电子文档交易市场
安卓APP | ios版本
电子文档交易市场
安卓APP | ios版本
换一换
首页 金锄头文库 > 资源分类 > PPT文档下载
分享到微信 分享到微博 分享到QQ空间

计算机专业英语课件E1_Unit 10

  • 资源ID:367820301       资源大小:754KB        全文页数:37页
  • 资源格式: PPT        下载积分:10金贝
快捷下载 游客一键下载
账号登录下载
微信登录下载
三方登录下载: 微信开放平台登录   支付宝登录   QQ登录  
二维码
微信扫一扫登录
下载资源需要10金贝
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
如填写123,账号就是123,密码也是123。
支付方式: 支付宝    微信支付   
验证码:   换一换

 
账号:
密码:
验证码:   换一换
  忘记密码?
    
1、金锄头文库是“C2C”交易模式,即卖家上传的文档直接由买家下载,本站只是中间服务平台,本站所有文档下载所得的收益全部归上传人(卖家)所有,作为网络服务商,若您的权利被侵害请及时联系右侧客服;
2、如你看到网页展示的文档有jinchutou.com水印,是因预览和防盗链等技术需要对部份页面进行转换压缩成图而已,我们并不对上传的文档进行任何编辑或修改,文档下载后都不会有jinchutou.com水印标识,下载后原文更清晰;
3、所有的PPT和DOC文档都被视为“模板”,允许上传人保留章节、目录结构的情况下删减部份的内容;下载前须认真查看,确认无误后再购买;
4、文档大部份都是可以预览的,金锄头文库作为内容存储提供商,无法对各卖家所售文档的真实性、完整性、准确性以及专业性等问题提供审核和保证,请慎重购买;
5、文档的总页数、文档格式和文档大小以系统显示为准(内容中显示的页数不一定正确),网站客服只以系统显示的页数、文件格式、文档大小作为仲裁依据;
6、如果您还有什么不清楚的或需要我们协助,可以点击右侧栏的客服。
下载须知 | 常见问题汇总

计算机专业英语课件E1_Unit 10

ContentsPart 1 Reading and TranslatingSection A:Ways to Protect Your Personal Information Online Section B:Using Computer Forensics against CybercrimePart 2 Simulated Writing:Writing for Employment(II)Part 3 Listening and SpeakingDialogue:Using Antivirus SoftwareListening Comprehension:Hacker and CrackerDictation:Trojan Horses1.1 Section A:Ways to Protect Your Personal Information Online Wordsunprecedentednpresidentid adj.前所未有的,空前的,没有先例的engagingineidi adj.有趣的,令人愉快的,迷人的scourskau(r)v.(彻底地)搜寻,搜查perkpk n.(工资之外的)补贴,津贴,额外待遇Words hackhk v.非法侵入(他人计算机系统)mixmiks n.混乱,迷惑starterstt(r)n.起始者,初学者signifysignifai v.表示,说明1.1 Section A:Ways to Protect Your Personal Information OnlinePhrasessign up 注册without you knowing 在不了解你的情况下just the same 仍然,依然,照样in question 被提及的,讨论中的,相关的protect against 保护,保卫in regard to 在方面,就而论big name 成功人士,知名人士1.1 Section A:Ways to Protect Your Personal Information OnlineExercisesI.Read the following statements carefully,and decide whether they are true(T)or false(F)according to the text._1.Identity and money theft risks are one of the biggest threats we face online._2.Many of websites are either malicious or simply not safe._3.If you are surfing the Web,it is not necessary to have some protection._4.The two-step authentication process makes it harder or nearly impossible for hackers to access your information as the password alone is not alone._5.Phishing is a method that can be used by hackers who access private data of individual users.1.1 Section A:Ways to Protect Your Personal Information OnlineII.Choose the best answer to each of the following questions according to the text.1.How many ways are mentioned to protect your personal and banking info?A.One B.ThreeC.FiveD.Seven2.Which of the following is right?A.The two-step authentication process makes it harder or nearly impossible for hackers to access your information as the password alone is not alone.B.Phishing is a method that can be used by hackers who access private data of individual users.C.Identity and money theft risks are one of the biggest threats we face online.D.All of the above1.1 Section A:Ways to Protect Your Personal Information Online3.Which of the following is needed to create a password?A.Social network B.Email C.Banking account D.All of the above1.1 Section A:Ways to Protect Your Personal Information Online.Identify the letter of the choice that best matches the phrase or definition.a.disaster recovery planb.presence technologyc.surge suppressor d.system failuree.uninterruptible power supply(UPS)_1.A device containing a built-in battery that provides continuous power to a computer and other connected when the electricity goes out_2.A device that protects hardware from damage due to electrical fluctuations_3.A written plan that describes the steps a company will take following the occurrence of a disaster_4.Technology that enables one computing device(such as a computer or mobile device)to locate and identify the current status of another device on the same network_5.The complete malfunction of a computer system1.1 Section A:Ways to Protect Your Personal Information OnlineV.Translate the following passage into ChineseWhy do Some Websites Allow Me to Use My Email Address as a Username?No two users can have the same email address;that is,your email address is unique to you.This means you can use your email address and password from one website to validate your identity on another website.Facebook,Google,and Twitter,for example,are three popular websites that provide authentication services to other applications.By using your email address from one of these websites to access other websites,you do not have to create or remember separate user names and passwords for the various websites you visit.1.1 Section A:Ways to Protect Your Personal Information Online 1.2 Section B:Using Computer Forensics against CybercrimeWordsforensicsfrnsiks n.取证,网络法医学copyrightkpirait v.获得的版权vandalismvndlizm n.故意破坏公共财物的行为,恣意毁坏他人财产的行为notenut n.便条tellertel(r)n.(银行的)出纳,出纳员accomplicekmplis n.共犯,帮凶,同谋incriminateinkrimineit v.使负罪,连累1.2 Section B:Using Computer Forensics against CybercrimeWordspointpint v.为(某人)指出wiretapwaitp n.窃听装置,窃听scrupulousskrupjls adj.仔细的,细致的discreditdiskredit v.使怀疑,使不可置信bystanderbaistnd(r)n.旁观者spoofspuf v.欺骗 1.2 Section B:Using Computer Forensics against CybercrimePhrasesplanted evidence 栽赃,伪造证据look through 逐一查看,翻阅guard against 防止,提防 1.2 Section B:Using Computer Forensics against CybercrimeNotes1 拒绝服务攻击(denial-of-service attacks)是攻击者想办法让目标机器停止提供服务,是黑客常用的攻击手段之一。攻击者进行拒绝服务攻击,实际上让服务器实现两种效果:一是迫使服务器的缓冲区满,不接收新的请求;二是使用IP欺骗,迫使服务器把非法用户的连接复位,影响合法用户的连接。2 蜜罐技术(Honeypot)发展于1990年的一种对攻击方进行欺骗的技术,通过布置一些作为诱饵的主机、网络服务或者信息,诱使攻击方对它们实施攻击,从而可以对攻击行为进行捕获和分析,了解攻击方所使用的工具与方法,推测攻击意图和动机,能够让防御方清晰地了解他们所面对的安全威胁,并通过技术和管理手段来增强实际系统的安全防护能力。1.2 Section B:Using Computer Forensics against CybercrimeExercisesI.Read the following statements carefully,and decide whether they are true(T)or false(F)according to the text._1When a network is the target of a cyber-attack,forensic investigat

注意事项

本文(计算机专业英语课件E1_Unit 10)为本站会员(小萌新****ao)主动上传,金锄头文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即阅读金锄头文库的“版权提示”【网址:https://www.jinchutou.com/h-59.html】,按提示上传提交保证函及证明材料,经审查核实后我们立即给予删除!

温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载不扣分。




关于金锄头网 - 版权申诉 - 免责声明 - 诚邀英才 - 联系我们
手机版 | 川公网安备 51140202000112号 | 经营许可证(蜀ICP备13022795号)
©2008-2016 by Sichuan Goldhoe Inc. All Rights Reserved.