电子文档交易市场
安卓APP | ios版本
电子文档交易市场
安卓APP | ios版本

计算机英语教程 教学课件 ppt 作者 吕云翔 杨雪 林珣_ Unit 10

29页
  • 卖家[上传人]:E****
  • 文档编号:89540666
  • 上传时间:2019-05-27
  • 文档格式:PPT
  • 文档大小:203.50KB
  • / 29 举报 版权申诉 马上下载
  • 文本预览
  • 下载提示
  • 常见问题
    • 1、Unit 10 Computer Security,计算机英语教程 教学课件,Contents,Part 1 Reading and Translating Section A: Computer Security Section B: Computer Virus Section C: Firewall Part 2 Simulated Writing: Business Letter Part 3 Listening and Speaking Dialogue: Using Anti-virus Software Listening Comprehension: Hacker and Cracker Dictation: Father of the Mouse Doug Engelbart,1.1 Computer Security,Introduction Security Architecture Hardware Mechanisms that Protect Computers and Data Secure Operating Systems Secure Coding

      2、Applications,1.1 Computer Security,Complex Sentences Original: If the operating environment is not based oin a secure operating system capable of maintaining a domain for its own execution, and capable of protecting application code from malicious subversion, and capable of protecting the system from subverted code, then high degrees of security are understandably not possible. Translation:如果操作环境不是基于一个安全的操作系统能够维持自己的执行域,并能保护应用程序代码免受恶意破坏,以及保护系统免受破坏代码损害,那么高安全程度是显然不可能的。,1.1 Computer Security,Exercis

      3、es I. Read the following statements carefully, and decide whether they are true (T) or false (F) according to the text. _1Computer security is a branch of technology arranged under information security category. _2Physically limiting access to computers is approximately one of the strongest approaches to improve computer security. _3Computer programming strategies are often considered as the most dependent approach for computer security among others. _4In aviation, transmitting unauthorized comm

      4、unications over specific radio frequencies may spoof air traffic controllers or simply disrupt communications altogether. _5The issues of computer security are an indispensable part of maintaining an operational industry.,1.1 Computer Security,II. Choose the best answer to each of the following questions. 1What is the primary difference of computer security from some other computer science fields? AIts varied objectives BIts positive enforceable rules CIts negative requirements DIts impractical

      5、for most computer programs,C,1.1 Computer Security,II. Choose the best answer to each of the following questions. 2Which of the following strategies is demonstrated via the example of“the Bell-LaPadula model” belongs? ASecure Architecture BSecure Operating Systems CSecure Coding DSecure Hardware Mechanisms,D,1.1 Computer Security,II. Choose the best answer to each of the following questions. 3Which of the following is NOT argued in the instances of computer security accidents in aviation? AHuman

      6、 error BComputer malfunction CHackers intruding DElectromagnetic interference,B,1.1 Computer Security,III. Translating. 1. Original: The objective of computer security includes protection of information and property from theft,corruption or natural disaster, while allowing the information and property to remain accessible and productive to its intended users. Translation: 2. Original Other accidental and intentional faults have caused significant disruption of safety critical systems throughout

      7、the last few decades and dependence on reliable communication and electrical power only jeopardizes computer safety. Translation:,1.2 Computer Virus,Introduction Infection Strategies Vulnerability and Countermeasures Disadvantages,1.2 Computer Virus,Complex Sentences Original: Just as genetic diversity in a population decreases the chance of a single disease wiping out a population, the diversity of software systems on a network similarly limits the destructive potential of viruses. Translation:

      8、正像在种群中的遗传多样性降低了某种单一疾病灭绝种群的可能性,网络中软件系统的多样性也类似地限制了病毒的破坏性潜力。,1.2 Computer Virus,Exercises I. Read the following statements carefully, and decide whether they are true (T) or false (F) according to the text. _1Windows is by far the most popular operating system for virus writers due to their market dominance. _2Bugs in software generally means potential exploits for the spread of viruses. _3The method of using a heuristic algorithm to find viruses can detect viruses which havent yet been defined in

      9、the current database of known virus “signatures”. _4The backups on CD/DVD are always safe because the media becomes read-only and can no longer be affected by a virus. _5Anti-virus software can enhance the underlying capability of host software to prevent viruses transmitting.,1.2 Computer Virus,II. Choose the best answer to each of the following questions. 1Which of the following is RIGHT about the infection strategies of viruses? AViruses may take advantage of present network services to facilitate their spread BAll original viruses must modify the copies in metamorphic viruses for spread CThe success of viruses all relies on their fast infection rate to spread DAll viruses pretend that they are executable files in order to replicate themselves,B,1.2 Computer Virus,II. Choose the best answer to each of the following questions. 2Which of the following is NOT an effective countermeasure to viruses? AUpdating operating system regu

      《计算机英语教程 教学课件 ppt 作者 吕云翔 杨雪 林珣_ Unit 10》由会员E****分享,可在线阅读,更多相关《计算机英语教程 教学课件 ppt 作者 吕云翔 杨雪 林珣_ Unit 10》请在金锄头文库上搜索。

      点击阅读更多内容
    最新标签
    发车时刻表 长途客运 入党志愿书填写模板精品 庆祝建党101周年多体裁诗歌朗诵素材汇编10篇唯一微庆祝 智能家居系统本科论文 心得感悟 雁楠中学 20230513224122 2022 公安主题党日 部编版四年级第三单元综合性学习课件 机关事务中心2022年全面依法治区工作总结及来年工作安排 入党积极分子自我推荐 世界水日ppt 关于构建更高水平的全民健身公共服务体系的意见 空气单元分析 哈里德课件 2022年乡村振兴驻村工作计划 空气教材分析 五年级下册科学教材分析 退役军人事务局季度工作总结 集装箱房合同 2021年财务报表 2022年继续教育公需课 2022年公需课 2022年日历每月一张 名词性从句在写作中的应用 局域网技术与局域网组建 施工网格 薪资体系 运维实施方案 硫酸安全技术 柔韧训练 既有居住建筑节能改造技术规程 建筑工地疫情防控 大型工程技术风险 磷酸二氢钾 2022年小学三年级语文下册教学总结例文 少儿美术-小花 2022年环保倡议书模板六篇 2022年监理辞职报告精选 2022年畅想未来记叙文精品 企业信息化建设与管理课程实验指导书范本 草房子读后感-第1篇 小数乘整数教学PPT课件人教版五年级数学上册 2022年教师个人工作计划范本-工作计划 国学小名士经典诵读电视大赛观后感诵读经典传承美德 医疗质量管理制度 2 2022年小学体育教师学期工作总结 2022年家长会心得体会集合15篇
    关于金锄头网 - 版权申诉 - 免责声明 - 诚邀英才 - 联系我们
    手机版 | 川公网安备 51140202000112号 | 经营许可证(蜀ICP备13022795号)
    ©2008-2016 by Sichuan Goldhoe Inc. All Rights Reserved.