学术英语(理工)讲义+课后习题解答.ppt_第1页
学术英语(理工)讲义+课后习题解答.ppt_第2页
学术英语(理工)讲义+课后习题解答.ppt_第3页
学术英语(理工)讲义+课后习题解答.ppt_第4页
学术英语(理工)讲义+课后习题解答.ppt_第5页
已阅读5页,还剩435页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

,学术英语理工,AcademicEnglishforScienceandEngineering,Unit1ChoosingaTopic,UnitContents,1Decidingonatopic2Formulatingaresearchquestion3Writingaworkingtitle4Enhancingyouracademiclanguage(穿插在以上各版块中),Unit1ChoosingaTopic,1Decidingonatopic,PrinciplesofDecidingonatopicTask1NarrowdownandevaluatetopicsTask2DiscussTask3ReadText1andText2andanswerquestionsText1HowDoComputerHackers“GetInside”aComputer?Text2ElectronicThreatsofaComputerTask4ListentoLecture1,2and3andanswerquestionsLecture1QuestionsLecture2QuestionsLecture3Questions,Unit1ChoosingaTopic,1Decidingonatopic,Fourprinciplesofdecidingonatopic,Interesting,Important,Manageable,Adequate,Unit1ChoosingaTopic,1Decidingonatopic,CityDevelopmentSustainableDevelopmentofCitiesSustainableDevelopmentofBigCitiesSustainableDevelopmentofChineseBigCitiesSustainableDevelopmentofChineseBigCitiesfromtheBiologicalPerspective,Unit1ChoosingaTopic,1Decidingonatopic,Unit1ChoosingaTopic,1Decidingonatopic,Unit1ChoosingaTopic,1Decidingonatopic,Whatisthemainideathateachessaytriestoillustrate?,Text1illustrateshowhackersorunauthorizedusersuseonewayoranothertogetinsideacomputer,whileText2describesthevariouselectronicthreatsacomputermightface.,Inwhichaspectdothetwoessayssharethesameidea?,Bothfocusonthevulnerabilityofacomputer.,Unit1ChoosingaTopic,1Decidingonatopic,Inwhichaspectdothetwoessaysdiffer?,Text1illustrateshowhackersorunauthorizedusersuseonewayoranothertogetinsideacomputer,whileText2describesthevariouselectronicthreatsacomputermightface.,Unit1ChoosingaTopic,1Decidingonatopic,Whattopicdoeseachessayaddress?DoyouthinktheyareappropriateaccordingtothefourprinciplesmentionedonPage2?,缺答案,Unit1ChoosingaTopic,1Decidingonatopic,AdditionalquestionsforyourunderstandingofText1,1Whatdoes“unauthorizeduser”referto?,Thistermcoverstheentirerangeoffolks,fromthoseinvolvedinorganizedcriminalactivitiestoinsiderswhoarepushingthelimitsofwhattheyareauthorizedtodoonasystem.,Unit1ChoosingaTopic,1Decidingonatopic,AdditionalquestionsforyourunderstandingofText1,2Whatsthedifferenceofknownandunknownvulnerabilities?,Thistermcoverstheentirerangeoffolks,fromthoseinvolvedinorganizedcriminalactivitiestoinsiderswhoarepushingthelimitsofwhattheyareauthorizedtodoonasystem.,Unit1ChoosingaTopic,1Decidingonatopic,AdditionalquestionsforyourunderstandingofText1,3Howtoprotectyourselfagainstcomputerattacks?,Makesureyouhaveallthelatestpatchesforyouroperatingsystemandapplications;Makesureyourpasswordiscomplex;ConsidergettingahardwarefirewallandlimitingtheflowofdatatoandfromtheInternettoonlythefewselectportsyouactuallyneed;Makesureyouranti-virussoftwareisup-to-dateandcheckfrequentlytoseeiftherearenewvirusdefinitionsavailable;Backupyourdata.,Unit1ChoosingaTopic,1Decidingonatopic,Enhancingyouracademiclanguage,Matchthewordswiththeirdefinitions.,5c,10i,1g,2a,3e,4b,6d,7j,8f,9h,Unit1ChoosingaTopic,1Decidingonatopic,Enhancingyouracademiclanguage,Matchthewordswiththeirdefinitions.,1a(n)(象征的)gestureoflove2Thepublisher(分发)thebookinAsia.3A“”(地点)isaplace,andsoawebsite.4a(n)(复杂的)networkofsystems5beusedto(识别)potentialterrorists6dealthematterwithhim(完全地)7startwithapretty(直截了当)question8beyondthe(功能)ofthecomputers9hitthe(目标)atadistance10thepersonnever(尝试)todoanythingmore11ahighlysophisticated(过程),symbolic,distribute,site,complex,identify,physically,straightforward,capability,target,attempt,process,Unit1ChoosingaTopic,1Decidingonatopic,Enhancingyouracademiclanguage,Matchthewordswiththeirdefinitions.,12workwithinthe_(限定因素)oftimeandbudget13thanksforyourkind_(解释)14usemany_(专业的)terms15Prices_(变化范围)from340U.S.Dollarsto390U.S.Dollars.16_(开拓)anewmarketinthecity17beabsorbedinthesocial_(社交网络)18_(涉及)unnecessaryextracharges19onlyone_(实例)outofmany20gettoknowmoreaboutthe_(具体的细节)ofthewedding21_(陪伴)withhertowatchmovies,parameter,interpretation,technical,range,exploit,networking,involve,instance,specification,accompany,Unit1ChoosingaTopic,1Decidingonatopic,Enhancingyouracademiclanguage,Completetheparagraph,Whenitcomestocloudcomputing,itisoftenworriedthatcloudcomputingisnotreliable,theworries(从到)“Ilosecontroloverthesystemwithcloudcomputing”to“Myfilesarenotsecurewithcloudcomputing”.Actuallytheworries(来自于对误解)ofcloudcomputing.Althoughthesecurityofcloudcomputing_(留下很多问题没有得到解决),it(打开了通道)thefuturedevelopmentofcomputers.Henceabetterunderstandingofanewtechnology(需要有新的思想)_.,rangingfrom,arisefromsomemisunderstandings,leavesalotofproblemsunsolved,opensapathfor,requiresadifferentframeofmind,Unit1ChoosingaTopic,1Decidingonatopic,Enhancingyouracademiclanguage,TranslatethefollowingsentencesfromText1intoChinese.,有些人声称黑客是那些扩宽知识界限而不造成危害的好人(或即使造成危害,但并非故意而为),而“破碎者”才是真正的坏人。,2这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。,3那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。,Unit1ChoosingaTopic,1Decidingonatopic,Enhancingyouracademiclanguage,TranslatethefollowingsentencesfromText1intoChinese.,5另外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在仅有的几个你真正需要的端口,如电子邮件和网站流量。,4另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的是攻击到尽可能多的潜在目标。,Unit1ChoosingaTopic,1Decidingonatopic,AdditionalquestionsforyourunderstandingofText2,1WhatareTrojanhorses?,Trojanhorsesareastringofrecentspecimensdesignedtosnatchpasswordsorcreditcardinformationandinstallprogramsthatcanbeusedtoremotelycontrolinfectedmachines.,Unit1ChoosingaTopic,1Decidingonatopic,AdditionalquestionsforyourunderstandingofText2,2Whatstherespectiveaimsofphishingandspyware?,Phishingistotrickarecipientintohandingovermoneyorsensitivepersonalinformationliketheirbankaccountdetailsorausernameandpassword.Spywareistoserveupunwantedadverts,changesystemsettingsandgatherinformationonausersonlinebehaviorformarketingpurposes.,Unit1ChoosingaTopic,1Decidingonatopic,AdditionalquestionsforyourunderstandingofText2,3Whydoesthewritersaythattheearliest“criminal”hackerswereinfactrelativelyharmless?,Itisbecausethattheyusuallyinterestedintestingtheboundariesoftheirknowledgeandtheirabilitytogetaroundsecuritymeasures.Theymainlyperformedharmlesspranks,forexampleemployinglow-techtrickstogetfreecallsthroughtheU.S.phonenetworks.,Unit1ChoosingaTopic,1Decidingonatopic,Enhancingyouracademiclanguage,Matchthewordswiththeirdefinitions.,5a,10c,1d,2f,3h,4i,6e,7b,8j,9g,Unit1ChoosingaTopic,1Decidingonatopic,Enhancingyouracademiclanguage,Matchthewordswiththeirdefinitions.,1throwawaya(n)(损坏的)computer2earnsomebodyconsiderable(恶名)3beused(可互换地)4Acomputerhas(发生故障).5(挤)milkintothebottle6a(n)(有独创性的)solutiontotheproblem7Chinas(出现)asagreatpower8of(卑微的)birth9(狡猾的)menoftenpassforwise.10exploittheir(弱点)tofightthem11asuspected(罪犯)12ajacketwithleather(补丁)ontheelbows.,compromised,notoriety,interchangeably,malfunctioned,squeeze,ingenious,emergence,humble,Cunning,vulnerability,criminal,patches,Unit1ChoosingaTopic,1Decidingonatopic,Enhancingyouracademiclanguage,Matchthewordswiththeirdefinitions.,13the(阴险的)looksonhisface14Thisisa(n)(艰巨的)challenge.15thevirusthatcan(复制)itself16His(恶毒的)gossipcausedmuchmischief.17Thepath(盘旋)upthemountain.18a(n)(安全的)operatingsystem19(使模糊)myvision20(阻止)thespreadofanepidemic21fallinto(坏名声)22solve(复杂的)electricalproblems23(利用)naturalresources24writeapersonalnotetoeach(收件人)25(转换)holdingsintoshares,sinister,daunting,replicate,malicious,spirals,secure,blur,stem,sophisticated,disrepute,harness,recipient,convert,Unit1ChoosingaTopic,1Decidingonatopic,Enhancingyouracademiclanguage,TranslatethefollowingsentencesfromText2intoChinese.,看似无害的编程错误可以被利用,导致电脑被侵入并为电脑蠕虫和病毒的繁衍提供温床。,2当一个软件漏洞被发现,黑客可以将漏洞变成一个侵入点,从而造成极大的破坏,在这之前,往往需要争分夺秒地利用正确的软件补丁来防止破坏的发生。,3最简单的钓鱼骗局试图利用迅速致富的伎俩诱使诈骗目标寄钱。但网络骗子们也变得越来越狡猾,最近的陷阱是通过发送客户服务的电子邮件让用户进入假银行或商业网站,并在那里请他们“重新输入”他们的账户信息。,Unit1ChoosingaTopic,1Decidingonatopic,Enhancingyouracademiclanguage,TranslatethefollowingsentencesfromText2intoChinese.,4间谍软件与垃圾邮件和钓鱼网络一起,构成了三个令人生厌的互联网害虫。尽管有些程序可以通过入侵软件漏洞从而进入电脑,但这些有害而秘密的程序通常会随着其他通常是免费的应用软件侵入到计算机系统中。,5尽管因特网已经彻底改变了全球通讯,但是对于那些意图为了罪恶目的而利用网络力量的人和那些负责阻止这些网络犯罪的人来说,他们之间的较量才刚刚开始。,Unit1ChoosingaTopic,1Decidingonatopic,1Topicsofeachlecture,Lecture1:_,Lecture2:_,Lecture3:_,2Topic1:_,Topic2:_,TheimportanceofComputerEthics,HowtodealwithComputerHackers,HowIBegintodevelopComputerApplications,Unit1ChoosingaTopic,1Decidingonatopic,Enhancingyouracademiclanguage,Lecture1,1Whatisthetopicofthelecture?,TohelpcomputeruserstobeawareoftheethicalusesofcomputersandtheInternet.,2Whydoethicalissuesbecomemoreimportant?,Peopleshouldrespectotherpeoplespropertyanduseresourcesfairly.,Unit1ChoosingaTopic,1Decidingonatopic,Enhancingyouracademiclanguage,Lecture1,3Whichruleisaboutthewaytoavoidplagiarism?,BecausemoreandmorepeoplehavestartedusingcomputersandtheInternet.,4Whichruledohackersmainlybreak?,NumberEight.,Unit1ChoosingaTopic,1Decidingonatopic,Enhancingyouracademiclanguage,Lecture1,WhatarethemainprinciplesbehindtheTenCommandmentsofComputerEthics?,NumberNine.,HowisLecture1differentfromTexts1and2intermsofcontent?,TohelpcomputeruserstobeawareoftheethicalusesofcomputersandtheInternet.,7Whatisthetitleofthelectureyoumaysuggest?,缺答案,Unit1ChoosingaTopic,1Decidingonatopic,Enhancingyouracademiclanguage,Lecture2,1Whoisthemysterioussponsoror“theAnonymous”?,Itsasophisticatedgroupofpoliticallymotivatedhackers.,2Accordingtothelecturer,whatshouldwedobesidesputtingahugeamountofmoneyintocybersecurityforthemostextraordinarytechnicalsolution?,Weshouldtalktohackersandmakeuseofthem.,Unit1ChoosingaTopic,1Decidingonatopic,Enhancingyouracademiclanguage,Lecture2,3HowdothepurchaserandthevendordobusinessontheCarderPlanet?,Theydobusinessbyusingtheescrawsystem.,4Accordingtothelecturer,whatkindofhackersshouldnotbethrownintojail?,Hackerswhohavedisabilitieslikeautism.,Unit1ChoosingaTopic,1Decidingonatopic,Enhancingyouracademiclanguage,Lecture2,Whatisthesolutiontothehackerproblemaccordingtothelecturer?,Recruitingandmobilizinghackersonbehalfofthestate.,InwhichaspectsisthelecturerelatedtoTexts1and2?,FacedwiththethreatsofcomputerhackersmentionedinText1and2,thespeakersuggeststhatweshouldtalktohackers,understandtheirdisabilities,andmakeuseoftheirtalent.,7Whatisthetitleofthelectureyoumaysuggest?,UnderstandandMakeUseofHackers,Unit1ChoosingaTopic,1Decidingonatopic,Enhancingyouracademiclanguage,Lecture3,1Whatisthefunctionoftheapp“EarthFortune”?,Itcandisplaydifferentkindsofcolordependingononesfortune.,2Whydoalotofkidsfinditdifficulttomakegames?,Becausenotmanykidsknowwheretheycanlearntomakeupaprogram.,Unit1ChoosingaTopic,1Decidingonatopic,Enhancingyouracademiclanguage,Lecture3,3Wheredoesthelecturerputhisapps?,Theappstore.,4Whydidthelecturerstartanappclub?,Becausestudentsathisschoolcancomeandlearnhowtodesignanapp.,Unit1ChoosingaTopic,1Decidingonatopic,Enhancingyouracademiclanguage,Lecture3,WhatisthebigchallengetotheiPadprogram?,HowshouldiPadbeusedandwhatappsshouldweputontheiPads.,Whatisthetitleofthetalkyoumaysuggest?,HowCanIGetFascinatedwiththeiPadsandDesignApps,7Willthelecturerbecomeapotentialhacker?Why,orwhynot?,Mostprobablyifhelackssucheducationascomputerethics.,Unit1ChoosingaTopic,2Formulatingaresearchquestion,purposesofaresearchquestionTask1ReadText3andText4andanswerquestionsText3HowDoComputerHackers“GetInside”aComputer?Text4ElectronicThreatsofaComputerTask2DeveloptopicsintoresearchquestionsTask3Brainstormandanswerquestions,Unit1ChoosingaTopic,2Formulatingaresearchquestion,Itidentifiesthespecificobjectivesyourresearchoryourpaperwilladdress.,purposesofaresearchquestion,Itdeterminesthesizeofyourresearchorthelengthofyourpaper.,Unit1ChoosingaTopic,1Decidingonatopic,Text3Researchquestion1:_Researchquestion2:_Researchquestion3:_Text4Researchquestion1:_Researchquestion2:_Researchquestion3:_,HowmanytypesofCloudservicesandwhatarethey?,Whatisgreencomputing?,Whatadvantagesofthecloudcomputing?,WhatistheWeb3.0?,Whatadvantagesanddisadvantagesofthecloudcomputing?,Canthecloudcomputingprovidesecuritybenefits?,Unit1ChoosingaTopic,2Formulatingaresearchquestion,AdditionalquestionsforyourunderstandingofText3,1Whatiscloudcomputing?,Cloudcomputingisapay-per-usemodelforenablingon-demandaccesstoreliableandconfigurableresourcesthatcanbequicklyprovisionedandreleasedwithminimalconsumerinvolvementintermsofmanagement.,Unit1ChoosingaTopic,2Formulatingaresearchquestion,AdditionalquestionsforyourunderstandingofText3,2Whatcharacteristicsshouldcloudhave?,1Itshouldbeabletoquicklyallotandrelieveresourceswheneverrequiredbyclients;2Itshouldhavereal-timebackuptooffermaximumuptimetoclients;3Itshouldbeabletocatertotheneedsofclientswithouthavingtoinvolveclientsintomanagementoftheservice.,Unit1ChoosingaTopic,2Formulatingaresearchquestion,AdditionalquestionsforyourunderstandingofText3,3Whataretheadvantagesofcloudcomputing?,RemoteAccessibility:Withcloudcomputing,yourbusinessisnotrestrictedtoaparticularlocation.EasyExpansion:Asofthecharacteristicsofcloudcomputingisitsflexibility,youcanquicklyaccessmoreresourcesifyouneedtoexpandyourbusiness.Security:Thoughpeopledoubtcloudcomputing,cloudstendtobemoresecurethanthetraditionalbusinessmodels.EnvironmentallyFriendly:Usageofready-maderesourcestailoredtoyourneedshelpsyoureducetheelectricityexpenses,Unit1ChoosingaTopic,Enhancingyouracademiclanguage,Matchthewordswiththeirdefinitions.,5i,10c,1f,2d,3e,4j,6h,7b,8a,9g,2Formulatingaresearchquestion,Unit1ChoosingaTopic,Enhancingyouracademiclanguage,Matchthewordswiththeirdefinitions.,2Formulatingaresearchquestion,1(不管)oftheirageandeducation2Theprogrammust(迎合)totheneedsofyourcustomers.3(易于)todeveloplungcancer4(选择)foronestyleortheother5Hesuppliesthe(最大的)amountofinformation.6Theseproductordersshouldbe(编号).7the(提供)offacilitiesforchildren8arestaurant(合适于)forfamilies9theneedforatighter(检查)onarmssales10(现成的)excuse11Theaircrafthasbeen(改进)andimproved.12providetreatment(所要求的)13the(去向)ofthemissingdocuments,irrespective,betailored,coded,provision,catered,check,prone,maximum,opt,ready-made,modified,on-demand,whereabouts,Unit1ChoosingaTopic,Enhancingyouracademiclanguage,Matchthewordswiththeirdefinitions.,2Formulatingaresearchquestion,14(有害的)wastemustbeappropriatelydealtwith.15Theterribledamagehasbeen(遭受到了).16Fewoftherulesare(适合于)tothecountry.17anindustrial(开发商)18awholerangeofservices(所提供的)19(主持)atalkshow20Itisfreeorfora(极小的,象征性的)charge.21gettheseaccounts(核证)22ahighly(自动化)factory23apower(断供期)24Demandandsupplyareoutof(同步一致).25Theevidencecan(证实)hisstory.26agreatvictorywith(最小的)price27ahighly(流动的)society,Hazardous,incurred,applicable,developer,onoffer,host,nominal,certified,automated,sync,outage,backup,minimal,mobile,Unit1ChoosingaTopic,Enhancingyouracademiclanguage,TranslatethefollowingsentencesfromText3intoChinese.,2Formulatingaresearchquestion,云计算可定义为一种付款模式,这种模式可以根据提出的要求迅速得到可靠的计算机分配资源,而付钱用户很少要自己进行管理。,2由于云计算可以总是用来不断提供资源,因此当你需要扩充计算机容量,你不需要去买硬件。这样,你就不会因为用更多的电去冷却计算机设备而产生更多的二氧化碳。,Unit1ChoosingaTopic,Enhancingyouracademiclanguage,TranslatethefollowingsentencesfromText3intoChinese.,2Formulatingaresearchquestion,3这意味着他们不需要开车到办公地点。这就可以省去燃料费,减少二氧化碳排放,这就保护了环境。,4万一断电,客户就可以再启动时使用和主机同步的备份。,5除此之外,云计算还不容易受到黑客入侵和分布式拒绝服务的攻击,因为攻击者不知道你的数据放在什么地方。,Unit1ChoosingaTopic,AdditionalquestionsforyourunderstandingofText4,2Formulatingaresearchquestion,1WhatisWeb3.0basedon?,Web3.0isbasedontheservicesfordatamining,artificialintelligence,independentagents,speechrecognitionandnewcomputingmodels(distributed,grid3andcloud).,Unit1ChoosingaTopic,AdditionalquestionsforyourunderstandingofText4,2Formulatingaresearchquestion,2Whatcouldthecloudclientsbe?,ThecloudclientscouldberegularPCs,mobilephones,PDAsoranyothersimilardevices.,Unit1ChoosingaTopic,AdditionalquestionsforyourunderstandingofText4,2Formulatingaresearchquestion,3Whatmajorsecuritybenefitsdoesthecloudcomputingprovideforindividualsorcompanies?,1)centralizeddatastorage;2)monitoringofdataaccessbecomeseasier;3)increaseduncertainty;4)virtualizationallowsarapidreplacementofacompromisedserverlocatedintothecloudwithoutmajorcostsordamages.Also,thedowntimeforcomputersinthecloudcouldbesubstantiallyreduced;5)loggingextendedlogscanbeactivated;6)thesecuritychangescanbeeasilytestedandimplemented.,Unit1ChoosingaTopic,Enhancingyouracademiclanguage,Matchthewordswiththeirdefinitions.,5g,10h,1c,2e,3a,4i,6b,7d,8f,9j,2Formulatingaresearchquestion,Unit1ChoosingaTopic,Enhancingyouracademiclanguage,Matchthewordswiththeirdefinitions.,2Formulatingaresearchquestion,1A(n)(类比)isdrawnbetweenthetwothings.2Catsandbirdsareseldom(协调的).3(分发)theprizesamongthewinners.4(执行)anewpolicytohelptheunemployed5Thefunctioncanbe(激活)anytime.6a(n)(静止的)viewoftheworld7Theaudiences(总计达到)amillionpeople.8a(n)(一模一样的复制品)ofarealpanda9lookfora(n)(革新的)way10trytofindthe(替代品)ofadamageddesk11Theirbusiness(突然垮了).12Theirequalityis(受到损害).13(挖掘有价值的)fordetailedinformation14abridge(坚固的)enoughtolastahundredyears15Heisanational(宝贵的人).,analogy,compatible,Distribute,implement,activated,static,aggregated,clone,innovative,replacement,crashed,compromised,mine,substantial,asset,Unit1ChoosingaTopic,Enhancingyouracademiclanguage,Matchthewordswiththeirdefinitions.,2Formulatingaresearchquestion,16(使集中)powerinhim17airport(设施)18Hehasto(松开)hishold.19(监听)hisconversation20helpindividuals(使适应,融合于)intothecommunity21Fromhisfatherhe(获得)hisenthusiasmforsports.22(修订,更新)atextbook23(下载)thematerialtoyourcomputer24(提高)thepayandstatusoftheteacher25Theyareonly(批准)forbeer.26pay(级差的)rentsaccordingtotheirincome27(安装)anewcomputerin

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论