文档库 最新最全的文档下载
当前位置:文档库 › 信息管理专业英语翻译

信息管理专业英语翻译

信息管理专业英语翻译
信息管理专业英语翻译

1A vulnerability is a weakness that a person can eXploit to accomplish something that is not authorized or intended as legitimate use of a network or system.

一个漏洞是一个软弱,一个人要有所成就,能利用未被授权或打算作为合法使用网络或系统。

When a vulnerability is exploited to compromise the security of systems or information on those systems,the result is a security incident,Vulnerabilities may be caused by engineering or design errors,or faulty implementation.

当一个漏洞是利用妥协的安全系统或信息在这些系统中,其结果是一个安全漏洞事件,可能是由于工程或设计错误,或错误的实现。

Why the Internet Is Vulnerable(为什么互联网是脆弱)

2Many early network protocols that now form part of the Internet infrastructure were designe without security in mind.

许多早期的网络协议,现在互联网基础设施的组成部分是不安全的理念,设计。

Without a fundamentally secwre infrastructure,network defense becomes more diffcult.

没有从根本上安全的基础设施、网络防御变得更加困难。

Furthermore, the Internet is an extremely dynamic environment, in terms of both topology and emerging technology。

,包括拓扑和新兴技术。

。and may be hard to detect or trace。An attacker does not have to be phsically present to carry out the attack.

由于互联网的营销公开和原设计的协议、网络攻击通常是快速,简单,便宜,而且可能很难检测或跟踪一个攻击者不必一股脑的礼物进行攻击。

In fact,many attacks can be launched readily from anywhere in the word, and the location of the attacker can easily be hidden.

事实上,许多攻击可以启动容易从任何地方在词的位置,攻击者可以很容易的被隐藏。

Nor is it always necessary to“break in”to a site (gain privileges on it ) to compromise confidentiality,integrity,or availability of its information on service.

”网站(获得特权)妥协的保密性,完整性或可用性的信息服务。

It is common for sites to be unaware of the risks or unconcerned about the amount of trust they place in the Intemet.

这是常见的网站不知道或不关心的风险量的信任他们的地方在因特网。

They may not be aware of what can happen to their information and systems.

他们可能还不知道会发生什么,他们的信息和系统。

They may believe that their site will not be a target or that precautions they have taken are sufficient.

他们可能认为,他们的网站将不是一个目标,或者他们已经采取足够的预防措施。

Because the technology is constantly changing and intruders are constantly developing new tools and techniques,solutions do not remain effective indefinitely.

因为技术是不断变化的,不断发展新的入侵者是工具和技术,解决方案不能无限期地保持有效。

5Since much of the traffic on the Internet is not encrypted,confidentiality and integrity are diffcult to achieve.

因为大部分的交通网络是不加密的,保密性和完整性都难实现。

This situation undermines not only annlications (such as financial applications that are

network-based ) but also more fundamental mechanisms such as authentication and

non-repudiation.

这种情况不仅annlications破坏(如金融应用程序,这些应用程序是基于网络的),但也更根本的机制,比如身份验证和不可抵赖性。

As a result, sites may be affected by a security compromise at another site over which they have no control .

因此,网站可能会受到安全妥协在另一个网站而失去控制。

An example of this is a packet sniffer that is installed at one site but allows the intruder to gather information about other domains (possibly in other counties).

一个例子是一个数据包嗅探器,安装在一个站点上但允许入侵者收集信息关于其他域(可能在其他国家)。

6Another factor that contributes to the vulnerability of the Internet is the rapid growth and use of the netword,accompanied by rapid deployment of network services involving complex applications. 另一个因素导致的脆弱性是互联网快速发展和使用网络,伴随着快速部署的网络服务涉及复杂的应

用程序。

Often,these services are not designed, configured,or maintained securely.

通常,这些服务不是设计、配置或维护安全。

In the rush to yet new products to market developers do not adequately ensure that they do not repeat previous mistakes or introduce new vulnerabilities

在急于然而新产品市场开发人员不充分确保他们不重复以前的错误或引入新的漏洞

7Compounding the problem, operating system security is rarely a purchase criterion.

让问题更加复杂的是,操作系统安全是很少购买标准。

Commercial operating system vendors often report that sales are driven by customer demand for performance,price,easy of use,maintenance,and support.

商业操作系统供应商经常报告,销售是由客户要求的性能、价格、容易使用、维护和支持。

As a result ,off-the-shelf operating systems are shipped in an easy-to-use but insecure configuration that allow sits to use the system soon after installation.

因此,现成的操作系统是在一个易于使用的但不安全的运来配置,允许坐使用系统安装后不久。These host/sites are often not fully configured from a security perspective before connecting.

这些主机/网站常常没有完全配置之前从安全角度连接。

This lack of secure configuration makes them vulnerable to attacks,which sometimes occur within minutes of connection.

这种缺乏安全的配置使他们容易受到攻击,这有时发生后几分钟内连接。

8Finally, the explosive growth of the Intemet has expanded the need for well-trained and experienced people to engineer and manage the network in a secure manner.

最后,爆炸性增长的互联网已扩大需要训练有素、经验丰富的人,工程师和管理网络安全的方式。Because the need for network security experts far exceeds the supply,inexperienced people are called upon secure systems,opening windows of opportunity for the intruder community.

因为需要网络安全专家供不应求,没有经验的人呼吁安全的系统,开放的机会窗口为入侵者社区。Type of Technical Vulnerabilities 技术漏洞的类型

9The following taxonomy is useful in understanding the technical cause behind successful intrusion techniques,and helps experts identify general solutions for addressing each type of problem.

以下分类是有用的在理解技术原因成功入侵技术,并帮助专家识别通用于解决每种类型的问题。Flaws in Software or Protocol

缺陷在软件或协议

10Protocols define the rules and conventions for computers to communicate on a network.

协议定义了规则和惯例来进行计算机通信网络。

If a protocol has a fundamental deign flaw,it is vulnerable to exploitation no matter how well it is implemented.

如果一个协议有一个基本的设计缺陷,它是容易受到剥削无论它如何被实现。

An example of this is the Network file System (NFS),which allows systems to share files.

一个例子是网络文件系统(NFS),它允许系统共享文件。

This protocol does not include a provision for authentication; that is,there is no way of verifying that a person logging in really is whom he or she claims to be.

这个协议不包括提供认证;那就是,没有办法验证登录,一个人真的是被他或她声称是。

NFS servers are targets for the intruder community.

NFS服务器目标社区的入侵者。

11When software is designed or specified,often security is left out of the initial description and is later "added on" to the system.

当软件被设计或指定,通常安全是排除在最初的描述和后来的“添加”到系统。

Because the additional components were not part of the original design,the software may not behave as planned and unexpected vulnerabilities may be present.

因为额外的组件是属于原始设计,软件可能不像计划和意想不到的可能出现的漏洞。Weaknesses in How Protocols and Software Are Implemented

弱点在协议和软件如何实现

12 Even when a protocol is well designed,it can be vulnerable because of the way it is implemented.

甚至当一个协议是良好设计的,它可以是脆弱的,因为它是如何实现的。

For example,a protocol for electronic mail may be implemented in a way that permits intruders to connect to the mail port of the victim’s machine and fool the machine into performing a task not intended by the service..

例如,一个协议,电子邮件可能实施的方式,允许入侵者连接到邮件港口受害者的机器和傻瓜机器到执行任务不能由服务. .

If intruders supply certain data for the “To:”field instead of a correct E-mail address,they may be able to fool the machine into sending them user and password information or granting them access to the victim's machine with privileges to read protected files or run programs on the system.

如果入侵者提供某些数据的“:”字段,而不是一个正确的电子邮件地址,他们也许能够愚弄机进入发送用户和密码信息或向他们授予访问权限的受害者的机读文件或运行程序保护系统上。

This tune of vulnerability enables intruders to attack the victim’s machine from remote sites without access to an account on the victim’s system.

这首曲子的脆弱性使入侵者攻击受害者的机器从远程站点没有获得一个帐户在受害者的系统。This tune of attack often is just a first step leading to the exploitation of flaws in system or application software.

这首曲子的攻击往往只是第一步导致缺陷的开发系统或应用程序软件。

13Software may he vulnerable because of flaws that were not identified before the software was released.This type of vulnerability has a wide range of subclasses,which intruders often exploit using their oen attack tools.For readers who are familiar with software desgin,the following examples of subclasses are inciuded:

软件可能他脆弱,是因为缺陷,没有明确的软件发布之前。这种类型的漏洞已经广泛的子类,入侵者经常利用他们的厄恩攻击工具。让读者熟悉软件设计,下面的例子包括子类:

race conditions in file access

在文件访问竞争条件

non-existent checking of data content and size

不存在的检查数据内容和大小

non-existent checking for success or failure

不存在检查成功或失败

inability to adapt to resource exhaustion

无法适应资源枯竭

incomplete checking of operating environment

不完整的检查的操作环境

专业英语翻译中的常见问题(详细翻译技巧)

英译汉几个常见问题如下: 1)英译汉时语言组织不符合中文的讲话习惯。在不改变原文绝大部分意思的情况下,不需要字对字或者严格遵守英语语序,在获得原句含意后务必采用中文的思维将译文写出。要求是在读着看过译文后,不能让读着感觉到文章是翻译而得的,即不能留有丝毫翻译的痕迹。 2)英译汉时译文上下文的用词不一致。尤其是学术文献或论文的翻译,除了学术用语和专业用语需要准确,更重要的是全文上下文中同一个词或者短句翻译出的用词或短语必须一致。例如一开始将control panel翻译为“控制面板”,那么全文都不得改变这个译法。 3)英译汉时用词过于口语化。除了剧本,台词,字幕等需要口语化用词的翻译稿件以外。其余大部分翻译,例如文献,论文,合同,申请书,标书等,用词尽量书面化。例如“weight”在统计学和分析学中不可翻译为“给予数值”,必须翻译为“赋权”,两者意思相近,但是采用后者。 4)英译汉时词汇含意理解产生偏差。这是死记单词造成的后果。翻译中,在无上下文的情况下,除非是专有学术名词(例“diabetes”基本上永远都是糖尿病的意思),其余的单词很难说究竟是什么意思,我们只能说某个词大概是对照中文某个词的感觉,但是决不可死认一个意思,死认单词意思造成翻译不通、翻译错误等。当然也不能糊译,不能为了使句子翻译通顺而胡编一个意思。 5)英译汉时英语长句中的意群划分有误。原版的英语资料中长句较多,往往40-50个词之间没有一个标点,修饰成分和意群划分的错误会导致理解错误和翻译错误。原则上,英语中的各类从句,特别是状语从句在句子中的位置相对灵活,没搞明白其修饰对象就会错译。 汉译英几个常见问题如下: 1)汉译英时字对字翻译。这是翻译中最致命的错误,很多人以为认识对应的英语单词或者知道对应的英语单词,这句话才会翻译。其实不是,原则上四千词汇量就能解释大部分英语单词的含义,只不过大部分人不知道如何用简单词汇造句去描述或解释高难度单词。 2)汉译英时中式语序。何谓中式语序,即以“主+谓+宾”为主的句型。这种句子写多了,一旦遇上长句或者语法功能上缺少成分的句子就懵了。所以必须多读,多了解原版英语的句子是如何写的。 3)汉译英时短句太多。这里并不是指写英语短句不好,在考试中建议写短句,这是为了避免语法错误,当然也不要太短了。在较为正式的或专业性强的文本中,汉译英在必要时需要翻译成长句。例如不久前的某论文中的一句:筛选出对靶基因干扰效率最高的 HER2-shRNA慢病毒表达载体并成功包装成病毒去感染SKOV-3细胞而后在体外进行实验的结果显示Her2/neu的siRNA慢病毒载体可以显著抑制靶基因的表达并使卵巢癌SKOV3细胞的生物学行为明显受抑。因此,熟练掌握各类从句的写法和作用很重要。 4)汉译英时英语词汇词义辨析不清而导致误用,用词不准。大部分人的翻译习惯是,凡是中文有英文的对应单词,就二话不说直接用,其实这个是不对的。很多同义词意思相近,用法和所用的语境场合完全不同。例如“base”“basis”“foundation”,意思几乎相同,但是用法完全不同。尤其是学术文章,误用就导致歧义。 5)汉译英时逻辑混乱结构不清。汉译英中的逻辑和语句结构相当重要。逻辑混乱,即译文毫无章法,思绪混沌,不知所云。结构不清,即英语的从句或其他成分在句中的位置胡乱摆放,进行翻译的人员自然是清楚的指导这些英语句子的含义,因为是看着中文翻译过来的,想不知道中文含义都难,但是没看过中文的读着就会因此而看得云里雾里,从而导致读者难以理解译文。

电子信息类专业英语翻译

1.This electron beam sweeps across each line at a uniform rate,then flies back to scan another line directly below the previous one and so on,until the horizontal lines into which it is desired to break or split the picture have been scanned in the desired sequence. 电子束以均匀的速率扫描每一行,然后飞速返回去扫描下一行,直到把被扫描的图像按所希望的顺序分割成行。 2.The technical possibilities could well exist,therefore,of nation-wide integrated transmission network of high capacity,controlled by computers,interconnected globally by satellite and submarine cable,providing speedy and reliable communications throughout the word 因此,在技术上完全可能实现全国性的集成发送网络。这种网络容量大,由计算机控制,并能通过卫星和海底电缆实现全球互联,提供世界范围的高速、可靠的通信。 3.Transit time is the primary factor which limits the ability of a transistor to operate at high frequency. 渡越时间是限制晶体管高频工作能力的主要因素 4.The intensity of sound is inversely proportional to the square of the distance measured from the source of the sound. 声强与到声源的距离的平方成反比。 5.The attenuation of the filter is nearly constant to within 0.5 dB over the entire frequency band. 该滤波器的衰减近于恒定, 整个频带内的变化在0.5 dB以内。 6.At present, the state of most semiconductor device technology is such that the device design and process technology must be supplemented by screening and inspection procedures, if ultimate device reliability is to be obtained and controlled. 目前, 大多数半导体器件的技术尚未十分完善, 以至若要获得并控制器件最终的可靠性, 就必须辅以筛选和检验, 以弥补设计和工艺技术之不足 7.Bandwidth of transistor amplifiers vary from about 250 MHz in the L band to 1000 MHz in the X band. 晶体管放大器的带宽在L波段约为250 MHz, 在X波段为1000 MHz。 8.The output of the differential amplifier is fed to the circuit’s output stage via an offset-compensation network, which causes the op-amp’s output to center at zero volts. The output stage takes the form of a complementary emitter follower, and provides a low-impedance output. 差动放大级的输出通过一个失调补偿网络与输出级相连, 目的是使运放的输出以0 V为中心。输出级采用互补的射极跟随器的形式以使输出阻抗很低 9.Because of the very high open-loop voltage gain of the op-amp, the output is driven into positive saturation (close to +V) when the sample voltage goes slightly above the reference voltage, and driven into negative saturation (close to-V) when the sample voltage goes slightly below the reference voltage. 由于运放的开环电压增益很高, 当取样电压略高于参考电压时, 输出趋向于正向饱和状态(接近+V)。当取样电压低于参考电压时, 输出趋向于负向饱和状态(接近-V)。 10.If the signal source were direct connected instead of capacitor coupled, there would be a low resistance path from the base to the negative supply line, and this would affect the circuit bias conditions. 如果信号源和电路不是用电容耦合而是直接相连,从基极到负电源线就会一个低阻通路,并且这将影响到电路偏置状态 11.The differential amplifier has a high-impedance (constant-current)“tail”to give it a high input impedance and a high degree of common-mode signal rejection. It also has a high-impedance collector (or drain) load, to give it a large amount of signal-voltage gain (typically about 100 dB). 差动放大极有一个高阻抗的“尾巴”(恒流源)以提供高输入阻抗和对共模信号的深度抑制,同时,它还具有一个高阻抗和集电极或漏极负载以提供高的信号电压增益(典型的数据是100dB). 12.On the other hand, a DC negative-logic system, as in Figure 3.6(b), is one which designates the more negative voltage state of the bit as the 1 level and the more positive as the 0 level. 另一方面, 如图3.6(b)所示, 把比特的较低的电压状态记为1电平, 较高的电压状态记为0电平, 这样的系统称为直流负逻辑系统。 13.For example, to represent the 10 numerals (0, 1, 2, …, 9) and the 26 letters of the English alphabet would require 36

信息管理专业英语第二版参考答案

Unit 1 【Ex1、】根据课文内容,回答以下问题。 1.In human terms and in the broadest sense, information is anything that you are capable of perceiving、 2.It includes written communications, spoken communications, photographs, art, music, and nearly anything that is perceptible、 3.If we consider information in the sense of all stimuli as information, then we can’t really find organization in all cases、 4.No、 5.Traditionally, in libraries, information was contained in books, periodicals, newspapers, and other types of recorded media、People access it through a library’s catalog and with the assistance of indexes, in the case of periodical and newspaper articles、 https://www.wendangku.net/doc/f57577280.html,puterized “information systems”、 7.The problem for most researchers is that they have yet to discover the organizing principles that are designed to help them find the information they need、 8.For library materials, the organizing principle is a detailed subject classification system available for searching in an online “catalog”、 9.The one thing common to all of these access systems is organization、 10.No, it isn’t、 【Ex2、】根据给出的汉语词义与规定的词类写出相应的英语单词。每词的首字母已给出。 n.取回,恢复,修补;检索retrieval n.机械装置,机构,机制mechanism adj.特有的,表示特性的,典型的characteristic n.分类,分级classification n.风格,方式,样式,习惯manner n.文件,公文document vt.解释,说明Interpret vt.使自动化,自动操作automate n.分类assortment n.法则,原则,原理principle n.排列,安排arrangement n.&vt.访问,存取access n.浏览器;浏览书本的人browser n.目录catalog n.索引index n.材料,原料,物资,素材material

电子信息工程专业英语作业3

Lesson eight 第八课 Ⅱ.翻译句子,并注意remain和above的词类和词义 2. In this case the voltage applied must remain unchanged. 在这种情况下,那个应用电压必须保持不变 4. If you take 3 from 8, 5 remain. 如果从8中拿走3,剩5. 6. The above property was discovered by Faraday. 法拉第发现以上性质。 8. Lenz states that the self-induced emf impedes any change of current and tends to support the former current value. The above is known as Lenz’s law. 楞茨陈述自感电动势阻止电流的变化而保持先前电流的值。上面就是我们所知的楞 次定律。 Ⅲ.翻译句子,注意some的词义 2. That radio receiver weighs some five kilograms. 那个无线接收器重五公斤。 4. Some element in the substance is not known. 物质中的一些元素是人们不知道的。 Ⅳ.翻译句子,注意句中one 的不同用法和词义。 2. This concept was discussed in Chapter One. 这个概念在第一张讨论过。 4. No one can lift this equipment. 没人能举起这件设备。 6. This chapter will deal with one of the three functions of a turning circuit. 这章我们将介绍螺旋电路三个功能中的一个。 8. Before one studies a system, it is necessary to define and discuss some important terms. 在研究一个系统之前,确定且讨论一些重要的术语是有必要的。 Ⅴ.画出句中的名词从句,说明其种类,并将句子译成汉语。 2. These experiments do not show which particles. 这些实验不能显示他们的粒子结构。 4. The operating point is determined by how much bias is used. 操作要点是被用多少偏压决定的。 6. It is not important how this voltage is produced. 这个电压是怎么产生的并不重要。 8. It may be questioned whether this approach is the best for the physicist. 这种方式最适合于医生可能会被质疑。 10. This ball may be used to determine whether that body is charged. 这个球可能用于检测是否身体是带电的。 12. It is known that charged particles emit electromagnetic waves whenever they are accelerated. 众所周知的当电子被加速他们就会发射电磁波。 14. The value of this factor determines how fast the amplitude of the current

管理信息系统MIS(Management Information System)

MIS(Management Information System) the term in the interest of the administration. In the wake of the development of MIS, much business sit up the decentralized message concentration to establish the information system ministry of directly under director, and the chief of information system ministry is ordinarily in the interest of assistant manager’s grade. After the authority of business is centralized up high-quality administration personnel staff’s hand, as if causing much sections office work decrease, hence someone prophesy, middle layer management shall vanish. In reality, the reappearance phase employed layer management among the information system queen not merely not to decrease, on the contrary there being the increase a bit. This is for, although the middle layer management personnel staff getting off exonerate out through loaded down with trivial details daily routine, yet needs them to analyses researching work in the way of even more energy, lift further admonishing the decision of strategic importance level. In the wake of the development of MIS, the business continuously adds to the demand of high technique a talented person, but the scarce thing of capability shall be washed out gradually. This compels people by means of study and cultivating, and continuously lifts individual’s quality. In The wake of the news dispatch and electric network and file transmission system development, business staff member is on duty in many being living incomparably either the home. Having caused that corporation save the expenses enormously, the work efficiency obviously moves upward American Rank Zeros corporation the office system on the net, in the interest of the creativity of raise office personnel staff was produced the advantageous term. At the moment many countries are fermenting one kind of more well-developed manufacturing industry strategy, and become quickly manufacturing the business. It completely on the basis of the user requirement organization design together with manufacture, may carry on the large-scale cooperation in the interest of identical produce by means of the business that the flow was shifted the distinct districts, and by means of the once more programming to the machinery with to the resources and the reorganization of personnel staff , constituted a fresh affrication system, and causes that manufacturing cost together with lot nearly have nothing to do with. Quickly manufacturing the business establishes a whole completely new strategy dependence relation against consumer, and is able to arouse the structure of production once more revolution. The management information system is towards the self-adoption and Self-learning orientation development, the decision procedure of imitation man who is be able to be better. Some entrepreneurs of the west vainly hope that consummate MIS is encircles the magic drug to govern the business all kinds of diseases; Yet also someone says, and what it is too many is dependent on the defeat that MIS be able to cause on the administration. It is adaptable each other to comprehend the effect to the business of MIS, and is favor of us to be living in development and the research work, and causes the business organization and administer the better development against MIS of system and administration means , and establish more valid MIS. 英文翻译文章的出处:Russ Basiura, Mike Batongbacal 管理信息系统: 管理信息系统就是我们常说的MIS(Management Information System), 在强调管理,

信息管理专业英语 unit1-12 单词以及句子翻译

专业英语 一、专业术语 RFID射频识别IOT物联网Cloud Computing云计算ANN神经网络BI商业智能E-business /Web-business / e-commerce电子商务KM知识管理GIS地理信息系统PDA掌上电脑Bluetooth蓝牙技术CAD计算机辅助设计CMD计算机辅助制作branch manager部门经理binary format二进制格式USB(Universal Serial Bus)通用串行总线computer case计算机机箱 temporary storage of information临时存储信息floppy disk软盘CD-ROM只读光盘textual源代码video card视频卡,显卡sound card音频卡,声卡 DVD数字化视频光盘SISP战略信息系统计划Project Management项目管理Human Resources人力资源End-User Systems Development最终用户系统开发rolling business plans流动业务计划MIS(management information system)管理信息系统DB(database)数据库DBMS(database Management system)数据库管理系统DSS(decision support system)决策支持系统operational manager运营经理Senior manager 高级经理semi-structured decision半结构化决策 ANS(Advanced Network&Service)高级网络及服务公司 TPS(Transaction Processing systems)事务管理系统 KWS(Knowledge Work Systems)只是工作系统GRASP绘制机器人技术应用软件包OAS(Office Automation Systems)办公自动化系统 ESS(Executive Support Systems)经理支持系统 EIS(Executive Information Systems)经理信息系统 OLAP(on-line analytical processing)联机分析处理 GIS(Group Information Systems)集群信息系统 GDSS(Group Decision Support Systems)集群决策支持系统 MIT(Management Information technology)管理信息技术 RAD(rapid application development)快速应用开发 Two-way communications 双工通讯client-server environment 客户服务环境Data warehouse 数据仓库logistics information systems 物流信息系统 ERP(Enterprise resource planning)企业资源规划 CRM(customer relationship Management)客户关系管理 OOD(Object-Oriented design)面向对象设计 OOP(Object0Oriented Programming)面向对象编程 HLLs(High Level Languages)高级语言ADTs(Abstract Data Types)抽象数据类型Software Ics软件的组成单元machine code机器码op-code输出码 EDI(Electronic Data interchange)电子数据交换 SMEs(small and medium sized enterprises)中小企业 B2B企业对企业电子商务B2C企业对用户电子商务 CERT(Character Error Rate Tester)字符出错率测试器 CIAS(Communication Link Analyzer System)通信链路分析系统 IMS(Information Management System)管理信息系统 NDMS(Netware Data Management System)网络数据管理系统

电子信息工程专业英语B篇译文

果粒橙 图解:译文“蓝色” Unit 6 The Principle of PCM PCM原理 Pcm is dependent on three separate operations, sampling, quantizing, and coding. Many different schemes for performing these three functions have evolved during recent years, and we shall describe the main ones. In these descriptions we shall see how a speech channel of telephone quality may be conveyed as a series of amplitude values, each value being represented, that is, coded as a sequence of 8 binary digits. Furthermore, we shall prove that a minimum theoretical sampling frequency of order 6.8 kilohertz(khz) is required to convey a voice channel occupying the range 300 HZ to 3.4 Khz. Practical equipments, however, normally use3 a sampling rate of 8 khz, and if 8-digits per sample value are used, the voice channel becomes represented by a stream of pulses with a repetition rate of 64khz. Fig .1-1 illustrates the sampling, quantizing, and coding processes. PCM的构成依赖于三个环节,即采样、量化和编码。近年来,人们对这三个环节的实现提出了许多不同的方案,我们将对其中的一些主要的方案进行讨论。在这些讨 论中,我们会看到话路中的语声信号是如何转换成幅值序列的,而每个幅值又被编码,即以8位二进制数的序列表示。而且,我们将证明,为了转换频率范围为300HZ— 3.4KHZ的话路信号,理论上最小采样频率须为6.8khz。但是,实际设备通常用8khz 的采样速率,而如果每个样值用8位码的话,则话路是由一个重复速率为64khz的脉 冲流来表示的。图1-1表示了采样、量化、编码的过程。 Reexamination of our simple example shows us that the speech signal of maximum frequency 3.4khz has been represented by a signal of frequency 64khz. However, if only 4-digits per sample value had been used, the quality of transmission would drop, and the repetition rate of the pulses would be reduced to 32khz. Thus the quality of transmission is dependent on the pulse repetition rate, and for digital communication systems these two variables may be interchanged most efficiently. 让我们再研究一下上面提到的简单例子。可以看出,最高频率为3.4khz的话音信号适用64khz的(脉冲流)信号来表示的。但是,如果每个样值中用4位(码)表示,则传输质量会下降,而脉冲的重复速率也将减小到32khz。因而传输质量是取决于脉 冲重复速率的。对于数字通信系统,这两个量之间极明显的互相影响着。 Digital transmission provides a powerful method for overcoming noisy environments. Noise can be introduced into transmission patch in many different ways : perhaps via a nearby lightning strike, the sparking of a car ignition system, or the thermal low-level noise within the communication equipment itself. It is the relationship of the true signal to the noise signal, known as the signal-to-noise ratio, which is of the most interest to the communication engineer.Basically, if the signal is very large compared to the noise level, then a perfect message can take place; however, this is not always the case. For example, the signal received from a

管理信息系统中英文翻译资料

Managemengt Information Systems By a management information system,we propose the follow alternate definition: an integrated uer/machine system (usually computerized) for providing information to support decision making in an enterprise. The key elements of this definition are —An integrated uer/machine system —For proving information —To support decision making —In an enterprise A management information system utilizes —Computer hardware and software —Manual procedures —Models for analysis —A database Just as there is a logical flow of materials in the creation of a product, there is logical flow of information in a management information system.In manufacturing,raw materials move through a process that transforms the raw materials into usable products. In a similar fashion, in an information system,data are supplied to a system(input), the data are manipulated(processed),and they are transformed into information(output).In its simplest form ,a management information systemed may be depicted by an input-process-output(IPO) model

信管英语总复习题目

信管英语复习试题参考答案(第一部分) 一、翻译(课本P1-3) 1、The study of information systems is usually a commerce and business administration discipline. “and frequently involves software engineering, but also distinguishes itself by concentrating on the integration of computer systems with the aims of the organization. 2、Information systems support business processes and operations by the ways 1) Processing these accounting records into income statements, balance sheets,ledgers,management reports,and other forms of financial information 2) Recording and storing inventory data,work in process data, equipment repair and maintenance data,supply chain data,and other production/operations records 3、More sophisticated programs often seamlessly incorporate statistical decision making tools like sensitivity analysis,Monte Carlo analysis.risk analysis, breakeven analysis and Bayesian analysis. 4、If,for example,you are using the information system to decide about a new product introduction,the program should incorporate tools like logic analysis, conjoint analysis, contribution margin analysis.multi-dimensional scaling,multi-factor analysis. factor analysis,cluster analysis, discriminant analysis, Quality Function Deployment,preference regressions,and preference-rank translations。 二、选择(课本P4) As the strategic support role,information systems can support a company's competitive positioning (l)The supports of help in the piloting of the chain of internal value. They are the most recent,the most__________ and are within the reach of the manager They are the solutions of reductions of costs and management of the__________. One___________ them under the name of “Business Workflow Analysis”( BWA) or of“Business Management Sys tems Peer To Peer(p2p)”Tools netw orks,they assure the control of the piloting of the___________ of the functions of the company,the mastery in real time of the costs of dysfunctions cause distances from accounts,evaluation and reporting of accounting results___________ in the evaluation and in the reporting of results quality ①indicates ②articulated ③pragmatic ④performance ⑤set 三、判断(课本P33-34) From time to time, organizations need to change their information systems, in response to new marketing opportunities, modified government regulations, the introduction of new technolog, merger with another company, or other developments. For instance, a major cable-TV company may need to set up a billing system for movies-on-demand, or, on a smaller scale, a two-person graphic design business may want to change its invoice and payment system. When change is needed, the time is ripe for applying the principles of systems analysis and design. The formal process by which organizations build systems is known as the Systems Development Life Cycle (SDLC). The extent to which your job brings you in contact with your company's SDLC will vary depending on a number of factors, such as the size of the organization, your job description, your relevant experience, and your

相关文档
相关文档 最新文档