首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
考研
Thirty-five years after computer scientists at UCLA linked two bulky computers using a 15-foot gray cable, testing a new way for
Thirty-five years after computer scientists at UCLA linked two bulky computers using a 15-foot gray cable, testing a new way for
admin
2009-04-27
75
问题
Thirty-five years after computer scientists at UCLA linked two bulky computers using a 15-foot gray cable, testing a new way for exchanging data over networks, what would ultimately become the Internet remains a work in progress.
University researchers are experimenting with ways to increase its capacity and speed. Programmers are trying to imbue Web pages with intelligence. And work is underway to re-engineer the net-work to reduce spam and security troubles.
(46)
All the while threats loom: critics ware that commercial, legal and political pressures could hinder the types of innovations that made the Internet what it is today.
Stephen Crocker and Vinton Cerf were among the graduate students who joined UCLA professor Len Kleinrock in an engineering lab on Sept. 2, 1969, as bits of meaningless test data flowed silently between the two computers. By January, three other "nodes" joined the fledgling network.
(47)
Then came e-mail a few years later, a core communications agreement called TCP/IP in the late 70s, the domain name system in the 80s and the World Wide Web—now the second most popular application behind e-mail—in 1990.
The Internet expanded beyond its initial military and educational domain into businesses and homes around the world.
Today, Crocker continues work on the Internet, designing better tools for collaboration. (48)
And as security chairman for the Internet’s key oversight body, he is trying to defend the core addressing system from outside threats.
He acknowledges the Internet he helped build is far from finished, and changes are in store to meet growing demands for multimedia. (49)
Network providers now make only "best efforts" at delivering data packets, and Crocker said better guarantees are needed to prevent the skips and unexpected pauses now common with video.
Cerf, now at MCI Inc., said he wished he could have designed the Internet with security built-in. Microsoft Corp., Yahoo Inc. and America Online Inc., among others, are currently trying to retrofit the network so e-mail senders can be authenticated—a way to cut clown on junk messages sent using spoofed addresses.
(50)
Many features being developed today wouldn’t have been possible at birth given the slower computing speeds and narrower Internet pipes, or bandwidth, Cerf said.
选项
答案
几年之后,电子邮件出现了,这是在70年代晚期被称为TCP/IP的核心通信协议。80年代出现了域名系统,1990年,万维网问世,并成为仅次于电子邮件的最流行的应用工具。
解析
本句是简单句,全句采用倒装结构,句子主语是e-mail,the domain name system and the World Wide Web;谓语动词是came。句中a core communication protocol called TCP/IP是e-mail的同位语;now the second most popular application behind e-mail是the World Wide Web的同位成分。翻译时应注意句子倒装及两个同位语的译法。因为主语比较长,在翻译时应各个部分断开翻译,将谓语添加进去,成为完整的句子。因为三个主语的谓语都是came,因此可以考虑选择不同的译法,如句中的"出现、问世"。application原意为"应用",这里与计算机相关,应引申为"应用程序,应用工具"。
转载请注明原文地址:https://kaotiyun.com/show/mTa4777K
0
考研英语一
相关试题推荐
TheDonaldTrumpadministrationannouncedThursdayanewplanaroundtheprotectionofendangeredspecies.Accordingtotheadmi
Scientistsoftenstruggletocommunicatethefindingsofresearch.Oursubjectmattercanbetechnicalandnoteasilydigestedb
KimiyukiSudashouldbeaperfectcustomerforJapan’scar-makers.He’sayoung,successfulexecutiveatanInternet-servicesco
Duringuncertaintimes,peopletendtolookbackandwonderhowitgottothis.Theyfeelmorekeenlytheirmissedopportunities
Liketheflu,aperson’semotionalstatecanbecontagious.Watchsomeonecry,andyou’lllikelyfeelsad;thinkabouttheelder
【C1】______jobapplicationstoeliminatediscriminationisnoteasy.Tenbigemployersinthepublicandprivatesectors—includin
Socialscientistshavebeentryingtoidentifytheconditionsmostlikelytopromotesatisfyinghumanlives.Theirfindingsgive
Youaregoingtoreadalistofsubheadingsandatext.Choosethemostsuitablesubheadingfromthelist[A]to[G]foreachnu
HeartdiseasehaslongbeenBritain’sbiggestsinglekiller.Despiteoureffortstowardoffitsriskfactorswithmoreexercise
HeartdiseasehaslongbeenBritain’sbiggestsinglekiller.Despiteoureffortstowardoffitsriskfactorswithmoreexercise
随机试题
在信息安全领域,基本的安全性原则包括保密性(Confidentiality)、完整性(integrity)和可用性(Availability)。保密性指保护信息在使用、传输和存储时___①_____。信息加密是保证系统保密性的常用手段。使用哈希校验是保证数
中度缺氧病人的动脉血氧分压低于
施工合同双方当事人对合同是否可撤销发生争议,可向( )请求撤销合同。
职能战略的目的是()。
东兴公司2016年8月主营业务收入200万元,主营业务成本150万元,管理费用8万元,公允价值变动收益3万元,资产减值损失1万元,投资收益7万元,营业外收入6万元。假定不考虑其他因素,该企业当月的营业利润为()万元。
在一次数学考试中,第14题和第15题为选做题.规定每位考生必须且只须在其中选做一题.设4名考生选做这两题的可能性均为设这4名考生中选做第15题的学生数为ξ个,求ξ的分布列及数学期望.
根据下列图表,回答下列问题。2009年上半年中部地区主要经济指标2009年上半年,城镇固定资产投资和城镇居民人均可支配收入均居同一位的省份有几
ThemakingofWestSumatradishrendang
A、$15.B、$25.C、$40.D、$45.C对话中男士介绍参加一天会议的注册费是15美金,如果三天都参加则为40美金,女士表示自己三天的会议都要参加,因此她应该支付40美金的注册费,本题选C。
NOCASH,NOPROBLEMAstechnologycontinuestodevelop,peoplearechangingthewaytheypayforthings.Manyofushavea
最新回复
(
0
)