《計算機專業(yè)英語》課件第8章_第1頁
《計算機專業(yè)英語》課件第8章_第2頁
《計算機專業(yè)英語》課件第8章_第3頁
《計算機專業(yè)英語》課件第8章_第4頁
《計算機專業(yè)英語》課件第8章_第5頁
已閱讀5頁,還剩62頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)

文檔簡介

UNIT8

TOPICS

TEXTInformationSecurity

EXERCISES

SUPPLEMENTARYVirusesCanEatYourComputerAliveCONVERSATIONEntertainingClients

WRITINGHowto

WriteEffectiveLettersofAppreciationandCongratulationTOPICS

UNIT8ThehistoryofInformationSecurity

TheconceptofInformationSecurity

ThegoalofInformationSecurity

WhatisconfidentialityofInformationSecurity?

WhatisintegrityofInformationSecurity?

WhatdoesavailabilityofInformationSecuritymean?

Doyouknowhowtomakeitsecurewhenshoppingonline?

Whatiscomputervirus?

Howtoprotectyourpersonalcomputerfromviruses?

Whatdoesfirewalltechnologymean?

Isitsecureafterinstallafirewall?

Skillsofentertainingclients.

Howtowritelettersofappreciateandcongratulation?

ComputernetworksdidnotexistatthedawnofthecomputerEra.Thus,atthistime,theneedforinformationsecurity—thatis,theneedtosecurethephysicalcomputeranditsmedia,makesuretheequipmentwasnotstolen,damaged,ormodifiedsinceeachmainframewasanisolatedmachine.TEXT

InformationSecurityDuringthe1960s,manymoremainframeswerebroughtonline.Theworkperformedbythesecomputersstartedtobecometime-criticalandbegantorequiretheuseofdataandprocesseshousedatseparatesites.Then,securitywasbecomingapopularconcern.

Atthecloseofthetwentiethcentury,theInternetbringsmillionsofcomputernetworksintocommunicationwitheachother.Thepersonalcomputerappearsonpeople’sdesktopsatworkandevenathome.Whatemergedwasalabyrinthofnetworksboastingvariousdegreesofsecurityattemptingtoaccessandshareinformationwitheachother.TheweaknessesbecameeasiertoexploitasaccesstotheInternet’sresourcesbecameeasier.

Understandingtheaspectsofinformationsecurityrequiresthedefinitionsofcertaininformationtechnologyterms.Thewordsecuritymeans“thequalityorstateofbeingsecure—tobefreefromdanger”.While,theterminformationsecuritywhichisreferredtocomputersecurityandinformationassurancemeansprotectinginformationfromunauthorizedaccess,illegaluse,disclosure,disruption,modification,perusal,inspection,recordingordestruction.

Informationsecurityisoftenachievedbymeansofseveralstrategiesandmethodssuchaspolices,standards,andstrategies.Butthecoreaimofinformationsecurityistoensuretheconfidentiality,integrityandavailability(CIA)ofcriticalsystemsandconfidentialinformation.CIAisawidelyusedbenchmarkforevaluationofinformationsystemssecurity,focusingonthethreecoregoalsof

confidentiality,integrityandavailabilityofinformation.Confidentiality

Ininformationsecurity,confidentialitymeanssecrecyofinformation.Theaimofconfidentialityistoensureprotectionagainstunauthorizedaccesstooruseofconfidentialinformation.Consider,forexample,creditcardstransactionsontheInternetarepopularwiththeageofe-tradecoming.Itrequiresthecreditcardnumbertobetransmittedfromthebuyertothemerchantandfromthemerchanttoatransactionprocessingnetwork.Thesystemattemptstoenforceconfidentialityofthecardnumberduringtransmissionbyencryptingthecardinformation.Itissaidtheconfidentialityhasoccurredifanunauthorizedpartyobtainsthecardnumberinanywayduringthetransaction.

Toprotectconfidentialityofinformation,anumberofmeasuresmaybeused,including:

Informationclassification

Securedocumentstorage

Applicationofgeneralsecuritypolices

EducationofinformationcustodiansandendusersIntegrity

Thesecondcomponentofinformationsecurityisintegrity.Theinformationcreatedandstoredbyanorganizationneedstobestableconstantly.Nowthewordintegrityisthetermthatmeansdatacannotbemodifiedundetectably.Thatistoassurethedatabeingaccessedorreadhasneitherbeentamperedwith,norbeenalteredordamagedthroughasystemerror,sincethetimeofthelastauthorizedaccess.Wheninformationisexposedtocorruption,damage,destruction,orotherdisruptionofitsauthenticstate,thatistosaytheinformationislackofintegrity.Forexample,datastoredondiskareexpectedtobestableandnotsupposedtobechanged.Integritymeansthatchangesshouldbedoneonlybyauthorizedusersandthroughauthorizedmechanisms.Availability

Ingeneral,theavailabilityofCIAistoensurethatinformationandvitalservicesareassessableforusewhenrequired.Foranysystem,theinformationmustbeavailablewhenitisneeded.Thismeansthatthecomputingsystemwhichisusedtostoreandprocesstheinformationmustbeaccessible.Forexample,researchlibrariesthatrequireidentificationbeforeentrance.Librariansprotectthecontentsofthelibrarysothattheyareavailableonlytoauthorizedusers.Highavailabilitysystemsaimtoremainavailableatalltimes,preventingservicedisruptionsduetopoweroutages,hardwarefailures,andsystemupgrades.Ensuringavailabilityalsoinvolvespreventingdenial-of-serviceattacks.

Availability,likeotheraspectsofsecurity,maybeaffectedbypurelytechnicalissues,naturalphenomena,orhumancauses.

Informationsecurityisa“well-informedsenseofassurancethattheinformationrisksandcontrolsareinbalance.”InformationSecurityisusuallyachievedthroughamixoftechnical,organizationalandlegalmeasures.Thesemayincludetheapplicationofcryptography,thehierarchicalmodelingoforganizationsinordertoassureconfidentiality,orthedistributionofaccountabilityandresponsibilitybylaw,amonginterestedparties.Ⅰ.Matchthetermsandinterpretations.1.SecurityAwareness(a)Ameasureofthedegreeofasystemwhichisintheoperableandcommittablestateatthestartofmissionwhenthemissioniscalledforatanunknownrandompointintime.EXERCISES2.Confidentiality(b)Theconversionofdataintoaformthatcannotbeeasilyunderstoodbyunauthorizedpeople.3.Integrity(c)Theknowledge,skillandattitudeanindividualpossessesregardingtheprotectionofinformationassets.

4.Availability(d)Thecharacteristicthatalterationstoasystem’sassetscanbemadeonlyinanauthorizedway.5.Encryption(e)Referstothepropertyofacomputersystemwherebyitsinformationisdisclosedonlytoauthorizedparties.

Ⅱ.ArethefollowingstatementsTrue(T)orFalse(F)?

1.()TheInternetismoresecuresincemorepeopleareusingit.

2.()Changingpasswordsonyourcomputer,andusingcombinationsoflettersandnumbers,makesiteasiertogainaccess.

3.()Informationsecuritysystemsneedtobeimplementedtoprotectpersonalstaffdetailsinmanybusinesses.

4.()Computervirusesareprogramsthatcaninfectothercomputerprograms..()Computersecurityconcernsonlywiththesoftwareanddataofcomputersystems.

6.()Databackupmeansmakingcopiesofdata.

7.()Hackermeansabadmanwhoaccessestoacomputersystem7withoutauthority.

8.()Abackupfileisacopyofafilewhichiskeptincaseanythinghappenstotheoriginalfile.

9.()Dataissaidtobecorruptonlywhenlost.

10.()Incomputersecurity,accesscontrolhasbeenwidelyusedto10managethepermissionsofuserstoaccesstheobjects.Ⅲ.TranslatethefollowingwordsandphrasesintoChinese.Ⅳ.TranslatethefollowingChinesestatementsintoEnglish.

1.互聯(lián)網(wǎng)使用得越多,對互聯(lián)網(wǎng)安全就關(guān)注得越多。

2.有效的信息安全包括了一系列政策、安全產(chǎn)品、技術(shù)等。

3.對于多數(shù)公司而言,80%的安全問題來自于公司內(nèi)部。

4.黑客有兩種攻擊計算機系統(tǒng)的方法。

5.一個有效的保護計算機網(wǎng)絡(luò)的方法是安裝防火墻。

Ⅴ.Fillineachoftheblankswithoneofthefollowingwordsorphrases.

refertotransmittedcollectioncrimeinformation

recordedvaluabledisruptpermissiondata

Anypartofacomputingsystemcanbethetargetofa

.Whenwe

acomputingsystem,wemeana

ofhardware,software,storagemedia,

,andpeoplethatanorganizationusestoperformcomputingtasks.Sometimes,weassumethatpartsofacomputingsystemarenot

toanoutsider,butoftenwearemistaken.Forinstance,wetendtothinkthatthemostvaluablepropertyinabankisthecash,gold,orsilverinthevault.Butinfactthecustomer

inthebank’scomputermaybefarmorevaluable.Storedonpaper,

onastoragemedium,residentinmemory,or

overtelephonelinesorsatellitelinks,thisinformationcanbeusedinmyriadwaystomakemoneyillicitly.Acompetingbankcanusethisinformationtostealclientsorevento

serviceanddiscreditthebank.Anunscrupulousindividualcouldmovemoneyfromoneaccounttoanotherwithouttheowner’s

.Agroupofconartistscouldcontactlargedepositorsandconvincethemtoinvestinfraudulentschemes.Thevarietyoftargetsandattacksmakescomputersecurityverydifficult.

Ⅵ.Thefollowingisaconversationbetweencustomerandtechsupport.FillintheblankswiththehelpoftheChinesegiveninthebrackets.

TechSupport:WhatcanIdo?

Benjamin:

(我在網(wǎng)上沖浪時電腦系統(tǒng)崩潰了)

TechSupport:

(你瀏覽過非法網(wǎng)站嗎?)

Benjamin:No,butdoesthatmatter?

TechSupport:Yes,

(如果瀏覽非法網(wǎng)站,電腦很容易感染病毒)

Benjamin:Isee.I’dbetternevertry.

TechSupport:That’swise.

Benjamin:Doyouknowwhat’swrongwithmyPC?

TechSupport:Oneminute.

(哦,它中毒了,而且電腦上沒有殺毒軟件)

Benjamin:IsthesoftwarenecessaryforaPC?

TechSupport:Ofcourse.You’dbetterlearnsomethingaboutit.

Benjamin:I’mafraidyes.ButwhataboutthedataIstoredinthecomputer?

TechSupport:Don’tworry.Itshouldhavebeenprotectedautomatically.

(我有殺毒軟件,需要我?guī)湍惆惭b嗎?)

Benjamin:Yes,please.I’llreallyappreciatethat.

Systemmanagementisthedaytodayrunningofacomputersystem.Anycomputersystemthatisdoingusefulworkmustbemaintainedonaregularbasis.Buteachyear,thenumberofsecurityvulnerabilitiesdiscoveredrises,andhackingtoolsavailabletoexploitthesevulnerabilitiesbecomemorereadilyavailableandeasiertouse.SUPPLEMENTARY

VirusesCanEatYourComputerAlive

Hackerslookforwaysto“accessyourcomputerandcopy,stealoralterdatayouhavestored”.Absolutelyandwithoutquestion,thenumberonecomputing-andnetworking-relatedchallengeweallfacetodayiscomputerandnetworksecurity.

Computerandnetworksecurityproblemsaffectcorporationsandsmallbusinesses,governments,highereducation,schools,individualsandfamiliesalike—allofusarestruggling.

Nomatterhowcarefulwemightbe,computersmaybefoundinfectedwithdifferentviruses.IfusingInternetfrequentlyfordownloadingmovies,musicandotherfilesfromtheInternet,thechancesofpickingupatrojan,worm,orothervirusarealmostassured.

Avirusinvadesforsystem,erasestheharddriveandsendsrandomdocumentstoeveryoneontheuser’scontactslist.Acomputervirusisatypicallymaliciousprogramwrittentospreaditselfeasilyfromcomputertocomputer.Itssolepurposeistoinfect,corruptandultimatelybreakdownacomputersystemandanynetworkitmaybeapartof.

Acomputervirushasfewboundariesandlimitations,andwiththeglobaluseofE-mailandtheinternetallowingavirustospreadsoeasily,asimpleclickofthemousecancausealmostinstantworldwidechaos.Withoutpriorknowledgeofanypossiblevirusthatiscirculatingatthetime,thistypeofcomputervirusisimpossibletospot.TheuserwillhavenoideathatthemailthattheyhavejustclickedonandopenedhasinfectedtheirPCand,insomecases,thePCviruswillhavealreadysentitselfouttoalloftheemailaddressescontainedwithintheusersemailcontactlist.Therearesomemostcommonviruses:

ThePandaBurnsIncensecomputerworm—thiswasviruswreakedhavocformonthsinChinain2006and2007.JumpingonecomputertoanotherbytrickingusersintoopeningwhatappearedtobeafriendlyE-mailmessage,thePandafunneledpasswords,financialinformationandonlinecashbalancesleavingapandaasitscallingcard.

TheMelissaVirus—thiswasabugthathiteveryPCusers.ItwouldautomaticallyE-mailitselftootherpeoplewithoutpermission.Itcanbeextraharmfulifusingaprivatemailserver.TheMelissavirushasgonedowninhistoryasoneofthemostcommoncomputervirusesofalltime.

ATrojanhorse,orTrojan,isastandalonemaliciousprogramdesignedtogivefullcontrolofinfectedPCtootherPC.Itcanalsoperformothertypicalcomputervirusactivities.Trojanhorsescanmakecopiesofthemselves,stealinformation,orharmtheirhostcomputersystems.ThetermisderivedfromtheTrojanHorsestoryinGreekmythologybecauseTrojanhorsesattempttogivefullcontrolofPCtootherPC.

Thankfully,therearemanygreatvirusprotectionprogramsonthemarkettodaythatcaninstantlyvanquisheventhetoughestviruses,butthatdoesn’tmeantheusershouldn’thaveanideaofsomeofthecommoncomputervirusesthatarecurrentlygoingaround.

WhenusingcomputersespeciallysurfingontheInternet,therearesometipstofollow:

1.Don’tclickonpop-upadsthatadvertiseantivirusoranti-spywareprograms.Ifyouareinterestedinasecurityproduct,contacttheretailerdirectlythroughitshomepage,retailoutletorotherlegitimatecontactmethods.

2.Don’tdownloadsoftwarefromunknownsources.Somefreesoftwareapplicationsmaycomebundledwithotherprograms,includingmalware.

3.Useandregularlyupdatefirewalls,antivirus,andanti-spywareprograms.Keeptheseprogramsupdatedregularly.Usetheauto-updatefeatureifavailable.

4.Patchoperatingsystems,browsers,andothersoftwareprograms.Keepyoursystemandprogramsupdatedandpatchedsothatyourcomputerwillnotbeexposedtoknownvulnerabilitiesandattacks.

5.Regularlyscanandcleanyourcomputer.Scanyourcomputerwithyouranti-spywareonceaweek.

6.Backupyourcriticalfiles.Back-upcopiesofimportantfilesisoneofthemostfundamentalrequirementsifthecomputerbecomesinfected.在經(jīng)濟日益發(fā)達的今天,人與人之間的距離逐漸縮短。在日常工作及社會交往中,接待客戶的活動越來越多。但是如何接待客戶對每個人而言都是一件值得學(xué)習(xí)的事。下面是在日常接待中應(yīng)該注意的事項。CONVERSATION

EntertainingClients

接待客戶

1.迎接禮儀迎來送往,是社會交往接待活動中最基本的環(huán)節(jié),是表達主人情誼、體現(xiàn)禮貌素養(yǎng)的重要方面。尤其是迎接,能給客人留下重要的第一印象。通常迎接客人要有周密的部署,應(yīng)該重點注意以下事項:●了解客人的車次、航班。安排與客人身份、職務(wù)相當(dāng)?shù)娜藛T前去迎接?!裼涌腿藭r應(yīng)該提前為客人準(zhǔn)備好交通工具。將客人送往目的地后,應(yīng)對當(dāng)?shù)氐娘L(fēng)土人情、自然景觀等做簡單介紹。

2.接待禮儀接待客人要注意以下幾點:

●客人要找的負責(zé)人不在時,要明確告訴對方負責(zé)人何時回來。

●客人到來時,如果負責(zé)人不能馬上接見,要向客人說明等待理由與等待時間。

●接待人員帶領(lǐng)客人到達目的地,應(yīng)該有正確的引導(dǎo)方法和引導(dǎo)姿勢。ExampleDialogue1

A:HowcanIhelpyou?

B:Yes,IamJimMilsonfromEdisonassociate.I’dliketoseeMr.Smith.

A:Doyouhaveanappointment?

B:Yes,heknowsIamcoming.Ourmeetingisat9o’clock.

A:IwonderingifMr.Smithforgotyourmeeting.Iamafraidheleftthisofficethismorningandheisnotexpectedbackuntilafter4PM.Letmefindoutifhemadeanarrangementforsomeoneelsetomeetwithyouinhisplace.Willyoupleasehaveaseat?

B:Sure.

A:Yeah,Mr.Milson.IjustcheckedwiththeirofficemanagerMsTerry,shesaidMr.Smithbriefedheronyourproject.Sheisjustfinishingupourmeetingnow.Sheshouldbemeetingyoushortly.Wouldyoulikemetoshowyouaroundforyourwaiting?

B:Thatwouldbeverynice,thankyou!

A:RightthiswayMr.Milson.Wecanstartwithourfrontoffice.WhenMsTerryisready,youmaytakeatthefront6thfloor.Thereisaconferenceroomalreadyprepared.Dialogue2

F: Hello,Mr.Henson,welcometoBeijing!IsthisyourfirsttimetovisitChina?

M:Ohno,I’vealreadymadeseveraltripstoGuangzhou,thisismyfirsttriptoBeijing.ItisalotlargerthanIexpecteditwouldbe.

F:Yes,Beijinghasbeenbrokenoverthelastfewyears,therearealotofimprovementchangingbemadeforOlympic.Whatwouldyouliketoseewhenareyouhere?

M:IhopetohavetimetovisitGreatWallwhenIamhere.Ialwayswanttogothere.IthinkitwouldbearealshamebycameallthewayinBeijinganddidn’tmakeoutthewall.DoyouthinkIhaveachancetoseeit?

F:Icanprettysureitcanbearranged.TheWallisashortdistancefromthecity.ButwecouldmakearrangementsfordrivertotakeusouttovisittheGreatWallduringwhenourafternoonbreaks.IalsorecommendyoutovisitTian’anMenSquareandcitywhileyouaddit!

M:Yes,thatwouldbenice.WouldIhaveatourguidetotourcompletelyvisittheseplaces?

F: Don’tworry.Iwouldbeabletogoalongwithyouoverthenextfewdays.IfyouhaveanyquestionsorproblemsIwillberightheretohelpyouout.Icanbeatranslatorandtourguide.

M:Thankyouverymuch.

F:?Mypleasure.IhopeyourvisittoBeijingisveryenjoyable!Practice

ImaginethatAisasalesmanagerofABCCompany,andBisaguestofABC.AisgoingtopickBupattheairport.PleasecompletethefollowingdialoguebetweenAandBwiththegivenpoints:

Greeteachother.

Talkingaboutthetrip.

Talkingaboutthehotel.

Makeabriefintroductiontothecityandlocalcustoms.Tips招待客戶常用語

1.I’mXXX,fromAA.I’vecometomeetyou.我是從AA來的XXX,我是來接您的。

2.Didyouhaveapleasanttrip?/Howwasyourtrip?旅途愉快嗎?

3.IsthisthefirsttimeyoucomtoShenzhen?您是第一次來深圳嗎?

4.Thecarisintheparkinglot,thiswayplease.車在停車場,這邊請。

5.Wouldyoulikeaglassofwater?/CanIgetyouacupofChineseredtea?/HowaboutaCoke?來杯水怎么樣?/我給您倒杯紅茶吧?/來杯可樂怎么樣?

6.Acupofcoffeewouldbegreat.Thanks!來杯咖啡吧。謝謝!

7.Therearemanyplaceswherewecaneat.HowaboutCantonesefood?有很多吃飯的地方。粵菜怎么樣?

8.Iwouldliketoinviteyouforlunch.我想請您吃午飯。

9.Oh,Ican’tletyoupay.Itismytreat,youaremyguest.哦,不能讓您請。這次我來,您是客人。

10.MayIproposethatwebreakforcoffeenow?我們休息一下喝杯咖啡吧?

11.Excuseme.I’llberightback.不好意思,我馬上回來。

12.Haveagoodjourney!祝您旅途愉快!

13.ThankyouverymuchforeverythingyouhavedoneusduringourstayinChina.謝謝您為我們在中國期間所做的一切。

14.I’mlookingforwardtoseeingyouagain.希望能再次見到您。

15.Thereisawelcomingdinnertomorrownight.明晚將有一個接風(fēng)宴。

16.

Iwilltakeyouonacitytourtomorrowmorning.

明天上午我會帶您瀏覽市容。

17.

Wouldyoupleasetellmewhenyouarefree?能告訴我您什么時候有空嗎?

18.

I’mafraidIhavetocancelmyappointment.恐怕我得取消約會了。

19.

Willyouchangeourappointmenttomorrowat10:00a.m.tothedayaftertomorrowatthesametime?我們的約會是不是要從明天上午10點改到后天同一時間?

20.Wouldyouliketogothroughourfactorysometime?什么時候來參觀我們的工廠吧?

21.Thankyouforcomingtoday.謝謝您的蒞臨。

22.Wouldn’tyouliketospendanextradayortwohere?您不愿意在這里多待一兩天嗎?

23.Whencanweworkoutadeal?我們什么時候洽談生意?

24.I’dappreciateyourkindconsiderationinthecomingdays.在接下來的幾天里還請多關(guān)照。在日常生活和社會交往中,我們常常會得到別人的幫助、招待、饋贈、慰問等。而感謝信作為一種禮儀文書,主要用來向?qū)Ψ奖硎境鲎匀磺页錆M真摯的感謝之情。感謝信在寫作時通常篇幅較短,直接表達對對方的感謝之情。WRITING

HowtoWriteEffectiveLettersofAppreciation

and

Congratulation

如何寫感謝信及祝賀信

在英語寫作中,祝賀信使用的頻率很高。在同學(xué)、同事、朋友或者親戚取得成績、獲得獎勵以及結(jié)婚、生子、生日、晉升等情況下,通常要寫祝賀信以表達我們的祝賀之情。祝賀信用詞必須親切有禮、表達出真誠的喜悅之情。英語感謝信和祝賀信的寫作格式類似,主要由以下幾部分組成:信頭(heading),即發(fā)信人的地址和日期(右上角);稱呼(salutation),即對收信人的尊稱(一般用DearMr…,DearMadam…,DearMiss…等);正文(body),即感謝信或祝賀信的主要內(nèi)容,通常正文第一句和稱呼之間要空一至二行;信尾客套話(complimentaryclose)或祝賀詞,即寫信人在信的右(或左)下角寫上表示自己對收信人的一種禮貌客氣的謙稱或者再次表示感謝或祝賀。Example

DearMrs.Beck,

Howdidyoueverfindthosewonderfulglasses?Theyareperfect,andJimandIwanttothankyouathousandtimes!

Thepresentswillbeshownonthedayofthewedding,butdocomeoverThursdaymorningifyoucanforacupofcoffee.

Thankyouagain,andwithlovefromusboth.

Mary

親愛的貝克太太:您是怎樣

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論