首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Thirty-five years after computer scientists at UCLA linked two bulky computers using a 15-foot gray cable, testing a new way for
Thirty-five years after computer scientists at UCLA linked two bulky computers using a 15-foot gray cable, testing a new way for
admin
2009-04-27
46
问题
Thirty-five years after computer scientists at UCLA linked two bulky computers using a 15-foot gray cable, testing a new way for exchanging data over networks, what would ultimately become the Internet remains a work in progress.
University researchers are experimenting with ways to increase its capacity and speed. Programmers are trying to imbue Web pages with intelligence. And work is underway to re-engineer the net-work to reduce spam and security troubles.
(46)
All the while threats loom: critics ware that commercial, legal and political pressures could hinder the types of innovations that made the Internet what it is today.
Stephen Crocker and Vinton Cerf were among the graduate students who joined UCLA professor Len Kleinrock in an engineering lab on Sept. 2, 1969, as bits of meaningless test data flowed silently between the two computers. By January, three other "nodes" joined the fledgling network.
(47)
Then came e-mail a few years later, a core communications agreement called TCP/IP in the late 70s, the domain name system in the 80s and the World Wide Web—now the second most popular application behind e-mail—in 1990.
The Internet expanded beyond its initial military and educational domain into businesses and homes around the world.
Today, Crocker continues work on the Internet, designing better tools for collaboration. (48)
And as security chairman for the Internet’s key oversight body, he is trying to defend the core addressing system from outside threats.
He acknowledges the Internet he helped build is far from finished, and changes are in store to meet growing demands for multimedia. (49)
Network providers now make only "best efforts" at delivering data packets, and Crocker said better guarantees are needed to prevent the skips and unexpected pauses now common with video.
Cerf, now at MCI Inc., said he wished he could have designed the Internet with security built-in. Microsoft Corp., Yahoo Inc. and America Online Inc., among others, are currently trying to retrofit the network so e-mail senders can be authenticated—a way to cut clown on junk messages sent using spoofed addresses.
(50)
Many features being developed today wouldn’t have been possible at birth given the slower computing speeds and narrower Internet pipes, or bandwidth, Cerf said.
选项
答案
而威胁一直忽隐忽现:批评家们提醒说商业、法律和政治压力会阻碍各种创新,而正是这种创新促使因特网发展到今天。
解析
本句是复合句,冒号后的部分与前面部分是同位关系,是对前部分threats loom的解释。句子主干结构是:critics warn that…。commercial,legal and political pressures…what it is today是宾语从句,其中 that made the Internet what it is today是定语从句,修饰先行词innovations,what it is today是宾语补足语。本句翻译时也应采取分译法,将定语从句与其修饰的先行词断开翻译,只需将名词部分重复即可。句中 what it is today直译为"今天这个样子",翻译时应与前面部分一起翻译成"促使因特网发展到今天"。
转载请注明原文地址:https://kaotiyun.com/show/hTa4777K
0
考研英语一
相关试题推荐
Scientistsoftenstruggletocommunicatethefindingsofresearch.Oursubjectmattercanbetechnicalandnoteasilydigestedb
KimiyukiSudashouldbeaperfectcustomerforJapan’scar-makers.He’sayoung,successfulexecutiveatanInternet-servicesco
Theclean-energybusinessisturningintothenextbiginvestmentboom,inwhichrisksarelightlyignored.Untilrecently,reca
Duringuncertaintimes,peopletendtolookbackandwonderhowitgottothis.Theyfeelmorekeenlytheirmissedopportunities
Whenoneofhisemployeesphonedinsicklastyear,ScottMcDonald,CEOofMonumentSecurityinSacramento,California.,decided
Thedestructionofournaturalresourcesandcontaminationofourfoodsupplycontinuetooccur,largelybecauseoftheextreme
Whatisawomanworth?Thatisthequestionthathastobefacedbydivorcingcouplesandbytheirlawyers.Theanswersseemto
Socialscientistshavebeentryingtoidentifytheconditionsmostlikelytopromotesatisfyinghumanlives.Theirfindingsgive
SupposeyouhavereadapieceofinformationontheInternetaboutrecruitingEnglisheditors.Writealettertothecompany’s
HeartdiseasehaslongbeenBritain’sbiggestsinglekiller.Despiteoureffortstowardoffitsriskfactorswithmoreexercise
随机试题
张某在王某处修理电视机,因为钱不够,就将自己的手表放在王某处,说第二天拿钱来,就把电视机取走了。王某取得对手表的占有是依据()。
桂枝的功效是
针对事件一,在工程动态结算时,采用调值公式法进行结算需要做好()等工作。索赔证据的基本要求是()。
耐火极限是指建筑构件按()进行耐火试验,从受到火的作用时起,到失去支持能力或完整性或失去隔火作用时止的这段时间,用小时(h)表示。
好的结尾可以达到的效果是______。
案例一一般资料:求助者,女性,28岁,中学教师。案例介绍:求助者由于与丈夫发生矛盾,烦躁、失眠三个多月。下面是心理咨询师与求助者之间的一段咨询对话。心理咨询师:您好!请问我能为您提供什么帮助呢?求助者:我最
下列案件适用简易程序审理是错误的有()。
有些人坚持认为,在刑事审判中应该允许起诉人使用非法获得的证据,只要法官和陪审团被说服而相信执行警员在获得证据时并没意识到违法或并不想有意违法。这种被建议的“善意的例外”将会削弱宪法对每个人的保护,导致警察行为的不谨慎,鼓励执法官员在法庭上说谎。上述
在最坏情况下,二分查找法的时间复杂度为()。
数据独立性是数据库技术的重要特点之一。所谓数据独立性是指()。
最新回复
(
0
)