




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1、,学术英语 理工,Academic English for Science and Engineering,Unit 1 Choosing a Topic,Unit Contents,1 Deciding on a topic 2 Formulating a research question 3 Writing a working title 4 Enhancing your academic language (穿插在以上各版块中),Unit 1 Choosing a Topic,1 Deciding on a topic,Principles of Deciding on a topic
2、 Task 1 Narrow down and evaluate topics Task 2 Discuss Task 3 Read Text 1 and Text 2 and answer questions Text 1 How Do Computer Hackers “Get Inside” a Computer? Text 2 Electronic Threats of a Computer Task 4 Listen to Lecture 1, 2 and 3 and answer questions Lecture 1 Questions Lecture 2 Questions L
3、ecture 3 Questions,Unit 1 Choosing a Topic,1 Deciding on a topic,Four principles of deciding on a topic,Interesting,Important,Manageable,Adequate,Unit 1 Choosing a Topic,1 Deciding on a topic,City Development Sustainable Development of Cities Sustainable Development of Big Cities Sustainable Develop
4、ment of Chinese Big Cities Sustainable Development of Chinese Big Cities from the Biological Perspective,Unit 1 Choosing a Topic,1 Deciding on a topic,Unit 1 Choosing a Topic,1 Deciding on a topic,Unit 1 Choosing a Topic,1 Deciding on a topic,What is the main idea that each essay tries to illustrate
5、?,Text 1 illustrates how hackers or unauthorized users use one way or another to get inside a computer, while Text 2 describes the various electronic threats a computer might face.,In which aspect do the two essays share the same idea?,Both focus on the vulnerability of a computer.,Unit 1 Choosing a
6、 Topic,1 Deciding on a topic,In which aspect do the two essays differ?,Text 1 illustrates how hackers or unauthorized users use one way or another to get inside a computer, while Text 2 describes the various electronic threats a computer might face.,Unit 1 Choosing a Topic,1 Deciding on a topic,What
7、 topic does each essay address? Do you think they are appropriate according to the four principles mentioned on Page 2?,缺答案,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 1,1 What does “unauthorized user” refer to?,This term covers the entire range
8、of folks, from those involved in organized criminal activities to insiders who are pushing the limits of what they are authorized to do on a system.,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 1,2 Whats the difference of known and unknown vulnera
9、bilities?,This term covers the entire range of folks, from those involved in organized criminal activities to insiders who are pushing the limits of what they are authorized to do on a system.,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 1,3 How t
10、o protect yourself against computer attacks?,Make sure you have all the latest patches for your operating system and applications; Make sure your password is complex; Consider getting a hardware firewall and limiting the flow of data to and from the Internet to only the few select ports you actually
11、 need; Make sure your anti-virus software is up-to- date and check frequently to see if there are new virus definitions available; Back up your data.,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions.,5 c,10 i,1 g,2 a,3 e,4 b,6 d,7
12、j,8 f,9 h,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions.,1 a(n) (象征的) gesture of love 2 The publisher (分发) the book in Asia. 3 A “ ” (地点) is a place, and so a website. 4 a(n) (复杂的) network of systems 5 be used to (识别) potential
13、terrorists 6 deal the matter with him (完全地) 7 start with a pretty (直截了当) question 8 beyond the (功能) of the computers 9 hit the (目标) at a distance 10 the person never (尝试) to do anything more 11 a highly sophisticated (过程),symbolic,distribute,site,complex,identify,physically,straightforward,capabilit
14、y,target,attempt,process,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions.,12 work within the _ (限定因素) of time and budget 13 thanks for your kind _ (解释) 14 use many _ (专业的) terms 15 Prices _ (变化范围) from 340 U.S. Dollars to 390 U.S.
15、 Dollars. 16 _ (开拓) a new market in the city 17 be absorbed in the social _ (社交网络) 18 _ (涉及) unnecessary extra charges 19 only one _ (实例) out of many 20 get to know more about the _ (具体的细节) of the wedding 21 _ (陪伴) with her to watch movies,parameter,interpretation,technical,range,exploit,networking,
16、involve,instance,specification,accompany,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Complete the paragraph,When it comes to cloud computing, it is often worried that cloud computing is not reliable, the worries (从到) “I lose control over the system with cloud compu
17、ting” to “My files are not secure with cloud computing”. Actually the worries (来自于对误解) of cloud computing. Although the security of cloud computing _(留下很多问题没有得到解决), it (打开了通道) the future development of computers. Hence a better understanding of a new technology (需要有新的思想)_.,ranging from,arise from so
18、me misunderstandings,leaves a lot of problems unsolved,opens a path for,requires a different frame of mind,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Translate the following sentences from Text 1 into Chinese.,有些人声称黑客是那些扩宽知识界限而不造成危害的好人 (或即使造成危害,但并非故意而为),而“破碎者”才是真正
19、的坏人。,2 这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。,3 那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Translate the following sentences from Text 1 into Chinese.,5 另外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在仅有的几个你真
20、正需要的端口,如电子邮件和网站流量。,4 另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的是攻击到尽可能多的潜在目标。,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 2,1 What are Trojan horses?,Trojan horses are a string of recent specimens designed to snatch passwords or cred
21、it card information and install programs that can be used to remotely control infected machines.,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 2,2 Whats the respective aims of phishing and spyware?,Phishing is to trick a recipient into handing over
22、 money or sensitive personal information like their bank account details or a username and password. Spyware is to serve up unwanted adverts, change system settings and gather information on a users online behavior for marketing purposes.,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional ques
23、tions for your understanding of Text 2,3 Why does the writer say that the earliest “criminal” hackers were in fact relatively harmless?,It is because that they usually interested in testing the boundaries of their knowledge and their ability to get around security measures. They mainly performed har
24、mless pranks, for example employing low-tech tricks to get free calls through the U.S. phone networks.,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions.,5 a,10 c,1 d,2 f,3 h,4 i,6 e,7 b,8 j,9 g,Unit 1 Choosing a Topic,1 Deciding on
25、 a topic,Enhancing your academic language,Match the words with their definitions.,1 throw away a(n) (损坏的) computer 2 earn somebody considerable (恶名) 3 be used (可互换地) 4 A computer has (发生故障). 5 (挤) milk into the bottle 6 a(n) (有独创性的) solution to the problem 7 Chinas (出现) as a great power 8 of (卑微的) b
26、irth 9 (狡猾的) men often pass for wise. 10 exploit their (弱点) to fight them 11 a suspected (罪犯) 12 a jacket with leather (补丁) on the elbows.,compromised,notoriety,interchangeably,malfunctioned,squeeze,ingenious,emergence,humble,Cunning,vulnerability,criminal,patches,Unit 1 Choosing a Topic,1 Deciding
27、on a topic,Enhancing your academic language,Match the words with their definitions.,13 the (阴险的) looks on his face 14 This is a(n) (艰巨的) challenge. 15 the virus that can (复制) itself 16 His (恶毒的) gossip caused much mischief. 17 The path (盘旋) up the mountain. 18 a(n) (安全的) operating system 19 (使模糊) my
28、 vision 20 (阻止) the spread of an epidemic 21 fall into (坏名声) 22 solve (复杂的) electrical problems 23 (利用) natural resources 24 write a personal note to each (收件人) 25 (转换) holdings into shares,sinister,daunting,replicate,malicious,spirals,secure,blur,stem,sophisticated,disrepute,harness,recipient,conve
29、rt,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Translate the following sentences from Text 2 into Chinese.,看似无害的编程错误可以被利用,导致电脑被侵入并为电脑蠕虫和病毒的繁衍提供温床。,2 当一个软件漏洞被发现,黑客可以将漏洞变成一个侵入点,从而造成极大的破坏,在这之前,往往需要争分夺秒地利用正确的软件补丁来防止破坏的发生。,3 最简单的钓鱼骗局试图利用迅速致富的伎俩诱使诈骗目标寄钱。但网络骗子们也变得越来越狡猾,最近
30、的陷阱是通过发送客户服务的电子邮件让用户进入假银行或商业网站,并在那里请他们“重新输入”他们的账户信息。,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Translate the following sentences from Text 2 into Chinese.,4 间谍软件与垃圾邮件和钓鱼网络一起,构成了三个令人生厌的互联网害虫。尽管有些程序可以通过入侵软件漏洞从而进入电脑,但这些有害而秘密的程序通常会随着其他通常是免费的应用软件侵入到计算机系统中。,5 尽管因特网已经彻底
31、改变了全球通讯,但是对于那些意图为了罪恶目的而利用网络力量的人和那些负责阻止这些网络犯罪的人来说,他们之间的较量才刚刚开始。,Unit 1 Choosing a Topic,1 Deciding on a topic,1 Topics of each lecture,Lecture 1: _,Lecture 2: _,Lecture 3: _,2 Topic 1: _,Topic 2: _,The importance of Computer Ethics,How to deal with Computer Hackers,How I Begin to develop Computer App
32、lications,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Lecture 1,1 What is the topic of the lecture?,To help computer users to be aware of the ethical uses of computers and the Internet.,2 Why do ethical issues become more important?,People should respect other peop
33、les property and use resources fairly.,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Lecture 1,3 Which rule is about the way to avoid plagiarism?,Because more and more people have started using computers and the Internet.,4 Which rule do hackers mainly break?,Number
34、Eight.,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Lecture 1,What are the main principles behind the Ten Commandments of Computer Ethics?,Number Nine.,How is Lecture 1 different from Texts 1 and 2 in terms of content?,To help computer users to be aware of the ethic
35、al uses of computers and the Internet.,7 What is the title of the lecture you may suggest?,缺答案,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Lecture 2,1 Who is the mysterious sponsor or “the Anonymous”?,Its a sophisticated group of politically motivated hackers.,2 Ac
36、cording to the lecturer, what should we do besides putting a huge amount of money into cybersecurity for the most extraordinary technical solution?,We should talk to hackers and make use of them.,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Lecture 2,3 How do the pu
37、rchaser and the vendor do business on the CarderPlanet?,They do business by using the escraw system.,4 According to the lecturer, what kind of hackers should not be thrown into jail?,Hackers who have disabilities like autism.,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic lang
38、uage,Lecture 2,What is the solution to the hacker problem according to the lecturer?,Recruiting and mobilizing hackers on behalf of the state.,In which aspects is the lecture related to Texts 1 and 2?,Faced with the threats of computer hackers mentioned in Text 1 and 2, the speaker suggests that we
39、should talk to hackers, understand their disabilities, and make use of their talent.,7 What is the title of the lecture you may suggest?,Understand and Make Use of Hackers,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Lecture 3,1 What is the function of the app “Eart
40、h Fortune”?,It can display different kinds of color depending on ones fortune.,2 Why do a lot of kids find it difficult to make games?,Because not many kids know where they can learn to make up a program.,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Lecture 3,3 Wher
41、e does the lecturer put his apps?,The app store.,4 Why did the lecturer start an app club?,Because students at his school can come and learn how to design an app.,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Lecture 3,What is the big challenge to the iPad program?,H
42、ow should iPad be used and what apps should we put on the iPads.,What is the title of the talk you may suggest?,How Can I Get Fascinated with the iPads and Design Apps,7 Will the lecturer become a potential hacker? Why, or why not?,Most probably if he lacks such education as computer ethics.,Unit 1
43、Choosing a Topic,2 Formulating a research question,purposes of a research question Task 1 Read Text 3 and Text 4 and answer questions Text 3 How Do Computer Hackers “Get Inside” a Computer? Text 4 Electronic Threats of a Computer Task 2 Develop topics into research questions Task 3 Brainstorm and an
44、swer questions,Unit 1 Choosing a Topic,2 Formulating a research question,It identifies the specific objectives your research or your paper will address.,purposes of a research question,It determines the size of your research or the length of your paper.,Unit 1 Choosing a Topic,1 Deciding on a topic,
45、Text 3 Research question 1: _ Research question 2: _ Research question 3: _ Text 4 Research question 1: _ Research question 2: _ Research question 3: _,How many types of Cloud services and what are they?,What is green computing?,What advantages of the cloud computing?,What is the Web 3.0?,What advan
46、tages and disadvantages of the cloud computing?,Can the cloud computing provide security benefits?,Unit 1 Choosing a Topic,2 Formulating a research question,Additional questions for your understanding of Text 3,1 What is cloud computing?,Cloud computing is a pay-per-use model for enabling on-demand
47、access to reliable and configurable resources that can be quickly provisioned and releasedwith minimal consumer involvement in terms of management.,Unit 1 Choosing a Topic,2 Formulating a research question,Additional questions for your understanding of Text 3,2 What characteristics should cloud have
48、?,1 It should be able to quickly allot and relieve resources whenever required by clients; 2 It should have real-time backup to offer maximum up time to clients; 3 It should be able to cater to the needs of clients without having to involve clients into management of the service.,Unit 1 Choosing a T
49、opic,2 Formulating a research question,Additional questions for your understanding of Text 3,3 What are the advantages of cloud computing?,Remote Accessibility: With cloud computing, your business is not restricted to a particular location. Easy Expansion: As of the characteristics of cloud computin
50、g is its flexibility, you can quickly access more resources if you need to expand your business. Security: Though people doubt cloud computing, clouds tend to be more secure than the traditional business models. Environmentally Friendly: Usage of ready-made resources tailored to your needs helps you
51、 reduce the electricity expenses,Unit 1 Choosing a Topic,Enhancing your academic language,Match the words with their definitions.,5 i,10 c,1 f,2 d,3 e,4 j,6 h,7 b,8 a,9 g,2 Formulating a research question,Unit 1 Choosing a Topic,Enhancing your academic language,Match the words with their definitions
52、.,2 Formulating a research question,1 (不管) of their age and education 2 The program must (迎合) to the needs of your customers. 3 (易于) to develop lung cancer 4 (选择) for one style or the other 5 He supplies the (最大的) amount of information. 6 These product orders should be (编号). 7 the (提供) of facilities
53、 for children 8 a restaurant (合适于) for families 9 the need for a tighter (检查) on arms sales 10 (现成的) excuse 11 The aircraft has been (改进) and improved. 12 provide treatment (所要求的) 13 the (去向) of the missing documents,irrespective,be tailored,coded,provision,catered,check,prone,maximum,opt,ready-made
54、,modified,on-demand,whereabouts,Unit 1 Choosing a Topic,Enhancing your academic language,Match the words with their definitions.,2 Formulating a research question,14 (有害的) waste must be appropriately dealt with. 15 The terrible damage has been (遭受到了). 16 Few of the rules are (适合于) to the country. 17
55、 an industrial (开发商) 18 a whole range of services (所提供的) 19 (主持) a talk show 20 It is free or for a (极小的,象征性的) charge. 21 get these accounts (核证) 22 a highly (自动化) factory 23 a power (断供期) 24 Demand and supply are out of (同步一致). 25 The evidence can (证实) his story. 26 a great victory with (最小的) price
56、 27 a highly (流动的) society,Hazardous,incurred,applicable,developer,on offer,host,nominal,certified,automated,sync,outage,back up,minimal,mobile,Unit 1 Choosing a Topic,Enhancing your academic language,Translate the following sentences from Text 3 into Chinese.,2 Formulating a research question,云计算可定义为一种付款模式,这种模式可以根据提出的要求迅速得到可靠的计算机分配资源,而付钱用户很少要自己进行管理。,2 由于云计算可以总是用来不断提供资源,因此当你需要扩充计算机容量,你不需要去买硬件。这样,你就不会因为用更多的电去冷却计算机设备而产生更多的二氧化碳。,Unit 1 Choosing a Topic,Enhancing your aca
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 7-Python程序设计 python试题标准答案及评分标准
- 机械设备租赁协议书范本2025年
- 工程装修合同范本2025年
- 聚焦2025年:医疗器械国产化替代对行业竞争格局的调整报告
- 二零二五年度客服外包服务合同大全
- 2025版工程车辆买卖合同运输、培训及安全操作指导服务合同
- 2025版餐饮APP线上线下融合与品牌推广合同
- 2025年度广告活动策划合同范本简易指南
- 2025年版新能源项目担保合同与主合同技术支持协议
- 2025版灯光工程设计与施工及全程维护合同
- 2025-2030国内植保无人机行业市场发展现状及竞争格局与投资发展研究报告
- 银屑病的用药护理
- 家庭农场购销合同协议
- 企业级IT数据备份与恢复服务协议
- 2025新修订《代表法》五大亮点解读
- 公共浴室卫生管理制度
- 护理文献综述汇报
- 职业技术学院《机械制造工艺与工艺装备》课程标准 机械制造及自动化
- 【西安交通大学】2025年电力人工智能多模态大模型创新技术及应用报告
- 风电工程质量管理规程
- 树根桩施工方案40867
评论
0/150
提交评论