图书介绍

高等学校计算机专业规划教材 计算机英语 第2版2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

高等学校计算机专业规划教材 计算机英语 第2版
  • 邱仲潘,曾思亮,薛伟胜著 著
  • 出版社: 北京:清华大学出版社
  • ISBN:9787302462552
  • 出版时间:2017
  • 标注页数:380页
  • 文件大小:72MB
  • 文件页数:396页
  • 主题词:电子计算机-英语-高等学校-教材

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

高等学校计算机专业规划教材 计算机英语 第2版PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

Chapter 1 PC Basic1

1.1 Storage1

1.2 Outer Hardware3

1.3 Smartphone, Tablet and Laptop5

1.4 Exercise 17

1.5 Further Reading: Flash Memory8

1.5.1 The Basics8

1.5.2 Removable Flash Memory Cards9

1.5.3 SmartMedia10

1.5.4 CompactFlash10

Chapter 2 How Computer Monitors Work12

2.1 The Basics12

2.1.1 Display Technology Background13

2.1.2 Display Technologies: VGA13

2.1.3 Display Technology: DVI13

2.1.4 Viewable Area14

2.1.5 Maximum Resolution and Dot Pitch14

2.1.6 Dot Pitch14

2.1.7 Refresh Rate15

2.1.8 Color Depth16

2.1.9 Power Consumption17

2.1.10 Monitor Trends: Flat Panels17

2.2 Exercise 218

2.3 Further Reading: Liquid Crystal Display19

2.3.1 Brief History21

2.3.2 Transmissive and Reflective Displays21

2.3.3 Color Displays21

2.3.4 Passive-matrix and Active-matrix22

2.3.5 Quality Control22

2.3.6 Zero-power Displays23

2.3.7 Drawbacks23

Chapter 3 How Cell Phones Work25

3.1 Cell-phone Frequencies25

3.2 Cell-phone Channels27

3.3 Analog Cell Phones28

3.4 Along Comes Digital29

3.5 Inside a Digital Cell Phone29

3.6 Exercise 332

3.7 Further Reading: Cell Phone33

3.7.1 History33

3.7.2 Handsets35

Chapter 4 Digital Camera Basics40

4.1 How does Digital Camera Work40

4.2 CCD and CMOS: Filmless Cameras40

4.3 Digital.Camera Resolution41

4.4 Capturing Color43

4.5 Digital Photography Basics43

4.6 Megapixel Ratings44

4.7 Digital Camera Settings and Modes44

4.8 Shutter Speed45

4.9 Exercise 447

4.10 Further Reading: How to Take Good Photos48

4.10.1 Digital Camera Problems49

4.10.2 Image Editing Software50

Chapter 5 How Bits and Bytes Work53

5.1 Decimal Numbers53

5.2 Bits54

5.3 Bytes55

5.4 Bytes: ASCⅡ55

5.5 Standard ASCⅡ Character Set56

5.6 Lots of Bytes57

5.7 Binary Math57

5.8 Quick Recap58

5.9 Exercise 558

5.10 Further Reading:How Boolean Logic Works60

5.10.1 Simple Gates60

5.10.2 Simple Adders63

5.10.3 Flip Flops66

5.10.4 Implementing Gates68

Chapter 6 Microprocessors71

6.1 Microprocessor History71

6.2 Microprocessor Progression72

6.3 Inside a Microprocessor73

6.4 Microprocessor Instructions75

6.5 Decoding Microprocessor Instructions78

6.6 Microprocessor Performance79

6.7 Microprocessor Trends79

6.8 64-bit Processors80

6.9 Exercise 681

6.10 Further Reading:E-commerce82

6.10.1 Commerce83

6.10.2 The Elements ofCommerce84

6.10.3 Why the Hype85

6.10.4 The Dell Example86

6.10.5 The Lure ofE-commerce87

6.10.6 Easy and Hard Aspects ofE-commerce89

6.10.7 Building an E-commerce Site89

6.10.8 Affiliate Programs90

6.10.9 Implementing an E-commerce Site90

Chapter 7 Application Software92

7.1 What is Software92

7.2 Programming Languages92

7.2.1 Assemblers92

7.2.2 Compilers and Interpreters93

7.2.3 Nonprocedural Languages94

7.3 Libraries94

7.4 The Program Development Process95

7.4.1 Problem Definition95

7.4.2 Planning95

7.4.3 Writing the Program96

7.4.4 Debug and Documentation96

7.4.5 Maintenance96

7.5 Writing your Own Programs97

7.6 Exercise 798

7.7 Further Reading: Computer Software99

7.7.1 Relationship to Hardware99

7.7.2 System and Application Software100

7.7.3 Users See Three Layers of Software100

7.7.4 Software Creation101

7.7.5 Software in Operation101

7.7.6 Software Reliability101

7.7.7 Software Patents101

7.7.8 System Software101

Chapter 8 Compiler103

8.1 Introduction and History103

8.2 Types of Compilers104

8.3 Compiled vs. Interpreted Languages105

8.4 Compiler Design105

8.5 Compiler Front End106

8.6 Compiler Back End106

8.7 Exercise 8108

8.8 Further Reading: Assembly Language109

8.8.1 Assemblers110

8.8.2 Assembly Language111

8.8.3 Machine Instructions112

8.8.4 Assembly Language Directives113

8.8.5 Usage of Assembly Language114

8.8.6 Cross Compiler115

8.8.7 Compiling a Gcc Cross Compiler115

Chapter 9 How Java Works116

9.1 A Little Terminology116

9.2 Downloading the Java Compiler117

9.3 Your First Program119

9.4 Understanding What Just Happened121

9.5 Exercise 9124

9.6 Further Reading: How Perl Works125

9.6.1 Getting Started125

9.6.2 Hello World126

9.6.3 Variables127

9.6.4 Loops and Ifs128

9.6.5 Functions129

9.6.6 Reading130

Chapter 10 Database & C++131

10.1 Text131

10.2 Exercise 10134

10.3 Further Reading: C++135

10.3.1 Technical Overview136

10.3.2 Features Introduced in C++136

10.3.3 C++ Library137

10.3.4 Object-oriented Features of C++137

10.3.5 Design of C++140

10.3.6 History of C++141

10.3.7 C++ is not a Superset of C143

Chapter 11 Artificial Intelligence145

11.1 Overview145

11.2 Strong AI and Weak AI145

11.2.1 Strong Artificial Intelligence146

11.2.2 Weak Artificial Intelligence146

11.2.3 Philosophical Criticism and Support of Strong AI146

11.3 History Development of AI Theory148

11.4 Experimental AI Research149

11.5 Exercise 11151

11.6 Further Reading: Alan Turing153

11.6. 1 Childhood and Youth153

11.6.2 College and his Work on Computability154

11.6.3 Cryptanalysis (Code Breaking)155

11.6.4 Work on Early Computers and the Turing Test156

11 .6.5 Work on Pattern Formation and Mathematical Biology157

11.6.6 Prosecution for Homosexuality and Turing's Death157

Chapter 12 Machine Learning158

12.1 Overview159

12.1.1 Types of problems and tasks159

12.1.2 History and relationships to other fields160

12.1.3 Theory161

12.1.4 Approaches162

12.2 Exercise 12166

12.3 Further Reading: Applications for machine learning168

12.3.1 Adaptive websites168

12.3.2 Affective computing168

12.3.3 Bioinformatics168

12.3.4 Brain-machine interfaces169

12.3.5 Cheminformatics169

12.3.6 Classifying DNA sequences169

12.3.7 Computational anatomy170

12.3.8 Computational finance171

12.3.9 Computer vision, including object recognition171

12.3.10 Detecting credit card fraud171

12.3.11 Software172

Chapter 13 How DSL Works174

13.1 Overview174

13.2 Telephone Lines175

13.3 Asymmetrical DSL175

13.4 Distance Limitations176

13.5 Splitting the Signal: CAP177

13.6 Splitting the Signal: DMT177

13.7 DSL Equipment178

13.7.1 DSL Equipment: Transceiver179

13.7.2 DSL Equipment: DSLAM179

13.8 Exercise 13180

13.9 Further Reading: How Telephones Work182

13.9.1 A Simple Telephone182

13.9.2 A Real Telephone183

13.9.3 The Telephone Network: Wires and Cables184

13.9.4 The Telephone Network: Digitizing and Delivering184

13.9.5 Creating Your Own Telephone Network185

13.9.6 Calling Someone185

13.9.7 Tones186

Chapter 14 Internet Infrastructure188

14.1 A Network Example188

14.2 Bridging The Divide189

14.3 Backbones190

14.4 Internet Protocol: IP Addresses & Domain Name System190

14.5 Uniform Resource Locators191

14.6 Clients, Servers and Ports192

14.7 Exercise 14194

14.8 Further Reading: Modem195

Chapter 15 How Internet Search Engines Work199

15.1 Looking at the Web199

15.2 Building the Index202

15.3 Building a Search203

15.4 Future Search203

15.5 Exercise 15205

15.6 Further Reading: Web crawler206

15.6.1 Nomenclature206

15.6.2 Overview207

15.6.3 Crawling policy207

15.6.4 Architectures209

15.6.5 Security210

15.6.6 Crawler identification210

15.6.7 Crawling the deep web210

15.6.8 Visual vs programmatic crawlers211

Chapter 16 Encryption212

16.1 In the Key of212

16.2 Hash This213

16.3 Are You Authentic214

16.4 Exercise 16216

16.5 Further Reading: Identity Theft217

16.5.1 Types of Identity Theft217

16.5.2 Stealing Your Identity217

16.5.3 Accessing Your Personal Information218

16.5.4 Public Information219

16.5.5 How To Protect Yourself219

16.5.6 Internet Transactions219

16.5.7 If It Happens To You220

16.5.8 What Congress Is Doing About It222

16.5.9 What the Future Holds222

Chapter 17 Taking a Closer Look at the DCE223

17.1 Common Threads223

17.2 Remote Calls224

17.3 Directory Services224

17.4 Distributed Security Service225

17.5 Distributed File System225

17.6 Distributed Time Service226

17.7 Extending and Using the DCE226

17.8 Exercise 17227

17.9 Further Reading: How to Kerberize Your Site228

17.9.1 Introduction228

17.9.2 Pick a Kerberos Server Machine (KDC)229

17.9.3 DCE and Kerberos229

17.9.4 Install the Kerberos Server229

17.9.5 Obtain the Necessary Code229

17.9.6 Do You Need More Code230

17.9.7 Building the Gnu Tools230

17.9.8 Building the Gnu C Compiler231

17.9.9 Compiling Kerberos232

17.9.10 ForAll Platforms233

17.9.11 Configuring the Kerberos KDC233

17.9.12 Setting Up a Host Server236

17.9.13 Domain Names237

17.9.14 Kerberos Clients237

17.9.15 Getting a Ticket forAnother Realm237

17.9.16 Kerberos Security Problems238

17.9.17 Kerberos Authentication Option in SSL238

17.9.18 Available Kerberized Goodies239

17.9.19 CygnusKerbnet for NT, Macs, and UNIX239

Chapter 18 What is Wi-Fi and How does it work240

18.1 How does Wi-Fi work240

18.2 Uses241

18.3 Frequencies242

18.4 Advantages and Challenges243

18.5 Network Security245

18.6 Exercise 18248

18.7 Further Reading: Wireless Revolution: The History of Wi-Fi249

Chapter 19 Shockwave 3-D Technology251

19.1 Uses of Shockwave Technology252

19.2 Making 3-D Content Accessible254

19.3 Developing New 3-D Content255

19.4 Exercise 19257

19.5 Further Reading: Computer Viruses258

19.5.1 Types of Infection258

19.5.2 What's a “Virus”259

19.5.3 What's a “Worm”259

19.5.4 Code Red259

19.5.5 Early Cases: Executable Viruses260

19.5.6 Boot Sector Viruses261

19.5.7 E-mail Viruses261

19.5.8 Prevention of Virus262

19.5.9 Origins of Virus264

19.5.10 History of Virus264

Chapter 20 Kinect266

20.1 Technology266

20.2 History268

20.3 Launch270

20.4 Reception271

20.5 Sales272

20.6 Awards272

20.7 Exercise 20273

20.8 Further Reading: Software of Kinect274

20.8.1 Kinect for Windows274

20.8.2 Software276

附录A部 分参考译文279

第1章 电脑基本组件279

第2章 计算机显示器是如何工作的283

第3章 手机如何工作288

第4章 数码相机基础知识293

第5章 位和字节是怎样工作的297

第6章 微处理器概述302

第7章 应用软件310

第8章 编译器314

第9章 Java是如何工作的318

第10章 数据库与VC++325

第11章 人工智能328

第12章 机器学习334

第13章 DSL是如何工作的341

第14章 Internet基础结构345

第15章 网络搜索引擎工作原理350

第16章 加密355

第17章 近看DCE358

第18章 什么是Wi-Fi以及它是如何运作的362

第19章 Shockwave三维技术366

第20章 3D体感摄影机:Kinect370

习题答案377

热门推荐