当前位置:文档之家› 大学体验英语综合教程第三版2详细答案Uint8

大学体验英语综合教程第三版2详细答案Uint8

Unit EightLead-in1 business2 communicating3 discover4 type in5 invention6 get along7 opposition8 create9 memory 10 availablePassage AThink About It1 Yes, I often do, as I like to explore the potentialities of the Internet. Many people also welcome free software because they don’t have to pay for it. Others don’t do so because there is no protection guaranteed against viruses.2 There are different kinds of anti-virus software, . Norton, Rising Star and some others. The computers I use in the library all have one kind or another of software installed to prevent viruses from being brought in.3 When old types of viruses have been taken care of, new ones may appear. It would be impossible to get rid of computer viruses permanently.Read About ItContent AwarenessRead And Think2 Work with your partner and answer the following questions.1 They turned to the IT staff in their company for help.2 Viruses such as Melissa, the Love Bug, etc.3 No, they aren’t. They forget about the harm a computer virus may bring when that virus is off news headlines.4 They open unsolicited attachments and download unauthorized software.5 Open.3 Choose the best answer to each question with the information from the passage.1 B2 A3 D4 A5 C4 Fill in the blanks with the words given below. Change the form where necessary.1 adequate2 vitally3 document4 distribution5 urban6 potential7 continual8 infecting9 threat 10 updated5 Complete the following sentences with phrases or expressions from the passage. Change the form where necessary.1 let down2 came across as3 in the back of…mind4 as a matter of course5 cleaning up6 Choose one word from the box below to replace the underlined word in each sentence. change the form where necessary.1 encountered2 detected3 transmitted4 pirated 5inflicted7 Translate the following sentences into English.1 In pursuit of a healthier diet, people are eating more fish than they used to.2 We need to have the roof repaired before the bad weather sets in.3 The disease is spreading, and all young children are at risk.4 The information is transmitted from one computer to another through a telephone line.5 Jack is a fairly good runner. He wins more often than not.8 Read and compare the English sentences, paying attention to their italicized parts, and then translate the Chinese sentences by simulating the structure of the English sentences.1 It sounds like this high-tech company has put in place many favorable measures to protect against brain drains.2 The worry comes when paper-mills ignore the environmental pollution in pursuit of profits.3 It’s vitally important that one attend a test-preparation class before taking a TOEFL test but this cannot be a one-off event if he really wants to have a goodcommand of English.4 The potential threat should always be in the back of a doctor’s mind and appropriate measures should be taken in no time once emergency arises.5 In the end, sciences and education are the keys to a prosperous country and this is a continual process.9 Computer viruses are a constant threat to companies and other organizations as well as home users. Work in small groups and have a discussion about how computer viruses spread and how companies should protect against computer viruses.Computer viruses can be transmitted via e-mail attachments. They also spread through software downloaded from the Internet. So when you are downloading the unlicensed and pirated software, you are likely to put your computer at risk. The software can seem harmless enough, but they could easily be harboring a dangerous virus.To protect against computer viruses, we should be careful when opening e-mail attachments and downloading software. We should use anti-virus software and update it regularly.As for companies, they should not only take measures by investing in anti-virus software, but also pay enough attention to the education of their employees. While the employees maysuddenly become aware of the virus threat when the threat is there, they soon forget about it as the stories disappear from the news headlines. So it is important that companies constantly educate the users about the virus threat and ask them to practice safe computing.10 Write a paragraph of around 80 words explaining that companies should do more than invest in anti-virus software to protect against computer viruses. The following points may help you to organize your writing. And the first sentence has been written for you.To protect against computer viruses, companies should do more than invest in anti-virus software on the desktops, servers and email gateways. It’s true that anti-virus software, updated regularly, can protect the companies’ defences to a large extent. The employees, however, may use office computers for personal amusement. When they are opening unsolicited attachments or downloading unauthorized software, they probably are putting the company at risk, for the attachments and the software could easily harbor dangerous viruses. Therefore, it is very important that companies should constantly educate their employees about the virus threat and remind them about what would happen if they let their guarddown.Passage BThink About It1 Yes, my e-mail pin was once hit by hackers and I couldn’t enter it any more.2 Companies or individuals who wish to avert computer security issues should put security systems in place. From a hacking perspective, each server is open to attack, so each must possess its own anti-virus and spyware systems, and continued oversight must be given to each of these security systems.3 Not all hackers are criminals. Bored in school, very adept with computers and technology, they download scripts or hack into systems with the intent to vandalize or disrupt systems. They like to see themselves as elite. They have a lot of pro gramming background and write code but won’t use it themselves. Underlying the psyche of the criminal hacker may be a deep sense of inferiority. Consequently, the mastery of computer technology, or the shut down of a major site, might give them a sense of power.Read About ItContent AwarenessRead And Think11 Work with your partner and answer the following questions.1 He flied to Seattle for a job with a company called Invita Security.2 The company lured them to break into the networks of potential customers as part of an effort to persuade those companies to hire Invita to keep hackers out.3 They were stopped and caught by FBI.4 It is a marked legal milestone when courts could uphold the right of federal agents to seize evidence remotely, and to charge foreign cyberciminals in courts.5 According to them, the most captivating aspects of beinga hacker are psychological, for it makes them feel like playinga thrilling game, which is full of adventures.12 Decide whether the following statements are true (T) or false (F) according to the passage.1 F2 F3 F4 T5 F13 Fill in the blanks with the words given below. Change the form where necessary.1 regaled2 breached3 captivating4 entrepreneurial5 conspire6 restitution7 extorted8 tactic9 milestone 10 lodging14 Complete the following sentences with phrases or expressions from the passage. Change the form where necessary.1 hacker2 break into3 charge4 benefit5 bring along15 Translate the following sentences into English.1 As the statistics demonstrates we have made great progress in this field in a short period of time.2 The exploits of great leaders have been told in songs and stories.3 It is a long way. Let’s take turn driving.4 It turns out that it is the banker rather than the computer fault that has caused the disaster.5 They must take practical measures to carry out their plan; otherwise it will end in smoke.16 Finish the following incomplete outline of paragraph 1 of the passage “A Hacker Story.” Then reread the whole passage and write a summary of it.1 Ivanov and his fellow partner flew to Seattle.Invita informed them about the job requirements.2 20-year-old Russian hacker Alexey Ivanov was lured to Seattle in hopes of landing a dream job with Invita. At the Seattle interview, Ivanov impressed the interviewers with tales of hacking exploits and demonstrations of his skills. Butas he and his Russian colleague were being driven away, they were arrested by FBI agents and were charged with conspiracy, computer fraud, hacking and extortion. The most important gain from the Ivanov case may be the legal milestones marked when courts upheld the right of federal agents to seize evidence remotely, and to charge foreign cybercriminals in . courts. Nevertheless, important cyberlaw questions remain unanswered. The motivations of hackers are psychological as much as financial17 Reduce the number of words in these sentences by making the introductory dependent clauses elliptical. Write out the revised sentences.1 Although expecting a telephone call, the doctor had to leave his office.2 While driving into town, my mother ran out of gas.3 If curious about your final grade, ask your professor.4 When applying for a scholarship, you should write neatly.5 After cutting the grass, please water it.18 Choose the correct pronoun to complete each sentence. Write out the complete sentence. Then write after each sentence the elliptical clause beginning with than or as.1 You worked harder than they. (than they worked)2 Michael is more popular than he. (than he is)3 They don’t dance well as we. (as we dance)4 Do you like to drive as fast as they (as they drive)5 I can do the job better than she. (than she does)19 Rewrite the following sentences so that major ideas receive proper emphasis. Rely upon the suggestion in parentheses.1 Refer to page 321 and you will find that the major character is over six feet tall.2 Because the immigrants will gain economic power, speaking the immigrants’ language will become more important to the businessman.3 Art was not only an interest; art was a vital emotional therapy.4 The young girls enjoy driving around town and waving to friends.5 Not only a knowledge of language is important, but a knowledge of customs is also important.20 Choose one of the following topics and write an Internet notice.This is a VBScript Internet worm which was based loosely on the original VBS/Love letter worm. This worm does not damagefiles, however, it does contain another mechanism of downloading a password stealing agent and launching this silently in the background. In addition, this worm steals PIN information stored in the registry related to UBS online banking software.This worm distributes itself via MAPI e-mail as “ with the subject line “resume” and no body text.If this VBScript is run, it may display an actual resume in Notepad. However in the background it is doing other things such as downloading the trojan component and sending itself to others via MAPI e-mail. Additionally, the sensitive PIN information is e-mailed to three hard-coded e-mail recipients.11。

相关主题