您好,欢迎访问三七文档
当前位置:首页 > 商业/管理/HR > 信息化管理 > 学术英语 理工 教师手册
1学术英语理工教师手册主编:蔡基刚2目录Unit1ChoosingaTopic............................................................................................................3Unit2SearchingforInformation............................................................................................20Unit3ListeningtoLectures....................................................................................................46Unit4WritingaLiteratureReview.........................................................................................64Unit5WritinganAcademicEssay.........................................................................................82Unit6MakinganOralPresentation......................................................................................1133Unit1ChoosingaTopic1DecidingonatopicTask1Answersmayvary.Task21No,becausetheyallseemlikeasubjectratherthanatopic,asubjectwhichcannotbeaddressedevenbyawholebook,letalonebya1500-wordessay.2Eachofthemcanbebrokendownintovariousandmorespecificaspects.Forexample,cancercanbeclassifiedintobreastcancer,lungcancer,livercancerandsoon.Breastcancercanhavesuchspecifictopicsforresearchascausesforbreastcancer,effectsofbreastcancerandpreventionordiagnosisofbreastcancer.3Actuallythetopicsofeachfieldareendless.Takebreastcancerforexample,wecanhavethetopicslike:WhyWomenSufferfromBreastCancerMoreThanMen?ANewWaytoFindBreastTumorsSomeRisksofGettingBreastCancerinDailyLifeBreastCancerandItsDirectBiologicalImpactBreastCancer—theSymptoms&DiagnosisBreastfeedingandBreastCancerTask31Text1illustrateshowhackersorunauthorizedusersuseonewayoranothertogetinsideacomputer,whileText2describesthevariouselectronicthreatsacomputermayface.2Bothfocusonthevulnerabilityofacomputer.3Text1analyzesthewaysofcomputerhackers,whileText2describessecurityproblemsofacomputer.4Text1:Thewayhackers“getinside”acomputerText2:ElectronicthreatsacomputerfacesYes,Ithinktheyareinteresting,important,manageableandadequate.Task41Lecture1:TenCommandmentsofComputerEthicsLecture2:HowtoDealwithComputerHackersLecture3:HowIBegintoDevelopComputerApplications2Answersmayvary.Task5Answersmayvary.2FormulatingaresearchquestionTask14Text3Researchquestion1:Howmanytypesofcloudservicesarethereandwhatarethey?Researchquestion2:Whatisgreencomputing?Researchquestion3:Whatareadvantagesofthecloudcomputing?Text4Researchquestion1:WhatistheWeb3.0?Researchquestion2:Whatareadvantagesanddisadvantagesofthecloudcomputing?Researchquestion3:Whatsecuritybenefitscanthecloudcomputingprovide?Task22Topic2:ThreatsofArtificialIntelligenceResearchquestions:1)Whatarethethreatsofartificialintelligence?2)Howcanhumanbeingscontrolthosethreats?3)Whatarethedifficultiestocontrolthosethreats?3Topic3:ThePotentialsofNanotechnologyResearchquestions:1)Whatareitspotentialsinmedicine?2)Whatareitspotentialsinspaceexploration?3)Whatareitspotentialsincommunications?4Topic4:GlobalWarmingandItsEffectsResearchquestions:1)Howdoesitaffectthepatternofclimates?2)Howdoesitaffecteconomicactivities?3)Howdoesitaffecthumanbehavior?Task3Answersmayvary.3WritingaworkingtitleTask1Answersmayvary.Task21Lecture4isaboutthesecurityproblemsofcloudcomputing,whileLecture5isaboutthedefinitionandnatureofcloudcomputing,henceitismoreelementarythanLecture4.2Thefourallfocusoncloudcomputing.AlthoughLecture4andText4addressthesametopic,theformerislessoptimisticwhilethelatterhasmoreconfidenceinthesecurityofcloudcomputing.Text3illustratesthevariousadvantagesofcloudcomputing.3Lecture4:CloudComputingSecurityLecture5:WhatIsCloudComputing?Task35Answersmayvary.4EnhancingyouracademiclanguageReading:Text11Matchthewordswiththeirdefinitions.1g2a3e4b5c6d7j8f9h10i2CompletethefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.1symbolic2distributed3site4complex5identify6fairly7straightforward8capability9target10attempt11process12parameter13interpretation14technical15range16exploit17networking28involve19instance20specification21accompany22predictable23profile3Readthesentencesinthebox.Payattentiontothepartsinbold.NowcompletetheparagraphbytranslatingtheChineseinbrackets.Youmayrefertotheexpressionsandthesentencepatternslistedabove.rangingfrom(从„„到)arisefromsomemisunderstandings(来自于对„„误解)leavesalotofproblemsunsolved(留下很多问题没有得到解决)opensapathfor(打开了通道)requiresadifferentframeofmind(需要有新的思想)4TranslatethefollowingsentencesfromText1intoChinese.1有些人声称黑客是那些超越知识疆界而不造成危害的好人(或即使造成危害,但并非故意而为),而“骇客”才是真正的坏人。2这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。3那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。4另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的是攻击到尽可能多的潜在目标。5另外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在几个真正需要的端口,如电子邮件和网站流量。Reading:Text21Matchthewordswiththeirdefinitions.1d2f3h4i5a6e7b8j9g10c2CompletethefollowingexpressionsorsentencesbyusingthetargetwordslistedbelowwiththehelpoftheChineseinbrackets.Changetheformifnecessary.1compromised2notoriety3interchangeably4malfunctioned5squeeze6ingenious7emergence8humble9Cunning10vulnerability11criminal12patches13sinister14daunting15replic
本文标题:学术英语 理工 教师手册
链接地址:https://www.777doc.com/doc-4150150 .html