学术英语课后答案unit1.doc

上传人:1595****071 文档编号:33919412 上传时间:2022-08-12 格式:DOC 页数:18 大小:156.50KB
返回 下载 相关 举报
学术英语课后答案unit1.doc_第1页
第1页 / 共18页
学术英语课后答案unit1.doc_第2页
第2页 / 共18页
点击查看更多>>
资源描述

《学术英语课后答案unit1.doc》由会员分享,可在线阅读,更多相关《学术英语课后答案unit1.doc(18页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。

1、如有侵权,请联系网站删除,仅供学习与交流学术英语课后答案 unit1【精品文档】第 16 页学术英语理工教师手册Unit 1 Choosing a TopicI Teaching ObjectivesIn this unit , you will learn how to:1.choose a particular topic for your research2.formulate a research question3.write a working title for your research essay4.enhance your language skills related w

2、ith reading and listening materials presented in this unitII. Teaching Procedures1.Deciding on a topicTask 1Answers may vary.Task 2 1 No, because they all seem like a subject rather than a topic, a subject which cannot be addressed even by a whole book, let alone by a1500-wordessay. 2Each of them ca

3、n be broken down into various and more specific aspects. For example, cancer can be classified into breast cancer, lung cancer, liver cancer and so on. Breast cancer can have such specific topics for research as causes for breast cancer, effects of breast cancer and prevention or diagnosis of breast

4、 cancer. 3 Actually the topics of each field are endless. Take breast cancer for example, we can have the topics like:Why Women Suffer from Breast Cancer More Than Men?A New Way to Find Breast TumorsSome Risks of Getting Breast Cancer in Daily LifeBreast Cancer and Its Direct Biological ImpactBreast

5、 Cancerthe Symptoms & DiagnosisBreastfeeding and Breast CancerTask 31 Text 1 illustrates how hackers or unauthorized users use one way or another to get inside a computer, while Text 2 describes the various electronic threats a computer may face.2 Both focus on the vulnerability of a computer.3 Text

6、 1 analyzes the ways of computer hackers, while Text 2 describes security problems of a computer. 4 Text 1: The way hackers “get inside” a computer Text 2: Electronic threats a computer facesYes, I think they are interesting, important, manageable and adequate. Task 41Lecture1:Ten Commandments of Co

7、mputer EthicsLecture 2:How to Deal with Computer HackersLecture 3:How I Begin to Develop Computer Applications2Answersmay vary.Task 5 Answers may vary.2 Formulating a research questionTask 1Text 3Research question 1: How many types of cloud services are there and what are they?Research question 2: W

8、hat is green computing?Research question 3: What are advantages of the cloud computing?Text 4Research question 1: What is the Web 3.0?Research question 2: What are advantages and disadvantages of the cloud computing?Research question 3: What security benefits can the cloud computing provide?Task 2 2

9、 Topic2: Threats of Artificial IntelligenceResearch questions:1) What are the threats of artificial intelligence?2) How can human beings control those threats?3) What are the difficulties to control those threats?3 Topic3: The Potentials of NanotechnologyResearch questions:1) What are its potentials

10、 in medicine?2) What are its potentials in space exploration?3) What are its potentials in communications?4 Topic4: Global Warming and Its EffectsResearch questions:1) How does it affect the pattern of climates?2) How does it affect economic activities?3) How does it affect human behavior?Task 3Answ

11、ers may vary.3 Writing a working titleTask 1Answers may vary.Task 21 Lecture 4 is about the security problems of cloud computing, while Lecture 5 is about the definition and nature of cloud computing, hence it is more elementary than Lecture 4.2 The four all focus on cloud computing. Although Lectur

12、e 4 and Text 4 address the same topic, the former is less optimistic while the latter has more confidence in the security of cloud computing. Text 3 illustrates the various advantages of cloud computing.3 Lecture 4: Cloud Computing SecurityLecture 5: What Is Cloud Computing?Task 3 Answers may vary.4

13、 Enhancing your academic languageReading: Text 11.Match the words with their definitions.1g 2a 3e 4b 5c 6d 7j 8f 9h 10i2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 symbolic 2distribu

14、ted 3site 4complex 5identify6fairly 7straightforward 8capability 9target 10attempt11process 12parameter 13interpretation 14technical 15range 16exploit 17networking 18involve 19 instance 20specification 21accompany 22predictable 23profile3. Read the sentences in the box. Pay attention to the parts in

15、 bold.Now complete the paragraph by translating the Chinese in brackets. You may refer to the expressions and the sentence patterns listed above.ranging from(从到)arise from some misunderstandings(来自于对误解)leaves a lot of problems unsolved(留下很多问题没有得到解决)opens a path for(打开了通道)requires a different frame o

16、f mind(需要有新的思想)4.Translate the following sentences from Text 1 into Chinese.1) 有些人声称黑客是那些超越知识疆界而不造成危害的好人(或即使造成危害,但并非故意而为),而“骇客”才是真正的坏人。2) 这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。3) 那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。 4) 另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有

17、任何具体目标,目的是攻击到尽可能多的潜在目标。5) 另外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在几个真正需要的端口,如电子邮件和网站流量。Reading: Text 21.Match the words with their definitions.1d 2f 3h 4i 5a 6e 7b 8j 9g 10c2.Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Chan

18、ge the form if necessary.1 compromised 2notoriety 3 interchangeably 4malfunctioned 5squeeze6 ingenious 7 emergence 8 humble 9 Cunning 10 vulnerability11criminal 12patches 13 sinister 14daunting 15replicate16malicious 17 spirals 18secure 19blur 20 stem21 disrepute 22 sophisticated 23harness 24 recipi

19、ent 25convert 3. Read the sentences in the box. Pay attention to the parts in bold. Now complete the paragraph by translating the Chinese in brackets. You may refer to the expressions and the sentence patterns listed above.There is evidence(有证据表明)so hasthe numberof hackers(黑客的数量也有很大增长)are often refe

20、rred to as(往往被称之为)compromise your computer(损坏你的计算机)capture your information(获取你的信息)access your computer(进入你的计算机)4 .Translate the following sentences from Text 2 into Chinese.1 看似无害的编程错误可能被利用,导致电脑被侵入,为电脑病毒和蠕虫的繁衍提供温床。2 当一个软件漏洞被发现,黑客可以将它变成一个侵入点,从而造成极大的破坏。在这之前,往往需要争分夺秒地利用正确的软件补丁来防止破坏的发生。3 最简单的钓鱼骗局试图利用迅速

21、致富的伎俩诱使诈骗目标寄钱。但网络骗子们也变得越来越狡猾,最近的陷阱是通过发送客户服务的电子邮件让用户进入假银行或商业网站,并在那里请他们“重新输入”他们的账户信息。4 间谍软件与垃圾邮件和钓鱼网络一起,构成了三个令人生厌的互联网害虫。尽管有些程序可以通过入侵软件漏洞从而进入电脑,但这些有害而秘密的程序通常会随着其他免费的应用软件侵入到计算机系统中。5 尽管因特网已经彻底改变了全球通讯,但是对于那些利用网络力量实现罪恶目的的人和那些负责阻止这些网络犯罪的人来说,他们之间的较量才刚刚开始。Reading: Text 31. Match the words with their definitio

22、ns.1f 2d 3e 4j 5i 6h 7b 8a 9g 10c2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 irrespective 2 be tailored 3 prone 4 opt 5maximum6coded 7provision 8catered 9check 10ready-made11modifie

23、d 12on-demand 13 whereabouts 14Hazardous 15incurred16applicable 17developer 18on offer19host 20nominal 21certified 22automated 23outage24sync 25back up 26minimal 27mobile 3. Read the sentences in the box. Pay attention to the parts in bold. Now complete the paragraph by translating the Chinese in br

24、ackets. You may referto the expressions and the sentence patterns listed above.Irrespective of whether(不管)saveusersthe trouble(使用户避免这样的麻烦)caters to the needs of(迎合了需求)for the purpose of(其目的就是)4. Translate the following sentences from Text 3 into Chinese. 1 云计算可定义为一种按次付费模式,这种模式可以根据要求迅速得到计算机分配的可靠资源,用户

25、很少需要自己进行管理。2 由于云计算可以用来不断提供资源,因此当你需要扩充计算机容量时就不需要去买硬件,就不会因为用电去冷却计算机设备而产生更多的二氧化碳。3 这意味着他们不需要开车到办公地点。这就可以省去燃料费,减少二氧化碳排放,从而保护了环境。 4 万一断电,客户可以在电脑再启动时使用和主机同步的备份。 5 除此之外,云计算还不容易受到黑客入侵和分布式拒绝服务的攻击,因为攻击者不知道数据的位置。Reading: Text 41. Match the words with their definitions.1c 2e 3a 4i 5g 6b 7d 8f 9j 10h2. Complete

26、the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 analogy 2compatible 3 Distribute 4 implement 5activated 6 static 7 aggregated 8 clone 9 innovative 10replacement 11 crashed12 compromised 13 mine 14

27、substantial 15asset 16 centralize 17 facilities18 loose 19 monitor 20integrate 21derived 22 update 23download24 upgrade 25licensed 26differential 27 install 28 minimum 29 in-house 30crucial 3. Read the sentences in the box. Pay attention to the parts in bold. Now complete the paragraph by translatin

28、g the Chinese in brackets. You may referto the expressions and the sentence patterns listed above.remains wide open(有很大的前景)is derived from the way in which(来自这样一个方法)becomes crucial(非常重要)will be substantially reduced(会大大降低)4.Translate the following sentences from Text 4 into Chinese.1这个术语来自于因特网往往呈现为网

29、络图的方法。 2目前云计算技术涉及一个数据中心的存在,这个中心能够为全世界用户提供服务。 3这就减少了由于没有硬件,如手提电脑带来的影响。 4虚拟化可以使一个损坏的云端服务器迅速找到替代品而不造成大的损失或破坏。 5云技术还处于起步阶段,更多新的优点会不断被发现。 III. Lecture ListeningListening: Lecture 11.To help computer users to be aware of the ethical uses of computers and the Internet.2. Because more and more people have s

30、tarted using computers and the Internet.3.Number Eight.4.Number Nine.5. Respect and fairness. 6.Lecture 1 addresses the topic “how a computer user avoids being a conscious or unconscious hacker” while Text 1 and 2 deal with the way hackers “get inside” a computer and electronic threats a computer fa

31、ces.7.Ten Commandments of Computer Ethics.Lecture 1 Computer ethics 8 Good morning. Did anyone hear the news about the teenager in New York who hacked into a banks database and stole about 30,000 credit card numbers over the week end? Hacking is related to computer ethics. Computer ethics deals with

32、 the proper use of information technology, such as computers and the Internet. By proper use, I mean socially responsible use. Well first talk about what ethical behavior is and then how this applies to computer use. Ethics is about right and wrong or it deals with moral judgment, with what is accep

33、table or unacceptable to do. Now we learn ideas about what is right and wrong from our families, our friends, and from the culture we live in. Because of differences in our backgrounds, we may not always agree on what is right and wrong. However, for our discussion today, I will define for you what

34、I mean by an ethical action. An ethical action is something someone does that benefits someone and doesnt hurt anyone. So, for example, if you see a man drop some money and you pick the money up and give it to him, this is an ethical action. On the other hand, if you pick up the money and dont give

35、it back to the man, this benefits you, but hurts the man. This is not an ethical action. Now what about computers? What are the ethical boundaries for using computers and Internet? Most people agree that it is wrong to steal from a store. Would they also say its wrong to copy music files from the In

36、ternet? Or, to take another example, most people agree that it is wrong to open an envelope and read a letter to someone else. Would they also say its wrong to read someone elses email?In the past decade or so, many more people have started using computers and the Internet, so these issues have beco

37、me important. In 1992, the Computer Ethics Institute was founded in the United States. This is a research, education, and policy study group whose goal is to increase awareness of the ethical issues that are likely to come up as technology develops. One concept the Computer Ethics Institute has deve

38、loped is the Ten Commandments of Computer Ethics. These rules are important guidelines the Institute thinks all computer users should follow. Now some of you may be familiar with the Ten Commandments from the Bible, like, uh, “Thou shalt not kill.” or “Thou shalt honor thy father and thy mother.” Th

39、e Ten Commandments of Computer Ethics have been written in the same style of language used in the Ten Commandments from the Bible. For example, they use the phrase “Thou shalt not”, “Thou shalt not” means “dont” or “you shouldnt”.Lets look at each commandment or rule.The first commandment says: Thou

40、 shalt not use a computer to harm other people. Simple enough, right?Number Two: Thou shalt not interfere with other peoples computer work. I interpret this to mean dont use a computer in any way that will affect or change the work someone else is doing. Dont move or edit someone elses files without

41、 telling them. Number Three: Thou shalt not snoop in other peoples files. To snoop means to try to find out something without another person knowing it. If you look at someone elses files on the computer or read their email, youre snooping. Respect other peoples privacy.Number Four: Thou shalt not u

42、se a computer to steal. There are situations on the Internet in which you have to decide if you are stealing or not, like downloading music files, as I mentioned earlier. Number Five: Thou shalt not use a computer to say things that are untrue. It is up to you to be truthful in your website, in your

43、 e-business, and in your email.Number Six: Thou shalt not use software for which you have not paid. In other words, if the software is free on the Internet, its okay to download and use it. However, it is not okay to copy software from a friend, because you didnt pay for it.Number Seven: Thou shalt

44、not use other peoples computer resources without telling them, or without paying them. For example, you shouldnt use someone elses computer, password, or Internet connection without asking them first.Number Eight: Thou shalt not appropriate someone elses ideas. Appropriate means to take words someon

45、e else wrote and say theyre yours. Uh, for example, you have to write a report for school. If you copy a term paper from the Internet and hand it in, youre breaking the rule. Copying even a few sentences off the Internet and presenting them as your own is breaking the rule. Number Nine: The ninth co

46、mmandment says: Thou shalt think about the social consequences of the program you are writing. Now, this applies mostly to computer programmers. Social consequences means how the program youre writing might affect others in society. Could hackers possibly use your program to illegally gain access to

47、 a computer system? Skillful hackers can hack into banks and into credit card companies; they can alter accounts and steal money. They can also create viruses that can cause billions of dollars of damage worldwide. Number Ten, The tenth commandment says: Thou shalt always use a computer in ways that are respectful of others. For example, sending unfriendly email to someone or about someone or creating websites with ne

展开阅读全文
相关资源
相关搜索

当前位置:首页 > 教育专区 > 小学资料

本站为文档C TO C交易模式,本站只提供存储空间、用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。本站仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知淘文阁网,我们立即给予删除!客服QQ:136780468 微信:18945177775 电话:18904686070

工信部备案号:黑ICP备15003705号© 2020-2023 www.taowenge.com 淘文阁