Lecture 1---Computer Process Control《先进制造技术(英)》、《机电专业外语》课件
- 格式:ppt
- 大小:5.67 MB
- 文档页数:66
托福听力tpo46lecture1、2、3、4原文+题目+答案+译文Lecture1 (2)原文 (2)题目 (4)答案 (6)译文 (6)Lecture2 (8)原文 (8)题目 (10)答案 (12)译文 (12)Lecture3 (14)原文 (14)题目 (16)答案 (18)译文 (18)Lecture4 (19)原文 (19)题目 (22)答案 (24)译文 (24)Lecture1原文NARRATOR:Listen to part of a lecture in a biology class.FEMALE PROFESSOR:I'd like to continue our discussion of animal behavior and start off today's class by focusing on a concept we haven't yet touched upon—swarm intelligence.Swarm intelligence is a collective behavior that emerges from a group of animals,like a colony of termites,a school of fish,or a flock of birds.Let's first consider the principles behind swarm intelligence,and we'll use the ant as our model.Now,an ant on its own is not that smart.When you have a group of ants,however, there you have efficiency in action.You see,there's no leader running an ant colony. Each individual,each individual ant operates by instinctively following a simple set of rules when foraging for food.Rule number1:Deposit a chemical marker…called a pheromone.And rule2:Follow the strongest pheromone path.The strongest pheromone path is advantageous to ants seeking food.So,for example,when ants leave the nest,they deposit a pheromone trail along the route they take.If they find food,they return to the nest on the same path and the pheromone trail gets stronger—it's doubled in strength.Because an ant that took a shorter path returns first,its pheromone trail is stronger,and other ants will follow it, according to rule2.And as more ants travel that path,the pheromone trail gets even stronger.So,what's happening here?Each ant follows two very basic rules,and each ant acts on information it finds in its immediate local environment.And it's important to note: Even though none of the individual ants is aware of the bigger plan,they collectively choose the shortest path between the nest and a food source because it's the most reinforced path.By the way,a-a few of you have asked me about the relevance of what we're studying to everyday life.And swarm intelligence offers several good examples of how concepts in biology can be applied to other fields.Well,businesses have been able to use this approach of following simple rules when designing complex systems,for instance,in telephone networks.When a call is placed from one city to another,it has to connect through a number of nodes along the way.At each point,a decision has to be made:Which direction does the call go from here?Well,a computer program was developed to answer this question based on rules that are similar to the ones that ants use to find food.Remember,individual ants deposit pheromones,and they follow the path that is most reinforced.Now,in the phone network,a computer monitors the connection speed of each path, and identifies the paths that are currently the fastest—the least crowded parts of the network.And this information,converted into a numeric code,is deposited at the network nodes.This reinforces the paths that are least crowded at the moment. The rule the telephone network follows is to always select the path that is most reinforced.So,similar to the ant's behavior,at each intermediate node,the call follows the path that is most reinforced.This leads to an outcome which is beneficial to the network as a whole,and calls get through faster.But getting back to animal behavior,another example of swarm intelligence is the way flocks of birds are able to fly together so cohesively.How do they coordinate their movements and know where they're supposed to be?Well,it basically boils down to three rules that each bird seems to follow.Rule1:Stay close to nearby birds.Rule2:Avoid collision with nearby birds.And rule3:Move in the average speed and direction of nearby birds.Oh,and by the way,if you're wondering how this approach can be of practical use for humans:The movie industry had been trying to create computer-generated flocks of birds in movie scenes.The question was how to do it easily on a large scale?A researcher used these threerules in a computer graphics program,and it worked!There have also been attempts to create computer-generated crowds of people using this bird flocking model of swarm intelligence.However,I'm not surprised that more research is needed.The three rules I mentioned might be great for bird simulations,but they don't take into account the complexity and unpredictability of human behavior.So,if you want to create crowds of people in a realistic way,that computer model might be too limited.题目1.What is the lecture mainly about?A.Various methods that ants use to locate foodB.A collective behavior common to humans and animalsC.A type of animal behavior and its application by humansD.Strategies that flocks of birds use to stay in formation2.According to the professor,what behavior plays an important role in the way ants obtain food?A.Ants usually take a different path when they return to their nest.B.Ants leave chemical trails when they are outside the nest.C.Small groups of ants search in different locations.D.Ants leave pieces of food along the path as markers.3.What are two principles of swarm intelligence based on the ant example?[Click on2answers.]A.Individuals are aware of the group goal.B.Individuals act on information in their local environment.C.Individuals follow a leader's guidance.D.Individuals instinctively follow a set of rules.4.According to the professor,what path is followed by both telephone calls on a network and ants seeking food?A.The path with the least amount of activityB.The most crowded pathC.The path that is most reinforcedD.The path that has intermediate stopping points5.Why does the professor mention movies?A.To identify movie scenes with computer-simulated flocks of birdsB.To identify a good source of information about swarm intelligenceC.To emphasize how difficult it still is to simulate bird flightD.To explain that some special effects in movies are based on swarm intelligence6.What is the professor's attitude about attempts to create computer-generated crowds of people?A.She believes that the rules of birds'flocking behavior do not apply to group behavior in humans.B.She thinks that crowd scenes could be improved by using the behavior of ant colonies as a model.C.She is surprised by how realistic the computer-generated crowds are.D.She is impressed that computer graphics can create such a wide range of emotions.答案C B BD C D A译文下面听一段生物学讲座的片段。
学术英语课后答案u n i t1学术英语理工教师手册Unit 1 Choosing a TopicI Teaching ObjectivesIn this unit , you will learn how to:1.choose a particular topic for your research2.formulate a research question3.write a working title for your research essay4.enhance your language skills related with reading and listening materials presented in this unitII. Teaching Procedures1.Deciding on a topicTask 1Answers may vary.Task 21 No, because they all seem like a subject rather than a topic, a subject which cannot be addressed even by a whole book, let alone by a1500-wordessay.2Each of them can be broken down into various and more specific aspects. For example, cancer can be classified into breast cancer, lung cancer, liver cancer and so on. Breast cancer can have such specific topics for research as causes for breast cancer, effects of breast cancer and prevention or diagnosis of breast cancer.3 Actually the topics of each field are endless. Take breast cancer for example, we can have the topics like:Why Women Suffer from Breast Cancer More Than Men?A New Way to Find Breast TumorsSome Risks of Getting Breast Cancer in Daily LifeBreast Cancer and Its Direct Biological ImpactBreast Cancer—the Symptoms & DiagnosisBreastfeeding and Breast CancerTask 31 Text 1 illustrates how hackers or unauthorized users use one way or another to get inside a computer, while Text2 describes the various electronic threats a computer may face.2 Both focus on the vulnerability of a computer.3 Text 1 analyzes the ways of computer hackers, while Text 2 describes security problems of a computer.4 Text 1: The way hackers “get inside” a computerText 2: Electronic threats a computer facesYes, I think they are interesting, important, manageable and adequate.Task 41Lecture1:Ten Commandments of Computer EthicsLecture 2:How to Deal with Computer HackersLecture 3:How I Begin to Develop Computer Applications2Answersmay vary.Task 5Answers may vary.2 Formulating a research questionTask 1Text 3Research question 1: How many types of cloud services are there and what are they? Research question 2: What is green computing?Research question 3: What are advantages of the cloud computing?Text 4Research question 1: What is the Web 3.0?Research question 2: What are advantages and disadvantages of the cloud computing? Research question 3: What security benefits can the cloud computing provide?Task 22 Topic2: Threats of Artificial IntelligenceResearch questions:1) What are the threats of artificial intelligence?2) How can human beings control those threats?3) What are the difficulties to control those threats?3 Topic3: The Potentials of NanotechnologyResearch questions:1) What are its potentials in medicine?2) What are its potentials in space exploration?3) What are its potentials in communications?4 Topic4: Global Warming and Its EffectsResearch questions:1) How does it affect the pattern of climates?2) How does it affect economic activities?3) How does it affect human behavior?Task 3Answers may vary.3 Writing a working titleTask 1Answers may vary.Task 21 Lecture 4 is about the security problems of cloud computing, while Lecture 5 is about the definition and nature of cloud computing, hence it is more elementary than Lecture 4.2 The four all focus on cloud computing. Although Lecture 4 and Text 4 address the same topic, the former is less optimistic while the latter has more confidence in the security of cloud computing. Text3 illustrates the various advantages of cloud computing.3 Lecture 4: Cloud Computing SecurityLecture 5: What Is Cloud Computing?Task 3Answers may vary.4 Enhancing your academic languageReading: Text 11.Match the words with their definitions.1g 2a 3e 4b 5c 6d 7j 8f 9h 10i2. Complete the following expressions or sentences by using the target words listed below with the help of the Chinese in brackets. Change the form if necessary.1 symbolic 2distributed 3site 4complex 5identify6fairly 7straightforward 8capability 9target 10attempt11process 12parameter 13interpretation 14technical15range 16exploit 17networking 18involve19 instance 20specification 21accompany 22predictable 23profile3. Read the sentences in the box. Pay attention to the parts in bold.Now complete the paragraph by translating the Chinese in brackets. You may refer to the expressions and the sentence patterns listed above.ranging from(从……到)arise from some misunderstandings(来自于对……误解)leaves a lot of problems unsolved(留下很多问题没有得到解决)opens a path for(打开了通道)requires a different frame of mind(需要有新的思想)4.Translate the following sentences from Text 1 into Chinese.1) 有些人声称黑客是那些超越知识疆界而不造成危害的好人(或即使造成危害,但并非故意而为),而“骇客”才是真正的坏人。
英语电脑操作步骤作文高中英文:Computer operation is an essential skill in today's digital age. Whether it's for work, school, or personal use, knowing how to navigate and use a computer is crucial. In this essay, I will outline the steps for basic computer operation.Step 1: Power on the computer。
First, locate the power button on the computer or monitor. Press the button to turn on the computer. Wait for the computer to boot up, which may take a few minutes.Step 2: Log in to the computer。
Once the computer has booted up, you will be promptedto log in. Enter your username and password to access your desktop. If you are using a public computer, such as in alibrary or at school, you may need to enter a guest login or use your student ID.Step 3: Navigate the desktop。
After logging in, you will see your desktop, which is the main screen of the computer. Here, you can access your files, programs, and settings. The desktop may have icons for various applications, such as web browsers, word processors, and media players.Step 4: Open a program。