ImageVerifierCode 换一换
格式:DOCX , 页数:17 ,大小:91.30KB ,
资源ID:3997062      下载积分:3 金币
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.bdocx.com/down/3997062.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(学术英语理工类课后题答案.docx)为本站会员(b****4)主动上传,冰豆网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知冰豆网(发送邮件至service@bdocx.com或直接QQ联系客服),我们立即给予删除!

学术英语理工类课后题答案.docx

1、学术英语理工类课后题答案学术英语理工类课后题答案Reading: Text 11.Match the words with their definitions.1g 2a 3e 4b 5c 6d 7j 8f 9h 10i2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 symbolic 2distributed 3site

2、 4complex 5identify6fairly 7straightforward 8capability 9target 10attempt11process 12parameter 13interpretation 14technical 15range 16exploit 17networking 18involve 19 instance 20specification 21accompany 22predictable 23profile3. Read the sentences in the box. Pay attention to the parts in bold.Now

3、 complete the paragraph by translating the Chinese in brackets. You may refer to the expressions and the sentence patterns listed above.ranging from(从到)arise from some misunderstandings(来自于对误解)leaves a lot of problems unsolved(留下很多问题没有得到解决)opens a path for(打开了通道)requires a different frame of mind(需要

4、有新的思想)4.Translate the following sentences from Text 1 into Chinese.1) 有些人声称黑客是那些超越知识疆界而不造成危害的好人(或即使造成危害,但并非故意而为),而“骇客”才是真正的坏人。2) 这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。3) 那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。 4) 另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的

5、是攻击到尽可能多的潜在目标。5) 另外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在几个真正需要的端口,如电子邮件和网站流量。Reading: Text 21.Match the words with their definitions.1d 2f 3h 4i 5a 6e 7b 8j 9g 10c2.Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the fo

6、rm if necessary.1 compromised 2notoriety 3 interchangeably 4malfunctioned 5squeeze6 ingenious 7 emergence 8 humble 9 Cunning 10 vulnerability11criminal 12patches 13 sinister 14daunting 15replicate16malicious 17 spirals 18secure 19blur 20 stem21 disrepute 22 sophisticated 23harness 24 recipient 25con

7、vert 3. Read the sentences in the box. Pay attention to the parts in bold. Now complete the paragraph by translating the Chinese in brackets. You may refer to the expressions and the sentence patterns listed above.There is evidence(有证据表明)so hasthe numberof hackers(黑客的数量也有很大增长)are often referred to a

8、s(往往被称之为)compromise your computer(损坏你的计算机)capture your information(获取你的信息)access your computer(进入你的计算机)量才刚刚开始。Reading: Text 31. Match the words with their definitions.1f 2d 3e 4j 5i 6h 7b 8a 9g 10c2. Complete the following expressions or sentences by using the target words listed below with the help

9、 of the Chinese in brackets. Change the form if necessary.1 irrespective 2 be tailored 3 prone 4 opt 5maximum6coded 7provision 8catered 9check 10ready-made11modified 12on-demand 13 whereabouts 14Hazardous 15incurred16applicable 17developer 18on offer19host 20nominal 21certified 22automated 23outage2

10、4sync 25back up 26minimal 27mobile 3. Read the sentences in the box. Pay attention to the parts in bold. Now complete the paragraph by translating the Chinese in brackets. You may referto the expressions and the sentence patterns listed above.Irrespective of whether(不管)saveusersthe trouble(使用户避免这样的麻

11、烦)caters to the needs of(迎合了需求)for the purpose of(其目的就是)4. Translate the following sentences from Text 3 into Chinese. 1 云计算可定义为一种按次付费模式,这种模式可以根据要求迅速得到计算机分配的可靠资源,用户很少需要自己进行管理。2 由于云计算可以用来不断提供资源,因此当你需要扩充计算机容量时就不需要去买硬件,就不会因为用电去冷却计算机设备而产生更多的二氧化碳。3 这意味着他们不需要开车到办公地点。这就可以省去燃料费,减少二氧化碳排放,从而保护了环境。 4 万一断电,客户可以

12、在电脑再启动时使用和主机同步的备份。 5 除此之外,云计算还不容易受到黑客入侵和分布式拒绝服务的攻击,因为攻击者不知道数据的位置。Reading: Text 41. Match the words with their definitions.1c 2e 3a 4i 5g 6b 7d 8f 9j 10h2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form

13、if necessary.1 analogy 2compatible 3 Distribute 4 implement 5activated 6 static 7 aggregated 8 clone 9 innovative 10replacement 11 crashed12 compromised 13 mine 14 substantial 15asset 16 centralize 17 facilities18 loose 19 monitor 20integrate 21derived 22 update 23download24 upgrade 25licensed 26dif

14、ferential 27 install 28 minimum 29 in-house 30crucial 3. Read the sentences in the box. Pay attention to the parts in bold. Now complete the paragraph by translating the Chinese in brackets. You may referto the expressions and the sentence patterns listed above.remains wide open(有很大的前景)is derived fr

15、om the way in which(来自这样一个方法)becomes crucial(非常重要)will be substantially reduced(会大大降低)4.Translate the following sentences from Text 4 into Chinese.1这个术语来自于因特网往往呈现为网络图的方法。 2目前云计算技术涉及一个数据中心的存在,这个中心能够为全世界用户提供服务。 3这就减少了由于没有硬件,如手提电脑带来的影响。 4虚拟化可以使一个损坏的云端服务器迅速找到替代品而不造成大的损失或破坏。 5云技术还处于起步阶段,更多新的优点会不断被发现。 III

16、. Lecture ListeningListening: Lecture 11.To help computer users to be aware of the ethical uses of computers and the Internet.2. Because more and more people have started using computers and the Internet.3.Number Eight.4.Number Nine.5. Respect and fairness. 6.Lecture 1 addresses the topic “how a com

17、puter user avoids being a conscious or unconscious hacker” while Text 1 and 2 deal with the way hackers “get inside” a computer and electronic threats a computer faces.7.Ten Commandments of Computer Ethics.Lecture 1 Computer ethics 8 Good morning. Did anyone hear the news about the teenager in New Y

18、ork who hacked into a banks database and stole about 30,000 credit card numbers over the week end? Hacking is related to computer ethics. Computer ethics deals with the proper use of information technology, such as computers and the Internet. By proper use, I mean socially responsible use. Well firs

19、t talk about what ethical behavior is and then how this applies to computer use. Ethics is about right and wrong or it deals with moral judgment, with what is acceptable or unacceptable to do. Now we learn ideas about what is right and wrong from our families, our friends, and from the culture we li

20、ve in. Because of differences in our backgrounds, we may not always agree on what is right and wrong. However, for our discussion today, I will define for you what I mean by an ethical action. An ethical action is something someone does that benefits someone and doesnt hurt anyone. So, for example,

21、if you see a man drop some money and you pick the money up and give it to him, this is an ethical action. On the other hand, if you pick up the money and dont give it back to the man, this benefits you, but hurts the man. This is not an ethical action. Now what about computers? What are the ethical

22、boundaries for using computers and Internet? Most people agree that it is wrong to steal from a store. Would they also say its wrong to copy music files from the Internet? Or, to take another example, most people agree that it is wrong to open an envelope and read a letter to someone else. Would the

23、y also say its wrong to read someone elses email?In the past decade or so, many more people have started using computers and the Internet, so these issues have become important. In 1992, the Computer Ethics Institute was founded in the United States. This is a research, education, and policy study g

24、roup whose goal is to increase awareness of the ethical issues that are likely to come up as technology develops. One concept the Computer Ethics Institute has developed is the Ten Commandments of Computer Ethics. These rules are important guidelines the Institute thinks all computer users should fo

25、llow. Now some of you may be familiar with the Ten Commandments from the Bible, like, uh, “Thou shalt not kill.” or “Thou shalt honor thy father and thy mother.” The Ten Commandments of Computer Ethics have been written in the same style of language used in the Ten Commandments from the Bible. For e

26、xample, they use the phrase “Thou shalt not”, “Thou shalt not” means “dont” or “you shouldnt”.Lets look at each commandment or rule.The first commandment says: Thou shalt not use a computer to harm other people. Simple enough, right?Number Two: Thou shalt not interfere with other peoples computer wo

27、rk. I interpret this to mean dont use a computer in any way that will affect or change the work someone else is doing. Dont move or edit someone elses files without telling them. Number Three: Thou shalt not snoop in other peoples files. To snoop means to try to find out something without another pe

28、rson knowing it. If you look at someone elses files on the computer or read their email, youre snooping. Respect other peoples privacy.Number Four: Thou shalt not use a computer to steal. There are situations on the Internet in which you have to decide if you are stealing or not, like downloading mu

29、sic files, as I mentioned earlier. Number Five: Thou shalt not use a computer to say things that are untrue. It is up to you to be truthful in your website, in your e-business, and in your email.Number Six: Thou shalt not use software for which you have not paid. In other words, if the software is f

30、ree on the Internet, its okay to download and use it. However, it is not okay to copy software from a friend, because you didnt pay for it.Number Seven: Thou shalt not use other peoples computer resources without telling them, or without paying them. For example, you shouldnt use someone elses compu

31、ter, password, or Internet connection without asking them first.Number Eight: Thou shalt not appropriate someone elses ideas. Appropriate means to take words someone else wrote and say theyre yours. Uh, for example, you have to write a report for school. If you copy a term paper from the Internet an

32、d hand it in, youre breaking the rule. Copying even a few sentences off the Internet and presenting them as your own is breaking the rule. Number Nine: The ninth commandment says: Thou shalt think about the social consequences of the program you are writing. Now, this applies mostly to computer programmers. Social consequences means how the program youre writing might affect others in society. Could hackers po

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1