欢迎来到冰点文库! | 帮助中心 分享价值,成长自我!
冰点文库
全部分类
  • 临时分类>
  • IT计算机>
  • 经管营销>
  • 医药卫生>
  • 自然科学>
  • 农林牧渔>
  • 人文社科>
  • 工程科技>
  • PPT模板>
  • 求职职场>
  • 解决方案>
  • 总结汇报>
  • ImageVerifierCode 换一换
    首页 冰点文库 > 资源分类 > DOCX文档下载
    分享到微信 分享到微博 分享到QQ空间

    学术英语理工类课后题答案解析.docx

    • 资源ID:8994778       资源大小:35.20KB        全文页数:23页
    • 资源格式: DOCX        下载积分:1金币
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    三方登录下载: 微信开放平台登录 QQ登录
    二维码
    微信扫一扫登录
    下载资源需要1金币
    邮箱/手机:
    温馨提示:
    快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如填写123,账号就是123,密码也是123。
    支付方式: 支付宝    微信支付   
    验证码:   换一换

    加入VIP,免费下载
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    学术英语理工类课后题答案解析.docx

    1、学术英语理工类课后题答案解析Reading: Text 11.Match the words with their definitions.1g 2a 3e 4b 5c 6d 7j 8f 9h 10i2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 symbolic 2distributed 3site 4complex

    2、5identify6fairly 7straightforward 8capability 9target 10attempt11process 12parameter 13interpretation 14technical 15range 16exploit 17networking 18involve 19 instance 20specification 21accompany 22predictable 23profile3. Read the sentences in the box. Pay attention to the parts in bold.Now complete

    3、the paragraph by translating the Chinese in brackets. You may refer to the expressions and the sentence patterns listed above.ranging from(从到)arise from some misunderstandings(来自于对误解)leaves a lot of problems unsolved(留下很多问题没有得到解决)opens a path for(打开了通道)requires a different frame of mind(需要有新的思想)4.Tr

    4、anslate the following sentences from Text 1 into Chinese.1) 有些人声称黑客是那些超越知识疆界而不造成危害的好人(或即使造成危害,但并非故意而为),而“骇客”才是真正的坏人。2) 这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。3) 那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。 4) 另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的是攻击到尽可能多的潜

    5、在目标。5) 另外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在几个真正需要的端口,如电子邮件和网站流量。Reading: Text 21.Match the words with their definitions.1d 2f 3h 4i 5a 6e 7b 8j 9g 10c2.Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if nece

    6、ssary.1 compromised 2notoriety 3 interchangeably 4malfunctioned 5squeeze6 ingenious 7 emergence 8 humble 9 Cunning 10 vulnerability11criminal 12patches 13 sinister 14daunting 15replicate16malicious 17 spirals 18secure 19blur 20 stem21 disrepute 22 sophisticated 23harness 24 recipient 25convert 3. Re

    7、ad the sentences in the box. Pay attention to the parts in bold. Now complete the paragraph by translating the Chinese in brackets. You may refer to the expressions and the sentence patterns listed above.There is evidence(有证据表明)so hasthe numberof hackers(黑客的数量也有很大增长)are often referred to as(往往被称之为)c

    8、ompromise your computer(损坏你的计算机)capture your information(获取你的信息)access your computer(进入你的计算机)4 .Translate the following sentences from Text 2 into Chinese.1 看似无害的编程错误可能被利用,导致电脑被侵入,为电脑病毒和蠕虫的繁衍提供温床。2 当一个软件漏洞被发现,黑客可以将它变成一个侵入点,从而造成极大的破坏。在这之前,往往需要争分夺秒地利用正确的软件补丁来防止破坏的发生。3 最简单的钓鱼骗局试图利用迅速致富的伎俩诱使诈骗目标寄钱。但网络骗子

    9、们也变得越来越狡猾,最近的陷阱是通过发送客户服务的电子邮件让用户进入假银行或商业网站,并在那里请他们“重新输入”他们的账户信息。4 间谍软件与垃圾邮件和钓鱼网络一起,构成了三个令人生厌的互联网害虫。尽管有些程序可以通过入侵软件漏洞从而进入电脑,但这些有害而秘密的程序通常会随着其他免费的应用软件侵入到计算机系统中。5 尽管因特网已经彻底改变了全球通讯,但是对于那些利用网络力量实现罪恶目的的人和那些负责阻止这些网络犯罪的人来说,他们之间的较量才刚刚开始。Reading: Text 31. Match the words with their definitions.1f 2d 3e 4j 5i 6

    10、h 7b 8a 9g 10c2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 irrespective 2 be tailored 3 prone 4 opt 5maximum6coded 7provision 8catered 9check 10ready-made11modified 12on-demand 13 wh

    11、ereabouts 14Hazardous 15incurred16applicable 17developer 18on offer19host 20nominal 21certified 22automated 23outage24sync 25back up 26minimal 27mobile 3. Read the sentences in the box. Pay attention to the parts in bold. Now complete the paragraph by translating the Chinese in brackets. You may ref

    12、erto the expressions and the sentence patterns listed above.Irrespective of whether(不管)saveusersthe trouble(使用户避免这样的麻烦)caters to the needs of(迎合了需求)for the purpose of(其目的就是)4. Translate the following sentences from Text 3 into Chinese. 1 云计算可定义为一种按次付费模式,这种模式可以根据要求迅速得到计算机分配的可靠资源,用户很少需要自己进行管理。2 由于云计算可

    13、以用来不断提供资源,因此当你需要扩充计算机容量时就不需要去买硬件,就不会因为用电去冷却计算机设备而产生更多的二氧化碳。3 这意味着他们不需要开车到办公地点。这就可以省去燃料费,减少二氧化碳排放,从而保护了环境。 4 万一断电,客户可以在电脑再启动时使用和主机同步的备份。 5 除此之外,云计算还不容易受到黑客入侵和分布式拒绝服务的攻击,因为攻击者不知道数据的位置。Reading: Text 41. Match the words with their definitions.1c 2e 3a 4i 5g 6b 7d 8f 9j 10h2. Complete the following expre

    14、ssions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 analogy 2compatible 3 Distribute 4 implement 5activated 6 static 7 aggregated 8 clone 9 innovative 10replacement 11 crashed12 compromised 13 mine 14 substantial 15asset

    15、 16 centralize 17 facilities18 loose 19 monitor 20integrate 21derived 22 update 23download24 upgrade 25licensed 26differential 27 install 28 minimum 29 in-house 30crucial 3. Read the sentences in the box. Pay attention to the parts in bold. Now complete the paragraph by translating the Chinese in br

    16、ackets. You may referto the expressions and the sentence patterns listed above.remains wide open(有很大的前景)is derived from the way in which(来自这样一个方法)becomes crucial(非常重要)will be substantially reduced(会大大降低)4.Translate the following sentences from Text 4 into Chinese.1这个术语来自于因特网往往呈现为网络图的方法。 2目前云计算技术涉及一个

    17、数据中心的存在,这个中心能够为全世界用户提供服务。 3这就减少了由于没有硬件,如手提电脑带来的影响。 4虚拟化可以使一个损坏的云端服务器迅速找到替代品而不造成大的损失或破坏。 5云技术还处于起步阶段,更多新的优点会不断被发现。 III. Lecture ListeningListening: Lecture 11.To help computer users to be aware of the ethical uses of computers and the Internet.2. Because more and more people have started using comput

    18、ers and the Internet.3.Number Eight.4.Number Nine.5. Respect and fairness. 6.Lecture 1 addresses the topic “how a computer user avoids being a conscious or unconscious hacker” while Text 1 and 2 deal with the way hackers “get inside” a computer and electronic threats a computer faces.7.Ten Commandme

    19、nts of Computer Ethics.Lecture 1 Computer ethics 8 Good morning. Did anyone hear the news about the teenager in New York who hacked into a banks database and stole about 30,000 credit card numbers over the week end? Hacking is related to computer ethics. Computer ethics deals with the proper use of

    20、information technology, such as computers and the Internet. By proper use, I mean socially responsible use. Well first talk about what ethical behavior is and then how this applies to computer use. Ethics is about right and wrong or it deals with moral judgment, with what is acceptable or unacceptab

    21、le to do. Now we learn ideas about what is right and wrong from our families, our friends, and from the culture we live in. Because of differences in our backgrounds, we may not always agree on what is right and wrong. However, for our discussion today, I will define for you what I mean by an ethica

    22、l action. An ethical action is something someone does that benefits someone and doesnt hurt anyone. So, for example, if you see a man drop some money and you pick the money up and give it to him, this is an ethical action. On the other hand, if you pick up the money and dont give it back to the man,

    23、 this benefits you, but hurts the man. This is not an ethical action. Now what about computers? What are the ethical boundaries for using computers and Internet? Most people agree that it is wrong to steal from a store. Would they also say its wrong to copy music files from the Internet? Or, to take

    24、 another example, most people agree that it is wrong to open an envelope and read a letter to someone else. Would they also say its wrong to read someone elses email?In the past decade or so, many more people have started using computers and the Internet, so these issues have become important. In 19

    25、92, the Computer Ethics Institute was founded in the United States. This is a research, education, and policy study group whose goal is to increase awareness of the ethical issues that are likely to come up as technology develops. One concept the Computer Ethics Institute has developed is the Ten Co

    26、mmandments of Computer Ethics. These rules are important guidelines the Institute thinks all computer users should follow. Now some of you may be familiar with the Ten Commandments from the Bible, like, uh, “Thou shalt not kill.” or “Thou shalt honor thy father and thy mother.” The Ten Commandments

    27、of Computer Ethics have been written in the same style of language used in the Ten Commandments from the Bible. For example, they use the phrase “Thou shalt not”, “Thou shalt not” means “dont” or “you shouldnt”.Lets look at each commandment or rule.The first commandment says: Thou shalt not use a co

    28、mputer to harm other people. Simple enough, right?Number Two: Thou shalt not interfere with other peoples computer work. I interpret this to mean dont use a computer in any way that will affect or change the work someone else is doing. Dont move or edit someone elses files without telling them. Numb

    29、er Three: Thou shalt not snoop in other peoples files. To snoop means to try to find out something without another person knowing it. If you look at someone elses files on the computer or read their email, youre snooping. Respect other peoples privacy.Number Four: Thou shalt not use a computer to st

    30、eal. There are situations on the Internet in which you have to decide if you are stealing or not, like downloading music files, as I mentioned earlier. Number Five: Thou shalt not use a computer to say things that are untrue. It is up to you to be truthful in your website, in your e-business, and in

    31、 your email.Number Six: Thou shalt not use software for which you have not paid. In other words, if the software is free on the Internet, its okay to download and use it. However, it is not okay to copy software from a friend, because you didnt pay for it.Number Seven: Thou shalt not use other peopl

    32、es computer resources without telling them, or without paying them. For example, you shouldnt use someone elses computer, password, or Internet connection without asking them first.Number Eight: Thou shalt not appropriate someone elses ideas. Appropriate means to take words someone else wrote and say theyre yours. Uh, for example, you have to write a report for school. If you copy a term paper from the Internet and hand it in, youre breaking t


    注意事项

    本文(学术英语理工类课后题答案解析.docx)为本站会员主动上传,冰点文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰点文库(点击联系客服),我们立即给予删除!

    温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2023 冰点文库 网站版权所有

    经营许可证编号:鄂ICP备19020893号-2


    收起
    展开