学术英语课后答案unit1

  • 格式:doc
  • 大小:142.00 KB
  • 文档页数:21

下载文档原格式

  / 43
  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

学术英语理工

教师手册

Unit 1 Choosing a Topic

I Teaching Objectives

In this unit , you will learn how to:

a particular topic for your research

a research question

a working title for your research essay

your language skills related with reading and listening materials presented in this unit

II. Teaching Procedures

on a topic

Task 1

Answers may vary.

Task 2

1 No, because they all seem like a subject rather than a topic, a subject which cannot be addressed even by a whole book, let alone by a1500-wordessay.

2Each of them can be broken down into various and more specific aspects. For example, cancer can be classified into breast cancer, lung cancer, liver cancer and so on. Breast cancer can have such specific topics for research as causes for breast cancer, effects of breast cancer and prevention or diagnosis of breast cancer.

3 Actually the topics of each field are endless. Take breast cancer for example, we can have the topics like:

Why Women Suffer from Breast Cancer More Than Men?

A New Way to Find Breast Tumors

Some Risks of Getting Breast Cancer in Daily Life

Breast Cancer and Its Direct Biological Impact

Breast Cancer—the Symptoms & Diagnosis

Breastfeeding and Breast Cancer

Task 3

1 Text 1 illustrates how hackers or unauthorized users use one way or another to get inside a computer, while Text

2 describes the various electronic threats a computer may face.

2 Both focus on the vulnerability of a computer.

3 Text 1 analyzes the ways of computer hackers, while Text 2 describes security problems of a computer.

4 Text 1: The way hackers “get inside” a computer

Text 2: Electronic threats a computer faces

Yes, I think they are interesting, important, manageable and adequate.

Task 4

1Lecture1:Ten Commandments of Computer Ethics

Lecture 2:How to Deal with Computer Hackers

Lecture 3:How I Begin to Develop Computer Applications

2Answersmay vary.

Task 5

Answers may vary.

2 Formulating a research question

Task 1

Text 3

Research question 1: How many types of cloud services are there and what are they? Research question 2: What is green computing?

Research question 3: What are advantages of the cloud computing?

Text 4

Research question 1: What is the Web ?

Research question 2: What are advantages and disadvantages of the cloud computing? Research question 3: What security benefits can the cloud computing provide?

Task 2

2 Topic2: Threats of Artificial Intelligence

Research questions:

1) What are the threats of artificial intelligence?

2) How can human beings control those threats?

3) What are the difficulties to control those threats?

3 Topic3: The Potentials of Nanotechnology

Research questions:

1) What are its potentials in medicine?

2) What are its potentials in space exploration?

3) What are its potentials in communications?