请帮忙翻译
英语: Tiered networksMAC address and the logic of network addresses (such as TCP / IP and IPX / SPX) is the main difference between the logical network address of the network in accordance with the hierarchical structure of many organizations. Network address the logic of organizations and enterprises can form the logic of the organizational form of adaptation, in accordance with the organizational structure of the building by the management of the sector's local area network. Or enterprises in accordance with the geographical distribution of each branch have an independent LAN. Under normal circumstances, the two will mix.Routers used to connect different local area networks, and breakthroughs such as token ring network Ethernet LAN standard, such as topology limitations to build a large network. Internet is the best example of his many scattered network composed of no centralized management, but he used the address logic layered space organizations. Routers connect thousands of these networks, and make the best routing, and a host of information sent to different networks on one another host, all of which are based on regular changes And regular updates routing information. According to sort routing information to determine how the data packets sent to different networks on the Internet.Routing table online tracking of these routers, and to the ultimate goal of networks including the path of hops. Routers do not have to know the destination of data packets to all the routing information. If the purpose of network routers is articulated on the other a local area network, the router may not know the purpose of neighboring networks. In this case, routers use "default gateway" send data packets. On the Internet, a data packet will normally reach their destinations through a number of router, the router on the routing table retain only the data packets reach their destinations "jump" information. Each router on the path reach their destinations all know that the next jump, or use the routing tables in the default gateway.Routers are not limited to the use of TCP / IP protocol, but on the Internet, almost all routers in the use of IP routing. Many companies and business-class routers can be configured routing other agreements, such as IPX / SPX and AppleTalk. However, SOHO routers, and even those who use such as DSL and cable modem access network router to use only the TCP / IP protocol.To provide securityRouter's working principle is to check network protocol packet in the head, and make routing. Clearly, in routers for the network can establish a "check point." That is, use the router configuration rules and Web-based head of the pack decided to allow or prohibit information network traffic. For example, using the router as a firewall to the first line of defense, you can use a specific port on or off the TCP or UDP communications, to prohibit network access to specific applications. For example, in routers Telnet traffic congestion on the (port 23), a person can stop using Telnet log in the network computer, can also block specific Web address to visit private network through a router (or the contrary), these are Is part of the functions of a firewall.Firewall, including more than a simple routing capabilities, including state detection technology and application agents, and other functions. The scale of the ever-expanding Internet from the original academic environment to the current state, there is no security to speak of, in the process, the router is the first to create a "firewall" of equipment.Router logs normally provide tools, you can use the log data determine whether the network has been infiltrated. Although the majority of today's hacker attacks means very complex, and IP address can be forged, but only from the novice often use the Internet to download free hacking tools, by checking the log file on the router to the Unix nux host the syslog daemon, when Routers are security threats that can also log file analysis.日语:ひとつの阶のネットの组织を分けます MACアドレスと论理のネットワークアドレス(例えばTCP/IPとIPX/SPX)の间のが主に区别するのが论理のネットワークアドレスが多いネットを段阶の构造によって组织するのです。ネットワークアドレスの论理の组织形式は企业のすでにある论理の组织形式と适応することができて、组织によって构造を管理することを得て各部门のLANを建设します。あるいは企业の地理(学)によって分布して行って、すべての支店机构はすべて1つのぽつんと立っているLANを持ちます。通常の情况の下で、この2种类の情况は混じって使うことができ(ありえ)ます。ルータは异なっているLANにつながることに用いて、たとえばのイーサネットとトークンリング・ネットワークなどのLANの标准的なトポロジーの制限を突破して1つの更に大规模のネットを作り上げます。Internetは1つの最も良い例で、彼の多くて分散したネットは构成して、集中统一の管理がなくて、しかし彼は论理を使ってひとつの阶の住所の空间を分けて组织を行います 。ルータはこれらの数千のネットにつながって、そして最优秀ルートの选択をして、1台のホストコンピュータの上の情报の手渡しを异なったネットの上の别の1台の1台のホストコンピュータに着いて、すべてのはこれらはすべて経常的な変更と経常的な更新のルートの情报に基づきます。ルートはソーティングして関连している情报によってどのようにデータを包んでInternetの上の不一致のネットを送り届けることを决定します。ルートは表してネット上のこれらのルータを追迹して、そして最终の目的のネットのパスのが数を跳びますまで(へ)含みます。ルータはデータが目的地のすべてのルートの情报まで(へ)包むことを知っている必要はありません。もし目的のネットはルータの上でつながったことその他に1つのLANだならば、それではルータも隣り合っている目的のネットを知っている必要はないことができます。このような情况の下で、ルータは“デフォルトゲートウエイ”を使ってデータの包みを発送します。Internetの上で、1つのデータは通常多数のルータを通り抜けて目的地に到着することを包んで、ルータの上のルートはただデータだけを保留して包んで目的地の“おりて跳びますと”の情报に到着することを表します。パスの上のすべてのルータはすべて目的地のに到着して下跳ぶこととを知っていて、あるいはルートが表す中にデフォルトゲートウエイを使います。ルータは限られてTCP/IP合意を使うだけではなくて、しかしInternetの上で、ほとんど所有するルータはすべてIPルートを使っています。たくさんの会社と企业级の的のルータはルートのその他の合意を配置することができて、例えばIPX/SPXとAppleTalk。しかし、SOHOルータ、たとえたとえばもあれらはケーブルを使ってDSLモデムの接続ネットワークの経络のルータとただTCP/IP合意だけを使いますとしても。安全性を提供しますルータの仕事の原理はネットワークプロトコルのデータの包みの中の头部の情报を検査するので、そしてルートの选択をします。とても明らかで、ルータの上でネットのために1つの“検査して点検します”を创立することができます。つまりルータの配置の规则を使って、そしてネットに基づいて包みの头部の情报を数えますネットの流量を许しますかます禁止することを决定します。例えば、ルータを使ってファイアウォールの第1本の防御线として、特定のポートの上のTCPあるいはUDP通信を起用しますかます闭锁することができて、禁止でネットを通じて(通って)特定のアプリケーションを访问します。例えば、ルータの上でTelnetの流量(ポートの23)がふさがって、ある人がTelnet登录のネットの中のコンピュータを使うことを阻止することができて、特定のネットワークアドレスがルータを通じて(通って)私有のネット(あるいはこれに反して)を访问することをも阻止することができて、これらはすべてファイアウォールの中で一部の机能です。ファイアウォールは简単なルートの机能を含むだけではなくて、また状态の検査・测定する技术を含んでと代行などの机能を使用します。规模の绝えず広げるInternetは初めの学术の环境は现在の状态まで(へ)発展して、すでに言う値打ちがあったいかなる安全性がなくて、この过程の中で、ルータは最初に“ファイアウォール”の设备を创建することに用いるのです。 ルータは通常日志にツールを提供して、日志のデータの判断のネットを使ってすでにしみ込むかどうかことができます。今の多数のハッカーの攻撃の手段はとても复雑ですけれども、しかもIPアドレスを伪造することができて、しかし新米はよくInternetの上からただダウンロードして无料のハッカーのツールを使うだけ、ルータの上の日志のファイルを検査しますを通じて(通って)Unix nuxホストコンピュータの上のsyslogまで(へ)过程を见守って、ルータ时にの安全を受ける胁しは、日志のファイルをも分析することができます。
Tiered networks MAC address and the logic of network addresses (such as TCP / IP and IPX / SPX) is the main difference between the logical network address of the network in accordance with the hierarchical structure of many organizations. Network address the logic of organizations and enterprises can form the logic of the organizational form of adaptation, in accordance with the organizational structure of the building by the management of the sector's local area network. Or enterprises in accordance with the geographical distribution of each branch have an independent LAN. Under normal circumstances, the two will mix.Routers used to connect different local area networks, and breakthroughs such as token ring network Ethernet LAN standard, such as topology limitations to build a large network. Internet is the best example of his many scattered network composed of no centralized management, but he used the address logic layered space organizations. Routers connect thousands of these networks, and make the best routing, and a host of information sent to different networks on one another host, all of which are based on regular changes And regular updates routing information. According to sort routing information to determine how the data packets sent to different networks on the Internet.Routing table online tracking of these routers, and to the ultimate goal of networks including the path of hops. Routers do not have to know the destination of data packets to all the routing information. If the purpose of network routers is articulated on the other a local area network, the router may not know the purpose of neighboring networks. In this case, routers use "default gateway" send data packets. On the Internet, a data packet will normally reach their destinations through a number of router, the router on the routing table retain only the data packets reach their destinations "jump" information. Each router on the path reach their destinations all know that the next jump, or use the routing tables in the default gateway.Routers are not limited to the use of TCP / IP protocol, but on the Internet, almost all routers in the use of IP routing. Many companies and business-class routers can be configured routing other agreements, such as IPX / SPX and AppleTalk. However, SOHO routers, and even those who use such as DSL and cable modem access network router to use only the TCP / IP protocol.To provide securityRouter's working principle is to check network protocol packet in the head, and make routing. Clearly, in routers for the network can establish a "check point." That is, use the router configuration rules and Web-based head of the pack decided to allow or prohibit information network traffic. For example, using the router as a firewall to the first line of defense, you can use a specific port on or off the TCP or UDP communications, to prohibit network access to specific applications. For example, in routers Telnet traffic congestion on the (port 23), a person can stop using Telnet log in the network computer, can also block specific Web address to visit private network through a router (or the contrary), these are Is part of the functions of a firewall.Firewall, including more than a simple routing capabilities, including state detection technology and application agents, and other functions. The scale of the ever-expanding Internet from the original academic environment to the current state, there is no security to speak of, in the process, the router is the first to create a "firewall" of equipment. Router logs normally provide tools, you can use the log data determine whether the network has been infiltrated. Although the majority of today's hacker attacks means very complex, and IP address can be forged, but only from the novice often use the Internet to download free hacking tools, by checking the log file on the router to the Unix nux host the syslog daemon, when Routers are security threats, can also Analysis log file.
Lamination network organization The MAC address and the logical network address (e.g. TCP/IP and IPX/SPX) between main difference is the logical network address many networks according to the hierarchical structure organization. Network address's logic configuration of organization may adapt with the enterprise existing logic configuration of organization, obtains the management structure according to the organization to construct various departments' local area network. Or defers to enterprise's geographic distribution to carry on, each Branch office has an independent local area network. In the usual situation, these two kind of situations will mix use.The router uses in connecting the different local area network, local area network standard topology and so on breakthrough such as ethernet and token ring net limitations constructs a larger-scale network. Internet is a best example, his many dispersion's network composes, does not have the centralism unified management, but he uses the logical lamination the address space to carry on the organization. The router connects these thousands of networks, and makes the best routing, a main engine's on information transmission to a different network in another main engine, all these based on regular change and regular renewal routing information. The route according to the sorting related information decided how to transmit the data packet to Internet on the different network.On routing list tracking network's these routers, and include to the final goal network way jump the number. The router does not need to know the data packet to the destination all routing information. If the goal network is other local area network which on the router hangs meets, then the router may also not need to know the neighboring goal network. In this case, the router use “tacitly approves the gateway” the transmission data packet. “As soon as on Internet, a data packet will usually pass through many routers to arrive at the destination, on the router routing list only retention data package arrives at the destination under to jump” the information. In way each router knew that as soon as arrives at the destination under to jump, or in the use routing list tacitly approves the gateway.The router is not only restricted in uses the TCP/IP agreement, but on Internet, nearly all routers is using the IP route. Many companies and the enterprise routers may dispose route other agreements, for example IPX/SPX and AppleTalk. But, SOHO router, also, even if such as these use electric cable and the DSL modem turning on network's router only uses the TCP/IP agreement.Provides the securityThe router principle of work is inspects in the network protocol data packet the forehead information, and makes the routing. Very obvious, may establish one on the router for the network “the set point”. Is also uses the router the disposition rule, and based on the network several package of forehead information decided that the permission or forbids the network current capacity. For example, the use router takes the firewall's first defense line, may appoint either on closure specific port's TCP or the UDP correspondence, forbids through the network visit specific application procedure. For example, blocks Telnet on the router the current capacity (port 23), may prevent somebody to register in the network with Telnet the computer, (otherwise may also prevent the specific network address through the router visit private network or), these are in the firewall part of functions.Not only firewall including simple routing function, but also includes condition functions and so on examination technology and application proxy. The scale expands unceasingly Internet developed from the initial academia to the present condition, already did not have any security to be possible saying that in this process, the router was first used in founding “the firewall” the equipment. The router usually provides the diary tool, may use the diary data judgment network to be seeped whether already. Although are now most the hacker the attack method to be complex, and may fabricate the IP address, but the novice often is only downloads the use free crack from Internet, through on inspection router on journal file to Unix nux main engine syslog daemon process, when the router receives the security threat is, may also analyze the journal file.
The lamination network organizes the MAC address and the logical network address (e.g. TCP/IP and IPX/SPX) between main difference is the logical network address many networks according to the hierarchical structure organization. Network address's logic configuration of organization may adapt with the enterprise existing logic configuration of organization, obtains the management structure according to the organization to construct various departments' local area network. Or defers to enterprise's geographic distribution to carry on, each Branch office has an independent local area network. In the usual situation, these two kind of situations will mix use. the router uses in connecting the different local area network, local area network standard topology and so on breakthrough such as ethernet and token ring net limitations constructs a larger-scale network. Internet is a best example, his many dispersion's network composes, does not have the centralism unified management, but he uses the logical lamination the address space to carry on the organization. The router connects these thousands of networks, and makes the best routing, a main engine's on information transmission to a different network in another main engine, all these based on regular change and regular renewal routing information. The route according to the sorting related information decided how to transmit the data packet to Internet on the different network.On routing list tracking network's these routers, and include to the final goal network way jump the number. The router does not need to know the data packet to the destination all routing information. If the goal network is other local area network which on the router hangs meets, then the router may also not need to know the neighboring goal network. In this case, the router use “tacitly approves the gateway” the transmission data packet. “As soon as on Internet, a data packet will usually pass through many routers to arrive at the destination, on the router routing list only retention data package arrives at the destination under to jump” the information. In way each router knew that as soon as arrives at the destination under to jump, or in the use routing list tacitly approves thegateway.Provides the securityThe router principle of work is inspects in the network protocol data packet the forehead information, and makes the outlet by the choice. Very obvious, may establish one on the router for the network “the set point”. Is also uses the router the disposition rule, and based on the network several package of forehead information decided that the permission or forbids the network current capacity. For example, the use router takes the firewall's first defense line, may appoint either on closure specific port's TCP or the UDP correspondence, forbids through the network visit specific application procedure. For example, blocks Telnet on the router the current capacity (port 23), may prevent somebody to register in the network with Telnet the computer, (otherwise may also prevent the specific network address through the router visit private network or), these are in the firewall part of functions. Not only firewall including simple routing function, but also includes condition functions and so on examination technology and application proxy. The scale expands unceasingly Internet developed from the initial academia to the present condition, already did not have any security to be possible saying that in this process, the router was first used in founding “the firewall” the equipment. the router usually provides the diary tool, may use the diary data judgment network to be seeped whether already. Although are now most the hacker the attack method to be complex, and may fabricate the IP address, but the novice often is only downloads the use free crack from Internet, through on inspection router on journal file to Unix nux main engine syslog daemon process, when the router receives the security threat is, may also analyze the journal file.

计算机有关的英语单词及翻译两样都要。
PC:个人计算机Personal Computer CPU:中央处理器Central Processing UnitCPU Fan:中央处理器的“散热器”(Fan)MB:主机板MotherBoardRAM:内存Random Access Memory,以PC-代号划分规格,如PC-133,PC-1066,PC-2700HDD:硬盘Hard Disk DriveFDD:软盘Floopy Disk DriveCD-ROM:光驱Compact Disk Read Only MemoryDVD-ROM:DVD光驱Digital Versatile Disk Read Only MemoryCD-RW:刻录机Compact Disk ReWriterVGA:显示卡(显示卡正式用语应为Display Card)AUD:声卡(声卡正式用语应为Sound Card)LAN:网卡(网卡正式用语应为Network Card)MODM:数据卡或调制解调器ModemHUB:集线器WebCam:网络摄影机Capture:影音采集卡Case:机箱Power:电源Mouse:鼠标,常见接口规格为PS/2与USBMoniter:屏幕,CRT为显像管屏幕,LCD为液晶屏幕USB:通用串行总线Universal Serial Bus,用来连接外围装置IEEE1394:新的高速序列总线规格Institute of Electrical and Electronic EngineersKB:键盘,常见接口规格为PS/2与USBSpeaker:喇叭Printer:打印机Scanner:扫描仪UPS:不断电系统IDE:指IDE接口规格Integrated DeviceElectronics:IDE接口装置泛指采用IDE接口的各种设备SCSI:指SCSI接口规格Small Computer SystemInterface,SCSI接口装置泛指采用SCSI接口的各种设备GHz:(中央处理器运算速度达)Gega赫兹/每秒FSB:指“前端总线(Front Side Bus)”频率,以MHz为单位ATA:指硬盘传输速率ATAttachment,ATA-133表示传输速率为133MB/secAGP:显示总线Accelerated GraphicsPort,以2X,4X,8X表示传输频宽模式PCI:外围装置连接端口Peripheral Component InterconnectATX:指目前电源供应器的规格,也指主机板标准大小尺寸BIOS:硬件(输入/输出)基本设置程序Basic Input Output SystemCMOS:储存BIOS基本设置数据的记忆芯片Complementary Metal-Oxide SemiconductorPOST:开机检测Power On Self TestOS:操作系统Operating SystemWindows:窗口操作系统,图形接口DOS:早期文字指令接口的操作系统fdisk:“规划硬盘扇区”-DOS指令之一format:“硬盘扇区格式化”-DOS指令之一setup.exe:“执行安装程序”-DOS指令之一Socket:插槽,如CPU插槽种类有SocketA,Socket478等等umper:跳线(短路端子)Pin:针脚,如ATA133硬盘排线是80Pin,如PC2700内存模块是168Pinbit:位(0与1这两种电路状态), 计算机数据最基本的单位Byte:字节,等于8 bit(八个位的组合,共有256种电路状态),计算机一个文字以8 bit来表示KB:等于1024 ByteMB:等于1024 KBGB:等于1024 MBaccess arm 磁头臂,存取臂access time 存取时间adder 加法器address 地址alphanumeric 字母数字的analog computer 模拟计算机analyst 分析员area 区域array 数组,阵列assembler 汇编程序automation 自动化band 区batch processing 成批处理binary code 二进制码binary digit 二进制位,二进制数字bit 比特,二进制的一位branch 分支,支线brush 电刷buffer storage 缓冲存储器calculator 计算器call instruction 呼叫指令card punch 卡片穿孔机card reader 卡片阅读机,读卡机cell 单元channel 通道,信道character 字符check digit 校验数位circuit 电路,线路to clear 清除,清零clock 时钟code 代码to code 编码coder 编码员,编码器command 指令,命令compiler 编译程序computer language 计算机语言console 控制台control unit 控制部件,控制器core storage, core store 磁心存储器counter 计数器cybernetics 控制论cycle 循环data 数据data processing 数据处理debugging 调试decision 制定digit 数字,数位,位digital computer 数字计算机disc, disk 磁盘display unit 显示装置drum 磁鼓to edit 编辑electronics 电子学emitter 发射器to encode 编码to erase 擦除,清洗,抹除feed 馈送,供给to feed 馈送,供给feedback 反馈field 字段,信息组,域file 文件floppy disk 软磁盘floppy disk drive 软磁盘机flow chart 流程图frame 帧hardware 硬件identifier 标识符index 索引information 信息inline processing 内处理input 输入inquiry 询问instruction 指令integrated circuit 集成电路to interpret 解释item 项目,项jump 转移key 键,关键码keyboard 键盘latency time 等待时间library 库,程序库linkage 连接to load 装入,寄存,写入,加载location 存储单元logger 登记器,记录器loop 循环machine language 机器语言magnetic storage 磁存储器magnetic tape 磁带matrix 矩阵memory 存储器message 信息,报文microcomputer 微型计算机module 组件,模块monitor 监视器,监督程序,管程nanosecond 毫微秒network 网络,网numeric, numerical 数字的,数值的octet 八位位组,八位字节operator 操作员optical character reader 光符阅读机optical scanner 光扫描器output 输出overflow 溢出,上溢panel 平板parameter 参数,参量perforator 穿孔机peripheral equipment 外围设备,外部设备personal computer 个人计算机printed circuit 印制电路printer 打印机printout 打印输出to process 处理processing unit 处理部件program 程序to program 程序编制programmer 程序设计员programming 程序设计,程序编制pulse 脉冲punch 穿孔to punch 穿孔punched card, punch card 穿孔卡片punched tape, punch tape 穿孔纸带punch hole 孔,穿孔random access 随机存取to read 读reader 阅读程序reading 阅读real time 实时record, register 记录redundancy 冗余routine 例行程序selector 选择器,选择符sentinel 标记sequence 序列,顺序sequential 顺序的serial 串行的.连续的shift 移位,移数signal 信号simulation 模拟simulator 模拟器,模拟程序software 软件,软设备sort 分类,排序sorter 分类人员,分类机,分类程序,排序程序storage 存储器to store 存储subroutine, subprogram 子程序switch 开关symbol 符号symbolic language 符号语言system 系统tabulator 制表机teleprinter 电传打字机terminal 终端terminal unit 终端设备timer 时钟,精密***time sharing 分时timing 定时track 磁道transducer 传感器,翻译机translator 翻译程序,翻译器to update 更新Winchester disk drive 温彻斯特磁盘机,硬盘机working storage 工作存储器PC:Personal Computer,个人计算机、个人电脑,又称微型计算机或微机。NC: Network Computer,网络计算机。MPC: Multimedia Personal Computer,多媒体个人电脑。MMX: 是MultiMedia eXtensions(多媒体扩展)的缩写,是第六代CPU芯片的重要特点。MMX技术是在CPU中加入了 特地为视频信号(Video Signal),音频信号(Audio Signal)以及图像处理(Graphical Manipulation)而设 计的57条指令,因此,MMX CPU极大地提高了电脑的多媒体(如立体声、视频、三维动画等)处理功能。Intel Pentium 166MHz MMXTM: Intel Pentium是英特尔(Intel)公司生产的“奔腾”CPU。 意为“Registered”(注册商标)。166MHz指CPU时钟频率,MHz即Mega Hertz的缩写。MMXTM中的TM是 “Trade Mark”的简写,意为“注册商标”。OOP: Object Oriented Programming,面向对象的程序设计。所谓“对象”就是一个或一组数据以及处理这些数据的 方法和过程的集合。面向对象的程序设计完全不同于传统的面向过程程序设计,它大大地降低了软件开发的难度,使编程就像搭积木一样简单,是当今电脑编程的一 股势不可挡的潮流。28VGA: 28是指彩色显示器上的黄光网点间距(点距),点距越小的显示器,图像就越细腻、越好,这是因为彩色屏幕上的每个像点都是由一组 红、绿、蓝光汇聚而成的,由于在技术上三束光还不能100%地汇聚在一点上,因此会产生一种黄光网点的间隔,这种间隔越小,屏幕上显示的图像越清晰。 VGA是Video Graphics Array(视频图形阵列)的缩写。FAT:Allocation Table,文件分配表,它的作用是记录硬盘中有关文件如何被分散存储在不同扇区的信息。EPA:Environmental Protection Agency的简称,美国环境保护署。EPA于1992年宣布了“能源之星” (Energy Star)计划,并得到了国际社会的积极响应。只要启动电脑,过不了几秒钟就能见到屏幕上出现“能源之星”的标志。能源之星的目标是当电 脑系统的各个部件不活动时自动进入低功耗状态,当部件的能动性恢复(即当键盘、鼠标等被使用)时,电脑系统自动回到完全清醒的状态。对于符合能源之星规范 的产品,EPA将发给能源之星标志“EPA POLLUTION PREVENTER”,意为“美国环境保护署认可的防污染的节能产品”。IC卡:Intelligent Card,智能卡。ATX:一种新的电脑机箱、主板、电源的结构规范。IDE:集成电路设备或智能磁盘设备。DLL:Dynamic Link Library,动态链接库。KB:Kilo Byte,KB表示千字节。K=Kilo,构词成分,表示“千;千米;公斤;公里”。B=Byte,意为“字节”,是电脑中最小存贮单位(一个字节可以存贮一个英文字母,每两个字节可以存放一个汉字)。MB:Mega Byte,MB表示兆字节。M=Mega,构词成分,表示“兆;百万”。GB:Giga Byte,GB表示千兆字节。G=Giga,构词成分,表示千兆;十亿”。CAI:Computer-Asisted Instruction或Computer-Aided Instruction,计算机辅助教学。它将是二十一世纪最重要、最受欢迎的教学手段。CAD:Computer-Aided Design,计算机辅助设计。ISO:International Standard Organization,国际标准化组织。ISO于1987年推出有关质量管理和质 量保证的ISO 9000系列国际标准,于1994年又发布了经过修订的标准。其中,构成ISO 9000系列标准的主要标准分别是: 1.ISO 9000-1:1994《质量管理和质量保证标准—第一部分:选择和使用指南》。2.ISO 9001:1994《质量体系—设计、开发、生 产、安装和服务的质量保证模式》。3.ISO 9002:1994《质量体系—最终检验和试验的质量保证模式》。3DS或3D Studio: Three Dimension Studio,三维摄影室。是美国Autodesk公司推出的一套多功能三维 动画软件,集实体造型、静态着色和动画创作于一体,极大地普及了三维造型技术。它能够与AutoCAD进行图形信息交换,利用扫描仪输入图形,通过VGA 与电视转换接口将动画输出至电视或录像带。VR:Virtual Reality,虚拟现实,又称投入3D,由空军模拟飞行装置演变而来,基本上是利用左、右视觉空间交替变换显示图像的 原理产生立体效果,实际上已超出图像处理的范畴,是综合光、声、图像的计算机生成环境,人们能够像在实际生活中那样对虚拟环境中的对象进行交互式操作,虚 拟现实应用前景极为广阔。OCR:Optical Character Recognition(光学字符识别)的缩写,是指将文字材料通过扫描仪输入作为计算机图像文 件,通过软件识别为中文或英文内码,然后进行文字处理。由于手写体的随意性太大,目前OCR主要限于印刷文字的识别。目前代表中文OCR识别准确率最高水 平的是清华文通公司出品的TH-OCR NT for Windows。SCSI:Small Computer System Interface,小型计算机系统接口,它是为解决众多的外部设备与计算机之间的连接问题而出现的。OEM:Original Equipment Manufacturer,原始设备制造商。Microsoft OEM: 微软OEM产品。它是指预安装在微机上的软件操作系统,包括Windows98、Windows NT、WorkStation、Windows3.X、MS-DOS。MIS:Management Information System,管理信息系统。它广泛地应用于各行各业,国内最有名的管理信息系统有“王特MIS”、“雅奇MIS”、“Quick MIS”。PNP:Plug and Play,即插即用,它是Window98的一个重要技术特性。所谓即插即用是指将符合PNP标准的PC插卡等外围 设备安装到电脑时,操作系统自动设定系统结构的技术。这就是说,当用户安装新的硬件时,不必再设置任何跳线器开关,也不必用软件配置中断请求(IRQ)、 内存地址或直接存储器存取(DMA)通道,Windows98会向应用程序通知硬件设备的新变化,并会自动协调IRQ、内存地址和DMA通道之间的冲突。OLE:Object Linking and Embedding,对象连接与嵌入,简称OLE技术。OLE不仅是桌面应用程序集成,而且还 定义和实现了一种允许应用程序作为软件“对象”(数据集合和操作数据的函数)彼此进行“连接”的机制,这种连接机制和协议称为部件对象模型 (Component Object Model),简称COM。OLE可以用来创建复合文档,复合文档包含了创建于不同源应用程序,有着不同类型的数 据,因此它可以把文字、声音、图像、表格等组合在一起。MIDI:Musical Instrument Digital Interface,乐器数字接口。它是多媒体的基本术语之一,MIDI文 件是用电子乐器如:电子琴、吉它、萨克斯等演奏并录制下来的,它能在大多数的多媒体计算机声音卡上播放,即使不去创建自己的MIDI文件,也可以使用现有 的MIDI文件,作为多媒体演示的背景音乐。MIDI文件储存的只是对声音的描述,依靠声音卡的合成器(FM或者波形表)来产生人们想听的真实声音。MPEG:是Motion Picture Experts Group的缩写,意即“运动图像专家组”,它是多媒体计算机中的一种活动图像及其伴音的压缩编码标准,即人们通常所说的MPEG标准。它包括三部分:MPEG音频、MPEG视频、和MPEG系统。Internet: 为International Net的简写,因特网,又称国际互联网。它最早产生于美国国防部的高级研究规划署,那是 1969年的事了,最初的目的也只是远程计算机的数据共享,后来发展成将世界各地的计算机及计算机网络相互连接起来,形成了一个无边无际的超级大网。 Internet的主要服务项目有:电子邮件(E-mail),远程登录(Telnet),查询服务(Finger),文件传输(FTP),文档服务器 (Archive),新闻论坛(Usenet),电子公告牌(BBS),新闻群组(News Group),全球网(World Wide Web,缩写 为WWW,又称万维网)等。BBS:Bulletin Board System,公告牌系统或电子公告板,又称 Public Access Message System,公共访问信息系统。它是普通公告的电子版本,用户可以通过公告牌发布消息,任何用户都可以读 取公告牌上的消息,也可以给某一特定的人或一组用户发送信息。公告牌系统被广泛地用于传播信息,咨询一个电子公告牌往往比使用交互信箱或公共邮政系统发送 公告更加快捷、有效。E-mail: 电子邮件,这是一种利用Internet网交换文字信息的交互式服务,全世界Internet用户可以互相发送和接收电子邮件。WWW: World Wide Web的缩写,全球网,又称万维网。它是一个基于超文本方式的信息检索工具,提供一种友好的信息查询接口,是目前最受欢迎同时也是最先进的Internet检索工具之一。Remote Login: 远程登录(注册),它是在网络环境下实现资源共享的一种重要手段,采用这种方式,用户可连接到世界任何一台Internet主机。HTTP: Hyper Text Transmission Protocol,超文本传输协议。IP:IP国际互联网协议,即网际协议。FTP:是 Transfer Protocol的缩写,即文件传输协议,用于在Internet上传输文件。FTP的任务是从一台计算机将文件传送到另一台计算机。人们通过FTP可以获得很多免费的实用软件。Gopher: 读音/′g uf /,英文意为“地鼠”;(美国南部穴居的)可食用的龟”。它是Internet中基于菜单驱动的信息查询软件,可将用户的请求自动转换成FTP(文件传输 协议)或Telnet(用于远程终端连接的标准IP协议)命令,在菜单的引导下,用户可对Internet上远程信息系统进行访问。Archive: 读音/′a:kaiv/,“档案;档案馆”之意。Internet中的文档服务器,可定期自动地访问众多的Internet FTP服务器,将这些服务器上的文件索引成一个可以检索的数据库。WAIS:是Wide Area Information Service的简写,广域信息服务器。它使得Internet上巨大的数据资源变得易于检索,并且可以获得远程数据库的信息。Luisitserv: 这是Internet上流行的用户之间交流信息的方式。IRC:Internet Relay Chat,互联网接力聊天。这是一种多用户聊天设施,允许多个用户通过文字实时地与其它人聊天。Hypertext: 超文本。本来用做表示所有超链接,也表示包含“链接”的文本。这是一种非线性的信息组织方法,文字、图形和其它数据做为单个元素都能够指向(链接)其它元素。Hyperlink: 超链接。一种与其它文件的“链接”,文件中图片、按钮、“热词”或短语都可以做为超链接,当用户选择超链接之后,所连接的信息就会显示出来。HTML: Hyper Text Markup Language,超文本标示语言。它是由欧洲粒子实验室一名想象力丰富的研究员 Tim Bemers Lee发明的,是“WWW(全球网)世界”的通用语言。“WWW世界”的诸服务器与客户浏览器间,通过它互相沟通;信息资源也是由 它描述而“表现”的,HTML可以 描述主页(Home Page)和静态的文本。全世界有几千万人在使用HTML语言,可以毫不夸张地说,没有HTML 就没有“WWW世界”。Hypermedia: 超媒体。一种以计算机为基础的利用文字、图形、动画、声音和视频传送和显示信息的方法。这些文字等超媒体的组成元素既可以与其它文件连接,又可以做为单个对象处理。Navigator: 是美国网景(Netscape)公司出品的Internet浏览器软件之一。Navigator的英文意思是“航海者、 海上探险者”,寓意人们可以使用该软件在Internet网络的海洋中航行、探险。Navigator不仅可以浏览万维网(WWW),还具有电子邮件(E -mail)、文件传输(FTP)、远程登录(Telnet)及新闻组(News Group)、信息浏览(Gopher)等多种功能。 IE:Internet Explorer,Explorer意为“探险者”。
pc:个人计算机personal CD:可视激光光盘
