学术英语理工六篇复习大全

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

学科英语文摘6篇
Academic English for Science & Technology
CONTENTS
T1How do computer hackers "get inside" a computer?....... (2)
Choosing a Topic.................... ........ .............. ................ (5)
Enhancing your academic language.................... .. (7)
Understanding of the Text.................... ........ ..... ..... ..... . (9)
T2 Introduction: Computer Viruses.................... (10)
Searching for Information (1).................... .... .... .......... ... (14)
Enhancing your academic language.................... .......... (16)
Understanding of the Text.................... ........ (18)
T5 Can you compete with A.I. for the next job? (20)
Searching for Information (2)........... ........ ..... ..... ..... ..... .... .23 Enhancing your academic language..... ..... ..... ..... ..... ..... . (24)
Understanding of the Text….. ….. ….. ….. ….. ….. ….. ….. …. ..26
T9Global Warming & Its Effects.................... ........ . (28)
Searching for Information (3)..... ..... ..... ..... ..... ..... ..... (32)
Enhancing your academic language..... ..... ..... ..... ..... ..... . (37)
Understanding of the Text….. ….. ….. ….. ….. ….. ….. ….. ….. .39
T12How Radiation Threatens Health.............................. .41 Writing a Literature Review ..... ..... ..... ..... ..... ..... .... .... (45)
Enhancing your academic language..... ..... ..... ..... ..... ..... . (51)
Understanding of the Text….. ….. ….. ….. ….. ….. ….. ….. ….. .53
T15Genetically Modified Foods – Feed the World? (55)
Writing an Academic Essay..... ..... ..... ..... ..... ..... ..... .... (58)
Enhancing your academic language….. ….. ….. ….. ….. ….. . . .68 Understanding of the Text….. ….. ….. ….. ….. ….. ….. ….. ….. .70 Expanding Reading:
Section A.. ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... (72)
Listening to Lectures..... ..... ..... ..... ..... ..... ..... ..... ..... (74)
Section B.. ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... (79)
Making an Oral Presentation.. ..... ..... ..... ..... ..... ..... ..... . (81)
Text 1How do computer hackers "get inside" a computer?
August 16, 2004 Julie J.C.H. Ryan, an assistant professor at The George Washington University and co-author of Defending Your Digital Assets Against Hackers, Crackers (解密高手), Spies, and Thieves, explains.
1.This seems like a straightforward question but it’s actually quite
complex in its implications, and the answer is anything but simple.
The trivial (平凡而随便的) response is that ‘hackers get inside a target computer system by exploiting vulnerabilities(漏洞),’ but in order to provide more detail, let’s start from the beginning.
2.The term ‘hacker’is fairly controversial in its meaning and
interpretation. Some people claim that hackers are good guys who simply push the boundaries of knowledge without doing any harm (at least not on purpose), whereas ‘crackers’are the real bad guys. This debate is not productive (富有成效的); for the purposes of this discussion, the term ‘unauthorized user’(UU未授权用户)will suffice (足够了). This moniker (绰号/名称=UU)covers the entire spectrum(范围) of folks, from those involved in organized criminal activities to insiders who are pushing the limits of what they are authorized to do on a system.
3.Next let’s explore what it means to ‘get inside’ a computer. This can
refer to gaining access to the stored contents of a computer system, gaining access to the processing capabilities of a system, or intercepting(截取)information being communicated between systems.Each of these attacks requires a different set of skills and targets a different set of vulnerabilities.
4.So what do UUs take advantage of? Vulnerabilities exist in every
system and there are two kinds: known and unknown. Known vulnerabilities often exist as the result of needed capabilities. For instance, if you require different people to use a system in order to accomplish some business process, you have a known vulnerability: users. Another example of a known vulnerability is the ability to communicate over the Internet; enabling this capability, you open an access path to unknown and untrusted entities. Unknown vulnerabilities, which the owner or operator of a system is not aware of, may be the result of poor engineering, or may arise from unintended consequences of some of the needed
capabilities.
5.By definition, vulnerabilities may be exploited. These can range from
poor password protection to leaving a computer turned on and physically accessible to visitors to the office. More than one technical exploit has been managed simply by sitting at the receptionist’s desk and using his computer to access the desired information. Poor passwords (for example, a username of ‘Joe Smith’with an accompanying password of ‘joesmith’) are also a rich source of access: password cracking programs can easily identify dictionary words, names, and even common phrases within a matter of minutes.
Attempts to make those passwords more complex by replacing letters with numbers, such as replacing the letter O with the number zero, don’t make the task much harder. And when a UU can utilize a valid username-password combination, getting access to a system is as easy as logging in.
6.If a target system is very strongly protected (by an architecture that
includes both technical controls such as firewalls or security software, and managerial controls such as well defined policies and procedures) and difficult to access remotely, a UU might employ low-technology attacks. These tactics may include bribing an authorized user, taking a temporary job with a janitorial services firm, or dumpster diving (rifling through trash in search of information). If the target system is not so strongly protected, then a UU can use technical exploits to gain access.
7.To employ technical exploits a UU must first determine the
specifications of the target system. It would do no good whatsoever for a UU to use a technical exploit against a Microsoft vulnerability if the target system is a Macintosh. The UU must know what the target system is, how it is configured(配置), and what kind of networking capabilities it has. Once these parameters (which can be determined remotely through a variety of methods) are known, then the UU can exploit the configuration’s known vulnerabilities. The availability of preprogrammed attacks for common configurations can make this task quite simple; UUs that use these scripted (改编的) capabilities are somewhat derisively (嘲弄的) known as ‘script kiddies.’
8.One way a technically proficient UU can remotely determine the
configuration of a target system is through capabilities inherent in hypertext transfer protocol (http). Users who access certain Web sites actually send configuration information, such as the type of browser being used, to the requesting site. Once the system configuration is known, then exploits can be selected. An example of an exploit that
takes advantage of system-specific vulnerabilities is described in the following statement from the U.S. Computer Emergency Response Team (US CERT): ‘Exploit code has been publicly released that takes advantage of a buffer overflow(缓冲区溢出) vulnerability in the Microsoft Private Communication Technology (PCT) protocol(协议).
The vulnerability allows a remote attacker to execute arbitrary (任意的) code with SYSTEM privileges.’
[see /current/current_activity.html for more information] 9.Another type of attack is one that is preprogrammed against
specific vulnerabilities and is launched without any specific target--it is blasted out shotgun style with the goal of reaching as many potential targets as possible. This type of attack eliminates the need for the first step, but is less predictable in both outcome and effectiveness against any given target.
10.It’s important to recognize that the end goal of unauthorized access
varies depending on the UU’s motivations. For example, if a UU is trying to gather a lot of zombie(呆板的) computers for use in a distributed denial of service attack, then the goal is to sneak a client program onto as many computers as possible. One way to do this fairly effectively is through the use of a so-called Trojan horse program, which installs the malicious program without the knowledge or consent (同意) of the user. Some of more recent mass Internet attacks have had this profile (形象/姿态) as an element of the attack pattern.
11.Protecting yourself against attacks is a multistep (多级) process, which
aims to limit and manage the vulnerabilities of your system. (It’s impossible to eliminate them all.) First, make sure you have all the latest patches for your operating system and applications--these patches generally fix exploitable vulnerabilities. Make sure your password is complex: it should include letters, numbers, and symbolic characters in a nonsensical (无意义的) manner. Also, consider getting
a hardware firewall and limiting the flow of data to and from the
Internet to only the few select ports you actually need, such as e-mail and Web traffic.Make sure your antivirus software is up-to-date and check frequently to see if there are new virus definitions available. (If you are using a Windows system, you should ideally update your virus definitions every day.) Finally, back up your data. That way if something bad does happen, you can at least recover the important stuff.
Choosing a Topic
1. Deciding on a topic
1) Four principles of deciding on a topic:
2) Narrowing the topic
City Development
Sustainable Development of Cities
Sustainable Development of Big Cities
Sustainable Development of Chinese Big Cities Sustainable Development of Chinese Big Cities from the Biological Perspective
3) Your narrower subtopic
Topics Your narrower Questions
subtopics
Global Warming
Cancer Nanotechnology
Internet
Artificial
intelligence
Energy
Genetic
engineering
Universe
1) Is the topic appropriate for a 1500-word essay? Why or why not?
2) If the topic is too general, how do you narrow it down to a more manageable topic?
3) Can you suggest some appropriate topics
of each subject?
2. Formulating a research question
3. Writing a working title
Enhancing your academic language
Te x t 1 (pp.4-6) of Unit 1
I、Match the words with their definitions(p.21).
1g;2a;3e;4b;5c;6d;7j;8f;9h;10i II、Complete the following expressions or sentences(p.22).
1 a(n) symbolic (象征的) gesture of love
2 The publisher distribute (分发) the book in Asia.
3 A “site” (地点) is a place, and so a website.
4 a(n) complex (复杂的) network of systems
5 be used to identify (识别) potential terrorists
6 deal the matter with him physically (完全地)
7 start with a pretty straightforward (直截了当) question
8 beyond the capability (功能) of the computers
9 hit the target (目标) at a distance
10 the person never attempt (尝试) to do anything more
11 a highly sophisticated process (过程)
12 work within the parameter (限定因素) of time & budget
13 thanks for your kind interpretation (解释)
14 use many technical (专业的) terms
15 Prices range (变化范围) from $340 to $390.
16 exploit (开拓) a new market in the city
17 be absorbed in the social networking (网络)
18 involve (涉及) unnecessary extra charges
19 only one instance (实例) out of many
20 get to know more about the specification (具体细节) of the wedding
21 accompany (陪伴) with her to watch movies
22 the only thing predictable (可预言的) about life
23 learn the profile (概要) of the project
III、Complete the paragraph(p.23)
When it comes to cloud computing, it is often worried that cloud computing is not reliable, the worries ranging from (从…到) “I lose control over the system with cloud computing”to “My files are not secure with cloud computing”. Actually the worries arise from some misunderstandings (来自于对……误解) of cloud computing. Although the security of cloud computing leaves a lot of problems unsolved (留下很多问题没有得到解决), it opens a path for (打开了通道) the future development of computers. Hence a better understanding of a new technology requires a different frame of mind (需要有新的思想).
IV、Translate the following sentences from Text 1 into Chinese.
1. 有些人声称黑客是那些扩宽知识界限而不造成危害的好人(或即使造成危害,但并非故意而为),而“破碎者”才是真正的坏人。

Some people claim that hackers are good guys who simply push the boundaries of knowledge without doing any harm (at least no t on purpose), whereas ‘crackers’ are the real bad guys.
2. 这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。

This can refer to gaining access to the stored contents of a computer system, gaining access to the processing capabilities of a system, or intercepting information being communicated between systems.
3. 那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。

Unknown vulnerabilities, which the owner or operator of a system is not aware of, may be the result of poor engineering, or may arise from unintended consequences of some of the needed capabilities.
4. 另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的是攻击到尽可能多的潜在目标。

Another type of attack is one that is preprogrammed against specific vulnerabilities and is launched without any specific target--it is blasted out shotgun style with the goal of reaching as many potential targets as possible.
5. 另外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在仅有的几个你真正需要的端口,如电子邮件和网站流量。

Also, consider getting a hardware firewall and limiting the flow of data to and from the Internet to only the few select ports you actually need, such as e-mail and Web traffic.
Understanding of the Text
Text 1 电脑黑客如何进入电脑
1. 这好像是一个直接的问题,但是内涵很复杂,答案绝不简单,如果随便地回答,那么黑客通过利用弱点进入目标电脑系统。

但是为了提供更多细节,我们还是从头说起。

2. “hacker” 这个词在意义和解释上都很有争议。

有些人声称黑客是那些扩宽知识界限而不造成危害的好人(或即使造成危害,但并非故意而为),而“破碎者”才是真正的坏人。

这种争论没有什么效果,如果是为了这种讨论的目的,术语“未授权的使用者”(UU)就足够用了。

这个术语包含了所有不同类型的人,从那些参与有组织犯罪行为的人到那些内部人士,他们突破了在系统中被授予的权限。

3. 接下来我们探讨一下“进入” 电脑意味着什么。

这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。

每种攻击都需要不同的技巧,以不同的漏洞为目标。

4. 那么“未授权的使用者”利用的是什么?漏洞存在于每个系统中,并且有两个漏洞:已知的和未知的。

已知的漏洞通常因为需要某些能力而存在。

比如,为了某个商业过程,你需要不同的人使用一个系统,你就有一个已知的漏洞:使用者。

另一个已知漏洞的例子是通过互联网交流的能力,为了具备这个能力,你要给未知和不被信任的实体开通一条路径。

那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。

5. 按定义,漏洞可能被利用。

这些漏洞可以是低级的密码保护,也可以是让电脑开着,让办公室的访客可以利用。

只要坐在接待员的桌前,用他的电脑获得需要的信息,就有超过一种技术被利用。

低级的密码(如用户名“Joe Smith”, 密码也是“Joe Smith”)也是接近电脑的丰富的来源:密码破译程序可以很容易在几分钟内确认字典中的单词、姓名,甚至常见短语。

通过用数字代替字母,使这些密码更复杂。

比如用0来代替字母O,并不会使任务更复杂。

当未获授权的使用者使用有效的用户名——密码组合,进入系统就是简单的登录了。

6. 假如目标系统被很好地保护(通过技术控制,比如防火墙或安全软件,还有管理控制,比如明确的政策和过程),并且远程难以进入,未获授权的使用者可能会使用低技术的攻击,这些策略可能包括贿赂获授权的使用者,在清洁公司做临时工,或者在垃圾堆里翻找信息。

如果目标系统没有得到很好的保护,那么未获授权的使用者可以使用技术手段进入。

7. 为了使用技术手段未获授权的使用者必须先决定目标系统的规格。

对未获授权使用者来说,如果目标系统是Macintosh, 使用攻击微软漏洞的技术手段没有任何好处。

他们必须知道目标系统是什么,它是怎样配置的,它有哪种联网能力。

一旦知道了这些参数(它们可以通过多种方法远程获得),他们就可以利用这些配置的已知漏洞。

对于常见的配置可以利用先设置好的攻击方式,这样能让这次任务很简单。

使用这些预先设置的攻击能力的人有时被嘲笑为“脚本小子” 。

8. 技术熟练的人可以远程决定目标系统的配置,其中一个办法是通过超文本传输协议内在的能力。

接近固有网站的人把配置信息,比如正在被使用的浏览器类型,发送到发出请求的地址。

一旦系统配置已知,就可以选择手段。

9. 另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的是攻击到尽可能多的潜在目标。

这种攻击略去了第一步。

但是对于任何给定的目标其结果和有效性都不太好预测。

10. 应该注意到未获授权的进入其最终目的因为进入者的动机而有不同,比如,如果他想收集很多僵尸电脑,而又不想在服务时进行攻击,那他的目的就是把客户程序偷偷安装到尽量多的电脑上,这样做的一种有效方式就是通过使用所谓的特洛伊木马程序,它是在用户不知情或不同意的情况下安装恶意程序,有些更近期发生的大规模网络攻击,有些更近期发生的大规模网络攻击,有这样的姿态作为攻击类型的要素。

11. 保护好自己不受攻击是多步的过程,目的是限制和管理系统的漏洞(并不可能完全消除这些漏洞)。

首先,保证你有操作系统和应用程序的最新补丁——这些补丁通常会修补可以利用的弱点,保证你的密码够复杂:包括字母、数字和象征符号,并且毫无意义。

另外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在仅有的几个你真正需要的端口,如电子邮件和网站流量。

保证你的反病毒软件是最新的,经常检查是否有新的病毒定义(如果你正在使用Windows 系统,理想状态下你应该每天升级病毒定义)。

最后,备份你的数据,那样如果不好的情况真的发生,至少你可以恢复重要的东西。

Text 2 Introduction: Computer Viruses
11:04 04 September 2006 by Will Knight
Artist’s impression of computer bugs on a circuit board (Image: Vanessa Kellas/Rex Features)
1.Any computer connected to the internet faces a daunting (吓人的)
range of electronic threats. Perhaps the biggest single threat to any computer is the humble (简陋的) software bug (病毒\漏洞). Seemingly innocuous (harmless)programming errors can be exploited to force entry into a computer and also provide the weak spots that allow computer worms and viruses to proliferate (=multiply增值).
2.Many software bugs will simply cause a computer to crash. But an
expert programmer can sometimes figure out how to make a computer malfunction (故障/失灵) in a creative way, so that it provides access to secure parts of a system, or shares protected data.
3.When a software vulnerability is revealed, it is often a race
against the clock to apply the correct software patch before an attacker can convert the bug into an "exploit" that can be used to cause major damage.
Viruses and worms
4. A computer virus is a program that spreads between computers by
hiding itself within a - seemingly innocent - document or application.
A worm, on the other hand, is a program that replicates (复制) and
travels without "infecting" anything else on a system.
5.Many modern specimens(样本) of malevolent(恶毒/恶意的)code,
however, use a mixture of tricks to cheat their way onto computer systems, blurring (模糊) the line between worms and viruses. The terms are now often used interchangeably.
6.The first worms appeared in the 1970s and spread slowly between
computers connected to the same network. They simply displayed an annoying message on the screen of each infected machine. The first computer virus, called Elk Cloner, was written in 1982 and infected computers via floppy disks.
Trojans and zombies (僵尸)
7.But viruses and worms no longer just provide a way for malevolent
hackers to gain notoriety (声名狼藉). Today’s viral (由病毒引起的) code can contaminate (=infect) computers at lightning speed, spreading via email, peer-to-peer file-sharing (点对点文件共享) networks and even instant messaging programs. The most successful ones cause serious damage, forcing companies around the globe to close down while infected computers are cleaned up.
8. A string (=series) of recent specimens have been designed to snatch
(窃取) passwords or credit card information and install programs that can be used to remotely control infected machines. These programs are known as trojan horses (特洛伊木马).
9.There is evidence that virus writers can earn large amounts of money
by leasing access to (以租赁方式进入) networks of compromised (被盗用的) computers - often referred to as "botnets (僵尸网络)". These groups of remote-controlled "zombies" have been used to extort money (搂款) from websites, by threatening to crash (死机) them with a denial-of-service (DOS拒绝服务) attack. This involves overloading a server with bogus (=false) page requests, so that real messages cannot get through.
Spam, Spam, Spam(垃圾邮件)
10.Spammers have also begun using botnets to forward unsolicited bulk
(大量来路不明的)email advertising, or spam, through scores (=large quantities) of zombie PCs (个人通讯服务).This makes it far more difficult for spam hunters (=tracking spam) to block the messages at source and catch the culprits (罪魁祸首).
11.Once considered a fairly minor problem, spam is rapidly spiralling (不
断恶化) out of control, and much more than half of all email messages are now thought to consist of unwanted advertising messages.
12.To combat computer scientists’ best efforts to stem (=block) the tide
of junk email (=spam), the spammers have had to become more
cunning and sophisticated. More recently, spim (垃圾讯息) (spam by instant messenger) and spit (spam by internet telephony) have joined the fray (=quarrel/debate/combat).
Phishing
13.Spam’s more sinister (邪恶的)cousin is the phishing email. This is a
con (诈骗) trick that arrives as an email and tries to trick a recipient into handing over money or sensitive personal information like their bank account details or a username and password.
14.The simplest phishing tricks try to dupe a target into sending
money as part of a get-rich-quick scheme. But phishing tricksters are also getting more devious and recent scams(欺诈)pose as customer service emails and send users to bogus banking or commercial websites where they are invited to "re-enter" their account information.
15.Some genuine sites have even proven vulnerable to software glitches
(=small bug) that can be exploited to capture information from regular users. Phishing is especially threatening because it can be used to steal a person’s digital identity.
Spyware
16.Along with spam and phishing, spyware represents the third of an
unhappy trinity (三位一体)of internet pests. These insidious (=cunning) and clandestine (私下/偷偷摸摸的)programs typically find their way onto a computer system alongside another, often free, software application, although some can also exploit software bugs to get onto a machine. The programs are used to serve up unwanted adverts (=ad), change system settings and gather information on a user’s online behavior for marketing purposes.
Hackers
17.The term "computer hacker" was first coined (杜撰) in the 1960s and
originally meant someone capable of developing an ingenious (=creative) solution to a programming problem. But the phrase has since fallen into disrepute (声名狼藉), entering the popular vocabulary as a term for a programmer with criminal intent.
18.The earliest "criminal" hackers were in fact relatively harmless,
interested in testing the boundaries of their knowledge and their
ability to get around security measures. They mainly performed innocuous pranks (无害的恶作剧), for example employing low-tech tricks to get free calls through the US phone networks.
19.There are many tools in the modern hacking kit, including network
scanners, packet sniffers (数据包嗅探仪), rootkits (隐藏软件)and decompilers(解、编译程序). But "social engineering" - for example, putting a particularly enticing message in an email header to encourage people to open it - and even search engines can also be useful weapons for the hacker.
Computer crime
20.As the number of computers networks has grown, so have the
possibilities for more serious misuse. And, as money increasingly becomes a digital commodity, the world has seen the emergence of serious computer criminals.
21.Criminal gangs have also started to get in on (参与) the action,
attracted by the huge quantities of money now spent online every day. There is evidence that unscrupulous (肆无忌惮的) experts can also earn serious money from crime syndicates (=criminal gangs) by breaking into computer systems, writing viruses and creating phishing scams.
22.And it is not just ordinary desktop computers that are under threat.
Governments, banks and critical (=key) infrastructure can also be brought to a standstill (使之停业)by an expert armed only with a laptop computer and a net connection.
Mobile menace (=threat)
23.The biggest new target for computer hackers is the mobile device.
Virus writers are already experimenting with code designed for smartphones (智能手机) and experts predict more may be on the way, while hackers are also looking at ways to crack(崩溃) handheld devices.
24.While the internet has transformed global communication
beyond recognition, the arms race between those intent on harnessing (=utilizing / treatment) its power for criminal purposes and those tasked with preventing them has only just begun.
Searching for Information (1)
1. Finding reliable and better sources (To evaluate source materials)
2. Scanning and skimming (Tips for scanning and skimming) 1) Scanning:
●keep in mind at all times what you are searching for (e.g., the definition of a term, the effect of a phenomenon);
●search thesis statements and topic sentences in paragraphs for the information you want to gain;
●use the knowledge of the essay organization (such as cause-effect, comparison-contrast, problem-solution) to find what you are looking for;
●pay attention to signal words such as numbers, letters, steps, the words such as first, second, and next, or words that are bold-faced, italics, or in different sizes, fonts, etc.
2) Skimming
●the title and subtitles;
●the abstract (if there is one);
●the introduction and thesis;
●the first or last paragraphs of the essays/chapters;
●headings and subheadings;
●the conclusion and summaries;
●the first sentence or the last sentence of each paragraph;
●highlighted texts such as words in bold or italic text;
●graphs, tables or diagrams.
Enhancing your academic language
Te x t 2 (pp.7-10) of Unit 1
I、Match the words with their definitions(p.24).
1d;2f;3h;4i;5a;6e;7b;8j;9g;10c II、Complete the following expressions or sentences(p.25).
1 throw away a(n) compromised (损坏的) computer
2 earn somebody considerable notoriety (恶名)
3 be used interchangeably (可互换地)
4 A computer has malfunctioned (发生故障).
5 squeeze (挤) milk into the bottle
6 a(n) ingenious (有独创性的) solution to the problem
7 China’s emergence (出现) as a great power
8 of humble (卑微的) birth
9 Cunning (狡猾的) men often pass for wise.
10 exploit their vulnerability (弱点) to fight them
11 a suspected criminal (罪犯)
12 a jacket with leather patches (补丁) on the elbows.
13 the sinister (阴险的) looks on his face
14 This is a(n) daunting (艰巨的) challenge.
15 the virus that can replicate (复制) itself
16 His malicious (恶毒的) gossip caused much mischief.
17 The path spirals (盘旋) up the mountain.
18 a(n) secure (安全的) operating system
19 blur (使模糊) my vision
20 stem (阻止) the spread of an epidemic
21 fall into disrepute (坏名声)
22 solve sophisticated (复杂的) electrical problems
23 harness (利用) natural resources
24 write a personal note to each recipient (收件人)
25 convert (转换) holdings into shares
III、Complete the paragraph(p.26)
There is evidence (有证据表明) that as the number of web users has grown, so has the number of hackers (黑客的数量也有很大增长). Computer hackers are often referred to as (往往被称之为) the major threat to the Internet as they can deliver dangerous malware to your computer and compromise your computer (损坏你的计算机) or capture your information (获取你的信息). They can also try to access your computer (进入你的计算机) if you are not protected with a firewall.
IV、Translate the following sentences from Text 2 into Chinese.
1. 看似无害的编程错误可以被利用,导致电脑被侵入并为电脑蠕虫和病毒的繁衍提供温床。

Seemingly innocuous (harmless) programming errors can be exploited to force entry into a computer and also provide the weak spots that allow computer worms and viruses to proliferate.
2. 当一个软件漏洞被发现,黑客可以将漏洞变成一个侵入点,从而造成极大的破坏,在这之前,往往需要争分夺秒地利用正确的软件补丁来防止破坏的发生。

When a software vulnerability is revealed, it is often a race against the clock to apply the correct software patch before an attacker can convert the bug into an "exploit" that can be used to cause major damage.
3. 最简单的钓鱼骗局试图利用迅速致富的伎俩诱使诈骗目标寄钱。

但网络骗子们也变得越来越狡猾,最近的陷阱是通过发送客户服务的电子邮件让用户进入假银行或商业网站,并在那里请他们“重新输入”他们的账户信息。

The simplest phishing tricks try to dupe a target into sending money as part of a get-rich-quick scheme. But phishing tricksters are also getting more devious and recent scams pose as customer service emails and send users to bogus banking or commercial websites where they are invited to "re-enter" their account information.
4. 间谍软件与垃圾邮件和钓鱼网络一起,构成了三个令人生厌的互联网害虫。

尽管有些程序可以通过入侵软件漏洞从而进入电脑,但这些有害而秘密的程序通常会随着其他通常是免费的应用软件侵入到计算机系统中。

Along with spam and phishing, spyware represents the third of an unhappy trinity of internet pests. These insidious and clandestine programs typically find their way onto a computer system alongside another, often free, software application, although some can also exploit software bugs to get onto a machine.
5. 尽管因特网已经彻底改变了全球通讯,但是对于那些意图为了罪恶目的而利用网络力量的人和那些负责阻止这些网络犯罪的人来说,他们之间的较量才刚刚开始。

While the internet has transformed global communication beyond recognition, the arms race between those intent on harnessing its power for criminal purposes and those tasked with preventing them has only just begun.
Understanding of the Text
Text 2 电脑面临的电子威胁
1. 任何联网的电脑都面临一系列吓人的电子威胁。

也许对任何电脑而言,最大的单个威胁是低劣的软件。

看似无害的编程错误可以被利用,导致电脑被侵入并为电脑蠕虫和病毒的繁衍提供温床。

2. 许多软件缺陷会导致电脑崩溃,但是专业编程人员有时会想出如何以一种有创意的方式让电脑失控,这样它可以进入系统的安全部分,或分享受保护的数据。

3. 当一个软件漏洞被发现,黑客可以将漏洞变成一个侵入点,从而造成极大的破坏,在这之前,往往需要争分夺秒地利用正确的软件补丁来防止破坏的发生。

病毒和蠕虫
4. 电脑病毒是一种在电脑之间传播的程序,似乎很无辜地把自己隐藏到文件或应用程序中。

而另一方面,蠕虫是一种能复制和旅行的程序,它不会感染系统中的其他东西。

5. 许多现代的恶意代码样本,使用混合的技巧来骗取进入电脑系统的路径,混淆了蠕虫和病毒的界限,所以这两个术语现在可以互换。

6. 第一批蠕虫出现在二十世纪七十年代,在同样网络的电脑之间缓慢传播。

它们只是在每台被感染的机器屏幕上显示令人烦恼的信息。

第一个电脑病毒被称为Elk Cloner, 在1982年写成,通过软盘感染电脑。

特洛伊和僵尸
7. 但是病毒和蠕虫不再仅仅是为有敌意的黑客提供臭名远扬的机会。

现在的病毒代码会以光的速度感染电脑。

通过email, 点对点文件共享网络,甚至是即时信息程序传播。

最成功的病毒会导致严重损伤,被感染的电脑进行清理时,会迫使全球企业关门。

8. 一系列最近的样本被设计来盗取密码或信用卡信息,并且安装可以被用来远程控制受感染机器的程序。

这些程序被称为特洛伊木马。

9. 有证据表明病毒写作者可以通过出租进入被感染电脑网络的权利而大赚一笔——这些网络常被称作是“僵尸网络” 。

这些被远程控制的“僵尸”团队被用来从网站挤出钱,方式是威胁用拒绝服务攻击的手段让这些电脑崩溃。

这涉及到用虚假网页请求过载服务器,这样真正的信息就不能进入。

垃圾邮件
10. 垃圾邮件发送者也开始通过许多僵尸电脑使用僵尸网络来发送大量来路不明的邮件广告或垃圾邮件。

这使得追踪垃圾邮件的人更难从源头阻挡信息,抓住罪魁祸首。

11. 垃圾邮件曾被认为是相当小的问题,但是却在迅速增长以至失控,一大半的email 信息都被认为包含不被需要的广告信息。

12. 电脑科学家在尽最大努力制止垃圾邮件潮,为了应对这种局面,垃圾邮件发出者变得更狡猾和复杂。

最近,“spim”(通过即时信使发送的垃圾邮件)和“spit”(通过网络电话通讯技术发送的垃圾邮件) 也加入了这场战斗。

钓鱼
13. 比垃圾邮件更邪恶的是网络钓鱼电子邮件,这是一个以邮件形式出现的骗局,想要欺骗收信者交出钱或敏感的个人信息,比如银行账户细节或用户名和密码。

相关文档
最新文档