2002 66-70
A typical imperative language contains an applicative sub-language which approximate the mathematical abstractions of "timeless" function applied to "spaceless" values, where the acture operation sequences and use of storage space during expression evaluation are organized behind the scenes.
In this setting, values are data structures of low volume, typically a few computer words or less, which means that an illusion of spacelessness can be realized by having intermediate results during expression evaluation stored at the discretion of language implementation, and effecting parameter transmission and Assignment Operations Through value Copying.
vocabulary:
Imperative command, mandatory
Approximate approximation, approximate
Timeless is eternal, timeless
Spaceless space
SEQUENCE order, sequence
Scene scene, scenario
Illusion fantasy, illusion
Evaluation Valuation, assignment
Discretion judgment
At the discretion of sth / sb is / appointed
Implementation execution, (CODING) encoded
Assignment distribution, delegation, designated
Translation
Typical instruction type language itself has a corresponding lower-layer operation language, the lower language assignment in the background of the task and the spatial assignment in the expression evaluation process, so that from the upper layer, the program seems to be unlimited in the unlimited storage space. Operation.
In this case, numerical is generally organized as a underlying data structure consisting of several or fewer calculator characters. Implement an illusion that the upper layer seems to be space in the upper layer by means of a method of buffering intermediate results during the expression evaluation process, and other methods such as the value transfer and operation segmentation, such as parameter replication.
2002 71-75
Most computer systems are vulnerable to two different groups of attacks:. Insider attacks and outsider attacks A system that is known to be secure to an outsider attack by preventing access from outside can still be vulnerable to the insider attacks accomplished by abusive usage of authorized users . Detecting such abusive usage as well as attacks by outside not only provides information on damage assessment, but also helps to prevent future attacks These attacks are usually detected by tools referred to as Intrusion Detection Systems vocabulary:
Vulnerable fragile, vulnerable
Insider, internal personnel
Outsider outgoing line, external personnel
Abusive abuse, unmatched
Authorized is determined, authorized
Detect prevention, notice, detection
Assessment evaluation, estimation
Prevent Prevention
Intrusion invasion, intrusion
Translation:
Most calculator systems are fragile under two types of attacks: an interior person from the outside. Although some systems have good defense capabilities for external attacks, illegal operations of internal legitimate users will also cause destructive attacks on the system.
Testing the internal and external attacks of the system, not only the damage caused by the attack, but also prevents future attacks. These attacks can usually be detected by some tools, such as "intrusion detection system".
2001 29
MIMD system can be classified into throughput-oriented systems, high-availability systems and response-oriented systems. The goal of throughput-oriented multiprocessing is to obtain high throughput at minimal computing cost. The techniques employed by multiprocessor operating systems to achieve this goal take Advantage of An Inherent Processing Versus Input / Output Balance in The Workload To Produce Balance and Uniform Loading of System Resources.
vocabulary:
Throughput production volume, throughput
Orient orientation
Response response, answer
Employ hiring, placement
Take Advantage Of
Inherent is born, inherent
Versus comparison, comparison (abbreviated as VS, Exp China vs costa rica) Balance balance, smooth, balanced
Uniform uniform, uniform
Resource resources
Translation:
The MIDM system can be classified as a production system, facing high-performance systems and response systems. The purpose of the production amount of multiprocessor system is to consume minimal processing costs to obtain the highest production. The multiprocessor system uses such a technique to reach the above object: replacing the I / O balance mechanism with a fixed process to stabilize system resources and organized.
2001 30
Soon, More of the Information We Receive Via The Internet Could Come Package
Wrappers are made up of software code that's targeted to do specific things with the data enclosed within them, such as helping to define queries for search engines. They also keep outsiders from gaining access to that code.
vocabulary:
VIA via, pass, passage
Digital digital, digital
Wrapper packaging
Digital Wrapper Digital Package
Outsider outside
Translation:
Soon, more information we receive via the Internet will be delivered in the form of a digital package.
The digital package is composed of software code, the purpose is to use the data encapsulated to complete some specified tasks, such as defining query content for search engines. At the same time, they also refuse to access illegal access to internal data.
2000 14
Network managers have long awaited practical voice-over-IP (VOIP) solutions. VOIP promises ease network management and decreases costs by converging at a company's telephony and data infrastructures into one network. And a VOIP solution implemented at a company's headquarters with far-reaching BRANCH OFFICES CAN SAVE TREMENDOUS AMOUNTS OF Money In Long Distance Phone Bill, Provided That Solution Delivers Pots-Like Voice Quality over the Internet.
vocabulary:
Practical practical, practical, practical
Converging gathering, gathering
Infrastructure underground facilities, infrastructure
Implement implementation, implementation
Branch branch, branch
Translation: