大学体验英语综合教学教育资料第三版2详细规范标准答案Uint8.doc

举报
资源描述
Unit Eight Lead-in 1 business 2 communicating 3 discover 4 type in 5 invention 6 get along 7 opposition 8 create 9 memory 10 available Passage A Think About It 1 Yes, I often do, as I like to explore the potentialities of the Internet. Many people also welcome free software because they don’t have to pay for it. Others don’t do so because there is no protection guaranteed against viruses. 2 There are different kinds of anti-virus software, e.g. Norton, Rising Star and some others. The computers I use in the library all have one kind or another of software installed to prevent viruses from being brought in. 3 When old types of viruses have been taken care of, new ones may appear. It would be impossible to get rid of computer viruses permanently. Read About It Content Awareness Read And Think 2 Work with your partner and answer the following questions. 1 They turned to the IT staff in their company for help. 2 Viruses such as Melissa, the Love Bug, etc. 3 No, they aren’t. They forget about the harm a computer virus may bring when that virus is off news headlines. 4 They open unsolicited attachments and download unauthorized software. 5 Open. 3 Choose the best answer to each question with the information from the passage. 1 B 2 A 3 D 4 A 5 C 4 Fill in the blanks with the words given below. Change the form where necessary. 1 adequate 2 vitally 3 document 4 distribution 5 urban 6 potential 7 continual 8 infecting 9 threat 10 updated 5 Complete the following sentences with phrases or expressions from the passage. Change the form where necessary. 1 let down 2 came across as 3 in the back of…mind 4 as a matter of course 5 cleaning up 6 Choose one word from the box below to replace the underlined word in each sentence. change the form where necessary. 1 encountered 2 detected 3 transmitted 4 pirated 5 inflicted 7 Translate the following sentences into English. 1 In pursuit of a healthier diet, people are eating more fish than they used to. 2 We need to have the roof repaired before the bad weather sets in. 3 The disease is spreading, and all young children are at risk. 4 The information is transmitted from one computer to another through a telephone line. 5 Jack is a fairly good runner. He wins more often than not. 8 Read and compare the English sentences, paying attention to their italicized parts, and then translate the Chinese sentences by simulating the structure of the English sentences. 1 It sounds like this high-tech company has put in place many favorable measures to protect against brain drains. 2 The worry comes when paper-mills ignore the environmental pollution in pursuit of profits. 3 It’s vitally important that one attend a test-preparation class before taking a TOEFL test but this cannot be a one-off event if he really wants to have a good command of English. 4 The potential threat should always be in the back of a doctor’s mind and appropriate measures should be taken in no time once emergency arises. 5 In the end, sciences and education are the keys to a prosperous country and this is a continual process. 9 Computer viruses are a constant threat to companies and other organizations as well as home users. Work in small groups and have a discussion about how computer viruses spread and how companies should protect against computer viruses. Computer viruses can be transmitted via e-mail attachments. They also spread through software downloaded from the Internet. So when you are downloading the unlicensed and pirated software, you are likely to put your computer at risk. The software can seem harmless enough, but they could easily be harboring a dangerous virus. To protect against computer viruses, we should be careful when opening e-mail attachments and downloading software. We should use anti-virus software and update it regularly. As for companies, they should not only take measures by investing in anti-virus software, but also pay enough attention to the education of their employees. While the employees may suddenly become aware of the virus threat when the threat is there, they soon forget about it as the stories disappear from the news headlines. So it is important that companies constantly educate the users about the virus threat and ask them to practice safe computing. 10 Write a paragraph of around 80 words explaining that companies should do more than invest in anti-virus software to protect against computer viruses. The following points may help you to organize your writing. And the first sentence has been written for you. To protect against computer viruses, companies should do more than invest in anti-virus software on the desktops, servers and email gateways. It’s true that anti-virus software, updated regularly, can protect the companies’ defences to a large extent. The employees, however, may use office computers for personal amusement. When they are opening unsolicited attachments or downloading unauthorized software, they probably are putting the company at risk, for the attachments and the software could easily harbor dangerous viruses. Therefore, it is very important that companies should constantly educate their employees about the virus threat and remind them about what would happen if they let their guard down. Passage B Think About It 1 Yes, my e-mail pin was once hit by hackers and I couldn’t enter it any more. 2 Companies or individuals who wish to avert computer security issues should put security systems in place. From a hacking perspective, each server is open to attack, so each must possess its own anti-virus and spyware systems, and continued oversight must be given to each of these security systems. 3 Not all hackers are criminals. Bored in school, very adept with computers and technology, they download scripts or hack into systems with the intent to vandalize or disrupt systems. They like to see themselves as elite. They have a lot of programming background and write code but won’t use it themselves. Underlying the psyche of the criminal hacker may be a deep sense of inferiority. Consequently, the mastery of computer technology, or the shut down of a major site, might give them a sense of power. Read About It Content Awareness Read And Think 11 Work with your partner and answer the following questions. 1 He flied to Seattle for a job with a company called Invita Security. 2 The company lured them to break into the networks of potential customers as part of an effort to persuade those companies to hire Invita to keep hackers out. 3 They were stopped and caught by FBI. 4 It is a marked legal milestone when courts could uphold the right of federal agents to seize evidence remotely, and to charge foreign cyberciminals in U.S courts. 5 According to them, the most captivating aspects of being a hacker are psychological, for it makes them feel like playing a thrilling game, which is full of adventures. 12 Decide whether the following statements are true (T) or false (F) according to the passage. 1 F 2 F 3 F 4 T 5 F 13 Fill in the blanks with the words given below. Change the form where necessary. 1 regaled 2 breached 3 captivating 4 entrepreneurial 5 conspire 6 restitution 7 extorted 8 tactic 9 milestone 10 lodging 14 Complete the following sentences with phrases or expressions from the passage. Change the form where necessary. 1 hacker 2 break into 3 charge 4 benefit 5 bring along 15 Translate the following sentences into English. 1 As the statistics demonstrates we have made great progress in this field in a short period of time. 2 The exploits of great leaders have been told in songs and stories. 3 It is a long way. Let’s take turn driving. 4 It turns out that it is the banker rather than the computer fault that has caused the disaster. 5 They must take practical measures to carry out their plan; otherwise it will end in smoke. 16 Finish the following incomplete outline of paragraph 1 of the passage “A Hacker Story.” Then reread the whole passage and write a summary of it. 1 Ivanov and his fellow partner flew to Seattle. Invita informed them about the job requirements. 2 20-year-old Russian hacker Alexey Ivanov was lured to Seattle in hopes of landing a dream job with Invita. At the Seattle interview, Ivanov impressed the interviewers with tales of hacking exploits and demonstrations of his skills. But as he and his Russian colleague were being driven away, they were arrested by FBI agents and were charged with conspiracy, computer fraud, hacking and extortion. The most important gain from the Ivanov case may be the legal milestones marked when courts upheld the right of federal agents to seize evidence remotely, and to charge foreign cybercriminals in U.S. courts. Nevertheless, important cyberlaw questions remain unanswered. The motivations of hackers are psychological as much as financial 17 Reduce the number of words in these sentences by making the introductory dependent clauses elliptical. Write out the revised sentences. 1 Although expecting a telephone call, the doctor had to leave his office. 2 While driving into town, my mother ran out of gas. 3 If curious about your final grade, ask your professor. 4 When applying for a scholarship, you should write neatly. 5 After cutting the grass, please water it. 18 Choose the correct pronoun to complete each sentence. Write out the complete sentence. Then write after each sentence the elliptical clause beginning with than or as. 1 You worked harder than they. (than they worked) 2 Michael is more popular than he. (than he is) 3 They don’t dance well as we. (as we dance) 4 Do you like to drive as fast as they? (as they drive) 5 I can do the job better than she. (than she does) 19 Rewrite the following sentences so that major ideas receive proper emphasis. Rely upon the suggestion in parentheses. 1 Refer to page 321 and you will find that the major character is over six feet tall. 2 Because the immigrants will gain economic power, speaking the immigrants’ language will become more important to the businessman. 3 Art was not only an interest; art was a vital emotional therapy. 4 The young girls enjoy driving around town and waving to friends. 5 Not only a knowledge of language is important, but a knowledge of customs is also important. 20 Choose one of the following topics and write an Internet notice. This is a VBScript Internet worm which was based loosely on the original VBS/Love letter worm. This worm does not damage files, however, it does contain another mechanism of downloading a password stealing agent and launching this silently in the background. In addition, this worm steals PIN information stored in the registry related to UBS online banking software. This worm distributes itself via MAPI e-mail as “resume.txt.vbs” with the subject line “resume” and no body text. If this VBScript is run, it may display an actual resume in Notepad. However in the background it is doing other things such as downloading the trojan component and sending itself to others via MAPI e-mail. Additionally, the sensitive PIN information is e-mailed to three hard-coded e-mail recipients.
展开阅读全文
温馨提示:
得力文库 - 分享文档赚钱的网站所有资源均是用户自行上传分享,仅供网友学习交流,未经上传用户书面授权,请勿作他用。
相关搜索

当前位置:首页 > 教育专区 > 教案示例


本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知得利文库网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

工信部备案号:黑ICP备15003705号-8 |  经营许可证:黑B2-20190332号 |   黑公网安备:91230400333293403D

© 2020-2023 www.deliwenku.com 得利文库. All Rights Reserved 黑龙江转换宝科技有限公司 

黑龙江省互联网违法和不良信息举报
举报电话:0468-3380021 邮箱:hgswwxb@163.com