大学体验英语综合教程第三版2详细答案Uint8
老师的诗歌-通告范文
.
Unit Eight
Lead-in
1 business
2 communicating 3 discover 4 type in 5 invention
6 get along 7 opposition 8 create 9 memory 10
available
Passage A
Think About It
1
Yes, I often do, as I like to explore the
potentialities of
the Internet. Many people
also welcome free software because
they don’t
have to pay for it. Others don’t do so because
there
is no protection guaranteed against
viruses.
2 There are different kinds of anti-
virus software, e.g. Norton,
Rising Star and
some others. The computers I use in the library
all have one kind or another of software
installed to prevent
viruses from being
brought in.
3 When old types of viruses have
been taken care of, new ones
may appear. It
would be impossible to get rid of computer
viruses permanently.
Read About It
Content Awareness
Read And Think
2
Work with your partner and answer the following
questions.
1 They turned to the IT staff in
their company for help.
整理版文本
.
2 Viruses such as Melissa, the Love Bug, etc.
3 No, they aren’t. They forget about the harm
a computer virus
may bring when that virus is
off news headlines.
4 They open unsolicited
attachments and download unauthorized
software.
5 Open.
3 Choose the best
answer to each question with the information
from the passage.
1 B 2 A 3 D 4 A 5 C
4 Fill in the blanks with the words given
below. Change the
form where necessary.
1
adequate 2 vitally 3 document 4 distribution 5
urban
6 potential 7 continual 8 infecting 9
threat 10 updated
5 Complete the following
sentences with phrases or expressions
from the
passage. Change the form where necessary.
1
let down 2 came across as 3 in the back of…mind 4
as a matter
of course 5 cleaning up
6
Choose one word from the box below to replace the
underlined
word in each sentence. change the
form where necessary.
1 encountered 2 detected
3 transmitted 4 pirated 5 inflicted
7
Translate the following sentences into English.
1 In pursuit of a healthier diet, people are
eating more fish
整理版文本
.
than
they used to.
整理版文本
.
2 We need
to have the roof repaired before the bad weather
sets
in.
3 The disease is spreading, and
all young children are at risk.
4 The
information is transmitted from one computer to
another
through a telephone line.
5 Jack
is a fairly good runner. He wins more often than
not.
8 Read and compare the English sentences,
paying attention to
their italicized parts,
and then translate the Chinese
sentences by
simulating the structure of the English
sentences.
1 It sounds like this high-tech
company has put in place many
favorable
measures to protect against brain drains.
2
The worry comes when paper-mills ignore the
environmental
pollution in pursuit of profits.
3 It’s vitally important that one attend a
test-preparation
class before taking a TOEFL
test but this cannot be a one-off
event if he
really wants to have a good command of English.
4 The potential threat should always be in the
back of a
doctor’s mind and appropriate
measures should be taken in no
time once
emergency arises.
5 In the end, sciences and
education are the keys to a prosperous
整理版文本
.
country and this is a continual
process.
9 Computer viruses are a constant
threat to companies and other
organizations as
well as home users. Work in small groups and
have a discussion about how computer viruses
spread and how
companies should protect
against computer viruses.
Computer viruses can
be transmitted via e-mail attachments.
They
also spread through software downloaded from the
Internet.
So when you are downloading the
unlicensed and pirated software,
you are
likely to put your computer at risk. The software
can
seem harmless enough, but they could
easily be harboring a
dangerous virus.
To
protect against computer viruses, we should be
careful
when opening e-mail attachments and
downloading software. We
should use anti-virus
software and update it regularly.
As for
companies, they should not only take measures by
investing in anti-virus software, but also pay
enough attention
to the education of their
employees. While the employees may
suddenly
become aware of the virus threat when the threat
is
there, they soon forget about it as the
stories disappear from
the news headlines. So
it is important that companies
constantly
educate the users about the virus threat and ask
them
to practice safe computing.
整理版文本
.
10 Write a paragraph of around 80
words explaining that
companies should do more
than invest in anti-virus software
to protect
against computer viruses. The following points may
help you to organize your writing. And the
first sentence has
been written for you.
To protect against computer viruses, companies
should do more
than invest in anti-virus
software on the desktops, servers and
email
gateways. It’s true that anti-virus software,
updated
regularly, can protect the companies’
defences to a large
extent. The employees,
however, may use office computers for
personal
amusement. When they are opening unsolicited
attachments or downloading unauthorized
software, they
probably are putting the
company at risk, for the attachments
and the
software could easily harbor dangerous viruses.
Therefore, it is very important that companies
should
constantly educate their employees
about the virus threat and
remind them about
what would happen if they let their guard
down.
Passage B
Think About It
1
Yes, my e-mail pin was once hit by hackers and I
couldn’t
enter it any more.
整理版文本
.
2 Companies or individuals who
wish to avert computer security
issues should
put security systems in place. From a hacking
perspective, each server is open to attack, so
each must possess
its own anti-virus and
spyware systems, and continued oversight
must
be given to each of these security systems.
3
Not all hackers are criminals. Bored in school,
very adept
with computers and technology, they
download scripts or hack
into systems with the
intent to vandalize or disrupt systems.
They
like to see themselves as elite. They have a lot
of
programming background and write code but
won’t use it
themselves. Underlying the psyche
of the criminal hacker may
be a deep sense of
inferiority. Consequently, the mastery of
computer technology, or the shut down of a
major site, might
give them a sense of power.
Read About It
Content Awareness
Read
And Think
11 Work with your partner and answer
the following questions.
1 He flied to Seattle
for a job with a company called Invita
Security.
2 The company lured them to
break into the networks of potential
customers
as part of an effort to persuade those companies
to
整理版文本
.
hire Invita to keep
hackers out.
整理版文本
.
3 They were
stopped and caught by FBI.
4 It is a marked
legal milestone when courts could uphold the
right of federal agents to seize evidence
remotely, and to
charge foreign cyberciminals
in U.S courts.
5 According to them, the most
captivating aspects of being a
hacker are
psychological, for it makes them feel like playing
a thrilling game, which is full of adventures.
12 Decide whether the following statements are
true (T) or
false (F) according to the
passage.
1 F 2 F 3 F 4 T 5 F
13 Fill in
the blanks with the words given below. Change the
form where necessary.
1 regaled 2 breached
3 captivating 4 entrepreneurial 5 conspire
6
restitution 7 extorted 8 tactic 9 milestone 10
lodging
14 Complete the following sentences
with phrases or
expressions from the passage.
Change the form where necessary.
1 hacker 2
break into 3 charge 4 benefit 5 bring along
15 Translate the following sentences into
English.
1 As the statistics demonstrates we
have made great progress
in this field in a
short period of time.
2 The exploits of great
leaders have been told in songs and
stories.
整理版文本
.
3 It is a
long way. Let’s take turn driving.
4 It turns
out that it is the banker rather than the computer
fault that has caused the disaster.
5 They
must take practical measures to carry out their
plan;
otherwise it will end in smoke.
16
Finish the following incomplete outline of
paragraph 1 of
the passage “A Hacker Story.”
Then reread the whole passage
and write a
summary of it.
1 Ivanov and his fellow partner
flew to Seattle.
Invita informed them about
the job requirements.
2 20-year-old Russian
hacker Alexey Ivanov was lured to Seattle
in
hopes of landing a dream job with Invita. At the
Seattle
interview, Ivanov impressed the
interviewers with tales of
hacking exploits
and demonstrations of his skills. But as he
and his Russian colleague were being driven
away, they were
arrested by FBI agents and
were charged with conspiracy,
computer fraud,
hacking and extortion. The most important gain
from the Ivanov case may be the legal
milestones marked when
courts upheld the right
of federal agents to seize evidence
remotely,
and to charge foreign cybercriminals in U.S.
courts.
Nevertheless, important cyberlaw
questions remain unanswered.
The motivations
of hackers are psychological as much as
整理版文本
.
financial
整理版文本
.
17 Reduce the number of words in these
sentences by making the
introductory dependent
clauses elliptical. Write out the
revised
sentences.
1 Although expecting a telephone
call, the doctor had to leave
his office.
2 While driving into town, my mother ran out
of gas.
3 If curious about your final grade,
ask your professor.
4 When applying for a
scholarship, you should write neatly.
5 After
cutting the grass, please water it.
18 Choose
the correct pronoun to complete each sentence.
Write
out the complete sentence. Then write
after each sentence the
elliptical clause
beginning with than or as.
1 You worked harder
than they. (than they worked)
2 Michael is
more popular than he. (than he is)
3 They
don’t dance well as we. (as we dance)
4 Do you
like to drive as fast as they? (as they drive)
5 I can do the job better than she. (than she
does)
19 Rewrite the following sentences so
that major ideas receive
proper emphasis. Rely
upon the suggestion in parentheses.
1 Refer to
page 321 and you will find that the major
character
is over six feet tall.
整理版文本