资源预览内容
第1页 / 共539页
第2页 / 共539页
第3页 / 共539页
第4页 / 共539页
第5页 / 共539页
第6页 / 共539页
第7页 / 共539页
第8页 / 共539页
第9页 / 共539页
第10页 / 共539页
亲,该文档总共539页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述
,学术英语 理工,Academic English for Science and Engineering,Unit 1 Choosing a Topic,Unit Contents,1 Deciding on a topic 2 Formulating a research question 3 Writing a working title 4 Enhancing your academic language (穿插在以上各版块中),Unit 1 Choosing a Topic,1 Deciding on a topic,Principles of Deciding on a topic Task 1 Narrow down and evaluate topics Task 2 Discuss Task 3 Read Text 1 and Text 2 and answer questions Text 1 How Do Computer Hackers “Get Inside” a Computer? Text 2 Electronic Threats of a Computer Task 4 Listen to Lecture 1, 2 and 3 and answer questions Lecture 1 Questions Lecture 2 Questions Lecture 3 Questions,Unit 1 Choosing a Topic,1 Deciding on a topic,Four principles of deciding on a topic,Interesting,Important,Manageable,Adequate,Unit 1 Choosing a Topic,1 Deciding on a topic,City Development Sustainable Development of Cities Sustainable Development of Big Cities Sustainable Development of Chinese Big Cities Sustainable Development of Chinese Big Cities from the Biological Perspective,Unit 1 Choosing a Topic,1 Deciding on a topic,Unit 1 Choosing a Topic,1 Deciding on a topic,Unit 1 Choosing a Topic,1 Deciding on a topic,What is the main idea that each essay tries to illustrate?,Text 1 illustrates how hackers or unauthorized users use one way or another to get inside a computer, while Text 2 describes the various electronic threats a computer might face.,In which aspect do the two essays share the same idea?,Both focus on the vulnerability of a computer.,Unit 1 Choosing a Topic,1 Deciding on a topic,In which aspect do the two essays differ?,Text 1 illustrates how hackers or unauthorized users use one way or another to get inside a computer, while Text 2 describes the various electronic threats a computer might face.,Unit 1 Choosing a Topic,1 Deciding on a topic,What topic does each essay address? Do you think they are appropriate according to the four principles mentioned on Page 2?,缺答案,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 1,1 What does “unauthorized user” refer to?,This term covers the entire range of folks, from those involved in organized criminal activities to insiders who are pushing the limits of what they are authorized to do on a system.,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 1,2 Whats the difference of known and unknown vulnerabilities?,This term covers the entire range of folks, from those involved in organized criminal activities to insiders who are pushing the limits of what they are authorized to do on a system.,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 1,3 How to protect yourself against computer attacks?,Make sure you have all the latest patches for your operating system and applications; Make sure your password is complex; Consider getting a hardware firewall and limiting the flow of data to and from the Internet to only the few select ports you actually need; Make sure your anti-virus software is up-to- date and check frequently to see if there are new virus definitions available; Back up your data.,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions.,5 c,10 i,1 g,2 a,3 e,4 b,6 d,7 j,8 f,9 h,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions.,1 a(n) (象征的) gesture of love 2 The publisher (分发) the book in Asia. 3 A “ ” (地点) is a place, and so a website. 4 a(n) (复杂的) network of systems 5 be used to (识别) potential terrorists 6 deal the matter with him (完全地) 7 start with a pretty (直截了当) question 8 beyond the (功能) of the computers 9 hit the (目标) at a distance 10 the person never (尝试) to do anything more 11 a highly sophisticated (过程),symbolic,distribute,site,complex,identify,physically,straightforward,capability,target,attempt,process,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions.,12 work within the _ (限定因素) of time and budget 13 thanks for your kind _ (解释) 14 use many _ (专业的) terms 15 Prices _ (变化范围) from 340 U.S. Dollars to 390 U.S. Dollars. 16 _ (开拓) a new market in the city 17 be absorbed in the social _ (社交网络) 18 _ (涉及) unnecessary extra charges 19 only one _ (实例) out of many 20 get to know more about the _ (具体的细节) of the wedding 21 _ (陪伴) with her to watch movies,parameter,interpretation,technical,range,exploit,networking,involve,instance,specification,accompany,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Complete the paragraph,When it comes to cloud computing, it is often worried that cloud computing is not reliable, the worries
收藏 下载该资源
网站客服QQ:2055934822
金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号