高級程序員考試英語試題詳解(2000~2002)

2002  66-70

 A typical imperative language contains an applicative sub-language which approximate the mathematical abstractions of “timeless” function applied to “spaceless” values, where the acture operation sequences and use of storage space during expression evaluation are organized behind the scenes.

 In this setting, values are data structures of low volume, typically a few computer words or less, which means that an illusion of spacelessness can be realized by having intermediate results during expression evaluation stored at the discretion of language implementation, and effecting parameter transmission and assignment operations through value copying.

詞彙:

imperative                  命令的, 強制的

approximate                 近似的,大約的

timeless                    永恆的,時間無限的

spaceless                    空間無限的

sequence                   次序,序列

scene                       場景,情景

illusion                     幻想,幻覺

evaluation                   估價,賦值

discretion                   判斷力

at the discretion of sth/sb       /自行處理

implementation              執行,(coding)編碼

assignment                  分配,委派,指定

譯文

  典型的指令型語言自身具有相應的下層操作語言,下層語言在後臺進行任務的組織和表達式求值過程中的空間分配,使得從上層看,程序似乎是在無限的存儲空間上進行無限時間的運算。

  在這種情形下,數值一般組織成由幾個或者更少的計算器字(computer word)組成的底層數據結構。通過在表達式求值過程中緩衝中間結果的辦法,以及其它諸如在參數複製中採用值傳遞以及操作分割等辦法,來實現在上層看來空間無限的幻覺。

 <?xml:namespace prefix = o ns = "urn:schemas-microsoft-com:office:office" />

 

 

2002        71-75

 Most computer systems are vulnerable to two different groups of attacks: Insider attacks and outsider attacks. A system that is known to be secure to an outsider attack by preventing access from outside can still be vulnerable to the insider attacks accomplished by abusive usage of authorized users. Detecting such abusive usage as well as attacks by outside not only provides information on damage assessment, but also helps to prevent future attacks. These attacks are usually detected by tools referred to as Intrusion Detection Systems.

詞彙:

vulnerable              脆弱的,易受攻擊的

insider                 內行,內部人員

outsider                外行,外部人員

abusive                濫用的,無節制的

authorized              經認定的,經授權的

detect                  預防,察覺,檢測出

assessment              評估,估算

prevent                 預防

intrusion               入侵,闖入

譯文:

 大多數計算器系統在兩種類型攻擊下是脆弱的: 一種來自於內部人員,另一種來自於外部。儘管有些系統對於外部的攻擊具有良好的防禦能力,但是內部合法用戶的非法操作同樣會對系統造成破壞性攻擊。

 對系統所受的內外攻擊進行檢測,不僅僅可以估算攻擊造成的傷害,更可以預防未來的攻擊。這些攻擊通常可以被一些工具檢測到,例如入侵檢測系統

 

 

 

2001 29

 MIMD system can be classified into throughput-oriented systems, high-availability systems and response-oriented systems. The goal of throughput-oriented multiprocessing is to obtain high throughput at minimal computing cost. The techniques employed by multiprocessor operating systems to achieve this goal take advantage of an inherent processing versus input/output balance in the workload to produce balanced and uniform loading of system resources.

詞彙:

throughput             生產量,吞吐量

orient                 定向

response               響應,應答

employ                僱用,安置

take advantage of        利用

inherent               生來就有的,固有的

versus                 對比,比較(縮寫爲VS, exp China VS Costa Rica)

balance               平衡,平穩,均衡

uniform               統一的,制服

resource                             資源

譯文:

 MIDM系統可以分類爲面向生產量系統,面向高性能系統和麪向響應系統。面向生產量多處理器系統的目的是耗費最小的處理成本來獲取最高的生產量。多處理器系統利用這樣的技術來達到上述目的: 用固定的過程替代I/O平衡機制,來使系統資源穩定和有組織。

 

 

 

2001 30

 Soon, more of the information we receive via the Internet could come packaged in digital wrappers.

 Wrappers are made up of software code that’s targeted to do specific things with the data enclosed within them, such as helping to define queries for search engines. They also keep outsiders from gaining access to that code.

詞彙:

via                 經由,通過,通路

digital                 數字式的,數字的

wrapper               包裝

digital wrapper         數字包裹

outsider               外界的

譯文:

 很快,我們經由Internet收到的更多信息將以數字包裹的形式傳遞。

 數字包裹是由軟件代碼組成的,目的在於利用封裝在裏面的數據來完成一些指定的任務,比如爲搜索引擎定義查詢內容等。同時,它們也拒絕外界對內部數據的非法訪問。

 

 

 

2000 14

Network managers have long awaited practical voice-over-IP(VOIP) solutions. VOIP promises ease network management and decreases costs by converging at a company’s telephony and data infrastructures into one network. And a VOIP solution implemented at a company’s headquarters with far-reaching branch offices can save tremendous amounts of money in long distance phone bill, provided that solution delivers POTS-like voice quality over the Internet.

詞彙:

practical                   實際的,實踐的,實用的

converging                 聚集,聚會

infrastructure               底層設施,基礎設施

implement                  貫徹,施行

branch                     分支,分枝

譯文:

 網絡管理人員一直期待着實用的聲訊IP電話(VOIP)解決方案。通過把一家公司的電話和數據基礎設施集成到一個網絡服務中去,VOIP能夠使網絡管理更加方便,並且降底投資。一家使用了VOIP技術且擁有外地分支機構的公司,能夠節省大量的長途電話費,並且能夠在Internet上以接近於普通電話服務(POTS)的音質進行通話。

 

發表評論
所有評論
還沒有人評論,想成為第一個評論的人麼? 請在上方評論欄輸入並且點擊發布.
相關文章