学术英语(理工类)Unit1-2-3-4-5演示PPT

上传人:日度 文档编号:142990385 上传时间:2020-08-25 格式:PPT 页数:539 大小:4.83MB
返回 下载 相关 举报
学术英语(理工类)Unit1-2-3-4-5演示PPT_第1页
第1页 / 共539页
学术英语(理工类)Unit1-2-3-4-5演示PPT_第2页
第2页 / 共539页
学术英语(理工类)Unit1-2-3-4-5演示PPT_第3页
第3页 / 共539页
学术英语(理工类)Unit1-2-3-4-5演示PPT_第4页
第4页 / 共539页
学术英语(理工类)Unit1-2-3-4-5演示PPT_第5页
第5页 / 共539页
点击查看更多>>
资源描述

《学术英语(理工类)Unit1-2-3-4-5演示PPT》由会员分享,可在线阅读,更多相关《学术英语(理工类)Unit1-2-3-4-5演示PPT(539页珍藏版)》请在金锄头文库上搜索。

1、1,学术英语 理工,Academic English for Science and Engineering,2,3,Unit 1 Choosing a Topic,Unit Contents,1 Deciding on a topic 2 Formulating a research question 3 Writing a working title 4 Enhancing your academic language (穿插在以上各版块中),4,Unit 1 Choosing a Topic,1 Deciding on a topic,Principles of Deciding on

2、a topic Task 1 Narrow down and evaluate topics Task 2 Discuss Task 3 Read Text 1 and Text 2 and answer questions Text 1 How Do Computer Hackers “Get Inside” a Computer? Text 2 Electronic Threats of a Computer Task 4 Listen to Lecture 1, 2 and 3 and answer questions Lecture 1 Questions Lecture 2 Ques

3、tions Lecture 3 Questions,5,Unit 1 Choosing a Topic,1 Deciding on a topic,Four principles of deciding on a topic,Interesting,Important,Manageable,Adequate,6,Unit 1 Choosing a Topic,1 Deciding on a topic,City Development Sustainable Development of Cities Sustainable Development of Big Cities Sustaina

4、ble Development of Chinese Big Cities Sustainable Development of Chinese Big Cities from the Biological Perspective,7,Unit 1 Choosing a Topic,1 Deciding on a topic,8,Unit 1 Choosing a Topic,1 Deciding on a topic,9,Unit 1 Choosing a Topic,1 Deciding on a topic,What is the main idea that each essay tr

5、ies to illustrate?,Text 1 illustrates how hackers or unauthorized users use one way or another to get inside a computer, while Text 2 describes the various electronic threats a computer might face.,In which aspect do the two essays share the same idea?,Both focus on the vulnerability of a computer.,

6、10,Unit 1 Choosing a Topic,1 Deciding on a topic,In which aspect do the two essays differ?,Text 1 illustrates how hackers or unauthorized users use one way or another to get inside a computer, while Text 2 describes the various electronic threats a computer might face.,11,Unit 1 Choosing a Topic,1 D

7、eciding on a topic,What topic does each essay address? Do you think they are appropriate according to the four principles mentioned on Page 2?,缺答案,12,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 1,1 What does “unauthorized user” refer to?,This ter

8、m covers the entire range of folks, from those involved in organized criminal activities to insiders who are pushing the limits of what they are authorized to do on a system.,13,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your understanding of Text 1,2 Whats the difference

9、 of known and unknown vulnerabilities?,This term covers the entire range of folks, from those involved in organized criminal activities to insiders who are pushing the limits of what they are authorized to do on a system.,14,Unit 1 Choosing a Topic,1 Deciding on a topic,Additional questions for your

10、 understanding of Text 1,3 How to protect yourself against computer attacks?,Make sure you have all the latest patches for your operating system and applications; Make sure your password is complex; Consider getting a hardware firewall and limiting the flow of data to and from the Internet to only t

11、he few select ports you actually need; Make sure your anti-virus software is up-to- date and check frequently to see if there are new virus definitions available; Back up your data.,15,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitio

12、ns.,5 c,10 i,1 g,2 a,3 e,4 b,6 d,7 j,8 f,9 h,16,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions.,1 a(n) (象征的) gesture of love 2 The publisher (分发) the book in Asia. 3 A “ ” (地点) is a place, and so a website. 4 a(n) (复杂的) network o

13、f systems 5 be used to (识别) potential terrorists 6 deal the matter with him (完全地) 7 start with a pretty (直截了当) question 8 beyond the (功能) of the computers 9 hit the (目标) at a distance 10 the person never (尝试) to do anything more 11 a highly sophisticated (过程),symbolic,distribute,site,complex,identif

14、y,physically,straightforward,capability,target,attempt,process,17,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Match the words with their definitions.,12 work within the _ (限定因素) of time and budget 13 thanks for your kind _ (解释) 14 use many _ (专业的) terms 15 Prices _

15、 (变化范围) from 340 U.S. Dollars to 390 U.S. Dollars. 16 _ (开拓) a new market in the city 17 be absorbed in the social _ (社交网络) 18 _ (涉及) unnecessary extra charges 19 only one _ (实例) out of many 20 get to know more about the _ (具体的细节) of the wedding 21 _ (陪伴) with her to watch movies,parameter,interpret

16、ation,technical,range,exploit,networking,involve,instance,specification,accompany,18,Unit 1 Choosing a Topic,1 Deciding on a topic,Enhancing your academic language,Complete the paragraph,When it comes to cloud computing, it is often worried that cloud computing is not reliable, the worries (从到) “I lose control over the

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 高等教育 > 专业基础教材

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号