学术英语课后答案unit1.docx

上传人:b****1 文档编号:20157207 上传时间:2023-04-25 格式:DOCX 页数:27 大小:37.30KB
下载 相关 举报
学术英语课后答案unit1.docx_第1页
第1页 / 共27页
学术英语课后答案unit1.docx_第2页
第2页 / 共27页
学术英语课后答案unit1.docx_第3页
第3页 / 共27页
学术英语课后答案unit1.docx_第4页
第4页 / 共27页
学术英语课后答案unit1.docx_第5页
第5页 / 共27页
点击查看更多>>
下载资源
资源描述

学术英语课后答案unit1.docx

《学术英语课后答案unit1.docx》由会员分享,可在线阅读,更多相关《学术英语课后答案unit1.docx(27页珍藏版)》请在冰豆网上搜索。

学术英语课后答案unit1.docx

学术英语课后答案unit1

学术英语理工

 

教师手册

Unit1ChoosingaTopic

ITeachingObjectives

Inthisunit,youwilllearnhowto:

aparticulartopicforyourresearch

aresearchquestion

aworkingtitleforyourresearchessay

yourlanguageskillsrelatedwithreadingandlisteningmaterialspresentedinthisunit

II.TeachingProcedures

onatopic

Task1

Answersmayvary.

Task2

1No,becausetheyallseemlikeasubjectratherthanatopic,asubjectwhichcannotbeaddressedevenbyawholebook,letalonebya1500-wordessay.

2Eachofthemcanbebrokendownintovariousandmorespecificaspects.Forexample,cancercanbeclassifiedintobreastcancer,lungcancer,livercancerandsoon.Breastcancercanhavesuchspecifictopicsforresearchascausesforbreastcancer,effectsofbreastcancerandpreventionordiagnosisofbreastcancer.

3Actuallythetopicsofeachfieldareendless.Takebreastcancerforexample,wecanhavethetopicslike:

WhyWomenSufferfromBreastCancerMoreThanMen

ANewWaytoFindBreastTumors

SomeRisksofGettingBreastCancerinDailyLife

BreastCancerandItsDirectBiologicalImpact

BreastCancer—theSymptoms&Diagnosis

BreastfeedingandBreastCancer

Task3

1Text1illustrateshowhackersorunauthorizedusersuseonewayoranothertogetinsideacomputer,whileText2describesthevariouselectronicthreatsacomputermayface.

2Bothfocusonthevulnerabilityofacomputer.

3Text1analyzesthewaysofcomputerhackers,whileText2describessecurityproblemsofacomputer.

4Text1:

Thewayhackers“getinside”acomputer

Text2:

Electronicthreatsacomputerfaces

Yes,Ithinktheyareinteresting,important,manageableandadequate.

Task4

1Lecture1:

TenCommandmentsofComputerEthics

Lecture2:

HowtoDealwithComputerHackers

Lecture3:

HowIBegintoDevelopComputerApplications

2Answersmayvary.

Task5

Answersmayvary.

2Formulatingaresearchquestion

Task1

Text3

Researchquestion1:

Howmanytypesofcloudservicesarethereandwhatarethey

Researchquestion2:

Whatisgreencomputing

Researchquestion3:

Whatareadvantagesofthecloudcomputing

Text4

Researchquestion1:

WhatistheWeb

Researchquestion2:

Whatareadvantagesanddisadvantagesofthecloudcomputing

Researchquestion3:

Whatsecuritybenefitscanthecloudcomputingprovide

Task2

2Topic2:

ThreatsofArtificialIntelligence

Researchquestions:

1)Whatarethethreatsofartificialintelligence

2)Howcanhumanbeingscontrolthosethreats

3)Whatarethedifficultiestocontrolthosethreats

3Topic3:

ThePotentialsofNanotechnology

Researchquestions:

1)Whatareitspotentialsinmedicine

2)Whatareitspotentialsinspaceexploration

3)Whatareitspotentialsincommunications

4Topic4:

GlobalWarmingandItsEffects

Researchquestions:

1)Howdoesitaffectthepatternofclimates

2)Howdoesitaffecteconomicactivities

3)Howdoesitaffecthumanbehavior

Task3

Answersmayvary.

3Writingaworkingtitle

Task1

Answersmayvary.

Task2

1Lecture4isaboutthesecurityproblemsofcloudcomputing,whileLecture5isaboutthedefinitionandnatureofcloudcomputing,henceitismoreelementarythanLecture4.

2Thefourallfocusoncloudcomputing.AlthoughLecture4andText4addressthesametopic,theformerislessoptimisticwhilethelatterhasmoreconfidenceinthesecurityofcloudcomputing.Text3illustratesthevariousadvantagesofcloudcomputing.

3Lecture4:

CloudComputingSecurity

Lecture5:

WhatIsCloudComputing

Task3

Answersmayvary.

4Enhancingyouracademiclanguage

Reading:

Text1

thewordswiththeirdefinitions.

1g2a3e4b5c6d7j8f9h10i

2.CompletethefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.

1symbolic2distributed3site4complex5identify

6fairly7straightforward8capability9target10attempt

11process12parameter13interpretation14technical

15range16exploit17networking18involve

19instance20specification21accompany22predictable23profile

3.Readthesentencesinthebox.Payattentiontothepartsinbold.

NowcompletetheparagraphbytranslatingtheChineseinbrackets.Youmayrefertotheexpressionsandthesentencepatternslistedabove.

rangingfrom(从……到)

arisefromsomemisunderstandings(来自于对……误解)

leavesalotofproblemsunsolved(留下很多问题没有得到解决)

opensapathfor(打开了通道)

requiresadifferentframeofmind(需要有新的思想)

thefollowingsentencesfromText1intoChinese.

1)有些人声称黑客是那些超越知识疆界而不造成危害的好人(或即使造成危害,但并非故意而为),而“骇客”才是真正的坏人。

2)这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。

3)那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。

4)另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的是攻击到尽可能多的潜在目标。

5)另外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在几个真正需要的端口,如电子邮件和网站流量。

Reading:

Text2

thewordswiththeirdefinitions.

1d2f3h4i5a6e7b8j9g10c

thefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.

1compromised2notoriety3interchangeably4malfunctioned5squeeze

6ingenious7emergence8humble9Cunning10vulnerability

11criminal12patches13sinister14daunting15replicate

16malicious17spirals18secure19blur20stem

21disrepute22sophisticated23harness24recipient25convert

3.Readthesentencesinthebox.Payattentiontothepartsinbold.

NowcompletetheparagraphbytranslatingtheChineseinbrackets.Youmayrefertotheexpressionsandthesentencepatternslistedabove.

Thereisevidence(有证据表明)

sohasthenumberofhackers(黑客的数量也有很大增长)

areoftenreferredtoas(往往被称之为)

compromiseyourcomputer(损坏你的计算机)

captureyourinformation(获取你的信息)

accessyourcomputer(进入你的计算机)

4.TranslatethefollowingsentencesfromText2intoChinese.

1看似无害的编程错误可能被利用,导致电脑被侵入,为电脑病毒和蠕虫的繁衍提供温床。

2当一个软件漏洞被发现,黑客可以将它变成一个侵入点,从而造成极大的破坏。

在这之前,往往需要争分夺秒地利用正确的软件补丁来防止破坏的发生。

3最简单的钓鱼骗局试图利用迅速致富的伎俩诱使诈骗目标寄钱。

但网络骗子们也变得越来越狡猾,最近的陷阱是通过发送客户服务的电子邮件让用户进入假银行或商业网站,并在那里请他们“重新输入”他们的账户信息。

4间谍软件与垃圾邮件和钓鱼网络一起,构成了三个令人生厌的互联网害虫。

尽管有些程序可以通过入侵软件漏洞从而进入电脑,但这些有害而秘密的程序通常会随着其他免费的应用软件侵入到计算机系统中。

5尽管因特网已经彻底改变了全球通讯,但是对于那些利用网络力量实现罪恶目的的人和那些负责阻止这些网络犯罪的人来说,他们之间的较量才刚刚开始。

Reading:

Text3

1.Matchthewordswiththeirdefinitions.

1f2d3e4j5i6h7b8a9g10c

2.CompletethefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.

1irrespective2betailored3prone4opt5maximum

6coded7provision8catered9check10ready-made

11modified12on-demand13whereabouts14Hazardous15incurred

16applicable17developer18onoffer19host20nominal21certified22automated23outage24sync25backup26minimal27mobile

3.Readthesentencesinthebox.Payattentiontothepartsinbold.

NowcompletetheparagraphbytranslatingtheChineseinbrackets.Youmayrefertotheexpressionsandthesentencepatternslistedabove.

Irrespectiveofwhether(不管)

saveusersthetrouble(使用户避免这样的麻烦)

caterstotheneedsof(迎合了需求)

forthepurposeof(其目的就是)

4.TranslatethefollowingsentencesfromText3intoChinese.

1云计算可定义为一种按次付费模式,这种模式可以根据要求迅速得到计算机分配的可靠资源,用户很少需要自己进行管理。

2由于云计算可以用来不断提供资源,因此当你需要扩充计算机容量时就不需要去买硬件,就不会因为用电去冷却计算机设备而产生更多的二氧化碳。

3这意味着他们不需要开车到办公地点。

这就可以省去燃料费,减少二氧化碳排放,从而保护了环境。

4万一断电,客户可以在电脑再启动时使用和主机同步的备份。

5除此之外,云计算还不容易受到黑客入侵和分布式拒绝服务的攻击,因为攻击者不知道数据的位置。

Reading:

Text4

1.Matchthewordswiththeirdefinitions.

1c2e3a4i5g6b7d8f9j10h

2.CompletethefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.

1analogy2compatible3Distribute4implement5activated6static

7aggregated8clone9innovative10replacement11crashed

12compromised13mine14substantial15asset16centralize17facilities

18loose19monitor20integrate21derived22update23download

24upgrade25licensed26differential27install28minimum29in-house30crucial

3.Readthesentencesinthebox.Payattentiontothepartsinbold.

NowcompletetheparagraphbytranslatingtheChineseinbrackets.Youmayrefertotheexpressionsandthesentencepatternslistedabove.

remainswideopen(有很大的前景)

isderivedfromthewayinwhich(来自这样一个方法)

becomescrucial(非常重要)

willbesubstantiallyreduced(会大大降低)

thefollowingsentencesfromText4intoChinese.

1这个术语来自于因特网往往呈现为网络图的方法。

2目前云计算技术涉及一个数据中心的存在,这个中心能够为全世界用户提供服务。

3这就减少了由于没有硬件,如手提电脑带来的影响。

4虚拟化可以使一个损坏的云端服务器迅速找到替代品而不造成大的损失或破坏。

5云技术还处于起步阶段,更多新的优点会不断被发现。

III.LectureListening

Listening:

Lecture1

helpcomputeruserstobeawareoftheethicalusesofcomputersandtheInternet.

2.BecausemoreandmorepeoplehavestartedusingcomputersandtheInternet.

Eight.

Nine.

5.Respectandfairness.

1addressesthetopic“howacomputeruseravoidsbeingaconsciousorunconscioushacker”whileText1and2dealwiththewayhackers“getinside”acomputerandelectronicthreatsacomputerfaces.

CommandmentsofComputerEthics.

Lecture1Computerethics8

Goodmorning.DidanyonehearthenewsabouttheteenagerinNewYorkwhohackedintoabank’sdatabaseandstoleabout30,000creditcardnumbersovertheweekendHackingisrelatedtocomputerethics.Computerethicsdealswiththeproperuseofinformationtechnology,suchascomputersandtheInternet.Byproperuse,Imeansociallyresponsibleuse.We’llfirsttalkaboutwhatethicalbehaviorisandthenhowthisappliestocomputeruse.

Ethicsisaboutrightandwrongoritdealswithmoraljudgment,withwhatisacceptableorunacceptabletodo.Nowwelearnideasaboutwhatisrightandwrongfromourfamilies,ourfriends,andfromtheculturewelivein.Becauseofdifferencesinourbackgroun

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > PPT模板 > 商务科技

copyright@ 2008-2022 冰豆网网站版权所有

经营许可证编号:鄂ICP备2022015515号-1