文档库 最新最全的文档下载
当前位置:文档库 › 学术英语理工类课后题答案

学术英语理工类课后题答案

学术英语理工类课后题答案
学术英语理工类课后题答案

Reading: Text 1

1.Match the words with their definitions.

1g 2a 3e 4b 5c 6d 7j 8f 9h 10i

2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.

1 symbolic 2distributed 3site 4complex 5identify

6fairly 7straightforward 8capability 9target 10attempt

11process 12parameter 13interpretation 14technical

15range 16exploit 17networking 18involve

19 instance 20specification 21accompany 22predictable 23profile

3. Read the sentences in the box. Pay attention to the parts in bold.

Now complete the paragraph by translating the Chinese in brackets. You may refer to the expressions and the sentence patterns listed above.

ranging from(从……到)

arise from some misunderstandings(来自于对……误解)

leaves a lot of problems unsolved(留下很多问题没有得到解决)

opens a path for(打开了通道)

requires a different frame of mind(需要有新的思想)

4.Translate the following sentences from Text 1 into Chinese.

1) 有些人声称黑客是那些超越知识疆界而不造成危害的好人(或即使造成危害,但并非故意而为),而“骇客”才是真正的坏人。

2) 这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。

3) 那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。

4) 另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的是攻击到尽可能多的潜在目标。

5) 另外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在几个真正需要的端口,如电子邮件和网站流量。

Reading: Text 2

1.Match the words with their definitions.

1d 2f 3h 4i 5a 6e 7b 8j 9g 10c

https://www.wendangku.net/doc/9e8191241.html,plete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.

1 compromised 2notoriety 3 interchangeably 4malfunctioned 5squeeze

6 ingenious

7 emergence

8 humble

9 Cunning 10 vulnerability

11criminal 12patches 13 sinister 14daunting 15replicate

16malicious 17 spirals 18secure 19blur 20 stem

21 disrepute 22 sophisticated 23harness 24 recipient 25convert

3. Read the sentences in the box. Pay attention to the parts in bold.

Now complete the paragraph by translating the Chinese in brackets. You may refer to the expressions and the sentence patterns listed above.

There is evidence(有证据表明)

so hasthe numberof hackers(黑客的数量也有很大增长)

are often referred to as(往往被称之为)

compromise your computer(损坏你的计算机)

capture your information(获取你的信息)

access your computer(进入你的计算机)

4 .Translate the following sentences from Text 2 into Chinese.

1 看似无害的编程错误可能被利用,导致电脑被侵入,为电脑病毒和蠕虫的繁衍提供温床。

2 当一个软件漏洞被发现,黑客可以将它变成一个侵入点,从而造成极大的破坏。在这之前,往往需要争分夺秒地利用正确的软件补丁来防止破坏的发生。

3 最简单的钓鱼骗局试图利用迅速致富的伎俩诱使诈骗目标寄钱。但网络骗子们也变得越来越狡猾,最近的陷阱是通过发送客户服务的电子邮件让用户进入假银行或商业网站,并在那里请他们“重新输入”他们的账户信息。

4 间谍软件与垃圾邮件和钓鱼网络一起,构成了三个令人生厌的互联网害虫。尽管有些程序可以通过入侵软件漏洞从而进入电脑,但这些有害而秘密的程序通常会随着其他免费的应用软件侵入到计算机系统中。

5 尽管因特网已经彻底改变了全球通讯,但是对于那些利用网络力量实现罪恶目的的人和那些负责阻止这些网络犯罪的人来说,他们之间的较量才刚刚开始。

Reading: Text 3

1. Match the words with their definitions.

1f 2d 3e 4j 5i 6h 7b 8a 9g 10c

2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.

1 irrespective

2 be tailored

3 prone

4 opt 5maximum

6coded 7provision 8catered 9check 10ready-made

11modified 12on-demand 13 whereabouts 14Hazardous 15incurred

16applicable 17developer 18on offer19host 20nominal 21certified

22automated 23outage24sync 25back up 26minimal 27mobile

3. Read the sentences in the box. Pay attention to the parts in bold.

Now complete the paragraph by translating the Chinese in brackets. You may referto the expressions and the sentence patterns listed above.

Irrespective of whether(不管)

saveusersthe trouble(使用户避免这样的麻烦)

caters to the needs of(迎合了需求)

for the purpose of(其目的就是)

4. Translate the following sentences from Text 3 into Chinese.

1 云计算可定义为一种按次付费模式,这种模式可以根据要求迅速得到计算机分配的可靠资源,用户很少需要自己进行管理。

2 由于云计算可以用来不断提供资源,因此当你需要扩充计算机容量时就不需要去买硬件,就不会因为用电去冷却计算机设备而产生更多的二氧化碳。

3 这意味着他们不需要开车到办公地点。这就可以省去燃料费,减少二氧化碳排放,从而保护了环境。

4 万一断电,客户可以在电脑再启动时使用和主机同步的备份。

5 除此之外,云计算还不容易受到黑客入侵和分布式拒绝服务的攻击,因为攻击者不知道数据的位置。

Reading: Text 4

1. Match the words with their definitions.

1c 2e 3a 4i 5g 6b 7d 8f 9j 10h

2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.

1 analogy 2compatible 3 Distribute 4 implement 5activated 6 static

7 aggregated 8 clone 9 innovative 10replacement 11 crashed

12 compromised 13 mine 14 substantial 15asset 16 centralize 17 facilities

18 loose 19 monitor 20integrate 21derived 22 update 23download

24 upgrade 25licensed 26differential 27 install 28 minimum 29 in-house 30crucial

3. Read the sentences in the box. Pay attention to the parts in bold.

Now complete the paragraph by translating the Chinese in brackets. You may referto the expressions and the sentence patterns listed above.

remains wide open(有很大的前景)

is derived from the way in which(来自这样一个方法)

becomes crucial(非常重要)

will be substantially reduced(会大大降低)

4.Translate the following sentences from Text 4 into Chinese.

1这个术语来自于因特网往往呈现为网络图的方法。

2目前云计算技术涉及一个数据中心的存在,这个中心能够为全世界用户提供服务。

3这就减少了由于没有硬件,如手提电脑带来的影响。

4虚拟化可以使一个损坏的云端服务器迅速找到替代品而不造成大的损失或破坏。

5云技术还处于起步阶段,更多新的优点会不断被发现。

III. Lecture Listening

Listening: Lecture 1

1.To help computer users to be aware of the ethical uses of computers and the Internet.

2. Because more and more people have started using computers and the Internet.

3.Number Eight.

4.Number Nine.

5. Respect and fairness.

6.Lecture 1 addresses the topic “how a computer user avoids being a conscious or unconscious hacker” while Text 1 and 2 deal with the way hackers “get inside” a computer a nd electronic threats a computer faces.

7.Ten Commandments of Computer Ethics.

Lecture 1 Computer ethics 8

Good morning. Did anyone hear the news about the teenager in New York who hacked into a bank’s database and stole about 30,000 credit card numbers over the week end? Hacking is related to computer ethics. Computer ethics deals with the proper use of information technology, such as computers and the Internet. By proper use, I mean socially responsible use. We’ll first talk about what ethical behavior is and then how this applies to computer use.

Ethics is about right and wrong or it deals with moral judgment, with what is acceptable or unacceptable to do. Now we learn ideas about what is right and wrong from our families, our friends, and from the culture we live in. Because of differences in our backgrounds, we may not always agree on what is right and wrong.

However, for our discussion today, I will define for you what I mean by an ethical action. An ethical action is something someone does that ben efits someone and doesn’t hurt anyone. So, for example, if you see a man drop some money and you pick the money up and give it to him, this is an ethical action. On the other hand, if you pick up the money and don’t give it back to the man, this benefits you, but hurts the man. This is not an ethical action.

Now what about computers? What are the ethical boundaries for using computers and Internet? Most people agree that it is wrong to steal from a store. Would they also say it’s wrong to copy music files from the Internet? Or, to take another example, most people agree that it is wrong to open an envelope and read a letter to someone else. Would they also say it’s wrong to read someone else’s email?

In the past decade or so, many more people have started using computers and the Internet, so these issues have become important. In 1992, the Computer Ethics Institute was founded in the United States. This is a research, education, and policy study group whose goal is to increase awareness of the ethical issues that are likely to come up as technology develops. One concept the Computer Ethics Institute has developed is the Ten Commandments of Computer Ethics. These rules are important guidelines the Institute thinks all computer users should follow. Now some of you may be familiar with the Ten Commandments from the Bible, like, uh, “Thou shalt not kill.” or “Thou shalt honor thy father and thy mother.” The Ten Commandments of Computer Ethics have been written in the same style of language used in the Ten Commandments from the Bible. For example, they use the phrase “Thou shalt not”, “Thou shalt not” means “don’t” or “you shouldn’t”.

Let’s look at each commandment or rule.

The first commandment says: Thou shalt not use a computer to harm other people. Simple enough, right?

Number Two: Thou shalt not interfere with other people’s computer work. I interpret this to mean don’t use a computer in any way that will affect or change the work someone else is doing.

Don’t move or edit someone else’s files without telling th em.

Number Three: Thou shalt not snoop in other people’s files. To snoop means to try to find out something without another person knowing it. If you look at someone else’s files on the computer or read their email, you’re snooping. Respect other people’s privacy.

Number Four: Thou shalt not use a computer to steal. There are situations on the Internet in which you have to decide if you are stealing or not, like downloading music files, as I mentioned earlier.

Number Five: Thou shalt not use a computer to say things that are untrue. It is up to you to be truthful in your website, in your e-business, and in your email.

Number Six: Thou shalt not use software for which you have not paid. In other words, if the software is free on the Internet, it’s okay to d ownload and use it. However, it is not okay to copy software from a friend, because you didn’t pay for it.

Number Seven: Thou shalt not use other people’s computer resources without telling them, or without paying them. For example, you shouldn’t use someone else’s computer, password, or Internet connection without asking them first.

Number Eight: Thou shalt not appropriate someone else’s ideas. Appropriate means to take words someone else wrote and say they’re yours. Uh, for example, you have to write a re port for school. If you copy a term paper from the Internet and hand it in, you’re breaking the rule. Copying even a few sentences off the Internet and presenting them as your own is breaking the rule.

Number Nine: The ninth commandment says: Thou shalt think about the social consequences of the program you are writing. Now, this applies mostly to computer programmers. Social consequences means how the program you’re writing might affect others in society. Could hackers possibly use your program to illegally gain access to a computer system? Skillful hackers can hack into banks and into credit card companies; they can alter accounts and steal money. They can also create viruses that can cause billions of dollars of damage worldwide.

Number Ten, The tenth commandment says: Thou shalt always use a computer in ways that are respectful of others. For example, sending unfriendly email to someone or about someone or creating websites with negative messages are examples of breaking this rule.

OK, the Computer Ethics Institute has sent these guidelines to many large companies and to schools across the United States. However, there’s no way to enforce these rules. Nevertheless, they would like to see schools, in particular, utilize these rules to help students develop a strong sense of computer ethics. Well, there are a lot of rules, but they all boil down to a couple of principles: respect and fairness. Respect what belongs to others and use resources fairly.

Now let’s go back to ethics. Now increasingly, schools are seeing that students need to be taught computer ethics as part of the school curriculum. Some schools have come up with acceptable-use policies, or rules about what is or isn’t OK for students to do regarding computer use. This is how the Computer Ethics Institute would like to see schools utilizing the rules. Generally, it’s considered wrong to steal someone else’s password or to read some else’s email. It’s also considered unacceptable in college classes for a student to download a term paper off the Internet and pretend that he or she wrote it. This is called “plagiarism”, and it’s a good example of breaking Rule Number Eight. Students are permitted to use the Internet for research, but are instructed to write the information in their own words and to explain where they got the information.

Now the ten rules are guidelines for us to follow. These rules help us to be aware of the ethical uses of technology. Let’s stop here for today. Think about these rules this week and we’ll talk about them. And read the next two chapters for next week.

Listening: Lecture 2

1 It’s a sophisticated group of politically motivated hackers.

2 We should talk to hackers and make use of them.

3 They do business by using the escrow system.

4 Hackers who have disabilities like autism.

5 Recruiting and mobilizing hackers on behalf of the state.

6 Faced with the threats of computer hackers mentioned in Text 1 and 2, the speaker suggests that we should talk to hackers, understand their disabilities, and make use of their talent.

7 Understand and Make Use of Hackers.

Lecture 2 Computer hackers!

Now this is a very un-TED-like thing to do, but let’s kick off the afternoon with a message from a mystery sponsor.

Anonymous: Dear Fox News, it has come to our unfortunate attention that both the name and nature of Anonymous has been ravaged. We are everyone and we are no one. We are anonymous. We are legion. We do not forgive. We do not forget. We are the base of chaos.

Anonymous, ladies and gentlemen—a sophisticated group of politically motivated hackers who have emerged in 2011. And they’re pretty scary. You never know when they’re going to attack next, who or what the consequences will be. But interestingly, they have a sense of humor. These guys hacked into Fox News’ Twitter account to announce President Obama’s assassination. Now you can imagine the panic that would have generated in the newsroom at Fox. “What do we do now? Put on a black armband, or crack open the champagne?” (Laughter) And of course, who could escape the iron y of a member of Rupert Murdoch’s News Corp. being a victim of hacking for a change. (Laughter, applause)

Sometimes you know you turn on the news and you say, “Is there anyone left to hack?” Sony PlayStation Network—done; the government of Turkey—tick, Br itain’s Serious Organized Crime Agency—a breeze, the CIA—falling off a log. In fact, a friend of mine from the security industry told me the other day that there are two types of companies in the world: those that know they’ve been hacked, and those that d on’t. I mean three companies providing cyber security services to the FBI have been hacked. I mean is nothing sacred anymore, for heaven’s sake?

Anyway, this mysterious group Anonymous—and they would say this themselves—they are providing a service by demonstrating how useless companies are at protecting our data. But there is also a very serious aspect to Anonymous—they are ideologically driven. They claim that they are battling a dastardly conspiracy. They say that governments are trying to take over the Internet and control it, and that they, Anonymous, are the authentic voice of resistance—be it against global media corporations, or against intelligence agencies, or whoever it is. And their politics are not entirely unattractive. Okay, they’re a little inchoate. There’s a strong whiff of sort of half-baked anarchism about them. But one thing is true: We are at the beginning of a mighty struggle for control of the Internet. The Web links everything, and very soon it will mediate most human activity. Because the Internet has fashioned a new and complicated environment for an

old-age dilemma that pits the demands of security with the desire for freedom.

Now this is a very complicated struggle. And unfortunately, for mortals like you and me, we probably can’t understand it very well. Nonetheless, in an unexpected attack of hubris a couple of years ago, I decided I would try and do that. And I sort of get it. These were the various things that I was looking at as I was trying to understand it. But in order to try and explain the whole thing, I would need another 18 minutes or so to do it, so you’re just gonna have to take it on trust from me on this occasion, and let me assure you that all of these issues are involved in cyber security and control of the Internet one way or the other, but in a configuration that even Stephen Hawking would probably have difficulty trying to get his head around. So there you are. And as you see, in the middle, there is our old friend, the hacker. The hacker is absolutely central to many of the political, social and economic issues affecting the Net. And so I thought to myself, “Well, these are the guys who I want to talk to.” And what do you know, nobody else does talk to the hackers. They’re completely anonymous, as it were.

So despite the fact that we are beginning to pour billions, hundreds of billions of dollars, into cyber security—for the most extraordinary technical solutions—no one wants to talk to these guys, the hackers, who are doing everything. Instead, we prefer these really dazzling technological solutions, which cost a huge amount of money. So nothing is going into the hackers. Well, I say nothing, but actually there is one teeny weeny little research unit in Turin, Italy, called the Hackers Profiling Project. And they are doing some fantastic research into the characteristics, into the abilities and the socialization of hackers. But because they’re a U.N. operation, maybe that’s why governments and corporations aren’t that interested in them. Because it’s a U.N. oper ation, of course, it lacks funding. But I think they’re doing very important work. Because where we have a surfeit of technology in the cyber security industry, we have a definite lack of—call me old-fashioned—human intelligence.

Now, so far I’ve mentione d the hackers Anonymous who are a politically motivated hacking group. Of course, the criminal justice system treats them as common old garden criminals. But interestingly, Anonymous does not make use of its hacked information for financial gain. But what about the real cybercriminals? Well, real organized crime on the Internet goes back about 10 years when a group of gifted Ukrainian hackers developed a website, which led to the industrialization of cybercrime. Welcome to the now forgotten realm of CarderPlanet. This is how they were advertising themselves a decade ago on the Net. Now CarderPlanet was very interesting. Cybercriminals would go there to buy and sell stolen credit card details, to exchange information about new malware that was out there. And remember, this is a time when we’re seeing for the first time so-called off-the-shelf malware. This is sort of ready for use, out-of-the-box stuff, which you can deploy even if you’re not a terribly sophisticated hacker.

And so CarderPlanet became a sort of supermarket for cybercriminals. And its creators were incredibly smart and entrepreneurial, because they were faced with one enormous challenge as cybercriminals. And that challenge is: How do you do business, how do you trust somebody on the Web who yo u want to do business with when you know that they’re a criminal? (Laughter) I mean it’s axiomatic that they’re dodgy, and they’re going to want to try and rip you off. So the family, as the inner core of CarderPlanet was known, came up with this brilliant idea called the escrow system. They appointed an officer who would mediate between the vendor and the purchaser. The vendor, say, had stolen credit card details; the purchaser wanted to get hold of them. The purchaser would send the administrative officer some dollars digitally, and the vendor

would sell the stolen credit card details. And the officer would then verify if the credit card, the stolen credit cards worked. And if they did, he then passed on the money to the vendor and the stolen credit card details to the purchaser. And it was this which completely revolutionized cybercrime on the Web. And after that, it just went wild. We had a champagne decade for people we know as Carders.

Now I spoke to one of these Carders who we’ll call RedBrigade—altho ugh that wasn’t even his proper nickname—but I promised I wouldn’t reveal who he was. And he explained to me how in 2003 and 2004 he would go on sprees in New York, taking out $10,000 from an ATM here, $30,000 from an ATM there, using cloned credit cards. He was making, on average a week, $150,000—tax free of course. And he said that he had so much money stashed in his upper-East side apartment at one point that he just didn’t know what to do with it and actually fell into a depression. But that’s a slightly different story, which I won’t go into now. Now the interesting thing about RedBrigade is that he wasn’t an advanced hacker. He sort of understood the technology, and he realized that security was very important if you were going to be a Carder, but he d idn’t spend his days and nights bent over a computer, eating pizza, drinking coke and that sort of thing. He was out there on the town having a fab time enjoying the high life.

And this is because hackers are only one element in a cybercriminal enterprise. And often they’re the most vulnerable element of all. And I want to explain this to you by introducing you to six characters who I met while I was doing this research. Dimitry Golubov, aka SCRIPT—born in Odessa, Ukraine in 1982. Now he developed his social and moral compass on the Black Sea port during the 1990s. This was a sink-or-swim environment where involvement in criminal or corrupt activities was entirely necessary if you wanted to survive. As an accomplished computer user, what Dimitry did was to transfer the gangster capitalism of his hometown onto the World Wide Web. And he did a great job in it. You have to understand though that from his ninth birthday, the only environment that he knew was gangsterism. He knew no other way of making a living and making money.

Then we have Renukanth Subramaniam, aka JiLsi—founder of DarkMarket, born in Colombo, Sri Lanka. As an eight-year-old, he and his parents fled the Sri Lankan capital because Singhalese mobs were roaming the city, looking for Tamils like Renu to murder. At 11, he was interrogated by the Sri Lankan military; accused of being a terrorist, and his parents sent him on his own to Britain as a refugee seeking political asylum. At 13, with only little English and being bullied at school, he escaped into a world of computers where he showed great technical ability, but he was soon being seduced by people on the Internet. He was convicted of mortgage and credit card fraud, and he will be released from Wormwood Scrubs Jail in London in 2012.

Matrix001, Matrix Lunar Anx, who was an administrator at DarkMarket. Born in Southern Germany to a stable and well-respected middle class family, his obsession with gaming as a teenager led him to hacking. And he was soon controlling huge servers around the world where he stored his games that he had cracked and pirated. His slide into criminality was incremental. And when he finally woke up to his situation and understood the implications, he was already in too deep.

Max Vision, aka ICEMAN—mastermind of CardersMarket. Born in Meridian, Idaho. Max Vision was one of the best penetration testers working out of Santa Clara, California in the late 90s for private companies and voluntarily for the FBI. Now in the late 1990s, he discovered a vulnerability on all U.S. government networks, and he went in and patched it up—because this

included nuclear research facilities—sparing the American government a huge security embarrassment. But also, because he was an inveterate hacker, he left a tiny digital wormhole through which he alone could crawl. But this was spotted by an eagle-eye investigator, and he was convicted. At his open prison, he came under the influence of financial fraudsters, and those financial fraudsters persuaded him to work for them on his release. And this man with a planetary-sized brain is now serving a 13-year sentence in California.

Adewale Taiwo, aka FreddyBB—master bank account cracker from Abuja in Nigeria. He set up his prosaically entitled newsgroup, bankfrauds@https://www.wendangku.net/doc/9e8191241.html, before arriving in Britain in 2005 to take a Masters in chemical engineering at Manchester University. He impressed in the private sector, developing chemical applications for the oil industry while simultaneously running a worldwide bank and credit card fraud operation that was worth millions until his arrest in 2008. And then finally, Cagatay Evyapan, aka Chao—one of the most remarkable hackers ever, from Ankara in Turkey. He combined the tremendous skills of a geek with the suave social engineering skills of the master criminal. One of the smartest people I’ve ever met. He also had the most effective virtual private network security arrangement the police have ever encountered amongst global cybercriminals.

Now the important thing about all of these people is they share certain characteristics despite the fact that they come from very different environments. They are all people who learned their hacking skills in their early to mid-teens. They are all people who demonstrate advanced ability in maths and the sciences. Remember when they developed those hacking skills, their moral compass had not yet developed. And most of them, with the exception of SCRIPT and Chao, well, they did not demonstrate any real social skills in the outside world—only on the Web.

And the other thing is the high incidence of hackers like these who have characteristics which are consistent with Asperger’s syndrome. Now I discuss this with Professor Simon Baron-Cohen who’s the professor of developmental psychopathology at Cambridge. And he has done path-breaking work on autism and confirmed, also for the authorities here, that Gary McKinnon —who was who is wanted by the United States for hacking into the Pentagon—suffers from Asperger’s and a secondary condition of depression. And Baron-Cohen explained that certain disabilities can manifest themselves in the hacking and computing world as tremendous skills, and that we should not be throwing in jail people who have such disabilities and skills because they have lost their way socially or been duped.

Now I th ink we’re missing a trick here, because I don’t think people like Max Vision should be in jail. We need to engage and find ways of offering guidance to these young people, because they are a remarkable breed. And if we rely, as we do at the moment, solely on the criminal justice system and the threat of punitive sentences, we will be nurturing a monster we cannot tame. Thank you very much for listening.

Listening: Lecture 3

1.It can display different kinds of color depending on one’s fortune.

2 Because not many kids know where they can learn to make up a program.

3 The app store.

4 Because students at his school can come and learn how to design an app.

5 How should iPad be used and what apps should we put on the iPads.

6 How Can I Get Fascinated with the iPads and Design Apps?

7 Maybe most probably if he lacks such education as computer ethics.

Lecture 3Computer applications

Hello, everyone! My name is Thomas Suarez. I’ve always had a fascination for computers and technology, and I made a few apps for th e iPhone, iPod touch and iPad. I’d like to share a couple with you today. My first step was a unique fortune teller called Earth Fortune, that would display different colors of earth depending on what your fortune was. My favorite and most successful app is Bustin Jieber, which is the Justin Bieber wack mal. I created it because a lot of people at school dislike Justin Bieber a little bit, so I decided to make the app, so I went to work programming it and I released it just before the holidays in 2010.

A lot of people asked me how did I make this? A lot of time just because the person who asked the question wants to make an app also. A lot of kids these days like to play games, but now they want to make them and it’s difficult. Because not many kids know wh ere to go to find out how to make a program. I mean for soccer you could go to a soccer team, for violin you could get lessons for a violin, but what if you want to make an app? And their parents, these kids’ parents might have done these things when they were young, but not many parents have made apps. Where do you go to find out how to make an app.

Well, this is how I approached it, this is what I did.

First of all, I’ve been programming in multiple other programs just to get the basics down, such as the Python, C, Java etc. And then Apple released the iPhone and with it, the iPhone software developing kit, and software developing kit is a sweet of tools for creating and programming an iPhone app. This opened up a whole new world of possibilities for me, and after playing with the soft developing kit a little bit I made a couple apps and made some test apps, one of them happened to be Earth Fortune. I was ready to put Earth Fortune on the app store, and so I persuaded my parents to pay the $99 fee to be able to put my apps on the app store. They agreed and now I have apps on the app store.

I’ve got a lot interesting encouragement from my family, friends, teachers, and even people of the apple store, that’s been a huge help to me. I’ve got a lot of inspira tion from Steve Jobs. I started an app club at school and a teacher of my school is kindly sponsoring my app club. Any students at my school can come and design, learn how to design an app. This is all I can share my experiences with others.

There is this program called the iPad pilot program, and some districts have them. I’m fortunate enough to be part of one. A big challenge is how should the iPads be used and what apps should we put on the iPads. So we’re getting feedback from teachers at the school to see what kind of apps they like. When we design the app and we sell it, it would be free to local districts and other districts that we sell to. All the money from that would go to local foundations. These days students know, usually know, a little bit more than teachers with the technology, so, sorry, so this is the resource to teachers and educators should recognize this resource and make good use of it. I’d like to finish up by saying what I like to do in the future. First of all I’d like to create mor e apps, more games. I’m working with the third party company to make an app. I’d like to get into Android programming and developments, and I’d like to continue my app club and find other ways for students to share knowledge with others. Thank you.

Listening: Lecture 4

1 Security.

2 Privacy, intrusion prevention and detection, and availability.

3 The keys are less secure and can be cracked more easily.

4 Because there are new forms of attacks as technology develops.

5 We should apply cloud service intelligently in the new context.

Lecture 4 Cloud computing security

So my name’s Matthias Jung. I’m a consultant in blog and network security domain. I want to talk about cloud security, and ask the questions that are actually so new. Security is said as one of the most important obstacles to the adoption of cloud computing, but there are so much hype around cloud computing that you don’t know what people are actually talking about. Many companies are selling and labeling the products as cloud computing because if you think of Software as a Service or Platform as a Service, you’re basically talking about Web service and Web services are around already since 10 or 12 years. So the threats related to Web services are very well known. Some of them are listed here: secret injection, cross site scripting, request forgery, and you basically either need to trust your service provider if you fill your data at the Google’s places or you need to negotiate some service level agreements. What’s really new is Infrastructure as a Service. Services like Amazon EC2, but still here, the problems related to security—privacy, intrusion prevention, detection availability—are all problems that are all trans that we have around since a long time. And there are already a lot of solutions, open source solutions, partly solutions directly provided by the cloud provider. So, what is actually new? There are some new forms of attacks that are related to the new technology Infrastructure as a Service. And I will give a short overview about so me of them. So, oh, it’s not very visible here. I integrated the links to some documents. People run 10-bit images. There was a conference where software security provider was able to show how easily it was to create a malicious virtual image and people just instantiated it because it was quite on the top of the list of AMIs, said Amazon. Easy and instant access to many machines. Imagine someone stole lots of credit cards now is able to instantiate it to create an army of hundreds or thousands of machines that can run distributed deny-of-service attacks. This is something new. Auto-Scaling. This is a funny one because deny-of-service attack against infrastructure, normally resulted in shutting down the machines, here results in instantiating new instances and the customer who is attacked is paying for it. Side channel attacks. This is something shown in a research lab; they were able to predict where on the physical resources a certain instance was running based on the idea of original instance. And they were able to place their own virtual instance close to this and by measuring cache responses they were able to predict some information about load and performance of this other instance. Lack of entropy, also something found out by a research lab. To have safe keys you need to be able to have sufficient number of random numbers. If you don’t have enough random numbers, then the keys are less secure and can be cracked more easily. There are some other issues like bugs in virtualization software. Amazon uses XEN. Storage data of terminated instance reconstructable. This was something founded in Amazon. If you store your information at the local storage you shut down your image. You should be sure that the information has completely been deleted, which was not the case in this specific case. And one important thing is also that in Amazon EC2, you have a single key to access to the API and the API gives you full control of the whole infrastructure, meaning someone able to retrieve the key can do anything he wants with the

infrastructure. And even worse, you are not able to get access to the auditlog so you are not able to detect if someone tries to get into your system. My conclusion. So, is Infrastructure as a Service less or more secure than Software as a Service or Platform as a Service? It’s more secure in the sense that you have a higher level of control, you can customize your infrastructure and you can apply your own security’s teams. It is less secure in the sense that there are some new technology, there are some more forms of attacks. What does that mean for cloud security then? So thereare some new problems, which is good because security experts like to solve new problems. There are some problems that can be solved by the service providers. We need to push them, we need to ask them. Amazon showed very responsive they included some security features recently in their platform. But the vast majority of problems are problems that are well understood. The procedures and tools are there, and just need to be applied intelligently in the new context. Thanks for your attention.

Listening: Lecture 5

Part1

1 No, because the cloud computing is more than just about technology, it’s a combination of different factors.

2 Innovation, bespoke, products and utility service.

3 Because the innovation would finally become a utility service.

Part2

4 A constant demand for new things and a constant pressure for improvement.

5 Concept, suitability, technology and attitude.

6 To illustrate the situation that there are so much noise on cloud computing.

Lecture 5Cloud computing

Part 1

So cloud computing, why it matters? Quick introduction first my name is Simon Wardley, I work at Canonical, on software services. Canonical is the company that sponsors and supports Ubuntu. Before I start this presentation, a few words of warning. I am a scientist by training, which means I like graphs. Now I plotted a quick graph, the level of audience’s pain, that’s you, against the number of slides given in the 20-minute presentation. Now I reckon there is a safe limit of around about 15 slides. Because I’m a scientist and I like to experiment; I thought to do this presentation with no less than 193 slides. I know what you are thinking, but don’t worry if you do get a bit lost. This is a talk on cloud computing. Being lost is normal.

So what is cloud computing? On the way here, I thought I’d ask some people, so I asked the taxi driver in London. And he said, it’s like computers on the Internet, innit. Well that’s actually very good. So I asked the techno logy strategist, and he said, it’s the future of technology and the disruptive shift of the computing stack towards online services. Well that’s just a fancy way of saying “It’s like computers on the Internet, innit.” So I asked the businessman, and he said it’s what the technology strategist said it was, but it’s also about the provision of computer resources like electricity and getting relatively inexpensive costs, like Cyzedmans. So I asked Cyzedmans and he said “It’s like Saas or Software as a Service,and Infrastructure provision and PaaS. That’s Platform as a Service and utility computing being provided on public clouds, which is different from private clouds which aren’t cloud computing. Unless of course you’re talking about hybrid

clouds which sort of are and it’s also hype and lock-in and did I mention infrastructure?”

So, I had a look on Google, and I found 67 definitions of cloud computing. Now whilst this doesn’t actually help if you are trying to understand the field, it’s fantastic for me because I’m trying to pad out a presentation. So let’s look at those 67 definitions.

No.1: On-demand self-service Internet infrastructure where you pay-as-you-go and you use what you need, either through a browser application or API. Broken up into multiple segments including: Cloud Infrastructure, Cloud Platforms and Cloud Applications (see “Cloud Pyramid”). So what’s the Cloud Pyramid? Well it turns out it’s another 8 definitions and a long-running debate of whether the cloud is a triangle and if so, which way does it point.

Lost yet? You will be. Definition two. Okay I’m not really going to read out 67 definitions, so what I’m going to say is that having done so, I came to the conclusion that there is no definition for cloud computing unless of course you are talking to a technology strategist who normally says cloud is their product. So I looked around for analogy to help me explain what was going on, why were we having such problems with definitions and I think I found one.

What is Industrial Revolution? Well I asked my taxi driver and he said it’s like mechanized horses, inn it, which is, not bad. I could search on Google and found 43 definitions. Here we go again. No.1: Broad socioeconomic change starting in the early 19th century.

No.2: Rapid development of industry starting in the early 19th century.

Oh no, we can’t even agree on century here. No definition once more and this is 200 years after the event. Now at this rate, kittens will be online before we understand what cloud computing is. The reason why we have such a problem with definition is that the Industrial Revolution is not a thing. It’s a transformation, a transition. So I’m going to explore this and the fundamentals behind this because that’s the heart of the problem. So the Industrial Rev olution was a time when we went from bespoke cottage industry what I’d like to call Mrs. Muggings’ ink to one of mass production and this change depended upon a number of factors. It needed the idea or the concept of industrial production combined with the suitability of activities for that, combined with the technology for this change and also a changing attitude in society to adopt these new models. These forces are what caused the Industrial Revolution. And you can’t define Industrial Revolution in terms of our product alone because it’s more than this. So whilst my taxi driver’s definition is very neat. It’s ultimately wrong and the same is true with cloud computing, because cloud computing is more than just about technology. It’s a combination of different factors. And this is where I’d like to start.

So first, I want to have a look at concept. The origins of cloud computing can be traced back to 1968 when John McCarthy predicted that in the future, computing resources would be provided just like electricity, and he gave this idea a name. He called it utility computing. But where did this idea come from? Well to understand this we actually have to get further back, and understand the change in the electricity industry. So back in 1821, electricity was brand new; it was an innovation; it was hot over the time, a number of bespoke systems were created and then products were introduced. And then around about 1890s, Edison and Westinghouse introduced the first utility electricity grids. Electricity had become much more of a commodity, and in this case it was provided as utility services. Harvey Hubbell then created the plug, and then in 1930s we had the national grid. Electricity provision has transformed from an innovation to much more of a utility service. It had become ubiquitous. It had become common, and it had lost its spark. Now this transformation is known as commoditization, and a similar pattern can be seen in IT infrastructure.

So starting off with the innovation of the Z3 (1941), to the introduction of bespoke systems like LEO, to the first product such as the IBM 650. The next logical step was eventually going to be a shift towards much more utility services. And this is literally what John McCarthy predicted. In fact, that was Parkhill (1966) predicted it before him. But both these men made the leap, the consensual leap to say that in the future, what has happened to the electricity industry was going to happen to the computer industry. And this is the basic concept behind cloud computing. But the 18 question always was we had the concept, when would activities be suitable for this change? Is there some way that we could plot this change to determine when it was going to happen? Well it turns out there is a way we can do this. I am going to plot a graph of ubiquity from something novel like a good film with Tom Cruise to something common like a film with Tom Cruise. And against this I am going to plot certainty from something which I don’t know like whether I’m going to finish this presentation in tim e to something which I do know like how much time I’ve got. I’ve got a big clock here warning me. So now I am going to ask some data. This is TV, phones and VCRs plotted against the axis. And what this hypothesis is in this curve relationship between the ubiquity and the certainty of an activity, it describes a pathway for how a rare and poorly understood innovation becomes a much common and well-defined commodity.

Part 2

Eventually it can be provided through utility services. And you can see this transition in IT. If you take something like Customer Relationship Management system, CRM, then we’ve gone from the early lists in 1980s to data-based marketing systems of the mid-80s to the CRM products of the 90s to the much more utility like services of South Force today. CRM has transitioned from innovation to much more of a utility service. And this transition is happening to all business activities. And all of them are moving. And why are they moving? Well, if you ask any businessmen, they would tell you th e business is little more than war affair, it’s a cat fight. And as soon as one company gains some advantage with some fancy new piece of technology, some fancy new gun like an e-commerce site. Then all of its competitors will follow suit. This creates a constant demand for the new thing. But companies are also in competition for the supply of that new thing. And anytime a company introduces a new concept, in this case, feline body armor, somebody else will make a better version. This creates constant pressure for improvement. And it’s the combined pressures, which create this constant pressure towards commoditization.

So what’s happening in IT? It’s a huge group of activities which were once innovations, but more recently have been provided as products with competition based on feature differentiation, have become so widespread and so feature complete that they moved up this curve, and become suitable for service provision through volume operations. Now this doesn’t mean that everything in IT is, is moving in that direction. There’s a white spectrum of activities in IT and was still innovating last time I checked. However certain IT activities are now suitable for this transition. But concepts in suitability aren’t enough. You also need the technology to sup port this. But I could talk about virtualization but in reality virtualization has been around since Popek wrote the book in 1974. Yes, it’s improved but in the world of Steve Austin, we have the technology. So, concept, you know, technology, suitability b ut still, that’s not enough. You also need a change in business attitude towards IT. And that’s been happening ever since people like Nic. Carr have written books pointing out. But there is little strategic value in much of IT. As IT activities become more ubiquitous, they have diminishing strategic value and become much more of a cost

of doing business. So we have concept, suitability, technology and attitude. And this is what is driving this transition from an as-a-product world to an as-a-service world. It’s not something new. It’s… it’s an expected consequence of forces that has been predicted for some time.

So why does it matter? Well, this new industry, this as-a-service industry is relatively new. But it causes these highly disruptive to the product-based industry. But more importantly, if you are a user, and if you look at an activity, you consider it to be an innovation, whereas everybody else, i.e. the market, uses common and well-defined services. The only thing that you are going to create is a competitive disadvantage for yourself. You actually exist in an ecosystem that has constant pressure to keep up with the rest of the market. To explain this analogy, let’s go back to the kitten fight. There’s no point turning up to the fight with a snazzy rifle if everybody else is brought tanks. All organizations need to continuously evolve you just can’t stick with the old ways. So at a bungee, back in April, we introduced the concept called Ubuntu Enterprise Cloud. This basically introduced the system called Eucalyptus into the Distribution and we are able to allow users to build their own clouds matching the common standard of EC2 API. Because we felt that this was a time for transition and the very least we want to allow users to able to experiment with their own clouds based upon open resource technology behind the fir ewall. So I’m going to quickly recap. I started off by asking the question of what is cloud computing and the answer which I found varied from the sublime to the utterly ridiculous. Turns out the cloud computing is not a new concept. And this could be this old concept describes this transition, transformation of our industry from a product to a much more service-oriented economy. And basically its time has come. Now we can’t avoid this change any more than Mrs. Muggings could avoid the Industrial Revolution. But before I leave, I just, this is a section I just want to explore, which is, why is there so much confusion over cloud computing, because the concept itself is really simple. Well first of all, these are the reasons I hypothesize there are so much confusion. One, this transition is highly disruptive to people in our product world. So there is no follow-up of rebranding going on to take a product and call it clouding, hence the cloud equals our product. A second problem is that really this transition is all about price and quality of service of common components provided through utility services. And of course those common components will accelerate the speed which you could innovate with new things. But though it will enable you to build new things more quickly, cloud computing itself is nothing more than an evolution and an expected evolution of an industry. Of course any technology strategist will tell you that innovation is where the money is at. So there is lots of attempts to brand cloud as an innovation in itself. Lastly, as the economy has gone down the toilet, cloud has become hot. So there is being a big shift of people into the cloud computing space and this all creates noise. We have lots of pointless arguments going on such as private cloud, w hether it’s cloud computing or not. Cloud computing, whether it’s like electricity, a supermarket or whatever. A friend of mine recently said to me that there is so much gibberish on cloud you might as well just call everything “Kitten”. So as a scientist,I thought I’d experiment with this. So this last bit of the talk pure experimentation I call it “Kitten, Kitten, Kitten”. Kitten, kitten, kitten, kitten, kitten, kitten, kitten, kitten, kitten, kitten, kitten, kitten, kitten…Kitty, kitty kitten, kitten, chicken. Kitten chicken, chicken, kitten, chicken, kitten! Kitten…and it’s hype and lock-in and did I mention infrastructure. Alternatively, if you want cloud for human beings not for kittens, then come and join us at Ubuntu. Thank you very much..

综合学术英语教程练习答案

Unit Two Task1Familiarizing Yourself with Classif ication 1.Skim the f ollowing passage f or the answ ers to the questions below. 1) Man-made or anthropogenic causes, and natural causes. 2) Pollution (burning fossil fuels, mining coal and oil, etc.), the production of CO( the increase of population, the demolition of trees, etc.) 3) COis a greenhouse gas that traps heat in the Earth’s atmosphere. 4) Classif ication helps us to determine and understand the relationship of the parts of a subject which is studied by us. Classification is made on the basis of a clear definition. 5) In order to make a clear and logic classification, one needs to follow a principle of classification and go on with a system consistently. For example, the categories of classification should be mutually exclusive and no overlapping is allowed. Reading1Causes for Global Warming Task2Understanding Lectures through Classification Listening1 1.Listening to the lectur e and write down wha tev er y ou believ e is impor tant, especially the classif ica tions of key terms. Unconscious motivation, unconscious conflict, the id, the ego, the superego, etc. https://www.wendangku.net/doc/9e8191241.html,e y our notes.Decide if the sta tements below ar e true(T)or false(F).Then justify y our answ ers,in the space pr ovided,b y giving evidence fr om the talk. 1) T 2) F 3) F 4) F 5) T 6) F 7) T 8) F 3.Listen again,paying a ttention to the f ollowing classif ica tions and then complete the tables below. Idea One: The existence of an unconscious motivation Idea Two: The notion of unconscious dynamics or conflict 4.Listen again and piece y our notes together into a shor t summar y.Then r etell the lectur e to y our par tner.

学术英语 课文翻译

U8 A 1 在过去的30年里,作为一个专业的大提琴演奏家,我花了相当于整整20年时间在路上执行和学习音乐传统和文化。我的旅行使我相信在我们的全球化的世界中,文化传统来自于一个身份、社会稳定和富有同情心的互动的基本框架。 2 世界在快速改变,正如我们一定会创造不稳定的文化,让人质疑他们的地方。全球化使我们服从于别人的规则,这往往会威胁到个人的身份。这自然使我们紧张,因为这些规则要求我们改变传统习惯。所以如今全球领导者的关键问题是:如何使习惯和文化发展到融入更大的行星,同时不必牺牲鲜明特色和个人的骄傲? 3 我的音乐旅程提醒了我,全球化带来的相互作用不只是摧毁文化;他们能够创造新的文化,生机,传播存在已久的传统。这不像生态“边缘效应”,它是用来描述两个不同的生态系统相遇发生了什么,例如,森林和草原。在这个接口,那里是最小密度和生命形式的最大的多样性,每种生物都可以从这两个生态系统的核心作画。有时最有趣的事情发生在边缘。在交叉口可以显示意想不到的连接。 4 文化是一个由世界每个角落的礼物组成的织物。发现世界的一种方式是例如通过深入挖掘其传统。例如音乐方面,在任何的大提琴演奏家的曲目的核心是由巴赫大提琴组曲。每个组件的核心是一个称为萨拉班德舞曲的舞蹈动作。这种舞蹈起源于北非的柏柏尔人的音乐,它是一个缓慢的、性感的舞蹈。它后来出现在西班牙,在那里被禁止,因为它被认为是下流的。西班牙人把它带到了美洲,也去了法国,在那里成为一个优雅的舞蹈。在1720年,巴赫公司的萨拉班德在他的大提琴组曲运动。今天,我扮演巴赫,一个巴黎裔美国人的中国血统的音乐家。所以谁真正拥有的萨拉班德?每一种文化都采用了音乐,使其具有特定的内涵,但每一种文化都必须共享所有权:它属于我们所有人。 5 1998年,我从丝绸之路发现在数千年来从地中海和太平洋许多文化间观念的流动。当丝绸之路合奏团执行,我们试图把世界上大部分集中在一个阶段。它的成员是一个名家的同等团体,大师的生活传统是欧洲、阿拉伯、阿塞拜疆、亚美尼亚、波斯、俄罗斯、中亚、印度、蒙古、中国、韩国或日本。他们都慷慨地分享他们的知识,并好奇和渴望学习其他形式的表达。 6 在过去的几年里,我们发现每一个传统都是成功的发明的结果。确保传统的生存的一个最好的方法是由有机进化,目前利用我们所有可用的工具。通过录音和电影;通过驻在博物馆、大学、设计学校和城市;通过表演从教室到体育场,合奏的音乐家,包括我自己,学习有用的技能。回到家中,我们和其他人分享这些技能,确保我们的传统在文化桌上有一席之地。 7 我们发现,在本国执行传统出口的是国外激励从业者。最重要的是,我们对彼此的音乐发展出了激情,并建立了相互尊重、友谊和信任的纽带,每一次我们都在舞台上这都是可触及的。这种欢乐的互动是为了一个理想的共同的更大的目标:我们始终能够通过友好的对话解决任何分歧。我们相互开放,我们形成一个桥进入陌生的传统,驱逐往往伴随着变化和错位的恐惧。换句话说,当我们扩大我们看世界的镜头的时候,我们更好地了解自己,自己的生活和文化。我们与我们的小星球的遥远的行星有更多的共同分享,而不是我们意识到的。 8 发现这些共同的文化是很重要的,但不只是为了艺术的缘故。所以我们的许多城市,不仅是伦敦,纽约,东京,现在即使甚至是中小城市正在经历着移民潮。我们将如何吸取同化有自己独特的习惯的人群?移民不可避免地会导致抵抗和冲突,就像过去一样?有什么关于德国的土耳其人口的阿尔巴尼亚人在意大利,北非人在西班牙和法国?文化繁荣的引擎可以帮助我们找出如何集合可以和平融合,同时不牺牲个性身份。这不是政治正确性。它是关于对人而言什么是珍贵的承认,和每一个文化已经给予我们世界的礼物。

研究生学术综合英语课文翻译unit1-4

第一单元? 如何发表演说 斯蒂芬·卢卡斯? ???? 在人类创造的万物中,语言可能是最卓越的一项创造。通过语言,我们可以分享经验、阐明价值观念、交流思想、传播知识、传承文化。确实,语言对于思想本身至关重要。和流行的信仰不同的是:语言并不是简单地反映事实,而是通过对事件意义的思考来帮助人们感悟现实。? ???? 优秀的演说者尊重语言并懂得如何驾驭语言。语言是演说者展示才能的工具,对于他们来说,如同其他职业的工具一样,语言也有特殊的功用。作为一名演说者,你应该意识到话语的意义,并懂得如何准确无误地使用语言,使其表达清楚,趣味横生,恰如其分。? 如同数字对于会计的重要性一样,准确地使用语言对于演说者至关重要。在没有确切知道一个词语的意思之前,千万不要盲目使用。碰到没有把握的词语,一定要查词典追根究底。当你准备演讲之前,一定要不断地问自己:“我究竟想说些什么?我究竟想表达什么样的意思?”因此,对于一篇演讲稿的用词来说,必须准确无误。? 如果语言表达清楚无误,听众就能很快抓住你的意思。鉴于此,演说者应该使用那些对于大多数人来说非常熟悉的词语,这些词语不需要任何专业背景就能够理解;演说者应该使用那些表达具体而不是相对抽象的词语;并且千万不要乱堆砌辞藻,哗众取宠。? 准确生动地使用语言能够使你的演说贴近生活。有一种方法可以使你的语言更加生动形象,那就是通过展开联想或创造语言图示。通过使用表达具体的词语、明喻或者暗喻等手法可以展开想像。明喻是对事物不同之处的比较,不过有些是相同的:它们总是包含“像……一样”或者“如同……一样”这样的连词。暗喻是一种隐性的比喻,它能够把两个形式不同但是有一些相通之处的事物联系在一起,暗喻不包含“像……一样”或者“如同……一样”这样的连词。? 另一种让你的演说生动形象的方法是注重语言的节奏感。有四种修辞格可以让你的语言富有节奏感:排比、重复、头韵和对比。排比是将一组或一系列具有相似结构的词语、短语或者句子排列在一起;重复是在一系列短句或者长句的开头或者结尾使用相同的一句话或者一组词语;头韵是指邻近或者相邻的几个句子中的首个词语的辅音字母相同;对比是将一些意思相反的词语或者句子并列在一起,通常使用排比结构。 恰当地使用语言是指语言的运用要符合特定的场合、特定的观众和特定的主题。同时,恰当地使用语言还意味着演说者要有自己的语言风格,而不是模仿他人的口吻。如果演说者的语言在各个方面都能够做到恰如其分,那么这篇演说成功的机率就会大大提高。??????? 优秀的演说并不是空穴来风、缺乏论据的决断。演说者必须找到强有力的论据来支持其观点。实际上,熟练地使用论据经常是区别一篇优秀演说词和一篇空洞演说词的关键所在。一般来说,通常有三种论据材料:事例、统计数据和证词。? ???????在演说过程中,你可以使用一些简明扼要的例子——比如过去发生的一个很具体的事件——有时候,你可以罗列好几个简明的例子,借此增强听众的印象。扩展性的例子——描述、叙述或者奇闻轶事——通常长一些,但更具体。夸张性的例子描述想像中的情形,这种例子能够将相关的想法有效地传达给听众。这三种例子都能够帮助演说者理清思绪、加强印象或者使演说更加娓娓动听。为了使表达更加富有效果,例子应该生动活泼,丰富多彩。 只要演说者对于统计数据用之得当并且加以解释,这些数据将有助于有效地传达信息,听众也能从统计数据中获益匪浅。最重要的是:演说者应该对统计数据了如指掌,并且运用得恰如其分。由于数据很容易操纵和捏造,因此,对于演说者来说,一定要确保图表没有张冠李戴,并且要确保统计方法正确,数据来源可靠。?

(完整word版)学术综合英语课后答案解析

Unit 1 C 1.The younger generation should continue to sustain and develop our fine traditions and long-standing culture. 2.In the course of preparing one’s speech, one should be clearly aware of how one could make effective use of statistics and examples to bolster one’s point of view. 3.An impromptu speech is one of the speaking skills that college students should learn and develop through practice. 4.By using simile and metaphor, you can make your language more vivid and more attractive to your audience. 5.The proper examples you cite might help reinforce the impression on your listeners and make your viewpoints more convincing. 6.When you are speaking, you should choose common and easy words and at the same time avoid clutter in your speech.

学术英语课后翻译答案

学术英语(理工)课后英译汉练习答案 Text 1 1有些人声称黑客是那些扩宽知识界限而不造成危害的好人(或即使造成危害,但并非故意而为),而“破碎者”才是真正的坏人。 2这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。 3那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。 4另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的是攻击到尽可能多的潜在目标。 5另外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在仅有的几个你真正需要的端口,如电子邮件和网站流量。 Text 2 1看似无害的编程错误可以被利用,导致电脑被侵入并为电脑蠕虫和病毒的繁衍提供温床。 2当一个软件漏洞被发现,黑客可以将漏洞变成一个侵入点,从而造成极大的破坏,在这之前,往往需要争分夺秒地利用正确的软件补丁来防止破坏的发生。 3最简单的钓鱼骗局试图利用迅速致富的伎俩诱使诈骗目标寄钱。但网络骗子们也变得越来越狡猾,最近的陷阱是通过发送客户服务的电子邮件让用户进入假银行或商 业网站,并在那里请他们“重新输入”他们的账户信息。 4间谍软件与垃圾邮件和钓鱼网络一起,构成了三个令人生厌的互联网害虫。尽管有些程序可以通过入侵软件漏洞从而进入电脑,但这些有害而秘密的程序通常会随着 其他通常是免费的应用软件侵入到计算机系统中。 5尽管因特网已经彻底改变了全球通讯,但是对于那些意图为了罪恶目的而利用网络力量的人和那些负责阻止这些网络犯罪的人来说,他们之间的较量才刚刚开始。Text 5 1.最近在《纽约时报》上刊登的一篇文章谈到了一种新计算机软件,该软件在瞬间就能通 过数以千计的法律文件筛选并寻找到那些可诉讼的条款,这为律师们节省了在阅读文件上所花费的数百小时。 2.他们主要靠耕种来养活自己,然后再多种一些用以物品交易或卖一些盈余 3.从事农业和畜牧业者的绝对数量大约在1910年时达到顶峰(约有1,100—1,200万), 在此之后人数便急剧下降 4.这个故事总结了美国几个世纪以来的工作经历,从失业工人的层面上讲是悲剧,但从全 国劳动力的层面上讲是件好事。 5.人工智能是一种新的自动化技术吗?是一种削弱了曾经是20世纪末就业标志的脑力工 作的技术吗?是一种只会消除更好的工作机会的技术吗? Text 6 1.就前者来说,玩家按照顺序移动,(那么)每个人都了解其他玩家之前的动作。就 后者而言,玩家同时做出动作,则不了解其他玩家的动作。 2.当一个人思考别人会如何反应的时候,他必须站在别人的角度,用和他们一样的思 考方式进行思考一个人不能将自己的推理强加在别人的身上。 3.尽管各位玩家同时做出动作,不知道其他玩家当前的动作,然而,每个玩家都必须

(完整版)学术英语综合课后答案季佩英.doc

Unit 1 Language building-up Task 1/Specialized vocabulary 1.饲料经销商;饲料批发商 2.为他自己的收益而工作 3.技能与劳动力 4.制造塑料 5.私人交易 6.包装并定价 7.无形之手 1.priced https://www.wendangku.net/doc/9e8191241.html,bor 3.transactions 4.gain https://www.wendangku.net/doc/9e8191241.html,bor; manufactured 6.invisible hand 7.distributor Task 2/Signpost language 1.Today, in millions of homes across the nation, God will be thanked for many gifts, for the feast on the table and the company of loved ones, for health and good fortune in the year gone by, for peace privilege of having been born, or having become — American(Line 2, Para.1). 2. And yet, isn't there something wondrous,—something almost inexplicable in the way your Thanksgiving weekend is made possible by the skill and labor of vast numbers of total strangers? (Line 1, Para. 4) 3. ...Thanksgiving Turkey, there would be one,—or more likely, a few dozen—waiting. (Line 3, Para.6) Task 3/Formal English 1. very many 3. a large group of 5. understand 2. buying or selling 4. more huge 6. troubled Unit 2 Language building Task 1: Part 1: 1)无形之手; 2)自由企业制度 3)股东 4)经济体制 5)开发产品和服务 6)市场力量;市场调节作用

学术英语Unit1~4课文翻译

Unit 1 Text A 神经过载与千头万绪的医生 患者经常抱怨自己的医生不会聆听他们的诉说。虽然可能会有那么几个医生确实充耳不闻,但是大多数医生通情达理,还是能够感同身受的人。我就纳闷为什么即使这些医生似乎成为批评的牺牲品。我常常想这个问题的成因是不是就是医生所受的神经过载。有时我感觉像变戏法,大脑千头万绪,事无巨细,不能挂一漏万。如果病人冷不丁提个要求,即使所提要求十分中肯,也会让我那内心脆弱的平衡乱作一团,就像井然有序同时演出三台节目的大马戏场突然间崩塌了一样。有一天,我算过一次常规就诊过程中我脑子里有多少想法在翻腾,试图据此弄清楚为了完满完成一项工作,一个医生的脑海机灵转动,需要处理多少个细节。 奥索里奥夫人 56 岁,是我的病人。她有点超重。她的糖尿病和高血压一直控制良好,恰到好处。她的胆固醇偏高,但并没有服用任何药物。她锻炼不够多,最后一次 DEXA 骨密度检测显示她的骨质变得有点疏松。尽管她一直没有爽约,按时看病,并能按时做血液化验,但是她形容自己的生活还有压力。总的说来,她健康良好,在医疗实践中很可能被描述为一个普通患者,并非过于复杂。 以下是整个 20 分钟看病的过程中我脑海中闪过的念头。 她做了血液化验,这是好事。 血糖好点了。胆固醇不是很好。可能需要考虑开始服用他汀类药物。 她的肝酶正常吗? 她的体重有点增加。我需要和她谈谈每天吃五种蔬果、每天步行 30 分钟的事。 糖尿病:她早上的血糖水平和晚上的比对结果如何?她最近是否和营 养师谈过?她是否看过眼科医生?足科医生呢? 她的血压还好,但不是很好。我是不是应该再加一种降血压的药?药 片多了是否让她困惑?更好地控制血压的益处和她可能什么药都不吃 带来的风险孰重孰轻?

学术综合英语unit1_5课后习题答案解析

Task 2 A contrary to implicit assertion look up adapted Sustain unbiased In the course of metaphor clutter B bolster credible impromptu sparingly anecdote Credentials testimony hypothetical paraphrase juxtaposition Task 3 Translation B.发言提纲是有效发言的基础。通过写发言提纲,你可以确保你的思想是相关联的,你的思路从一点谈到另一点,你的讲话结构是连贯的。通常,准备讲演你可以采用两种提纲方式:详细准备提纲和简单发言提纲。 在准备发言提纲中,应该写出你的特定目的及中心思想,并以连贯的方式确定主要观点和次要观点,发言提纲应该由简要的提要组成,这些提要在你讲话时能够给予你一些帮助。发言提纲还应该包括帮助你记忆的重点词或重点短语。在写发言提纲时,可采用准备提纲的模式,尽可能使你的发言提纲简要,同时,要确保提纲清晰,易于辨认。 C. 1. The younger generation should continue to sustain and develop our fine traditions and long-standing culture. 2. In the course of preparing one’s speech, one should be clearly aware of how one could make effective use of statistics and examples to bolster one’s point of view. 3. An impromptu speech is one of the speaking skills that college students should learn and develop through practice. 4. By using simile and metaphor, you can make your language more vivid and more attractive to your audience. 5. The proper examples you cite might help reinforce the impression on your listeners and make your viewpoints more convincing. 6. When you are speaking, you should choose common and easy words and at the same time avoid clutter in you speech. 7. When you write a paper, citing the views from some experts is a good way to make your ideas more credible. 8. A good method of delivering a speech will improve its quality and will help convey the speakers’ ideas clearly and interestingly. 9. You should mot blindly use a word that you are not sure about, and if you are not sure, look up the word in a dictionary. 10. Your language should adapt to the particular occasion and audience. If your language is appropriate in all respects, your speech is successful. D. Before you deliver an academic speech, you should, first of all, get well prepared for it. Then, you should make your major points clear in your speech, and your speech should be well organized. When speaking, you should not speak too fast, and your language should be exp licit. Don’t always read the notes you prepared beforehand. From time to time, you should look at your audience. On one hand, you can show your respect to your audience, and on the other hand, you will be able to go on with your speech more smoothly.

研究生学术英语课后习题答案

Unit 1英译汉:15 Outlines are essential to effective speeches.By outlining, you make sure that related ideas are together, that your thoughts flow from one to another, and that the structure of your speech is coherent. You will probably use two kinds of outlines for your speeches--the detailed preparation outline and the brief speaking outline. 发言提纲是有效发言的基础。通过写发言提纲,你可以确保你的想法是关联的,你的思路从一点谈到另一点,你的讲话结构是连贯的,通常准备演讲你可以采用两种提纲方式:详细准备提纲和简单发言提纲。 In a preparation outline, you should state your specific purpose and central idea, and identify main points and sub--points using a consistent pattern. The speaking outline sho uld consist of brief notes to help you while you deliver the speech. It should contain ke y words or phrases to bolster your memory. In making up your speaking outline, follow the same visual framework used in your preparation outline. Keep the speaking outline a s brief as possible and be sure it is plainly legible 在准备提纲中,应该写出你的特定目的及中心思想,并以连贯的方式确定主要观点和次要观点。发言提纲应该由简要的提要组成,这些提要在你讲话时能够给你一些帮助。发言提纲还应包括帮助你记忆的重点词或重点短语。在写发言提纲时,可采用准备提纲的模式,尽可能使你的发言提纲简要,同时,要确保提纲清晰、易于辨认。 汉译英: 当你发表学术演讲时,首先要做好充分的准备;其次,你演讲的主要观点要明确,层次要清楚。演讲时,语速不要过快,语言要清晰。不要总是在读你准备好的稿子。最后,你应该经常看一下你的听众。这样,一方面你对你的听众表示尊重,另一方面,你可以更顺利地进行你的演讲。 Before you deliver an academic speech, firstly you should get well prepared for it. Then, you should make your major points clear in your speech, and your speech should be well organized. When speaking, you should not speak too fast, and your language should be explicit. Don’t always read the notes you prepared beforehand. From time to time, you should look at your audience. On one hand, you can show your respect to your audience, and on the other hand, you will be able to go on with your speech more smoothly.

学术英语综合课后答案季佩英

Unit 1 Lan guage build in g-up TaSk 1/SpeCiaIiZed VoCabUlary 1. 饲料经销商;饲料批发商 2. 为他自己的收益而工作 3. 技能与劳动力 4. 制造塑料 5. 私人交易 6. 包装并定价 7. 无形之手 1. PriCed 2. labor 3. tran SaCt ions 4. gai n 5. labor; manu factured 6. in ViSibIe hand 7. distributor TaSk 2/Sig npost Ia nguage 1. Today ,in milli OnS of homes across the n ati on, God will be tha nked for many gifts, for the feast On the table and the compa ny Of IoVed On es, for health and good fortune in the year gone by, for PeaCe PriViIege of havi ng bee n born, Or hav ing become —— AmeriCa n(Line 2, Para.1). 2. And yet, isn't there SOmeth ing won drous, —SOmethi ng almost in explicable in the Way your Than ksgivi ng Weeke nd is made POSSibIe by the skill and labor of VaSt nu mbers of total Stra ngers? (Li ne 1, Para. 4) 3. ...Tha nksgivi ng Turkey, there would be one, —or more likely, a few doze n —Wait ing. (Line 3, Para.6) TaSk 3/FormaI En glish 1. Very many 2. buying or selli ng 3. a large group of 4. more huge 5. Un dersta nd 6. troubled Unit 2 Lan guage build ing TaSk 1: Part 1: 1) 无形之手; 2) 自由企业制度 3) 股东 4) 经济体制

学术英语管理课文翻译

Unit 1 When faced with both economic problems and increasing competition not only from firms in the united states but also from international firms located in other parts of the world, employee and managers now began to ask the question:what do we do now? although this is a fair question, it is difficult to answer. Certainly, for a college student taking business courses or be beginning employee just staring a career, the question is even more difficult to answer. And yet there are still opportunities out there d=for people who are willing to work hard, continue to learn, and possess the ability to adapt to change. 当面对不仅来自美国的公司而且来自位于世界其他地方的国际公司的经济问题和日益激烈的竞争时,员工和经理现在开始要问一个问题:我们要做什么?虽然这是一个很清晰的问题,但是它是很难回答的。当然,对于一个正在谈论商务课程的大学生或者一个刚开始职业生涯的员工来说,这个问题更难回答。但目前仍然有许多机会给那些愿意努力工作,继续学习并且拥有适应变化的能力的人。 Whether you want to obtain part-time employment to pay college and living expense, begin your career as a full –time employee, or start a business, you must bring something to the table that makes you different from the next person . Employee and our capitalistic economic systems are more demanding than ever before. Ask yourself: What can I do that will make employee want to pay me a salary? What skills do I have that employers need?

《学术英语》(理科)课后答案(完整版)

Contents Unit 1 – Astronomy (2) Part I: Pre-listening (2) Part II: While Listening (2) Text A: Fun Facts about Astronomy (2) Text B: Shenzhou-10 Mission (3) Part III: After Listening (3) Part IV: Homework (3) Unit 2 – Biology (4) Part I: Pre-listening (4) Part II: While Listening (4) Text A: Secret of Life (4) Text B: Animal Intelligence (5) Part III: After Listening (5) Part IV: Homework (5) Unit 3 – Psychology (6) Part I: Pre-listening (6) Part II: While Listening (6) Text A: Discovering Psychology (6) Text B: Liespotting (7) Part III: After Listening (7) Part IV: Homework (7) Unit 4 – Geography (8) Part I: Pre-listening (8) Part II: While Listening (8) Text A: What Is Geography? (8) Text B: Mount Kailash – Axis of the World (9) Part III: After Listening (9) Part IV: Homework (9) Unit 5 – Economy (sic) (10) Part I: Pre-listening (10) Part II: While Listening (10) Text A: The Blue Economy (10) Text B: A Monkey Economy as Irrational as Ours (11) Part III: After Listening (11) Part IV: Homework (11) Unit 6 – Physics (12) Part I: Pre-listening (12) Part II: While Listening (12) Text A: What Is Physics? (12) Text B: Science of Figure Skating (13) Part III: After Listening (13) Part IV: Homework (13) Unit 7 – Computer Science (14) Part I: Pre-listening (14) Part II: While Listening (14) Text A: Computer Software (14) Text B: Computer Science Advice for Students (15) Part III: After Listening (15) Part IV: Homework (15) Unit 8 – Chemistry (16) Part I: Pre-listening (16) Part II: While Listening (16) Text A: The History of Discovering Elements (16) Text B: The Periodic Table of Elements (17) Part III: After Listening (17) Part IV: Homework (17)

unit1蔡基刚 学术英语 答案

Unit 1 Choosing a Topic Critical Reading U n d e rs ta n d in g th e te x t T A S K 1 Key words Laypeople, radiation, understanding Objective To investigate lay people,knowledge o f radiation phenomena and risk Methods used Questionnaires and interviews T A S K 2 1Respondents were aware o f the harmful health effects o f radiation, while they had a little understanding o f the concept o f radiation. 2 There are a big proportion o f respondents who support to continue the production o f nuclear power. 3The mass media plays a very important role in the misunderstanding o f radiation. 4 A school program should be designed to analyzing everyday conceptions about radiation. T A S K 3 Paras.1-2e f b a Paras.3-6k h c d Para. 7b c h a Paras.8-11f a i k Paras.12-18d h g f Paras.19-20g c a b Paras.21-28i j a h c h g d a b e j f i g d f e g h g c j b d e a b c e i d h e f k b c g d e f T A S K 4 1-525413 6-10971068 11-151315111412 16-202019181716 21-252523212422 26-28272628 T A S K 5 1The answer reveals that the respondents fa il to understand that a new nucleus w ill be produced when a radioactive atom is broken. 2 According to the view o f constructivists, a person’s ideas w ill survive school education and form an important basis fo r new learning. 3The solution is to consider lay ideas and combine factual knowledge w ith practical or political factors.

学术英语理工类课后题 详解答案

Reading: Text 1 1.Match the words with their definitions. 1g 2a 3e 4b 5c 6d 7j 8f 9h 10i 2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary. 1 symbolic 2distributed 3site 4complex 5identify 6fairly 7straightforward 8capability 9target 10attempt 11process 12parameter 13interpretation 14technical 15range 16exploit 17networking 18involve 19 instance 20specification 21accompany 22predictable 23profile 3. Read the sentences in the box. Pay attention to the parts in bold. Now complete the paragraph by translating the Chinese in brackets. You may refer to the expressions and the sentence patterns listed above. ranging from(从……到) arise from some misunderstandings(来自于对……误解) leaves a lot of problems unsolved(留下很多问题没有得到解决) opens a path for(打开了通道) requires a different frame of mind(需要有新的思想) 4.Translate the following sentences from Text 1 into Chinese. 1) 有些人声称黑客是那些超越知识疆界而不造成危害的好人(或即使造成危害,但并非故意而为),而“骇客”才是真正的坏人。 2) 这可以指获取计算机系统的存储内容,获得一个系统的处理能力,或捕获系统之间正在交流的信息。 3) 那些系统开发者或操作者所忽视的不为人知的漏洞很可能是由于糟糕的设计造成的,也可能是为了让系统具备一些必要的功能而导致计划外的结果。 4) 另一种是预先设定好程序对特定易受攻击对象进行攻击,然而,这种攻击是以鸟枪式的方式发出的,没有任何具体目标,目的是攻击到尽可能多的潜在目标。 5) 另外,考虑安装一个硬件防火墙并将从互联网中流入和流出的数据限定在几个真正需要的端口,如电子邮件和网站流量。 Reading: Text 2 1.Match the words with their definitions. 1d 2f 3h 4i 5a 6e 7b 8j 9g 10c https://www.wendangku.net/doc/9e8191241.html,plete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary. 1 compromised 2notoriety 3 interchangeably 4malfunctioned 5squeeze 6 ingenious 7 emergence 8 humble 9 Cunning 10 vulnerability 11criminal 12patches 13 sinister 14daunting 15replicate 16malicious 17 spirals 18secure 19blur 20 stem 21 disrepute 22 sophisticated 23harness 24 recipient 25convert

相关文档
相关文档 最新文档