当前位置:
文档之家› 《计算机英语》Unit 10
《计算机英语》Unit 10
1.2 Computer Virus
• II. Choose the best answer to each of the following questions.
1.1 Computer Security
• II. Choose the best answer to each of the following questions.
C
– 1.What is the primary difference of computer security from some other computer science fields? – A.Its varied objectives – B.Its positive enforceable rules – C.Its negative requirements – D.Its impractical for most computer programs
1.1 Computer Security
1. Introduction
2. Security Architecture 3. Hardware Mechanisms that Protect Computers and Data 4. Secure Operating Systems 5. Secure Coding 6. Applications
1.1 Computer Security
• II. Choose the best answer to each of the following questions. B – 3.Which of the following is NOT argued in the instances of computer security accidents in aviation? – A.Human error – B.Computer malfunction – C.Hackers intruding – D.Electromagnetic interference
– ___1.Computer security is a branch of technology arranged under information security category. – ___2.Physically limiting access to computers is approximately one of the strongest approaches to improve computer security. – ___3.Computer programming strategies are often considered as the most dependent approach for computer security among others. – ___4.In aviation, transmitting unauthorized communications over specific radio frequencies may spoof air traffic controllers or simply disrupt communications altogether. – ___5.The issues of computer security are an indispensable part of maintaining an operational industry.
1.2 Computer Virus
• Exercises • I. Read the following statements carefully, and decide whether they are true (T) or false (F) according to the text.
– ___1.Windows is by far the most popular operating system for virus writers due to their market dominance. – ___2.Bugs in software generally means potential exploits for the spread of viruses. – ___3.The method of using a heuristic algorithm to find viruses can detect viruses which haven’t yet been defined in the current database of known virus ―signatures‖. – ___4.The backups on CD/DVD are always safe because the media becomes read-only and can no longer be affected by a virus. – ___5.Anti-virus software can enhance the underlying capability of host software to prevent viruses transmitting.
1.1 Computer Security
• Complex Sentences
– Original: If the operating environment is not based oin a secure operating system capable of maintaining a domain for its own execution, and capable of protecting application code from malicious subversion, and capable of protecting the system from subverted code, then high degrees of security are understandably not possible.
– Translation:如果操作环境不是基于一个安全的操作系统——能够 维持自己的执行域,并能保护应用程序代码免受恶意破坏,以及 保护系统免受破坏代码损害,那么高安全程度是显然不可能的。
1.1 Computer Security
• Exercises • I. Read the following statements carefully, and decide whether they are true (T) or false (F) according to the text.
1.1 Computer Security
• III. Translating.
– 1. Original: The objective of computer security includes protection of information and property from theft,corruption or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. – Translation: – 2. Original Other accidental and intentional faults have caused significant disruption of safety critical systems throughout the last few decades and dependence on reliable communication and electrical power only jeopardizes computer safety. – Translation:
• Part 2 Simulated Writing: Business Letter • Part 3 Listening and Speaking
– Dialogue: Using Anti-virus Software
– Listening Comprehension: Hacker and Cracker – Dictation: Father of the Mouse — Doug Engelbart
1.2 Computer Virus
1. Introduction
2. Infection Strategies 3. Vulnerability and Countermeasures
4. Disadvantages
1.2 Computer Virus
• Complex Sentences
– Original: Just as genetic diversity in a population decreases the chance of a single disease wiping out a population, the diversity of software systems on a network similarly limits the destructive potential of viruses. – Translation:正像在种群中的遗传多样性降低了某种单一疾病灭绝 种群的可能性,网络中软件系统的多样性也类似地限制了病毒的 破坏性潜力。
1.2 Computer Virus
• II. Choose the best answer to each of the following questions.
B
– 1.Which of the following is RIGHT about the infection strategies of viruses? – A.Viruses may take advantage of present network services to facilitate their spread – B.All original viruses must modify the copies in metamorphic viruses for spread – C.The success of viruses all relies on their fast infection rate to spread – D.All viruses pretend that they are executable files in order to replicate themselves