网站大量收购闲置独家精品文档,联系QQ:2885784924

全新版大学英语听说教程第六册课堂部分听力练习原文.doc

全新版大学英语听说教程第六册课堂部分听力练习原文.doc

  1. 1、本文档共62页,可阅读全部内容。
  2. 2、原创力文档(book118)网站文档一经付费(服务费),不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
  3. 3、本站所有内容均由合作方或网友上传,本站不对文档的完整性、权威性及其观点立场正确性做任何保证或承诺!文档内容仅供研究参考,付费前请自行鉴别。如您付费,意味着您自己接受本站规则且自行承担风险,本站不退款、不进行额外附加服务;查看《如何避免下载的几个坑》。如果您已付费下载过本站文档,您可以点击 这里二次下载
  4. 4、如文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“版权申诉”(推荐),也可以打举报电话:400-050-0827(电话支持时间:9:00-18:30)。
查看更多
全新版大学英语听说教程第六册课堂部分听力练习原文.doc

Unit 1 Facts and Opinions 1. The Internet is the fastest, most modern and best communication tool ever invented. However, the Internet also makes it possible for a person to damage or slow thousands of computers that are linked to it. 2. Computer networks, that is, multiple computers linked together, are particularly vulnerable to computer crimes and computer viruses. 3. A computer virus is similar to a biological virus. It is not a complete program, and it cant run on its own, so it is attached to another program or document. 4. Computer viruses are self-replicating computer programs that interfere with a computers functions. They cause the infected computers to disclose important information or result in data loss. 5. Worms are harmful computer programs that are similar to viruses. A worm only makes copies of itself, but it can take up computer memory and slow the computers processes. 6. About 63,000 viruses have rolled through the Internet, causing an estimated $65 billion in damage. 7. In August 2003, the MSBlaster worm attacked more than 330,000 PCs worldwide in a single day, causing the infected machines to shut down temporarily. Some experts viewed this as a sign of terrorist strike. 8. In the US alone, the Code Red worm in 2001 caused an estimated $2 billion in damage and cleanup costs. 9. Several computer viruses have caused chaos for companies and computer users around the world. The Sobig virus is being sent by e-mail at the rate of around one million copies a day. 10. Viruses come in many shapes and sizes -- they can attack through e-mail use, Internet browsing, file downloading, and disk and CD exchanging. 11. A hacker is a person intensely interested in the workings of any computer operating system. Most often, hackers are programmers. They break into a computer system, but never intentionally damage data. 12. A cracker is someone that breaks into a computer system to damage it, or for the purpose of getting illegitimate access to resources

文档评论(0)

xinshengwencai + 关注
实名认证
内容提供者

该用户很懒,什么也没介绍

版权声明书
用户编号:5311233133000002

1亿VIP精品文档

相关文档