西北工业大学硕士英语综合教程2(unit3 cyber attack)课件_第1页
西北工业大学硕士英语综合教程2(unit3 cyber attack)课件_第2页
西北工业大学硕士英语综合教程2(unit3 cyber attack)课件_第3页
西北工业大学硕士英语综合教程2(unit3 cyber attack)课件_第4页
西北工业大学硕士英语综合教程2(unit3 cyber attack)课件_第5页
已阅读5页,还剩57页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

Book2Unit3CyberspaceNetworkTextA:BattlingtheCyberWarmongersQuitContents12345BackgroundInformation&CulturalNotesLead-inTextStructuresSentenceStudyTextAQuitWords&PhrasesKeytoExercises6KevinPoulsen

bombergap

JingoismJonathanJamesBackgroundInformation&CulturalNotesHomeJonathanJamesHewasanAmericanhackerwhowasthefirstjuvenileincarcerated(监禁)forcybercrimeintheU.S.TheSouthFloridanativewas15yearsoldatthetimeofthefirstoffenseand16yearsoldonthedateofhissentencing.HediesonMay18,2008,ofaself-inflictedgunshotwound.BackgroundInformation&CulturalNotesBackHome

bombergap

wastheunfoundedbeliefintheColdWar-eraUnitedStatesthattheSovietUnionhadgainedanadvantageindeployingjet-poweredstrategicbombers.Widelyacceptedforseveralyears,thegapwasusedasapoliticaltalkingpointinordertojustifygreatlyincreaseddefensespending.OneresultwasamassivebuildupoftheUnitedStatesAirForcebomberfleet,whichpeakedatover2,500bombers,inordertocountertheperceivedSovietthreat.BackgroundInformation&CulturalNotesBackHomeJingoismItisdefinedintheOxfordEnglishDictionaryas“extremepatriotismintheformofaggressivepolicy”.Inpractice,itreferstotheadvocateoftheuseofthreatsoractualforceagainstothercountriesinordertosafeguardthattheyperceiveastheircountry’snationalinterests,andcolloquiallytoexcessivebiasinjudgingone’sowncountryassuperiortoothersanextremetypeofnationalism.BackgroundInformation&CulturalNotes['dʒiŋɡəuizəm]n.侵略主义;沙文主义;武力外交政策BackHomeLefttoright:

Churchill,Roosevelt,StalinLead-in

Whatshouldwedoinordertohaveamoresecuredinternet?

Question1HomeToBeContinuedLead-inWhatshouldwedoinordertohaveamoresecuredinternet?

Question1HomeToBeContinuedAvoidunsuitableandundesirablemessageexchangingonnetworkingsites,perhapswithpeoplewhocouldbedangeroustounsuspectingchildren.Thereareover3000casesayearofpeoplewhohavebeencyberbullied,stalkedandworse,bystrangersonline,orhavehadtheirinternetnetworkingsitepageshackedinto.cyberbully:网络霸凌bully:

['buli]n.欺凌弱小者;土霸vt.欺负;威吓vi.欺侮人stalk:[stɔ:k]vt.追踪,潜近;高视阔步vi.高视阔步地走;潜近,偷偷接近Lead-inWhatshouldwedoinordertohaveamoresecuredinternet?

Question2HomeToBeContinuedFirewallsimposerestrictionsonincomingandoutgoingpacketstoandfromprivatenetworks.Allthetraffic,whetherincomingoroutgoing,mustpassthroughthefirewall;onlyauthorizedtrafficisallowedtopassthroughit.FirewallscreatecheckpointsbetweenaninternalprivatenetworkandthepublicInternet,alsoknownaschokepoints.FirewallscancreatechokepointsbasedonIPsourceandTCPportnumber.TheycanalsoserveastheplatformforIPsec.Usingtunnelmodecapability,firewallcanbeusedtoimplementVPNs.FirewallscanalsolimitnetworkexposurebyhidingtheinternalnetworksystemandinformationfromthepublicInternet.chokepoint:瓶颈alsochokepoint.

IP:abbr.

互联网协议InternetProtocolTCPport:abbr.

终端控制协议端口号TerminalControlProtocolIPSec:abbr.

网际协议安全InternetProtocolSecurityVPNs:

abbr.虚拟专用网VirtualprivatenetworksLead-inWhatisCyberTerrorism?Question3HomeTheuseofcomputernetworktoolstoshutdowncriticalnationalinfrastructure(suchasenergy,transportation,governmentoperations)ortocoerceorintimidateagovernmentorcivilianpopulation.coerce:[kəu'ə:s]

vt.

强制,迫使intimidate:[in'timideit]vt.恐吓,威胁;胁迫TextStructureI.Introduction:thesimulationofthecyberattackandtheattackonGooglehaveresultedinthediscussionaboutcyberwarthreat.(Para.1~5)

AsimulationofaseverecyberattackonAmerica,whichcrippledmuchofthenationalinfrastructureandarousedthepublicfearofthecyber-attack.(Para1-2)2.TheattackonGooglehasresultedinthethreatofacyberwar.(Para3-5)

HomeToBeContinuedTextStructureII.Whythethreatofcyberwarhasbeeninflated.

(Para.6~11)Itisthecontractorswhobenefitfromhelpingthegovernmentwiththecybersecurityandhypeupthecyberattack. (Para6-8)Accordingtosomeexperts’analysis,thethreatofcyberwarhasbeenhypedup. (Para9-11)HomeTextStructureIII.Thecyberwarmaywellexistbutitshouldcomplywiththerulesofwars. (Para.12~16)Examplesofcyberattack.

(Para.12-14)

2.Theanalysiswhythetacticsofcyberattackisnotwidelyused.

(Para.15)

3.Differentprotectionpoliciesshouldbemadeaccordingtotheriskandthelevelsofdevastation. (Para.16) HomeTextStructureIV.theanalysisofthereasonswhytheAmericangovernmentcomputersaresovulnerabletoattack.(Para.17~20)

Perfectsecurityincyberspaceisundesirable.

(Para17)Whatcrashedthewebsiteswastheincompetenceofthepeoplewhoranit.

(Para18-20)

HomeToBeContinuedV.conclusion:thecyberattackisnotasthreateningassomepeoplehavehypedupbutwestillneedtoadoptpreventivemeasuresandpoliciestosecurecyberspace.(Para.21)

SentenceStudyGiventheprevioushistoryofexcessivelytightconnectionsbetweenourgovernmentandmanyofitscontractors,it’squitepossiblethattheover-dramatizedrhetoricofthosecheerleadingthecyberwarhashelpedtoaddatleastafewbilliondollarstothispricetag.Mr.Mcconnel’scurrentemployer,BoozAllenHamilton,hasjustlanded$34millionincybersecuritycontractswiththeAirForce. (Para.7,Line1)given:

prep.Considering考虑到……鉴于……rhetoric:

n.1.花言巧语,浮夸之词2.修辞;修辞学;修辞学著作3.雄辩(术);辩才4.辞令,言语2HomeConsideringthepreviousintimacybetweenmanycontractorsandthegovernment,theiroverstatedopinionadvocatingthecyberwarmaymakethegovernmentspendafewbillionmoredollarsprotectinginternetsecurity.BoozAllenHamilton,nowworkingforMr.Mcconnel,hasjustmanagedtosignacontractof$34millionwiththeAirForceincybersecurity.ToBeContinuedSentenceStudy鉴于政府以前与给其提供网络安全的承包商们过往甚密,那些宣扬网战的极度浮夸之词很可能让政府至少多花几十亿美元来进行网络安全保护。麦康奈尔先生目前所就职的联合国国际开发署咨询机构最近刚跟航空公司签署了一份价值3400万美元的网络安全协议。2HomeSentenceStudy麦萨斯、麦康奈尔以及无数其他从事网络安全保护的人都转型成功:最初只是在政府内部尽力解决政府机构的网络安全问题,发展为专门为政府机构解决网络安全问题的承包商。他们都是极受尊重的专家,仅仅因为他们看过更绝密的报告,他们的观点也不容忽视。3HomeSentenceStudyWedonotwanttosleepwalkintocyber-Katrina,butneitherdowewanttoholdourpolicy-makinghostagetotherhetoricalploysofbetter-informedgovernmentcontractors. (Para.8,Line6)informed:

v.havingorshowingknowledge掌握情况的e.g.:aninformedcritic,memberofthepublic,etc.Wedonotwanttoinvolveintoacyberwarmuddle-headedly,neitherdowewantourpolicy-makerstobeaffectedbythoseknowledgeablecontractors’exaggeration.

4HomeKatrina:

HurricaneKatrina.卡特里娜飓风

holdsbto:使某人信守诺言ToBeContinuedSentenceStudyFromastrictlymilitaryperspective,“cyberwar”—withasmall“c”mayverywellexist,playingsecondfiddletoongoingmilitaryconflict,theonewithtanks,shellfireandall.(Para.14,Line1)mayverywell:

很有可能e.g.:1.很有可能这些有毒物质就在我们的水里甚至食物里。Thesetoxicsubstancesmayverywellbeinourwaterevenourfood.2.这场辩论的最终结果很可能决定中国高中教育的未来。

HowthisdebateplaysoutmayverywelldeterminethefutureofChinesehighschooleducation.从严格的军事角度讲,以小c开始的“网战”也许很可能存在,但是肯定位居于正在发生的,坦克、大炮等全部上阵的军事冲突之后。5HomeStrictlyspeakingfromamilitaryaspect,cyberwarprobablyexists,butitisstillsecondarytotherealmilitaryconflictshappening,withtanks,shellfireandalltheotherweaponsused.SentenceStudyWhatisworse,anymajorre-engineeringoftheInternetcouldderail

otherambitiousinitiativesoftheU.S.government,especiallyitsefforts,topromoteInternetfreedom.

(Para.12,Line1)derail:

v.[di'reil]vt.使出轨vi.出轨n.脱轨;[铁路]脱轨器initiative:n.[i'niʃiətiv;-ʃətiv]n.1.初步;创始2.主动的行动;倡议3.主动的精神;首创精神;创始力adj.1.开始的;初步的2.主动的;进取的3.入门的;介绍的更糟糕的是,任何重大的网络重建工程都将会影响美国政府其它的远大理想,特别是其在推广网络使用方面的举措。6HomeWhatisworse,anyimportantadjustmentoftheInternetcouldhindertheimplementationofotherambitiousinitiativesoftheU.S.government,especiallyitsefforts,topromoteInternetfreedom.crippleunplugmurkytrickimminenthypeflimsydismantlegleanNewWordsPlaysecondfiddletosb./sth

ExpressionsNewWords&ExpressionsHomeNewWords&Expressions1.cripple

Thecountryhascripplingdebts.1.

这个国家债务极重。Back2.这家企业因亏损而陷入困境。Theirbusinesshasbeencrippledbylosses.Para.1,Line2unplug

[,ʌn‘plʌɡ]

vt.

1.disconnect(anelectricalappliance)byremovingitsplugfromthesocket去掉…的障碍物;2.removeanobstructionfrom(sth)拔去…的塞子或插头[过去式unplugged过去分词unplugged现在分词unplugging]

NewWords&Expressions2.unplug1.

睡前请拔掉电视插头。

PleaseunplugtheTVbeforeyougotobed.

Back

2.

排水管堵了,得疏通一下。Thedrainisblockedandneedsunplugging.Para.1,Line4murky

['mə:ki]

adj.

1.unpleasantlydark,gloomy,黑暗的;暗淡的;阴沉的 2.dirty,unclear朦胧的;模糊的; 3.notknownbutsuspectedofbeingimmoralordishonest可疑的,不可告人的

NewWords&Expressions3.murky

1.伦敦的街道,在十一月的雾中模糊不清。London’sstreetsareallmurkywithNovemberfog.2.

她把他的信扔进了浑浊的河水深处。

Shethrewhisletter

intotheriver’smurkydepth.

Back3.

有关你过去那些不光彩的事,我决不告诉别人。Thetruthaboutyourmurkypastissafewithme—mylipsaresealed.Para.4,Line1trick

[trik]vt.

1.欺骗,诈骗,哄骗(与of,out,into连用):

NewWords&Expressions4.trick

1.他的薪金给骗走了。Hewastrickedoutofhispaycheck.2.

老人受骗买了一台二手的收音机。Theoldmanwastrickedintobuyingasecondhandradio.Back2.(尤指外表)装饰;打扮;修饰(常与out,up连用):

3.她打扮得珠光宝气。Shewastrickedoutinjewels.Para.4,Line1imminent

[‘iminənt]adj.

即将来临的;迫近的(espofunpleasantevents)abouttohappen,likelytohappenverysoon;upcomingNewWords&Expressions5.imminent1.士兵害怕即将来临的死亡。Thesoldierfearedimminentdeath.

2.

最近将发布进一步缩减政府开支的公告。Anannouncementoffurthercutsingovernmentexpenditureisimminent.

BackPara.5,Line3hype

n.(sl)(pieceof)misleadingandexaggeratedpublicity.天花乱坠的选宣传报道

V.

hypesthup(sl)publicizesthinawildlyexaggeratedway言过其实的宣传某事NewWords&Expressions6.hype

1.民众没有被新闻界言过其实的报道所愚弄。Thepublicwerenotfooledbyallthehypethepressgavetheevent.2.

那部新推出的电影做了很大的媒体宣传。Therewasabigmediahypeforthatnewmovie.

Back3.这部影片被吹得离了谱了。Themoviehasbeenhypedupfarbeyonditsworth.

Para.5,Line41.(ofclothormaterial)lightandthin(指布或材料)轻而薄的

e.g.aflimsydressNewWords&Expressions7.flimsy

2.notstrongorsolidenoughforthepurposeforwhichitisused不结实的,易损坏的.e.g.aflimsycardboardbox不结实的纸箱。3.(fig)weakorfeeble;unconvincing软弱无力的;不足信的e.g.:aflimsyexcuse站不住脚的借口。Back1.

对他不利的证据不足凭信。Theevidenceagainsthimisratherflimsy.2.多么无力的借口啊!Whataflimsyexcuse!Para.10,Line4playsecondfiddletosb/sthbetreatedaslessimportantthananotherperson,activity居次位,当副手secondfiddle

二流的人;交响乐队中第二小提琴部NewWords&Expressions8.playsecondfiddletosb/sth

1.他因从政而而把家庭置于次要地位。Hisfamilyhashadtoplaysecondfiddletohispoliticalcareer.

2.

我不打算屈居于新主管之下,就辞职了。Ihavenointentionofplayingsecondfiddletothenewdirector,soI’veresigned.

BackPara.14,Line2dismantlevt.1.去掉...的覆盖物;从(房子、船等)拆除(+of);2.tobeabletobetakentopieces可拆开,可拆卸NewWords&Expressions9.dismantle

1.拆掉房子的屋顶Dismantleahouseofitsroof2.卸下炮衣。Dismantleagunofitscovering.3.撤除军事基地。Dismantleamilitarybase.Back4.

这台发动机很容易拆。Thisenginedismantleseasily.Para.15,Line7glean

V.a.gathergrainleftinafieldbyharvestworkers拾落穗b.(fig)gleansthfromsb/sthObtain(newsfacts,information,etc)fromvarioussources,insmallquantitiesandwitheffort.搜集(消息,资料,情报等)(通常指来源广、零碎而费力)NewWords&Expressions10.glean1.

她总能从旁边听到的谈话中搜集点滴信息。shecanalways

gleanafewbitsofinformationfromoverhearingvariousconversations.Back2.

我从别人说话中总算弄清楚他不来了。Fromwhatpeoplesaid,Imanagedtogleanthathewasn’tcoming.

Para.15,Line7HomeKeytoExercises1.ReadingComprehensiona.Choosethesentencesthatbestexpressthemeaningofthestatementfromthetext.(1) A(2) C (3) B (4) C (5) AHomeKeytoExercises(1)infratructure,includingairtraffic,financialmarketsandevenbasicemail;incompetent,indecisiveandconfused(2)iftheworld’smostinnovativetechnologycompanycannotprotectitscomputersfromdigitalaggression,wecannotexpecttobeprotectedbythegovernment.(3)theyhaveresponsibilitytoprovidesomehardevidencetosupporttheirclaims(4)spamming,scammingandidentityfraud,whicharetheinevitablecastsofdemocratizingaccesstomulti-purposetechnologies(5)notaquestionofnationalsecuritybutaquestionofbasicgovernmentincompetence.b.Fillintheblankswiththeinformationyouhavelearnedinthetext.HomeKeytoExercises2.VocabularyFillintheblankswiththecorrectformofthewordsorphrasesyouhavelearnedinthetext.

derail (2)hype (3)spamming(4)nascent(5)simulate (6)parlance (7)weaponry(8)unplug(9)hostage(10)civiliansHomeKeytoExercises2.Vocabulary(1)D(2)B(3)A(4)C(5)C(6)B(7)A(8)C(9)D(10)Ab.

Choosethewordorphrasethatisclosestinmeaningtotheunderlinedone.

HomeKeytoExercises3.Clozechooseanappropriatewordfromthefollowinglisttofillineachofthefollowingblanks.Eachwordcanbeusedonlyonce.Changetheformwherenecessary.(1)attack (2)disruption(3)described(4)assaults(5)traced (6)authorized(7)identified(8)sophistication(9)rogue (10)intrusion (11)demonstrate(12)issue(13)ultimate(14)eventual(15)launch(16)offensive(17)analysis(18)security(19)investigation(20)shinedHomeKeytoExercises4.Translation

a.ChinesetoEnglish:TranslatethefollowingsentencesintoEnglish.(2)Thesoldiersweresocourageousthattheysworetowipeoutanyenemythatdaretoinvadeintotheircountry.(1)Gainingrealknowledgerequirestakingrisksandkeepingthemindopen,butmostpeopleprefertobereassuredratherthantolearnthecomplexandoftenunsettlingtruthaboutanything.HomeToBeContinuedKeytoExercises4.Translation

a.ChinesetoEnglish:TranslatethefollowingsentencesintoEnglish.(3)They’resolackinginconfidenceintheattractionofbroadcastingthegamesonTVthattheyfeeltheyhavetohypeupwithsomehystericalcommentatorinordertogetanyonetowatchthem.Home(4)What’sworse,therearethosewhowouldunleashmaliciousnetworkattacksdesignedtoexploitthesehiddenvulnerabilitiestouncovertheprizeddatawithin.ToBeContinuedKeytoExercises4.Translation

a.ChinesetoEnglishTranslatethefollowingsentencesintoEnglish.(6)Thisshowstrueleadership,sustainedvision,andsolidcommitment.Theywereapplaudedforstickingwithitforsomanyyearswithgreatsubtlety.(5)Thechangeofthegovernment’sinterferencestrategiesonhousingusheredinaperiodofstablehouseprices.HomeToBeContinuedKeytoExercises4.Translation

a.ChinesetoEnglishTranslatethefollowingsentencesintoEnglish.(7)Howtosingleoutthemostsuccinctwaytofinishtheworkstillremainsaproblem.Home(8)ButDefenseSecretaryGatessaidtheUnitedStateshasputalotonthetableintermsofmissiledefenseproposalsanditistimefortheRussianstoreciprocate.KeytoExercises4.Translation

a.ChinesetoEnglishTranslatethefollowingparagraphintoEnglish.

Accordingtosomemediareportsrecently,thecyber-attackstoGoogleandmanyAmericancompaniesseemedtohaveoriginatedinChina.TheChairmanofChineseInternetAssociationrefutesthatitwasanirresponsibleprejudicetoallegeonthatcyberattacksoriginatedinChinawithoutthoroughinvestigation,andwasthereforeabsolutelyarbitrary.Withtherapiddevelopmentoninternetintheglobe,itwasdifficulttodeterminetheoriginbecauseoftheeaseofhidingidentitiesonline.Thehackersmayhideidentities,logonthecomputersofaforeigncountryandcommitcyberattackstothecomputersinthethirdone.HomeToBeContinuedKeytoExercises4.Translation

a.ChinesetoEnglishTranslatethefollowingparagraphintoEnglish.However,China’sinformationnetworks,aswellasmanyothercountries,alsofaceseverethreatofcyberattacks.Chinesegovernmenthasalwaysattachedgreatimportancetothesecurityofthecomputernetworkandstrengthenedinternationalcooperationtocrackdownoncross-bordercybercrimes,aswellasenhanceditscrackdownthroughconsultationandcollaborationwiththeInternationalCriminalPoliceOrganization.Therefore,itiswhollynonsensetoallegeonthatcyber-attacksoriginatedinChinajudgingmerelyfromcomputerIPaddressofChina.HomeKeytoExercises4.Translation

b.EnglishtoChineseTranslatethefollowingparagraphintoChinese.为什么这些在军事领域里被认为是“计算机网络攻击”的策略没有被广泛地应用?尽管互联网带来巨大的变化,但它并没有使悠久的战争规律变得过时或毫不相关。比如,按照军事惯例要求在攻击时区分平民和军事目标。在既相互分离又相互连接的网络空间里,这个要求并不容易满足:在网络攻击敌人的手机塔时,也会影响到平民目标。在2008年美国决定解散一个沙特阿拉伯的网络论坛。这个由CIA创立的论坛本来是用来收集情报的,但是却越来越多地被圣战分子用来计划对伊拉克的攻击。这次解散不经意间造成了在沙特阿拉伯、德国、德克萨斯州的300多台服务器的中断。网络攻击当然不具备外科手术的准确性,且对平民的伤害很难避免。军事指挥官们不想因战争而受到审判,即使这些犯罪是通过网络进行的。HomeKeytoExercises4.Translation

b.EnglishtoChineseReadthepassagecarefullyandtranslatetheunderlinedsentencesintoChinese.(1)根据最近的一项有关网络功能的民意调查显示,46%的受访者将因特网描述为朋友,43%的人则把它看成是敌人,还有11%的人心里不清楚。(2)网络能通过减少填写和更新应聘者资料的时间和成本来提高招聘效率,提升评估的有效性,以此来增强搜索公司提供给客户的建议和价值。HomeToBeContinuedKeytoExercises4.Translation

b.EnglishtoChineseReadthepassagecarefullyandtranslatetheunderlinedsentencesintoChinese.(3)设想他们桌面上有一个图标,能够帮助他们提醒你一些任务,并且可以用鼠标将具体细节发送给你,这对客户来说将会是多么方便的事啊!(4)也就是说,一个设计良好的网络招聘程序能用网络来处理数据,每日不知疲倦地工作并且能跨越地理障碍,因此用人单位可以辨别候选人之间的细微差别,评估他们的优缺点,并且抓住机会推销他们。(5)这些新聘用的人员很快就被送到高价的培训项目中去学习在线获取应聘者资料的技术——远端网络数据挖掘工具——然后马上就能投入到工作之中去。HomeKeytoExercises5.WritingHowWillOurLifeGoonwithoutInternet?1.网络提供给了人们丰富多彩和便捷的生活2.很多人开始感觉离开网络寸步难行3.你对网络依赖症的看法WriteanessayinEnglishwith150wordatleastunderthetitlebelow.SAMPLEHomeKeytoExercisesIfaskedwhethertheinternetisthegreatestdiscoveryofthe21thcentury,myanswerwouldbeyes.Theinternethasdrawntheworldcloser,realizedcountlessincredibledreams,andprovidedmodernpeoplewithagreatmanyconveniencesandabrilliantlife.Today,manypeoplesimplyfeeltheycannotlivewithouttheinternet.Governmentspublishtheirlatestpoliciesanddecisionsonlineforworldwiderecognition,politicalcampaignsareoftendoneonlinetogainwiderpublicsupport.Companiesandenterprisesresorttotheinternetformorebusinessopportunitiesandpotentialcustomershomeandabroad.Universitiesandresearchersturntotheinternetifthey’dseekinternationalcooperationorfunding.Commonfolkslikeusalsorelyonthecyberworldinvariousways,forcommunication,entertainment,bankingandshopping.True,thepoweroftheinternetisallpervasiveanditsmanynegativeeffectsarealreadyvisible,forexample,internetaddictstendtowithdrawtotheirownfantasyworldratherthancommunicatewitharealperson.Childrenareexposedtoonlinepornographyandviolence.Internetfraudsareaneverydayoccurrence,inviewofwhatmentionedabove,youareadvisedtousetheinternetwithwisdom.Keepitatasafedistanceandneverloseyourself..SAMPLE1HomeKeytoExercisesAsaprimarysourceofinformationaswellasanefficientmeansofcommunication,theinternetofferspeopleacolorfulandconvenientlife,justbyclickingthemouse,wecanenjoyabrilliantandeasylifethatcouldnotbeachievedeverbefore;shopping,makingfriends,contactingrelatives,lookingforjobs,downloadingm

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论