolearnedthatacomputersystemhasinput,output,storage,andprocessingcomponents;thattheprocessoristhe“intelligence”ofacomputersystem;andthatasinglecomputersystemmayhaveseveralprocessors.Wehavediscussed
Notes
[1]InabigmainframecomputertheprocessoriscalledaCentralProcessingUnit,orCPU,C.addD.subtractacomputertofollow.
A.stepsB.processC.linesD.graphicsA.machineB.computerC.keyboardD.personA.machineB.computerC.keyboardD.mouse
5.Whichofthefollowingisnotthestagesofprogramming?
A.Writeaprogram.
B.Debugtheprogram.
C.Printtheprogram.
D.Compiletheprogram.
PassageC
Acomputervirusisacomputerprogramthatiscreatedtomakeandspreadcopiesofitself.Theprogrammayhoweveralsobedesignedtohaveothereffectsonthesystemsitinfects,rangingfromtheannoyingtothedisastrous.
Virusattacksaregrowingrapidlythesedays.AccordingtoBusinessWeek,the76,404attacksreportedinthefirsthalfof2003nearlymatchpreviousyear'stotalnumber.Asnewantivirustoolsaremorepowerfulthanbefore,theviruswritersaregettingalotsmarterwithnewerandcreativewaystoattacknetworksystems.Let'sfirstexaminesomecommonvirustypes:
BasicVirus-apieceofsoftwarecodethatisdevelopedtoattackcomputersandnetwork
systemsviaemailorInternetconnections.Itquicklyreplicatesitselfandgraduallyattachestofiles,programsortheharddrive.
TrojanHorses-Thisisaprogramthatdoesn'treplicatewhenenteringasystembutcanbeeffectivelyusedtoopen'backdoors.'TrojanHorsesallowhackerstotakecontroloveraparticularsystemortostealveryimportantdata.
Worm-thistypeofvirusisabletospreaditselfautomaticallyoverthenetworkfromonecomputertothenext.Duringawormattack,users'computersgetinfectedwithoutevenhavingtoclickopenemailattachmentoranyprogram,etc.
Sinceitisverydifficulttoavoidthevirus,yourbestdefenseisapowerfulantivirusprogram.Inordertofightwithsuchviruses,thesoftwarevendorsshouldfocusonmakingtheirproductsmorerobust.Thismayaskforatrade-offbetweenuser-friendlinessandsecurity.Inspecificcasesitmayrequireline-by-lineinspection,coderetoolingandevensystemsautomationtodefendtheinstalledprograms.
(四)、choosethebestansweraccordingtothepassageB.(根據上文的內容選擇正確的答案。10分,每題2分)
1.
A.programsB.virusC.copiesD.files
2.
A.networkB.E-mailC.programD.hardware
3.AntivirusprogramcanscanandA.cleanB.produceC.replicateD.make
4.A.quicklyreplicateitselfandgraduallyattachetofiles,programsortheharddrive.
B.infectthecomputerwithoutevenhavingtoclickopenemailattachmentoranyprogram.C.allowhackerstotakecontroloveraparticularsystemortostealveryimportantdata.D.avoidthevirustoattackcomputer.
5.matchpreviousyear'stotalnumber.
A.86,404B.76,404C.56,354D.34,876
Ⅲ.Translation.翻譯(30分)
(一)TranslatethefollowingsentencesintoChinese.(將下列句子翻譯成漢語。)(共20分,每題5分)
1.Fordevelopingasoftwareproduct,thedevelopmentprocessisdividedinto5stages:RequirementsAnalysis&Specification,Design,Coding,Testing,andMaintenance.