学术英语理工类课后题答案.doc

上传人:gs****r 文档编号:1528633 上传时间:2019-03-04 格式:DOC 页数:15 大小:94.50KB
下载 相关 举报
学术英语理工类课后题答案.doc_第1页
第1页 / 共15页
学术英语理工类课后题答案.doc_第2页
第2页 / 共15页
学术英语理工类课后题答案.doc_第3页
第3页 / 共15页
学术英语理工类课后题答案.doc_第4页
第4页 / 共15页
学术英语理工类课后题答案.doc_第5页
第5页 / 共15页
点击查看更多>>
资源描述

1、Reading: Text 11.Match the words with their definitions.1g 2a 3e 4b 5c 6d 7j 8f 9h 10i2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 symbolic 2distributed 3site 4complex 5identify6fair

2、ly 7straightforward 8capability 9target 10attempt11process 12parameter 13interpretation 14technical 15range 16exploit 17networking 18involve 19 instance 20specification 21accompany 22predictable 23profile3. Read the sentences in the box. Pay attention to the parts in bold.Now complete the paragraph

3、by translating the Chinese in brackets. You may refer to the expressions and the sentence patterns listed above.ranging from(从到)arise from some misunderstandings(来自于对误解)leaves a lot of problems unsolved(留下很多问题没有得到解决)opens a path for(打开了通道)requires a different frame of mind(需要有新的思想)4.Translate the fo

4、llowing sentences from Text 1 into Chinese.1) 有些人声称黑客是那些超越知识疆界而不造成危害的好人(或即使造成危害,但并非故意而为),而“骇客” 才是真正的坏人。2) 这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。3) 那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。 4) 另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的是攻击到尽可能多的潜在目标。5) 另外,考虑安

5、装一个硬件防火墙并将从互联网中流入和流出的数据限定在几个真正需要的端口,如电子邮件和网站流量。Reading: Text 21.Match the words with their definitions.1d 2f 3h 4i 5a 6e 7b 8j 9g 10c2.Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 compr

6、omised 2notoriety 3 interchangeably 4malfunctioned 5squeeze6 ingenious 7 emergence 8 humble 9 Cunning 10 vulnerability11criminal 12patches 13 sinister 14daunting 15replicate16malicious 17 spirals 18secure 19blur 20 stem21 disrepute 22 sophisticated 23harness 24 recipient 25convert 3. Read the senten

7、ces in the box. Pay attention to the parts in bold. Now complete the paragraph by translating the Chinese in brackets. You may refer to the expressions and the sentence patterns listed above.There is evidence(有证据表明)so hasthe numberof hackers(黑客的数量也有很大增长)are often referred to as(往往被称之为)compromise you

8、r computer(损坏你的计算机)capture your information(获取你的信息)access your computer(进入你的计算机)4 .Translate the following sentences from Text 2 into Chinese.1 看似无害的编程错误可能被利用,导致电脑被侵入,为电脑病毒和蠕虫的繁衍提供温床。2 当一个软件漏洞被发现,黑客可以将它变成一个侵入点,从而造成极大的破坏。在这之前,往往需要争分夺秒地利用正确的软件补丁来防止破坏的发生。3 最简单的钓鱼骗局试图利用迅速致富的伎俩诱使诈骗目标寄钱。但网络骗子们也变得越来越狡猾,最近的

9、陷阱是通过发送客户服务的电子邮件让用户进入假银行或商业网站,并在那里请他们“重新输入” 他们的账户信息。4 间谍软件与垃圾邮件和钓鱼网络一起,构成了三个令人生厌的互联网害虫。尽管有些程序可以通过入侵软件漏洞从而进入电脑,但这些有害而秘密的程序通常会随着其他免费的应用软件侵入到计算机系统中。5 尽管因特网已经彻底改变了全球通讯,但是对于那些利用网络力量实现罪恶目的的人和那些负责阻止这些网络犯罪的人来说,他们之间的较量才刚刚开始。Reading: Text 31. Match the words with their definitions.1f 2d 3e 4j 5i 6h 7b 8a 9g 1

10、0c2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 irrespective 2 be tailored 3 prone 4 opt 5maximum6coded 7provision 8catered 9check 10ready-made11modified 12on-demand 13 whereabouts 14

11、Hazardous 15incurred16applicable 17developer 18on offer19host 20nominal 21certified 22automated 23outage24sync 25back up 26minimal 27mobile 3. Read the sentences in the box. Pay attention to the parts in bold. Now complete the paragraph by translating the Chinese in brackets. You may referto the exp

12、ressions and the sentence patterns listed above.Irrespective of whether(不管)saveusersthe trouble(使用户避免这样的麻烦)caters to the needs of(迎合了需求)for the purpose of(其目的就是)4. Translate the following sentences from Text 3 into Chinese. 1 云计算可定义为一种按次付费模式,这种模式可以根据要求迅速得到计算机分配的可靠资源,用户很少需要自己进行管理。2 由于云计算可以用来不断提供资源,因此

13、当你需要扩充计算机容量时就不需要去买硬件,就不会因为用电去冷却计算机设备而产生更多的二氧化碳。3 这意味着他们不需要开车到办公地点。这就可以省去燃料费,减少二氧化碳排放,从而保护了环境。 4 万一断电,客户可以在电脑再启动时使用和主机同步的备份。 5 除此之外,云计算还不容易受到黑客入侵和分布式拒绝服务的攻击,因为攻击者不知道数据的位置。Reading: Text 41. Match the words with their definitions.1c 2e 3a 4i 5g 6b 7d 8f 9j 10h2. Complete the following expressions or se

14、ntences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 analogy 2compatible 3 Distribute 4 implement 5activated 6 static 7 aggregated 8 clone 9 innovative 10replacement 11 crashed12 compromised 13 mine 14 substantial 15asset 16 centrali

15、ze 17 facilities18 loose 19 monitor 20integrate 21derived 22 update 23download24 upgrade 25licensed 26differential 27 install 28 minimum 29 in-house 30crucial 3. Read the sentences in the box. Pay attention to the parts in bold. Now complete the paragraph by translating the Chinese in brackets. You

16、may referto the expressions and the sentence patterns listed above.remains wide open(有很大的前景)is derived from the way in which(来自这样一个方法)becomes crucial(非常重要)will be substantially reduced(会大大降低)4.Translate the following sentences from Text 4 into Chinese.1这个术语来自于因特网往往呈现为网络图的方法。 2目前云计算技术涉及一个数据中心的存在,这个中心

17、能够为全世界用户提供服务。 3这就减少了由于没有硬件,如手提电脑带来的影响。 4虚拟化可以使一个损坏的云端服务器迅速找到替代品而不造成大的损失或破坏。 5云技术还处于起步阶段,更多新的优点会不断被发现。 III. Lecture ListeningListening: Lecture 11.To help computer users to be aware of the ethical uses of computers and the Internet.2. Because more and more people have started using computers and the

18、Internet.3.Number Eight.4.Number Nine.5. Respect and fairness. 6.Lecture 1 addresses the topic “how a computer user avoids being a conscious or unconscious hacker” while Text 1 and 2 deal with the way hackers “get inside” a computer and electronic threats a computer faces.7.Ten Commandments of Compu

19、ter Ethics.Lecture 1 Computer ethics 8 Good morning. Did anyone hear the news about the teenager in New York who hacked into a banks database and stole about 30,000 credit card numbers over the week end? Hacking is related to computer ethics. Computer ethics deals with the proper use of information

20、technology, such as computers and the Internet. By proper use, I mean socially responsible use. Well first talk about what ethical behavior is and then how this applies to computer use. Ethics is about right and wrong or it deals with moral judgment, with what is acceptable or unacceptable to do. No

21、w we learn ideas about what is right and wrong from our families, our friends, and from the culture we live in. Because of differences in our backgrounds, we may not always agree on what is right and wrong. However, for our discussion today, I will define for you what I mean by an ethical action. An

22、 ethical action is something someone does that benefits someone and doesnt hurt anyone. So, for example, if you see a man drop some money and you pick the money up and give it to him, this is an ethical action. On the other hand, if you pick up the money and dont give it back to the man, this benefi

23、ts you, but hurts the man. This is not an ethical action. Now what about computers? What are the ethical boundaries for using computers and Internet? Most people agree that it is wrong to steal from a store. Would they also say its wrong to copy music files from the Internet? Or, to take another exa

24、mple, most people agree that it is wrong to open an envelope and read a letter to someone else. Would they also say its wrong to read someone elses email?In the past decade or so, many more people have started using computers and the Internet, so these issues have become important. In 1992, the Comp

25、uter Ethics Institute was founded in the United States. This is a research, education, and policy study group whose goal is to increase awareness of the ethical issues that are likely to come up as technology develops. One concept the Computer Ethics Institute has developed is the Ten Commandments o

26、f Computer Ethics. These rules are important guidelines the Institute thinks all computer users should follow. Now some of you may be familiar with the Ten Commandments from the Bible, like, uh, “Thou shalt not kill.” or “Thou shalt honor thy father and thy mother.” The Ten Commandments of Computer

27、Ethics have been written in the same style of language used in the Ten Commandments from the Bible. For example, they use the phrase “Thou shalt not”, “Thou shalt not” means “dont” or “you shouldnt”.Lets look at each commandment or rule.The first commandment says: Thou shalt not use a computer to ha

28、rm other people. Simple enough, right?Number Two: Thou shalt not interfere with other peoples computer work. I interpret this to mean dont use a computer in any way that will affect or change the work someone else is doing. Dont move or edit someone elses files without telling them. Number Three: Th

29、ou shalt not snoop in other peoples files. To snoop means to try to find out something without another person knowing it. If you look at someone elses files on the computer or read their email, youre snooping. Respect other peoples privacy.Number Four: Thou shalt not use a computer to steal. There a

30、re situations on the Internet in which you have to decide if you are stealing or not, like downloading music files, as I mentioned earlier. Number Five: Thou shalt not use a computer to say things that are untrue. It is up to you to be truthful in your website, in your e-business, and in your email.

31、Number Six: Thou shalt not use software for which you have not paid. In other words, if the software is free on the Internet, its okay to download and use it. However, it is not okay to copy software from a friend, because you didnt pay for it.Number Seven: Thou shalt not use other peoples computer

32、resources without telling them, or without paying them. For example, you shouldnt use someone elses computer, password, or Internet connection without asking them first.Number Eight: Thou shalt not appropriate someone elses ideas. Appropriate means to take words someone else wrote and say theyre you

33、rs. Uh, for example, you have to write a report for school. If you copy a term paper from the Internet and hand it in, youre breaking the rule. Copying even a few sentences off the Internet and presenting them as your own is breaking the rule. Number Nine: The ninth commandment says: Thou shalt thin

34、k about the social consequences of the program you are writing. Now, this applies mostly to computer programmers. Social consequences means how the program youre writing might affect others in society. Could hackers possibly use your program to illegally gain access to a computer system? Skillful ha

35、ckers can hack into banks and into credit card companies; they can alter accounts and steal money. They can also create viruses that can cause billions of dollars of damage worldwide. Number Ten, The tenth commandment says: Thou shalt always use a computer in ways that are respectful of others. For

36、example, sending unfriendly email to someone or about someone or creating websites with negative messages are examples of breaking this rule.OK, the Computer Ethics Institute has sent these guidelines to many large companies and to schools across the United States. However, theres no way to enforce

37、these rules. Nevertheless, they would like to see schools, in particular, utilize these rules to help students develop a strong sense of computer ethics. Well, there are a lot of rules, but they all boil down to a couple of principles: respect and fairness. Respect what belongs to others and use res

38、ources fairly.Now lets go back to ethics. Now increasingly, schools are seeing that students need to be taught computer ethics as part of the school curriculum. Some schools have come up with acceptable-use policies, or rules about what is or isnt OK for students to do regarding computer use. This i

39、s how the Computer Ethics Institute would like to see schools utilizing the rules. Generally, its considered wrong to steal someone elses password or to read some elses email. Its also considered unacceptable in college classes for a student to download a term paper off the Internet and pretend that

40、 he or she wrote it. This is called “plagiarism”, and its a good example of breaking Rule Number Eight. Students are permitted to use the Internet for research, but are instructed to write the information in their own words and to explain where they got the information.Now the ten rules are guidelin

41、es for us to follow. These rules help us to be aware of the ethical uses of technology. Lets stop here for today. Think about these rules this week and well talk about them. And read the next two chapters for next week. Listening: Lecture 21 Its a sophisticated group of politically motivated hackers

42、. 2 We should talk to hackers and make use of them.3 They do business by using the escrow system.4 Hackers who have disabilities like autism. 5 Recruiting and mobilizing hackers on behalf of the state.6 Faced with the threats of computer hackers mentioned in Text 1 and 2, the speaker suggests that w

43、e should talk to hackers, understand their disabilities, and make use of their talent. 7 Understand and Make Use of Hackers.Lecture 2 Computer hackers!Now this is a very un-TED-like thing to do, but lets kick off the afternoon with a message from a mystery sponsor. Anonymous: Dear Fox News, it has c

44、ome to our unfortunate attention that both the name and nature of Anonymous has been ravaged. We are everyone and we are no one. We are anonymous. We are legion. We do not forgive. We do not forget. We are the base of chaos. Anonymous, ladies and gentlemena sophisticated group of politically motivat

45、ed hackers who have emerged in 2011. And theyre pretty scary. You never know when theyre going to attack next, who or what the consequences will be. But interestingly, they have a sense of humor. These guys hacked into Fox News Twitter account to announce President Obamas assassination. Now you can

46、imagine the panic that would have generated in the newsroom at Fox. “What do we do now? Put on a black armband, or crack open the champagne?” (Laughter) And of course, who could escape the irony of a member of Rupert Murdochs News Corp. being a victim of hacking for a change. (Laughter, applause) So

47、metimes you know you turn on the news and you say, “Is there anyone left to hack?” Sony PlayStation Networkdone; the government of Turkeytick, Britains Serious Organized Crime Agencya breeze, the CIAfalling off a log. In fact, a friend of mine from the security industry told me the other day that th

48、ere are two types of companies in the world: those that know theyve been hacked, and those that dont. I mean three companies providing cyber security services to the FBI have been hacked. I mean is nothing sacred anymore, for heavens sake? Anyway, this mysterious group Anonymousand they would say this themselvesthey are providing a service by demonstrating how useless companies are at protecting our data. But there is also a very serious aspect to Anonymousthey are ideologically

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 企业管理资料库 > 生产营运

Copyright © 2018-2021 Wenke99.com All rights reserved

工信部备案号浙ICP备20026746号-2  

公安局备案号:浙公网安备33038302330469号

本站为C2C交文档易平台,即用户上传的文档直接卖给下载用户,本站只是网络服务中间平台,所有原创文档下载所得归上传人所有,若您发现上传作品侵犯了您的权利,请立刻联系网站客服并提供证据,平台将在3个工作日内予以改正。