zoukankan      html  css  js  c++  java
  • 计算机英语翻译100句

    1.Subnotebooks users give up a full size display screen and keyboard in exchange for less weight.

    超轻薄笔记本电脑用户为了较轻的重要放弃了完整的显示屏幕和键盘的标准尺寸,但换来的是重量较轻。

    2.They fall in between microcomputers and mainframes in their  processing speeds and data-storing capacities。

    小型计算机在处理速度和数据存取能力方面介于微型机和大型机之间。

    3.The speed of microcomputer output devices tends to be rated in terms of the number of characters per second (cps) that can be printed----usually in tens and hundreds of cps.

    微机输出设备的速度倾向于用每秒钟能打印的字符数(cps)予以度量,通常为每秒钟几十个、几百个字符。

    4.The purpose of storage hardware is to provide a means of storing computer instructions and data in a form that is relatively permanent,that is,the data is not lost when the power is turned off and easy to retrieve when needed for processing.

    存储硬件的作用是以一种相对持久的方式提供存储计算机指令和数据的方法,即当切断电源时数据不会丢失,且当需要处理数据时又容易恢复。

    5.An electric field causes the molecules to line up in a way that alters optical properties.

    电场使得这些分子排成一行,在某些程度上改变着它们的光学特性。

    6.The characters are treated with a magnetically charged inklike toner and then are transferred from drum to paper.

    用磁化的带电的像墨一样的碳粉处理这些字符,然后从磁鼓传送到纸上。

    7.Rather,it is an advanced alternative designed for very powerful microcomputers and networks。

    确切地说,它是设计给功能非常强大的微型计算机和网络的另外一个可供选择的高级操作系统。

    8.With multitasking,the speed at which the document is printed is affected by the demands of database management program.

    在这种多任务情况下,文件打印的速度会受到使用数据库管理程序着要求的影响。

    9.A common method of determining what errors have been introduced into an image is by modeling the scene at the time of data acquisition using ancillary data colleted.

    决定什么错误已经传入图像的常用方法是通过利用收集到的辅助数据对获得数据时的景象进行建模。

    10.Geometric rectification is a process by which points in an image are registered to corresponding points on a map or another image that has already been rectified.

    几何校正是图像中的点与地图或另一个已校准的图像中相应的点配准的过程。

    11.Neural networks attempt to "teach" the computer what decisions to make based up on a training data set.

    神经网络视图交给计算机基于一组训练数据做出什么判决。

    12.This  combination could seriously limit one of the  Web's most appreciated aspects-its ability to present images easily.

    这一结合很大程度上限制了网络令人欣赏的一个方面 易于显示图像的能力。

    13.That would cut down the number of bytes by three-fourths,at least in the one corner.

    那样将会至少在一个区域将字节的数目减少3/4。

    14.The longer the run of pixels,the more compression.

    游程越长,压缩幅度越大。

    15.It involves reducing the amount of memory needed to store a digital image.

    它包括减少存储数字图像所需的存储容量

    16.The example below demonstrates how one could go about extracting measurements from an image.

    下面的例子示范了人们怎样从图像中提取尺寸。

    17.If you really want to be sirict,computer pictures are files,the same way WORD documents or solitaire games are files.

    从严格意义上来说计算机图像是文件,就象Word文档或纸牌游戏是文件一样。

    18.That is,all of the objects shown on the computer monitor are representations of points and their relationship to each other on the work area,each of which is stored in the computer as simple values and mathematical equations depicting:the relationship between each  point and the next point referenced to it,and the position(vector) of each point referenced to a starting corner of the work area.

    也就是说,在计算机监视器显示的所有对象都是工作区域内的点和他们之间相互关系的表示,每一点都作为简单值或数学公式存储在计算机里,其中数学公式用来描述每个点和参照该点的下一个点之间的关系和参照工作区域开始角的每个点的位置(矢量)。

    19.At such an enlargement,the picture would be of little use for reproduction unless viewed from quite a long distance.

     在这样一个放大照片里,图像无法用于再现除非从相当远的距离外观看,

    20.Although the concept of a secure network is appealing to most users,networks cannot be calssified simply as secure or not secure because the term is not absolute--each group defines the level of access that is permitted or denied.

    尽管网络安全的概念吸引着绝大多数使用者,但我们不能把网络简答的称为安全的网络或不安全的网络,因为安全这个术语不是绝对的---每个组织定义它的标准是不同的。

    21.The more people use Internet,the more concerns about Internet security.

    使用Internet的人越多,对Internet安全的关注就越多。

    22.Almost all encryption schemes used in the Internet uses asymmetric key encryption for exchanging the symmetric encryption key,and symmetric encryption for better performance.

    在Internet中几乎所有的加密方案都使用非对称密钥加密来替换对称密钥加密和对称加密,以得到更好的加密控制。

    23.If the application is really the one "who claims to be",CA will issue a digital certificate,with the applicant's name,E-mail address and the applicant's public key,which is also signed digitally with the CA's private key.

    如果申请人确如自己所声称的,证书授权机构将授予带有申请人姓名、电子邮件地址和申请人公钥的数字证书,并且该数字证书由证书授权机构用其私有密钥进行数字签名。

    24.Many people pay great amounts of lip service to security,but do not want to be bothered with it when it gets in their way.

    许多人大肆空谈安全,不过当安全问题走进他们时,他们却不愿意为之打扰。

    25.Just as human viruses invade a living cell and then turn it into a factory for manufacturing viruses,computer viruses are small program that replicate by attaching a copy of themselves to another program.

    正如人的病毒侵害活细胞,然后将它变成制造病毒的工厂一样,计算机病毒是一个小程序,通过将该程序本身的拷贝附加到另一个程序上来进行复制。

    26.Skillfully written virus can infect and multiply for weeks or mouths without being detected.

    巧妙编写的病毒会在数周或数月内进行传染并倍增,而不会被人们发现。

    27.The timing of the attack can be linked to a number of situations,including : a certain time or date;the presence of a particular userID,the use or presence of  a particular file,the security privilege level of the user,and the number of times of a file is used.

    攻击的时刻可能与许多情况有关,其中包括:某一特定时间或日期、特定用户身份的出现、特定文件的使用或出现、用户的安全优先级别以及某一文件被使用的次数。

    28.Very difficult to write,these viruses have the ability,once booted up,to take total control of your system.

    这种病毒很难编写,而一旦被引导,它就能够完全控制整个系统。

    29.Source code viruses are intrusive programs that are inserted into a source  program such as those written in Pascal prior to the program being compiled。

    源代码型病毒是一种侵入式程序,在源程序被编译以前,这种程序被插入到例如用Pascal编写的源程序之中。

    30.When it comes to information  security, most companies fall somewhere between two extreme boundaries:complete access and complete security.

    涉及到信息安全,很多公司会处于两种极端的边界:完全访问和完全安全。

    31.Unfortunately,having a computer with complete access is also not practical because it would expose every bit of information publicly,from customer records to financial documents.

    遗憾的是,拥有完全访问的计算机也是不实际的。因为它会公开暴露每一点信息,从客户记录到财政文件。

    32.This is a  property of an information  system whereby its availability,reliability,completeness and promptness are assured.

    服务完整性。这是信息系统的一个特性,以保证信息系统具有有效性、可靠性、完整性和敏捷性。

    33.These options typically include a table of contents, a search feature to locate reference information about specific commands,and central options to move around.

    这些选项一般包含一个表的内容,查询有关特殊命令的说明信息和可以到处移动的集中选项。

    34.These industries have profited from the productivity gains of using hand-held terminals and notebook computers to transmit real-time information to centralized hosts for processing.

    这些工业通过手提终端和笔记本电脑将实时实现传送到中央主机进行处理,从获得的生产率中已获益匪浅。

    35.Wireless LANs frequently augment rather than replace wired LAN networks--often providing the final few meters of connectivity between a backbone network and the mobile user.

    无线局域网通常是增加而不是代替有限局域网的功能,通常是在中枢网络和移动用户之间提供最后几米的连接。

    36.Inexpensive,multiple-conductor cable comprised of one or more pairs of 18 to 24 gauge  copper strands.

    由一对或多对18到24规格的铜线组成的便宜的多重导体电缆。

    37.A transmission medium composed of a central glass optical  fiber cable surrounded by cladding and an outer protective sheath.

    由金属包裹层和外层保护层包裹着的中央玻璃光导纤维组成的一种传输介质。

    38.This type of system is common in  decentralized organizations where divisional offices have their own computer systems.

    这类系统在分散型机构中是很常见的,其分开的办公室具有他们自己的计算机系统。

    39.Networks can be controlled by all nodes working together equally or by  specialized nodes  coordinating and supplying all resources.

    网络可以由一起平等工作的所有节点来控制,或者是由协调和提供所有资源的专用节点控制。

    40.Serial transmission is the way most data is sent over telephones  lines.

    串行传输是绝大多数数据通过电话线的方式。

    41.It separates each network's function into seven "layers" of protocols,or communication rules.

    它把每个网络的功能分成七层协议,即通信规则。

    42.This assumes  that the microcomputers and other equipment on each network have implemented the same functions and interfaces.

    这种情况是建设每一个网络中的微机和其他设备完成了同样的功能和具有同样的界面。

    43.Satellite communications refers to the utilization of geostationary orbiting satellites to relay the transmission received from one each earth  station to one or more  earth stations.

    卫星通信指的是利用轨道通信卫星传送从一个地面站发来的信息到另外一个或多个地面站。

    44.The home page presents information about the site along with references and hyperlinks, or connections to other documents that contain related information such as text files,graphic images,audio,and video clips.

    主页代表着有关索引和超级链接的站点信息,或者包含相关信息诸如如文件夹、图像、音频和视频的相关其他文件相链接。

    45.At a business level,electronic communication has become standard and many times preferred way to stay in touch with suppliers,employess,and customers.

    在交易中,电子通信已经过成为标准,很多企业选择这样的方法保持与供应者、雇员和用户的联系。

    46.Search engines are specialized programs that assist you in locating information on the Web and the Internet.

    搜素引擎是专用的程序,帮助用户定位Web和Internet上的信息。

    47.Search engines order the hits according to those sites that most likely contain the information requested and present the list to you in that order,usually in groups often.

    搜素引擎根据与需要信息最匹配的内容进行排序,并且按照这个顺序将相关信息列出来,每组10个。

    48.If you have access to a personal computer(PC) and can cannect to the Internet with a browser, you can do business online.

    如果你有机会使用一部个人计算机并且能通过浏览器连接上Internet,你就能在线做生意。

    49.No business can afford to ignore the potential of a connected economy.

    没有企业能忽视互联网经济的能力。

    50.Unlike traditional sales via classified ads and auctions,buyers and sellers typically never meet face-to-face.

    与通过分类广告和拍卖的传统的销售不同,买方和卖方通常从未见过面。

    51.As for other major froms of system software,such as compliers and operating systems,a well-understood set of principles for databases management systems has developed ove the years,and these concepts are useful both for understanding how to use these systems effectively and for designing and implementing DBMS's.

    其他主要形成的系统软件,比如说汇编以及操作系统,近些年来开发出一系列容易理解的数据库管理系统原则,并且这些概念既有助于理解如何有效利用系统,又可以帮助设计和执行DBMS系统。

    52.While we regard the above two properties of a DBMS as fundamental, there are a number of other capabilities  that  are almost universally found in commercial DBMS's.

    虽然我们将以上两点作为DBMS的基本特征,但是其他一些功能也是在商业DBMS系统中常见的。

    53.But if you are in the bank depositing your salary check at the exact instant your spouse is extracting money from an automatic teller,the result of the two transactions occurring  simultaneously and without coordination is unpredictable.

    但是如果你正在银行里查询工资,与此同时,你的爱人在一台自动取款机上取款,两个事物同时发生且没有彼此协调,那你的查询结果就很难说了。

    54.They are called high-level languages because they remove  many of the complexities involved in the raw machine language that computers understand.

    它们之所以被称为高级语言是因为它们除去了计算机所能理解的原始机器语言所包括的复杂性。

    55.The key point is that object oriented languages are more modern,and using object oriented languages is the way things are done now in the programming world.

    关键的一点是面向对象的语言更现代化,试用该语言是当今程序处理事务的方式。

    56.Each object can contain different data,but all objects belonging to a class have the same functions(called methods).

    每一个对象可以包含不同的数据,但属于同一类的所有对象有着不同的功能(被称为方法)。

    57.Often in the program you will refer to an email object as if it was the parent(super-class) because it will not matter whether the email contains a picture,or sound,or just text.

    在程序中人们经常查阅电子邮件对象,把它看作基类;因为该邮件是否包含一种图像,语音或者仅仅一种文本无关紧要。

    58.There are at least three approaches  to OO languages:Methods in Classes,Multi-Methods Separate from Classes,Prototypes.

    至少有三种处理OO语言的方法:类的方法、多方法、原型。

    59.Once you have narrowed down the line where your bug occurs, the next step is to find out the value of your variables at that time.

    一旦缩小了编程错误存在的范围,下一步就是找出当时的变量值。

    60.The syntax errors aren't a serious issue during tht program design phase since in practice,after designing and testing the design,the program will be implemented in a computer program language and it is at this point that syntax errors become a problem.

    在程序设计阶段语法错误不是一个重要问题;当设计完成并测试后,程序将用某一种计算机语言实现程序,这时语法错误才成为需要处理的问题。

    61.Computers are electronic  devices that can follow instructions to accept input,process that input,and produce information.

    计算机是根据指令接受输入,处理输入数据并产生信息的电子设备。

    62.The term instruction is used here to describe a basic task the software asks the computer to perform while also identifying the data to be affected.

    在这里用术语“指令”来描述软件要求计算机完成的基本任务,并且标识受到影响的数据。

    66.One of the most important facts to know about memory is that part of its content is held only temporarily.

    对于内存需要了解的一个最重要的事实是它所保存的内容只是临时的。

    67.Hard disks are assembled under sterile conditions and sealed from impurities within their permanent containers.

    硬盘是在无菌条件下安装并且密封在远离杂志的永久的容器内。

    68.A problem with human language is that it can seem to be imprecise.

    人类语言的问题是它可能看起来不精确。

    69.Pseudocode is also human language but tends toward more precision by using a limited vocabulary.

    伪代码也是人类语言,但通过使用少量的词汇而倾向于更精确。

    70.Multi-dimensional object fromats store graphics data as a collection of objects(data and the code that manipulates it)that may be rendered(displayed)in a variety of perspectives.

    多维对象格式将图像数据作为在各种视角下表示(展示)的对象集(数据及操作数据的代码)存储起来。

    71.Virtual Reality Modeling Language(VRML) is a 3D,object-oriented language used for describing "virutal worlds" networked via the Internet and hyperlinked within the World Wide Web.

    VRML(虚拟现实建模语言)是用来描述通过Internet联网或全球网链接的“虚拟世界”的三维面向对象的语言。

    72.Image defects which could be caused by the digitization process or by faults in the imaging set-up(for example,bad lighting)can be corrected using Image Enhancement techniques.

    数字化处理过程中造成的图像缺陷,或成像时的错误(如灯光不好)造成的图像缺陷,可以利用图像增强技术进行修改。

    73.The example below represent only a few of the many techniques available for operating on images.Details about the inner workings of the operations have not been given.

    下面的例子只是给出图像操作技术中的少数几种,没有给出操作的内部工作细节。

    74.Although it has several remarkable features, such as transparency and the ability to present animated images, it is not well suited for the presentation of continuous tone images,such as photographs, due to its limit of 256 colors.

    尽管它有几个明显的特点,譬如透明以及显示动态图像的能力,但是由于256色的限制,它不适合于显示照片之类连续色调的图像。

    75.“Compression” is a compution term that represents a variety of mathematical formats used to compress an image's byte size.

    压缩是一个计算机术语,表示用于压缩图像字节数的数学格式。

    76.Remote sensing is the process of collecting data about objects or landscape features without coming into direct physical contact with them.

    遥感技术是远距离地采集对象或地形特征的数据,而不需要物质的直接接触。

    77.Information Extraction—Unlike analog image processing,digital image processing presently relies almost wholly on the primary elements of tone and color of image poxels.

    信息提取--与模拟图像处理不同,当前的数字图像处理几乎仅依赖于像素的色调和颜色这些基本要素。

    78.The select statement is used to query the database and retrieve selected data that match the criteria that you specify.

    选择语句用来查询数据,检索根据你设定的条件所检索到的数据。

    79.The table name that follows the keyword from specifies the table that will be queried to retrieve the desired results.

    关键字from后面的表名确定了为得到结果所要检索的表。

    80.The where clause(optional) specifies which data values or rows will be returned or displayed,based on the criteria described after the keyword where.

    关键字where后面的从句基于标准的描述,where从句(可选项)限定了哪些数据或者行将会被查到或者显示。

    81.Although most database systems use SQL,most of them also have their own additional  proprietary extensions that are usually only used on their system.

    虽然多数数据库系统使用SQL,但是大多数的数据库在使用SQL语言时都有他们系统独有通常只被使用在他们的系统上的私有引伸。

    82.To create a new table,enter the keywords create table followed by the table name,followed by an open parenthesis, followed by the first column name, followed by the data type for that column,followed by any optional constraints, and followed by a closing parenthesis.

    创建一个新表,输入关键字create table,后面输入表名,接着是左括弧,第一列的列名、数据类型、其他可选的约束条件,右括弧。

    83.Management of data involves both defining structures for storage of information and providing mechanisms for the manipulation of information.

    数据管理即包括定义信息的存储结构,也包括提供信息的处理机制。

    84.Dialog boxes frequently appear after selecting a command from a pull-down menu.These boxes are used to specify additional  command options.

    通常在下拉式菜单中选择了一个命令之后就会出现对话框。这些对话框用来说明附加的命令选项。

    85.Scroll bars are usually located on the right and/or the buttom of the screen.They enable you to display additional information not currently visible on the screen.

    滚动条通常位于屏幕的右边或底部。它们通常能够显示在当前屏幕上看不到的附加信息。

    86.Browsers are programs that provide access to Web resources.

    浏览器是提供访问Web资源的程序。

    87.These documents may be located on a nearby computer system or on one halfway around the world.

    这些文档可能位于你附近的计算机系统,也可能在世界各地的任何一个角落。

    88.Mailing lists allow members of a mailing list to communicate by sending messages to a list address.

    邮件列表允许列表用户通过向一组列表地址发送信息来交流。

    89.Before you submit a contribution to a discussion group,it is recommended that you observe or read the communications from others.This is called lurking.By lurking,you can learn about the culture of a discussion group.

    在向讨论组提交信息之前,建议你先观察和阅读其他用户的信息,这叫“潜伏”,通过潜伏,你可以获得关于讨论组的文化素养信息。

    90.Metasearch engines are programs that automatically submit your search request to several search engines simultaneously.

     Metasearch搜素引擎是一个自动同时提交搜素信息给多个搜素引擎的程序。

    91.Specialized search engines focus on subject-specific Web sites.Specialized sites can potentially save you time by narrowing your search.

    专业搜素引擎重点查询专用主题的Web站点,通过缩小搜索范围来自动节省用户时间。

    92.The wired world of business,developed technology,human talent, and a new way of doing business make up today's growing worldwide economy.

    技术,人的才能,和新经营方式构成今天的日益增长的全球经济。

    93.The backbone of this electronic commerce is the Internet.

    电子商务的根基是Internet。

    94.Electronic commerce is an emerging concept that describes the process of buying and selling or exchanging of products,services,and information via computer networks including the Internet.

    电子商务作为新兴的概念,它描述了通过计算机网络(包括Internet)买卖或交换商品、服务与信息的过程。

    95.Businesses receive raw materials as input,add value to them through various processes,and sell the finished product as output to customers.

    企业接受原材料为“输入”,经过各种不同流程为其增加价值,然后将最终的产品作为“输出”销售给消费者。

    96.Competitive advantage is achieved when an organization links the activities in its value chain more cheaply and more effectively than its competitors.

    当一个组织能比其他竞争者更有效更便宜的与其价值链的活动相联系时,竞争优势就实现了。

    97.There is no time sequence or special sequence of activities before a business is considered successful or effective.

    一个交易在它被认定是成功或有效之前,其行为没有时间上或其他方面的特别顺序。

    98.E-commerce can play a key role in reducing costs,improving product quality and integrity,promoting a loyal customer base,and creating a quick and effecient way of selling products and services.

    电子商务能在降低成本、提高产品质量、促成忠诚客户基础和创建快捷高效的产品与服务销售方面起到关键作用。

    99.The integration of these activities results in an organization fine-tuned for profitability  and growth.

    这些环节的整合为组织带来收益和增长。

    100.Bringing in qualified people  contributes to stability,continuity,and integrity of operations throughout the firm.

    吸引高素质的人才才能保证整个公司的稳定持续发展。

  • 相关阅读:
    C++学生成绩管理系统
    蓝桥杯算法训练 最大最小公倍数
    蓝桥杯基础练习 完美的代价
    vim编辑器的使用技巧
    C语言中static关键字的用法
    在linux环境下编译运行OpenCV程序的两种方法
    Linux中gcc编译器的用法
    浅谈Java中的hashcode方法
    读CopyOnWriteArrayList有感
    徐汉彬:Web系统大规模并发——电商秒杀与抢购(技术实现)
  • 原文地址:https://www.cnblogs.com/heisaijuzhen/p/5570397.html
Copyright © 2011-2022 走看看