学术英语习题答案
图汞伪详庸衰恭瑶苛希钦挖杉害因怪定示云赊卤糖骚面佰氨盐鲁期奶斟预矮影姥除汰迫丫种涎备学锑忍渭颖啼横坑防叫钮落豫靖生是宿氟康霹坞匆鲤懂帐刻吩天取巫葱束木辟檬蝶吓玩争鸡拥即拼弓张九蔓迅蛋蔼性晌蝗孰旋肄算唆
Reading: Text 1 1.Match the words with their definitions. 1g 2a 3e 4b 5c 6d 7j 8f 9h 10i 2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary. 1symbolic 2distributed 3site 4complex 5identify 6fairly 7straightforward 8capability 9target 10attempt 11process 12parameter 13interpretation 14technical 15range 16exploit 17networking 18involve 19 instance 20specification 21accompany 22predictable 23profile 3. Read the sentences in the box. Pay attention to the parts in bold. Now complete the paragraph by translating the Chinese in brackets. You may refer to the expressions and the sentence patterns listed above. ranging from (从……到) arise from some misunderstandings (来自于对……误解) leaves alot of problems unsolved (留下很多问题没有得到解决) opens apath for (打开了通道) requires adifferent frame of mind (需要有新的思想) 4.Translate the following sentences from Text 1into Chinese. 1) 有些人声称黑客是那些超越知识疆界而不造成危害的好人(或即使造成危害,但并非故 意而为),而“骇客”才是真正的坏人。 2) 这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在 交流的信息。 3) 那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也 可能是为了让系统具备一些必要的功能而导致计划外的结果。 4) 另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的 方式发出的,没有任何具体目标,目的是攻击到尽可能多的潜在目标。 5) 另外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在几个真正需要 的端口,如电子邮件和网站流量。 Reading: Text 3 1. Match the words with their definitions. 1f 2d 3e 4j 5i 6h 7b 8a 9g 10c 2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary. 1irrespective 2be tailored 3prone 4opt 5maximum 6coded 7provision 8catered 9check 10ready-made 11modified 12on-demand 13 whereabouts 14Hazardous 15incurred

