《计算机英语(第4版)》课后练习参考答案课件
切格瓦拉语录-联欢晚会主持词
Unit FourSection B
I. Fill in the
blanks with the information given in the text:
1.
2.
3.
Information engineering
emphasizes a modeling tool called entity
relationship diagrams.
One of the
disadvantages of model-driven development is the
long duration of projects.
Unlike structured
analysis and design and information engineering,
object-oriented
analysis and design attempt to
emerge the data and process concerns into singular
constructs
called objects.
4. Unlike
logical models, physical models show not only what
a system is or does , but also
how the system
is physically and technically implemented.
II. Translate the following terms or phrases
from English into Chinese and vice versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
check box 复选框,选择框,校验框
structured
design 结构化设计
building block 积木块,构建模块,构件
database schema 数据库模式
radio button
单选(按)钮
系统建模技术 system modeling technique
模型驱动开发 model-driven development
数据流程图
data flow diagram
下拉式菜单 drop-down (或pull-
down) menu
10. 滚动条 scroll bar
Unit
Five: Software Process
Unit FiveSection A
I. Fill in the blanks with the information
given in the text:
1. New software may be
developed from scratch or through the use of
existing systems and
off-the-shelf software or
system components.
2. The three generic
process models discussed in the text are often
complementary rather than
mutually exclusive,
especially for large system development.
3. The waterfall model is so named
because of the cascade from one phase to another
in the
software development process.
4.
The fundamental development activities of the
waterfall model are requirements analysis
and
definition, system and software design,
implementation and unit testing, integration and
system testing, and operation and maintenance.
5. The two fundamental types of evolutionary
development are exploratory development and
throwaway prototyping.
6. The evolutionary
approach is often more effective than the
waterfall approach in producing
systems that
meet the immediate needs of customers, but it is
difficult to establish a(n)
stable system
architecture using this approach.
7. CBSE is
a(n) reuse-oriented approach to software
development, which relies on a large
base of
reusable software components and an integrating
framework for these components.
8. While CBSE
can reduce the amount of software to be developed
and the associated cost
and risks, it cannot
avoid requirements compromises which may lead to a
system that does
not meet the real needs of
users.
II. Translate the following terms
or phrases from English into Chinese and vice
versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
system specification
系统规格说明
unit testing 单位(或单元、部件)测试
software
life cycle 软件生命周期(或生存周期)
system validation
testing 系统验证测试
evolutionary development
process 演化开发过程
linear model 线性模型
program
unit 程序单元
throwaway prototype 抛弃式原型
text
formatting 正文格式编排,文本格式化
10. system evolution
系统演变
11. 系统设计范例 system design paradigm
12. 需求分析与定义 requirements analysis and
definition
13. 探索式编程方法 exploratory
programming approach
14. 系统文件编制 system
documentation
15. 瀑布模型 waterfall model
16. 系统集成 system integration
17. 商用现成软件
commercial off-the-shelf (或COTS) software
18.
基于组件的软件工程 component-based software engineering
(CBSE)
19. 软件维护工具 software maintenance tool
20. 软件复用 software reuse
IV.
Translate the following passage from English into
Chinese:
Software processes are complex and,
like all intellectual and creative processes, rely
on
people making decisions and judgments.
Because of the need for judgment and creativity,
attempts to automate software processes have
met with limited success. Computer-aided
software engineering (CASE) tools can support
some process activities. However, there is no
possibility, at least in the next few years,
of more extensive automation where software takes
over creative design from the engineers
involved in the software process.
One reason
the effectiveness of CASE tools is limited is
because of the immense
diversity of software
processes. There is no ideal process, and many
organization have
developed their own approach
to software development. Processes have evolved to
exploit the
capabilities of the people in an
organization and the specific characteristics of
the systems that
are being developed. For some
systems, a very structured development process is
required
while for others a flexible, agile
process is likely to be more effective.
软件过程比较
复杂,而且像所有其他的智能和创造性过程一样,依靠人们作出决定
和判断。由于需要判断和创造性,使
软件过程自动化的尝试只取得了有限的成功。计算
机辅助软件工程工具可支持软件过程的某些活动。然而
,至少是在未来几年内,不可能
实现更广泛的软件过程自动化,使软件能够接替参与软件过程的工程师来
从事创造性设
计。
计算机辅助软件工程工具的有效性有限,原因之一是软件过程多种多样。不
存在理
想的过程,而且许多组织机构发展了自己的软件开发方法。软件过程不断演变,以利用
组
织机构中的人员的能力和开发中的系统的具体特点。对于一些系统来说,需要的是一
个高度结构化的开发
过程,而对于另外一些系统来说,一个灵活敏捷的过程很可能更为
有效。
Unit Six: Database
Unit SixSection
A
I. Fill in the blanks with the information
given in the text:
1. Data storage
traditionally used individual, unrelated files,
sometimes called flat files.
2. According to
the text, a DBMS is a combination of five
components: hardware, software,
data, users,
and procedures.
3. As far as a DBMS is
concerned, users can refer to both end users and
application programs,
and end users can refer
to both database administrators and normal user.
4. The three-level architecture for a DBMS
discussed in the text consists of the internal,
conceptual, and external levels.
5. In the
relational database models, data is organized in
two-dimensional tables called
relations.
6. A distributed database can be classified
either as a fragmented distributed database or as
a
replicated distributed database.
7.
While trying to keep the advantages of the
relational model, an object-oriented database
allows applications to access structured data.
8. An important step in the design of a
database involves the building of a(n)
entity-
relationship model that defines the entities for
which some information must be
maintained, the
attributes of these entities, and the relationship
between these entities.
II. Translate the
following terms or phrases from English into
Chinese and vice versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
end
user 最终用户,终端用户
atomic operation 原子操作
database administrator 数据库管理员
relational
database model 关系数据库模型
local data 本地数据
object-oriented database 面向对象数据库
database
management system (DBMS) 数据库管理系统
entity-
relationship model (ERM) 实体关系模型
distributed
database 分布式数据库
10. flat file 平面文件
11. 二维表 two-dimensional table
12.
数据属性 data attribute
13. 数据库对象 database
object
14. 存储设备 storage device
15. 数据类型
data type
16. 数据插入与删除 data insertion and
deletion
17. 层次数据库模型 hierarchical database
model
18. 数据库体系结构 database architecture
19. 关系数据库管理系统 relational database management
system (RDBMS)
20. 全局控制总线 global control bus
IV. Translate the following passage
from English into Chinese:
In a relational
database, the rows of a table represent records
(collections of information
about separate
items) and the columns represent fields
(particular attributes of a record). In
conducting searches, a relational database
matches information from a field in one table with
information in a corresponding field of
another table to produce a third table that
combines
requested data from both tables. For
example, if one table contains the fields
EMPLOYEE-ID,
LAST-NAME, FIRST-NAME, and HIRE-
DATE, and another table contains the fields DEPT,
EMPLOYEE-ID, and SALARY, a relational database
can match the EMPLOYEE-ID fields in
the two
tables to find such information as the names of
all employees earning a certain salary
or the
departments of all employees hired after a certain
date. In other words, a relational
database
uses matching values in two tables to relate
information in one to information in the
other. Microcomputer database products
typically are relational databases.
在关系数据库中,表的
行表示记录(关于不同项的信息集),列表示字段(一个记
录的特定属性)。在进行搜索时,关系数据库
将一个表中的一个字段的信息与另一个表
的一个相应字段的信息进行匹配,以生成将来自这两个表的所要
求数据结合起来的另一
个表。例如,如果一个表包含EMPLOYEE-ID、LAST-
NAME、FIRST-NAME和
HIRE-
DATE字段,另一个表包含DEPT、EMPLOYEE-
ID和SALARY字段,关系数据
库可匹配这两个表中的EMPLOYEE-ID字段,以找到特定的
信息,如所有挣到一定薪水
的雇员的姓名或所有在某个日期之后受雇的雇员所属的部门。换言之,关系数
据库使用
两个表中的匹配值,将一个表中的信息与另一个表中的信息联系起来。微型计算
机数据
库产品一般是关系数据库。
Unit SixSection B
I. Fill in the blanks with the information
given in the text:
1. The commit point is the
point at which all the steps in a transaction have
been recorded in
the log of the DBMS.
2. A
large DBMS often contain a scheduler to coordinate
time-sharing among transactions in
much the
same way that a time-sharing operating system
coordinates interweaving of
processes.
3.
The items within a database that are currently
being used by some transaction are marked
with
locks. There are two common types of locks: shared
locks and exclusive locks.
4. With the wound-
wait protocol, if an older transaction requires
access to an item that is
locked by a younger
transaction is forced to release all of its data
items, and its activities are
rolled back.
II. Translate the following terms or
phrases from English into Chinese and vice versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
nonvolatile storage system
非易失性存储系统
equipment malfunction 设备故障
wound-wait protocol 受伤―等待协议
exclusive
lock 排它锁,互斥(型)锁
database integrity 数据库完整性
共享锁 shared lock
数据库实现 database
implementation
级联回滚 cascading rollback
数据项 data item
10. 分时操作系统 time-sharing
operating system
Unit Seven: Computer Networks
Unit
SevenSection A
I. Fill in the blanks with the
information given in the text:
1. According to
the geographical area covered, a computer network
is often classified as either
a LAN, a (n)
MAN, or a WAN.
2. A network can also be
classified as either a (n) open network or a (n)
closed network
according to whether its
internal operation is based on designs in the
public domain or on
innovations owned and
controlled by a particular entity.
3. A
network can also be classified according to its
topology. Among the most popular
topologies
are the bus topology, ring topology, and star
topology.
4. A popular protocol in networks
based on the ring topology is the token ring
protocol
developed by IBM in the 1970s.
5.
In a (n) Ethernet system, the right to transmit
messages is controlled by the protocol known
as CSMACD.
6. The clientserver model for
interprocess communication defines the basic roles
played by
the processes as either a client or
a server.
7. The peer-to-peer model involves
two processes communicating as equals and usually
executing on a (n) temporary basis.
8.
Although it is often used, the term peer-to-peer
network is not very appropriate.
II.
Translate the following terms or phrases from
English into Chinese and vice versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
file server 文件服务器
carrier sense
载波检测,载波监听
protocol suite 协议组,协议集
peer-to-
peer model 对等模型
bus topology network 总线拓扑网络
inter-machine cooperation 机器间合作,计算机间合作
Ethernet protocol collection 以太网协议集
proprietary network 专有网络
utility package
实用软件包,公用程序包
10. star network 星形网络
11. 局域网 local area network (LAN)
12. 令牌环 token ring
13. 无线网络 wireless
network
14. 封闭式网络 closed network
15.
环形拓扑结构 ring topology
16. 客户机/服务器模型
clientserver model
17. 网络应用程序 network
application
18. 进程间通信 interprocess
communication
19. 打印服务器 print server
20.
广域网 wide area network (WAN)
IV.
Translate the following passage from English into
Chinese:
A network, in computer science, is a
group of computers and associated devices that are
connected by communications facilities. A
network can involve permanent connections, such
as cables, or temporary connections made
through telephone or other communications links. A
network can be as small as a local area
network consisting of a new computers, printers,
and
other devices, or it can consist of many
small and large computers distributed over a vast
geographic area. Small or large, a computer
network exists to provide computer users with the
means of communicating and transferring
information electronically. Some types of
communication are simple user-to-user
messages; others, of the type known as distributed
processes, can involve several computers and
the sharing of workloads or cooperative (合作的)
efforts in performing a task.
在计算机科学中,网络是指
由通信设备连接在一起的一组计算机及其相关设备。网
络可采用电缆等永久性连接,或者采用通过电话或
其他通信链路而实现的临时性连接。
网络可以小到由少数计算机、打印机以及其他设备构成的局域网,也
可以由分布在广大
地理区域的许多小型与大型计算机组成。计算机网络无论大小,其存在的目的均在于为
计算机用户提供以电子方式进行信息通信与传送的方法。有些类型的通信是简单的用户
到用户消
息;有些称为分布式过程,可能涉及数台计算机,以及在执行任务中分担工作
量或进行协作。
Unit SevenSection B
I. Fill in the
blanks with the information given in the text:
1. In the bus topology, a terminator should be
installed at each end of the bus or main cable.
2. As compared with the star topology, the
extended star topology adds sub-central devices
instead of connecting all devices to a central
unit.
3. The hierarchical topology, also
referred to as the tree topology, is much like the
star
topology, except that it doesn’t use a
(n) central node.
4. A truly redundant network
can be created with the mesh topology.
II. Translate the following terms or phrases
from English into Chinese and vice versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
routing path 路由选择通路
dual-ring
topology 双环形拓扑结构
extended star topology
扩展星形拓扑结构
backbone network 基干网,骨干网
mesh
topology 网格拓扑结构
同轴电缆 coaxial cable
逻辑拓扑结构 logical topology
无冲突连网环境
collision-free networking environment
树形拓扑结构
tree topology
10. 目的地节点 destination node
Unit Eight: The Internet
Unit EightSection
A
I. Fill in the blanks with the information
given in the text:
1. The Internet originated
from research projects going back to the early
1960s.
2. The establishment of domains on the
Internet is overseen by a nonprofit corporation
called
ICANN或the Internet Corporation for
Assigned Names and Numbers.
3. A registered
domain can be attached to the existing Internet by
means of a (n) router which
is often referred
to as the gateway of the domain.
4. A user
typically connects to the Internet in one of two
ways: temporarydial-up
connections and
permanentdedicated connections.
5. A (n)
ISP或Internet service provider is a company that
provides Internet access and
other services to
customers.
6. An IP address is a 32-bit
address made up of two parts: the network
identifier and the host
address, identifying
the domain in which a computer resides and the
particular computer
within the domain
respectively.
7. IP address are traditionally
written in dotted decimal notation.
8. For
ease of memorization, each domain is also assigned
a unique mnemonic address known
as a domain
name.
II. Translate the following terms
or phrases from English into Chinese and vice
versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
cell phone 蜂窝电话,移动电话,手机
IP address 网际协议地址,IP地址
autonomous system
自主系统
dial-up connection 拨号连接
network
identifier 网络标识符
binary notation 二进制记数法
mnemonic name 助记名,缩写名
Internet-wide
directory system 因特网范围的目录系统
name server
名称服务器
10. Internet infrastructure 因特网基础结构
11. 助记地址 mnemonic address
12. 网吧 cyber
cafe
13. 宽带因特网访问 broadband Internet access
14. 顶级域名 top-level domain (TLD)
15. 因特网编址
Internet addressing
16. 点分十进制记数法 dotted
decimal notation
17. 因特网服务提供商 Internet
service provider (ISP)
18. 专用因特网连接 dedicated
Internet connection
19. 主机地址 host address
20. 硬件与软件支持 hardware and software support
IV. Translate the following
passage from English into Chinese:
The
internet provides only the physical and logical
infrastructure that connects millions
of
computers together. Many believe that the World
Wide Web (WWW, or simply the Web)
provides the
killer application (制胜法宝) for this global network.
The Web is considered the
content of the
Internet, providing all sorts of information by
using a rich set of tools that
manage and link
text, graphics, sound, and video. Providing and
viewing information on the
Web is accomplished
server applications and client applications.
If you’ve already explored the Web, you’ll
recognize the client-side application as the
Web browser. A Web browser receives,
interprets, and displays pages of information from
the
Web. The user can navigate within pages,
jump to other pages by clicking hypertext links,
and
point to just about any page on the Web. <
br>因特网只是提供了将许许多多的计算机连接在一起的物理与逻辑基础结构。不少人
认为,是万维网
(WWW或简称the Web)为这个全球网络提供了“制胜法宝”。万维网
被视为因特网的内容,它
通过使用管理与链接文本、图形、声音和视频的一套丰富工具
来提供各种信息。在万维网上提供和查看信
息,是使用服务器应用程序和客户应用程序
完成的。
如果你已经探索过万维网,你就会看出客
户端应用程序就是万维网浏览器。万维网
浏览器接收、解释和显示来自万维网的网页信息。用户可以在网
页之内浏览,可以通过
点击超文本链接跳到其他网页,也可以指向万维网上的几乎任何网页。
Unit EightSection B
I. Fill in the blanks
with the information given in the text:
1. For
an outgoing message, the four layers of software
involved in Internet communication
work in the
order of the application layer, the transport
layer, the network layer, and the
link layer;
for an incoming message, it is just the opposite.
2. The transport layer converts long messages
into packets compatible with the Internet
before their transmission and reassembles them
at the destination.
3. The packets related to
a common message may follow different paths
through the Internet.
4. Only the link and
network layers are involved at the intermediate
stops during a packet’s
journey to its final
destination.
II. Translate the
following terms or phrases from English into
Chinese and vice versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
incoming message 来报,到来的报文
application
layer 应用层
utility software 实用软件
sequence
number (顺)序号,序列号
remote login capabilities
远程登录能力
端口号 port number
软件例程 software
routine
传输层 transport layer
文件传送协议
FTP(File Transfer Protocol)
10. 万维网浏览器 Web
browser
Unit Nine: Mobile and Cloud
Computing
Unit NineSection A
I. Fill in
the blanks with the information given in the text:
1. The concept of cloud computing has evolved
from cluster, grid, and utility computing.
2.
A public cloud is built over the Internet and can
be accessed by any user who has paid for
the
service.
3. A private cloud is built within
the domain of a (n) intranet owned by a single
organization.
4. A (n) hybrid cloud is built
with both public and private clouds.
5.
Generally speaking, private clouds are easier to
manage, and public clouds are easier to
access.
6. The rapid progress in multi-
core CPUs, memory chip, and disk arrays has made
it possible
to built faster data centers with
huge amounts of storage space.
7. One of the
design objectives for cloud computing is shifting
computing from desktops
data centers
8.
The Internet cloud is envisioned as a massive
cluster of servers, which can be physical
machines or VMs.
to
II.
Translate the following terms or phrases from
English into Chinese and vice versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
server farm 大型机服务器
access protocol
存取协议,访问协议
storage area network 存储区域网(络)
high-throughput computing 高吞吐(量)计算
server
cluster 服务器集群
public cloud 公共云
grid
computing 网格计算
security-aware cloud
architecture 具有安全意识的云体系结构
social networking
社交网络
10. utility computing 效用计算
11.
云计算提供商 cloud computing provider
12. 存储芯片
memory chip
13. 基于内部网的私有云 intranet-based
private cloud
14. 网络带宽 network bandwidth
15. 混合云 hybrid cloud
16. 磁盘阵列 disk array
17. 软件即服务 Software as a Service (SaaS)
18. 集群计算 cluster computing
19. 虚拟化计算机资源
virtualized computer resources
20. 多核处理器
multi-core processor
IV. Translate the
following passage from English into Chinese:
Cloud computing applies a virtualized platform
with elastic resources on demand by
provisioning hardware, software, and data sets
dynamically. The idea is to move desktop
computing to a service-oriented platform using
server cluster and huge databases at data
centers. Cloud computing leverages its low
cost and simplicity to benefit both users and
providers. Machines virtualization has enabled
such cost-effectiveness. Cloud computing
intends to satisfy many user applications
simultaneously. The cloud ecosystem (生态系统)
must be designed to be secure, trustworthy,
and dependable. Some computer users think of the
cloud as a centralized resource pool. Others
consider the cloud to be a servers used.
Traditionally, a distributed computing
system tends to be owned and operated by an
autonomous administrative domain (e. g., a
research laboratory or company) for on-premises
(机构内部的) computing needs. However, these
traditional systems have encountered several
performance bottlenecks (瓶颈): constant system
maintenance, poor utilization, and increasing
costs associated with hardwaresoftware
upgrades (升级). Cloud computing as an on-demand
computing paradigm resolves or relieves us
from these problems.
云计算动态供应硬件、软件和数据集,以此方式按需应用
一个拥有弹性资源的虚拟
化平台。其目的是通过在数据中心使用服务器集群和巨型数据库而将桌面计算转
移到一
个面向服务的平台。云计算充分利用其低成本与简单的特性既惠及用户也惠及提供商。
机
器虚拟化使这样的成本效益成为可能。云计算意在同时满足许多用户应用程序的需
要。云生态系统必须设
计得具有安全性、可信性和可靠性。有些计算机用户将云视为一
个集中式资源池,而另外一些计算机用户
则认为云是一个在所用的各个服务器上实行分
布式计算的服务器集群。
传统上,一个分布式计
算系统往往由一个自主管理域(如一个研究实验室或公司)
为内部计算需要而拥有和使用。然而,这些传
统系统遭遇数个性能瓶颈:系统维护需要
不断进行;利用率差;与硬件/软件升级有关的费用日益增长。
作为一种按需计算范式,
云计算可解决这些问题或可使我们摆脱这些问题。
Unit NineSection B
I. Fill in the blanks
with the information given in the text:
1.
Supportive technologies for the IoT are divided
into two categories: enabling and
synergistic
technologies.
2. Contemporary devices that
lend support to ubiquitous computing include
smartphones,
tablet computers, sensor
networks, RFID tags, smart cards, and GPS devices.
3. The architecture of an IoT consists of
sensing devices connected to various applications
via
mobile networks, the Internet, and
processing clouds.
4. A typical wireless
sensor network consists of spatially distributed
autonomous sensors to
cooperatively monitor
physical or environmental conditions.
II.
Translate the following terms or phrases from
English into Chinese and vice versa:
1.
computer vision 计算机视觉
2.
3.
4.
5.
6.
7.
8.
9.
ubiquitous
computing 普适计算
command line 命令行
data
logging system 数据记录(或登录)系统
augmented reality
增强现实
移动网络 mobile network
平板电脑 tablet
computer
物联网 Internet of Things
智能电网
smart power grid
10. 传感器融合 sensor fusion
Unit Ten: Computer Security
Unit
TenSection A
I. Fill in the blanks with the
information given in the text:
1. The CIA
triad used to define computer security objectives
consists of confidentiality,
integrity, and
availability.
2. In computer security,
integrity covers the two related concepts of data
integrity and system
integrity.
3. In
addition to the CIA triad, two of the most
commonly mentioned concepts concerning
security objectives are authenticity and
accountability.
4. Security concerns with
respect to data encompass availability, secrecy,
and integrity
5. Passive network security
attacks attempt to learn or make use of
information from the
system without affecting
system resources, whereas active attacks attempt
to alter system
resources or affect their
operation.
6. A key threat to software is an
attack on availability
7. In developing a
security policy, a security manager must balance
ease of use against
security against cost of
failure and recovery.
8. In the context of
computer security, assurance is the degree of
confidence one has that the
security measures
work as intended.
II. Translate the
following terms or phrases from English into
Chinese and vice versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
backup system 备份系统
encryption key (加密)密钥
data confidentiality 数据机密性
system
vulnerability 系统脆弱性,系统脆弱之处
unauthorized
access 未经授权的访问,越权存取
intrusion detection
system 入侵检测系统
after-action recovery 事后恢复
software piracy 软件侵权
authorized user
特许用户
10. data unit 数据单元,数据单位
11. 软件版本
software version
12. 数据完整性 data integrity
13. 系统崩溃 system crash
14. 病毒检查软件 virus-
checking software
15. 综合安全策略 comprehensive
security strategy
16. 软件配置管理 software
configuration management
17. 故障隔离 fault
isolation
18. 统计数据库 statistical database
19. 保密的加密算法 secure encryption algorithm
20. 数据流 data stream
IV. Translate
the following passage from English into Chinese:
Intruder (入侵者) attacks range from the benign
(良性的,温和的) to the serious. At the
begin end of
the scale, there are many people who simply wish
to explore internets and see
what is out
there. At the serious end are individuals who are
attempting to read privileged data,
perform
unauthorized modifications to data, or disrupt the
system.
The objective of the intruder is to
gain access to a system or to increase the range
of
privileges accessible on a system. Most
initial attacks use system or software
vulnerabilities
that allow a user to execute
code that opens a back door into the system.
Intruders can get
access to a system by
exploiting attacks such as buffer overflows (缓存溢出)
on a program
that runs with certain
privileges.
Alternatively, the intruder
attempts to acquire information that should have
been
protected. In some cases, this
information is in the form of a user password.
With knowledge
of some other users’ password,
an intruder can log in to a system and exercise
all the
privileges accorded to the legitimate
user.
入侵者攻击从温和的到严重的形形色色。在这一系列攻击的温和端,有许多人只是
希望探查互联网,看看那里有什么。在严重端的是试图阅读特许数据、对数据进行未经
授权的修改或扰乱
系统的个人。
入侵者的目标是获得进入一个系统的机会,或者增加在一个系统中可以使用的特权
范围。初始攻击大多利用系统或软件的脆弱之处,这些脆弱之处允许用户执行相应的代
码,打开进入系
统的后门。入侵者可对具有某些运行特权的程序实施像缓存溢出这样的
攻击,利用此类攻击获得进入一个
系统的机会。
另外,入侵者也试图获取应予保护的信息。在有些情况下,这种信息是以用户口令
的形式存在的。知道了某个其他用户的口令之后,入侵者就可以登录系统并行使赋予合
法用户的所有特
权。
Unit TenSection B
I. Fill in the
blanks with the information given in the text:
1. Most commercial antivirus software uses
both the virus dictionary approach and the
suspicious behavior approach with emphasis on
the virus dictionary approach.
2. An emerging
technique to deal with malware in general is
whitelisting which prevents
execution of all
computer code except that which has been
previously identified as trustworthy
by the
system administrator.
3. Instead of attempting
to identify known viruses, the suspicious behavior
approach
provides protection against brand-new
viruses that do not yet exist in any virus
dictionaries.
4. Usually one should have only
one type of memory-resident antivirus software
installed on
a single computer.
II.
Translate the following terms or phrases from
English into Chinese and vice versa:
1.
2.
3.
phishing attack 网络钓鱼攻击
graphics
card 显(示)卡
heuristic analysis 试探性分析
4.
5.
6.
7.
8.
9.
infected file 被感染文件
virus dictionary
病毒字典
数据捕获 data capture
恶意软件 malicious
software
病毒特征代码 virus signature
防病毒软件
antivirus software
10. 内存驻留程序 memory-resident
program
Unit Eleven: Cyberculture
Unit ElevenSection B
I. Fill in the blanks
with the information given in the text:
1.
When professional website designers determine the
number of levels in a website, a
guideline
usually followed is that there should be a maximum
of three links for the most
important
information.
2. A website has a few different
kinds of webpages: the homepage, node pages, basic
pages,
navigation pages, and the optional
splash page.
3. According to the text, the
five principles of design for the interface of a
website are balance,
alignment, grouping,
consistency, and contrast.
4. Before uploading
your website, you should do some usability testing
to ensure quality.
II. Translate the
following terms or phrases from English into
Chinese and vice versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
web-
authoring software 网络写作软件
template generator
模版生成程序
navigation page 导航页面
corporate
logo 公司标识
splash page 醒目页面,过渡页
导航条
navigation bar
节点页面 node page
网站地图 site
map
可用性测试 usability testing
10.
图形交换格式 gif(Graphics Interchange Format)
Unit Twelve: Electronic Commerce
Unit
TwelveSection B
I. Fill in the blanks with the
information given in the text:
1. All
electronic commerce sites must at least provide a
catalog display, shopping cart
capabilities,
and transaction processing.
2. Small commerce
sites can use a(n) static catalog while larger
commerce sites are more
likely to use a(n)
dynamic catalog.
3. A shopping cart is
sometimes called a shopping bag or shopping
basket.
4. At checkout, the online shopper’s
Web browser software and the seller’s Web server
software both switch into a secure state of
communication.
II. Translate the
following terms or phrases from English into
Chinese and vice versa:
1.
2.
3.
4.
5.
6.
7.
8.
9.
software suite 软件套件
text box 文本框
virtual checkout counter 虚拟付款台
static
catalog 静态目录
browser session 浏览器会话期
动态目录
dynamic catalog
购物车软件 shopping cart software
供应链 supply chain
企业资源计划软件 enterprise
resource planning (ERP) software
10. 税率 tax
rate