首页 > 汉语言文学> 外国文学史
题目内容 (请给出正确答案)
[主观题]

Computer Security 计算机安全 The techniques developed to protect single computers and network-link

Computer Security

计算机安全

The techniques developed to protect single computers and network-linked computer systems from accidental or intentional harm are called computer security. Such harm includes destruction of computer hardware and software, physical loss of data, and the deliberate invasion of databases by unauthorized individuals.

Data may be protected by such basic methods as locking up terminals and replicating data in other storage facilities. More sophisticated methods include limiting data access by requiring the user to have an encoded card or to supply an identification number or passworD. Such procedures can apply to the computer data system as a whole or may be pinpointed for particular information banks or programs. Data are frequently ranked in computer files according to degree of confidentiality.

Operating systems and programs may also incorporate built in safeguards, and data may be encoded in various ways to prevent unauthorized persons from interpreting or even copying the material. The encoding system most widely used in the United States is the Data Encryption Standard (DES), designed by IBM and approved for use by the National Institute of Standards and Technology in 1976. DES involves a number of basic encrypting procedures that are then repeated several times. Very large scale computer systems, for example, the U. S. military Advanced Research Project Agency Network (ARPANET), may be broken up into smaller subsystems for security purposes, but smaller systems in government and industry are more prone to system-wide invasions. At the level of personal computers, security possibilities are fairly minimal.

Most invasions of computer systems are for international or corporate spying or sabotage, but computer hackers[1]may take the penetration of protected databanks as a challenge, often with no object in mind other than accomplishing a technological feat. Of growing concern is the deliberate implantation in computer programs of worms or viruses[2]that, if undetected, may progressively destroy databases and other software. Such infected programs have appeared in the electronic bulletin boards available to computer users. Other viruses have been incorporated into computer software sold commercially. No real protection is available against such bugs except the vigilance of manufacturer and user.

Anti-Virus Programs to the Rescue

There is a wide range of virus protection products available to combat the 11,000 known viruses that currently plague personal computers. These products range in technology from virus scanners to terminate and stay resident monitors, to integrity checkers to a combination of the three. Each of these techniques has its associated strengths and weaknesses.[3]

The most fundamental question that must be asked when considering and evaluating automated anti-virus tools is "how well does the product protect against the growing virus threat?" When developing a security program, companies must think long term. Not only must you choose a form of protection that can detect and safely eliminate today's varieties, but you must consider tomorrow's gully wash as well.[4]The real challenge lies in securing against the 38,000 new species that are expected to appear within the next two years. The 11,000 known viruses that have been documented to date represent what is only the tip of the iceberg in terms of what tomorrow will bring.

Virus Protection Methods

Today there exists three broad based categories of anti-virus techniques: scanners, memory resident monitors (TSRs), and integrity checkers.

Virus Scanners

Virus scanners are programs designed to examine a computer's boot block, system memory, partition table, and executable files,[5]looking for specific code patterns that are typical to known virus strains. Generally, a virus scanner is able to identify a virus by name and indicate where on the hard drive or floppy drive the infection has occurreD. Virus scanners are also able to detect a known virus before it is executeD. Virus scanners do a good job of detecting known viruses. They are generally able to find a virus signature if it is present and will identify the infected file and the virus. Some are faster than others, which is an advantage when checking a hard disk with thousands of files. But virus scanners have several major weaknesses.

First and foremost, scanners are completely ineffective against any virus whose code pattern is not recognizeD. In other words, scanners cannot identify a virus if they don't have a signature for it. Also, many of today's viruses are designed specifically to thwart scanners. These so-called stealth viruses know the correct file size and date for a program (i. e. , what they were before the virus infected them). They will intercept operations that ask for that information and return the pre-infection values, not the actual ones during a disk reaD. Some viruses can mutate slightly so that the original signature will be rendered ineffective against the new strain and can even result in file damage if recovery is based off virus signature assumptions. A new wave in virus authorship is the creation of self mutating viruses. These viruses infect a file in a different way each time, so it cannot be identified by a simple pattern search, rendering virus scanners ineffective.

Secondly, virus scanners are quickly rendered obsolete and require frequent, costly and time-consuming updates—which may be available only after serious damage has been done. The burden of constantly updating virus scanners, even if provided free of charge, can be a huge burden. In a corporate environment, where thousands of personal computers must be protected, simply distributing scanner updates in a timely and efficient manner and making sure they are installed is an enormous task.

I ntegrity Checkers

This is a relatively new approach, compared to scanners and monitors. Integrity checkers incorporate the principle modification detection. This technique safeguards against both known and unknown viruses by making use of complex file signatures and the known state of the computer environment rather than looking for specific virus signatures.

Each file has a unique signature (which is like a fingerprint-a unique identifier for that particular file) in the form of a CRC or a checksum. Changes in any character within the file will probably change the file's checksum. For a virus to spread, it must get into system memory and change some file or executable code.

An integrity checker will fingerprint and register all program files and various system parameters, such as the boot block, partition table, and system memory, storing this information in an on-line database. By recalculating the files checksum and comparing it to the original, integrity checkers can detect file changes that are indicative of a virus infection.

Industry experts agree that integrity checking is currently the only way to contend with tomorrow's growing virus threat. Since this methodology is non-reliant on virus signatures, it offers protection against all potential viruses, today's and tomorrow's.

Additionally, stealth viruses have historically been able to bypass integrity checkers. The only way users can be certain that their computer is 100 percent clean is to boot the system from a clean, DOS based disk and check the integrity of the information stored on this disk with the current state of the hard drive. Called the "Golden Rule" in virus protection, most integrity checkers fail to follow this security principle.

System Administrator

System Administrator, in computer science, is the person responsible for administering Use of a multiuser computer system, communications system, or both. A system administrator performs such duties as assigning user accounts and passwords, establishing security access levels, and allocating storage space, as well as being responsible for other tasks such as watching for unauthorized access and preventing virus or Trojan Horse[6]programs from entering the system. A related term, sysop (system operator), generally applies to a person in charge of a bulletin board system, although the distinction is only that a system administrator is associated with large systems owned by businesses and corporations, whereas a sysop usually administers a smaller, often home- based, system.

Hacker

Hacker, in computer science, originally, is a computerphile, a person totally engrossed in computer programming and computer technology. In the 1980s, with the advent of personal computers and dial up[7]computer networks, hackers acquired a pejorative connotation, often referring to someone who secretively invades others computers, inspecting or tampering with the programs or data stored on them. (More accurately, though, such a person would be called a cracker.) Hacker also means someone who, beyond mere programming, likes to take apart operating systems and programs to see what makes them tick.

Notes

[1]computer hackers:电脑黑客,指非法侵入他人计算机进行浏览或篡改程序或计算机上所存数据的人。

[2]Of growing concern is the deliberate implantation in computer programs of worms or viruses.越来越令人担心的是蓄意地把蠕虫程序或病毒植入计算机程序。

[3]These products range in technology from virus scanners to terminate and stay resident monitors,to integrity checkers to a combination of the three.Each of these techniques has its associated strengths and weaknesses.这些防病毒的产品从技术上有病毒扫描到内存驻留监督程序,从完整性检查到三者的结合程序,每一种有其相关的优点和缺点。

[4]gully wash:gully冲沟,檐槽。此处字面意义是“冲水槽”,可翻译成“但必须从长计议”或“考虑到未来的问题”。

[5]to examine a computer's boot block,system memory,partition table,and executable files:检查计算机的引导块、系统内存、分区表和可执行文件。

[6]Trojan Horse:特洛伊木马,一种欺骗程序。在计算机安全学中,一种计算机程序,表面上或实际上有某种有用功能,而含有附加的(隐藏的)可能利用了调用进程的合法特许来危害系统安全的功能。

[7]dial up:拨号呼叫,访问计算机的一种方法。计算机通过调制解调器连接到电话线路上,拨号上网。

Choose the best answer for each of the following:

查看答案
答案
收藏
如果结果不匹配,请 联系老师 获取答案
您可能会需要:
您的账号:,可能还需要:
您的账号:
发送账号密码至手机
发送
安装优题宝APP,拍照搜题省时又省心!
更多“Computer Security 计算机安全 The te…”相关的问题
第1题
According to the author, computer security is ______. A.a program B.a technique C.a computer sys

According to the author, computer security is ______.

A.a program B.a technique

C.a computer system D.a method

点击查看答案
第2题
Which of the following statements may not be true? A.People break their large scale computer system

Which of the following statements may not be true?

A.People break their large scale computer systems up into smaller subsystems for security purposes.

B.Personal computers are most likely to be invaded by unauthorized persons.

C.All of the people invading computer systems are trying to spy or sabotage.

D.Some people penetrate into protected databanks in order to prove their technical worth.

点击查看答案
第3题
Software Security 软件安全 We live in a world today where software is pervasive. Software touches

Software Security

软件安全

We live in a world today where software is pervasive. Software touches nearly every aspect of our lives, from software-controlled subways, air traffic control systems, nuclear power plants, and medical equipment to more mundane everyday examples, such as software-controlled microwave ovens, gas burners, elevators, automated teller machines[1], the family car, and the local 911 service[2]. In the past, many of these items relied upon established safety and reliability principles from electrical, mechanical, and/or civil engineering, which developed over several decades, if not longer. Today items like these are controlled by software.

When it is examined, its totality, the magnitude of the software safety and reliability challenge facing us today makes the Y2K[3]problem look minuscule by comparison. Hence, it is time to acknowledge the discipline of software safety and reliability and its importance to everyday life. Some people and organizations are starting to understand and respond to this challenge. For example, the FBI[4]recently established a National Infrastructure Protection Center to protect safety-critical systems and software. Unfortunately, many still remain blissfully unaware of the situation or deny its existence. Contributing to the problem is the small number of universities that offer courses in software safety and reliability.

We hear a lot about the global economy today. Technology has less respect for state or national borders than do market forces. The software safety and reliability challenge is a global challenge. Products, such as cars and medical devices, are built in one jurisdiction and sold worldwide. Air traffic control systems must interoperate safely and reliably among multiple countries, for example along the long borders between the U. S. , Canada, and Mexico. Accordingly, the first part of this book introduces the concept of software safety and reliability, and techniques and approaches used to achieve and assess it.

Background

The inherent complexity of software—its design, development, assessment, and use—is and has been increasing rapidly during the last decade. The cycle time between new versions of system and application software has decreased from a number of years to a number of months. The evolution and discovery of new design techniques and development methodologies are proceeding at an equally rapid pace. Consequently, the debate about what constitutes the standard body of knowledge for Computer Science professionals continues.

Accompanying this is the ever broadening role that software plays in electronic products. A study performed in the U. K. in 1990 estimated that the market for the development of safety-related software was $. 85B per year and that it was growing at a rate of 20 percent per year. This is due to the fact that software is replacing discrete hardware logic in many devices. Some common examples include air traffic control systems, nuclear power plant control systems, and radiation therapy systems. In addition, advanced electronics with embedded software controllers are being incorporated into a variety of new products, such as laser surgical devices, automobiles, subways, and intelligent transportation systems.

As such the role of software has moved from simply generating financial or other mathematical data to monitoring and controlling equipment, which directly affects human life and safety. In fact, it was reported by Donald Mackenzie that "the total number of people killed by computer system failures, worldwide, up to the end of 1998 is between 1,000 and 3,000. "

As a result, a more thorough and widespread understanding of, and familiarity with the specialized techniques to achieve and assess the safety and reliability of software, are needed in academia, industry, and government. This is also true since many legal issues related to software liability are evolving.

Purpose

While the general concept of safety and reliability is understood by most parties, the specialty of software safety and reliability is not. The understanding of electronic component reliability and electrical safety has been evolving since the 1940s. In contrast, software safety and reliability is a relatively new discipline that only a few understand well or at all. Hence, the overall goal of writing this book is to improve the state of the art of software safety and reliability, both its understanding and practice. This goal is achieved through three objectives.

The first objective of this book is to serve as a "consciousness raising"[5]about the importance of software safety and reliability and the attention this subject warrants in mission critical systems[6]. As more and more functionality is shifted from hardware to software, two common scenarios occur. First, managers and technical personnel involved in mission critical projects are generally very knowledgeable about optics, radiation physics, mechanical engineering, and so forth. However, they are sometimes at a loss when it comes to knowing: 1) what to do about software safety and reliability; 2) the skill set that is needed to adequately address software safety and reliability; and 3) sometimes even that this subject warrants serious attention. Second, today there are many excellent Computer Science and Software Engineering programs at universities throughout the worlD. Unfortunately, very few of them offer any courses on software safety and reliability or on software engineering standards. A student may acquire a thorough background in software engineering without being exposed to the field of software safety and reliability. Given the shift in technology to software controlled products, this is unfortunate because today's students will be tomorrow's safety and reliability practitioners. This book has been written to serve as a "consciousness raising" for both scenarios. As such, it includes many illustrative everyday examples about the importance of software safety and reliability.

The second objective of this book is to provide practical information about the current methods used to achieve and assess software safety and reliability. This is accomplished by a comprehensive discussion of the current approaches promoted by key industrial sectors and standards organizations to software safety and reliability. Since most practitioners were not taught software safety and reliability in school, it is all the more imperative that they be made aware of current software safety and reliability standards[7]. As a rule, standards are written in a very terse style. A phrase or sentence may be very meaningful to the committee members who spent years writing the standard, but the same phrase leaves the average reader in the dark. Accordingly, Parts Ⅱ and Ⅲ of this book have been written in the style of an application guide—" how to" read, interpret, and implement a given standarD. While theory is not entirely neglected, the emphasis is on practical information.

The third and final objective of this book is to bring together, for the first time, in one volume the contemporary thinking on software safety and reliability so that it can be compared and analyzed; thereby leading to the improved understanding and practice of this field in the future.

Firewall

Nations without controlled borders cannot ensure the security and safety of their citizens, nor can they prevent piracy and theft. Networks without controlled access cannot ensure the security or privacy of stored data, nor can they keep network resources from being exploited by hackers.

The communication efficiency provided by the Internet has caused a rush to attach private networks directly to it. Direct Internet connections make it easy for hackers to exploit private network resources. Prior to the Internet, the only widely available way for a hacker to connect from home to a private network was direct dialing with modems and the public telephone network. Remote access security was a relatively small issue.

When you connect our private network to the Internet, you are actually connecting your network directly to everv other network attached to the Internet. There's no inherent central point of security control.

Firewalls are used to create security checkpoints at the boundaries of private networks. By providing the routing function between the private network and the Internet, firewalls inspect all communications passing between the two networks and either pass or drop the communications depending on how they match the programmed policy rules. If your firewall is properly configured and contains no serious exploitable bugs, your network will be as free from risk as possible.

Firewalls are among the newest developments in Internet technology. Developed from rudimentary security systems that major computer vendors like Compact and IBM developed to secure their own networks in the mid 1980s, these network sentinels have developed in lock-step with the burgeoning threat of information warfare. The most interesting and innovative developments, like Network Address Translation and multi-layer security filtering, are so new that books just two years old are already obsolete.

The security problems of the past could be solved with simple packet filters and dial- back modem banks. The security problems of the future will require rifling through and validating every byte of an Internet message, requiring encrypted certification of a web site's true identity before connecting, and then encrypting nearly everything that travels between. Fortunately, as technology and the technological society it mirrors progress, these measures will become simple and invisible. As vendors make operating systems more hardened against attack, the World Wide Web will secretly grow more secure for people who will freely surf the Web as they please, hampered only by the occasionally warning that a site is not accredited or that a message contains suspicious content. This is as it should be.

The security problems of today are most effectively solved with firewalls and virtual private tunnels. Peripheral security utilities[8]like intrusion detectors and security scanners do their part to alarm and alert, but firewalls will remain the foundation of Internet security until their functionality is built into the very protocols upon which the Internet operates and until every Internet-connected computer contains the equivalent of a firewall. Even then, centralized management of Internet policy may make firewalls a permanent addition to corporate networking.

Notes

[1]automated teller machines:自动取款机,简写成ATM。

[2]911 service:在美国等一些西方国家,紧急救护号码为9ll。

[3]Y2K(Year 2000):电脑千年虫。

[4]the FBI:(美国)联邦调查局(Federal Bureau of Investigation)的缩写。

[5]consciousness raising:提高意识。

[6]mission critical systems:任务是至关重要的系统。

[7]It is...从句中用should+do,should常可省,如:It is important that he start early tomorrow.

[8] Peripheral security utilities: 外围(部)安全设备。

Choose the best answer:

点击查看答案
第4题
Cyber Security 网络安全 Hide your Identity Before you venture online, keep the following facts in

Cyber Security

网络安全

Hide your Identity

Before you venture online, keep the following facts in mind:

· Someone on the Net can make money by selling your personal data.

· Every time you go online, you give someone new information—however small a piece it may be—about your preferences.

· Some data collectors are not content to wait for you to come to them and may try to trick or steal more information from you.

We can call these the Basic Rules of Personal Information, and they hold true for everyone who uses the Internet, from your Uncle Sid to Larry Ellison.[1]Your good name and every iota of data about you are for sale. Since you're not getting a cut of the profits (at least, most people aren't),[2]it's best to keep your private information to yourself. After all, once it's out of your hands, you have no control over who gets it and how they use it.

Protect your IP Address

Like the number and street name of your real-world address, a computer's IP address[3]tells others where and how to find the computer online. This identifier is composed of four numbers, each between 0 and 255, separated by periods (for example, 123. 123. 23. 2). Every Web site and electronic device connected to the Internet must possess a unique IP address; that is, no two devices can have the same IP address at the same time.

If spammers or hackers manage to get your IP address, they can assault your PC with viruses or even hack directly into it to steal your personal data. You can put up dedicated hardware or software firewalls and install antivirus programs on every node in your network, but, given enough time and resources, a determined hacker can break into almost any computer.

You should guard your IP address as carefully as you would guard your full name and street address. Neither your browser nor Windows itself allows you to hide your IP address from the outside world, but some third-party software takes care of this problem. Freedom,[4]from Zero-Knowledge Systems, masks your true IP address from the real world by routing all your Internet data through the Zero-Knowledge network. This program can stump even Web bugs.

If you use a dial-up connection, you're less at risk because your IP address changes with every session. But if you have an always-on connection, such as DSL or cable, you probably have a static or unchanging IP address. A static IP can leave you vulnerable to repeated scans and attacks. On the other hand, if you get a different IP address each time you connect to the Internet—a dynamic IP address—you can present a moving target for the hackers. If you' re privacy conscious, ask your ISP[5]for a dynamic IP address. Intruders will have a much harder time finding your computer time and time again if your address isn't constant.

Cookies Keep Track

But Web sites also use other technologies to track you down and trace your movement online. Cookies are small data files that the Web sites you visit can store in your browser's cookie file to track your path across the Web or record your user preferences. Most cookies have useful purposes. For example, if you register to view a specific Web site (such as the New York Times on the Web), the site can plant a cookie on your computer so that, thereafter, you won't need to enter your username and password to access the site. There are two kinds of cookies, persistent cookies, which remain on your computer even if you shut it down, and per-session cookies, which are often used to store the contents of a shopping cart and won't be saved once you power off your PC.

The threat cookies present isn't from the depth of the information they can reveal; cookies don't permit hackers' unfettered access to your private files, for instance. The threat is a small but long-term erosion of your privacy. Most sites record cookies every time you click a new link within the site and can later find out which pages you read and how long you lingered. Such information may be very useful to marketers who mine it for details on your habits and likes or dislikes. Over time, these minute data fragments can help companies build a profile of you, which they could sell to yet more aggressive marketers.

Bugs Do it Better

If you delete the cookies regularly or configure your browser not to accept them, snoopy sites can't collect enough data to profile you. That's why some companies use Web bugs as a user-tracking backup if cookies don't work. Here's how Web bugs work: these tiny graphics, sometimes just a pixel high and a pixel wide, are the same color as a Web page's background. Any time you visit a site, the site must have your IP address before it can load any Web graphic file (including a Web bug), and, with your IP address in hand, the machine that hosts the Web bug can log your address for the duration of your session.[6]Even with cookies blocked, bugs let sites track users surreptitiously. In many cases, the tracking may be benign—a site monitoring how popular a particular page is—but it isn't always just the site that uses a Web bug. Commercial sites with banner ads have discovered that ad banner companies themselves, such as DoubleCliek,[7]may use Web bugs to track the traffic on the sites that host their ads. So Web bugs can open you up to unwanted profiling, and (if the Web bug loads after a user fills in a Web order form, for example) possible junk mailing.

Stop Hostile Apps

Cookies aren't inherently malicious, but the ubiquitous little files inhabit your hard drive (if you use Internet Explorer, for instance, the cookies reside inside your C:\ Windows\Cookies folder) and identify you via a string of numbers and letters (called a unique identifier) to the Web site or company that placed the cookie there. For instance, companies such as DoubleClick, Adbureau. net,[8]or Link Exchange[9]that provide advertising to Web sites can plant a cookie on your hard drive when you are reading one site (for example, Amazon. com[10]) and then read that same cookie when you surf to a different DoubleClick-served site (for instance, CNN. com[11]). That's how the company tracks you across multiple sites.

Take a Bite out of Cookies

Fortunately, your browser makes it easy to disable cookies: in Internet Explorer 5. x,[12]click Tools > Internet Options, then choose the Security tab. Click the Earth icon labeled Internet, then click the Custom Level button near the bottom of the window. In the Security Settings window that opens, scroll down to the section labeled Cookies. To keep your browser from automatically planting cookies on your PC, select the Disable or Prompt option next to "Allow cookies that are stored on your computer" (in other words, the persistent cookies we mentioned earlier). It's generally OK to leave the per-session cookies enabled; these are the cookies that remember what's in your shopping cart when you use a Web store.

In Netscape, click Edit > Preferences and select the Advanced item in the left pane. Here, you can opt to block all cookies or to decide on a site-by-site basis. We recommend that you pick the second option and allow your browser to use cookies for some sites. That way, you can exercise a measure of control over your information and still take advantage of the cookie conveniences. If you're truly paranoid, however, you may want to disable all cookies even if it prevents you from, say, shopping efficiently online.

If you're curious about how many sites set cookies, check the "Warn me before accepting a cookie" box, and Navigator will pop up a dialog box each time a site tries to set a cookie. (Internet Explorer still lacks such an option. ) We recommend that you try this for only a short time; the sheer volume of cookie request dialogs will likely drive you crazy.

Be Selective

Simply disabling cookies may not work for you, however. Internet Explorer doesn't let you block cookies sent to advertising companies while permitting cookies from the site you're visiting; it's all or nothing. Blocking all cookies eliminates the timesaving benefit of user preferences on free customizable news sites such as My Yahoo. If you use IE and want to pick and choose which sites are allowed to plant cookies on your hard drive, try the handy freeware CookieWall[13]from AnalogX. CookieWall runs in your System Tray, silently monitoring your Internet Explorer cookie file every minute or so and allowing you to pick and choose which cookies to permit. When the program encounters a cookie that it hasn't seen before, a dialog box pops up to ask you what to do with cookies from this site—handy if, say, you register to use My Yahoo and don't want to have to enter your username every time you load the page.

Connection Protection

If you use a high-speed connection such as DSL or cable, consider downloading ZoneAlarm,[14]CNET's[15]favorite free personal firewall. Firewalls not only keep hostile apps from entering your PC from the outside, they also block hidden or unknown software on your PC (the sort a virus could install) from connecting to the Internet without your knowledge and giving away your valuable information.

To find out how secure your connection is, go to Steve Gibson's Shields Up[16]site and get a free test of your security. Shields Up performs many of the same tests hackers use to probe your computer for vulnerabilities and provides you with a summary assessment of your PC's security and what you need to do (if anything) to make yourself less vulnerable. Gibson's scan can tell you if the back door program is running but not if it has been (or is being) used. But a little information goes a long way. If you know the Trojan is there, you can work to get rid of it.

Notes

[1]from your Uncle Sid to Larry Ellison其中Uncle Sid和Larry Ellison均为虚构人物,泛指任何人,类似中文“从张三到赵六”。

[2]Since you're not getting a cut of the profits...既然你分不到一点利润……。

[3] IP address(lnternet Protocol网际协议)网址。

[4] Freedom是Zero-Knowledge软件公司推出的防火墙,该公司主要为那些希望保护消费者隐私的网站设计反黑客软件,系列产品有Freedom Internet Security, Freedom Anti-Virus, Freedom Firewall, Freedom Parental Control, Freedom WebSecure。网址:www. zeroknowledge. com.

[5] ISP(lnternet Service Provider)国际互联网服务提供商,也叫IAPs (Internet Access Providers)。

[6] ...for the duration of your session. 在你上网期间。

[7] DoubleClick是一家美国网络条幅广告公司(Banner advertising company),主营在线广告、电子邮件式市场营销。网址:www. doubleclick. com。

[8] Adbureau. net一家网络条幅广告公司。

[9] LinkExchnage微软公司下属的一家条幅广告公司,主要从事销售与市场营销。网址:www. linkexchange. com.

[10] Amazon. com 一家网络图书营销公司。

[11] CNN. com美国著名的有线电视网.CNN(美国有线电视网)的网站。

[12] Internet Explorer(简称IE)与Netscape及Navigator是目前使用最广泛的三大浏览器。

[13] CookieWall是AnalogX公司推出的个人防火墙。网址:www. analogx. com。

[14] ZoneAlarm是美国Zone Labs公司推出的免费个人防火墙,该软件以其独特的动态性能曾获得美国最佳防火墙奖。网址:www. zonelabs. com。

[15] CNET是一家专门介绍并从事在线营销业务的网站,它所经营的产品包括软件、硬件以及相关的电子产品。网址:www. CNET. com。

[16] Shields Up是Gibson Research Corporation(GRC)公司推出的个人电脑反黑客软件。网址:www. grc. coma

点击查看答案
第5题
阅读下列英文短文,从供选择的中文句子中选出最符合短文意思的句子。 Forty-three years after the birth of

阅读下列英文短文,从供选择的中文句子中选出最符合短文意思的句子。

Forty-three years after the birth of ENIAC—the first electronic computer, computers are still in their infancy. We are on the verge of a true revolution when we will see the computer itself“doing science”.In the next decade advances in computer-assisted science should dwarf the past historical accomplishments of scientific computing. Ken Wilson, Cornell University's Nobel laureate, points out that computational science is now the third paradigm of science, supplementing theory and experimentation.

供选择的答案:

(1)计算机还处于幼年时代。

(2)计算机已步入中年。

(3)计算机还在不断发展中。

(4)现在我们正经历一场真正的革命。

(5)现在我们正处于一场真正革命的边缘。

(6)现在计算机本身正在进行一场真正的革命。

(7)这场革命实现时我们将看到计算机自行“进行科学研究”。

(8)当我们看到计算机自行“进行科学研究”,我们正在一场革命的途中。

(9)当我们看到计算机自行“进行科学研究”,我们开始进行一场真正的革命。

(10)在今后十年中,计算机辅助科学的进展将使以往科学计算取得的历史性成果更加丰富。

(11)在今后十年中,计算机辅助科学的进展将使以往科学计算取得的历史性成果相形见绌。

(12)在今后十年中,计算机辅助科学的进展与以往科学计算取得的历史性成果等量齐观。

(13)计算科学是提供理论和实验研究用的第三种科学示例。

(14)计算科学是补充理论和实验研究用的第三种科学范例。

(15)计算科学是增加理论和实验研究用的第三种学科。

点击查看答案
第6题
证券市场线(security market line)

证券市场线(security market line)

点击查看答案
第7题
机械安全(mechanical security)

机械安全(mechanical security)

点击查看答案
第8题
自然安全(natural security)

自然安全(natural security)

点击查看答案
第9题
One solution to major security problem is ______, which are frequently installed to fix known securi
ty holes.

A.patches B.compensations C.complements D.additions

点击查看答案
第10题
performance guarantee(performance bond、performance security)

performance guarantee(performance bond、performance security)

点击查看答案
第11题
《雇员退休收入保障法案》(Employee Retirement Income Security Act,ERISA)

《雇员退休收入保障法案》(Employee Retirement Income Security Act,ERISA)

点击查看答案
退出 登录/注册
发送账号至手机
密码将被重置
获取验证码
发送
温馨提示
该问题答案仅针对搜题卡用户开放,请点击购买搜题卡。
马上购买搜题卡
我已购买搜题卡, 登录账号 继续查看答案
重置密码
确认修改