1、 Unit 1 Computer Hardware Unit 2 Computer Software Unit 3 Computer Network Unit 4 MultimediaCONTENTS Unit 5 E-commerce Unit 6 Computer Security Unit 7 Big Data Unit 8 Cloud Computing Unit 6 Computer SecuritySpeakingListeningReadingWritingPerimeter Network边界网络Internal Network 内部网络Web Servers网站服务器Swit
2、ch 交换机Internal FirewallInternal Router内部路由器内部防火墙1 1.Look at the following picture and speak out each name of the following devices in computer Look at the following picture and speak out each name of the following devices in computer security management in Chinese.security management in Chinese.Data
3、base Server数据库服务器数据存储区Data Store2.Look at the following picture and describe the major function of firewalls in computer 2.Look at the following picture and describe the major function of firewalls in computer security.security.3.Suppose you are a cyber-security expert.Give a presentation to each pi
4、cture in English.3.Suppose you are a cyber-security expert.Give a presentation to each picture in English.Picture 1 Have you ever been a victim of malware?What have you donePicture 1 Have you ever been a victim of malware?What have you done?Reference words:virus 病毒 cyber attack 网络攻击 WannaCry ransom
5、ware 勒索病毒encrypt 加密Microsoft Windows operating system 微软操作系统Picture Picture 2 2 3.Introduce the most popular anti-virus 3.Introduce the most popular anti-virus softwaressoftwares and their features to the users.and their features to the users.1.Listen carefully and choose the words you hear.1.Listen
6、 carefully and choose the words you hear.1A.better B.bitter C.letter D.litter2.A.pig B.big C.pear D.bear3.A.cup B.cuff C.cap D.cab4.A.slip B.sheep C.shipD.sleep5.A.cheek B.chick C.copyD.coffee6.A.boat B.vote C.bestD.vest7.A.hat B.hot C.vatD.vet8.A.beg B.bad C.bedD.bag9.A.seat B.seed C.sealD.zeal10.A
7、.cork B.cock C.cotD.cartKeys:1.A.2.D.3.B.4.C.5.A.6.D.7.C.8.B.9.C.10.C.2.Listen to the short passage and choose the proper words to fill in 2.Listen to the short passage and choose the proper words to fill in the blanks.the blanks.Not all people like to work but everyone likes to play.All over the wo
8、rld men and women,boys and girls enjoy 1 (sports,shopping,sleeping).Since long,adults and children have called their friends together to spend hours,even days playing games.Sports help people to live happily.They help to keep people healthy and feeling 2 (wonderful,great,good).When they are playing
9、games,people move a lot.This is good for their health.Having fun with their friends makes them happy.Many people enjoy sports by 3 (meeting,seeing,watching)others play.In small towns,crowds meet to watch the bicycle races or the soccer games.In the big cities,thousands buy tickets to see ice-skating
10、 shows or 4 (football,baseball,volleyball)games.Is it hot where you live?Then swimming is probably your 5 (best,favorite,like).sport.Boys and girls in China love to swim,while aged people like various kinds of Tai Ji and Qi Gong.The climate is good for all the seasonal sports in the country.3.Listen
11、 to the dialogue and choose the best responses to what you hear.3.Listen to the dialogue and choose the best responses to what you hear.1.A:We both do.B:He doesnt play football.C.No,he doesnt.D.Yes.I do._2.A:I m busy B:I usually watch TV.C.I agree with you.D.I dont want to go there._3.A:I dont like
12、swimming B:I would like to learn it.C.Yes,I think so.D.Its my pleasure._ 4.A:Yes,he is nice.B.Thank you.C.He always wears a cap.D:He is very strong._DB BC CA A 3.Listen to the dialogue and choose the best responses to what you hear.3.Listen to the dialogue and choose the best responses to what you h
13、ear.5.A.I must go now.B.I like basketball best.C.Three years ago.D.one hour._ 6.A.Nobody B.What are you saying?C.Well,I feel a little tired.D.No,I dont like to _7.A:Yes.Thats a good idea.B:I would like a cup of tea.C.How are you getting along?D.Thank your books._8.A:What a pleasure.B.Basketball C.Le
14、ts go.D.I enjoy it._D DC CA AB B4.Listen to the dialogues and choose the best answer to each question 4.Listen to the dialogues and choose the best answer to each question you hear.you hear.1.A.Very happy.B.Very funny.C.Very excited.D.He didnt enjoy himself at all.2.A.He should keep this habit.B.Its
15、 good that he still does so.C.He should change this habit.D.Hed better give up this habit.3.A.She likes doing morning exercises.B.She dislikes doing such exercises.C.She cant get up early.D.She will do it.4.A.2 hours.B.3 hours C.Two hours and a half.D.Three hours and a half5.A.Volleyball.B.Ping-pong
16、.C.Tennis.D.Football.5.Listen to the dialogue and answer the following questions by filling 5.Listen to the dialogue and answer the following questions by filling in the blanks.in the blanks.1.Whats weather like today?Its so 1 _ .2.What do they want to do?They want to go 2 _.3.Does the woman like to
17、 do it?3 _.4.Why does the man insist on playing the game?Because they wont 4 _ when you start the game.5.Do they go to play the game finally?5 _.cold skating No,she doesnt feel cold Yes 6.Listen to the passage and fill in the blanks with words you hear.Some new words 6.Listen to the passage and fill
18、 in the blanks with words you hear.Some new words given below will be of some help to you.given below will be of some help to you.I do like sports!I do like sports!I do like sports during my daily life.Talking about what kind of sport that I like most,I tell you that,its swimming.The 1 I choose swim
19、ming are as follows:First of all,it is 2 enjoyable,you know,in 3 .When the sun is shining 4 ,and the air is even too hot to breathe,swimming would be the best 5 .Once you jump into the water,the coolness will drive all the anxiety and sticky 6 away.Second,I guess swimming is one of the best sports t
20、o 7 ones health.It enables your lungs to breathe more air,and helps the body to build up more muscles.Last but not least,swimming is 8 for girls,since its a whole body sport.9 the whole bodys 10 ,girls can gain a well-shaped figure easily.I like sports.I like swimming.Keys:1.reasons 2.really 3.summe
21、r 4.outside 5.choice 6.feelings 7.improve 8.suitable 9.Through 10.exercise Passage A Computer Security Computer Security Life is full of trade offs and computer security is no different.The only safe computer is a dead computer,or at least a disconnected one.If no one can get to it,no one can harm i
22、t.The only problem is,its not exactly useful in that state.So the extent of computer security is always a tradeoff between putting the computer to use and restricting its misuse and abuse.The time and money you spend on securing your computer has to be weighed against the likely loss if it is broken
23、 into or damaged;e.g.,you are not likely to keep your garbage under lock and key.Passage A Computer security is defined by ISO as follows:a technological and administrative safeguard which is made or accepted for data processing system to prevent computer hardware and software from being accidentall
24、y or maliciously destroyed,alternated or exposed.The range of computer security covers physical security,software security,data security and operation security,etc.Physical security means that the devices of computer system and its relevant facilities work regularly,including main unit,network equip
25、ments,communication circuits,storage devices,etc.Passage A Software security refers to the integrity of software,i.e.the integrity of operating system software,database management software,network software,applications and materials concerned,including development of software,software security test,
26、amendment and copying of software,and so on.Data security means that data or information which is owned or created by the system is kept in full,effective and legally used without being destroyed or disclosed,including input,output,recognition of users,access control,back up and restore,and so forth
27、.Passage A Operation security indicates that system resources are legally used,including power management,environment(including air-conditioner),personnel,admission and exit control of rooms for computer,data and medium management,operation management,etc.As you design or modify your computer and ne
28、twork security,think about how you want to use your systems and what you stand to lose if security is compromised.This will help guide your choice of solutions and their relative complexity and cost.Passage A The only safe computer is a _(1)computer,or at least a _(2)one.If no one can get to it,no o
29、ne can harm it.The only problem is,its not exactly _(3)in that state.So the extent of computer security is always a _(4)between putting the computer to use and restricting its misuse and abuse.The time and money you spend on _(5)your computer has to be weighed against the likely loss if it is broken
30、 into or _(6);e.g.,you are not likely to keep your garbage under lock and key.1.Fill in the blanks without referring to the passage1.Fill in the blanks without referring to the passagedead disconnected useful tradeoff securingdamagedPassage A(1).Is an absolutely safe computer a perfect computer?Why?
31、No.The only safe computer is a dead computer,or at least a disconnected one.Its not exactly useful in that state.(2).What is computer security?Computer security is defined by ISO as follows:a technological and administrative safeguard which is made or accepted for data processing system to prevent c
32、omputer hardware and software from being accidentally or maliciously destroyed,alternated or exposed.(3).What does computer security mainly consist of?The range of computer security covers physical security,software security,data security and operation security,etc.2.Answer the following questions a
33、ccording to the passage 2.Answer the following questions according to the passage Passage A(5).Can you describe the main content of data security?Data security means that data or information which is owned or created by the system is kept in full,effective and legally used without being destroyed or
34、 disclosed,including input,output,recognition of users,access control,back up and restore,and so forth.(6).When you design or modify your computer and network security,what you should think about?As you design or modify your computer and network security,think about how you want to use your systems
35、and what you stand to lose if security is compromised.2.Answer the following questions according to the passage 2.Answer the following questions according to the passage Passage A1.The range of computer security covers physical security,_security,data security and operation security,etc.2.Physical s
36、ecurity means that the devices of computer system and its relevant _ work regularly.3.Software security refers to the _of software.4._ means that data or information which is owned or created by the system is kept in full,effective and legally used.5.Operation security indicates that _ are legally u
37、sed.6.The extent of computer security is always a _ between putting the computer to use and restricting its misuse.3.Complete each of the following statements according to the passage 3.Complete each of the following statements according to the passage softwarefacilitiesintegrityData security system
38、 resources tradeoffPassage A(1)清单1展示了该表的定义。(is defined)Listing 1 shows how this table is defined.(2)其理由如下。(as follows)The reasons are as follows.(3)解锁手机,以防止不必要的检查。(prevent from)Unlock your phone to prevent from unwanted checks.(4)病人可以食用苹果、香蕉、芒果等。(so forth)The patient can have apples,bananas,mangos,a
39、nd so forth.4.Translate the following sentences into English.4.Translate the following sentences into English.Passage A(5).他走了总有一个星期吧。(at least)Hes been away for at least a week.(6).几个钟头抵得过整整一生,是吗?(weigh against)Some hours weigh against a whole lifetime,dont they?(7).他们闯进哪个套间了?(break into)Which flat
40、 did they break into?(8).跟他作生意你是要吃亏的。(stand to lose)4.Translate the following sentences into English.4.Translate the following sentences into English.You will stand to lose if you do business with him.Passage A(1)Computer security is defined by ISO as follows:a technological and administrative safeg
41、uard which is made or accepted for data processing system to prevent computer hardware and software from being accidentally or maliciously destroyed,alternated or exposed.国际标准化委员会对计算机安全给出的定义是:为数据处理系统所建立和采取的技术以及管理的安全保护,保护计算机硬件、软件、数据不因偶然的或恶意的原因而遭到破坏、更改、泄露。(2)Physical security means that the devices of
42、 computer system and its relevant facilities work regularly.实体安全指计算机系统的设备和相关装置有序运行,包括主机、网 络设备、通信线路、存储设备等。5.Translate the following sentences into Chinese.5.Translate the following sentences into Chinese.Passage A(3).Data security means that data or information which is owned or created by the system
43、 is kept in full,effective and legally used without being destroyed.数据安全指系统拥有或创建的数据或信息在不被毁坏和泄露的情况下被充分、有效、合法地使用,包括输入、输出、用户识别,访问控制,备份和修复等。(4).Life is full of trade offs and computer security is no different.生活充满了权衡,计算机安全也不例外。5.Translate the following sentences into Chinese.5.Translate the following se
44、ntences into Chinese.Passage A(5).The only safe computer is a dead computer,or at least a disconnected one.绝对安全意味着形同虚设,至少是孤立的。(6).So the extent of computer security is always a tradeoff between putting the computer to use and restricting its misuse and abuse.所以,计算机安全的程度总是取决于在使用它和限制其误用之间的权衡。5.Transla
45、te the following sentences into Chinese.5.Translate the following sentences into Chinese.Passage A(7).The time and money you spend on securing your computer has to be weighed against the likely loss if it is broken into or damaged你需要对确保计算机安全所花费的时间、金钱与它一旦被侵入或破坏所造成的损失来进行权衡。(8).Operation security indic
46、ates that system resources are legally used.操作安全指合法使用系统资源.5.Translate the following sentences into Chinese.5.Translate the following sentences into Chinese.Passage A(9).As you design or modify your computer and network security,think about how you want to use your systems and what you stand to lose
47、if security is compromised.当你设计和修改计算机和网络安全的时候,要考虑清楚:你想怎样使用系统?如果安全不复存在,你将失去什么?(10).The range of computer security covers physical security,software security,data security and operation security,etc.计算机安全包括实体安全、软件安全、数据安全和操作安全等。5.Translate the following sentences into Chinese.5.Translate the following
48、sentences into Chinese.Passage BSome Security TechniquesSome Security Techniques Security is concerned with protecting information,hardware,and software.Security measures mainly consist of encryption,access control,anticipating disasters and making backup copies.Encryption Whenever information is se
49、nt over a network,the possibility of unauthorized access exists.The longer the distance the message has to travel,the higher the security risk is.For example,an e-mail message on a LAN meets a limited number of users operating in controlled environments such as offices.An e-mail message traveling ac
50、ross the country on the National Information Highway affords greater opportunities for the message to be intercepted.The government is encouraging Passage Bbusinesses that use the National Information Highway to use a special encryption program.This program is available on a processor chip called th