计算机专业英语 -第11章_第1页
计算机专业英语 -第11章_第2页
计算机专业英语 -第11章_第3页
计算机专业英语 -第11章_第4页
计算机专业英语 -第11章_第5页
已阅读5页,还剩59页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、达尔文:“未经事先设计的变化”如果碰巧有利于生物体的生存,其变异就会保留下来。否则,则被自然选择所淘汰,In the computer field, the person who can adapt to changes in computer technology will become and stay a winner,Chapter 11,Your Future and Information Technology,Competencies (Page 1 of 2,Explain why it is important to have an individual strategy t

2、o be a winner in the information age Describe how technology is changing the nature of competition,Page 432,Competencies (Page 2 of 2,Discuss four ways people react to new technology Describe how you can stay current with your career Describe different careers in information technology,Page 432,Intr

3、oduction,This final chapter is not about the far future, its about today and the near future. Its about how organizations adapt to technological change as well as its about you as an individual and what you can do to keep your computer competency up to date,Page 433,computer support specialist (322)

4、A person who provides technical support to customers and other users computer technician (322)A person who repairs and installs computer components and systems computer trainer (322)A person who instructs users on the latest software or hardware,cryptographer (322)A person who designs, tests, and re

5、searches encryption procedure synic (愤世嫉俗者, 讽世者) (314)A person who feels that the idea of using a microcomputer is overrated. data entry worker (数据录入人员) (322)A person who inputs customer information, lists, and other types of data,database administrator (DBA) (322)A person who uses database manageme

6、nt software to determine the most efficient ways to organize and access data desktop publisher (322)A person who creates and formats publication-ready material frustrated (315)A person who feels it is an imposition to have to learn something new or is too impatient to try to understand the manuals,i

7、nformation systems manager (322)A person who oversees the work of programmers, computer specialists, systems analysts, and other computer professionals naive (315)A person who feels that computers are magic boxes capable of solving all kinds of problems that computers really cant handle. network adm

8、inistrator (322)A person who creates and maintains networks,proactive (主动) (315)acting in anticipation of future problems, needs, or changes programmer (322)A person who creates, tests, and troubleshoots computer programs software engineer (322)A person who analyzes users needs and creates applicati

9、on software,systems analyst (322)A person who plans and designs information systems technical writer (322)A person who prepares instruction manuals, technical reports, and other scientific or technical documents Webmaster (322)A person who develops and maintains Web sites and Web resources,Changing

10、Times,Page 434,Automated tellers,Internet banks,Technology and Organizations,New products New enterprises New customer and supplier relationships,Page 435,Technology and People,Cynicism Naivet Frustration Proactivity,Page 436,How You Can Be a Winner,Stay current Maintain computer competency Develop

11、professional contacts Develop specialties Be alert for organizational change Look for innovative opportunities,Page 437,Careers in IT,Computer support specialist Computer technician Computer trainer Cryptographer Database administrator Data entry worker Desktop publisher,Information systems manager

12、Network administrator Programmer Software engineer Systems analyst Technical writer Webmaster,Page 444,A Look to the FutureBe Proactive,Concentrate on goals Use computers to your advantage Gain control over technology Keep an eye on the future and move toward success,Page 445,Discussion Questions (P

13、age 1 of 2,Why is strategy important to individual success in the information age? What is your strategy? Describe how technology changes the nature of competition. How can your computer competencies and knowledge help you get ahead in todays market,Page 452,Discussion Questions (Page 2 of 2,What do

14、es proactive mean? What is a proactive computer user? What advantages does this type of user have over the other types? Discuss several different careers in information technology. Which are of interest to you,Page 452,P311-4,Although end users do not need to be specialists in information technology

15、, they should be aware of career opportunities in the area. 虽然最终用户并不需要成为信息技术专家,他们应该知道在该领域的就业机会,P312-7,How do you become and stay a winner? In brief, the answer is: you must form your own individual strategy for dealing with change. 你如何成为并保持赢家?简单来说,答案是:你必须形成应对变化的个性化战略,P313-4,Just a few years ago, the

16、 only computer connectivity options available to individuals were through online service providers like America Online and through colleges and universities. 就在几年前,可供个人的计算机连接唯一选项是通过互联网服务供应商像美国在线和通过高校,P314-15,Clearly, recent technological changes, and those sure to come in the near future, will produ

17、ce significant changes and opportunities in the years ahead. 显然,最近和不久将来的技术变革在未来几年将产生重大的变化和机会,P315-3,On the other hand, some nave persons are actually quite familiar with computers but underestimate the difficulty of changing computer systems or of generating certain information. 另一方面,一些新手其实熟悉电脑,但低估了

18、计算机系统变化或获取某些情报的困难,P315-7,Such a person feels it is an imposition to have to learn something new or is too impatient to try to understand the manuals explaining what hardware and software are supposed to do. 这样的人认为这是强加要学习新的东西,或者是太心急去试图了解手册解释硬件和软件都应该做什么,P317-11,Besides being members of professional as

19、sociations, successful people make it a point to maintain contact with others in their. 除了专业协会的成员,成功人士通过它与同领域其他人联系,P320-14,Whatever the training required, always look for ways to adapt and improve your skills to become more productive and marketable. 任何所需的培训,不断寻求良策以调整和改善自己的技能以变得更具竟争力和适应力,P321-10,Be

20、especially alert for new trends within the organization future hiring, layoffs, automation, mergers with other companies, and the like 。 要特别留意组织内部未来的雇用,解雇,自动化,与其他公司合并等新趋势,5、Disk caching 6、Internet drive 7、Sector 8、Floppy 10、Cylinder 11、Density,1、Track 2、RAID 3、Access time 4、Pits and lands 9、Zip,1、A

21、2、A 3、C 4、A 5、C 6、A 7、C 8、D 9、D 10、C,1、G 2、A 3、J 4、I 5、D 6、B 7、H 8、C 9、F 10、E,Discuss the traditional and high-capacity floppy disks.The traditional floppy disk is the 1.44 MB 31/2-inch disk. The most common type is labeled 2HD, which means “two-sided, high-density” and have a capacity of 1.44 MB. F

22、loppy disks have a thin exterior jacket made of hard plastic to protect the flexible disk inside.High-capacity disks, also known as floppy-disk cartridges, are rapidly replacing the traditional floppy disk. They are 31/2 inches in diameter, and are able to store more information, are thicker, and re

23、quire special disk drives,What are the three types of hard disks? Describe three ways to improve hard-disk performance.There are three types of hard disks: 1、internal hard disk, 2、hard-disk cartridge, 3、hard-disk pack. Three ways to improve the performance of hard disks are 1、disk caching, 2、redunda

24、nt arrays of inexpensive disks 3、file compression/decompression,What are the two most common optical disc formats? What is hi def? Describe the basic types for each format.The two most common optical disc formats are CD and DVD. The next generation of optical disc is called hi def (high definition),

25、 with a far greater capacity than DVDs. CDs, DVDs, and hi def have three basic types: read only, write once, and rewriteable,Discuss solid-state storage, Internet hard drives, and magnetic tape. What are the advantages and disadvantages of each?Solid-state storage devices have no moving parts. While

26、 this type of storage is more expensive than the others, it is more reliable and requires less power.Internet hard drives are special service sites on the Web that provide users with storage,Discuss mass storage, enterprise storage systems, and mass storage devices.Mass storage refers to the tremend

27、ous amount of secondary storage required by large organizations. Enterprise storage systems are systems that large organizations use to promote efficient and safe use of data across the networks within their organizations. Mass storage devices are specialized high-capacity secondary storage devices

28、designed to meet organizational demands for data,5、Base station 7、Analog 9、topology 10、NIC 11、bps 12、bluetooth 14、bandwidth,1、client 2、Bus network 3、Network gateway 4、modulation 6、packets 8、GPS 13、Node 15、DSL 16、hub,1、C 2、B 3、A 4、D 5、C 6、D 7、B 8、B 9、D 10、D,1、G 2、B 3、A 4、I 5、H 6、E 7、C 8、J 9、D 10、F,De

29、fine and discuss connectivity, the wireless revolution, and communications. Connectivity is a concept related to using computer networks to link people and resources. The single most dramatic change in connectivity and communications in the past five years has been the widespread use of mobile or wi

30、reless telephones. Communication systems are electronic systems that transmit data from one location to another,Identify and describe the various physical and wireless communication channels.Physical1、Telephone lines.2、Coaxial cable-.3、Fiber-optic cable.Wireless1、Infrared.2、Broadcast radio.3、Microwa

31、ve.4、Satellite,Identify the standard Internet protocol and discuss its essential features.The standard protocol for the Internet is TCP/IP,Define and discuss the four principal network topologies.Star network.Bus network.Ring network.Hierarchical network,Define and discuss the three most common netw

32、ork strategies. Terminal network system,- Client/server network systems -.Peer-to-peer network system,3、Malware 6、Keystroke logger 7、Snoopware 8、Hacker 9、History file,1、Cookie 2、Surge protector 4、Ergonomics 5、Cracker,1、A 2、A 3、D 4、B 5、B 6、C 7、D 8、C 9、B 10、D,1、G 2、H 3、F 4、A 5、B 6、C 7、J 8、I 9、B 10、E,D

33、iscuss the impact of large databases, private networks, the Internet, and the Web on privacy.Every day, data is gathered about us and stored in large databases. A vast industry of data gatherers known as information resellers or information brokers now exists that collects and sells such personal da

34、ta. Using publicly available databases and in many cases nonpublic databases, information resellers create electronic profiles or highly detailed and personalized descriptions of individuals,Discuss the various kinds of computer criminals.There are many types of computer criminals. Employees:. Outsi

35、de users:. Hackers:. Crackers:. Organized crime:.Terrorists,What are the principal measures used to protect computer security? What is encryption? How is it used by corporations and individuals?Some of the principal measures to protect computer security are encryption, restricting access, anticipati

36、ng disasters, and backing up data. Encryption is encoding data so that it cannot be read without a key. Businesses have become so good at it that some law enforcement agencies are unable to wiretap messages from suspected criminals. Individuals also are using encryption programs to safeguard their p

37、rivate communications,What is ergonomics? How does computer use impact mental health? Physical health?Ergonomics is defined as the study of human factors related to things people use. Sitting in front of a screen in awkward positions for long periods may lead to physical problems such as eyestrain,

38、headaches, and back pain. Computing can be quite noisy. Voice input and output can be distracting for co-worker. Research shows that workers whose performance is monitored electronically suffer more health problems than do those watched by human supervisors. Technostress is the tension that arises w

39、hen we have to adapt unnaturally to computers rather than having computers adapt to us,Describe the basic elements of the Green PC and what you can do to protect the environment.The basic elements of the Green PC are: System unit: (1) uses an energy-saving microprocessor that requires a minimal amou

40、nt of power, (2) employs microprocessor and hard-disk drives that shift to an energy-saving or sleep mode when not in operation, (3) replaces the conventional power supply unit with an adapter that requires less electricity, and (4) eliminates the cooling fan. Display: (1) flat panels that require l

41、ess energy than the traditional monitors, (2) special power-down monitors that automatically reduce power consumption when not in use, and (3) screen-saver software that clears the display whenever it is not in use. Manufacturing: Computer manufacturers such as Intel, Apple, Compaq, and others are u

42、sing fewer harmful chemicals in production. Particular attention is given to chlorofluorocarbons (CFCs) in solvents and cleaning agents. Toxic nickel and other heavy metals are being eliminated or reduced in the manufacturing processes,4、Data entry worker 6、Computer Technician 8、Proactive 9、Webmaster 10、System analyst 11、Technical writer 12、Cryptographer,1、Nave 2、Programmer 3、Frustrated 4、Desktop publisher 5、Computer trainer 7、Cynic,1、D 2、B 3、A 4、D 5、C 6、D 7、C 8、A 9、D 10、B,1、D 2、J 3、H 4、A 5、E 6、I

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

最新文档

评论

0/150

提交评论