跪求翻译一段英文!急!!!

Anexperiencedconsultant,TrudyYang,hadbeencontractedtoevaluatetheITcontrolsofamedium-s... An experienced consultant,Trudy Yang,had been contracted to evaluate the IT controls of a medium-sized distribution firm based in Malaysia that sold medical supplied. From observation,Yang noted that confidential company data was encrypted when it was stored in digital format. She noted that access to sensitive company formation was carefully controlled and monitored. She also saw that access controls were reviewed regularly to take into account staffing changes, as advised by the Human Resource Department.

Yang examined the effectiveness of the controls that were in place for the integrity of the business processes. She noted that the company mailed turn-around documents to its non-regular customers, which were returned with the payment. As far as it was possible, the firm's data entry was performed online. A range of input validation routines was used when data were input into the company's systems. System output was cheked for reasonableness by trained staff, and key elements of the financial reports were verified with independent sources. Every three months the inventory was counted and the results were reconciled against the quantities stated in accounting records.

The company invested in the development of a comprehensive disaster recovery and business continuity plan in 2006 by an industry expert, but had seen no need to review it since then. As the exptert was highly experienced and no disaster had ever occured in the company's 20 years of operations, the plan had never been tested. However arrangements were in place for a hot site in another district of Kuala Lumpur. Yang examined the company's backup procedures closely. While all files were backed up weekly each Saturday onto DVDs, incremental backups occured every night at midnight. Because the company knew that its IT staff was well qualified, it had not practised restoring the data from the backups. The backups were unencrypted to allow faster restoration from the backups, if needed. A backup was stored on-site in the computer server room on a shelf near the door, again so that it could be located easily if a disaster took place.
展开
文武齐龙
2010-10-22 · TA获得超过6356个赞
知道大有可为答主
回答量:1123
采纳率:0%
帮助的人:802万
展开全部
An experienced consultant,Trudy Yang,had been contracted to evaluate the IT controls of a medium-sized distribution firm based in Malaysia that sold medical supplied. From observation,Yang noted that confidential company data was encrypted when it was stored in digital format. She noted that access to sensitive company formation was carefully controlled and monitored. She also saw that access controls were reviewed regularly to take into account staffing changes, as advised by the Human Resource Department.
特鲁迪 杨,作为一个经验丰富的顾问,受聘于一家在马来群岛上、以销售医用设备为主的中等规模的公司。通过观察,杨发现,公司数据在输入到电子硬盘之前都会进行加密。她同时注意到,接触公司敏感信息的行为都会收到严密的监视。此外,由于人事部门的建议,对公司数据的访问来源也会被有规律的调查。

Yang examined the effectiveness of the controls that were in place for the integrity of the business processes. She noted that the company mailed turn-around documents to its non-regular customers, which were returned with the payment. As far as it was possible, the firm's data entry was performed online. A range of input validation routines was used when data were input into the company's systems. System output was cheked for reasonableness by trained staff, and key elements of the financial reports were verified with independent sources. Every three months the inventory was counted and the results were reconciled against the quantities stated in accounting records.
杨调查了公司对交易监控的严密程度。她发现公司对非正式客户都有严格的监控。只要可能的话,公司的数据记录都直接在网上完成。进入公司数据库之前,需要填写一系列的验证信息。系统的数据输出端一直有经验丰富的工作人员管理,与公司经济状况相关的核心数据则由单独的处理器保管。每隔三个月,公司财产清单都会受到检测,以便观察记录情况与实际收支是否相符。

The company invested in the development of a comprehensive disaster recovery and business continuity plan in 2006 by an industry expert, but had seen no need to review it since then. As the exptert was highly experienced and no disaster had ever occured in the company's 20 years of operations, the plan had never been tested.
公司在2006年于一位工程师的帮助之下,投资发展了一项覆盖全厂的应对突发事件的数据回复系统,但是该系统自从开发之后就再没有被维护过。由于负责该系统的工程师经验极其丰富,再加上公司近二十年的运营期间从未发生过数据库方面的严重入侵,因而此系统从没有被检测过。

However arrangements were in place for a hot site in another district of Kuala Lumpur. Yang examined the company's backup procedures closely. While all files were backed up weekly each Saturday onto DVDs, incremental backups occured every night at midnight. Because the company knew that its IT staff was well qualified, it had not practised restoring the data from the backups. The backups were unencrypted to allow faster restoration from the backups, if needed. A backup was stored on-site in the computer server room on a shelf near the door, again so that it could be located easily if a disaster took place.
然而系统的枢纽设在KL区。杨仔细检查了公司的文件备份路径,发现所有文档都会在周六被记录到DVD盘中,新的文件备份都是在当日零点进行。由于公司明白,公司内的IT员工都富有经验,因此他们并没有训练过如何从备份中恢复文件。如果需要的话,备份文件可以不加密。备份文件被放置于离房门比较近的架子上,以便需要的时候可以第一时间取出。

这篇文章难的单词没有几个,可还是不好翻译啊。有些地方不得不意译或者干脆忽略了
070521047
2010-10-17 · TA获得超过508个赞
知道小有建树答主
回答量:360
采纳率:0%
帮助的人:311万
展开全部
Trudy Yang是一位有经验的顾问,已签约一家中型IT评估分销公司,其总部设在马来西亚。根据观察,杨说,公司机密数据进行加密时,它被存储于数字格式。她指出,越接近敏感的数字格式会形成越严格控制和监测。她还提到,访问控制,定期进行检测用于人事变动,由人力资源部通知。
感觉很生硬。
已赞过 已踩过<
你对这个回答的评价是?
评论 收起
推荐律师服务: 若未解决您的问题,请您详细描述您的问题,通过百度律临进行免费专业咨询

为你推荐:

下载百度知道APP,抢鲜体验
使用百度知道APP,立即抢鲜体验。你的手机镜头里或许有别人想知道的答案。
扫描二维码下载
×

类别

我们会通过消息、邮箱等方式尽快将举报结果通知您。

说明

0/200

提交
取消

辅 助

模 式