学术英语课后答案--unit1

整理文档很辛苦,赏杯茶钱您下走!

免费阅读已结束,点击下载阅读编辑剩下 ...

阅读已结束,您可以下载文档离线阅读编辑

资源描述

学术英语理工教师手册学术英语理工2013-2014-21Unit1ChoosingaTopicITeachingObjectivesInthisunit,youwilllearnhowto:1.chooseaparticulartopicforyourresearch2.formulatearesearchquestion3.writeaworkingtitleforyourresearchessay4.enhanceyourlanguageskillsrelatedwithreadingandlisteningmaterialspresentedinthisunitII.TeachingProcedures1.DecidingonatopicTask1Answersmayvary.Task21No,becausetheyallseemlikeasubjectratherthanatopic,asubjectwhichcannotbeaddressedevenbyawholebook,letalonebya1500-wordessay.2Eachofthemcanbebrokendownintovariousandmorespecificaspects.Forexample,cancercanbeclassifiedintobreastcancer,lungcancer,livercancerandsoon.Breastcancercanhavesuchspecifictopicsforresearchascausesforbreastcancer,effectsofbreastcancerandpreventionordiagnosisofbreastcancer.3Actuallythetopicsofeachfieldareendless.Takebreastcancerforexample,wecanhavethetopicslike:WhyWomenSufferfromBreastCancerMoreThanMen?ANewWaytoFindBreastTumorsSomeRisksofGettingBreastCancerinDailyLifeBreastCancerandItsDirectBiologicalImpactBreastCancer—theSymptoms&DiagnosisBreastfeedingandBreastCancerTask31Text1illustrateshowhackersorunauthorizedusersuseonewayoranothertogetinsideacomputer,whileText2describesthevariouselectronicthreatsacomputermayface.2Bothfocusonthevulnerabilityofacomputer.学术英语理工2013-2014-223Text1analyzesthewaysofcomputerhackers,whileText2describessecurityproblemsofacomputer.4Text1:Thewayhackers“getinside”acomputerText2:ElectronicthreatsacomputerfacesYes,Ithinktheyareinteresting,important,manageableandadequate.Task41Lecture1:TenCommandmentsofComputerEthicsLecture2:HowtoDealwithComputerHackersLecture3:HowIBegintoDevelopComputerApplications2Answersmayvary.Task5Answersmayvary.2FormulatingaresearchquestionTask1Text3Researchquestion1:Howmanytypesofcloudservicesarethereandwhatarethey?Researchquestion2:Whatisgreencomputing?Researchquestion3:Whatareadvantagesofthecloudcomputing?Text4Researchquestion1:WhatistheWeb3.0?Researchquestion2:Whatareadvantagesanddisadvantagesofthecloudcomputing?Researchquestion3:Whatsecuritybenefitscanthecloudcomputingprovide?Task22Topic2:ThreatsofArtificialIntelligenceResearchquestions:1)Whatarethethreatsofartificialintelligence?2)Howcanhumanbeingscontrolthosethreats?3)Whatarethedifficultiestocontrolthosethreats?3Topic3:ThePotentialsofNanotechnologyResearchquestions:1)Whatareitspotentialsinmedicine?2)Whatareitspotentialsinspaceexploration?3)Whatareitspotentialsincommunications?4Topic4:GlobalWarmingandItsEffectsResearchquestions:1)Howdoesitaffectthepatternofclimates?2)Howdoesitaffecteconomicactivities?3)Howdoesitaffecthumanbehavior?学术英语理工2013-2014-23Task3Answersmayvary.3WritingaworkingtitleTask1Answersmayvary.Task21Lecture4isaboutthesecurityproblemsofcloudcomputing,whileLecture5isaboutthedefinitionandnatureofcloudcomputing,henceitismoreelementarythanLecture4.2Thefourallfocusoncloudcomputing.AlthoughLecture4andText4addressthesametopic,theformerislessoptimisticwhilethelatterhasmoreconfidenceinthesecurityofcloudcomputing.Text3illustratesthevariousadvantagesofcloudcomputing.3Lecture4:CloudComputingSecurityLecture5:WhatIsCloudComputing?Task3Answersmayvary.4EnhancingyouracademiclanguageReading:Text11.Matchthewordswiththeirdefinitions.1g2a3e4b5c6d7j8f9h10i2.CompletethefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.1symbolic2distributed3site4complex5identify6fairly7straightforward8capability9target10attempt11process12parameter13interpretation14technical15range16exploit17networking18involve19instance20specification21accompany22predictable23profile3.Readthesentencesinthebox.Payattentiontothepartsinbold.NowcompletetheparagraphbytranslatingtheChineseinbrackets.Youmayrefertotheexpressionsandthesentencepatternslistedabove.rangingfrom(从……到)arisefromsomemisunderstandings(来自于对……误解)leavesalotofproblemsunsolved(留下很多问题没有得到解决)opensapathfor(打开了通道)requiresadifferentframeofmind(需要有新的思想)学术英语理工2013-2014-244.TranslatethefollowingsentencesfromText1intoChinese.1)有些人声称黑客是那些超越知识疆界而不造成危害的好人(或即使造成危害,但并非故意而为),而“骇客”才是真正的坏人。2)这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。3)那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。4)另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的是攻击到尽可能多的潜在目标。5)另外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在几个真正需要的端口,如电子邮件和网站流量。Reading:Text21.Matchthewordswiththeirdefinitions.1d2f3h4i5a6e7b8j9g10c2.CompletethefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.1compromised2notoriety3interchangeably4malfunctioned5squeeze6ingenious7emergence8humble9Cunning10vulnerability11criminal12patches13sinister14daunting15replicate16malicious17spirals18secure19blur20stem21disrepute22sophisticated23harness24recipient25convert3.Readthesentencesinthebox.Payattentiontothepartsinbold.NowcompletetheparagraphbytranslatingtheChineseinbrackets.Youmayrefertotheexpressionsandthesentencepatternslistedabove.Thereisevidence(有证据表明)sohasthenumberofhackers(黑客的数量也有很大增长)areoftenreferredtoas(往往被称之为)compromiseyourcomputer(损坏你的计算机)captureyour

1 / 19
下载文档,编辑使用

©2015-2020 m.777doc.com 三七文档.

备案号:鲁ICP备2024069028号-1 客服联系 QQ:2149211541

×
保存成功