武汉微博教育整理分享—计算机英语第三版课后答案(五)
练习答案
e-Business | |
Section A | I.Fill in the blanks with the information given in the text: 1. commercial; network 2. catalogs; engines 3. currencies; checks 4. relationship-based; purses 5. Signatures 6. cash; token 7. Public 8. Symmetric II.Translate the following terms or phrases from English into Chinese and vice versa: 1. user authentication 用户认证 2. electronic purse 电子钱包 3. information filter 信息过滤 4. data integrity 数据完整性 5. smart card 智能卡 6. HTML 超文本标记语言 7. symmetric key cryptosystem 对称密钥密码系统 8. message authentication code 信息鉴定码 9. unauthorized access control 未授权访问控制 10. electronic catalog 电子目录 11. electronic money (或cash) 电子货币 12. search engine 搜索引擎 13. digital signature 数字签名 14. user interface 用户界面 15. EFT (Electronic Funds Transfer) 电子资金转帐 16. public key cryptosystem 公钥密码系统 17. PDA (personal digital assistant) 个人数字助理 18. hypertext link 超文本链接 19. 3D image 三维图像 20. credit card 信用卡 III.Fill in each of the blanks with one of the words given in the following list, making changes if necessary: The term electronic commerce encompasses the entire process of buying, selling, and advertising products and services using electronic communications media. But when people talk about (e-commerce) today, they're usually referring to the emerging marketplace on the Internet. (Retailers) of all kinds are now scrambling to establish themselves and reach (customers) in this new marketplace. The major obstacle to e-commerce is the problem of how to pay for (products) and services online. How can electronic (payments) be made convenient, reliable, and (secure) for consumers and retailers alike? As with every other Internet (technology), a global standard for online (transactions) must emerge before e-commerce becomes a widely accepted (practice). The drive to establish a standard for (electronic) money is well underway. Software developers, banks, and (credit) card companies are all pushing transaction systems to (online) merchants, each betting that their system will become the (standard) way to pay for things online. As a Web (storefront) owner, you must investigate all the (options) and offer as many choices to your customers as they demand, while keeping (costs) and complexities from getting out of hand. IV.Translate the following passage from English into Chinese. A computer virus is a program that “infects” computer files (usually other executable programs) by inserting in those files copies of itself. This is usually done in such a manner that the copies will be executed when the file is loaded into memory, allowing them to infect still other files, and so on. Viruses often have damaging side effects, sometimes intentionally, sometimes not. A virus that propagates (传播) itself across computer networks is sometimes referred to as a “Worm”, especially if it is composed of many separate segments distributed across the network. A “Trojan Horse”, though technically not a virus, is a program disguised as something useful, which when run does something equally devious (阴险的) to the computer system while appearing to do something else. 计算机病毒是通过在计算机文件(通常是其他可执行程序)中插入自身的拷贝来“传染”这些文件的程序。这通常以如此的方式进行,以致文件装入内存时拷贝即被执行,从而使其可再传染其他的文件,等等。病毒常常产生破坏性的副作用,有时是有意的,有时则是无意的。 在计算机网络上自我传播的病毒有时称为“蠕虫”,尤其是在它由分布在网络各处的许多独立部分构成的情况下。“特洛伊木马”虽然从技术上讲不是病毒,但它是伪装成有用东西的程序,运行时在对计算机系统做着同样阴险的事情的同时,表面上却显得在做其他的事情。 |
Section B | I.Fill in the blanks with the information given in the text: 1. Four 2. e-Business 3. vendor-centric; customer-centric 4. Infrastructure II.Translate the following terms or phrases from English into Chinese and vice versa: 1. vendor-centric model 客户中心模式 2. Web site 网站 3. Web surfing 网上冲浪 4. middleware server 中间件服务 5. back-end platform 后端平台 6. e-Business strategy 电子商务策略 7. binary format 二进制格式 8. customer-oriented e-Business system 面向客户的电子商务系统 9. ISV (independent software vendor) 独立软件推销商 10. information infrastructure 信息基础结构设施 |
Section C | I.Fill in the blanks with the information given in the text: 1. Services 2. Marketing 3. storefronts; consulting 4. advertisements; subscriptions II.Translate the following terms or phrases from English into Chinese and vice versa:tablet pc平板 1. Web storefront 网上店面 2. electronic press kit 电子版发行包 3. online retail 在线零售 4. multimedia demo 多媒体演示 5. online access 联机访问 6. value-added services 增值业务 7. product promotion 产品推销 8. communication medium 通信媒体 |
Unit 14 | Computer Security |
Section A | I.Fill in the blanks with the information given in the text: 1. employees 2. Hackers 3. Crackers 4. damage; manipulation 5. Worm 6. software piracy 7. access; backup 8. Passwords II.Translate the following terms or phrases from English into Chinese and vice versa: 1. encryption program 加密程序 2. deletion command 删除命令 3. authorized user 授权的用户 4. backup copy 备份的副本 5. voltage surge 电涌,浪涌电压 6. circuit breaker 断路器 7. electronic component 电子器件 8. data-entry error 数据输入错误 9. electronic break-in 电路中断 10. power line 电力线,输电线 11. detection program 检测程序 12. power source 电源 13. destructive computer program 破坏性计算机程序 14. computer virus 计算机病毒 15. software piracy 软件侵权 16. hard-disk drive 硬盘驱动器 17. virus checker 病毒检查程序 18. primary storage 主存储器 19. electronic bulletin board 电子公告板 20. surge protector 浪涌电压保护器 武汉微博教育 III.Fill in each of the blanks with one of the words given in the following list, making changes if necessary: A virus or other unwelcome surprise can lurk in your computer system for days or months without discovery. A time bomb is a computer program that stays in your system undetected until it is triggered by a certain event in time, such as when the computer system clock reaches a certain date. A time bomb is usually carried by a virus or Trojan horse. For example, the Michelangelo virus contains a time bomb designed to damage files on your hard disk on March 6, the birthday of artist Michelangelo. A logic bomb is a computer program that is triggered by the appearance or disappearance of specific data. For example, suppose a programmer in a large corporation believes that she is on the list of employees to be terminated during the next cost-cutting campaign. Her hostility (敌意) overcomes her ethical (道德的) judgment, and she creates a logic bomb program that checks the payroll (在职人员名单) file every day to make sure her employment status is still active. If the programmer’s status changes to “terminated,” her logic bomb activates a program that destroys data on the computer. A time bomb or logic bomb might do mischief (祸害) in your computer long before the timer goes off. If the bomb contains a virus, it could replicate and spread to other files. Meanwhile, you might send files from your computer to other computers, not knowing that they are infected. IV.Translate the following passage from English into Chinese. But the really amazing thing is that we’re still only at the dawn of the digital age. In the past two decades, the power of microprocessors has increased more than one million times. But 20 years from now, microprocessors will probably be more than a million times again as powerful as they are today. And they’ll contain up to one billion transistors. Over the next few years the PC will remain the main computing tool for most people, but it will be joined by all kinds of new, microprocessor-powered devices that will make your life even easier. For example, when you’re traveling you’ll be able to call up your itinerary, send an e-mail postcard, book an appointment with your doctor or balance your bank account using a handheld PC that will know what information you need, and when and where you need it. And you’ll be able to get a map, hotel guide or the news from the Web via new kinds of cell phones. 但是,真正令人吃惊的是,我们仍然只是处于数字时代的开端。在过去20年,微处理器的功能增强了一百多万倍。但是,今后20年,微处理器的功能很可能比今天再增强一百多万倍。而且,它们将含有多达10亿个晶体管。 在今后几年,个人电脑将依然是大多数人的主要计算工具,但是,在个人电脑之外,将出现各种新颖的由微处理器驱动的设备,使你的生活更加便利。例如,你旅行的时候,可以调出旅行计划,发送明信片,预约医生,或者结算银行账户,所使用的则是手持式个人电脑,它知道你需要什么信息以及何时何地需要。而且,你可以通过新型手机得到地图、饭店指南或网上新闻。 |
Section B | I.Fill in the blanks with the information given in the text: 1. Macro 2. boot sector 3. Parasitic 4. Trojan或Trojan Horse II.Translate the following terms or phrases from English into Chinese and vice versa: 1. partition table 分区表 2. host program 主机程序 3. anti-virus software 反毒软件 4. global template 公用模板 5. virus signature 病毒特征代码 6. BBS (bulletin board system) 公告板系统 7. data corruption 数据毁损 8. MBR (master boot record) 主引导记录 9. boot sector 引导扇区 10. macro virus 宏病毒 |
Section C | I.Fill in the blanks with the information given in the text: 1. Protect 2. entertainment; challenge 3. IP address 4. back doors II.Translate the following terms or phrases from English into Chinese and vice versa: 1. system platform 系统平台 2. install back doors 安置后门 3. email attachment 的附件 4. vulnerability assessment tool 弱点评估工具 5. network security measure 网络安全措施 6. system maintenance personnel 系统维护人员 7. MX record 函件交换记录 8. hack a system 非法闯入系统 |
Unit 15 | Remarks by IT Giants |
Section A | I.Fill in the blanks with the information given in the text: 1. color TVs 2. Web 3. Corporations 4. Connectivity 5. access或connectivity 6. telecommunications; telephone 7. wireless; high-bandwidth 8. Internet II.Translate the following terms or phrases from English into Chinese and vice versa: 1. PC-plus era PC影响力增强的时代 2. cable modem 海底电缆 3. universal PC model 通用PC模式 4. multifunctional device 多功能设备 5. information overload 信息过载,信息超负荷 6. high-bandwidth connectivity 高带宽连通性 7. consumer electronics 消费类电器 8. investment portfolio 投资组合 9. virtual convergence 虚拟整合 10. tablet PC 便笺簿式个人电脑 11. voice recognition 语音识别 12. smart television 智能电视 13. R & D (research and development) 研究与开发 14. surf the Web 在网上冲浪 15. Auto PC 自动个人计算机 16. e-mail colleagues 给同事发 17. Web-enabled cell phone 具有上网功能的手机 18. digital technology 数字技术 19. wireless technology 无线技术 20. broadband communications 宽带通信 III.Fill in each of the blanks with one of the words given in the following list, making changes if necessary: At home, you’ll be able to operate your PC by talking to it. It will automatically back up all your information, update its own software and synchronize itself with your TV, cell phone, handheld, and all the devices on your home network. The refrigerator in your kitchen will know how well stocked it is, suggest recipes based on what’s available, and order more food from your online grocer. Your TV will double as an interactive shopping mall, letting you buy advertised products or clothes you saw in a sitcom. And if you don’t want to watch TV, you’ll be able to read an electronic book that knows your favorite authors and automatically downloads their latest novels. If you decide to read one of them, your bank account will be debited. Sounds like science fiction? Just a few years ago, it was. But thanks to the microprocessor—and to all the incredible innovations in software, hardware, the Internet and telecommunications—everything I’ve described is already possible. And although you can’t yet buy all these devices at your local computer retailer, the incredible speed at which technology is advancing means that it won’t be long before they’re as commonplace as the PC. |
Section B | I.Fill in the blanks with the information given in the text: 1. information; communication 2. e-business 3. Restructuring 4. Application II.Translate the following terms or phrases from English into Chinese and vice versa: 1. networking technology 网络技术 2. assembly plant 组装厂 3. state-owned enterprise 国有企业 4. economic reform 经济改革 5. supply chain 供应链 6. cable television 有线电视 7. cost control 成本控制 8. joint venture 合资企业 9. application software 应用软件 10. inventory management 库存管理 |
Section C | I.Fill in the blanks with the information given in the text: 1. Fundamentals 2. Opportunities 3. technology; technological 4. memory chips; microprocessors II.Translate the following terms or phrases from English into Chinese and vice versa: 1. inflection point 拐点,回折点 2. media industry 媒体业 3. mainframe computer 大型计算机 4. problem diagnosis 问题诊断 5. technological concept 技术概念 6. ATM (Automatic Teller Machine) 自动柜员机 7. memory chip 存储芯片 8. competitive environment 竞争环境 |
版权声明:本站内容均来自互联网,仅供演示用,请勿用于商业和其他非法用途。如果侵犯了您的权益请与我们联系QQ:729038198,我们将在24小时内删除。
发表评论