新视野大学英语读写教程第五册答案 下载本文

新视野大学英语读写教程第五册答案

5. A capital crime. Comprehension of the Text

I. All acts prohibited by religion are crimes, and treated as such in traditional society. 2. An unwritten code of conduct.

3. It means that a liar is prone to commit crimes, such as stealing. 4. Because they believe that it will lead to miseries and misfortune. 5. They perform rituals.

6. God will make the thief suffer physically or internally. 7. The loss of reputation by the thief and his parents. 8. They must care for and honor their parents. 9. They are both political and religious leaders.

10. Religion can help eliminate crime.

l. deviate 2. cherished 3. prolonged 4. constrained 5. summoned 6. appeased 7. breach 8. Expelled 9. strive 10. battering 11. convened 12. ascertain

Exercises on CD and web course only: 13. incurring 14. conform 15. reproached

1. against 2. from 3. to 4. of 5. to 6. in 7. to 8. as 9. from 10. to 11. to 12. from

Exercises on CD and web course only: 13. In 14. to 15. of Reading Skills 1.25 years.

2. About one in a thousand. 3. A bag with handles.

4, He pinched it between his index and middle fingers. 5. Seven years.

1. They think it's an honorable profession. 2. Mothers with babies, the elderly and the lame. 3. One who carries her bag on the left side.

26 / 39

新视野大学英语读写教程第五册答案

4. The partner can serve as a screen.

5. The back pockets of trousers and zipped-up inside pockets of leather jackets. 6. Because people there are usually upset and cautious. 7. He wanted to set himself a challenge.

8. The wallet slipped out of his hand, then the woman screamed and the store detectives security guard caught him.

9. The victim-awareness courses helped him to do so. 10. To help people avoid being victims of pickpockets.

新视野大学英语第五册读写教程课后答案 unit 7

Unit seven

Comprehension of the Text

1. It is a macro virus spread through an e-mail attachment.

2. It spreads through a Microsoft Word 97 or Word 2000 e-mail attachment that, when opened, activates a macro through the Microsoft Outlook program and e-mails itself to the first fifty names in the address book of the infected computer.

3. Its most striking characteristic is its ability to propagate itself across a vast number of systems in the commercial, government, and military realms in a very short period of time.

4. Commerce could be jeopardized, either because no information could be passed using the Internet or because information passed over the Internet might be considered unreliable. Many businesses now rely on the Internet as a primary or even sole carrier of information. If the Internet ceased to function, the consequent losses could ultimately be measured in tens of billions rather than millions of dollars.

5. First, use virus protection software packages available on the market that can detect, clean, and attempt to predict suspicious program behavior.

Second, be careful about what they take from the Intemet and avoid being too hasty in opening attached files, both from known users and especially from users unknown to them.

6. System administrators should quickly report computer assaults and viruses to the appropriate government organizations.

7. First, be careful about attached files sent to us. Second, use up-to-date virus protection in our

27 / 39

新视野大学英语读写教程第五册答案

computers.

8. According to the author, tough laws regarding computer crime should be formulated to discourage people from creating or distributing more viruses.

9. It is easy to write and distribute destructive viruses. Their motivation is such that only tougher laws regarding computer viruses are enough to discourage them.

10. Though seemingly the author did not state his attitude clearly in the text, the author showed his disapproval of computer viruses by first drawing attention to the serious damage caused by viruses and then introducing possible solutions. Vocabular~

1. propagated 2. startled 3. activate 4. jeopardize 5. disrupted 6. erased 7. blunting 8. insulate 9. cumulative 10. hasty 11. formulate 12. intent

Exercises on CD and web course only: 13. disclosed 14. vulnerable 15. disabled 1. intent on making 2. discouraged from 3. engaging in 4. in doubt 5. by means of 6. in essence 7. vulnerable to 8. In the case of 9. serve as 10. hooked up to l 1. in circulation 12. As yet

Exercises on CD and web course only: 13. shut down 14. in the spectrum of 15. attach.., to Collocation

1. lights 2. course 3. story 4. club

5. fever 6. feature 7. business 8. risk

Exercises on CD and web course only: 9. home 10. workshop Translation --BI

1. Cyberspace communication is expanding by leaps and bounds, with millions of people browsing websites daily.

2. The Chinese media are formulating new plans in order to increase their presence on the

28 / 39

新视野大学英语读写教程第五册答案

Intemet to meet the challenges of the virtual era.

3. The new system now allows faxes to be sent round the world with minimum effort and maximum security.

4. Because of its interactivity and accessibility, the Intemet has activated new interest in homestudy programs.

5. The invention of the electronic word processor was as startling an information revolution as the invention of the printing press.

6. Digital cameras aren't available for everybody -- at least, not yet. While cheaper than before, they are by no means cheap.

7. Aworkaholic is a person who works too much. Aworkaholic lives to work, rather than works to live.

8. It is not cheap to raise pets in the city. In the case of a dog, registration may be obtained from the city's Dogs Supervision Office for a fee of about 2,000 yuan a year.

9. Recently, we have witnessed a number of young people who, for a variety of sociological and psychological reasons, have become attached to their computers, and are exploiting their potential in a criminal manner.

10. Whether it is worth investing in the long term is still in doubt.

Let's assume you are a sports fan. What is your first reaction when you find in your e-mail an attachment called \

to have a look at the Russian tennis star. But if you open it, the virus will be activated and will copy the attachment to every e-mail address in your \farther. E-viruses, which flood the Intemet through dubious e-mails with fancy bait, make production of anti-virus programs a profitable business.

1.无法使用互联网传递信息或者互联网传递的信息无法保证其可靠性,就可能危及商业活动。 2.如果互联网无法运作,随之而来的损失最终可能会高达数百{乙美元,而不是数百万美元了。 3.令专家们震惊的是,这种病毒能够在极短的时间内迅速地在商业、政府和军事领域的系统内 进行传播。

4.用户需要小心处理从互联网上获得的信息,避免仓促打开附件,无论是来自于认识的用户还 是不认识的用户,尤其是后者。

5.它的发生给政府和私营部门都敲响了警钟,提醒他们重视恶性病毒在互联网上传播所带来的 威胁。

29 / 39

新视野大学英语读写教程第五册答案

6.因为编写和传播破坏性病毒轻而易举,所以预防病毒最有效的方法就是阻止人们从事这种活 动。

7.要让蓄意传播类似梅利莎病毒的电脑罪犯知道,他们一定会受到迅速严厉的惩罚。 8.病毒的快速传播是通过发送超过电子邮件系统处理能力的信息,使电脑网络功能退化,或使 其运行受阻。其结果是,一些网络被迫中止服务,因为从系统中清除该病毒时,那些网络必 须关闭。

9.令人恐惧的是,这些宏命令可用来使受害者电脑在其不知情的情况下通过电子邮件把硬盘驱 动器上存放的敏感和秘密文件发送给他人。

10.至今我们还不能确切估算出与该病毒有关的工作效率损失和其他破坏所造成的累计经济损失。 Essay SummarYlrI

I.A 2. C 3. D 4. D 5. A 6. C 7. B 8.^ 9. B 10.A II.C 12. D 13. B 14. C 15. C 16. B 17. C 18. D 19. C 20. D Structured Writing

Nimda is a new network-aware, mass-mailing virus. Nimda attacks at least a dozen known vulnerabilities on systems running Microsoft liS, and can also spread via open shares to other connected machines on a network.

Then how to prevent Nimda from attacking your system?

First, don't open attachments! One of the best ways to prevent virus infections is not to open attachments, especially when viruses such as this one are actively circulating. Even if the e-mail message is from a known source, be careful. A few viruses take mailing lists from an infected computer and send out new messages with their destructive payload attached.

Second, get protection. Install virus-protection software on your machine. Simply download any of the top-rated programs and follow the installation instructions.

Third, scan your system regularly. Scan your entire system when loading anti-vires software

fbr the first time. lt's better to start with your PC clean and free of virus problems. Make it a regular habit to scan for viruses.

Fourth, update your anti-virus software. Make sure your virus protection software is up-todate. Some anti-virus protection programs have a feature that will automatically link to the lnteruet and add virus detection code whenever the software vendor discovers a new threat. (Words: 171, not including the first

30 / 39