学术英语讲解课后习题解答包括unit全部包含_第1页
学术英语讲解课后习题解答包括unit全部包含_第2页
学术英语讲解课后习题解答包括unit全部包含_第3页
学术英语讲解课后习题解答包括unit全部包含_第4页
学术英语讲解课后习题解答包括unit全部包含_第5页
已阅读5页,还剩483页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

学术英语讲解课后习题解答包括unit全部包含Unit1

ChoosingaTopicUnitContents1Decidingonatopic2Formulatingaresearchquestion3Writingaworkingtitle4Enhancingyouracademiclanguage〔穿插在以上各版块中〕Unit1

ChoosingaTopic1DecidingonatopicPrinciplesofDecidingonatopicTask1NarrowdownandevaluatetopicsTask2DiscussTask3ReadText1andText2andanswerquestionsText1HowDoComputerHackers“GetInside〞aComputer?Text2ElectronicThreatsofaComputerTask4ListentoLecture1,2and3andanswerquestionsLecture1QuestionsLecture2QuestionsLecture3QuestionsUnit1

ChoosingaTopic1DecidingonatopicFourprinciplesofdecidingonatopicInterestingImportantManageableAdequateUnit1

ChoosingaTopic1DecidingonatopicCityDevelopmentSustainableDevelopmentofCitiesSustainableDevelopmentofBigCitiesSustainableDevelopmentofChineseBigCitiesSustainableDevelopmentofChineseBigCitiesfromtheBiologicalPerspectiveUnit1

ChoosingaTopic1DecidingonatopicTopicsYournarrowersubtopicsQuestionsGlobalWarmingIsthetopicappropriatefora1500-wordessay?Whyorwhynot?Ifthetopicistoogeneral,howdoyounarrowitdowntoamoremanageabletopic?Canyousuggestsomeappropriatetopicsofeachsubject?CancerNanotechnologyInternetArtificialintelligenceUnit1

ChoosingaTopic1DecidingonatopicTopicsYournarrowersubtopicsQuestionsEnergyIsthetopicappropriatefora1500-wordessay?Whyorwhynot?Ifthetopicistoogeneral,howdoyounarrowitdowntoamoremanageabletopic?Canyousuggestsomeappropriatetopicsofeachsubject?GeneticengineeringUniverseUnit1

ChoosingaTopic1Decidingonatopic

Whatisthemainideathateachessaytriestoillustrate?Text1illustrateshowhackersorunauthorizedusersuseonewayoranothertogetinsideacomputer,whileText2describesthevariouselectronicthreatsacomputermightface.

Inwhichaspectdothetwoessayssharethesameidea?Bothfocusonthevulnerabilityofacomputer.Unit1

ChoosingaTopic1Decidingonatopic

Inwhichaspectdothetwoessaysdiffer?Text1illustrateshowhackersorunauthorizedusersuseonewayoranothertogetinsideacomputer,whileText2describesthevariouselectronicthreatsacomputermightface.Unit1

ChoosingaTopic1Decidingonatopic

Whattopicdoeseachessayaddress?DoyouthinktheyareappropriateaccordingtothefourprinciplesmentionedonPage2?缺答案Unit1

ChoosingaTopic1DecidingonatopicAdditionalquestionsforyourunderstandingofText11Whatdoes“unauthorizeduser〞referto?Thistermcoverstheentirerangeoffolks,fromthoseinvolvedinorganizedcriminalactivitiestoinsiderswhoarepushingthelimitsofwhattheyareauthorizedtodoonasystem.Unit1

ChoosingaTopic1DecidingonatopicAdditionalquestionsforyourunderstandingofText12What’sthedifferenceofknownandunknownvulnerabilities?Thistermcoverstheentirerangeoffolks,fromthoseinvolvedinorganizedcriminalactivitiestoinsiderswhoarepushingthelimitsofwhattheyareauthorizedtodoonasystem.Unit1

ChoosingaTopic1DecidingonatopicAdditionalquestionsforyourunderstandingofText13Howtoprotectyourselfagainstcomputerattacks?Makesureyouhaveallthelatestpatchesforyouroperatingsystemandapplications;Makesureyourpasswordiscomplex;ConsidergettingahardwarefirewallandlimitingtheflowofdatatoandfromtheInternettoonlythefewselectportsyouactuallyneed;Makesureyouranti-virussoftwareisup-to-dateandcheckfrequentlytoseeiftherearenewvirusdefinitionsavailable;Backupyourdata.Unit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.5——c10——i1——g2——a3——e4——b6——d7——j8——f9——hUnit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.1a(n)(象征的)gestureoflove2Thepublisher(分发)thebookinAsia.3A“〞(地点)isaplace,andsoawebsite.4a(n)(复杂的)networkofsystems5beusedto(识别)potentialterrorists6dealthematterwithhim(完全地)7startwithapretty(直截了当)question8beyondthe(功能)ofthecomputers9hitthe(目标)atadistance10thepersonnever(尝试)todoanythingmore11ahighlysophisticated(过程)symbolic

distribute

sitecomplexidentifyphysicallystraightforwardcapabilitytargetattemptprocessUnit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.12workwithinthe__________(限定因素)oftimeandbudget13thanksforyourkind_____________(解释)14usemany__________(专业的)terms15Prices__________(变化范围)from340U.S.Dollarsto390U.S.Dollars.16__________(开拓)anewmarketinthecity17beabsorbedinthesocial__________(社交网络)18__________(涉及)unnecessaryextracharges19onlyone__________(实例)outofmany20gettoknowmoreaboutthe__________(具体的细节)ofthewedding21__________(陪伴)withhertowatchmoviesparameterinterpretationtechnicalrangeexploitnetworkinginvolveinstancespecificationaccompanyUnit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageCompletetheparagraphWhenitcomestocloudcomputing,itisoftenworriedthatcloudcomputingisnotreliable,theworries(从……到)“Ilosecontroloverthesystemwithcloudcomputing〞to“Myfilesarenotsecurewithcloudcomputing〞.Actuallytheworries(来自于对……误解)ofcloudcomputing.Althoughthesecurityofcloudcomputing____________________________(留下很多问题没有得到解决),it(翻开了通道)thefuturedevelopmentofcomputers.Henceabetterunderstandingofanewtechnology(需要有新的思想)_______________________________.rangingfromarisefromsomemisunderstandingsleavesalotofproblemsunsolvedopensapathforrequiresadifferentframeofmindUnit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText1intoChinese.有些人声称黑客是那些扩宽知识界限而不造成危害的好人〔或即使造成危害,但并非成心而为〕,而“破碎者〞才是真正的坏人。2这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。3那些系统开发者或操作者所无视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致方案外的结果。Unit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText1intoChinese.5另外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在仅有的几个你真正需要的端口,如电子邮件和网站流量。4另一种是预先设定好程序对特定易受攻击对象进展攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的是攻击到尽可能多的潜在目标。Unit1

ChoosingaTopic1DecidingonatopicAdditionalquestionsforyourunderstandingofText21WhatareTrojanhorses?Trojanhorsesareastringofrecentspecimensdesignedtosnatchpasswordsorcreditcardinformationandinstallprogramsthatcanbeusedtoremotelycontrolinfectedmachines.Unit1

ChoosingaTopic1DecidingonatopicAdditionalquestionsforyourunderstandingofText22What’stherespectiveaimsofphishingandspyware?Phishingistotrickarecipientintohandingovermoneyorsensitivepersonalinformationliketheirbankaccountdetailsorausernameandpassword.Spywareistoserveupunwantedadverts,changesystemsettingsandgatherinformationonauser’sonlinebehaviorformarketingpurposes.Unit1

ChoosingaTopic1DecidingonatopicAdditionalquestionsforyourunderstandingofText23Whydoesthewritersaythattheearliest“criminal〞hackerswereinfactrelativelyharmless?Itisbecausethattheyusuallyinterestedintestingtheboundariesoftheirknowledgeandtheirabilitytogetaroundsecuritymeasures.Theymainlyperformedharmlesspranks,forexampleemployinglow-techtrickstogetfreecallsthroughtheU.S.phonenetworks.Unit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.5——a10——c1——d2——f3——h4——i6——e7——b8——j9——gUnit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.1throwawaya(n)

(损坏的)computer2earnsomebodyconsiderable

(恶名)3beused

(可互换地)4Acomputerhas

(发生故障).5

(挤)milkintothebottle6a(n)

(有独创性的)solutiontotheproblem7China’s

(出现)asagreatpower8of

(卑微的)birth9

(狡猾的)menoftenpassforwise.10exploittheir

(弱点)tofightthem11asuspected

(罪犯)12ajacketwithleather

(补丁)promisednotorietyinterchangeablymalfunctionedsqueezeingeniousemergencehumbleCunningvulnerabilitycriminalpatchesUnit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.13the(阴险的)looksonhisface14Thisisa(n)(艰巨的)challenge.15thevirusthatcan(复制)itself16His(恶毒的)gossipcausedmuchmischief.17Thepath(盘旋)upthemountain.18a(n)(平安的)operatingsystem19(使模糊)myvision20(阻止)thespreadofanepidemic21fallinto(坏名声)22solve(复杂的)electricalproblems23(利用)naturalresources24writeapersonalnotetoeach(收件人)25(转换)holdingsintosharessinisterdauntingreplicatemaliciousspiralssecureblurstemsophisticateddisreputeharnessrecipientconvertUnit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText2intoChinese.看似无害的编程错误可以被利用,导致电脑被侵入并为电脑蠕虫和病毒的繁衍提供温床。2当一个软件漏洞被发现,黑客可以将漏洞变成一个侵入点,从而造成极大的破坏,在这之前,往往需要争分夺秒地利用正确的软件补丁来防止破坏的发生。3最简单的钓鱼骗局试图利用迅速致富的手段诱使诈骗目标寄钱。但网络骗子们也变得越来越狡猾,最近的陷阱是通过发送客户效劳的电子邮件让用户进入假银行或商业网站,并在那里请他们“重新输入〞他们的账户信息。Unit1

ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText2intoChinese.4间谍软件与垃圾邮件和钓鱼网络一起,构成了三个令人生厌的互联网害虫。尽管有些程序可以通过入侵软件漏洞从而进入电脑,但这些有害而秘密的程序通常会随着其他通常是免费的应用软件侵入到计算机系统中。5尽管因特网已经彻底改变了全球通讯,但是对于那些意图为了罪恶目的而利用网络力量的人和那些负责阻止这些网络犯罪的人来说,他们之间的比赛才刚刚开场。Unit1

ChoosingaTopic1Decidingonatopic1TopicsofeachlectureLecture1:__________________________________Lecture2:__________________________________Lecture3:__________________________________2

Topic1:____________________________________

Topic2:____________________________________TheimportanceofComputerEthicsHowtodealwithComputerHackersHowIBegintodevelopComputerApplicationsUnit1

ChoosingaTopic1Decidingonatopic

EnhancingyouracademiclanguageLecture11Whatisthetopicofthelecture?TohelpcomputeruserstobeawareoftheethicalusesofcomputersandtheInternet.2Whydoethicalissuesbecomemoreimportant?Peopleshouldrespectotherpeople’spropertyanduseresourcesfairly.Unit1

ChoosingaTopic1Decidingonatopic

EnhancingyouracademiclanguageLecture13Whichruleisaboutthewaytoavoidplagiarism?BecausemoreandmorepeoplehavestartedusingcomputersandtheInternet.4Whichruledohackersmainlybreak?NumberEight.Unit1

ChoosingaTopic1Decidingonatopic

EnhancingyouracademiclanguageLecture1WhatarethemainprinciplesbehindtheTenCommandmentsofComputerEthics?NumberNine.HowisLecture1differentfromTexts1and2intermsofcontent?TohelpcomputeruserstobeawareoftheethicalusesofcomputersandtheInternet.7Whatisthetitleofthelectureyoumaysuggest?缺答案Unit1

ChoosingaTopic1Decidingonatopic

EnhancingyouracademiclanguageLecture21Whoisthemysterioussponsoror“theAnonymous〞?It’sasophisticatedgroupofpoliticallymotivatedhackers.2Accordingtothelecturer,whatshouldwedobesidesputtingahugeamountofmoneyintocybersecurityforthemostextraordinarytechnicalsolution?Weshouldtalktohackersandmakeuseofthem.Unit1

ChoosingaTopic1Decidingonatopic

EnhancingyouracademiclanguageLecture23HowdothepurchaserandthevendordobusinessontheCarderPlanet?Theydobusinessbyusingtheescrawsystem.4Accordingtothelecturer,whatkindofhackersshouldnotbethrownintojail?Hackerswhohavedisabilitieslikeautism.Unit1

ChoosingaTopic1Decidingonatopic

EnhancingyouracademiclanguageLecture2Whatisthesolutiontothehackerproblemaccordingtothelecturer?Recruitingandmobilizinghackersonbehalfofthestate.InwhichaspectsisthelecturerelatedtoTexts1and2?FacedwiththethreatsofcomputerhackersmentionedinText1and2,thespeakersuggeststhatweshouldtalktohackers,understandtheirdisabilities,andmakeuseoftheirtalent.7Whatisthetitleofthelectureyoumaysuggest?UnderstandandMakeUseofHackersUnit1

ChoosingaTopic1Decidingonatopic

EnhancingyouracademiclanguageLecture31Whatisthefunctionoftheapp“EarthFortune〞?Itcandisplaydifferentkindsofcolordependingonone’sfortune.2Whydoalotofkidsfinditdifficulttomakegames?Becausenotmanykidsknowwheretheycanlearntomakeupaprogram.Unit1

ChoosingaTopic1Decidingonatopic

EnhancingyouracademiclanguageLecture33Wheredoesthelecturerputhisapps?Theappstore.4Whydidthelecturerstartanappclub?Becausestudentsathisschoolcancomeandlearnhowtodesignanapp.Unit1

ChoosingaTopic1Decidingonatopic

EnhancingyouracademiclanguageLecture3WhatisthebigchallengetotheiPadprogram?HowshouldiPadbeusedandwhatappsshouldweputontheiPads.Whatisthetitleofthetalkyoumaysuggest?HowCanIGetFascinatedwiththeiPadsandDesignApps7Willthelecturerbecomeapotentialhacker?Why,orwhynot?Mostprobablyifhelackssucheducationascomputerethics.Unit1

ChoosingaTopic2FormulatingaresearchquestionpurposesofaresearchquestionTask1ReadText3andText4andanswerquestionsText3HowDoComputerHackers“GetInside〞aComputer?Text4ElectronicThreatsofaComputerTask2DeveloptopicsintoresearchquestionsTask3BrainstormandanswerquestionsUnit1

ChoosingaTopic2FormulatingaresearchquestionItidentifiesthespecificobjectivesyourresearchoryourpaperwilladdress.purposesofaresearchquestionItdeterminesthesizeofyourresearchorthelengthofyourpaper.Unit1

ChoosingaTopic1DecidingonatopicText3Researchquestion1:

___________________________________________________Researchquestion2:

_____________________________________Researchquestion3:

_____________________________________Text4Researchquestion1:

_____________________________________Researchquestion2:

____________________________________________________________Researchquestion3:

____________________________________________________________HowmanytypesofCloudservicesandwhatarethey?Whatisgreencomputing?Whatadvantagesofthecloudcomputing?WhatistheWeb3.0?Whatadvantagesanddisadvantagesofthecloudcomputing?Canthecloudcomputingprovidesecuritybenefits?

Unit1

ChoosingaTopic2FormulatingaresearchquestionAdditionalquestionsforyourunderstandingofText31Whatiscloudcomputing?Cloudcomputingisapay-per-usemodelforenablingon-demandaccesstoreliableandconfigurableresourcesthatcanbequicklyprovisionedandreleased—withminimalconsumerinvolvementintermsofmanagement.Unit1

ChoosingaTopic2FormulatingaresearchquestionAdditionalquestionsforyourunderstandingofText32Whatcharacteristicsshouldcloudhave?1Itshouldbeabletoquicklyallotandrelieveresourceswheneverrequiredbyclients;2Itshouldhavereal-timebackuptooffermaximumuptimetoclients;3Itshouldbeabletocatertotheneedsofclientswithouthavingtoinvolveclientsintomanagementoftheservice.Unit1

ChoosingaTopic2FormulatingaresearchquestionAdditionalquestionsforyourunderstandingofText33Whataretheadvantagesofcloudcomputing?RemoteAccessibility:Withcloudcomputing,yourbusinessisnotrestrictedtoaparticularlocation.EasyExpansion:Asofthecharacteristicsofcloudcomputingisitsflexibility,youcanquicklyaccessmoreresourcesifyouneedtoexpandyourbusiness.

Security:Thoughpeopledoubtcloudcomputing,cloudstendtobemoresecurethanthetraditionalbusinessmodels.

EnvironmentallyFriendly:Usageofready-maderesourcestailoredtoyourneedshelpsyoureducetheelectricityexpensesUnit1

ChoosingaTopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.5——i10——c1——f2——d3——e4——j6——h7——b8——a9——g2FormulatingaresearchquestionUnit1

ChoosingaTopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.2Formulatingaresearchquestion1(不管)oftheirageandeducation2Theprogrammust(迎合)totheneedsofyourcustomers.3(易于)todeveloplungcancer4(选择)foronestyleortheother5Hesuppliesthe(最大的)amountofinformation.6Theseproductordersshouldbe(编号).7the(提供)offacilitiesforchildren8arestaurant(适宜于)forfamilies9theneedforatighter(检查)onarmssales10(现成的)excuse11Theaircrafthasbeen(改进)andimproved.12providetreatment(所要求的)13the(去向)ofthemissingdocumentsirrespectivebetailoredcodedprovisioncateredcheckpronemaximumoptready-mademodifiedon-demandwhereaboutsUnit1

ChoosingaTopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.2Formulatingaresearchquestion14

(有害的)wastemustbeappropriatelydealtwith.15Theterribledamagehasbeen

(遭受到了).16Fewoftherulesare

(适合于)tothecountry.17anindustrial

(开发商)18awholerangeofservices

(所提供的)19

(主持)atalkshow20Itisfreeorfora

(极小的,象征性的)charge.21gettheseaccounts

(核证)22ahighly

(自动化)factory23apower

(断供期)24Demandandsupplyareoutof

(同步一致).25Theevidencecan

(证实)hisstory.26agreatvictorywith

(最小的)price27ahighly

(流动的)societyHazardousincurredapplicabledeveloperonofferhostnominalcertifiedautomatedsyncoutagebackupminimalmobileUnit1

ChoosingaTopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText3intoChinese.2Formulatingaresearchquestion云计算可定义为一种付款模式,这种模式可以根据提出的要求迅速得到可靠的计算机分配资源,而付钱用户很少要自己进展管理。2由于云计算可以总是用来不断提供资源,因此当你需要扩大计算机容量,你不需要去买硬件。这样,你就不会因为用更多的电去冷却计算机设备而产生更多的二氧化碳。Unit1

ChoosingaTopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText3intoChinese.2Formulatingaresearchquestion3这意味着他们不需要开车到办公地点。这就可以省去燃料费,减少二氧化碳排放,这就保护了环境。4万一断电,客户就可以再启动时使用和主机同步的备份。5除此之外,云计算还不容易受到黑客入侵和分布式拒绝效劳的攻击,因为攻击者不知道你的数据放在什么地方。Unit1

ChoosingaTopicAdditionalquestionsforyourunderstandingofText42Formulatingaresearchquestion1WhatisWeb3.0basedon?Web3.0isbasedontheservicesfordatamining,artificialintelligence,independentagents,speechrecognitionandnewcomputingmodels(distributed,grid3andcloud).Unit1

ChoosingaTopicAdditionalquestionsforyourunderstandingofText42Formulatingaresearchquestion2Whatcouldthecloudclientsbe?ThecloudclientscouldberegularPCs,mobilephones,PDAsoranyothersimilardevices.Unit1

ChoosingaTopicAdditionalquestionsforyourunderstandingofText42Formulatingaresearchquestion3Whatmajorsecuritybenefitsdoesthecloudcomputingprovideforindividualsorcompanies?1)centralizeddatastorage;2)monitoringofdataaccessbecomeseasier;3)increaseduncertainty;4)virtualizationallowsarapidreplacementofacompromisedserverlocatedintothecloudwithoutmajorcostsordamages.Also,thedowntimeforcomputersinthecloudcouldbesubstantiallyreduced;5)logging—extendedlogscanbeactivated;6)thesecuritychangescanbeeasilytestedandimplemented.Unit1

ChoosingaTopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.5——g10——h1——c2——e3——a4——i6——b7——d8——f9——j2FormulatingaresearchquestionUnit1

ChoosingaTopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.2Formulatingaresearchquestion1A(n)(类比)isdrawnbetweenthetwothings.2Catsandbirdsareseldom(协调的).3(分发)theprizesamongthewinners.4(执行)anewpolicytohelptheunemployed5Thefunctioncanbe(激活)anytime.6a(n)(静止的)viewoftheworld7Theaudiences(总计到达)amillionpeople.8a(n)(一模一样的复制品)ofarealpanda9lookfora(n)(革新的)way10trytofindthe(替代品)ofadamageddesk11Theirbusiness(突然垮了).12Theirequalityis(受到损害).13(挖掘有价值的)fordetailedinformation14abridge(巩固的)enoughtolastahundredyears15Heisanational(珍贵的人).analogycompatibleDistributeimplementactivatedstaticaggregatedcloneinnovativereplacementcrashedcompromisedminesubstantialassetUnit1

ChoosingaTopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.2Formulatingaresearchquestion16

(使集中)powerinhim17airport

(设施)18Hehasto

(松开)hishold.19

(监听)hisconversation20helpindividuals

(使适应,融合于)intothecommunity21Fromhisfatherhe

(获得)hisenthusiasmforsports.22

(修订,更新)atextbook23

(下载)thematerialtoyourcomputer24

(提高)thepayandstatusoftheteacher25Theyareonly

(批准)forbeer.26pay

(级差的)rentsaccordingtotheirincome27

(安装)anewcomputerintheoffice28practiceeachdayfora(n)

(最少的)of30minutes29alotofcompanywilldo

(内部的)training30a(n)

(重要的)decisioncentralizefacilitiesloosemonitorintegratederivedupdateupgradedownloadlicenseddifferentialinstallminimumin-housecrucialUnit1

ChoosingaTopicEnhancingyouracademiclanguageCompletetheparagraph2FormulatingaresearchquestionAlthoughthepotentialofe-business(有很大的前景),itisoftenplaguedbycomputerviruses.Thetermcomputerviruses(来自这样一个方法)thevirus“infects〞theexecutablefileorprogram.Hencedevelopingawaytodealwithcomputerviruses(非常重要).Butifwefindtheway,thethreatthevirusposes(会大大降低).remainswideopenisderivedfromthewayinwhichbecomescrucialwillbesubstantiallyreducedUnit1

ChoosingaTopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText4intoChinese.2Formulatingaresearchquestion1云计算这个术语来自于英特网往往把自己呈现为网络图的方法。2目前云计算技术涉及这样一个数据中心的存在,这个中心能够为全世界用户提供效劳。3这就减少了由于没有硬件如手提电脑带来的影响。Unit1

ChoosingaTopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText4intoChinese.2Formulatingaresearchquestion4虚拟化可以迅速使一个损坏的效劳器找到一个替代品并储存在云端而不造成大的损失或破坏。5云技术还处于起步阶段,所以有更多新的优点会不断发现。Unit1

ChoosingaTopic2FormulatingaresearchquestionTopic2:ThreatsofArtificialIntelligence

Researchquestions:

_________________________________________________________________________________________________________________________________Unit1

ChoosingaTopic2FormulatingaresearchquestionTopic3:ThePotentialsofNanotechnology

Researchquestions:

_________________________________________________________________________________________________________________________________Unit1

ChoosingaTopic2FormulatingaresearchquestionTopic4:GlobalWarmingandItsEffects

Researchquestions:

_________________________________________________________________________________________________________________________________Unit1

ChoosingaTopicWhydoyouchoosethetwotopics?Forexample,aretheyinteresting,important,controversial,manageableoradequateinsourcematerials?2FormulatingaresearchquestionWhatresearchquestionsofeachtopicdoyouwanttoanswerthroughyourresearch?Unit1

ChoosingaTopic3WritingaworkingtitleIntroductionTask2ListentoLecture4and5andanswerquestions

Lecture4Questions

Lecture5QuestionsUnit1

ChoosingaTopic3Writingaworkingtitleatypicaltitleiscomposedof:subjectmatterkeywordsofthemethodkeywordsofthecontentappropriatetitles:PsychologicalMotivationofComputerHackersEffectivenessofTwoApproachestoLungCancerEnvironmentalEffectsofNuclearPowerPlantsUnit1

ChoosingaTopicWhatistherelationshipbetweenthetwolecturesintermsofcontent?3WritingaworkingtitleLecture4isaboutthesecurityproblemsofcloudcomputing,whileLecture5isaboutthedefin

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论