南昌大学学术英语课后习题答案第一章answers for exercises of unit 1.docx
- 文档编号:28806436
- 上传时间:2023-07-19
- 格式:DOCX
- 页数:7
- 大小:41.92KB
南昌大学学术英语课后习题答案第一章answers for exercises of unit 1.docx
《南昌大学学术英语课后习题答案第一章answers for exercises of unit 1.docx》由会员分享,可在线阅读,更多相关《南昌大学学术英语课后习题答案第一章answers for exercises of unit 1.docx(7页珍藏版)》请在冰豆网上搜索。
南昌大学学术英语课后习题答案第一章answersforexercisesofunit1
Unit1ChoosingaTopic
4Enhancingyouracademiclanguage
Text1
1.Matchthewordswiththeirdefinitions.
1g2a3e4b5c6d7j8f9h10i
2.CompletethefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.
1symbolic2distributed3site4complex5identify
6fairly7straightforward8capability9target10attempt
11process12parameter13interpretation14technical
15range16exploit17networking18involve
19instance20specification21accompany22predictable23profile
3.Readthesentencesinthebox.Payattentiontothepartsinbold.
NowcompletetheparagraphbytranslatingtheChineseinbrackets.Youmayrefertotheexpressionsandthesentencepatternslistedabove.
rangingfrom(从……到)
arisefromsomemisunderstandings(来自于对……误解)
leavesalotofproblemsunsolved(留下很多问题没有得到解决)
opensapathfor(打开了通道)
requiresadifferentframeofmind(需要有新的思想)
4.TranslatethefollowingsentencesfromText1intoChinese.
1)有些人声称黑客是那些超越知识疆界而不造成危害的好人(或即使造成危害,但并非故意而为),而“骇客”才是真正的坏人。
2)这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。
3)那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。
4)另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的是攻击到尽可能多的潜在目标。
5)另外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在几个真正需要的端口,如电子邮件和网站流量。
Text2
1.Matchthewordswiththeirdefinitions.
1d2f3h4i5a6e7b8j9g10c
2.CompletethefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.
1compromised2notoriety3interchangeably4malfunctioned5squeeze
6ingenious7emergence8humble9Cunning10vulnerability
11criminal12patches13sinister14daunting15replicate
16malicious17spirals18secure19blur20stem
21disrepute22sophisticated23harness24recipient25convert
3.Readthesentencesinthebox.Payattentiontothepartsinbold.
NowcompletetheparagraphbytranslatingtheChineseinbrackets.Youmayrefertotheexpressionsandthesentencepatternslistedabove.
实现罪恶目的的人和那些负责阻止这些网络犯罪的人来说,他们之间的较量才刚刚开始。
Text3
1.Matchthewordswiththeirdefinitions.
1f2d3e4j5i6h7b8a9g10c
2.CompletethefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.
1irrespective2betailored3prone4opt5maximum
6coded7provision8catered9check10ready-made
11modified12on-demand13whereabouts14Hazardous15incurred
16applicable17developer18onoffer19host20nominal21certified22automated23outage24sync25backup26minimal27mobile
3.Readthesentencesinthebox.Payattentiontothepartsinbold.
NowcompletetheparagraphbytranslatingtheChineseinbrackets.Youmayrefertotheexpressionsandthesentencepatternslistedabove.
Irrespectiveofwhether(不管)
saveusersthetrouble(使用户避免这样的麻烦)
caterstotheneedsof(迎合了需求)
forthepurposeof(其目的就是)
4.TranslatethefollowingsentencesfromText3intoChinese.
1云计算可定义为一种按次付费模式,这种模式可以根据要求迅速得到计算机分配的可靠资源,用户很少需要自己进行管理。
2由于云计算可以用来不断提供资源,因此当你需要扩充计算机容量时就不需要去买硬件,就不会因为用电去冷却计算机设备而产生更多的二氧化碳。
3这意味着他们不需要开车到办公地点。
这就可以省去燃料费,减少二氧化碳排放,从而保护了环境。
4万一断电,客户可以在电脑再启动时使用和主机同步的备份。
5除此之外,云计算还不容易受到黑客入侵和分布式拒绝服务的攻击,因为攻击者不知道数据的位置。
Text4
1.Matchthewordswiththeirdefinitions.
1c2e3a4i5g6b7d8f9j10h
2.CompletethefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.
1analogy2compatible3Distribute4implement5activated6static
7aggregated8clone9innovative10replacement11crashed
12compromised13mine14substantial15asset16centralize17facilities
18loose19monitor20integrate21derived22update23download
24upgrade25licensed26differential27install28minimum29in-house30crucial
3.Readthesentencesinthebox.Payattentiontothepartsinbold.
NowcompletetheparagraphbytranslatingtheChineseinbrackets.Youmayrefertotheexpressionsandthesentencepatternslistedabove.
remainswideopen(有很大的前景)
isderivedfromthewayinwhich(来自这样一个方法)
becomescrucial(非常重要)
willbesubstantiallyreduced(会大大降低)
4.TranslatethefollowingsentencesfromText4intoChinese.
1这个术语来自于因特网往往呈现为网络图的方法。
2目前云计算技术涉及一个数据中心的存在,这个中心能够为全世界用户提供服务。
3这就减少了由于没有硬件,如手提电脑带来的影响。
4虚拟化可以使一个损坏的云端服务器迅速找到替代品而不造成大的损失或破坏。
5云技术还处于起步阶段,更多新的优点会不断被发现。
LectureListening
Listening:
Lecture1
1.TohelpcomputeruserstobeawareoftheethicalusesofcomputersandtheInternet.
2.BecausemoreandmorepeoplehavestartedusingcomputersandtheInternet.
3.NumberEight.
4.NumberNine.
5.Respectandfairness.
6.Lecture1addressesthetopic“howacomputeruseravoidsbeingaconsciousorunconscioushacker”whileText1and2dealwiththewayhackers“getinside”acomputerandelectronicthreatsacomputerfaces.
7.TenCommandmentsofComputerEthics.
Listening:
Lecture2
1It’sasophisticatedgroupofpoliticallymotivatedhackers.
2Weshouldtalktohackersandmakeuseofthem.
3Theydobusinessbyusingtheescrowsystem.
4Hackerswhohavedisabilitieslikeautism.
5Recruitingandmobilizinghackersonbehalfofthestate.
6FacedwiththethreatsofcomputerhackersmentionedinText1and2,thespeakersuggeststhatweshouldtalktohackers,understandtheirdisabilities,andmakeuseoftheirtalent.
7UnderstandandMakeUseofHackers.
Listening:
Lecture3
1.Itcandisplaydifferentkindsofcolordependingonone’sfortune.
2Becausenotmanykidsknowwheretheycanlearntomakeupaprogram.
3Theappstore.
4Becausestudentsathisschoolcancomeandlearnhowtodesignanapp.
5HowshouldiPadbeusedandwhatappsshouldweputontheiPads.
6HowCanIGetFascinatedwiththeiPadsandDesignApps?
7Maybemostprobablyifhelackssucheducationascomputerethics.
Listening:
Lecture4
1Security.
2Privacy,intrusionpreventionanddetection,andavailability.
3Thekeysarelesssecureandcanbecrackedmoreeasily.
4Becausetherearenewformsofattacksastechnologydevelops.
5Weshouldapplycloudserviceintelligentlyinthenewcontext.
Listening:
Lecture5
Part1
1No,becausethecloudcomputingismorethanjustabouttechnology,it’sacombinationofdifferentfactors.
2Innovation,bespoke,productsandutilityservice.
3Becausetheinnovationwouldfinallybecomeautilityservice.
Part2
4Aconstantdemandfornewthingsandaconstantpressureforimprovement.
5Concept,suitability,technologyandattitude.
6Toillustratethesituationthattherearesomuchnoiseoncloudcomputing.
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 南昌大学学术英语课后习题答案第一章answers for exercises of unit 南昌大学 学术 英语 课后 习题 答案 第一章 answers
![提示](https://static.bdocx.com/images/bang_tan.gif)
链接地址:https://www.bdocx.com/doc/28806436.html