学术英语理工教师手册学术英语理工2013-2014-21Unit1ChoosingaTopicITeachingObjectivesInthisunit,youwilllearnhowto:1.chooseaparticulartopicforyourresearch2.formulatearesearchquestion3.writeaworkingtitleforyourresearchessay4.enhanceyourlanguageskillsrelatedwithreadingandlisteningmaterialspresentedinthisunitII.TeachingProcedures1.DecidingonatopicTask1Answersmayvary.Task21No,becausetheyallseemlikeasubjectratherthanatopic,asubjectwhichcannotbeaddressedevenbyawholebook,letalonebya1500-wordessay.2Eachofthemcanbebrokendownintovariousandmorespecificaspects.Forexample,cancercanbeclassifiedintobreastcancer,lungcancer,livercancerandsoon.Breastcancercanhavesuchspecifictopicsforresearchascausesforbreastcancer,effectsofbreastcancerandpreventionordiagnosisofbreastcancer.3Actuallythetopicsofeachfieldareendless.Takebreastcancerforexample,wecanhavethetopicslike:WhyWomenSufferfromBreastCancerMoreThanMen?ANewWaytoFindBreastTumorsSomeRisksofGettingBreastCancerinDailyLifeBreastCancerandItsDirectBiologicalImpactBreastCancer—theSymptoms&DiagnosisBreastfeedingandBreastCancerTask31Text1illustrateshowhackersorunauthorizedusersuseonewayoranothertogetinsideacomputer,whileText2describesthevariouselectronicthreatsacomputermayface.2Bothfocusonthevulnerabilityofacomputer.学术英语理工2013-2014-223Text1analyzesthewaysofcomputerhackers,whileText2describessecurityproblemsofacomputer.4Text1:Thewayhackers“getinside”acomputerText2:ElectronicthreatsacomputerfacesYes,Ithinktheyareinteresting,important,manageableandadequate.Task41Lecture1:TenCommandmentsofComputerEthicsLecture2:HowtoDealwithComputerHackersLecture3:HowIBegintoDevelopComputerApplications2Answersmayvary.Task5Answersmayvary.2FormulatingaresearchquestionTask1Text3Researchquestion1:Howmanytypesofcloudservicesarethereandwhatarethey?Researchquestion2:Whatisgreencomputing?Researchquestion3:Whatareadvantagesofthecloudcomputing?Text4Researchquestion1:WhatistheWeb3.0?Researchquestion2:Whatareadvantagesanddisadvantagesofthecloudcomputing?Researchquestion3:Whatsecuritybenefitscanthecloudcomputingprovide?Task22Topic2:ThreatsofArtificialIntelligenceResearchquestions:1)Whatarethethreatsofartificialintelligence?2)Howcanhumanbeingscontrolthosethreats?3)Whatarethedifficultiestocontrolthosethreats?3Topic3:ThePotentialsofNanotechnologyResearchquestions:1)Whatareitspotentialsinmedicine?2)Whatareitspotentialsinspaceexploration?3)Whatareitspotentialsincommunications?4Topic4:GlobalWarmingandItsEffectsResearchquestions:1)Howdoesitaffectthepatternofclimates?2)Howdoesitaffecteconomicactivities?3)Howdoesitaffecthumanbehavior?学术英语理工2013-2014-23Task3Answersmayvary.3WritingaworkingtitleTask1Answersmayvary.Task21Lecture4isaboutthesecurityproblemsofcloudcomputing,whileLecture5isaboutthedefinitionandnatureofcloudcomputing,henceitismoreelementarythanLecture4.2Thefourallfocusoncloudcomputing.AlthoughLecture4andText4addressthesametopic,theformerislessoptimisticwhilethelatterhasmoreconfidenceinthesecurityofcloudcomputing.Text3illustratesthevariousadvantagesofcloudcomputing.3Lecture4:CloudComputingSecurityLecture5:WhatIsCloudComputing?Task3Answersmayvary.4EnhancingyouracademiclanguageReading:Text11.Matchthewordswiththeirdefinitions.1g2a3e4b5c6d7j8f9h10i2.CompletethefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.1symbolic2distributed3site4complex5identify6fairly7straightforward8capability9target10attempt11process12parameter13interpretation14technical15range16exploit17networking18involve19instance20specification21accompany22predictable23profile3.Readthesentencesinthebox.Payattentiontothepartsinbold.NowcompletetheparagraphbytranslatingtheChineseinbrackets.Youmayrefertotheexpressionsandthesentencepatternslistedabove.rangingfrom(从……到)arisefromsomemisunderstandings(来自于对……误解)leavesalotofproblemsunsolved(留下很多问题没有得到解决)opensapathfor(打开了通道)requiresadifferentframeofmind(需要有新的思想)学术英语理工2013-2014-244.TranslatethefollowingsentencesfromText1intoChinese.1)有些人声称黑客是那些超越知识疆界而不造成危害的好人(或即使造成危害,但并非故意而为),而“骇客”才是真正的坏人。2)这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。3)那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。4)另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的是攻击到尽可能多的潜在目标。5)另外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在几个真正需要的端口,如电子邮件和网站流量。Reading:Text21.Matchthewordswiththeirdefinitions.1d2f3h4i5a6e7b8j9g10c2.CompletethefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.1compromised2notoriety3interchangeably4malfunctioned5squeeze6ingenious7emergence8humble9Cunning10vulnerability11criminal12patches13sinister14daunting15replicate16malicious17spirals18secure19blur20stem21disrepute22sophisticated23harness24recipient25convert3.Readthesentencesinthebox.Payattentiontothepartsinbold.NowcompletetheparagraphbytranslatingtheChineseinbrackets.Youmayrefertotheexpressionsandthesentencepatternslistedabove.Thereisevidence(有证据表明)sohasthenumberofhackers(黑客的数量也有很大增长)areoftenreferredtoas(往往被称之为)compromiseyourcomputer(损坏你的计算机)captureyour