图书介绍
高等学校计算机专业规划教材 计算机英语 第2版2025|PDF|Epub|mobi|kindle电子书版本百度云盘下载

- 邱仲潘,曾思亮,薛伟胜著 著
- 出版社: 北京:清华大学出版社
- ISBN:9787302462552
- 出版时间:2017
- 标注页数:380页
- 文件大小:72MB
- 文件页数:396页
- 主题词:电子计算机-英语-高等学校-教材
PDF下载
下载说明
高等学校计算机专业规划教材 计算机英语 第2版PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
Chapter 1 PC Basic1
1.1 Storage1
1.2 Outer Hardware3
1.3 Smartphone, Tablet and Laptop5
1.4 Exercise 17
1.5 Further Reading: Flash Memory8
1.5.1 The Basics8
1.5.2 Removable Flash Memory Cards9
1.5.3 SmartMedia10
1.5.4 CompactFlash10
Chapter 2 How Computer Monitors Work12
2.1 The Basics12
2.1.1 Display Technology Background13
2.1.2 Display Technologies: VGA13
2.1.3 Display Technology: DVI13
2.1.4 Viewable Area14
2.1.5 Maximum Resolution and Dot Pitch14
2.1.6 Dot Pitch14
2.1.7 Refresh Rate15
2.1.8 Color Depth16
2.1.9 Power Consumption17
2.1.10 Monitor Trends: Flat Panels17
2.2 Exercise 218
2.3 Further Reading: Liquid Crystal Display19
2.3.1 Brief History21
2.3.2 Transmissive and Reflective Displays21
2.3.3 Color Displays21
2.3.4 Passive-matrix and Active-matrix22
2.3.5 Quality Control22
2.3.6 Zero-power Displays23
2.3.7 Drawbacks23
Chapter 3 How Cell Phones Work25
3.1 Cell-phone Frequencies25
3.2 Cell-phone Channels27
3.3 Analog Cell Phones28
3.4 Along Comes Digital29
3.5 Inside a Digital Cell Phone29
3.6 Exercise 332
3.7 Further Reading: Cell Phone33
3.7.1 History33
3.7.2 Handsets35
Chapter 4 Digital Camera Basics40
4.1 How does Digital Camera Work40
4.2 CCD and CMOS: Filmless Cameras40
4.3 Digital.Camera Resolution41
4.4 Capturing Color43
4.5 Digital Photography Basics43
4.6 Megapixel Ratings44
4.7 Digital Camera Settings and Modes44
4.8 Shutter Speed45
4.9 Exercise 447
4.10 Further Reading: How to Take Good Photos48
4.10.1 Digital Camera Problems49
4.10.2 Image Editing Software50
Chapter 5 How Bits and Bytes Work53
5.1 Decimal Numbers53
5.2 Bits54
5.3 Bytes55
5.4 Bytes: ASCⅡ55
5.5 Standard ASCⅡ Character Set56
5.6 Lots of Bytes57
5.7 Binary Math57
5.8 Quick Recap58
5.9 Exercise 558
5.10 Further Reading:How Boolean Logic Works60
5.10.1 Simple Gates60
5.10.2 Simple Adders63
5.10.3 Flip Flops66
5.10.4 Implementing Gates68
Chapter 6 Microprocessors71
6.1 Microprocessor History71
6.2 Microprocessor Progression72
6.3 Inside a Microprocessor73
6.4 Microprocessor Instructions75
6.5 Decoding Microprocessor Instructions78
6.6 Microprocessor Performance79
6.7 Microprocessor Trends79
6.8 64-bit Processors80
6.9 Exercise 681
6.10 Further Reading:E-commerce82
6.10.1 Commerce83
6.10.2 The Elements ofCommerce84
6.10.3 Why the Hype85
6.10.4 The Dell Example86
6.10.5 The Lure ofE-commerce87
6.10.6 Easy and Hard Aspects ofE-commerce89
6.10.7 Building an E-commerce Site89
6.10.8 Affiliate Programs90
6.10.9 Implementing an E-commerce Site90
Chapter 7 Application Software92
7.1 What is Software92
7.2 Programming Languages92
7.2.1 Assemblers92
7.2.2 Compilers and Interpreters93
7.2.3 Nonprocedural Languages94
7.3 Libraries94
7.4 The Program Development Process95
7.4.1 Problem Definition95
7.4.2 Planning95
7.4.3 Writing the Program96
7.4.4 Debug and Documentation96
7.4.5 Maintenance96
7.5 Writing your Own Programs97
7.6 Exercise 798
7.7 Further Reading: Computer Software99
7.7.1 Relationship to Hardware99
7.7.2 System and Application Software100
7.7.3 Users See Three Layers of Software100
7.7.4 Software Creation101
7.7.5 Software in Operation101
7.7.6 Software Reliability101
7.7.7 Software Patents101
7.7.8 System Software101
Chapter 8 Compiler103
8.1 Introduction and History103
8.2 Types of Compilers104
8.3 Compiled vs. Interpreted Languages105
8.4 Compiler Design105
8.5 Compiler Front End106
8.6 Compiler Back End106
8.7 Exercise 8108
8.8 Further Reading: Assembly Language109
8.8.1 Assemblers110
8.8.2 Assembly Language111
8.8.3 Machine Instructions112
8.8.4 Assembly Language Directives113
8.8.5 Usage of Assembly Language114
8.8.6 Cross Compiler115
8.8.7 Compiling a Gcc Cross Compiler115
Chapter 9 How Java Works116
9.1 A Little Terminology116
9.2 Downloading the Java Compiler117
9.3 Your First Program119
9.4 Understanding What Just Happened121
9.5 Exercise 9124
9.6 Further Reading: How Perl Works125
9.6.1 Getting Started125
9.6.2 Hello World126
9.6.3 Variables127
9.6.4 Loops and Ifs128
9.6.5 Functions129
9.6.6 Reading130
Chapter 10 Database & C++131
10.1 Text131
10.2 Exercise 10134
10.3 Further Reading: C++135
10.3.1 Technical Overview136
10.3.2 Features Introduced in C++136
10.3.3 C++ Library137
10.3.4 Object-oriented Features of C++137
10.3.5 Design of C++140
10.3.6 History of C++141
10.3.7 C++ is not a Superset of C143
Chapter 11 Artificial Intelligence145
11.1 Overview145
11.2 Strong AI and Weak AI145
11.2.1 Strong Artificial Intelligence146
11.2.2 Weak Artificial Intelligence146
11.2.3 Philosophical Criticism and Support of Strong AI146
11.3 History Development of AI Theory148
11.4 Experimental AI Research149
11.5 Exercise 11151
11.6 Further Reading: Alan Turing153
11.6. 1 Childhood and Youth153
11.6.2 College and his Work on Computability154
11.6.3 Cryptanalysis (Code Breaking)155
11.6.4 Work on Early Computers and the Turing Test156
11 .6.5 Work on Pattern Formation and Mathematical Biology157
11.6.6 Prosecution for Homosexuality and Turing's Death157
Chapter 12 Machine Learning158
12.1 Overview159
12.1.1 Types of problems and tasks159
12.1.2 History and relationships to other fields160
12.1.3 Theory161
12.1.4 Approaches162
12.2 Exercise 12166
12.3 Further Reading: Applications for machine learning168
12.3.1 Adaptive websites168
12.3.2 Affective computing168
12.3.3 Bioinformatics168
12.3.4 Brain-machine interfaces169
12.3.5 Cheminformatics169
12.3.6 Classifying DNA sequences169
12.3.7 Computational anatomy170
12.3.8 Computational finance171
12.3.9 Computer vision, including object recognition171
12.3.10 Detecting credit card fraud171
12.3.11 Software172
Chapter 13 How DSL Works174
13.1 Overview174
13.2 Telephone Lines175
13.3 Asymmetrical DSL175
13.4 Distance Limitations176
13.5 Splitting the Signal: CAP177
13.6 Splitting the Signal: DMT177
13.7 DSL Equipment178
13.7.1 DSL Equipment: Transceiver179
13.7.2 DSL Equipment: DSLAM179
13.8 Exercise 13180
13.9 Further Reading: How Telephones Work182
13.9.1 A Simple Telephone182
13.9.2 A Real Telephone183
13.9.3 The Telephone Network: Wires and Cables184
13.9.4 The Telephone Network: Digitizing and Delivering184
13.9.5 Creating Your Own Telephone Network185
13.9.6 Calling Someone185
13.9.7 Tones186
Chapter 14 Internet Infrastructure188
14.1 A Network Example188
14.2 Bridging The Divide189
14.3 Backbones190
14.4 Internet Protocol: IP Addresses & Domain Name System190
14.5 Uniform Resource Locators191
14.6 Clients, Servers and Ports192
14.7 Exercise 14194
14.8 Further Reading: Modem195
Chapter 15 How Internet Search Engines Work199
15.1 Looking at the Web199
15.2 Building the Index202
15.3 Building a Search203
15.4 Future Search203
15.5 Exercise 15205
15.6 Further Reading: Web crawler206
15.6.1 Nomenclature206
15.6.2 Overview207
15.6.3 Crawling policy207
15.6.4 Architectures209
15.6.5 Security210
15.6.6 Crawler identification210
15.6.7 Crawling the deep web210
15.6.8 Visual vs programmatic crawlers211
Chapter 16 Encryption212
16.1 In the Key of212
16.2 Hash This213
16.3 Are You Authentic214
16.4 Exercise 16216
16.5 Further Reading: Identity Theft217
16.5.1 Types of Identity Theft217
16.5.2 Stealing Your Identity217
16.5.3 Accessing Your Personal Information218
16.5.4 Public Information219
16.5.5 How To Protect Yourself219
16.5.6 Internet Transactions219
16.5.7 If It Happens To You220
16.5.8 What Congress Is Doing About It222
16.5.9 What the Future Holds222
Chapter 17 Taking a Closer Look at the DCE223
17.1 Common Threads223
17.2 Remote Calls224
17.3 Directory Services224
17.4 Distributed Security Service225
17.5 Distributed File System225
17.6 Distributed Time Service226
17.7 Extending and Using the DCE226
17.8 Exercise 17227
17.9 Further Reading: How to Kerberize Your Site228
17.9.1 Introduction228
17.9.2 Pick a Kerberos Server Machine (KDC)229
17.9.3 DCE and Kerberos229
17.9.4 Install the Kerberos Server229
17.9.5 Obtain the Necessary Code229
17.9.6 Do You Need More Code230
17.9.7 Building the Gnu Tools230
17.9.8 Building the Gnu C Compiler231
17.9.9 Compiling Kerberos232
17.9.10 ForAll Platforms233
17.9.11 Configuring the Kerberos KDC233
17.9.12 Setting Up a Host Server236
17.9.13 Domain Names237
17.9.14 Kerberos Clients237
17.9.15 Getting a Ticket forAnother Realm237
17.9.16 Kerberos Security Problems238
17.9.17 Kerberos Authentication Option in SSL238
17.9.18 Available Kerberized Goodies239
17.9.19 CygnusKerbnet for NT, Macs, and UNIX239
Chapter 18 What is Wi-Fi and How does it work240
18.1 How does Wi-Fi work240
18.2 Uses241
18.3 Frequencies242
18.4 Advantages and Challenges243
18.5 Network Security245
18.6 Exercise 18248
18.7 Further Reading: Wireless Revolution: The History of Wi-Fi249
Chapter 19 Shockwave 3-D Technology251
19.1 Uses of Shockwave Technology252
19.2 Making 3-D Content Accessible254
19.3 Developing New 3-D Content255
19.4 Exercise 19257
19.5 Further Reading: Computer Viruses258
19.5.1 Types of Infection258
19.5.2 What's a “Virus”259
19.5.3 What's a “Worm”259
19.5.4 Code Red259
19.5.5 Early Cases: Executable Viruses260
19.5.6 Boot Sector Viruses261
19.5.7 E-mail Viruses261
19.5.8 Prevention of Virus262
19.5.9 Origins of Virus264
19.5.10 History of Virus264
Chapter 20 Kinect266
20.1 Technology266
20.2 History268
20.3 Launch270
20.4 Reception271
20.5 Sales272
20.6 Awards272
20.7 Exercise 20273
20.8 Further Reading: Software of Kinect274
20.8.1 Kinect for Windows274
20.8.2 Software276
附录A部 分参考译文279
第1章 电脑基本组件279
第2章 计算机显示器是如何工作的283
第3章 手机如何工作288
第4章 数码相机基础知识293
第5章 位和字节是怎样工作的297
第6章 微处理器概述302
第7章 应用软件310
第8章 编译器314
第9章 Java是如何工作的318
第10章 数据库与VC++325
第11章 人工智能328
第12章 机器学习334
第13章 DSL是如何工作的341
第14章 Internet基础结构345
第15章 网络搜索引擎工作原理350
第16章 加密355
第17章 近看DCE358
第18章 什么是Wi-Fi以及它是如何运作的362
第19章 Shockwave三维技术366
第20章 3D体感摄影机:Kinect370
习题答案377
热门推荐
- 3807508.html
- 1881460.html
- 505699.html
- 3066806.html
- 628405.html
- 371827.html
- 2589362.html
- 1237416.html
- 1258424.html
- 2492049.html
- http://www.ickdjs.cc/book_3211349.html
- http://www.ickdjs.cc/book_1586708.html
- http://www.ickdjs.cc/book_349665.html
- http://www.ickdjs.cc/book_2923046.html
- http://www.ickdjs.cc/book_1192938.html
- http://www.ickdjs.cc/book_3346772.html
- http://www.ickdjs.cc/book_524406.html
- http://www.ickdjs.cc/book_1258693.html
- http://www.ickdjs.cc/book_1415515.html
- http://www.ickdjs.cc/book_1510959.html