新视野大学英语读写教程第五册 课后答案 unit 7
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
新视野大学英语读写教程第五册课后答案 unit 7
Unit seven
Comprehension of the Text
1. It is a macro virus spread through an e-mail attachment.
2. It spreads through a Microsoft Word 97 or Word 2000 e-mail attachment that, when opened,
activates a macro through the Microsoft Outlook program and e-mails itself to the
first fifty
names in the address book of the infected computer.
3. Its most striking characteristic is its ability to propagate itself across a vast number of systems in the commercial, government, and military realms in a very short period of time.
4. Commerce could be jeopardized, either because no information could be passed using the
Internet or because information passed over the Internet might be considered unreliable.
Many businesses now rely on the Internet as a primary or even sole carrier of information.
If the Internet ceased to function, the consequent losses could ultimately be measured in tens
of billions rather than millions of dollars.
5. First, use virus protection software packages available on the market that can detect, clean,
and attempt to predict suspicious program behavior.
Second, be careful about what they take from the Intemet and avoid being too hasty in opening
attached files, both from known users and especially from users unknown to them.
6. System administrators should quickly report computer assaults and viruses to the
government organizations.
7. First, be careful about attached files sent to us. Second, use up-to-date virus protection in our
computers.
8. According to the author, tough laws regarding computer crime should be formulated to
discourage people from creating or distributing more viruses.
9. It is easy to write and distribute destructive viruses. Their motivation is such that only tougher
laws regarding computer viruses are enough to discourage them.
10. Though seemingly the author did not state his attitude clearly in the text, the author showed
his disapproval of computer viruses by first drawing attention to the serious damage caused
by viruses and then introducing possible solutions.
Vocabular~
1. propagated
2. startled
3. activate
4. jeopardize
5. disrupted
6. erased
7. blunting
8. insulate
9. cumulative 10. hasty 11. formulate 12. intent
Exercises on CD and web course only: 13. disclosed 14. vulnerable 15. disabled 1. intent on making 2. discouraged from
3. engaging in
4. in doubt
5. by means of
6. in essence
7. vulnerable to 8. In the case of
9. serve as 10. hooked up to
l 1. in circulation 12. As yet
Exercises on CD and web course only: 13. shut down 14. in the spectrum of 15. attach.., to
1. lights
2. course
3. story
4. club
5. fever
6. feature
7. business
8. risk
Exercises on CD and web course only: 9. home 10. workshop
Translation
--BI
1. Cyberspace communication is expanding by leaps and bounds, with millions of people
browsing websites daily.
2. The Chinese media are formulating new plans in order to increase their presence on the
Intemet to meet the challenges of the virtual era.
3. The new system now allows faxes to be sent round the world with minimum effort and
maximum security.
4. Because of its interactivity and accessibility, the Intemet has activated new interest in homestudy
programs.
5. The invention of the electronic word processor was as startling an information revolution as
the invention of the printing press.
6. Digital cameras aren't available for everybody -- at least, not yet. While cheaper than before,
they are by no means cheap.
7. Aworkaholic is a person who works too much. Aworkaholic lives to work, rather than works
to live.
8. It is not cheap to raise pets in the city. In the case of a dog, registration may be
the city's Dogs Supervision Office for a fee of about 2,000 yuan a year.
9. Recently, we have witnessed a number of young people who, for a variety of sociological and
psychological reasons, have become attached to their computers, and are exploiting their
potential in a criminal manner.
10. Whether it is worth investing in the long term is still in doubt.
Let's assume you are a sports fan. What is your first reaction when you find in your
e-mail
an attachment called "Anna Kournikova.jpg.vbs'? Curiosity tempts you to open the document
to have a look at the Russian tennis star. But if you open it, the virus will be activated and will
copy the attachment to every e-mail address in your "Outlook Express", spreading the virus even
farther. E-viruses, which flood the Intemet through dubious e-mails with fancy bait, make
production of anti-virus programs a profitable business.
1.无法使用互联网传递信息或者互联网传递的信息无法保证其可靠性,就可能危及商业活动。
2.如果互联网无法运作,随之而来的损失最终可能会高达数百{乙美元,而不是数百万美元了。
3.令专家们震惊的是,这种病毒能够在极短的时间内迅速地在商业、政府和军事领域的系统内
进行传播。
4.用户需要小心处理从互联网上获得的信息,避免仓促打开附件,无论是来自于认识的用户还
是不认识的用户,尤其是后者。
5.它的发生给政府和私营部门都敲响了警钟,提醒他们重视恶性病毒在互联网上传播所带来的
威胁。
6.因为编写和传播破坏性病毒轻而易举,所以预防病毒最有效的方法就是阻止人们从事这种活
动。
7.要让蓄意传播类似梅利莎病毒的电脑罪犯知道,他们一定会受到迅速严厉的惩罚。
8.病毒的快速传播是通过发送超过电子邮件系统处理能力的信息,使电脑网络功能退化,或使
其运行受阻。
其结果是,一些网络被迫中止服务,因为从系统中清除该病毒时,那些网络必
须关闭。
9.令人恐惧的是,这些宏命令可用来使受害者电脑在其不知情的情况下通过电子邮件把硬盘驱
动器上存放的敏感和秘密文件发送给他人。
10.至今我们还不能确切估算出与该病毒有关的工作效率损失和其他破坏所造成的累计经济损失。
Essay SummarYlrI
I.A 2. C 3. D 4. D 5. A 6. C 7. B 8.^ 9. B 10.A
II.C 12. D 13. B 14. C 15. C 16. B 17. C 18. D
19. C 20. D
Structured Writing
Nimda is a new network-aware, mass-mailing virus. Nimda attacks at least a dozen known
vulnerabilities on systems running Microsoft liS, and can also spread via open shares to other
connected machines on a network.
Then how to prevent Nimda from attacking your system?
First, don't open attachments! One of the best ways to prevent virus infections is not
to open
attachments, especially when viruses such as this one are actively circulating. Even if the e-mail
message is from a known source, be careful. A few viruses take mailing lists from an infected
computer and send out new messages with their destructive payload attached. Second, get protection. Install virus-protection software on your machine. Simply download
any of the top-rated programs and follow the installation instructions.
Third, scan your system regularly. Scan your entire system when loading anti-vires software
fbr the first time. lt's better to start with your PC clean and free of virus problems. Make it a regular
habit to scan for viruses.
Fourth, update your anti-virus software. Make sure your virus protection software is up-todate.
Some anti-virus protection programs have a feature that will automatically link to the lnteruet and add virus detection code whenever the software vendor discovers a new threat.
(Words: 171, not including the first
paragraph)
Comprehension of the Text
1. Processing had slowed to a crawl. Employees at the firm couldn't print documents, change
screens or even move their pointer without enduring long delays.
2. They ran some tests first. Their repeated attempts to delete the bad software were to no avail,
as each time the hacker would again break into the network to reinstall it. Finally they were
successful by installing a hardware security device.
3. They can destroy databases, steal trade secrets, erase hard drives and make public a company's
confidential client information. They can halt e-commerce through "denial of service" attacks, damage websites, commit financial fraud and pretend to be merchants by diverting
customers to fake websites.
From remote locations, hackers also can convert a computer into a listening device and
overhear or record anyone talking in the vicinity of the computer. They can use other programs to manipulate company computers via the Internet.
4. No, because hackers who sneak into others' system don't search for a name, they search for
a weakness.
5. They can minimize their risks by conducting weakness appraisals, choosing experienced
security personnel, and establishing- and then enforcing- robust security policies and procedures.
6. Run background checks on any individuals who will be given privileged access to the
company's computer systems.
Limit employees' access to the computer system, by implementing effective password management systems, such as "two-factor" access. Strengthen internal security practices
that minimize the risk of employees' passwords becoming available to others.
7. Individuals assume false identities (as utility workers, telephone repairers, messengers, or
computer technicians) to deceive employees into disclosing their passwords and other information. Some hackers even take temporary positions on night cleaning crews so they can
browse files, poke through trash or install devices to extract information.
8. Don't type their passwords and other confidential data when others are nearby. Employees
should never reveal passwords (even when asked by a network administrator). Other reckless
behavior to be avoided includes keeping "password reminders' on monitors, tacked to cork
boards, or under keyboards. Under no circumstances should employees select
easy-to-guess
passwords such as their nickname or the name of their child, spouse, pet or car. Whenever possible, employees should create seven-character passwords consisting of small
and capital letters, numbers and symbols.
9. Hackers sometimes employ "dictionary attacks" -- running programs that try every word
in the dictionary -- to crack passwords.
10. Anti-virus software, which searches hard disks for recognized viruses, isn't perfect. New
viruses (which the software cannot yet detect) are let loose daily. And clever hackers can
sneak notorious ones, such as the Melissa virus, past the programs by compressing the vires'
file size, or by using tools to attach the viruses to legitimate programs such as cartoons or
greetings.
Even with the best security defenses in place, companies' networks and intellectual property
still may be vulnerable to insiders.
Vocabulary
I. baffled 2. diverted 3. refrain 4. extract
5. revenge
6. vicinity
7. confidential
8. slack
9. straightforward 10. deduced 11. browsed 12. presume
Exercises on CD and web course only: 13. robust 14. sneak 15. reckless
1. with
2. in
3. into
4. via
5. to
6. into
7. in
8. for
9. from 10. of 11. of 12. into
Exercises on CD and web course only: 13. to 14. to 15. from
Section
Reading Skills
1. Writing and distributing destructive viruses, stealing and changing the information in other
people's computer systems without their knowledge or permission are considered to be
computer crimes.
2. Tough laws have been formulated and enforced against computer crimes, such as hacking.
These criminals are arrested, tried and prosecuted for their computer crimes.
3. As computer crimes are very new ones people might have different views on judging whether
the law and the court are being fair in penalties.
4. According to what we have learned about "insiders", "outsiders" might refer to those people
who have not been authorized access to the target computer system and are not familiar with
the security situation of that system, and as a result they are not likely to cause great damage
than insiders.
5. Morris probably faces 18 to 24 months in prison. His maximum penalty would be five years
and a $250,000 fine.
Comprehension of the Text
El
1. F
2. T
3. F
4. F
5. F
6. F
7. T
8. T
9. F 10. T
PART II
~'kEY TO EXERCISES
Pre-reading Activities
--nnwwmm~
What is the place of basic old-fashioned values -- such as honesty, kindness and generosity
-- in the consumer culture of today's society? That's the question the writer asks after reflecting
on a newspaper story about a little boy who found some lost money and returned it to its owner.
What bothers the writer is that some of the teachers at the boy's school were not happy with the
token reward for his good deed. They wanted more. The author, on the contrary, thinks that a good
deed itself is its own reward. Any external stuff corrodes the integrity of human beings. Inner
peace and happiness do not rely on material incentives. (Words: 108)
The purpose of this passage is to familiarize the students with the main idea of Passage A,
so that their reading will be better focused. By listening to this passage, the students will be able
to get a general idea of the reading passage: it is about moral values, such as honesty, kindness
and generosity.
The students are encouraged to get whatever answers they may think of for the questions.。