欢迎来到装配图网! | 帮助中心 装配图网zhuangpeitu.com!
装配图网
ImageVerifierCode 换一换
首页 装配图网 > 资源分类 > PPTX文档下载
 

计算机专业英语第5章课件

  • 资源ID:215887574       资源大小:246.43KB        全文页数:59页
  • 资源格式: PPTX        下载积分:10积分
快捷下载 游客一键下载
会员登录下载
微信登录下载
三方登录下载: 微信开放平台登录 支付宝登录   QQ登录   微博登录  
二维码
微信扫一扫登录
下载资源需要10积分
邮箱/手机:
温馨提示:
用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)
支付方式: 支付宝    微信支付   
验证码:   换一换

 
账号:
密码:
验证码:   换一换
  忘记密码?
    
友情提示
2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

计算机专业英语第5章课件

1第5章ComputerNetworkTechnology 5.1ComputerNetworkBasics5.2InformationSecurity5.3WirelessNetworks5.4专业英语应用模块25.1ComputerNetworkBasics Agroupofcomputersandotherdevicesconnectedtogetheriscalledanetwork,andthetechnicalconceptofconnectedcomputerssharingresourcesiscallednetworking.Computersthatarepartofanetworkcansharedata,messages,graphics,printers,faxmachines,modems,CD-ROMs,harddisks,andotherdatastorageequipment.3Fig.5-1Compositionofcomputernetwork4MainContentsoftheTextNetworkstructureNetworkadministratorTopologiesStarnetworkGridnetworkBusnetworkRingnetworkHybridnetwork5nNetworkscomeinavarietyofsizesandcomplexities.Generally,thebigger,themorecomplex,andthemoredifficulttomanage.(1)LocalAreaNetwork(2)BridgedLAN(3)SwitchedLAN(4)CampusAreaNetwork(5)RoutedNetwork(6)WideAreaNetwork6nThe Internet is a huge worldwide WANconsistingofthousandsofLANandmillionsofroutersandservers(Fig.5-2).7nNetworkadministratorhasfullrightsandpermissions to all resources on a network.Theadministrator is usually responsible for installing,managing,and controlling servers and networkingcomponents.nAdministratorscanalsomodifythepropertiesofuseraccountsandthemembershipofgroups,createandmanageprinters,installprinters,shareresourcesandassignpermissionstothoseresources.8nThephysicaltopologydescribesthelayoutofthenetwork,justlikeamapshowsthelayoutofvariousroads,andthelogicaltopologydescribeshowthedataissentacrossthenetworkorhowthecarsareabletotravel(thedirectionandspeed)ateveryroadonthemap.Logicaltopologyisthemethodusedtopasstheinformationbetweenthecomputers.(1)Starnetwork(2)Gridnetwork(3)Busnetwork(4)Ringnetwork(5)Hybridnetwork9KeyWords accurate正确的,精确的annulus环backbone骨干,支柱contractor合同人,承包商diagnose诊断fashion风尚,时尚hierarchical分层的hybrid混合的merge使合并neighbor邻居,邻接10KeyWords permission许可,允许regular常规的,合格的router路由器spreadsheet电子表格token令牌,记号topology拓扑,结构upgrade升级,上升unreliable不可靠的11Notes 1Withoutanetwork,thedocumentshavetobeprintedoutsothatotherscaneditthemorusethem.译文:没有网络,就必须将文档打印出来才能供他人编辑或使用。本句的“Withoutanetwork”是条件状语,“sothat”引导的是目的状语从句。12Notes 2Iftheuserweretoconnecthiscomputertoothercomputers,he could share data on other computers,includinghigh-qualityprinters.译文:如果用户能把他们的计算机与其他计算机联在一起的话,他们就可以共享其他计算机上的数据,包括高性能的打印机。本句由“If”引导条件状语从句,“includinghigh-qualityprinters”是补语。13Notes3Arouterknowswherestuffis,evenifitsseveralroutersaway.译文:路由器知道信息的位置,即使要经过几个路由器的距离。本句的“wherestuffis”是宾语从句,“evenifitsseveralroutersaway”是让步状语从句。14Notes 4 A grid network is a kind of computer networkconsistingofanumberofcomputersystemsconnectedinagridtopology.译文:网状网络是一种计算机网络,它以网状拓扑结构将许多计算机系统连接在一起。本 句 的“consisting of a number of computersystems”是现在分词短语作定语,修饰“network”,而“connectedinagridtopology”是过去分词短语作定语,修饰“computersystems”。15Notes5Actually,thereareusuallytwocablessoadapterscanloopbacktoremarktheringifthereisabreak.译文:实际上,通常会有两条电缆,这样适配器就会在网络中出现故障时,可以沿环路返回重新构成环。本句的“soadapterscanloopbacktoremarkthering”是目的状语,而“ifthereisabreak”是条件状语。16ReadingMaterialOpticalCommunicationnOpticalcommunicationsystemsusehighcarrierfrequenciesinthevisibleornear-infraredregionoftheelectromagneticspectrum.Theyaresometimescalledlight-wavesystemstodistinguishthemfrommicrowavesystems,whosecarrierfrequencyistypicallysmallerbyfiveordersofmagnitude(1GHz).nOpticalcommunicationsystemsdifferinprinciplefrommicrowavesystemsonlyinthefrequencyrangeofthecarrierwaveusedtocarrytheinformation.17nTheapplicationofopticalfibercommunicationsisingeneralpossibleinanyareathatrequirestransferofinformationfromoneplacetoanother.However,fiber-opticcommunicationsystemshavebeendevelopedmostlyfortelecommunicationsapplications.nThetelecommunicationapplicationscanbebroadlyclassifiedintotwocategories,long-haulandshort-haul,dependingonwhethertheopticalsignalistransmittedoverrelativelylongorshortdistancescomparedwithtypicalintercitydistances(100km).185.2InformationSecuritynSecuritythreatstoanetworkcanbedividedintothosethatinvolvesomesortofunauthorizedaccessandallothers.Oncesomeonegainsunauthorizedaccesstothenetwork,therangeofthingstheycandoislarge.nActiveattacksincludealteringmessagecontents,masqueradingassomeoneelse,denialofservice,andplantingviruses.19Main Contents of the TextnManagementsresponsibilityThenetworksecuritypolicyismanagementsstatementoftheimportanceandtheircommitmenttonetworksecurity.Thepolicyneedstodescribeingeneraltermswhatwillbedone,butdoesnotdealwiththewaytheprotectionistobeachieved.20nThe network security policy needs to clearly statemanagements position about the importance ofnetworksecurityandtheitemsthataretobeprotected.nManagement must understand that there is no suchthingasaperfectlysecurenetwork.nFurthermore,networksecurityisaconstantlymovingtarget because of advances in technology and thecreativityofpeoplewhowouldliketobreakintoanetworkoritsattachedcomputers.21nAttackpreventionDifferentsecuritymechanismscanbeusedtoenforcethesecuritypropertiesdefinedinagivensecuritypolicy.Attackpreventionisaclassofsecuritymechanismsthatcontainswaysofpreventingordefendingagainstcertainattacksbeforetheycanactuallyreachandaffectthetarget.Animportantelementinthiscategoryisaccesscontrol,amechanismwhichcanbeappliedatdifferentlevelssuchastheoperatingsystem,thenetwork,ortileapplicationlayer.22nAccesscontrollimitsandregulatestheaccesstocriticalresources.nThisisdonebyidentifyingorauthenticatingthepartythatrequestsaresourceandcheckingitspermissionsagainsttherightsspecifiedforthedemandedobject.nAfirewallisanimportantaccesscontrolsystematthenetworklayer.nThefirewallisacentralchokepointthatallowsenforcementofaccesscontrolforservicesthatmayrunattheinsideoroutside.23nAttackavoidanceSecuritymechanismsinthiscategoryassumethatanintrudermayaccessthedesiredresourcebuttheinformationismodifiedinawaythatmakesitunusablefortheattacker.Themostimportantmemberinthiscategoryiscryptography,whichisdefinedasthescienceofkeepingmessagesecure.24nTheoriginalmessageiscalledplaintext.nThe process of converting this message through theapplicationofsometransformationrulesintoaformatthathidesitssubstanceiscalledencryption.nThe corresponding disguised message is denoted asciphertext,and the operation of turning it back intoplaintextiscalleddecryption.nItisimportanttonoticethattheconversionfromplaintociphertext has to be lossless in order to be able torecover the original message at the receiver under allcircumstances.25nThetransformationrulesaredescribedbyacryptographicalgorithm.Thefunctionofthisalgorithmisbasedontwomainprinciples:substitutionandtransposition.nMostsystemsinvolvemultiplestepsoftranspositionandsubstitutiontobemoreresistantagainstcryptanalysis.26KeyWordsanticipate预料,预测brute暴力的,粗暴的choke要塞,拥塞ciphertext密文creativity创造力,创新cryptographic加密的,密码的decode译码denial否认,拒绝denote表示,意味着disguise伪装,借口eavesdrop偷听,窃听27KeyWordsencryption加密hostile敌人,敌对分子interference冲突,干扰intruder闯入者,侵入者lossless无损的observation观察,观测overt公开的,公然的,明显的plaintext明文separation分离,隔离,隔开upgrade升级,提高28Notes1Thatrequiresfollowthroughandcommunicationwithallemployeessothattheyunderstand the emphasis and importanceseniormanagementisplacingonsecurity.译文:这需要后续通过与所有员工的沟通,使他们认识到高层管理人员在安全上布置的重点和重要性。本句的“sothat”引导目的状语从句。29Notes2Themostcommonformofaccesscontrolusedinmulti-usercomputersystemsareaccesscontrollistsforresourcesthatarebasedontheuserandgroupidentityoftheprocessthatattemptstousethem.译文:在多用户计算机系统中,最常用的访问控制形式是资源访问控制清单。清单是建立在进程中想要使用这些资源的用户和群的身份基础上的。本句的“usedinmulti-usercomputersystems”作定语,修饰“accesscontrol”,“thatarebased”是修饰“accesscontrollists”的定语。30Notes3Whenaresourceshouldbeaccessed,thesystem looks up the user and group in theaccesscontrollistandgrantsordeniesaccessasappropriate.译文:当一个资源被请求访问时,系统会在访问控制清单中查找用户和群并适当授权访问或拒绝访问。本句的“When”引导时间状语从句,“in theaccesscontrollist”作定语。31Notes4Thefirewallpreventsattacksfromtheoutsideagainstthemachinesintheinsidenetworkbydenyingconnectionattempts from unauthorized parties located outside,inaddition,afirewallmayalsobeutilizedtopreventusersbehind the firewall from using certain services that areoutside.译文:防火墙通过拒绝来自外部的未授权方的连接企图,从而防止来自外部的对内部网络中的机器的攻击。除此之外,防火墙还可以用来阻止墙内用户使用外部服务。这是一个长句,由“inaddition”连接起两个并列子句,“by denying connection attempts from unauthorizedpartieslocatedoutside”是方式状语,“behindthe”作定语。32Notes5The information is preprocessed at thesender before it is transmitted over thecommunicationchannelandpost-processedatthereceiver.译文:信息在通信渠道中传播之前由发送者进行了预处理,并且接收者收到信息后也要进行处理。本句采用被动语态,主语是“Theinformation”,谓 语 为“preprocessed”和“post-processed”,构成并列句,“beforeitistransmittedoverthecommunicationchannel”是时间状语。33ReadingMaterialTechniquesforInternetSecurityNetworkFirewallsnThepurposeofanetworkfirewallistoprovideashellaroundthenetworkthatwillprotectthesystemsconnectedtothenetworkfromvariousthreats.Thetypesofthreatsafirewallcanprotectagainstinclude:UnauthorizedaccesstonetworkresourcesDenialofserviceMasquerading34Fig.5-3 Network structure example35DigitalCertificateandAuthenticationnDigitalcertificateisanidentitycardcounterpartinthecomputersociety.nAuthenticationisanimportantpartofeverydaylife.Thelackofstrongauthenticationhasinhibitedthedevelopmentofelectroniccommerce.36DigitalSignaturenAdigitalsignatureisanelectronicsignaturethatcanbeusedtoauthenticatetheidentityofthesenderofamessageorthesignerofadocument,andpossiblytoensurethattheoriginalcontentofthemessageordocumentthathasbeensentisunchanged.nAdigitalsignatureisastringofbitsattachedtoanelectronicdocument,whichcouldbeawordprocessingfileoranE-mailmessage.375.3WirelessNetworksnWirelesstechnologies,inthesimplestsense,enableoneormoredevicestocommunicatewithoutphysicalconnectionswithoutrequiringnetworkorperipheralcabling.nWirelessnetworksserveasthetransportmechanismbetweendevicesandamongdevicesandthetraditionalwirednetworks(enterprisenetworksandtheInternet).38Main Contents of the TextnWirelesslocalareanetworks(WLAN)nBluetoothnWirelessnetworkhavemanyusesnsecureyourwirelessnetworknWirelessaccesspoints39nAnaccesspointcommunicateswithdevicesequippedwithwirelessnetworkadaptors;itconnectstoawiredEthernetLANviaanRJ-45port.nAccesspointdevicestypicallyhavecoverageareasofupto300feet(approximately100meters).nThis coverage area is called a cell or range.Usersmovefreelywithinthecellwiththeirlaptoporothernetworkdevice.nAccess point cells can be linked together to allowusers to even“roam”within a building or betweenbuildings.40nInrecentyears,wirelessnetworkinghasbecomemoreavailable,affordable,andeasytouse.nWirelessnetworkhavemanyuses.Forexample,youcansendE-mail,receivetelephonecallsandfaxesandreadremotedocumentsinyourtravel.nIfyouareusingwirelesstechnology,orconsideringmakingthemovetowireless,youshouldknowaboutthesecuritythreatsyoumayencounter.41nSo,ifyourneighborhoodiscloselysettled,orifyouliveinanapartmentorcondominium,failuretosecureyourwirelessnetworkcouldpotentiallyopenyourInternetconnectiontoasurprisingnumberofusers.nDoingsoinvitesanumberofproblems:ServiceviolationsBandwidthshortagesAbusebymalicioususersMonitoringofyouractivityDirectattackonyourcomputer42nWireless access points can announce theirpresence to wireless-enabled computers.Thisisreferredtoas“identifierbroadcasting”.nManypublicaccesspointsarenotsecured,andthetraffictheycarryisnotencrypted.nThiscanputyoursensitivecommunicationsortransactionsatrisk.43KeyWordsabuse欺骗affordable负担得起Bluetooth蓝牙cellular蜂窝的,多孔的cordless无绳的,不用电线的coverage范围,规模disaster灾害,天灾diverse多种多样的,不同的fashion方式,风格headphone耳机inability无能,无能为力44KeyWordsinfrastructure基站,基础设施laptop微型便携式(电脑)fleet船队,车队malicious有恶意的,蓄意的nickname诨名,绰号repairperson维修人员roam漫游savvy精明的,有见识的unpredictable无法预言的violation侵害,违犯wavelength波长wireless无线的,无线电的45Notes1Wirelesstechnologiesrangefromcomplexsystems,suchaswirelesslocalareanetworks(WLAN)andcellphonestosimple devices such as wireless headphones,microphones,andotherdevicesthatdonotprocessorstoreinformation.译文:无线电技术的范围从复杂的系统如无线局域网和手机到简单的设备如无线耳机、麦克风以及其他不用来处理或储存信息的设备。本句有两处由“such as”引导的同位语结构,“thatdo”作定语。46Notes2UnlikeatraditionalLAN,whichrequiresawiretoconnectauserscomputertothenetwork,aWLANconnectcomputersandothercomponentstothenetworkusinganaccesspointdevice.译文:与需要一根线把用户的计算机与网络连接的传统局域网不同,无线局域网使用一个接入点装置把计算机和其他组成部分连接到网络。本句中“UnlikeatraditionalLAN”作状语,“which”引导的是非限定性定语从句,修饰“atraditionalLAN”,“usinganaccesspointdevice”作方式状语。47Notes3Ifyoufailtosecureyourwirelessnetwork,anyonewithawireless-enabled computer within range of your wirelessaccesspointcanhopafreerideontheInternetoveryourwirelessconnection.译文:如果你不能确保你的无线网络的安全,任何拥有一台能激活无线网络的计算机的人只要在你的无线接口范围之内就能通过你的无线连接免费上互联网。本句中“If”引导的是条件状语从句,“withawireless-enabledcomputerwithinrangeofyourwirelessaccesspoint”作定语,修饰主语“anyone”。48Notes4Whenyouuseawirelessrouteroraccesspointtocreateahomenetwork,youtradewiredconnectivityforconnectivitydeliveredviaaradiosignal.译文:当你使用一个无线路由器或接入点去建立一个家庭网络时,你用有线连接交换到由无线电信号传送的连接。本句由“When”引导时间状语从句。49Notes5 Because your connection is being transmitted“in theclear”,malicious users can use“sniffing”tools to obtainsensitive information such as passwords,bank accountnumbers,andcreditcardnumbers.译文:由于你的连接被畅通无阻地传送出去,恶意用户能够使用“嗅探”工具来获得敏感信息,诸如密码、银行帐号以及信用卡号。本句由“Because”引导原因状语从句,“suchas”后面的部分作为“sensitiveinformation”的同位语。50ReadingMaterialInternetApplicationsnE-mailreferstothetransmissionofmessagesovercommunicationsnetworks.nE-mailusestheofficememoparadigminwhichamessagecontainsaheaderthatspecifiesthesender,recipients,andsubject,followedbyabodythatcontainsthetextofthemessage.nAnE-mailaddressisastringdividedintotwopartsbythecharacter(pronouncedas“at”).Thefirstpartisamailboxidentifier,andthesecondstandsforthenameofthecomputeronwhichthemailboxresides.51nAsearchtoolisacomputerprogramthatperformssearches.nAsearchmethodisthewayasearchtoolrequestsandretrievesinformationfromitsWebsite.nAsearchbeginsataselectedsearchtoolsWebsite,reachedbymeansofitsaddressorURL.nEachsearchenginehasitsownwayofassigningrelevance.Higherweightingisnormallygiventotermsinthetitleandthefirstfewwordsinadocument.52nThemobileWebreferstoaccesstotheWorldWideWeb,i.e.theuseofbrowser-basedInternetservices,fromahandheldmobiledevice,suchasasmartphoneorafeaturephone,connectedtoamobilenetworkorotherwirelessnetwork.nMobileWebaccesstodaystillsuffersfrominteroperabilityandusabilityproblems.53nMobileInternetreferstoaccesstotheInternetviaacellulartelephoneserviceprovider.nItiswirelessaccessthatcanhandofftoanotherradiotowerwhileitismovingacrosstheservicearea.nAmobilephone,suchasasmartphone,thatconnectstodataorvoiceserviceswithoutgoingthroughthecellularbasestationisnotonmobileInternet.545.4 专业英语应用模块专业英语应用模块5.4.1 Self-Introduction5.4.2 Self-Recommendation55n自我介绍是向别人展示自己的一个重要手段,这个环节直接关系到你给别人的第一印象。自我介绍也是一种说服的手段和艺术。n自我介绍的时间不长,一般谈谈学历、个人基本情况、工作经历、社会实践、对于应聘职位和行业的看法等。n自我介绍的原则:开门见山,简明扼要,一般最好不要超过三分钟。实事求是,不可吹得天花乱坠。突出长处,但要与申请的职位有关。善于用具体生动的实例来证明自己,说明问题。介绍完后,要问面试官还想知道关于自己的什么事情。5657n自荐信与你的履历表一样重要,一份好的自荐信能为你赢得一个面试机会。履历表告诉别人你的经历和你的技能,而自荐信告诉别人你能为雇佣者做些什么。1.自我介绍和你是如何得知该职位的招聘信息的示例如下:Iamthefourthyearsstudent,majorincomputerscience.IwillgraduateinJuly.Iamgladtoknowyourcompanyishiringwebsitedesigners,acustomerofyourcompanyrecommendedme.582.自我推荐n简短地叙述自己的才能,特别是这些才能将满足公司的需要。n该自荐信应促使招聘者想进一步阅读你的简历。示例如下:Iwasrewardedasmyactivityandcreation,duringIworkedforBlueSkyNetworkcompanyasacomputernetworkmaintainer.593.致谢及进一步行动的要求n信的结尾部分不仅仅只是对你的雇主花时间读你的信表示感谢,还要表明你的下一步计划。示例如下:Iwillconnectwithhumanresourcedepartmentintwoweeks,itisconvenienttoarrangethetimetocheckmyqualification.

注意事项

本文(计算机专业英语第5章课件)为本站会员(txadgkn****dgknqu...)主动上传,装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知装配图网(点击联系客服),我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!