计算机专业英语第八单元课文内容
《计算机英语》Unit 8

1.1 Web 2.0
• II. Choose the best answer to each of the following questions.
D
– 2.What does Tim Berners-Lee’s description about Web 2.0 mean? – A.“Web 2.0” is a very popular now – B.“Web 2.0” is not defined clearly – C.“Web 2.0” is an entireey new concept – D.“Web 2.0” is an revotutoom in the World Wide Web
1.2 Social Networking Service
• II. Choose the best answer to each of the following questions.
D
– 3.Which of the following Websites was launched latest in the development of social networking service? – A.MySpace B.Friendster – C. D.Facebook
Unit 8 The Internet
计算机英语教程 教学课件
Contents
• Part 1 Reading and Translating
– Section A: Web 2.0
– Section B: Social Networking Service – Section C: Microblogging
1.2 Social Networking Service
unit 8 computer virus

Q2
2. Which of the following is the most likely to contain a virus? A. Cd-rom B. Ram C. Floppy disk D. Rom
Q3
3. What is the best way of protecting your compuer from getting a virus? A. Keeping it clean B. Installing anti-virus software C. Not allowing your mum to use it D. Installing a new hard drive
COMPUTER ENGLISH
Quiz
Q1
1. Where are computer viruses most commonly picked up from ?
A. Manchester united supporters B. Your mates mail attachments C. Old computers D. E-
COMPUTER ENGLISH
3.hacker
The incredibly(难以置信的) fast development(发展) of the internet has brought many benefits(好处) both to consumers and businesses. However, it has also provided criminals(犯罪) or misguided(误导) individuals with great opportunities for crime or „mischief‟(伤害 ). The internet is not only used by innocent(无辜的) members of the public, but also by fraudulent(不正当的) traders, software pirates, hackers and con-artists, to name but a few.
第八单元课文译文 计算机英语 吕云翔

第八单元系统交付第一部分听说A. 对话:软件部署White先生:欢迎来到酒店!感谢你们为我们四季酒店管理信息系统开发所做出的努力。
Kevin:这是我们的荣幸!今天,我们将向你们交付软件,包括所有经过测试的程序文件、数据文件和用户补充文档,例如用户指南和操作手册。
在我们的软件中还添加了超文本“帮助”文件和一个疑难问题排除指南。
White先生:听起来太棒了!那么我们可以在系统部署后马上运行了吗?Kevin:没问题。
但我建议还是首先在一个小群体的用户代表中测试软件。
在确保运行正常之后,我们可以在整个酒店中部署系统。
通过这种方式,这些用户代表可以先运行该软件并在实践中找出问题,而问题的影响将控制在一个较小范围内并且问题可以及时地得到解决。
这也是一种常见的软件部署方式。
White先生:真的吗?那么,我觉得是个好主意。
但多大的范围合适呢?我们总共有100名工作人员和20台计算机。
Sharon:在大概三分之一的酒店信息台上部署就可以。
我认为,信息台处理大部分酒店日常业务,并能有力高效地发现和揭示潜在的问题。
White先生:好的。
我完全同意这个建议,并会尽快安排设备和人员。
此外,如果发现问题时,恐怕我们还将需要一些及时支持。
Kevin:不必担心。
我们将提供安装和启动帮助,作为一个支持小组,我们将为您确保疑难问题排除帮助,直到系统正常运行半年。
Jason:这是我们的联系列表,上面有电话号码和电子邮件地址。
另外,我们也需要一份酒店负责该系统的工作人员的联系信息,以便及时联系。
White先生:没问题。
我会在2天之内将我们的联系信息发电子邮件给你们。
Kevin:关于这方面,更进一步地,我认为我们最好正式地建立问题记录和反馈机制,包括“反馈过程是什么样的?”、“你们如何记录问题并将其报告给我们?”、“使用哪种形式,纸介和/或电子的?”,等等。
这样,我们就可以收集和记录你们的反馈意见,与你们进行沟通和评估,以一起确定修改方案。
计算机英语教程unit 8

本句中, that lets you change line spacing directly from
the main toolbar by pushing a small button 是一定语从句, 修饰和限定feature,在该从句中,by pushing a small button 是一介词短语,做方式状语,修饰谓语change。 本句意为: 对Word 10而言,有一小的新功能。该功能可让你直接从主工具栏 中按一小按钮来改变行间距。
Notes
[2] Microsoft at last offers its lazy customers a way to write letters or documents without typing on the keyboard
本句中,to writቤተ መጻሕፍቲ ባይዱ letters or documents without typing on the
Notes
[4] This feature lets you easily select multiple areas of a document at once by merely using your mouse cursor with the Ctrl key of your keyboard, thereby saving time when
Unit 8
Microsoft Word
退出
New Words
New Words
New Words
Phrases
be intended to 意图是使,是用来
计算机专业英语Unit8

Unit 8 Section 1
•
•
Zhang Hua: Then are there any special requirements for a computer in multimedia applications? Mr. Wang: Actually most PCs today have good multimedia features. They have dual- or single-core CPUs clocked at 3.0 GHz or faster, at least 1GB of RAM, and a 128 MB or higher video card. Popular graphics cards include Nvidia Gforce or ATI Radeon. Zhang Hua: So there is a wide selection for us now. Mr. Wang: Right. Multimedia applications were uncommon due to the expensive hardware required until the mid-1990s. However, with increases in performance and decreases in price, now they are commonplace. Of course, we can make different choices depending on our specific purposes. Zhang Hua: I see. Thank you very much for your explanation, Mr. Wang. Mr. Wang: You’re welcome.
Unit 8 Internet课文1,2

和因特网革命相类似的历史事件 是工 业革命。英国首先发起了工业革命,并因 此兴旺繁荣数十年。像今天的电脑企业家 一样,商人和工程师们一夜之间成为百万 富翁,并且一度领导英国的经济。但是这 些爆发户们却遭到英国社会的鄙视,尽管 他们很有钱,但却没有社会地位。
Text Understanding
3 The prejudice against technology prevented Britain’s development, and it was left for the United States to finish the Industrial Revolution. Unlike Britain, the Americans
中国社会对因特网的态度使 中国做好了完成因特网革命的准 备。美国对工业革命的掌控使它 很快在经济上超过了英国,中国 同样也会超过美国。
Text Understanding
9 The Internet is dominated by the services industry.
downfall in the race to finish the Internet Revolution.
虽然中国和印度的学生仍然渴望去美 国,但总有一天,当他们的祖国富裕了, 相比于金钱他们会更希望得到尊重。那时 ,美国会后悔不该如此恶劣地对待那些受 过良好教育的外国人。因此,就像发生在 英国的工业革命,美国的偏见也最终导致 它在因特网革命竞赛中的失败。
Text Understanding
8 China’s social attitude towards the Internet
Revolution prepares China to finish it. America’s mastering of the Industrial Revolution allowed it to speed past Britain economically, and China may just speed past America.
Unit-8-Computers-and-Security课文翻译大学体验英语二

Unit 8 Computers and SecurityPassage A You Are the Weakest Link, Goodbye.Do you remember the good old days? Innocent times spent sharing documents and executable files without a care in the world. Okay, every month or so you might encounter a boot sector virus - but they were easy to deal with even if the anti-virus software didn't pick them up.But those long lazy summers disappeared too fast. Macro viruses made Information Technology (IT) administrators grow up fast as they realized there was a type of virus which could spread very quickly throughout an organization. It wasn't unusual to find hundreds of computers within personal company infected by viruses transmitted via email attachments. The IT staff were amongst the fittest departments in your company, running from Personal Computer (PC) to the next cleaning them up.There had to be a better way. Companies now realize that viruses aren't "urban myths", and can have a serious impact on their operations. They invest in anti-virus software on the desktops, servers and email gateways and even put in place procedures to ensure their anti-virus is up-to-date with the very latest detection routines.It sounds like companies have put in place adequate defenses to protect against viruses. But have they?Anti-virus software detects most of the viruses your users are likely to encounter - often without the user even knowing. However, the software must be updated regularly, preferably daily in any large company. Even then, a very new virus can infect your users. With the rapid transmission of files through networks and the Internet, a virus can spread a considerable distance before it can be identified and protected against. Fortunately, only a few viruses ever do this but the likes of Melissa and the Love Bug can inflict serious damage before their progress is stopped. Whilst employees become suddenly aware during the ensuing media excitement, they soon forget about the virus threat as the stories disappear from the news headlines.This is the danger. Complacency can set in when there is no perceived "action" on the virus front with no global crisis, and the importance of being vigilant about viruses recedes in your users' minds. They forget what the big deal was in the first place - after all, the anti-virus software deals with the viruses, doesn't it? And isn't it the IT department's job to look after this sort of thing?Before you know it your users are opening unsolicited attachments once more, downloading unauthorized software, and putting your company's data and credibility at risk. All because the users think that they are working in a safe environment. Employeessee anti-virus software, firewalls and IT departments as guarantees that their computers will work and will be safe. Of course, there aren't any guarantees. Anti-virus software plays one, albeit important, part in the defense of your company from malicious attack but the security of your computer system is only as strong as the weakest link. And that, more often than not, is the human factor.No employer wants to come across as a killjoy or an ogre. Most will willingly accept that the happiest employees are those who feel that they are respected and trusted by their employer. Many companies accept that employees will send and receive a certain amount of personal email and make the odd personal telephone call.However, the worry comes when employees start risking company security in pursuit of personal amusement. Funny screensavers and games downloaded from the Internet can seem harmless enough but they could easily be harboring a dangerous virus.Software downloaded from the net is often unlicensed and unsupported, and may cause conflicts with existing software in use at your company. Unlicensed, pirated software is an ideal vector for a computer virus. Virus writers and hackers often use such software as the ideal "kick-start" for their virus distribution.It is vitally important that employees be educated about the virus threat but this cannot be a one-off event. The potential threat should always be in the back of an employee's mind and precautionary measures should be taken as a matter of course. There is no harm in reminding people about what could happen if they let their guard down. In the end, education is the key to a virus-free environment and this is a continual process. It may not be the most exciting thing on the agenda but it works.The lesson is simple. You can have the best software in the world protecting your company's defenses; you can even be the biggest IT company in the world; but without your users practicing safe computing they will always be the weakest link.PA 你是最薄弱的环节,再见还记得美好的往日时光吗?在那样的纯真年代,我们共享文档和可执行文件,根本没有半点顾虑。
计算机专业英语第二版 译文

《计算机英语》参考译文(精读部分)目录第1单元课文A:计算机概览 (3)一、引言 (3)二、历史 (3)三、硬件 (4)四、编程 (5)五、未来的发展 (5)第2单元课文A:计算机硬件 (5)一、引言 (5)二、输入硬件 (6)三、输出硬件 (6)四、存储硬件 (7)五、硬件的连接 (7)第3单元课文A:操作系统 (8)一、引言 (8)二、操作系统是怎样工作的 (8)三、当前的操作系统 (8)五、未来的技术 (10)第4单元课文A:编程语言 (11)一、引言 (11)二、语言类型 (11)三、高级语言的分类 (12)四、语言的结构与成分 (12)五、历史 (13)第5单元课文A:计算机程序 (13)一、引言 (13)二、程序开发 (14)三、程序元素 (14)四、程序功能 (15)五、历史 (16)六、未来 (16)第6单元课文A:软件生命周期 (17)第7单元课文A:进入关系数据库的世界 (19)一、什么是关系数据库? (19)二、数据库管理系统的介绍 (20)三、不同的计算模型 (21)第8单元课文A:电信与计算机 (22)第9单元课文A:计算机网络 (24)一、引言 (24)二、调制解调器与计算机管理局 (24)三、局域网 (24)四、路由器与桥接器 (25)五、广域网 (25)六、分布式计算 (25)七、安全与管理 (26)第10单元课文A:因特网是如何工作的? (26)一、因特网访问 (27)二、信息打包 (27)三、网络编址 (27)四、电子邮件 (28)五、传输模式 (28)六、带宽 (28)第11单元课文A:信息革命 (29)一、引言 (29)二、社会与技术发展 (29)三、信息革命的方向 (29)四、就业趋势 (30)五、信息技术与消费者 (31)六、信息革命的问题 (31)第12单元课文A:电子商务简介 (32)一、定义 (32)二、需求与服务 (32)第13单元课文A:计算机安全 (34)一、计算机安全面临的威胁 (34)二、保护计算机安全的措施 (36)第14单元课文A:比尔•盖茨文摘 (37)第1单元课文A:计算机概览一、引言计算机是一种电子设备,它能接收一套指令或一个程序,然后通过对数值数据进行运算或者对其他形式的信息进行处理来执行该程序。
Unit_8_SectionA_The_Internet

Unit 8 The Internet
7/52
Most of this original work was sponsored by the U.S. government through the Defense Advanced Research Projects Agency (DARPA-pronounced "DAR-pa").
最初的工作大多是由美国政府通过国防部高级研究计划局 (DARPA——读作“DAR-pa”)发起的。
Unit 8 The Internet
8/52
Over the years, the development of the lnternet shifted from a defense project to an academic research project, and today it is 定语从句 largely a commercial undertaking that links a worldwide combination of WANs, MANs, and LANs involving millions of computers.
随着岁月的推移,因特网的开发从一个国防项目转变成一个学术研 究项目。如今,它在很大程度上是一个商业项目,连接着全世界的 广域网、城域网和局域网,涉及数百万台计算机。
9/52
Unit 8 The Internet
I. Internet Architecture
计算机专业英语的课文及翻译

Unit 8 puter NetworkingText 1 Data municationsThe end equipmentcan be puters, printers, keyboards, CRTs, and so on.They are either generates the digital information for transmission oruses the received digital data. This equipment generally operates digital information internally in word units.DTE is data terminal equipment. A station controller (STACO)is the corresponding unit at the secondaries. At one time, the DTE was the last piece of equipment that belonged to the subscriber in a data link system. Between the DTEs, first is the modem, and then is the munications equipment. The munication equipment is owned and maintained by Telco. Data munications equipment (DCE) accepts the serial data stream from the DTE. And DCE converts it to some form of analog signal suitable for transmission on voice-grade lines. At the receive end, the DCE performs the reverse function. It converts the received analog signal to a serial digital data stream. The simplest form of DCE is a modem (modulator/demodulator) or data set. At the transmit end, the modem can be considered a form of digital-to-analog converter.While at the receive end, it can be considered a form of analog-to-digital converter.参考译文数据通信终端设备可以是计算机、打印机、键盘、CRT等。
计算机专业英语Unit 8

Unit 8 Computer NetworkingT ext 1 Data Communications Exercises1. Fill in the blanks with appropriate words according to the text.(1)The end equipment is either __generates the digital information for transmission_or_ uses the received digital data.(2)When digital data are transmitted, they are _in serial form_.(3)_DTE___ is data terminal equipment.(4)_STACO is the corresponding unit at the secondaries.(5)Between the DTEs, first is _the modems_, and then is the communicationsequipment__.(6)_DCE__ accepts the serial data stream from the DTE.(7)At the transmit end, the modem can be considered a form of _digital-to-analog_converter, while at the receive end, it can be considered a form ofanalog-to-digital__ converter.(8)DCE converts the received_ analog signal_ to a serial digital data stream_.2. Multiple choices.(1)The end equipment in a communication system includes _ABCD_.A. computersB. CRTsC. printersD. keyboards(2)The equipment B_D__.A. manipulates digital information internally in serial formB. manipulates digital information internally in word unitsC. transfers the number of bits in parallelD. transfers the number of bits in serial form(3)DTE is __BD_.A. Digital T-carrierB. data terminal equipmentC. satelliteD. the last piece of equipment that belonged to the subscriber in a data link system(4)There are AB_ between the DTEs.A. the modemB. communications equipmentC. digital-to-analog converterD. will be replaced by an updated standard3. Translate and analyze the following sentences.(5)This equipment generally operates digital information internally in word units.句子组成:in word units介词短语作方式状语修饰operates翻译:_这种设备通常在内部以字为单位处理数字信息_____(6)It converts the received analog signal to a serial digital data stream.句子组成:convert……to指将……转换成……翻译:它把接收到的模拟信号转换成串行数字数据流(7)Data communications equipment (DCE) accepts the serial data stream from theDTE.句子组成:from the DTE修饰动词accept翻译:数据通信设备(DCE)从DTE接收串行数据流Reading comprehension.Security is an important consideration in the Internet world. The computer has a way of knowing who you are. Most LANs or mainframes require each user to log in, or sign on to the system. To do this, you should type in your user ID before a prompt. Y ou are then prompted for a password. Passwords are special codes you use to “lock” your account. Obviously you need to be careful about protecting your password if you are building nuclear power plants or something, but what about the rest of us? A student recently got some help from her friend on email. She gave him her password to a class account, and he wrote it down. Apparently some of his buddies found the password and logged in using the student’s user ID and password, and sent a very obscene message to the class. The student nearly lost her account, because she had been sloppy with her password.Change you password regularly!Some hints:∙Don’t use your dog’s name. People will guess it.∙Don’t use words in English, people can hook up spell checkers.∙Consider combining words and numbers.Answer the following questions according to the article above.(8)What does the passage mainly discuss?Security is an important consideration in the Internet world.(9)According to the passage, we know security is an important consideration __in theInternet world_.(10)Why the author thinks that is important to protect your password if you are buildingnuclear power plant or something?Because the password may be used by other people(11)At last, the author give some hints, what are they?They are: first, don’t use your dog’s name. People will guess it. Second,don’t use words in English, people can hook up spell checkers. And last, consider combining words and numbers.Text 2 Architecture of Computer Networks Exercises1. Fill in the blanks with appropriate words according to the text.(12)Computer network is a complex unit, it consists of two or more connectedcomputing units.(13)Design of a network and its logical structure should comply with a set of designprinciples.(14)Two important network architectures are: the OSI reference model and the TCP/IPreference model.(15)The _OSI__ model was created by the ISO.(16)Note that the OSI model itself is not a network architecture__.(17)TCP/IP is a communication protocol, it provides many different networkingservices.(18)The TCP/IP Internet protocol suite is formed from two standards :_the TCP__ andthe IP__.(19)__TCP/IP__ is the foundation of the Internet as we know it today.(20)TCP means it is on the __transport__ layer and IP means it is on the __network__layer separately.2. Decide whether the following statements are True or False.(21)Design of a network and its logical structure should comply with a set of designprinciples. ( √ )(22)The OSI model was not created by the ISO. ( × )(23)The network architecture is a layer-based. ( √ )(24)The OSI model is a foundation for all comparing protocols. ( × )(25)The OSI model is a network architecture. ( × )(26)The TCP/IP Internet protocol suite is formed from three standards. ( × )(27)TCP means it is on the network layer and IP means it is on the transport layerseparately. ( × )3. Translate and analyze the following sentences.(28)It is used for the purpose of data communication and resource sharing.句子组成:it 代指计算机网络,for引导的短语结构修饰used翻译:_它用于数据通信和资源共享。
计算机英语课件Unit 8 Computer Network section B A Guide to Network Topology

The partial-mesh topology is much like the full-mesh, only we don't connect each device to every other device on the network. Instead, we only implement a few alternate routes. After all, what are the odds a network will fail in multiple times near the same device?
Note that since there is no end on a ring topology, no terminators are necessary. A frame travels along the circle, stopping at each node. If that node wants to transmit data, it adds destination address and data information to the frame. The frame then travels around the ring, searching for the destination node. When it's found, the data is taken out of the frame and the circle continues.
But wait—it gets better! We have two types of ring topologies in networking: the one we just reviewed, and dual-ring topology. In a dualtopology, we use two rings instead of one. This creates a sense of redundancy so that if any point in the network fails, the second ring will (hopefully) be able to pick up the slack. If both rings were to fail at separate locations, we can even use the opposite ring at each point to "patch" the downed node.
《计算机专业英语》谢希仁第二版-第8章讲义

RequireБайду номын сангаасents:
• 了解Internet的起源 • 掌握Internet的关键技术概念 • 描述 Internet协议与应用程序的作用 • 解释当前Internet的结构 • 理解当前Internet的局限 • 描述Internet II的潜在作用
What is the Internet? Where did it come from, and how did it support the growth of the World Wide Web? What are the Internet’s most important operating principles? The Internet is an interconnected network of thousands of networks and millions of computers (sometimes called host computers or just hosts) linking businesses, educational institutions, government agencies, and individuals together. 因特网是什么? 它来自何处,和它如何支持万维网的增长? 因特 网最重要的运行原则是什么?因特网是成千上万的网络和数以百 万计的计算机(有时被称为主机计算机或主机)将企业、教育机构、 政府机关和个人联结起来的一个互联网络。
8.1 The Internet: Key Technology Concepts
Behind this formal definition are three extremely important concepts that are the basis for understanding the Internet: packet switching, the TCP/IP communications protocol, and client/server computing. Although the Internet has evolved and changed dramatically in the last 30 years, these three concepts are at the core of how the Internet functions today and are the foundation for Internet tomorrow. 在这个正式的定义背后,隐含着三个极其重要的概念:分组交 换、TCP/IP(传输控制协议/网际协议)通信协议和客户机/服务 器计算技术,它们乃是理解因特网的基础。尽管因特网在过去 30年发生了引人注目的进化和变化,但这三个概念仍是今天因 特网运转的核心,也是未来因特网的基础。
Unit8ComputerNetwork计算机英语第八单元计算机网络

第八单元:计算机网络Unit 8 Computer Network课文A:网络基本原理Section A Network FundamentalsThe need to share information and resources among different computers has led to linked computer systems, called networks, in which computers are connected so that data can be transferred from machine to machine.在不同计算机之间共享信息和资源的需要,导致了相互连接的计算机系统的产生。
这种相互连接的计算机系统被称为网络。
在网络中,计算机连接在一起,从而数据可以从一台计算机传输到另一台计算机。
In these networks, computer users can exchange messages and share resources - such as printing capabilities, software packages, and data storage facilities - that are scattered throughout the system.在网络中,计算机用户可以交换信息,并共享分散在整个网络系统的资源,如打印能力、软件包以及数据存储设备。
The underlying software required to support such applications has grown from simple utility packages into an expanding system of network software that provides a sophisticated network wide infrastructure. 支持这类应用所需的基本软件,已经从简单的实用软件包发展成一个不断扩展的网络软件系统,该系统提供了一个复杂的网络范围的基础结构。
计算机专业英语第八章课文翻译

CHAPTER 8 SECONDARY STORAGEP213IntroductionSecondary storage devices are used to save, to back up, and even to tran sport files consisting of data or programs from one location or computer to another. Not long ago, almost all files contained only numbers and lett ers. The demands for saving these files were easily met with low-capacity floppy disk drives and hard-disk drives.Data storage has expanded from text and numeric files to include digita l music files, photographic files, video files, and much more. These new ty pes of files require secondary storage devices that have much greater cap acity.Secondary storage devices have always been an indispensable element i n any computer system. They have similarities to output and input device s. Like output devices, secondary storage devices receive information from the system unit in the form of the machine language of 0s and Is. Rathe r than translating the information, however, secondary storage devices sav e the information in machine language for later use. Like input devices, s econdary storage devices send information to the system unit for processi ng. However, the information, since it is already in machine form, does n ot need to be translated. It is sent directly to memory (RAM), where it c an be accessed and processed by the CPU.Competent end users need to be aware of the different types of second ary storage. They need to know the capabilities, limitations, and uses of fl oppy disks, hard disks, optical discs, and other types of secondary storage. Additionally, they need to be aware of specialty storage devices for porta ble computers and to be knowledgeable about how large organizations ma nage their extensive data resources.辅助存储设备被用来保存,备份,甚至把数据或程序从一个位置或计算机传送到另一个地方。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
TSR (Terminate and Stay Resident) abbr. 终止驻留程序 lurk v. 潜伏
resident virus 驻留的病毒 polymorphic adj. 多态的
Introduction to Computer Viruses
Note that worms often take the opposite approach to spread as fast as possible. While this makes their detection virtually certain, they also have the effect of bringing down networks and denying access to the network. This is one of the goals of many worms. During the infection phase, in order to infect a computer, a virus has to have the chance to execute its code. Viruses usually ensure that this happens by behaving like a parasite, that is, by modifying another items so that the virus codes are executed when the legitimate items are run or opened. Good vehicles for viruses include the parts of a disk which contain codes executed whenever that disk is booted. As long as the virus is active on the computer, it can copy itself to files or disks that are accessed.
大连理工大学出版社
worm n. 蠕虫
parasite n. 寄生虫
Introduction to Computer Viruses
Viruses can be transmitted by: △ Booting a PC from an infected medium △ Executing an infected program △ Opening an infected file Common routes for virus infiltration include: △ Floppy disks or other media that users can exchange △ Email attachment △ Pirated software △ Shareware ◆ Attack Phase
Unit Eight
Security
姓名: 学号 : 班级:
大连理工大学出版社
Introduction to Computer Viruses
passage One
Training target: In this part, our target is to train your reading comprehension. We have made the flexible sentences strong black and marked the subject, predicate and object of them. Try to grasp the main idea of these sentences.
主语、谓语、宾 语 大连理工大学出版社
Introduction to Computer Viruses
What is computer virus? A computer virus is a special kind of computer program that reproduces its own code by attaching itself to other executable files, and spreads usually across disks and networks surreptitiously. Viruses have many different forms, but they all potentially have two phases to their execution: the infection phase and the attack phase. ◆ Infection Phase The virus has the potential to infect other programs when it executes. We often don’t clearly understand when the virus will infect the other programs. Some viruses infect other programs each time they are executed; other viruses infect only upon a certain trigger. This trigger could be anything: a day or a time, an external event on your PC, a counter within the virus, etc. Virus writers want their programs to spread as far as possible before anyone notices them.
infiltration n. 渗入 email attachment 邮件附件 pirated software 盗版软件
大连理工大学出版社
Introduction to Computer Viruses
Many viruses do unpleasant things such as deleting files or changing random data on your disk or merely slowing your PC down; some viruses do less harmful things such as playing music or creating messages or animation on your screen. Just as the infection phase can be triggered by some events, the attack phase also has its own trigger. Does this mean a virus without an attack phase is benign? No. Most viruses have bugs in them and these bugs often cause unintended negative side effects. In addition, even if the virus is perfect, it still steals system resources. Viruses often delay revealing their presence by launching their attack only after they have had ample opportunity to spread. This means the attack could be delayed for days, weeks, months, or even years after the first initial infection.
大连理工大学出版社
deleting file 删除文件
benign adj. 良性的 bug n. 漏洞
ample adj. 充足的 initial adj. 开始的,最初的
Introduction to Computer Viruses
The attack phase is optional, many viruses simply reproduce and have no trigger for an attack phase. Does this mean these are “good” viruses? No! Anything that writes itself to your disk without your permission is stealing storage and CPU cycles. What is worse is that viruses of “just infect” without an attack phase, often damage the program or disks they infect.. This is not an intentional act of virus, but simply a result of the fact that many viruses contain extremely poor defective codes. As an example, stoned, one of the most common viruses in the past was not intentionally harmful. Unfortunately, the author did not anticipate the use of anything other than 360K floppy disks. The original virus tried to hide its own code in an area of 1.2MB that resulted in corruption of the entire diskette.