Information literacy Knowing how to find data from several sources, select relevant material, analyse and organise it into a form that can be used to make decisions. Computers have become the tools people use to access and manage information. Information technologists are people who analyse and design the tools. What is a computer? Tradition definitions of computers include �6�1 A machine that accepts data and processes it into use information. �6�1 A computer is a binary, digital, electronic, stored program machine. �6�1 While a computer is commonly a digital machine, analogue machine do exist. An electronic device, operating under the control of instructions stored in its own memory unit, that can accept data (input), process data arithmetically and logically, produce results (output) from the processing and stores results for future use. Many computers receive and send data (communicate) across networks LAN and Wan. A computer system consists of hardware and software. What is hardware? Hardware Hardware is physical devices or components that can be physically handled – you can thou it. Input Devices Input devices convert data that humans collect into coded electrical signals that a computer can process. The central processing unit The electronic processing takes place in the CPU. The CPU consists of �6�1 A control unit that controls all of the computer’s functions and an �6�1 Arithmetic and logical unit (ALU) that performs any calculation Memory Memory holds all programs and What is RAM currently open? Data (notes) Word processor Output devices Output devices convert the computer’s electronic signals back into information Secondary storage devices These devices store programs and data permanently. The programs and data are not necessarily (or likely to be) in current use. . DVD CD Communication devices These devices enable a computer to connect to another computer. List the six different type of hardware? Secondary storage(external), input, processor, output , memory, Communication. Name eight pieces of hardware USB, keyboard, monitor, screen, RAM, ROM, VDU, Modem. The system unit and peripheral devices The system unit is the computer box. Peripheral devices are any devices around the outside, or in other words, plugged into the (back of) the machine. Peripheral devices include the key board, mouse, printer, joy stick and others. Peripheral devices are any devices around the outside, or in other words, plugged into the (back of) the machine. Peripheral devices include the keyboard, mouse, printer, joy stick and others. What else does a computer have? Software Software is a computer program ,which is a detailed set of instructions that directs a computer to perform the tasks necessary to process data into information. These instructions are written in languages that computer can interpret. Software includes computer games, a word processing packing, an accounting package, amongst Definition of a computer system �6�1 A computer system is the configuration of hardware and software, functioning together, to process data into useful information, in order to achieve a purpose for a human user. What is data? �6�1 Data is raw facts, be they numbers, words, images and sounds, that can be input into a computer. . Mary a name is a piece of data What is information? �6�1 Information is processed data, that has meaning and is useful. . John is a list of names who scored an A grade on an exam John A Chai A Pam A . Commodore $23 500 Magna $21 500 Falcon $19 800 The system unit contains the �6�1 Motherboard �6�1 CPU �6�1 Memory �6�1 Other electronics It is where the computer program instructions are executed and the data is manipulatedThe Processor CPU The CPU interprets and carries out basic instructions that operate the computer, the CPU contain the �6�1 Control unit and the �6�1 Arithmetic logic unit Control unit The control unit directs and coordinates the computer’s operations. For every single instruction, the control unit repeats four basic operations, �6�1 Fetching �6�1 Decoding �6�1 Executing �6�1 Storing CPU speed The CPU’s speed may be measured in MIPS The number of millions of instructions per second Arithmetic/logic unit The ALU performs all calculations, which involve �6�1 Arithmetic operations 2+3 �6�1 Comparison operations age>=17 �6�1 Logical operations pass Processing instructions A CPU may begin executing a second machine cycle before completing the first-referred to as pipelining. Current CPU’s can pipeline up to 4 instructions. Storage within the CPU Registers temporarily hold data and instructions. The computer’s clock A System clock is necessary to control the timing of all computer operations. Each tick of the clock is referred to as a clock cycle. Clock speed is the speed at which a processor executes instructions. A hertz is one cycle per second and a megahertz is 1024 by1024 and a gigahertz is 1024 by 1024 by1024. Memory Memory is the temporary storage place for data and (program) instructions. Memory is measured in �6�1 Kilobytes 1024 bytes 2^10 �6�1 Megabytes 1024* 1024 bytes 2^20 �6�1 Gigabytes 1024*1024*1024 bytes 2^30 Representation of data Digital computers are built from many small electronic circuits. Each circuit, at any point of time can be turned OFF or ON. Hence these devices are called two state devices. Binary Digit 0and 1 Each off or on digital value is called a bit, short for binary digit. A 1 bit computer would be able to distinguish between two values-characters, symbols or numbers. Hardly sufficient for the characters on the keyboard Bits Characters 1 2 2 4 3 8 4 16 5 32 6 64 7 128 8 256
Since the 21st century, the human economy has developed high speed, the people live have had the change which changes with each new day, specially computer's application and popularization to economical and social life each domain. Along with the computer in the social life each domain's widespread utilization, the computer virus attack and the guard technology unceasingly is also developing, has brought the huge destruction and the latent threat for the computer system. It is reported that various countries suffer the computer virus infection and the attack event are counted by the 100 million, has disturbed the normal human society life seriously, has brought the huge latent threat and the destruction for the computer network and the system. Along with the computer, the network utilization popularizes unceasingly, thoroughly, will guard against the computer virus to receive various countries to take seriously more and more. In order to ensure system's security and unimpeded, therefore, studies the computer virus the measure to be imminent. This article obtains from computer's characteristic, to come the preliminary discussion to cope with the computer virus the method and the measure. 计算机Computer,、病毒 virus系统安全system safety
You've probably been sick before. It's not many cases, like the flu, you're sick because of a virus…tiny germs ready to multiply and spread from person-to-person, via handshakes or sneezes。你肯定生过病吧,很不爽,对吗?生病通常是因为感染了病毒。握手、打喷嚏都能让病毒繁殖传播。Computer viruses are no of germs, they are computer programs are usually designed by criminals to multiply and spread from computer-to-computer like a one makes it to your computer, it can erase your files, send emails without your permission or even communicate sensitive info to criminals。电脑病毒亦然。但不是微生物而是电脑程序。黑客设计的病毒程序会像疾病一样在电脑间传播一旦电脑感染了病毒,它会删除文件、私发邮件、甚至把私人信息泄露给犯罪分子。Let's take a closer look, because what we call computer viruses can actually be Viruses, worms or trojanswe’ll start with bugs hitch a ride when something, like a file, is shared between computers. This often happens via attachments sent in email or shared USB someone clicks to open the file, the damage is virus is now on that computer, where it starts to multiply and look for chances to hitch a ride to a new computer。电脑病毒可以细分为三种,普通病毒、蠕虫 、木马先来说说普通病毒。它通过电脑之间的文件共享来传播。通常会在附件或U盘中出现,一打开这种文件,电脑就会中毒。然后复制,等着感染下一台电脑。Like a sick human, it’s sometimes hard to to tell when a file has a this reason, the best defense is anti-virus prevents viruses from getting to your computer and removes them when they are found。和人生病一样,有时候文件是否感染病毒也很难”确诊”。所以,最好的防护措施就是安装杀毒软件能防止电脑中毒,也能在发现病毒时及时清除。Now, worms are a little are programs that spread to computers without humans doing create worms to spread via computers that are connected in a network. They worm their way from computer-to-computer it's a small office or a global network like the Internet。蠕虫则更可怕,即使我们什么也没操作,它也能传播。只有电脑联网,蠕虫就会感染网上的病毒。不管是局域网,还是在整个互联网中。Usually, the worms find a back way to trick the computer’s software into letting them they're in, they look for the same backdoor in similar computers,wreaking havoc along the way。蠕虫擅长走”后门”。就是通过电脑软件的漏洞入侵。一旦被感染,蠕虫还会寻找其他电脑的”后门”,一路披荆斩棘地破坏下去。The best defense is keeping your computer software up to date at work and helps close the doors and prevent problems。最好的防护措施是,更新系统、修复漏洞,门关好了,蠕虫就爬不进来了。Trojans, our last example, are sneaky the real trojan horse, they’re a you fall for it, you end up downloading a virus from the may appear to be a game or useful software, but hidden inside is a program that can cause example, these programs can open new backdoors,giving criminals access to your computer and information over the Web。木马则是最最阴险狡诈的病毒。像传说中的特洛伊木马,它也善用诡计,一个不小心就可能从网上下载木马。木马病毒会伪装成游戏或者常用软件,有些木马还会给电脑开新的”后门”,让犯罪分子轻易侵入你的电脑获取信息。Not avoid trojans, only download software from sites you like washing your hands and covering your cough,you have to be aware of what causes problems to avoid them。可怕吧?要防木马,你必须只在信任的网站上下载软件,提高警惕,时刻注意网络安全,就像咳嗽要掩口,饭前便后要洗手一样。Keep your computer up to date and get anti-virus will help prevent problems and help you please…don't click on links, attachments and downloadable you know they're legit。还要经常更新电脑软件,安装杀毒工具。一边防患于未然,一边“亡羊补牢”。另外,陌生的链接、附件、文件也不要碰。除非能确认它们的安全性。Through a little awareness, you and your computer will stay happy and healthy。
Computer [By Kaiser3344]More than two hundred years ago, the invention of the steam engine,rumbled ushered in the industrial society; more than a hundred years ago,lamps, electrical world presents a multicoloured to humans; sixty years ago,computer generated, the human with the highly development track, the earth has become a village. Computer is gradually becoming the master of human production and use of computer to improve the production efficiency is very high. From the spacecraft to the research of nanotechnology, production from nuclear explosions to the pipeline, human production aspects are due to the use of computer and enhance production efficiency. USA ala Moss National Laboratory, a few big basketball court with a computer, can be used to simulate nuclear test, it a second operation of hundreds of millions of times,a few days to finish ourselves never finish the work. Even in ordinarycomputer industry, also plays an important role. For example, in the field of education, a teacher want to count a grade exam results, calculate theaverage, with the computer, a few seconds on the line, if calculated by hand, to a few to computer and Internet as the carrier, promote rapid economic growth. The Internet enables people to obtain information more convenient,so as to make the investment, production, sales and other aspects of thespeed, so that rapid development of the economy. USA former president Clinton proposed in 1992 to increase Internet information transmission speed of the "information superhighway" plan, make America stable economic growth, rapid is increasingly affecting the human way of life. The emergence of the Internet to eliminate regional disparities, so far apart from each otherpeople can get together and talk. Remain within doors, tour the of miles away, cleaning the house, Arabian Nights type ideashave been realized with the help of course, computer has many benefits at the same time, there are manyhidden dangers. So some people think that computer can do more harm than good, and hindered the development of society. This view is especially the emergence of Internet time is very short, it takes a long time to perfect and develop. Moreover, every thing has not onlyadvantages without fault. Nuclear energy can give great energy for human beings, but also in the human head enveloped nuclear explosion shadow;cloning is human scientific breakthrough, but human cloning is againsthuman and Internet is becoming more and more important, how should we do? A survey shows that, the great Russian Internet users only about three million, this makes us more profound understanding of why she isfading. In fact, the computer and the Internet is not popular, resulting ininformation, information due to occlusion of production is backward,backward in production led to the strength of the backward. The economyhas just taken off Chinese if don't want to lag behind, we must pay attention to the popularization of computer and internet. Fortunately, our country has"legend", "square", "Sina", "Sohu" and so on his computer and networkcompany, although far from their independent and Internet whirlwind blowing up, are you ready?好评
计算机专业方面的外文翻译都是找wo拿参考 。
只要翻译摘要部分,就是中文摘要后面再有一个英文摘要,可以谷歌在线翻译,不过翻译完了一定要重新修改,因为语法翻译的挺烂的
毕业论文外文翻译是在网上找到一篇与你论文主旨相关的英文文章,然后自己翻译过来,篇幅必须长一点,因为一般毕业设计都要有字数限制。
本科毕业设计(论文)外文翻译基本规范:
一、要求
1、与毕业论文分开单独成文。
2、两篇文献。
二、基本格式
1、文献应以英、美等国家公开发表的文献为主(Journals from English speaking countries)。
2、毕业论文翻译是相对独立的,其中应该包括题目、作者(可以不翻译)、译文的出处(杂志的名称)(5号宋体、写在文稿左上角)、关键词、摘要、前言、正文、总结等几个部分。
3、文献翻译的字体、字号、序号等应与毕业论文格式要求完全一致。
4、文中所有的图表、致谢及参考文献均可以略去,但在文献翻译的末页标注:图表、致谢及参考文献已略去(见原文)。(空一行,字体同正文)
5、原文中出现的专用名词及人名、地名、参考文献可不翻译,并同原文一样在正文中标明出处。
三、毕业论文(设计)外文翻译的内容要求
外文翻译内容必须与所选课题相关,外文原文不少于6000个印刷符号。译文末尾要用外文注明外文原文出处。
原文出处:期刊类文献书写方法:[序号]作者(不超过3人,多者用等或et al表示).题(篇)名[J].刊名(版本),出版年,卷次(期次):起止页次。
原文出处:图书类文献书写方法:[序号]作者.书名[M].版本.出版地:出版者,出版年.起止页次。
原文出处:论文集类文献书写方法:[序号]作者.篇名[A].编著者.论文集名[C]. 出版地:出版者,出版年.起止页次。
要求有外文原文复印件。
扩展资料:
文献翻译要求
1、翻译要注重专业、准确
文献翻译涵盖许许多多的学科,每一学科都有自己的专业术语。比如,从事专利文献翻译的译者必须对相关专业术语有着深入的了解和清楚的把握,这样才能用专业、准确、规范的语言翻译出来。
2、翻译要注重知识更新
文献翻译涉及到各种学科,这些学科的发展是与时俱进的。因此,译员也要与时俱进,随时掌握最新的知识,这样才能更好地胜任翻译任务。
3、翻译要注重本地化
无论是将国外的文献翻译进来,还是将国内的文献介绍出去,翻译时都必须注意语言的本地化,符合目标语言的习惯。
4、翻译要注重语言严谨、流畅
文献翻译一方面讲究语言的严谨科学,逻辑的连贯严密,另一方面它也注重文字尽可能的优美流畅。因此,这类翻译对译者的目标语言使用能力是一种挑战。
参考资料:百度百科-文献翻译
这个要得看你的文章了,如果你不会的话,可以去请教请教北京译顶科技啊,那边还是很不错的,服务态度还很棒
With the development of computer technology and network technology, network security issues, today has become one of the most attention to the problem of the network world Many factors, which endanger the safety of the network, they mainly attached to the various malware, including viruses and trojans is most general Internet users are familiar with. According to these harmful factors, network security technology rapid development, it also greatly improved the security of the network. Aiming at network security situation now, on the company's network information security are analyzed and put forward the improvement plan. Keywords: physical security, intrusion detection, firewall, switch, router
1 Snort start-upEnter experimental platform, click on the toolbar "control panel" button and enter IDS working directory, operation of a network interface Snort eth0 intercepting, requirements are as follows:(1) only catch a group of icmp host to show request packet.(2) using detailed in the terminal display mode in the link layer and network information packets.(3) to capture information log, log directory ar/log/ ________________________________ command
一个非常好用的软件可以帮你。投稿精灵是一个自助投稿管理的软件。软件目前集合了上百家的学术期刊在线征稿,打造一个安全的交易平台。投稿精灵简单易用,不需要任何的专业知识就可以完成职称论文的发表。在百度上搜索就可以找到,也可以搜索到他们的官方网站,就可以下载使用了。目前,我发了很多篇了,我还帮同事发了不少,西西,竟然还赚点差价,我现在拿出来分享,希望对你也有点帮助啊,记得给我加分啊r
童鞋你好!这个估计需要自己搜索了!网上基本很难找到免费给你服务的!我在这里给你点搜索国际上常用的外文数据库:---------------------------------------------------------- ⑴ISI web of knowledge Engineering Village2 ⑵Elsevier SDOL数据库 IEEE/IEE(IEL) ⑶EBSCOhost RSC英国皇家化学学会 ⑷ACM美国计算机学会 ASCE美国土木工程师学会 ⑸Springer电子期刊 WorldSciNet电子期刊全文库 ⑹Nature周刊 NetLibrary电子图书 ⑺ProQuest学位论文全文数据库 ⑻国道外文专题数据库 CALIS西文期刊目次数据库 ⑼推荐使用ISI web of knowledge Engineering Village2-----------------------------------------------------------中文翻译得自己做了,实在不成就谷歌翻译。弄完之后,自己阅读几遍弄顺了就成啦!学校以及老师都不会看这个东西的!外文翻译不是论文的主要内容!所以,很容易过去的!祝你好运!
Since the 21st century, the human economy has developed high speed, the people live have had the change which changes with each new day, specially computer's application and popularization to economical and social life each domain. Along with the computer in the social life each domain's widespread utilization, the computer virus attack and the guard technology unceasingly is also developing, has brought the huge destruction and the latent threat for the computer system. It is reported that various countries suffer the computer virus infection and the attack event are counted by the 100 million, has disturbed the normal human society life seriously, has brought the huge latent threat and the destruction for the computer network and the system. Along with the computer, the network utilization popularizes unceasingly, thoroughly, will guard against the computer virus to receive various countries to take seriously more and more. In order to ensure system's security and unimpeded, therefore, studies the computer virus the measure to be imminent. This article obtains from computer's characteristic, to come the preliminary discussion to cope with the computer virus the method and the measure. 计算机Computer,、病毒 virus系统安全system safety
你可以加
当然可以了…
可加我“扣扣”细谈,扣扣号码见我的ID附件2:外文原文The History of the InternetThe Beginning - ARPAnetThe Internet started as a project by the US government. The object of the project was to create a means of communications between long distance points, in the event of a nation wide emergency or, more specifically, nuclear war. The project was called ARPAnet, and it is what the Internet started as. Funded specifically for military communication, the engineers responsible for ARPANet had no idea of the possibilities of an "Internet." By definition, an 'Internet' is four or more computers connected by a network. ARPAnet achieved its network by using a protocol called TCP/IP. The basics around this protocol was that if information sent over a network failed to get through on one route, it would find another route to work with, as well as establishing a means for one computer to "talk" to another computer, regardless of whether it was a PC or a Macintosh. By the 80's ARPAnet, just years away from becoming the more well known Internet, had 200 computers. The Defense Department, satisfied with ARPAnets results, decided to fully adopt it into service, and connected many military computers and resources into the network. ARPAnet then had 562 computers on its network. By the year 1984, it had over 1000 computers on its network. In 1986 ARPAnet (supposedly) shut down, but only the organization shutdown, and the existing networks still existed between the more than 1000computers. It shut down due to a failied link up with NSF, who wanted toconnect its 5 countywide super computers into ARPAnet. With the funding of NSF, new high speed lines were successfully installedat line speeds of 56k (a normal modem nowadays) through telephone linesin 1988. By that time, there were 28,174 computers on the (by then decided) Internet. In 1989 there were 80,000 computers on it. By 1989, there were 290,000. Another network was built to support the incredible number of peoplejoining. It was constructed in 1992. Today - The InternetToday, the Internet has become one of the most important technological advancements in the history of humanity. Everyone wants to get 'on line' to experience the wealth of information of the Internet. Millions of people now use the Internet, and it's predicted that by the year 2003 every single person on the planet will have Internet access. The Internet ha起源——ARPAnetInternet是被美国政府作为一项工程进行开发的。这项工程的目的,是为了建立远距离之间点与点的通信,以便处理国家军事范围内的紧急事件,例如核战争。这项工程被命名为ARPAnet,它就是Internet的前身。建立此工程的主要应用对象就是军事通讯,那些负责ARPAnet的工程师们当时也没有想到它将成为“Internet”。根据定义,一个“Internet”应该由四或者更多的计算机连接起来的网络。ARPAnet是通过一种叫TCP/IP的协议实现连网工作的。此协议最基础的工作原理是:如果信息在网络中的一条路径发送失败,那么它将找到其他路径进行发送,就好象建立一种语言以便一台计算机与其他计算机“交谈”一样,但不注意它是PC,或是Macintosh。到了20世纪80年代,ARPAnet已经开始变成目前更为有名的Internet了,它拥有200台在线主机。国防部很满意ARPAnets的成果,于是决定全力将它培养为能够联系很多军事主机,资源共享的服务网络。到了1984年,它就已经超过1000台主机在线了。在1986年ARPAnet关闭了,但仅仅是建立它的机构关闭了,而网络继续存在与超过1000台的主机之间。由于使用NSF连接失败,ARPAnet才被关闭。NSF是将5个国家范围内的超级计算机连入ARPAnet。随着NSF的建立,新的高速的传输介质被成功的使用,在1988年,用户能通过56k的电话线上网。在那个时候有28,174台主机连入Internet。到了1989年有80,000台主机连入Internet。到1989年末,就有290,000台主机连入了。另外还有其他网络被建立,并支持用户以惊人的数量接入。于1992年正式建立。现状——Internet如今,Internet已经成为人类历史上最先进技术的一种。每个人都想“上网”去体验一下Internet中的信息财富。成千上百的人都用Internet。预计,到了2003年世界上的每个人,都将拥有Internet接入。Internet已经真正成为我们这个年代生活的一部分。由于计算机技术和网络技术每天都在改变,我们很难想象Internet下一步将发展成什么样子。工作原理:现在,人们用Internet是一件很平常的事。他们通过Internet进行购物、玩游戏、聊天等娱乐活动。Internet不仅仅是一件事物。Internet也会崩溃。它的工作原理如同电话通信系统,只不过没有专门的Internet公司来经营Internet。Internet是成千上万台计算机互相连接的集合。Internet就像是办公网络一样,不同的是,它有成千上万台计算机相连接。其中最主要的是Internet是如何进行通信的。位于Houston的一台计算机是如何通过浏览网页而能与位于Tokyo的计算机进行数据通信的呢?Internet信息,拥有信息的计算机连接到Internet,是基于语言。这种语言叫做TCP/IP。TCP/IP建立了一种语言,能使计算机在Internet系统中传送数据。但是TCP/IP的取得也必须具备两台电脑之间的物理连接。
毕业论文外文翻译:将外文参考文献翻译成中文版本。翻译要求:1、选定外文文献后先给指导老师看,得到老师的确认通过后方可翻译。2、选择外文翻译时一定选择外国作者写的文章,可从学校中知网或者外文数据库下载。3、外文翻译字数要求3000字以上,从外文文章起始处开始翻译,不允许从文章中间部分开始翻译,翻译必须结束于文章的一个大段落。参考文献是在学术研究过程中,对某一著作或论文的整体的参考或借鉴.征引过的文献在注释中已注明,不再出现于文后参考文献中。外文参考文献就是指论文是引用的文献原文是国外的,并非中国的。 原文就是指原作品,原件,即作者所写作品所用的语言。如莎士比亚的《罗密欧与朱丽叶》原文是英语。译文就是翻译过来的文字,如在中国也可以找到莎士比亚《罗密欧与朱丽叶》的中文版本,这个中文版本就称为译文。扩展资料:外文翻译需要注意的问题1、外文文献的出处不要翻译成中文,且写在中文译文的右上角(不是放在页眉处);会议要求:名称、地点、年份、卷(期),等 。2、作者姓名以及作者的工作单位也不用必须翻译。3、abstract翻译成“摘要”,不要翻译成“文章摘要”等其他词语。4、Key words翻译成“关键词” 。5、introduction 翻译成“引言”(不是导言)。6、各节的标号I、II等可以直接使用,不要再翻译成“第一部分”“第二部分”,等。 7、注意排版格式,都是单排版,行距,字号小4号,等(按照格式要求)。8、里面的图可以拷贝粘贴,但要将图标、横纵指标的英文标注翻译成中文。 9、里面的公式、表不可以拷贝粘贴,要自己重新录入、重新画表格。
你的外文是什么哦
翻译外文文献的方法:
1.大部分外文参考文献下载后是pdf格式,可以通过一些方法将其转换为更方便复制修改的word版。ps:小编是通过“软件安装管家”的pdf转换器进行转换的,一个非常好用的免费软件。
2.打开word版的外文文献。
3.选中要翻译的部分,选择上方工具栏的“审阅”,再点击下方选项卡的“翻译”中的“翻译所选文字”,右方出现翻译结果。ps:一部分一部分进行翻译比较好。
4.接下来是准确翻译的做法。首先对照原文,运用你的英文水平进行大致的检查。
在科研过程中阅读翻译外文文献是一个非常重要的环节,许多领域高水平的文献都是外文文献,借鉴一些外文文献翻译的经验是非常必要的。
由于特殊原因我翻译外文文献的机会比较多,慢慢地就发现了外文文献翻译过程中的三大利器:Google“翻译”频道、金山词霸(完整版本)和CNKI“翻译助手"。
外文文献数据库
外文文献反映了世界各国科学技术的先进水平,及时报道了国际重要科研成果和科研动向,是科研人员研究新课题、推出新成果的重要情报源。
分类
外文文献数据库可以有很多种分类的角度,其中从所收录文献信息的使用方式的角度分类如下:
第一类是收录文献全文的数据库,以 sciencedirect 、springer 和wiley 为代表。
第二类是收录摘要、文献来源和文献引证关系的数据库,以所谓的三大索引数据库为代表。(三大索引数据库统一于 ISI web of knowledge)
第三类是含有少量免费全文,但对于大多数文章只是收录摘要和文献来源信息的数据库,以pubmed为代表。
第四类是既包含全文电子期刊库,又包含文摘数据库的数据库,以ovid为代表。
外文翻译要求:(1)选定外文文献后先给指导老师看,得到老师的确认通过后方可翻译。(2)选择外文翻译时一定选择外国作者写的文章,可从学校中知网或者外文数据库下载。(3)外文翻译字数要求3000字以上,从外文文章起始处开始翻译,不允许从文章中间部分开始翻译,翻译必须结束于文章的一个大段落。