學(xué)術(shù)英語講解課后習(xí)題解答包括unit全部包含_第1頁
學(xué)術(shù)英語講解課后習(xí)題解答包括unit全部包含_第2頁
學(xué)術(shù)英語講解課后習(xí)題解答包括unit全部包含_第3頁
學(xué)術(shù)英語講解課后習(xí)題解答包括unit全部包含_第4頁
學(xué)術(shù)英語講解課后習(xí)題解答包括unit全部包含_第5頁
已閱讀5頁,還剩483頁未讀, 繼續(xù)免費閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請進行舉報或認領(lǐng)

文檔簡介

學(xué)術(shù)英語講解課后習(xí)題解答包括unit全部包含Unit1

ChoosingaTopicUnitContents1Decidingonatopic2Formulatingaresearchquestion3Writingaworkingtitle4Enhancingyouracademiclanguage〔穿插在以上各版塊中〕Unit1

ChoosingaTopic1DecidingonatopicPrinciplesofDecidingonatopicTask1NarrowdownandevaluatetopicsTask2DiscussTask3ReadText1andText2andanswerquestionsText1HowDoComputerHackers“GetInside〞aComputer?Text2ElectronicThreatsofaComputerTask4ListentoLecture1,2and3andanswerquestionsLecture1QuestionsLecture2QuestionsLecture3QuestionsUnit1

ChoosingaTopic1DecidingonatopicFourprinciplesofdecidingonatopicInterestingImportantManageableAdequateUnit1

ChoosingaTopic1DecidingonatopicCityDevelopmentSustainableDevelopmentofCitiesSustainableDevelopmentofBigCitiesSustainableDevelopmentofChineseBigCitiesSustainableDevelopmentofChineseBigCitiesfromtheBiologicalPerspectiveUnit1

ChoosingaTopic1DecidingonatopicTopicsYournarrowersubtopicsQuestionsGlobalWarmingIsthetopicappropriatefora1500-wordessay?Whyorwhynot?Ifthetopicistoogeneral,howdoyounarrowitdowntoamoremanageabletopic?Canyousuggestsomeappropriatetopicsofeachsubject?CancerNanotechnologyInternetArtificialintelligenceUnit1

ChoosingaTopic1DecidingonatopicTopicsYournarrowersubtopicsQuestionsEnergyIsthetopicappropriatefora1500-wordessay?Whyorwhynot?Ifthetopicistoogeneral,howdoyounarrowitdowntoamoremanageabletopic?Canyousuggestsomeappropriatetopicsofeachsubject?GeneticengineeringUniverseUnit1

ChoosingaTopic1Decidingonatopic

Whatisthemainideathateachessaytriestoillustrate?Text1illustrateshowhackersorunauthorizedusersuseonewayoranothertogetinsideacomputer,whileText2describesthevariouselectronicthreatsacomputermightface.

Inwhichaspectdothetwoessayssharethesameidea?Bothfocusonthevulnerabilityofacomputer.Unit1

ChoosingaTopic1Decidingonatopic

Inwhichaspectdothetwoessaysdiffer?Text1illustrateshowhackersorunauthorizedusersuseonewayoranothertogetinsideacomputer,whileText2describesthevariouselectronicthreatsacomputermightface.Unit1

ChoosingaTopic1Decidingonatopic

Whattopicdoeseachessayaddress?DoyouthinktheyareappropriateaccordingtothefourprinciplesmentionedonPage2?缺答案Unit1

ChoosingaTopic1DecidingonatopicAdditionalquestionsforyourunderstandingofText11Whatdoes“unauthorizeduser〞referto?Thistermcoverstheentirerangeoffolks,fromthoseinvolvedinorganizedcriminalactivitiestoinsiderswhoarepushingthelimitsofwhattheyareauthorizedtodoonasystem.Unit1

ChoosingaTopic1DecidingonatopicAdditionalquestionsforyourunderstandingofText12What’sthedifferenceofknownandunknownvulnerabilities?Thistermcoverstheentirerangeoffolks,fromthoseinvolvedinorganizedcriminalactivitiestoinsiderswhoarepushingthelimitsofwhattheyareauthorizedtodoonasystem.Unit1

ChoosingaTopic1DecidingonatopicAdditionalquestionsforyourunderstandingofText13Howtoprotectyourselfagainstcomputerattacks?Makesureyouhaveallthelatestpatchesforyouroperatingsystemandapplications;Makesureyourpasswordiscomplex;ConsidergettingahardwarefirewallandlimitingtheflowofdatatoandfromtheInternettoonlythefewselectportsyouactuallyneed;Makesureyouranti-virussoftwareisup-to-dateandcheckfrequentlytoseeiftherearenewvirusdefinitionsavailable;Backupyourdata.Unit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.5——c10——i1——g2——a3——e4——b6——d7——j8——f9——hUnit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.1a(n)(象征的)gestureoflove2Thepublisher(分發(fā))thebookinAsia.3A“〞(地點)isaplace,andsoawebsite.4a(n)(復(fù)雜的)networkofsystems5beusedto(識別)potentialterrorists6dealthematterwithhim(完全地)7startwithapretty(直截了當)question8beyondthe(功能)ofthecomputers9hitthe(目標)atadistance10thepersonnever(嘗試)todoanythingmore11ahighlysophisticated(過程)symbolic

distribute

sitecomplexidentifyphysicallystraightforwardcapabilitytargetattemptprocessUnit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.12workwithinthe__________(限定因素)oftimeandbudget13thanksforyourkind_____________(解釋)14usemany__________(專業(yè)的)terms15Prices__________(變化范圍)from340U.S.Dollarsto390U.S.Dollars.16__________(開拓)anewmarketinthecity17beabsorbedinthesocial__________(社交網(wǎng)絡(luò))18__________(涉及)unnecessaryextracharges19onlyone__________(實例)outofmany20gettoknowmoreaboutthe__________(具體的細節(jié))ofthewedding21__________(陪伴)withhertowatchmoviesparameterinterpretationtechnicalrangeexploitnetworkinginvolveinstancespecificationaccompanyUnit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageCompletetheparagraphWhenitcomestocloudcomputing,itisoftenworriedthatcloudcomputingisnotreliable,theworries(從……到)“Ilosecontroloverthesystemwithcloudcomputing〞to“Myfilesarenotsecurewithcloudcomputing〞.Actuallytheworries(來自于對……誤解)ofcloudcomputing.Althoughthesecurityofcloudcomputing____________________________(留下很多問題沒有得到解決),it(翻開了通道)thefuturedevelopmentofcomputers.Henceabetterunderstandingofanewtechnology(需要有新的思想)_______________________________.rangingfromarisefromsomemisunderstandingsleavesalotofproblemsunsolvedopensapathforrequiresadifferentframeofmindUnit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText1intoChinese.有些人聲稱黑客是那些擴寬知識界限而不造成危害的好人〔或即使造成危害,但并非成心而為〕,而“破碎者〞才是真正的壞人。2這可以指獲取計算機系統(tǒng)的存儲內(nèi)容,獲得一個系統(tǒng)的處理能力,或捕獲系統(tǒng)之間正在交流的信息。3那些系統(tǒng)開發(fā)者或操作者所無視的不為人知的漏洞很可能是由于糟糕的設(shè)計造成的,也可能是為了讓系統(tǒng)具備一些必要的功能而導(dǎo)致方案外的結(jié)果。Unit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText1intoChinese.5另外,考慮安裝一個硬件防火墻并將從互聯(lián)網(wǎng)中流入和流出的數(shù)據(jù)限定在僅有的幾個你真正需要的端口,如電子郵件和網(wǎng)站流量。4另一種是預(yù)先設(shè)定好程序?qū)μ囟ㄒ资芄魧ο筮M展攻擊,然而,這種攻擊是以鳥槍式的方式發(fā)出的,沒有任何具體目標,目的是攻擊到盡可能多的潛在目標。Unit1

ChoosingaTopic1DecidingonatopicAdditionalquestionsforyourunderstandingofText21WhatareTrojanhorses?Trojanhorsesareastringofrecentspecimensdesignedtosnatchpasswordsorcreditcardinformationandinstallprogramsthatcanbeusedtoremotelycontrolinfectedmachines.Unit1

ChoosingaTopic1DecidingonatopicAdditionalquestionsforyourunderstandingofText22What’stherespectiveaimsofphishingandspyware?Phishingistotrickarecipientintohandingovermoneyorsensitivepersonalinformationliketheirbankaccountdetailsorausernameandpassword.Spywareistoserveupunwantedadverts,changesystemsettingsandgatherinformationonauser’sonlinebehaviorformarketingpurposes.Unit1

ChoosingaTopic1DecidingonatopicAdditionalquestionsforyourunderstandingofText23Whydoesthewritersaythattheearliest“criminal〞hackerswereinfactrelativelyharmless?Itisbecausethattheyusuallyinterestedintestingtheboundariesoftheirknowledgeandtheirabilitytogetaroundsecuritymeasures.Theymainlyperformedharmlesspranks,forexampleemployinglow-techtrickstogetfreecallsthroughtheU.S.phonenetworks.Unit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.5——a10——c1——d2——f3——h4——i6——e7——b8——j9——gUnit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.1throwawaya(n)

(損壞的)computer2earnsomebodyconsiderable

(惡名)3beused

(可互換地)4Acomputerhas

(發(fā)生故障).5

(擠)milkintothebottle6a(n)

(有獨創(chuàng)性的)solutiontotheproblem7China’s

(出現(xiàn))asagreatpower8of

(卑微的)birth9

(狡猾的)menoftenpassforwise.10exploittheir

(弱點)tofightthem11asuspected

(罪犯)12ajacketwithleather

(補丁)promisednotorietyinterchangeablymalfunctionedsqueezeingeniousemergencehumbleCunningvulnerabilitycriminalpatchesUnit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.13the(陰險的)looksonhisface14Thisisa(n)(艱巨的)challenge.15thevirusthatcan(復(fù)制)itself16His(惡毒的)gossipcausedmuchmischief.17Thepath(盤旋)upthemountain.18a(n)(平安的)operatingsystem19(使模糊)myvision20(阻止)thespreadofanepidemic21fallinto(壞名聲)22solve(復(fù)雜的)electricalproblems23(利用)naturalresources24writeapersonalnotetoeach(收件人)25(轉(zhuǎn)換)holdingsintosharessinisterdauntingreplicatemaliciousspiralssecureblurstemsophisticateddisreputeharnessrecipientconvertUnit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText2intoChinese.看似無害的編程錯誤可以被利用,導(dǎo)致電腦被侵入并為電腦蠕蟲和病毒的繁衍提供溫床。2當一個軟件漏洞被發(fā)現(xiàn),黑客可以將漏洞變成一個侵入點,從而造成極大的破壞,在這之前,往往需要爭分奪秒地利用正確的軟件補丁來防止破壞的發(fā)生。3最簡單的釣魚騙局試圖利用迅速致富的手段誘使詐騙目標寄錢。但網(wǎng)絡(luò)騙子們也變得越來越狡猾,最近的陷阱是通過發(fā)送客戶效勞的電子郵件讓用戶進入假銀行或商業(yè)網(wǎng)站,并在那里請他們“重新輸入〞他們的賬戶信息。Unit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText2intoChinese.4間諜軟件與垃圾郵件和釣魚網(wǎng)絡(luò)一起,構(gòu)成了三個令人生厭的互聯(lián)網(wǎng)害蟲。盡管有些程序可以通過入侵軟件漏洞從而進入電腦,但這些有害而秘密的程序通常會隨著其他通常是免費的應(yīng)用軟件侵入到計算機系統(tǒng)中。5盡管因特網(wǎng)已經(jīng)徹底改變了全球通訊,但是對于那些意圖為了罪惡目的而利用網(wǎng)絡(luò)力量的人和那些負責(zé)阻止這些網(wǎng)絡(luò)犯罪的人來說,他們之間的比賽才剛剛開場。Unit1

ChoosingaTopic1Decidingonatopic1TopicsofeachlectureLecture1:__________________________________Lecture2:__________________________________Lecture3:__________________________________2

Topic1:____________________________________

Topic2:____________________________________TheimportanceofComputerEthicsHowtodealwithComputerHackersHowIBegintodevelopComputerApplicationsUnit1

ChoosingaTopic1Decidingonatopic

EnhancingyouracademiclanguageLecture11Whatisthetopicofthelecture?TohelpcomputeruserstobeawareoftheethicalusesofcomputersandtheInternet.2Whydoethicalissuesbecomemoreimportant?Peopleshouldrespectotherpeople’spropertyanduseresourcesfairly.Unit1

ChoosingaTopic1Decidingonatopic

EnhancingyouracademiclanguageLecture13Whichruleisaboutthewaytoavoidplagiarism?BecausemoreandmorepeoplehavestartedusingcomputersandtheInternet.4Whichruledohackersmainlybreak?NumberEight.Unit1

ChoosingaTopic1Decidingonatopic

EnhancingyouracademiclanguageLecture1WhatarethemainprinciplesbehindtheTenCommandmentsofComputerEthics?NumberNine.HowisLecture1differentfromTexts1and2intermsofcontent?TohelpcomputeruserstobeawareoftheethicalusesofcomputersandtheInternet.7Whatisthetitleofthelectureyoumaysuggest?缺答案Unit1

ChoosingaTopic1Decidingonatopic

EnhancingyouracademiclanguageLecture21Whoisthemysterioussponsoror“theAnonymous〞?It’sasophisticatedgroupofpoliticallymotivatedhackers.2Accordingtothelecturer,whatshouldwedobesidesputtingahugeamountofmoneyintocybersecurityforthemostextraordinarytechnicalsolution?Weshouldtalktohackersandmakeuseofthem.Unit1

ChoosingaTopic1Decidingonatopic

EnhancingyouracademiclanguageLecture23HowdothepurchaserandthevendordobusinessontheCarderPlanet?Theydobusinessbyusingtheescrawsystem.4Accordingtothelecturer,whatkindofhackersshouldnotbethrownintojail?Hackerswhohavedisabilitieslikeautism.Unit1

ChoosingaTopic1Decidingonatopic

EnhancingyouracademiclanguageLecture2Whatisthesolutiontothehackerproblemaccordingtothelecturer?Recruitingandmobilizinghackersonbehalfofthestate.InwhichaspectsisthelecturerelatedtoTexts1and2?FacedwiththethreatsofcomputerhackersmentionedinText1and2,thespeakersuggeststhatweshouldtalktohackers,understandtheirdisabilities,andmakeuseoftheirtalent.7Whatisthetitleofthelectureyoumaysuggest?UnderstandandMakeUseofHackersUnit1

ChoosingaTopic1Decidingonatopic

EnhancingyouracademiclanguageLecture31Whatisthefunctionoftheapp“EarthFortune〞?Itcandisplaydifferentkindsofcolordependingonone’sfortune.2Whydoalotofkidsfinditdifficulttomakegames?Becausenotmanykidsknowwheretheycanlearntomakeupaprogram.Unit1

ChoosingaTopic1Decidingonatopic

EnhancingyouracademiclanguageLecture33Wheredoesthelecturerputhisapps?Theappstore.4Whydidthelecturerstartanappclub?Becausestudentsathisschoolcancomeandlearnhowtodesignanapp.Unit1

ChoosingaTopic1Decidingonatopic

EnhancingyouracademiclanguageLecture3WhatisthebigchallengetotheiPadprogram?HowshouldiPadbeusedandwhatappsshouldweputontheiPads.Whatisthetitleofthetalkyoumaysuggest?HowCanIGetFascinatedwiththeiPadsandDesignApps7Willthelecturerbecomeapotentialhacker?Why,orwhynot?Mostprobablyifhelackssucheducationascomputerethics.Unit1

ChoosingaTopic2FormulatingaresearchquestionpurposesofaresearchquestionTask1ReadText3andText4andanswerquestionsText3HowDoComputerHackers“GetInside〞aComputer?Text4ElectronicThreatsofaComputerTask2DeveloptopicsintoresearchquestionsTask3BrainstormandanswerquestionsUnit1

ChoosingaTopic2FormulatingaresearchquestionItidentifiesthespecificobjectivesyourresearchoryourpaperwilladdress.purposesofaresearchquestionItdeterminesthesizeofyourresearchorthelengthofyourpaper.Unit1

ChoosingaTopic1DecidingonatopicText3Researchquestion1:

___________________________________________________Researchquestion2:

_____________________________________Researchquestion3:

_____________________________________Text4Researchquestion1:

_____________________________________Researchquestion2:

____________________________________________________________Researchquestion3:

____________________________________________________________HowmanytypesofCloudservicesandwhatarethey?Whatisgreencomputing?Whatadvantagesofthecloudcomputing?WhatistheWeb3.0?Whatadvantagesanddisadvantagesofthecloudcomputing?Canthecloudcomputingprovidesecuritybenefits?

Unit1

ChoosingaTopic2FormulatingaresearchquestionAdditionalquestionsforyourunderstandingofText31Whatiscloudcomputing?Cloudcomputingisapay-per-usemodelforenablingon-demandaccesstoreliableandconfigurableresourcesthatcanbequicklyprovisionedandreleased—withminimalconsumerinvolvementintermsofmanagement.Unit1

ChoosingaTopic2FormulatingaresearchquestionAdditionalquestionsforyourunderstandingofText32Whatcharacteristicsshouldcloudhave?1Itshouldbeabletoquicklyallotandrelieveresourceswheneverrequiredbyclients;2Itshouldhavereal-timebackuptooffermaximumuptimetoclients;3Itshouldbeabletocatertotheneedsofclientswithouthavingtoinvolveclientsintomanagementoftheservice.Unit1

ChoosingaTopic2FormulatingaresearchquestionAdditionalquestionsforyourunderstandingofText33Whataretheadvantagesofcloudcomputing?RemoteAccessibility:Withcloudcomputing,yourbusinessisnotrestrictedtoaparticularlocation.EasyExpansion:Asofthecharacteristicsofcloudcomputingisitsflexibility,youcanquicklyaccessmoreresourcesifyouneedtoexpandyourbusiness.

Security:Thoughpeopledoubtcloudcomputing,cloudstendtobemoresecurethanthetraditionalbusinessmodels.

EnvironmentallyFriendly:Usageofready-maderesourcestailoredtoyourneedshelpsyoureducetheelectricityexpensesUnit1

ChoosingaTopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.5——i10——c1——f2——d3——e4——j6——h7——b8——a9——g2FormulatingaresearchquestionUnit1

ChoosingaTopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.2Formulatingaresearchquestion1(不管)oftheirageandeducation2Theprogrammust(迎合)totheneedsofyourcustomers.3(易于)todeveloplungcancer4(選擇)foronestyleortheother5Hesuppliesthe(最大的)amountofinformation.6Theseproductordersshouldbe(編號).7the(提供)offacilitiesforchildren8arestaurant(適宜于)forfamilies9theneedforatighter(檢查)onarmssales10(現(xiàn)成的)excuse11Theaircrafthasbeen(改進)andimproved.12providetreatment(所要求的)13the(去向)ofthemissingdocumentsirrespectivebetailoredcodedprovisioncateredcheckpronemaximumoptready-mademodifiedon-demandwhereaboutsUnit1

ChoosingaTopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.2Formulatingaresearchquestion14

(有害的)wastemustbeappropriatelydealtwith.15Theterribledamagehasbeen

(遭受到了).16Fewoftherulesare

(適合于)tothecountry.17anindustrial

(開發(fā)商)18awholerangeofservices

(所提供的)19

(主持)atalkshow20Itisfreeorfora

(極小的,象征性的)charge.21gettheseaccounts

(核證)22ahighly

(自動化)factory23apower

(斷供期)24Demandandsupplyareoutof

(同步一致).25Theevidencecan

(證實)hisstory.26agreatvictorywith

(最小的)price27ahighly

(流動的)societyHazardousincurredapplicabledeveloperonofferhostnominalcertifiedautomatedsyncoutagebackupminimalmobileUnit1

ChoosingaTopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText3intoChinese.2Formulatingaresearchquestion云計算可定義為一種付款模式,這種模式可以根據(jù)提出的要求迅速得到可靠的計算機分配資源,而付錢用戶很少要自己進展管理。2由于云計算可以總是用來不斷提供資源,因此當你需要擴大計算機容量,你不需要去買硬件。這樣,你就不會因為用更多的電去冷卻計算機設(shè)備而產(chǎn)生更多的二氧化碳。Unit1

ChoosingaTopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText3intoChinese.2Formulatingaresearchquestion3這意味著他們不需要開車到辦公地點。這就可以省去燃料費,減少二氧化碳排放,這就保護了環(huán)境。4萬一斷電,客戶就可以再啟動時使用和主機同步的備份。5除此之外,云計算還不容易受到黑客入侵和分布式拒絕效勞的攻擊,因為攻擊者不知道你的數(shù)據(jù)放在什么地方。Unit1

ChoosingaTopicAdditionalquestionsforyourunderstandingofText42Formulatingaresearchquestion1WhatisWeb3.0basedon?Web3.0isbasedontheservicesfordatamining,artificialintelligence,independentagents,speechrecognitionandnewcomputingmodels(distributed,grid3andcloud).Unit1

ChoosingaTopicAdditionalquestionsforyourunderstandingofText42Formulatingaresearchquestion2Whatcouldthecloudclientsbe?ThecloudclientscouldberegularPCs,mobilephones,PDAsoranyothersimilardevices.Unit1

ChoosingaTopicAdditionalquestionsforyourunderstandingofText42Formulatingaresearchquestion3Whatmajorsecuritybenefitsdoesthecloudcomputingprovideforindividualsorcompanies?1)centralizeddatastorage;2)monitoringofdataaccessbecomeseasier;3)increaseduncertainty;4)virtualizationallowsarapidreplacementofacompromisedserverlocatedintothecloudwithoutmajorcostsordamages.Also,thedowntimeforcomputersinthecloudcouldbesubstantiallyreduced;5)logging—extendedlogscanbeactivated;6)thesecuritychangescanbeeasilytestedandimplemented.Unit1

ChoosingaTopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.5——g10——h1——c2——e3——a4——i6——b7——d8——f9——j2FormulatingaresearchquestionUnit1

ChoosingaTopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.2Formulatingaresearchquestion1A(n)(類比)isdrawnbetweenthetwothings.2Catsandbirdsareseldom(協(xié)調(diào)的).3(分發(fā))theprizesamongthewinners.4(執(zhí)行)anewpolicytohelptheunemployed5Thefunctioncanbe(激活)anytime.6a(n)(靜止的)viewoftheworld7Theaudiences(總計到達)amillionpeople.8a(n)(一模一樣的復(fù)制品)ofarealpanda9lookfora(n)(革新的)way10trytofindthe(替代品)ofadamageddesk11Theirbusiness(突然垮了).12Theirequalityis(受到損害).13(挖掘有價值的)fordetailedinformation14abridge(鞏固的)enoughtolastahundredyears15Heisanational(珍貴的人).analogycompatibleDistributeimplementactivatedstaticaggregatedcloneinnovativereplacementcrashedcompromisedminesubstantialassetUnit1

ChoosingaTopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.2Formulatingaresearchquestion16

(使集中)powerinhim17airport

(設(shè)施)18Hehasto

(松開)hishold.19

(監(jiān)聽)hisconversation20helpindividuals

(使適應(yīng),融合于)intothecommunity21Fromhisfatherhe

(獲得)hisenthusiasmforsports.22

(修訂,更新)atextbook23

(下載)thematerialtoyourcomputer24

(提高)thepayandstatusoftheteacher25Theyareonly

(批準)forbeer.26pay

(級差的)rentsaccordingtotheirincome27

(安裝)anewcomputerintheoffice28practiceeachdayfora(n)

(最少的)of30minutes29alotofcompanywilldo

(內(nèi)部的)training30a(n)

(重要的)decisioncentralizefacilitiesloosemonitorintegratederivedupdateupgradedownloadlicenseddifferentialinstallminimumin-housecrucialUnit1

ChoosingaTopicEnhancingyouracademiclanguageCompletetheparagraph2FormulatingaresearchquestionAlthoughthepotentialofe-business(有很大的前景),itisoftenplaguedbycomputerviruses.Thetermcomputerviruses(來自這樣一個方法)thevirus“infects〞theexecutablefileorprogram.Hencedevelopingawaytodealwithcomputerviruses(非常重要).Butifwefindtheway,thethreatthevirusposes(會大大降低).remainswideopenisderivedfromthewayinwhichbecomescrucialwillbesubstantiallyreducedUnit1

ChoosingaTopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText4intoChinese.2Formulatingaresearchquestion1云計算這個術(shù)語來自于英特網(wǎng)往往把自己呈現(xiàn)為網(wǎng)絡(luò)圖的方法。2目前云計算技術(shù)涉及這樣一個數(shù)據(jù)中心的存在,這個中心能夠為全世界用戶提供效勞。3這就減少了由于沒有硬件如手提電腦帶來的影響。Unit1

ChoosingaTopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText4intoChinese.2Formulatingaresearchquestion4虛擬化可以迅速使一個損壞的效勞器找到一個替代品并儲存在云端而不造成大的損失或破壞。5云技術(shù)還處于起步階段,所以有更多新的優(yōu)點會不斷發(fā)現(xiàn)。Unit1

ChoosingaTopic2FormulatingaresearchquestionTopic2:ThreatsofArtificialIntelligence

Researchquestions:

_________________________________________________________________________________________________________________________________Unit1

ChoosingaTopic2FormulatingaresearchquestionTopic3:ThePotentialsofNanotechnology

Researchquestions:

_________________________________________________________________________________________________________________________________Unit1

ChoosingaTopic2FormulatingaresearchquestionTopic4:GlobalWarmingandItsEffects

Researchquestions:

_________________________________________________________________________________________________________________________________Unit1

ChoosingaTopicWhydoyouchoosethetwotopics?Forexample,aretheyinteresting,important,controversial,manageableoradequateinsourcematerials?2FormulatingaresearchquestionWhatresearchquestionsofeachtopicdoyouwanttoanswerthroughyourresearch?Unit1

ChoosingaTopic3WritingaworkingtitleIntroductionTask2ListentoLecture4and5andanswerquestions

Lecture4Questions

Lecture5QuestionsUnit1

ChoosingaTopic3Writingaworkingtitleatypicaltitleiscomposedof:subjectmatterkeywordsofthemethodkeywordsofthecontentappropriatetitles:PsychologicalMotivationofComputerHackersEffectivenessofTwoApproachestoLungCancerEnvironmentalEffectsofNuclearPowerPlantsUnit1

ChoosingaTopicWhatistherelationshipbetweenthetwolecturesintermsofcontent?3WritingaworkingtitleLecture4isaboutthesecurityproblemsofcloudcomputing,whileLecture5isaboutthedefin

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲空間,僅對用戶上傳內(nèi)容的表現(xiàn)方式做保護處理,對用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對任何下載內(nèi)容負責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當內(nèi)容,請與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準確性、安全性和完整性, 同時也不承擔用戶因使用這些下載資源對自己和他人造成任何形式的傷害或損失。

最新文檔

評論

0/150

提交評論