.What do you think of computer?Computer is very useful for us. The Internet is a great facility for collecting information. The Internet makes it easy to build social connections. we can have a lot of friends all over the world and reach much knowledge by Internet. Millions of people communicate today through the disadvantages of computer also have a lot. The network information may be falsehood, so mach as leading to a wrong decision-making. May online socialization weaken our ability to deal with relationships in the real world? The weak-willed persons maybe indulge network-game and amusement in Internet thereby disrepair own loveliness of Internet is infinitude and colorful, but strengthen to manage it. We make good use of it only while we have an appropriate approach to Internet .
What is a Computer?Computers are machines that can be used for performing calculations automatically. They can perform complex and repetitive procedures quickly, precisely and reliably and can quickly store and retrieve large amounts of physical components from which a computer is constructed (electronic circuits and input/output devices) are known as "hardware". Most computers have four types of hardware components: input, processor, storage (main memory, auxiliary storage) and output. Input and output (I/O) devices allow the computer to communicate with the user and the outside world. The CPU (central processing unit) executes programs ("software") which tell the computer what to two principal characteristics of a computer are: It responds to a specific set of instructions in a well-defined manner. It can execute a prerecorded list of instructions (a program).Classification of computersComputers can be generally classified by size and power as follows: • Personal computer: A small, single-user computer based on a microprocessor. In addition to the microprocessor, a personal computer has a keyboard for entering data, a monitor for displaying information, and a storage device for saving data. • Workstation : A powerful, single-user computer. A workstation is like a personal computer, but it has a more powerful microprocessor and a higher-quality monitor. • Minicomputer : A multi-user computer capable of supporting from tens to hundreds of users simultaneously. • Mainframe : A powerful multi-user computer capable of supporting many hundreds to thousands of users simultaneously. • Supercomputer : An extremely fast computer that can perform millions of instructions per second. Generations of ComputersThe history of computer development is often referred to in reference to the different generations of computing devices. Each generation of computer is characterized by a major technological development that fundamentally changed the way computers operate. It resulted in smaller, cheaper, and more powerful, efficient and reliable devices. • First Generation- 1940-1956: Vacuum tubes were used and it relied on machine language to perform operations, and they could only solve one problem at a time.• Second Generation - 1956-1963: Transistors were used and computers moved from cryptic binary machine language to symbolic, or assembly, languages, which allowed programmers to specify instructions in words.• Third Generation - 1964-1971: Integrated circuits -Transistors were miniaturized and placed on silicon chips, called semiconductors. Users interacted through keyboards and monitors and interfaced with an operating system.• Fourth Generation - 1971-Present: Microprocessors -The microprocessor brought the fourth generation of computers, as thousands of integrated circuits were built onto a single silicon chip.• Fifth Generation - Present and Beyond: Artificial intelligence -Computing devices, based on artificial intelligence, are still in development, though there are some applications, such as voice recognition, that are being used todayIPSOMost computers have four types of hardware components: input, processor, storage (auxiliary storage) and output. Input and output (I/O) devices allow the computer to communicate with the user and the outside world. The CPU (central processing unit) executes programs ("software") which tell the computer what to CycleThe diagram given explains the operations in the computer. First the data enters the computer through the input device, and then processing occurs at the processing unit. The processing unit is the microprocessor chip. Processing unit comprises of the control unit and arithmetic and logical unit and main memory. There are storage devices (auxiliary storage) which store the processed data and data can be retrieved at anytime. The processed data is sent out to the output devices for the ----- Processing ------ Storage ----- OutputNEW WORDS AND EXPRESSIONS automatically adv. 自动地 repetitive adj.各自的 retrieve v. 恢复,补救physical adj.物理的,自然的auxiliary adj.辅助的,附加的,副的 n.补助物main memory 主存auxiliary memory辅存execute v.执行,实现prerecord v.事先录音microprocessor n.微处理器in addition to adv.除…什么之外monitor n.显示器simultaneously adv.同时地technological adj.科技的fundamentally adv.基础地,根本地Vacuum tube 电子管transistor 晶体管cryptic adj.秘密的,神秘的binary adj.二进位的symbolic adj.象征的,符号的semiconductor n.半导体artificial intelligence 人工智能
题目:计算机是现代科学技术最杰出的成果之一,它无处不在,与我们生活的各个领域息息相关,Computers(电脑)。 请以“Computers”为题,写一篇100个单词左右的英语小短文。 要求写出计算机的具体用途和人们对于计算机应用的态度。 【范文】 Computers One of the greatest advancements in modern technology has been the invention of computers. Computers are changing the way people live and work. They are already widely used in industry, business and in academic institutions. With the popularization of science and technology, computers have found an increasingly wide application in all fields. A computer can do a lot of work. It is capable of doing extremely complicated work in all fields of learning. It can solve the most complex mathematics problems. Computers are able to store large amounts of information, which can be recalled rapidly at any time. The truth of the matter, however, is that any new technology has a “dark”side. The problems caused by the use of computers are quite different. For example, assembly lines will be a slow process to retain workers to build and operate new equipment. Nevertheless, the dark side of the computer shouldn't mean that we should abandon the use of computers. Technology only can make the real work cheaper, faster, and less tedious. It cannot solve problems. 【评语】 该文从现代化的'技术革新角度来谈计算机,然后在第二段里讲到,随着科学和技术的普遍应用,计算机也大放光彩,具体的例举了两个用处,高中英语写作《Computers(电脑)》。最后一段里,用“the truth of the matter”,再加“however”转折,说明了计算机的“dark side”,文章全面而重点突出。
计算机,方面的英语论的
湖南软件学院计算机专业英语(论文) 第1页 On Information Resources Abstract: With the development of human society, the way people gather information more and more resources as a special social resources, With strategic nature, can spread the properties, it can increase the properties and comprehensive quality characteristics. Information resource with great economic and social value, not only is important to take a new road to industrialization led forces, but also changes the mode of production and social progress in an enormous boost. Keywords: theoretical exploration; information resources; Transformation 1 Introductio Information resources, as a special configuration has a special meaning and forms of social resources, their role is with each passing day growing. Information resources are the basic elements of modern social productive forces, while change in the way of social production and people's way of life enhancement, resulting in an invaluable influence and promote the role. At the same time in the modern society, the content of information resources is continuously expanding to include not only the growing number of natural science information resources, but also times of social science information resources. The availability of information resources and use of attention is whether the growth of a country's comprehensive national strength is an important factor, but also the extent a country is an important symbol of modernization.
Computer network security and to guard againstAbstract: When mankind entered the 21st century information society, the network society of the time, China will establish a complete set of network security system, especially from the policy and law to establish China's own characteristics, network security words: computer; network; security; preventIn the information age, information can help groups or individuals so that they benefit from, the same information can also be used to pose a threat to them, caused damage. Therefore network security, including the composition of network hardware, software and network transmission of information security, so that they do not because of accidental or malicious destruction of the attacks, network security not only the technical aspects, but also management issues, both complement each other, are , the concept of computer network securityInternational Organization for Standardization of "computer security" is defined as: "To establish a data processing system and the adoption of technology and management of security protection, the protection of computer hardware, software, data is not due to accidental and malicious destruction of reasons, change and leakage." The above definition of computer security includes physical security and logical security of both the contents of the contents of the logic of security could be understood as we often say that the information security, information refers to the confidentiality, integrity and availability of protection, and network security Information security is the meaning of the extension, that network security is a network of information confidentiality, integrity and availability protection. Computer network security as the specific meaning of the user changes, the user is different on the network security awareness and requirements will be different. From the ordinary user's point of view, could only hope that personal privacy or confidential information transmission on the network be protected against eavesdropping, tampering and forgery; and network provider in addition to care about these network information security, we must also consider how to deal with sudden natural disasters, such as military strikes against the destruction of network hardware, as well as unusual in the network how to restore network communications, and maintain the continuity of network essence, the network security, including the composition of network hardware, software and network transmission of information security, so that they do not because of accidental or malicious attacks on the destruction of both the technical aspects of network security issues, there are management issues, the two sides complement each other, are indispensable. Man-made network intrusion and attacks makes network security is facing new , computer network security status quoComputer network security is the network hardware, software and data systems are protected from accidental or malicious destruction of reasons, alteration, disclosure, the system continuous, reliable, normal operation of network services without disruption. Computer and network technology has the complexity and diversity, makes computer and network security has become a need to continue to update and improve the area. At present, hackers method has been more than the type of computer virus, and many attacks are fatal. In the Internet network, because the Internet does not have the time and geographical constraints, whenever there is a means to generate new attacks, we can in a week around the world, these attacks means the use of network and system vulnerabilities to attack computer systems and resulting in network paralysis. Worms, backdoor (Back-doors), Rootkits, DOS (DenialofServices) and Sniffer (network monitor) is a familiar means of several hacker attacks. However, none of these attacks means they reflect the astonishing power of today become worse. These types of attacks means the new variant, with previous attacks appeared methods, more intelligent, targeted against Internet-based protocols and operating system level. From the Web process control procedures to the kernel-level Rootlets. Hackers practices escalating renovation, to the user's ability to guard against information security , computer network security precautions1, to strengthen the internal network management and the use of safety awareness among staff, many computer systems commonly used passwords to control access to system resources, which is anti-virus process, the most vulnerable and the most economical methods. Network administrator and terminal operator privileges in accordance with their responsibilities, choose a different password for the application data legitimate operation, to prevent unauthorized users to access the data and the use of network the network, software installation and management is crucial, it is not only related to network maintenance and management efficiency and quality, but also to the network security. A good antivirus software can be easily installed within minutes to the organization each NT server can also be downloaded and spread to all the purpose of the machine by the network administrator set up and manage to focus, it will work with the operating system and other security is closely linked to become a part of network security management, and automatically provide the best network virus defensive measures. When the computer virus on-line resources applications attack, such as the virus exists in the information-sharing network of media, it is necessary to the security at the gateway, on the network front-end for , network firewall technologyIs a kind of used to strengthen the network access control to prevent the external network users to illegal means to enter the external network through the internal network, access internal network resources and protect the internal network operating environment special for Network Interconnection Devices. It is between two or more networks such as packet transmission link in accordance with a certain degree of security strategy to implement the inspection, to determine whether the network communication between are allowed to, and monitor the network running. Although the firewall is to protect the network from an effective means of hacking, but there are obviously inadequate: through the firewall can not protect against outside attack other means, can not prevent defectors from the inside and inadvertent threats posed by users, but also can not completely prevent the transmission of the virus have been infected with the software or documents, and can not protect against data-driven , security encryption technologyEncryption technology for the global e-commerce to provide a guarantee, so that Internet-based electronic trading system has become possible, thus improving the symmetric encryption and asymmetric encryption technology is still the mainstream of the 21st century. Symmetric encryption to the conventional password-based technology, computing encryption and decryption operations use the same key. Asymmetric encryption, encryption key that is different from the decryption key, encryption keys are made public, anyone can use, only the decryption key to decrypt people , the network host operating system security and physical security measuresNetwork firewall as the first line of defense and can not fully protect the internal network, must be combined with other measures to improve the safety of the system level. After the firewall is based on the network host operating system security and physical security measures. In accordance with the level from low to high, namely, the physical security of the host system, the core operating system security, system security, application services security and file system security; At the same time, host security checks and bug fixes, as well as a backup safety system as a supplementary safety measures. These constitute the entire network system, the second line of defense, the main part of a breakthrough to prevent the firewall as well as attacks from within. System backup is the last line of defense network system, used to attack after the System Restore. The firewall and host security measures is the overall system security by auditing, intrusion detection and response processor constitute the overall safety inspection and response measures. It from the network system firewall, network host or even directly from the network link layer on the extraction of network status information, as input to the intrusion detection subsystem. Intrusion Detection System in accordance with certain rules to determine whether there is any invasion of the incident, if the invasion occurred, the emergency treatment measures, and generate a warning message. Moreover, the system's security audit also can be used as the future consequences of aggressive behavior and to deal with security policy on the system to improve sources of short, network security is a comprehensive issue, involving technology, management, use and many other aspects, including both its own information system security issues, there are physical and logical technical measures, a kind of technology can only solve the problem on the one hand, rather than a panacea. To this end the establishment of a network with Chinese characteristics, security system, the need for national policies and regulations to support and joint research and development group. Security and anti-security like two sides of contradictions, always pick-up, so the security industry is a future with the development of new technologies and the continuous development of :[1] Huang Yi-qiang, et al. On the software development needs analysis phase of the main tasks. Quarterly Journal of Sun Yat-sen University, 2002 (01).[2] Hu Daoyuan. Computer LAN [M]. Beijing: Tsinghua University Press, 2001.[3] Zhu Lisen, even Shougong. Computer Network Application Technology [M]. Beijing: Patent Literature Publishing House, 2001.[4] Xie Xiren. Computer Networks (4th edition) [M]. Beijing: Publishing House of Electronics Industry, 2003.[5]孙小刚, Han Dong, et al. Oriented software engineering, Visual C + + Network Programming [M]. Beijing: Tsinghua University Press, 2004,11.仅供参考,请自借鉴。希望对您有帮助。补充:您可以随时找我,我会帮你翻译好发过去,随时欢迎您的咨询。
【英文篇名】 Switch Router Operating System Based on a General Operating System 【下载频次】 ☆ 【作者】 潘登; 徐佩霞; 【英文作者】 PAN Deng; XU Pei xia (Department of Electronic Engineering and Information Science; University of Science and Technology of China; Hefei; 230027; China); 【作者单位】 中国科学技术大学电子工程与信息科学系; 230027; 【文献出处】 数据采集与处理 , Journal of Data Acquisition & Processing, 编辑部邮箱 2003年 04期 期刊荣誉:中文核心期刊要目总览 ASPT来源刊 CJFD收录刊 【中文关键词】 交换式路由器; 通用操作系统; 路由器操作系统; 【英文关键词】 switch router; general operating system; router operating system; 【摘要】 提出了一种将通用操作系统及其上层路由软件移植到交换式路由器平台上的方案。此方案可以向上屏蔽交换式路由器与传统的路由器体系结构上的区别 ,从而把通用操作系统及其上层路由软件移植到交换式路由器的平台上 ;同时兼顾数据通信和管理维护方面的需求 ,为上层路由软件提供了与传统路由器相同的接口 ,从而使基于通用操作系统的路由软件可以在不损失可升级性的条件下快速移植到交换式路由器上。实际应用证实了该方案具有良好的灵活性和兼容性 【英文摘要】 A new solution to port general operating systems and their routing software to switch router is presented. The solution shields the architecture difference between traditional router and switch router to application level software, thus it may support general operating system and their routing software on switch router platform. The solution is also considered as requirements of both data communication and control functions. And same ways of the access and control of the router are provied as traditional ro... 【基金】 国家 8 63计划 ( 863 -3 1 7-0 1 -99)资助项目 【DOI】 CNKI:SUN: 【分类号】 【正文快照】 引 言路由器最重要的工作是根据 IP包头和路由、过滤规则转发 IP包。其他功能还包括路由表的维护与路由器系统的维护。实际上路由器可以看成是一种针对 IP网络路由需求而设计的专用计算机。随着因特网所承载的业务的演进 ,因特网对于路由器性能的要求也日渐提高。在交换式路 看看这一篇 文章编号: 100429037 (2003) 0420450205一种基于通用操作系统的交换式路由器操作系统实现潘 登, 徐佩霞(中国科学技术大学电子工程与信息科学系, 合肥, 230027)摘要: 提出了一种将通用操作系统及其上层路由软件移植到交换式路由器平台上的方案。此方案可以向上屏蔽交换式路由器与传统的路由器体系结构上的区别, 从而把通用操作系统及其上层路由软件移植到交换式路由器的平台上; 同时兼顾数据通信和管理维护方面的需求, 为上层路由软件提供了与传统路由器相同的接口, 从而使基于通用操作系统的路由软件可以在不损失可升级性的条件下快速移植到交换式路由器上。实际应用证实了该方案具有良好的灵活性和兼容性。关键词: 交换式路由器; 通用操作系统; 路由器操作系统中图分类号: TN 915105; TP393 文献标识码:A 基金项目: 国家863 计划(8632317201299) 资助项目 收稿日期: 2003203229; 修订日期: 2003206215Switch Router Operating System Based ona General Operating SystemPA N D eng , X U P ei2x ia(Department of Elect ronic Engineering and Info rmat ion Science,U niversity of Science and Techno logy of Ch ina, Hefei, 230027,Ch ina)Abstract: A new so lu t ion to po rt general operat ing system s and their rou t ing sof tw are tosw itch rou ter is p resen ted. The so lu t ion sh ields the arch itectu re difference betw een t radit ionalrou ter and sw itch rou ter to app licat ion level sof tw are, thu s it may suppo rt general operat ingsystem and their rou t ing sof tw are on sw itch rou ter p latfo rm. The so lu t ion is also con sidered asrequ iremen t s of bo th data commun icat ion and con t ro l funct ion s. A nd same w ays of the accessand con t ro l of the rou ter are p rovied as t radit ional rou ter, so rou t ing sof tw are of the generaloperat ing system may be po rted to sw itch rou ter p latfo rm rap idly w ith the upgradeab lef lex ib ility. P ract ical design app roves that the so lu t ion has a good compat ib ility and f lex ib words: sw itch rou ter; general operat ing system; rou ter operat ing system引 言路由器最重要的工作是根据IP 包头和路由、过滤规则转发IP 包。其他功能还包括路由表的维护与路由器系统的维护。实际上路由器可以看成是一种针对IP 网络路由需求而设计的专用计算机。随着因特网所承载的业务的演进, 因特网对于路由器性能的要求也日渐提高。在交换式路由器中, 包转发等绝大多数处理已经转移到以端口为中心的硬件中完成, 只有路由规则的生成与维护、网络管理和系统维护等比较复杂的工作仍由软件部分完成。实用中路由器所采用的操作系统可分为三大类: (1) 以Cisco 的IO S 为代表的专用操作系统, 常见于网络骨干节点; (2) 以V xWo rk s 为代表的嵌入式系统, 常见于小型办公ö家用接入设备上; (3)采用通用操作系统的则在骨干节点和用户接入设备上都有这类设备。例如Jun iper 的路由产品就采用L inux 作为操作系统。通用操作系统上的各种路由、网管软件的开发已经有相当长时间, 其功能、性能、稳定性和升级灵活性都很优秀, 但这些软件仍第18卷第4期2003 年12 月数据采集与处理Journal of Data A cquisit ion & P rocessingVo l. 18 No. 4Dec. 2003然是针对传统路由器体系结构开发的, 无法直接应用于新的路由器体系结构。本文提出在通用操作系统的驱动栈中插入一个中间层, 这样对系统内核及和运行在其上的路由、网管等上层软件屏蔽了下层硬件的特殊性, 从而把上层软件和高速硬件平台结合起来。该方案已经应用于高速边缘路由器中, 并表现出了良好的实用性和可扩展性。1 交换式路由器与传统路由器在体系结构上的差别路由器工作在网络的第三层, 其处理工作主要涵盖七层模型中的下三层, 包括: 物理接口处理、数据链路层处理、网络层的路由查找、转发以及队列管理等[1 ]。在传统的路由器体系结构中, 硬件部分只实现物理层的处理, 其余工作需要消耗系统计算资源完成: 包括CPU 周期、内存容量和总线带宽等, 因此性能也受限于这些资源。而在交换式路由器中, 路由处理机仅处理系统维护、路由表维护等少量工作, 数据流的处理都由相对独立的硬件完成, 不再受限于系统计算资源, 因此其性能远优于传统路由器[2 ]。如图1 所示。(a) 传统路由器体系结构(b) 交换式路由器体系结构图1 路由器的逻辑结构 传统路由器和交换式路由器在体系结构方面有明显的区别: 在传统路由器中, 所有的物理接口直接挂接在总线上, 内核可以通过总线直接访问这些接口; 而在交换式路由器中, 只有控制卡是直接挂接在总线上的, 内核必须通过控制卡间接访问各个接口。这导致操作系统内核中代表网络接口的驱动对象的区别: 在传统路由器中, 内核存在若干网络设备驱动对象实例, 每个实例通过总线直接维护一个端口, 为内核及其上面的上层软件提供基本操作支持。而在交换式路由器中, 普通的网络设备驱动对象无法直接维护端口, 也无法支持系统内核和上层软件操作。因此, 交换式路由器体系结构的特殊性使得通用操作系统和上层软件无法直接应用。针对这个问题有两种解决办法: (1) 大量修改内核和各种相关软件的源代码以适应新的体系结构。这种做法存在开发工作量大、周期长、局限性强的缺点, 丧失了使用通用操作系统的灵活性; (2) 在驱动栈中增加一个中间层, 支持普通网络驱动对象所能支持的一切操作, 这样系统内核和上层软件基本上不必修改就可以运行在交换式路由器上。这就是本文所提出的中间层方案。这种方案克服了第一种方法的复杂性, 在保持灵活性的基础上, 可以快速地把通用操作系统及上层软件移植到交换式路由器的硬件平台上。2 中间层设计中间层功能包括数据通信和控制两个方面。从数据通信方面考虑, 每个端口的功能都等效于传统路由器中的一个网络接口, 所以每个物理端口在内核中都应有对应的网络驱动实例。这样才能支持各种上层软件运行, 满足数据通信功能的需要。从控制功能方面考虑, 对上要把每一种可能的逻辑操作映射成硬件操作; 对下要能够和多个设备通信。上层应用包括系统维护、路由软件、网管软件; 下层设备包括处理引擎和端口。控制功能的具体实现和硬件平台有关。考虑到多种应用可能同时操作一个硬件设备, 一种应用也可能同时操作多个设备, 在实现时必须考虑到对于多并发操作的支持。基于上述考虑, 中间层由控制卡驱动模块和若干网络驱动实例组成。在图2 (a, b) 中分别给出了传统路由器的结构与驱动方式以及本文所提出的中间层所处的位置与驱动方式。第4 期潘 登, 等: 一种基于通用操作系统的交换式路由器操作系统实现451图2 中间层的位置与驱动方式 控制卡驱动模块作为中间层的核心, 维护控制卡上所有的端口、内存映射、中断和循环缓冲队列资源。它实现了数据通道和控制通道。对下直接驱动控制卡、与各个端口、处理引擎通信; 对上, 一方面通过内核调用陷阱方式提供控制通道接口; 另一方面向虚拟网络驱动实例提供数据通道接口。虚拟网络驱动实例在操作系统内核为各个物理端口实现网络驱动实例。它们工作在控制卡驱动模块的基础上, 并不直接控制硬件, 故称为虚拟网络驱动实例。虚拟网络驱动实例封装控制卡驱动模块提供的数据传输功能, 并为内核和上层软件提供与普通网络驱动实例相同的调用接口。下面分别给出数据通道和控制通道的实现方案。211 数据通道的功能与实现虚拟网络驱动实例和物理端口是一一对应的。内核数据收发的功能包括3 个方面:(1) 发往某虚拟网络驱动实例的数据包应该由其对应端口输出;(2) 这个端口所收到的包也通过该虚拟网络驱动实例向系统内核提交;(3) 中间层也可以对虚拟网络驱动实例进行流控操作, 以避免因拥塞导致数据丢失。注意到图2 (b) 中的交换结构以定长信元交换数据, 其格式如图3 所示, 其中信元头占4 字节, 包括处理引擎号和端口号域。对于收ö发信元, 处理引擎号和端口号分别为该信元的源端口的和目的端口的对应值。根据图2 (b) 所示的系统结构可知: 由处理引擎号和端口号可以确定端口的物理位置。控制卡驱动模块在其内部的驱动信息数组中维护虚拟网络驱动实例和端口之间的对应关系。图3 数据信元结构发送数据时, 虚拟网络驱动实例从内核网络部分获取待发送的数据, 偕同指向该实例自己的指针一起提交给控制卡驱动模块。一方面, 控制卡驱动模块通过这个指针可以对虚拟网络驱动实例进行流控设置; 另一方面, 控制卡驱动模块根据虚拟网络驱动实例指针查驱动信息表得到目标端口物理位置信息, 包括处理引擎号和端口号。端口物理位置信息将被填充到所有用来承载待发送数据包的信元头中。控制卡驱动模块通过控制卡把信元送到交换结构, 而交换结构和处理引擎分别根据处理引擎号和端口号将信元转发到到目标端口。最后端口从接收到的信元中恢复出原始数据发出。接收数据时, 端口也会将数据拆分到若干信元中逐级上传。考虑到交换结构的循环优先机制, 一个数据包上传的过程可能被来自其他端口的数据抢断。所以控制卡驱动模块对于接收到的信元按源端口位置信息(包括处理引擎号和端口号) 保存到不同的缓冲区中。当接收到该数据包相关的全部信元, 控制驱动模块即可重组该数据, 并根据源端口位置信息查驱动信息表以得到指向该端口对应虚拟网络驱动实例的指针, 进而激活该虚拟网络驱动实例接收数据。虚拟网络驱动实例从控制卡驱动模块中获取数据后, 按照网络驱动的常规方式调用net if- rx 接口向内核提交数据。数据收发实现结构如图4 所示。值得注意的是, 在交换式路由器中, 处理引擎通过交换结构交换的是IP 包; 而通用操作系统中452 数据采集与处理第18 卷图4 数据收发实现结构网络驱动通常处理链路层的帧。即控制卡驱动模块数据通道对上对下的数据格式是不同的。因此, 在发送数据时控制卡驱动模块需要从得到的链路帧中提取IP 包再转发到端口; 而接收数据时则对来自端口的IP 包进行链路帧封装再向上提交。以以太网为例, 需要恢复的包括源和目标站的物理地址、载荷类型和帧校验[3 ]。对于承载IP 包的以太帧, 显然其目标站物理地址和载荷类型[4 ]都是已知的。实现时采用的操作系统是L inux, 通过在虚拟网络驱动源代码中进行设置可以使内核不进行帧校验[5 ]。所以只有源站物理地址未知。如果要求硬件给出真实的源站物理地址, 则增加了硬件的复杂度; 而若在控制卡驱动模块中伪造源物理地址, 则可能导致内核的ARP 管理混乱。为简化硬件设计, 实现时采用了在控制卡驱动模块中伪造源物理地址的办法, 同时修改虚拟网络驱动源代码, 重载帧头处理函数[6 ]。这样内核ARP 表就不受伪造地址的影响, 其获取和刷新通过查询端口ARP 记录实现。212 控制通道的功能与实现控制功能的通信也是基于信元的, 其操作包括维护管理和表同步两类。维护管理主要是进行各种查询, 通常通过若干次双向通信完成。每次通信有效载荷都只有几个字节, 由一个信元即可承载。而表同步则是将上层软件维护的表复制到相关硬件中, 包括ARP 表、路由和分类表等。表同步操作涉及大量数据传输, 需要由多个信元承载。控制功能都是针对设备进行的, 所以在控制ö反馈信元中也必须包括目标设备的物理位置信息。在实际运行期间, 所有的上层应用和设备之间的控制通信复用控制通道, 其特点为:(1) 不同的应用可能同时访问同一设备;(2) 一个应用也可能同时访问多个设备;(3) 同一应用对于同一个设备的操作一般都是顺序的。为支持这种复用操作, 所有承载控制信息和反馈信息的头部除包括目标硬件的物理位置和操作指令外, 还包括命令类型、应用类型信息。控制ö反馈用信元结构如图5 所示。图5 控制ö反馈信元结构图5 中: 处理引擎号和端口号, 确定设备的物理位置; 收ö发信元分别为该信元的源端口的和目的端口的对应值; 命令码在设备和应用之间定义。每种可能的操作分配一个代码; 应用码在控制卡驱动模块和上层应用之间预定义。每种可能的应用分配一个代码。这些应用包含网管、路由维护、硬件维护和ARP 信息获取等。上层应用通过内核调用陷井( IOCTL ) 发起控制通道操作, 同时给出目标设备物理位置、命令类型代码和应用类型代码。控制卡驱动模块把这些信息填充到控制信元中再将其发往设备。设备把这些代码直接复制到反馈信元中, 再在后面追加上反馈信息。控制卡驱动模块为每一种应用分配一个循环缓冲区, 把收到的反馈根据应用类型排入相应队列中。上层应用从其所对应的循环缓冲区中读取反馈信元, 然后根据信元中的物理位置信息、命令码就可以确定该反馈对应的原始命令, 从而对反馈数据进行适当处理。这样就实现了各种控制功能对控制通道的复用。如图6 所示。第4 期潘 登, 等: 一种基于通用操作系统的交换式路由器操作系统实现453图6 控制通信实现结构3 结 论鉴于传统路由器体系结构和交换式路由器体系结构的区别, 通用操作系统及在其上开发的路由软件无法直接应用于交换式路由器。本文提出的中间层方案可以有效地解决这个问题。该方案全面考虑了数据通信和管理维护方面的需求, 为上层提供了与原有模型基本相同的接口, 并使得路由软件在不损失其灵活性和可升级性的条件下直接应用于交换式路由器中。虽然该方案只是在特定的平台和特定的操作系统上得到了实现, 但是不难看出, 这种思路对操作系统并没有特殊的依赖性, 完全可以移植到其他通用操作系统上。本文提出的方案已经在国家863 项目实用化综合接入系统的高速边缘路由器的研制中取得了良好的实际效果。本文为国产高性能路由器的软件开发提出了一种高效快捷的解决方案, 该方案具有良好的应用前景。参考文献:[1 ] Kuro se J F, Ro ss KW. Computer netwo rk ing: a top2dow n app roach featuring the internet [M ]. A ddisonW esley Longman′s P ress, 2001. 332~ 341.[ 2 ] 梁阿磊, 等. 路由器体系结构及其发展[J ]. 小型微型计算机系统, 2001, 8: 943~ 945.[3 ] M edia access cont ro l frame st ructure [S ]. IEEE Std80213, 1998. 36~ 40.[ 4 ] Charles Ho rnig. RFC 894: a standard fo r the t rans2m ission of IP datagram s over Ethernet netwo rk s[S ].198411~ 2.[5 ] Bovet D P. U nderstanding L inux kernel[M ]. O reil2ley P ress, 2002. 683~ 685[ 6 ] Rubini A. L inux device drivers. 2nd edit ion [M ].O r2eilley P ress, 2001. 455~ 458作者简介: 潘 登(19772) , 男, 博士研究生, 研究方向: 网络体系结构、网络安全, E2mail: pandeng@mail. ustc. edu. cn;徐佩霞(19412) , 女, 教授, 博士生导师, 研究方向: 音频视频编码、非线性处理、下一代网络。454 数据采集与处理第18 卷
The computer is a product of advanced civilization and its invention, according to some people, signals the advent of a Second Industrial Revolution. Formerly a bulky machine that demanded much space, the computer is now becoming smaller and smaller and scientists have made it more sophisticated and accordingly more useful. As is generally known, the computer can do a wide range of work, including complex computation and analyses. People now also use it as a teaching aid in designing. An infinite variety of software can be put into the computer, which explains why it is so powerful. There is, however, one thing which we should bear in mind: that the computer cannot think but man can. So there need not be any fear that someday the computer will control us and all we should expect is try our best to bring it to perfection. A computer age is not a pipe dream and there will come a day when most of our needs can be met by this wonderful machine.
计算机英语是学习计算机新理论和新技术的桥梁。计算机英语教材的主要目标是培养计算机及其相关专业学生使用本专业英语的能力。下面是我为大家整理的计算机英语论文,供大家参考。
计算机英语论文范文一:计算机英语教学实训设计研究
1高职高专计算机英语的特点
时效性和实用性
新技术飞速发展,大量的计算机专业概念专业词汇随着新技术的发展层出不穷。如ITinformationtechnology;online;E-merce等都是随着新技术的发展产生和应用的,因此它的时效性和实用性显而易见。
专业性与客观性
计算机专业文章一般重在客观地陈述事实,力求严谨和清清楚,避免主观成分和感 *** 彩,这就决定了计算机英语具有客观性。
专业术语多
如:CPUCentralProcessingUnit:中央处理器;DBSMDatabaseSystem资料库管理系统OperatingSystem作业系统.
缩略语经常出现
如:MBMotherBoard:主机板,LCDLiquidCrystalDisplay:液晶萤幕USBUniversalSerialBus:通行序列汇流排;
合成的新词多
如:input出入;output输出;Personalputer:个人计算机;
介词短语、分词短语和名词性片语和长句使用频繁
如:Someapplicationpackagesofferconsiderableputingpowerbyfocusingonasingletask,suchaswordprocessing;others,calledintegratedsoftwareoffersomewhatlesspowerbutincludeseveralapplications,suchasawordprocessor,aspreadsheet,andadatabaseprogram.有些应用程式包可就一个单项任务提供相当的计算能力,如文书处理;其它应用程式包,称为综合软体,计算能力略差但也包括了很多应用功能,如:文书处理器,电子表格和资料库程式等。
2如何开展高职高专计算机英语教学和实训
“加快现代职业教育体系建设,深化产教融合、校企合作,培养数以亿计的高素质劳动者和技术技能人才。”是发展职业教育的指导思想。高职高专IT职业英语的任务就是要培养既有一定IT专业技术技能,又有较强的外语水平的高素质人才。
合理的课程安排
高职高专《计算机英语》主要针对高职院校的计算机各专业学生开设,是计算机专业学生学好计算机专业课程的一门重要工具。为软体技术,资讯管理,物联网技术,等专业方向的学生必修课。
实用的高职高专计算机英语实训内容
通过计算机英语教学内容的学习,使学生掌握电脑科学相关硬体和软体以及相关计算机技术的英语表达方式,并运用到实践中。在实训时,学生应能够运用所学的计算机英语知识,根据看到的硬体装置实现口头表达,以及借助相关工具书和翻译软体,对与自己专业相关文献和应用软体,实现书面表达。了解上机时常见的提示资讯及解释,根据专业方向能看懂与本专业相关的专业资讯提示。通过本课程实训使学生扫清上机时使用英语软体的障碍,并且使学生具备阅读计算机专业英语书刊的能力,能听懂一般性专业学术报告的能力。
基于专业需求的课程和实训设计
1基于专业需求的课程和实训设计设计理念计算机英语程开发遵循“劳动过程系统化”的先进教学理念,贯穿日常教学中,将理论教学中渗入实训教学环节,提出集专案确定——专案分析——专案策划——专案管理与评估为一体的系统的实训教学模式,以专案驱动来完成知识的内化。在软体技术专业可以侧重SoftwareEngineer的教学与实训设计;网路工程专业则可以加强puterNetworks的教学与实训设计;而资讯管理专业应侧重DatabaseSystem的教学与实训设计。
2基于专业需求的课程和实训设计设计思路计算机英语课程和实训设计的总体思路是:以市场为导向,基于IT行业人员工作岗位基本职责进行教学和实训设计,紧紧围绕各专业人才培养方案实施教学和实训,取舍教材内容,为专业服务。
3基于专业需求的课程和实训设计培养目标根据高职教育的指导思想和培养目标,在更新教学理念和创新教学模式的过程中,计算机英语课程和实训设计,以促进就业为导向,适应技术进步和生产方式变革以及社会公共服务的需要社会需求为出发点,以“实用为主,够用为度”为原则,突出专业特点,突出课程的实用性,适应计算机相应专业需求的,培养具有动手能力和创新意识的高技术人才。计算机英语是一门实用时很强的课程,要求教师具有较强的英语语言知识与应用能力,同时要具备对科技前沿的洞察力,更需要更新教学理念,创新教学模式,注重实训环节。
计算机英语论文范文二:计算机英语课内实践教学研究
1.课内实践教学多元化
“任务驱动”教学方式
对于该课程,课内实践教学的目的是为了充分发挥教师的主导作用和学生的主体作用,因此,采用“任务驱动”的方式可以较好的激发学生的积极性。“任务驱动”指的是学生在学习过程中,在教师的帮助下,围绕一个共同的任务为中心来完成,在这个过程中,学生会通过任务的程序获得成就感,可以较大地激发他们的积极性,逐步形成一个良性回圈,从而培养学生独立思考和自主学习能力。该门课内实践教学结合任务驱动的方式,已经采用的是让学生选择自己感兴趣的某个IT领域技术方向,运用文献检索方法,自行查询英文文献并阅读翻译,在课堂上用英文对其作报告,并制作英文PPT加以展示,并新增现场提问的环节,培养学生用英文进行学术答辩的能力。通过在课堂上使用这种实践方式,已取得了较好的效果。
其他多元化的任务方式
除了培养学生英文文献检索、学术报告的能力之外,应用型本科IT专业学生是未来IT行业的建设者之一,该课内实践教学还要考虑市场需求的因素。在IT行业中,企业对员工专业英语能力的需求是必要且多样化的;如测试、编码等初级职位员工只需要阅读使用者介面、操作说明等英文文献的能力;而对于技术研究等中级职位,不仅需要阅读能力还要求掌握一定的翻译技能、回复英文邮件等;在更高级别的工作如订单签订、专案谈判等事务中,则需要具备听、说、读、写、译各方面的综合能力以及跨文化交流能力。因此在今后的实践教学中,计划新增多样的任务方式,如设计一些具有很强实践性和实操性的活动,全方位训练和提高学生面向行业、企业岗位需求、在真实工作环境中的英语交际能力、应用能力和学习能力。比如训练学生英文简历的撰写,再设计情景对话,让学生分小组扮演IT公司面试官和应聘者角色,对职场招聘进行场景模拟,学习和应用计算机英语知识和口语表达能力。不仅如此,在工程实践中,软体企业开发人员常常需要编写英文版本的软体需求文件和使用者指南,因此还可以考虑与软体工程的课程老师合作,在学生进行课程设计时编写英文版本的软体需求规格说明书。
灵活布置作业
作业也是实践教学的重要补充,对于作业一定要布置一些实用有意义的内容,这样学生才会主动而非被迫地去做;关于这方面教师要充分利用自己积累的学习和工作经历。比如根据笔者学生时期的应聘经验,可以告诉学生大中型IT公司的软体开发职位招聘的笔试题很重视动态记忆体方面的内容,有相当比例该方面的试题,也具有一定难度,而很多中文教材关于此方面的内容往往讲解的不够详实,而英文教材文献六的“PointersandDynamicMemory”这一节对动态记忆体的思想介绍的较清晰,通过此类方法抓住学生的心理,吸引学生主动地去学习,这样不仅训练了计算机英语,又提升了学生应聘的竞争力。此外,一定要让学生体会到利用网路资源来促进学习和交流的重要性。可以鼓励学生登陆各大著名IT外企的网站,上面会经常地提供其新技术和新产品宣传的英文视讯和动画。这类视讯短片直观而形象,学生不但学习了新技术和新词汇,同时还锻炼了听说能力,学习兴趣也会大大提高。还可以引导学生平时多关注外企网站上的招聘广告,本专业领域的产品说明书等,上面有大量描述本专业技术的计算机英语,这对培养学生的实际应用能力有很大的帮助。
2结语
该文分析了计算机英语课内实践教学对于IT应用型人才培养的必要性,并结合该研究者本身的经验体会,探讨了一些关于该课程的课内实践教学方式,通过在教学实践中使用这些方式,已取得了较好的效果。计算机英语是专业课和英语课的有机结合,具有很强的实用性。课内实践教学应合理采用多种有效的教学方法和多元化教学模式,让学生通过该课程的学习,进一步提高专业英语听、说、读、写等水平,培养综合素质,从而提高了就业竞争力,才能真正发挥该课程的作用。
wsgakwaldas ksaowaiidiwqiaoid;;;adkquajdjwhhhadkammhcamcnaxandadhwajsdhajbsdjagdhbagjwdgahdyuagdbgjagdjagdayuhdbgahdgajshgdagdhyagdhawhdgahutdfyuh cgabuey nkawywd uiahdiuayh kqaby uiahdkuaydiuh uisy bai....kaodkaodkaokdaokdakdao '''''ajdhajdhadhak////'''''akldajkdjadjajkydwuihayusdaw;;;;;aduawkjaiusjdj aiudiaj ioueio jasiod aw asd a ad
英语求职简历范文:Directions:You are applying for a job. please writing a resume to HR to describe:1) your objective2) work experience3) Educational Background4) personal informationRESUME204 APT 2 ALLEY 328 YONGJIA RE TEL:64308991SHANGHAI 200020,PRCEMALL:kalunz@ Objective:A position of management job potential in the banking department specializing in Foreign changeWork Experience:July 2001 to××× Secretary to deputy manager of marketing●draft business correspondence●keep and update files●Schedule deputy manager's appointmentsAugust 1999 to ×××Co. , 2001Receptionist●Telephone communication●greeted clients●manage correspondenceMarch 1998 to ×××Industrial BankMay 1998 InternEducational Background:Sept 1994 toShanghai×××University,Bachelor Degree in International Business ManagementJuly 1998Major in International Business Management●key courses including English, Japanese,Computer Operation, Business Management,InvestmentInternational Commercial LawSept 1988 to Shanghai×××High SchoolJuly 1994Personal Information:male, born in Shanghai, 11/12,1970, unmarried, healthyReferences available upon request.这是大概格式,你把想说的话往里套就行了,如果照搬照抄经理会发现的。祝你好运!
《计算机仿真》,《计算机测量与控制》,《计算机工程与应用》。内容简介:
计算机三大顶级期刊以应用为中心、以微处理器为基础,软硬件可裁剪的,适应应用系统对功能、可靠性、成本、体积、功耗等综合性严格要求的专用计算机系统。
计算机三大顶级期刊一般由嵌入式微处理器、外围硬件设备、嵌入式操作系统以及用户的应用程序等四个部分组成。
相关信息:
操作系统是管理、控制和监督计算机软、硬件资源协调运行的程序系统,由一系列具有不同控制和管理功能的程序组成,它是直接运行在计算机硬件上的、最基本的系统软件,是系统软件的核心。操作系统是计算机发展中的产物,它的主要目的有两个:
一是方便用户使用计算机,是用户和计算机的接口。比如用户键入一条简单的命令就能自动完成复杂的功能,这就是操作系统帮助的结果。
二是统一管理计算机系统的全部资源,合理组织计算机工作流程,以便充分、合理地发挥计算机的效率。
1.《计算机工程与设计》
中国航天科工集团第二研究院706所主办,月刊,影响因子,相对来讲比较好中。征稿范围:计算机网络与通信计算机网络与通信、计算机辅助设计及图形学、多媒体技术、数据库、并行处理、人工智能、计算机软件工程、计算机硬件体系结构、计算机新技术应用及其他计算机相关领域。
2.《计算机辅助设计与图形学学报》
中国计算机学、北京中科期刊出版有限公司主办,月刊,影响因子:,它是我国CAD和计算机图形学领域第一个公开出版的学术刊物。栏目设置主要有:综述、图形算法与技术、虚拟现实与计算机动画、图像与图形的融合、VLSI设计与测试及电子设计自动化。
论商务英语复合应用型人才的培养 [论文摘要] 在全球一体化的大背景下,贸易往来日益频繁,对具有商务英语专业技能的人才需求越来越大。本文从行业先导和工学结合这两个方面,分析如何培养集技能与专业技能于一体的复合型涉外商务英语应用型人才。 [论文关键词] 商务 行业先导 结合 一、商务英语专业的人才培养目标 商务英语专业培养出来的人才应具备从业的基本素质和能力,适应开放的外向型企业开展商务活动对专业人才的要求。通过对语言基础课、语言技能课的学习,打好坚实的语言基础。通过商务知识、商务技能课的学习掌握一定的商务知识和技能,能听懂外商一般的商务洽谈,能使用英语和外商进行一般的业务洽谈和交流,能读懂外商的信函业务单证和文件等,能用英文书写一般的商务文书。具体来说定位于业务员、外销员、跟单员等具备从事国际商务业务工作上岗资格和能力的专业人员。 二、行业先导、工学结合的人才培养模式 我国高等院校,尤其是高职高专院校,在改革浪潮的推动下,纷纷探索订单式人才培养办学模式,取得了一定的成绩。高职院校的商务英语专业在订单式人才培养,校企协作完成教学计划,校企共创考核方式等方面正在做着尝试,有了初期的理论探讨和实践基础。在教改和实践创新基础上,我们滨州职业学院进行了大胆的商务英语人才培养模式的改革,采用了“语言能力+商务和操作能力+行业知识技能”构成的商务英语行业人才培养模式。本培养模式以高职高专政策和为导向,以高职高专教改和教学实践为基础,深入探讨和实践高职高专商务英语人才培养创新模式。 这种行业先导的人才培养模式立足于“行业先导”的理论研究和实践思路,在商务英语专业传统的“语言能力+商务管理知识+商务操作能力”的复合型人才培养的基础上加上行业知识技能和特色,创建以“语言能力+商务管理和操作能力+行业知识技能”为核心的崭新行业人才培养模式,创建了以就业为主导、以行业知识技能为特色的商务英语专业行业人才培养新路。 在工学结合人才培养模式中,应重视实践教学基地建设,形成以行业发展的先进水平为标准,以专业发展实际为依据,以校内实训基地为基础,以校外实训基地为重要补充,校内校外有机结合,构建全方位的工学结合平台,有力地促进人才的培养,形成与行业一线单位合作的有效机制。 1.校内实训基地的建设 首先,可以在实训室安装国际贸易实务平台,引导学生进行逼真的商务活动模拟训练。每位学生都拥有一家自己创办的模拟公司,独立在网上虚拟从事国际货物买卖交易。学生在主动学习和实践的过程中,可以逐步养成敏锐的意识、良好的商业交往能力以及快速应变、理性分析的综合能力。教师在模拟实习中主要通过系统的教学设计、有目的地不断创设仿真商务场景,促进学生对已掌握的英语知识和国际商务知识和技能的综合运用和深度运用。 其次,还可以建立校内模拟实训室.让学生多接触外贸企业中真实的献如一些单证、说明书、手册、专利、、广告等。对于一些常见应用文体如通知、商业函件、个人、合同等,要求学生能做到填得出,写得好。 最后,成立专业教学委员会,为加强专业教学和,促进专业建设与发展,学校可以聘请企业界的管理人员、专家和行业协会的代表担任委员,成立商务专业教学指导委员会,定期举行会议和考察,商讨专业的发展方向,提出建设性的意见,审定专业教学计划,协调管生实训,指导学生就业。 2.校外实训基地的建设。 首先,校外实训可以是到基地参观、请基地人员现场教学等。校外实训可以安排学生利用寒暑假到企业进行专业认知实习和岗位认知实习,如有能力还可担任兼职业务员,指定老师加强指导,组织优秀学生参与实践,为就业做好充足的准备。 其次,注重加强校外实践基地建设,校外实训基地建设可使学生“零距离”接触生产、建设、服务和管理第一线。实训基地的建设,必须加强与企业的联合,与产业的结合,与的融合,保证其科学先进性,使学生和受训者参与生产、建设、管理和服务等的实际运作,通过实践使受训者更深刻地了解并准确把握岗位技能、要求、社会、环境和企业运作管理模式等。校外实践基地是人才培养的重要基础。要充分挖掘资源,与企业加强联系,只有形成以就业为导向,以行业、企业为依托的校企合作、产学结合的模式,才能培养出真正意义上的复合型、应用型人才。 三、结束语 对于商务英语这个较新的专业,要紧紧围绕培养复合应用型人才的目标,采用行业先导、结合的人才培养模式,把握实践性和实用性的专业特色,坚持英语交际能力和商务知识、商务操作技能并重的原则,就一定能够将商务英语专业办出特色、办出水平,培养出有特色、高素质的复合应用型商务英语专业人才,实现可持续发展。 参考文献: [1]刘春林:创新高职商务英语人才培养模式[J].《中国成人教育》,2007,(7) [2]王金洛:“工学结合”英语人才培养模式的探讨[J].《广东农职业技术学院学报》,2008,(2) [3]杨筱玲:高职商务,旨在培养应用型人才[J].《市场现代化》,2007,(6) [4]彭述初:关于高职商务英语专业人才培养的几点思考[J].《湖南冶金职业技术学院学报》,2008,(3) [5]陈梅:高职商务英语人才培养新模式的构建[J].《中国成人教育》,2008,(3)商务英语翻译的文化适应性问题探析内容摘要:随着世界经济一体化趋势日渐明显,国家、地区之间联系紧密化态势不断增强,商务英语在经济组织交往活动中日益发挥重要作用,如何有效利用商务英语实现经济组织交往的无缝对接成为亟待解决的难题。本文立足商务英语翻译现状,以企业文化理论为分析背景,以企业文化适应性特征为切入点,探讨了商务英语翻译过程中的文化适应性问题,以期为商务英语翻译工作提供有益借鉴和参考。 关键词:商务英语 翻译 文化适应性 商务英语翻译问题概述 从某种意义上讲,国家间、地区间经济交往的实质是国家文化、地区文化的互动、交流与接触。在不同文化的交互过程中,首先面临的问题就是弱化和消除文化障碍,实现文化沟通和交流。英语作为国家间、地区间经济交往和商务往来的有效工具,具有存在形式的多样性与表达方式的多样性等特点,这些特征不仅反映着国家、地区间文化的差异性,也影响着商务英语翻译的准确性。因此,商务英语翻译必须注重国外企业与本国企业之间的文化差异。 作为一种社会存在,文化环境是一个不同区域、行业、特征和性质的文化交织影响、能动渗透的有机能动场,尤其是其中的文化传统有着较强的波及力和辐射力,会对社会生活的诸多方面造成影响效应,商务英语翻译也不例外。企业文化是企业在长期发展演化过程中形成的历史产物,是社会文化在企业组织管理实践中的折射,也是西方管理理论在经历“经济人”、“社会人”、“自我实现的人”与“复杂人”假设之后,对组织的文化价值、经营理念、管理过程和未来经营业绩关系的又一次重新审视。企业文化渗透于企业的一切活动中,又流溢于企业的一切活动之上,既是企业组织的基因和灵魂,也是企业持续发展的潜在动力和重要保障;既是制度性和非制度性、绝对性和相对性的辩证统一,也是批判性和继承性、稳定性和动态性的有机结合。商务英语翻译过程中的文化适应,应关注和把握以下三个方面: 重视商务英语翻译的外部环境 密切关注国外企业文化的最新成果,充分考虑商务英语翻译的外部环境。随着我国企业改革的深化、国内市场经济进程的加快和经济全球化趋势的推进,东西方文化的交流渗透成为不可逆转的历史潮流,学习市场经济国家先进的企业文化逐渐成为培育和创新我国企业文化的重要途径。但实事求是地分析,对如何借鉴、学习、吸收和内化国外先进企业文化成果在商务英语翻译过程中的适应性、可移植性等关键问题,并没有从理论上、学术上加以明确描述和科学阐明。目前,商务英语翻译过程中对待国外先进企业文化或多或少、或轻或重存在以下方面的不足: 局限和满足于介绍和翻译,而忽视根据本土社会特殊的文化背景、文化特征进行商务英语翻译,以及对国外先进企业文化的吸收、修正和创造性地应用。 忽视文化盘点,即忽视国外先进企业文化的制约性,不注重原产地文化与本土文化的差异性与共同性分析,在商务英语翻译过程中未从方法论角度把握其来龙去脉,缺乏对国外先进企业文化成果深层次的文化学透视。 缺乏对我国本土文化独特性的准确认识,未经系统科学地分析就直接从国外先进的企业文化中演绎出各种关于商务英语翻译的手段、设想、方式与模式,企图在较短的时期内来完成商务英语翻译工作。实践证明,单纯考虑国外企业文化,不会产生与国内企业商务交往活动的英语翻译理论及实践操作方式,也不会促进国内企业商务活动的持续、深入和有效地开展,反而给企业商务交往与活动的有效开展带来很大障碍,造成企业生存力、发展力和竞争力的巨大破坏。 把握国内外企业文化之间的内在耦合性与本质差异性 事实上,在商务英语翻译过程中一个非常重要而又往往被忽视的环节就是文化的适应性。当然,文化适应性的观点决不是否认不同商务英语翻译的相互借鉴和学习,但国外先进企业文化不能原封不动地渗透到商务英语翻译过程中,商务英语翻译必须注意文化适应性问题。国内外众多专家学者的研究表明,东西方管理文化存在诸多方面的差异,彼此各有优势,很难找到一条客观、有效的商务英语翻译标准。对于商务英语翻译过程中存在的一些现象和问题,究其本质是由国内外企业文化之间的内在耦合性与本质差异性所致。因此,在我国企业商务英语翻译过程中一定要注意文化适应性问题,注重跨文化的比较研究,反映国外企业文化特性,才能更好的造就企业商务英语翻译在企业商务创新实践中实现实质性转变和历史性飞跃。本文认为,商务英语翻译的首要前提应该是注重国内外企业文化之间的内在耦合性与本质差异性,有效体现国内外企业商务活动交往之间的文化适应性。 全面构建商务英语翻译的内部环境 文化适应性作为商务英语翻译能否取得实质性突破的关键要素,说明商务英语翻译要与我国传统文化价值理念相一致。商务英语翻译是体现企业亚文化的一种手段,是社会宏观的大文化在企业中的投射,因而商务英语翻译必须体现出社会的宏观大文化。所以,中国企业商务英语翻译的文化基础就应该是中国优秀的传统文化,中华五千年的历史文化是人类的一种本原文化,是在与各种文化、思想、观念不断碰撞、借鉴和融合的历史过程中积淀而成,是中华民族智慧的结晶与表征。儒家的“仁、义、礼、智、信”思想,道家的“天人合一”思想,“道可道,非常道”的真理追求意识,“无为而治”的管理意识和“有生于无”的创造观以及孙子的“五事七计”以道为首的思想等优秀传统文化,无疑是培育和建构商务英语翻译理论的重要基石。 长期以来,我国商务英语翻译理论缺乏中国特色,究其原因主要是没有把中国传统文化中的思想精华借鉴和应用到商务英语翻译理论中。实践表明,只有建立扎根于现实土壤、具有我国传统文化特色的商务英语翻译,才能使企业发展具备永续的原动力和发展的持久力。例如,海尔的“In Good Faith Forever”,集中反映了德、信、人尊、人与人之间亲和的传统精神在企业文化中的延续,也正是由于海尔把传统文化作为商务英语翻译过程中的一个重要因素和重要组成部分来认识,从无序到有序,从有序到体系,从体系到高度,从高度到延伸,将诸多竞争对手远远抛于身后。 综上所述,商务英语翻译应置于中国的传统文化背景中去深入探讨。研究商务英语翻译与中国传统文化和当代社会文化的关系,商务英语翻译与企业管理、企业环境、企业发展和企业创新的关系等,提出具有中国特色的商务英语翻译理论体系和模式,加强商务英语翻译理论应用、测量、评估、诊断和追踪的实证性研究,从而形成独具特色的商务英语翻译管理模式,推动经济组织交往的无缝对接。 参考文献: 1.赵雪涛,王明辉.浅谈商务英语翻译与文化关联[J].商场现代化,2008(24) 2.杨恕华.商务英语翻译的特点[J].科技信息(学术版),2006(7) 3.刘洁.谈商业广告翻译中的文化对接现象[J].商业时代,2008(36)
随着世界经济的发展,我国与世界各国之间的商务联络越来越密切,商务英语作为经济往来的重要桥梁也越来越重要,商务英语专业发展也越来越引人注目。下面是我带来的,欢迎阅读!
1
韩剧引发相关衍生品销售热潮
A megahit South Korean drama is inspiring Chinese video-steaming website iQiyi to explore e-merce as a new way to grow revenue.
一部韩剧的热播促使中国视讯网站爱奇艺探索新的电商销售模式以提升收益。
The popularity of Descendants of the Sun, which has been viewed a bined billion times online in China, shows how panies can benefit from consumers who want to mimic styles of celebrities.
《太阳的后裔》在中国迄今为止已经取得亿的点选量,这部剧的热播让人们看到公司是怎样从那些想要模仿明星风格的粉丝身上获取利润的。
IQiyi, the official streaming site of the 16-episode drama in China, is seeing sky rocketing sales of items used by actress Song Hye-gyo, whose character is a doctor in the series.
作为这部十六集电视剧在中国的官方独家授权网站,爱奇艺销售的与剧中女主角宋慧乔饰演一名医生同款商品的销量剧增。
The Beijing-based pany, backed by Internet giant Baidu Inc, said the daily sales on its e-merce site jumped by 180 percent in March after it started streaming the drama on Feb 24.
这家由网际网路巨头百度持股总部位于北京的公司称,自从2月24日此剧开播至进入3月份以来,其网上商城的每日交易额已经增加了180% 。
Sales of a Laneige cream from Amore Pacific Corp surged by 10 times and a Daniel Wellington watch by eightfold.
其中,乔妹同款兰芝气垫BB的销量剧增10倍,DW手表销量也升高了8倍。
"The whopping sales figures illustrate there is a huge demand for derivatives of quality content,such as clothing and co *** etics," iQiqi said in a statement.
爱奇艺在一份宣告中称:“销量的巨大攀升证明消费者对于剧中相关衍生物如衣服、化妆品等的需求巨大。”
The pany did not disclose detailed numbers but said Guangdong, Shanghai and Beijing are the top three regions where consumers spend most on buying items used by actors in the drama.
公司虽然没有透露具体的资料,但指出广东、上海和北京的消费者在购买剧中主角同款商品上花费最多。
To enable viewers to do shopping while watching, iQiyi has embedded shopping links into videos so that consumers can get what they want with a simple click of the mouse.
为了使观众可以“边看边买”,爱奇艺在视讯中植入了购物连结,使观众只需轻轻一点就能买到他们想要的商品。
Wang Xiangjun, chief management officer at iQiyi, said: "E-merce is an important part of our efforts to monetize intellectual properties. We will continue expanding our presence in e-tailing by selling products used in popular entertainment shows."
爱奇艺的首席营销官王向军说:“线上商城是我们智慧财产权变现的努力中重要的一部分,我们将继续扩大在明星同款商品零售上的投入力度。”
Chinese video sites are suffering from financial losses as they are paying big checks to purchase quality content.
由于在购买内容版权上的巨大投入,中国许多视讯网站正遭受着亏损。
iQiyi’s arch rival Youku Tudou Inc is also teaming up with its parent pany Alibaba Group Holding Ltd to experiment on video-based e-merce, so as to find new revenue sources beyond advertising and membership fees.
爱奇艺的主要竞争对手优酷土豆公司也在与其控股公司阿里巴巴集团合作试水基于内容的电子商务领域,以开拓除了广告费和会员收费之外的其它收入来源。
Pang Yiming, a senior *** yst at Beijing-based Internet consultancy Analysys International, said South Korean dramas are of great and unwavering appeal to Chinese female consumers.
来自北京易观国际公司的高阶分析师庞一鸣称,韩剧对于中国的女性消费者有着稳定且巨大的吸引力。
2
迪拜乞丐月入47万,网友:求组团
Begging is surely big business. And it has proven to be so in Dubai, where a recently arrested beggar was found making as much as 270,000 dirham around 73,500 . dollars a month.
乞讨可是一笔大生意。在迪拜乞讨就证明了这一点,那里最近逮捕了一个乞丐,发现他的月收入居然多达27万迪拉姆约73500美元,47万人民币。
The beggar was among dozens arrested by Dubai Municipality inspectors, local media reported.
据当地媒体报道,迪拜市政巡逻员逮捕了几十个乞讨者,此人只是其中之一。
Fifty nine beggars were caught during the first three months of 2016, said Faisal Al Badiawi, head of the markets section at the Dubai Municipality, in a statement.
迪拜市市场部门主管Faisal Al Badiawi 在一份宣告中说,2016年前三个月共抓了59名乞丐。
Those arrests were part of a campaign carried out by the municipality in cooperation with the emirate’s police to bat begging in Dubai.
这些逮捕行动是迪拜市与阿联酋警方合作进行的打击乞讨活动的一部分。
“Some of the beggars had passports issued with business or tourist visas,” Al Badiawi told reporters.
Faisal Al Badiawi在接受采访时说,“有些乞讨者是持有商务或旅游签证的。”
“During the campaign, we found that the majority of beggars had entered the country legally with a three-month visa, in order to collect as much money as they could during their time here,” Al Badiawi explained.
Al Badiawi解释说,“在逮捕活动中,我们发现大多数乞讨者都是通过3个月旅游签证合法的‘混’到迪拜,在这段时间他们尽可能多的去赚钱。”
The seizures showed that one beggar was making about 73,500 dollars per month. “More money was collected on Fridays when beggars stood in front of mosques,” Al Badiawi said.
缴获结果显示,一个乞丐每月大约收入73500美元。Al Badiawi 说,“这些乞丐每星期五在 *** 寺门口“开工”时,还有可能赚到更多的钱。”
Local authorities of Dubai have been carrying out year-long operations to bat begging along the city streets.
迪拜当局针对这些街头乞讨者展开了长达一年的逮捕行动。
In 2015, up to 197 begging-related arrests were made during an anti-begging campaign around Ramadan, according to a previous report of Gulf News. Police said street begging affects the city’s security.
据海湾新闻之前的一个报道,2015年斋月期间开展的一次反乞讨运动中,多达197名乞讨者被逮捕。警方称,街头乞讨影响城市的安全。
3
优步境外打车 也可以用支付宝付人民币了~~
Taxi-hailing service Uber and China’s e-merce giant Alibaba Group have agreed a deal that will allow Chinese travelers to pay for a taxi in any country where Uber operates.
打车软体优步和中国电子商务巨头阿里巴巴集团已经达成协议,允许乘客在任何国家的优步服务中用支付宝付款。
It means they can pay for their rides in yuan using their Alipay accounts.
这意味着乘客能通过支付宝账户来用人民币付车费了。
US car sharing service Lyft and China’s Didi Chuxing recently launched a similar service.
美国的另一款打车软体来福车和中国的滴滴出行最近也合作开发了一项相似的服务。
The growth in *** artphone transport services is encouraging firms to build international partnerships.
智慧手机交通服务的进步正在 *** 企业建立国际合作关系。
Before the agreement, mainland Chinese travelers using the Uber app overseas needed to connect a dual-currency credit card with their Uber account and were billed for their journeys in US dollars.
在协议达成之前,中国大陆的游客在海外用优步软体需要用优步账号系结双币信用卡然后用美元来付车费的账单。
Alipay is the online payment service of Ant Financial Services, an affiliate of Chinese e-merce giant Alibaba.
支付宝是蚂蚁金融的线上支付服务软体,蚂蚁金融是中国电子商务巨头阿里巴巴的子公司。
Alibaba is an investor in both Didi and Lyft, on top of its partnership with Uber.
除了和优步有合作关系,阿里巴巴同时是滴滴和来福车的投资者。
Uber said its customers had been able to use Alipay for their journeys in mainline China since 2014 and in Hong Kong, Taiwan and Macau since early 2016.
优步说,他的客户从2014年起就已经能用支付宝在中国大陆和香港付车费了,2016年在台湾和澳门也可以用支付宝付费了。
The San Francisco-based pany said the cross-border payments arrangement would cover mainland Chinese travelers in 400 cities.
优步总部设在旧金山,他们表示中国大陆乘客跨境付账的服务将会覆盖400个城市。
Uber and Alibaba said they intended to expand co-operation in India through Alipay’s links with Paytm, which is India’s largest mobile payment provider.
优步和阿里表示他们准备通过支付宝和印度最大的移动支付平台Paytm的合作关系来扩充套件与印度方面的合作。
Early last year, Ant Financial teamed up with parent pany Alibaba to invest more than $500m 341m in Paytm.
去年早些时候,蚂蚁金融联手母公司阿里巴巴在Paytm投资超过5亿美元亿英镑。
Rival alliances
竞争对手联盟
Didi, and Lyft have also joined forces with ride-hailing apps GrabTaxi in Southeast Asia and Ola in India.
滴滴和来福车也开始与东南亚打车软体Grab Taxi以及印度的打车软体Ola联合。
The four panies have formed a strategic partnership in a bid to pete with Uber.
这四家公司结成了战略性合作关系,力图和优步竞争。
This allows them to share technology and local knowledge.
这使得他们能够分享技术和当地资源。
下面我给大家精选了5篇2014bec高级的写作 范文 ,希望你们喜欢。
商务英语 BEC2014年高级写作范文(1)
Report writing Ex 4: Sample answer: (235words)
Reassessment of job satisfaction: SuePearson(PR Dept.)
Introduction
This report sets out to use Workset colours toassess the accuracy of my job description as PRofficer and to suggest a number of changes.
Findings
It is clear that there is a difference between theway the company views the job and the reality as I perceive it. Firstly, a number of areas whichdemand a significant proportion of my time are not mentioned in the official job brief. Thesegment on the pie chart which provides most cause for concern is the pink sector; this relatesto my attendance at a number of meetings which I can contribute little. Another significantarea is the grey segment; this refers to the unscheduled time I spend sorting out computerproblems. I feel these activities are hampering my core work. As can be seen from the piecharts, the time I spend actively working to meet the goals agreed with my line manager is lessthan envisaged.
Conclusions
The above discrepancies clearly indicate that my current job brief is inaccurate.
Recommendations
I would recommend that my official job brief should be updated using the Workset would also be valuable to consider the proportion of non-core colours in the pie chart andto investigate whether work in these areas could be carried out by someone else more suitedto these tasks.
商务英语BEC2014年高级写作范文(2)
Replying to an enquiry Ex 7: Sample answer: (219words)
Dear Mr Zampieri
With reference to your letter dated 14 June, inwhich you requested information about A Cut Above,please find enclosed details about our company andthe services we offer.
Our aim is always to provide our clients with thebest combination of food, entertainment andlocation. By choosing A Cut Above, you can relaxand enjoy your special occasion while we do all thework. Events catered for by A Cut Above include corporate functions such as conversationsand Christmas balls and also family celebrations such as birthdays, weddings and anniversaries.
A Cut Above offers a variety of services from simply providing a gourmet menu to helpingyou choose the right venue and organise entertainment. We specialise in using our experienceto meet your needs. To help us achieve this aim, we always arrange a meeting with a newclient well before the date of any event in order to discuss the various possibilities.
As you can appreciate, we are unable to give quotations before our initial briefing with aclient as price per head varies with the choice of menu.
To arrange a meeting or for any further information, please do not hesitate to contactmyself or Elena Polidoro on 01623 713698.
A Cut Above looks forward to hearing from you.
Yours sincerely
Sinead Welsh
Describing graphs Ex 4: Sample answer: (132words)
The share price of IBM and AOL showed aupward trend from June until the end , while AOL shares then continued torise steadily over the next three months, the price ofIBM shares fell slightly. By March 1999 both shareswere worth about $100.
AOL shares then shot up, almost doubling invalue within four weeks. They reached a high of $180in mid-April before collapsing to just over $100 pershare at the beginning of May. There was a slightrecovery during that month however, despite this by June 1999 the price of AOL shares wasonce again about $100. In contrast, despite minor fluctuations, IBM shares made a steadyrecovery over the three month period, finishing at just over $100, almost equal to AOL..
商务英语BEC2014年高级写作范文(3)
Suggested answer: (127words)
The last years of twentieth century saw theInternet being used by more and more companies asa business tool. In 1997 e-commerce was verylimited earning a revenue of less than $25 , since then, there has been a steadygrowth worldwide. This trend looks set to continueinto the next century with revenue from e-commerce rising to reach almost $200 billion by2003.
Like e-commerce, e-business has shown steadygrowth with revenue tripling in the period 1997 to 2000, rising from about $50 billion to $150billion. However, during there is predicted to be a far more dramatic increase in e-businessrevenue over the next three years. It is thought that by 2003 revenue from e-business willhave reached over $800 billion worldwide.
..
Business practices in China Ex 3: Sample answer: (244words)
Dear Chen,
I was very pleased to receive your letter. Asrequested, I enclose some advice about visitingMilan.
There are lots of good hotels near the Fiera and Irecommend the Hotel Wagner; it is about a ten-minute walk from the trade fair and also has themetro and train connections. The public transportsystem here is quite reliable and I do not think youneed to hire a car; the traffic in Milan can be a bit chaotic.
Finding somewhere to eat in the evening should be easy. There are plenty of restaurantsand pizzerias near the hotel. My favourite is Nove Cento, which serves excellent seafood pasta.
It is difficult to know what to recommend for sightseeing as the city has so much to you are interested in art, then the world famous ‘Last Supper' by Leonardo da Vinci is a shorttrain ride from the hotel or you could visit the Brera art gallery. There is also the Duomo,Milan's huge gothic cathedral. If you are interested in football, there should be midweek matchfeaturing either AC or Inter Milan. Alternatively, you could visit the fashion area around viaMontenapoleone.
Thank you for inviting me for a meal one evening during you stay. I would be very happyto accept.
I look forward to hearing from you nearer the time. We can then make the arrangementsfor where and when we are going to meet.
Best regards
Maurizio
商务英语BEC2014年高级写作范文(4)
The headhunting process Ex 4: Sample answer: (234words)
Dear Mr Jacobs
I am writing to apply to the position of SalesAdviser for the North East Region which wasadvertised in Herald International yesterday.
Although I am currently working in the MarketingDepartment of a large multinational, I wouldappreciate to work for a rapidly expanding youngcompany such as yours.
As you can see from my enclosed CV, I obtainedan honours degree in Sales and Marketing from Nottingham University in 1994. I thoroughlyenjoyed the six months I spent in working in Boots plc as pert of the course. During this time Igained invaluable insights into the nature of sales. After leaving university I initially spent timeworking for a small local firm before finding my current job and I feel that I am more suited tothe dynamics and varied demands of a smaller firm.
Not only has my experience familiarised me with the challenges faced by the industry todaybut, having been brought up in the north east, I know the region, its problems and itsundoubted potential. As a result, I feel that I would be able to relate to your customers onboth a professional and a personal level.
I am available for interview from 15 September and would be pleased to discuss my CV inmore detail then,
I look forward to hearing from you.
Yours sincerely
A motivation survey
Ex 3: Sample answer: (116words)
Findings
A number of employees clearly suffer from a lackof motivation as a result of dissatisfaction in one ormore areas of their work. The key findings areoutlined below:
Staff feel undervalued by the company, both ona financial and a personal level. It is generally felt thatthe companyˇs competitors offer higher levels ofremuneration. The perception that the managersare unappreciative of staff efforts is particularly noticeable in the Sales Department.
Certain employees feel under-challenged. The company is clearly not exploiting its humanresources.
There appears to be a breakdown of communication in the Production Department. Theconfusion and resultant ill-feeling towards managers has the potential to disrupt theproduction cycles.
Recommendations
We strongly recommend the following measures:
An evaluation of job profiles throughout the company to assess whether skills could beutilised more efficiently
A review of the current salary structure involving the comparison with similarorganisations
It is also essential to investigate and take action regarding the communication in theProduction and Sales Department.
商务英语BEC2014年高级写作范文(5)
Report 工作部门 工作 总结
This report aims at outlining which aspects of our department function most effectively, which ones need improvement and how to achieve an efficient improvement.
First of all, it needs to be stressed out that the majority of the team generally shows a real team spirit, is willing to do his best to prioritize some smooth interactions with customers and is not reluctant to work outside the normal working hours.
On top of that, every member of the team has been carefully selected for his/her excellent qualifications in terms of negotiating skills and communications abilities.
As a result, it came out of the recent survey, conducted with most of our customers, that our department has an excellent image outside the company.
Unfortunately, however, some aspects appear to be less brilliant. As part of our sales force, people spend most of their time on the phone and cannot fit any training course within their schedule. As there is no clear strategy to encourage the employees to attend training courses, they may feel guilty to decide to use part of their working time to get a better knowledge on a computer software for instance.
This being, said, I strongly recommend to define a clear strategy encouraging people to register, at least, to two training courses, each year.
This would help them to understand that, whatever their initial qualifications may be, it may bring benefit to both them and the company to improve them.
商务英语BEC2014年高级写作范文5篇相关 文章 :
1. 最新的关于商务英语BEC信件类作文的优秀范文分享
2. 商务英语邮件写作范文3篇
3. bec商务英语写作范文:通知
4. BEC商务英语中级写作范文及讲解
5. bec商务英语写作1
6. bec商务英语高级难不难
7. bec商务英语高级难度怎样
8. 高级商务英语文本(4)
9. 高级商务英语文本(2)