(一)
学好英语有助于精通电脑
许多操作电脑的命令、电脑中的一些重要名词、概念等都来自日常英语词汇,如果英语基础好,对这些命令、名词、概念等稍加分析、记忆就能掌握, 可凭借英语单词的词义来加深对电脑知识的理解。如:DEL(删除文件命令)=Delete(删除),MD(建立子目录命令)=Make Directory(建立目录),CD(改变或进入目录命令)=Change Directory(改变目录),CLS(清除屏幕命令)=Clear Screen(清除屏幕),CHKDSK(检查磁盘状态命令)=Check Disk(检查磁盘),VER(显示版本号命令)=Version(版本)等等。
在电脑中有一些非常重要的、常用的术语、软件名称、略写形式的专有名词,都源于常用英文单词或多个英文单词的首写字母。例如:被称为计算机心脏的CPU(中央处理器)=Central Processing Unit(中央处理单元),DOS=Disk Operating System(磁盘操作系统),PC=Personal Computer(个人电脑),MPC=Multimedia Personal Computer(多媒体个人电脑),VCD=Video Compact Disk(视频压缩光盘),RAM=Random Access Memory(随机存储器,即人们常说的“内存”)。国际标准计算机编码:ASCII=American Standard Code for Inf
ormation Interchange(美国标准信息交换码)。世界上流行最早、使用人数最多的电脑高级语言——BASIC=Beginner's All-purpose Symbolic Instruction Code(初学者通用符号指令代码)。还有一些必须掌握的基本概念,如电脑存储容量单位:KB=Kilo Byte(千字节),MB=Mega Byte(兆字节),GB=Giga Byte(千兆字节)。K=Kilo——表示“千”。M=Mega——表示“兆;百万”。G=Giga——表示“千兆;十亿”。B=Byte,表示“字节”,是电脑最小存储单位(一个字节可以存储一个英文字母,每两个字节可以存放一个汉字)。
要掌握电脑技术,不但要学好一般日常英语,更重要的是应学好电脑英语。由于电脑里的命令、高级语言的语句等在电脑中均需占一定的空间,从节约和简练的原则出发,为充分发挥其效能,电脑在存储和显示这些信息时,通常尽量采用缩略的形式,使其语句十分简洁,加之专业术语较多,逐渐形成了人们常说的“电脑英语”。如果电脑英语像一般英语那样结构松散,书写完整,就会显得冗长口罗嗦,编写程序或阅读起来就会感到十分困难和诸多不便。尽管有的人学过多年英语,对绝大多数电脑里的英语句子能翻译、能理解,而对有些电脑英语词句就不知其所以然了。在电脑英语中有的语句按照字面意义、按照语法规则或习惯表达法去分析均视为错误,但在电脑英语中则是正确的表达方法。例如:
1、Data record too large(数据记录太大),正常英语应写成The data record is too large.
2、Drive A not prepared(驱动器A没有准备好),应为Drive A is not prepared.
3、Program too big to fit in memory(程序太大,不能装入内存),普通说法是The Program is too big to fit in the memory.
4、General failure reading(writting) drive A(读写驱动器A失败),一般英语应写成There is a general failure in reading(writting) drive A。
5、Write protect error writting drive A(写信息时驱动器A中软盘处于写保护状态),一般英语表达成Drive A is in the status of writting protect when you are writting data on the floppy disk.
上面几个句子如按照字面意义或语法规则去分析,都或多或少有错,但在电脑中这些表达方式却是对的。我们不难发现,学好英语特别是学好电脑英语,不但可以加快掌握电脑知识,做到“既知其然又知其所以然”,而且还可以大大降低学习电脑的难度。
(二)
The computer virus
The computer virus is an outcome of the computer overgrowth in the 1980s. The cause of the term "computer virus" is the likeness between the biological virus and the evil program infected with computers. The origin of this term came from an American science fiction“The Adolescence of P-1”written by Thomas J. Ryan, published in 1977. Human viruses invade a living cell and turn it into a factory for manufacturing viruses. However, computer virusesare small programs. They replicate by attaching a copy of themselves to another program
计算机语言种类 Once attached to me host Program, the viruses then look for other programs to "infect". In this way, he virus can spread quickly throughout a hard disk or an entire organization when it infects a LAN or a multi-user system. At some point, determined by how the virus was programmed the virus attacks. The timing of the attack can be linked to a number of situations, including a certain time or date, the presence of a particular file, the security privilege level of the user, and the number of times a file is used. Likewise, the mode of attack varies. So-called "benign" viruses might simply display a message, like the one that infected IBM's main computer system last Christmas with a season's greeting. Malign
ant viruses are designed to damage the system. The attack is to wipe out data, to delete flies, or to format the hard disk.
What Kind of Viruses Are There? There are four main types of viruses: shell, intrusive, operating system and source ode. Shell viruses wrap themselves around a host program and don't modify the original program. Shell programs are easy to write, which is why about half of viruses are of this type. Intrusive viruses Invade an existing program and actually insert a portion of themselves into the host program. Intrusive viruses are hard to write and very difficult to remove without damaging the host file.
参考译文:计算机病毒
计算机病毒是八十年代计算机飞速发展带来的结果,计算机病毒这一名词起因于在计算机上传染的有害程序与生物学中病毒的相似性,该名词起源于1977年出版的、由 Thomas J. Ryan写的一本美国科幻小说《p-1的青春》。人体病毒入侵活的细胞后,就把它转变成制造病毒的工厂。而计算机病毒是一些小程序,它们把自己的一个副本附加到另一个程序上面进行复制。
病毒程序一旦附加到一个主程序上,就开始寻其他可以进行“感染”的程序。这样,病毒就很快地布满整个硬盘,如果病毒感染了一个局域网或者一个多用户系统,那么就在整个组织内进行扩散。只有在某个点上病毒程序才会发作(这是由病毒程序的设计所决定的)。攻击的时间与多种情况有关,包括:某个时间或日期、特定用户识别符的出现、用户的安全保密等级和一个文件使用的次数。同样,攻击的方式也是各种各样的。所谓的“良性”病毒可能只是简单地显示一个消息,如在去年圣诞节时,受感染的IBM公司的主要计算机系统显示节日问候。恶性病毒被设计出来破坏系统。常见的攻击方式是消除数据、删除文件或者格式化硬盘。
(三)
That little "a" wit @的来头
That little "a" with a circle curling around it that is found in email addresses is most commonly referred to as the "at" symbol.
小写字母a外加个圆圈,这一符号常出现在email()地址中,通常是作为"at"(在)的标记。
Surprisingly though, there is no official, universal name for this sign. There are dozens of strange terms to describe the @ symbol.
然而令人感到惊奇的是,这一标记居然没有官方的,通用的名称。有几十个奇怪的术语用来描绘@这一符号。
Before it became the standard symbol for electronic mail, the @ symbol was used to represent the cost or weight of something. For instance, if you purchased 6 apples, you might write it as 6 apples @ $1.10 each.
@这一符号在成为的标准符号之前,曾被用来表示物品的单价或质量。例如,你买6只苹果。就可以写成"六只苹果,每只@$1.10,表示每只苹果1.10美元。
With the introduction of e-mail came the popularity of the @ symbol. The @ symbol or the "at sign" separates a person's online user name from his mail server address. For instance, **********************. Its widespread use on the Internet made it necessary to put this symbol on keyboards in other countries that have never seen or used the symbol before. As a result, there is really no official name for this symbol.
版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系QQ:729038198,我们将在24小时内删除。
发表评论