Professional English Final Review Questions


1. Question type

  1. Multiple choice questions 15*0.5
  2. Chinese and English vocabulary translation 15*0.5
  3. Abbreviations 10*2
  4. Cloze 10*1
  5. Choose words to fill in the blanks 20**1
  6. Reading Comprehension 10*1
  7. Sentence and passage translation 6 questions = 25 points

2. Multiple Choice Questions

  1. 【单选题】( )is a functional unit that interprets and carries out instructions.
    A、memory B、processor C、storage D、network
  2. 【单选题】( ) consists of the symbols, characters, and usage rules that permit people to communicate with computer.
    A、programming language B、network C、keyboardD、display
  3. 【单选题】( ) software, also called end-user program, includes database programs, word processors,spreadshects,etc…
    A、Application B、SystemC、CompilerD、Utility
  4. 【单选题】 In ( ) ,the only element that can be deleted or removed is the one that was inserted most recently.
    A、a line B、a qucue C、an array D、a stack
  5. [Single-choice question] Most ( ) measures involve data encryption and password.
    A, securityB, hardwareC, displayD, program
  6. 【单选题】( )An error can be caused by attempting to divide by 0.
    A、Interrup tB、Default C、Underflow D、Overflow
  7. 【单选题】The process of identifying and correcting errors in a program.( )
    A、Debug B、Bug C、Fault D、Default
  8. 【单选题】A collection of related information, organized for easy retrieval.( )
    A、Data B、Database C、Buffer D、Stack
  9. 【单选题】A location where data can be temporarily stored.( )
    A、Area B、Disk C、Buffer D、File
  10. 【单选题】A graphical bar with buttons that perform some of the most common commands.( )
    A、Title bar B、Tool bar C、Status bar D、Scroll bar
  11. 【单选题】Every valid character in a computer that uses even must always have an even number oflbits.( )
    A、parity B、check C、test D、compare
  12. 【Single choice】【慉选慊】The maximum number of data that can be expressed by 8 bits is ( )
    A, 64 B, 128 C, 255 D, 256
  13. 【单选题】Integration is the process of verifying that the components of a system work together as described in the program design and system design specifications.( )
    A、trying B、checking C、testing D、coding
  14. 【单选题】GIF files are limited to a maximum of 8 bits/pixel, it simply means that no more than 256 colors are allowed in( )
    A、an image B、a file C、a window D、a page
  15. 【单选题】Computer is a complex consisting of two or more connected computing units, it is used for the purpose of data communication and resource sharing.( )
    A、storage B、device C、network D、processor
  16. 【单选题】( )is a device that converts images to digital format.
    A、Copier B、Printer C、Scanner D、Display
  17. 【单选题】T In C language, a( ) is a series of characters enclosed in double quotes.
    A、matrix B、string C、program D、stream
  18. 【单选题】( )are those programs that help find the information you are trying to locate on the WWW.
    A、Windows B、Search Engines C、Web Sites D、Web Pages
  19. 【单选题】In C language, ( )are used to create variables and are grouped at the top of a program block.
    A、declarations B、dimensions C、comments D、descriptions
  20. 【单选题】An ( )statement can perform a calculation and store the result in a variable so that it can be used later.
    A、executable B、input C、output D、assignment
  21. 【单选题】Each program module is compiled separately and the resulting ( )files are linked together to make an executable application.
    A、assembler B、source C、library D、object
  22. 【单选题】( ) is he conscious effort to make all jobs similar, routine,and interchangeable
    A、WWW. B、Informatization C、computerization D、Standardization
  23. 【单选题】A Web( )is one of many software application that function as the interfaces between a user and the Internet.
    A、display B、browser C、window D、view
  24. 【单选题】Firewall is a( ) mechanism used by organization to protect their LANs from the internet.
    A、reliable B、stable C、peaceful D、security
  25. 【单选题】A query is used to search through the database to locate a particular record or records, which conform to specified( )
    A、criteria B、standards C、methods D、conditions
  26. ( )processing offers many ways to edit text and establish document formats. You can easily insert, delete, change, move and copy words or blocks of text.
    A、Data B、Database C、Word D、File
  27. "Scrolling” is a technique most commonly associated with ( )
    A、disk B、display C、printer D、memory
  28. A sequence of any number of characters enclosed in the double quotes is called a character ( )
    A、array B、group C、set D、string
  29. 【单选题】 In C language, when an array name is passed to a function, what is passed is the( ) of the beginning of the array
    A、data B、value C、location D、element
  30. In C language, the result of the logical ( ) operator is I if the value of its operand is 0, and0 if the value of its operand is non-zero.
    A、AND B、NOT C、OR D、EOR
  31. A floating constant consists of an integer part, a decimal point, a fraction part, an e or E, and an optionally signed integer ( )
    A、exponent B、order C、superfluous D、superior
  32. The ( ) is a temporary storage area that you can use to copy or move selected text or object among applications.
    A、cache B、pool C、buffer D、clipboard
  33. ()means “Any HTML document on a HTTP Server”.
    A、Web server B、Web page C、Web browser D、Web site
  34. The term “_ program” means a program written in high-level language.
    A、compiler B、executable C、source D、object
  35. Very long, complex expressions in program are difficult to _ write correctly and difficult to_.
    A、defend B、detect C、default D、debug
  36. In C language, functions are important because they provide a way to _ code so that a large complex program can be written by combining many smaller parts.
    A、modify B、modularize C、block D、board
  37. The standard _in C language contain many useful functions for input and output ,string handling, mathematical computations, and system programming tasks.
    A、database B、files C、libraries D、subroutine
  38. In_ programming, the user determines the sequence of instructions to be executed, not the programmer.
    A、top-down B、structure C、data-driven D、event-driven
  39. _is a clickable string or graphic that points to another Web page or document.
    A、Link B、Anchor C、Browser D、Hyperlink
  40. One solution to major security problem_ is which are frequently installed to fix known security holes.
    A、patches B、compensation C、complements D、additions
  41. A programmer must know about a function’s _to call it correctly.
    A、location B、algorithm C、interface D、statements
  42. On a _memory system, the logical memory space available to the program is totally independent of the physical memory space.
    A、cache B、virtual C、RAM D、ROM
  43. ____ is a sequence of letters and digits, the first character must be a letter.
    A、An identifier B、A string C、An array D、Program
  44. The error messages given by a C compiler show the message text, the most common cause of the error, and a suggestion for _______the error.
    A、updating B、fixing C、changing D、editing
  45. A ________ is a feature of the system or a description of something the system is capable of doing in order to fulfill the system’s purpose.
    A、plan B、requirement C、document D、design
  46. _______ is a set of specifications and software that allow small programs or software components to work together.
    A、ActiveX B、XML C、HTML D、DBMS
  47. 100BASE-TX makes use of two pairs of twisted pair cable, one pair used for transmission and t other for________.
    A、reception B、detection C、relation D、connection
  48. A typical peripheral device has ________registers, which the processor uses to select the device’s internal registers.
    A、data B、a control C、a signal D、an address
  49. Each instruction is processed sequentially, and several instructions are at varying stages of execution in the processor at any given time, this is called instruction __________.
    A、executing B、sequencing C、pipelining D、producing
  50. Which one of these statements about connecting to the Internet is true?
    A、The Internet can only be used to link computers with same operating system
    B、The Internet can be used to connect computers with different ISP
    C、You must have a modem to connect to the Internet
    D、You must have a telephone line to connect to the Internet
  51. Insufficient ______can cause a processor to work at 50% or even more below its performance potential.
    A、mouse B、I/O C、document D、memory
  52. The_______ in E-mail messages has affected almost every computer around the world and has caused the damage of up to US$1 billion in North America.
    A、illness B、virus C、weakness D、attachment
  53. One of the basic rules of computer security is to change your ________regularly.
    A、name B、computer C、device D、password
  54. One of the greatest features of a home_________ is the ability to share one Internet connection simultaneously over two or more computers.
    A、computer B、device C、network D、work
  55. The usual address for a Web site is the page address, although you can enter_________.
    A、home B、main C、host D、house

  1. A processor is a functional unit that interprets and executes instructions. B
  2. Programming languages ​​consist of symbols, characters, and usage rules that allow people to communicate with computers. A
  3. Application software, also called end-user programs, includes database programs, word processors, spreadsheets, and more. A
  4. In a stack, the only element that can be deleted or removed is the most recently inserted element. D.
  5. Most security measures involve data encryption and passwords. A
  6. Attempts to divide by 0 may result in an overflow error. D.
  7. The process of identifying and correcting errors in a program. Debug A.
  8. A collection of related information organized for easy retrieval. (). Database B
  9. A location where data can be temporarily stored. () buffer C
  10. A graphics bar with buttons for some of the most commonly used commands. ( ) Toolbar B
  11. In computers using even numbers, there must always be an even number of bits per valid character. ( ) Parity A
  12. The maximum number of data that can be represented by 8 bits is () C
  13. Integration is the process of verifying that system components work together as described in the program design and system design specifications. ( ) Test C
  14. GIF files are limited to a maximum of 8 bits/pixel, which simply means that no more than 256 colors are allowed in (). A
  15. A computer is a complex of two or more connected computing units for data communication and resource sharing. ( ) Network C
  16. A scanner is a device that converts an image into a digital format. scanner
  17. In C, a string is a sequence of characters enclosed in double quotes. B
  18. are programs that help you find the information you're looking for on the WWW. search engine B.
  19. In C language, () is used to create variables and grouped at the top of the program block. A. Statement
  20. The () statement can perform a calculation and store the result in a variable for later use. D. assignment
  21. Each program module is compiled separately, and the resulting files are linked together to form an executable application. D. Object
  22. Standardization is his conscious effort to make all work similar, routine and interchangeable D
  23. The Web() is one of many software applications that serve as an interface between a user and the Internet. browser B
  24. A firewall is a mechanism that organizations use to protect their local area network from Internet attacks.
    flat D, safety
  25. A query is used to search a database for a specific record or records matching a specified (). D. Conditions
  26. Word processing offers a variety of methods for editing text and formatting documents. You can easily insert, delete, change, move and copy words or blocks of text. C
  27. Scrolling is one of the most common display-related techniques Display B
  28. A sequence of any number of characters enclosed in double quotes is called the string D
  29. In C language, when an array name is passed to a function, what is passed is the element at the beginning of the array. D.
  30. In C language, the result of the logical NOT operator is 1 if the value of its operand is 0, and 0 if the value of its operand is non-zero. B
  31. A floating-point constant consists of an integer part, a decimal point, a fractional part, e or e, and an optional signed integer exponent A exponent
  32. ( ) is a temporary storage area that can be used to copy or move selected text or objects between applications D Clipboard
  33. A web page refers to "any HTML document on an HTTP server". B page
  34. The term "_program" refers to a program written in a high-level language. C source code
  35. Very long, complex expressions in programs are difficult to write correctly and difficult to write. Ddebugging
  36. In C, functions are important because they provide a way to simplify code so that large complex programs can be written by combining many smaller parts. BModular
  37. The standard _in C language contains many useful functions for input and output, string manipulation, mathematical calculations, and systems programming tasks. C library
  38. In programming, the user decides the order in which instructions are executed, not the programmer. D event driven
  39. is a clickable string or graphic that points to another web page or document. D hyperlink
  40. One solution to major security concerns_ is to install frequently to fix known security holes. A. Patch
  41. A programmer must know the _s of a function to call it correctly. C. Interface
  42. In a virtual memory system, the logical memory space available to programs is completely independent of the physical memory space. B virtual
  43. ____ is a combination of letters and numbers, and the first character must be a letter. A an identifier
  44. Error messages given by C compilers show the message text, the most common causes of errors, and suggestions for _______ errors. B. Correction
  45. A ________ is a characteristic of a system, or a description of what the system is capable of doing in order to achieve the purpose of the system. B. demand
  46. _______ is a set of specifications and software that allow small programs or software components to work together. A. ActiveX
  47. 100BASE-TX uses two pairs of twisted-pair cables, one for transmission and the other for ________. A. Receive
  48. A typical peripheral device has a ________ register, which the processor uses to select the device's internal registers. D. address
  49. Each instruction is processed sequentially, and at any given time, several instructions are in different stages of execution in the processor, which are called instructions __________. C. Assembly line
  50. Which of the following statements is true about connecting to the Internet? The Internet can be used to connect computers from different ISPs B
  51. Insufficient _____ can cause a processor to operate at less than 50% or more of its performance potential. D, memory
  52. The _______ in email affected nearly every computer around the world and caused up to $1 billion in damages in North America. B. virus
  53. One of the basic rules of computer security is to replace your ________ regularly. D. Password
  54. One of the greatest features of the family _________ is the ability to share a single Internet connection on two or more computers at the same time. C. Internet
  55. The usual address for a Web site is the page address, but you can also enter _________. C. Host

4. Fill in the blanks

【完型填空】
Software design is a 1 process requires a certain 2 of flair on the part of the designer. Design cannot be learned from a book. It must be practiced and learnt by experience and study of existing systems A well 3 software system is straightforward to implement and maintain, easily 4 and reliable Badly (3) software system. although they may work, are 5 to be expensive to maintain, difficult to test and unreliable.
(1)A 、createB 、createdC 、creatingD 、creative
(2)A 、amountB 、amountedC 、mountD 、mounted
(3)A 、designB 、designedC 、designingD 、designs
(4)A 、understandB 、 understandsC 、understandingD 、understood
(5)A 、likeB 、likelyC 、unlikeD 、unlikely

Software design is a process that requires a certain amount of talent from the designer. Design cannot be learned from books. It must be practiced and learned through experience and study of existing systems. A good software system is one that is easy to implement and maintain, easy and reliable. While they work, they are expensive to maintain, difficult to test, and unreliable.
Correct Answers: (1) D(2) A(3) B(4) D(5) B

【Cloze】
An instruction is made up of operations that 1 the function to be performed and operands that represent the data to be operated on. For example, if an instruction is to perform the operation of 2 two numbers, it must know 3 the two numbers are. The processor's job is to 4 instructions and operands from memory and to perform each operation. Having done that, it signals memory to send it 5 instruction. (1)A 、skipB 、smileC 、smokeD 、specify (
2
) A, addB, addedC, addingD, addition
(3)A, whenB, whereC, whichD, who
(4)A, getB, makeC, pushD, put
(5)A, antB, lastC, nextD, second is
an instruction to be executed It consists of the operation of the function and operands representing the data to be operated on. For example, if an instruction is to perform an operation on two numbers, it must know that those two numbers are 3. The processor's job is to fetch instructions and operands from memory and execute each operation. When it's done, it sends 5 instructions to memory.
Correct Answers: (1) D(2) C(3) B(4) A(5) C

Software quality assurance is now an 1 sub-discipline of software engineering. As Buckly and Oston point out, 2 software quality assurance is likely to lead to an ultimate 3 of software costs. However, the major hurdle in the path of software management in this area is the lack of 4 software standards. The development of accepted and generally applicable standards should be one of the principal goals of 5 in software engineering.
(1)A 、emerging B 、emergentC 、engaging D 、evolve
(2)A 、effectiveB 、effortlessC 、lightD 、week
(3)A 、balanceB 、growth C 、productionD 、reduction
(4)A 、usableB 、usageC 、useless D 、useness
(5)A 、 managementB 、 planning C 、productionD 、 research

Software quality assurance is now a subdiscipline of software engineering. As Buckly and Oston point out, software quality assurance is likely to lead to an eventual increase in software costs. However, the main obstacle on the road to software management in this field is the lack of 4 software standards. The development of recognized and universally applicable standards should be one of the main goals in software engineering5.
Correct Answers: (1) A(2) A(3) B(4) A(5) D

Because Web servers are platform and application 1 , they can send or request data from legacy or external applications including databases. All replies, once converted into 2 mark-up languages, can then be transmitted to a 3 . Used in this wav Intranets can 4 lower desktop support costs, easy links with legacy applications and databases and, 5 all, ease of use.
(1)A 、coupled B 、dependent C 、independentD 、related
(2)A 、 ciphertext B 、hypertextC 、plaintext D 、supertext
(3)A 、browser B 、repeaterC 、routerD 、server
(4)A 、offB 、offerC 、office D 、officer
(5)A 、abort B 、aboutC 、aboveD 、around

Because web servers are both platforms and applications, they can send or request data from legacy or external applications, including databases. All responses, once converted into 2 markup languages, can be delivered to 3. Using an intranet in this situation reduces desktop support costs, provides easy linking with legacy applications and databases, and, most importantly, ease of use.
Correct Answers: (1) C(2) B(3) A(4) B(5) C

5. Choose words to fill in the blanks

Unit1

speed device other considered exists

hardware effective operate moving designer

A buffer is a data area shared by (1) devices or program processes that (2) at different speeds or with different sets of priorities. The buffer allows each (3) or process to operate without being held up by the (4) .In order for a buffer to be (5) ,the size of the buffer and the algorithms for (6) data into and out of the buffer need to be (7) by the buffer (8) . Like a cache, a buffer is a “midpoint holding place” but (9) not so much to accelerate the (10) of an activity as to support the coordination of separate activities.

A buffer is an area of ​​data shared by hardware devices or program processes that operate at different speeds or with different priority sets. A buffer allows each device or process to run without being blocked by another device or process. For a buffer to be efficient, the buffer designer needs to consider the size of the buffer and the algorithm for moving data into and out of the buffer. Like a cache, a buffer is a "midpoint holding point", but not so much to speed up activities as to support the coordination of separate activities.
correct answer:

The first space:
hardware

Second empty:
operate

The third space:
device

Fourth space:
other

Fifth space:
effective

The sixth space:
moving

Seventh space:
considered

The eighth space:
designer

Ninth space:
exists

Tenth space:
speed

Unit2

Customers directory related emphasis accessible
Method fields implies mainframe information

In data processing, using an office metaphor, a file is a ____collection of records. Forexample, you might put the records you have on each of your____in a file. In turn, each record would consist of ____for individual data items, such as customer name, customer number,customer address, and so forth. By providing the same ____in the same fields in cach record (sothat all records are consistent), your file will be easily ____for analysis and manipulation by a computer program. This use of the term has become somewhat less important with the advent of the database and its____on the table as a way of collecting record and field data. In ____systems, the term data set is generally synonymous with file but a specific form of organization recognized by a particular access-Depending on the operating system, files(and dats eete) are eantained within a patalon____tor Folder

In data processing, to use an office metaphor, a file is a related collection of records. For example, you could put each customer's record in one file. In turn, each record will consist of fields for a single data item, such as customer name, customer number, customer address, and so on. By providing the same information in the same fields in the cach records (so all records are consistent), your files will be easily accessible by computer programs for analysis and manipulation. With the advent of the database, and its emphasis on tables as a way of collecting data for records and fields, the use of the term became less important. In mainframe systems, the term "dataset" is often synonymous with file, but connotes a specific form of organization identified by a specific method of access. Depending on the operating system, files (and datasets) are kept in the patalon directory or Folder.
correct answer:

The first blank:
related
The second blank:
customers
The third blank:
fields
The fourth blank:
information
The fifth blank:
accessible
The sixth blank:
emphasis
The seventh blank:
mainframe
The eighth blank:
implies
The ninth blank:
method
The tenth blank:
directory

Unit3

Graphical through applications defined interact
boot command use loaded requests

An operating system (sometimes abbreviated as “OS") is the program that, after being initially
____into the computer by a ____program, manages all the other programs in a computer. The other programs are called____or application programs. The application programs make ____of the operating system by making ____for services through a ____application program interface (API). In addition, users can____directly with the operating system ____a user interface such as a____language or a ____user interface (GUI).

An operating system (sometimes abbreviated "OS") is the program that manages all other programs in a computer after it is initially loaded into the computer by the bootloader. Other programs are called applications or applications. Applications utilize the operating system by making service requests through defined application programming interfaces (APIs). In addition, users can directly interact with the operating system through a user interface such as a command language or a graphical user interface (GUI).
correct answer:

The first blank:
loaded
The second blank:
boot
The third blank:
applications
The fourth blank:
use
The fifth blank:
requests
The sixth blank:
defined
The seventh blank:
interact
The eighth blank:
through
The ninth blank:
command
The tenth blank:
graphical

Unit4

Records leaves beyond two power
depth random database nodes end

A binary tree is a method of placing and locating files (called records or keys) in a ,especially when all the data is known to be in ____ access memory (RAM). The algorithm finds data by repeatedly dividing the number of ultimately accessible ____ in half until only one remains.
In a tree, records are stored in locations called
. This name derives from the fact that records always exist at ____ points; there is nothing ____ them. Branch points are called ____.The order of a tree is the number of branches (called children) per node. In a binary tree, there are always ____ children per node ,so the order is 2. The number of leaves in a binary tree
is always a ____ of 2. The number of access operations required to reach the desired record is called the ____ of the tree.

A binary tree is a way of placing and locating files (called records or keys) in a database, especially when all the data is known to be in random access memory (RAM). The algorithm finds data by iteratively dividing the final number of accessible records in half until only one record remains. In a tree, records are stored in locations called leaves. This name derives from the fact that records always exist on endpoints; there is nothing beyond them. Branch points are called nodes. The order of the tree is the number of branches (called child nodes) for each node. In a binary tree, each node always has two children, so the order is 2. The number of leaves in a binary tree is always a power of 2. The number of access operations required to reach the desired record is called the depth of the tree.
correct answer:

The first empty:
database

Second empty:
random

The third space:
records

The fourth space:
leaves

Fifth space:
end

The sixth space:
beyond

Seventh space:
nodes

Eighth space:
two

Ninth space:
power

Tenth space:
depth

Unit6

reorganized collection types distributed network
accessed updated classes relational organizational

A database is a ____ of information that is organized so that it can easily be ____ managed, and ____. In one view, databases can be classified according to ____ of content :bibliographic ,full-text, numeric ,and images.
In computing, databases are sometimes classified according to their ____
approach. The most prevalent approach is the ____ database, a tabular database in which data is defined so that can be ____ and accessed in a number of different ways. A ____ database is one that can dispersed or replicated among different points in a ____ .An object-oriented programming database is one that is congruent with the data defined in object ____ and subclasses.

A database is a collection of information organized so that it can be easily accessed, managed, and updated. In one view, databases can be categorized by content type: bibliographic, full-text, digital, and image. In computing, databases are sometimes classified according to their method of organization. The most popular approach is the relational database, which is a tabular database in which data is defined so that it can be reorganized and accessed in many different ways. A distributed database is a database that can be dispersed or replicated among different points in the network. An object-oriented programming database is a database that is consistent with data defined in object classes and subclasses.

correct answer:

First empty:
collection

Second empty:
accessed

The third space:
updated

Fourth space:
types

Fifth space:
organizational

The sixth space:
relational

Seventh space:
reorganized

The eighth space:
distributed

Ninth space:
network

The tenth space:
classes

Unit8

expressed transfer bandwidth bottleneck bytes modem point sustain slower communications

In computer networks, ____ is often used as a synonym for data ____ rate-the amount of data that can be carried from one____ to another in a given time period (usually a second). This kind of bandwidth is usually____ in bits (of data) per second (bps) .Occasionally, It’s expressed as ____per second (bit/s). A modem that works at 57 600 bit/s has twice bandwidth of a ____ that works at 28 800 bit/s. In general, a link with a high bandwidth is that may be able to carry enough information to ____ the succession of images in a video presentation.
It should be remembered that a real ____ path usually consists of a succession of links each with its own bandwidth. If one of these is much
____ than the rest it is said to be a bandwidth ____.

In computer networking, bandwidth is often used as a synonym for data transfer rate - the amount of data that can be transferred from one point to another in a given period of time (usually a second). This bandwidth is usually expressed in bits per second (data) (bps). Sometimes it is expressed as bytes per second (bits/s). A modem operating at 57 600 bps has twice the bandwidth of a modem operating at 28 800 bps. Often, links with high bandwidth may be able to carry enough information to maintain continuity of images in a video presentation. It should be remembered that a real communication path usually consists of a series of links, each with its own bandwidth. If one of them is much slower than the others, it is called a bandwidth bottleneck.
correct answer:

First space:
bandwidth

Second empty:
transfer

The third space:
point

The fourth space:
expressed

Fifth space:
bytes

Sixth space:

modem

The seventh space:
sustain

The eighth space:
communications

Ninth space:
slower

Tenth space:
bottleneck

Unit 10

receive page forth back Hypertext
standard request confirmation fills processed

The common gateway interface (CGI) is a ____ way for a Web server to pass a Web user’s ____ to an application program and to ____ data back to forward to the user. When the user requests a Web ____ (for example, by clicking on a highlighted word or entering a Web site address),the server sends____ the requested page. However, when a user out a form on a Web page and sends it in, it usually needs to be____by an application program The Web server typically passes the form information to a small application program that processes the data and may send back a____message. This method or convention for passing data back and between the server and the application is called the common gateway interface(CGI).It is part of the Web’s ____Transfer Protocol(HTTP).

Common Gateway Interface (CGI) is the standard method for Web servers to pass Web users' requests to applications and receive data back for forwarding to users. When a user requests a web page (for example, by clicking a highlighted word or entering a website address), the server sends back the requested page. However, when a user fills out a form on a web page and sends it, it usually needs to be processed by an application. The web server usually passes the form information to a small application that handles the data and possibly sends back an acknowledgment. This method or convention of passing data back and forth between the server and the application is called the Common Gateway Interface (CGI). It is part of the Web's Hypertext Transfer Protocol (HTTP).

correct answer:

First empty:
standard

Second empty:
request

The third space:
receive

The fourth space:
page

Fifth space:
back

The sixth space:
fills

The seventh space:
processed

The eighth space:
confirmation

Ninth void:
forth

Tenth Empty:
Hypertext

Unit11

confused challenge cracker security media
breaches proficient technical licenses weaknesses

The term hacker is used in popular ____ to describe someone who attempts to break into computer systems. Typically, this kind of hacker would be a ____ programmer or engineer with sufficient ____ knowledge to understand the weak points in a ____ system.
A ____ is someone who breaks into someone else’s computer system, often on a network; bypasses passwords or ____ in computer programs; or in other ways intentionally ____ computer security. A cracker can be doing this for profit, maliciously, for some altruistic purpose or cause, or because the ____ is there. Some breaking-and-entering has been done ostensibly to point out ____ in a site’s security system.
The term “cracker" is not to be ____ with “hacker”. Hackers generally deplore cracking. However, as Eric Raymond, compiler of The New Hacker’s Dictionary notes, some journalists ascribe break-ins to “hackers”.

The term hacker is used in popular media to describe someone who tries to break into a computer system. Typically, such hackers will be skilled programmers or engineers with sufficient technical knowledge to understand weaknesses in security systems. A cracker is someone who breaks into another person's computer system, usually on a network; bypasses a password or license in a computer program; or otherwise deliberately breaches computer security. Crackers may do this for profit, in bad faith, for some altruistic purpose or reason, or because a challenge exists. Some of the break-ins were ostensibly aimed at pointing out weaknesses in the site's security systems. The term "cracker" should not be confused with "hacker". Hackers usually regret cracking. However, as Eric Raymond, editor of The New Hacker's Dictionary, points out, some journalists blame "hackers" for the break-in.
correct answer:

First space:
media

Second empty:
proficient

The third space:
technical

The fourth space:
security

Fifth space:
cracker

The sixth space:
licenses

Seventh space:
breaches

The eighth space:
challenge

Ninth space:
weaknesses

Tenth space:
confused

Unit13

analyzing knowledge objects features clarify
automate imagine element complexity algorithms

Deep learning is a type of machine learning (ML) and artificial intelligence (AI) that imitates the way humans gain certain types of knowledge. Deep learning is an important ____ of data science, which includes statistics and predictive modeling. It is extremely beneficial to data scientists who are asked with collecting, ____ and interpreting large amounts of data. Deep learning makes this process faster and easier.
At its simplest, deep learning can be thought of as a way to ____ predictive analytics. While traditional machine learning ____ are linear, deep learning algorithms are stacked in a hierarchy of increasing ____ and abstraction.
To understand deep learning, ____ a toddler whose first word is dog. The toddler learns what a dog is and is not by pointing to ____ and saying the word dog. The parent says, “Yes, that is a dog,” or, “No, that is not a dog. "As the toddler continues to point to objects, he becomes more aware of the ____ that all dogs possess. What the toddler does, without knowing it, is to ____ a complex abstraction— the concept of dog —by building a hierarchy in which each level of abstraction is created with ____ that was gained from the preceding layer of the hierarchy.

Deep learning is a type of machine learning (ML) and artificial intelligence (AI) that mimics the way humans acquire certain types of knowledge. Deep learning is an important part of data science, including statistical and predictive modeling. It is very beneficial for data scientists who are required to collect, analyze and interpret large amounts of data. Deep learning makes this process faster and easier. In simple terms, deep learning can be thought of as a method for automating predictive analytics. While traditional machine learning algorithms are linear, deep learning algorithms are stacked in an increasingly complex and abstract hierarchy. To understand deep learning, imagine a toddler whose first word is dog. Toddlers learn what a dog is and isn't by pointing at objects and saying the word dog. Parents say, "Yes, that's a dog," or, "No, that's not a dog." As the toddler continues to point at objects, he becomes more aware of the function of all objects...

correct answer:

First empty:
element

Second empty:
analyzing

The third space:
automate

Fourth void:
algorithms

Fifth space:
complexity

The sixth space:
imagine

Seventh space:
objects

The eighth space:
features

Ninth Empty:
clarify

The tenth space:
knowledge

Unit15

update media reduced meaningful challenge
multiple data recent messages explosion
Volume

We currently see the exponential growth in the data storage as the data is now more than text da We can find data in the format of videos , musics and large images on our social (1) channels.is very common to have Terabytes and Petabytes of the storage system for enterprises. As the database grows the applications and architecture built to support the (2) needs to be reevaluated quite often. Sometimes the same data is reevaluated with multiple angles and even though the original data the same the new found intelligence creates (3) of the data. The big volume indeed represents Big Data.
Velocity
The data growth and social media explosion have changed how we look at the data. There was time when we used to believe that data of yesterday is (4) . The matter of the fact newspapers is till following that logic. However, news channels and radios have changed how fast we receive the news. Today, people reply on social media to (5) them with the latest happening. On social media sometimes a few seconds old messages (a tweet, status updates etc.) are not something interests users. They often discard old ____(6) and pay attention to recent updates. The data movement is now almost real time and the update window has (7) to fractions of the seconds. This high velocity data represent Big Data.
Variety
Data can be stored in (8) format. For example database, excel, csv, access or for the matter of the fact, it can be stored in a simple text file. Sometimes the data is not even in the traditional format is we assume, it may be in the form of video, SMS, pdf or something we might have not thought about. It is the need of the organization to arrange it and make it (9) . It will be easy to do so if we have data in the same format, however it is not the case most of the time. The real world have data in many different formats and that is the (10) we need to overcome with the Big Data. This variety of the data represent Big Data.

We are currently seeing an exponential growth in data storage as data is now more than just text da we can find it on social media in video, music and large image channels.is very common for businesses to have terabytes and petabytes of storage systems. As databases grow, applications and architectures built to support the data need to be frequently re-evaluated. Sometimes the same data is re-evaluated from multiple perspectives, creating an explosion of data with newfound intelligence even though the original data is the same. Big volume really stands for Big Data. Velocity data growth and social media explosion have changed the way we look at data. There was a time when we used to believe that yesterday's data was the most recent. In fact, the newspaper's question until followed this logic. However, news channels and radio have changed the speed at which we receive news. Today, people are replying on social media, updating them on what's going on. About social me...

correct answer:

First space:
media

Second empty:
data

The third space:
explosion

The fourth space:
recent

Fifth space:
update

Sixth space:

messages

The seventh space:
reduced

The eighth space:
multiple

Ninth space:
meaningful

Tenth space:
challenge

7. Translation of sentences and passages

27.[Intertranslation of short texts in Chinese and English]He went to town with the purpose of buying a new computer.
Correct answer: The purpose of his going to town is to buy a new computer.
28.[Intertranslation of Chinese and English passages]Most online services have their own browsers.Correct
answer: Most online services have their own browsers29
.[Mutual translation of Chinese and English passages]Floppy disk may be double-density or high-density .Correct
Answer: Floppy disks can be double density or high density.
30.[Intertranslation of short texts in Chinese and English]The formula then includes the addresses of the cells.
The correct answer: The formula includes the addresses of the cells.
31.[Inter-translation of short texts in Chinese and English] C might best be described as a “medium level language”.
Correct answer: C language may best be called a “medium level language”.
132.[Chinese-English short text mutual translation]Every browser has the built-in ability to understand
HTML.Correct answer: Every browser has a built-in function to understand HTML
33.[Chinese English short text mutual translation]C is one of the most popular computer languages ​​in the world.
Correct answer: C language is one of the most popular computer languages ​​in the world.
34.[Inter-translation of short texts in Chinese and English]Java technology is both a programming language and a platform.
Correct answer: Java technology is both a programming language and a platform.
35.[Intertranslation of short texts in Chinese and English]In fact, a window manager can be thought of as a GUI for a CLI OS.
Correct answer: In fact, a window manager can be thought of as a GUI for a CLI OS .
36.[Intertranslation of short texts in Chinese and English]A database management system handles user requests for database action.
Correct answer: The database management system handles user requests for database action.

Unit 2
32. [Mutual translation of short texts in Chinese and English] Machine language consists of the raw numbers that can be directly understood
by a particular processor.
Correct answer: Machine language consists of raw numbers that can be understood by a special processor.
33.[Intertranslation of short texts in Chinese and English]The actual effect of any particular virus depends on how it was programmed by
the person who wrote the virus.
Correct answer: The actual effect of any particular virus depends on how it was programmed by the person who wrote the virus. programmed.
34.[Inter-translation of short texts in Chinese and English]An anti-virus program that hasn't been updated for several months will not
provide much protection against current viruses.
Correct answer: Anti-virus software that hasn't been updated for several months will not provide much protection against current viruses. What protection is offered.
35.[Intertranslation of short texts in Chinese and English]Memory is typically measured in kilobytes or megabytes, and disk space is
typically measured in megabytes or gigabytes.
Correct answer: Generally speaking, memory is typically measured in kilobytes or megabytes, and disk space is typically measured in megabytes or gigabytes. Measured in megabytes or gigabytes.
36.[Intertranslation of short texts in Chinese and English]The hypertext transfer protocol is the native protocol of browsers and is most typically used to transfer HTML formatted filesCorrect
answer: The hypertext transfer protocol is the browser's own protocol, generally used to transfer HTML formatted files document.
337.[Intertranslation of short texts in Chinese and English]LAN is the extent of network which connects computers that are physically close together, typically within a single room or building. Correct answer: LAN is a network that connects computers that are physically close together, typically within a single room or building
. A network of connected computers within a building.
38.[Intertranslation of short texts in Chinese and English]For mobile users, firewalls allow remote access into the private network by the
use of secure logon procedures and authentication certificates.
Correct answer: For mobile users, firewalls allow remote access into the private network by the use of secure logon procedures and authentication certificates. certificates for remote access to private networks.
39.[Inter-translation of short texts in Chinese and English]From the Internet users' point of view, to download a file is to request it from another computer (or from a Web page on another computer) and to receive it
Correct answer: From an Internet user's point of view, downloading a file is requesting it from another computer (or from a web page on another computer) and receiving it.
40.[Inter-translation of short texts in Chinese and English]After the Soviet launch of the Sputnik satellite in 1957, the US military set up the Advanced Research Projects Agency to fund research in things sometimes only vaguely related to military matters. Correct answer: In 1957 the US
military After the launch of Sputnik, the U.S. military began to establish the Advanced Research Projects Agency (ARPA) to fund research sometimes vaguely related to the military.
41. [Intertranslation of short texts in Chinese and English]Often a chip set will fit on one chip.
Correct answer: Usually a chipset is integrated on a chip.

Unit 3
22 [Intertranslation of short texts in Chinese and English] It loads the operating system into memory and allows it to begin operation.
My answer: It loads the operating system into memory and starts the operating system.
23【Intertranslation of short texts in Chinese and English】On the computer, there are two basic types of items that need to be
organized.
My answer: On the computer, there are two basic types of items that need to be organized.
24【Intertranslation of short texts in Chinese and English】Fonts are used by computer for on-screen display and printers for hard
copy output.
My answer: Fonts are used by computer for on-screen display and printers for hard copy output.
25【Intertranslation of short texts in Chinese and English】Optical fiber is thin filaments of glass through which light beams are
transmitted.
My answer: Optical fiber is a thin glass filament that can transmit light beams.
26【Intertranslation of short texts in Chinese and English】When you type things on the keyboard, the letters and numbers show up
on the monitor.
My answer: When you type on the keyboard, these characters and numbers appear on the monitor.
56
27【Intertranslation of short texts in Chinese and English】An intranet is a private network. There are many intranets scattered all over
the world.
My answer: An intranet is a private network. Many Intranets are scattered around the world.
28【Intertranslation of short texts in Chinese and English】On the computer screen, a folder most often looks like a yellow or blue
paper file folder.
My answer: On the computer screen, a folder most often looks like a yellow or blue paper file folder .
29【Intertranslation of short texts in Chinese and English】Once you've encoded your source content, the process of creating streaming
media is complete
My answer: Once you've encoded your source content, the process of creating streaming media is complete. 30【Intertranslation of short texts in Chinese and English】 Syntactically
, a domain name consists of a sequence of names(labels)
separated by periods (dots)
logo).
31【Mutual translation of short texts in Chinese and English】The quality of video you see on your monitor depends on both the video
card and the monitor you choose.
My answer: The video quality you see on your monitor depends on the video card and monitor you choose.

Unit 4
20 [Intertranslation of Chinese and English short texts] Star topologies are normally implemented using twisted pair cable,
specifically unshielded twisted pair (UTP).
My answer: Star topology is usually implemented by twisted pair cables, especially unshielded twisted pair cables.
21【Intertranslation of short texts in Chinese and English】A video card is the part of your computer that transforms video data into
the visual display you seen your monitor.
My answer: The video card is a part of your computer. Visual information that can be seen on the
22【Intertranslation of short texts in Chinese and English】A multi-user operating system allows many different users to take advantage
of the computer's resources simultaneously.
My answer: A multi-user operating system allows different users to take advantage of computer resources at the same time.
23【Intertranslation of short texts in Chinese and English】Address is the unique location of an information site on the Internet, a
specific file (for example, a Web page), or an E-mail user.
My answer: Address is an information site on the Internet , a specific file (such as a web page), or the unique location of an e-mail user.
24【Intertranslation of short texts in Chinese and English】Over the years, ARPA has funded many projects in computer science
research, many of which had a profound effect on the state of the art.
My answer: Over the years, ARPA has funded many projects in computer science research, many of which had a profound effect on the state of the art. Numerous projects have been funded, many of which have had a profound impact on modern craftsmanship. 25【Mutual translation of short texts in Chinese and English】In truth of course by making the creation of more complex software practical, computer languages ​​have merely created new types of software bugs. My answer: Of course in fact,
with the emergence of more complex software applications, Computer languages ​​simply created new types of software failures.
26【Mutual translation of short texts in Chinese and English】A computer virus is a program designed to spread itself by first infecting
executable files or the stem areas of hard and floppy disks and then making copies of itself.
My answer: A computer virus is a program designed to spread itself by first infecting executable files or the stem areas of hard and floppy disks and then making copies of itself. After first infecting executable files or system areas of hard and floppy disks, it starts spreading itself and making copies of itself.
27【Intertranslation of short texts in Chinese and English】When the entire RAM is being used (for example if there are many programs open at the same time)e computer will swap data to the hard drive and back to give the impression that there is slightly memory.
My answer: When all RAM is used (eg many programs open at the same time), the computer swaps data to the hard disk, giving the user the impression that there is still some RAM left.
28 [Mutual translation of short texts in Chinese and English] The compiler ignores all comments.
My answer: The compiler ignores all comments.
29【Intertranslation of short texts in Chinese and English】You can E-mail your document without ever leaving word.
My answer: You can send your document by email without leaving Word.

Unit 6
22【Intertranslation of short texts in Chinese and English】A laptop is a microcomputer small enough to use on one's lap
.
23【Intertranslation of short texts in Chinese and English】Formulas are entered in the worksheet cell and mast begin with an equal
sign "=".
My answer: Formulas are entered in the cells of the spreadsheet and must begin with an equal sign "=".
24【Intertranslation of short texts in Chinese and English】principal types of printers include dot-matrix, daisy wheel, inkjet, and laser.
My answer: The main types of printers are: dot matrix, chrysanthemum wheel, inkjet and laser Equation
25 [Intertranslation of short texts in Chinese and English] ARPANET made possible collaborations between people who were
thousands of miles apart.
My answer: ARPANET made possible collaborations between people who were thousands of miles apart.
26【Intertranslation of short texts in Chinese and English】The hypertext markup language is the language most frequently used to
express Web pages.
My answer: Arpanet can enable people who are thousands of miles apart to cooperate.
27【Intertranslation of short texts in Chinese and English】The elements of a record represent different types of information and are
accessed by name.
My answer: The elements of a record represent different types of information and can be accessed by name.
28【Intertranslation of short texts in Chinese and English】In computing and computer applications, matrices are used to arrange set
of data in table form.
My answer: In numerical computing and computer applications, matrices are used to organize data in table form.
29【Intertranslation of short texts in Chinese and English】On the Internet, a node or stopping point can be cither a gateway node or
a host (end-point) node.
My answer: In the Internet, a node or a stopping point can be Gateway node or master (endpoint) node.
30【A counterrotating ring is a ring topology that consists of wo rings
transmitting in opposite directions.
My answer: A counterrotating ring is a ring topology composed of two rings in opposite directions.
41【Intertranslation of short texts in Chinese and English】In the simplest networks, a switch is not required for messages that are
sent and received within the network.
My answer: In the simplest network, there is no need to use a switch to send and receive messages within the network.

Unit 8
21 [Intertranslation of short texts in Chinese and English] A brouter is a network bridge combined with a router.
My answer: A bridge router is a network bridge combined with a router.
22【Intertranslation of short texts in Chinese and English】Nothing epitomizes modern life better than the computer.
My answer: Nothing epitomizes modern life better than the computer.
23【Intertranslation of short texts in Chinese and English】The BIOS determines whether the video card is operational.
My answer: BIOS determines whether the video card is operational.
24【Intertranslation of short texts in Chinese and English】What are the advantages and disadvantages of a ring topology?
My answer: BIOS determines whether the graphics card can be used.
25【Intertranslation of short texts in Chinese and English】A network typically means a group of computers working together.
My answer: The network generally refers to a group of computers working together.
26【Intertranslation of short texts in Chinese and English】Ideally, you should back up your entire system on a regular basis.
My answer: A network generally refers to a group of computers working together.
27【Mutual translation of short texts in Chinese and English】A bus topology connects each computer (node) to a single segment trunk.
My answer: A bus topology connects each computer (node) to a single-segment trunk.
28【Mutual translation of short texts in Chinese and English】In general, higher-level languages ​​can be either interpreted or compiled.
My answer: Usually high-level languages ​​can be interpreted or compiled.
29【Intertranslation of short texts in Chinese and English】A firewall is a set of related programs located at a network gateway server.
My answer: A firewall is a set of related programs on the network gateway server.
30【Intertranslation of short texts in Chinese and English】After the formula is typed into the cell, the calculation executes immediately.
My answer: Firewall is a group of related programs on the network gateway server.

Unit
12 [Intertranslation of short texts in Chinese and English] Bus is an electrical connection between the components of a computer
system along which the signals or power is transmitted.
My answer: The bus is the circuit between the computer system components, along which you can Transmit signals and power.
13【Intertranslation of short texts in Chinese and English】Faster than many types of parallel port, a single USB port is capable of
chaining many devices without the need of a terminator.
My answer: Because a single USB interface is faster than many parallel ports, it can Connect many devices without terminating the device.
14【Mutual translation of short texts in Chinese and English】A hypertext document is like a text document with the ability to contain
pointers to other regions of(possibly other) hypertext documents.
My answer: A hypertext document is like a text document, but it contains There are pointers to other areas of the hypertext document (and possibly other hypertext documents).
15【Intertranslation of short texts in Chinese and English】Some drives have random access (like disk drives, zip drives. CD-ROMs, and
DVD-ROMs), while others only have sequential access (like tape drives).
My answer: Some drives (such as disk drives, zip drives, CD-ROMs, and DVD-ROMs) have random access, while others (such as tape drive) can only be accessed sequentially.
16【Intertranslation of short texts in Chinese and English】Hypertext Transfer Protocol is a standard used by World Wide Web servers
to provide rules for moving text ,images, sound. video, and other multimedia files across the Internet
.
My answer: Hypertext Transfer Protocol is A standard used by World Wide Web servers that provides rules for transmitting text, images, sound, video, and other multimedia files over the Internet.
17【Mutual translation of short texts in Chinese and English】A modem modulates outgoing digital signals from a computer or other
digital device to analog signals over a conventional telephone line and demodulates the incoming
analog signal and converts in to a digital signal for the digital device (computer) .
My answer: A modem modulates a digital output signal from a computer or an analog signal from another device over a telephone line, and demodulates the incoming analog signal into a digital signal used by a digital device such as a computer.
18【Intertranslation of short texts in Chinese and English】New viruses come out every single day.
My answer: New computer viruses will come every few days.
19【Mutual translation of short texts in Chinese and English】Try to keep your file names to 20-30 characters.
My answer: Try to keep your file names at 20-30 characters.
20【Mutual translation of short texts in Chinese and English】Each hub is wired in the typical star configuration.
My answer: try to keep the file name within 20~30 characters.
21【Intertranslation of short texts in Chinese and English】To run these objects, just enter the name of the file.
My answer: try to keep the file name at 20~30 characters.

Unit 11
12 [Mutual translation of Chinese and English short texts] Tape must be read or written sequentially, not randomly.
My answer: Tape must be read or written sequentially, not randomly.
13【Intertranslation of short texts in Chinese and English】The data we have collected is not enough to be convincing.
My answer: The data we have collected is not enough to be convincing.
14【Intertranslation of short texts in Chinese and English】A gateway is often associated with both a router and a switch.
My answer: Gateways are often associated with routers and switches.
15【Intertranslation of short texts in Chinese and English】All computer data can ultimately be reduced to a series of bits.
My answer: All computer data can ultimately be reduced to a series of bits.
16【Intertranslation of short texts in Chinese and English】The computer chip is primarily responsible for executing instructions.
My answer: The computer chip is mainly responsible for executing instructions.
17【Intertranslation of short texts in Chinese and English】None of the projects had such a profound effect as the ARPANET project.
My answer: No other project had such a profound effect as the ARPANET project.
18【Mutual translation of short texts in Chinese and English】Mixed referencing can also be used where only the row or column is fixed.
My answer: When only the row or column is fixed, mixed referencing can be used.
19【Intertranslation of short texts in Chinese and English】Dialogue Box is a box which appears on screen, inviting input from the user.
My answer: Dialogue Box is a box that appears on the screen, allowing the user to input.
20【Inter-translation of short texts in Chinese and English】LISP is a programming language well suited to, and well used by AI
researchers.
My answer: LISP is a programming language suitable for artificial intelligence, and it is also a programming language well used by artificial intelligence researchers .
21【Intertranslation of short texts in Chinese and English】Some people classify languages ​​into two categories, higher-level and lowerlevel.
My answer: Some people classify languages ​​into two categories: high-level language and low-level language.

Thirteen unit
17 [Chinese and English short text mutual translation] Specific applications of AI include expert systems, natural language
processing, speech recognition and machine vision.
My answer: The specific applications of artificial intelligence include expert systems, natural language processing, speech recognition and machine vision vision.
1618【Mutual translation of short texts in Chinese and English】Artificial super intelligence (ASI) is a software-based system with intellectual powers beyond those of humans across an almost comprehensive range of categories and fields of endeavor. My answer: Specific applications of artificial intelligence include
experts systems, natural language processing, speech recognition, and machine vision.
19【Intertranslation of short texts in Chinese and English】Machine learning algorithms use historical data as input to predict new
output values.
My answer: Machine learning algorithms use historical data as input to predict new output values.
20【Mutual translation of short texts in Chinese and English】There are four basic approaches: supervised learning, unsupervised learning, semi-supervised learning and reinforcement learning.
My answer: There are four basic approaches: supervised learning, unsupervised learning, semi-supervised learning, and reinforcement learning.
21【Intertranslation of short texts in Chinese and English】Deep learning techniques enable this automatic learning through the
absorption of huge amounts of unstructured data such as text, images, or video.
My answer: Deep learning techniques enable this automatic learning through the absorption of huge amounts of unstructured data such as text, images, or video. , images or videos) to achieve this automatic learning.
22【Mutual translation of short texts in Chinese and English】The goals of artificial intelligence include learning, reasoning, and
perception.
My answer: The goals of artificial intelligence include learning, reasoning, and perception.
23【Intertranslation of short texts in Chinese and English】When most people hear the term artificial intelligence, the first thing they
usually think of is robots.
My answer: When most people hear the term artificial intelligence, the first thing they usually think of is robots .
24【Mutual translation of short texts in Chinese and English】The applications of artificial intelligence are endless.
My answer: The applications of artificial intelligence are endless.
25【Mutual translation of short texts in Chinese and English】Other examples of machines with artificial intelligence include computers
that play chess and self-driving cars.
My answer: Other examples of machines with artificial intelligence include chess-playing computers and self-driving cars.
26【Intertranslation of short texts in Chinese and English】AI is continuously evolving to benefit many different industries.
My answer: AI is continuously evolving to benefit many different industries.

Unit 15
[Inter-translation of short texts in Chinese and English] I hope that this talk has given you some insights into the kind of the work
that we've been doing.
My answer: I hope this talk has given you some insights into the kind of the work that we've been doing. Work with some deeper understanding.
3【Intertranslation of short texts in Chinese and English】The new systems have been optimized for running Microsoft Windows.
My answer: These new systems have been optimized for running Microsoft Windows.
4【Intertranslation of short texts in Chinese and English】These designs demonstrate her unerring eye for color and detail.
My answer: These new systems have been optimized to run Microsoft Windows.
5【Intertranslation of short texts in Chinese and English】Let me make this clear: A bar chart is not analytics.
My answer: We must understand: A bar chart is not data analysis.
186【Mutual translation of short texts in Chinese and English】A good dictionary will give us the connotation of a word as well as its
denotation.
My answer: A good dictionary will not only tell us the literal meaning of a word, but also tell us the connotation of a word as well as its denotation. the implication.
7【Mutual translation of short texts in Chinese and English】The latest lifestyle trend is downshifting.
My answer: The latest lifestyle tends to slow down the pace of life.
8【Mutual translation of short texts in Chinese and English】 The end of an era presupposes the start of another.
My answer: The end of an era means the beginning of another era.
9 [Intertranslation of short texts in Chinese and English] You cannot combine structured and unstructured exception handling in the same function.
My answer: In the same function, you cannot mix structured and unstructured exception handling.
10【Intertranslation of short texts in Chinese and English】Finally, the practical application shows the feasibility and veracity of this
approach.
My answer: Finally, the feasibility and accuracy of the method are proved by examples.
11【Intertranslation of short texts in Chinese and English】The viability of multilayer switches depends on the protocol supported.
My answer: The viability of multilayer switches depends on the supported protocols.
12【Inter-translation of short texts in Chinese and English】
Cloud computing is a general term for anything that involves delivering hosted services over the
Internet. These services are broadly divided into three categories: Infrastructure-as-a-Service
(Haas), Platform-as-a-Service (Pa5) and Software as a. Service (SaaS). The name cloud computing
was inspired by the cloud symbol that’s often used to represent the Internet in flowcharts and
diagrams.
A cloud service has three distinct characteristics that differentiate it from traditional hosting. It is
sold on demand, typically by he minute or the hour it is elastic — a user can have as much or as
little of a service as they want at any given time, and the service is filly managed by the provider
(the consumer needs nothing but. a personal computer and Internet access). Significant
innovations virtualization and distributed computing,as well as improved access to high-peed
Internet and a weak economy, have accelerated inters in loud computing.
My answer: Cloud computing is the general term for hosting services provided over the Internet. These services fall broadly into three categories: Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). The name cloud computing was inspired by the cloud symbol, which is often used to represent the Internet in flowcharts and diagrams.
Different from traditional hosting, cloud services have three distinct features. Cloud computing is sold on demand (usually by the minute or hour); there is a certain degree of elasticity - users can get the services they need at any given time; these services are fully managed by the provider (customers only need a personal computer and connect it to the Internet). Interest in cloud computing is growing due to major innovations in virtualization and distributed computing, as well as high-speed Internet and weak economic factors.

Guess you like

Origin blog.csdn.net/m0_58065010/article/details/130241153