




版權(quán)說(shuō)明:本文檔由用戶(hù)提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)
文檔簡(jiǎn)介
UNIT8
TOPICS
TEXTInformationSecurity
EXERCISES
SUPPLEMENTARYVirusesCanEatYourComputerAliveCONVERSATIONEntertainingClients
WRITINGHowto
WriteEffectiveLettersofAppreciationandCongratulationTOPICS
UNIT8ThehistoryofInformationSecurity
TheconceptofInformationSecurity
ThegoalofInformationSecurity
WhatisconfidentialityofInformationSecurity?
WhatisintegrityofInformationSecurity?
WhatdoesavailabilityofInformationSecuritymean?
Doyouknowhowtomakeitsecurewhenshoppingonline?
Whatiscomputervirus?
Howtoprotectyourpersonalcomputerfromviruses?
Whatdoesfirewalltechnologymean?
Isitsecureafterinstallafirewall?
Skillsofentertainingclients.
Howtowritelettersofappreciateandcongratulation?
ComputernetworksdidnotexistatthedawnofthecomputerEra.Thus,atthistime,theneedforinformationsecurity—thatis,theneedtosecurethephysicalcomputeranditsmedia,makesuretheequipmentwasnotstolen,damaged,ormodifiedsinceeachmainframewasanisolatedmachine.TEXT
InformationSecurityDuringthe1960s,manymoremainframeswerebroughtonline.Theworkperformedbythesecomputersstartedtobecometime-criticalandbegantorequiretheuseofdataandprocesseshousedatseparatesites.Then,securitywasbecomingapopularconcern.
Atthecloseofthetwentiethcentury,theInternetbringsmillionsofcomputernetworksintocommunicationwitheachother.Thepersonalcomputerappearsonpeople’sdesktopsatworkandevenathome.Whatemergedwasalabyrinthofnetworksboastingvariousdegreesofsecurityattemptingtoaccessandshareinformationwitheachother.TheweaknessesbecameeasiertoexploitasaccesstotheInternet’sresourcesbecameeasier.
Understandingtheaspectsofinformationsecurityrequiresthedefinitionsofcertaininformationtechnologyterms.Thewordsecuritymeans“thequalityorstateofbeingsecure—tobefreefromdanger”.While,theterminformationsecuritywhichisreferredtocomputersecurityandinformationassurancemeansprotectinginformationfromunauthorizedaccess,illegaluse,disclosure,disruption,modification,perusal,inspection,recordingordestruction.
Informationsecurityisoftenachievedbymeansofseveralstrategiesandmethodssuchaspolices,standards,andstrategies.Butthecoreaimofinformationsecurityistoensuretheconfidentiality,integrityandavailability(CIA)ofcriticalsystemsandconfidentialinformation.CIAisawidelyusedbenchmarkforevaluationofinformationsystemssecurity,focusingonthethreecoregoalsof
confidentiality,integrityandavailabilityofinformation.Confidentiality
Ininformationsecurity,confidentialitymeanssecrecyofinformation.Theaimofconfidentialityistoensureprotectionagainstunauthorizedaccesstooruseofconfidentialinformation.Consider,forexample,creditcardstransactionsontheInternetarepopularwiththeageofe-tradecoming.Itrequiresthecreditcardnumbertobetransmittedfromthebuyertothemerchantandfromthemerchanttoatransactionprocessingnetwork.Thesystemattemptstoenforceconfidentialityofthecardnumberduringtransmissionbyencryptingthecardinformation.Itissaidtheconfidentialityhasoccurredifanunauthorizedpartyobtainsthecardnumberinanywayduringthetransaction.
Toprotectconfidentialityofinformation,anumberofmeasuresmaybeused,including:
Informationclassification
Securedocumentstorage
Applicationofgeneralsecuritypolices
EducationofinformationcustodiansandendusersIntegrity
Thesecondcomponentofinformationsecurityisintegrity.Theinformationcreatedandstoredbyanorganizationneedstobestableconstantly.Nowthewordintegrityisthetermthatmeansdatacannotbemodifiedundetectably.Thatistoassurethedatabeingaccessedorreadhasneitherbeentamperedwith,norbeenalteredordamagedthroughasystemerror,sincethetimeofthelastauthorizedaccess.Wheninformationisexposedtocorruption,damage,destruction,orotherdisruptionofitsauthenticstate,thatistosaytheinformationislackofintegrity.Forexample,datastoredondiskareexpectedtobestableandnotsupposedtobechanged.Integritymeansthatchangesshouldbedoneonlybyauthorizedusersandthroughauthorizedmechanisms.Availability
Ingeneral,theavailabilityofCIAistoensurethatinformationandvitalservicesareassessableforusewhenrequired.Foranysystem,theinformationmustbeavailablewhenitisneeded.Thismeansthatthecomputingsystemwhichisusedtostoreandprocesstheinformationmustbeaccessible.Forexample,researchlibrariesthatrequireidentificationbeforeentrance.Librariansprotectthecontentsofthelibrarysothattheyareavailableonlytoauthorizedusers.Highavailabilitysystemsaimtoremainavailableatalltimes,preventingservicedisruptionsduetopoweroutages,hardwarefailures,andsystemupgrades.Ensuringavailabilityalsoinvolvespreventingdenial-of-serviceattacks.
Availability,likeotheraspectsofsecurity,maybeaffectedbypurelytechnicalissues,naturalphenomena,orhumancauses.
Informationsecurityisa“well-informedsenseofassurancethattheinformationrisksandcontrolsareinbalance.”InformationSecurityisusuallyachievedthroughamixoftechnical,organizationalandlegalmeasures.Thesemayincludetheapplicationofcryptography,thehierarchicalmodelingoforganizationsinordertoassureconfidentiality,orthedistributionofaccountabilityandresponsibilitybylaw,amonginterestedparties.Ⅰ.Matchthetermsandinterpretations.1.SecurityAwareness(a)Ameasureofthedegreeofasystemwhichisintheoperableandcommittablestateatthestartofmissionwhenthemissioniscalledforatanunknownrandompointintime.EXERCISES2.Confidentiality(b)Theconversionofdataintoaformthatcannotbeeasilyunderstoodbyunauthorizedpeople.3.Integrity(c)Theknowledge,skillandattitudeanindividualpossessesregardingtheprotectionofinformationassets.
4.Availability(d)Thecharacteristicthatalterationstoasystem’sassetscanbemadeonlyinanauthorizedway.5.Encryption(e)Referstothepropertyofacomputersystemwherebyitsinformationisdisclosedonlytoauthorizedparties.
Ⅱ.ArethefollowingstatementsTrue(T)orFalse(F)?
1.()TheInternetismoresecuresincemorepeopleareusingit.
2.()Changingpasswordsonyourcomputer,andusingcombinationsoflettersandnumbers,makesiteasiertogainaccess.
3.()Informationsecuritysystemsneedtobeimplementedtoprotectpersonalstaffdetailsinmanybusinesses.
4.()Computervirusesareprogramsthatcaninfectothercomputerprograms..()Computersecurityconcernsonlywiththesoftwareanddataofcomputersystems.
6.()Databackupmeansmakingcopiesofdata.
7.()Hackermeansabadmanwhoaccessestoacomputersystem7withoutauthority.
8.()Abackupfileisacopyofafilewhichiskeptincaseanythinghappenstotheoriginalfile.
9.()Dataissaidtobecorruptonlywhenlost.
10.()Incomputersecurity,accesscontrolhasbeenwidelyusedto10managethepermissionsofuserstoaccesstheobjects.Ⅲ.TranslatethefollowingwordsandphrasesintoChinese.Ⅳ.TranslatethefollowingChinesestatementsintoEnglish.
1.互聯(lián)網(wǎng)使用得越多,對(duì)互聯(lián)網(wǎng)安全就關(guān)注得越多。
2.有效的信息安全包括了一系列政策、安全產(chǎn)品、技術(shù)等。
3.對(duì)于多數(shù)公司而言,80%的安全問(wèn)題來(lái)自于公司內(nèi)部。
4.黑客有兩種攻擊計(jì)算機(jī)系統(tǒng)的方法。
5.一個(gè)有效的保護(hù)計(jì)算機(jī)網(wǎng)絡(luò)的方法是安裝防火墻。
Ⅴ.Fillineachoftheblankswithoneofthefollowingwordsorphrases.
refertotransmittedcollectioncrimeinformation
recordedvaluabledisruptpermissiondata
Anypartofacomputingsystemcanbethetargetofa
.Whenwe
acomputingsystem,wemeana
ofhardware,software,storagemedia,
,andpeoplethatanorganizationusestoperformcomputingtasks.Sometimes,weassumethatpartsofacomputingsystemarenot
toanoutsider,butoftenwearemistaken.Forinstance,wetendtothinkthatthemostvaluablepropertyinabankisthecash,gold,orsilverinthevault.Butinfactthecustomer
inthebank’scomputermaybefarmorevaluable.Storedonpaper,
onastoragemedium,residentinmemory,or
overtelephonelinesorsatellitelinks,thisinformationcanbeusedinmyriadwaystomakemoneyillicitly.Acompetingbankcanusethisinformationtostealclientsorevento
serviceanddiscreditthebank.Anunscrupulousindividualcouldmovemoneyfromoneaccounttoanotherwithouttheowner’s
.Agroupofconartistscouldcontactlargedepositorsandconvincethemtoinvestinfraudulentschemes.Thevarietyoftargetsandattacksmakescomputersecurityverydifficult.
Ⅵ.Thefollowingisaconversationbetweencustomerandtechsupport.FillintheblankswiththehelpoftheChinesegiveninthebrackets.
TechSupport:WhatcanIdo?
Benjamin:
(我在網(wǎng)上沖浪時(shí)電腦系統(tǒng)崩潰了)
TechSupport:
(你瀏覽過(guò)非法網(wǎng)站嗎?)
Benjamin:No,butdoesthatmatter?
TechSupport:Yes,
(如果瀏覽非法網(wǎng)站,電腦很容易感染病毒)
Benjamin:Isee.I’dbetternevertry.
TechSupport:That’swise.
Benjamin:Doyouknowwhat’swrongwithmyPC?
TechSupport:Oneminute.
(哦,它中毒了,而且電腦上沒(méi)有殺毒軟件)
Benjamin:IsthesoftwarenecessaryforaPC?
TechSupport:Ofcourse.You’dbetterlearnsomethingaboutit.
Benjamin:I’mafraidyes.ButwhataboutthedataIstoredinthecomputer?
TechSupport:Don’tworry.Itshouldhavebeenprotectedautomatically.
(我有殺毒軟件,需要我?guī)湍惆惭b嗎?)
Benjamin:Yes,please.I’llreallyappreciatethat.
Systemmanagementisthedaytodayrunningofacomputersystem.Anycomputersystemthatisdoingusefulworkmustbemaintainedonaregularbasis.Buteachyear,thenumberofsecurityvulnerabilitiesdiscoveredrises,andhackingtoolsavailabletoexploitthesevulnerabilitiesbecomemorereadilyavailableandeasiertouse.SUPPLEMENTARY
VirusesCanEatYourComputerAlive
Hackerslookforwaysto“accessyourcomputerandcopy,stealoralterdatayouhavestored”.Absolutelyandwithoutquestion,thenumberonecomputing-andnetworking-relatedchallengeweallfacetodayiscomputerandnetworksecurity.
Computerandnetworksecurityproblemsaffectcorporationsandsmallbusinesses,governments,highereducation,schools,individualsandfamiliesalike—allofusarestruggling.
Nomatterhowcarefulwemightbe,computersmaybefoundinfectedwithdifferentviruses.IfusingInternetfrequentlyfordownloadingmovies,musicandotherfilesfromtheInternet,thechancesofpickingupatrojan,worm,orothervirusarealmostassured.
Avirusinvadesforsystem,erasestheharddriveandsendsrandomdocumentstoeveryoneontheuser’scontactslist.Acomputervirusisatypicallymaliciousprogramwrittentospreaditselfeasilyfromcomputertocomputer.Itssolepurposeistoinfect,corruptandultimatelybreakdownacomputersystemandanynetworkitmaybeapartof.
Acomputervirushasfewboundariesandlimitations,andwiththeglobaluseofE-mailandtheinternetallowingavirustospreadsoeasily,asimpleclickofthemousecancausealmostinstantworldwidechaos.Withoutpriorknowledgeofanypossiblevirusthatiscirculatingatthetime,thistypeofcomputervirusisimpossibletospot.TheuserwillhavenoideathatthemailthattheyhavejustclickedonandopenedhasinfectedtheirPCand,insomecases,thePCviruswillhavealreadysentitselfouttoalloftheemailaddressescontainedwithintheusersemailcontactlist.Therearesomemostcommonviruses:
ThePandaBurnsIncensecomputerworm—thiswasviruswreakedhavocformonthsinChinain2006and2007.JumpingonecomputertoanotherbytrickingusersintoopeningwhatappearedtobeafriendlyE-mailmessage,thePandafunneledpasswords,financialinformationandonlinecashbalancesleavingapandaasitscallingcard.
TheMelissaVirus—thiswasabugthathiteveryPCusers.ItwouldautomaticallyE-mailitselftootherpeoplewithoutpermission.Itcanbeextraharmfulifusingaprivatemailserver.TheMelissavirushasgonedowninhistoryasoneofthemostcommoncomputervirusesofalltime.
ATrojanhorse,orTrojan,isastandalonemaliciousprogramdesignedtogivefullcontrolofinfectedPCtootherPC.Itcanalsoperformothertypicalcomputervirusactivities.Trojanhorsescanmakecopiesofthemselves,stealinformation,orharmtheirhostcomputersystems.ThetermisderivedfromtheTrojanHorsestoryinGreekmythologybecauseTrojanhorsesattempttogivefullcontrolofPCtootherPC.
Thankfully,therearemanygreatvirusprotectionprogramsonthemarkettodaythatcaninstantlyvanquisheventhetoughestviruses,butthatdoesn’tmeantheusershouldn’thaveanideaofsomeofthecommoncomputervirusesthatarecurrentlygoingaround.
WhenusingcomputersespeciallysurfingontheInternet,therearesometipstofollow:
1.Don’tclickonpop-upadsthatadvertiseantivirusoranti-spywareprograms.Ifyouareinterestedinasecurityproduct,contacttheretailerdirectlythroughitshomepage,retailoutletorotherlegitimatecontactmethods.
2.Don’tdownloadsoftwarefromunknownsources.Somefreesoftwareapplicationsmaycomebundledwithotherprograms,includingmalware.
3.Useandregularlyupdatefirewalls,antivirus,andanti-spywareprograms.Keeptheseprogramsupdatedregularly.Usetheauto-updatefeatureifavailable.
4.Patchoperatingsystems,browsers,andothersoftwareprograms.Keepyoursystemandprogramsupdatedandpatchedsothatyourcomputerwillnotbeexposedtoknownvulnerabilitiesandattacks.
5.Regularlyscanandcleanyourcomputer.Scanyourcomputerwithyouranti-spywareonceaweek.
6.Backupyourcriticalfiles.Back-upcopiesofimportantfilesisoneofthemostfundamentalrequirementsifthecomputerbecomesinfected.在經(jīng)濟(jì)日益發(fā)達(dá)的今天,人與人之間的距離逐漸縮短。在日常工作及社會(huì)交往中,接待客戶(hù)的活動(dòng)越來(lái)越多。但是如何接待客戶(hù)對(duì)每個(gè)人而言都是一件值得學(xué)習(xí)的事。下面是在日常接待中應(yīng)該注意的事項(xiàng)。CONVERSATION
EntertainingClients
接待客戶(hù)
1.迎接禮儀迎來(lái)送往,是社會(huì)交往接待活動(dòng)中最基本的環(huán)節(jié),是表達(dá)主人情誼、體現(xiàn)禮貌素養(yǎng)的重要方面。尤其是迎接,能給客人留下重要的第一印象。通常迎接客人要有周密的部署,應(yīng)該重點(diǎn)注意以下事項(xiàng):●了解客人的車(chē)次、航班。安排與客人身份、職務(wù)相當(dāng)?shù)娜藛T前去迎接。●迎接客人時(shí)應(yīng)該提前為客人準(zhǔn)備好交通工具。將客人送往目的地后,應(yīng)對(duì)當(dāng)?shù)氐娘L(fēng)土人情、自然景觀(guān)等做簡(jiǎn)單介紹。
2.接待禮儀接待客人要注意以下幾點(diǎn):
●客人要找的負(fù)責(zé)人不在時(shí),要明確告訴對(duì)方負(fù)責(zé)人何時(shí)回來(lái)。
●客人到來(lái)時(shí),如果負(fù)責(zé)人不能馬上接見(jiàn),要向客人說(shuō)明等待理由與等待時(shí)間。
●接待人員帶領(lǐng)客人到達(dá)目的地,應(yīng)該有正確的引導(dǎo)方法和引導(dǎo)姿勢(shì)。ExampleDialogue1
A:HowcanIhelpyou?
B:Yes,IamJimMilsonfromEdisonassociate.I’dliketoseeMr.Smith.
A:Doyouhaveanappointment?
B:Yes,heknowsIamcoming.Ourmeetingisat9o’clock.
A:IwonderingifMr.Smithforgotyourmeeting.Iamafraidheleftthisofficethismorningandheisnotexpectedbackuntilafter4PM.Letmefindoutifhemadeanarrangementforsomeoneelsetomeetwithyouinhisplace.Willyoupleasehaveaseat?
B:Sure.
A:Yeah,Mr.Milson.IjustcheckedwiththeirofficemanagerMsTerry,shesaidMr.Smithbriefedheronyourproject.Sheisjustfinishingupourmeetingnow.Sheshouldbemeetingyoushortly.Wouldyoulikemetoshowyouaroundforyourwaiting?
B:Thatwouldbeverynice,thankyou!
A:RightthiswayMr.Milson.Wecanstartwithourfrontoffice.WhenMsTerryisready,youmaytakeatthefront6thfloor.Thereisaconferenceroomalreadyprepared.Dialogue2
F: Hello,Mr.Henson,welcometoBeijing!IsthisyourfirsttimetovisitChina?
M:Ohno,I’vealreadymadeseveraltripstoGuangzhou,thisismyfirsttriptoBeijing.ItisalotlargerthanIexpecteditwouldbe.
F:Yes,Beijinghasbeenbrokenoverthelastfewyears,therearealotofimprovementchangingbemadeforOlympic.Whatwouldyouliketoseewhenareyouhere?
M:IhopetohavetimetovisitGreatWallwhenIamhere.Ialwayswanttogothere.IthinkitwouldbearealshamebycameallthewayinBeijinganddidn’tmakeoutthewall.DoyouthinkIhaveachancetoseeit?
F:Icanprettysureitcanbearranged.TheWallisashortdistancefromthecity.ButwecouldmakearrangementsfordrivertotakeusouttovisittheGreatWallduringwhenourafternoonbreaks.IalsorecommendyoutovisitTian’anMenSquareandcitywhileyouaddit!
M:Yes,thatwouldbenice.WouldIhaveatourguidetotourcompletelyvisittheseplaces?
F: Don’tworry.Iwouldbeabletogoalongwithyouoverthenextfewdays.IfyouhaveanyquestionsorproblemsIwillberightheretohelpyouout.Icanbeatranslatorandtourguide.
M:Thankyouverymuch.
F:?Mypleasure.IhopeyourvisittoBeijingisveryenjoyable!Practice
ImaginethatAisasalesmanagerofABCCompany,andBisaguestofABC.AisgoingtopickBupattheairport.PleasecompletethefollowingdialoguebetweenAandBwiththegivenpoints:
Greeteachother.
Talkingaboutthetrip.
Talkingaboutthehotel.
Makeabriefintroductiontothecityandlocalcustoms.Tips招待客戶(hù)常用語(yǔ)
1.I’mXXX,fromAA.I’vecometomeetyou.我是從AA來(lái)的XXX,我是來(lái)接您的。
2.Didyouhaveapleasanttrip?/Howwasyourtrip?旅途愉快嗎?
3.IsthisthefirsttimeyoucomtoShenzhen?您是第一次來(lái)深圳嗎?
4.Thecarisintheparkinglot,thiswayplease.車(chē)在停車(chē)場(chǎng),這邊請(qǐng)。
5.Wouldyoulikeaglassofwater?/CanIgetyouacupofChineseredtea?/HowaboutaCoke?來(lái)杯水怎么樣?/我給您倒杯紅茶吧?/來(lái)杯可樂(lè)怎么樣?
6.Acupofcoffeewouldbegreat.Thanks!來(lái)杯咖啡吧。謝謝!
7.Therearemanyplaceswherewecaneat.HowaboutCantonesefood?有很多吃飯的地方?;洸嗽趺礃樱?/p>
8.Iwouldliketoinviteyouforlunch.我想請(qǐng)您吃午飯。
9.Oh,Ican’tletyoupay.Itismytreat,youaremyguest.哦,不能讓您請(qǐng)。這次我來(lái),您是客人。
10.MayIproposethatwebreakforcoffeenow?我們休息一下喝杯咖啡吧?
11.Excuseme.I’llberightback.不好意思,我馬上回來(lái)。
12.Haveagoodjourney!祝您旅途愉快!
13.ThankyouverymuchforeverythingyouhavedoneusduringourstayinChina.謝謝您為我們?cè)谥袊?guó)期間所做的一切。
14.I’mlookingforwardtoseeingyouagain.希望能再次見(jiàn)到您。
15.Thereisawelcomingdinnertomorrownight.明晚將有一個(gè)接風(fēng)宴。
16.
Iwilltakeyouonacitytourtomorrowmorning.
明天上午我會(huì)帶您瀏覽市容。
17.
Wouldyoupleasetellmewhenyouarefree?能告訴我您什么時(shí)候有空嗎?
18.
I’mafraidIhavetocancelmyappointment.恐怕我得取消約會(huì)了。
19.
Willyouchangeourappointmenttomorrowat10:00a.m.tothedayaftertomorrowatthesametime?我們的約會(huì)是不是要從明天上午10點(diǎn)改到后天同一時(shí)間?
20.Wouldyouliketogothroughourfactorysometime?什么時(shí)候來(lái)參觀(guān)我們的工廠(chǎng)吧?
21.Thankyouforcomingtoday.謝謝您的蒞臨。
22.Wouldn’tyouliketospendanextradayortwohere?您不愿意在這里多待一兩天嗎?
23.Whencanweworkoutadeal?我們什么時(shí)候洽談生意?
24.I’dappreciateyourkindconsiderationinthecomingdays.在接下來(lái)的幾天里還請(qǐng)多關(guān)照。在日常生活和社會(huì)交往中,我們常常會(huì)得到別人的幫助、招待、饋贈(zèng)、慰問(wèn)等。而感謝信作為一種禮儀文書(shū),主要用來(lái)向?qū)Ψ奖硎境鲎匀磺页錆M(mǎn)真摯的感謝之情。感謝信在寫(xiě)作時(shí)通常篇幅較短,直接表達(dá)對(duì)對(duì)方的感謝之情。WRITING
HowtoWriteEffectiveLettersofAppreciation
and
Congratulation
如何寫(xiě)感謝信及祝賀信
在英語(yǔ)寫(xiě)作中,祝賀信使用的頻率很高。在同學(xué)、同事、朋友或者親戚取得成績(jī)、獲得獎(jiǎng)勵(lì)以及結(jié)婚、生子、生日、晉升等情況下,通常要寫(xiě)祝賀信以表達(dá)我們的祝賀之情。祝賀信用詞必須親切有禮、表達(dá)出真誠(chéng)的喜悅之情。英語(yǔ)感謝信和祝賀信的寫(xiě)作格式類(lèi)似,主要由以下幾部分組成:信頭(heading),即發(fā)信人的地址和日期(右上角);稱(chēng)呼(salutation),即對(duì)收信人的尊稱(chēng)(一般用DearMr…,DearMadam…,DearMiss…等);正文(body),即感謝信或祝賀信的主要內(nèi)容,通常正文第一句和稱(chēng)呼之間要空一至二行;信尾客套話(huà)(complimentaryclose)或祝賀詞,即寫(xiě)信人在信的右(或左)下角寫(xiě)上表示自己對(duì)收信人的一種禮貌客氣的謙稱(chēng)或者再次表示感謝或祝賀。Example
DearMrs.Beck,
Howdidyoueverfindthosewonderfulglasses?Theyareperfect,andJimandIwanttothankyouathousandtimes!
Thepresentswillbeshownonthedayofthewedding,butdocomeoverThursdaymorningifyoucanforacupofcoffee.
Thankyouagain,andwithlovefromusboth.
Mary
親愛(ài)的貝克太太:您是怎樣
溫馨提示
- 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
- 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
- 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
- 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
- 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
- 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
- 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。
最新文檔
- 2025年中國(guó)金紅石市場(chǎng)調(diào)查研究報(bào)告
- 2025年中國(guó)聚乙基吡咯烷酮市場(chǎng)調(diào)查研究報(bào)告
- ?;穫}(cāng)儲(chǔ)項(xiàng)目可行性分析報(bào)告
- 汽車(chē)墻體廣告合同范本
- 老油井采油技術(shù)設(shè)備系統(tǒng)集成產(chǎn)業(yè)化項(xiàng)目商業(yè)計(jì)劃書(shū)
- 管理信息試卷
- 人教版小學(xué)五年級(jí)英語(yǔ)上冊(cè)全冊(cè)教案及反思
- 全員營(yíng)銷(xiāo)基礎(chǔ)知識(shí)培訓(xùn)
- 高壓絕緣子用液體硅橡膠總體規(guī)模、主要生產(chǎn)商、主要地區(qū)、產(chǎn)品和應(yīng)用細(xì)分研究報(bào)告
- 廢水處理站EPC總承包項(xiàng)目可行性分析報(bào)告
- 借用品牌合同范本
- 噴灑除草劑安全協(xié)議書(shū)(2篇)
- LTE-V2X系統(tǒng)性能要求及測(cè)試規(guī)范
- 2025年北森題庫(kù)測(cè)試題及答案
- 2025年美容師初級(jí)技能水平測(cè)試卷:美容師美容護(hù)膚實(shí)操技能試題匯編
- 茶館里的政治:揭秘《茶館》背后的歷史
- 跨學(xué)科實(shí)踐活動(dòng)5探究土壤酸堿性對(duì)植物生長(zhǎng)的影響教學(xué)設(shè)計(jì)-2024-2025學(xué)年九年級(jí)化學(xué)魯教版下冊(cè)
- 國(guó)望液晶數(shù)顯切紙機(jī)安全操作規(guī)程
- 《國(guó)際跳棋教學(xué)》課件
- 詳解2021年《關(guān)于優(yōu)化生育政策促進(jìn)人口長(zhǎng)期均衡發(fā)展的決定》ppt
- 游泳池經(jīng)營(yíng)方案
評(píng)論
0/150
提交評(píng)論