学术英语摘要
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Text1 How do computer hackers “get inside” a computer
Abstract:Computer vulnerabilities are often utilized by hackers or crackers. The security of each computer is challenging. This paper firstly redefines the term “hacker”, “cracker” and “getting inside” the computers and describes the procedure in detail. The term “unauthorized user” (UU) will be a better choice for defining the insider group. The known and unknown vulnerabilities will be taken advantage of by UUs ranging from poor password protection to leaving a computer turned on and physically accessible to visitors in the office. The first step of employing technical exploits will be the determination of the specifications of the target system. There are two ways of attacking including being through capabilities inherent in hypertext transfer protocol (http) and being preprogrammed against specific vulnerabilities and launched without any specific target. The variability of hacking action including the weak system and the strong system warns the users to choose the right way to protect the computer and do not authorize the computer to others easily. Lastly, the solution of avoiding vulnerabilities has been given, including updating patches, making complex passwords, getting information only from the reliable websites or services, updating anti-virus software and backing up the data to protect the computer not being hacked.
Text 3 Advantages of Cloud computing
Abstract:Cloud of computing is allowing you to use services that include infrastructure applications, and storage space for a nominal fee. It should be able to quickly allot and relieve resources whenever required by clients and cater to the needs of clients without having to involve clients into management of the service and have real- time backup to offer maximum up time clients. The type of cloud services includes software as a service, platform as a service, infrastructure as a service .The advantages of cloud computing under green computing include reducing the consumption of electricity while also reducing emissions that damage the environment ,saving the environment while also saving on the expenses incurred due to a demand for expansion ,and allowing you to let you employees telecommute. Then, here is a summary about the advantages of cloud computing: remote accessibility, easy expansion, security and environmentally friendly.
Text5 Can You Compete with A.I. for the Next Job?
Abstract: With the development of social and technology, Artificial intelligence may replace human jobs in the future. There are a lot of news that reported artificial intelligence has play a important role in our life. For decades, People wrote about how machines replace humans. It will be better or ill. But all expected did not come. Around the time of the Revolution, Most of Americans worked in the farm. They farmed to keep themselves alive. With the development of traffic, Farming increasingly became a cash business. But as the agricultural industry grew, there are fewer and fewer workers who worked at farming and ranching. Today agricultural provides fewer than two million jobs. Because of automation happened. It brings better plows,