资源预览内容
第1页 / 共440页
第2页 / 共440页
第3页 / 共440页
第4页 / 共440页
第5页 / 共440页
第6页 / 共440页
第7页 / 共440页
第8页 / 共440页
第9页 / 共440页
第10页 / 共440页
亲,该文档总共440页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述
学术英语理工 AcademicEnglishforScienceandEngineering Unit1ChoosingaTopic UnitContents 1Decidingonatopic2Formulatingaresearchquestion3Writingaworkingtitle4Enhancingyouracademiclanguage 穿插在以上各版块中 Unit1ChoosingaTopic 1Decidingonatopic PrinciplesofDecidingonatopicTask1NarrowdownandevaluatetopicsTask2DiscussTask3ReadText1andText2andanswerquestionsText1HowDoComputerHackers GetInside aComputer Text2ElectronicThreatsofaComputerTask4ListentoLecture1 2and3andanswerquestionsLecture1QuestionsLecture2QuestionsLecture3Questions Unit1ChoosingaTopic 1Decidingonatopic Fourprinciplesofdecidingonatopic Interesting Important Manageable Adequate Unit1ChoosingaTopic 1Decidingonatopic CityDevelopmentSustainableDevelopmentofCitiesSustainableDevelopmentofBigCitiesSustainableDevelopmentofChineseBigCitiesSustainableDevelopmentofChineseBigCitiesfromtheBiologicalPerspective Unit1ChoosingaTopic 1Decidingonatopic Unit1ChoosingaTopic 1Decidingonatopic Unit1ChoosingaTopic 1Decidingonatopic Whatisthemainideathateachessaytriestoillustrate Text1illustrateshowhackersorunauthorizedusersuseonewayoranothertogetinsideacomputer whileText2describesthevariouselectronicthreatsacomputermightface Inwhichaspectdothetwoessayssharethesameidea Bothfocusonthevulnerabilityofacomputer Unit1ChoosingaTopic 1Decidingonatopic Inwhichaspectdothetwoessaysdiffer Text1illustrateshowhackersorunauthorizedusersuseonewayoranothertogetinsideacomputer whileText2describesthevariouselectronicthreatsacomputermightface Unit1ChoosingaTopic 1Decidingonatopic Whattopicdoeseachessayaddress DoyouthinktheyareappropriateaccordingtothefourprinciplesmentionedonPage2 缺答案 Unit1ChoosingaTopic 1Decidingonatopic AdditionalquestionsforyourunderstandingofText1 1Whatdoes unauthorizeduser referto Thistermcoverstheentirerangeoffolks fromthoseinvolvedinorganizedcriminalactivitiestoinsiderswhoarepushingthelimitsofwhattheyareauthorizedtodoonasystem Unit1ChoosingaTopic 1Decidingonatopic AdditionalquestionsforyourunderstandingofText1 2What sthedifferenceofknownandunknownvulnerabilities Thistermcoverstheentirerangeoffolks fromthoseinvolvedinorganizedcriminalactivitiestoinsiderswhoarepushingthelimitsofwhattheyareauthorizedtodoonasystem Unit1ChoosingaTopic 1Decidingonatopic AdditionalquestionsforyourunderstandingofText1 3Howtoprotectyourselfagainstcomputerattacks Makesureyouhaveallthelatestpatchesforyouroperatingsystemandapplications Makesureyourpasswordiscomplex ConsidergettingahardwarefirewallandlimitingtheflowofdatatoandfromtheInternettoonlythefewselectportsyouactuallyneed Makesureyouranti virussoftwareisup to dateandcheckfrequentlytoseeiftherearenewvirusdefinitionsavailable Backupyourdata Unit1ChoosingaTopic 1Decidingonatopic Enhancingyouracademiclanguage Matchthewordswiththeirdefinitions 5 c 10 i 1 g 2 a 3 e 4 b 6 d 7 j 8 f 9 h Unit1ChoosingaTopic 1Decidingonatopic Enhancingyouracademiclanguage Matchthewordswiththeirdefinitions 1a n 象征的 gestureoflove2Thepublisher 分发 thebookinAsia 3A 地点 isaplace andsoawebsite 4a n 复杂的 networkofsystems5beusedto 识别 potentialterrorists6dealthematterwithhim 完全地 7startwithapretty 直截了当 question8beyondthe 功能 ofthecomputers9hitthe 目标 atadistance10thepersonnever 尝试 todoanythingmore11ahighlysophisticated 过程 symbolic distribute site complex identify physically straightforward capability target attempt process Unit1ChoosingaTopic 1Decidingonatopic Enhancingyouracademiclanguage Matchthewordswiththeirdefinitions 12workwithinthe 限定因素 oftimeandbudget13thanksforyourkind 解释 14usemany 专业的 terms15Prices 变化范围 from340U S Dollarsto390U S Dollars 16 开拓 anewmarketinthecity17beabsorbedinthesocial 社交网络 18 涉及 unnecessaryextracharges19onlyone 实例 outofmany20gettoknowmoreaboutthe 具体的细节 ofthewedding21 陪伴 withhertowatchmovies parameter interpretation technical range exploit networking involve instance specification accompany Unit1ChoosingaTopic 1Decidingonatopic Enhancingyouracademiclanguage Completetheparagraph Whenitcomestocloudcomputing itisoftenworriedthatcloudcomputingisnotreliable theworries 从 到 Ilosecontroloverthesystemwithcloudcomputing to Myfilesarenotsecurewithcloudcomputing Actuallytheworries 来自于对 误解 ofcloudcomputing Althoughthesecurityofcloudcomputing 留下很多问题没有得到解决 it 打开了通道 thefuturedevelopmentofcomputers Henceabetterunderstandingofanewtechnology 需要有新的思想 rangingfrom arisefromsomemisunderstandings leavesalotofproblemsunsolved opensapathfor requiresadifferentframeofmind Unit1ChoosingaTopic 1Decidingonatopic Enhancingyouracademiclanguage TranslatethefollowingsentencesfromText1intoChinese 有些人声称黑客是那些扩宽知识界限而不造成危害的好人 或即使造成危害 但并非故意而为 而 破碎者 才是真正的坏人 2这可以指获取计算机系统的存储内容 获得一个系统的处理能力 或捕获系统之间正在交流的信息 3那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的 也可能是为了让系统具备一些必要的功能而导致计划外的结果 Unit1ChoosingaTopic 1Decidingonatopic Enhancingyouracademiclanguage TranslatethefollowingsentencesfromText1intoChinese 5另外 考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在仅有的几个你真正需要的端口 如电子邮件和网站流量 4另一种是预先设定好程序对特定易受攻击对象进行攻击 然而 这种攻击是以鸟枪式的方式发出的 没有任何具体目标 目的是攻击到尽可能多的潜在目标 Unit1ChoosingaTopic 1Decidingonatopic AdditionalquestionsforyourunderstandingofText2 1WhatareTrojanhorse
收藏 下载该资源
网站客服QQ:2055934822
金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号