1、学术英语理工类课后题答案学术英语理工类课后题答案Reading: Text 11.Match the words with their definitions.1g 2a 3e 4b 5c 6d 7j 8f 9h 10i2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 symbolic 2distributed 3site
2、 4complex 5identify6fairly 7straightforward 8capability 9target 10attempt11process 12parameter 13interpretation 14technical 15range 16exploit 17networking 18involve 19 instance 20specification 21accompany 22predictable 23profile3. Read the sentences in the box. Pay attention to the parts in bold.Now
3、 complete the paragraph by translating the Chinese in brackets. You may refer to the expressions and the sentence patterns listed above.ranging from(从到)arise from some misunderstandings(来自于对误解)leaves a lot of problems unsolved(留下很多问题没有得到解决)opens a path for(打开了通道)requires a different frame of mind(需要
4、有新的思想)4.Translate the following sentences from Text 1 into Chinese.1) 有些人声称黑客是那些超越知识疆界而不造成危害的好人(或即使造成危害,但并非故意而为),而“骇客”才是真正的坏人。2) 这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。3) 那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。 4) 另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的
5、是攻击到尽可能多的潜在目标。5) 另外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在几个真正需要的端口,如电子邮件和网站流量。Reading: Text 21.Match the words with their definitions.1d 2f 3h 4i 5a 6e 7b 8j 9g 10c2.Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the fo
6、rm if necessary.1 compromised 2notoriety 3 interchangeably 4malfunctioned 5squeeze6 ingenious 7 emergence 8 humble 9 Cunning 10 vulnerability11criminal 12patches 13 sinister 14daunting 15replicate16malicious 17 spirals 18secure 19blur 20 stem21 disrepute 22 sophisticated 23harness 24 recipient 25con
7、vert 3. Read the sentences in the box. Pay attention to the parts in bold. Now complete the paragraph by translating the Chinese in brackets. You may refer to the expressions and the sentence patterns listed above.There is evidence(有证据表明)so hasthe numberof hackers(黑客的数量也有很大增长)are often referred to a
8、s(往往被称之为)compromise your computer(损坏你的计算机)capture your information(获取你的信息)access your computer(进入你的计算机)量才刚刚开始。Reading: Text 31. Match the words with their definitions.1f 2d 3e 4j 5i 6h 7b 8a 9g 10c2. Complete the following expressions or sentences by using the target words listed below with the help
9、 of the Chinese in brackets. Change the form if necessary.1 irrespective 2 be tailored 3 prone 4 opt 5maximum6coded 7provision 8catered 9check 10ready-made11modified 12on-demand 13 whereabouts 14Hazardous 15incurred16applicable 17developer 18on offer19host 20nominal 21certified 22automated 23outage2
10、4sync 25back up 26minimal 27mobile 3. Read the sentences in the box. Pay attention to the parts in bold. Now complete the paragraph by translating the Chinese in brackets. You may referto the expressions and the sentence patterns listed above.Irrespective of whether(不管)saveusersthe trouble(使用户避免这样的麻
11、烦)caters to the needs of(迎合了需求)for the purpose of(其目的就是)4. Translate the following sentences from Text 3 into Chinese. 1 云计算可定义为一种按次付费模式,这种模式可以根据要求迅速得到计算机分配的可靠资源,用户很少需要自己进行管理。2 由于云计算可以用来不断提供资源,因此当你需要扩充计算机容量时就不需要去买硬件,就不会因为用电去冷却计算机设备而产生更多的二氧化碳。3 这意味着他们不需要开车到办公地点。这就可以省去燃料费,减少二氧化碳排放,从而保护了环境。 4 万一断电,客户可以
12、在电脑再启动时使用和主机同步的备份。 5 除此之外,云计算还不容易受到黑客入侵和分布式拒绝服务的攻击,因为攻击者不知道数据的位置。Reading: Text 41. Match the words with their definitions.1c 2e 3a 4i 5g 6b 7d 8f 9j 10h2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form
13、if necessary.1 analogy 2compatible 3 Distribute 4 implement 5activated 6 static 7 aggregated 8 clone 9 innovative 10replacement 11 crashed12 compromised 13 mine 14 substantial 15asset 16 centralize 17 facilities18 loose 19 monitor 20integrate 21derived 22 update 23download24 upgrade 25licensed 26dif
14、ferential 27 install 28 minimum 29 in-house 30crucial 3. Read the sentences in the box. Pay attention to the parts in bold. Now complete the paragraph by translating the Chinese in brackets. You may referto the expressions and the sentence patterns listed above.remains wide open(有很大的前景)is derived fr
15、om the way in which(来自这样一个方法)becomes crucial(非常重要)will be substantially reduced(会大大降低)4.Translate the following sentences from Text 4 into Chinese.1这个术语来自于因特网往往呈现为网络图的方法。 2目前云计算技术涉及一个数据中心的存在,这个中心能够为全世界用户提供服务。 3这就减少了由于没有硬件,如手提电脑带来的影响。 4虚拟化可以使一个损坏的云端服务器迅速找到替代品而不造成大的损失或破坏。 5云技术还处于起步阶段,更多新的优点会不断被发现。 III
16、. Lecture ListeningListening: Lecture 11.To help computer users to be aware of the ethical uses of computers and the Internet.2. Because more and more people have started using computers and the Internet.3.Number Eight.4.Number Nine.5. Respect and fairness. 6.Lecture 1 addresses the topic “how a com
17、puter user avoids being a conscious or unconscious hacker” while Text 1 and 2 deal with the way hackers “get inside” a computer and electronic threats a computer faces.7.Ten Commandments of Computer Ethics.Lecture 1 Computer ethics 8 Good morning. Did anyone hear the news about the teenager in New Y
18、ork who hacked into a banks database and stole about 30,000 credit card numbers over the week end? Hacking is related to computer ethics. Computer ethics deals with the proper use of information technology, such as computers and the Internet. By proper use, I mean socially responsible use. Well firs
19、t talk about what ethical behavior is and then how this applies to computer use. Ethics is about right and wrong or it deals with moral judgment, with what is acceptable or unacceptable to do. Now we learn ideas about what is right and wrong from our families, our friends, and from the culture we li
20、ve in. Because of differences in our backgrounds, we may not always agree on what is right and wrong. However, for our discussion today, I will define for you what I mean by an ethical action. An ethical action is something someone does that benefits someone and doesnt hurt anyone. So, for example,
21、if you see a man drop some money and you pick the money up and give it to him, this is an ethical action. On the other hand, if you pick up the money and dont give it back to the man, this benefits you, but hurts the man. This is not an ethical action. Now what about computers? What are the ethical
22、boundaries for using computers and Internet? Most people agree that it is wrong to steal from a store. Would they also say its wrong to copy music files from the Internet? Or, to take another example, most people agree that it is wrong to open an envelope and read a letter to someone else. Would the
23、y also say its wrong to read someone elses email?In the past decade or so, many more people have started using computers and the Internet, so these issues have become important. In 1992, the Computer Ethics Institute was founded in the United States. This is a research, education, and policy study g
24、roup whose goal is to increase awareness of the ethical issues that are likely to come up as technology develops. One concept the Computer Ethics Institute has developed is the Ten Commandments of Computer Ethics. These rules are important guidelines the Institute thinks all computer users should fo
25、llow. Now some of you may be familiar with the Ten Commandments from the Bible, like, uh, “Thou shalt not kill.” or “Thou shalt honor thy father and thy mother.” The Ten Commandments of Computer Ethics have been written in the same style of language used in the Ten Commandments from the Bible. For e
26、xample, they use the phrase “Thou shalt not”, “Thou shalt not” means “dont” or “you shouldnt”.Lets look at each commandment or rule.The first commandment says: Thou shalt not use a computer to harm other people. Simple enough, right?Number Two: Thou shalt not interfere with other peoples computer wo
27、rk. I interpret this to mean dont use a computer in any way that will affect or change the work someone else is doing. Dont move or edit someone elses files without telling them. Number Three: Thou shalt not snoop in other peoples files. To snoop means to try to find out something without another pe
28、rson knowing it. If you look at someone elses files on the computer or read their email, youre snooping. Respect other peoples privacy.Number Four: Thou shalt not use a computer to steal. There are situations on the Internet in which you have to decide if you are stealing or not, like downloading mu
29、sic files, as I mentioned earlier. Number Five: Thou shalt not use a computer to say things that are untrue. It is up to you to be truthful in your website, in your e-business, and in your email.Number Six: Thou shalt not use software for which you have not paid. In other words, if the software is f
30、ree on the Internet, its okay to download and use it. However, it is not okay to copy software from a friend, because you didnt pay for it.Number Seven: Thou shalt not use other peoples computer resources without telling them, or without paying them. For example, you shouldnt use someone elses compu
31、ter, password, or Internet connection without asking them first.Number Eight: Thou shalt not appropriate someone elses ideas. Appropriate means to take words someone else wrote and say theyre yours. Uh, for example, you have to write a report for school. If you copy a term paper from the Internet an
32、d hand it in, youre breaking the rule. Copying even a few sentences off the Internet and presenting them as your own is breaking the rule. Number Nine: The ninth commandment says: Thou shalt think about the social consequences of the program you are writing. Now, this applies mostly to computer programmers. Social consequences means how the program youre writing might affect others in society. Could hackers po
copyright@ 2008-2022 冰豆网网站版权所有
经营许可证编号:鄂ICP备2022015515号-1