




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、Unit FourText AText B能力分析训练Text A The firewall actually defines the difference between Internet and Intranet. They have to do with performance management and prioritization of service, but the primary one is the firewall. It is the difference between Internet and Intranet. Firewalls are very importa
2、nt. But, is the firewall the only way to connect from your Intranet, from your inside network, to the Internet? In most cases, the answer is no.Firewalls are imperfect because they provide only a single point at which we can issue some control. There are many kinds of firewalls, such as “simple traf
3、fic recording system”, “IP packets filter gateway” (or IP packets examine router) and the “proxy application gateway”. Each provides different level of security checking. Which is the best? It is hard to say, because it depends on what kind of files (database) you want to protect and what kind of pr
4、otection you want the firewall to provide, since we know that there are four kinds of documents: public used, copyrighted, secret and confidential. Among all the firewalls, “simple traffic recording system” is the simplest one. It is a kind of recording device that can keep all the records of passin
5、g through traffic in a database or document for auditing purpose. he rest kinds of firewalls are all structured on the base of packets filtering techniques. The packets are small subsets of data that travel through networks, each with the source address, destination address, protocol used, and part
6、of the E-mail texts. This kind of firewalls has two functions: chokes and gates. There are two types of rules used for examining the data traffic: one is called “default permit”, which allows all traffic except that explicitly blocked by firewall administrators; the other is called “default deny”, w
7、hich denies all traffic except that explicitly allowed by the firewall administrator. Generally speaking, the latter is better. The packets filter gate (or packets examine router) is a more common used firewall. It is a kind of router used for packet filtering. Another kind of firewall is called “pr
8、oxy application gateway”, which employs the proxy service software, which not only provides traffic filtering at IP and transport levels, but also provides application level protocol checking at application level.Notes 1When we talk about the Internet, we have to be very careful to identify the fact
9、 that the Internet and Intranet are actually the same physical network. 这里的that the Internet and Intranet are actually the same physical network引导的是同位语从句。 同位语从句用于对前面出现的名词作进一步说明,一般用连词that引导。 常见的先行名词有fact、idea、belief、news、hope、conclusion、suggestion、order、problem、report、decision等。 例如:She finally made t
10、he decision that she would join the fashion show. 她终于决定参加那场时装秀。 I had no idea how many books I could borrow at a time. 我不知道一次能借几本书。 The news that their team had won the championship came. 他们队获冠军的消息传来了。 本句译为:讨论互联网时,我们细心一点的话可以发现一个事实,就是互联网和内部网实际上是同一个网络。 2Generally speaking, the latter is better, for it
11、 doesnt need to update its checking list often, because it only let the preauthorized users to access in and turn down all the unauthorized accessing, no matter what kind of intruders they are, known and unknown. 这里的no matter what kind of intruders they are, known and unknown引导的是让步状语从句。 引导让步状语从句的连词和
12、词组有though、although、whether、even though、even if、no matter what(when, how)、whatever(whenever, however)等。 例如:No matter what you may say, I would not change my mind. 无论你说什么,我都不会改变主意。 本句译为:总的来说,后者更好一点,因为它不需要经常更新它的检查标准,它只让预先授权的用户进入并拒绝所有非授权的进入,无论是已知的或未知的入侵者。Text B Computer crime is growing around the world
13、. The goal of computer security is to institute controls that preserve security, integrity, and availability. The most powerful tool in providing computer security is coding. By transforming data so that it is unintelligible to the outside observer, the value of an interception and the possibility o
14、f a modification or a fabrication are almost nullified. Encryption provides secrecy for data. Encryption is an important tool in computer security, but one should not overrate its importance. Users must understand that encryption does not solve all computer security problems. 1.Encryption The most w
15、idely used technique is the password, a string of characters that the user must provide to gain access to a system. The system stores each password for comparison with the string presented by the user.2User Authentication Techniques A password scheme is economical, acceptable to most users and easy
16、to implement. It has a number of problems, however. Although the method depends on the secrecy of the password, it is common for users, to write down passwords in exposed places or divulge them to others. Others persons can observe the keying in of password.Another method that has been used to learn
17、 a password is spoofing. Other authentication techniques involve some readable machine object possessed by the user, such as a card or badge. But here, there is the danger of loss, theft or forgery of object. Numerous hardware devices have been invented to assist in computer security. These devices
18、range from hardware implementations of encryption to locks limiting access to theft protection to devices to verify users identities.3.Hardware ControlsNotes 1The goal of computer security is to institute controls that preserve security, integrity, and availability. 这里的不定式短语to institute controls tha
19、t preserve security, integrity, and availability作句子的表语。 例如:His purpose is to win the presidential election.他的目标是要赢得此次总统大选。 本句译为:计算机安全防范的目的是对系统进行控制,以保证系统的保密性、完整性和可用性。 2By transforming data so that it is unintelligible to the outside observer 这里by引导的介词短语作句子的状语,而so that引导的是结果状语从句。 本句译为:通过数据转换,使外部人员无法识别
20、 3Thus, encryption is at the heart of methods for ensuring all three goals of computer security. 这里介词短语at the heart of methods for ensuring all three goals of computer security作句子的表语。 例如:He is at work. 他在工作。 The party is in power. 现在是该党执政。 本句译为:因而加密是保证计算机安全的3个目标的主要方法。 4Thus, it is important to know
21、the situations in which encryption is useful and to use it effectively. 这里的不定式短语to know the situations in which encryption is useful and to use it effectively是真正的句子主语,it是形式主语。 例如:It is necessary to learn a foreign language. 学习一门外语是有必要的。 It is difficult to finish the task in an hour. 一个小时内完成这个任务有困难。
22、本句译为:所以,重要的是了解在什么情况下加密才有用和有效。 5Many users, however, are unaware of the need for security, especially in situations in which a group has recently undertaken a computing task that was previously performed by a central computing department. 这里的in whichcomputing department是定语从句,修饰situations,而该从句中又嵌套了一个定
23、语从句that wascomputing department,修饰task。 本句译为:但是,很多用户没有认识到安全的重要性,特别是当小组刚接手的计算任务原来是由中央计算机部门完成的时候。 6so that using the control does not seriously affect the task being protected. 这里so that引导的是结果状语从句,而该从句中的主语是动名词短语using the control。 本句译为:才能避免对所保护的工作造成严重影响。ExercisesTrue or false 1The most powerful tool in
24、 providing computer security is coding. 2Encryption provides integrity for data. 3If encryption is not used properly, it can have no effect on security or can, in fact, improve the performance of the entire system. 4By authentication the system verifies the users claim of identity. 5A password schem
25、e is economical, acceptable to most users but hard to implement. 6Numerous hardware devices have been invented to assist in computer security. 7In fact, some of the simplest controls, such as frequent changes of passwords, can be achieved at essentially no cost but with tremendous effects. 8Some of
26、the easiest, most effective, and least expensive controls are software controls. 9People using controls should not be convinced of the need for security.10Controls should be selective so that they do not exclude legitimate accesses. 1The goal of computer security is to institute controls that preser
27、ve s , i , and availability. 2Furthermore, encryption is important in p , which are agreed-upon sequences of actions to a some task. 3A p for almost any kind of security is accurate i of users.Put in the missing information based on the text 4The system stores each password for c with the string pre
28、sented by the user. 5Another method that has been used to learn a password is s . 6Promising techniques that are still primarily in the research stage involve recognizing some c of the user, such as the voice, hand, f or signature.能力分析训练Skills of UnderstandingSkills of Translation Skills of Business
29、 E-mail Writing Skills of Oral Language in Working Condition Skills of Understanding推理和判断 阅读时不但要理解字面意思,还要能根据所读材料进行一定的判断和推论,进而理解文章隐含的意义和深层的含义。 其步骤如下:了解有关事实和论据,注意用词造句的特点;对这些事实和论据进行分析;在分析的基础上做出判断,有时还要借助常识来判断。 Britain almost more than any other country in the world must seriously face the problem of bui
30、lding upwards, that is to say of accommodating a considerable proportion of its population in high blocks of flats. It is said that the Englishman objects to this type of existence, but if the case is such, he does in fact differ from the inhabitants of most countries of the world today.例1: Question
31、: We can infer form the passage that . (A)English people, like most people in other countries, dislike living in flats (B)People in most countries of the world today are not opposed to living in flats (C)People in Britain are forced to move into the high blocks of flats (D)Modern flats still fail to
32、 provide the necessary facilities for living 本题考核的就是学生根据上下文进行推断的能力。 文中说英国人在住房问题上和当今世界上许多国家的居民有着不同的看法。 英国人不喜欢住高层公寓,那么,世界上许多国家的居民便是不反对住高层公寓。答案为(B)。 You have been badly injured in a car accident. It is necessary to give you a blood transfusion because you lost a great deal of blood in the accident. How
33、ever, special care must be taken in selecting new blood for you. If the blood is too different from your own, the transfusion could kill you.例2: Question: The passage is most probably written for . (A)the general reader (B)the medical student (C)the blood expert (D)people badly injured in a car acci
34、dent 这篇文章是关于输血常识的,所表达的内容浅显易懂,因此,我们可以判断出该题的正确答案为(A)。 根据推理和判断的技巧,阅读下列短文并回答有关问题Exercises of Such Skill The conditions under which social scientists must work would drive a physical scientist mad. Here are five of those conditions. He can make few experiments; he cannot measure the results accurately; h
35、e cannot control the conditions surrounding the experiments; he is often expected to get quick results with slow acting economic forces; and he must work with people, not with non-living objects.Passage 1 Question: The five conditions under which a social scientist must work are characterized by .(A
36、)precision and efficiency(B)variability and vagueness(C)accuracy and explicitness(D)objectivity and exactness It has become harder and harder for a teenager to stand up against the popularity wave and to go his or her own way. Industry has firmly carved out a teenage market. These days every teenage
37、r can learn from the advertisements what a teenager should have and be. And many of todays parents have come toward high marks for the popularity of their children. All this adds up to a great barrier for the teenager who wants to find his or her own path.Passage 2 Question: The author thinks of adv
38、ertisements as . (A)convincing (B)influential (C)instructive (D)authoritative Even though the Egyptians were warlike, they found time for peaceful games. Before long they had developed a number of ball games, each with its own set of rules. Perhaps they played ball more for instruction than for fun.
39、 Ball playing was thought of mainly as a way to teach young men the speed and skill they would need for war.Passage 3 Question: The Egyptians thought that ball playing was . (A)funny (B)worthwhile (C)dangerous (D)peacefulSkills of Translation正反译与反正译 在英汉互译过程中,由于两种语言表达习惯不同,往往需要把英语中的正说译成汉语中的反说,把英语中的反说译
40、成汉语中的正说,或反之,这样才能确切表达原意并符合语言的规范。 这种把正说处理为反说,把反说处理为正说的译法,叫正反、反正表达法。 这种正说和反说的相互转换是翻译技巧中的一个重要方法。 它属于引申和修辞范围。 那么,什么是正说和反说呢? 英语词句中含有“never”,“no”,“not”,“non-”,“un-”,“im-”,“in-”,“ir-”,“-less”等成分以及汉语词句中含有“不”、“没”、“无”、“未”、“甭”、“别”、“休”、“莫”、“非”、“毋”、“勿”等成分的为反说,不含有这些成分的为正说。 正说和反说包括的词类范围很广,不仅包括动词、形容词、副词、名词、介词和连词,而且包
41、括各种词组、短语和从句。 现以实例对正反、反正表达法加以说明。 在不少情况下,由于有的词语含有特殊意义,如不从反面着笔,译文就不通,这时必须反说。例如: I have read your articlesI expect to meet an old man 我读过你的文章,没想到你这样年轻。(动词) He was absent from his own country last year 他去年不在自己的国家。(形容词短语) 一、英译汉正说反译法 He dived into the water fully clothed and rescued the children 他衣服没脱就跳入水中
42、,把孩子救了上来。(副词) He was extremely sorry for the shortness of time 他对时间不足感到十分抱歉。(名词) I do think that it is beyond his power to fulfill the task 我的确认为要完成这项任务是他力所不及的。(介词) The lecture was interesting,but as far as I am concerned the speaker was speaking over my head 这讲座很有趣,但对我来说,讲座太深了,听不懂。(介词短语) The plan a
43、s it is leaves much to be desired 目前这样的方案大有不足之处。(动词短语) Before I could say “thank you”,the postman had disappeared around the corner 我还没来得及说声“谢谢”,邮递员已经在拐角处不见了。(连词) This painting is beyond all of us even though it is popular. 尽管这幅画很受欢迎,但我们都看不懂。(介词) He always lives ahead of his salary. 他的工资总是不够花。(动词) 英
44、文的表达方式是否定的,但在译文中却采用肯定的表达方式。例如: The scientist must approach the familiar just as carefully and cautiously as he does the unfamiliar. 科学家在处理熟知的事物时,必须像处理陌生的事物一样小心谨慎。(形容词) 二、英译汉反说正译法 The illiteracy rate declined from 30.4 percent in 1910 to 22.9 percent in 1920 文盲率从1910年的30.4%降低到1920年的22.9%。(名词) She cam
45、e very unwillingly(副词) 她来得不是很情愿。 We must never stop taking an optimistic view of life. 我们对生活要永远抱乐观态度。(动词) Dont make your conclusion before the end of the year. 到年底再下结论嘛。(动词) 将下列句子译成汉语,注意句中斜体部分的译法。 1The demand for our products exceeds the supply. (正反译) 2The weather is keeping dry. (正反译) 3Any person n
46、ot putting litter in this basket will be liable to a fine of $5. (反正译) 4I couldnt feel better. (反正译)Exercises of Such SkillSkills of Business E-mail Writing电 话 记 录 When we are making telephone calls, sometimes the person that is wanted is not present. When this happens, the receiver often takes some notes from the caller, and gives the notes to the wanted person after the call. Read the followi
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 强势打造新质生产力
- 新质生产力绿色生产力是什么
- 四年级数学下册小数加减法教学设计
- 委内瑞拉马脑炎的临床护理
- 2025家庭护理合同(照顾病人版)
- 邵东期末考试卷子及答案
- 山西高一联考试卷及答案
- 三月四级试卷真题及答案
- 2025年中国电脑零配件市场调查研究报告
- 化妆品行业跨国经营与合作策略考核试卷
- 六年级下册道德与法治期中测试卷含答案【考试直接用】
- EIM Book 1 Unit 11 Promise,promise单元知识要点
- 全陕西师范大学《716文学综合》考研真题详解下载全
- 引航梯的位置和标识及保养记录
- 外科学急性化脓性腹膜炎
- 苯酚的分子组成和结构课件
- 《罗织经》全文及翻译
- GB∕T 26077-2021 金属材料 疲劳试验 轴向应变控制方法
- 维修服务评价表
- 哲学专业英语词汇
- 2019版人教版教材习题高中物理必修3
评论
0/150
提交评论