1. 首頁
  2. 職業/專業/職能

計算機專業英語文章

計算機專業英語文章

計算機專業英語篇一:計算機專業英語

1.1ACloserLookattheProcessorandPrimaryStorage

仔細看看處理器和主儲存器

Wehavelearnedthatallcomputershavesimilarcapabilitiesandperformessentiallythesamefunctions,althoughsomemightbefasterthanothers.Wehavealsolearnedthatacomputersystemhasinput,output,storage,andprocessingcomponents;thattheprocessoristhe“intelligence”ofacomputersystem;andthatasinglecomputersystemmayhaveseveralprocessors.Wehavediscussed

Notes

[1]InabigmainframecomputertheprocessoriscalledaCentralProcessingUnit,orCPU,C.addD.subtractacomputertofollow.

A.stepsB.processC.linesD.graphicsA.machineB.computerC.keyboardD.personA.machineB.computerC.keyboardD.mouse

5.Whichofthefollowingisnotthestagesofprogramming?

A.Writeaprogram.

B.Debugtheprogram.

C.Printtheprogram.

D.Compiletheprogram.

PassageC

Acomputervirusisacomputerprogramthatiscreatedtomakeandspreadcopiesofitself.Theprogrammayhoweveralsobedesignedtohaveothereffectsonthesystemsitinfects,rangingfromtheannoyingtothedisastrous.

Virusattacksaregrowingrapidlythesedays.AccordingtoBusinessWeek,the76,404attacksreportedinthefirsthalfof2003nearlymatchpreviousyear'stotalnumber.Asnewantivirustoolsaremorepowerfulthanbefore,theviruswritersaregettingalotsmarterwithnewerandcreativewaystoattacknetworksystems.Let'sfirstexaminesomecommonvirustypes:

BasicVirus-apieceofsoftwarecodethatisdevelopedtoattackcomputersandnetwork

systemsviaemailorInternetconnections.Itquicklyreplicatesitselfandgraduallyattachestofiles,programsortheharddrive.

TrojanHorses-Thisisaprogramthatdoesn'treplicatewhenenteringasystembutcanbeeffectivelyusedtoopen'backdoors.'TrojanHorsesallowhackerstotakecontroloveraparticularsystemortostealveryimportantdata.

Worm-thistypeofvirusisabletospreaditselfautomaticallyoverthenetworkfromonecomputertothenext.Duringawormattack,users'computersgetinfectedwithoutevenhavingtoclickopenemailattachmentoranyprogram,etc.

Sinceitisverydifficulttoavoidthevirus,yourbestdefenseisapowerfulantivirusprogram.Inordertofightwithsuchviruses,thesoftwarevendorsshouldfocusonmakingtheirproductsmorerobust.Thismayaskforatrade-offbetweenuser-friendlinessandsecurity.Inspecificcasesitmayrequireline-by-lineinspection,coderetoolingandevensystemsautomationtodefendtheinstalledprograms.

(四)、choosethebestansweraccordingtothepassageB.(根據上文的內容選擇正確的答案。10分,每題2分)

1.

A.programsB.virusC.copiesD.files

2.

A.networkB.E-mailC.programD.hardware

3.AntivirusprogramcanscanandA.cleanB.produceC.replicateD.make

4.A.quicklyreplicateitselfandgraduallyattachetofiles,programsortheharddrive.

B.infectthecomputerwithoutevenhavingtoclickopenemailattachmentoranyprogram.C.allowhackerstotakecontroloveraparticularsystemortostealveryimportantdata.D.avoidthevirustoattackcomputer.

5.matchpreviousyear'stotalnumber.

A.86,404B.76,404C.56,354D.34,876

Ⅲ.Translation.翻譯(30分)

(一)TranslatethefollowingsentencesintoChinese.(將下列句子翻譯成漢語。)(共20分,每題5分)

1.Fordevelopingasoftwareproduct,thedevelopmentprocessisdividedinto5stages:RequirementsAnalysis&Specification,Design,Coding,Testing,andMaintenance.