ImageVerifierCode 换一换
格式:PPT , 页数:440 ,大小:5.67MB ,
资源ID:7866675      下载积分:20 金币
快捷注册下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝    微信支付   
验证码:   换一换

开通VIP
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【https://www.zixin.com.cn/docdown/7866675.html】到电脑端继续下载(重复下载【60天内】不扣币)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录   QQ登录  

开通VIP折扣优惠下载文档

            查看会员权益                  [ 下载后找不到文档?]

填表反馈(24小时):  下载求助     关注领币    退款申请

开具发票请登录PC端进行申请

   平台协调中心        【在线客服】        免费申请共赢上传

权利声明

1、咨信平台为文档C2C交易模式,即用户上传的文档直接被用户下载,收益归上传人(含作者)所有;本站仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。所展示的作品文档包括内容和图片全部来源于网络用户和作者上传投稿,我们不确定上传用户享有完全著作权,根据《信息网络传播权保护条例》,如果侵犯了您的版权、权益或隐私,请联系我们,核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
2、文档的总页数、文档格式和文档大小以系统显示为准(内容中显示的页数不一定正确),网站客服只以系统显示的页数、文件格式、文档大小作为仲裁依据,个别因单元格分列造成显示页码不一将协商解决,平台无法对文档的真实性、完整性、权威性、准确性、专业性及其观点立场做任何保证或承诺,下载前须认真查看,确认无误后再购买,务必慎重购买;若有违法违纪将进行移交司法处理,若涉侵权平台将进行基本处罚并下架。
3、本站所有内容均由用户上传,付费前请自行鉴别,如您付费,意味着您已接受本站规则且自行承担风险,本站不进行额外附加服务,虚拟产品一经售出概不退款(未进行购买下载可退充值款),文档一经付费(服务费)、不意味着购买了该文档的版权,仅供个人/单位学习、研究之用,不得用于商业用途,未经授权,严禁复制、发行、汇编、翻译或者网络传播等,侵权必究。
4、如你看到网页展示的文档有www.zixin.com.cn水印,是因预览和防盗链等技术需要对页面进行转换压缩成图而已,我们并不对上传的文档进行任何编辑或修改,文档下载后都不会有水印标识(原文档上传前个别存留的除外),下载后原文更清晰;试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓;PPT和DOC文档可被视为“模板”,允许上传人保留章节、目录结构的情况下删减部份的内容;PDF文档不管是原文档转换或图片扫描而得,本站不作要求视为允许,下载前可先查看【教您几个在下载文档中可以更好的避免被坑】。
5、本文档所展示的图片、画像、字体、音乐的版权可能需版权方额外授权,请谨慎使用;网站提供的党政主题相关内容(国旗、国徽、党徽--等)目的在于配合国家政策宣传,仅限个人学习分享使用,禁止用于任何广告和商用目的。
6、文档遇到问题,请及时联系平台进行协调解决,联系【微信客服】、【QQ客服】,若有其他问题请点击或扫码反馈【服务填表】;文档侵犯商业秘密、侵犯著作权、侵犯人身权等,请点击“【版权申诉】”,意见反馈和侵权处理邮箱:1219186828@qq.com;也可以拔打客服电话:0574-28810668;投诉电话:18658249818。

注意事项

本文(学术英语(理工)讲义+课后习题解答.ppt)为本站上传会员【w****g】主动上传,咨信网仅是提供信息存储空间和展示预览,仅对用户上传内容的表现方式做保护处理,对上载内容不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知咨信网(发送邮件至1219186828@qq.com、拔打电话4009-655-100或【 微信客服】、【 QQ客服】),核实后会尽快下架及时删除,并可随时和客服了解处理情况,尊重保护知识产权我们共同努力。
温馨提示:如果因为网速或其他原因下载失败请重新下载,重复下载【60天内】不扣币。 服务填表

学术英语(理工)讲义+课后习题解答.ppt

1、单击此处编辑母版标题样式,单击此处编辑母版文本样式,第二级,第三级,第四级,第五级,*,学术英语 理工,Academic English,for Science and Engineering,Unit 1 Choosing a Topic,Unit Contents,1,Deciding on a topic,2,Formulating a research question,3,Writing a working title,4 Enhancing your academic language,(穿插在以上各版块中),Unit 1 Choosing a Topic,1 Deciding o

2、n a topic,Principles of Deciding on a topic,Task 1,Narrow down and evaluate topics,Task 2,Discuss,Task 3,Read Text 1 and Text 2 and answer questions,Text 1,How Do Computer Hackers“Get Inside”a Computer?,Text 2,Electronic Threats of a Computer,Task 4,Listen to Lecture 1,2 and 3 and answer questions,L

3、ecture 1,Questions,Lecture 2,Questions,Lecture 3,Questions,Unit 1 Choosing a Topic,1 Deciding on a topic,Four principles of deciding on a topic,Interesting,Important,Manageable,Adequate,Unit 1 Choosing a Topic,1 Deciding on a topic,City Development,Sustainable Development of Cities,Sustainable Devel

4、opment of Big Cities,Sustainable Development of Chinese Big Cities,Sustainable Development of Chinese Big Cities from the Biological Perspective,Unit 1 Choosing a Topic,1 Deciding on a topic,Topics,Your narrower subtopics,Questions,Global Warming,Is the topic appropriate for,a 1500-word essay?Why or

5、why not?,If the topic is too general,how do you narrow it down,to a more manageable topic?,Can you suggest some,appropriate topics of each,subject?,Cancer,Nanotechnology,Internet,Artificial intelligence,Unit 1 Choosing a Topic,1 Deciding on a topic,Topics,Your narrower subtopics,Questions,Energy,Is

6、 the topic appropriate for,a 1500-word essay?Why or,why not?,If the topic is too general,how do you narrow it down,to a more manageable topic?,Can you suggest some,appropriate topics of each,subject?,Genetic engineering,Universe,Unit 1 Choosing a Topic,1 Deciding on a topic,What is the main idea tha

7、t each essay tries to illustrate?,Text 1 illustrates how hackers or unauthorized users use one way or another to get inside a computer,while Text 2 describes the various electronic threats a computer might face.,In which aspect do the two essays share the same idea?,Both focus on the vulnerability o

8、f a computer.,Unit 1 Choosing a Topic,1 Deciding on a topic,In which aspect do the two essays differ?,Text 1 illustrates how hackers or unauthorized users use one way or another to get inside a computer,while Text 2 describes the various electronic threats a computer might face.,Unit 1 Choosing a To

9、pic,1 Deciding on a topic,What topic does each essay address?,Do you think they are appropriate according to the four,principles mentioned on Page 2?,缺答案,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 1,1 What does“unauthorized user”refer to?,This t

10、erm covers the entire range of folks,from those involved in organized criminal activities to insiders who are pushing the limits of what they are authorized to do on a system.,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 1,2 Whats the difference o

11、f known and unknown,vulnerabilities?,This term covers the entire range of folks,from those involved in organized criminal activities to insiders who are pushing the limits of what they are authorized to do on a system.,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your under

12、standing of Text 1,3 How to protect yourself against computer attacks?,Make sure you have all the latest patches for,your operating system and applications;,Make sure your password is complex;,Consider getting a hardware firewall and,limiting the flow of data to and from the,Internet to only the few

13、 select ports you,actually need;,Make sure your anti-virus software is up-to-,date and check frequently to see if there are,new virus definitions available;,Back up your data.,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions.,5 c,1

14、0 i,1 g,2 a,3 e,4 b,6 d,7 j,8 f,9 h,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions.,1 a(n),(,象征的,)gesture of love,2 The publisher,(,分发,)the book in Asia.,3 A“,”(,地点,)is a place,and so a website.,4 a(n),(,复杂的,)network of systems,5

15、 be used to,(,识别,)potential terrorists,6 deal the matter with him,(,完全地,),7 start with a pretty,(,直截了当,)question,8 beyond the,(,功能,)of the computers,9 hit the,(,目标,)at a distance,10 the person never,(,尝试,)to do anything more,11 a highly sophisticated,(,过程,),symbolic,distribute,site,complex,identify,

16、physically,straightforward,capability,target,attempt,process,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions.,12 work within the _(,限定因素,)of time and budget,13 thanks for your kind _(,解释,),14 use many _(,专业的,)terms,15 Prices _(,变化

17、范围,)from 340 U.S.Dollars to 390 U.S.Dollars.,16 _(,开拓,)a new market in the city,17 be absorbed in the social _(,社交网络,),18 _(,涉及,)unnecessary extra charges,19 only one _(,实例,)out of many,20 get to know more about the _(,具体的细节,)of the wedding,21 _(,陪伴,)with her to watch movies,parameter,interpretation

18、technical,range,exploit,networking,involve,instance,specification,accompany,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Complete the paragraph,When it comes to cloud computing,it is often worried that cloud computing is not reliable,the worries,(,从,到,),“I lose con

19、trol over the system with cloud computing”to“My files are not secure with cloud computing”.Actually the worries,(,来自于对,误解,)of cloud computing.Although the security of cloud computing _(,留下很多问题没有得到解决,),it,(,打开了通道,)the future development of computers.Hence a better understanding of a new technology,(,

20、需要有新的思想,)_.,ranging from,arise from some misunderstandings,leaves a lot of problems unsolved,opens a path for,requires a different frame of mind,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Translate the following sentences from Text 1 into Chinese.,有些人声称黑客是那些扩宽知识界限

21、而不造成危害的好人,(或即使造成危害,但并非故意而为),而“破碎者”才是真正的坏人。,2,这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。,3,那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Translate the following sentences from Text 1 into Chinese.,5,另

22、外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在仅有的几个你真正需要的端口,如电子邮件和网站流量。,4,另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的是攻击到尽可能多的潜在目标。,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 2,1 What are Trojan horses?,Trojan horses are a string of recent specimen

23、s designed to snatch passwords or credit card information and install programs that can be used to remotely control infected machines.,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 2,2 Whats the respective aims of phishing and spyware?,Phishing is

24、to trick a recipient into handing over money or sensitive personal information like their bank account details or a username and password.,Spyware is to serve up unwanted adverts,change system settings and gather information on a users online behavior for marketing purposes.,Unit 1 Choosing a Topic,

25、1 Deciding on a topic,Additional questions for your understanding of Text 2,3 Why does the writer say that the earliest“criminal”hackers were in fact relatively harmless?,It is because that they usually interested in testing the boundaries of their knowledge and their ability to get around security

26、measures.They mainly performed harmless pranks,for example employing low-tech tricks to get free calls through the U.S.phone networks.,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions.,5 a,10 c,1 d,2 f,3 h,4 i,6 e,7 b,8 j,9 g,Unit

27、1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions.,1 throw away a(n),(,损坏的,)computer,2 earn somebody considerable,(,恶名,),3 be used,(,可互换地,),4 A computer has,(,发生故障,).,5,(,挤,)milk into the bottle,6 a(n),(,有独创性的,)solution to the problem,7

28、Chinas,(,出现,)as a great power,8 of,(,卑微的,)birth,9,(,狡猾的,)men often pass for wise.,10 exploit their,(,弱点,)to fight them,11 a suspected,(,罪犯,),12 a jacket with leather,(,补丁,)on the elbows.,compromised,notoriety,interchangeably,malfunctioned,squeeze,ingenious,emergence,humble,Cunning,vulnerability,crim

29、inal,patches,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions.,13 the,(,阴险的,)looks on his face,14 This is a(n),(,艰巨的,)challenge.,15 the virus that can,(,复制,)itself,16 His,(,恶毒的,)gossip caused much mischief.,17 The path,(,盘旋,)up the

30、 mountain.,18 a(n),(,安全的,)operating system,19,(,使模糊,)my vision,20,(,阻止,)the spread of an epidemic,21 fall into,(,坏名声,),22 solve,(,复杂的,)electrical problems,23,(,利用,)natural resources,24 write a personal note to each,(,收件人,),25,(,转换,)holdings into shares,sinister,daunting,replicate,malicious,spirals,s

31、ecure,blur,stem,sophisticated,disrepute,harness,recipient,convert,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Translate the following sentences from Text 2 into Chinese.,看似无害的编程错误可以被利用,导致电脑被侵入并为电脑蠕虫和病毒的繁衍提供温床。,2,当一个软件漏洞被发现,黑客可以将漏洞变成一个侵入点,从而造成极大的破坏,在这之前,往往需要争分夺秒地利用正

32、确的软件补丁来防止破坏的发生。,3,最简单的钓鱼骗局试图利用迅速致富的伎俩诱使诈骗目标寄钱。但网络骗子们也变得越来越狡猾,最近的陷阱是通过发送客户服务的电子邮件让用户进入假银行或商业网站,并在那里请他们“重新输入”他们的账户信息。,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Translate the following sentences from Text 2 into Chinese.,4,间谍软件与垃圾邮件和钓鱼网络一起,构成了三个令人生厌的互联网害虫。尽管有些程序可以通过

33、入侵软件漏洞从而进入电脑,但这些有害而秘密的程序通常会随着其他通常是免费的应用软件侵入到计算机系统中。,5,尽管因特网已经彻底改变了全球通讯,但是对于那些意图为了罪恶目的而利用网络力量的人和那些负责阻止这些网络犯罪的人来说,他们之间的较量才刚刚开始。,Unit 1 Choosing a Topic,1 Deciding on a topic,1 Topics of each lecture,Lecture 1:_,Lecture 2:_,Lecture 3:_,2,Topic 1:_,Topic 2:_,The importance of Computer Ethics,How to deal

34、 with Computer Hackers,How I Begin to develop Computer Applications,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Lecture,1,1 What is the topic of the lecture?,To help computer users to be aware of the ethical uses of computers and the Internet.,2 Why do ethical issu

35、es become more important?,People should respect other peoples property and use resources fairly.,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Lecture,1,3 Which rule is about the way to avoid plagiarism?,Because more and more people have started using computers and t

36、he Internet.,4 Which rule do hackers mainly break?,Number Eight.,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Lecture,1,What are the main principles behind the Ten,Commandments of Computer Ethics?,Number Nine.,How is Lecture 1 different from Texts 1 and 2 in,terms o

37、f content?,To help computer users to be aware of the ethical uses of computers and the Internet.,7 What is the title of the lecture you may suggest?,缺答案,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Lecture,2,1 Who is the mysterious sponsor or“the Anonymous”?,Its a s

38、ophisticated group of politically motivated hackers.,2 According to the lecturer,what should we do besides putting a huge amount of money into cybersecurity for the most extraordinary technical solution?,We should talk to hackers and make use of them.,Unit 1 Choosing a Topic,1 Deciding on a topic,En

39、hancing your academic language,Lecture,2,3 How do the purchaser and the vendor do business on the CarderPlanet?,They do business by using the escraw system.,4 According to the lecturer,what kind of hackers should not be thrown into jail?,Hackers who have disabilities like autism.,Unit 1 Choosing a T

40、opic,1 Deciding on a topic,Enhancing your academic language,Lecture,2,What is the solution to the hacker problem according to the lecturer?,Recruiting and mobilizing hackers on behalf of the state.,In which aspects is the lecture related to Texts 1 and 2?,Faced with the threats of computer hackers m

41、entioned in Text 1 and 2,the speaker suggests that we should talk to hackers,understand their disabilities,and make use of their talent.,7 What is the title of the lecture you may suggest?,Understand and Make Use of Hackers,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic langua

42、ge,Lecture,3,1 What is the function of the app“Earth Fortune”?,It can display different kinds of color depending on ones fortune.,2 Why do a lot of kids find it difficult to make games?,Because not many kids know where they can learn to make up a program.,Unit 1 Choosing a Topic,1 Deciding on a topi

43、c,Enhancing your academic language,Lecture,3,3 Where does the lecturer put his apps?,The app store.,4 Why did the lecturer start an app club?,Because students at his school can come and learn how to design an app.,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Lecture

44、3,What is the big challenge to the iPad program?,How should iPad be used and what apps should we put on the iPads.,What is the title of the talk you may suggest?,How Can I Get Fascinated with the iPads and Design Apps,7 Will the lecturer become a potential hacker?Why,or why not?,Most probably if he

45、 lacks such education as computer ethics.,Unit 1 Choosing a Topic,2 Formulating a research question,purposes of a research question,Task 1,Read Text 3 and Text 4 and answer questions,Text 3,How Do Computer Hackers“Get Inside”a Computer?,Text 4,Electronic Threats of a Computer,Task 2,Develop topics i

46、nto research questions,Task 3,Brainstorm and answer questions,Unit 1 Choosing a Topic,2 Formulating a research question,It identifies the specific objectives your research or,your paper will address.,purposes of a research question,It determines the size of your research or the length,of your paper.

47、Unit 1 Choosing a Topic,1 Deciding on a topic,Text 3,Research question 1:,_,_,Research question 2:,_,Research question 3:,_,Text 4,Research question 1:,_,Research question 2:,_,Research question 3:,_,How many types of Cloud services and what are they?,What is green computing?,What advantages of the

48、 cloud computing?,What is the Web 3.0?,What advantages and disadvantages of the cloud computing?,Can the cloud computing provide security benefits?,Unit 1 Choosing a Topic,2 Formulating a research question,Additional questions for your understanding of Text 3,1 What is cloud computing?,Cloud computi

49、ng is a pay-per-use model for enabling on-demand access to reliable and configurable resources that can be quickly provisioned and releasedwith minimal consumer involvement in terms of management.,Unit 1 Choosing a Topic,2 Formulating a research question,Additional questions for your understanding o

50、f Text 3,2 What characteristics should cloud have?,1 It should be able to quickly allot and relieve resources whenever required by clients;,2 It should have real-time backup to offer maximum up time to clients;,3 It should be able to cater to the needs of clients without having to involve clients in

移动网页_全站_页脚广告1

关于我们      便捷服务       自信AI       AI导航        抽奖活动

©2010-2026 宁波自信网络信息技术有限公司  版权所有

客服电话:0574-28810668  投诉电话:18658249818

gongan.png浙公网安备33021202000488号   

icp.png浙ICP备2021020529号-1  |  浙B2-20240490  

关注我们 :微信公众号    抖音    微博    LOFTER 

客服