首页 > 题库 > 考研考博 > 考博英语 > 武汉大学 > 翻译题

1.One of the fastest growing areas in Internet applications is the adoption of Internet technologies for the development of corporate networks. Many public sectors and commercial organizations throughout the world are accelerating their paces in building corporate networks based on Internet technologies, allowing them to roll out their private “Intranets”. These Intranets are used to support enterprise applications and communications both inside and outside the corporate firewall.
2.Intranet is the new buzz word referring to the use of fast growing and relatively inexpensive Internet technologies for the development of enterprise information and communication systems. It generally involves two key types of software: the “browser” which allows users to scan the network for useful information and the “server” which stores and organizes the information. Major IT vendors have announced or are planning to announce products and services which will help their customers in realizing the competitive advantages made possible by these new technologies. For example,Oracle and Sybase have unveiled their plans to introduce browsers that include application development tools based on Java, a programming language licensed from Sun Microsystems Inc. These new toolsets will allow developers to write network-connection-ready, web-enabled applications that link to corporate databases.
The creation of private intranets provides opportunities for companies to use the Web as a complement or an alternative for traditional internal networking, application development tools and groupware products. 3. For example, Morgan Stanley and Turner Broadcasting have successfully implemented their own Intranets which allow their employees to share information, collaborate on projects, and to create very effective workgroups spreading across large geographical regions.
With improved security design on the Intranet which can be bridged into the Internet, many companies are developing new business applications which were not technically feasible nor economically viable in the past. For example, shipping companies and courier companies can build cargo and parcel tracking systems which allow their international customers, anywhere in the world, to log onto their local Internet networks to access secured databases to retrieve the latest information about their shipments.
One of the most often quoted criticisms of Internet when being considered for serious business applications is its security risk, or its perceived inadequacy of security features. Many feel that the Internet is distributed and “uncontrolled”. By its very own nature, there is no single organization owning the Internet, running it or can be held responsible for it in the conventional sense. Intrusion may come from anywhere in the world. To further complicate the matter, legislation and law enforcement concerning electronic crimes vary greatly from one country to another. This presents great challenges in the prosecution of crimes committed using the Internet.
While some of these feelings and observations are correct, many Internet technology providers throughout the world are working very aggressively in solving the problems concerning Internet security. Using cryptographic techniques and network management technologies, Internet can be as secured as any private networks used in the financial, commercial and national defense applications.
The Internet is a global technology. It will affect, in many aspects, the way that we interact with people, conduct our business transactions. It will also change the way that we acquire and share experience and knowledge. 4. It unavoidably will alter our sense of community and remove some of the constraints previously associated with geographical boundaries. The Internet and Intranet are presenting opportunities and challenges to individuals and enterprises. They will reward those with the ability and vision to harness their power, realizing their constraints and capable of developing solutions in overcoming these limitations.

Directions:Read the following passage, and then translate the underlined parts numbered from (1) to(4) , from English into Chinese. Please write your answer on the ANSWER SHEET.

参考答案: 查看答案 查看解析 查看视频解析 下载APP畅快刷题

相关知识点试题

相关试卷