登录  
 加关注
   显示下一条  |  关闭
温馨提示!由于新浪微博认证机制调整,您的新浪微博帐号绑定已过期,请重新绑定!立即重新绑定新浪微博》  |  关闭

家庭教育文章

http://youyan7224480.blog.163.com/

 
 
 

日志

 
 

计算机专业英语教案第5章  

2009-06-18 23:02:13|  分类: 博主目录 |  标签: |举报 |字号 订阅

  下载LOFTER 我的照片书  |

 

第5章  Computer Applications

5.1 Word Processing

5.2 Multimedia

5.3  Computer Graphics

5.4  Database Applications

5.5 Computer Virus

 

5.1 Word Processing

?         Personal computer-based office automation software has become an indispensable part of electronic management in many countries.

?         Word processing programs have replaced typewriters; spreadsheet programs have replaced ledger books; database programs have replaced paper-based electoral rolls, inventories and staff lists; personal organizer programs have replaced paper diaries; and so on.

?         Word processing refers to the methods and procedures involved in using a computer to create, edit, and print documents.

?         Word processing software has replaced typewriters for producing documents such as reports, letters, papers, and manuscripts.

The advantage of word processing

?         The great advantage of word processing over using a typewriter is that you can make changes without retyping the entire document.

?         If you want to delete a paragraph, you simply remove it, without leaving a trace.

?         It is equally easy to insert a word, sentence, or paragraph in the middle of a document.

?         Word processors also make it easy to move sections of text from one place to another within a document, or between documents.

?         Most standard word processing features are supported, including footnotes and mail-merge but no tables or columns.

?         The interface uses customizable toolbars, and the editing screen is a zoom-able draft mode that optionally displays headers, footnotes, and footers.

Microsoft Word

?         Microsoft Word is a powerful word processing application that will allow you, through simple keystroke and menu navigation, to create dynamic documents for work, school, or personal use.

?         Word processors vary considerably, but all word processors support some basic features.

Full-featured word processors usually support the following features

?         Insert and Delete text

?         Cut, paste and copy

?         Page size and margins

?         Search and replace

?         Word wrap

?         Print

?         File management

?         Font specifications

?         Footnotes and cross-references

?         Graphics

?         Headers, footers and page numbering

?         Layout

?         Macros

?         Merge

?         Spell checker

?         Tables of contents and indexes

?         Thesaurus

?         Windows

?         WYSIWYG(What You See Is What You Get)

 

 

5.4  Database Applications

?         Database systems are designed to manage large bodies of information.

?         The management of data involves both the definition of structures for the storage of information and the provision of mechanisms for the manipulation of information.

?         A database-management system (DBMS) consists of a collection of interrelated data and a set of programs to access those data.

?         The primary goal of a DBMS is to provide an environment that is both convenient and efficient to use in retrieving and storing database information.

Transaction Management

?         A transaction is a collection of operations that performs a single logical function in a database application. Each transaction is a unit of both atomicity and consistency.

?         Thus, we require that transactions do not violate any database-consistency constraints.

?         In the absence of failures, all transactions complete successfully, and atomicity is achieved easily.

Storage Management

?         Database typically require a large amount of storage space.

?         Corporate databases are usually measured in terms of gigabytes or, for the largest databases, terabytes of data.

?         The performance of a system depends on what the efficiency is of the data structures used to represent the data in the database, and on how efficiently the system is able to operate on these data structures.

Database Administrator

?         The person who has such central control over the system is called the database administrator (DBA).

?         The DBA creates the original database schema by writing a set of definitions that is translated by the DDL compiler to a set of tables that is stored permanently in the data dictionary.

?         The DBA also creates appropriate storage structures and access methods by writing a set of definitions, which is translated by the data-storage and data-definition-language compiler.

Today's Database Landscape

?         In addition to the development of the relational database model, two technologies led to the rapid growth of what are now called client/server database systems.

?         Because processing is split between client computers and a database server, this new breed of application was a radical change from mainframe-based application programming.

?         The second important technology was the local area network (LAN) and its integration into offices across the world.

Distributed Database System

?         In a distributed database system, the database is stored on several computers.

?         The computers in a distributed system communicate with one another through various communication media, such as high-speed networks or telephone lines.

?         The computers in a distributed system are referred to by a number of different names, such as sites or nodes, depending on the context in which they are mentioned.

 

5.5 Computer Virus

?         A computer virus is a program designed to replicate and spread on its own, generally with the victim being oblivious to its existence.

?         Computer viruses spread by attaching themselves to other programs (e.g., word processor or spreadsheet application files) or to the boot sector of a disk.

?         Because a virus is software code, it can transmitted along with any legitimate software that enters your environment.

?         Nearly three-quarters (75 percent) of infections occurred in a networked environment, making rapid spread a serious risk.

What’s the Features of Computer Virus?

?         Computer virus as a procedure can duplicate itself to other normal procedures or on some components of the system, for example, leading portion of disk.

?         The virus hidden in the infected system does not break out immediately; instead, it needs certain time or some conditions before it breaks out.

?         Virus will begin attack once some conditions are ready.

?         Destruction caused by computer virus is extensive, it not only damages computer system, deletes files, or alters data, etc., it can also occupies system resources, disturb machine operation, etc.

?         Typically, virus can infect several thousand computers in several hours if the infected microcomputer is linked with Internet.

?         On one hand, new virus or their variations emerge with each passing day; on the other hand, some virus may resurrect after they have been eliminated, for example, when the infected floppy disk are reused.

?         Virus can transmit normal information as a carrier and thus avoid our protective measures set in the system.

?         Virus infects through various ways beyond our control, in addition, as illegal duplication and pirate software get popular, detection of virus becomes very difficult.

?         Virus tends to hide itself to avoid being detected.

What’s the Structure of Computer Virus?

?         Infected sign is also called virus signature composed of ASCII code of some numbers or characters.

?         Infecting module performs three tasks: To search for an executable file or covered file, to check if there is infected sign on that file, and to infect it, write virus code into the host procedure, if no infected sign is found.

?         The virus designer attempts in the destructive code to delete files, delete data, format floppy disk and hard disk, decrease computer efficiency and space, etc.

?         If the condition is ready, the triggering module returns “true” value, and calls destroying module to destroy, otherwise it returns a “false” value.

?         Major control module controls the four modules mentioned above. Besides, it also ensures the infected program can continue to work normally and no deadlock will occur in contingency.

What damage Can Viruses Do?

?         Some viruses are merely annoying, and others are disastrous.

?         At the very least, viruses expand file size and slow real-time interaction, hindering performance of your machine.

?         Other viruses are more dangerous.

?         They can continually modify or destroy data, intercept input/output devices, overwrite files and reformat hard disks.

What Are the Symptoms of Virus Infection?

?         Changes in the length of programs

?         Changes in the file date or time stamp

?         Longer program load time

?         Slower system operation

?         Reduced memory or disk space

?         Bad sectors on your floppy

?         Unusual error messages

?         Unusual screen activity

?         Failed program execution

?         Failed system boot-ups when booting or accidentally booting from the A drive

?         Unexpected writes to a drive

What Are the Effects of Computer Virus to the Society?

?         Some viruses create disgust effects or frighten the user, such as interfering the keyboard or displaying disgusting messages or pictures.

?         Computer viruses can be a great threat to a company. A company may lose important documents which may mean the lost of capital.

?         One step further, the operation breakdown of companies causes prelims to the society’s normal operation.

 

  评论这张
 
阅读(504)| 评论(1)

历史上的今天

评论

<#--最新日志,群博日志--> <#--推荐日志--> <#--引用记录--> <#--博主推荐--> <#--随机阅读--> <#--首页推荐--> <#--历史上的今天--> <#--被推荐日志--> <#--上一篇,下一篇--> <#-- 热度 --> <#-- 网易新闻广告 --> <#--右边模块结构--> <#--评论模块结构--> <#--引用模块结构--> <#--博主发起的投票-->
 
 
 
 
 
 
 
 
 
 
 
 
 
 

页脚

网易公司版权所有 ©1997-2018