为了正常的体验网站,请在浏览器设置里面开启Javascript功能!
首页 > 全新版大学英语听说教程第六册课堂部分听力练习原文

全新版大学英语听说教程第六册课堂部分听力练习原文

2012-12-03 50页 doc 210KB 200阅读

用户头像

is_008406

暂无简介

举报
全新版大学英语听说教程第六册课堂部分听力练习原文Unit 1 Facts and Opinions 1. The Internet is the fastest, most modern and best communication tool ever invented. However, the Internet also makes it possible for a person to damage or slow thousands of computers that are linked to it. 2. Computer networks, that i...
全新版大学英语听说教程第六册课堂部分听力练习原文
Unit 1 Facts and Opinions 1. The Internet is the fastest, most modern and best communication tool ever invented. However, the Internet also makes it possible for a person to damage or slow thousands of computers that are linked to it. 2. Computer networks, that is, multiple computers linked together, are particularly vulnerable to computer crimes and computer viruses. 3. A computer virus is similar to a biological virus. It is not a complete program, and it can't run on its own, so it is attached to another program or document. 4. Computer viruses are self-replicating computer programs that interfere with a computer's functions. They cause the infected computers to disclose important information or result in data loss. 5. Worms are harmful computer programs that are similar to viruses. A worm only makes copies of itself, but it can take up computer memory and slow the computer's processes. 6. About 63,000 viruses have rolled through the Internet, causing an estimated $65 billion in damage. 7. In August 2003, the MSBlaster worm attacked more than 330,000 PCs worldwide in a single day, causing the infected machines to shut down temporarily. Some experts viewed this as a sign of terrorist strike. 8. In the US alone, the Code Red worm in 2001 caused an estimated $2 billion in damage and cleanup costs. 9. Several computer viruses have caused chaos for companies and computer users around the world. The Sobig virus is being sent by e-mail at the rate of around one million copies a day. 10. Viruses come in many shapes and sizes -- they can attack through e-mail use, Internet browsing, file downloading, and disk and CD exchanging. 11. A hacker is a person intensely interested in the workings of any computer operating system. Most often, hackers are programmers. They break into a computer system, but never intentionally damage data. 12. A cracker is someone that breaks into a computer system to damage it, or for the purpose of getting illegitimate access to resources. But the general public often believes a hacker is a cracker. 13. Some experts have compared a cyber attack to a digital Pearl Harbor. Others have dismissed it as a weapon of mass annoyance. 14. Computer security has been an issue of concern for more than a decade. Companies and governments around the world have tried to develop techniques to protect both single computers and network-linked computer systems from accidental or intentional harm. 15. A lack of computer security may cause the destruction of computer hardware and software, physical loss of data, deception of computer users and the deliberate invasion of databases by unauthorized individuals. 16. Generally speaking, one of the peculiar traits of the computer security industry is that no one takes much interest in it unless they are actually feeling insecure. 17. A variety of simple techniques can prevent computer crimes. For example, destroying printed materials, keeping disks in locked cabinets, and clearing desktops of sensitive documents can prevent access to confidential information. 18. Passwords are confidential sequences of characters that give approved users access to computers. 19. One hacker admitted that he had managed to crack into the Indian server of Citibank. It took him almost a fortnight of hard work to gain access to their database of accounts. Once he was in, he diverted money from others' accounts to his own savings account. 20. In 2001, a 27-year-old Russian hacker was sentenced to serve 36 months in prison on 20 counts of conspiracy, various computer crimes, and fraud. 21. It is estimated that nine out of every 10 large corporations and government agencies have been attacked by computer intruders. 22. As cyber attacks become more frequent, hacker insurance is expected to jump from a $100 million market today to $900 million by 2005. That may result in higher costs for business. 23. Investigators say virus senders are usually incredibly hard to track, operating around the world in an obscure and anonymous environment. 24. Many hackers are found to be kids who are learning programming and trying to impress the hacker community. 25. An anti-virus program searches the computer for and guards against viruses. It also inspects incoming e-mails and new programs for viruses. An Interview with the World's Most Notorious Hacker Kevin Mitnick has been the world's most notorious hacker for over a decade. After two jail terms, the second lasting five years, he was released in September 2000. He has since written a book on the art of social engineering and is starting a consultancy to advise companies on the best way to protect IT infrastructures. On March 12, 2002, he was interviewed by a reporter. Reporter: Firstly, to set the record straight, are you a hacker or a cracker? Mitnick: Definitely a hacker. Crackers go into systems for financial gain or to deliberately cause damage. My motivations were those of the prankster and explorer. When I went into systems I was usually just looking around or on the search for specific software for personal use. I've served my time and those days are now over. Reporter: How did you first get interested in computers? Mitnick: Actually it was magic that was my first love. I was a member of the Junior Magic Club from an early age and I'm still fascinated by the power of illusion. Then when I was 13 I got my amateur radio licence and got into electronic communication. Finally I saw a computer at a radio station and swept floors there so that I could use it. Reporter: How do you deem your experience in prison? Mitnick: There have been hackers in jail who were threatened to work for criminals, but fortunately I wasn't one of them. The main problem was the myths that were flying around. I was held for four and a half years without bail, because the authorities believed their own hype and were afraid I'd start World War Three from the nearest phone box. I've been accused of a lot of things, including hacking the Pentagon and the North American Aerospace Defense Command. Why would I want to go there? They're heavily guarded and there was no interesting software to check out. I've also been accused of being the inspiration for the film "War Games" but when I met the scriptwriter a few years later he said he'd never heard of me. Reporter: So now you've published a book on social engineering. What is it and why is it so important? Mitnick: Social engineering is the side of hacking that seldom gets mentioned. It's using people to subvert technology. You can have the best computer set-up in the world but, if someone can convince a member of the staff to let them in, all that is useless. The weakest link in any security chain is always human. The skills of social engineering are used by hackers to replace genuine technical knowledge. Reporter: Surely it can't be as simple as just asking for a password? Mitnick: Sometimes that's all it takes. In practice it usually takes several calls using different personae before you can get all the keys you need for access. People like to help each other and, by establishing rapport and building trust, the determined individual can get what they want. Other techniques include setting up a situation so that the person, or target, comes to you for help. Reporter: Is it ever possible to achieve total security in business without losing custom? Mitnick: While no system is ever going to be totally secure, companies need to establish a balance between maintaining proper security and giving good customer service. You can't shut yourself away and stay in business but, with the right tools, you can get an acceptable level of security. It's really a process of education. Think about how much money companies spend on IT hardware and software protection and compare that to the training budget for teaching the staff how to deal with hackers. Teach all the staff, not just the IT department, and you'll get a much better return on investment than by buying another firewall. Reporter: What's the single most important rule for anyone with access to company secrets who wants to avoid being the victim of hackers? Mitnick: Always check the identity of the person at the other end of the phone. If they're legitimate they won't mind you checking. If they're not, you've just saved your company large amounts of time and money. Questions: 1. Which of the following is NOT true about Mitnick? 2. Why did Mitnick say that he was a hacker, not a cracker? 3. When did Mitnick started to show his interest in computers? 4. What did Mitnick think of his experience in prison? 5. Why was it important for Mitnick to publish a book on social engineering? 6. What is the single most important rule for company employees wishing to avoid being the victims of hackers? Cyberspace Hacker     The freedom and openness of cyberspace is part of its appeal, part of what makes it an exciting frontier for electronic pioneers. Like the Wild West of a century ago, cyberspace has its cowboys, too: the hackers. Skilled at computer programming, most use their talent to break new trails. But a few become outlaws.     This young man is doing what an estimated twenty million people do every day: surfing the Net. From his room, he can explore the world. With the same equipment but with a different purpose, he could read your credit records, tap into your telephone calls, even monitor your video rentals. All that information is stored on a computer. And if it's connected to the Internet, it's at the mercy of unscrupulous hackers. Federal authorities say hacker Kevin Mitnick used his computer to commit electronic burglary on a grand scale to obtain secret files, twenty thousand credit card numbers, e-mail and free cellular phone services. If convicted, Kevin Mitnick could spend thirty-five years in prison. Among Kevin Mitnick's alleged victims (is) "New York Times" reporter John Markoff who says Mitnick read his e-mail. "My electronic mail is, is as important to me as my bank account. It's not okay for anybody to read my electronic mail."     Radio program producer: "Given to the hysteria that surrounds Kevin Mitnick, ..." On the other hand, Kevin Mitnick is a hero to some people on this New York radio program devoted to hackers. "The twenty thousand credit card numbers, again, a file that was available for months and months and months, ur, Kevin did not take that file. There was no criminal intent of the sort where you make any kind of money or benefit in any way."     John Markoff: "You know, if you have a lot of power and you can read people's mail and you can travel to computers in Singapore and you can eavesdrop, I mean that's pretty amazing stuff. And you, and you feel like nobody can track you, and you're, you're safe. Um, you know I could see how somebody could be caught, caught up with the romance of that."     Former assistant US attorney Kent Walker worked on the Mitnick case. "Computer hacking is a very serious crime. In the last year alone the FBI and the Secret Service logged over twenty-five hundred complaints of break-ins and attempted break-ins into computers and computer networks."     Police: "Today on online services you can sell stolen property. You can give away or sell copyrighted software. You can, uh, engage in fraudulent activities, including, uh, oh, credit card fraud."    Kent Walker: "Hackers commit a wide variety of offenses. Hackers have tried to steal government information, to destroy people's credit histories, and to steal millions of dollars of computer software." Questions: 1. What is the talk mainly about? 2. Which of the following would Mitnick NOT do when surfing the Net? 3. Who is John Markoff? 4. Which of the following activities is NOT mentioned as a cyberspace offense? Unit2 Facts and Opinions 1. Good fences make good neighbors. It is said that this proverb first appeared in the poem "Mending Wall" by the American poet Robert Frost. 2. This proverb means that good neighbors respect one another's property. As long as neighbors mind their own business, they will get along fine. Good farmers, for example, maintain their fences in order to keep their livestock from wandering onto neighboring farms. 3. Li Ming and I have been great neighbors and friends for four years. We have been through many experiences together, learning and playing together, and there seems to be no border between us. 4. Difficult neighbors refer to those who are not easy to get along with, to deal with or to put up with, when a dispute arises. 5. The Bible says: "Love thy neighbor." But in real life situations, loving one's neighbor as oneself can be very difficult. 6. We build fences to keep our dog in our own yard and not in our neighbor's. Folks well off enough to have a swimming pool build a fence around it to keep outsiders out -- and safe. 7. But we build too many fences and walls -- walls in our personal lives, walls in our churches, walls in our community and nation. So we have walls of hostility, anger, judgment, indifference, and isolation. We have walls dividing race, class, gender, and neighborhood. 8. A warm and cordial relationship between neighbors can greatly increase the chances of a peaceful resolution. 9. Some people say that good fences make bad neighbors and others say good lawyers make bad neighbors. 10. Mr. Mallow and Mr. Robins own attractive homes in a desirable community. Both are good residents according to their property manager. But they are never good neighbors to each other. 11. It is true that we all need to be good neighbors. Students and residents need to respect each other, and the university needs to respect the neighborhood. 12. Being a good neighbor means working together to win together. Helping your fellow neighbor without expecting something in return is being a good neighbor. 13. A 60-year-old woman was arrested Friday afternoon and charged with attempted first-degree murder, for the stabbing of her next-door neighbor. 14. A man lived in a house that was separated from a next-door neighbor by a hedge. He allowed the hedge to grow to a towering height, blocking out all the sun in the neighbor's yard. The neighbor tried to communicate about the problem, but was met with a wall of silence and quickly closed doors. 15. My father is being sued by his neighbor for building up the 6-feet-tall wood fence between his neighbor's property and his own. There was an existing 4-feet-tall wood fence, but my father decided to tear that down and put up a new one. The result is: good fences make bad neighbors. 16. My housemates and I were fined $70 last month because there was trash in front of our house. The worst part about it is that it wasn't our trash. 17. My next-door neighbor is not only mean but noisy; she often plays her stereos loud enough to wake up the whole community. 18. A man known as the "most annoying neighbor" went before a jury for the first time last Tuesday on charges of littering in his home's yard. Neighbors have complained about the piles of junk and rats in his yard for more than 10 years. 19. When some neighbors complained about the loud noise that my classmates made on weekends, the university quickly adopted a new noise policy that restricted some traditional events held on weekends. 20. There are good neighbors and bad neighbors, both students and non-students, that live around the campus. I am not trying to say that our neighbors are bad or mean, just that the university should not always take their side. 21. Every year in the US, the Good Neighbor Awards are given to about 2,000 winners who have made extraordinary commitments to improving the quality of life in their communities. 22. We hope to show the world the neighbor's virtues and to inspire people around the country to contribute to their communities. 23. Indonesia and Australia are neighbors, whether we like it or not. Between neighbors, there are always ups and downs. Sometimes we have very good and excellent relations and at other times we may have some problems -- this is just normal between neighbors. Difficult Neighbors    Most of us have had a conflict, great or small, with a neighbor. Many local organizations that track quarrels between neighbors say such conflicts -- about property lines, eyesores, tumbledown fences, loud stereos, parties, undisciplined children -- are on the rise.     It is estimated that neighborhood disputes make up 50 to 60 percent of cases referred to mediation. And the number is growing. A retired judge, Roderic Duncan, says sometimes such disputes wind up in court. Some cases are serious, but others border on the ludicrous. In Alameda County, California, he recalls, two neighbors didn't see eye to eye on anything. One was a blue-collar worker who was politically conservative, the other a university employee who was liberal. The university man's tree dropped apples in the other's yard. When they rotted, the blue-collar man threw them back. The university man left the gate to their common driveway open, upsetting his neighbor, who liked it closed. Finally, the blue-collar man bought a mannequin, dressed it in a military uniform and installed it in a window facing his neighbor's house -- with right arm upraised and middle finger extended. The other man charged him with civil harassment.     After hearing both sides, Judge Duncan says, "I told them that this was offensive behavior and just asked them to work it out on their own. They were both very sheepish, and quickly agreed. They knew the whole thing was silly, but had just gotten beyond their control."     Misunderstanding can also cause a dispute. Duncan tells another story. In Albany, N.Y., two women hadn't spoken to each other in nine years, even though they had once been friends. Meanwhile, they had kept the police busy answering complaints that the other's TV was too loud, her car was blocking the driveway or her kids were unruly. Finally the police insisted they submit their dispute to mediation.     "How did all this start?" asked mediator. One woman told the mediator about the day she had come to the other's door to borrow something. Her neighbor opened the door, said "I can't talk to you," then "slammed the door in my face."     "I remember that day," replied the "door-slammer." "I was on the phone with my sister, who had just learned she had breast cancer. I meant, 'I'll talk to you later.' But when I tried, you wouldn't talk to me." If they had talked it over that day, the feud would never have happened. So speak up right away. When a dispute looms, carefully plan what to say and attack the problem, not the person. If your neighbor likes his stereo loud, calmly tell him or her how the problem harms you -- "I have to be at work at 5 a.m. Could you turn it down after 10 p.m.?" Statements: 1. Disputes between neighbors are common and lots of things can cause conflicts. According to the passage, more than half of the disputes can be resolved through mediation. 2. In Judge Duncan's eyes, 50 to 60 percent of cases about neighborhood disputes are caused by ludicrous and trivial matters. 3. The speaker implied, not stated, that blue-collar workers could not be good neighbors to white-collar workers. 4. According to the judge's account, it was the university man who charged his next-door neighbor with civil harassment. 5. Both the blue-collar worker and the university man admitted that they had been irrational in their behavior to each other. 6. In the judge's second story, as the police could not resolve the dispute between the two women, they had to submit their dispute to court. 7. The dispute between the two women started when one unintentionally slammed the door in the other's face. Hog Farm     Nestled among the redwood forests and high rolling hills of northern California's Mendocino County is the nearly 300-hectare plot of land, which 30 or so Hog Farm family members call h
/
本文档为【全新版大学英语听说教程第六册课堂部分听力练习原文】,请使用软件OFFICE或WPS软件打开。作品中的文字与图均可以修改和编辑, 图片更改请在作品中右键图片并更换,文字修改请直接点击文字进行修改,也可以新增和删除文档中的内容。
[版权声明] 本站所有资料为用户分享产生,若发现您的权利被侵害,请联系客服邮件isharekefu@iask.cn,我们尽快处理。 本作品所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用。 网站提供的党政主题相关内容(国旗、国徽、党徽..)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。

历史搜索

    清空历史搜索