【正文】
ciety. Could hackers possibly use your program to illegally gain access to a puter system? Skillful hackers can hack into banks and into credit card panies。 4虛擬化可以使一個損壞的云端服務(wù)器迅速找到替代品而不造成大的損失或破壞。 2目前云計算技術(shù)涉及一個數(shù)據(jù)中心的存在,這個中心能夠為全世界用戶提供服務(wù)。 5 除此之外,云計算還不容易受到黑客入侵和分布式拒絕服務(wù)的攻擊,因為攻擊者不知道數(shù)據(jù)的位置。這就可以省去燃料費,減少二氧化碳排放,從而保護了環(huán)境。2 由于云計算可以用來不斷提供資源,因此當(dāng)你需要擴充計算機容量時就不需要去買硬件,就不會因為用電去冷卻計算機設(shè)備而產(chǎn)生更多的二氧化碳。5 盡管因特網(wǎng)已經(jīng)徹底改變了全球通訊,但是對于那些利用網(wǎng)絡(luò)力量實現(xiàn)罪惡目的的人和那些負責(zé)阻止這些網(wǎng)絡(luò)犯罪的人來說,他們之間的較量才剛剛開始。4 間諜軟件與垃圾郵件和釣魚網(wǎng)絡(luò)一起,構(gòu)成了三個令人生厭的互聯(lián)網(wǎng)害蟲。3 最簡單的釣魚騙局試圖利用迅速致富的伎倆誘使詐騙目標寄錢。2 當(dāng)一個軟件漏洞被發(fā)現(xiàn),黑客可以將它變成一個侵入點,從而造成極大的破壞。5) 另外,考慮安裝一個硬件防火墻并將從互聯(lián)網(wǎng)中流入和流出的數(shù)據(jù)限定在幾個真正需要的端口,如電子郵件和網(wǎng)站流量。3) 那些系統(tǒng)開發(fā)者或操作者所忽視的不為人知的漏洞很可能是由于糟糕的設(shè)計造成的,也可能是為了讓系統(tǒng)具備一些必要的功能而導(dǎo)致計劃外的結(jié)果。.. .. .. ..Reading: Text 1 the words with their definitions.1g 2a 3e 4b 5c 6d 7j 8f 9h 10i2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 symbolic 2distributed 3site 4plex 5identify6fairly 7straightforward 8capability 9target 10attempt11process 12parameter 13interpretation 14technical 15range 16exploit 17networking 18involve 19 instance 20specification 21acpany 22predictable 23profile3. Read the sentences in the box. Pay attention to the parts in bold.Now plete the paragraph by translating the Chinese in brackets. You may refer to the expressions and the sentence patterns listed above.ranging from(從……到)arise from some misunderstandings(來自于對……誤解)leaves a lot of problems unsolved(留下很多問題沒有得到解決)opens a path for(打開了通道)requires a different frame of mind(需要有新的思想) the following sentences from Text 1 into Chinese.1) 有些人聲稱黑客是那些超越知識疆界而不造成危害的好人(或即使造成危害,但并非故意而為),而“駭客”才是真正的壞人。2) 這可以指獲取計算機系統(tǒng)的存儲內(nèi)容,獲得一個系統(tǒng)的處理能力,或捕獲系統(tǒng)之間正在交流的信息。 4) 另一種是預(yù)先設(shè)定好程序?qū)μ囟ㄒ资芄魧ο筮M行攻擊,然而,這種攻擊是以鳥槍式的方式發(fā)出的,沒有任何具體目標,目的是攻擊到盡可能多的潛在目標。Reading: Text 2 the words with their definitions.1d 2f 3h 4i 5a 6e 7b 8j 9g 10c the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 promised 2notoriety 3 interchangeably 4malfunctioned 5squeeze6 ingenious 7 emergence 8 humble 9 Cunning 10 vulnerability11criminal 12patches 13 sinister 14daunting 15replicate16malicious 17 spirals 18secure 19blur 20 stem21 disrepute 22 sophisticated 23harness 24 recipient 25convert 3. Read the sentences in the box. Pay attention to the parts in bold. Now plete the paragraph by translating the Chinese in brackets. You may refer to the expressions and the sentence patterns listed above.There is evidence(有證據(jù)表明)so hasthe numberof hackers(黑客的數(shù)量也有很大增長)are often referred to as(往往被稱之為)promise your puter(損壞你的計算機)capture your information(獲取你的信息)access your puter(進入你的計算機)4 .Translate the following sentences from Text 2 into Chinese.1 看似無害的編程錯誤可能被利用,導(dǎo)致電腦被侵入,為電腦病毒和蠕蟲的繁衍提供溫床。在這之前,往往需要爭分奪秒地利用正確的軟件補丁來防止破壞的發(fā)生。但網(wǎng)絡(luò)騙子們也變得越來越狡猾,最近的陷阱是通過發(fā)送客戶服務(wù)的電子郵件讓用戶進入假銀行或商業(yè)網(wǎng)站,并在那里請他們“重新輸入”他們的賬戶信息。盡管有些程序可以通過入侵軟件漏洞從而進入電腦,但這些有害而秘密的程序通常會隨著其他免費的應(yīng)用軟件侵入到計算機系統(tǒng)中。Reading: Text 31. Match the words with their definitions.1f 2d 3e 4j 5i 6h 7b 8a 9g 10c2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 irrespective 2 be tailored 3 prone 4 opt 5maximum6coded 7provision 8catered 9check 10readymade11modified 12ondemand 13 whereabouts 14Hazardous 15incurred16applicable 17developer 18on offer19host 20nominal 21certified 22automated 23outage24sync 25back up 26minimal 27mobile 3. Read the sentences in the box. Pay attention to the parts in bold. Now plete the paragraph by translating the Chinese in brackets. You may referto the expressions and the sentence patterns listed above.Irrespective of whether(不管)saveusersthe trouble(使用戶避免這樣的麻煩)caters to the needs of(迎合了需求)for the purpose of(其目的就是)4. Translate the following sentences from Text 3 into Chinese. 1 云計算可定義為一種按次付費模式,這種模式可以根據(jù)要求迅速得到計算機分配的可靠資源,用戶很少需要自己進行管理。3 這意味著他們不需要開車到辦公地點。 4 萬一斷電,客戶可以在電腦再啟動時使用和主機同步的備份。Reading: Text 41. Match the words with their definitions.1c 2e 3a 4i 5g 6b 7d 8f 9j 10h2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 analogy 2patible 3 Distribute 4 implement 5activated 6 static 7 aggregated 8 clone 9 innovative 10replacement 11 crashed12 promised 13 mine 14 substantial 15asset 16 centralize 17 facilities18 loose 19 monitor 20integrate 21derived 22 update 23download24 upgrade 25licensed 26differential 27 install 28 minimum 29 inhouse 30crucial 3. Read the sentences in the box. Pay attention to the parts in bold. Now plete the paragraph by translating the Chinese in brackets. You may referto the expressions and the sentence patterns listed above.remains wide open(有很大的前景)is derived from the way in which(來自這樣一個方法)bees crucial(非常重要)will be substantially reduced(會大大降低) the following sentences from Text 4 into Chinese.1這個術(shù)語來自于因特網(wǎng)往往呈現(xiàn)為網(wǎng)絡(luò)圖的方法。 3這就減少了由于沒有硬件,如手提電腦帶來的影響。 5云技術(shù)還處于起步階段,更多新的優(yōu)點會不斷被發(fā)現(xiàn)。 they can alter accounts and steal money. They can also create viruses that can cause billions of dollars of damage worldwide. Number Ten, The tenth mandment says: Thou shalt always use a puter in ways that are respectful of others. For example, sending unfriendly to someone or about someone or creating websites with negative messages are examples of breaking this rule.OK, the Computer E