1、计算机常用英语术语词汇(Vocabulary of commonly used English terms in computer)This document is generated by the 2009-10-25 11:33:46 derived palm press.Glossary of commonly used English terms in computersGlossary of commonly used English terms in computersComputer, Vocabulary, In, Common, UseHardware class (Hard
2、ware)Two, software class (Software)Three, network class (Network)Four, otherCPU (Center, Processor, Unit) central processing unitMainboard motherboardRAM (random, access, memory) random access memory (RAM)ROM (Read, Only, Memory) romFloppy Disk floppy diskHard Disk hard diskCD-ROM CD-ROM drive (Guan
3、g Qu)Monitor monitorKeyboard keyboardMouse mouseChip chipCD-R CD writerHUB hubModem=, MOdulator-DEModulator, modemP-P (Plug, and, Play) plug and playUPS (Uninterruptable, Power, Supply) UPSBIOS (Basic-input-Output, =BLSystem) basic input output systemCMOS (Complementary, Metal-Oxide-Semiconductor) c
4、omplementary metal oxide semiconductorSetup installationUninstall uninstallWizzard wizard Mu3OS (Operation, Systrem) operating systemOA (Office, AutoMation) office automationExit exitsEdit editorCopy replicationCut shearPaste pasteDelete deleteSelect selectionFind lookupSelect select allReplace subs
5、titutionUndo undoRedo redoProgram programLicense license (permit)Back, step aheadNext nextFinish endFolder folderDestination Folder destination folderUser userClick clickDouble click double clickRight click right clickSettings settingsUpdate updateRelease PublishingData dataData base databaseDBMS (D
6、ata, Base, Manege, System) database management systemView viewInsert insertionObject objectConfiguration configurationCommand commandDocument documentPOST (power-on-self-test) power self-test programCursor cursorAttribute propertyIcon iconService pack service patchesOption pack function patchDemo de
7、moShort cut shortcutException anomalyDebug debuggingPrevious, the former oneColumn lineThe row columnRestart restartText textFont fontsSize sizeScale proportionInterface interfaceFunction functionAccess accessManual GuideActive activationComputer language computer languageMenu menuGUI (graphical, us
8、er, interfaces) graphical user interfaceTemplate templatePage setup page settingsPassword passwordCode passwordPrint preview Print PreviewZoom in zoom inZoom out shrinksPan roamingCruise roamingFull screen fullscreenTool bar toolbarStatus bar status barRuler scaleTable tableParagraph paragraphSymbol
9、 symbolStyle style 46AExecute execution 0Graphics graphicsImage imageUnix an operating system for a serverOperating system developed by Mac OS Apple CorpOO (Object-Oriented) object orientedVirus virusFile fileOpen openColse shutdownNew newSave saveExit exitsClear clearDefault defaultslocal area netw
10、orkWAN WanClient/Server client / serverATM (AsynchronousTransfer Mode) asynchronous transfer modeWindows NT Microsoft Corps network operating systemInternet InternetWWW (World, Wide, Web) World Wide WebProtocol protocolHTTP Hypertext Transfer ProtocolFTP file transfer protocolBrowser browserHomepage
11、 home pageWebpage web pagesWebsite websiteURL is on the WWW Internet service programRepresentation method for specifying information locationsOnline OnlineEmail emailICQ web pagingFirewall firewallGateway gatewayHTML hypertext markup languageHypertext hypertextHyperlink hyperlinkIP (Address) Interne
12、t Protocol (address)SearchEngine search engineTCP/IP a set of communication protocols for networksTelnet telnetIE (Internet, Explorer) Explorer (Microsoft Corps web browser)Navigator pilots (Netscape Co browser)Multimedia multimediaISO International Organization for StandardizationANSI American Nati
13、onal Standards InstituteAble energyActiveFile active fileAddwatch add monitoring pointsAllfiles all filesAllrightsreserved all powers reservedAltdirlst switch directory formatAndfixamuchwiderrangeofdiskproblems and can solve a wider range of disk problemsAndotherinformation and other informationArch
14、ivefileattribute archive propertiesAssignto specifies toAutoanswer auto answerAutodetect automatic detectionAutoindent auto indentAutosave automatic storageAvailableonvolume the remaining space on this diskThe badcommand command is wrongThe badcommandorfilename command or file name is wrongBatchpara
15、meters batch parametersBinaryfile binary fileBinaryFiles binary fileBorlandinternational Borland International IncBottommargin page blankBydate by dateByextension by extensionByname by nameBytesfree bytes idleCallstack call stackCasesensitive case sensitiveCausespromptingtoconfirmyouwanttooverwritea
16、n requires a confirmation prompt to appear when you want to overwrite oneCentralpointsoftwareinc central point software AGChangedirectory change directoryChangedrive change driveChangename change nameCharacterset character setCheckingfor is checkingChecksadiskanddisplaysastatusreport checks the disk
17、 and displays a status reportChgdrivepath change disk / pathNode nodeA proxy password checker for npasswd UNIX that filters potential passwords before it is submitted to a Cryptographic FileOSPF open shortest path first protocolOSI Model open system interconnection modelOut-of-band attack out of ban
18、d attackPacket filter packet filterPassword passwordPath pathPayload net loadPBX private switchPCS personal communications servicePeer equivalencePermission permissionsPlaintext plaintextPPTP point to point Tunneling ProtocolPort portPrority priorityProtocol protocolPotential browser potential brows
19、erPOP Internet email protocol standardIs the abbreviation of Post Office Protocol, which is the standard of Internet e-mail protocol. We can do it by having POPThe host of the service function transmits and receives the e-mail. The flaw in this protocol is that when you receive e-mail, allThe letter
20、s are cleared from the server and downloaded to your local hard drive. Of course, there are also some client programs that can turn power onMail left on the server or set to more than a certain size of the document can not be downloaded. Multimedia as mailFormat, mail will become more and more big,
21、we hope to be able to master what files to download and when to download, which will be neededIMAP protocol. The current version of POP is POP3Process processProxy agentProxy server proxy serverThe proxy service is the proxy Web user obtains the data to come back, usually uses the WWW software, must
22、 link the distant terminal to obtain the fundWhen the data is received, the request signal must be sent and then transmitted again, one byte, one byte. With the setting of proxyThe signal for data will be sent to Proxy Server first. When Proxy Server gets the users request, it arrives firstSearch fo
23、r the same information, and if so, send the data directly to the user by Proxy Server, if cache does notData, Proxy Server will use the bandwidth available on the network, to retrieve data from the far end platform, while stored inIn cache, one side is passed to the user. Even if the line is blocked
24、, it is faster than the users own direct graspPaseudorandom pseudorandomPhreaking refers to the process of controlling the telephone systemRAS remote access serviceRemote control remote controlRPC remote procedure callRemote boot remote bootRoute routingRouter routerRouting routingRIP routing inform
25、ation protocolRouted daemon, a UNIX routing service using RIPRouting table routing tableR.U.P routing update protocolRSA a public key encryption algorithm. And RSA is probably the most popular.Script scriptSearch engine search engineSSL Secure Sockets LayerSecure passwordSID security identifierSende
26、r senderSLIP serial Internet ProtocolServer serverServer-based network server based networkSession layer session layerShare share and sharingShared level security for share-level securitySMTP Simple Mail Transfer ProtocolSNMP simple network management protocolSite siteSCSI small computer system inte
27、rfaceSnffer snfferSnooping snoopingStandalone server independent serverStrong cipher strong passwordStream cipher stream cipherStrong password strong passwordSQL structured query languageSubnet mask subnet maskSubdirectory subdirectorySubnet subnetSwap file swap fileSACL system access control tableS
28、/Key secure connection one-time password system, in S/Key, the password will never be sent through the network, so it can not be stolentakeSniffer (sniffer) secretly captures data packets across a network. Hackers generally use it to try to steal usernamesCipher.Spoofing (spoofing) any process invol
29、ving posing other users or hosts for unauthorized access to the targetTime bomb (time bomb) refers to a program that waits for a specific time or event to be activated before it can cause a machine to malfunctionTCPDUMP is a useful tool for capturing packets in UNIX and is often used to obtain detai
30、led network communications records.Thin client thin clientThread threadThroughput throughputTransport layer transmissionTransport Protocol transport protocolTrust trustTunnel secure encryption linkVector of attack attack vectorVirtual directory virtual directoryVirtual Machine virtual machineVRML vi
31、rtual reality model languageVolume file setVulnerability vulnerabilityWeak passwurd weak passwordWell-known ports universal portWorkstation workstationX.25 a packet switched network protocolZone transfer zone conversionCool super Forum - my cool super forum, my world!Authentication authentication an
32、d identificationAuthorization authorizationA software package for Back Office MicrosoftBack up backupBackup browser backup browserBDC backup domain controllerBaseline baselineBIOS basic input / output systemBinding binding and poolingBit bit, binary bitBOOTP boot protocolBGP boot gateway protocolBot
33、tleneck bottle diameterBridge bridge, bridgeBrowser browserBrowsing browsingChannel channelCSU/DSU channel service unit / digital service unitChecksum checksumcluster 簇、群集the 公共网关接口cgi (common gateway interface公用网关接口是一个可以产生相同结果或结果随用户输入而变化的程序.它可以用一种解释性的界面语言编写, 也可以用一种编译方式的编程语言编写.cgi规定了 web服务器调用其它可执行程序
34、的接口协议标准.web 服务器通过调用 cgi程序实现和 web浏览器的交互, 也就是 cgi程序接受 web浏览器发送给web服务器的信息, 进行处理,并将响应结果再回送给 web服务器和 web浏览器.cgi 程序一般完成web网页中表单数据的处理、数据库查询和实现与传统应用系统的集成等工作.cgi 程序虽然可以用任何程序设计语言编写, 但是用 c语言编写的 cgi程序具有执行速度快、安全性高等特点.cgi based attack (基于 cgi攻击) 它利用公共网关接口的脆弱点进行攻击, 通常借助 www站点进行crash (崩溃) 系统突然失效, 需要从新引导cd - rom 只读型
35、光盘component 组件data link 数据链路datagram 数据报缺省文档 efault document数字键控系统 digital key systemthe disk mirroring 磁盘镜像分布式文件系统 distributed file systemdata driven attack (数据驱动攻击) 依靠隐藏或者封装数据进行的攻击, 那些数据可不被察觉的通过防火墙.dns spoofing (域名服务器电子欺骗) 攻击者用来损害域名服务器的方法, 可通过欺骗 dns的高速缓存或者内应攻击来实现的一种方式 (通常为攻击者假扮合法的 dns服务器角色)dos (嘿嘿
36、, 可不是 dos哦, 这个是 deniad of service, 用户恶意使用网络信 极为服务拒绝)息服务器时, 将拒绝为合法的用户提供服务.eavesdropping 窃听、窃取加密通道 encrypted tunnelenterprise network 企业网ethernet 以太网external security 外部安全性environment variable 环境变量传真猫 fax modemattribute 文件属性 filethe file system 文件系统file 文件form 格式fragments 分段frame relay 桢中继firewall 防火墙
37、firework (防火墙) 是加强加 internet 与 之间安全防范的一个或一组系 intranetp (内部网)统.防火墙可以确定哪些内部服务允许外部访问, 哪些外人被许可访问所允许的内部服务,那些外部服务可由内部人员访问.为了使防火墙发挥效力, 来自和发往 internet 的所有信息都必须经由防火墙出入.防火墙只允许授权信息通过, 而防火墙本身不能被渗透.gated daemon gated进程 (好象是一种早期的 unix寻径服务)网关 gatewayglobal account 全局帐号global group 全局组group 组group account 组帐号组标识符 g
38、roup identifierhcl 硬件兼容性表hash 散表hpfs 高性能文件系统主目录 home directoryhome page 竹叶hop 驿站、中继段the “host“ 主机hyperlink 超文本链接highjacking 劫持终端, 即为攻击者捕获另一个用户会话的控制.这是很少发生的, 一旦发生就表明目标的安全性已经被破坏.其实 netxray在这一点就做的很好.htpasswd 一种用密码来保护 www (上的站点的系统 unlx)icon 图标伪装攻击 impersonation attack索引服务器 index serverisa 工业标准结构继承权限过滤器
39、inherieted rights filterisdn 综合业务数字网interactive user 交互性用户intermediate system 中介系统internal security 内部安全性internet explorer (ie) ibm的万维网浏览器the internet server 因特网服务器other 解释程序内联网 企业内部网 intranet.入侵者 intruder.一种邮件协议是 internet message protocal 的缩写.imap 提供了一个在远程 imap access服务器上管理邮件的手段, 它与 pop 协议相似, 但功能比
40、pop 要多, 只下载邮件 功能包括.的标题、建立多个邮箱和在服务器上建立保存邮件的文件夹.java virtual machine java虚拟机基于 java语言的一种脚本语言 java scriptjack in 一句黑客常用的口语, 意思为破坏服务器安全的行为kernel 内核密钥 keyskeyspace 密钥空间一些用语窃取他人用户名和密码的工具 keystroke capture recorder (按键记录器)局域网服务器 lan serverlocal security 局部安全性log 日志、记录logging 登录logoff 退出、注销logical port 逻辑端口
41、注册 logon登录脚本 logon script长文件名 lfnlogic bomb (逻辑炸弹) 一种可导致系统加锁或者故障的程序或代码.主浏览器 mass browsermapi. 粉酷超级论坛 - 我的粉酷超级论坛, 我的天地progrmming 的缩写.微软和其它一些公司开发了可使 是 messaging application interfacewindows 应用程序接入到从 microsoft e-mail 到 novell mhs的多种消息系统.但是, 仅限于在日常工作的水平上工作, 即感知邮件的应用程序, 它可在网络上交换邮件与数据.the server 成员服务器菜单 menu消息 messagemultilink 多链接even 多媒体 internet邮件扩展mpr 多协议路由器multiprocessing 多重处理模块 modulemultihomed host 多穴主机mud? 粉酷超级论坛 - 我的粉酷超级论坛, 我的天地mud的英文全名是 multiple dimension、multiple dialogue 或multiple use use usedungeon, 译为 “多人世界“ 、 “多人对话“ 或 “多人地牢, 俗称“ 泥巴 “游戏.