计算机专业英语key-term chapter 9
- 格式:docx
- 大小:18.17 KB
- 文档页数:7
幻灯片1UNIT 9 The InternetSection AThe Internet幻灯片2The Internet —IntroductionThe most notable example of an internet is the Internet (note the uppercase I ), which originated from research projects going back to the early 1960s. The goal was to develop the ability to link a variety 0f computer networks so that they could function as a connected system that would not be disrupted by local disasters.最著名的互联网例子是因特网(Internet,注意大写的I)。
因特网起源于20世纪60年代初的研究项目。
其目标是发展一种能力,将各种计算机网络连接起来,使它们能够作为一个不会因局部灾难而瓦解的互联系统运行。
幻灯片3The Internet —IntroductionMost of this original work was sponsored by the U.S. government through the Defense Advanced Research Projects Agency (DARPA--pronounced "DAR-pa"), Over the years, the development of the Internet shifted from a defense project to an academic research project, and today it is largely a commercial undertaking that links a worldwide combination of WANs, MANs, and LANs involving millions of computers.最初的工作大多是由美国政府通过国防部高级研究计划局(DARPA——读作“DAR-pa”)发起的。
Chapter 9 Computing Security Learning Objectives:Warm-up:Label the following pictures with the terms in the box:1. router2.search engine 3.modular plug 4. world wide web 5. network controller 6. network graphic 7. network cabinet 8. net wire 9. serverA.______________________B.______________________C. ______________________D._____________________E._____________________F. ______________________G ._____________________H.______________________I. ______________________9.1 An Introduction to Computer SecurityComputer Security is the protection of computing systems and the data that they store or access. The issue of computer security first arose in the 1970s as individuals began to break into telephone systems. As technologyadvanced, computer systems became targets as well. The Federal Bureau of Investigation (FBI 1) made one of its first arrests related to computer hacking in the early 1980s.When talking about computer security, some people think firstly of their credit card numbers, social security numbers 2, and other personal information. Knowing how to protect private information from those who would exploit it is very important. However, that is only one part of computer security. Computer security in a broad sense consists of the three aspects: hardware security, information security and administration security.Ⅰ. Hardware security falls into physical security and emanation security 3. The former concerns protection of computer hardware and associated equipments, such as computers, servers, networks and peripheral equipment, etc. from external physical threats, such as tampering , theft, earthquakes, water, etc. The latter copes with protection against spurious signals 4 emitted by electrical equipments in the system, such as electromagnetic emission from displays and audio emission (sounds from printers, etc).Ⅱ. Information security is made up of communication security and computer security in a narrow sense. The firsthacking [ ♒✌♓☠]n . 非法访问计算机系统和数据库的活动in a broad sense 广义上的 fall into 分为 emanation[ ♏❍☜⏹♏♓☞☜⏹] n . 散发, 发出 associated adj .联合的, 关联的 tamper [ ♦✌❍☐☜] vi .干预, 玩弄 vt .篡改spurious [ ♦☐◆☜❒♓☜♦] adj .伪造的, 假造的 electromagnetic[✋●♏♦❒☜☺❍✌♈⏹✋♦✋ ] adj .电磁的 transmission[♦❒✌⏹❍♓☞☜⏹] n .播送, 发射, 传动1 FBI 联邦调查局2social security number 社会安全号码。
计算机专业英语词汇1. file n. 文件;v. 保存文件2. command n. 命令,指令3. use v. 使用,用途4. program n. 程序5. line n. (数据,程序)行,线路6. if conj. 如果7. display vt. 显示,显示器8. set v. 设置,n. 集合9. key n. 键,关键字,关键码10. list n. 列表,显示,v. 打印11. by prep. 凭,靠,沿12. press v. 按,压13. with prep. 用,与,随着14. format n. 格式15. change v. 更换,改变,变动16. cursor n. 光标17. directory n. 目录,索引簿18. from prep. 从,来自,以来19. menu n. 菜单,目录20. option n. 任选,选择,可选项21. character n. 字符,符号,特性22. current n. 电流23. type n. 型,类型;v. 打印24. screen n. 屏幕,屏;v. 屏蔽25. specify v. 指定,规定,确定26. move v. 移动27. disk n. 盘,磁盘28. text n. 正文,文本29. drive v. 驱动;n. 驱动器30. see v. 看,看出,查看31. name n. 名,名称;vt. 命名32. record n. 记录33. box n. 箱,匣,(逻辑)框34. database n. 数据库35. help v. & n. 帮助36. memory n. 记忆存储,存储器37. which pron. 哪个,a. 那一个38. all a. 全,全部;ad. 完全39. on ad. 接通,导电,开40. copy n. 复制,v. 拷贝41. shell n. 壳,外壳42. delete vt. 删除,删去,作废43. enter v. 键入,送入44. margin n. 余量,边缘,边际45. mark n. 标记;vt. 加标记46. also ad. & conj. 也,亦,还47. do v. 做,干;n. 循环48. information n. 信息,情报49. choose v. 挑选,选择,选定50. select vt. 选择51. group n. 组,群52. first a. & ad. & n. 第一,首先53. field n. 字段,域,栏,场54. procedure n. 过程,程序,工序55. print v. 打印,印刷56. return v. 返回,回送57. number n. 数字,号码;vt. 编号58. selected a. 精选的59. want v. 需要,应该,缺少60. window n. 窗口61. message n. 信息,消息,电文62. dialog n. & vt. 对话63. example n. 例子,实例64. create vt. 创立,建立65. insert vt. 插入66. related a. 相关的67. item n. 项,项目,条款68. edit vt. 编辑,编排,编篡69. marked a. 有记号的70. area n. (区)域,面积,方面71. parameter n. 参数,参变量72. then ad. & conj. 那时,则73. variable a. 可变的;n. 变量74. tab n. 制表键75. up ad. 上,向上,a. 高的76. string n. 行,字符串77. each a. & ad. 各(自),每个78. active a. 激活的,活动的79. topic n. 题目,论题80. start v. 起动,开始,启动81. mode n. 态,方式,模82. selection n. 选择83. function n. 函数,功能,操作84. word n. 字(词),单词85. make vt. 制造,形成,接通86. right a. 右边的,正确的87. value n. 值88. button n. 按钮89. index n. 索引,变址,指数90. without prep. 没有,在…以外91. appear vi. 出现,显现,好像92. left a. & n. 左边(的)93. save v. 保存94. next n. 下一次,a. 其次95. off ad. (设备)关着,脱离96. following a. 下列的,以下的97. control v. 控制,支配,管理98. only a. 唯一的,ad. 仅仅99. user n. 用户100. end n. 结束,终点,端点101. system n. 系统102. contain vt. 包含,包括103. time n. 时间;vt. 计时104. letter n. 字母,信105. data n. 数据106. setting n. 设置,调整107. desire v. & n. 期望108. position n. 位置;vt. 定位109. down ad. 落下,降低,减少110. task n. 任务;v. 派给…任务111. view n. & v. 视图,景象112. switch n. & v. 开关,转换,切换113. include vt. 包括,包含114. get v. 得到,获得,取115. default v. 缺省,预置,约定116. structure n. 结构,构造,构件117. into prep. 向内,进入118. path n. 路径,通路,轨道119. blank n. 空白,间隔120. open v. 打开,开启,断开121. add v. & n. 加,增加,添122. enable vt. 启动,恢复正常操作123. operation n. 操作,运算,动作124. erase v. 擦除,取消,删除125. filename n. 文件名126. search v. 检索,查询,搜索127. another a. 另一个,别的128. last a. & n. 最后(的)129. column n. 列,柱,栏130. after prep. & ad. 以后,后面131. prompt n. & v. 提示132. two n. & a. 二,两,双133. execute v. 实行,实施134. about ad. 关于,大约,附近135. escape v. 逃避,逸出,换码136. error n. 错误,误差,差错137. currently ad. 目前,现在138. extension n. 扩充,延伸139. same a. 同样的,相同的140. status n. 状态,态,状况141. run v. 运行,运转,操作142. argument n. 变元,自变量143. statement n. 语句,陈述,命题144. shift v. 转义,换档,移位145. store n. & vt. 存储,存储器146. scroll vt. 上滚(卷);n. 纸卷147. replace vt. 替换,置换,代换148. macro n. 宏,宏功能,宏指令149. page n. 页面,页,版面150. quit v. 退出,结束151. define vt. 定义,规定,分辨152. reference n. & a. 参考;参考的153. other a. 别的,另外的154. while conj. 当…的时候155. pressing n. & a. 压制;紧急的156. restore vt. 恢复,复原157. top n. 顶,尖端158. how ad. 如何,怎样,多么159. color n. 颜色,色彩,(彩)色160. allow v. 允许,容许161. block n. (字,信息,数据)块162. decimal n. & a. 十进制;十进制的163. main a. 主要的164. definition n. 定义,确实,清晰度165. between prep. 在…之间,中间166. optional a. 任选的,可选的167. date n. 日期168. remove v. 除去,移动169. arrow n. 箭头,指针170. label n. 标签,标号,标识符171. within prep. 在…以内172. issue v. 发行,出版,流出173. different a. 不同的,各种各样的174. available a. 可用的175. returned a. 退回的176. associate v. 相联,联想,关联177. attribute n. 属性,标志,表征178. dos 磁盘操作系统179. before prep. 以前,前,先180. order n. & vt. 指令,次序;排序181. modify vt. 修改,改变,变址182. array n. 数组,阵列183. mouse n. 鼠标器184. note n. 注解,注释185. locate vt. 定位186. video n. 视频,电视187. printer n. 打印机,印刷机188. bar n. 条,杆,棒189. bottom n. & a. 底,基础;底下的190. carriage n. 滑架,托架191. content n. 含量,容量,内容192. either a. & pron. 任何一个,各193. ok ad. & a. 对,好;全对194. space n. 空格键,空间195. editor n. 编辑程序196. exist vi. 存在,生存,有197. scope n. 范围,显示器198. paragraph n. 段(落),节,短讯199. multi (词头)多200. clear v. 清除,弄干净201. exit n. & vi. 出口;退出202. report vt. & n. 报告,报表203. execution n. 执行204. backup n. 备份,后备,后援205. version n. 版本206. find v. 寻找,发现207. pointer n. 指针,指示字208. subset n. 子集,子设备209. keyboard n. 键盘210. full a. & ad. & n. 全(的),满211. check v. 校对,栓查,核算212. should v. & aux. 应当,该213. single a. & n. 单个的;一个,单214. positioning n. 定位215. provide v. 提供216. title n. 题目,标题217. expression n. 表达式218. through prep. & ad. 通过,直通219. toggle n. & v. 触发器;系紧220. code n. 码,代码,编码221. such a. & pron. 这样的,如此222. beginning n. 起点,初223. guide n. 向导,指南,入门224. tree n. 树,语法树225. environment n. 环境226. but 但是,可是,除非,不过227. device n. 设备,器件,装置228. highlight n. 增强亮度,提示区229. call v. 调用,访问,呼叫230. continue v. 连续,继续231. indicate vt. 指示,表示232. until prep. 到…为止,直到233. begin v. 开始,着手,开端234. place vt. 放,位,地点235. rename vt. 更名,改名236. swap v. 交换,调动237. work n. 工作238. remain vi. 剩下,留下,仍然239. close v. & a. 关闭,闭合;紧密的240. combination n. 结合,组合241. profile n. 简要,剖面,概貌242. unless conj. 除非243. so pron. & conj. 如此,这样244. except prep. 除…之外,除非245. turn v. & n. 转,转动;圈,匝246. back n. 背面,反向,底座247. sure a. & ad. 确实的;的确248. section n. 节,段,区域249. follow v. 跟随,跟踪250. split v. 分开,分离251. need v. 必须,需要252. access n. 存取,选取,接近253. additional a. 附加的,辅助的254. cancel v. 删除,取消,作废255. document n. 文献,资料,文件256. case n. 情况,场合257. numeric n. & a. 数字的,分数258. go vi. 运行,达到259. load n. & v. 装入,负载,寄存260. try n. (尝)试,试验261. size n. 尺寸,大小,容量262. entire a. & n. 完全的;总体263. leave v. 离开,留下264. history n. 历史265. second n. & a. 秒,第二(的) 266. reflow v. & n. 回流,逆流267. output n. 输出,输出设备268. out n. & a. 输入,在外269. both a. & ad. 两,双,都270. install vt. 安装271. source n. 源,电源,源点272. way n. 路线,途径,状态273. assign vt. 赋值,指定,分派274. support vt. 支援,支持,配套275. specific a. 特殊的,具体的276. join v. & n. 连接,并(运算) 277. expand v. 扩充,扩展,展开278. like a. 类似的,同样的279. diskette n. 软磁盘,软盘片280. skip v. 跳跃(定位),跳过281. application n. 应用282. confirmation n. 认可283. whether conj. 无论,不管284. hold v. 保持285. click n. “卡搭”声,插销286. write v. 写,存入287. byte n. (二进制的)字节288. abbreviate vt. 缩写,省略289. show v. 显示,呈现,出示290. otherwise ad. & a. 另外291. working n. 工作,操作,作业292. delimiter n. 定界符,分界符293. location n. 定位,(存储器)单元294. perform v. 执行,完成295. graphic n. & a. 图形;图形的296. read v. 读,读阅297. confirm vt. 证实,确认298. sort v. 分类,排序299. clause n. 条款,项目,子句300. once ad. & n. 只一次,一旦301. however conj. 然而,可是302. extend v. 扩充303. look v. 看,查看304. starting a. 起始的305. now ad. & n. 此刻,现在306. original n. & a. 原文;原(初)始的307. correspond vi. 通信(联系)308. property n. 性(质),特征309. several a. & n. 若干个,几个310. learn v. 学习,训练311. cause n. 原因,理由312. bracket n. (方)括号,等级313. omit vt. 省略,删去,遗漏314. running a. 运行着的,游动的315. sub-directory n. 子目录316. edge n. 棱,边,边缘,界限317. form n. 格式,表格,方式318. instruction n. 指令,指导319. ascii n. 美国信息交换标准码320. below a. & prep. 下列的;低于321. standard n. 标准322. occurrence n. 出现,发生323. lock n. & v. 锁,封闭;自动跟踪324. append vt. 附加,增补325. destination n. 目的地,接收站326. password n. 口令,保密字327. point n. 点,小数点,句号328. variety n. 变化,种类,品种329. many a. & n. 许多,多数330. buffer n. 缓冲器331. useful a. 有用的332. object n. 对象,目标,物体333. again ad. 再,又,重新,也334. operating a. 操作的,控制的335. carry v. 进位,带336. update v. 更新,修改,校正337. moving n. & a. 活动的,自动的338. coprocessor n. 协同处理器339. overlay v. 覆盖,重叠340. practice n. 实习,实践341. navigation n. 导航342. automatically ad. 自动地,机械地343. total n. & v. 总数;总计344. previous a. 早先的,上述的345. software n. 软件346. shortcut n. 近路,捷径347. long a. 长的,远的348. unique a. 唯一的,独特的349. part n. 部分,零件350. updated a. 适时的,更新的351. internal a. 内部的352. fill v. 填充353. basic n. & a. 基本;基本的354. math n. 数学355. since prep. 自从…以来356. determine v. 确定357. making n. 制造,构造358. center n. 中心,中央359. already ad. 已经,早已360. keyword n. 关键字(词)361. action n. 操作,运算362. condition n. 条件,情况;vt. 调节363. quick a. & ad. 快速的,灵敏的364. assigned a. 指定的,赋值的365. give vt. 给出,赋予,发生366. large a. (巨)大的,大量的367. chapter n. 章,段368. computer n. 计算机369. complete v. & a. 完成;完整的370. past a. 过去的,结束的371. match v. 比较,匹配,符合372. recover v. 恢复,回收373. always ad. 总是,一直,始终374. require v. 需要,要求375. opening n. 打开,断路,孔376. network n. & vt. 网络;联网377. sign n. 符号,信号,记号378. release vt. & n. 释放,核发,版379. three a. & n. 三(的)380. recall vt. 撤消,复活,检索381. deletion n. 删去(部分),删除382. fixed a. 固定的,不变的383. amount vt. & n. 总计;合计384. alias n. 别名,代号,标记385. quote n. & v. 引号;加引号386. correct a. & vt. 正确的;改正387. else ad. & conj. 否则,此外388. maximum n. & a. 最大(的),最高389. under prep. 在…下面(之下) 390. take v. 取,拿391. switching n. 开关,转接,交换392. element n. 元件,元素,码元393. modification n. 改变,修改394. modified a. 修改的,变更的395. input n. 输入,输入设备396. uppercase n. 大写字母397. plus prep. 加,加上,外加398. found v. 建立,创办399. debug vt. 调试400. force v. & n. 强制;压力,强度401. lowercase n. 下档,小写体402. just ad. 恰好403. undo vt. 取消,废除404. environ vt. 围绕,包围405. why ad. 为什么406. temporary a. 暂时的,临时的407. put v. 存放(记录),放置408. instead ad. (来)代替,当作409. encounter v. & n. 遇到,碰到410. across prep. 交叉,越过411. matching n. 匹配,调整412. wildcard n. 通配符413. spill v. 漏出,溢出,漏失414. level n. 水平,级,层次415. browse v. 浏览416. speech n. 说话,言语,语音417. occur vi. 发生,出现,存在418. memo n. 备忘录419. prior a. 先验的,优先的420. loaded a. 有负载的421. length n. (字,记录,块)长度422. round v. 舍入,四舍五入423. variant n. & a. 变体,易变的424. floppy n. 软磁盘425. machine n. 机器,计算机426. square n. & a. 正方形;方形的427. supply vt. & n. 电源,供给428. home n. & a. 家,出发点429. normal a. & n. 正常,标准430. onto prep. 向…,到…上431. during prep. 在…期间432. module n. 模块(程序设计)433. monochrome n. 单色434. assistance n. 辅助设备,帮助435. tell n. 讲,说,教,计算436. library n. (程序…)库,图书馆437. demonstration n. (公开)表演,示范438. stack n. 栈,堆栈,存储栈439. even a. & ad. 偶数的;甚至440. evaluate v. 估计,估算,求值441. times n. 次数442. previously ad. 以前,预先443. directly ad. 直接地,立即444. logical a. 逻辑的,逻辑“或”445. template n. 标准框,样板,模板446. calling n. 呼叫,调用,调入447. later a. 更后的,后面的448. driver n. 驱动器,驱动程序449. therefore ad. & conj. 因此,所以450. saving a. 保存的451. detail n. 元件,零件,细节452. linker n. 连接程序453. loop n. 圈,环;(程序)循环,回路454. process vt. 处理,进程,加工455. scheme n. 方案,计划,图456. every a. 每个,全体,所有的457. refer v. 访问,引用,涉及458. possible a. 可能的,潜在的459. above a. 在…之上,大于460. overview n. 综述,概要461. result n. 结果462. syntax n. 语法,文法,句法463. abbreviation n. 缩短,省略,简称464. bios n. 基本输入/输出系统465. hidden a. 隐藏的,秘密的466. null n. & a. 空(的),零(的)467. send v. 发送468. private a. 专用的,私人的469. hard a. 硬的470. hardware n. 硬件471. say v. 说,显示,假定472. equal vt. & n. 等于,相等;等号473. pack n. 压缩,包裹474. minus a. & n. 负的;负数,减475. alternate a. 交替的,备用的476. collapse v. 崩溃,破裂477. corner n. 角,角落,转换478. present a. & v. 现行的;提供479. interpreter n. 解释程序,翻译机480. advance v. & n. 进步,提高;进展481. forward a. 正向的482. fast a. & ad. 快速的483. special a. 专用的,特殊的484. slash n. 斜线485. utility n. & a. 实用程序;实用性486. regardless a. 不注意的,不考虑的487. disable vt. 禁止,停用488. compatible a. 可兼容的,可共存的489. depend vi. 随…而定,取决于490. empty a. 空,零,未占用491. alphabetical a. 字母(表)的,abc的492. branch n. 分支,支线;v. 转换493. resume v. 重(新)开(始)494. multiple a. 多次的,复杂的495. monitor n. 监视器,监督程序496. configuration n. 配置497. replacement n. 替换,置换,更新498. required a. 需要的499. macros n. 宏命令(指令)500. table n. 表501. loss n. 损耗,损失502. batch n. 批,批量,成批503. exact a. 正确的504. aboveboard ad. & a. 照直,公开的505. activate vt. & n. 使激活,驱动506. around ad. & prep. 周围,围绕507. slow a. & ad. 慢速的508. floating a. 浮动的,浮点的509. refresh v. 刷新,更新,再生510. stop v. 停止,停机511. pass v. 传送,传递,遍(数) 512. public a. 公用的,公共的513. eject n. 弹出514. ignore vt. 不管,忽略不计515. share v. 共享,共用516. sequence n. 顺序,时序,序列517. consist vi. 符合,包括518. step n. 步,步骤,步长,档519. double a. 两倍的,成双的520. come vi. 来,到,出现521. lower a. 下部的,低级的522. describe vt. 描述,沿…运行523. count v. 计数,计算524. pop v. 上托,弹出(栈)525. valid a. 有效的526. suspend v. 中止,暂停,挂起527. enhance vt. 增强,放大,夸张528. separate v. & a. 分隔,分离,各自的529. echo n. 回波,反射波530. necessary a. 必要的,必然的531. greater than 大于532. able a. 能…的,有能力的533. marking n. 标记,记号,传号534. ask v. 请求,需要535. term n. 项,条款,术语536. bring v. 引起,产生,拿来537. warning n. & a. 报警,预告538. less a. & ad. 更小,更少539. whose pron. 谁的540. comment n. & vi. 注解,注释541. effect n. 效率,作用,效能542. expanding a. 扩展的,扩充的543. on-line a. 联机的544. reorder v. (按序)排列,排序545. direct a. 直接的546. enclose vt. 封闭,密封,围住,包装547. reset vt. 复位,置“0”548. various a. 不同的,各种各样的549. paper n. 纸,文件,论文551. side n. (旁)边,面,侧(面)552. push v. 推,按,压,进(栈) 553. programming n. 程序设计,编程序554. upper a. 上的,上部的555. row n. 行556. pressed a. 加压的,压缩的557. temporarily ad. 暂时558. day n. 日,天,白天,时代559. repaint vt. 重画560. redefine vt. 重新规定(定义) 561. relation n. 关系,关系式562. dimension n. 尺寸,维,因次563. boundary n. 边界,界限,约束564. zoom v. 变焦距565. initialize v. 初始化566. personal a. 个人的,自身的567. hello int. & v. 喂!;呼叫568. true a. & n. 真,实,选中569. wish v. & n. 祝愿,希望570. font n. 铅字,字形571. know v. 知道,了解,认识573. global n. 全局,全程,全局符574. still a. & n. & v. 静止的;静;平静575. installation n. 安装,装配576. invoke vt. 调用,请求577. interactive a. 交互式,交互的578. described a. 被看到的,被发现的579. century n. 世纪580. literal a. 文字的581. rather ad. 宁可,有点582. exclusive a. 排斥,排它性583. marker n. 记号,标记,标志584. wait v. 等待585. appropriate a. 适当的,合适的586. fit v. & n. 适合,装配;非特587. adapter n. 适配器,转换器588. filter n. 滤波器,滤光材料589. break v. 断开,撕开,中断590. backward ad. 向后,逆,倒591. searching n. 搜索592. receive v. 接收593. dual a. 对偶的,双的595. normally ad. 正常地,通常596. exactly ad. 正好,完全,精确地597. immediately ad. 直接地598. separated a. 分开的599. high a. 高600. equivalent a. 相等的,等效的601. light n. & a. 光(波,源);轻的602. zero n. 零,零位,零点603. storage n. 存储,存储器604. width n. 宽度605. language n. 语言606. startup n. 启动607. much a. & n. 很多,许多,大量608. per prep. 每,按609. over prep. 在…上方610. mirror n. & v. 镜,反射,反映611. request n. & vt. 请求612. keypad n. 小键盘613. keep v. 保持,保存614. resident a. 驻留的615. learning n. 学问,知识616. talk v. 通话,谈话617. summary n. 摘要,汇总,提要618. well n. & a. 井;好,良好619. link n. & v. 链接;连接,联络620. according to a. 按照,根据621. identify v. 识别,辨认622. designated a. 指定的,特指的623. pertain vi. 附属,属于,关于624. expansion n. 展开,展开式625. incompatible a. 不兼容的626. blinking n. 闪烁627. month n. 月份628. precede v. 先于629. readily ad. 容易地,不勉强630. transportable a. 可移动的631. appropriately ad. 适当地632. routine n. 程序,例行程序633. ready a. 就绪,准备好的634. listing n. 列表,编目635. newly ad. 新近,重新636. year n. (一)年,年度,年龄637. contact n. 接触,触点638. session n. 对话,通话639. own a. & v. 自己的;拥有640. redraw vt. 再拉641. here ad. 在这里642. manual a. 手工的,手动的643. particular a. 特定的,特别的644. rectangle n. 矩形645. additive a. & n. 相加的;附加物646. similar a. 相似的647. assembly n. 汇编,安装,装配648. copyright n. 版权649. description n. 描述650. retrieve v. 检索651. mistake n. 错误652. produce v. 生产,制造653. ram 随机存取存储器654. exception n. 例外,异常,异议655. digit n. 数字,位数,位656. reverse v. & a. 反向的,逆657. minimum n. & a. 最小(的),最低658. enough a. & ad. 足够的,充足的659. although conj. 虽然,即使660. reindex v. & n. 变换(改变)符号661. third a. & n. 第三,三分之一662. red a. & n. 红色(的)663. along prep. & ad. 沿着664. test n. & v. 测试665. small a. 小的,小型的666. feed v. 馈给,(打印机)进纸667. company n. & v. 公司;交际,交往668. movie n. 影片,电影(院)669. compile vt. 编译670. frequently ad. 常常,频繁地671. undefined a. 未定义的672. state n. & vt. 状态;确定673. tick v;n. 滴答(响);勾号(√) 674. accept vt. 接受,认可,同意675. intense a. 强烈的,高度的676. documentation n. 文件编制,文本677. asterisk n. 星号(*)678. easily ad. 容易地,轻易地679. become v. 成为,变成,适宜680. address vt. & n. 寻址;地址681. interface n. 接口682. pause vi. 暂停683. repeat v. 重复684. restart v. 重新启动,再启动685. assumed a. 假定的686. speed n. 速度687. entry n. 输入,项(目),入口688. combine v. 组合,联合689. organize v. 组织,创办,成立690. finished a. 完成的691. mixed a. 混合的692. permit v. 许可,容许693. formatting n. 格式化694. root n. 根695. symbol n. 符号,记号696. binary n. & a. 二进制;双态的697. whenever ad. & conj. 随时698. reach v. & n. 范围,达到范围699. caution n. & v. 警告,注意700. subtotal n. & v. 小计,求部分和701. card n. 卡片,插件(板)702. general a. 通用的703. associated a. 联合的,相联的704. transfer v. 传送,转换,转移705. connect v. 连接706. partition v. 划分,分区,部分707. hexadecimal a. 十六进制的708. generate vt. 产生,发生,生成709. specification n. 说明书,规则说明书710. customize vt. 定制,定做711. far a. 远的,遥远的712. nest v. 嵌套,后进先出713. duplicate vt. 复制,转录,加倍714. compression n. 压缩,浓缩715. unable a. 不能的716. means n. 方法,手段717. alternately ad. 交替地,轮流地718. intensity n. 强度,亮度719. reading n. 读,读数720. let v. 让,允许721. explicitly ad. 明显地,显然地722. compare v. 比较,对照,比喻723. sector n. & v. 扇区,段;分段724. problem n. 问题,难题725. vertically ad. 竖直地,直立地726. horizontally ad. 水平地727. backspace v. 退格,回退728. terminate v. 端接,终止729. people n. 人们730. short a. & n. 短的;短路731. drag vt. 拖,拉,牵,曳732. formatted a. 有格式的733. preview n. & vt. 预映734. underscore vt. 在…下面划线735. correctly ad. 正确地736. initially ad. 最初,开头737. reformat v. 重定格式738. inside n. & a. 内部,内容;内部的739. integrate v. 综合,集成740. controlled a. 受控制的,受操纵的741. period n. 周期742. huge a. 巨大的,非常的743. determined a. 坚决的,毅然的744. trailing n. & a. 结尾;尾随的745. seek v. 查找,寻找,探求746. introduction n. 入门,介绍,引进747. indent v. 缩排748. base n. 基,底,基地址749. integer n. 整数750. attempt vt. & n. 尝试,试验751. twice n. & ad. 两次,两倍于752. formed a. & n. 成形753. subscript n. 注脚,下标754. tiny a. 微小的,微量的755. model n. 模型,样机,型号756. correction n. 校正,修正757. rating n. 定额,标称值758. secondary a. 辅助的,第二的759. opened a. 开路的,断开的760. limit n. 极限,限界761. sun n. 太阳,日762. translate v. 翻译,转换,平移763. reason n. 原因,理由764. colon n. 冒号“:”765. avoid vt. 避免,取消,无效766. range n. 范围,域,区域767. allocate vt. 分配768. wordperfect a. 一字不错地熟记的769. simply ad. 简单地,单纯地770. verify vt. 鉴定,检验,核对771. manner n. 方法,样式,惯例772. direction n. 方向,定向,指向773. portion n. & vt. 部分;分配774. emulator n. 仿真器,仿真程序775. successful a. 成功的776. applied a. 适用的,外加的777. sum n. 和,合计,总额778. achieve vt. 完成,实现779. together ad. 一同,共同,相互780. affect vt. 影响,改变,感动781. delay v. 延迟782. free a. 自由的,空闲的783. properly ad. 真正地,适当地784. kind n. 种类,属,级,等785. splitting n. 分区(裂)786. feature n. 特征,特点787. console n. 控制台,操作台788. operate v. 操作,运算789. kernel n. 内核(核心)程序790. easy a. & ad. 容易的;容易地791. modifier n. 修改量,变址数792. invalid a. 无效的793. compiler n. 编译程序(器)794. dot n. 点795. beep n. 蜂鸣声,嘀嘀声796. face n. 面,表面797. random a. 随机的798. facility n. 设施,装备,便利799. heading n. 标题800. asynchronous a. 异步的,非同步的801. series n. 序列,系列,串联802. individual a. 个别的,单个的803. explain v. 阐明,解释804. paste n. 湖,胶,膏805. welcome vt. & n. 欢迎806. six n. & a. 六(个)(的)807. early a. & ad. 早期,初期808. wrap v. & n. 包装,缠绕809. blue a. & n. 蓝(色),青色810. queue v. & n. 排队,队列811. interrupt v. & n. 中断812. respect n. & vt. 遵守,关系813. converted a. 转换的,变换的814. common a. 公用的815. hyphen n. 连字符,短线816. serial a. 串行的,串联的817. loading n. 装入,加载,存放818. retain vt. 保持,维持819. setup n. 安排,准备,配置820. freeze v. 冻结,结冰821. intend vt. 打算,设计822. explanation n. 说明,注解,注释823. certain a. 确实的,确定的824. zap v. 迅速离去,击溃825. archive vt. 归档826. negative a. 负的,否定的827. image n. 图像,影像,映像828. platform n. 平台,台架829. often ad. 经常,往往,屡次830. signal n. & v. 信号;发信号831. cpu 控制处理部件832. bit n. 比特;(二进制)位833. fully ad. 十分,完全834. deactivate vt. 释放,去活化835. especially ad. 特别(是),尤其836. usually ad. 通常,平常,一般837. recommend vt. 推荐,建议838. maintain vt. 维护,保养,保留839. important a. 严重的,显著的840. central a. 中央的,中心的841. addition n. 加法,增加842. anytime ad. 在任何时候843. analyst n. 分析员844. false a. 假(布尔值),错误845. black a. & n. 黑色的,黑色846. gather n. 聚集,集合847. cycle n. & v. 周,周期;循环848. relative a. 相对的849. offer v. 提供,给予,呈现850. ending n. 结束851. rent v. & n. 租用;裂缝852. sentence n. 句(子)853. remember v. 存储,记忆,记住854. proper a. 真的,固有的855. design v. 设计856. examine v. 检验,考试,审查857. initial a. 最初的,初始的858. corrupt v. & a. 恶化;有毛病的859. buy v. 买,购买,赢得860. increase v. 增加,增大861. host n. 主机862. sample n. & v. 样品,样本;抽样863. pending a. 悬而未决的,未定的864. divide v. 除865. boot n. 引导,靴866. hide v. 隐藏,隐蔽867. half n. & a. & ad. 一半,半个868. magenta n. & a. 深红色(的) 869. leading n. & a. 引导(的)870. wrong a. & ad. n. 错误(的) 871. today n. & ad. 今天872. least a. & ad. 最小(的)873. opposite a. & n. & ad. 相反的874. white a. & n. 白色(的)875. override v. & n. 超越,克服876. brown a. & n. 褐色(的),棕色877. hex a. & n. 六角形的878. rest n. & v. 剩余,休息879. damage n. & vt. 损伤,故障880. instant a. 立刻的,直接的881. reserved a. 保留的,预订的882. technology n. 工艺,技术,制造学883. handle n. 处理,句柄884. apply v. 应用,适用于,作用885. stand v. 处于(状态),保持886. payment n. 支付,付款887. kilobyte n. 千字节(kb)888. parenthesis n. 括弧,圆括号889. scan v. 扫描,扫视,搜索890. locating n. 定位,查找891. developer n. 开发者,显影剂892. murder n. 弄坏,毁掉893. flush v. 弄平,使齐平894. unlock v. 开锁,打开895. movement n. 传送,移动896. consecutive a. 连续的,连贯的897. collection n. 集合,聚集,画卷898. front a. 前面的,正面的899. addressing n. 寻址900. prefix n. 前缀901. carousel n. 圆盘传送带902. safety n. 安全,保险903. static a. 静态的,不变的904. background n. 背景,底色,基础905. product n. (乘)积,产品906. assignment n. 赋值,分配907. bad a. 坏的,不良的908. declare v. 说明909. adjust vt. 调整,调节,控制910. recognize v. 识别911. route n. 路线,路由912. respectively ad. 分别地913. unsuccessful a. 不成功的,失败的914. received a. 被接收的,公认的915. navigate v. 导航,驾驶916. considered a. 考虑过的,被尊重的917. due a. 到期的,应付(给)的918. recently ad. 近来919. room n. 房间,空间920. descend v. 下降,落下921. fact n. 事实922. alter v. 改变,修改923. track n. 磁道,轨道924. precedence n. 优先权925. skeleton n. 骨架,框架926. log n. & v. 记录,存入927. star n. 星形,星号928. hot a. 热的929. replaceable a. 可替换的930. accessible a. 可以使用的931. involve vt. 涉及,卷入,占用932. configure vt. 使成形933. question n. 问题934. green n. & a. 绿色绿色的935. entirely ad. 完全地,彻底地936. helpful a. 有帮助的,有用的937. middle a. 中间的938. declared a. 承认的,申报的939. compress vt. 压缩,精减940. graphically ad. 用图表表示941. auto a. 自动的942. automatic a. 自动的943. aligned a. 对准的,均衡的944. anywhere ad. 在任何地方945. terminal n. 终端,端子946. door n. 舱门,入口,孔947. expire v. 终止,期满948. resolution n. 分辨率949. local a. 局部的,本地的950. semicolon n. 分号(;)951. reread vt. 重读952. overwrite v. 重写953. critical a. & n. 临界的;临界值954. manager n. 管理程序955. capability n. 能力,效力,权力956. affected a. 受了影响的957. allowed a. 容许的958. border n. 边界,框,界限959. cache n. 高速缓存960. bell n. 铃,钟961. play v. 玩,奏,放音,放象962. quickly a. 快,迅速地963. fastback n. 快速返回964. answer n. & v. 响应,回答;答复965. represent v. 表示,表现,代表966. difference n. 差分,差967. highest a. 最高的968. project n. 项目,计划,设计969. physical a. 物理的,实际的970. matter n. 物质,内容,事情971. hercules n. 大力神,大力士972. reduce v. 减少,降低,简化973. publisher n. 出版者,发行人974. trim n. 区标,微调975. substitute v. 代替,替换,代入976. disabled a. 禁止的,报废的977. recent a. 近来的978. positive a. 正的,阳的,正片979. upgrade v. 升级,提高质量980. instance n. & vt. 例子,情况;举例981. happen vi. (偶然)发生,碰巧982. elapsed vi. & n. 经过983. future n. & a. 将来,未来的984. midnight n. & a. 午夜985. though conj. 虽然,尽管986. nor conj. 也不987. mono a. & n. 单音的988. slide v. & n. 滑动,滑动触头989. abort v. & n. 中断,故障990. jump v. & n. 转移991. toward prep. 朝(着…方向)992. throughout prep. 贯穿,整,遍993. via prep. 经过,经由994. among prep. 在…之中,中间995. neither a. & pron. (两者)都不996. layer n. & v. 层,涂层997. scatter v. 散射,分散,散布998. attention n. 注意(信号)999. convention n. 常规,约定,协定1000. conventional a. 常规的,习惯的1001. tool n. 工具,刀1002. handler n. 处理程序1003. processor n. 处理机,处理程序1004. desktop a. 台式的1005. build v. 建造,建立,组合1006. windowing n. 开窗口1007. development n. 开发,研制,显影1008. exceed v. 超过,大于1009. understand v. 懂,明白(了),理解1010. horizontal a. 水平的,横向的1011. alphabetically ad. 按字母表顺序1012. meet v. “与”,符合,满足1013. protect vt. 保护1014. reserve vt. 保留,预定,预约1015. clock n. 时钟,计时器,同步1016. manifest vt. 表明,显示,显现1017. safe a. 安全的,可靠的1018. disconnect vt. 拆接,断开,拆线1019. clockwise a. 顺时针的1020. eliminate vt. 除去,消除,切断1021. actual a. 实际的,现实的1022. declaration n. 说明,申报1023. probably ad. 多半,很可能1024. ring n. & v. 环,圈;按铃1025. cover vt. 盖,罩,套1026. indicator n. 指示器,指示灯1027. apple n. 苹果1028. icon n. 图符,象征1029. consideration n. 考虑,研究,讨论1030. skill n. 技巧1031. picture n. 图象,画面1032. layout n. 布置,布局,安排1033. suggest vt. 建议,提议,暗示1034. convenient a. 方便的,便利的1035. instruct vt. 讲授,命令1036. appendix n. 附录1037. medium n. & a. 媒体;中等的1038. truncate vt. 截尾,截断1039. inhibit vt. 禁止1040. nearly ad. 近乎,差不多,几乎1041. warn vt. 警告,警戒,预告1042. underline n. 下划线1043. register n. 寄存器1044. stuff n. & vt. 材料;装入1045. exclude vt. 排除,除去1046. destroy vt. 破坏,毁坏,打破1047. calculation n. 计算,统计,估计1048. angle n. 角,角度1049. lexical a. 辞典的,词法的1050. decide v. (使)判定,判断1051. trouble n. 故障1052. processing n. (数据)处理,加工1053. customer n. 顾客,客户1054. port n. 端口,进出口1055. discuss vt. 讨论,论述1056. segment n. 段,片段,图块1057. filing n. (文件的)整理汇集1058. identically ad. 相等,恒等1059. market n. 市场,行情,销路1060. valuable a. 有价值的,贵重的1061. limited a. 有限的,(受)限制的1062. trying a. 费劲的,困难的1063. heap n. 堆阵1064. grey n. & a. 灰色;灰色的1065. permanently ad. 永久地,持久地1066. accelerator n. 加速装置,加速剂1067. originally ad. 原来,最初1068. ability n. 性能,能力,效率1069. internally ad. 在内(部)1070. derelict vt. 中途淘汰1071. redirect vt. 重定向1072. reside vi. 驻留1073. header n. 首部,标题,报头1074. extra a. 特别的,额外的1075. repeated a. 重复的1076. death n. 毁灭,消灭1077. observe v. 观察,探测。
COMMUNICATION CHANNELSCommunication channels are an essential element of every communication system. These channels actually carry the data from one computer to another. There are two categories of communication channels. One category connects sending and receiving devices by providing a physical connection such as a wire or cable. The other category is wireless.沟通渠道是一个至关重要的元素的每个通信系统。
这些渠道实际上把数据从一台计算机到另一个。
有两个类别的沟通渠道。
一个类别连接发送和接收设备通过提供一个物理连接导线或电缆等。
另一类是无线。
PHYSICAL CONNECTIONSPhysical connections use a solid medium to connect sending and receiving devices. These connections include telephone lines (twisted pair), coaxial cable,and fiber-optic cable.物理连接使用固体介质连接发送和接收设备。
这些连接包括电话线路(双绞线)、同轴电缆和光纤电缆。
Telephone lines you see strung on poles consist of twisted-pair cable,which is made up of hundreds of copper wires. A single twisted pair culminates in a wall jack into which you can plug your phone and computer. (See Figure 9-3.) Telephone lines have been the standard transmission medium for years for both voice and data. However, they are now being phased out by more technically advanced and reliable media.Coaxial cable, a high-frequency transmission cable, replaces the multiple wires of telephone lines with a single solid-copper core. (See Figure 9-4.) In terms of the number of telephone connections, a coaxial cable has over 80 times the transmission capacity of twisted pair.Coaxial cable is used to deliver television signals as well as to connect computers in a network..电话线路你看到两极串在由双绞线,是由数以百计的铜线。
Unit nine1 program performance in one area must be sacrificed for the sake of the general performance of the software.for the sake of ----: 由于-----的缘故,为了-----。
作此意讲时主要是指为了要得到某物,不是指为了什么原因。
He goes to the seaside for the sake of his health .注:在复数名词后面用sake 或sakes 均可,但含义不同go to the seaside for the children`s sake (单数)(意味着孩子们的目的相同)do it for both our sakes (复数)(意味着我们的目的不同)可以改成:go to the seaside for the sake of the childrendo it for the sake of both of us .2 building blocks 程序块3 computability theory 算法修正4 Computer scientists in this field seek to develop techniques for determining the inherent efficiency of algorithms with respect to one another.with respect to : in reference to ; in regard to .inquiries with respect to the best route to take .5 Computer scientists attempt to make it easier for users to access databases,prevent access by unauthorized users,-----attempt to : 作为动词,attempt 比try 更正式,但听起来可能显得做作。
Chapter1 CompetenciesAfter you have read this chapter, you should be able to:1. Explain the five parts of an information system: people, procedures, software,hardware, and data.2. Distinguish between system software and application software.3. Discuss the three kinds of system software programs.4. Distinguish between basic and specialized application software.5. Identify the four types of computers and the four types of microcomputers.6. Describe the different types of computer hardware including the system unit,input, output, storage, and communication devices.7. Define data and describe document, worksheet, database, and presentation files.8. Explain computer connectivity, the wireless revolution, and the Internet.第一章能力当你阅读本章,你应该能够:1。
解释了信息系统的五个部分:人,程序,软件,硬件和数据。
2。
区分系统软件和应用软件。
3。
讨论了系统软件程序的三种。
4。
区分基本和专门的应用软件。
Multiple Choice Questions1. People that collect and sell personal data are called:A. direct marketersB. fund-raisersC. information resellersD. government agencies2. These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.A. SpywareB. FreewareC. Employee-monitoring softwareD. Cookies3. Small data files that are deposited on a user's hard drive when they visit a Web site are called:A. cookiesB. codesC. cacheD. proxies4. These are used by advertisers to keep track of your Web activity as you move from one site to the next.A. Web bugsB. History filesC. First-party cookiesD. Third-party cookies5. Programs used to secretly record an individual's activities on the Internet are called:A. spywareB. cookiesC. sniffer programsD. keystroke loggers6. Which type of program would likely be used by investigators to record a potential suspects' Internet activities?A. CookieB. Global positioning systemC. Keystroke loggerD. Web bug7. This type of computer criminal creates and distributes malicious programs.A. EmployeeB. HackerC. CrackerD. Keystroke logger8. Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.A. Illusion of anonymityB. Browser cacheC. History filesD. Privacy mode9. Which of the following is not malware?A. Trojan horsesB. VirusesC. WormsD. Ad-Aware10. A program that replicates itself and clogs computers and networks.A. VirusB. WormC. Denial-of-service attackD. Trojan horse11. Free computer games and free screen saver programs are typical carriers of:A. DoSB. wormsC. virusesD. Trojan horses12. Which among the following is a way to shut down an ISP or Web site?A. Denial of service attackB. VirusesC. Trojan horsesD. Worms13. Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?A. Malicious programB. Internet scamC. TheftD. Data manipulation14. The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person.A. Identity theftB. Auction fraudC. CyberbullyingD. Snoopware15. These crimes include the theft of data in the form of confidential information.A. HotspotsB. Blue-collarC. White-collarD. Cyberbullying16. According to which law is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away?A. Digital Millennium Copyright ActB. Computer Abuse Amendments ActC. The Gramm-Leach-Bliley ActD. Computer Fraud and Abuse Act17. Corporations often use this to prevent copyright violations.A. Digital Millennium Copyright ActB. Website encryptionC. Digital rights management (DRM)D. Keystroke loggers18. This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.A. EncryptionB. FirewallC. PasswordD. Dictionary attack19. This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.A. WormB. FakeC. VirusD. Rogue20. The process of coding information to make it unreadable except to those who have a special piece of information known as a key.A. RestrictionB. SecurityC. ProtectionD. Encryption21. A(n) _____ acts as a security buffer between a corporation's private network and all external networks.A. firewallB. passwordC. disaster recovery planD. virus checker22. Which of the following is the most widely used wireless network encryption for home wireless networks?A. WEPB. WPEC. WPAD. WPA223. Which of the following is not a measure to protect computer security?A. Restricting accessB. Encrypting dataC. Copying data and storing it at a remote locationD. Keeping the same password on all systems consistently24. _____ is concerned with protecting software and data from unauthorized tampering or damage.A. Data backupB. Physical securityC. Disaster recovery planD. Data security25. This is a legal concept that gives content creators the right to control use and distribution of their work.A. PiracyB. EthicsC. CopyrightD. Privacy26. This law gives you the right to look at your personal records held by government agencies.A. Gramm-Leach-Bliley ActB. Freedom of Information ActC. Family Educational Rights and Privacy ActD. Computer Fraud and Abuse Act27. Computer criminals that create and spread viruses are punished under this law.A. Gramm-Leach-Bliley ActB. Freedom of Information ActC. Family Educational Rights and Privacy ActD. Computer Fraud and Abuse ActTrue / False Questions28. The essential elements that control how computers are used are laws.True False29. A special telephone directory, called a reverse directory, can be used to get names, addresses, and other details about the people we call.True False30. It is highly likely that each one of us has an electronic profile created by information resellers.True False31. Identity theft and mistaken identity are the same.True False32. Most browsers offer a privacy mode, which ensures that your browsing activity is not recorded on your hard disk.True False33. A trackingcookie is used by an advertising company to keep track of your Web activity as you move from one site to the next.True False34. Web bugs are usually hidden within the HTML code for a Web page or in an e-mail message as an invisible image.True False35. It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for.True False36. Spy removal programs are designed to detect and remove various types of privacy threats. True False37. The archiving and search features of the Web make your online identity available indefinitely.True False38. Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.True False39. Posting personal information such as your birth date, family member names, and home address, doesn't increase your risk of identity theft.True False40. The use of a company's computer time by an employee to run a personal business is common and generally accepted by employers.True False41. Rogue Wi-Fi Hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites.True False42. Biometric scanning devices are used to scan employee identification cards.True False43. Security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.True False44. A dictionary attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.True False45. The most common protocol for Web site encryption is HTTPS (Hyper Text Transfer Protocol Secure).True False46. If copyright-protected music is uploaded to a Web site, it is legal to download it.True False47. Cutting and pasting material from a Web site directly into your own report or paper without giving proper credit to the original source is unethical.True FalseFill in the Blank Questions48. _____, a privacy issue, relates to the responsibility of controlling who is able to use data. ________________________________________49. Using publically available databases, information resellers create _____ and sell them to direct marketers, fundraisers, and others.________________________________________50. _____ is the illegal assumption of someone's identity for the purposes of economic gain. ________________________________________51. _____-party cookies store information about the current session, your general preferences, and your activity on one Web site.________________________________________52. _____-party cookies are used by advertising companies to keep track of your Web activity as you move from one site to the next.________________________________________53. A(n) _____ is someone who creates programs to gain unauthorized access to computer systems for malicious purposes.________________________________________54. _____ bugs are invisible images or HTML code hidden within a Web page or e-mail message and are used to transmit information without your knowledge.________________________________________55. _____ are programs that travel through networks and operating systems and attach themselves to various other programs and databases.________________________________________56. A(n) _____ attack attempts to slow down or stop a computer system or network by sending repetitive requests for information.________________________________________57. A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet _____.________________________________________58. _____ attempts to trick Internet users into thinking a fake but official-looking Web site or e-mail is legitimate.________________________________________59. Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called _____.________________________________________60. _____ is the use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person.________________________________________61. A(n) _____ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information.________________________________________62. _____ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.________________________________________63. _____ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key.________________________________________64. _____ scanning devices use fingerprints and iris scanners to identify individuals.________________________________________65. _____ private networks encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet.________________________________________66. _____ security is concerned with protecting software and data from unauthorized tampering or damage.________________________________________67. As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the _____.________________________________________68. A(n) _____ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.________________________________________69. _____ is representing some other person's work and ideas as your own without giving credit to the original source.________________________________________Essay Questions70. Describe how information about individuals is collected and compiled.71. Explain cookies and identify the difference between first-party cookies and third-party cookies.72. Describe spyware and computer monitoring software.73. Explain how a Web bug works.74. Describe the three most common types of malware, including viruses, worms, and Trojan horses.75. How do firewalls work?76. What are computer ethics?77. Discuss copyright issues as they relate to the Internet, including software piracy and digital rights management, and the Digital Millennium Copyright Act.78. What is plagiarism, and why is it a particular concern today?Multiple Choice Questions1. (p. 244) People that collect and sell personal data are called:A. direct marketersB. fund-raisersC. information resellersD. government agenciesAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-03Topic: Large Databases2. (p. 246) These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.A. SpywareB. FreewareC. Employee-monitoring softwareD. CookiesAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-03Topic: Private Networks3. (p. 247) Small data files that are deposited on a user's hard drive when they visit a Web site are called:A. cookiesB. codesC. cacheD. proxiesAACSB: TechnologyBlooms: UnderstandDifficulty: 1 EasyLearning Outcome: 09-03Topic: The Internet and the Web4. (p. 248) These are used by advertisers to keep track of your Web activity as you move from one site to the next.A. Web bugsB. History filesC. First-party cookiesD. Third-party cookiesAACSB: TechnologyBlooms: UnderstandDifficulty: 1 EasyLearning Outcome: 09-03Topic: The Internet and the Web5. (p. 249) Programs used to secretly record an individual's activities on the Internet are called:A. spywareB. cookiesC. sniffer programsD. keystroke loggersAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-03Topic: The Internet and the Web6. (p. 249) Which type of program would likely be used by investigators to record a potential suspects' Internet activities?A. CookieB. Global positioning systemC. Keystroke loggerD. Web bugAACSB: TechnologyBlooms: EvaluateDifficulty: 3 HardLearning Outcome: 09-03Topic: The Internet and the Web7. (p. 251) This type of computer criminal creates and distributes malicious programs.A. EmployeeB. HackerC. CrackerD. Keystroke loggerAACSB: TechnologyBlooms: AnalyzeDifficulty: 2 MediumLearning Outcome: 09-05Topic: Cybercrime8. (p. 248) Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.A. Illusion of anonymityB. Browser cacheC. History filesD. Privacy modeAACSB: TechnologyBlooms: EvaluateDifficulty: 1 EasyLearning Outcome: 09-03Topic: The Internet and the Web9. (p. 250) Which of the following is not malware?A. Trojan horsesB. VirusesC. WormsD. Ad-AwareAACSB: TechnologyBlooms: EvaluateDifficulty: 2 MediumLearning Outcome: 09-04Topic: The Internet and the Web10. (p. 251) A program that replicates itself and clogs computers and networks.A. VirusB. WormC. Denial-of-service attackD. Trojan horseAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-05Topic: Cybercrime11. (p. 252) Free computer games and free screen saver programs are typical carriers of:A. DoSB. wormsC. virusesD. Trojan horsesAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 09-05Topic: Cybercrime12. (p. 253) Which among the following is a way to shut down an ISP or Web site?A. Denial of service attackB. VirusesC. Trojan horsesD. WormsAACSB: TechnologyBlooms: EvaluateDifficulty: 3 HardLearning Outcome: 09-05Topic: Cybercrime13. (p. 253) Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?A. Malicious programB. Internet scamC. TheftD. Data manipulationAACSB: TechnologyBlooms: EvaluateDifficulty: 1 EasyLearning Outcome: 09-05Topic: Cybercrime14. (p. 253-254) The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person.A. Identity theftB. Auction fraudC. CyberbullyingD. SnoopwareAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-05Topic: Cybercrime15. (p. 254) These crimes include the theft of data in the form of confidential information.A. HotspotsB. Blue-collarC. White-collarD. CyberbullyingAACSB: TechnologyBlooms: AnalyzeDifficulty: 1 EasyLearning Outcome: 09-05Topic: Cybercrime16. (p. 263) According to which law is it illegal for an owner of a program to make backup copies for their personal use and resell or give them away?A. Digital Millennium Copyright ActB. Computer Abuse Amendments ActC. The Gramm-Leach-Bliley ActD. Computer Fraud and Abuse ActAACSB: TechnologyBlooms: EvaluateDifficulty: 2 MediumLearning Outcome: 09-07Topic: Copyright and Digital Rights Management17. (p. 263) Corporations often use this to prevent copyright violations.A. Digital Millennium Copyright ActB. Website encryptionC. Digital rights management (DRM)D. Keystroke loggersAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-07Topic: Copyright and Digital Rights Management18. (p. 256) This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.A. EncryptionB. FirewallC. PasswordD. Dictionary attackAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-06Topic: Measures to Protect Computer Security19. (p. 254) This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.A. WormB. FakeC. VirusD. RogueAACSB: TechnologyBlooms: UnderstandDifficulty: 1 EasyLearning Outcome: 09-05Topic: Cybercrime20. (p. 256-257) The process of coding information to make it unreadable except to those who have a special piece of information known as a key.A. RestrictionB. SecurityC. ProtectionD. EncryptionAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-06Topic: Measures to Protect Computer Security21. (p. 256) A(n) _____ acts as a security buffer between a corporation's private network and all external networks.A. firewallB. passwordC. disaster recovery planD. virus checkerAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-06Topic: Measures to Protect Computer Security22. (p. 260) Which of the following is the most widely used wireless network encryption for home wireless networks?A. WEPB. WPEC. WPAD. WPA2AACSB: TechnologyBlooms: EvaluateDifficulty: 2 MediumLearning Outcome: 09-06Topic: Measures to Protect Computer Security23. (p. 255) Which of the following is not a measure to protect computer security?A. Restricting accessB. Encrypting dataC. Copying data and storing it at a remote locationD. Keeping the same password on all systems consistentlyAACSB: TechnologyBlooms: EvaluateDifficulty: 2 MediumLearning Outcome: 09-06Topic: Measures to Protect Computer Security24. (p. 260) _____ is concerned with protecting software and data from unauthorized tampering or damage.A. Data backupB. Physical securityC. Disaster recovery planD. Data securityAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-06Topic: Measures to Protect Computer Security25. (p. 263) This is a legal concept that gives content creators the right to control use and distribution of their work.A. PiracyB. EthicsC. CopyrightD. PrivacyAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 09-07Topic: Copyright and Digital Rights Management26. (p. 246) This law gives you the right to look at your personal records held by government agencies.A. Gramm-Leach-Bliley ActB. Freedom of Information ActC. Family Educational Rights and Privacy ActD. Computer Fraud and Abuse ActAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-03Topic: Large Databases27. (p. 251) Computer criminals that create and spread viruses are punished under this law.A. Gramm-Leach-Bliley ActB. Freedom of Information ActC. Family Educational Rights and Privacy ActD. Computer Fraud and Abuse ActAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-05Topic: CybercrimeTrue / False Questions28. (p. 263) The essential elements that control how computers are used are laws.FALSEAACSB: TechnologyBlooms: AnalyzeDifficulty: 2 MediumLearning Outcome: 09-07Topic: Ethics29. (p. 244-245) A special telephone directory, called a reverse directory, can be used to get names, addresses, and other details about the people we call.TRUEAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-03Topic: Large Databases30. (p. 244) It is highly likely that each one of us has an electronic profile created by information resellers.TRUEAACSB: TechnologyBlooms: UnderstandDifficulty: 1 EasyLearning Outcome: 09-03Topic: Large Databases31. (p. 245-246) Identity theft and mistaken identity are the same.FALSEAACSB: TechnologyBlooms: AnalyzeDifficulty: 2 MediumLearning Outcome: 09-03Topic: Large Databases32. (p. 248) Most browsers offer a privacy mode, which ensures that your browsing activity is not recorded on your hard disk.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 3 HardLearning Outcome: 09-03Topic: The Internet and the Web33. (p. 248) A trackingcookie is used by an advertising company to keep track of your Web activity as you move from one site to the next.TRUEAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-03Topic: The Internet and the Web34. (p. 249) Web bugs are usually hidden within the HTML code for a Web page or in an e-mail message as an invisible image.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-03Topic: The Internet and the Web35. (p. 249) It is against the law for keystroke loggers to be deposited on your hard drive by the company you work for.FALSEAACSB: TechnologyBlooms: ApplyDifficulty: 3 HardLearning Outcome: 09-03Topic: The Internet and the Web36. (p. 249) Spy removal programs are designed to detect and remove various types of privacy threats.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-03Topic: The Internet and the Web37. (p. 250) The archiving and search features of the Web make your online identity available indefinitely.TRUEAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-04Topic: Online Identity38. (p. 251) Computer security focuses on protecting information, hardware, and software from unauthorized use as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-05Topic: Security39. (p. 245) Posting personal information such as your birth date, family member names, and home address, doesn't increase your risk of identity theft.FALSEAACSB: TechnologyBlooms: UnderstandDifficulty: 1 EasyLearning Outcome: 09-03Topic: Large Databases40. (p. 254) The use of a company's computer time by an employee to run a personal business is common and generally accepted by employers.FALSEAACSB: TechnologyBlooms: UnderstandDifficulty: 1 EasyLearning Outcome: 09-05Topic: Cybercrime41. (p. 254) Rogue Wi-Fi Hotspots imitate free hotspots and capture information, such as usernames and passwords, sent by users to legitimate sites.TRUEAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-05Topic: Cybercrime42. (p. 255) Biometric scanning devices are used to scan employee identification cards. FALSEAACSB: TechnologyBlooms: EvaluateDifficulty: 1 EasyLearning Outcome: 09-06Topic: Measures to Protect Computer Security43. (p. 251) Security is concerned with protecting information, hardware, and software from unauthorized use, as well as preventing or limiting the damage from intrusions, sabotage, and natural disasters.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-05Topic: Security44. (p. 256) A dictionary attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.TRUEAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-06Topic: Measures to Protect Computer Security45. (p. 260) The most common protocol for Web site encryption is HTTPS (Hyper Text Transfer Protocol Secure).TRUEAACSB: TechnologyBlooms: RememberDifficulty: 1 EasyLearning Outcome: 09-06Topic: Measures to Protect Computer Security46. (p. 263) If copyright-protected music is uploaded to a Web site, it is legal to download it. FALSEAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-07Topic: Copyright and Digital Rights Management47. (p. 264) Cutting and pasting material from a Web site directly into your own report or paper without giving proper credit to the original source is unethical.TRUEAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-07Topic: PlagiarismFill in the Blank Questions48. (p. 243) _____, a privacy issue, relates to the responsibility of controlling who is able to use data.AccessAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-02Topic: Privacy49. (p. 244) Using publically available databases, information resellers create _____ and sell them to direct marketers, fundraisers, and others.electronic profilesAACSB: TechnologyBlooms: UnderstandDifficulty: 3 HardLearning Outcome: 09-03Topic: Large Databases50. (p. 245) _____ is the illegal assumption of someone's identity for the purposes of economic gain.Identity theftAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-03Topic: Large Databases51. (p. 247) _____-party cookies store information about the current session, your general preferences, and your activity on one Web site.FirstAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-03Topic: The Internet and the Web52. (p. 248) _____-party cookies are used by advertising companies to keep track of your Web activity as you move from one site to the next.ThirdAACSB: TechnologyBlooms: RememberDifficulty: 2 MediumLearning Outcome: 09-03Topic: The Internet and the Web53. (p. 251) A(n) _____ is someone who creates programs to gain unauthorized access to computer systems for malicious purposes.hackerAACSB: TechnologyBlooms: UnderstandDifficulty: 2 MediumLearning Outcome: 09-05Topic: Security。
Key Terms - Chapter 9accessRefers to the responsibility of those who have data to control who is able to use that data.accuracyRelates to the responsibility of those who collect data to ensure that the data is correct.antispywareSee spy removal programs.biometric scanningDevices that check fingerprints or retinal scans.botnetA collection of zombie computers.browser cacheA collection of temporary Internet files that contain web page content and instructions for displaying this content.computer crimeIllegal action in which a perpetrator uses special knowledge of computer technology. Criminals may be employees, outside users, hackers and crackers, and organized crime members.computer ethicsGuidelines for the morally acceptable use of computers in our society.Computer Fraud and Abuse ActLaw allowing prosecution of unauthorized access to computers and databases.computer monitoring softwareThe most invasive and dangerous type of spyware. These programs record every activity made on your computer, including credit card numbers, bank account numbers, and e-mail messages.cookiesPrograms that record information on Web site visitors.copyrightA legal concept that gives content creators the right to control use and distribution of their work.crackerOne who gains unauthorized access to a computer system for malicious purposes.cyberbullyingThe use of the Internet, a cell phone, or other device to deliver content intended to hurt or embarrass another person.cybercrimeAny criminal offence that involves a computer and a network. Criminals may be employees, outside users, hackers and crackers, on organized crime members.data securityProtection of software and data from unauthorized tampering or damage.denial of service (DoS) attackA variant virus in which Web sites are overwhelmed with data and users are unable to access the Web site. Unlike a worm that self-replicates, a DoS attack floods a computer or network with requests for information and data.dictionary attackUses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user’s account.Digital Millennium Copyright ActLaw that makes it legal for a program owner to make only his or her own backup copies of a software program. However, it is illegal for those copies to be resold or given away.digital rights management (DRM)Encompasses various technologies that control access to electronic media and files.disaster recovery planPlan used by large organizations describing ways to continue operations following a disaster until normal computer operations can be restored.electronic profileUsing publicly and privately available databases, information resellers create electronic profiles, which are highly detailed and personalized descriptions of individuals.encryptionCoding information so that only the user can read or otherwise use it.encryption keyA binary number used to gain access to encrypted information.ethicsStandards of moral conduct.Family Educational Rights and Privacy Act (FERPA)A federal law that restricts disclosure of educational records.firewallSecurity hardware and software. All communications into and out of an organization pass through a special security computer, called a proxy server, to protect all systems against external threats.first-party cookieA cookie that is generated and then read only by the website you are currently visiting.Freedom of Information ActLaw giving citizens the right to examine data about them in federal government files, except for information restricted for national security reasons.Gramm-Leach-Bliley ActA law that protects personal financial information.hackerPerson who gains unauthorized access to a computer system for the fun and challenge of it.Health Insurance Portability and Accountability Act (HIPAA)A federal law that protects medical records.history fileCreated by browser to store information on Web sites visited by your computer system.https (hypertext transfer protocol secure)A widely used protocol for web traffic and to protect the transfer of sensitive information.identity theftThe illegal assumption of someone’s identity for the purpose of economic gain.illusion of anonymityThe misconception that being selective about disclosing personal information on the Internet can prevent an invasion of personal privacy.information brokerSee information reseller.information resellerAlso known as information broker. It gathers personal data on people and sells it to direct marketers, fund-raisers, and others, usually for a fee.InPrivate BrowsingA privacy mode provided by Internet Explorer that eliminates history files as well as blocks most cookies.Internet scamUsing the Internet, a fraudulent act or operation designed to trick individuals into spending their time and money for little or no return.IT security analystPerson responsible for maintaining the security of a company’s network, systems, and data. Employers look for candidates with a bachelor’s or advanced specialized associate’s degree in information systems or computer science and network experience.keyAnother term for encryption key.keystroke loggersAlso known as computer monitoring software and sniffer programs. They can be loaded onto your computer without your knowledge.malwareShort for malicious software.mistaken identityWhen the electronic profile of one person is switched with another.online identityThe information that people voluntarily post about themselves online.passwordSpecial sequence of numbers or letters that limits access to information, such as electronic mail.phishingAn attempt to trick Internet users into thinking a fake but official-looking Web site or e-mail is legitimate.physical securityActivity concerned with protecting hardware from possible human and natural disasters.plagiarismRepresenting some other person’s work and ideas as your own without giving credit to the original source.plagiaristSomeone who engages in plagiarism.privacyComputer ethics issue concerning the collection and use of data about individuals.privacy modeA browser feature that eliminates history files and blocks most cookies.Private BrowsingA privacy mode provided by Safari. See privacy mode.propertyComputer ethics issue relating to who owns data and rights to software. reverse directoryA special telephone directory listing telephone numbers sequentially, followed by subscriber names.robot networkSee botnet.rogue Wi-Fi hotspotImitation hotspot intended to capture personal information.scamA fraudulent or deceptive act or operation designed to trick individuals into spending their time and money for little or no return.securityThe protection of information, hardware, and software.security suitesA collection of utility programs designed to protect your privacy and security while you are on the web.software piracyUnauthorized copying of programs for personal gain.spy removal programPrograms such as Spybot and Spysweeper, designed to detect Web bugs and monitor software.spywareWide range of programs designed to secretly record and report an individual’s activities on theInternet.temporary Internet fileFile that has web page content and instructions for displaying this content.third-party cookiesA cookie generated by an advertising company that is affiliated with the website you are currently visiting. Often also referred to as a tracking cookie.Trojan horseProgram that is not a virus but is a carrier of virus(es). The most common Trojan horses appear as free computer games, screen savers, or antivirus programs.Once downloaded they locate and disable existing virus protection and then deposit the virus.virtual private network (VPN)Creates a secure private connection between a remote user and anorganiza tion’s internal network. Special VPN protocols create the equivalent of a dedicated line between a user’s home or laptop computer and a company server.virusHidden instructions that migrate through networks and operating systems and become embedded in different programs. They may be designed to destroy data or simply to display messages.web bugsProgram hidden in the HTML code for a Web page or e-mail message as a graphical image. Web bugs can migrate whenever a user visits a Web site containing a Web bug or opens infected e- mail. They collect information on the users and report back to a predefined server.wireless network encryptionRestricts access to authorized users on wireless networks.wormVirus that doesn’t attach itself to programs and databases but fills a computer system with self- replicating information, clogging the system so that its operations are slowed or stopped.WPA2 (Wi-Fi Protected Access 2)A secure encryption protocol.zombieA computer infected by a virus, worm, or Trojan horse that allows it to be remotely controlled for malicious purposes.。