好文档 - 专业文书写作范文服务资料分享网站

《计算机英语第》课后练习答案

天下 分享 时间: 加入收藏 我要投稿 点赞

Unit Nine/Section C

I.

Fill in the blanks with the information given in the text: 1. 2. 3. 4. 1. 2. 3. 4. 5. 6. 7. 8.

desktop wireless nodes

phones; computers

notebook computer 笔记本 wireless hotspot 无线热点

Short Message Service 短信(服务)

wearable computer 可穿戴计算机,穿戴式计算机 移动电话 mobile phone 条形码阅读器 barcode reader 网站 Web site 智能手机 smart phone

II. Translate the following terms or phrases from English into Chinese and vice versa:

Unit Ten: Computer Security Unit Ten/Section A

I.

Fill in the blanks with the information given in the text: 1. 2. 3. 4. 5. 6. 7. 8. 1. 2. 3. 4. 5. 6. 7. 8. 9.

confidentiality; availability data authenticity integrity Passive; active availability ease; security assurance

backup system 备份系统 encryption key (加密)密钥 data confidentiality 数据机密性

system vulnerability 系统脆弱性,系统脆弱之处 unauthorized access 未经授权的访问,越权存取 intrusion detection system 入侵检测系统 after-action recovery 事后恢复 software piracy 软件侵权 authorized user 特许用户

II. Translate the following terms or phrases from English into Chinese and vice versa:

10. data unit 数据单元,数据单位 11. 软件版本 software version

12. 数据完整性 data integrity 13. 系统崩溃 system crash

14. 病毒检查软件 virus-checking software 15. 综合安全策略 comprehensive security strategy 16. 软件配置管理 software configuration management 17. 故障隔离 fault isolation 18. 统计数据库 statistical database

19. 保密的加密算法 secure encryption algorithm 20. 数据流 data stream

III. Fill in each of the blanks with one of the words given in the following list, making changes if necessary:

An access control mechanism mediates between a user (or a process executing on behalf of a user) and system resources, such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate (验证) a user seeking access. Typically the authentication function determines whether the user is permitted to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization (授权) database that specifies what type of access to which resources is allowed for this user. The access control function consults this database to determine whether to grant access. An auditing function monitors and keeps a record of user accesses to system resources.

In practice, a number of components may cooperatively share the access control function. All operating systems have at least a rudimentary (基本的), and in many cases a quite robust, access control component. Add-on security packages can add to the native access control capabilities of the OS. Particular applications or utilities, such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.

IV. Translate the following passage from English into Chinese:

入侵者攻击从温和的到严重的形形色色。在这一系列攻击的温和端,有许多人只是希望探查互联网,看看那里有什么。在严重端的是试图阅读特许数据、对数据进行未经授权的修改或扰乱系统的个人。

入侵者的目标是获得进入一个系统的机会,或者增加在一个系统中可以使用的特权范围。初始攻击大多利用系统或软件的脆弱之处,这些脆弱之处允许用户执行相应的代码,打开进入系统的后门。入侵者可对具有某些运行特权的程序实施像缓存溢出这样的攻击,利用此类攻击获得进入一个系统的机会。

另外,入侵者也试图获取应予保护的信息。在有些情况下,这种信息是以用户口令的形式存在的。知道了某个其他用户的口令之后,入侵者就可以登录系统并行使赋予合法用户的所有特权。

Unit Ten/Section B

I.

Fill in the blanks with the information given in the text: 1. 2. 3. 4. 1.

virus dictionary

whitelisting; administrator suspicious behavior memory-resident

phishing attack 网络钓鱼攻击

II. Translate the following terms or phrases from English into Chinese and vice versa:

2. 3. 4. 5. 6. 7. 8. 9.

graphics card 显(示)卡 heuristic analysis 试探性分析 infected file 被感染文件 virus dictionary 病毒字典 数据捕获 data capture 恶意软件 malicious software 病毒特征代码 virus signature 防病毒软件 antivirus software

10. 内存驻留程序 memory-resident program

Unit Ten/Section C

I.

Fill in the blanks with the information given in the text: 1. 2. 3. 4. 1. 2. 3. 4. 5. 6. 7. 8.

infection; payload trapdoor botnet

administrator; root

maintenance hook 维护陷阱 multipartite virus 多成分病毒

authentication procedure 验证过程,认证过程 instant messaging 即时通信,即时消息 系统登录程序 system login program 逻辑炸弹 logic bomb

多威胁恶意软件 multiple-threat malware 源代码 source code

II. Translate the following terms or phrases from English into Chinese and vice versa:

Unit Eleven: Cyberculture Unit Eleven/Section A

I.

Fill in the blanks with the information given in the text: 1. 2. 3. 4. 5. 6. 7. 8. 1. 2.

system copyright rights deleted

formatting或format signature screens emoticons

mailing list 邮件发送清单,邮件列表 proprietary software 专有软件

II. Translate the following terms or phrases from English into Chinese and vice versa:

3. 4. 5. 6. 7. 8. 9.

cc line 抄送行 bcc line 密送行

forwarded e-mail message 转发的电子邮件 e-mail convention 电子邮件常规 click on an icon 点击图标

confidential document 密件,秘密文件 classified information 密级信息

10. recovered e-mail message 恢复的电子邮件 11. 常用情感符 commonly used emoticon 12. 已删除电子邮件 deleted e-mail 13. 电子系统 electronic system 14. 附件行 Attachments line 15. 版权法 copyright law

16. 电子邮件网规 e-mail netiquette 17. 信息高速公路 information superhighway 18. 签名文件 signature file

19. 电子数据表程序 spreadsheet program 20. 文字处理软件 word processor

III. Fill in each of the blanks with one of the words given in the following list, making changes if necessary:

Instant messaging has always been a good way to stay in touch with friends. As companies look to cut costs and improve efficiency, instant messaging is a good way to replace in-person meetings, while allowing people to collaborate (合作) through their computers. Instant messaging is a valuable new tool that is becoming as common as e-mail in the workplace.

Several companies, such as Yahoo!, AOL, and Microsoft, will give you free access to instant messaging. To use their systems, you will need to download their software to your computer from their websites. Some instant messaging programs include the ability to send live audio or video. With a microphone and/or digital camera mounted on your computer, you can let other people see and hear you talking.

Most instant messaging programs ask you to sign in with a password. Then, you can create a list of other people with whom you want to converse (交谈). To begin a conversation, send a message to the others to see if they are at their computers. Their computers will open a window or make a sound to tell them you want to talk to them. If they respond, you can start writing back and forth. IV. Translate the following passage from English into Chinese:

新技术带来的变化速度对于全世界人们的生活、工作和娱乐方式产生了重要影响。新兴技术对传统的教学过程以及教育的管理方式提出挑战。人们经常断言,推动当今社会发生变化的最强有力因素将证明是信息技术。信息技术虽然本身就是一个重要的学习领域,但同时也在所有的课程领域产生着重大影响。方便的全球通信使我们可以即时访问巨量的数据。快速的通信,加上在家里、工作场所和教育机构使用信息技术机会的增多,可能意味着学习成为一项真正持续终生的活动;在这项活动中,技术变化的速度迫使我们要对学习过程本身不断作出评估。

Unit Eleven/Section B

I.

Fill in the blanks with the information given in the text: 1. 2. 3. 4. 1. 2. 3. 4. 5. 6. 7. 8. 9.

levels; three node; navigation balance; contrast usability

web-authoring software 网络写作软件 template generator 模版生成程序 navigation page 导航页面 corporate logo 公司标识 splash page 醒目页面,过渡页 导航条 navigation bar 节点页面 node page 网站地图 site map 可用性测试 usability testing

II. Translate the following terms or phrases from English into Chinese and vice versa:

10. 图形交换格式 gif(Graphics Interchange Format)

Unit Eleven/Section C

I.

Fill in the blanks with the information given in the text: 1. 2. 3. 4. 1. 2. 3. 4. 5. 6. 7. 8.

neutrality networks; content recognition Phishing

message board 留言板,消息板 software vendor 软件供应商,软件厂商 anonymous message 匿名消息 video clip 视频剪辑,视频片段 过滤软件 filtering software 版权侵犯 copyright infringement 网络中立性 network neutrality 网络运营商 network operator

II. Translate the following terms or phrases from English into Chinese and vice versa:

Unit Twelve: Electronic Commerce Unit Twelve/Section A

I.

Fill in the blanks with the information given in the text: 1. 2.

boom business

《计算机英语第》课后练习答案

UnitNine/SectionCI.Fillintheblankswiththeinformationgiveninthetext:1.2.3.4.1.2.3.4.5.6.7.8.desktopwirelessnodesphones;computersnot
推荐度:
点击下载文档文档为doc格式
00pbv3xhql48fsc2a7r62i4cx3q5al00q7q
领取福利

微信扫码领取福利

微信扫码分享