學(xué)術(shù)英語(理工)講義+課后習(xí)題解答ppt課件_第1頁
學(xué)術(shù)英語(理工)講義+課后習(xí)題解答ppt課件_第2頁
學(xué)術(shù)英語(理工)講義+課后習(xí)題解答ppt課件_第3頁
學(xué)術(shù)英語(理工)講義+課后習(xí)題解答ppt課件_第4頁
學(xué)術(shù)英語(理工)講義+課后習(xí)題解答ppt課件_第5頁
已閱讀5頁,還剩435頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認(rèn)領(lǐng)

文檔簡介

1、學(xué)術(shù)英語 理工,Academic English for Science and Engineering,Unit 1 Choosing a Topic,Unit Contents,1 Deciding on a topic 2 Formulating a research question 3 Writing a working title 4 Enhancing your academic language (穿插在以上各版塊中,Unit 1 Choosing a Topic,1 Deciding on a topic,Principles of Deciding on a topic T

2、ask 1 Narrow down and evaluate topics Task 2 Discuss Task 3 Read Text 1 and Text 2 and answer questions Text 1 How Do Computer Hackers “Get Inside” a Computer? Text 2 Electronic Threats of a Computer Task 4 Listen to Lecture 1, 2 and 3 and answer questions Lecture 1 Questions Lecture 2 Questions Lec

3、ture 3 Questions,Unit 1 Choosing a Topic,1 Deciding on a topic,Four principles of deciding on a topic,Interesting,Important,Manageable,Adequate,Unit 1 Choosing a Topic,1 Deciding on a topic,City Development Sustainable Development of Cities Sustainable Development of Big Cities Sustainable Developme

4、nt of Chinese Big Cities Sustainable Development of Chinese Big Cities from the Biological Perspective,Unit 1 Choosing a Topic,1 Deciding on a topic,Unit 1 Choosing a Topic,1 Deciding on a topic,Unit 1 Choosing a Topic,1 Deciding on a topic,What is the main idea that each essay tries to illustrate,T

5、ext 1 illustrates how hackers or unauthorized users use one way or another to get inside a computer, while Text 2 describes the various electronic threats a computer might face,In which aspect do the two essays share the same idea,Both focus on the vulnerability of a computer,Unit 1 Choosing a Topic

6、,1 Deciding on a topic,In which aspect do the two essays differ,Text 1 illustrates how hackers or unauthorized users use one way or another to get inside a computer, while Text 2 describes the various electronic threats a computer might face,Unit 1 Choosing a Topic,1 Deciding on a topic,What topic d

7、oes each essay address? Do you think they are appropriate according to the four principles mentioned on Page 2,缺答案,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 1,1 What does “unauthorized user” refer to,This term covers the entire range of folks,

8、from those involved in organized criminal activities to insiders who are pushing the limits of what they are authorized to do on a system,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 1,2 Whats the difference of known and unknown vulnerabilities,Th

9、is term covers the entire range of folks, from those involved in organized criminal activities to insiders who are pushing the limits of what they are authorized to do on a system,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 1,3 How to protect you

10、rself against computer attacks,Make sure you have all the latest patches for your operating system and applications; Make sure your password is complex; Consider getting a hardware firewall and limiting the flow of data to and from the Internet to only the few select ports you actually need; Make su

11、re your anti-virus software is up-to- date and check frequently to see if there are new virus definitions available; Back up your data,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions,5 c,10 i,1 g,2 a,3 e,4 b,6 d,7 j,8 f,9 h,Unit 1

12、 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions,1 a(n) (象征的) gesture of love 2 The publisher (分發(fā)) the book in Asia. 3 A “ ” (地點) is a place, and so a website. 4 a(n) (復(fù)雜的) network of systems 5 be used to (識別) potential terrorists 6 deal

13、 the matter with him (完全地) 7 start with a pretty (直截了當(dāng)) question 8 beyond the (功能) of the computers 9 hit the (目標(biāo)) at a distance 10 the person never (嘗試) to do anything more 11 a highly sophisticated (過程,symbolic,distribute,site,complex,identify,physically,straightforward,capability,target,attempt,p

14、rocess,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions,12 work within the _ (限定因素) of time and budget 13 thanks for your kind _ (解釋) 14 use many _ (專業(yè)的) terms 15 Prices _ (變化范圍) from 340 U.S. Dollars to 390 U.S. Dollars. 16 _ (開拓)

15、 a new market in the city 17 be absorbed in the social _ (社交網(wǎng)絡(luò)) 18 _ (涉及) unnecessary extra charges 19 only one _ (實例) out of many 20 get to know more about the _ (具體的細節(jié)) of the wedding 21 _ (陪伴) with her to watch movies,parameter,interpretation,technical,range,exploit,networking,involve,instance,sp

16、ecification,accompany,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Complete the paragraph,When it comes to cloud computing, it is often worried that cloud computing is not reliable, the worries (從到) “I lose control over the system with cloud computing” to “My files

17、are not secure with cloud computing”. Actually the worries (來自于對誤解) of cloud computing. Although the security of cloud computing _(留下很多問題沒有得到解決), it (打開了通道) the future development of computers. Hence a better understanding of a new technology (需要有新的思想)_,ranging from,arise from some misunderstandings

18、,leaves a lot of problems unsolved,opens a path for,requires a different frame of mind,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Translate the following sentences from Text 1 into Chinese,有些人聲稱黑客是那些擴寬知識界限而不造成危害的好人 (或即使造成危害,但并非故意而為),而“破碎者”才是真正的壞人,2 這可以指獲取計算機系統(tǒng)的存儲內(nèi)

19、容,獲得一個系統(tǒng)的處理能力,或捕獲系統(tǒng)之間正在交流的信息,3 那些系統(tǒng)開發(fā)者或操作者所忽視的不為人知的漏洞很可能是由于糟糕的設(shè)計造成的,也可能是為了讓系統(tǒng)具備一些必要的功能而導(dǎo)致計劃外的結(jié)果,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Translate the following sentences from Text 1 into Chinese,5 另外,考慮安裝一個硬件防火墻并將從互聯(lián)網(wǎng)中流入和流出的數(shù)據(jù)限定在僅有的幾個你真正需要的端口,如電子郵件和網(wǎng)站流量,4 另一種是預(yù)

20、先設(shè)定好程序?qū)μ囟ㄒ资芄魧ο筮M行攻擊,然而,這種攻擊是以鳥槍式的方式發(fā)出的,沒有任何具體目標(biāo),目的是攻擊到盡可能多的潛在目標(biāo),Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 2,1 What are Trojan horses,Trojan horses are a string of recent specimens designed to snatch passwords or credit card information and inst

21、all programs that can be used to remotely control infected machines,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 2,2 Whats the respective aims of phishing and spyware,Phishing is to trick a recipient into handing over money or sensitive personal i

22、nformation like their bank account details or a username and password. Spyware is to serve up unwanted adverts, change system settings and gather information on a users online behavior for marketing purposes,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of

23、 Text 2,3 Why does the writer say that the earliest “criminal” hackers were in fact relatively harmless,It is because that they usually interested in testing the boundaries of their knowledge and their ability to get around security measures. They mainly performed harmless pranks, for example employ

24、ing low-tech tricks to get free calls through the U.S. phone networks,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions,5 a,10 c,1 d,2 f,3 h,4 i,6 e,7 b,8 j,9 g,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic l

25、anguage,Match the words with their definitions,1 throw away a(n) (損壞的) computer 2 earn somebody considerable (惡名) 3 be used (可互換地) 4 A computer has (發(fā)生故障). 5 (擠) milk into the bottle 6 a(n) (有獨創(chuàng)性的) solution to the problem 7 Chinas (出現(xiàn)) as a great power 8 of (卑微的) birth 9 (狡猾的) men often pass for wis

26、e. 10 exploit their (弱點) to fight them 11 a suspected (罪犯) 12 a jacket with leather (補丁) on the elbows,compromised,notoriety,interchangeably,malfunctioned,squeeze,ingenious,emergence,humble,Cunning,vulnerability,criminal,patches,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic l

27、anguage,Match the words with their definitions,13 the (陰險的) looks on his face 14 This is a(n) (艱巨的) challenge. 15 the virus that can (復(fù)制) itself 16 His (惡毒的) gossip caused much mischief. 17 The path (盤旋) up the mountain. 18 a(n) (安全的) operating system 19 (使模糊) my vision 20 (阻止) the spread of an epid

28、emic 21 fall into (壞名聲) 22 solve (復(fù)雜的) electrical problems 23 (利用) natural resources 24 write a personal note to each (收件人) 25 (轉(zhuǎn)換) holdings into shares,sinister,daunting,replicate,malicious,spirals,secure,blur,stem,sophisticated,disrepute,harness,recipient,convert,Unit 1 Choosing a Topic,1 Deciding

29、 on a topic,Enhancing your academic language,Translate the following sentences from Text 2 into Chinese,看似無害的編程錯誤可以被利用,導(dǎo)致電腦被侵入并為電腦蠕蟲和病毒的繁衍提供溫床,2 當(dāng)一個軟件漏洞被發(fā)現(xiàn),黑客可以將漏洞變成一個侵入點,從而造成極大的破壞,在這之前,往往需要爭分奪秒地利用正確的軟件補丁來防止破壞的發(fā)生,3 最簡單的釣魚騙局試圖利用迅速致富的伎倆誘使詐騙目標(biāo)寄錢。但網(wǎng)絡(luò)騙子們也變得越來越狡猾,最近的陷阱是通過發(fā)送客戶服務(wù)的電子郵件讓用戶進入假銀行或商業(yè)網(wǎng)站,并在那里請他們“重

30、新輸入”他們的賬戶信息,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Translate the following sentences from Text 2 into Chinese,4 間諜軟件與垃圾郵件和釣魚網(wǎng)絡(luò)一起,構(gòu)成了三個令人生厭的互聯(lián)網(wǎng)害蟲。盡管有些程序可以通過入侵軟件漏洞從而進入電腦,但這些有害而秘密的程序通常會隨著其他通常是免費的應(yīng)用軟件侵入到計算機系統(tǒng)中,5 盡管因特網(wǎng)已經(jīng)徹底改變了全球通訊,但是對于那些意圖為了罪惡目的而利用網(wǎng)絡(luò)力量的人和那些負(fù)責(zé)阻止這些網(wǎng)絡(luò)犯

31、罪的人來說,他們之間的較量才剛剛開始,Unit 1 Choosing a Topic,1 Deciding on a topic,1 Topics of each lecture,Lecture 1: _,Lecture 2: _,Lecture 3: _,2 Topic 1: _,Topic 2: _,The importance of Computer Ethics,How to deal with Computer Hackers,How I Begin to develop Computer Applications,Unit 1 Choosing a Topic,1 Deciding

32、 on a topic,Enhancing your academic language,Lecture 1,1 What is the topic of the lecture,To help computer users to be aware of the ethical uses of computers and the Internet,2 Why do ethical issues become more important,People should respect other peoples property and use resources fairly,Unit 1 Ch

33、oosing a Topic,1 Deciding on a topic,Enhancing your academic language,Lecture 1,3 Which rule is about the way to avoid plagiarism,Because more and more people have started using computers and the Internet,4 Which rule do hackers mainly break,Number Eight,Unit 1 Choosing a Topic,1 Deciding on a topic

34、,Enhancing your academic language,Lecture 1,What are the main principles behind the Ten Commandments of Computer Ethics,Number Nine,How is Lecture 1 different from Texts 1 and 2 in terms of content,To help computer users to be aware of the ethical uses of computers and the Internet,7 What is the tit

35、le of the lecture you may suggest,缺答案,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Lecture 2,1 Who is the mysterious sponsor or “the Anonymous”,Its a sophisticated group of politically motivated hackers,2 According to the lecturer, what should we do besides putting

36、a huge amount of money into cybersecurity for the most extraordinary technical solution,We should talk to hackers and make use of them,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Lecture 2,3 How do the purchaser and the vendor do business on the CarderPlanet,They d

37、o business by using the escraw system,4 According to the lecturer, what kind of hackers should not be thrown into jail,Hackers who have disabilities like autism,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Lecture 2,What is the solution to the hacker problem accordi

38、ng to the lecturer,Recruiting and mobilizing hackers on behalf of the state,In which aspects is the lecture related to Texts 1 and 2,Faced with the threats of computer hackers mentioned in Text 1 and 2, the speaker suggests that we should talk to hackers, understand their disabilities, and make use

39、of their talent,7 What is the title of the lecture you may suggest,Understand and Make Use of Hackers,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Lecture 3,1 What is the function of the app “Earth Fortune”,It can display different kinds of color depending on ones f

40、ortune,2 Why do a lot of kids find it difficult to make games,Because not many kids know where they can learn to make up a program,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Lecture 3,3 Where does the lecturer put his apps,The app store,4 Why did the lecturer star

41、t an app club,Because students at his school can come and learn how to design an app,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Lecture 3,What is the big challenge to the iPad program,How should iPad be used and what apps should we put on the iPads,What is the tit

42、le of the talk you may suggest,How Can I Get Fascinated with the iPads and Design Apps,7 Will the lecturer become a potential hacker? Why, or why not,Most probably if he lacks such education as computer ethics,Unit 1 Choosing a Topic,2 Formulating a research question,purposes of a research question

43、Task 1 Read Text 3 and Text 4 and answer questions Text 3 How Do Computer Hackers “Get Inside” a Computer? Text 4 Electronic Threats of a Computer Task 2 Develop topics into research questions Task 3 Brainstorm and answer questions,Unit 1 Choosing a Topic,2 Formulating a research question,It identif

44、ies the specific objectives your research or your paper will address,purposes of a research question,It determines the size of your research or the length of your paper,Unit 1 Choosing a Topic,1 Deciding on a topic,Text 3 Research question 1: _ Research question 2: _ Research question 3: _ Text 4 Re

45、search question 1: _ Research question 2: _ Research question 3: _,How many types of Cloud services and what are they,What is green computing,What advantages of the cloud computing,What is the Web 3.0,What advantages and disadvantages of the cloud computing,Can the cloud computing provide security b

46、enefits,Unit 1 Choosing a Topic,2 Formulating a research question,Additional questions for your understanding of Text 3,1 What is cloud computing,Cloud computing is a pay-per-use model for enabling on-demand access to reliable and configurable resources that can be quickly provisioned and releasedwi

47、th minimal consumer involvement in terms of management,Unit 1 Choosing a Topic,2 Formulating a research question,Additional questions for your understanding of Text 3,2 What characteristics should cloud have,1 It should be able to quickly allot and relieve resources whenever required by clients; 2 I

48、t should have real-time backup to offer maximum up time to clients; 3 It should be able to cater to the needs of clients without having to involve clients into management of the service,Unit 1 Choosing a Topic,2 Formulating a research question,Additional questions for your understanding of Text 3,3

49、What are the advantages of cloud computing,Remote Accessibility: With cloud computing, your business is not restricted to a particular location. Easy Expansion: As of the characteristics of cloud computing is its flexibility, you can quickly access more resources if you need to expand your business.

50、 Security: Though people doubt cloud computing, clouds tend to be more secure than the traditional business models. Environmentally Friendly: Usage of ready-made resources tailored to your needs helps you reduce the electricity expenses,Unit 1 Choosing a Topic,Enhancing your academic language,Match

51、the words with their definitions,5 i,10 c,1 f,2 d,3 e,4 j,6 h,7 b,8 a,9 g,2 Formulating a research question,Unit 1 Choosing a Topic,Enhancing your academic language,Match the words with their definitions,2 Formulating a research question,1 (不管) of their age and education 2 The program must (迎合) to t

52、he needs of your customers. 3 (易于) to develop lung cancer 4 (選擇) for one style or the other 5 He supplies the (最大的) amount of information. 6 These product orders should be (編號). 7 the (提供) of facilities for children 8 a restaurant (合適于) for families 9 the need for a tighter (檢查) on arms sales 10 (現(xiàn)成

53、的) excuse 11 The aircraft has been (改進) and improved. 12 provide treatment (所要求的) 13 the (去向) of the missing documents,irrespective,be tailored,coded,provision,catered,check,prone,maximum,opt,ready-made,modified,on-demand,whereabouts,Unit 1 Choosing a Topic,Enhancing your academic language,Match the

54、 words with their definitions,2 Formulating a research question,14 (有害的) waste must be appropriately dealt with. 15 The terrible damage has been (遭受到了). 16 Few of the rules are (適合于) to the country. 17 an industrial (開發(fā)商) 18 a whole range of services (所提供的) 19 (主持) a talk show 20 It is free or for a

55、 (極小的,象征性的) charge. 21 get these accounts (核證) 22 a highly (自動化) factory 23 a power (斷供期) 24 Demand and supply are out of (同步一致). 25 The evidence can (證實) his story. 26 a great victory with (最小的) price 27 a highly (流動的) society,Hazardous,incurred,applicable,developer,on offer,host,nominal,certified,

56、automated,sync,outage,back up,minimal,mobile,Unit 1 Choosing a Topic,Enhancing your academic language,Translate the following sentences from Text 3 into Chinese,2 Formulating a research question,云計算可定義為一種付款模式,這種模式可以根據(jù)提出的要求迅速得到可靠的計算機分配資源,而付錢用戶很少要自己進行管理,2 由于云計算可以總是用來不斷提供資源,因此當(dāng)你需要擴充計算機容量,你不需要去買硬件。這樣,你就

57、不會因為用更多的電去冷卻計算機設(shè)備而產(chǎn)生更多的二氧化碳,Unit 1 Choosing a Topic,Enhancing your academic language,Translate the following sentences from Text 3 into Chinese,2 Formulating a research question,3 這意味著他們不需要開車到辦公地點。這就可以省去燃料費,減少二氧化碳排放,這就保護了環(huán)境,4 萬一斷電,客戶就可以再啟動時使用和主機同步的備份,5 除此之外,云計算還不容易受到黑客入侵和分布式拒絕服務(wù)的攻擊,因為攻擊者不知道你的數(shù)據(jù)放在什么地

58、方,Unit 1 Choosing a Topic,Additional questions for your understanding of Text 4,2 Formulating a research question,1 What is Web 3.0 based on,Web 3.0 is based on the services for data mining, artificial intelligence, independent agents, speech recognition and new computing models (distributed, grid3 and cloud,Unit 1 Choosing a Topic,Additional questions for your u

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時也不承擔(dān)用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

評論

0/150

提交評論