理工科学术英语摘要(完整版)

合集下载
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Text1 How do computer hackers “get inside”a computer

Abstract:

Computer vulnerabilities are often utilized by hackers or crackers. The security of each computer is challenging. This paper firstly redefines the term “hacker”, “cracker” and “getting inside” the computers and describes the procedure in detail. The term “unauthorized user” (UU) will be a better choice for defining the insider group. The known and unknown vulnerabilities will be taken advantage of by UUs ranging from poor password protection to leaving a computer turned on and physically accessible to visitors in the office. The first step of employing technical exploits will be the determination of the specifications of the target system. There are two ways of attacking including being through capabilities inherent in hypertext transfer protocol (http) and being preprogrammed against specific vulnerabilities and launched without any specific target. The variability of hacking action including the weak system and the strong system warns the users to choose the right way to protect the computer and do not authorize the computer to others easily. Lastly, the solution of avoiding vulnerabilities has been given, including updating patches, making complex passwords, getting information only from the reliable websites or services, updating

anti-virus software and backing up the data to protect the computer not being hacked.

摘要:

计算机漏洞经常被黑客破解使用。每台计算机的安全性都在承受挑战。本文首先重新定义了术语“电脑狂人”、“黑客”和“进入计算机内部”,并详细描述了该过程。而术语“未授权用户”(UU)能更好的定义“侵入者”。已知和未知的漏洞会不经意的被人利用,不管这些漏洞是低安全性密码保护,还是电脑持续开机,亦或是在办公室与其他访客的直接接触。“未授权用户”利用技术漏洞的第一步即是确定目标系统的明细规范是什么。有两种攻击方式,一种是针对超文本传输协议(HTTP)固有的功能,另一种是预先设定好程序对特定易受攻击对象进行攻击,没有任何具体目标。黑客行动的多变性,警告用户不管是薄弱的还是强大的系统,都应当选择正确的方式来自我保护,不要轻易将授权给其他人。

最后,文章列出了避免安全漏洞的解决方案,包括更新补丁、使用复杂的密码、只从可靠的网站或服务中获取信息、及时更新杀毒软件和备份,以保护计算机中的数据不被黑客攻击。

Text 3 Advantages of Cloud computing

Abstract:

Cloud of computing is allowing you to use services that include infrastructure applications ,and storage space for a nominal fee. It should be able to quickly allot and relieve resources whenever required by clients and cater to the needs of clients without having to involve clients into management of the service and have real- time backup to offer maximum up time clients. The type of cloud services includes software as a service ,platform as a service ,infrastructure as a service .The advantages of cloud computing under green computing include reducing the consumption of electricity while also reducing emissions that damage the environment ,saving the environment while also saving on the expenses incurred due to a demand for expansion ,and allowing you to let you employees telecommute. Then ,here is a summary about the advantages of cloud computing: remote accessibility , easy expansion ,security and environmentally friendly.

Keys words : advantage 、cloud computing service、 green computing

摘要:

云计算是可以让你使用基础设施和应用程序,并且为象征性的收费提供存储空间的服务。它可以很快分配和释放资源,无论客户何时请求,能够迎合客户的需求,而不需要让客户参与服务的管理;而且它有实时的备份,为客户提供最大的正常运行时间。云服务的类型包括软件即服务模型、平台即服务模型、基础构架即服务模型。绿色背景下云计算的好处是降低了电力消耗,同时也降低了有害环境的排放量;挽救了环境,也节约了由于扩大的需求而带来的费用;允许你的员工远程上班。然后,得出云计算有以下几项优点:远程利用、很容易扩展、安全、环境友好。

关键字:优势、云计算、服务、绿色计算

相关文档
最新文档