freepeople性欧美熟妇, 色戒完整版无删减158分钟hd, 无码精品国产vα在线观看DVD, 丰满少妇伦精品无码专区在线观看,艾栗栗与纹身男宾馆3p50分钟,国产AV片在线观看,黑人与美女高潮,18岁女RAPPERDISSSUBS,国产手机在机看影片

正文內容

計算機專業(yè)英語作業(yè)和答案解析-資料下載頁

2025-06-19 07:18本頁面
  

【正文】 ew antivirus software is always more effective in defending virus attack. ()10. Hackers sometimes can disguise themselves as internal users and attack your system undetected. (√ )四. Match the following words and expressions in the left column with those similar in meaning in the right column.(將左列的詞匯與右列相應的漢語匹配。)(一).1. MISa.局域網2. HTMLb.電子數(shù)據(jù)交換3. LANc.管理信息系統(tǒng)4. FTPd.萬維網5. TCP/IPe.企業(yè)與個人的電子商務交易方式6. WWWf.傳輸控制協(xié)議/網際協(xié)議7. EDIg.文件傳送[輸]協(xié)議8. OSIh.超文本鏈接標示語言9. B2C i.企業(yè)之間的電子商務交易方式10. B2B j.開放系統(tǒng)互連1. c 6. d 2. h 7.b 3. a 8. j 4. g 9. e 5. f 10. i (二) .1. routera.音頻2. hubb.圖像3. switchc.集線器4. multimediad.路由器5. audioe.防火墻6. videof.交換機7. graphicsg.多媒體8. imageh.視頻9. hackeri.圖形10. firewallj黑客1. d 6. h 2. c 7.i 3. f 8. b 4. g 9. j 5. a 10. e 四.Fill in the blanks with suitable words or expressions from the list given below, and change the form where necessary. (從下面方框中選擇合適的詞或表達,以其適當?shù)男问教羁铡#?.traffic facilitate network protocol message transmission packet destination TCP/IP consists of two protocols . It uses packet switching to facilitate the transmission of messages. Packet switching divides message into small unites called packets . Packets travel along the network separately, based on the final destination and network traffic and other network conditions. 2.convert transfer networking connect decision routine software packageManagement Information System connects all the ponents of an organization together. It provides information support for decision makers. These information is converted from data. A welldesigned MIS can save time for routine tasks and speed up the transfer of information. The four elements of MIS are people, hardware, software and data. Hardware requirements often means networking , while software requirements often include office packages .3.blend online hoax attachmentantivirus security programA virus is a program that selfreplicates. There are many types of viruses. Basic virus attacks puters via or Internet connections. hoax viruses often e with your mail and are carried by the attachment . Several viruses may be bined together to form blended attack. To defend against virus, you need antivirus tools. This requires a balancing between userfriendliness and security . Many software such as NAV can provide such functions plus online protection.五. Translation.(翻譯。)(一).Translate the following sentences into Chinese.(將下列句子翻譯成漢語。)1.In recent years, TCP/IP has also begun to be used by telephone panies to provide faster, cheaper telephone transmissions.近年來,TCP/IP被逐漸用于電話公司來提供更快、更便宜的電話傳輸。2.The World Wide Web is the latest evolution of an effort to make information on puters throughout the world available to as many users as possible.人們努力想把計算機上的信息傳遍全世界,讓盡可能多的人能夠得到,萬維網(WWW)就是為此發(fā)展起來的。3.A small network may only connect two puters inside a home to share a single printer and Internet connection小型計算機網絡可能僅由家庭中的兩臺計算機組成,它們可以共享打印機和因特網連接。4.Thus a management information system collects, transmits, processes, and stores data on an organization39。s resources and programmes.管理信息系統(tǒng)基于企業(yè)的資源和程序搜集、傳輸和存儲數(shù)據(jù)。5.EDI refers to the electronic exchange of business information between two panies using a specific and structured format over private networks.EDI是指兩個公司之間通過私有網絡使用特定、結構化的格式電子交換商業(yè)信息。6.Information users only have to deal with one integrated environment rather than a number of separate information subsystems.信息用戶只需要處理一個集成環(huán)境,而不是一系列獨立的信息子系統(tǒng)。7.A multimedia system allows end users to share, transfer and process a variety of forms of information in a unified manner.多媒體系統(tǒng)允許終端用戶以統(tǒng)一的形式共享、傳輸并處理各種形式的信息。8.The data warehouse is the data environment that can be used as the single integrated source of data for processing information.數(shù)據(jù)倉庫是一種數(shù)據(jù)環(huán)境,是用于信息處理的單一和綜合的數(shù)據(jù)源。9.A puter virus is a puter program that is created to make and spread copies of itself.計算機病毒是一種計算機程序,被創(chuàng)建用來制造和傳播自身的副本。10.There is free firewall software available that can run on minimal hardware and provide a good level of protection to your network.現(xiàn)在已有免費的防火墻軟件,可以運行在最低的硬件配置上,并能較好地保護您的網絡。(二).Translate the following paragraphs into Chinese.(將下列各段翻譯成漢語)。1. A puter network links puters together to allow users to share hardware, software, and data, and municate with each other electronically. Computer networks exist in many sizes and types. We will discuss the topologies of networks first, and then touch on some hardware issues, including the network devices and the types of transmission media involved. Communication networks can be classified in terms of their physical arrangement or Topologies. Three mon topologies are the star, bus, and ring.計算機網絡以電子的方式將用戶的計算機連接在一起,用戶通過網絡,就可以共享硬件、軟件、數(shù)據(jù),就可以相互通信。網絡有不同的規(guī)模和種類。首先,我們將論述其拓撲結構,然后談一些硬件問題,包括網絡設備和相關的傳輸介質類型。通信網絡可以按照其物理排列或拓撲結構來分類。有三種常見的拓撲結構:星型、總線型和環(huán)型。2.Electronic merce is the process of buying and selling or exchanging of products and services and information via puter networks using any of the applications that rely on the Internet, such as
點擊復制文檔內容
職業(yè)教育相關推薦
文庫吧 www.dybbs8.com
備案圖鄂ICP備17016276號-1