freepeople性欧美熟妇, 色戒完整版无删减158分钟hd, 无码精品国产vα在线观看DVD, 丰满少妇伦精品无码专区在线观看,艾栗栗与纹身男宾馆3p50分钟,国产AV片在线观看,黑人与美女高潮,18岁女RAPPERDISSSUBS,国产手机在机看影片

正文內(nèi)容

計(jì)算機(jī)英語(第4版)課后練習(xí)參考答案-資料下載頁

2025-07-27 07:21本頁面
  

【正文】 ey threat to software is an attack on availability7. In developing a security policy, a security manager must balance ease of use against security against cost of failure and recovery.8. In the context of puter security, assurance is the degree of confidence one has that the security measures work as intended.II. Translate the following terms or phrases from English into Chinese and vice versa:1. backup system 備份系統(tǒng)2. encryption key (加密)密鑰3. data confidentiality 數(shù)據(jù)機(jī)密性4. system vulnerability 系統(tǒng)脆弱性,系統(tǒng)脆弱之處5. unauthorized access 未經(jīng)授權(quán)的訪問,越權(quán)存取6. intrusion detection system 入侵檢測(cè)系統(tǒng)7. afteraction recovery 事后恢復(fù)8. software piracy 軟件侵權(quán)9. authorized user 特許用戶10. data unit 數(shù)據(jù)單元,數(shù)據(jù)單位11. 軟件版本 software version12. 數(shù)據(jù)完整性 data integrity13. 系統(tǒng)崩潰 system crash14. 病毒檢查軟件 viruschecking software15. 綜合安全策略 prehensive security strategy16. 軟件配置管理 software configuration management 17. 故障隔離 fault isolation18. 統(tǒng)計(jì)數(shù)據(jù)庫 statistical database19. 保密的加密算法 secure encryption algorithm20. 數(shù)據(jù)流 data streamIV. Translate the following passage from English into Chinese:Intruder (入侵者) attacks range from the benign (良性的,溫和的) to the serious. At the begin end of the scale, there are many people who simply wish to explore internets and see what is out there. At the serious end are individuals who are attempting to read privileged data, perform unauthorized modifications to data, or disrupt the system.The objective of the intruder is to gain access to a system or to increase the range of privileges accessible on a system. Most initial attacks use system or software vulnerabilities that allow a user to execute code that opens a back door into the system. Intruders can get access to a system by exploiting attacks such as buffer overflows (緩存溢出) on a program that runs with certain privileges.Alternatively, the intruder attempts to acquire information that should have been protected. In some cases, this information is in the form of a user password. With knowledge of some other users’ password, an intruder can log in to a system and exercise all the privileges accorded to the legitimate user.入侵者攻擊從溫和的到嚴(yán)重的形形色色。在這一系列攻擊的溫和端,有許多人只是希望探查互聯(lián)網(wǎng),看看那里有什么。在嚴(yán)重端的是試圖閱讀特許數(shù)據(jù)、對(duì)數(shù)據(jù)進(jìn)行未經(jīng)授權(quán)的修改或擾亂系統(tǒng)的個(gè)人。入侵者的目標(biāo)是獲得進(jìn)入一個(gè)系統(tǒng)的機(jī)會(huì),或者增加在一個(gè)系統(tǒng)中可以使用的特權(quán)范圍。初始攻擊大多利用系統(tǒng)或軟件的脆弱之處,這些脆弱之處允許用戶執(zhí)行相應(yīng)的代碼,打開進(jìn)入系統(tǒng)的后門。入侵者可對(duì)具有某些運(yùn)行特權(quán)的程序?qū)嵤┫窬彺嬉绯鲞@樣的攻擊,利用此類攻擊獲得進(jìn)入一個(gè)系統(tǒng)的機(jī)會(huì)。另外,入侵者也試圖獲取應(yīng)予保護(hù)的信息。在有些情況下,這種信息是以用戶口令的形式存在的。知道了某個(gè)其他用戶的口令之后,入侵者就可以登錄系統(tǒng)并行使賦予合法用戶的所有特權(quán)。Unit Ten/Section BI. Fill in the blanks with the information given in the text:1. Most mercial antivirus software uses both the virus dictionary approach and the suspicious behavior approach with emphasis on the virus dictionary approach.2. An emerging technique to deal with malware in general is whitelisting which prevents execution of all puter code except that which has been previously identified as trustworthy by the system administrator.3. Instead of attempting to identify known viruses, the suspicious behavior approach provides protection against brandnew viruses that do not yet exist in any virus dictionaries.4. Usually one should have only one type of memoryresident antivirus software installed on a single puter.II. Translate the following terms or phrases from English into Chinese and vice versa:1. phishing attack 網(wǎng)絡(luò)釣魚攻擊2. graphics card 顯(示)卡3. heuristic analysis 試探性分析4. infected file 被感染文件5. virus dictionary 病毒字典6. 數(shù)據(jù)捕獲 data capture7. 惡意軟件 malicious software8. 病毒特征代碼 virus signature9. 防病毒軟件 antivirus software10. 內(nèi)存駐留程序 memoryresident programUnit Eleven: CybercultureUnit Eleven/Section BI. Fill in the blanks with the information given in the text:1. When professional website designers determine the number of levels in a website, a guideline usually followed is that there should be a maximum of three links for the most important information.2. A website has a few different kinds of webpages: the homepage, node pages, basic pages, navigation pages, and the optional splash page.3. According to the text, the five principles of design for the interface of a website are balance, alignment, grouping, consistency, and contrast.4. Before uploading your website, you should do some usability testing to ensure quality.II. Translate the following terms or phrases from English into Chinese and vice versa:1. webauthoring software 網(wǎng)絡(luò)寫作軟件2. template generator 模版生成程序3. navigation page 導(dǎo)航頁面4. corporate logo 公司標(biāo)識(shí)5. splash page 醒目頁面,過渡頁6. 導(dǎo)航條 navigation bar7. 節(jié)點(diǎn)頁面 node page8. 網(wǎng)站地圖 site map9. 可用性測(cè)試 usability testing10. 圖形交換格式 gif(Graphics Interchange Format)Unit Twelve: Electronic CommerceUnit Twelve/Section BI. Fill in the blanks with the information given in the text:1. All electronic merce sites must at least provide a catalog display, shopping cart capabilities, and transaction processing.2. Small merce sites can use a(n) static catalog while larger merce sites are more likely to use a(n) dynamic catalog.3. A shopping cart is sometimes called a shopping bag or shopping basket.4. At checkout, the online shopper’s Web browser software and the seller’s Web server software both switch into a secure state of munication.II. Translate the following terms or phrases from English into Chinese and vice versa:1. software suite 軟件套件2. text box 文本框3. virtual checkout counter 虛擬付款臺(tái)4. static catalog 靜態(tài)目錄5. browser session 瀏覽器會(huì)話期6. 動(dòng)態(tài)目錄 dynamic catalog7. 購物車軟件 shopping cart software8. 供應(yīng)鏈 supply chain9. 企業(yè)資源計(jì)劃軟件 enterprise resource planning (ERP) software10. 稅率 tax rate
點(diǎn)擊復(fù)制文檔內(nèi)容
環(huán)評(píng)公示相關(guān)推薦
文庫吧 www.dybbs8.com
備案圖鄂ICP備17016276號(hào)-1