已阅读5页,还剩5页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
Unit Eight Lead in 1 business 2 communicating 3 discover 4 type in 5 invention 6 get along 7 opposition 8 create 9 memory 10 available Passage A Think About It 1 Yes I often do as I like to explore the potentialities of the Internet Many people also welcome free software because they don t have to pay for it Others don t do so because there is no protection guaranteed against viruses 2 There are different kinds of anti virus software e g Norton Rising Star and some others The computers I use in the library all have one kind or another of software installed to prevent viruses from being brought in 3 When old types of viruses have been taken care of new ones may appear It would be impossible to get rid of computer viruses permanently Read About It Content Awareness Read And Think 2 Work with your partner and answer the following questions 1 They turned to the IT staff in their company for help 2 Viruses such as Melissa the Love Bug etc 3 No they aren t They forget about the harm a computer virus may bring when that virus is off news headlines 4 They open unsolicited attachments and download unauthorized software 5 Open 3 Choose the best answer to each question with the information from the passage 1 B 2 A 3 D 4 A 5 C 4 Fill in the blanks with the words given below Change the form where necessary 1 adequate 2 vitally 3 document 4 distribution 5 urban 6 potential 7 continual 8 infecting 9 threat 10 updated 5 Complete the following sentences with phrases or expressions from the passage Change the form where necessary 1 let down 2 came across as 3 in the back of mind 4 as a matter of course 5 cleaning up 6 Choose one word from the box below to replace the underlined word in each sentence change the form where necessary 1 encountered 2 detected 3 transmitted 4 pirated 5 inflicted 7 Translate the following sentences into English 1 In pursuit of a healthier diet people are eating more fish than they used to 2 We need to have the roof repaired before the bad weather sets in 3 The disease is spreading and all young children are at risk 4 The information is transmitted from one computer to another through a telephone line 5 Jack is a fairly good runner He wins more often than not 8 Read and compare the English sentences paying attention to their italicized parts and then translate the Chinese sentences by simulating the structure of the English sentences 1 It sounds like this high tech company has put in place many favorable measures to protect against brain drains 2 The worry comes when paper mills ignore the environmental pollution in pursuit of profits 3 It s vitally important that one attend a test preparation class before taking a TOEFL test but this cannot be a one off event if he really wants to have a good command of English 4 The potential threat should always be in the back of a doctor s mind and appropriate measures should be taken in no time once emergency arises 5 In the end sciences and education are the keys to a prosperous country and this is a continual process 9 Computer viruses are a constant threat to companies and other organizations as well as home users Work in small groups and have a discussion about how computer viruses spread and how companies should protect against computer viruses Computer viruses can be transmitted via e mail attachments They also spread through software downloaded from the Internet So when you are downloading the unlicensed and pirated software you are likely to put your computer at risk The software can seem harmless enough but they could easily be harboring a dangerous virus To protect against computer viruses we should be careful when opening e mail attachments and downloading software We should use anti virus software and update it regularly As for companies they should not only take measures by investing in anti virus software but also pay enough attention to the education of their employees While the employees may suddenly become aware of the virus threat when the threat is there they soon forget about it as the stories disappear from the news headlines So it is important that companies constantly educate the users about the virus threat and ask them to practice safe computing 10 Write a paragraph of around 80 words explaining that companies should do more than invest in anti virus software to protect against computer viruses The following points may help you to organize your writing And the first sentence has been written for you To protect against computer viruses companies should do more than invest in anti virus software on the desktops servers and email gateways It s true that anti virus software updated regularly can protect the companies defences to a large extent The employees however may use office computers for personal amusement When they are opening unsolicited attachments or downloading unauthorized software they probably are putting the company at risk for the attachments and the software could easily harbor dangerous viruses Therefore it is very important that companies should constantly educate their employees about the virus threat and remind them about what would happen if they let their guard down Passage B Think About It 1 Yes my e mail pin was once hit by hackers and I couldn t enter it any more 2 Companies or individuals who wish to avert computer security issues should put security systems in place From a hacking perspective each server is open to attack so each must possess its own anti virus and spyware systems and continued oversight must be given to each of these security systems 3 Not all hackers are criminals Bored in school very adept with computers and technology they download scripts or hack into systems with the intent to vandalize or disrupt systems They like to see themselves as elite They have a lot of programming background and write code but won t use it themselves Underlying the psyche of the criminal hacker may be a deep sense of inferiority Consequently the mastery of computer technology or the shut down of a major site might give them a sense of power Read About It Content Awareness Read And Think 11 Work with your partner and answer the following questions 1 He flied to Seattle for a job with a company called Invita Security 2 The company lured them to break into the networks of potential customers as part of an effort to persuade those companies to hire Invita to keep hackers out 3 They were stopped and caught by FBI 4 It is a marked legal milestone when courts could uphold the right of federal agents to seize evidence remotely and to charge foreign cyberciminals in U S courts 5 According to them the most captivating aspects of being a hacker are psychological for it makes them feel like playing a thrilling game which is full of adventures 12 Decide whether the following statements are true T or false F according to the passage 1 F 2 F 3 F 4 T 5 F 13 Fill in the blanks with the words given below Change the form where necessary 1 regaled 2 breached 3 captivating 4 entrepreneurial 5 conspire 6 restitution 7 extorted 8 tactic 9 milestone 10 lodging 14 Complete the following sentences with phrases or expressions from the passage Change the form where necessary 1 hacker 2 break into 3 charge 4 benefit 5 bring along 15 Translate the following sentences into English 1 As the statistics demonstrates we have made great progress in this field in a short period of time 2 The exploits of great leaders have been told in songs and stories 3 It is a long way Let s take turn driving 4 It turns out that it is the banker rather than the computer fault that has caused the disaster 5 They must take practical measures to carry out their plan otherwise it will end in smoke 16 Finish the following incomplete outline of paragraph 1 of the passage A Hacker Story Then reread the whole passage and write a summary of it 1 Ivanov and his fellow partner flew to Seattle Invita informed them about the job requirements 2 20 year old Russian hacker Alexey Ivanov was lured to Seattle in hopes of landing a dream job with Invita At the Seattle interview Ivanov impressed the interviewers with tales of hacking exploits and demonstrations of his skills But as he and his Russian colleague were being driven away they were arrested by FBI agents and were charged with conspiracy computer fraud hacking and extortion The most important gain from the Ivanov case may be the legal milestones marked when courts upheld the right of federal agents to seize evidence remotely and to charge foreign cybercriminals in U S courts Nevertheless important cyberlaw questions remain unanswered The motivations of hackers are psychological as much as financial 17 Reduce the number of words in these sentences by making the introductory dependent clauses elliptical Write out the revised sentences 1 Although expecting a telephone call the doctor had to leave his office 2 While driving into town my mother ran out of gas 3 If curious about your final grade ask your professor 4 When applying for a scholarship you should write neatly 5 After cutting the grass please water it 18 Choose the correct pronoun to complete each sentence Write out the complete sentence Then write after each sentence the elliptical clause beginning with than or as 1 You worked harder than they than they worked 2 Michael is more popular than he than he is 3 They don t dance well as we as we dance 4 Do you like to drive as fast as they as they drive 5 I can do the job better than she than she does 19 Rewrite the following sentences so that major ideas receive proper emphasis Rely upon the suggestion in parentheses 1 Refer to page 321 and you will find that the major character is over six feet tall 2 Because the immigrants will gain economic power speaking the immigrants language will become more im
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2026年智慧工地管理系统开发合同
- 2026年医疗市场监督协议
- 房地产物业合同范本及注意事项
- 小型工厂高清视频监控系统方案
- 2025年偏远地区低空医疗救援无人机应急响应策略报告
- 商业地产租赁管理合同范本
- 工厂设备保养计划与记录模板
- 劳务派遣合同范本及签订指南
- 连锁超市库存管理与供应链优化方案
- 幼儿园春季活动安全保障方案
- 云数据中心规划建设方案
- 矫形用物品产品原材料供应与需求分析
- 2024年上海市中考语文备考之现代文阅读作家明前茶及梁晓声相关阅读训练
- 咨询服务询价函+报价单(实用模板)
- 无人驾驶汽车的成本效益分析
- 生物多样性与气候变化课件
- 实验室漏水事件应急预案
- 初一语文练习册
- 建设项目使用林地可行性报告编制规范
- YY/T 0031-2008输液、输血用硅橡胶管路及弹性件
- GB/T 12152-2007锅炉用水和冷却水中油含量的测定
评论
0/150
提交评论