学术英语习题答案text1-15+18

上传人:第*** 文档编号:31777131 上传时间:2018-02-09 格式:DOC 页数:12 大小:89KB
返回 下载 相关 举报
学术英语习题答案text1-15+18_第1页
第1页 / 共12页
学术英语习题答案text1-15+18_第2页
第2页 / 共12页
学术英语习题答案text1-15+18_第3页
第3页 / 共12页
学术英语习题答案text1-15+18_第4页
第4页 / 共12页
学术英语习题答案text1-15+18_第5页
第5页 / 共12页
点击查看更多>>
资源描述

《学术英语习题答案text1-15+18》由会员分享,可在线阅读,更多相关《学术英语习题答案text1-15+18(12页珍藏版)》请在金锄头文库上搜索。

1、Reading: Text 11.Match the words with their definitions.1g 2a 3e 4b 5c 6d 7j 8f 9h 10i2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 symbolic 2distributed 3site 4complex 5identify6fair

2、ly 7straightforward 8capability 9target 10attempt11process 12parameter 13interpretation 14technical 15range 16exploit 17networking 18involve 19 instance 20specification 21accompany 22predictable 23profile3. Read the sentences in the box. Pay attention to the parts in bold.Now complete the paragraph

3、by translating the Chinese in brackets. You may refer to the expressions and the sentence patterns listed above.ranging from(从到)arise from some misunderstandings(来自于对误解)leaves a lot of problems unsolved(留下很多问题没有得到解决)opens a path for(打开了通道)requires a different frame of mind(需要有新的思想)4.Translate the fo

4、llowing sentences from Text 1 into Chinese.1) 有些人声称黑客是那些超越知识疆界而不造成危害的好人(或即使造成危害,但并非故意而为),而“骇客” 才是真正的坏人。2) 这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。3) 那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。 4) 另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的是攻击到尽可能多的潜在目标。5) 另外,考虑安

5、装一个硬件防火墙并将从互联网中流入和流出的数据限定在几个真正需要的端口,如电子邮件和网站流量。Reading: Text 21.Match the words with their definitions.1d 2f 3h 4i 5a 6e 7b 8j 9g 10c2.Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 compr

6、omised 2notoriety 3 interchangeably 4malfunctioned 5squeeze6 ingenious 7 emergence 8 humble 9 Cunning 10 vulnerability11criminal 12patches 13 sinister 14daunting 15replicate16malicious 17 spirals 18secure 19blur 20 stem21 disrepute 22 sophisticated 23harness 24 recipient 25convert 3. Read the senten

7、ces in the box. Pay attention to the parts in bold. Now complete the paragraph by translating the Chinese in brackets. You may refer to the expressions and the sentence patterns listed above.There is evidence(有证据表明)so hasthe numberof hackers(黑客的数量也有很大增长)are often referred to as(往往被称之为)compromise you

8、r computer(损坏你的计算机)capture your information(获取你的信息)access your computer(进入你的计算机)4 .Translate the following sentences from Text 2 into Chinese.1 看似无害的编程错误可能被利用,导致电脑被侵入,为电脑病毒和蠕虫的繁衍提供温床。2 当一个软件漏洞被发现,黑客可以将它变成一个侵入点,从而造成极大的破坏。在这之前,往往需要争分夺秒地利用正确的软件补丁来防止破坏的发生。3 最简单的钓鱼骗局试图利用迅速致富的伎俩诱使诈骗目标寄钱。但网络骗子们也变得越来越狡猾,最近的

9、陷阱是通过发送客户服务的电子邮件让用户进入假银行或商业网站,并在那里请他们“重新输入” 他们的账户信息。4 间谍软件与垃圾邮件和钓鱼网络一起,构成了三个令人生厌的互联网害虫。尽管有些程序可以通过入侵软件漏洞从而进入电脑,但这些有害而秘密的程序通常会随着其他免费的应用软件侵入到计算机系统中。5 尽管因特网已经彻底改变了全球通讯,但是对于那些利用网络力量实现罪恶目的的人和那些负责阻止这些网络犯罪的人来说,他们之间的较量才刚刚开始。Reading: Text 31. Match the words with their definitions.1f 2d 3e 4j 5i 6h 7b 8a 9g 1

10、0c2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 irrespective 2 be tailored 3 prone 4 opt 5maximum6coded 7provision 8catered 9check 10ready-made11modified 12on-demand 13 whereabouts 14

11、Hazardous 15incurred16applicable 17developer 18on offer19host 20nominal 21certified 22automated 23outage24sync 25back up 26minimal 27mobile 3. Read the sentences in the box. Pay attention to the parts in bold. Now complete the paragraph by translating the Chinese in brackets. You may referto the exp

12、ressions and the sentence patterns listed above.Irrespective of whether(不管)saveusersthe trouble(使用户避免这样的麻烦)caters to the needs of(迎合了需求)for the purpose of(其目的就是)4. Translate the following sentences from Text 3 into Chinese. 1 云计算可定义为一种按次付费模式,这种模式可以根据要求迅速得到计算机分配的可靠资源,用户很少需要自己进行管理。2 由于云计算可以用来不断提供资源,因此

13、当你需要扩充计算机容量时就不需要去买硬件,就不会因为用电去冷却计算机设备而产生更多的二氧化碳。3 这意味着他们不需要开车到办公地点。这就可以省去燃料费,减少二氧化碳排放,从而保护了环境。 4 万一断电,客户可以在电脑再启动时使用和主机同步的备份。 5 除此之外,云计算还不容易受到黑客入侵和分布式拒绝服务的攻击,因为攻击者不知道数据的位置。Reading: Text 41. Match the words with their definitions.1c 2e 3a 4i 5g 6b 7d 8f 9j 10h2. Complete the following expressions or se

14、ntences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 analogy 2compatible 3 Distribute 4 implement 5activated 6 static 7 aggregated 8 clone 9 innovative 10replacement 11 crashed12 compromised 13 mine 14 substantial 15asset 16 centrali

15、ze 17 facilities18 loose 19 monitor 20integrate 21derived 22 update 23download24 upgrade 25licensed 26differential 27 install 28 minimum 29 in-house 30crucial 3. Read the sentences in the box. Pay attention to the parts in bold. Now complete the paragraph by translating the Chinese in brackets. You may referto the expressions and the sentence patterns listed above.remains wide open(有很大的前景)is derived from the way in which(来自这样一个方法)becom

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 行业资料 > 工业设计

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号