




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
学术英语(理工)讲义+课后习题解答第一页,共440页。第二页,共440页。Unit1
ChoosingaTopicUnitContents1Decidingonatopic2Formulatingaresearchquestion3Writingaworkingtitle4Enhancingyouracademiclanguage
(穿插在以上各版块中)第三页,共440页。Unit1
ChoosingaTopic1DecidingonatopicPrinciplesofDecidingonatopicTask1
NarrowdownandevaluatetopicsTask2DiscussTask3
ReadText1andText2andanswerquestions
Text1
HowDoComputerHackers“GetInside”aComputer?
Text2
ElectronicThreatsofaComputerTask4
ListentoLecture1,2and3andanswerquestions
Lecture1
Questions
Lecture2
Questions
Lecture3
Questions
第四页,共440页。Unit1
ChoosingaTopic1DecidingonatopicFourprinciplesofdecidingonatopicInterestingImportantManageableAdequate第五页,共440页。Unit1
ChoosingaTopic1DecidingonatopicCityDevelopmentSustainableDevelopmentofCitiesSustainableDevelopmentofBigCitiesSustainableDevelopmentofChineseBigCitiesSustainableDevelopmentofChineseBigCitiesfromtheBiologicalPerspective第六页,共440页。Unit1
ChoosingaTopic1DecidingonatopicTopicsYournarrowersubtopicsQuestionsGlobalWarmingIsthetopicappropriatefora1500-wordessay?Whyorwhynot?Ifthetopicistoogeneral,howdoyounarrowitdowntoamoremanageabletopic?Canyousuggestsomeappropriatetopicsofeachsubject?CancerNanotechnologyInternetArtificialintelligence第七页,共440页。Unit1
ChoosingaTopic1DecidingonatopicTopicsYournarrowersubtopicsQuestionsEnergyIsthetopicappropriatefora1500-wordessay?Whyorwhynot?Ifthetopicistoogeneral,howdoyounarrowitdowntoamoremanageabletopic?Canyousuggestsomeappropriatetopicsofeachsubject?GeneticengineeringUniverse第八页,共440页。Unit1
ChoosingaTopic1Decidingonatopic
Whatisthemainideathateachessaytriestoillustrate?Text1illustrateshowhackersorunauthorizedusersuseonewayoranothertogetinsideacomputer,whileText2describesthevariouselectronicthreatsacomputermightface.
Inwhichaspectdothetwoessayssharethesameidea?Bothfocusonthevulnerabilityofacomputer.第九页,共440页。Unit1
ChoosingaTopic1Decidingonatopic
Inwhichaspectdothetwoessaysdiffer?Text1illustrateshowhackersorunauthorizedusersuseonewayoranothertogetinsideacomputer,whileText2describesthevariouselectronicthreatsacomputermightface.第十页,共440页。Unit1
ChoosingaTopic1Decidingonatopic
Whattopicdoeseachessayaddress?DoyouthinktheyareappropriateaccordingtothefourprinciplesmentionedonPage2?缺答案第十一页,共440页。Unit1
ChoosingaTopic1DecidingonatopicAdditionalquestionsforyourunderstandingofText11Whatdoes“unauthorizeduser”referto?Thistermcoverstheentirerangeoffolks,fromthoseinvolvedinorganizedcriminalactivitiestoinsiderswhoarepushingthelimitsofwhattheyareauthorizedtodoonasystem.第十二页,共440页。Unit1
ChoosingaTopic1DecidingonatopicAdditionalquestionsforyourunderstandingofText12What’sthedifferenceofknownandunknownvulnerabilities?Thistermcoverstheentirerangeoffolks,fromthoseinvolvedinorganizedcriminalactivitiestoinsiderswhoarepushingthelimitsofwhattheyareauthorizedtodoonasystem.第十三页,共440页。Unit1
ChoosingaTopic1DecidingonatopicAdditionalquestionsforyourunderstandingofText13Howtoprotectyourselfagainstcomputerattacks?Makesureyouhaveallthelatestpatchesforyouroperatingsystemandapplications;Makesureyourpasswordiscomplex;ConsidergettingahardwarefirewallandlimitingtheflowofdatatoandfromtheInternettoonlythefewselectportsyouactuallyneed;Makesureyouranti-virussoftwareisup-to-dateandcheckfrequentlytoseeiftherearenewvirusdefinitionsavailable;Backupyourdata.第十四页,共440页。Unit1
ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.5——c10——i1——g2——a3——e4——b6——d7——j8——f9——h第十五页,共440页。Unit1
ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.1a(n)
(象征的)gestureoflove2Thepublisher
(分发)thebookinAsia.3A“
”(地点)isaplace,andsoawebsite.4a(n)
(复杂的)networkofsystems5beusedto
(识别)potentialterrorists6dealthematterwithhim
(完全地)7startwithapretty
(直截了当)question8beyondthe
(功能)ofthecomputers9hitthe
(目标)atadistance10thepersonnever
(尝试)todoanythingmore11ahighlysophisticated
(过程)symbolic
distribute
sitecomplexidentifyphysicallystraightforwardcapabilitytargetattemptprocess第十六页,共440页。Unit1
ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.12workwithinthe__________(限定因素)oftimeandbudget13thanksforyourkind_____________(解释)14usemany__________(专业的)terms15Prices__________(变化范围)from340U.S.Dollarsto390U.S.Dollars.16__________(开拓)anewmarketinthecity17beabsorbedinthesocial__________(社交网络)18__________(涉及)unnecessaryextracharges19onlyone__________(实例)outofmany20gettoknowmoreaboutthe__________(具体的细节)ofthewedding21__________(陪伴)withhertowatchmoviesparameterinterpretationtechnicalrangeexploitnetworkinginvolveinstancespecificationaccompany第十七页,共440页。Unit1
ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageCompletetheparagraph
Whenitcomestocloudcomputing,itisoftenworriedthatcloudcomputingisnotreliable,theworries
(从……到)“Ilosecontroloverthesystemwithcloudcomputing”to“Myfilesarenotsecurewithcloudcomputing”.Actuallytheworries
(来自于对……误解)ofcloudcomputing.Althoughthesecurityofcloudcomputing____________________________(留下很多问题没有得到解决),it
(打开了通道)thefuturedevelopmentofcomputers.Henceabetterunderstandingofanewtechnology
(需要有新的思想)_______________________________.rangingfromarisefromsomemisunderstandingsleavesalotofproblemsunsolvedopensapathforrequiresadifferentframeofmind第十八页,共440页。Unit1
ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText1intoChinese.有些人声称黑客是那些扩宽知识界限而不造成危害的好人(或即使造成危害,但并非故意而为),而“破碎者”才是真正的坏人。2这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。3那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。第十九页,共440页。Unit1
ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText1intoChinese.5另外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在仅有的几个你真正需要的端口,如电子邮件和网站流量。4另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的是攻击到尽可能多的潜在目标。第二十页,共440页。Unit1
ChoosingaTopic1DecidingonatopicAdditionalquestionsforyourunderstandingofText21WhatareTrojanhorses?Trojanhorsesareastringofrecentspecimensdesignedtosnatchpasswordsorcreditcardinformationandinstallprogramsthatcanbeusedtoremotelycontrolinfectedmachines.第二十一页,共440页。Unit1
ChoosingaTopic1DecidingonatopicAdditionalquestionsforyourunderstandingofText22What’stherespectiveaimsofphishingandspyware?Phishingistotrickarecipientintohandingovermoneyorsensitivepersonalinformationliketheirbankaccountdetailsorausernameandpassword.Spywareistoserveupunwantedadverts,changesystemsettingsandgatherinformationonauser’sonlinebehaviorformarketingpurposes.第二十二页,共440页。Unit1
ChoosingaTopic1DecidingonatopicAdditionalquestionsforyourunderstandingofText23Whydoesthewritersaythattheearliest“criminal”hackerswereinfactrelativelyharmless?Itisbecausethattheyusuallyinterestedintestingtheboundariesoftheirknowledgeandtheirabilitytogetaroundsecuritymeasures.Theymainlyperformedharmlesspranks,forexampleemployinglow-techtrickstogetfreecallsthroughtheU.S.phonenetworks.第二十三页,共440页。Unit1
ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.5——a10——c1——d2——f3——h4——i6——e7——b8——j9——g第二十四页,共440页。Unit1
ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.1throwawaya(n)
(损坏的)computer2earnsomebodyconsiderable
(恶名)3beused
(可互换地)4Acomputerhas
(发生故障).5
(挤)milkintothebottle6a(n)
(有独创性的)solutiontotheproblem7China’s
(出现)asagreatpower8of
(卑微的)birth9
(狡猾的)menoftenpassforwise.10exploittheir
(弱点)tofightthem11asuspected
(罪犯)12ajacketwithleather
(补丁)promisednotorietyinterchangeablymalfunctionedsqueezeingeniousemergencehumbleCunningvulnerabilitycriminalpatches第二十五页,共440页。Unit1
ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.13the
(阴险的)looksonhisface14Thisisa(n)
(艰巨的)challenge.15thevirusthatcan
(复制)itself16His
(恶毒的)gossipcausedmuchmischief.17Thepath
(盘旋)upthemountain.18a(n)
(安全的)operatingsystem19
(使模糊)myvision20
(阻止)thespreadofanepidemic21fallinto
(坏名声)22solve
(复杂的)electricalproblems23
(利用)naturalresources24writeapersonalnotetoeach
(收件人)25
(转换)holdingsintosharessinisterdauntingreplicatemaliciousspiralssecureblurstemsophisticateddisreputeharnessrecipientconvert第二十六页,共440页。Unit1
ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText2intoChinese.看似无害的编程错误可以被利用,导致电脑被侵入并为电脑蠕虫和病毒的繁衍提供温床。2当一个软件漏洞被发现,黑客可以将漏洞变成一个侵入点,从而造成极大的破坏,在这之前,往往需要争分夺秒地利用正确的软件补丁来防止破坏的发生。3最简单的钓鱼骗局试图利用迅速致富的伎俩诱使诈骗目标寄钱。但网络骗子们也变得越来越狡猾,最近的陷阱是通过发送客户服务的电子邮件让用户进入假银行或商业网站,并在那里请他们“重新输入”他们的账户信息。第二十七页,共440页。Unit1
ChoosingaTopic1DecidingonatopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText2intoChinese.4间谍软件与垃圾邮件和钓鱼网络一起,构成了三个令人生厌的互联网害虫。尽管有些程序可以通过入侵软件漏洞从而进入电脑,但这些有害而秘密的程序通常会随着其他通常是免费的应用软件侵入到计算机系统中。5尽管因特网已经彻底改变了全球通讯,但是对于那些意图为了罪恶目的而利用网络力量的人和那些负责阻止这些网络犯罪的人来说,他们之间的较量才刚刚开始。第二十八页,共440页。Unit1
ChoosingaTopic1Decidingonatopic1TopicsofeachlectureLecture1:__________________________________Lecture2:__________________________________Lecture3:__________________________________2
Topic1:____________________________________
Topic2:____________________________________TheimportanceofComputerEthicsHowtodealwithComputerHackersHowIBegintodevelopComputerApplications第二十九页,共440页。Unit1
ChoosingaTopic1Decidingonatopic
EnhancingyouracademiclanguageLecture11Whatisthetopicofthelecture?TohelpcomputeruserstobeawareoftheethicalusesofcomputersandtheInternet.2Whydoethicalissuesbecomemoreimportant?Peopleshouldrespectotherpeople’spropertyanduseresourcesfairly.第三十页,共440页。Unit1
ChoosingaTopic1Decidingonatopic
EnhancingyouracademiclanguageLecture13Whichruleisaboutthewaytoavoidplagiarism?BecausemoreandmorepeoplehavestartedusingcomputersandtheInternet.4Whichruledohackersmainlybreak?NumberEight.第三十一页,共440页。Unit1
ChoosingaTopic1Decidingonatopic
EnhancingyouracademiclanguageLecture1WhatarethemainprinciplesbehindtheTenCommandmentsofComputerEthics?NumberNine.HowisLecture1differentfromTexts1and2intermsofcontent?TohelpcomputeruserstobeawareoftheethicalusesofcomputersandtheInternet.7Whatisthetitleofthelectureyoumaysuggest?缺答案第三十二页,共440页。Unit1
ChoosingaTopic1Decidingonatopic
EnhancingyouracademiclanguageLecture21Whoisthemysterioussponsoror“theAnonymous”?It’sasophisticatedgroupofpoliticallymotivatedhackers.2Accordingtothelecturer,whatshouldwedobesidesputtingahugeamountofmoneyintocybersecurityforthemostextraordinarytechnicalsolution?Weshouldtalktohackersandmakeuseofthem.第三十三页,共440页。Unit1
ChoosingaTopic1Decidingonatopic
EnhancingyouracademiclanguageLecture23HowdothepurchaserandthevendordobusinessontheCarderPlanet?Theydobusinessbyusingtheescrawsystem.4Accordingtothelecturer,whatkindofhackersshouldnotbethrownintojail?Hackerswhohavedisabilitieslikeautism.第三十四页,共440页。Unit1
ChoosingaTopic1Decidingonatopic
EnhancingyouracademiclanguageLecture2Whatisthesolutiontothehackerproblemaccordingtothelecturer?Recruitingandmobilizinghackersonbehalfofthestate.InwhichaspectsisthelecturerelatedtoTexts1and2?FacedwiththethreatsofcomputerhackersmentionedinText1and2,thespeakersuggeststhatweshouldtalktohackers,understandtheirdisabilities,andmakeuseoftheirtalent.7Whatisthetitleofthelectureyoumaysuggest?UnderstandandMakeUseofHackers第三十五页,共440页。Unit1
ChoosingaTopic1Decidingonatopic
EnhancingyouracademiclanguageLecture31Whatisthefunctionoftheapp“EarthFortune”?Itcandisplaydifferentkindsofcolordependingonone’sfortune.2Whydoalotofkidsfinditdifficulttomakegames?Becausenotmanykidsknowwheretheycanlearntomakeupaprogram.第三十六页,共440页。Unit1
ChoosingaTopic1Decidingonatopic
EnhancingyouracademiclanguageLecture33Wheredoesthelecturerputhisapps?Theappstore.4Whydidthelecturerstartanappclub?Becausestudentsathisschoolcancomeandlearnhowtodesignanapp.第三十七页,共440页。Unit1
ChoosingaTopic1Decidingonatopic
EnhancingyouracademiclanguageLecture3WhatisthebigchallengetotheiPadprogram?HowshouldiPadbeusedandwhatappsshouldweputontheiPads.Whatisthetitleofthetalkyoumaysuggest?HowCanIGetFascinatedwiththeiPadsandDesignApps7Willthelecturerbecomeapotentialhacker?Why,orwhynot?Mostprobablyifhelackssucheducationascomputerethics.第三十八页,共440页。Unit1
ChoosingaTopic2FormulatingaresearchquestionpurposesofaresearchquestionTask1
ReadText3andText4andanswerquestions
Text3
HowDoComputerHackers“GetInside”aComputer?
Text4
ElectronicThreatsofaComputerTask2Developtopicsintoresearchquestions
Task3
Brainstormandanswerquestions第三十九页,共440页。Unit1
ChoosingaTopic2FormulatingaresearchquestionItidentifiesthespecificobjectivesyourresearchoryourpaperwilladdress.purposesofaresearchquestionItdeterminesthesizeofyourresearchorthelengthofyourpaper.第四十页,共440页。Unit1
ChoosingaTopic1DecidingonatopicText3Researchquestion1:
___________________________________________________Researchquestion2:
_____________________________________Researchquestion3:
_____________________________________Text4Researchquestion1:
_____________________________________Researchquestion2:
____________________________________________________________Researchquestion3:
____________________________________________________________HowmanytypesofCloudservicesandwhatarethey?Whatisgreencomputing?Whatadvantagesofthecloudcomputing?WhatistheWeb3.0?Whatadvantagesanddisadvantagesofthecloudcomputing?Canthecloudcomputingprovidesecuritybenefits?
第四十一页,共440页。Unit1
ChoosingaTopic2FormulatingaresearchquestionAdditionalquestionsforyourunderstandingofText31Whatiscloudcomputing?Cloudcomputingisapay-per-usemodelforenablingon-demandaccesstoreliableandconfigurableresourcesthatcanbequicklyprovisionedandreleased—withminimalconsumerinvolvementintermsofmanagement.第四十二页,共440页。Unit1
ChoosingaTopic2FormulatingaresearchquestionAdditionalquestionsforyourunderstandingofText32Whatcharacteristicsshouldcloudhave?1Itshouldbeabletoquicklyallotandrelieveresourceswheneverrequiredbyclients;2Itshouldhavereal-timebackuptooffermaximumuptimetoclients;3Itshouldbeabletocatertotheneedsofclientswithouthavingtoinvolveclientsintomanagementoftheservice.第四十三页,共440页。Unit1
ChoosingaTopic2FormulatingaresearchquestionAdditionalquestionsforyourunderstandingofText33Whataretheadvantagesofcloudcomputing?RemoteAccessibility:Withcloudcomputing,yourbusinessisnotrestrictedtoaparticularlocation.EasyExpansion:Asofthecharacteristicsofcloudcomputingisitsflexibility,youcanquicklyaccessmoreresourcesifyouneedtoexpandyourbusiness.
Security:Thoughpeopledoubtcloudcomputing,cloudstendtobemoresecurethanthetraditionalbusinessmodels.
EnvironmentallyFriendly:Usageofready-maderesourcestailoredtoyourneedshelpsyoureducetheelectricityexpenses第四十四页,共440页。Unit1
ChoosingaTopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.5——i10——c1——f2——d3——e4——j6——h7——b8——a9——g2Formulatingaresearchquestion第四十五页,共440页。Unit1
ChoosingaTopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.2Formulatingaresearchquestion1
(不管)oftheirageandeducation2Theprogrammust
(迎合)totheneedsofyourcustomers.3
(易于)todeveloplungcancer4
(选择)foronestyleortheother5Hesuppliesthe
(最大的)amountofinformation.6Theseproductordersshouldbe
(编号).7the
(提供)offacilitiesforchildren8arestaurant
(合适于)forfamilies9theneedforatighter
(检查)onarmssales10
(现成的)excuse11Theaircrafthasbeen
(改进)andimproved.12providetreatment
(所要求的)13the
(去向)ofthemissingdocumentsirrespectivebetailoredcodedprovisioncateredcheckpronemaximumoptready-mademodifiedon-demandwhereabouts第四十六页,共440页。Unit1
ChoosingaTopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.2Formulatingaresearchquestion14
(有害的)wastemustbeappropriatelydealtwith.15Theterribledamagehasbeen
(遭受到了).16Fewoftherulesare
(适合于)tothecountry.17anindustrial
(开发商)18awholerangeofservices
(所提供的)19
(主持)atalkshow20Itisfreeorfora
(极小的,象征性的)charge.21gettheseaccounts
(核证)22ahighly
(自动化)factory23apower
(断供期)24Demandandsupplyareoutof
(同步一致).25Theevidencecan
(证实)hisstory.26agreatvictorywith
(最小的)price27ahighly
(流动的)societyHazardousincurredapplicabledeveloperonofferhostnominalcertifiedautomatedsyncoutagebackupminimalmobile第四十七页,共440页。Unit1
ChoosingaTopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText3intoChinese.2Formulatingaresearchquestion云计算可定义为一种付款模式,这种模式可以根据提出的要求迅速得到可靠的计算机分配资源,而付钱用户很少要自己进行管理。2由于云计算可以总是用来不断提供资源,因此当你需要扩充计算机容量,你不需要去买硬件。这样,你就不会因为用更多的电去冷却计算机设备而产生更多的二氧化碳。第四十八页,共440页。Unit1
ChoosingaTopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText3intoChinese.2Formulatingaresearchquestion3这意味着他们不需要开车到办公地点。这就可以省去燃料费,减少二氧化碳排放,这就保护了环境。4万一断电,客户就可以再启动时使用和主机同步的备份。5除此之外,云计算还不容易受到黑客入侵和分布式拒绝服务的攻击,因为攻击者不知道你的数据放在什么地方。第四十九页,共440页。Unit1
ChoosingaTopicAdditionalquestionsforyourunderstandingofText42Formulatingaresearchquestion1WhatisWeb3.0basedon?Web3.0isbasedontheservicesfordatamining,artificialintelligence,independentagents,speechrecognitionandnewcomputingmodels(distributed,grid3andcloud).第五十页,共440页。Unit1
ChoosingaTopicAdditionalquestionsforyourunderstandingofText42Formulatingaresearchquestion2Whatcouldthecloudclientsbe?ThecloudclientscouldberegularPCs,mobilephones,PDAsoranyothersimilardevices.第五十一页,共440页。Unit1
ChoosingaTopicAdditionalquestionsforyourunderstandingofText42Formulatingaresearchquestion3Whatmajorsecuritybenefitsdoesthecloudcomputingprovideforindividualsorcompanies?1)centralizeddatastorage;2)monitoringofdataaccessbecomeseasier;3)increaseduncertainty;4)virtualizationallowsarapidreplacementofacompromisedserverlocatedintothecloudwithoutmajorcostsordamages.Also,thedowntimeforcomputersinthecloudcouldbesubstantiallyreduced;5)logging—extendedlogscanbeactivated;6)thesecuritychangescanbeeasilytestedandimplemented.第五十二页,共440页。Unit1
ChoosingaTopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.5——g10——h1——c2——e3——a4——i6——b7——d8——f9——j2Formulatingaresearchquestion第五十三页,共440页。Unit1
ChoosingaTopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.2Formulatingaresearchquestion1A(n)
(类比)isdrawnbetweenthetwothings.2Catsandbirdsareseldom
(协调的).3
(分发)theprizesamongthewinners.4
(执行)anewpolicytohelptheunemployed5Thefunctioncanbe
(激活)anytime.6a(n)
(静止的)viewoftheworld7Theaudiences
(总计达到)amillionpeople.8a(n)
(一模一样的复制品)ofarealpanda9lookfora(n)
(革新的)way10trytofindthe
(替代品)ofadamageddesk11Theirbusiness
(突然垮了).12Theirequalityis
(受到损害).13
(挖掘有价值的)fordetailedinformation14abridge
(坚固的)enoughtolastahundredyears15Heisanational
(宝贵的人).analogycompatibleDistributeimplementactivatedstaticaggregatedcloneinnovativereplacementcrashedcompromisedminesubstantialasset第五十四页,共440页。Unit1
ChoosingaTopicEnhancingyouracademiclanguageMatchthewordswiththeirdefinitions.2Formulatingaresearchquestion16
(使集中)powerinhim17airport
(设施)18Hehasto
(松开)hishold.19
(监听)hisconversation20helpindividuals
(使适应,融合于)intothecommunity21Fromhisfatherhe
(获得)hisenthusiasmforsports.22
(修订,更新)atextbook23
(下载)thematerialtoyourcomputer24
(提高)thepayandstatusoftheteacher25Theyareonly
(批准)forbeer.26pay
(级差的)rentsaccordingtotheirincome27
(安装)anewcomputerintheoffice28practiceeachdayfora(n)
(最少的)of30minutes29alotofcompanywilldo
(内部的)training30a(n)
(重要的)decisioncentralizefacilitiesloosemonitorintegratederivedupdateupgradedownloadlicenseddifferentialinstallminimumin-housecrucial第五十五页,共440页。Unit1
ChoosingaTopicEnhancingyouracademiclanguageCompletetheparagraph2Formulatingaresearchquestion
Althoughthepotentialofe-business
(有很大的前景),itisoftenplaguedbycomputerviruses.Thetermcomputerviruses
(来自这样一个方法)thevirus“infects”the
executablefileorprogram.Hencedevelopingawaytodealwithcomputerviruses
(非常重要).Butifwefindtheway,thethreat
thevirusposes
(会大大降低).remainswideopenisderivedfromthewayinwhichbecomescrucialwillbesubstantiallyreduced第五十六页,共440页。Unit1
ChoosingaTopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText4intoChinese.2Formulatingaresearchquestion1云计算这个术语来自于英特网往往把自己呈现为网络图的方法。2目前云计算技术涉及这样一个数据中心的存在,这个中心能够为全世界用户提供服务。3这就减少了由于没有硬件如手提电脑带来的影响。第五十七页,共440页。Unit1
ChoosingaTopicEnhancingyouracademiclanguageTranslatethefollowingsentencesfromText4intoChinese.2Formulatingaresearchquestion4虚拟化可以迅速使一个损坏的服务器找到一个替代品并储存在云端而不造成大的损失或破坏。5云技术还处于起步阶段,所以有更多新的优点会不断发现。第五十八页,共440页。Unit1
ChoosingaTopic2FormulatingaresearchquestionTopic2:ThreatsofArtificialIntelligence
Researchquestions:
_________________________________________________________________________________________________________________________________第五十九页,共440页。Unit1
ChoosingaTopic2FormulatingaresearchquestionTopic3:ThePotentialsofNanotechnology
Researchquestions:
_________________________________________________________________________________________________________________________________第六十页,共440页。Unit1
ChoosingaTopic2FormulatingaresearchquestionTopic4:GlobalWarmingandItsEffects
Researchquestions:
_____________________________________________________________________________________________________
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 市政沉降观测施工方案
- 外用电梯施工方案
- 象山县国四道路施工方案
- 屋面排水管施工方案
- 天面隔热施工方案
- 膜结构车库出入口施工方案
- 会员店加盟合同范例
- 2025年大二辅导员第一学期工作总结模版
- 门楼拆除技术方案范本
- 采购合同中英文
- 数学家华罗庚课件
- 西方经济学考试题库(含参考答案)
- 2024至2030年中国冷镦钢行业市场全景分析及投资前景展望报告
- 国企集团公司各岗位廉洁风险点防控表格(廉政)范本
- 中医师承跟师笔记50篇
- GB/T 44099-2024学生基本运动能力测评规范
- 上海高中自招简历模板范文
- 施工技术创新实施措施方案
- 沪教版八年级英语下册Unit8-Life-in-the-future课件
- 部编版语文二年级下册第三单元教材解读大单元集体备课
- 湖北省远安县凤阳山矿区建筑石料用灰岩矿矿产资源开发利用与生态复绿方案(100万吨)
评论
0/150
提交评论