《学术英语(理工)详解答案_Unit1上课讲义.ppt》由会员分享,可在线阅读,更多相关《学术英语(理工)详解答案_Unit1上课讲义.ppt(71页珍藏版)》请在taowenge.com淘文阁网|工程机械CAD图纸|机械工程制图|CAD装配图下载|SolidWorks_CaTia_CAD_UG_PROE_设计图分享下载上搜索。
1、学术学术(xush)(xush)英语英语 理工理工Academic English Academic English for Science and Engineeringfor Science and Engineering第一页,共71页。第二页,共71页。Unit 1 Choosing a TopicUnit Contents1 Deciding on a topic2 Formulating a research question3 Writing a working title4 Enhancing your academic language (穿插在以上(穿插在以上(yshng)
2、各版块中)各版块中)第三页,共71页。Unit 1 Choosing a Topic1 Deciding on a topicPrinciples of Deciding on a topicTask 1 Narrow down and evaluate topicsTask 2 DiscussTask 3 Read Text 1 and Text 2 and answer questions Text 1 How Do Computer Hackers“Get Inside”a Computer?Text 2 Electronic Threats of a ComputerTask 4 Li
3、sten to Lecture 1,2 and 3 and answer questions Lecture 1 Questions Lecture 2 Questions Lecture 3 Questions 第四页,共71页。Unit 1 Choosing a Topic1 Deciding on a topicFour principles of deciding on a topic Interesting Important Manageable Adequate第五页,共71页。Unit 1 Choosing a Topic1 Deciding on a topicCity De
4、velopmentSustainable Development of CitiesSustainable Development of Big CitiesSustainable Development of Chinese Big CitiesSustainable Development of Chinese Big Cities from the Biological Perspective第六页,共71页。Unit 1 Choosing a Topic1 Deciding on a topicTopicsYour narrower subtopicsQuestions Global
5、Warming Is the topic appropriate for a 1500-word essay?Why or why not?If the topic is too general,how do you narrow it down to a more manageable topic?Can you suggest some appropriate topics of each subject?CancerNanotechnologyInternet Artificial intelligence第七页,共71页。Unit 1 Choosing a Topic1 Decidin
6、g on a topicTopicsYour narrower subtopicsQuestions Energy Is the topic appropriate for a 1500-word essay?Why or why not?If the topic is too general,how do you narrow it down to a more manageable topic?Can you suggest some appropriate topics of each subject?Genetic engineeringUniverse第八页,共71页。Unit 1
7、Choosing a Topic1 Deciding on a topic What is the main idea that each essay tries to illustrate?Text 1 illustrates how hackers or unauthorized users use one way or another to get inside a computer,while Text 2 describes the various electronic threats a computer might face.In which aspect do the two
8、essays share the same idea?Both focus on the vulnerability of a computer.第九页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic In which aspect do the two essays differ?Text 1 illustrates how hackers or unauthorized users use one way or another to get inside a computer,while Text 2 describes the vari
9、ous electronic threats a computer might face.第十页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic What topic does each essay address?Do you think they are appropriate according to the four principles mentioned on Page 2?缺答案(d n)第十一页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Additional quest
10、ions for your understanding of Text 11 What does“unauthorized user”refer to?This term covers the entire range of folks,from those involved in organized criminal activities to insiders who are pushing the limits of what they are authorized to do on a system.第十二页,共71页。Unit 1 Choosing a Topic1 Deciding
11、 on a topic Additional questions for your understanding of Text 12 Whats the difference of known and unknown vulnerabilities?This term covers the entire range of folks,from those involved in organized criminal activities to insiders who are pushing the limits of what they are authorized to do on a s
12、ystem.第十三页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Additional questions for your understanding of Text 13 How to protect yourself against computer attacks?Make sure you have all the latest patches for your operating system and applications;Make sure your password is complex;Consider gettin
13、g a hardware firewall and limiting the flow of data to and from the Internet to only the few select ports you actually need;Make sure your anti-virus software is up-to-date and check frequently to see if there are new virus definitions available;Back up your data.第十四页,共71页。Unit 1 Choosing a Topic1 D
14、eciding on a topic Enhancing your academic languageMatch the words with their definitions.5 c 10 i 1 g 2 a3 e4 b6 d7 j8 f9 h 第十五页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Enhancing your academic languageMatch the words with their definitions.1 a(n)(象征的)gesture of love2 The publisher (分发)the
15、 book in Asia.3 A“”(地点)is a place,and so a website.4 a(n)(复杂(fz)的)network of systems5 be used to (识别)potential terrorists6 deal the matter with him (完全地)7 start with a pretty (直截了当)question8 beyond the (功能)of the computers9 hit the (目标)at a distance10 the person never (尝试)to do anything more11 a hig
16、hly sophisticated (过程)symbolic distribute site complexidentifyphysicallystraightforwardcapabilitytargetattemptprocess第十六页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Enhancing your academic languageMatch the words with their definitions.12 work within the _(限定因素)of time and budget13 thanks for
17、 your kind _(解释)14 use many _(专业的)terms15 Prices _(变化范围)from 340 U.S.Dollars to 390 U.S.Dollars.16 _(开拓)a new market in the city17 be absorbed in the social _(社交网络(wnglu)18 _(涉及)unnecessary extra charges19 only one _(实例)out of many20 get to know more about the _(具体的细节)of the wedding21 _(陪伴)with her
18、to watch moviesparameterinterpretationtechnicalrangeexploitnetworkinginvolveinstancespecificationaccompany第十七页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Enhancing your academic languageComplete the paragraph When it comes to cloud computing,it is often worried that cloud computing is not rel
19、iable,the worries (从到)“I lose control over the system with cloud computing”to“My files are not secure with cloud computing”.Actually the worries (来自于对误解)of cloud computing.Although the security of cloud computing _(留下很多问题没有得到解决(jiju),it (打开了通道)the future development of computers.Hence a better under
20、standing of a new technology (需要有新的思想)_.ranging fromarise from some misunderstandingsleaves a lot of problems unsolvedopens a path forrequires a different frame of mind第十八页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Enhancing your academic languageTranslate the following sentences from Text 1
21、 into Chinese.1有些人声称黑客是那些扩宽知识界限而不造成危害的好人2 (或即使造成危害,但并非故意而为),而“破碎(p su)者”才是真正的坏人。2 这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在(zhngzi)交流的信息。3 那些(nxi)系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。第十九页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Enhancing your academic languageTransla
22、te the following sentences from Text 1 into Chinese.5 另外,考虑安装一个(y)硬件防火墙并将从互联网中流入和流出的数据限定在仅有的几个你真正需要的端口,如电子邮件和网站流量。4 另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有(mi yu)任何具体目标,目的是攻击到尽可能多的潜在目标。第二十页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Additional questions for your understanding of Text 2
23、1 What are Trojan horses?Trojan horses are a string of recent specimens designed to snatch passwords or credit card information and install programs that can be used to remotely control infected machines.第二十一页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Additional questions for your understand
24、ing of Text 22 Whats the respective aims of phishing and spyware?Phishing is to trick a recipient into handing over money or sensitive personal information like their bank account details or a username and password.Spyware is to serve up unwanted adverts,change system settings and gather information
25、 on a users online behavior for marketing purposes.第二十二页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Additional questions for your understanding of Text 23 Why does the writer say that the earliest“criminal”hackers were in fact relatively harmless?It is because that they usually interested in
26、testing the boundaries of their knowledge and their ability to get around security measures.They mainly performed harmless pranks,for example employing low-tech tricks to get free calls through the U.S.phone networks.第二十三页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Enhancing your academic lan
27、guageMatch the words with their definitions.5 a 10 c 1 d 2 f3 h4 i6 e7 b8 j9 g 第二十四页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Enhancing your academic languageMatch the words with their definitions.1 throw away a(n)(损坏的)computer2 earn somebody considerable (恶名)3 be used (可互换地)4 A computer ha
28、s (发生故障).5 (挤)milk into the bottle6 a(n)(有独创性的)solution to the problem7 Chinas (出现)as a great power8 of (卑微的)birth9 (狡猾的)men often pass for wise.10 exploit their (弱点(rudin)to fight them11 a suspected (罪犯)12 a jacket with leather (补丁)on the promised notorietyinterchangeablymalfunctionedsqueezeingenio
29、usemergencehumbleCunningvulnerabilitycriminalpatches第二十五页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Enhancing your academic languageMatch the words with their definitions.13 the (阴险的)looks on his face14 This is a(n)(艰巨的)challenge.15 the virus that can (复制)itself16 His (恶毒(d)的)gossip caused m
30、uch mischief.17 The path (盘旋)up the mountain.18 a(n)(安全的)operating system19 (使模糊)my vision20 (阻止)the spread of an epidemic21 fall into (坏名声)22 solve (复杂的)electrical problems23 (利用)natural resources24 write a personal note to each (收件人)25 (转换)holdings into sharessinisterdauntingreplicate maliciousspi
31、ralssecureblurstem sophisticateddisreputeharnessrecipientconvert第二十六页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Enhancing your academic languageTranslate the following sentences from Text 2 into Chinese.1看似无害的编程错误可以被利用,导致电脑被侵入并为电脑蠕虫和病毒(bngd)的繁衍提供温床。2 当一个软件漏洞被发现,黑客可以(ky)将漏洞变成一个侵入点,从而造成极大的破坏,在
32、这之前,往往需要争分夺秒地利用正确的软件补丁来防止破坏的发生。3 最简单的钓鱼骗局试图利用迅速致富的伎俩诱使诈骗目标寄钱。但网络骗子们也变得越来越狡猾,最近的陷阱是通过发送客户服务的电子邮件让用户进入(jnr)假银行或商业网站,并在那里请他们“重新输入”他们的账户信息。第二十七页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Enhancing your academic languageTranslate the following sentences from Text 2 into Chinese.4 间谍软件与垃圾邮件和钓鱼网络一起
33、,构成了三个令人生厌的互联网害虫。尽管有些程序可以通过入侵软件漏洞从而进入(jnr)电脑,但这些有害而秘密的程序通常会随着其他通常是免费的应用软件侵入到计算机系统中。5 尽管因特网已经彻底改变了全球通讯,但是对于那些意图为了罪恶目的而利用网络(wnglu)力量的人和那些负责阻止这些网络(wnglu)犯罪的人来说,他们之间的较量才刚刚开始。第二十八页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic1 Topics of each lectureLecture 1:_Lecture 2:_Lecture 3:_2 Topic 1:_ Topic
34、2:_The importance of Computer Ethics How to deal with Computer HackersHow I Begin to develop Computer Applications第二十九页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Enhancing your academic languageLecture11 What is the topic of the lecture?To help computer users to be aware of the ethical uses
35、of computers and the Internet.2 Why do ethical issues become more important?People should respect other peoples property and use resources fairly.第三十页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Enhancing your academic languageLecture13 Which rule is about the way to avoid plagiarism?Because m
36、ore and more people have started using computers and the Internet.4 Which rule do hackers mainly break?Number Eight.第三十一页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Enhancing your academic languageLecture15What are the main principles behind the Ten Commandments of Computer Ethics?Number Nine
37、.6How is Lecture 1 different from Texts 1 and 2 in terms of content?To help computer users to be aware of the ethical uses of computers and the Internet.7 What is the title of the lecture you may suggest?缺答案(d n)第三十二页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Enhancing your academic language
38、Lecture21 Who is the mysterious sponsor or“the Anonymous”?Its a sophisticated group of politically motivated hackers.2 According to the lecturer,what should we do besides putting a huge amount of money into cybersecurity for the most extraordinary technical solution?We should talk to hackers and mak
39、e use of them.第三十三页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Enhancing your academic languageLecture23 How do the purchaser and the vendor do business on the CarderPlanet?They do business by using the escraw system.4 According to the lecturer,what kind of hackers should not be thrown into j
40、ail?Hackers who have disabilities like autism.第三十四页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Enhancing your academic languageLecture25What is the solution to the hacker problem according to the lecturer?Recruiting and mobilizing hackers on behalf of the state.6In which aspects is the lectur
41、e related to Texts 1 and 2?Faced with the threats of computer hackers mentioned in Text 1 and 2,the speaker suggests that we should talk to hackers,understand their disabilities,and make use of their talent.7 What is the title of the lecture you may suggest?Understand and Make Use of Hackers第三十五页,共7
42、1页。Unit 1 Choosing a Topic1 Deciding on a topic Enhancing your academic languageLecture31 What is the function of the app“Earth Fortune”?It can display different kinds of color depending on ones fortune.2 Why do a lot of kids find it difficult to make games?Because not many kids know where they can
43、learn to make up a program.第三十六页,共71页。Unit 1 Choosing a Topic1 Deciding on a topic Enhancing your academic languageLecture33 Where does the lecturer put his apps?The app store.4 Why did the lecturer start an app club?Because students at his school can come and learn how to design an app.第三十七页,共71页。U
44、nit 1 Choosing a Topic1 Deciding on a topic Enhancing your academic languageLecture35What is the big challenge to the iPad program?How should iPad be used and what apps should we put on the iPads.6What is the title of the talk you may suggest?How Can I Get Fascinated with the iPads and Design Apps7
45、Will the lecturer become a potential hacker?Why,or why not?Most probably if he lacks such education as computer ethics.第三十八页,共71页。Unit 1 Choosing a Topic2 Formulating a research questionpurposes of a research questionTask 1 Read Text 3 and Text 4 and answer questions Text 3 How Do Computer Hackers“G
46、et Inside”a Computer?Text 4 Electronic Threats of a ComputerTask 2 Develop topics into research questions Task 3 Brainstorm and answer questions 第三十九页,共71页。Unit 1 Choosing a Topic2 Formulating a research question It identifies the specific objectives your research or your paper will address.purposes
47、 of a research question It determines the size of your research or the length of your paper.第四十页,共71页。Unit 1 Choosing a Topic1 Deciding on a topicText 3Research question 1:_Research question 2:_Research question 3:_Text 4Research question 1:_Research question 2:_Research question 3:_How many types o
48、f Cloud services and what are they?What is green computing?What advantages of the cloud computing?What is the Web 3.0?What advantages and disadvantages of the cloud computing?Can the cloud computing provide security benefits?第四十一页,共71页。Unit 1 Choosing a Topic2 Formulating a research question Additio
49、nal questions for your understanding of Text 31 What is cloud computing?Cloud computing is a pay-per-use model for enabling on-demand access to reliable and configurable resources that can be quickly provisioned and releasedwith minimal consumer involvement in terms of management.第四十二页,共71页。Unit 1 C
50、hoosing a Topic2 Formulating a research question Additional questions for your understanding of Text 32 What characteristics should cloud have?1 It should be able to quickly allot and relieve resources whenever required by clients;2 It should have real-time backup to offer maximum up time to clients