大学体验英语综合教程第三版2详细答案Uint8
大学体验英语综合教程2第三版课后答案

大学体验英语综合教程2第三版课后答案大学体验英语综合教程2第三版课后答案【篇一:大学体验英语综合教程2第三版 unit1 famousuniversities】niversities experiencing english integrated coursebooklisten and talkkey:1. dating; 2. coast; 3. eastern; 4. where; 5. earn;6. surrounded;7. atmosphere;8. undergraduate ;9. name; 10. apartmentpassage a译文牛津大学是英国最古老的大学,也是世界最著名的高等学府之一。
牛津大学始建于12世纪。
它位于英格兰的牛津,在伦敦西北约80公里处。
牛津大学有16 300多名学生(1999 —2000),其中留学生占将近四分之一,来自130多个国家。
牛津大学有35个学院,还有5个由不同宗教团体建立的私立学院。
5个私立学院中,有3个只招男生。
学院中,圣希尔达和萨默维尔学院只收女生,其他均为男女兼收。
牛津的每个学院都是独立于大学的实体,由该学院的院长和管委会成员负责管理。
大部分管委会成员都被称为“导师”,或学院教师,其余的是大学教授和讲师。
每个学院管理自己的房产和资产,选举自己的管委会,选择和招收自己的本科生。
大学提供一些图书馆、实验室及其他设施,但教学和学生生活主要由各学院负责。
牛津大学给每个学生指定一个导师,他主要通过辅导课监督学生的学习。
辅导课是指导师每周与1到2名学生见面一次。
学生如需专业指导,还可约见其他的导师,也可选听大学老师讲授的课程。
学生选听什么课程是根据自己的兴趣和导师的建议而定的。
学位由大学而不是各个学院授予。
最低文科或理科学位是优等文学学士。
牛津还在其他众多学科领域授予更高的学位、文凭和证书罗兹奖学金面向美国、加拿大和很多其他国家的学生,为他们提供至少两年的牛津学习费用。
大学体验英语综合教程第三版2详细答案Uint8

Unit EightLead-in1 business2 communicating3 discover4 type in5 invention6 get along7 opposition8 create9 memory 10 availablePassage AThink About It1 Yes, I often do, as I like to explore the potentialities of the Internet. Many people also welcome free software because they don’t have to pay for it. Others don’t do so because there is no protection guaranteed against viruses.2 There are different kinds of anti-virus software, e.g. Norton, Rising Star and some others. The computers I use in the library all have one kind or another of software installed to prevent viruses from being brought in.3 When old types of viruses have been taken care of, new ones may appear. It would be impossible to get rid of computer viruses permanently.Read About ItContent AwarenessRead And Think2 Work with your partner and answer the following questions.1 They turned to the IT staff in their company for help.2 Viruses such as Melissa, the Love Bug, etc.3 No, they aren’t. They forget about the harm a computer virus may bring when that virus is off news headlines.4 They open unsolicited attachments and download unauthorized software.5 Open.3 Choose the best answer to each question with the information from the passage.1 B2 A3 D4 A5 C4 Fill in the blanks with the words given below. Change the form where necessary.1 adequate2 vitally3 document4 distribution5 urban6 potential7 continual8 infecting9 threat 10 updated5 Complete the following sentences with phrases or expressions from the passage. Change the form where necessary.1 let down2 came across as3 in the back of…mind4 as a matter of course5 cleaning up6 Choose one word from the box below to replace the underlined word in each sentence. change the form where necessary.1 encountered2 detected3 transmitted4 pirated5 inflicted7 Translate the following sentences into English.1 In pursuit of a healthier diet, people are eating more fish than they usedto.2 We need to have the roof repaired before the bad weather sets in.3 The disease is spreading, and all young children are at risk.4 The information is transmitted from one computer to another through a telephone line.5 Jack is a fairly good runner. He wins more often than not.8 Read and compare the English sentences, paying attention to their italicized parts, and then translate the Chinese sentences by simulating the structure of the English sentences.1 It sounds like this high-tech company has put in place many favorable measures to protect against brain drains.2 The worry comes when paper-mills ignore the environmental pollution in pursuit of profits.3 It’s vitally important that one attend a test-preparation class before taking a TOEFL test but this cannot be a one-off event if he really wants to have a good command of English.4 The potential threat should always be in the back of a doctor’s mind and appropriate measures should be taken in no time once emergency arises.5 In the end, sciences and education are the keys to a prosperous country and this is a continual process.9 Computer viruses are a constant threat to companies and otherorganizations as well as home users. Work in small groups and have a discussion about how computer viruses spread and how companies should protect against computer viruses.Computer viruses can be transmitted via e-mail attachments. They also spread through software downloaded from the Internet. So when you are downloading the unlicensed and pirated software, you are likely to put your computer at risk. The software can seem harmless enough, but they could easily be harboring a dangerous virus.To protect against computer viruses, we should be careful when opening e-mail attachments and downloading software. We should use anti-virus software and update it regularly.As for companies, they should not only take measures by investing in anti-virus software, but also pay enough attention to the education of their employees. While the employees may suddenly become aware of the virus threat when the threat is there, they soon forget about it as the stories disappear from the news headlines. So it is important that companies constantly educate the users about the virus threat and ask them to practice safe computing.10 Write a paragraph of around 80 words explaining that companies should do more than invest in anti-virus software to protect against computer viruses. The following points may help you to organize your writing. And the first sentence has been written for you.To protect against computer viruses, companies should do more than invest in anti-virus software on the desktops, servers and email gateways. It’s true that anti-virus software, updated regularly, can protect the companies’ defences to a large extent. The employees, however, may use office computers for personal amusement. When they are opening unsolicited attachments or downloading unauthorized software, they probably are putting the company at risk, for the attachments and the software could easily harbor dangerous viruses. Therefore, it is very important that companies should constantly educate their employees about the virus threat and remind them about what would happen if they let their guard down.Passage BThink About It1 Yes, my e-mail pin was once hit by hackers and I couldn’t enter it any more.2 Companies or individuals who wish to avert computer security issues should put security systems in place. From a hacking perspective, each server is open to attack, so each must possess its own anti-virus and spyware systems, and continued oversight must be given to each of these security systems.3 Not all hackers are criminals. Bored in school, very adept with computers and technology, they download scripts or hack into systemswith the intent to vandalize or disrupt systems. They like to see themselves as elite. They have a lot of programming background and write code but won’t use it themselves. Underlying the psyche of the criminal hacker may be a deep sense of inferiority. Consequently, the mastery of computer technology, or the shut down of a major site, might give them a sense of power.Read About ItContent AwarenessRead And Think11 Work with your partner and answer the following questions.1 He flied to Seattle for a job with a company called Invita Security.2 The company lured them to break into the networks of potential customers as part of an effort to persuade those companies to hire Invita to keep hackers out.3 They were stopped and caught by FBI.4 It is a marked legal milestone when courts could uphold the right of federal agents to seize evidence remotely, and to charge foreign cyberciminals in U.S courts.5 According to them, the most captivating aspects of being a hacker are psychological, for it makes them feel like playing a thrilling game, which is full of adventures.12 Decide whether the following statements are true (T) or false (F)according to the passage.1 F2 F3 F4 T5 F13 Fill in the blanks with the words given below. Change the form where necessary.1 regaled2 breached3 captivating4 entrepreneurial5 conspire6 restitution7 extorted8 tactic9 milestone 10 lodging14 Complete the following sentences with phrases or expressions from the passage. Change the form where necessary.1 hacker2 break into3 charge4 benefit5 bring along15 Translate the following sentences into English.1 As the statistics demonstrates we have made great progress in this field in a short period of time.2 The exploits of great leaders have been told in songs and stories.3 It is a long way. Let’s take turn d riving.4 It turns out that it is the banker rather than the computer fault that has caused the disaster.5 They must take practical measures to carry out their plan; otherwise it will end in smoke.16 Finish the following incomplete outline of paragraph 1 of the passage “A Hacker Story.” Then reread the whole passage and writea summary of it.1 Ivanov and his fellow partner flew to Seattle.Invita informed them about the job requirements.2 20-year-old Russian hacker Alexey Ivanov was lured to Seattle in hopes of landing a dream job with Invita. At the Seattle interview, Ivanov impressed the interviewers with tales of hacking exploits and demonstrations of his skills. But as he and his Russian colleague were being driven away, they were arrested by FBI agents and were charged with conspiracy, computer fraud, hacking and extortion. The most important gain from the Ivanov case may be the legal milestones marked when courts upheld the right of federal agents to seize evidence remotely, and to charge foreign cybercriminals in U.S. courts. Nevertheless, important cyberlaw questions remain unanswered. The motivations of hackers are psychological as much as financial17 Reduce the number of words in these sentences by making the introductory dependent clauses elliptical. Write out the revised sentences.1 Although expecting a telephone call, the doctor had to leave his office.2 While driving into town, my mother ran out of gas.3 If curious about your final grade, ask your professor.4 When applying for a scholarship, you should write neatly.5 After cutting the grass, please water it.18 Choose the correct pronoun to complete each sentence. Write out the complete sentence. Then write after each sentence the ellipticalclause beginning with than or as.1 You worked harder than they. (than they worked)2 Michael is more popular than he. (than he is)3 They don’t dance well as we. (as we dance)4 Do you like to drive as fast as they? (as they drive)5 I can do the job better than she. (than she does)19 Rewrite the following sentences so that major ideas receive proper emphasis. Rely upon the suggestion in parentheses.1 Refer to page 321 and you will find that the major character is over six feet tall.2 Because the immigrants will gain economic power, speaking the im migrants’ language will become more important to the businessman.3 Art was not only an interest; art was a vital emotional therapy.4 The young girls enjoy driving around town and waving to friends.5 Not only a knowledge of language is important, but a knowledge of customs is also important.20 Choose one of the following topics and write an Internet notice. This is a VBScript Internet worm which was based loosely on the original VBS/Love letter worm. This worm does not damage files, however, it does contain another mechanism of downloading a password stealing agent and launching this silently in the background. In addition, this worm steals PIN information stored in the registry related to UBS onlinebanking software.This worm distributes itself via MAPI e-mail as “resume.txt.vbs” with the subject line “resume” and no body text.If this VBScript is run, it may display an actual resume in Notepad. However in the background it is doing other things such as downloading the trojan component and sending itself to others via MAPI e-mail. Additionally, the sensitive PIN information is e-mailed to three hard-coded e-mail recipients.。
大学体验英语综合教程2课后答案(全

s)
.
3Bp65
’(13. 1.2.3.4.5.6.7.
8.9.10.
14.1.2.()3.4.5 ()
1.我发现量入为出地过日子越来越难了。()
I.
2.现代政治家们都试图以电视讲话来影响普通百姓。
.
3.应该帮助学生对人生采取积极的态度。()
a.
1911.
5.很明显,自然灾害是造成这个国家经济危机的原因。
’s
6Bp125
13. 1.2.3.4.5.6.7.
8.9.10.
14.1.2.3.4.5.
1.我们的婚姻很幸福,但我们也曾经历过许多坎坷。()’
2.许多外语教师常常在课堂上自己讲得太多。()
.
3.那位著名演员每天早晨锻炼一小时以保持健康。( )
’d14 .,’.
3.他正在做一个新项目,年底前必须完成。( )
’sa.
4.他们让我们使用他们的实验室,作为回报,我们则让他们分享研究成果。
( )
,,.
5.诸如打电话,听电话一类的事情占用了这位秘书的大部分时间。( )
’s .
7Bp145
13.1.2.3.4.5.6.7.8.
9.10.
14.1.2.a3.4.5.
3.我们想不通他怎么会干出那样的傻事。( , )
’ta.
4.约翰逊一家对我很好,使我感到就像他们家的一员。
..
5.他们说,想就合同的细节和你谈谈。()
( )
.
5.这所大学提供了我们所需的所有材料和设备。()
.
1Bp21
13. 1,2 ,3,4,5, 6,7,8,9,10
大学体验英语综合教程2的课后习题答案

大学体验英语综合教程2的课后习题答案默认分类2010-04-09 14:06:22 阅读8272 评论7 字号:大中小订阅UNIT1P14 3.1.B, 2.D, 3.B, 4.A, 5.A 4.1.elected,2.minimum,3.distinct,4.responsibility,5.pursue,6.exploit,7.restrict,8.equip,9.granted, 10.awarded 5. 1.at large, 2.on the basis of, 3.in support of, 4.applyfor, 5.is aiming atP21 12. 1.B, 2.D, 3.A, 4.A, 5.B 13.1.challenge,2.hadtransformed, 3.engage, 4.occurred, 5.urged, 6.cancel, 7.pr ejudice, 8.foundation, 9.beliefs, 10.constructive 14. 1 .rests with, 2.in recognition of, 3.in fact, 4.providesfor, 5.keep...upUNIT2P36 3.1.C, 2.A, 3.A, 4.A, 5.C 4.1.version,2.publications,3.click,4.spotted,5.refugees,6.e ntries,7.financial,8.full-time,9.detailed, 10.annual 5.1.set up,2.came across,3.referred...to ,4.checkout, 5.learnt of / learned ofP42 12. 1.B, 2.D, 3.D, 4.C, 5.A 13.1.stressed,2.distinguished,3.invest,4.matured,5.covered,6.soured,7.concept,8.balance,9.discount, 10.discipline14. 1.paid off, 2.make ends meet, 3.To thisday, 4.picked up, 5.thanks toUNIT3P58 3.1. A; 2. B; 3. B; 4. C; 5. D 4.1. attractive 2. fascination 3. statement 4. despite 5. items 6. define 7. image 8. concerned 9. belongings 10. necessities 5.1. step back 2.identify with 3. dressing up 4. turned to/looked to 5. feed offP64 12. 1.D, 2.B, 3.D, 4.D, 5.B 13. 1. economic 2. estimated 3. measurable 4. inspired 5. maximize 6. motivate 7. created 8. distribute 9. concerning 10. abuse 14.1. by name 2. identify (her) with 3. participate in 4. speak for 5.take (firm) actionUNIT4P78 3. 1. D; 2. C; 3. B; 4. B; 5. A 4.1. signal 2. crash 3. distress 4. grace 5. exploded 6. collision 7. lowered 8. beamed 9. scatter 10. destruction 5. 1. combed through 2. in any case 3.ended in 4. bound for 5. on boardP84 12. 1.T, 2.F, 3.F, 4.T, 5.F 13. 1.wandering 2. unloading 3. crushed 4. slightest 5. appreciation 6. giant 7. steer 8. knelt 9. leaped 10. slammed 14.1. as good as new 2. in the nick of time/in time 3. at play 4. head for/make for 5.put awayUNIT5P98 3. 1. B; 2. A; 3. D; 4. C; 5. A 4. 1. was sinking 2. specialty 3. purely 4. discourage 5. unlikely 6. dynamics 7. actually 8. reasonably 9. have perceived 10. extended 5.1. took a deep interest in; 2. fell into; 3. sign up; 4. try (it) out; 5. dropped outofP104 12. 1.B, 2.D, 3.B, 4.D, 5.A 13. 1. bound 2. sustain 3. obstacle 4. restored 5. approval 6. shift 7. emphasize 8. undergo 9. invincible 10. appearance 14. 1. set out 2. at atime 3. in ... shape 4. stopped short 5. turned toUNIT6p118 3. 1.D, 2.A, 3.D, 4.C, 5.B 4. 1. clapped 2. defend 3. quit 4. perfection 5. interview 6. survey 7. exclusive 8. storage 9. observed 10. cover 5. 1. count ... out 2. be unaware of 3. stopped in his tracks 4. At times 5. turn ...aroundP124 12. 1.B, 2.C, 3.B, 4.D, 5.C 13. 1. deprived2. healthful3. combine4. determined5. lifestyle6. balance7. approach8. solutions9. miserable 10. deserves 14.1. out of reach 2. in tune with 3. set your mind to 4. come off 5. trail and errorUNIT7P138 3. 1.A, 2.A, 3.C, 4.D, 5.B 4. 1. optimist 2. reconstruction 3. sway 4. principles 5. gross 5.1. brought out her best 2. turn out 3.works out 4. Hang in there 5. by nature P144 12. 1.F, 2.T, 3.T, 4.T, 5.T 13. 1. anyway 2. spat 3. Adjusting 4. frequently 5. chilly 6. regularly 7. grip8. pinching 9. scraped 10. crawl 14. 1. on the phone 2. asa result of 3. back and forth 4. around the corner 5. hold ontoUNIT8P158 3. 1.B, 2.A, 3.D, 4.A, 5.C 4.1. adequate 2. vitally 3. document 4. distribution 5. urban 6. potential 7. continual 8. infecting 9. threat 10. updated5. 5.1. let down 2. came across as 3. In the back of (his) mind 4. as amatter of course 5. cleaning upP165 12. 1.F, 2.F, 3.F, 4.T, 5.F 13. 1. colonies 2. technologically 3. cursed 4. corresponding 5. delete 6.dread 7. swear 8. were spared 9. protection 10.dumb 14. 1. was cordoned off 2. fired up 3. queued up 4.get rid of 5. poured into。
大学体验英语综合教程2第三版课后答案及句子翻译

Unit 1P14 3.1.B, 2.D, 3.B, 4.A, 5.A P21 12.1.B, 2.D, 3.A, 4.A, 5.B3. Elected Minimum Distinct Responsibility Pursue Exploit Restrict EquipGranted Awarded4 at large on the basis of in support of apply for is aiming at7 Anyone over the age of 18 is eligible to vote.A form to apply for the scholarships is sent by the university to each student before the start of each semesterOn the advice of my doctor,I decided to give up smoking.The park is located right in the center of town.The university provides all the materials and facilities we desire.Unit 2P36 3.1.C, 2.A, 3.A, 4.A, 5.C P42 12. 1.B, 2.D, 3.D, 4.C, 5.ABasic benefits paid vacation personnel office be laid off career plans3 version publications click spotted refugees entries financialFull-time detailed annual4 set up came across referred to check out learnt of7 The policemen are busy filling out forms about the accident.I want to fill up the fuel tank before retuning the car.If you want to make a complaint, you’d better follow the correct procedure.We could’t have finished the experiment so soon without John’s help.After the storm,the people on the shore anxiously scanned the lake for any sign of the boat.Unit 33 attracitive fascination statement despite items define imageConcerned belongings necessities4 step back identified with dressing up turned to feed off7 We should decreased the number of the cars on the road in order to reduce the fuel consumptionThe rise in electricity costs has added to our.You should make your own decision,and don’t always follow the lead of your brother.That hairstyle is in fashion this year,bur I am afraid it will be our of fashion next year.We are fated to suffer from many disappointments in our quest for truth.Unit 43 signal crash distress grace exploded collision loweredBeamed scatter destruction4 combed through in any case ended in bound for on board7 She waited at the bus stop until the last bus came in.If there is anything we can help,please do not hesitate to contact us.How many crew does he need to run his yacht?Still I like her new book no matter it is not quite as good as her lastone.Never before have I met such a kind man.Unit 53 was sinking specialty purely discourage unlikely dynamics actuallyReasonably have perceived extended4 took a deep interest in fell into sign up try out dropped out of7 We have to put aside our emotions and take it from a professional standpoint.The play was so wonderful that I soon lost myself in the excitement of it.She hasn’t got any hobbies-unless you call watching TV a habby.He said that he had got the information first-hand from the mayor himself.Since you can’t answer the question,perhaps we’d better ask someone else.Unit 63 clapped defend quit perfection interview survey exclusive storageobserved cover4 count out be unaware of stopped in his tracks at times turn around7 It is a difficult job,but I would like to have a shotThis is a book about business practice as opposed to theorySocial activities never get in the way of her study.It was not until 1911 that the first vitamin was discovered.It was obvious that natural disasters were the cause of the country’s economic crisis.Unit 73 optimist reconstruction sway principles gross fulfilled electionsSurgery pillar rigid4 brought out her best turn out works out Hand in there by nature7 He did not regret what he had said but felt that he could have expressed it differentlyWe’d better wait till 14 December.David will have had his exam by then,so he’ll be able to go on holiday with us He’s working on a new project which has to be finished by the end of the year.They are letting us use their lab ,and in return,we are giving them the results of out research.The typing of the term paper took up the whole day.Unit 83 adequate vitally document distribution urban potential continual infectingthreat updated4 let down came across as In the back of mind as a matter of coursecleaning up7 In pursuit of a healthier diet, people are eating more fish than they used to.We need to have the roof repaired before the bad weather sets in.The disease is in spreading,and all young children are at risk.The information is transmitted from one computer to another through a telephone line.Jack is a fairy good runner . He wins more often than not.1. 任何年满18岁的人都有资格投票。
大学体验英语2第三版答案解析

WORD资料可编辑英语复习资料Unit 1四、pursue responsibility grant equip restrict(攻读)(责任)(授予)(使具备)(严格的)distinct minimum exploit award elect(分开的)(最小)(利用)(授予)(选举)1}The group( elected )one of its members to be their spokesperson.这个队伍要挑选一个人做他们的发言人。
2)Wage increases are being kept to a (minimum)in many companies because of the economic depression.因为许多公司经济不景气都最少的去增加工资。
3)The engineering profession now has many (distinct)branches.工科专业现在有很多分支。
4)Now that you are 13 you should have more sense of (responsibility).既然你已经13岁了应该有责任感了。
5)Students usually( pursue)one or more of the subjects,which they have studied at “A”level,such as Art,Drama,English,Music,etc.学生们往往攻读一个或多个课程,他们要通过课程水平考试,例如,艺术,戏剧,英语,音乐等。
6)We need to make sure that we (exploit)our resources as fully as possible.我们要确保我们尽可能充分的利用资源。
7)Congress is considering measures to(restrict)the sale of cigarettes.国会正在采取措施限制香烟的销售。
大学体验英语综合教程2第三版Unit 8-listen and talk

Unit 8 Computers and Security---Listen and TalkI.Teaching Objectives1.To train the students’ ability to listen through listening practice.2.To cultivate the students’ ability to talk about computer viruses.3.To let students learn something should be done to protect against computerviruses.II.Time Allotment1st period:Lead-in(20min)2nd period:Discussion(25min)3rd period:Dialogue samples(30min)4th period:Communicative tasks(20min)III.Teaching Content1.Lead-in: Listen to the passage at least 3times and try to fill the missing words inthe blanks.2.Discussion: Several pictures and ad videos are presented to encourage studentsto talk about computer.3.Dialogue samples: Two dialoguesDialogue 1 Talking about computer securityDialogue 2 Talking about computer viruses4. Communicative tasks: Two situations are designed to help students practice oral English.Task 1 Talking about computers and securityTask 2 Talking about computers and securityIV. Teaching Procedures1.Lead-inStep1:Teach students the words on P 193.Step2: Ask the students to listen to the passage at least 3 times and try to fill the missing words in the blanks.1.Allow sb to do sth: enable sb to do sth2.Type in: 键入3.get along:前进,进展4.at one’s fingertips:近在手边,随时可用,方便Step3: Ask students to fill the blanks and translate them.2. DiscussionStep 1. Show students some pictures about computer. Then ask students to form partners or groups to discuss these questions.1)Talk about what you use a computer for.2)How do you think computer or Internet.good or bad?Why?3)what will you do to protect your computer against viruses?Step 1. (1)Ask students to listen to dialogue 1.1.by chance:偶然,无意中2.screensaver:屏保(2)Ask students to repeat the dialogue line by line with one speaking after the other.Step 2. (1)Ask students to listen to dialogue 21.pick up:携带,染上2.recycle bin: 回收3.crash:死机(2) Ask students to repeat the dialogue line by line with one speaking afterthe other.4. Communicative tasksStep 1. Ask students to create a dialogue with their partner according to the given situation, using the expressions and sentence patterns for talking aboutcomputers and security .SituationBrian likes to download funny game software from the Internet, buthe doesn’t feel it’s very funny now because his computer crashesfrequently these days. He poured out his worries to Pei who advised himto install anti-virus software.For referenceBrian: Pei, can you help me out here? My computer is acting verystrange.Pei: Sure, Brian. What exactly is your computer doing?Brian: Well, every now and then it just stops working —the softwarefreezes up on me.Pei: Have you made any changes to your system recently?Brian: Yes. I downloaded some funny game software.Pei: Was it licensed software that is authorized to be used with yourexisting system?Brian: I don’t know —maybe not. Is that important?Pei:Definitely! If you install software that causes conflicts with yourexisting software, your computer may not work properly. And, becausethe software is unlicensed, it may contain viruses. You really need toinstall antivirus software on your computer.Brian: I had no idea! Thanks for your help.Step 2. Ask students to create a dialogue with their partner according to the given situation, using the expressions and sentence patterns for Talkingabout computers and security.SituationVictor was excited to get an e-mail from a “Lucy”with the subject “I Love You”, but his excitement vanished too quickly with a click onthe attached file. It was the Love Bug virus. Lingling suggested that henever open an attachment unless he’s been told to expect it and alwayskeep the antivirus system active.For referenceVictor: Lingling, I think I’ve done it again!Lingling: What do you mean? What do you think you’ve done again?Victor: I think I’ve messed up my computer again.Lingling: You weren’t downloading unauthorized software again,were you?Victor: No. This time it was an unusual e-mail with an attachment. Itwas from somebody named “Lucy”with the subject “I Love You”,but there was nothing in the attached file.Lingling: Do you know someone with the name “Lucy”?Victor: No, but I was so excited to get an e-mail with the subject “ILove You”that I didn’t pay any attention to who it was from.Lingling: That’s a problem. It was probably the Love Bug virus.Victor: What should I do?Lingling: The Love Bug virus is pretty serious. I’ll run someanti-viruses software on your computer to try and clean it off. In themeantime, Victor, remember not to open any attached files in an e-mailunless you know for sure who the person is that sent the e-mail, and thatyou were supposed to receive an attached file. It’s also a good idea tohave your anti-virus software running whenever you open an e-mail. V. AssignmentAsk students to work in pairs and discuss how to talk about computers and security. Then preview the passage A and the new words on P193-195.。
大学体验英语2第三版答案

大学体验英语2第三版答案英语复习资料Unit 1四、pursue responsibility grant equip restrict(攻读)(责任)(授予)(使具备)(严格的)distinct minimum exploit award elect(分开的)(最小)(利用)(授予)(选举)1}The group( elected )one of its members to be their spokesperson.这个队伍要挑选一个人做他们的发言人。
2)Wage increases are being kept to a (minimum)in many companies because of the economic depression.因为许多公司经济不景气都最少的去增加工资。
3)The engineering profession now has many (distinct)branches.工科专业现在有很多分支。
4)Now that you are 13 you should have more sense of (responsibility).既然你已经13岁了应该有责任感了。
5)Students usually( pursue)one or more of the subjects,which they have studied at “A”level,such as Art,Drama,English,Music,etc.学生们往往攻读一个或多个课程,他们要通过课程水平考试,例如,艺术,戏剧,英语,音乐等。
6)We need to make sure that we (exploit)our resources as fully as possible.我们要确保我们尽可能充分的利用资源。
7)Congress is considering measures to(restrict)the sale of cigarettes.国会正在采取措施限制香烟的销售。
- 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
- 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
- 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。
Unit EightLead-in1 business2 communicating3 discover4 type in5 invention6 get along7 opposition8 create9 memory 10 availablePassage AThink About It1 Yes, I often do, as I like to explore the potentialities of the Internet. Many people also welcome free software because they don’t have to pay for it. Others don’t do so because there is no protection guaranteed against viruses.2 There are different kinds of anti-virus software, . Norton, Rising Star and some others. The computers I use in the library all have one kind or another of software installed to prevent viruses from being brought in.3 When old types of viruses have been taken care of, new ones may appear. It would be impossible to get rid of computer viruses permanently.Read About ItContent AwarenessRead And Think2 Work with your partner and answer the following questions.1 They turned to the IT staff in their company for help.2 Viruses such as Melissa, the Love Bug, etc.3 No, they aren’t. They forget about the harm a computer virus may bring when that virus is off news headlines.4 They open unsolicited attachments and download unauthorized software.5 Open.3 Choose the best answer to each question with the information from the passage.1 B2 A3 D4 A5 C4 Fill in the blanks with the words given below. Change the form where necessary.1 adequate2 vitally3 document4 distribution5 urban6 potential7 continual8 infecting9 threat 10 updated5 Complete the following sentences with phrases or expressions from the passage. Change the form where necessary.1 let down2 came across as3 in the back of…mind4 as a matter of course5 cleaning up6 Choose one word from the box below to replace the underlined word in each sentence. change the form where necessary.1 encountered2 detected3 transmitted4 pirated 5inflicted7 Translate the following sentences into English.1 In pursuit of a healthier diet, people are eating more fish than they used to.2 We need to have the roof repaired before the bad weather sets in.3 The disease is spreading, and all young children are at risk.4 The information is transmitted from one computer to another through a telephone line.5 Jack is a fairly good runner. He wins more often than not.8 Read and compare the English sentences, paying attention to their italicized parts, and then translate the Chinese sentences by simulating the structure of the English sentences.1 It sounds like this high-tech company has put in place many favorable measures to protect against brain drains.2 The worry comes when paper-mills ignore the environmental pollution in pursuit of profits.3 It’s vitally important that one attend a test-preparation class before taking a TOEFL test but this cannot be a one-off event if he really wants to have a goodcommand of English.4 The potential threat should always be in the back of a doctor’s mind and appropriate measures should be taken in no time once emergency arises.5 In the end, sciences and education are the keys to a prosperous country and this is a continual process.9 Computer viruses are a constant threat to companies and other organizations as well as home users. Work in small groups and have a discussion about how computer viruses spread and how companies should protect against computer viruses.Computer viruses can be transmitted via e-mail attachments. They also spread through software downloaded from the Internet. So when you are downloading the unlicensed and pirated software, you are likely to put your computer at risk. The software can seem harmless enough, but they could easily be harboring a dangerous virus.To protect against computer viruses, we should be careful when opening e-mail attachments and downloading software. We should use anti-virus software and update it regularly.As for companies, they should not only take measures by investing in anti-virus software, but also pay enough attention to the education of their employees. While the employees maysuddenly become aware of the virus threat when the threat is there, they soon forget about it as the stories disappear from the news headlines. So it is important that companies constantly educate the users about the virus threat and ask them to practice safe computing.10 Write a paragraph of around 80 words explaining that companies should do more than invest in anti-virus software to protect against computer viruses. The following points may help you to organize your writing. And the first sentence has been written for you.To protect against computer viruses, companies should do more than invest in anti-virus software on the desktops, servers and email gateways. It’s true that anti-virus software, updated regularly, can protect the companies’ defences to a large extent. The employees, however, may use office computers for personal amusement. When they are opening unsolicited attachments or downloading unauthorized software, they probably are putting the company at risk, for the attachments and the software could easily harbor dangerous viruses. Therefore, it is very important that companies should constantly educate their employees about the virus threat and remind them about what would happen if they let their guarddown.Passage BThink About It1 Yes, my e-mail pin was once hit by hackers and I couldn’t enter it any more.2 Companies or individuals who wish to avert computer security issues should put security systems in place. From a hacking perspective, each server is open to attack, so each must possess its own anti-virus and spyware systems, and continued oversight must be given to each of these security systems.3 Not all hackers are criminals. Bored in school, very adept with computers and technology, they download scripts or hack into systems with the intent to vandalize or disrupt systems. They like to see themselves as elite. They have a lot of pro gramming background and write code but won’t use it themselves. Underlying the psyche of the criminal hacker may be a deep sense of inferiority. Consequently, the mastery of computer technology, or the shut down of a major site, might give them a sense of power.Read About ItContent AwarenessRead And Think11 Work with your partner and answer the following questions.1 He flied to Seattle for a job with a company called Invita Security.2 The company lured them to break into the networks of potential customers as part of an effort to persuade those companies to hire Invita to keep hackers out.3 They were stopped and caught by FBI.4 It is a marked legal milestone when courts could uphold the right of federal agents to seize evidence remotely, and to charge foreign cyberciminals in courts.5 According to them, the most captivating aspects of beinga hacker are psychological, for it makes them feel like playinga thrilling game, which is full of adventures.12 Decide whether the following statements are true (T) or false (F) according to the passage.1 F2 F3 F4 T5 F13 Fill in the blanks with the words given below. Change the form where necessary.1 regaled2 breached3 captivating4 entrepreneurial5 conspire6 restitution7 extorted8 tactic9 milestone 10 lodging14 Complete the following sentences with phrases or expressions from the passage. Change the form where necessary.1 hacker2 break into3 charge4 benefit5 bring along15 Translate the following sentences into English.1 As the statistics demonstrates we have made great progress in this field in a short period of time.2 The exploits of great leaders have been told in songs and stories.3 It is a long way. Let’s take turn driving.4 It turns out that it is the banker rather than the computer fault that has caused the disaster.5 They must take practical measures to carry out their plan; otherwise it will end in smoke.16 Finish the following incomplete outline of paragraph 1 of the passage “A Hacker Story.” Then reread the whole passage and write a summary of it.1 Ivanov and his fellow partner flew to Seattle.Invita informed them about the job requirements.2 20-year-old Russian hacker Alexey Ivanov was lured to Seattle in hopes of landing a dream job with Invita. At the Seattle interview, Ivanov impressed the interviewers with tales of hacking exploits and demonstrations of his skills. Butas he and his Russian colleague were being driven away, they were arrested by FBI agents and were charged with conspiracy, computer fraud, hacking and extortion. The most important gain from the Ivanov case may be the legal milestones marked when courts upheld the right of federal agents to seize evidence remotely, and to charge foreign cybercriminals in . courts. Nevertheless, important cyberlaw questions remain unanswered. The motivations of hackers are psychological as much as financial17 Reduce the number of words in these sentences by making the introductory dependent clauses elliptical. Write out the revised sentences.1 Although expecting a telephone call, the doctor had to leave his office.2 While driving into town, my mother ran out of gas.3 If curious about your final grade, ask your professor.4 When applying for a scholarship, you should write neatly.5 After cutting the grass, please water it.18 Choose the correct pronoun to complete each sentence. Write out the complete sentence. Then write after each sentence the elliptical clause beginning with than or as.1 You worked harder than they. (than they worked)2 Michael is more popular than he. (than he is)3 They don’t dance well as we. (as we dance)4 Do you like to drive as fast as they (as they drive)5 I can do the job better than she. (than she does)19 Rewrite the following sentences so that major ideas receive proper emphasis. Rely upon the suggestion in parentheses.1 Refer to page 321 and you will find that the major character is over six feet tall.2 Because the immigrants will gain economic power, speaking the immigrants’ language will become more important to the businessman.3 Art was not only an interest; art was a vital emotional therapy.4 The young girls enjoy driving around town and waving to friends.5 Not only a knowledge of language is important, but a knowledge of customs is also important.20 Choose one of the following topics and write an Internet notice.This is a VBScript Internet worm which was based loosely on the original VBS/Love letter worm. This worm does not damagefiles, however, it does contain another mechanism of downloading a password stealing agent and launching this silently in the background. In addition, this worm steals PIN information stored in the registry related to UBS online banking software.This worm distributes itself via MAPI e-mail as “ with the subject line “resume” and no body text.If this VBScript is run, it may display an actual resume in Notepad. However in the background it is doing other things such as downloading the trojan component and sending itself to others via MAPI e-mail. Additionally, the sensitive PIN information is e-mailed to three hard-coded e-mail recipients.11。