《計(jì)算機(jī)專(zhuān)業(yè)英語(yǔ)》課件第8章_第1頁(yè)
《計(jì)算機(jī)專(zhuān)業(yè)英語(yǔ)》課件第8章_第2頁(yè)
《計(jì)算機(jī)專(zhuān)業(yè)英語(yǔ)》課件第8章_第3頁(yè)
《計(jì)算機(jī)專(zhuān)業(yè)英語(yǔ)》課件第8章_第4頁(yè)
《計(jì)算機(jī)專(zhuān)業(yè)英語(yǔ)》課件第8章_第5頁(yè)
已閱讀5頁(yè),還剩62頁(yè)未讀, 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說(shuō)明:本文檔由用戶(hù)提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡(jiǎn)介

UNIT8

TOPICS

TEXTInformationSecurity

EXERCISES

SUPPLEMENTARYVirusesCanEatYourComputerAliveCONVERSATIONEntertainingClients

WRITINGHowto

WriteEffectiveLettersofAppreciationandCongratulationTOPICS

UNIT8ThehistoryofInformationSecurity

TheconceptofInformationSecurity

ThegoalofInformationSecurity

WhatisconfidentialityofInformationSecurity?

WhatisintegrityofInformationSecurity?

WhatdoesavailabilityofInformationSecuritymean?

Doyouknowhowtomakeitsecurewhenshoppingonline?

Whatiscomputervirus?

Howtoprotectyourpersonalcomputerfromviruses?

Whatdoesfirewalltechnologymean?

Isitsecureafterinstallafirewall?

Skillsofentertainingclients.

Howtowritelettersofappreciateandcongratulation?

ComputernetworksdidnotexistatthedawnofthecomputerEra.Thus,atthistime,theneedforinformationsecurity—thatis,theneedtosecurethephysicalcomputeranditsmedia,makesuretheequipmentwasnotstolen,damaged,ormodifiedsinceeachmainframewasanisolatedmachine.TEXT

InformationSecurityDuringthe1960s,manymoremainframeswerebroughtonline.Theworkperformedbythesecomputersstartedtobecometime-criticalandbegantorequiretheuseofdataandprocesseshousedatseparatesites.Then,securitywasbecomingapopularconcern.

Atthecloseofthetwentiethcentury,theInternetbringsmillionsofcomputernetworksintocommunicationwitheachother.Thepersonalcomputerappearsonpeople’sdesktopsatworkandevenathome.Whatemergedwasalabyrinthofnetworksboastingvariousdegreesofsecurityattemptingtoaccessandshareinformationwitheachother.TheweaknessesbecameeasiertoexploitasaccesstotheInternet’sresourcesbecameeasier.

Understandingtheaspectsofinformationsecurityrequiresthedefinitionsofcertaininformationtechnologyterms.Thewordsecuritymeans“thequalityorstateofbeingsecure—tobefreefromdanger”.While,theterminformationsecuritywhichisreferredtocomputersecurityandinformationassurancemeansprotectinginformationfromunauthorizedaccess,illegaluse,disclosure,disruption,modification,perusal,inspection,recordingordestruction.

Informationsecurityisoftenachievedbymeansofseveralstrategiesandmethodssuchaspolices,standards,andstrategies.Butthecoreaimofinformationsecurityistoensuretheconfidentiality,integrityandavailability(CIA)ofcriticalsystemsandconfidentialinformation.CIAisawidelyusedbenchmarkforevaluationofinformationsystemssecurity,focusingonthethreecoregoalsof

confidentiality,integrityandavailabilityofinformation.Confidentiality

Ininformationsecurity,confidentialitymeanssecrecyofinformation.Theaimofconfidentialityistoensureprotectionagainstunauthorizedaccesstooruseofconfidentialinformation.Consider,forexample,creditcardstransactionsontheInternetarepopularwiththeageofe-tradecoming.Itrequiresthecreditcardnumbertobetransmittedfromthebuyertothemerchantandfromthemerchanttoatransactionprocessingnetwork.Thesystemattemptstoenforceconfidentialityofthecardnumberduringtransmissionbyencryptingthecardinformation.Itissaidtheconfidentialityhasoccurredifanunauthorizedpartyobtainsthecardnumberinanywayduringthetransaction.

Toprotectconfidentialityofinformation,anumberofmeasuresmaybeused,including:

Informationclassification

Securedocumentstorage

Applicationofgeneralsecuritypolices

EducationofinformationcustodiansandendusersIntegrity

Thesecondcomponentofinformationsecurityisintegrity.Theinformationcreatedandstoredbyanorganizationneedstobestableconstantly.Nowthewordintegrityisthetermthatmeansdatacannotbemodifiedundetectably.Thatistoassurethedatabeingaccessedorreadhasneitherbeentamperedwith,norbeenalteredordamagedthroughasystemerror,sincethetimeofthelastauthorizedaccess.Wheninformationisexposedtocorruption,damage,destruction,orotherdisruptionofitsauthenticstate,thatistosaytheinformationislackofintegrity.Forexample,datastoredondiskareexpectedtobestableandnotsupposedtobechanged.Integritymeansthatchangesshouldbedoneonlybyauthorizedusersandthroughauthorizedmechanisms.Availability

Ingeneral,theavailabilityofCIAistoensurethatinformationandvitalservicesareassessableforusewhenrequired.Foranysystem,theinformationmustbeavailablewhenitisneeded.Thismeansthatthecomputingsystemwhichisusedtostoreandprocesstheinformationmustbeaccessible.Forexample,researchlibrariesthatrequireidentificationbeforeentrance.Librariansprotectthecontentsofthelibrarysothattheyareavailableonlytoauthorizedusers.Highavailabilitysystemsaimtoremainavailableatalltimes,preventingservicedisruptionsduetopoweroutages,hardwarefailures,andsystemupgrades.Ensuringavailabilityalsoinvolvespreventingdenial-of-serviceattacks.

Availability,likeotheraspectsofsecurity,maybeaffectedbypurelytechnicalissues,naturalphenomena,orhumancauses.

Informationsecurityisa“well-informedsenseofassurancethattheinformationrisksandcontrolsareinbalance.”InformationSecurityisusuallyachievedthroughamixoftechnical,organizationalandlegalmeasures.Thesemayincludetheapplicationofcryptography,thehierarchicalmodelingoforganizationsinordertoassureconfidentiality,orthedistributionofaccountabilityandresponsibilitybylaw,amonginterestedparties.Ⅰ.Matchthetermsandinterpretations.1.SecurityAwareness(a)Ameasureofthedegreeofasystemwhichisintheoperableandcommittablestateatthestartofmissionwhenthemissioniscalledforatanunknownrandompointintime.EXERCISES2.Confidentiality(b)Theconversionofdataintoaformthatcannotbeeasilyunderstoodbyunauthorizedpeople.3.Integrity(c)Theknowledge,skillandattitudeanindividualpossessesregardingtheprotectionofinformationassets.

4.Availability(d)Thecharacteristicthatalterationstoasystem’sassetscanbemadeonlyinanauthorizedway.5.Encryption(e)Referstothepropertyofacomputersystemwherebyitsinformationisdisclosedonlytoauthorizedparties.

Ⅱ.ArethefollowingstatementsTrue(T)orFalse(F)?

1.()TheInternetismoresecuresincemorepeopleareusingit.

2.()Changingpasswordsonyourcomputer,andusingcombinationsoflettersandnumbers,makesiteasiertogainaccess.

3.()Informationsecuritysystemsneedtobeimplementedtoprotectpersonalstaffdetailsinmanybusinesses.

4.()Computervirusesareprogramsthatcaninfectothercomputerprograms..()Computersecurityconcernsonlywiththesoftwareanddataofcomputersystems.

6.()Databackupmeansmakingcopiesofdata.

7.()Hackermeansabadmanwhoaccessestoacomputersystem7withoutauthority.

8.()Abackupfileisacopyofafilewhichiskeptincaseanythinghappenstotheoriginalfile.

9.()Dataissaidtobecorruptonlywhenlost.

10.()Incomputersecurity,accesscontrolhasbeenwidelyusedto10managethepermissionsofuserstoaccesstheobjects.Ⅲ.TranslatethefollowingwordsandphrasesintoChinese.Ⅳ.TranslatethefollowingChinesestatementsintoEnglish.

1.互聯(lián)網(wǎng)使用得越多,對(duì)互聯(lián)網(wǎng)安全就關(guān)注得越多。

2.有效的信息安全包括了一系列政策、安全產(chǎn)品、技術(shù)等。

3.對(duì)于多數(shù)公司而言,80%的安全問(wèn)題來(lái)自于公司內(nèi)部。

4.黑客有兩種攻擊計(jì)算機(jī)系統(tǒng)的方法。

5.一個(gè)有效的保護(hù)計(jì)算機(jī)網(wǎng)絡(luò)的方法是安裝防火墻。

Ⅴ.Fillineachoftheblankswithoneofthefollowingwordsorphrases.

refertotransmittedcollectioncrimeinformation

recordedvaluabledisruptpermissiondata

Anypartofacomputingsystemcanbethetargetofa

.Whenwe

acomputingsystem,wemeana

ofhardware,software,storagemedia,

,andpeoplethatanorganizationusestoperformcomputingtasks.Sometimes,weassumethatpartsofacomputingsystemarenot

toanoutsider,butoftenwearemistaken.Forinstance,wetendtothinkthatthemostvaluablepropertyinabankisthecash,gold,orsilverinthevault.Butinfactthecustomer

inthebank’scomputermaybefarmorevaluable.Storedonpaper,

onastoragemedium,residentinmemory,or

overtelephonelinesorsatellitelinks,thisinformationcanbeusedinmyriadwaystomakemoneyillicitly.Acompetingbankcanusethisinformationtostealclientsorevento

serviceanddiscreditthebank.Anunscrupulousindividualcouldmovemoneyfromoneaccounttoanotherwithouttheowner’s

.Agroupofconartistscouldcontactlargedepositorsandconvincethemtoinvestinfraudulentschemes.Thevarietyoftargetsandattacksmakescomputersecurityverydifficult.

Ⅵ.Thefollowingisaconversationbetweencustomerandtechsupport.FillintheblankswiththehelpoftheChinesegiveninthebrackets.

TechSupport:WhatcanIdo?

Benjamin:

(我在網(wǎng)上沖浪時(shí)電腦系統(tǒng)崩潰了)

TechSupport:

(你瀏覽過(guò)非法網(wǎng)站嗎?)

Benjamin:No,butdoesthatmatter?

TechSupport:Yes,

(如果瀏覽非法網(wǎng)站,電腦很容易感染病毒)

Benjamin:Isee.I’dbetternevertry.

TechSupport:That’swise.

Benjamin:Doyouknowwhat’swrongwithmyPC?

TechSupport:Oneminute.

(哦,它中毒了,而且電腦上沒(méi)有殺毒軟件)

Benjamin:IsthesoftwarenecessaryforaPC?

TechSupport:Ofcourse.You’dbetterlearnsomethingaboutit.

Benjamin:I’mafraidyes.ButwhataboutthedataIstoredinthecomputer?

TechSupport:Don’tworry.Itshouldhavebeenprotectedautomatically.

(我有殺毒軟件,需要我?guī)湍惆惭b嗎?)

Benjamin:Yes,please.I’llreallyappreciatethat.

Systemmanagementisthedaytodayrunningofacomputersystem.Anycomputersystemthatisdoingusefulworkmustbemaintainedonaregularbasis.Buteachyear,thenumberofsecurityvulnerabilitiesdiscoveredrises,andhackingtoolsavailabletoexploitthesevulnerabilitiesbecomemorereadilyavailableandeasiertouse.SUPPLEMENTARY

VirusesCanEatYourComputerAlive

Hackerslookforwaysto“accessyourcomputerandcopy,stealoralterdatayouhavestored”.Absolutelyandwithoutquestion,thenumberonecomputing-andnetworking-relatedchallengeweallfacetodayiscomputerandnetworksecurity.

Computerandnetworksecurityproblemsaffectcorporationsandsmallbusinesses,governments,highereducation,schools,individualsandfamiliesalike—allofusarestruggling.

Nomatterhowcarefulwemightbe,computersmaybefoundinfectedwithdifferentviruses.IfusingInternetfrequentlyfordownloadingmovies,musicandotherfilesfromtheInternet,thechancesofpickingupatrojan,worm,orothervirusarealmostassured.

Avirusinvadesforsystem,erasestheharddriveandsendsrandomdocumentstoeveryoneontheuser’scontactslist.Acomputervirusisatypicallymaliciousprogramwrittentospreaditselfeasilyfromcomputertocomputer.Itssolepurposeistoinfect,corruptandultimatelybreakdownacomputersystemandanynetworkitmaybeapartof.

Acomputervirushasfewboundariesandlimitations,andwiththeglobaluseofE-mailandtheinternetallowingavirustospreadsoeasily,asimpleclickofthemousecancausealmostinstantworldwidechaos.Withoutpriorknowledgeofanypossiblevirusthatiscirculatingatthetime,thistypeofcomputervirusisimpossibletospot.TheuserwillhavenoideathatthemailthattheyhavejustclickedonandopenedhasinfectedtheirPCand,insomecases,thePCviruswillhavealreadysentitselfouttoalloftheemailaddressescontainedwithintheusersemailcontactlist.Therearesomemostcommonviruses:

ThePandaBurnsIncensecomputerworm—thiswasviruswreakedhavocformonthsinChinain2006and2007.JumpingonecomputertoanotherbytrickingusersintoopeningwhatappearedtobeafriendlyE-mailmessage,thePandafunneledpasswords,financialinformationandonlinecashbalancesleavingapandaasitscallingcard.

TheMelissaVirus—thiswasabugthathiteveryPCusers.ItwouldautomaticallyE-mailitselftootherpeoplewithoutpermission.Itcanbeextraharmfulifusingaprivatemailserver.TheMelissavirushasgonedowninhistoryasoneofthemostcommoncomputervirusesofalltime.

ATrojanhorse,orTrojan,isastandalonemaliciousprogramdesignedtogivefullcontrolofinfectedPCtootherPC.Itcanalsoperformothertypicalcomputervirusactivities.Trojanhorsescanmakecopiesofthemselves,stealinformation,orharmtheirhostcomputersystems.ThetermisderivedfromtheTrojanHorsestoryinGreekmythologybecauseTrojanhorsesattempttogivefullcontrolofPCtootherPC.

Thankfully,therearemanygreatvirusprotectionprogramsonthemarkettodaythatcaninstantlyvanquisheventhetoughestviruses,butthatdoesn’tmeantheusershouldn’thaveanideaofsomeofthecommoncomputervirusesthatarecurrentlygoingaround.

WhenusingcomputersespeciallysurfingontheInternet,therearesometipstofollow:

1.Don’tclickonpop-upadsthatadvertiseantivirusoranti-spywareprograms.Ifyouareinterestedinasecurityproduct,contacttheretailerdirectlythroughitshomepage,retailoutletorotherlegitimatecontactmethods.

2.Don’tdownloadsoftwarefromunknownsources.Somefreesoftwareapplicationsmaycomebundledwithotherprograms,includingmalware.

3.Useandregularlyupdatefirewalls,antivirus,andanti-spywareprograms.Keeptheseprogramsupdatedregularly.Usetheauto-updatefeatureifavailable.

4.Patchoperatingsystems,browsers,andothersoftwareprograms.Keepyoursystemandprogramsupdatedandpatchedsothatyourcomputerwillnotbeexposedtoknownvulnerabilitiesandattacks.

5.Regularlyscanandcleanyourcomputer.Scanyourcomputerwithyouranti-spywareonceaweek.

6.Backupyourcriticalfiles.Back-upcopiesofimportantfilesisoneofthemostfundamentalrequirementsifthecomputerbecomesinfected.在經(jīng)濟(jì)日益發(fā)達(dá)的今天,人與人之間的距離逐漸縮短。在日常工作及社會(huì)交往中,接待客戶(hù)的活動(dòng)越來(lái)越多。但是如何接待客戶(hù)對(duì)每個(gè)人而言都是一件值得學(xué)習(xí)的事。下面是在日常接待中應(yīng)該注意的事項(xiàng)。CONVERSATION

EntertainingClients

接待客戶(hù)

1.迎接禮儀迎來(lái)送往,是社會(huì)交往接待活動(dòng)中最基本的環(huán)節(jié),是表達(dá)主人情誼、體現(xiàn)禮貌素養(yǎng)的重要方面。尤其是迎接,能給客人留下重要的第一印象。通常迎接客人要有周密的部署,應(yīng)該重點(diǎn)注意以下事項(xiàng):●了解客人的車(chē)次、航班。安排與客人身份、職務(wù)相當(dāng)?shù)娜藛T前去迎接。●迎接客人時(shí)應(yīng)該提前為客人準(zhǔn)備好交通工具。將客人送往目的地后,應(yīng)對(duì)當(dāng)?shù)氐娘L(fēng)土人情、自然景觀(guān)等做簡(jiǎn)單介紹。

2.接待禮儀接待客人要注意以下幾點(diǎn):

●客人要找的負(fù)責(zé)人不在時(shí),要明確告訴對(duì)方負(fù)責(zé)人何時(shí)回來(lái)。

●客人到來(lái)時(shí),如果負(fù)責(zé)人不能馬上接見(jiàn),要向客人說(shuō)明等待理由與等待時(shí)間。

●接待人員帶領(lǐng)客人到達(dá)目的地,應(yīng)該有正確的引導(dǎo)方法和引導(dǎo)姿勢(shì)。ExampleDialogue1

A:HowcanIhelpyou?

B:Yes,IamJimMilsonfromEdisonassociate.I’dliketoseeMr.Smith.

A:Doyouhaveanappointment?

B:Yes,heknowsIamcoming.Ourmeetingisat9o’clock.

A:IwonderingifMr.Smithforgotyourmeeting.Iamafraidheleftthisofficethismorningandheisnotexpectedbackuntilafter4PM.Letmefindoutifhemadeanarrangementforsomeoneelsetomeetwithyouinhisplace.Willyoupleasehaveaseat?

B:Sure.

A:Yeah,Mr.Milson.IjustcheckedwiththeirofficemanagerMsTerry,shesaidMr.Smithbriefedheronyourproject.Sheisjustfinishingupourmeetingnow.Sheshouldbemeetingyoushortly.Wouldyoulikemetoshowyouaroundforyourwaiting?

B:Thatwouldbeverynice,thankyou!

A:RightthiswayMr.Milson.Wecanstartwithourfrontoffice.WhenMsTerryisready,youmaytakeatthefront6thfloor.Thereisaconferenceroomalreadyprepared.Dialogue2

F: Hello,Mr.Henson,welcometoBeijing!IsthisyourfirsttimetovisitChina?

M:Ohno,I’vealreadymadeseveraltripstoGuangzhou,thisismyfirsttriptoBeijing.ItisalotlargerthanIexpecteditwouldbe.

F:Yes,Beijinghasbeenbrokenoverthelastfewyears,therearealotofimprovementchangingbemadeforOlympic.Whatwouldyouliketoseewhenareyouhere?

M:IhopetohavetimetovisitGreatWallwhenIamhere.Ialwayswanttogothere.IthinkitwouldbearealshamebycameallthewayinBeijinganddidn’tmakeoutthewall.DoyouthinkIhaveachancetoseeit?

F:Icanprettysureitcanbearranged.TheWallisashortdistancefromthecity.ButwecouldmakearrangementsfordrivertotakeusouttovisittheGreatWallduringwhenourafternoonbreaks.IalsorecommendyoutovisitTian’anMenSquareandcitywhileyouaddit!

M:Yes,thatwouldbenice.WouldIhaveatourguidetotourcompletelyvisittheseplaces?

F: Don’tworry.Iwouldbeabletogoalongwithyouoverthenextfewdays.IfyouhaveanyquestionsorproblemsIwillberightheretohelpyouout.Icanbeatranslatorandtourguide.

M:Thankyouverymuch.

F:?Mypleasure.IhopeyourvisittoBeijingisveryenjoyable!Practice

ImaginethatAisasalesmanagerofABCCompany,andBisaguestofABC.AisgoingtopickBupattheairport.PleasecompletethefollowingdialoguebetweenAandBwiththegivenpoints:

Greeteachother.

Talkingaboutthetrip.

Talkingaboutthehotel.

Makeabriefintroductiontothecityandlocalcustoms.Tips招待客戶(hù)常用語(yǔ)

1.I’mXXX,fromAA.I’vecometomeetyou.我是從AA來(lái)的XXX,我是來(lái)接您的。

2.Didyouhaveapleasanttrip?/Howwasyourtrip?旅途愉快嗎?

3.IsthisthefirsttimeyoucomtoShenzhen?您是第一次來(lái)深圳嗎?

4.Thecarisintheparkinglot,thiswayplease.車(chē)在停車(chē)場(chǎng),這邊請(qǐng)。

5.Wouldyoulikeaglassofwater?/CanIgetyouacupofChineseredtea?/HowaboutaCoke?來(lái)杯水怎么樣?/我給您倒杯紅茶吧?/來(lái)杯可樂(lè)怎么樣?

6.Acupofcoffeewouldbegreat.Thanks!來(lái)杯咖啡吧。謝謝!

7.Therearemanyplaceswherewecaneat.HowaboutCantonesefood?有很多吃飯的地方?;洸嗽趺礃樱?/p>

8.Iwouldliketoinviteyouforlunch.我想請(qǐng)您吃午飯。

9.Oh,Ican’tletyoupay.Itismytreat,youaremyguest.哦,不能讓您請(qǐng)。這次我來(lái),您是客人。

10.MayIproposethatwebreakforcoffeenow?我們休息一下喝杯咖啡吧?

11.Excuseme.I’llberightback.不好意思,我馬上回來(lái)。

12.Haveagoodjourney!祝您旅途愉快!

13.ThankyouverymuchforeverythingyouhavedoneusduringourstayinChina.謝謝您為我們?cè)谥袊?guó)期間所做的一切。

14.I’mlookingforwardtoseeingyouagain.希望能再次見(jiàn)到您。

15.Thereisawelcomingdinnertomorrownight.明晚將有一個(gè)接風(fēng)宴。

16.

Iwilltakeyouonacitytourtomorrowmorning.

明天上午我會(huì)帶您瀏覽市容。

17.

Wouldyoupleasetellmewhenyouarefree?能告訴我您什么時(shí)候有空嗎?

18.

I’mafraidIhavetocancelmyappointment.恐怕我得取消約會(huì)了。

19.

Willyouchangeourappointmenttomorrowat10:00a.m.tothedayaftertomorrowatthesametime?我們的約會(huì)是不是要從明天上午10點(diǎn)改到后天同一時(shí)間?

20.Wouldyouliketogothroughourfactorysometime?什么時(shí)候來(lái)參觀(guān)我們的工廠(chǎng)吧?

21.Thankyouforcomingtoday.謝謝您的蒞臨。

22.Wouldn’tyouliketospendanextradayortwohere?您不愿意在這里多待一兩天嗎?

23.Whencanweworkoutadeal?我們什么時(shí)候洽談生意?

24.I’dappreciateyourkindconsiderationinthecomingdays.在接下來(lái)的幾天里還請(qǐng)多關(guān)照。在日常生活和社會(huì)交往中,我們常常會(huì)得到別人的幫助、招待、饋贈(zèng)、慰問(wèn)等。而感謝信作為一種禮儀文書(shū),主要用來(lái)向?qū)Ψ奖硎境鲎匀磺页錆M(mǎn)真摯的感謝之情。感謝信在寫(xiě)作時(shí)通常篇幅較短,直接表達(dá)對(duì)對(duì)方的感謝之情。WRITING

HowtoWriteEffectiveLettersofAppreciation

and

Congratulation

如何寫(xiě)感謝信及祝賀信

在英語(yǔ)寫(xiě)作中,祝賀信使用的頻率很高。在同學(xué)、同事、朋友或者親戚取得成績(jī)、獲得獎(jiǎng)勵(lì)以及結(jié)婚、生子、生日、晉升等情況下,通常要寫(xiě)祝賀信以表達(dá)我們的祝賀之情。祝賀信用詞必須親切有禮、表達(dá)出真誠(chéng)的喜悅之情。英語(yǔ)感謝信和祝賀信的寫(xiě)作格式類(lèi)似,主要由以下幾部分組成:信頭(heading),即發(fā)信人的地址和日期(右上角);稱(chēng)呼(salutation),即對(duì)收信人的尊稱(chēng)(一般用DearMr…,DearMadam…,DearMiss…等);正文(body),即感謝信或祝賀信的主要內(nèi)容,通常正文第一句和稱(chēng)呼之間要空一至二行;信尾客套話(huà)(complimentaryclose)或祝賀詞,即寫(xiě)信人在信的右(或左)下角寫(xiě)上表示自己對(duì)收信人的一種禮貌客氣的謙稱(chēng)或者再次表示感謝或祝賀。Example

DearMrs.Beck,

Howdidyoueverfindthosewonderfulglasses?Theyareperfect,andJimandIwanttothankyouathousandtimes!

Thepresentswillbeshownonthedayofthewedding,butdocomeoverThursdaymorningifyoucanforacupofcoffee.

Thankyouagain,andwithlovefromusboth.

Mary

親愛(ài)的貝克太太:您是怎樣

溫馨提示

  • 1. 本站所有資源如無(wú)特殊說(shuō)明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶(hù)所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁(yè)內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒(méi)有圖紙預(yù)覽就沒(méi)有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫(kù)網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶(hù)上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶(hù)上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶(hù)因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論