内容发布更新时间 : 2024/12/23 8:48:25星期一 下面是文章的全部内容请认真阅读。
新视野大学英语读写教程第五册答案
paragraph)
Comprehension of the Text
1. Processing had slowed to a crawl. Employees at the firm couldn't print documents, change screens or even move their pointer without enduring long delays.
2. They ran some tests first. Their repeated attempts to delete the bad software were to no avail, as each time the hacker would again break into the network to reinstall it. Finally they were successful by installing a hardware security device.
3. They can destroy databases, steal trade secrets, erase hard drives and make public a company's confidential client information. They can halt e-commerce through \attacks, damage websites, commit financial fraud and pretend to be merchants by diverting customers to fake websites.
From remote locations, hackers also can convert a computer into a listening device and overhear or record anyone talking in the vicinity of the computer. They can use other programs to manipulate company computers via the Internet.
4. No, because hackers who sneak into others' system don't search for a name, they search for a weakness.
5. They can minimize their risks by conducting weakness appraisals, choosing experienced security personnel, and establishing- and then enforcing- robust security policies and procedures.
6. Run background checks on any individuals who will be given privileged access to the company's computer systems.
Limit employees' access to the computer system, by implementing effective password management systems, such as \that minimize the risk of employees' passwords becoming available to others.
7. Individuals assume false identities (as utility workers, telephone repairers, messengers, or computer technicians) to deceive employees into disclosing their passwords and other information. Some hackers even take temporary positions on night cleaning crews so they can browse files, poke through trash or install devices to extract information.
8. Don't type their passwords and other confidential data when others are nearby. Employees should never reveal passwords (even when asked by a network administrator). Other reckless behavior to be avoided includes keeping \
31 / 39
新视野大学英语读写教程第五册答案
boards, or under keyboards. Under no circumstances should employees select easy-to-guess passwords such as their nickname or the name of their child, spouse, pet or car. Whenever possible, employees should create seven-character passwords consisting of small and capital letters, numbers and symbols.
9. Hackers sometimes employ \in the dictionary -- to crack passwords.
10. Anti-virus software, which searches hard disks for recognized viruses, isn't perfect. New viruses (which the software cannot yet detect) are let loose daily. And clever hackers can sneak notorious ones, such as the Melissa virus, past the programs by compressing the vires' file size, or by using tools to attach the viruses to legitimate programs such as cartoons or greetings.
Even with the best security defenses in place, companies' networks and intellectual property still may be vulnerable to insiders. Vocabulary
I. baffled 2. diverted 3. refrain 4. extract 5. revenge 6. vicinity 7. confidential 8. slack 9. straightforward 10. deduced 11. browsed 12. presume
Exercises on CD and web course only: 13. robust 14. sneak 15. reckless 1. with 2. in 3. into 4. via 5. to 6. into 7. in 8. for 9. from 10. of 11. of 12. into
Exercises on CD and web course only: 13. to 14. to 15. from Section Reading Skills
1. Writing and distributing destructive viruses, stealing and changing the information in other people's computer systems without their knowledge or permission are considered to be computer crimes.
2. Tough laws have been formulated and enforced against computer crimes, such as hacking. These criminals are arrested, tried and prosecuted for their computer crimes.
3. As computer crimes are very new ones people might have different views on judging whether the law and the court are being fair in penalties.
32 / 39
新视野大学英语读写教程第五册答案
4. According to what we have learned about \who have not been authorized access to the target computer system and are not familiar with the security situation of that system, and as a result they are not likely to cause great damage than insiders.
5. Morris probably faces 18 to 24 months in prison. His maximum penalty would be five years and a $250,000 fine. Comprehension of the Text El
1. F 2. T 3. F 4. F 5. F 6. F 7. T 8. T 9. F 10. T PART II
~'kEY TO EXERCISES Pre-reading Activities --nnwwmm~
What is the place of basic old-fashioned values -- such as honesty, kindness and generosity -- in the consumer culture of today's society? That's the question the writer asks after reflecting on a newspaper story about a little boy who found some lost money and returned it to its owner. What bothers the writer is that some of the teachers at the boy's school were not happy with the token reward for his good deed. They wanted more. The author, on the contrary, thinks that a good deed itself is its own reward. Any external stuff corrodes the integrity of human beings. Inner peace and happiness do not rely on material incentives. (Words: 108)
The purpose of this passage is to familiarize the students with the main idea of Passage A,
so that their reading will be better focused. By listening to this passage, the students will be able to get a general idea of the reading passage: it is about moral values, such as honesty, kindness and generosity.
The students are encouraged to get whatever answers they may think of for the questions.
新视野大学英语第五册读写教程课后答案 unit 8
unit 8
Comprehension of the Text
1. No, the author believes that it is unnecessary.
33 / 39
新视野大学英语读写教程第五册答案
2. Because they thought the reward to the boy was not enough to match his good deed. 3. In his opinion, they are more confused about values than the boy. 4. Greed.
5. They treated it with scorn and cynicism. 6. No.
7. The obscene message is that children can get material incentives if tbey do what have been told. For example, children are offered either some money or a party or a $10 a week if they learn mathematics, read a certain number of books or do not stay away from school. 8. It refers to material rewards or incentives, such as money or ice cream. 9. That there are some simple pleasures that don't require a purchase. 10. Parents should set good examples to their children. Vocabulary
1. cynical 2. plight 3. ascribe 4. refreshments 5. compulsory 6. commended 7. reeled 8. suffice 9. absurd 10. aggravated 11. obscene 12. eclipsed
Exercises on CD and web course only: 13. outraged 14. elicit 15. incentive 1D
1. In retrospect 2. a token of 3. converted to 4. looked up to
5. are on the brink of(making) 6. be subject to 7. run out of control 8. reeled.., in 9. a parade of 10. ascribed.., to 11. In light of 12. belonged to
Exercises on CD and web course only: 13. doled out 14. paid dividends 15. cling to Collocation B
I. phone 2. green 3. business 4. identity 5. credit 6. Valentine 7. tarot 8. Christmas
Exercises on CD and web course only: 9. birthday 10. greeting Translation
1. Children were asked to complete many compulsory pieces of work each week.
34 / 39
新视野大学英语读写教程第五册答案
2. I commended the girl on the excellent job she had done. I later wrote to commend her to her employer.
3. Everyone with a mortgage realized the government's economic strategy was not working. 4. Absurd though it may seem, it is quite likely that Mr. Smith and his companions genuinely believe all this.
5. He aggravated his condition by leaving hospital too soon. 6. By patient questioning we managed to elicit enough information from the witness.
7. During your flight you can relax with a drink from the duty-free bar, and a meal or light
refreshments will be served according to the time of day.
8. I was in a dreadful plight -- I had lost my money and missed the last bus home.
9. One of the witnesses was bribed to give false evidence. 10. Despite repeated assurance(s) he failed to repay the money he had borrowed.
-- l
Changes in the American family structure are evidenced by increased rates of separation and
divorce. In certain areas of the country these trends have resulted in a growing number of singleparent
families and remarried parents. This does not indicate, however, that the institution of
marriage is crumbling. It is estimated that four ont of five divorced couples eventually remarry
35 / 39