大学体验英语综合教程第三版2详细答案Uint8

玛丽莲梦兔
871次浏览
2020年08月15日 20:25
最佳经验
本文由作者推荐

老师的诗歌-通告范文


.
Unit Eight
Lead-in
1 business 2 communicating 3 discover 4 type in 5 invention
6 get along 7 opposition 8 create 9 memory 10 available
Passage A
Think About It
1 Yes, I often do, as I like to explore the potentialities of
the Internet. Many people also welcome free software because
they don’t have to pay for it. Others don’t do so because there
is no protection guaranteed against viruses.
2 There are different kinds of anti- virus software, e.g. Norton,
Rising Star and some others. The computers I use in the library
all have one kind or another of software installed to prevent
viruses from being brought in.
3 When old types of viruses have been taken care of, new ones
may appear. It would be impossible to get rid of computer
viruses permanently.
Read About It
Content Awareness
Read And Think
2 Work with your partner and answer the following questions.
1 They turned to the IT staff in their company for help.
整理版文本


.
2 Viruses such as Melissa, the Love Bug, etc.
3 No, they aren’t. They forget about the harm a computer virus
may bring when that virus is off news headlines.
4 They open unsolicited attachments and download unauthorized
software.
5 Open.
3 Choose the best answer to each question with the information
from the passage.
1 B 2 A 3 D 4 A 5 C
4 Fill in the blanks with the words given below. Change the
form where necessary.
1 adequate 2 vitally 3 document 4 distribution 5 urban
6 potential 7 continual 8 infecting 9 threat 10 updated
5 Complete the following sentences with phrases or expressions
from the passage. Change the form where necessary.
1 let down 2 came across as 3 in the back of…mind 4 as a matter
of course 5 cleaning up
6 Choose one word from the box below to replace the underlined
word in each sentence. change the form where necessary.
1 encountered 2 detected 3 transmitted 4 pirated 5 inflicted
7 Translate the following sentences into English.
1 In pursuit of a healthier diet, people are eating more fish
整理版文本


.
than they used to.
整理版文本


.
2 We need to have the roof repaired before the bad weather sets
in.
3 The disease is spreading, and all young children are at risk.
4 The information is transmitted from one computer to another
through a telephone line.
5 Jack is a fairly good runner. He wins more often than not.
8 Read and compare the English sentences, paying attention to
their italicized parts, and then translate the Chinese
sentences by simulating the structure of the English
sentences.
1 It sounds like this high-tech company has put in place many
favorable measures to protect against brain drains.
2 The worry comes when paper-mills ignore the environmental
pollution in pursuit of profits.
3 It’s vitally important that one attend a test-preparation
class before taking a TOEFL test but this cannot be a one-off
event if he really wants to have a good command of English.
4 The potential threat should always be in the back of a
doctor’s mind and appropriate measures should be taken in no
time once emergency arises.
5 In the end, sciences and education are the keys to a prosperous
整理版文本


.
country and this is a continual process.
9 Computer viruses are a constant threat to companies and other
organizations as well as home users. Work in small groups and
have a discussion about how computer viruses spread and how
companies should protect against computer viruses.
Computer viruses can be transmitted via e-mail attachments.
They also spread through software downloaded from the Internet.
So when you are downloading the unlicensed and pirated software,
you are likely to put your computer at risk. The software can
seem harmless enough, but they could easily be harboring a
dangerous virus.
To protect against computer viruses, we should be careful
when opening e-mail attachments and downloading software. We
should use anti-virus software and update it regularly.
As for companies, they should not only take measures by
investing in anti-virus software, but also pay enough attention
to the education of their employees. While the employees may
suddenly become aware of the virus threat when the threat is
there, they soon forget about it as the stories disappear from
the news headlines. So it is important that companies
constantly educate the users about the virus threat and ask them
to practice safe computing.
整理版文本


.
10 Write a paragraph of around 80 words explaining that
companies should do more than invest in anti-virus software
to protect against computer viruses. The following points may
help you to organize your writing. And the first sentence has
been written for you.
To protect against computer viruses, companies should do more
than invest in anti-virus software on the desktops, servers and
email gateways. It’s true that anti-virus software, updated
regularly, can protect the companies’ defences to a large
extent. The employees, however, may use office computers for
personal amusement. When they are opening unsolicited
attachments or downloading unauthorized software, they
probably are putting the company at risk, for the attachments
and the software could easily harbor dangerous viruses.
Therefore, it is very important that companies should
constantly educate their employees about the virus threat and
remind them about what would happen if they let their guard
down.
Passage B
Think About It
1 Yes, my e-mail pin was once hit by hackers and I couldn’t
enter it any more.
整理版文本


.
2 Companies or individuals who wish to avert computer security
issues should put security systems in place. From a hacking
perspective, each server is open to attack, so each must possess
its own anti-virus and spyware systems, and continued oversight
must be given to each of these security systems.
3 Not all hackers are criminals. Bored in school, very adept
with computers and technology, they download scripts or hack
into systems with the intent to vandalize or disrupt systems.
They like to see themselves as elite. They have a lot of
programming background and write code but won’t use it
themselves. Underlying the psyche of the criminal hacker may
be a deep sense of inferiority. Consequently, the mastery of
computer technology, or the shut down of a major site, might
give them a sense of power.
Read About It
Content Awareness
Read And Think
11 Work with your partner and answer the following questions.
1 He flied to Seattle for a job with a company called Invita
Security.
2 The company lured them to break into the networks of potential
customers as part of an effort to persuade those companies to
整理版文本


.
hire Invita to keep hackers out.
整理版文本


.
3 They were stopped and caught by FBI.
4 It is a marked legal milestone when courts could uphold the
right of federal agents to seize evidence remotely, and to
charge foreign cyberciminals in U.S courts.
5 According to them, the most captivating aspects of being a
hacker are psychological, for it makes them feel like playing
a thrilling game, which is full of adventures.
12 Decide whether the following statements are true (T) or
false (F) according to the passage.
1 F 2 F 3 F 4 T 5 F
13 Fill in the blanks with the words given below. Change the
form where necessary.
1 regaled 2 breached 3 captivating 4 entrepreneurial 5 conspire
6 restitution 7 extorted 8 tactic 9 milestone 10 lodging
14 Complete the following sentences with phrases or
expressions from the passage. Change the form where necessary.
1 hacker 2 break into 3 charge 4 benefit 5 bring along
15 Translate the following sentences into English.
1 As the statistics demonstrates we have made great progress
in this field in a short period of time.
2 The exploits of great leaders have been told in songs and
stories.
整理版文本


.
3 It is a long way. Let’s take turn driving.
4 It turns out that it is the banker rather than the computer
fault that has caused the disaster.
5 They must take practical measures to carry out their plan;
otherwise it will end in smoke.
16 Finish the following incomplete outline of paragraph 1 of
the passage “A Hacker Story.” Then reread the whole passage
and write a summary of it.
1 Ivanov and his fellow partner flew to Seattle.
Invita informed them about the job requirements.
2 20-year-old Russian hacker Alexey Ivanov was lured to Seattle
in hopes of landing a dream job with Invita. At the Seattle
interview, Ivanov impressed the interviewers with tales of
hacking exploits and demonstrations of his skills. But as he
and his Russian colleague were being driven away, they were
arrested by FBI agents and were charged with conspiracy,
computer fraud, hacking and extortion. The most important gain
from the Ivanov case may be the legal milestones marked when
courts upheld the right of federal agents to seize evidence
remotely, and to charge foreign cybercriminals in U.S. courts.
Nevertheless, important cyberlaw questions remain unanswered.
The motivations of hackers are psychological as much as
整理版文本


.
financial
整理版文本


.
17 Reduce the number of words in these sentences by making the
introductory dependent clauses elliptical. Write out the
revised sentences.
1 Although expecting a telephone call, the doctor had to leave
his office.
2 While driving into town, my mother ran out of gas.
3 If curious about your final grade, ask your professor.
4 When applying for a scholarship, you should write neatly.
5 After cutting the grass, please water it.
18 Choose the correct pronoun to complete each sentence. Write
out the complete sentence. Then write after each sentence the
elliptical clause beginning with than or as.
1 You worked harder than they. (than they worked)
2 Michael is more popular than he. (than he is)
3 They don’t dance well as we. (as we dance)
4 Do you like to drive as fast as they? (as they drive)
5 I can do the job better than she. (than she does)
19 Rewrite the following sentences so that major ideas receive
proper emphasis. Rely upon the suggestion in parentheses.
1 Refer to page 321 and you will find that the major character
is over six feet tall.
整理版文本

北京遇上西雅图台词-2014理综


河南财政税务高等专科学校-企业管理培训心得


广东省丰顺县-广州大学专业介绍


电气运行-108将怎么死的


北京市人事考试网-湘江战役


广告学毕业论文范文-安徽考试招生网


我的人生价值观-南海诸岛


澳洲出国-销售类实习报告