期刊问答网 论文发表 期刊发表 期刊问答
  • 回答数

    3

  • 浏览数

    99

yejiah
首页 > 期刊问答网 > 期刊问答 > 计算机网络英语论文选题背景

3个回答 默认排序1
  • 默认排序
  • 按时间排序

手机用户

已采纳
计算机网络系统楼主我帮你。

计算机网络英语论文选题背景

87 评论(10)

nn0808

Computer network security and to guard againstAbstract: When mankind entered the 21st century information society, the network society of the time, China will establish a complete set of network security system, especially from the policy and law to establish China's own characteristics, network security Key words: computer; network; security; preventIn the information age, information can help groups or individuals so that they benefit from, the same information can also be used to pose a threat to them, caused Therefore network security, including the composition of network hardware, software and network transmission of information security, so that they do not because of accidental or malicious destruction of the attacks, network security not only the technical aspects, but also management issues, both complement each other, are First, the concept of computer network securityInternational Organization for Standardization of "computer security" is defined as: "To establish a data processing system and the adoption of technology and management of security protection, the protection of computer hardware, software, data is not due to accidental and malicious destruction of reasons, change and " The above definition of computer security includes physical security and logical security of both the contents of the contents of the logic of security could be understood as we often say that the information security, information refers to the confidentiality, integrity and availability of protection, and network security Information security is the meaning of the extension, that network security is a network of information confidentiality, integrity and availability Computer network security as the specific meaning of the user changes, the user is different on the network security awareness and requirements will be From the ordinary user's point of view, could only hope that personal privacy or confidential information transmission on the network be protected against eavesdropping, tampering and forgery; and network provider in addition to care about these network information security, we must also consider how to deal with sudden natural disasters, such as military strikes against the destruction of network hardware, as well as unusual in the network how to restore network communications, and maintain the continuity of network In essence, the network security, including the composition of network hardware, software and network transmission of information security, so that they do not because of accidental or malicious attacks on the destruction of both the technical aspects of network security issues, there are management issues, the two sides complement each other, are Man-made network intrusion and attacks makes network security is facing new Second, computer network security status quoComputer network security is the network hardware, software and data systems are protected from accidental or malicious destruction of reasons, alteration, disclosure, the system continuous, reliable, normal operation of network services without Computer and network technology has the complexity and diversity, makes computer and network security has become a need to continue to update and improve the At present, hackers method has been more than the type of computer virus, and many attacks are In the Internet network, because the Internet does not have the time and geographical constraints, whenever there is a means to generate new attacks, we can in a week around the world, these attacks means the use of network and system vulnerabilities to attack computer systems and resulting in network Worms, backdoor (Back-doors), Rootkits, DOS (DenialofServices) and Sniffer (network monitor) is a familiar means of several hacker However, none of these attacks means they reflect the astonishing power of today become These types of attacks means the new variant, with previous attacks appeared methods, more intelligent, targeted against Internet-based protocols and operating system From the Web process control procedures to the kernel-level R Hackers practices escalating renovation, to the user's ability to guard against information security Third, computer network security precautions1, to strengthen the internal network management and the use of safety awareness among staff, many computer systems commonly used passwords to control access to system resources, which is anti-virus process, the most vulnerable and the most economical Network administrator and terminal operator privileges in accordance with their responsibilities, choose a different password for the application data legitimate operation, to prevent unauthorized users to access the data and the use of network On the network, software installation and management is crucial, it is not only related to network maintenance and management efficiency and quality, but also to the network A good antivirus software can be easily installed within minutes to the organization each NT server can also be downloaded and spread to all the purpose of the machine by the network administrator set up and manage to focus, it will work with the operating system and other security is closely linked to become a part of network security management, and automatically provide the best network virus defensive When the computer virus on-line resources applications attack, such as the virus exists in the information-sharing network of media, it is necessary to the security at the gateway, on the network front-end for 2, network firewall technologyIs a kind of used to strengthen the network access control to prevent the external network users to illegal means to enter the external network through the internal network, access internal network resources and protect the internal network operating environment special for Network Interconnection D It is between two or more networks such as packet transmission link in accordance with a certain degree of security strategy to implement the inspection, to determine whether the network communication between are allowed to, and monitor the network Although the firewall is to protect the network from an effective means of hacking, but there are obviously inadequate: through the firewall can not protect against outside attack other means, can not prevent defectors from the inside and inadvertent threats posed by users, but also can not completely prevent the transmission of the virus have been infected with the software or documents, and can not protect against data-driven 3, security encryption technologyEncryption technology for the global e-commerce to provide a guarantee, so that Internet-based electronic trading system has become possible, thus improving the symmetric encryption and asymmetric encryption technology is still the mainstream of the 21st Symmetric encryption to the conventional password-based technology, computing encryption and decryption operations use the same Asymmetric encryption, encryption key that is different from the decryption key, encryption keys are made public, anyone can use, only the decryption key to decrypt people 4, the network host operating system security and physical security measuresNetwork firewall as the first line of defense and can not fully protect the internal network, must be combined with other measures to improve the safety of the system After the firewall is based on the network host operating system security and physical security In accordance with the level from low to high, namely, the physical security of the host system, the core operating system security, system security, application services security and file system security; At the same time, host security checks and bug fixes, as well as a backup safety system as a supplementary safety These constitute the entire network system, the second line of defense, the main part of a breakthrough to prevent the firewall as well as attacks from System backup is the last line of defense network system, used to attack after the System R The firewall and host security measures is the overall system security by auditing, intrusion detection and response processor constitute the overall safety inspection and response It from the network system firewall, network host or even directly from the network link layer on the extraction of network status information, as input to the intrusion detection Intrusion Detection System in accordance with certain rules to determine whether there is any invasion of the incident, if the invasion occurred, the emergency treatment measures, and generate a warning Moreover, the system's security audit also can be used as the future consequences of aggressive behavior and to deal with security policy on the system to improve sources of In short, network security is a comprehensive issue, involving technology, management, use and many other aspects, including both its own information system security issues, there are physical and logical technical measures, a kind of technology can only solve the problem on the one hand, rather than a To this end the establishment of a network with Chinese characteristics, security system, the need for national policies and regulations to support and joint research and development Security and anti-security like two sides of contradictions, always pick-up, so the security industry is a future with the development of new technologies and the continuous development of References:[1] Huang Yi-qiang, et On the software development needs analysis phase of the main Quarterly Journal of Sun Yat-sen University, 2002 (01)[2] Hu D Computer LAN [M] Beijing: Tsinghua University Press, [3] Zhu Lisen, even S Computer Network Application Technology [M] Beijing: Patent Literature Publishing House, [4] Xie X Computer Networks (4th edition) [M] Beijing: Publishing House of Electronics Industry, [5]孙小刚, Han Dong, et Oriented software engineering, Visual C + + Network Programming [M] Beijing: Tsinghua University Press, 2004,仅供参考,请自借鉴。希望对您有帮助。补充:您可以随时找我,我会帮你翻译好发过去,随时欢迎您的咨询。
265 评论(8)

再见花开

[摘要]英语正受到网络巨大的冲击和影响,产生了大量代写论文与政治、经济、生活相关的新词,总结并分析其构词特点,将会帮助人们充分利用各种英语资源,更好地为生活、学习和工作服务。[关键词]网络英语新词分布构成特点一、新词出现的原因及分布1。原因。当人们发现新事物,碰到新问题,总结了新经验,出现新思想的时候,便需要新宇和新词来表达,这是因为旧有的,沿袭使用的表达方法已经不适合或不敷应用了。一方面,由于以英语作母语或第二语言的国家遍及全球各洲,而各地的风土人情、生活习惯和社会环境大有区别,这就必然会出现不同的表达形式和用语。另一方面,这些语汇中不少会被逐渐吸收进经典的英语辞典中,成为语言的一部分。随着计算机技术的发展,网络走进了千家万户,越来越多的人开始利用网络进行实时交流。这样网络创造了自己的语言,产生了特有的新语体,也出现了许多新的网络用语,而且富有独特的语言魅力,使我们网络交流更有时代特色。2。分布,随着互联网的广泛应用,网络英语新词汇的分布遍地开花,涉及到政治、经济、文化生活等方面。(1)经济类。随着网络经济的形成和发展,网络经济词汇也大量涌现。例如:e-shopping:网上购物e-market:电子市场e-cash:电子现金e-revenue:电子商务收入e-business:网上交易e-service:电子服务(2)政治类。为使网络的普及,一些政府推出了一系列带有政治色彩的服务,同时也在网上进行各式选举活动。进而出现了一些英语政治新词。例如:e-campaigning:电子竞选e-precinct:电子选区e-precinctcaptain:电子选区负责人“e-rate”program:资助上网计划(3)娱乐生活类。现代生活与网络息息相关,网络正在潜移默化地改变着人们的工作、购物、娱乐、交往等的方式。各种与生活紧密联系的新词层出不穷。例如:e-life:网络生活internetrecruiting:网上招聘deadtreeedition:电子杂志digithead:电脑迷e-mailaffair:网恋blog:博客综上可见,网络英语新词已经成为现代政治、经济、文化、生活中不可或缺的一部分。二、网络英语新词构成特点网络英语新词汇的构成或由一些常用词派生,或通过些常用词重新合成,或赋予些常用词新意而形成。这些网络新词的语义具有生动贴切、简练明了的特点,在网络交流中更能表达人们的思想或观点,更轻易被人们接受。1。旧词新意。借用生活中熟悉的词语来表达新的意思。现举几例:bug原指虫子,现在的意思是硬件或者软件中的漏洞(缺点)。host:原指主人,现在的意思是电脑主机。shooting:原指射击他、投球之意,现在的意思是聊天。mouse原指老鼠,现在的意思是鼠标。memory:原指记忆,现在的意思是内存。display原指展示,表演,现在的意思是显示器。virtualclassroom:现在的意思是网上教学。hit:原指打击,现在的意思是点击(进入某个网站)。2。合成词。两个或者两个以上独立的词结合在一起构成,或者是一个自由结合的词组和短语。这种构词法在网络英语新词中很普遍,出现频率很高。现举几例:China+net→Chinanet(中国网)education+net→educationnet(教育网)network+citizen→netizen(网民)internetworm:电脑病毒netcop:网络警察networm:网迷netsurfer:网上冲浪者onlinegoods:网上商品onlinegalaxy:网络一族3。缩略词。将词的音节加以省略或简化而形成的词。此类网络英语新词更加符合网络交流的便捷、简练等特点。现举几例dbase:数据库onlineDJs:网络音乐主持人pgup:(浏览网页)上翻pgdn:(浏览网页)下翻opcode:合作代码cyberia:电脑咖啡店webzine:电子杂志webster网络专家4。首字母拼写词。由词组中的各词首字母按字母读音组成的缩略词。这种网络新词易读、易记、易识别。现举几例:WWW:万维网WAN:广域网LAN:局域网FIP:超文本传输协议IP:网络传输协议ISP网络提供商API:应用程序接口IT:信息技术IP:网络电话AFAIK:asfarasIknow(据我所知)BRB:berightback(马上回来)FRF:facetoface(视频聊天)BTW:bytheway(顺便提一下)HOWDY:howdoyoudo(最近如何)CU:seeyou(再见)IMO:inmyopinion(我认为)IOW:inotherwords(换句话说)TY:thankyouortrustyou(谢谢你或信任你)GTG:gettogo(离线)A/s/L:age/sex/location(年龄/性别/地址)5。派生词派生词缀和词根结合,或者粘着词根和粘着词根结合而构成的词。词根是基础,同一词根上可以加不同的词缀,从而构成丰富多彩的网络英语新词。现举几例:Inter:inlerphone(网络电话)interjecting(插入磁盘)Cyber-:cyberspace(网络空间)cybernaut(信息空间旅行者)Tele-:telnet(远程登陆协议)telecom(远程通信)Hyper-:hypermedia(超链接)hypertext(超文本)三、结束语随着互联网的快速发展,承担着大量信息传播的载体之一——网络英语也在逐步完善。现今的网络语言中,英语占据着统治地位,80%的网页语言是英语;近乎一半的世界人口能够熟练运用英语。因此,尽可能多地学习和把握网络英语非凡是网上出现的英语新词,将有助于人们更好地利用和吸收各种网络资源,这样,不仅可以提高人们的英语水平,还可以促进和加快步网络技术的进步以及社会发展的步伐。 时尚网络英语新词探析网络语言是人们在互联网上进行信息交流和信息处理的交际符号,它伴随信息时代的到来而产生。在网络语言交际工具中,英语一直是主导语言。在互联网上,任何一种语言都无法与英语抗争。时尚网络英语词汇是社会进步的产物,它不仅丰富了英语词汇,充实了词汇的语义,而且为人们提供了许多新概念,拓宽了人们的知识结构,影响着人们的生活。因此,对网络英语新词进行研究,有利于我们得心应手地畅游网络。归纳起来,网络新词的构成具有简洁化、系列化、隐喻性强等特征。构词简洁化在高速发展的信息时代,快速的生活节奏也促使人们简便高效地传递信息和进行交流,网络交际的一个主要特点是快捷高效。网民们寻求在最短的时间内获取最大的信息量,必然会使用简明扼要的新词语来代替冗长繁杂的词语,即主要通过缩略的构词法的使用,包括首字母缩略、混成缩略、借助数字与字母混合缩略、借用特殊符号表达等形式。首字母缩略。即取每个英文单词的首字母的方法。如:AFK表示“暂时离开”,EFTr表示“电子资金转账”,IM0表示“依我之见”,MYOB表示“不关你的事”,BBS指代的是“公告牌系统”混成缩略。即截取两个词中的一部分,再拼凑在一起,构成新的网络词汇。如:Interpedia表示的是“因特网全 ”,Ne—XI.N'I.'V-E.N" AIHAO~J-tE 2008·2(下半月)tiquette~ 的是“网络礼仪”,Edutainment指“寓教于乐的软件”等。借助数字和字母的混合缩略 除了按语音缩略,数字也加入到网络时尚新词的组成当中,成为了自英语词汇起源以来最为新颖的一种构词法。这种组合方式看起来难以理解,不符合语言规范,却符合了现代人追新、追奇、追求时尚、彰显个性的心理特点,也适应了快节奏激烈竞争状态下人们扩大单位时间的使用效率的心理需求。如:I12go表示“我想去”,It’S up 2 u表示“该你了”,Good 9表示“晚安”,B4表示“之前”。借用特殊符号表达。由于网络交流是通过键盘的文字交流,交流者之间一般存在遥远的空间距离。双方既看不到彼此的形象,也听不到对方的声音,所以无法用手势、语气或面部表情等非语言信息传递情感。于是一些带有感情色彩的标点就像一套脸谱弥补了缺乏情感交流手段的不足。如::)表示“眨眼睛”:一D表示“哈哈大笑”>:一<表示“愤怒”构词系列化网络新词的第二个特征是构词出现系列化特征。首先,网络英语构词通过能产性强的词缀派生出了大量的派生新词, 其中,最活跃的词缀有:前缀cyber一:表示“计算机(网络)的”构成的词有:cyberculture(电脑文化),cv—berfair(网上集市),cyberdepot(网上商店)等。前缀tele一:表示“远距离的、电信的”,构成的词有teleconferencing (远程会议),teleeommuter(远程上班族),teleputer(电视电话计算机)等。后缀一ware:表示“件,软件”,构成的词有:courseware(课件),Freeware(免费软件),careware(爱心软件),charityware(慈善软件)等。其次,网络英语的另外一个很重要的构词手段是复合构词。复合构词的系列化是网络英语构词的主要特点之一。常见的有:1.由electronic(缩写为“E”,意为“电子的”)和其他词构成的系列合成词,如:E—magazine(电子期刊),E—text(电子文本),E—wallet(电子钱包)等。2 由net(意为“网络”)合成的词有:speak(网络语言),net surf(网络冲浪),out—emet,指那些传统的不上网的媒体,包括杂志、报纸、书刊、电视电影,等,Nethead,指满脑子都是网络、痴迷的网虫或网迷。隐喻性强网络英语具有很强的隐喻特征。从语言的阐释修辞功能上讲,隐喻“是一个异质而同值的语词置换在常规词序中应该出现的词语”。 网络英语中包括许多专业的网络技术词汇和计算机词汇。这些词汇在一定程度上属于科技语言,所以,网络英语也就具有了隐喻性的特点。隐喻在人类认知方面有两大作用:创造新的意义和提供看待事物的新视角。 我们发现,在网络和计算机技术的发展过程中,人们不断通过隐喻手段来创造新词或新概念。普通的词汇通过语义变化及隐喻修饰,原词义加以引申、扩展,从一个新的角度去看待它,便具有新的含义。如: ’Bubble sort 冒泡排序法,指排序时逐次将相邻的两个数据进行比较,不符合排序要求的替换掉,按照这样的方法将关键码值最大的交换到最后一个记录位置上,然后进行第二轮排序。排序中关键码值较小的数据就像水中的气泡往上冒。这种计算机程序设计和数据处理中的重要运算术语缺乏对应的词语表达方式,用隐喻来命名这一陌生而又抽象的概念,既符合语言的经济原则,又体现了人类认知思维的具象性。在隐喻的作用下,抽象的概念具体化,复杂的含义简单化,科学的术语通俗化,很好地加强了社会科学和自然科学的沟通,使一个学科从另一个学科中得到启示。正是因为从已知的概念来认知未知的概念,从已知的语域向未知的语域映射,网络英语技术词汇与人们的13常生活词汇非常接近,既简洁生动,又易于记忆。如Memory,在普通词汇中被译为记忆,在网络术语中称为存储器。这种词汇的延伸与灵活应用,在很大程度上促进了网络技术和计算机的发展。结束语网络英语新词汇的发展反映了社会的进步,其构词特点具有非常鲜明的时代气息,其构词形式孕育着新的含义和简洁明了的构词方式,随着网络的进一步发展和英语在网络中的运用,网络英语的空间会愈来愈大。同时,网络英语的独特性也会愈来愈显现出来。因此,了解和掌握网络英语的构词特点,有利于我们掌握和运用现代化的教学设备,有助于获得通过网络对外进行交流的技巧,也可以透过语言这面镜子窥视出受众思想观念的变化。进一步讨论。可以预计的是随着网络的发展, 很可能会出现统一的字母表情符号。二、因特网上英语新词的特征语言的动态发展过程满足人们交际需要, 也体现了语言与社会、认识与交际的密切关系。网络英语正是在网络技术高速发展的社会背景下日益丰富、逐渐发展起来的, 并体现着媒体的普及和科技的进步。网络英语是网络文化的产物, 符合了语言的发展规律。网络新词的语义具有生动贴切、简练明确特点, 在网络交流中更能表达人们的思想或观点, 也更容易被人们接受。( 一) 词义通俗易懂, 生动贴切网络交流毕竟不同于面对面的交流, 交流者交换信息只能凭借文字, 不能借助身体语言, 这就要求网络英语新词汇必须是通俗易懂的。它的构词法应该是大家所熟悉的, 即使阅读者以前没有接触过的词汇, 大部分也可以根据熟悉的词汇推测出来。网络英语的通俗性主要反映在其构词方式大量地使用派生和合成, 使得上网者只需了解词缀的意思, 便可推断出并掌握由此派生出来的大量的新词, 如cyber 来源于希腊语, 意思是舵手, 可理解为“ 电脑、网络”或音译为“ 赛博”, 由cyber 派生出来的词有cyber activist、cyber addict、cyber attack、cyber cop、cyber brain、cyber surfing 等。网络英语中的合成词数量丰富, 种类繁多。许多新词都是由普通单词与具有特定含义的单词组合而成的, 其新的语义同样通俗易懂, 极易理解记忆。如web 原意是“ 蜘蛛网”, 引申为网络, 其合成的词有webmaster、webster、webzine、web site 等。网络上人们除了使用一些副语言符号来表示语调和情感外, 还常借用一些词汇来描述一些非语言行为, 如描述网民的动作、情感和体态等。人们面对的是冰冷的屏幕, 用语言来描述网民的动作、情感和体态, 有着纯文字无可比拟的作用, 可以使网络更具人情味, 更为生动和吸引人, 更接近实际的交流。如“ haha”表示笑“, LOL”表示大笑“, Smile”表示微笑“, Rose”表示送上的玫瑰“, ROTFL”表示笑得打滚“, //jump”表示高兴得像小孩子似的在聊天室里蹦蹦跳跳“, //think”表示歪着头想了一下“, //praise”表示对大家说“ 果然高明, 佩服, 佩服”等。( 二) 简洁易记, 输入快捷很多新颖别致的网络词汇是利用常用的词根及词缀, 按构词法规律, 进行创造性重组构成的。这类词汇具有言简意明, 易于解读, 便于记忆的特点。简洁、易于记忆的网络英语使网民们无须记忆冗长繁琐的术语或行话, 有效提高键盘输入信息的速度, 利于网络信息的传播。网络英语的简约性主要体现在网络上涌现的大量的缩略词汇上, 缩略构词法造词简练, 使用简便, 比较口语化, 不太正式, 缺乏被社会其他领域广泛接受的使用规则。但由于其通俗易懂、简单明了、易于记忆和传播, 因此, 这类缩略语在网际交流中被网民一致认可并广泛接受和使用。这些词汇的共同特点是形式简洁、词义单一, 没有丰富的联想意义。缩略语的使用不仅可以简化文章, 节约印刷空间和阅读时间, 而且可以有效地提高输入速度,从而适应计算机科学和网络技术高速发展的要求。因此, 为了提高输入速度, 网络英语还经常会忽略首字母的大小写。( 三) 隐喻性隐喻是人类重要的认知方式和思维方式。理查兹( Richards) 曾经说过“, 隐喻是人类‘ 语言无所不在的原理’”。PF'ontanier( 1830) 对隐喻的认知特性进行了进一步的阐述, 他指出隐喻就是将某类事物看作另一类事物。任何一种艺术形式都体现了隐喻特征, 任何一种以一类事物去体会另一类事物的方式都叫做隐喻, 网络语言自然包含其中。网语的主要构词方式正是以一范畴的事物去说明另一范畴的事物, 无论是数字范畴的数字网语, 还是符号范畴的符号网语以及网民自创的网络语言都体现了其隐喻性, 体现了网民认识世界的通常的认知形式。网络新词汇常依赖人们熟悉的词汇, 借助词汇的比喻意义, 激发读者的联想与想象, 彰显出新旧事物或观念的相似点或相关性, 赋旧词以新义, 创造出形象生动、喻意丰富的描写新事物、新观念的词汇。网络英语中包括许多专业的网络技术词汇和计算机词汇。这些词汇在一定程度上属于科技语言, 所以, 网络英语也就具有了隐喻性的特点。一般来说, 隐喻在人类认知方面有两大作用: 创造新的意义和提供看待事物的新视角。我们发现, 在网络和计算机技术的发展过程中, 人们不断通过隐喻手段来创造新词或新概念。普通的词汇通过语义变化及隐喻修饰, 原词义加以引申、扩展, 从一个新的角度去看待它, 便具有新的含义。如computer virus 中的virus 原指生物学中的病毒。而在计算机领域中, 是指由程序员设计的隐藏在计算机程序中, 意在破坏计算机操作系统使其紊乱或丢失数据等的秘密程序。类似的词汇还有gopher、archive、menu、memory、run、path 等。由此可见, 在隐喻的作用下, 抽象的概念具体化, 复杂的含义简单化, 科学的术语通俗化, 很好地加强了社会科学和自然科学的沟通, 使一个学科从另一个学科中得到启示。正是因为从已知的概念来认知未知的概念, 从已知的语域往未知的语域映射, 网络英语技术词汇与人们的日常生活词汇非常接近, 既简洁生动, 又易于记忆。这在很大程度上促进了网络技术和计算机知识的发展和普及。( 四) 新词的语义呈现和更新速度快、数量多计算机的高速发展, 网络的广泛普及, 导致了网络新词的大量出现, 这其中就包括了丰富的网络英语新词。这种新词呈现和更新速度之快, 数量之多是任何一本辞典也难于收录过来的。所以在网络英语新词发展如此迅猛的时代, 了解其构成及语义特征, 有助于知识的积累, 开阔我们的视野。当今, 网络文化影响着人们的学习、生活、工作、思维方式、价值观念。因此, 加强对网络英语新词的研究, 掌握它们的构成及语义特征, 对人们熟悉网络, 学习英语以及日常生活都会有很大的帮助。参考文献:
110 评论(11)

相关问答