計(jì)算機(jī)專業(yè)英語(yǔ)第4版-Computer Network Technology_第1頁(yè)
計(jì)算機(jī)專業(yè)英語(yǔ)第4版-Computer Network Technology_第2頁(yè)
計(jì)算機(jī)專業(yè)英語(yǔ)第4版-Computer Network Technology_第3頁(yè)
計(jì)算機(jī)專業(yè)英語(yǔ)第4版-Computer Network Technology_第4頁(yè)
計(jì)算機(jī)專業(yè)英語(yǔ)第4版-Computer Network Technology_第5頁(yè)
已閱讀5頁(yè),還剩65頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

ComputerNetworkTechnology5.1ComputerNetworkBasics5.2InformationSecurity5.3WirelessNetworks5.4專業(yè)英語(yǔ)應(yīng)用模塊15.1ComputerNetworkBasicsNetworkingarosefromtheneedtosharedatainatimelyfashion.Personalcomputersarewonderfulbusinesstoolsforproducingdata,spreadsheets,graphics,andothertypesofinformation,butdonotallowyoutoquicklysharethedatayouhaveproduced.Agroupofcomputersandotherdevicesconnectedtogetheriscalledanetwork,andthetechnicalconceptofconnectedcomputerssharingresourcesiscallednetworking.2(1)LocalAreaNetworkALocalAreaNetwork(LAN)isahomogenousentity.Everypacketplacedonthenetworkisseenbyevery“node”(serverorworkstation),buteachnodeprocessesonlythepacketsaddressedtoit,exceptfornetworktestequipmentandhackertools,whichreadanypacketstheyplease.AllnodesonaLANmaybetappedintoasinglecable(oldcoaxEthernet)orwiredtoacentral“hub”.3(2)BridgedLANAbridgedLANnetworkisaLANthatgottoobiganda“bridge”hadtobeinsertedtocutdownthetraffic.Abridgeknowswhatnetworkaddressesareoneachsideofit,andpassesonlytrafficaddressedtotheotherside,thus“segmenting”thenetwork.4(3)SwitchedLANAswitchedLANhasaveryfast,multi-portbridgecalleda“switch”or“switchinghub”.AswitchedLANmaybesofinegrainedithasonlyonenodeoneachport,reducingtrafficoneachcableasfarasitcanbereduced.5(4)CampusAreaNetworkACampusAreaNetwork(CAN)willhaveatleastone“backbone”towhichtwoormoreLANsareconnectedthroughbridges,switchesorrouters.6(5)RoutedNetworkAroutednetworkisonewhereindividualLANsareconnectedthroughrouters,devicesmuchsmarterthanbridgesorswitches.Arouterknowswherestuffis,evenifit’sseveralroutersaway.7(6)WideAreaNetworkAWideAreaNetwork(WAN)isanetworkthatpassesoverlinksnotownedbytheownerofthenetwork.Generally,theselinksareownedbyatelephonecompanyorsomeothercommoncarrier.TheInternetisahugeworldwideWANconsistingofthousandsofLANandmillionsofroutersandservers.82.NetworkAdministratorNetworkadministratorhasfullrightsandpermissionstoallresourcesonanetwork.Theadministratorisusuallyresponsibleforinstalling,managing,andcontrollingserversandnetworkingcomponents.Administratorscanalsomodifythepropertiesofuseraccountsandthemembershipofgroups,createandmanageprinters,installprinters,shareresourcesandassignpermissionstothoseresources.93.TopologiesThephysicaltopologydescribesthelayoutofthenetwork,justlikeamapshowsthelayoutofvariousroads,andthelogicaltopologydescribeshowthedataissentacrossthenetworkorhowthecarsareabletotravel(thedirectionandspeed)ateveryroadonthemap.Logicaltopologyisthemethodusedtopasstheinformationbetweenthecomputers.10(1)Starnetwork(2)Gridnetwork(3)Busnetwork(4)Ringnetwork(5)Hybridnetwork11accurate

正確的,精確的annulus

環(huán)backbone

骨干,支柱contractor

合同人,承包商diagnose

診斷fashion

風(fēng)尚,時(shí)尚hierarchical

分層的hybrid

混合的merge

使合并12neighbor鄰居,鄰接permission許可,允許regular 常規(guī)的,合格的router 路由器spreadsheet電子表格token 令牌,記號(hào)topology 拓?fù)洌Y(jié)構(gòu)upgrade升級(jí),上升unreliable 不可靠的13[1]

Withoutanetwork,thedocumentshavetobeprintedoutsothatotherscaneditthemorusethem.譯文:沒(méi)有網(wǎng)絡(luò),就必須將文檔打印出來(lái)才能供他人編輯或使用。本句的“Withoutanetwork”是條件狀語(yǔ),“sothat”引導(dǎo)的是目的狀語(yǔ)從句。14[2]Iftheuserweretoconnecthiscomputertoothercomputers,hecouldsharedataanddevicesonothercomputers,includinghigh-qualityprinters.譯文:如果用戶能把他的計(jì)算機(jī)與其他計(jì)算機(jī)連在一起的話,他就可以共享其他計(jì)算機(jī)上的數(shù)據(jù)和設(shè)備,包括高性能的打印機(jī)。本句由“If

”引導(dǎo)條件狀語(yǔ)從句,“includinghigh-qualityprinters”是補(bǔ)語(yǔ)。15[3]

Arouterknowswherestuffis,evenifit’sseveralroutersaway.譯文:路由器知道信息的位置,即使要經(jīng)過(guò)幾個(gè)路由器的距離。本句的“wherestuffis”是賓語(yǔ)從句,“evenifit’sseveralroutersaway”是讓步狀語(yǔ)從句。16[4]Agridnetworkisakindofcomputernetworkconsistingofanumberofcomputersystemsconnectedinagridtopology.譯文:網(wǎng)狀網(wǎng)絡(luò)是一種計(jì)算機(jī)網(wǎng)絡(luò),它以網(wǎng)狀拓?fù)浣Y(jié)構(gòu)將許多計(jì)算機(jī)系統(tǒng)連接在一起。本句的“consistingofanumberofcomputersystems”是現(xiàn)在分詞短語(yǔ),作定語(yǔ)修飾“network”,而“connectedinagridtopology”是過(guò)去分詞短語(yǔ)作定語(yǔ),修飾“computersystems”。17[5]Actually,thereareusuallytwocablessoadapterscanloopbacktoremarktheringifthereisabreak.譯文:實(shí)際上,通常會(huì)有兩條電纜,這樣適配器就會(huì)在網(wǎng)絡(luò)中出現(xiàn)故障時(shí),可以沿環(huán)路返回重新構(gòu)成環(huán)。本句的“soadapterscanloopbacktoremarkthering”是目的狀語(yǔ),而“ifthereisabreak”是條件狀語(yǔ)。18OpticalCommunicationFiber-opticcommunicationsystemsarelight-wavesystemsthatemployopticalfibersforinformationtransmission.Microwaveradioisusedinbroadcastingandtelecommunicationtransmissionsbecause,duetotheirshortwavelength,highlydirectionalantennasaresmallerandthereforemorepracticalthantheywouldbeatlongerwavelengths(lowerfrequencies).19Opticalcommunicationsystemsdifferinprinciplefrommicrowavesystemsonlyinthefrequencyrangeofthecarrierwaveusedtocarrytheinformation.Theopticalcarrierfrequenciesaretypically200THz,incontrast,themicrowavecarrierfrequenciesare1GHz.20Theapplicationofopticalfibercommunicationsisingeneralpossibleinanyareathatrequirestransferofinformationfromoneplacetoanother.However,fiber-opticcommunicationsystemshavebeendevelopedmostlyfortelecommunicationsapplications.Thisisunderstandableinviewoftheexistingworldwidetelephonenetworkswhichareusedtotransmitnotonlyvoicesignalsbutalsocomputerdataandfaxmessages.21Eachsuccessivegenerationoflight-wavesystemsiscapableofoperatingathigherbitratesandoverlongerdistances.Periodicregenerationoftheopticalsignalbyusingrepeatersisstillrequiredformostlong-haulsystems.225.2InformationSecuritySecuritythreatstoanetworkcanbedividedintothosethatinvolvesomesortofunauthorizedaccessandallothers.Oncesomeonegainsunauthorizedaccesstothenetwork,therangeofthingstheycandoislarge.23Management’sresponsibilityThenetworksecuritypolicyismanagement’sstatementoftheimportanceandtheircommitmenttonetworksecurity.Thepolicyneedstodescribeingeneraltermswhatwillbedone,butdoesnotdealwiththewaytheprotectionistobeachieved.24Management,atalllevels,needstosupportthepolicyandperiodicallyreinforceitwithemployeesinvariousways.ITandnetworkstaffmayneedtoinstalladditionalhardware,software,andprocedurestoperformautomatedsecuritychecking.25AttackpreventionDifferentsecuritymechanismscanbeusedtoenforcethesecuritypropertiesdefinedinagivensecuritypolicy.Dependingontheanticipatedattacks,differentmeanshavetobeappliedtosatisfythedesiredproperties.Attackpreventionisaclassofsecuritymechanismsthatcontainswaysofpreventingordefendingagainstcertainattacksbeforetheycanactuallyreachandaffectthetarget.26Accesscontrollimitsandregulatestheaccesstocriticalresources.Themostcommonformofaccesscontrolusedinmulti-usercomputersystemsareaccesscontrollistsforresourcesthatarebasedontheuserandgroupidentityoftheprocessthatattemptstousethem.Theidentityofauserisdeterminedbyaninitialauthenticationprocessthatusuallyrequiresanameandapassword.27Theloginprocessretrievesthestoredcopyofthepasswordcorrespondingtotheusernameandcomparesitwiththepresentedone.Whenbothmatch,thesystemgrantstheusertheappropriateuserandgroupcredentials.28Afirewallisanimportantaccesscontrolsystematthenetworklayer.Theideaofafirewallisbasedontheseparationofatrustedinsidenetworkofcomputersundersingleadministrativecontrolfromapotentialhostileoutsidenetwork.Thefirewallisacentralchokepointthatallowsenforcementofaccesscontrolforservicesthatmayrunattheinsideoroutside.29AttackavoidanceSecuritymechanismsinthiscategoryassumethatanintrudermayaccessthedesiredresourcebuttheinformationismodifiedinawaythatmakesitunusablefortheattacker.Whiletheinformationistransportedoverthecommunicationchannel,itresistsattacksbybeingnearlyuselessforanintruder.Onenotableexceptionisattacksagainsttheavailabilityoftheinformation,asanattackercouldstillinterruptthemessage.30Themostimportantmemberinthiscategoryiscryptography,whichisdefinedasthescienceofkeepingmessagesecure.Itallowsthesendertotransforminformationintowhatmayseemlikearandomdatastreamtoanattacker,butcanbeeasilydecodedbyanauthorizedreceiver.31Themostcommonattack,calledknownplaintextattack,isexecutedbyobtainingciphertexttogetherwithitscorrespondingplaintext.Theencryptionalgorithmmustbesocomplexthatevenifthecodebreakerisequippedwithplentyofsuchpairs,itisinfeasibleforheretoretrievethekey.32anticipate 預(yù)料,預(yù)測(cè)brute 暴力的,粗暴的choke 要塞,擁塞ciphertext 密文creativity 創(chuàng)造力,創(chuàng)新cryptographic 加密的,密碼的decode 譯碼denial 否認(rèn),拒絕denote 表示,意味著disguise 偽裝,借口33eavesdrop 偷聽(tīng),竊聽(tīng)encryption 加密hostile 敵人,敵對(duì)分子interference 沖突,干擾intruder 闖入者,侵入者lossless 無(wú)損的observation 觀察,觀測(cè)overt 公開(kāi)的,公然的,明顯的plaintext 明文separation 分離,隔離,隔開(kāi)upgrade 升級(jí),提高34[1]

Thatrequiresfollowthroughandcommunicationwithallemployeessothattheyunderstandtheemphasisandimportanceseniormanagementisplacingonsecurity.譯文:這需要后續(xù)通過(guò)與所有員工的溝通,使他們認(rèn)識(shí)到高層管理人員在安全布置上的重點(diǎn)和重要性。本句的“sothat”引導(dǎo)目的狀語(yǔ)從句。35[2]

Themostcommonformofaccesscontrolusedinmulti-usercomputersystemsareaccesscontrollistsforresourcesthatarebasedontheuserandgroupidentityoftheprocessthatattemptstousethem.譯文:在多用戶計(jì)算機(jī)系統(tǒng)中,最常用的訪問(wèn)控制形式是資源訪問(wèn)控制清單。清單是建立在進(jìn)程中想要使用這些資源的用戶和群的身份基礎(chǔ)上的。本句的“usedinmulti-usercomputersystems”作定語(yǔ),修飾“accesscontrol”,“thatarebased…”是修飾“accesscontrollists”的定語(yǔ)。36[3]

Whenaresourceshouldbeaccessed,thesystemlooksuptheuserandgroupintheaccesscontrollistandgrantsordeniesaccessasappropriate.譯文:當(dāng)一個(gè)資源被請(qǐng)求訪問(wèn)時(shí),系統(tǒng)會(huì)在訪問(wèn)控制清單中查找用戶和群并適當(dāng)授權(quán)訪問(wèn)或拒絕訪問(wèn)。本句的“When”引導(dǎo)時(shí)間狀語(yǔ)從句,“intheaccesscontrollist”作定語(yǔ)。37[4]

Thefirewallpreventsattacksfromtheoutsideagainstthemachinesintheinsidenetworkbydenyingconnectionattemptsfromunauthorizedpartieslocatedoutside,inaddition,afirewallmayalsobeutilizedtopreventusersbehindthefirewallfromusingcertainservicesthatareoutside.譯文:防火墻通過(guò)拒絕來(lái)自外部的未授權(quán)方的連接企圖,防止來(lái)自外部的對(duì)內(nèi)部網(wǎng)絡(luò)中的機(jī)器的攻擊。除此之外,防火墻還可以用來(lái)阻止墻內(nèi)用戶使用外部服務(wù)。這是一個(gè)長(zhǎng)句,由“inaddition”連接起兩個(gè)并列子句,“bydenyingconnectionattemptsfromunauthorizedpartieslocatedoutside”是方式狀語(yǔ),“behindthe…”作定語(yǔ)。38[5]

Theinformationispreprocessedatthesenderbeforeitistransmittedoverthecommunicationchannelandpost-processedatthereceiver.譯文:信息在通信渠道中傳播之前由發(fā)送者進(jìn)行了預(yù)處理,并且接收者收到信息后也要進(jìn)行處理。本句采用被動(dòng)語(yǔ)態(tài),主語(yǔ)是“Theinformation”,謂語(yǔ)為“preprocessed”和“post-processed”,構(gòu)成并列句,“beforeitistransmittedoverthecommunicationchannel”是時(shí)間狀語(yǔ)。39TechniquesforInternetSecurity1.NetworkFirewallsThepurposeofanetworkfirewallistoprovideashellaroundthenetworkthatwillprotectthesystemsconnectedtothenetworkfromvariousthreats.Thetypesofthreatsafirewallcanprotectagainstinclude:Unauthorizedaccesstonetworkresources—anintrudermaybreakintoahostonthenetworkandagainunauthorizedaccesstofiles.40Denialofservice—anindividualfromoutsideofthenetworkcould,forexample,sendthousandsofmailmessagestoahostonthenetinanattempttofillavailablediskspaceorloadthenetworklinks.Masquerading—electronicmailappearingtohaveoriginatedfromoneindividualcouldhavebeenforgedbyanotherwiththeintenttoembarrassorcauseharm.41Afirewallcanreduceriskstonetworksystemsbyfilteringoutinherentlyinsecurenetworkservices.42DigitalCertificateandAuthenticationDigitalcertificateisanidentitycardcounterpartinthecomputersociety.Whenapersonwantstogetadigitalcertificate,hegenerateshisownkeypair,givesthepublickeyaswellassomeproofofhisidentificationtotheCertificateAuthority(CA).CAwillchecktheperson’sidentificationtoassuretheidentityoftheapplicant.43DigitalSignatureAdigitalsignatureisanelectronicsignaturethatcanbeusedtoauthenticatetheidentityofthesenderofamessageorthesignerofadocument,andpossiblytoensurethattheoriginalcontentofthemessageordocumentthathasbeensentisunchanged.44Adigitalsignatureisastringofbitsattachedtoanelectronicdocument,whichcouldbeawordprocessingfileoranE-mailmessage.Thisbitstringisgeneratedbythesigner,anditisbasedonboththedocument’sdataandtheperson’ssecretpassword.Digitalsignaturesareeasilytransportable,cannotbeimitatedbysomeoneelse,andcanbeautomaticallytime-stamped.455.3WirelessNetworksWirelesstechnologies,inthesimplestsense,enableoneormoredevicestocommunicatewithoutphysicalconnections—withoutrequiringnetworkorperipheralcabling.Wirelesstechnologiesuseradiofrequencytransmissionsasthemeansfortransmittingdata,whereaswiredtechnologiesusecables.46Wirelessnetworksserveasthetransportmechanismbetweendevicesandamongdevicesandthetraditionalwirednetworks(enterprisenetworksandtheInternet).Wirelessnetworksaremanyanddiversebutarefrequentlycategorizedintothreegroupsbasedontheircoveragerange:wirelesswideareanetworks(WWAN),WLANs,andwirelesspersonalareanetworks(WPAN).47WLANsallowgreaterflexibilityandportabilitythandotraditionalwiredlocalareanetworks.UnlikeatraditionalLAN,whichrequiresawiretoconnectauser’scomputertothenetwork,aWLANconnectcomputersandothercomponentstothenetworkusinganaccesspointdevice.48AdhocnetworkssuchasBluetootharenetworksdesignedtodynamicallyconnectremotedevicessuchascellphones,laptops,andPDAs.Thesenetworksaretermed“adhoc”becauseoftheirshiftingnetworktopologies.WhereasWLANsuseafixednetworkinfrastructure,adhocnetworksmaintainrandomnetworkconfigurations,relyingonamaster-slavesystemconnectedbywirelesslinkstoenabledevicestocommunicate.49Inrecentyears,wirelessnetworkinghasbecomemoreavailable,affordable,andeasytouse.Homeusersareadoptingwirelesstechnologyingreatnumbers.On-the-golaptopusersoftenfindfreewirelessconnectionsinplaceslikecoffeeshopsandairports.50Wirelessnetworkshavemanyuses.Forexample,youcansendE-mail,receivetelephonecallsandfaxesandreadremotedocumentsinyourtravel.Inaddition,wirelessnetworksareofgreatvaluetofleetsoftrucks,taxis,busesandrepairpersonsforkeepingincontactwithhome.51Wirelessaccesspointscanannouncetheirpresencetowireless-enabledcomputers.Thisisreferredtoas“identifierbroadcasting”.Incertainsituations,identifierbroadcastingisdesirable.Manypublicaccesspointsarenotsecured,andthetraffictheycarryisnotencrypted.Thiscanputyoursensitivecommunicationsortransactionsatrisk.52AccessingtheInternetviaapublicwirelessaccesspointinvolvesserioussecuritythreatsyoushouldguardagainst.Thesethreatsarecompoundedbyyourinabilitytocontrolthesecuritysetupofthewirelessnetwork.What’smore,youareofteninrangeofnumerouswireless-enabledcomputersoperatedbypeopleyoudon’tknow.53abuse 濫用affordable 負(fù)擔(dān)得起bluetooth 藍(lán)牙cellular 蜂窩的,多孔的cordless 無(wú)繩的,不用電線的coverage 范圍,規(guī)模disaster 災(zāi)害,天災(zāi)diverse 多種多樣的,不同的54fashion 方式,風(fēng)格headphone 耳機(jī)inability 無(wú)能,無(wú)能為力infrastructure 基站,基礎(chǔ)設(shè)施laptop 微型便攜式(計(jì)算機(jī))fleet 船隊(duì),車(chē)隊(duì)malicious 有惡意的,蓄意的nickname 諢名,綽號(hào)55repairperson 維修人員roam 漫游savvy 精明的,有見(jiàn)識(shí)的unpredictable 無(wú)法預(yù)言的violation 侵害,違犯wavelength 波長(zhǎng)wireless 無(wú)線的,無(wú)線電的56[1]Wirelesstechnologiesrangefromcomplexsystems,suchaswirelesslocalareanetworks(WLAN)andcellphonestosimpledevicessuchaswirelessheadphones,microphones,andotherdevicesthatdonotprocessorstoreinformation.譯文:無(wú)線電技術(shù)的范圍從復(fù)雜的系統(tǒng)如無(wú)線局域網(wǎng)和手機(jī)到簡(jiǎn)單的設(shè)備如無(wú)線耳機(jī)、麥克風(fēng)以及其他不用來(lái)處理或儲(chǔ)存信息的設(shè)備。本句有兩處由“suchas”引導(dǎo)的同位語(yǔ)結(jié)構(gòu),“thatdo…”作定語(yǔ)。57[2]UnlikeatraditionalLAN,whichrequiresawiretoconnectauser’scomputertothenetwork,aWLANconnectcomputersandothercomponentstothenetworkusinganaccesspointdevice.譯文:與需要一根線把用戶的計(jì)算機(jī)與網(wǎng)絡(luò)連接的傳統(tǒng)局域網(wǎng)不同,無(wú)線局域網(wǎng)使用一個(gè)接入點(diǎn)裝置把計(jì)算機(jī)和其他組成部分連接到網(wǎng)絡(luò)。本句中“UnlikeatraditionalLAN”作狀語(yǔ),“which”引導(dǎo)的是非限定性定語(yǔ)從句,修飾“atraditionalLAN”,“usinganaccesspointdevice”作方式狀語(yǔ)。58[3]Ifyoufailtosecureyourwirelessnetwork,anyonewithawireless-enabledcomputerwithinrangeofyourwirelessaccesspointcanhopafreerideontheInternetoveryourwirelessconnection.譯文:如果你不能確保你的無(wú)線網(wǎng)絡(luò)的安全,任何擁有一臺(tái)能激活無(wú)線網(wǎng)絡(luò)的計(jì)算機(jī)的人,只要在你的無(wú)線接口范圍之內(nèi),就能通過(guò)你的無(wú)線連接免費(fèi)上互聯(lián)網(wǎng)。本句中“If

”引導(dǎo)的是條件狀語(yǔ)從句,“withawireless-enabledcomputerwithinrangeofyourwirelessaccesspoint”作定語(yǔ),修飾主語(yǔ)“anyone”。59[4]Whenyouuseawirelessrouteroraccesspointtocreateahomenetwork,youtradewiredconnectivityforconnectivitydeliveredviaaradiosignal.譯文:當(dāng)你使用一個(gè)無(wú)線路由器或接入點(diǎn)去建立一個(gè)家庭網(wǎng)絡(luò)時(shí),你用有線連接交換到由無(wú)線電信號(hào)傳送的連接。本句由“When”引導(dǎo)時(shí)間狀語(yǔ)從句。60[5]Becauseyourconnectionisbeingtransmitted“intheclear”,malicioususerscanuse“sniffing”toolstoobtainsensitiveinformationsuchaspasswords,bankaccountnumbers,andcreditcardnumbers.譯文:由于你的連接被暢通無(wú)阻地傳送出去,惡意用戶能夠使用“嗅探”工具來(lái)獲得敏感信息,諸如密碼、銀行賬號(hào)以及信用卡號(hào)。本句由“Because”引導(dǎo)原因狀語(yǔ)從句,“suchas”后面的部分作為“sensitiveinformation”的同位語(yǔ)。61InternetApplications

E-mailE-mailreferstothetransmissionofmessagesovercommunicationsnetworks.E-mailusestheofficememoparadigminwhichamessagecontainsaheaderthatspecifiesthesender,recipients,andsubject,followedbyabodythatcontainsthetextofthemessage.AnE-mailaddressisastringdividedintotwopartsbythe@character(pronouncedas“at”).62

SearchToolsandMethodsAsearchtoolisacomputerprogramthatperformssearches.Asearchmethodisthewayasearchtoolrequestsandretrievesinformationfrom

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

評(píng)論

0/150

提交評(píng)論