導航:首頁 > 網路連接 > 有關計算機網路的英文文章

有關計算機網路的英文文章

發布時間:2023-06-16 08:33:42

A. 求計算機中英文文獻!十萬火急!

樓主要加分啊!

Computer network virus and precautions

With the new network technology and application of the continuous rapid development of the computer network should
Use of becoming increasingly widespread, the role played by the increasingly important computer networks and human
More inseparable from the lives of the community's reliance on them will keep growing. With
With the continuous development of computer technology, the virus has become increasingly complex and senior, the new generation of
Computer viruses make full use of certain commonly used operating systems and application software for protection of the weak low
Spots have rampant in recent years as the popularity of the Internet in the world, will be attached document containing the virus
The situation in the mail has been increasing spread of the virus through the Internet, making the spread of the virus speed
Sharp also increased, by an ever-increasing scope of the infection. Therefore, the protection of the security of computer networks will be
Will become increasingly important.
A computer virus
The definition of computer virus computer virus (Computer Virus) in the "people's republic of China
The computer information system security protection regulations "which has been clearly defined, the virus" refers to the preparation or
Computer program inserted in the damage or destruction of computer data functions, affecting computer use
Self-replication and can a group of computer instructions, or code. "
Second, network virus
With the development of network and the Internet, a wider spread, the greater New harm
The virus emerged This is the Internet virus. The virus is an emerging concept in the traditional
The virus was not classified network virus this concept, because the development of networks, the traditional virus
The network also has a number of characteristics. Today's Internet virus is a broad notion of a
As as long as it is carried out using the Internet to spread destruction can be known as network viruses, such as:
"Love the back door", "Panda burning incense."
Third, network virus and the distinction between computer virus
The original common computer virus is nothing more than the devastating formatted hard drive, delete system
With the users documents, databases, etc. destruction. The mode of transmission is through nothing but also by virus infection
Mutual of the software, carrying the virus, such as the use of pirated optical discs, such as infection disk systems
The pilot virus and infected executable file virus, in addition to a network virus
These are the common characteristics of the virus, but also steal users with remote data, remote control of the other side
Computers and other damaged properties, such as Trojan and consumption of funding the operation of the network computer
Source collapse of the network server worm.
Fourth, the network against virus
Network destructive virus, will directly affect the work of the network, ranging from lowering speed video
Ring for the efficiency of the network, while in the collapse, undermining the server information to a multi-year work destroyed
Dan. Because viruses and other network annually fraud led to economic losses of over 16 billion yuan,
But this figure is constantly rising year by year. The next few years, the size of the market will reach Security
60 billion yuan. One antivirus software experts pointed out: "Network avian flu virus even more." Such as: "Xiong
Cat burning incense "In addition to virus infection through the web site users, the latest virus also through QQ
Loopholes in propagating itself through file-sharing networks, the default sharing, weak password systems, U disk and windows
Forms bottom of the top mobile hard drives, and other means of communication. While LAN once a computer machine
For infection, it can spread through the entire network instant, or even within a very short period of time can be infected
Thousands of computers, can lead to serious networks. Symptoms of poisoning in the performance of computers
There are enforceable. Exe files have become a strange pattern, the pattern shown as "Panda
Burning incense, "and then System blue screen, restart the frequent, hard drive data destruction, serious entire company
All computer LAN will all poisoning. "Panda burning incense," only more than half a month, a few varieties have high
Of more than 50, and the number of its users infected constantly expanding. Makes infected, "Panda burn incense" disease
The personal drug users has been as high as several million people infected with a few more corporate users is rising exponentially. Network
More on the computer network the greater the harm caused by the virus.
V. network transmission of the virus Features
1. Infection fast: single machine environment, the virus can only be passed from one computer diskette
To another, and in the network can be adopted by the rapid spread of network communication mechanism. According to measurement
Set against a typical PC network use in normal circumstances, once a computer workstation sick
Drugs, and will be online within 10 minutes in the several hundreds of all infected computers.
2. Proliferation of a wide range: in the network e to the spread of the virus very quickly and spread to encompass a large area, not only the rapid transmission of all LAN computer, but also through remote workstations virus in一瞬
Inter spread to thousands of miles away.
3. Dissemination in the form of complex and varied: computer viruses in general through the network "
Station server workstation "channels of communication, but in the form of complex and diverse communication.
4. Difficult to completely wipe: the standalone computer virus carriers sometimes can be deleted documents
Or low-level formatted drives, and other measures to eliminate the virus completely, and the network once a computer work
Clean stations failed to disinfect the entire network can be re-infected by the virus, or even just completed removal
The work of a workstation is likely to be on-line by another workstation virus infection. Therefore,
Only workstations in addition to killing viruses, and can not solve the virus harm to the network is.
6, the type of network virus
As the network increasingly developed, the type of network virus has been increasing, generally summed up as
The following categories:
1. Worm
It is the use of the transmission mechanism of replication and dissemination network, the mode of transmission is through the network
And e-mail, the prefix is Worm. For example, in recent years the great harm "Nimda" virus is Demodex
A worm virus. The virus used Microsoft's Windows operating system, computer flu
With this virus, will continue to automatically dial-up Internet access and use information in the document or the address
Sharing network spreads, and ultimately undermine the most important user data.
2. Macro Virus
Hong virus is a Storage in the document or template in the Acer computer virus. The prefix
Macro, once open such documents, which Acer will be implemented, then the virus would Acer
Been enabled transferred to the computer, and in the presence of the Normal template. From then on, all since
The document will be kept moving "infection" that the Hong virus, and if other users opened the flu
Documents with the virus, the Hong virus will be transferred to his computer.
3. Destructive proceres virus
The prefix destructive virus program is: Harm. The characteristics of this virus is a good in itself
Look at the user clicks on icons to temptation, when the user clicks on the virus, the virus will direct users
Computer generated destruction. If C formatted disk (Harm.formatC.f), the killer orders (Harm.
Command.Killer).
4. System virus
The prefix system for the virus: Win32, PE, Win95, W32, W95, and so on. These viruses
The characteristics of the general public can be infected with the windows operating system *. exe and *. dll file,
And through these documents for dissemination. If the CIH virus.
5. Backdoor virus
Backdoor virus prefix is Backdoor. The total of such virus through network -
Sowing, opened the back door to the system to the user and potential safety problems.
6. Bundling machine virus
Bundled-virus prefix is: Binder. The characteristics of this virus is the virus writers will use
Specific proceres will be bundled with a number of applications such as QQ, IE bundled up on the surface
It is normal to see the paper, when users run these bundled virus, will run these applications on the surface
Proceres, and then tied to the operation of hidden virus, which caused harm to the user. Such as: baled
Tied QQ (Binder.QQPass.QQBin), the system killer (Binder.killsys).
7. Script virus
The virus is usually JavaScript scripting code prepared by the malicious code, prefix is usually
Spript, with the general nature of advertising, will modify your IE Home, modify registry, and other information,
Computer user inconvenience caused.
8. Planting proceres virus virus
This virus is of the public will run from the in vivo release of one or several new
Under the virus to the system directory, by the release of a new virus damage. If the glaciers are sowing
(Dropper.BingHe2.2C), MSN striker (Dropper.Worm.Smibag).
9. Joke virus
The prefix is the virus joke: Joke. Also called prank virus. The characteristics of this virus is itself a nice user clicks on icons to temptation,
When the user clicks of this virus, the virus will be made to disrupt the operation scare users, in fact
The virus did not destroy any computer user. Such as: ghost (Joke.Girlghost) virus.
10. Trojan hacking virus
Trojan its prefix is: Trojan, hackers virus prefix General for Hack. Public special
Sex is through the network or system loopholes into the user's system and hidden, and then leaked to the outside world
User information, hackers virus there is a visual interface to the user's computer remotely
Control. Trojans, hackers often paired virus emerging, Trojan horse virus responsible for the invasive power users
Brain, and hackers virus will be passed to the Trojan horse virus control. . General Trojan such as QQ
News tail Trojan Trojan.QQ3344, there are big Trojan.LMir.PSW.60. Virus Form
A PSW or anything like PWD general said that the virus has stolen password function,
If some hacker programs, such as network梟雄Hack.Nether.Client.
7, the mode of transmission and network anti-virus
Through the above, we can see that e-mail viruses spread Click homepage, users download,
Others implant, implant, and other loopholes through five computer transmission, so long as holding these five
A thoroughfare, we will be able to live better anti-virus network.

計算機網路病毒與防範

隨著各種新的網路技術的不斷應用和迅速發展, 計算機網路的應
用范圍變得越來越廣泛, 所起的作用越來越重要, 計算機網路與人類
的生活更加密不可分, 社會對其的依賴程度也會隨之不斷增長。而隨
著計算機技術的不斷發展, 病毒也變得越來越復雜和高級, 新一代的
計算機病毒充分利用某些常用操作系統與應用軟體的低防護性的弱
點不斷肆虐, 最近幾年隨著網際網路在全球的普及, 將含病毒文件附加
在郵件中的情況不斷增多, 通過網路傳播病毒, 使得病毒的擴散速度
也急驟提高, 受感染的范圍越來越廣。因此, 計算機網路的安全保護將
會變得越來越重要。
一、計算機病毒
計算機病毒的定義計算機病毒(Computer Virus)在《中華人民共和
國計算機信息系統安全保護條例》中被明確定義, 病毒「指編制或者在
計算機程序中插入的破壞計算機功能或者破壞數據, 影響計算機使用
並且能夠自我復制的一組計算機指令或者程序代碼」。
二、網路病毒
隨著網路和Internet 的發展,一個傳播范圍更廣,危害更大的新型
病毒應運而生.這就是網路病毒。網路病毒是一個新興的概念, 在傳統
的病毒分類里沒有網路病毒這個概念, 由於網路的發展, 傳統的病毒
也就具有了一些網路的特性。如今的網路病毒是一個廣義的概念, 一
般只要是利用網路來進行傳播、破壞的都可以被稱為網路病毒, 如:
「愛情後門」、「熊貓燒香」等。
三、網路病毒與計算機病毒的區別
原先常見的計算機病毒的破壞性無非就是格式化硬碟, 刪除系統
與用戶文件、破壞資料庫等等。而傳播途徑也無非是通過遭病毒感染
的軟體的互相拷貝, 攜帶病毒的盜版光碟的使用等, 如感染磁碟系統
區的引導型病毒和感染可執行文件的文件型病毒, 而網路病毒除了具
有普通病毒的這些特性外, 還具有遠端竊取用戶數據、遠端控制對方
計算機等破壞特性, 比如特洛伊木馬病毒和消耗網路計算機的運行資
源, 拖垮網路伺服器的蠕蟲病毒。
四、網路病毒的危害
網路上病毒破壞性大, 將直接影響網路的工作, 輕則降低速度, 影
響工作效率, 重則使網路崩潰, 破壞伺服器信息, 使多年工作毀於一
旦。每年由於病毒等網路欺詐行為導致的經濟損失高達160 億多元,
而且這個數字逐年還在不斷地攀升。未來幾年, 安防市場規模將達到
600 億元。一位殺毒軟體專家指出: 「網路病毒更甚於禽流感」。如: 「熊
貓燒香」除了通過網站帶毒感染用戶之外, 此病毒還會通過QQ 最新
漏洞傳播自身, 通過網路文件共享、默認共享、系統弱口令、U 盤及窗
體頂端窗體底端移動硬碟等多種途徑傳播。而區域網中只要有一台機
器感染, 就可以瞬間傳遍整個網路, 甚至在極短時間之內就可以感染
幾千台計算機, 嚴重時可以導致網路癱瘓。中毒症狀表現為電腦中所
有可執行的.exe 文件都變成了一種怪異的圖案, 該圖案顯示為「熊貓
燒香」, 繼而系統藍屏、頻繁重啟、硬碟數據被破壞等, 嚴重的整個公司
區域網內所有電腦會全部中毒。「熊貓燒香」僅半個多月, 變種數已高
達50 多個, 並且其感染用戶的數量不斷擴大。使得感染「熊貓燒香」病
毒的個人用戶已經高達幾百萬, 企業用戶感染數更是成倍上升。網路
上的計算機越多, 網路病毒造成的危害越大。
五、網路病毒傳播特點
1.感染速度快: 在單機環境下, 病毒只能通過軟盤從一台計算機
帶到另一台, 而在網路中則可以通過網路通訊機制迅速擴散。根據測
定, 針對一台典型的PC 網路在正常使用情況, 只要有一台工作站有病
毒, 就可在幾十分鍾內將網上的數百台計算機全部感染。
2.擴散面廣: 由於病毒在網路中擴散非常快, 擴散范圍很大, 不但能迅速傳染區域網內所有計算機, 還能通過遠程工作站將病毒在一瞬
間傳播到千里之外。
3.傳播的形式復雜多樣: 計算機病毒在網路上一般是通過「工作
站伺服器工作站」的途徑進行傳播的, 但傳播的形式復雜多樣。
4.難於徹底清除: 單機上的計算機病毒有時可通過刪除帶毒文件
或低級格式化硬碟等措施將病毒徹底清除, 而網路中只要有一台工作
站未能消毒干凈就可使整個網路重新被病毒感染, 甚至剛剛完成清除
工作的一台工作站就有可能被網上另一台帶毒工作站所感染。因此,
僅對工作站進行病毒殺除, 並不能解決病毒對網路的危害。
六、網路病毒的類型
由於網路越來越發達, 網路病毒的種類也越來越多, 大體歸納為
以下幾類:
1.蠕蟲病毒
它的傳染機理是利用網路進行復制和傳播, 傳染途徑是通過網路
和電子郵件,前綴是Worm。比如近年危害很大的「尼姆達」病毒就是蠕
蟲病毒的一種。這一病毒利用了微軟視窗操作系統的漏洞, 計算機感
染這一病毒後, 會不斷自動撥號上網, 並利用文件中的地址信息或者
網路共享進行傳播, 最終破壞用戶的大部分重要數據。
2.宏病毒
宏病毒是一種寄存在文檔或模板的宏中的計算機病毒。前綴是
Macro, 一旦打開這樣的文檔, 其中的宏就會被執行, 於是宏病毒就會
被激活, 轉移到計算機上, 並駐留在Normal 模板上。從此以後, 所有自
動保存的文檔都會「感染」上這種宏病毒, 而且如果其他用戶打開了感
染病毒的文檔, 宏病毒又會轉移到他的計算機上。
3.破壞性程序病毒
破壞性程序病毒的前綴是: Harm。這類病毒的特性是本身具有好
看的圖標來誘惑用戶點擊, 當用戶點擊病毒時, 病毒便會直接對用戶
計算機產生破壞。如格式化C 盤(Harm.formatC.f) 、殺手命令(Harm.
Command.Killer) 等。
4.系統病毒
系統病毒的前綴為:Win32、PE、Win95、W32、W95 等。這些病毒的
一般公有的特性是可以感染windows 操作系統的*.exe 和*.dll 文件,
並通過這些文件進行傳播。如CIH 病毒。
5.後門病毒
後門病毒的前綴是Backdoor。該類病毒的共有特性是通過網路傳
播, 給系統開後門, 給用戶帶來安全隱患。
6.捆綁機病毒
捆綁機病毒的前綴是: Binder。這類病毒的特性是病毒作者會使用
特定的捆綁程序將病毒與一些應用程序如QQ、IE 捆綁起來, 表面上
看是正常文件, 當用戶運行這些捆綁病毒時, 會表面上運行這些應用
程序, 然後隱藏運行捆綁在一起的病毒, 從而給用戶造成危害。如: 捆
綁QQ(Binder.QQPass.QQBin) 、系統殺手(Binder.killsys) 等。
7.腳本病毒
腳本病毒通常是JavaScript 代碼編寫的惡意代碼, 前綴是通常為
Spript, 一般帶有廣告性質, 會修改您的IE 首頁、修改注冊表等信息,
造成用戶使用計算機不方便。
8.病毒種植程序病毒
這類病毒的公有特性是運行時會從體內釋放出一個或幾個新的
病毒到系統目錄下, 由釋放出來的新病毒產生破壞。如冰河播種者
(Dropper.BingHe2.2C) 、MSN 射手(Dropper.Worm.Smibag)等。
9.玩笑病毒
玩笑病毒的前綴是: Joke。也稱惡作劇病毒。這類病毒的特性是本身具有好看的圖標來誘惑用戶點擊,
當用戶點擊這類病毒時, 病毒會做出各種破壞操作來嚇唬用戶, 其實
病毒並沒有對用戶電腦進行任何破壞。如: 女鬼( Joke.Girlghost) 病毒。
10.木馬黑客病毒
木馬病毒其前綴是: Trojan, 黑客病毒前綴名一般為Hack。公有特
性是通過網路或者系統漏洞進入用戶的系統並隱藏, 然後向外界泄露
用戶信息, 黑客病毒則有一個可視的界面, 能對用戶的電腦進行遠程
控制。木馬、黑客病毒往往是成對出現的, 木馬病毒負責侵入用戶的電
腦, 而黑客病毒則會通過該木馬病毒來進行控制。。一般的木馬如QQ
消息尾巴木馬Trojan.QQ3344, 還有大Trojan.LMir.PSW.60。病毒名中
有PSW或者什麼PWD 之類的一般表示這個病毒有盜取密碼的功能,
一些黑客程序如網路梟雄Hack.Nether.Client 等。

B. 跪求一遍關於計算機網路的英語作文..字數在1200以上的..

Computer networks
Now every almost have computers, and computer good does have its downside - it depends on how you use. If you want to ask me: I on the computer do what, I can tell you, I will do a lot of things in the computer. May first and have out-of-town relatives chat, then can check information, listening to music, watching movies, paint... My favorite on the computer music and watching movies, because it very relaxing my mood.But the most people used compter to surf the internet.Now Let us know about the computer network
Ⅰ.Introction
Computer networks,the wide spread sharing of information among groups of computers and their users,are a central part of the information age.The popular adoption of the personal computer(PC)
and the local area network (LAN) ring the 1980s has led to the capacity to access information on a distant database;download an application from overseas;send a message to a friend country;and share files with a colleague-all from a personal computer.
The network that allow all this to be done so easily are sophisticated and complex entities.They rely for their effectiveness on many cooperating computers.The design and deployment of the wordwide computer network can be viewed as one of the great technological wonders of recent decades. Nowadays Intemet is very popular all over the world, especially in some big cities. Do you know when the Intemet was first established? Built in 1960s, the Internet was a crude network of a few computers which shared information. If one of the computers broke down, the whole networks would be unable to work, causing continual problems. At first, just the government had access to the Internet, using it for communications among different branches. However, by 1970s the Internet had been used in universities, banks, and hospitals. At the beginning of 1990s computers became affordable for common people and this affordability increased the use of the Internet by people,It is said that each day tens of millions of people log off, making it the most important part of people's life.

Ⅱ.Local Area Network
One of the most dramatic events in computer networking has been the introction and rapid growth of local area network(LAN) as a way to standardize the system of linking computers used in office systems.As the name suggests,this is a means of connecting a number of computing elements together.At the simplest level,a LAN provides no more more than a shared medium (such as a coaxial cable to which all computers and printers are connected) along with a set of rules that govern the access to that medium.The most widely used LAN,Ethernet,used a mechanism called Carrier Sense Multiple Access-Collosion Detect(CSMA-CD).This means that each connected device can only use the cable when it has established that each connected device is using it.If there is contention, the device looking for a connection backs off and tries again later.The Ethernet transfers data at 10M bits/sec,which is fast enough to make the distance between devices insignificant.They appeat to be connected directly to their destination.
There are many different layouts(such as bus ,star,ring,see Figure 6A-2)and a number of different access protocols for LANs.Despire this variety,all LANs share the feature that they are limited in range (typically they cover one building) and are fast enough to make the connecting network invisible to the devices that use it.
In addition to providing shared access,modern LANs can also give users a wide range of sophisticated facilities.Managenment software packages are available to control the way in which devices are configured on the local area network (LAN),how users are administered,and how network resources are controlled.A widely adopted structure o local network is to have a number of servers that are available to a (usuallu much greater) nember of clients.The former,usually powerful computers,provide service such as print control,file sharing,and mail to the latter,which are usually personal computers.
Ⅲ.Routers and brideges
The facilities on most local area network (LAN) are very powerful.Most organizatonns do not wish to have small isolated islands of computing facilities.They usually want to extend facilities over a wider area so that groups can wok wtthout having to be located.Routers and bridges arespecialized devices that allow two or more local area network (LAN) to be connected.The bridges is the more basic device and can only connect local area network (LAN) of the same type.The router is a more intelligent component that can interconnent many different types of computer network.
Many large companies have corporate adta network that are founded on a collection of local area network (LAN) and routers.From the user』s point of view,this arrangement provides them with a physically diverse network that looks like one coherent resource.
Ⅳ.Wide Area Networks
At some point,it becomes impractical to extend a local area network (LAN) any further.Physical limitation sometimes drives this,but more often than not there are more concenient or cheaper ways to extend a computer network.Two major components in most real computer networks are the public telephone and data networks.These provide long-distance links that extend a local area network (LAN) into a wide area network (WAN).Nearly all of the national network operators offer services for the interconnection of computer networks.These services range from simple, low speed data links that work over the public telephone network to sophisticaied high speed data services that are ideally suited to the interconnection of LANs.These high speed data services are usually referred to as broadband connection.It is anticiopated that they will provide the necessary links between LANs that make what is called the information superhighway a reality.

C. 一段英文翻譯(計算機網路方面)

Note: bufer -> buffer

希望我的翻譯對你有幫助。

1. link bandwidth .The network has to decide how to apportion bandwidth between different flows,Network routers may also decide to prioritize certain types of packets(e.g. latencysensitive audio or interactive telnet packes) over others (e.g. electronic mail)
1. 鏈路帶寬。 該網路需要決定怎樣為不同流量分配帶寬,網路路由器也可以用來決定為某種類型的數據包(比如:延遲感應音頻或交互遠程登錄包)
提供在其他(如:電子郵件)之上優先權

2.Queue space .When the router decides that a packet has to be dropped because it is running out of queue space (also known as buffer space ),which packet should it drop?The arriving one?The earliest one?A random one ?And when should it decide to drop packets;only when the queue is full,or sooner than that? Waiting too long to before dropping packets only serves to increase packet delays,and it may be advantageous to drop occasional packets even when the queue isn't full.
2. 隊列空間。 當由路由器認為由於一個包運行在隊列空間(也稱作緩沖空間)之外而需要丟掉時,該丟哪個包呢? 即將到達的? 還是到達最早的那個? 還是隨機挑選一個? 什麼時候決定該丟掉它呢,是隊列滿了的時候,抑或是更早些時候?在丟包前等候太長時間只會增加包延遲,並且有利於隨機丟包甚至是隊列未滿的時候。

What happens if we don't manage network resources well? For one thing, the available bandwidth might end up being greatly under-utilized even when there is demand for it ,causing economic heartburn.Most often ,however,network designers end up provisioning for a certain amount of "expected " offered load,and then have to deal with overload,or congesion.
當我們不能夠很好的管理網路資源時,會發生什麼? 一方面,可用帶寬可能會不能得到充分利用即使在需要這個帶寬時,這會對經濟不利. 然而大多時候,網路設計者最終分配一定量的"預期"負載,接著需要做的就是處理過載或堵塞問題了。

D. 幫忙寫一篇計算機介紹硬體軟體和網路的英語作文

In modern sociey, people who is handicaped in using computer and accessing network are classified as "blinds" naturally. The advantages of captioned facility is significant, the world move much faster than before because of the information exchange and speedy processing of data. You can guess how much business can grow if a spreadsheet need to be calculated using three days instead of one second nowaday, I should say in majority that computers and networking bring much convenience to human life. But there are still dark side of the world. I also observe children that cannot do simple calculation by mind, they have to rely on calculators, a simple form of computer, similar things happen all around us and when time goes by, we are weak in mind manipulation yet also weak in physical because we spent all time around the computer. What a world we are in to say hello to a friend next door by send him email ?

E. 尋人幫忙翻譯一段關於計算機網路的英文

計算機網路作為一個很好的基礎,當前及未來的網路管理人員和管理員可以建立一個數據通信標准,目前的和新興的網路技術,堅實的知識基礎。讀完這本書,您將有累積了更多的了解和對網路和網路贊賞。請注意,這不是一個「如何」的書。我們不提供具體的資料相對於網路管理或配置。引用前教的學生誰是使用這在數據通信和網路課程材料,以前的草案:「這種材料清除了很多東西,為我。它捆綁在一起的十年,我為網路管理員多年來無所適從了。「

F. 高中生英語演講關於電腦或者網路的(在線等)3分鍾

A computer is a machine that manipulates data according to a set of instructions.
Although mechanical examples of computers have existed through much of recorded human history, the first electronic computers were developed in the mid-20th century (1940–1945). These were the size of a large room, consuming as much power as several hundred modern personal computers (PCs). Modern computers based on integrated circuits are millions to billions of times more capable than the early machines, and occupy a fraction of the space. Simple computers are small enough to fit into a wristwatch, and can be powered by a watch battery. Personal computers in their various forms are icons of the Information Age and are what most people think of as "computers". The embedded computers found in many devices from MP3 players to fighter aircraft and from toys to instrial robots are however the most numerous.
The ability to store and execute lists of instructions called programs makes computers extremely versatile, distinguishing them from calculators. The Church–Turing thesis is a mathematical statement of this versatility: any computer with a certain minimum capability is, in principle, capable of performing the same tasks that any other computer can perform. Therefore computers ranging from a mobile phone to a supercomputer are all able to perform the same computational tasks, given enough time and storage capacity.
Programming languages provide various ways of specifying programs for computers to run. Unlike natural languages, programming languages are designed to permit no ambiguity and to be concise. They are purely written languages and are often difficult to read aloud. They are generally either translated into machine code by a compiler or an assembler before being run, or translated directly at run time by an interpreter. Sometimes programs are executed by a hybrid method of the two techniques. There are thousands of different programming languages—some intended to be general purpose, others useful only for highly specialized applications.
Computers have been used to coordinate information between multiple locations since the 1950s. The U.S. military's SAGE system was the first large-scale example of such a system, which led to a number of special-purpose commercial systems like Sabre.

In the 1970s, computer engineers at research institutions throughout the United States began to link their computers together using telecommunications technology. This effort was funded by ARPA (now DARPA), and the computer network that it proced was called the ARPANET. The technologies that made the Arpanet possible spread and evolved.

In time, the network spread beyond academic and military institutions and became known as the Internet. The emergence of networking involved a redefinition of the nature and boundaries of the computer. Computer operating systems and applications were modified to include the ability to define and access the resources of other computers on the network, such as peripheral devices, stored information, and the like, as extensions of the resources of an indivial computer. Initially these facilities were available primarily to people working in high-tech environments, but in the 1990s the spread of applications like e-mail and the World Wide Web, combined with the development of cheap, fast networking technologies like Ethernet and ADSL saw computer networking become almost ubiquitous. In fact, the number of computers that are networked is growing phenomenally. A very large proportion of personal computers regularly connect to the Internet to communicate and receive information. "Wireless" networking, often utilizing mobile phone networks, has meant networking is becoming increasingly ubiquitous even in mobile computing environments.

The need for computers to work well together and to be able to exchange information has spawned the need for many standards organizations, clubs and societies of both a formal and informal nature.

電腦是一台操縱根據指令集的數據。
雖然電腦機械事例,通過記錄的人類歷史上存在很多,首先開發了電腦在20世紀中期(1940年至45年)。這是一個大房間的大小,功耗一樣,數百現代(PC)的個人電腦。關於集成電路的現代計算機的倍比早期的機器能夠十億百萬美元,占據空間小部分。簡單的電腦足夠小,能夠裝到手錶,並且可以通過手錶電池供電。在各種形式的個人電腦是信息時代的圖標,並且大多數人認為是「電腦」。在嵌入式設備中發現的許多MP3播放器到戰斗機,從玩具到工業機器人的電腦但最多。
能夠存儲並執行指令的列表稱為程序使電腦非常多才多藝,他們的區別計算器。教會-圖靈論題是這種多功能性的數學聲明:任何一個有某些最低限度的能力的電腦上,原則上執行相同的任務,任何其他電腦可以執行的能力。因此,從電腦手機到超級電腦都能夠完成同樣的計算任務,足夠的時間和存儲容量。
編程語言提供了指定的電腦程序運行的各種方法。與自然語言,編程語言的目的是不允許任何含糊和精簡。它們是純粹的語言文字,而且往往難以朗讀。他們一般都翻譯成機器代碼編譯器或匯編程序運行之前,或翻譯,直接在運行時由一名翻譯的時間。有時候程序執行的是兩種方法混合方法。有許多不同的編程語言成千上萬的一些擬通用,其他人只需要高度專業化的應用非常有用。
電腦被用來協調20世紀50年代以來,在多個地點的資料。美國軍方的SAGE系統是第一個大規模實施這些制度,這導致了特殊用途的軍刀等商業系統的數量規模的例子。
在20世紀70年代,在研究機構的電腦工程師在美國開始他們的計算機連接在一起使用電信技術。這一努力是ARPA的資助(現在DARPA)的,以及計算機網路,它被稱為產生了ARPANET。該技術取得了ARPANET可能擴散和演變。
隨著時間的推移,以後的學術和軍事機構網路化,成為稱為電腦互聯網。網路的出現,涉及的性質和計算機邊界的重新定義。計算機操作系統和應用程序進行了修改,包括能夠定義和訪問網路上的資源,如其他計算機外圍設備,存儲的信息,等等,為擴展名的個人電腦上的資源。開始時,這些設施主要是人們可以在高科技環境中工作,但在20世紀90年代申請的蔓延,如電子郵件和萬維網,與發展經濟結合起來,如乙太網和ADSL網路技術的快速看到電腦聯網變得幾乎無處不在。事實上,該是聯網的計算機數量正在飄洋過海。個人電腦的一個非常大的比例,定期連接到互聯網來進行交流和接收信息。 「無線」網路,往往利用行動電話網路,意味著網路正在成為即使在移動計算環境日益普及。
對於電腦需要很好地協同工作,並能夠交換信息促成了許多標准組織,俱樂部和雙方正式和非正式性的社會需要。

閱讀全文

與有關計算機網路的英文文章相關的資料

熱點內容
上級網路ip與路由器ip沖突 瀏覽:55
鏈接路由器沒有網路 瀏覽:355
手機電信網路特別快怎麼辦 瀏覽:698
沒有網路怎麼電腦與電腦共享文件 瀏覽:871
開啟藍牙網路共享耗流量嗎 瀏覽:768
網路卡要去哪裡去投訴 瀏覽:322
重慶榮昌網路營銷策劃哪家有名 瀏覽:111
網路小說主角重生做手機 瀏覽:162
大華股份網路安全 瀏覽:898
安裝時設置了公用網路 瀏覽:430
網路一直是光信號怎麼辦 瀏覽:425
安防網路系統可以賣多少錢 瀏覽:710
國際網路聊天軟體下載 瀏覽:886
信號非常好但是網路打牌怎麼了 瀏覽:267
無線能把自己網路調快嗎 瀏覽:424
寶山區手機端網路推廣外包報價 瀏覽:103
廣州翼嘉電腦網路科技有限公司 瀏覽:637
如何在網路平台上舉報廢品收購站 瀏覽:445
築牢全區網路安全防線 瀏覽:404
泰國中國移動網路現狀 瀏覽:896

友情鏈接