新视野大学英语(第二版)快速阅读(2)

2019-08-03 10:52

B) sheets,cooking utensils,etc. C) bed linen,towels,etc. D) shoes at low prices

6、Garages sales are held_______

A) Once or twice every three months B) Once or twice every year C) From time to time

D) In January,May,June or July

7、Goods at ―discount stores‖ are______ A) Of low quality B) Very cheap C) Good enough D) From garage sales 译文:

去购物似乎很容易,但实际上它需要大量的学习,尤其是在美国。事实上,很多美国人都不太富裕的时候店―销售‖或在特殊的商店卖的东西在较低的价格,你可能会发现有趣的。在美国,修整重要的规则是,一要改变他或她的衣服的每一天。例如,在美国的大学,教授也不生不在连续两天的同样的衣服。你可能认为有必要购买更多的衣服比你在中国。当你在美国购物,你会发现价格范围很大的时候。购买使用,二手的衣服,家具,或其他家用物品可能会是一个省钱的好方法。大部分二手的衣服都很好的质量。如果你打算在这个国家定居下来,要一些家具,你可以去一个―贷款的衣橱‖,家具租金较低的成本,或者你也可以去―家具交换‖社区的地方。

床单,毛毯,床上用品和其他上市销售,在大多数社区每年两次。广告的―白‖的销售在床单,毛巾,等,通常出现在一月,以及在5月,六月或七月。每个赛季一次或两次,将有―车库销售‖,在那里你可以得到几乎任何东西,从一艘游艇,一双鞋,以较低的价格。价格在―折扣店‖和―旧货店‖也能像你想像的低。

购物时的食物,你应该寻找各种物品,发售每周特别价格。为了节约,它会为你计划根据销售是每周的菜单是一个好主意,它包括肉类,蔬菜,水果等,可以在这周的特别的价格购买。

换货和退货政策的商店的变化。你也应该记住,项目销售退货、换货政策可以不同于标准的商店的政策,特别是如果该项目的价格已经下降。问商人交流和退货政策之前,您的购买。获得一个交换或没有商店收到回报往往是困难的。所以,为了节省自己的头痛,你最好抓住任何纸或其他的购买证明。

在美国_________ 1、购物 一个美国人)看起来很简单 B)需要学习

C)是非常容易的外国人 D)是唯一的―小康‖的人

2、美国人改变他们的衣服每天,因为______ 一)衣服以较低的价格出售 B)人们把它作为一个规则 C)他们喜欢这样做 D)rveryone很―小康‖

3、购物的人在美国会发现_________ 一)美国商品的优良 大多数的衣服都是从中国B) C)的价格变化很大,有时 D)用于衣服的质量较差

4、一个人需要的家具可以__________ 一)商品交换的家具 B)博客,家具 C)免费的 D)租一些低成本

5、在―白色的销售‖,一个可以买_________ 几乎任何一个) B)片,炊具,等。 C)的床单,毛巾,等。 D)在低价格的鞋 6、车库销售_______举行 一)一次或两次,每三个月 b)一次或两次,每年 C)从时间到时间

D)在一月,五月,六月或七月 7、商品的―折扣店‖是______ 一个低质量) B)很便宜 C)足够好 D)从车库销售

Unit 2 Passage 4第29页到第31页

Computer Viruses

原版:

The computer virus is an outcome of the computer overgrowth in the 1980s. The term computer virus comes from the likeness between the viruses that harm the body and the harmful viruses. However, computer viruses are small programs. They reproduce by attaching a copy of themselves to another program.

Once attached to another program, viruses then look for other programs to ―infect‖. In this way , the virus can spread quickly throughout a single computer or an entire network when it infects a LAN or a multi-user system. At some point, the virus attacks according to how it is programmed. The timing of the attack can be linked to a number of situations, such an a certain time or date, the presence of a particular object, the security level of the user, and the number of times a program is used .Similarly, the pattern of attack comes in different ways .The so-called―harmless‖ viruses might simply show a message, like the one that infected IBM‘s main computer system in 1987 with Christmas greetings. Harmful viruses are designed to damage the system. They can wipe out data, cross out information , or rewrite the hard disk.

Main Types of Viruses

There are four main types of viruses: shell, intrusive,operating system, and source code.

Shell viruses wrap themselves around a host program, but don‘t change it .Shell programs are easy to write, which is why about half of viruses are of this type.

Intrusive viruses invade an existing program and actually place a part of them into the host program. Intrusive viruses are hard to write and very difficult to remove without damaging the host file.

Shell and intrusive viruses usually attack executable program filesthose with a .com or .exe extension, although data files are also at risk.

Operating system viruses work by replacing part of the operating system with their wen code. They are very difficult to write and have the ability, once loaded, to take total control of your system.

Source ode viruses are intrusive programs that are inserted into a source program such as those written in Pascal prior to the program being followed. They are the least common viruses because they are not only hard to write, but also have a limited number of hosts compared with the other types.

Be Cautious About the Second Network Viruses

Do you believe it? Network viruses can steal money! And they are coming for your computer right now. So far the Internet has become the main channel through which computer viruses spread. Even without getting information from the network, your computer can be infected by the second network computer viruses, which are hidden in some machines on the network.

The virus that can steal your money is a kind of the second network viruses. It was designed and inserted in some machines on the network. When your computer is linked to one of these machines, the virus will invade your hard disk and search whether Intuit Quicken, an accounting program, is installed. One of this accounting program‘s functions is to transfer accounts automatically. Once the program is infected, your money will be transferred to an additional account opened by the virus program without anybody knowing it.

1、Computer viruses are small programs,which______ A) Are similar to the viruses that harm the human boy B) Invade a living cell and produce other viruses

C) Reproduce by attaching a copy of themselves to another program D) Come into being during the computer overgrowth in the 1990s 2、Viruses can infect other programs if only they are ____ A) Affected by another program B) Spread throughout a computer C) Attached to another program D) Attacked by other programs

3、People create viruses for the purpose of ________ A) Showing a message B) Damaging the system

C) Delivering a season‘s greeting D) Linking some machines

4、The four main types of viruses do not include______ A) Instrusive

B) Operating system C) Source code D) Hard disk

5、About 50% of viruses are shell viruses,because shell viruses ________ A) Reproduce fast

B) Invade an existing program C) Are easy to write D) Have a host program

6、What do intrusive viruses place into a host program? A) The host file B) Some virus

C) A part of the program D) An existing program

7、What must an operating system virus do before overtaking an operating system? A) Load onto the system

B) Take control of your system C) Replace its code

D) Write an operating system

译文:

计算机病毒是八十年代计算机飞速发展的结果。这个词来自于病毒,计算机病毒的危害人体和病毒之间的相似之处。然而,计算机病毒是一些小程序。他们复制自己的一个副本附加到另一个程序。

一旦附加到另一个程序,然后再寻找其他程序病毒―感染‖。在这种方式中,病毒可以迅速蔓延,在一台计算机或一个网络,如果病毒感染了一个局域网或者一个多用户系统。在一些点,病毒攻击根据它是如何编程。攻击的时间与多种情况,这样一个特定的时间或日期,一个特定对象的存在,用户的安全水平,和一个程序的次数使用。同样,攻击的方式来在不同的方面。所谓的―无害‖的病毒可能简单地显示一个消息,像一个被感染的IBM的主要计算机系统在1987圣诞节的问候。有害的病毒被设计来破坏系统。他们可以消除数据,跨出信息,或重写硬盘。 病毒的主要类型

主要有四种类型的病毒:外壳,侵入,操作系统,和源代码。

外壳型病毒包裹自己周围宿主程序,但不改变它。外壳程序很容易写,这就是为什么大约一半的病毒程序是这种类型的。

病毒侵入已有的程序,实际上是把他们的一部分到宿主程序。入侵型病毒难以编写,在去除破坏主文件很难。

型和入侵型病毒通常攻击可执行程序filesthose用。COM或。EXE扩展,虽然数据文件都是危险的。

操作系统病毒通过其文码取代操作系统的一部分工作。他们写和有能力,很难一次加载,以完全控制你的系统。

源码病毒侵入性程序,插入到一个源程序,如在编写程序之前被跟踪。他们是最常见的病毒,因为他们不仅是难写,但也有数量有限的主机与其他类型的比较。 关于第二网络病毒的谨慎

你相信吗?网络病毒可以窃取金钱!他们正在为你的计算机现在。到目前为止互联网已经成为计算机病毒传播的主要渠道。即使没有从网络获取信息,您的计算机可以通过第二网络计算机病毒感染,这是隐藏在网络上的一些机器。

会偷钱的病毒是一种第二网络病毒。它的设计和插在网络上的一些机器。当你的计算机连接到这样的机器上时,病毒会入侵你的硬盘和搜索是否直觉加快,会计程序,安装。一个这样的会计程序的功能是自动转帐。程序一旦感染,你的钱将被转移到另外一个账户的病毒程序,没有人知道它。

1、计算机病毒是一些小程序,它______ 一)类似于病毒,危害人类的男孩 B)侵入活细胞和产生其他病毒

C)复制自己的一个副本附加到另一个程序 D)在上世纪90年代计算机生长期间 2、病毒可以感染其他程序如果只有他们____ 一)由另一个程序的影响


新视野大学英语(第二版)快速阅读(2).doc 将本文的Word文档下载到电脑 下载失败或者文档不完整,请联系客服人员解决!

下一篇:青岛市普通教育教研室

相关阅读
本类排行
× 注册会员免费下载(下载后可以自由复制和排版)

马上注册会员

注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: