《计算机英语》Unit 10
计算机英语的课文翻译第十单元 计算机病毒及防护
第十单元计算机病毒及防护Part A计算机病毒计算机病毒是一种人为设计的、故意袭击计算机的可执行程序。
因病毒性质不同,它可能破坏硬盘内容,并且或影响计算机的正常运行。
病毒程序能自我复制。
这就意味着通过自身复制,计算机上的病毒会成倍增加。
这种复制是有意图的;它是病毒程序的一部分。
在大多数情况下,如果感染病毒的文件被执行或被复制到另一台计算机,那么那台计算机也会被同一病毒感染。
病毒程序包含一些指令,这些指令会造成负面的影响,导致计算机遭受从无害到瘫痪的后果。
比如:●文件和数据被删除;●计算机安装程序或应用软件缓慢;●计算机屏幕上的内容和图像发生扭曲,并且会出现奇怪的图像和文本;●磁盘空间和文件名会无缘无故被更改;●系统工具如磁盘扫描程序会丧失功能。
病毒可能会随着任何的软件程序进入计算机系统。
对于因特网用户来说,这种威胁可能来自于通过文件传输协议下载文件,或查阅邮件附件。
一旦病毒进入计算机系统,它会粘附于,或有时甚至替代现存程序。
接着,当用户启动有问题的程序时,病毒也就被执行。
这通常发生在用户无意识的情况下。
一旦计算机被病毒感染,最好的挽救办法是购买杀毒软件包如Norton或McAfee并安装设置及时更新系统。
这些软件包可能不能保证计算机免于最新病毒的侵袭,但是提供了最为可能的解决方法。
你应该经常尝试以下操作:●安装杀毒软件并保持更新。
●定制杀毒软件增强保护。
病毒保护页面有许多链接指导你如何获取、安装和定制病毒扫描杀毒软件。
●安装个人防火墙并保持更新。
●备份重要的文档和数据。
●不要打开或浏览不知来源的邮件。
●警惕收到的邮件附件。
如果你不知道它的来源,删除该信息。
●不要从不信任的来源处下载文件。
●为你的操作系统获取最新补丁和更新材料。
计算机专业英语及翻译Unit 10
Unit 10 Program DesignText 1 Computer LanguagesComputer languages have undergone dramatic evolution since the first electronic computers were built. Early on, programmers worked with the most primitive computer instructions—machine language. These instructions were represented by long strings of ones and zeroes. Soon, assembly language was invented. It maps machine instructions to human-readable mnemonics, such as ADD and MOV.In time, higher-level languages evolved, such as PASCAL, BASIC, COBOL, C, C++, and JA V A. These languages let people work with something approximating words and sentences, such as Let I = 100. These instructions were translated back into machine language by interpreters and compilers. An interpreter translates a program as it reads it, turning the program instructions, or code, directly into actions. A compiler translates the code into an intermediary form. This step is called compiling, and produces an object file. The compiler then invokes a linker, which turns the object file into an executable program.Because interpreters read the code as it is written and execute the code on the spot, interpreters are easy for the programmer to work with. Compilers, however, introduce the extra steps of compiling and linking the code, which is inconvenient. Because the time-consuming task of translating the source code into machine language has already been accomplished, compilers produce a program that is very fast each time it is run.The problems programmers are asked to solve have been changing. Today's programs use sophisticated "user-friendly interfaces," involving multiple windows, menus, and dialog boxes. The programs written to support this new approach are far more complex than those written just ten years ago. Generally, as programming requirements have changed, both languages and the techniques used for writing programs have evolved.参考译文计算机语言自从第一批电子计算机诞生以来,计算机语言已经发生了戏剧性的变化。
精品课件-IT专业英语-UNIT10
ห้องสมุดไป่ตู้
UNIT 10 Computer Network
K ey P oints
Understanding the fundamental concepts of computer network Mastering the several main network technology Understanding the concepts of different kinds of network Understanding the OSI model
UNIT 10 Computer Network
Computer networking cabling (wired Ethernet as defined by IEEE 802.3) consists of 4 pairs of copper cabling that can be utilized for both voice and data transmission. The use of two wires twisted together helps to reduce crosstalk and electromagnetic induction. The transmission speed ranges from 2 million bits per second to 10 billion bits per second. Twisted pair cabling comes in two forms: unshielded twisted pair (UTP) and shielded twisted-pair (STP). Each form comes in several category ratings, designed for use in various scenarios.
计算机专业英语教程课件-Unit 10 Compilers Principles
New Words and Phrases
❖ nontrivial:非平凡的 ❖ optimization:n.最佳化;
最优化
❖ overemphasize:v.过分强 调
❖ parallel:adj.平行的 ❖ prevalence:n.流行,普遍 ❖ prioritize:v.给…优先处理 ❖ rearrange:v.重新排列
Unit 10
Compilers’ Principles
New Words and Phrases
❖ automatically:adv.自动地 ❖ compiler:n.自动编码器;
编辑人 ❖ complex:adj.复杂的;n.
合成物 ❖ compilation:n.聚集;编辑
物 ❖ dynamically:adj.有力的;
❖ misnomer:n.误称;用词 不当
❖ magnitude:n.广大,重要 性
❖ multicore:adj.多心的;多 核的
❖ mathematical:adj.数学上 的,精确的
❖ matrix:n.模型,矩阵
❖ minimize:v.使减到最少
❖ multiple:adj.多样的;复 合的
有一个好的了解后才能开始,而且要有全
The optimization must be correct, th preserve the meaning of the
compiled program,
面的实验和评估来验证我们的直觉。编译
The optimization must improve the performance of manyprogra
❖ simultaneously:adv.同时 发生地
《计算机专业英语》课件第10章
UNIT 10
TEXT Embedded System
An embedded system is a computer system designed for specific control functions within a larger system, often with real-time computing constraints. It is embedded as part of a complete device often including hardware and mechanical parts. By contrast, a general-purpose computer, such as a personal computer (PC), is designed to be flexible and to meet a wide range of end-user needs. Embedded systems control many devices in common use today.
UNIT 10
3. The program instructions written for embedded systems are referred to as firmware, and are stored in readonly memory or Flash memory chips. They run with limited computer hardware resources: little memory, small or nonexistent keyboard or screen.
UNIT 10
The integration of microcontrollers has further increased the applications for which embedded systems are used into areas where traditionally a computer would not have been considered. A general purpose and comparatively low-cost microcontroller may often be programmed to fulfill the same role as a large number of separate components. Although in this context an embedded system is usually more complex than a traditional solution, most of the complexity is contained within the microcontroller itself.
计算机英语实用教程Unit 10
Unit 10 Applications【教学目的】○ Learn about the English terms of Applications: boot,click,notebook,ASP,backup,CD-R,CD-RW and etc.○ Improve the students’ ability to understand the long and difficult sentences in the text.○ Master the key language poi nts and grammatical structures in the text.○ consolidate the technical terms and important professional phrases by doing exercises. 【教学重点难点】○Important technical terms:boot(启动),click(点击),notebook(笔记本电脑),ASP(动态服务器主页),backup (备份),CD-R(可写光盘),CD-RW(可改写光盘),DVD(数字化视频光盘),clipboard (剪贴板),compression(压缩),default setting(默认设置),icon(图标),password(密码),virus(病毒),MPEG (运动图像专家组),OCR(光学字符识别软件),extension(扩展名),cookie(小甜饼),applet(小Java程序),DSL (数字用户线路)○ Difficult sentences:1. Usually used as a marketing term to describe a Web site that is or is intended to be the first place people see when using the Web.2. A computer on the same network as an infected computer or that uses an infected disk (even a floppy) or that downloads and runs an infected program can itself become infected.3. Note also that different platforms have different general levels of resistance; UNIX machines are almost immune, Win ’95 / ’98 / ME is quite vulnerable, and most others lie somewhere in between.4. MPEGA family of multimedia standards developed by the Motion Picture Experts Group, commonly used to refer to audio or visual files saved with MPEG compression schemes.5. EncryptionA process that turns files into gobbledegook so that they cannot be read, other than by programs containing the appropriate password-protected encryption software.6. Applets differ from full-fledged Java applications in that they are not allowed to access certain resources on the local computer, such as files and serial devices (modems, printers, etc.), and are prohibited from communicating with most other computers across a network.7. A common configuration of DSL allows downloads at speeds of up to 1.544 megabits (not megabytes) per second, and uploads at speeds of 128 kilobits per second. This arrangement is called ADSL: Asymmetric Digital Subscriber Line.○ Review the important points of essential Englishwill表示“通常会……”by defaulthave uses for ……【教学步骤】Step OneRead and explain Text A to the students and ask the students to keep in mind the following professional terms:boot(启动):Starting up an OS is booting it.click(点击):To press a mouse button.notebook(笔记本电脑):A notebook is a small laptop with similar price, performance, and battery life.ASP(动态服务器主页):Active Server Pagesbackup(备份):To make a second copy of a file as a safety measure.CD-R(可写光盘):Compact DiskCD-RW(可改写光盘):Compact Disc Re-Writable formatDVD(数字化视频光盘):Digital Video Diskclipboard(剪贴板):A section of a co mputer’s memory where you can temporarily copy chunks of text, data, graphics, or pictures.compression(压缩):A technique to reduce the size of a file in order to make it more manageable and quicker to download.default setting(默认设置):The computer or software settings made by the manufacturer. icon(图标):A small picture displayed on-screen to identify a command or file.password(密码):A code used to gain access (login) to a locked system.virus(病毒):A virus is a program that will seek to duplicate itself in memory and on disks, but in a subtle way that will not immediately be noticed.MPEG (运动图像专家组):Motion Picture Experts GroupOCR(光学字符识别软件):Optical Character Recognition.CSS(层次式样表):Cascading style sheetsextensions(扩展名):Files are identified by a three -letter or -number code, called an extension. cookie(小甜饼):A cookie is a small file that a web page on another machine writes to your personal machine’s disk to store various bits of information.applet(小Java程序):A small Java program that can be embedded in an HTML page.DSL (数字用户线路):Digital Subscriber LineStep TwoHelp the students to analyze the following long difficult sentences:ually used as a marketing term to describe a Web site that is or is intended to be the firstplace people see when using the Web.本句解释portal。
计算机英语章节知识点unit10
Unit Ten1networks have been split between wide area networks (WANs)and local area networks (LANs)between---- and :常用于difference, divide choose 和spilt 等词之后I asked him whether there was much difference between British and European law .我问他是否英国法律和欧洲法律有明显的不同。
2.A WAN is a network connected over long-distance telephone lines.Over :穿过,越过,翻到-----另一边Electricity cables stretch over the fields . 电缆穿过了田野。
3.It is now possible to connect up LANs remotely over telephone links so that they look as a single LAN.It 是形式主语,真正的主语是动词不定式connect upSo that : 以便(表示目的)connect up:连接。
Connect up the cells of a battery .联接电池组的各个电池。
4 at least : at any lowest estimate or figure .至少。
It will cost at least five pounds .3 a device that lets the computer talk to the network在make ,let ,have ,see, hear ,watch ,notice ,feel, 等动词后的复合宾语,不定式都不带to,I often hear them sing this song .5 The name TCP/IP refers to a suite of data communication protocols.a suite of: suit [swi:t] 作名词。
《计算机英语》Unit Ten
总结: 总结 : (all) in all, in conclusion, in short , in brief, on the whole, to conclude, to sum up 等 Above all, we should avoid deciding what we think about people different from ourselves without first having learned a great deal about them and the kind of they have to live.
2、有时用对比连接词或词组表示后面所说的 就是代替前面所叙述的,这样的连接词有: alternatively, rather, instead, an/the alternative is ..., but, than, it might be better if..., whereas 3、前面说过的内容是正确的,后面以对照形 式进一步说明前述内容正确时,可以用下面的 连接词: but, in spite of, however, despite of , nevertheless, on the other hand, nonetheless, even if , although, even if, though.
逻辑联系语
文章是由句子、句群、段落组成的。在文章的 各个组成部分之间存在一定的逻辑关系,这些 逻辑关系有的时候用一定的语言手段表示出来。 用来表示逻辑关系的语言手段叫逻辑联系语。 他们可以表示列举、增补、转折或对比、原因 或结果、解释、总结等关系。逻辑联系语的形 式比较杂,有副词、介词短语、不定式短语、 句子等。他们在句子里多出现在句首,有时出 现在句中,极少出现在句尾。下面按他们表示 的逻辑关系分别举一些例子。
计算机英语课件Unit 10 Cyberculture
To line—Here is where you type the e-mail address of the person to whom you are sending the e-mail. You can put multiple addresses on this line, allowing you to send your message to many people. cc and bcc lines—They are used to copy the message to people who are not the primary readers, like your supervisors or others who might be interested in your conversation. The cc line shows your message's recipient that others are receiving copies of the message too. The bcc line("blind cc") allows you to copy your messages to others without anyone else knowing.
Yes Can you receive and send messages? Can you forward documents to others? Can you receive and send attached documents? Do you sort your e-mail message into folders? Can you send one e-mail message to multiple peoples? Have you created and used a signature file? Are you on any mailing lists (listservs)? Do you know what flaming is? Do you know what spam is? Do you know what netiquette (network etiquette) is?
计算机专业英语教程第10章
Figure 10-5
2021/7/1
5
What is a Network?
Figure 10-6
Geographically, using both cable and air connections, networks range from
home to citywide and even international. Here let us have some idea of three
Besides cables, they use microwave relays and satellites to reach users over
long distances. The widest of all WANs is the Internet, which spans the entire
2
What is a Network?
This arrangement is common for sharing data stored on different microcomputers but not as efficient as the star network for sharing common resources (See Figure 10-3).
on a central host computer (Figure 10-2).
In a bus network, there is no host computer, and instead each device in the
network handles its own communication control. All communications travel along
第十单元课文译文 计算机英语 吕云翔
第十单元开始工作第一部分听说A. 对话:开始工作(祝贺Kevin成为Expansion公司信息系统部的一名新程序员!今天是他第一天工作,他将认识一些新同事并迎接一个全新的工作环境。
)Kevin:很高兴见到你,John先生,我叫Kevin,我很高兴能来上班。
John先生(公司首席技术官):欢迎你来到我们公司,Kevin。
你将在信息系统部工作。
那么,现在请让我向你介绍一下我们的同事。
(Kevin跟着John先生走进了办公室。
)John先生:大家好,今天我很高兴向大家介绍一位新同事,他叫Kevin,从今天起,将与大家一起工作。
Kevin:大家好。
A, B, C:你好,李先生,欢迎你!Kevin:谢谢,我刚刚毕业,这是我第一次在跨国公司工作,希望大家能帮我适应从学校生活到职业工作环境的过渡。
A:没问题,李先生,我是Jenny,负责办公室工作。
这是你的办公桌。
Kevin:非常感谢,Jenny小姐。
A:叫我Jenny就可以了。
公司中每个人都直接称呼名字,这是自公司成立以来就已经形成的传统了。
Kevin:好的,我尽量。
B和C:很高兴认识你,相信我们将在以后的工作中合作愉快!Kevin:我也是。
John先生:Kevin,你如果有什么问题的话尽管问,大家都很友好。
Kevin:没问题。
对不起,顺便问一下,你能告诉我,我的具体工作和责任是什么?John先生:这周大部分时间你将用来熟悉办公室的工作,并阅读你下周将要加入项目的相关文档。
还有其他问题吗?Kevin:没有了,相信以后可能还会有很多问题,谢谢。
(工作了一整天,现在是下班的时间了。
)Jenny:Kevin,已经工作了快一天了,工作感觉如何?Kevin:不错,谢谢你的帮助。
一整天都很忙,现在觉得有点累。
Jenny:我第一次在这里工作的时候,也有同样的感受。
不过一段时间以后,就感觉好多了,我相信你会很快适应的。
Kevin:嗯,我觉得工作效率很高,而且很有挑战性。
这里的每个人工作都很努力并且很合作,大家都具备很强的能力和专业技能。
《计算机英语(第4版)》课后练习参考答案
Unit Two/Section AI.Fill in the blanks with the information given in the text:1.input; output; storage2.Basic Input/Output System3.flatbed; hand-held4.LCD-based5.dot-matrix; inkjet6.disk; memory7.volatile8.serial; parallelII.Translate the following terms or phrases from English into Chinese and vice versa:1.function key功能键,操作键,函数键2.voice recognition module 语音识别模块3.touch-sensitive region 触敏区4.address bus 地址总线5.flatbed scanner 平板扫描仪6.dot-matrix printer点阵打印机(针式打印机)7.parallel connection 并行连接8.cathode ray tube 阴极射线管9.video game 电子游戏10.audio signal 音频信号11.操作系统operating system12.液晶显示(器) LCD (liquid crystal display)13.喷墨打印机inkjet printer14.数据总线data bus15.串行连接serial connection16.易失性存储器volatile memory17.激光打印机laser printer18.磁盘驱动器disk drive19.基本输入 / 输出系统BIOS (Basic Inpul/Output System)changes if necessary:An access control mechanism mediates between a user (or a process executing on behalf of a user) and system resources、such as applications, operating systems, firewalls, routers, files, and databases. The system must first authenticate(验证)a user seeking access. Typically the authemiccition function determines whether the user is permitted to access the system at all. Then the access control function determines if the specific requested access by this user is permitted. A security administrator maintains an authorization(授权)d-sbase that specifies what type of access to which resources is allowed for this user. The access control function consults this database to detemine whether to grant access. An auditing function monitors and keeps a record of user accesses to system resources.In practice, a number of com—cmetus may cooperatively share the access control function. All mii,戏systems have at least a rudimentary(基本的),and in many cases a quite robust. access control component. Add-on security packages can add to the witi*access control capabilities of the OS. Particular applications or utilities,such as a database management system, also incorporate access control functions. External devices, such as firewalls, can also provide access control services.IV. Translate the following passage from English into Chinese:入侵者攻击从温和的到严重的形形色色。
计算机英语教程lesson 10 v2
参考译文
示例 把所得税申报表译成密码可以阻止任何人读它。如果拥 有人要读它,必须解密。只有加密钥匙的持有人可以把 它输入到解密程序。但是,如果进入程序时别人也可以 读这个钥匙,那么纳税申报单的机密性就打了折扣。 其它依靠系统的机制也可以阻止对信息的非法访问。但 与加密信息不同,当这些控制失败或被绕开时,只通过 这些控制保护的数据可以被阅读。这样,其优点被相应 的缺点抵消。它们比加密更能保护数据的安全,但当它 们失效或被避开时,数据就可见了。 机密性也可以用于数据的存在,它有时比数据本身更有 意义。访问控制机制有时仅仅隐藏数据的存在,以避免 存在本身暴露应该保护的信息。
参考译文
1.2 完整性 完整性指数据或资源的确实性,并且它常常解释为防止 不适当或未授权的改变。完整性包括数据完整性(信息 的内容)和源完整性(信息的来源,通常叫做认证)。 信息的来源也许与它的精确性、可信性以及人对该信息 的信任有关。这个说法阐明了一个原理:被称为可信性 的信息完整性对系统的正常运作非常重要。 示例 一家报纸上可能刊登了从白宫泄露出来的消息,但给它 加上了错误的来源。这个消息按采集到的信息刊登(保 持了数据的完整性),但其来源是错误的(破坏了源完 整性)。 完整性机制可以分为两类:预防机制和检测机制。
Text
请老师朗读并讲解课文
参考译文
第10课 计算机安全概论 我们从保护系统不受到安全威胁的基本安全服务开始。安全机制 检测并阻止攻击而且成功的恢复系统安全。分析系统的安全性需 要理解机制所实施的安全策略,也需要了解相关的假设和信任 (这些假设和信任会带来威胁),还要了解这些威胁在多大程度 上可以实现。这些知识可以使人设计出更好的机制和策略已抵制 这些威胁。这个过程产生风险分析。人是任何一个系统安全机制 中最薄弱的环节。因此,策略和程序必须重视人。 1. 基本部分 计算机安全依赖机密性、完整性和有效性。正如它们所出现的环 境不同,这三个方面的解释也不同。在给定环境中的一种解释由 每个人、客户的需求及特定组织的规则决定。
计算机英语教程(双色版)参考译文
参考译文第1课计算机基础计算机是一个可编程的机器(或者更准确地说,一个可编程的连续状态机器)。
计算机有两种基本类型:模拟计算机和数字计算机。
模拟计算机是模拟设备,即它们有连续的状态而不是离散的有限状态。
一个模拟计算机可以准确地表示小数或无理数,不进行舍入。
模拟计算机几乎只用于实验环境。
数字计算机是可编程的时序状态机器。
数字计算机使用离散状态。
二进制数字计算机使用两个离散状态(如正/负、高/低、通/断)来表示二进制数0和1。
1. 计算机有什么用?计算机的用途非常广泛。
数据处理是商业和金融的工作。
这包括开票、运输及收货、库存管理和类似的业务以及“电子办公”。
科学处理是用计算机支持科学。
这可以是简单地收集和分析原始数据,也可以是复杂地建立自然现象的模型(如气候模型、热力学、核能等)。
多媒体包括创建内容(创作音乐、演奏音乐、录制音乐、编辑电影和视频、特效、动画、插图、排版印刷材料等)和多媒体播放(游戏、DVD、教学材料等)。
2. 计算机的各部分可以十分粗略简单地认为计算机有三个部件:处理器、内存和I/O(输入/输出)。
这三个术语的边界是十分含糊的、不搭界的和不断变化的。
稍微更简单地可以把计算机部件分为五种:算术和逻辑子系统、控制子系统、主存、输入子系统和输出子系统。
2.1 处理器处理器是计算机实际上进行计算的部件。
有时也称作MPU(主处理器单元)或CPU (中央处理单元或中央处理器)。
处理器通常包括运算器(ALU)、控制器(包括处理器标志、标志寄存器或状态寄存器)、内部总线,有时也有一些特殊作用的单元(最常用的特殊作用单元是用于浮点算法的浮点单元)。
一些计算机有多个处理器。
这就叫做多处理计算机。
数字处理器的主要种类有:CISC、RISC、DSP以及它们的混合。
CISC代表复杂指令集计算机。
大型计算机和小型计算机有CISC处理器,厂家为了竞争提供了更有用的指令集。
大部分前两代微型处理器都用CISC。
RISC代表精简指令集计算机。
计算机英语 刘艺 王春生 第4版 Unit 10A
不仅雇员,而且有些供应商或客户也可能有机会访问公司的计算机 系统。使用自动柜员机(取款机)的银行客户就是一例。像雇员一样,这 些授权的用户可能获取秘密口令,或者找到进行计算机犯罪的其他途径。
Q:What is a hacker? What is the difference between hacker and cracker? (3) “Hackers” and “Crackers” Some people think of these two groups as being the same, but they are not. Hackers are people who gain unauthorized access to a computer system for the fun and challenge of it. Crackers do the same thing but for malicious purposes. They may intend to steal technical information or to introduce what they call a “bomb”—a destructive computer program—into the system.
2、计算机犯罪 计算机犯罪可能采取各种形式,包括: (1)破坏 不满的雇员有时企图破坏计算机、程序或文件。近年来,计算机病 毒已是臭名远扬。病毒是一种程序,在网络和操作系统中“迁移”,并 附加到不同的程序和数据库上。
A variant on the virus is the worm. This destructive program fills a computer system with self-replicating information, clogging the system so that its operations are slowed or stopped. The most infamous is known as the Internet Worm. In 1988, it traveled across North America, stopping thousands of computers along its way.
计算机专业英语课文的翻译 中文 (10)[5页]
第10单元计算机安全与隐私第一部分听力和对话对话:使用杀毒软件(Sophie的电脑不幸感染了恶意的电子邮件附件。
现在,她正努力寻找一些措施,用来有效地治疗和保护她的计算机不受病毒感染。
)Mark:我认为杀毒软件在上网时是一个主要的措施。
Henry:是的。
我同意。
杀毒软件是这样一种实用程序软件,它能够寻找并去除病毒、木马、蠕虫和恶意软件。
它适用于所有类型的计算机和数据存储设备,包括智能手机、平板电脑、个人计算机、闪存、服务器、PC机和Mac机。
Sophie:你能否推荐任何有信誉的杀毒软件让我使用?Mark:没问题。
流行的杀毒软件包括Norton AntiVirus、Kapspersky Anti-Virus、F-Secure Anti-Virus、Windows Defender和Avast等。
Sophie:杀毒软件如何起作用?Henry:现代的杀毒软件在幕后运行,并且企图识别存在于设备内的作为下载、电子邮件、附件或网页的恶意软件。
查找恶意软件的过程有时称为扫描或实现病毒扫描。
要识别恶意软件,杀毒软件可以查找病毒特征值或实现启发式分析。
Sophie:当查到恶意软件后会怎样呢?Mark:当杀毒软件查到恶意软件后,它可以试图去除感染,将这个文件放到隔离区,或仅仅是删除这个文件。
Mark:尽管偶尔查不到,但是杀毒软件和其他的安全软件模块能够不断地删去感染设备的恶意软件。
要点是使用安全软件,但是进行额外的预防措施也很重要,如定期备份数据,并且避开靠不住的软件销售商店。
Sophie:我如何保证我的杀毒软件正在运行?Mark:杀毒软件往往是我们习以为常的数字生活的一部分。
我们假定它已安装并执行它的工作。
Henry:但是杀毒软件可能无意中被禁用。
它的配置可以被通过设法潜入设备的恶意软件所改变。
在试用或订阅到期后,杀毒软件会失效。
保证杀毒软件正确地执行也许需要用户定期的介入。
Mark:而且许多杀毒产品在任务栏或通告区会显示一个图标。
计算机英语教程unit 10
Notes
[3] Another design goal was to give developers the tools they need to build
powerful, sophisticated database solutions that seamlessly integrate with enterprise-wide data while ensuring forward and backwards c ompati bil ity wit h ne w and e xi sti ng data ba se soluti ons . 本句中,动词不定式短语to give developers the tools做表语;they need 是一定语从句,修饰 the tools ;动词不定式短语 to build powerful, sophisticated database solutions 做目的状语; that seamlessly integrate with enterprise-wide data也是一定语从句,修饰 database solutions , while ensuring forward and backwards compatibility with new and existing database solutions是一时间状语, 修饰integrate with,while表示动作同时进行。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
1.2 Computer Virus
• II. Choose the best answer to each of the following questions.
1.1 Computer Security
• II. Choose the best answer to each of the following questions.
C
– 1.What is the primary difference of computer security from some other computer science fields? – A.Its varied objectives – B.Its positive enforceable rules – C.Its negative requirements – D.Its impractical for most computer programs
1.1 Computer Security
1. Introduction
2. Security Architecture 3. Hardware Mechanisms that Protect Computers and Data 4. Secure Operating Systems 5. Secure Coding 6. Applications
1.1 Computer Security
• II. Choose the best answer to each of the following questions. B – 3.Which of the following is NOT argued in the instances of computer security accidents in aviation? – A.Human error – B.Computer malfunction – C.Hackers intruding – D.Electromagnetic interference
– ___1.Computer security is a branch of technology arranged under information security category. – ___2.Physically limiting access to computers is approximately one of the strongest approaches to improve computer security. – ___3.Computer programming strategies are often considered as the most dependent approach for computer security among others. – ___4.In aviation, transmitting unauthorized communications over specific radio frequencies may spoof air traffic controllers or simply disrupt communications altogether. – ___5.The issues of computer security are an indispensable part of maintaining an operational industry.
1.2 Computer Virus
• Exercises • I. Read the following statements carefully, and decide whether they are true (T) or false (F) according to the text.
– ___1.Windows is by far the most popular operating system for virus writers due to their market dominance. – ___2.Bugs in software generally means potential exploits for the spread of viruses. – ___3.The method of using a heuristic algorithm to find viruses can detect viruses which haven’t yet been defined in the current database of known virus ―signatures‖. – ___4.The backups on CD/DVD are always safe because the media becomes read-only and can no longer be affected by a virus. – ___5.Anti-virus software can enhance the underlying capability of host software to prevent viruses transmitting.
1.1 Computer Security
• Complex Sentences
– Original: If the operating environment is not based oin a secure operating system capable of maintaining a domain for its own execution, and capable of protecting application code from malicious subversion, and capable of protecting the system from subverted code, then high degrees of security are understandably not possible.
– Translation:如果操作环境不是基于一个安全的操作系统——能够 维持自己的执行域,并能保护应用程序代码免受恶意破坏,以及 保护系统免受破坏代码损害,那么高安全程度是显然不可能的。
1.1 Computer Security
• Exercises • I. Read the following statements carefully, and decide whether they are true (T) or false (F) according to the text.
1.1 Computer Security
• III. Translating.
– 1. Original: The objective of computer security includes protection of information and property from theft,corruption or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. – Translation: – 2. Original Other accidental and intentional faults have caused significant disruption of safety critical systems throughout the last few decades and dependence on reliable communication and electrical power only jeopardizes computer safety. – Translation:
• Part 2 Simulated Writing: Business Letter • Part 3 Listening and Speaking
– Dialogue: Using Anti-virus Software
– Listening Comprehension: Hacker and Cracker – Dictation: Father of the Mouse — Doug Engelbart
1.2 Computer Virus
1. Introduction
2. Infection Strategies 3. Vulnerability and Countermeasures
4. Disadvantages
1.2 Computer Virus
• Complex Sentences
– Original: Just as genetic diversity in a population decreases the chance of a single disease wiping out a population, the diversity of software systems on a network similarly limits the destructive potential of viruses. – Translation:正像在种群中的遗传多样性降低了某种单一疾病灭绝 种群的可能性,网络中软件系统的多样性也类似地限制了病毒的 破坏性潜力。
1.2 Computer Virus
• II. Choose the best answer to each of the following questions.
B
– 1.Which of the following is RIGHT about the infection strategies of viruses? – A.Viruses may take advantage of present network services to facilitate their spread – B.All original viruses must modify the copies in metamorphic viruses for spread – C.The success of viruses all relies on their fast infection rate to spread – D.All viruses pretend that they are executable files in order to replicate themselves