学术英语(理工)讲义课后习题解答.ppt
《学术英语(理工)讲义课后习题解答.ppt》由会员分享,可在线阅读,更多相关《学术英语(理工)讲义课后习题解答.ppt(440页珍藏版)》请在三一办公上搜索。
1、,学术英语 理工,Academic English for Science and Engineering,Unit 1 Choosing a Topic,Unit Contents,1 Deciding on a topic2 Formulating a research question3 Writing a working title4 Enhancing your academic language(穿插在以上各版块中),Unit 1 Choosing a Topic,1 Deciding on a topic,Principles of Deciding on a topicTask
2、 1 Narrow down and evaluate topicsTask 2 DiscussTask 3 Read Text 1 and Text 2 and answer questions Text 1 How Do Computer Hackers“Get Inside”a Computer?Text 2 Electronic Threats of a ComputerTask 4 Listen to Lecture 1,2 and 3 and answer questions Lecture 1 Questions Lecture 2 Questions Lecture 3 Que
3、stions,Unit 1 Choosing a Topic,1 Deciding on a topic,Four principles of deciding on a topic,Interesting,Important,Manageable,Adequate,Unit 1 Choosing a Topic,1 Deciding on a topic,City DevelopmentSustainable Development of CitiesSustainable Development of Big CitiesSustainable Development of Chinese
4、 Big CitiesSustainable Development of Chinese Big Cities from the Biological Perspective,Unit 1 Choosing a Topic,1 Deciding on a topic,Unit 1 Choosing a Topic,1 Deciding on a topic,Unit 1 Choosing a Topic,1 Deciding on a topic,What is the main idea that each essay tries to illustrate?,Text 1 illustr
5、ates how hackers or unauthorized users use one way or another to get inside a computer,while Text 2 describes the various electronic threats a computer might face.,In which aspect do the two essays share the same idea?,Both focus on the vulnerability of a computer.,Unit 1 Choosing a Topic,1 Deciding
6、 on a topic,In which aspect do the two essays differ?,Text 1 illustrates how hackers or unauthorized users use one way or another to get inside a computer,while Text 2 describes the various electronic threats a computer might face.,Unit 1 Choosing a Topic,1 Deciding on a topic,What topic does each e
7、ssay address?Do you think they are appropriate according to the four principles mentioned on Page 2?,缺答案,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 1,1 What does“unauthorized user”refer to?,This term covers the entire range of folks,from those i
8、nvolved in organized criminal activities to insiders who are pushing the limits of what they are authorized to do on a system.,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 1,2 Whats the difference of known and unknown vulnerabilities?,This term co
9、vers the entire range of folks,from those involved in organized criminal activities to insiders who are pushing the limits of what they are authorized to do on a system.,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 1,3 How to protect yourself agai
10、nst computer attacks?,Make sure you have all the latest patches for your operating system and applications;Make sure your password is complex;Consider getting a hardware firewall and limiting the flow of data to and from the Internet to only the few select ports you actually need;Make sure your anti
11、-virus software is up-to-date and check frequently to see if there are new virus definitions available;Back up your data.,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions.,5 c,10 i,1 g,2 a,3 e,4 b,6 d,7 j,8 f,9 h,Unit 1 Choosing a
12、Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions.,1 a(n)(象征的)gesture of love2 The publisher(分发)the book in Asia.3 A“”(地点)is a place,and so a website.4 a(n)(复杂的)network of systems5 be used to(识别)potential terrorists6 deal the matter with him(完全地)7 st
13、art with a pretty(直截了当)question8 beyond the(功能)of the computers9 hit the(目标)at a distance10 the person never(尝试)to do anything more11 a highly sophisticated(过程),symbolic,distribute,site,complex,identify,physically,straightforward,capability,target,attempt,process,Unit 1 Choosing a Topic,1 Deciding o
14、n a topic,Enhancing your academic language,Match the words with their definitions.,12 work within the _(限定因素)of time and budget13 thanks for your kind _(解释)14 use many _(专业的)terms15 Prices _(变化范围)from 340 U.S.Dollars to 390 U.S.Dollars.16 _(开拓)a new market in the city17 be absorbed in the social _(社
15、交网络)18 _(涉及)unnecessary extra charges19 only one _(实例)out of many20 get to know more about the _(具体的细节)of the wedding21 _(陪伴)with her to watch movies,parameter,interpretation,technical,range,exploit,networking,involve,instance,specification,accompany,Unit 1 Choosing a Topic,1 Deciding on a topic,Enh
16、ancing your academic language,Complete the paragraph,When it comes to cloud computing,it is often worried that cloud computing is not reliable,the worries(从到)“I lose control over the system with cloud computing”to“My files are not secure with cloud computing”.Actually the worries(来自于对误解)of cloud com
17、puting.Although the security of cloud computing _(留下很多问题没有得到解决),it(打开了通道)the future development of computers.Hence a better understanding of a new technology(需要有新的思想)_.,ranging from,arise from some misunderstandings,leaves a lot of problems unsolved,opens a path for,requires a different frame of min
18、d,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Translate the following sentences from Text 1 into Chinese.,有些人声称黑客是那些扩宽知识界限而不造成危害的好人(或即使造成危害,但并非故意而为),而“破碎者”才是真正的坏人。,2 这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。,3 那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要
19、的功能而导致计划外的结果。,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Translate the following sentences from Text 1 into Chinese.,5 另外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在仅有的几个你真正需要的端口,如电子邮件和网站流量。,4 另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的是攻击到尽可能多的潜在目标。,Unit 1 Choosing
20、 a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 2,1 What are Trojan horses?,Trojan horses are a string of recent specimens designed to snatch passwords or credit card information and install programs that can be used to remotely control infected machines.,Unit 1 Ch
21、oosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 2,2 Whats the respective aims of phishing and spyware?,Phishing is to trick a recipient into handing over money or sensitive personal information like their bank account details or a username and password.Spywar
22、e is to serve up unwanted adverts,change system settings and gather information on a users online behavior for marketing purposes.,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 2,3 Why does the writer say that the earliest“criminal”hackers were in
23、fact relatively harmless?,It is because that they usually interested in testing the boundaries of their knowledge and their ability to get around security measures.They mainly performed harmless pranks,for example employing low-tech tricks to get free calls through the U.S.phone networks.,Unit 1 Cho
24、osing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions.,5 a,10 c,1 d,2 f,3 h,4 i,6 e,7 b,8 j,9 g,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions.,1 throw away a(n)(损坏的)computer2
25、 earn somebody considerable(恶名)3 be used(可互换地)4 A computer has(发生故障).5(挤)milk into the bottle6 a(n)(有独创性的)solution to the problem7 Chinas(出现)as a great power8 of(卑微的)birth9(狡猾的)men often pass for wise.10 exploit their(弱点)to fight them11 a suspected(罪犯)12 a jacket with leather(补丁)on the elbows.,compr
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 学术 英语 理工 讲义 课后 习题 解答
链接地址:https://www.31ppt.com/p-5958707.html