3. 要了解出生率,看一下手表的秒针。(减词法) 4. 不同的金属传导性是不同的。(减词法)
Skills of writing
From: eric@abc.com To: stan@aol.com
Subject: An invitation to our reception party. Date: Mon, Apr.18, 2009 Dear Stan,
We cordially invite you to attend a reception party in honor of your arrival. The party will begin at our meeting room at 8:30 p.m. on Apr.19. We look forward to having a good time with you. Sincerely yours, Eric
Skills of oral language in working condition
2.Hi, Mary, I was wondering if you would like to watch a Chinese acrobatics show tomorrow. 3. Mrs. Li, would you like to come to my dinner party tonight? A lot of our co-workers will be there.
4. That would be nice. I’m looking forward to having dinner with you.
5. I’d really love to watch the game with you this time, but I’ll be on a business trip then.
Self-Study
F F F F T
Answers of Unit Four
Text A
Ⅰ.Review the questions 略
Ⅱ. Put in the missing information based on the text
1. boundary 2. firewall 3. imperfect 4. protection; intranet 5. risks; value 6. traffic; filter; proxy 7. copyrighted; confidential 8. recording; auditing 9. chokes; gates 10. permit; administrators; deny Ⅲ. Translate the following passage into Chinese
真如先前所提到的,SSL是一个使用公钥技术的行业标准协议。公共互联网和企业内网中大量的服务器都使用了SSL技术进行安全的信息传输。SSL提供以下三个等级的安全服务:
1. 信息的私密性
将公钥和对称加密结合在一起使用可以实现这一特点。在使用SSL期间,SSL服务器
与其客户之间完整的数据流量可以通过使用商议定的密钥和加密算法进行加密。加密在将信息变得不可读时是不鼓励窃听的。
2. 信息的完整性
这项服务确保了信息从客户到服务器传输时其内容不会被破坏者篡改。将共享的秘密和特殊的数学函数相结合,又被称作哈希函数,SSL技术能提供基本的信息完整性的服务。
3. 相互认证
在这个过程中,服务器要确定客户的身份,反之亦然。相关的身份信息通常以公钥证书的形式被加密,而这些证书只有在使用了SSL协议时才能被相互交换。 Ⅳ.Translate the following sentences into English
1. The firewall offering similar controls on Internet isn’t a really wall. It is an integrated system
consisted of computer hardware and software; it can also be viewed as a protective system to prevent the unauthorized users from entering a specific network.
2. That boundary is nothing but a conceptual entity. The boundary is something we have decided
to define as being the point at which we will stop things that are inappropriate.
3. All the information flows (traffics) of inbound and outbound between Internet and LANs
should pass the firewall and be checked by it after the firewall is built up.
Text B
Ⅰ.True or False
T F F T F T T F F T
Ⅱ. Put in the missing information based on the text
1. security; integrity 2. protocols; accomplish 3. prerequisite; identification 4. comparison 5. spoofing 6. characteristic; fingerprint
Skills of Understanding
1. B 2. B 3. B
Skills of Translation
1. 2. 3. 4.
我们的产品供不应求。 天气一直不下雨。
任何人乱扔垃圾将处以5美元的罚款。 我感觉很糟糕。
Skills of writing
Jack,
Future Business Company called to ask you to go over to their office and help them develop a secure system for their Web site.
They wanted you to call back before 15:00 at 7590329.
Michael 13:30
Skills of oral language in working condition
2.Hello. This is Chen Lin of Future Business. May I speak to Ms. Liu, please? 3. A moment, please. I’ll put you through.
4. I’m sorry. Frank is not in right now. Can I take a message for you?
5. I’m sorry. Miss Tong is on another line right now. Would you mind holding for a minute or can I take a message for you?
Self-Study
T F F T T
Answers of Unit Five
Text A
Ⅰ.Review the questions 略
Ⅱ. Put in the missing information based on the text
1. anonymously 2. equivalent 3. intermediaries 4. duplication; fraud 5. anonymity 6. settlement; currencies 7. overcome; clearing 8. authorization 9. browser independent 10. maintain; broker
Ⅲ. Translate the following passage into Chinese
随着互联网的快速扩张,首次创建了安全的基于成本效益原则的支付系统。该系统能够支持网络上不断发展的商务行为。虽然用于大额支付的电子支付系统已经运作了一段时间,但是快速扩张的外汇兑换量和安全交易量所导致的不一致性也在不断地提高。此外针对小额支付同样也提出了基于成本效益原则和有效的电子支付系统的需求。目前在互联网上建立这样一个支付系统所取得的进展仍有待检验。在互联网上创建电子支付系统将为创建一整套全新的全球和全国的贸易关系提供了机遇。
Ⅳ.Translate the following sentences into English
1. Payment systems primarily permit direct payments to be made anonymously. 2. Digital tokens are uniquely coded to prevent duplication and fraud.
3. Electronic tokens should be opened up to disclose its entity originally issued when there is
fraud.
4. Traditional bank mechanisms cannot deal with the issues on network.
Text B
Ⅰ.True or False
F F T F T F T F T T
Ⅱ. Put in the missing information based on the text
1. transactions; electronically 2. communication; suppliers; financial 3. unambiguous; invoice 4. extensive regulations 5. advocate; tariff 6. simple; transparent 7. accomplish; anonymity 8. credit; debit 9. timely; appropriate 10. development; activities
Skills of Understanding
1. D 2. D 3. A
Skills of Translation
1. 2. 3. 4.
这个地区的又一次战争将造成国际关系的紧张,这是很明显的。 他没有遵守安全规则,这造成了全厂的大停电。
他曾经拒绝了出演电视广告,这个广告可以支付给他一分钟5000美元的报酬。 他父亲在意大利北部靠海边的皮萨城里有家小公司。
Skills of writing
1. From: customerservice@futurebusiness.com
To: Lucy@hotmail.com Cc:
Subject: Sincere apologies for the behavior of our employee! Date: Mon, May 12, 2009 Dear Ms. Lucy,
Please accept my apologies for the way you were treated on May 10 at our company. Future Business will never tolerate any rudeness to customers, and the person who was involved in this incident has been put on probation and has been sent to a special class on customer relations.
Thank you for bringing this matter to our attention. I sincerely hope this incident does not cause any damage to our business relationship. Sincerely yours, Chen Lin
Manager of Customer Service, Future Business, China
2. From: customerservice@futurebusiness.com
To: Lucy@hotmail.com Cc:
Subject: Thank you for your wonderful suggestion! Date: Mon, May 12, 2009 Dear Ms. Lucy,
Thank you for your letter of May 10. Your suggestion that we should offer reservation service via our Web site is most welcome, and we are investigating the feasibility of offering such a service.
We at Future Business are always seeking new ways to improve our products and services. Please feel free to write to us at any time. Thanks again for your suggestion. Sincerely yours,
Chen Lin
Manager of Customer Service, Future Business, China
Skills of oral language in working condition
2. I’m terribly sorry for mailing the wrong documents to our supplier. I got it wrong.
3. Sorry for putting a wrong date on the invoice I have sent to you. I will send a new one right
now.
4. Don’t worry about it. It doesn’t matter. Just send me a new one.
5. It doesn’t matter. My name is Lily. It’s my honor to introduce myself again.
Self-Study
略
Answers of Unit Six
Text A
Ⅰ.Review the questions 略
Ⅱ. Put in the missing information based on the text
1. standard; insecure 2. specification; compliant applications 3. confidentiality; authentication ; integrity 4. cryptographic; encryption; signatures; certificates 5. authority; hierarchy; culminates 6. cardholders; infrastructure 7. requests; responses 8. decryption performance; symmetric; instructions
Ⅲ. Translate the following passage into Chinese
有些观察者认为通过互联网进行安全支付的唯一办法是在物理上将认证的过程与买家和卖家之间的通讯链接分开。因此许多公司都在检测与个人计算机相连的智能卡读取器的使用。与电话卡存钱方式相同的智能卡将认证与支付过程分开成为了可能。智能卡技术能允许通过ATM机或单独使用个人的银行网络进行智能卡的充值。这样智能卡中的数值可以安全地、匿名地通过互联网进行传送了。
英国威斯明斯特银行是从事开发智能卡技术,并用来创建所谓“电子钱包”的几个机构组织之一。智能卡可以存储好几页文本,而信用卡上的磁条只能存储一两行信息。这使得信用卡大小的智能卡可以用来转账大量的现金,但是这些现金只能通过特殊的终端才能进行“花费”。最初的应用包括了取代了给零售商(例如,报纸、糖果)的小额现金支付或者是取代了一些付费服务,如公共电话或公共交通。 Ⅳ.Translate the following sentences into English
1. SET protocol is a standardized specification of secure transmission of electronic credit card
payments.
2. SET employs a new encryption which combines two encryptions- private key and public key
and which has the ability of efficiency of private key encryption and the authentication of public key encryption.
3. The purpose of SET protocol is to unify all different systems and to offer a secure
environment for the transmission of credit card information over network.
4. SET protocol strictly specifies that all the organizations who participate in electronic
transactions should own digital certificates issued legally and efficiently and use digital signature or information digest or both of them.
Text B