《计算机专业英语》课件unit6.pptx

上传人(卖家):momomo 文档编号:7651604 上传时间:2024-05-24 格式:PPTX 页数:45 大小:2.32MB
下载 相关 举报
《计算机专业英语》课件unit6.pptx_第1页
第1页 / 共45页
《计算机专业英语》课件unit6.pptx_第2页
第2页 / 共45页
《计算机专业英语》课件unit6.pptx_第3页
第3页 / 共45页
《计算机专业英语》课件unit6.pptx_第4页
第4页 / 共45页
《计算机专业英语》课件unit6.pptx_第5页
第5页 / 共45页
点击查看更多>>
资源描述

1、 Unit 1 Computer Hardware Unit 2 Computer Software Unit 3 Computer Network Unit 4 MultimediaCONTENTS Unit 5 E-commerce Unit 6 Computer Security Unit 7 Big Data Unit 8 Cloud Computing Unit 6 Computer SecuritySpeakingListeningReadingWritingPerimeter Network边界网络Internal Network 内部网络Web Servers网站服务器Swit

2、ch 交换机Internal FirewallInternal Router内部路由器内部防火墙1 1.Look at the following picture and speak out each name of the following devices in computer Look at the following picture and speak out each name of the following devices in computer security management in Chinese.security management in Chinese.Data

3、base Server数据库服务器数据存储区Data Store2.Look at the following picture and describe the major function of firewalls in computer 2.Look at the following picture and describe the major function of firewalls in computer security.security.3.Suppose you are a cyber-security expert.Give a presentation to each pi

4、cture in English.3.Suppose you are a cyber-security expert.Give a presentation to each picture in English.Picture 1 Have you ever been a victim of malware?What have you donePicture 1 Have you ever been a victim of malware?What have you done?Reference words:virus 病毒 cyber attack 网络攻击 WannaCry ransom

5、ware 勒索病毒encrypt 加密Microsoft Windows operating system 微软操作系统Picture Picture 2 2 3.Introduce the most popular anti-virus 3.Introduce the most popular anti-virus softwaressoftwares and their features to the users.and their features to the users.1.Listen carefully and choose the words you hear.1.Listen

6、 carefully and choose the words you hear.1A.better B.bitter C.letter D.litter2.A.pig B.big C.pear D.bear3.A.cup B.cuff C.cap D.cab4.A.slip B.sheep C.shipD.sleep5.A.cheek B.chick C.copyD.coffee6.A.boat B.vote C.bestD.vest7.A.hat B.hot C.vatD.vet8.A.beg B.bad C.bedD.bag9.A.seat B.seed C.sealD.zeal10.A

7、.cork B.cock C.cotD.cartKeys:1.A.2.D.3.B.4.C.5.A.6.D.7.C.8.B.9.C.10.C.2.Listen to the short passage and choose the proper words to fill in 2.Listen to the short passage and choose the proper words to fill in the blanks.the blanks.Not all people like to work but everyone likes to play.All over the wo

8、rld men and women,boys and girls enjoy 1 (sports,shopping,sleeping).Since long,adults and children have called their friends together to spend hours,even days playing games.Sports help people to live happily.They help to keep people healthy and feeling 2 (wonderful,great,good).When they are playing

9、games,people move a lot.This is good for their health.Having fun with their friends makes them happy.Many people enjoy sports by 3 (meeting,seeing,watching)others play.In small towns,crowds meet to watch the bicycle races or the soccer games.In the big cities,thousands buy tickets to see ice-skating

10、 shows or 4 (football,baseball,volleyball)games.Is it hot where you live?Then swimming is probably your 5 (best,favorite,like).sport.Boys and girls in China love to swim,while aged people like various kinds of Tai Ji and Qi Gong.The climate is good for all the seasonal sports in the country.3.Listen

11、 to the dialogue and choose the best responses to what you hear.3.Listen to the dialogue and choose the best responses to what you hear.1.A:We both do.B:He doesnt play football.C.No,he doesnt.D.Yes.I do._2.A:I m busy B:I usually watch TV.C.I agree with you.D.I dont want to go there._3.A:I dont like

12、swimming B:I would like to learn it.C.Yes,I think so.D.Its my pleasure._ 4.A:Yes,he is nice.B.Thank you.C.He always wears a cap.D:He is very strong._DB BC CA A 3.Listen to the dialogue and choose the best responses to what you hear.3.Listen to the dialogue and choose the best responses to what you h

13、ear.5.A.I must go now.B.I like basketball best.C.Three years ago.D.one hour._ 6.A.Nobody B.What are you saying?C.Well,I feel a little tired.D.No,I dont like to _7.A:Yes.Thats a good idea.B:I would like a cup of tea.C.How are you getting along?D.Thank your books._8.A:What a pleasure.B.Basketball C.Le

14、ts go.D.I enjoy it._D DC CA AB B4.Listen to the dialogues and choose the best answer to each question 4.Listen to the dialogues and choose the best answer to each question you hear.you hear.1.A.Very happy.B.Very funny.C.Very excited.D.He didnt enjoy himself at all.2.A.He should keep this habit.B.Its

15、 good that he still does so.C.He should change this habit.D.Hed better give up this habit.3.A.She likes doing morning exercises.B.She dislikes doing such exercises.C.She cant get up early.D.She will do it.4.A.2 hours.B.3 hours C.Two hours and a half.D.Three hours and a half5.A.Volleyball.B.Ping-pong

16、.C.Tennis.D.Football.5.Listen to the dialogue and answer the following questions by filling 5.Listen to the dialogue and answer the following questions by filling in the blanks.in the blanks.1.Whats weather like today?Its so 1 _ .2.What do they want to do?They want to go 2 _.3.Does the woman like to

17、 do it?3 _.4.Why does the man insist on playing the game?Because they wont 4 _ when you start the game.5.Do they go to play the game finally?5 _.cold skating No,she doesnt feel cold Yes 6.Listen to the passage and fill in the blanks with words you hear.Some new words 6.Listen to the passage and fill

18、 in the blanks with words you hear.Some new words given below will be of some help to you.given below will be of some help to you.I do like sports!I do like sports!I do like sports during my daily life.Talking about what kind of sport that I like most,I tell you that,its swimming.The 1 I choose swim

19、ming are as follows:First of all,it is 2 enjoyable,you know,in 3 .When the sun is shining 4 ,and the air is even too hot to breathe,swimming would be the best 5 .Once you jump into the water,the coolness will drive all the anxiety and sticky 6 away.Second,I guess swimming is one of the best sports t

20、o 7 ones health.It enables your lungs to breathe more air,and helps the body to build up more muscles.Last but not least,swimming is 8 for girls,since its a whole body sport.9 the whole bodys 10 ,girls can gain a well-shaped figure easily.I like sports.I like swimming.Keys:1.reasons 2.really 3.summe

21、r 4.outside 5.choice 6.feelings 7.improve 8.suitable 9.Through 10.exercise Passage A Computer Security Computer Security Life is full of trade offs and computer security is no different.The only safe computer is a dead computer,or at least a disconnected one.If no one can get to it,no one can harm i

22、t.The only problem is,its not exactly useful in that state.So the extent of computer security is always a tradeoff between putting the computer to use and restricting its misuse and abuse.The time and money you spend on securing your computer has to be weighed against the likely loss if it is broken

23、 into or damaged;e.g.,you are not likely to keep your garbage under lock and key.Passage A Computer security is defined by ISO as follows:a technological and administrative safeguard which is made or accepted for data processing system to prevent computer hardware and software from being accidentall

24、y or maliciously destroyed,alternated or exposed.The range of computer security covers physical security,software security,data security and operation security,etc.Physical security means that the devices of computer system and its relevant facilities work regularly,including main unit,network equip

25、ments,communication circuits,storage devices,etc.Passage A Software security refers to the integrity of software,i.e.the integrity of operating system software,database management software,network software,applications and materials concerned,including development of software,software security test,

26、amendment and copying of software,and so on.Data security means that data or information which is owned or created by the system is kept in full,effective and legally used without being destroyed or disclosed,including input,output,recognition of users,access control,back up and restore,and so forth

27、.Passage A Operation security indicates that system resources are legally used,including power management,environment(including air-conditioner),personnel,admission and exit control of rooms for computer,data and medium management,operation management,etc.As you design or modify your computer and ne

28、twork security,think about how you want to use your systems and what you stand to lose if security is compromised.This will help guide your choice of solutions and their relative complexity and cost.Passage A The only safe computer is a _(1)computer,or at least a _(2)one.If no one can get to it,no o

29、ne can harm it.The only problem is,its not exactly _(3)in that state.So the extent of computer security is always a _(4)between putting the computer to use and restricting its misuse and abuse.The time and money you spend on _(5)your computer has to be weighed against the likely loss if it is broken

30、 into or _(6);e.g.,you are not likely to keep your garbage under lock and key.1.Fill in the blanks without referring to the passage1.Fill in the blanks without referring to the passagedead disconnected useful tradeoff securingdamagedPassage A(1).Is an absolutely safe computer a perfect computer?Why?

31、No.The only safe computer is a dead computer,or at least a disconnected one.Its not exactly useful in that state.(2).What is computer security?Computer security is defined by ISO as follows:a technological and administrative safeguard which is made or accepted for data processing system to prevent c

32、omputer hardware and software from being accidentally or maliciously destroyed,alternated or exposed.(3).What does computer security mainly consist of?The range of computer security covers physical security,software security,data security and operation security,etc.2.Answer the following questions a

33、ccording to the passage 2.Answer the following questions according to the passage Passage A(5).Can you describe the main content of data security?Data security means that data or information which is owned or created by the system is kept in full,effective and legally used without being destroyed or

34、 disclosed,including input,output,recognition of users,access control,back up and restore,and so forth.(6).When you design or modify your computer and network security,what you should think about?As you design or modify your computer and network security,think about how you want to use your systems

35、and what you stand to lose if security is compromised.2.Answer the following questions according to the passage 2.Answer the following questions according to the passage Passage A1.The range of computer security covers physical security,_security,data security and operation security,etc.2.Physical s

36、ecurity means that the devices of computer system and its relevant _ work regularly.3.Software security refers to the _of software.4._ means that data or information which is owned or created by the system is kept in full,effective and legally used.5.Operation security indicates that _ are legally u

37、sed.6.The extent of computer security is always a _ between putting the computer to use and restricting its misuse.3.Complete each of the following statements according to the passage 3.Complete each of the following statements according to the passage softwarefacilitiesintegrityData security system

38、 resources tradeoffPassage A(1)清单1展示了该表的定义。(is defined)Listing 1 shows how this table is defined.(2)其理由如下。(as follows)The reasons are as follows.(3)解锁手机,以防止不必要的检查。(prevent from)Unlock your phone to prevent from unwanted checks.(4)病人可以食用苹果、香蕉、芒果等。(so forth)The patient can have apples,bananas,mangos,a

39、nd so forth.4.Translate the following sentences into English.4.Translate the following sentences into English.Passage A(5).他走了总有一个星期吧。(at least)Hes been away for at least a week.(6).几个钟头抵得过整整一生,是吗?(weigh against)Some hours weigh against a whole lifetime,dont they?(7).他们闯进哪个套间了?(break into)Which flat

40、 did they break into?(8).跟他作生意你是要吃亏的。(stand to lose)4.Translate the following sentences into English.4.Translate the following sentences into English.You will stand to lose if you do business with him.Passage A(1)Computer security is defined by ISO as follows:a technological and administrative safeg

41、uard which is made or accepted for data processing system to prevent computer hardware and software from being accidentally or maliciously destroyed,alternated or exposed.国际标准化委员会对计算机安全给出的定义是:为数据处理系统所建立和采取的技术以及管理的安全保护,保护计算机硬件、软件、数据不因偶然的或恶意的原因而遭到破坏、更改、泄露。(2)Physical security means that the devices of

42、 computer system and its relevant facilities work regularly.实体安全指计算机系统的设备和相关装置有序运行,包括主机、网 络设备、通信线路、存储设备等。5.Translate the following sentences into Chinese.5.Translate the following sentences into Chinese.Passage A(3).Data security means that data or information which is owned or created by the system

43、 is kept in full,effective and legally used without being destroyed.数据安全指系统拥有或创建的数据或信息在不被毁坏和泄露的情况下被充分、有效、合法地使用,包括输入、输出、用户识别,访问控制,备份和修复等。(4).Life is full of trade offs and computer security is no different.生活充满了权衡,计算机安全也不例外。5.Translate the following sentences into Chinese.5.Translate the following se

44、ntences into Chinese.Passage A(5).The only safe computer is a dead computer,or at least a disconnected one.绝对安全意味着形同虚设,至少是孤立的。(6).So the extent of computer security is always a tradeoff between putting the computer to use and restricting its misuse and abuse.所以,计算机安全的程度总是取决于在使用它和限制其误用之间的权衡。5.Transla

45、te the following sentences into Chinese.5.Translate the following sentences into Chinese.Passage A(7).The time and money you spend on securing your computer has to be weighed against the likely loss if it is broken into or damaged你需要对确保计算机安全所花费的时间、金钱与它一旦被侵入或破坏所造成的损失来进行权衡。(8).Operation security indic

46、ates that system resources are legally used.操作安全指合法使用系统资源.5.Translate the following sentences into Chinese.5.Translate the following sentences into Chinese.Passage A(9).As you design or modify your computer and network security,think about how you want to use your systems and what you stand to lose

47、if security is compromised.当你设计和修改计算机和网络安全的时候,要考虑清楚:你想怎样使用系统?如果安全不复存在,你将失去什么?(10).The range of computer security covers physical security,software security,data security and operation security,etc.计算机安全包括实体安全、软件安全、数据安全和操作安全等。5.Translate the following sentences into Chinese.5.Translate the following

48、sentences into Chinese.Passage BSome Security TechniquesSome Security Techniques Security is concerned with protecting information,hardware,and software.Security measures mainly consist of encryption,access control,anticipating disasters and making backup copies.Encryption Whenever information is se

49、nt over a network,the possibility of unauthorized access exists.The longer the distance the message has to travel,the higher the security risk is.For example,an e-mail message on a LAN meets a limited number of users operating in controlled environments such as offices.An e-mail message traveling ac

50、ross the country on the National Information Highway affords greater opportunities for the message to be intercepted.The government is encouraging Passage Bbusinesses that use the National Information Highway to use a special encryption program.This program is available on a processor chip called th

展开阅读全文
相关资源
猜你喜欢
相关搜索
资源标签

当前位置:首页 > 大学
版权提示 | 免责声明

1,本文(《计算机专业英语》课件unit6.pptx)为本站会员(momomo)主动上传,163文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。
2,用户下载本文档,所消耗的文币(积分)将全额增加到上传者的账号。
3, 若此文所含内容侵犯了您的版权或隐私,请立即通知163文库(发送邮件至3464097650@qq.com或直接QQ联系客服),我们立即给予删除!


侵权处理QQ:3464097650--上传资料QQ:3464097650

【声明】本站为“文档C2C交易模式”,即用户上传的文档直接卖给(下载)用户,本站只是网络空间服务平台,本站所有原创文档下载所得归上传人所有,如您发现上传作品侵犯了您的版权,请立刻联系我们并提供证据,我们将在3个工作日内予以改正。


163文库-Www.163Wenku.Com |网站地图|