英文版计算机教程

上传人:1888****888 文档编号:48109599 上传时间:2022-01-01 格式:PPT 页数:320 大小:3.22MB
收藏 版权申诉 举报 下载
英文版计算机教程_第1页
第1页 / 共320页
英文版计算机教程_第2页
第2页 / 共320页
英文版计算机教程_第3页
第3页 / 共320页
资源描述:

《英文版计算机教程》由会员分享,可在线阅读,更多相关《英文版计算机教程(320页珍藏版)》请在装配图网上搜索。

1、Unit OneUnit ThreeUnit TwoUnit FourUnit FiveUnit SixUnit SevenUnit EightUnit NineUnit TenUnit One A Friend or a SpyComputer Learning objectives In this unit you should get familiar with: the functions of computerthe changes computer brings to our lifethe advantage of computerthe disadvantages of com

2、puterReturn to HomeI. Warm-up 1.Tick () the words or phrases that are associated with this unit.WindowsCompact Disc Operating System DatabaseU discmodem Firewall ExplorerprocessorServer PDA Workstation2.Look at the following figures and label them correctly with the words given below.Notebook comput

3、er Desktop computer ScannerMainframe computer Laser Printer Handheld PDA Figure 1._ Figure 2._ Figure 3._ Figure 4._ Figure 5._ Figure 6._ Return to HomeII. Part A Personal Computer are Changing the WorldPersonal computer have been changing our daily life since IBM launched its pioneering PC on Augu

4、st 12, 1981. From then on, people have sent instant messages while watching friends on web cameras rather than inking letters to faraway friends. And people also could search online for anything from love to medical advice or bargain airfares. Personal computer gives the world telecommuting,video ga

5、mes and sedentary lifestyles Although it has made a stunning difference in peoples lives,personal computer is still in the early stages of this stuff When wireless seems to be everywhere, our life will be a big leap that is the things people couldnt dream of Computer has already changed our life in

6、many ways. The unprecedented access to people and information provided by computers has changed societys privacy landscape. Credit cards, banks and telephone companies record user activitiesInternet firms that provide free services such as on-line searches,maps,and e-mail save information typed in b

7、y users and sort it by unique identification numbers in the machines. With so much of our lives digital,the ability of the government and other people to know what we are doing, reconstruct our lives and basically stalk us online has grown. Now, as far as we can see, the effects of computers on soci

8、ety go far deeper than online lifestyles. The computer brings the world into the home as the television did before it. But it is also a window that lets others look into your world, particularly your bosses;people you buy from or sell to;and our government. They have flourished as a platform for soc

9、ial networking, with groups ranging from online cliques to buy virtual property. Anyone with a computer has the ability to quickly put video, text, or audio on the Internet, which unleashes a flood of weblogs and “citizen journalism” that,while democratic, lacks standards for integrity and reliabili

10、ty. The full effects that computers and the Internet will have on journalism, education and the military are yet to be known, but if the Internet corrodes the institutions our culture depends on,then we may have new social networks but lose very valuable social goods. With the developing of computer

11、 technologies, and the progressing we know and use them, we believe we can conquer the difficulties that computer brings. And then, well open a new page of our life. New words and expressionswebsites n. 网站sedentary a. 坐着的,不(或极少)活动的stunning a. 令人震惊的,极好的 unprecedented a. 空前的,无前例的clique n.私党, 小圈子, 派系pr

12、oxy n. 代理人integrity n. 正直,诚实reliability n. 可靠性corrode vt. 腐蚀,侵蚀 Exercises:1. Answer the following questions briefly according to the text. When was the first PC launched? How does the computer change societys privacy landscape? Why we call computer as a platform for social networking? Can we trust t

13、he information on weblogs and “citizen journalism”? Why? Do you think computer will destroy our life one day? Why?video games个人计算机telecommuting互联网公司unique identification number数字化avatar网络日志citizen journalism统一标准2. Fill in the table below by giving the corresponding Chinese or English equivalents. 3.

14、 Read the passage again and fill in the blanks with the information you have got in the passage.Since IBM launched its pioneering PC, people have sent instant messages while watching friends on rather than inking letters to faraway pals.The unprecedented to people and provided by computers has chang

15、ed societys privacy landscape.The computer as the television did before it on . 4. Choose the best one from the items given below to complete the following passage. Early computers A to solve mathematical and engineering problems. The first general purpose of B electronic computer was the Electronic

16、 Numerical Integrator and Computer (ENIAC), built by J. Presper Eckert and John V. Mauchly at the University of Pennsylvania in 1946. It filled a thirty by fifty-foot room and C thirty tons. The computer had 18,000 vacuum tubes which D perform calculations at a rate of 5,000 additions per second. Th

17、is is E than any human could perform, but a great deal slower than the computers of today. A: are build were built build builtB: programming programmatic programmable programC: weighed weighted weigh weightD: are used to used to use to were used toE: more fast faster much faster very faster 5. The f

18、ollowing is a humorous conversation between a customer and a salesman. Fill in the blanks with the help of the Chinese given in the brackets. Salesman: Can I help you? Customer: Yes, I need to buy a computer for this semester. I was told it is cheaper to buy computers here.Salesman: Well, . (你听到的是对的

19、)You can get (很不错的价格)on a new computer here. We have great discounts for students.Customer: I dont know much about computers. But I know I want (一台有很大内存的桌上电脑). And I need a printer.Salesman: Well, first lets consider your computer. Here, for example, is a system I . (极力推荐)-the Power Macintosh G3.It

20、comes with 512M of total memory.Customer: Is that a lot? Five hundred and twelve? Salesman: Yes, it is. It should be enough for any student needs you might have. Well, we have a special deal on right now. If you buy one of these (17 寸彩色显示屏)with a Power Macintosh G3, you can actually get 30 percent o

21、ff the usual sale price.Customer: Thirty percent?Salesman: Yes.Customer: Wow. Thats really good. And you think (对一个学生而言,这是一个很好的系统吗)?Salesman: Yes. Its excellent. Customer: Hmm. I think I should ask some of my friends for advice before I make a decision. Salesman: No, dont be sorry. Its reasonable to

22、 ask your friends. Customer: Well, thanks for your advice. I will probably come back later.Salesman: Youre very welcome. Here is my card, if you need any help, contact me please. Return to HomePart BCAN YOU TRUST YOUR COMPUTER? Whom should your computer take its orders from? Most people think their

23、computers should obey them, not obey someone else. With a plan they call trusted computing, large media corporations (including the movie companies and record companies), together with computer companies such as Microsoft and Intel, are planning to make your computer obey them instead of you. (Micro

24、softs version of this scheme is called Palladium.) Proprietary programs have included malicious features before, but this plan would make it universal. Proprietary software means, fundamentally, that you dont control what it does; you cant study the source code, or change it. Its not surprising that

25、 clever businessmen find ways to use their control to put you at a disadvantage. Microsoft has done this several times: one version of Windows was designed to report to Microsoft all the software on your hard disk; a recent security upgrade in Windows Media Player required users to agree to new rest

26、rictions. But Microsoft is not alone: the KaZaa music-sharing software is designed so that KaZaas business partner can rent out the use of your computer to their clients. These malicious features are often secret, but even once you know about them it is hard to remove them, since you dont have the s

27、ource code. In the past, these were isolated incidents. Trusted computing would make it pervasive. Treacherous computing is a more appropriate name, because the plan is designed to make sure your computer will systematically disobey you. In fact, it is designed to stop your computer from functioning

28、 as a general-purpose computer. Every operation may require explicit permission. The technical idea underlying treacherous computing is that the computer includes a digital encryption and signature device, and the keys are kept secret from you. Proprietary programs will use this device to control wh

29、ich other programs you can run, which documents or data you can access, and what programs you can pass them to. These programs will continually download new authorization rules through the Internet, and impose those rules automatically on your work. If you dont allow your computer to obtain the new

30、rules periodically from the Internet, some capabilities will automatically cease to function. Today you can avoid being restricted by proprietary software by not using it. If you run GNU/Linux or another free operating system, and if you avoid installing proprietary applications on it, then you are

31、in charge of what your computer does. You can also run free application programs and tools on non-free operating systems; this falls short of fully giving you freedom, but many users do it. New words and expressionscorporation n.公司,企业Microsoft n.微软(公司)Intel n.英特尔公司proprietary adj.所有者的,所有权的,私权的malici

32、ous adj.有恶意的,怀恨的pervasive adj.普遍的,流行的treacherous adj.背叛的,不可靠的explicit adj.明确的,明白表示的encryption n.加密cease v.停止,终止Exercises: 1. Mark the following statements with T (true) or F (false) according to the text. Computer only obeys its owner. If we found some malicious features in our computer, we can remo

33、ve them. You are always in disadvantage when you face those clever businessmen, such as Intel and KaZaa. If you refuse to obtain the new authorization rules from the Internet, some capabilities of your computer will not work automatically. We can avoid being restricted by proprietary software by not

34、 using it. Not a few users run free application programs and tools on non-free operating systems.2. Complete the following sentences by translating the parts given in Chinese.1) (随着科学技术的发展),more and more information including numerical data and a great deal of none-numerical data come out.2) Especia

35、lly in these years, with the development of database and computer network technique, computer users in different districts and countries can (通过网络通讯共享信息资源)。3) Now, As CAM、CAD and CAI being used very widely, (全面自动化) from design to production has fulfilled in many fields.4) Computer is electronic equi

36、pment which can make (算术和逻辑运算), process information rapidly and automatically.5) The technical idea underlying treacherous computing is that the computer includes (一个数位加密以及签章装置),and the keys are kept secret from you.Return to HomeIII. Further ReadingHow Bill Gates Work Many people are familiar with

37、the history of Bill Gates and Microsoft but they are often wondering about how Bill Gates works. Now lets go to Bills office to have a look at what his routine jobs are . If you look at Bill Gates office, there isnt much paper in it. On his desk he has three screens, synchronized to form a single de

38、sktop. He can drag items from one screen to the next. At Microsoft, e-mail is the medium of choice. Bill gets about 100 e-mails a day. They apply filtering to keep it to that level e-mail comes straight to Bill from anyone hes ever corresponded with. And he always sees a write-up from his assistant

39、of any other e-mail. Bill uses tools like in-box rules and search folders to mark and group messages based on their content and importance. Outlook also has a little notification box that comes up in the lower right whenever a new e-mail comes in. He is much disciplined about ignoring that unless he

40、 sees that its a high-priority topic. Bill Gates deals with information overloaded by using SharePoint, a tool that creates websites for collaboration on specific projects. These sites contain plans, schedules, discussion boards, and other information, and they can be created by just about anyone in

41、 the company with a couple of clicks. Another digital tool that has had a big effect on his productivity is desktop search. He now has gigabytes of information on his PC and servers in the form of e-mails, documents, media files, contact databases, and so on. And Bill gets 90% of his news online, an

42、d when he goes to a meeting and wants to jot things down, he brings his Tablet PC. It also has a note-taking piece of software called OneNote, so all his notes are in digital form. The one low-tech piece of equipment still in his office is his whiteboard. Bill always has nice color pens, and its gre

43、at for brainstorming when hes with other people, and even sometimes by himself.Days are often filled with meetings. So its great after the kids go to bed to be able to just sit at home and go through whatever e-mail he didnt get to. If the entire week is very busy, its the weekend when hell send the

44、 long, thoughtful pieces of e-mail. When people come in Monday morning, theyll see that hes been quite busy- theyll have a lot of e-mail. Further discussions: 1. Please describe Bill Gates office in a few sentences. 2. In Bill Gates Book for high school and college graduates, there is a list of 11 t

45、hings they did not learn in school. In this book, Bill Gates talks about how feel good, politically-correct teachings created a full generation of kids with no concept of reality and how this education set them up for failure in the real world. Can you list these 11things?3. The following is a list

46、of Computer English Terms. After reading, you are required to identify the Chinese equivalents in the table below. Then you should put the corresponding letters in the brackets.( ) Acalculator 1. 个人计算机( ) Bdigital computer 2. 数据处理( ) Cfeedback 3. 指令( ) Dterminal 4. 地址( ) Ekeyboard 5. 终端( ) Fpersonal

47、 computer 6. 键盘 ( ) Gdata processing 7. 数字计算机( ) Hinstruction 8. 反馈( ) Iitem 9. 计算器( ) Jaddress 10. 项目,项 I. Warm-up1. Answer the following questions briefly according to the text.(略)2. Figure 1 Notebook computerFigure 2 Desktop computerFigure 3 Handheld PDAFigure 4 Mainframe computerFigure 5 scanner

48、Figure 6 Laser Printer II. Part A On August 12, 1981. The unprecedented access to people and information provided by computers has changed societys privacy landscape by recording user activities; save information typed in by users and sort it by unique identification numbers in the machines. There a

49、re groups ranging from online cliques to fantasy worlds inhabited by animated custom “avatar” proxies that party,work,and buy virtual property. No,because they lacked standards for integrity and reliability. If the Internet corrodes the institutions our culture depends on,then we may have new social

50、 networks but lose very valuable social goods. video games视频游戏personal computer个人计算机telecommuting远程办公Internet firms网络公司unique identification number独特识别号码digital数字化avatar虚拟化身weblog网络日志citizen journalism市民新闻standards for integrity统一标准3. web cameras; access; information; bringing the world into the hom

51、e4.1): B 2): C 3): A 4): D 5): C5. Salesman: you heard right, an excellent deal Customer: a desktop computer with a lot of memory Salesman: highly recommend Salesman: seventeen-inch color monitors Customer: this is really a good system for a student? Part B1. F F T T T F2.1) With the development of

52、science technique2) share many valuable information resource through network3) complete automation4) arithmetic and logic calculation5) a digital encryption and signature device III. Further Reading 1. 略。2. The 11 things are: (1) Life is not fair, get used to it. (2) The world wont care about your s

53、elf-esteem. The world will expect you to accomplish something before you feel good about yourself. (3) You will not make 40 thousand dollars a year right out of high school. You wont be a vice president with a car phone, until you earn both. (4) If you think your teacher is tough, wait till you get

54、a boss. He doesnt have tenure. (5) Flipping burgers is not beneath your dignity. Your grandparents had a different word for burger flipping; they called it opportunity. (6) If you mess up, its not your parents fault, so dont whine about our mistakes, learn from them. (7) Before you were born, your p

55、arents werent as boring as they are now. They got that way from paying your bills, cleaning your clothes and listening to you talk about how cool you are. So before you save the rain forest from the parasites of your parents generation, try delousing the closet in your own room. (8) Your school may

56、have done away with winners and losers, but life has not. In some schools they have abolished failing grades; theyll give you as many times as you want to get the right answer. This doesnt bear the slightest resemblance to anything in real life. (9) Life is not divided into semesters. You dont get s

57、ummers off and very few employers are interested in helping you find yourself. Do that on your own time. (10) Television is NOT real life. In real life people actually have to leave the coffee shop and go to jobs.(11) Be nice to nerds. Chances are that youll end up working for one. 3. A-9; B-7; C-8;

58、 D-5; E-6; F-1; G-2; H-3; I-10; J-4. Return to Home第一单元第一单元 个人计算机个人计算机朋友还是间谍朋友还是间谍Part A 个人计算机改变着我们的世界个人计算机改变着我们的世界 自从1981年8月12日,IBM推出了最早的个人计算机之后,计算机就改变了我们的日常生活。从那时起,人们不再用墨水给远方的好友写信,而是可以通过网络摄像头看着对方,给他们发送即时消息。人们也可以在网络上搜寻任何关心的信息,从爱情到医疗建议到打折机票等。个人计算机给世界带来了远程办公、视频游戏和久坐的生活方式。 尽管电脑已经使人们的生活发生了惊人的变化,但它仍然处于初

59、期阶段。当无线设备无处不在的时候,我们将看到一个巨大的飞跃。那是些你和我做梦都想不到的事情。 计算机已经在很多方面改变了我们的生活。计算机为人们提供了史无前例地获取信息的渠道,改变了社会的隐私状况。信用卡、银行和电话公司记录着用户的活动情况。提供在线搜索、地图和电子邮件等免费服务的互联网公司保存用户输入的信息,并通过机器里的独特识别号码对信息进行分类。随着我们生活中这么多的东西已经数字化,政府和其他人便有了更大的能力了解我们在做什么,重构我们的生活,以及主要依凭网络来追踪我们。 现在,正如我们所了解到的那样,计算机对社会的影响远不止网络生活方式。计算机把世界带到了家中,就像以前电视所做的那样,

60、但它也是一扇窗,使其他人可以看到你的世界。特别是你的老板,与你做买卖的人,以及我们的政府。计算机已经发展成为一个繁忙的社交网络平台,各种不同的组织,从网上小团体到神奇的世界,那里居住着活跃的用户“虚拟化身”代理人,他们聚会,工作并且购买虚拟财产。任何拥有计算机的人都能很快地把视频、文本或音频放到互联网上,这使得网络日志和“市民新闻”大量涌现,尽管它们具有民主性,但缺乏统一的标准和可信性。 计算机以及互联网对新闻业、教育和军队的全部影响还不清楚,但如果互联网侵蚀我们的文化所依存的制度,那么我们可能会拥有新的社会网络,也会失去很有价值的社会利益。但是,随着计算机的发展,以及人们对它的进一步认识与利

61、用,相信我们能够很好地克服它的弊端,从而使人类的生活翻开崭新的一页。 Part B你相信你的计算机吗?你相信你的计算机吗? 您的电脑应该听从于谁的命令?大部份的人认为他们的电脑应该服从他们而不是别人。经由一项他们称之为“可信赖的计算”的计划,大型的媒体公司(包括电影和唱片公司)以及像Microsoft 和 Intel电脑公司,正打算使您的电脑服从他们而不是您。(这项方案的 Microsoft 版本称之为“安全装备”Palladium 。)私权的程序在以前就已经有包括了一些恶意的功能特色,但是这项打算将会使其普遍化。 私权软件在本质上即表示:您无法控制它要做些什么;您不能研究源代码或是更动它。聪

62、明的商人找出一些方法利用他们的控制,来使您处於劣势的行为并不让人感到惊讶。 Microsoft 已经做过许多次了:有一个版本的 Windows 被设计来将在您的硬碟上的所有软件回报给 Microsoft;一个最近在 Windows Media Player 上的“安全” 升级要求使用者同意新的限制。但 Microsoft 并不孤单:KaZaa 这个音乐分享软件被设计成,使 KaZaa 的商业伙伴可以将您的电脑的使用出租给他们的客户。这些恶意的功能特色通常是隐密的,但是就算您发现到,也很难将它们移除,因为您并没有源代码。 在过去,这些都是个别的事件。 “可信赖的计算”将可能使它变得普遍。 “背判

63、了的计算”是一个较为合适的名称,因为这项打算是设计用来确保您的电脑将会有系统地不服从您。事实上,它是设计用来使您的电脑无法作为一台通用的计算机。每一项操作都将会需要明确的许可才得以进行。 在“背判了的计算”底下的技术想法是:电脑包括了一个数位加密(digital encryption)以及签章(signature)装置,而其键值(keys)对您来说则是无法取得的秘密。私权程序将会使用这项装置来控制您可以执行的其它程序、您可以储存的文档或资料以及您可以传递的程序。这些程序将会持续地经由互联网下载新的认证规则(authorization rules),并且自动地将那些规则加诸到您的工作上。如果您不

64、允许您的电脑定期地从互联网取得新的规则,那么一些功能(capabilities)将会自动地停止工作(function)。 今天您可以经由不去使用它来避免被私权软件所限制。如果您执行 GNU/Linux 或是其它的自由操作系统,并且如果您避免在它上面安装私权应用程序,那么您就换得了完全地掌握您的电脑做些什么的自由。您也可以在收费的操作系统上运行免费的应用程序和工具;这并不足以给予您完全的自由,但是有许多使用者这么做。 Return to HomeUnit Two Fundamentals of Computer Hardware Learning objectivesIn this unit y

65、ou should get familiar with:the components of computer hardwarethe main functions of each componentthe concept of computer microprocessorthe business benefits of computer hardwareReturn to HomeI. Warm-up 1.Tick () the words or phrases that are associated with this unit. PC camera Microsoft Mouse Com

66、pact Disc Driver U disc Intel Internet keyboard Photoshop Modem Laser Printer CPU 2. Look at the following figures and label them correctly with the words given below.Mouse U Disc Compact Disc Driver LCD keyboard Gamepad Figure 1 _ Figure 2 _ Figure 3 _ Figure 4 _ Figure 5 _ Figure 6 _Return to HomeWhat is the Computer Hardware?Microcomputer hardware consists of devices for input, processing, storage, output and communications.Input Devices: Input devices are equipment that translates data and p

展开阅读全文
温馨提示:
1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
2: 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
3.本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!