CN -M1L01 -Introduction and Course Outline

合集下载

福建省厦门市湖里实验中学2023-2024学年八年级上学期英语期中试卷

福建省厦门市湖里实验中学2023-2024学年八年级上学期英语期中试卷

厦门市湖里实验中学2023-2024学年上学期期中八年级英语试卷(满分:150分;考试时间:120分钟)考生须知:1.本试卷分选择题和非选择题两大部分。

试卷共8页。

2.考生需看清楚各小题的序号,将选择题的答案按要求用2B铅笔填图在机读卡上:将非选择题的答案用0.5毫米的黑色签字笔书写在答题卡上。

1.听力(共三节,20小题;每小题1.5分,满分30分)第一节听句子听下面五个句子,从每小题所给的三幅图中选出与句子内容相符的选项。

第二节听对话听下面七段对话,从每小题所给的A、B、C三个选项中选出正确答案。

听第1段对话,回答第6小题。

6.WhydoesJasonlike theWhite'sStore?A.Because it has the best service.B.Because it has the best price9C. Because it has all kinds of clothes.听第2段对话,回答第7小题。

7.What does Jeff think of soap operas?cational. B.Relaxing. C.Boring.听第3段对话,回答第8小题。

8. How often does Lucy go to the dentist?A.Once a year.B.Twice a month.C.Once a week.听第4段对话,回答第9小题。

9.What does Cindy mean?.She didn't like the beach.B.She had a good time last weekend.C.She didn't go to the beach last week.听第5段对话,回答第10、11小题。

10. Who is Jimmy?A.Jason's friend.B. Jason's brother.C.Jason's cousin.11.What is Jason good at?A.Drawing.B.Singing.C.Swimming.听第6段对话,回答第12、13小题。

人教版八年级上册英语单词表(含音标)

人教版八年级上册英语单词表(含音标)

以下是为⼤家整理的关于⼈教版⼋年级上册英语单词表(含⾳标)的⽂章,供⼤家学习参考! 1 how often 多久;多常2 exercise n. 练习,作业,运动; v. 练习,运动,运⽤3 skateboard n. 溜冰板(⼀种装有滑轮的椭圆形滑板)4 hardly ad. ⼏乎不5 ever ad. 曾经,永远,究竟6 shop n. 商店; v. 购物7 once ad. ⼀次,曾经; conj. ⼀旦; n. ⼀次8 twice ad. 两倍,两次; n. 两次9 time n. 时间,期限,次数,乘; v. 计时,定时,乘; n.[计算机] DOS命令 : 显⽰并允许改变系统时间10 surf n. 海浪; vi. 冲浪11 Internet n. 因特12 program n. 节⽬,程序,计划; v. 规划,拟...计划,制作节⽬13 high school (美)中学,(英)公⽴中等学校14 most n. 最多,; a. ⼤多数的,⼏乎全部的,最多的; ad. 最,最多,极其15 no n. 不,拒绝,否决票; a. 没有,不是,绝⾮; ad. 不16 result n. 结果,成绩,答案; v. 产⽣,起于,致使17 active a. 积极的,主动的18 for conj. 因为; prep. 给,为19 as for prep. ⾄于,关于20 about a. 准备; ad. ⼤约; prep. 关于21 junk n. 垃圾22 junk food 没有营养的⾷品23 milk n. 奶,乳状物; v. 挤乳,产乳24 coffee n. 咖啡25 chip n. 薄⽚,芯⽚; v. 削,切,削成碎⽚26 cola n. 可乐27 chocolate n. 巧克⼒28 drink n. 饮料; v. 喝,喝酒29 health n. 健康,卫⽣,保健30 how many 多少31 interviewer U.png" n. 会见者,⾯谈者,访问记者32 habit n. 习惯33 try n. 尝试,试验; v. 试,尝试34 of course 当然35 look after 照顾;照看36 lifestyle n. ⽣活⽅式37 grade n. 年级; v. (学校的)年级,成绩,分数,等级,级别; vt. 分级,记成绩38 better a. 较好的,更好的; ad. 更好地39 same a. 同样的; ad. 同样地; pron. 同样的⼈或事40 as ad. 同样地,像; prep. 当做; conj. 当...之时,像...⼀样,因为41 different a. 不同的42 difference n. 不同,差异43 unhealthy a. 不健康的44 yuck 讨厌45 maybe ad. ⼤概,也许46 although conj. 尽管,虽然47 for conj. 因为; prep. 给,为48 grandpa n. (⼝语)爷爷,外公49 a lot of 许多;很多50 keep n. ⽣计,维持; v. 保持,保存,维持51 must n. 必须,未发酵葡萄汁,绝对必要的事物; conj. 必须52 less a. 更少的,更⼩的; ad. 更少地,更⼩地53 matter n. 事件,物质,原因; v. 有关系54 have aux. 已经,曾经; n. 吃,从事,得到,雇⽤,享有,有,允许; v. 有55 cold adj.冷的; n. 感冒; v. 冷(的)56 have a cold 患感冒57 stomachache n. 胃痛; vi. 肚⼦痛58 sore a. 疼痛的,痛⼼的; n. 痛处,疮⼝59 back a. 后⾯的; v. 后退; ad. 向后地; n.后背,背脊60 arm n. ⼿臂,袖⼦; v. 武装,装备61 ear n. ⽿朵62 eye n. 眼睛; v. 看,注视63 food n. ⾷物64 hand n. ⼿,掌握,协助; v. ⽀持,交给65 head n. 头,头脑,领袖; v. 为⾸,朝向,前进66 leg n. 腿67 mouth n. 嘴,开⼝; v. 装腔作势说话, ⾼声地说话68 neck n. 脖⼦,颈69 nose n. ⿐⼦,突出部分,嗅觉; v. 嗅到70 stomach n. 胃; v. 忍受,容忍; vt. 承受,忍受71 tooth n. ⽛齿72 throat n. 喉咙73 toothache n. ⽛痛74 fever n. 发烧,发热,热病75 rest a. 其余的; v.&n. 休息; vi. 搁(在),休息; vt. 使休息76 honey a. 蜂蜜似的; n. 蜂蜜,宝贝77 dentist n. ⽛科医⽣78 should conj. 应该,将要79 headache n. 头痛80 shouldn't (=should not) 不应...81 ago ad. 以前82 so ad. 如此,如是,如...那样; conj. 所以,因此,所以83 illness n. 病,疾病84 advice n. 忠告,劝告85 thirsty a. ⼝渴的86 stress n. 紧张,压⼒; v. 强调,着重; vt. 强调; n.负载87 be stressed out 紧张的,有压⼒的88 crispy a. 脆的89 cereal a. ⾕类(的),⾕物(的); n. ⾕类⾷物90 cookie n. 饼⼲91 early ad.&a. 早92 problem a. 成问题的; n. 问题93 way n. ⽅法,道路,⽅向94 traditional a. 传统的95 believe v. 认为,相信96 balance n. 天平,平衡,差额; v. 平衡97 yin 中国的殷代, 阴98 Yang n. 杨, 阳99 weak a. 不充分的,淡薄的,弱的,虚弱的,⽆⼒的100 herb n. 药草,⾹草 101 angry 5ANgrI a. ⽣⽓的102 tofu 5tEJfu: n. ⾖腐103 medicine 5medsn n. 药,医学104 western 5westEn n. 西⽅⼈,西部⽚,西部⼩说; a. 西⽅的,西洋的,西部的105 everybody 5evrIbCdI pron. 每⼈,⼈⼈106 get get v. 得到,变成,获得,使得; [计算机] 得到107 few fju: a. 很少的,不多的,少数的; int. 少数的; a. 少数的108 a few E5fju: (表⽰肯定)有些,⼏个109 stay steI n. 停留,停⽌,依靠; v. 停留,留宿,制⽌110 important Im5pR:tnt a. 重要的111 balanced 5bAlEnst a. 均衡的,平衡的112 diet 5daIEt n. ⽇常饮⾷; v. 照规定饮⾷113 moment 5mEJmEnt n. ⽚刻,瞬间;⼒矩114 at the moment 此刻115 late leIt a. 迟的,晚的,已故的; ad. 很晚,很迟,晚116 until En5tIl prep.&conj. 直到...为⽌117 dear dIE(r) a. 亲爱的; int. 啊,哎呀; n. 亲爱的⼈118 host family 寄宿家庭119 yesterday 5jestEdI n.&ad. 昨天120 hear hIE(r) v. 听到,听说,听取121 babysit 5beIbIsIt v. 照看婴⼉; vi. 临时代⼈照看婴⼉122 camp kAmp n. 露营,帐棚; v. 露营,扎营123 plan plAn n. 计划,策略,⽅法; v. 计划,设计,意欲124 Tibet tI5bet n. 西藏125 hike haIk n. 徒步旅⾏,远⾜,涨价; v. 健⾏,徒步旅⾏,使...⾼涨126 Hong Kong 5hCN5kCN n. ⾹港127 yeah jB:; jeE ad. 是128 how long 多长129 away E5weI ad. 远离,离开130 get back 回来131 send send v. 送给,传,寄132 postcard 5pEJstkB:d n. 明信⽚133 San Francisco n. 旧⾦⼭(美国加利福尼亚西部港市)134 Hawaii hB:5waIi: n. 夏威夷(美国州名)135 bike baIk n. 脚踏车136 ride raId n. 乘坐,乘车,搭便车; v. 骑,乘坐,克服137 sightseeing 5saItsi:IN n. 观光,游览138 fish fIF n. 鱼; v. 捕鱼,钓鱼139 rent rent n. 租⾦; v. 租; vi. 出租; vt. 出租,租⽤140 famous 5feImEs a. 的141 take a vacation 去度假142 Greece gri:s n. 希腊143 Spain speIn n. 西班⽛144 Europe 5ju:rEp n. 欧洲145 something 5sQmWIN pron.某事(物),某东西146 lake leIk n. 湖147 the Great Lakes 美国的五⼤湖148 leave li:v v.离开,告假,遗留,听任149 countryside 5kQntrIsaId n. 乡下,农村150 nature 5neItFE(r) n.⾃然,⾃然界,⾃然状态; 本性,天性,性质; 质; 性格; 性; 本质151 forget fE5get v. 忘记,忽略152 a lot 很;⾮常153 finish 5fInIF n. 完成,结束; v. 完成,结束,毁掉; [计算机] 终结154 Thailand 5taIlAnd n. 泰国155 tourist 5tJErIst a. 旅游的; n. 旅游者,观光者156 Italy 5ItElI n. 意⼤利157 take teIk v. (took,taken) 拿,取; v. 修(课程),花费,记录,认为,搭乘158 subway 5sQbweI n. 地铁159 hey heI int. 嗨160 walk wR:k n. 散步,步⾏; v. ⾛路161 train treIn n. ⽕车,⾏列;长裙拖地部分; v. 训练,教养162 forty 5fR:tI num.&a. 四⼗; pron. 四⼗(个,只...)163 fifty 5fIftI num. 五⼗164 sixty 5sIkstI 六⼗165 seventy 5sevntI 七⼗166 eighty 5eItI num.&a. ⼋⼗; pron. ⼋⼗(个,只...)167 ninety 5naIntI num.&n. 九⼗168 hundred 5hQndrEd n. 百,百个东西; a. 百,百个169 minute 5mInIt a. 微⼩的; n. 分钟170 take teIk v. (took,taken) 拿,取; v. 修(课程),花费,记录,认为,搭乘219 match mAtF n. ⽐赛,⽕柴,对⼿; v. 使...相配,与...竞争,相配220 whole hEJl a. 整个的; n. 全部221 over 5EJvE(r) a. 结束的; ad. 结束; prep. 在...的上⽅; v. 越过222 come over 过来;顺便来访223 free fri: a. ⾃由的,⼤⽅的,免费的; v. 释放,解放; ad. ⾃由地,免费224 till tIl conj. 直到(...为⽌); n. (账台中)放钱的抽屉; prep. 直到; pron. 直到...为⽌,直到; vt. 耕种225 outgoing 5autgEuIN n. 外出,开⽀,流出; a. 喜欢外出的; [计算机] 输出226 twin twIn a. 孪⽣的; n. 双胞胎之⼀227 calm kB:m n. 平稳,风平浪静; a. 平静的,冷静的; v. 平静下来,镇静228 wild waIld a. 放荡的,未开发的,野的,野⽣的,原始的; n. 荒野229 serious 5sIErIEs a.严肃的,庄重的,严重的,危急的,认真的230 smart smB:t a. 聪明的,漂亮的; v. 刺痛; a. 时髦的,巧妙的231 athletic AW5letIk a. 运动的232 note nEJt n. 笔记,注解,备忘录; v. 记录,注解,注意; n. 票据,便条,纸币233 mean mi:n n.平均值,平均数; a. 低劣的,卑贱的,平均的; v. 意谓,想要,意欲234 as Az ad. 同样地,像; prep. 当做; conj. 当...之时,像...⼀样,因为235 way weI n. ⽅法,道路,⽅向236 both bEJW a. 两者的; ad. 两者都; int. 两者237 hers h\:z pron. 她的238 physics 5fIzIks n. 物理学239 however haJ5evE(r) ad. 然⽽; conj. 然⽽,可是,不过240 more than 多于...241 common 5kCmEn a. 共同的,平常的,普通的; n. 平民,普通,公地,公园242 in common 共同的,共有的243 be good at 在…⽅⾯(学得,做得)好;善于244 schoolwork 5sku:lw\:k n. (包括课堂作业和家庭作业)作业245 make meIk v. 做,制造,使; n. 牌⼦,型号246 laugh lB:f n. 笑,笑声; v. 笑247 for fC: conj. 因为; prep. 给,为248 opposite 5CpEzIt a. 相对的,相反的,对⾯的; prep. 对⾯249 view vju: n. 视野,风景,见解; v. 看,考虑250 interest 5IntrEst n. 兴趣,嗜好,利息; v. 使...感兴趣251 most of ⼤多数252 though TEJ ad. 可是,然⽽,不过; conj. 尽管,虽然; prep. 但.253 necessary 5nesEsErI a. 必需的,必要的; n. [pl.]必需品254 beat bi:t n. 打,敲打声,拍⼦; v. 打,打败255 care 5keE n. ⼩⼼,照料,忧虑; v. 关⼼,照顾,喜爱,介意; abbr.=Cooperative for American Remittances to Europe 汇款到欧洲合作社256 friendship 5frendFIp n. 友谊,友好257 primary 5praImErI n. 最主要者; a. 主要的,初期的,根本的258 primary school ⼩学259 information 9InfE5meIFn n. 信息260 wheel wi:l n. 轮⼦,周期; v. 旋转,装以车轮,转动261 woman 5wJmEn n. 妇⼥,⼥⼈262 use ju:s n. 利⽤,使⽤,⽤途; v. 使⽤; vt. 使⽤,⽤263 cheese tFi:z n. 乳酪,⼲酪264 sick sIk a. 恶⼼的,有病的,腻烦的; n. 病⼈; vt. 呕吐265 before bI5fR:(r) a. 以前,在...以前; ad. 以前; prep.&conj. 在...以前266 body 5bCdI n. ⾝体,主体,正⽂; ad. 亲⾝地267 begin bI5gIn 开始268 begin with 从…开始;先做某事269 between bI5twi:n ad. 在中间; prep. 在...之间270 swimming pool .游泳池271 excited Ik5saItId a. 兴奋的272 Harbin 5hB:rbIn n. 哈尔滨273 fast fAst;fa:st a. 快速的,耐久的,紧的; ad. 很快地,紧紧地,彻底地; n. vi. 禁⾷, 绝⾷, 斋戒274 passenger 5pAsIndVE(r) n. 乘客,旅客275 safety 5seIftI a. 保险的; n. 安全276 shake FeIk n. 摇动,震动; v. 摇动,动摇277 milk shake 奶昔278 blender 5blendE n. 混合的⼈,混合器,搅拌器279 turn on 5t\:n Cn 打开,拧开; v. 反对,攻击280 cut kQt n. 切⼝,割伤,降低; v. 切割,减少,刺痛; vbl. 切割,减少,刺痛; [计算机] 剪掉281 up Qp a. 向上的; prep.&ad. 向上282 cut up 切碎283 peel pi:l n. ⽪; v. 削...⽪,剥落,脱⽪284 pour pR:(r) n. 流出,倾泻,骤⾬; v. 倒,倾泻,蜂涌⽽来285 into 5IntE prep. 到...⾥286 yogurt 5jRgEt n. (=yoghurt) 酸奶酪, 酵母乳287 ingredient In5gri:dIEnt n. 成分,因素288 cup kQp n. 杯⼦; v. (使)成杯形; vt. 使成杯形289 watermelon 5wC:tE9melEn n. 西⽠290 teaspoon 5ti:spu:n n. 茶匙291 amount E5maJnt n. 数量,总额; v. 总计,等于292 instruction In5strQkFn n. 说明,须知,指令,教学293 finally 5fAnElI ad. 最后,最终294 mix mIks n. 混合物,混乱; v. 混合,弄混,与; [计算机] 混合295 mix up 混合在⼀起296 popcorn 5pCpkC:n n. 爆⽶花297 popper 5pCpE 服药成瘾者;弄出砰然298 boil bRIl v. 沸腾,煮沸; vi. 沸腾; vt. 煮沸299 salt sR:lt n. 盐,刺激; a. 含盐的,⾟辣的; v. 加盐于,⽤盐腌; abbr. =Strategic Arms Limitation Talks 限制战略武器会谈300 add Ad v. 增加 301 add... to.. 把...加到...302 sandwich 5sAnwIdV n. 三明治; v. 插⼊,夹⼊303 bread bred n. ⾯包304 butter 5bQtE n. 奶油305 relish 5relIF n. 滋味,爱好,调味品; v. 品味,喜欢,有...味道306 lettuce 5letIs n. 莴苣307 Turkey 5t\:kI n. ⼟⽿其,⽕鸡308 slice slaIs n. 薄的切⽚,⼀部份; v. 切成薄⽚,分配309 super 5su:pE(r) a. 超级的,极好的310 top tCp n. 顶端,极点,地位;陀螺; a. 的,顶上的; v. ⾼耸,加以顶端,超越311 recipe 5resIpI n. ⾷谱,处⽅,秘诀312 check tFek n. 检查,⽀票,阻⽌物; v. 检查,阻⽌,核对313 green onion (带径叶的)嫩洋葱,葱314 duck dQk n. 鸭⼦; v. 没⼊⽔中,闪避315 sauce sR:s n. 调味汁,酱汁316 pancake 5pAnkeIk n. 薄煎饼317 roll rEJl n. 卷,滚动,名单; v. 滚,使...转动,摇摆318 gift gIft n. 礼物,天赋; vt. 给予319 shark FB:k n. 鲨鱼320 aquarium E5kweErIEm n. ⽔族馆,养鱼池,玻璃缸321 seal si:l n. 印章,封条,海豹; v. 盖印,封闭,猎海豹322 hang hAN n. 悬挂,吊死; v. (hanged,hanged) 悬挂,绞死,逗留323 hang out (俚语)经常出没,闲荡324 souvenir 9su:vE5nIE(r) n. 纪念品325 win wIn v. 赢得,胜利,成功326 autograph 5C:tEgrB:f n. 亲笔,⾃署,亲笔签名; v. ⾃署于,亲笔签名于,亲笔写327 prize praIz n. 奖,奖品,战利品; v. 珍视,捕获328 visitor 5vIzItE(r) n. 参观者,访问者329 outdoor 5aJtdR:(r) a. 户外的,屋外的330 octopus 5CktEpEs n. 章鱼331 end end n. 结束,终点,⽬标; v. 结束,终结,终⽌332 monitor 5mCnItE(r) n. 监督器,级长,监听员; v. 监视,监听,监督; [计算机] 显⽰器,监视333 Chicago FI5kB:gEJ n. 芝加哥334 California kAlI5fC:njE n. 加利福尼亚,加州335 sleep late 睡过头,起得晚336 drive draIv n. 驾车,快车道,推进⼒,驱使; v. 开车,驱使,驾进⼒; [计算机] 驱动器; n.路,街337 off Cf a. 远的,休假的,空闲的; ad. ⾛开,出发,隔断; prep. 离开,脱落,在...之外338 rain reIn n. ⾬; v. 下⾬339 DVD 5di:5vi:5di: n. 光碟,影碟340 yard jB:d n. 庭院,码341 yard sale 庭院旧货出售342 luckily 5lQkIlI ad. 幸运地,幸亏,侥幸343 umbrella Qm5brelE n. 伞344 raincoat 5reInkEJt n. ⾬⾐345 wet wet a. 湿的; n. 潮⽓,⾬; v. (使)弄湿; vt. 弄湿346 competition 9kCmpI5tIFn n. ⽐赛,竞争347 player 5pleIE(r) n. ⽐赛者,运动员348 future 5fju:tFE a. 将来的; n. 将来,未来; n. 期货349 again E5geIn ad. ⼜,再350 bear beE(r) n. 熊; v. 忍受,负荷; v. 结果实,⽣⼦⼥351 international 9IntE5nAFnEl a. 国际的352 record 5rekC:d; rI5kR:d n.记录,唱⽚,履历; v. 记录,将(声⾳等)录下353 hiccup 5hIkQp n. 打嗝354 sneeze sni:z n. 喷嚏; v. 打喷嚏355 too... to... 太...以⾄于不能...356 golf gClf n. ⾼尔夫球; v. 打⾼尔夫球; vi. (打)⾼尔夫球357 Brazilian brE5zIlIEn n. 巴西⼈; a. 巴西的358 national 5nAFnEl a. 国家的,民族的; n. 国民359 achievement E5tFi:vmEnt n. 成就,成绩,完成,达到360 perform pE5fR:m v. 执⾏,表演,做361 gymnast 5dVImnAst n. 体操运动员362 gold gEJld a. 含⾦的,⾦(制)的; n. ⾦⼦363 medal 5medl n. 奖章,勋章,纪念章364 championship 5tFAmpjEnFIp n. 冠军赛,冠军365 golfer 5ga:lfE(r),5gCf- n.打⾼尔夫球的⼈366 become bI5kQm v. 变成,变得; vbl. 变得367 call kR:l n. 呼叫,访问,打电话; v. 呼叫,访问,打电话; n.[计算机] DOS命368 talented 5tAlEntId a. 有才能的(多才的)369 loving 5lQvIN a. 亲爱的,锺情的,忠诚的370 creative kri:5eItIv a. 创造性的371 outstanding 9aJt5stAndIN a. 突出的,显著的372 kind kaInd a. 仁慈的,友好的; n. 种类373 unusual Qn5ju:Vl a. 不平常的,异常的374 grandson 5grAndsQn n. 孙⼦,外孙375 violinist vaIE5lInIst n. ⼩提琴⼿376 skate skeIt n. 冰鞋; v. 滑冰; vi. 溜冰,滑冰377 ice skating 滑冰378 champion 5tFAmpIEn n. 冠军,拥护者; v. 保卫,拥护379 tour tJE(r) n. 旅游,观光旅⾏,任期; v. 旅⾏,周游380 the U.S. 美国381 well-known 5welnEJn a. 出名的,众所周知的382 pianist 5pIEnIst n. 钢琴家383 could kEd;kJd can 的过去式; conj. 能够384 hum hQm n. 嗡嗡声,哼声,杂声; v. 发低哼声,闭⼝哼歌,嗡嗡叫; int. 哼,嗯385 song sCN n. 歌曲386 piece pi:s n. 块,⽚,篇; v. 修补,结合387 accordion E5kR:dIEn n. ⼿风琴388 take part in 参加389 Poland 5pEJlEnd n. 波兰390 person 5p\:sn n. ⼈391 alive E5laIv a. 活着的392 athlete 5AWli:t n. 运动员393 because of 由于394 Asia 5eIFE n. 亚洲395 table tennis n.乒乓球396 university 9ju:nI5v\:sEtI n. ⼤学397 major 5meIdVE(r) n. 主修,成年⼈,陆军少校; a. 主要的,较多的,⼤部份的; v. 主修398 major in 主修,专修399 management 5mAnIdVmEnt n. 管理,经营,处理400 number 5nQmbE(r) n. 号码,数字; v. 编号,加号码,总计; vi. 总计; vt. 编号 401 single 5sINgl a. 单⾝的,单纯的,单⼀的。

High School Chinese Syllabus 2012

High School Chinese Syllabus 2012

High School Chinese Syllabus 2012-2013Course OverviewHS Chinese is very important ,and is more difficult than MS Chinese .students are required to learnpinyin in Chinese1 ,And students should learn simple characters ,characters is very important inChinese,and it is also very hard for Students, so they should learn characters step by step .In Chinese2 ,students should pay attention to speaking,reading ,the texts in the books is longer ,so students should practise speaking,reading more in and out of the class. In Chinese3 students are required to learn some grammar. also studentsshould learn how to write ,and speak Chinese as much as possible . In Chinese4,students are required to speak Chinese fluently in the class,and can use grammar correctly.The course is conducted entirely in Chinese. Students are required to speak Chinese as much aspossible in all situations.HS Chinese aims at learning how to speak daily Chinese in china ,after finishing HS Chinesestudents can talk to Chinese people ,This course uses the textbook HANYU JIAOCHENG w ritten by YANG,JI-ZHOU.This series of text books guides the students from beginner to low –intermediate level.theCompiling principle is to foster middle school studetnts’ interest in learning a second language.To cope with the general needs of conducting daily communication,the sentence patterns andgrammar are presented to students in an order that emphasizes functional usage and the language materials are arranged within situational topics.This series of text books is composed of 6 books ,no student’s books ,exercises are after the texts.and other phonetic and listening materials and multimedia materials supplemented to thebooks.The major goals for students of HS Chinese are: to develop excellent Chinese speaking,listening, reading, and writing skills, to understand the cultural and social traditions of theChinese people, and to attain a minimum of A on the HS exam.Academic integrity is not only an expectation but also a requirement for all work. Plagiarism(using others' work without proper citation) is cheating.Course PlanHANYU JIAOCHENG Book1 is for Chinese 1HANYU JIAOCHENG Book2 is for Chinese 2HANYU JIAOCHENG Book3 is for Chinese 3HANYU JIAOCHENG Book4 is for Chinese 4Every book has 15 lessons ,7-8 lessons is for one semester ,3-4 lessons is for one quarter.maybe 10 lessons are for Chinese 1 or Chinese 2,because the books is a easierat the beginning .Student Activities:Below are two activities and the language learning standards that each activity satisfies.Targeted Standards1.1 Interpersonal Communication1.2 Interpretive Communication1.3 Presentational Communication2.1 Practices of Culture2.2 Products of Culture3.1 Making Connections3.2 Broaden the Sources of Information4.1 Language Comparison4.2 Cultural ComparisonMini-novel ProjectDescriptionStudents will have paired-discussions with me to choose a book for their supplementary readingand email their summary reports once every two weeks so that I can check on progress. Summary reports not only focus on writing skills, but also practice the use of the Han Yu Pinyin word processor, which is a key skill needed for the MS Chinese Exam. Students should finish this novel before the LAS mid-exam in January, then they will create their own mini-novel (about 3,000 words) as a project. Finally, I will review these novels and recommend them to local publishers. Students will have the opportunity to be published in local magazines, newspapers, or on the internet.Reflection1.1 Students will discuss with me their choices for their supplementary books.1.2 Students will email me their summary reviews after reading books.1.3 When students finish their novels, they will present their novels in class using PowerPoint.4.1 Students will investigate the different styles in narrating a story in Chinese and English.Video ProjectDescription“MuLan” is an epic poem and it is staged in three different ways: Peking Opera, Kun Opera,and cinematically. After reading and discussing the ancient poems of “MuLan” and watching these different performances students will create a movie script based on it in and written in modern Chinese. We will then create a video of it with students performing. This project will combine an appreciation of Chinese opera with the development of advanced language skills: reading, writing, speaking and interpreting, and video editing and dramatic skills.Reflection1.2 Students research information about “MuLan.” It is collected f rom books, the internet, audio-visual materials, and conversations with Chinese-native speakers.2.1 Students demonstrate an understanding of the traditional practices related to Chinese socialstructure and politics.2.2 Students will write a screenplay and create an original video based on the ancient poem“MuLan.”3.1 Students will acquire knowledge of some significant historical events in Chinese history andsocial development through reading “MuLan.”3.2 Students will broaden their abilities to do collect and qualify information.4.2 Students will discuss gender equality in the Chinese culture and their own.Field Trips:●“Bai­Lian” Shopping MallThis shopping Mall is near to our school.During this outing students will be required toconduct conversations with shop assistants using the target language of shopping. Wewill go to various businesses according to student interests to buy clothing, food andother items.● “L onghua” TempleLonghua Temple is the most famous landmark in xuhui District, from which the district obtained its name. It is the oldest shrine in the city, dating back even further than the city itself. Students will view religious prayers and different Buddhistinteractions representing themes such as fortune, birth, death, and health. It’s a tripemphasizing religion, culture, and history.“Gu­Yi” GardenWith a history of 480 years, Guyi Garden is the largest classical garden in Shanghai.It has a profound history and culture. Students can choose to explore aspects likearchitecture, painting, calligraphy, and masonry on which they’ll be able to demonstrate their understanding in various forms, such as sketches, photography, journal entries, video journals, and blogs. It’s a good chance to accomplish two things: broaden students’knowledge by connecting it to other school disciplines and vary and personalize their formative assessments.Community ServiceStudents are required do community service in a local home for the aged once each month. It provides them an opportunity to develop their awareness of social needs while assisting others.Lab and Electronics ComponentListening and speaking exercises are blended into the instruction. The course is conducted entirely in Chinese. Occasionally, the class will meet in the technology lab to perform Chinese listening exercises on the Internet. I also utilize the DVD player, Smart-board, and portable CD/cassette players in my teaching.Student EvaluationGrading Policies:No Delinquent Assignments: Each late assignment will receive one level grade deduction.No Missing Tests: Each missed test (including dictation and listening comprehension in class) must be made up at the student’s request within a reasonable period, otherwise azero grade will be assigned to the missing test.Bonus Points: At the instructor’s discretion, extra points may be awarded toextraordinary performance and extra effort in academic work.Grading:Students are evaluated cumulatively according to their individual overallperformance and achievement throughout the entire year. For assignments and projects, I’ll share the rubric or checklist with the students ahead of time. Tests will use multiple choice, fill-in-the-blank for grammar usage, sentence-creation, and translation in both Chinese and English.Students should have homeworkevery class ,and quiz evey two weeks.◆Homework 20%◆Test: 40%◆Speaking 10%◆Quiz 20%◆Writing 10%Resources:Textbook:Yang, Ji-Zhou (2006). Hanyu-Jiaocheng ,Peking University Press: Beijing, China.Resource Books:Zhu, zhi-ping (2004) HANYU JIAOCHENG,People’s Education Press.Liu, De-lian (2004). Oral Chinese ,Peking University Press: Beijing, China.Bao,Si-Huan, (2010).The vault of teaching teaching games ,Peking University Press: Beijing, China.Zhu,Xi-Xiang (2009).Writing guide for foreign students. Shanghai Normal University Press: Shanghai, China.Films:“Cofucius” “MuLan”Websites:。

三十九级台阶中英对照

三十九级台阶中英对照

The Thirty-Nine Steps三十九级台阶 简 介 理查德·哈内走回他伦敦的公寓,感到百无聊赖。

他想,在英格兰好像什么令人激动的事情也不曾发生过。

也许他该回非洲去。

然而,那天晚上来了一位叫斯卡德尔的客人,给他讲了一个离奇的故事。

一周以后,哈内卧在苏格兰荒原的石楠丛中,饥肠辘辘,筋疲力尽。

一架小飞机在他头顶的蓝天上低空盘旋。

哈内一动不动地躺着,希望谢天谢地飞机不要发现他,同时琢磨着口袋里斯卡德尔的黑色小笔记本。

斯卡德尔在笔记本里记着“黑石”,这个神秘的黑石是谁呢?那个“三十九级台阶”又怎么那么重要?六月十五日伦敦会出什么事? 而斯卡德尔已经被害,哈内的敌人在苏格兰的山山岭岭日夜追捕他,他必须自己搞清这是为什么。

如果他的敌人抓住他,就会把他杀掉…… 约翰·巴肯(1875—1940):苏格兰作家,政治家,曾任加拿大总督。

他有许多著作最有名的是理查德·哈内系列惊险小说,其中包括《三十九级台阶》,该书写于一九一五年,后改编成著名导演希区科克执导的电影。

1 The man who died 1 The man who died I returned to my flat at about three o'clock on that Mayafternoon very unhappy with life. I has been back in Britain for three monthsand I was already bored. The weather was bad,thepeople were dull,and the amusements ofLondon seemed as exciting as a glass of cold water.'Richard Hannay,'Itold myself,'you have made a mistake,andyou had better do something about it.' It made me angry when I thought of the years I had spent inAfrica. I had spent those years working very hard and making money. Not a lotof money,but enough for me. I had leftScotland when I was six years old,and Ihad never been home since. For years I had dreamt of coming home to Britainand spending the rest of my life there,butI was disappointed with the place after the first week. And so here I was,thirty-sevenyears old,healthy,withenough money to have a good time,andbored to death. That evening I went out to dinner and sat reading thenewspapers afterwards. They were full of the troubles in south-east Europe,andthere was a long report about Karolides,theGreek Prime Minister. He seemed to be an honest man,butsome people in Europe hated him. However,manypeople in Britain liked him,and onenewspaper said that he was the only man who could prevent a war starting. Iremember wondering if第 1 页 共 69 页I could get a job in south-east Europe;itmight be a lot less boring than life in London. As I walked home that night,Idecided to give Britain one more day. If nothing interesting happened,Iwould take the next boat back to Africa. My flat was in a big new building in Langham Place. Therewas a doorman at the entrance to the building,buteach flat was separate,with its ownfront door. I was just putting the key into my door when a man appeared nextto me. He was thin,with a short brownbeard and small,very bright eyes. Irecognized him as the man who lived in a flat on the top floor of thebuilding. We had spoken once or twice on the stairs. 'Can I speak to you?'heasked. 'May I come in for a minute?'Hisvoice was shaking a little. I opened the door and we went in. 'Is the door locked?'heasked,and quickly locked it himself. 'I'm very sorry,'hesaid to me. 'It's very rude of me. But I'm in a dangerous corner and youlooked like the kind of man who would understand. If I explain,willyou help me?' 'I'll listen to you,'Isaid. 'That's all I promise. 'I was getting worried by this strange man'sbehaviour. There was a table with drinks on it next to him,andhe took a large whisky for himself. He drank it quickly,andthen put the glass down so violently that it broke. 'I'm sorry,'he said.'I'm a little nervous tonight. You see,atthis moment I'm dead. ' I sat down in an armchair and lit my pipe. 'How does it feel?'Iasked. I was now almost sure that the man was mad. He smiled. 'I'm not mad-yet. Listen,I'vebeen watching you,and I guess thatyou're not easily frightened. I'm going to tell you my story. I need help verybadly,and I want to know if you're theright man to ask. ' 'Tell me your story,'Isaid,'and I'll tell you if I can helpyou. ' It was an extraordinary story. I didn't understand all ofit,and I had to ask a lot of questions,buthere it is: His name was Franklin P. Scudder and he was an American,buthe had been in south-east Europe for several years. By accident,hehad discovered a group of people who were working secretly to push Europetowards a war. These people wereclever,anddangerous. Some of them wanted to change the world through war;otherssimply wanted to make a lot of money,andthere is always money to be made第 2 页 共 69 页from a war. Their plan was to get Russia andGermany at war with each other. 'I want to stop them,'Scuddertold me,'and if I can stay alive foranother month,I think I can. ' 'I thought you were already dead,'Isaid. 'I'll tell you about that in a minute,'heanswered. 'But first,do you know whoConstantine Karolides is?' 'The Greek Prime Minister. I've just been reading about himin today's newspapers. ' 'Right. He's the only man who can stop the war. He'sintelligent,he's honest,andhe knows what's going on-and so his enemies plan to kill him. I havediscovered how. That was very dangerous for me,soI had to disappear. They can't kill Karolides in Greece because he has toomany guards. But on the 15th of June he's coming to London for a big meeting,andhis enemies plan to kill him here. ' 'You can warn him,'Isaid. 'He'll stay at home. ' 'That's what his enemies want. If he doesn't come,they'llwin,because he's the only man whounderstands the whole problem and who can stop the war happening. ' 'Why don't you go to the British police?'Isaid. 'No good. They could bring in five hundred policemen,butthey wouldn't stop the murder. The murderer will be caught,andhe'll talk and put the blame on the governments in Vienna and Berlin. It willall be lies,of course,buteverybody will be ready to believe it. But none of this will happen ifFranklin P. Scudder is here in London on the 15th of June. ' I was beginning to like this strange little man. I gave himanother whisky and asked him why he thought that he was now in danger himself. He took a large mouthful of whisky. 'I came to London by astrange route-through Paris,Hamburg,Norway,andScotland. I changed my name in everycountry,andwhen I got to London,I thought I wassafe. But yesterday I realized that they're still following me. There's a manwatching this building and last night somebody put a card under my door. On itwas the name of the man I fear most in the world. 'So I decided I had to die. Then they would stop lookingfor me. I got a dead body-it's easy to get one in London,ifyou know how-and I had the body brought to my flat in a large suitcase. Thebody was the right age,but the face wasdifferent from mine. I dressed it in my clothes and shot it in the face withmy own gun. My servant will find me when he arrives in the morning and he'llcall the police. I've left a lot of empty whisky bottles in my room. Thepolice will think I drank too much and then killed myself. 'He paused. 'Iwatched from the window until I saw you come home,andthen came down the stairs to meet第 3 页 共 69 页you. ' It was the strangest of stories. However,inmy experience,the most extraordinarystories are often the true ones. And if the man just wanted to get into myflat and murder me,why didn't he tell asimpler story? 'Right,'I said. 'I'lltrust you for tonight. I'll lock you in this room and keep the key. Just oneword,Mr Scudder. I believe you're honest,butif you're not,I should warn you that Iknow how to use a gun. ' 'Certainly,'heanswered,jumping up. 'I'm afraid I don'tknow yourname,sir,butI would like to thank you. And could I use your bathroom?' When I next saw him,halfan hour later,I didn't recognize him atfirst. Only the bright eyes were the same. His beard was gone,andhis hair was completely different. He walked like a soldier,andhe was wearing glasses. And he no longer spoke like an American. 'Mr Scudder—'I cried. 'Not Mr Scudder,'heanswered. 'Captain Theophilus Digby of the British Army. Please remember that.' I made him a bed in my study,andthen went to bed myself,happier than Ihad been for the past month. Interesting things did happen sometimes,evenin London. * * * The next morning when my servant Paddock arrived,Iintroduced him to Captain Digby. I explained that the Captain was an importantman in the army,but he had been workingtoo hard and needed rest and quiet. Then I went out,leavingthem both in the flat. When I returned at about lunchtime,thedoorman told me that the gentleman in flat 15 had killed himself. I went up tothe top floor,had a few words with thepolice,and was able to report to Scudderthat his plan had been successful. The police believed that the dead man wasScudder,and that he had killed himself.Scudder was very pleased. For the first two days in my flat,hewas very calm,and spent all his timereading and smoking,and writing in alittle black notebook. But after that he became more restless and nervous. Itwas not his own danger that he worried about,butthe success of his plan to prevent the murder of Karolides. One night he wasvery serious. 'Listen,Hannay,'hesaid. 'I think I must tell you some more about this business. I would hate toget killed without leaving someone else to carry on with my plan. ' I didn't listen very carefully. I was interested inScudder's adventures,but I wasn't veryinterested in politics. I remember that he said Karolides was only in dangerin London. He also mentioned a woman called Julia Czechenyi. He talked about aBlack Stone第 4 页 共 69 页and a man who lisped when he spoke. And he described another man,perhapsthe most dangerous of them all-an old man with a young voice who could hoodhis eyes like a hawk. The next evening I had to go out. I was meeting a man I hadknown in Africa for dinner. When I returned to the flat,Iwas surprised to see that the light in the study was out. I wondered ifScudder had gone to bed early. I turned on the light,butthere was nobody there. Then I saw something in the corner that made my bloodturn cold. Scudder was lying on his back. There was a long knifethrough his heart,pinninghim to thefloor. 1 死人 五月的那个下午三点来钟我回到寓所,过得很不开心。

船运常用英文缩写

船运常用英文缩写

ABT about 大约ABV above 以上ACCT account 由...承担,租船人,租家ADV advise 通知ADD address 地址AFMT after fix main terms 主要条款定下之后AGT agent代理ARBI arbitration 仲裁BBB before breaking bulk 开舱卸货前B/DAYS banking days 银行工作日BENDS.BE both ends 指装卸两头(港)BGD bagged 袋装的BLK bulk 散装(货)BS/L bills of lading 提单BSS 1/1 bases 以一个装港一个卸港为基准BWAD brackish water arrival draft 船到卸港的吃水CHOPT charterers’ option 租家选择CHRTS charterers 租船人,租家CO charterers option 租家选择COMM commission 佣金COUNTER 还盘C/P charter party 租约C.Q.D customary quick dispatch 按港口习惯速度尽快装卸CVS consecutive voyage,连续航程DFD demurrage/despatch 滞期/速遣DHD demurrage/free despatchDOP droppint outward pilotDRRK derrick 吊杆DWAT deadweight all toldDWCC deadweight cargo capacityEIU even if used 即使使用ETA expected time of arrival 预抵时间ETD expected time of departure 预离时间FHINC Fridays and holidays includedFIO free in & free out 船东不负责装/卸费FIOST free in,out, stowed(理舱) trimmed(平舱)FILO free in , liner out 船东不负责装,但负责卸FLT full liner term 全班轮条款,即船东负责装/卸费FLWS follows 下列FRT freight 运费FWAD fresh water arrival draftGENCON,GCN 金康合同GROSS TERMS liner termsIAC including Address Commission(租家佣金)IACS international association of classification societies 国际船级社 LIFO liner in, free out 船东负责装,但不负责卸LYCN laycan laytime and cancel timeL/D loading/discharging 装/卸MIN 至少FLUSIT TWNMOLOO more or less at owners option 增减由船东选择NAABSA more or less at charterers option 增减由租家选择NOR notice of readiness船舶备安通知NOM nominated 指定的OAP over age premium 船的超龄保险OFFER 报盘OO owners option 船东选择OPTN option 选择OWRS owners 船东PART CGO part cargo 拼装P & I CLUB protection and indemnity associations 船东互保协会 PPT prompt 即装,马上要装PMT per Metric Ton 每公吨PWWD per weather working day 每晴天工作日RCVRS receivers 收货人SBA safe berth anchor 安全锚地区性 泊位SBP safe berth port 安全 泊位 安全港SDBC,SD single deck 一层舱 统舱(船)S/F stowage Factor 积载因素SHEX Sunday holiday Except 星期天,节日不包括在内SHIPPER 发货人SPOT indicates that a ship or a cargo is immediately available. STEM refers to the readiness of cargo and is often a prerequisite to the fixing of a vessel, eg. Subject stem subject to the cargoavailability on the required dates of shipment being confirmed. SURVEYORS 验船师SWL safe working load.SWAD salt water arrival draftSUB subject 以…为条件TD,TWN tweendeck 二层舱(船)TIP taking inward pilotTNNG tonnage 指船TTL totalUU unless used 除非使用WIBON whether in berth or not 不管靠泊与否WIFPON whether in free pratique or not 不管船舶检验与否WIJION whether in joint inspection or not 不管船舶联检与否WIPON whether in port or not 不管抵港与否W/M weight or neasureWOG without guarantee 不保证WP weather pernittingWTS working time saved 按节约的工作时间计算WWDSHINC weather working days Sundays and holidays included晴天工作日,包括星期天及节假日W.W.W.W WIPON,WIBON,WIFPON,WIJIONYRS years 年BLT Built建造年份CALL SIGN: 呼号CBM: 立方米CLASS: 船级DRAFT 吃水DWT: Dead Weight 载重吨FLG: 船旗G/B: 散/包装舱容GRT/NRT: 总登记吨/净登记吨HH: hatch舱口 hold舱APS arrival pilot station 到达引航站 ATDNSHINE actual time of dispatch BOD bunker on deliveryBOR bunker on redeliveryBallast Water 压舱水Beaufort Scale 蒲福风级3级CONS consumption 消耗 耗油Douglas state of sea 3 道式海浪3级 DTLS detailsDLOSP 到达引航站DEL delivery 交船deratting certificate 恶意鼠证书 ENT/VICT 给船长用于招待的费用FW fresh waterGMT 国际标准时H.cover hatch coverH+M value 船的价值ILOHC 还船时给船员的扫舱费NIL nothing 无IWL institute warranty limitsIFO industrial fuel oil 燃料油KTS knots节Laden 载满MDO 船用柴油marine diesel oil oilMGO marine gas oilNYPE 纽约土产期租船合同P/F prefer宁可,优先RDEL redelivery还船ROB remaining on boardSPD speed 航速—————————————以下可能有重复——————————————AA Always afloat 经常漂浮AA Always accessible 经常进入AA Average adjusters 海损理算师AAR Against all risks 承保一切险AB Able bodied seamen 一级水手AB Average bond 海损分担证书A/B AKtiebolaget (瑞典)股份公司A/B Abean 正 横ABS American Bureau of Shipping 美国船级协会ABT About 大约ABB Abbreviation 缩略语A/C,ACCT Account 帐目AC Alter couse 改变航向AC Account current 活期存款,来往帐户AC Alernating current 交流电ACC Accepted; acceptance 接受,同意ACC.L Accommodation ladder 舷梯A.&C.P. Anchor & chains proved 锚及锚链试验合格ACV Air cushion vehicle 气垫船ACDGLY Accordingly 遵照AD Anno Domini 公元后AD After draft 后吃水ADD Address 地址ADDCOM Address commission 租船佣金ADF Automatic direction finder 自动测向仪AD VAL Ad valorm 从价(运费)ADV Advise;advice; advance 告知;忠告;预支A/E Auxiliary engine 辅机AF Advanced freight 预付运费AFAC As fast as can 尽可能快地AF Agency fee 代理费AFP Agence France press 法新社AFS As follows 如下AFT After 在。

新教材 牛津译林版高中英语必修第二册全册课后练习 含解析

新教材 牛津译林版高中英语必修第二册全册课后练习 含解析

牛津译林版必修第二册全册课后练习UNIT 1 Lights,camera,action! ................................................................................................... - 1 - 课时练习1 ...................................................................................................................... - 1 - 课时练习2 ...................................................................................................................... - 7 - 课时练习3 .................................................................................................................... - 12 - UNIT 2 Be sporty,be healthy ............................................................................................... - 18 - 课时练习1 .................................................................................................................... - 18 - 课时练习2 .................................................................................................................... - 23 - 课时练习3 .................................................................................................................... - 28 - UNIT 3 Festivals and customs ............................................................................................ - 33 - 课时练习1 .................................................................................................................... - 33 - 课时练习2 .................................................................................................................... - 39 - 课时练习3 .................................................................................................................... - 44 - UNIT 4 Exploring literature..................................................................................................... - 49 - 课时练习1 .................................................................................................................... - 49 - 课时练习2 .................................................................................................................... - 54 - 课时练习3 .................................................................................................................... - 59 - 模块综合测验 ....................................................................................................................... - 65 -UNIT 1 Lights,camera,action!课时练习1Ⅰ.单词拼写根据首字母提示或所给汉语意思写出所缺单词。

英语人教版九年级全册Unit3 Section B Activity2a~2d

英语人教版九年级全册Unit3 Section B Activity2a~2d

英语学科教学设计课题Unit3 Section B Activity2a~2d设计人付玉平教学过程一、课前导入1.学习目标:1)掌握词汇和短语2)整体阅读短文完成2c,2d3) 通过阅读学会如何“礼貌”和“得体”的使用语言2.学习重难点:1)词汇:politely, request, direction, correct, polite, direct, speaker, whom, impolite, address, underground, parking lot, course2)通过阅读学会如何“礼貌”和“得体”的使用语言二、自主学习Find out the phrases from Page21.1.参观外国_________________________2.有礼貌的求助_________________________3.类似问方向的请求________________________4. 听起来不那么礼貌_________________5. 一个很直接的问题_____________________6.正确地提问_______________________7. 在不同场合______________________8. 改变他们说话的方式______________________9.他们使用的表达方式________________________ 10. 取决于,依靠_________________ 11. 向某人直接提问__________________________12.听起来不礼貌___________________ 13.电子邮箱地址____________________14.引入、导入_________________________ 15.有礼貌地说话__________________ 16. 使用恰当的语言________________________ 17.与某人更好的交流__________________________ 18. 打扰一下__________________ 19.地下停车______________________ 20.去乡村学校的路__________________________三、导学释疑1. politely (adv.) “礼貌地;客气地”反义词: ______________polite (adj.) “有礼貌的;客气的;有教养的”反义词:______________我们应该有礼貌地和老人说话。

新概念英语第三册课本习题答案(21~40课)

新概念英语第三册课本习题答案(21~40课)

新概念英语第三册课本习题答案(21~40课)Lesson 21新概念3课后习题答案:Lesson 21 1b 2d 3c 4a 5a 6b 7b 8a 9c 10a 11a 12d 新概念3课后习题解析:Multiple choice questions 多项选择1。

D grasp vt。

抓住,掌握,领会n。

抓住, 掌握,领会establish vt。

建立,设立,确定,证实2。

.。

D in favor of adv.赞同, 有利于3。

C apart from 除什么之外还有supplement vt。

补足, 补充7.。

.B owe people money = owe money to people8。

.Bvivid adj.生动的,鲜明的,鲜艳的, 活泼的, 逼真的personality n.个性, 人格,人物,名人character n。

特性, 性质, 特征, 人物image n。

图象,肖像, 偶像imaginative adj。

想象的, 虚构的adj.富于想象的,有想象力的9.。

Cexceptionally(adj。

例外的,异常的)àunusually(adv。

显著地, 不同寻常的) —- An exceptionally beautiful girl。

marvelously(adj.不可思议的, 非凡的)= wonderfully(adv.奇妙的, 奇异的)singly adv.单独的unequally adv。

不相等地,不公平地, 独一无二的10。

.。

A rise vi。

n.11。

.。

Ajealous adj。

妒忌的,猜疑的, 警惕的, 嫉妒的disinterested adj。

无私心的, 廉洁的, 公正的adj.[美口]不关心的,不感兴趣的revolt v。

反抗, 起义,反叛revolted adj。

起来反抗的,起义的,厌恶的12。

Dbeat = defeatconquer vt。

  1. 1、下载文档前请自行甄别文档内容的完整性,平台不提供额外的编辑、内容补充、找答案等附加服务。
  2. 2、"仅部分预览"的文档,不可在线预览部分如存在完整性等问题,可反馈申请退款(可完整预览的文档不适用该条件!)。
  3. 3、如文档侵犯您的权益,请联系客服反馈,我们会尽快为您处理(人工客服工作时间:9:00-18:30)。

Module1 IntroductionLesson1 Introduction and Course OutlineSpecific Instructional ObjectiveOn Completion of this lesson, the students will be able to:•Define Computer Networks•State the evolution of Computer Networks•Categorize different types of Computer Networks•Specify some of the application of Computer Networks1.1.1 IntroductionThe concept of Network is not new. In simple terms it means an interconnected set of some objects. For decades we are familiar with the Radio, Television, railway, Highway, Bank and other types of networks. In recent years, the network that is making significant impact in our day-to-day life is the Computer network. By computer network we mean an interconnected set of autonomous computers. The term autonomous implies that the computers can function independent of others. However, these computers can exchange information with each other through the communication network system. Computer networks have emerged as a result of the convergence of two technologies of this century- Computer and Communication as shown in Fig. 1.1.1. The consequence of this revolutionary merger is the emergence of a integrated system that transmit all types of data and information. There is no fundamental difference between data communications and data processing and there are no fundamental differences among data, voice and video communications. After a brief historical background in Section 1.1.2, Section 1.1.2 introduces different network categories. A brief overview of the applications of computer networks is presented in Section 1.1.3. Finally an outline of the entire course is given in Section 1.1.4.Figure 1.1.1Evolution of computer networks1.1.2 Historical BackgroundThe history of electronic computers is not very old. It came into existence in the early 1950s and during the first two decades of its existence it remained as a centralized system housed in a single large room. In those days the computers were large in size and were operated by trained personnel. To the users it was a remote and mysterious object having no direct communication with the users. Jobs were submitted in the form of punched cards or paper tape and outputs were collected in the form of computer printouts. The submitted jobs were executed by the computer one after the other, which is referred to as batch mode of data processing. In this scenario, there was long delay between the submission of jobs and receipt of the results.In the 1960s, computer systems were still centralize, but users provided with direct access through interactive terminals connected by point-to-point low-speed data links with the computer. In this situation, a large number of users, some of them located in remote locations could simultaneously access the centralized computer in time-division multiplexed mode. The users could now get immediate interactive feedback from the computer and correct errors immediately. Following the introduction of on-line terminals and time-sharing operating systems, remote terminals were used to use the central computer.With the advancement of VLSI technology, and particularly, after the invention of microprocessors in the early 1970s, the computers became smaller in size and less expensive, but with significant increase in processing power. New breed of low-cost computers known as mini and personal computers were introduced. Instead of having a single central computer, an organization could now afford to own a number of computers located in different departments and sections.Side-by-side, riding on the same VLSI technology the communication technology also advanced leading to the worldwide deployment of telephone network, developed primarily for voice communication. An organization having computers located geographically dispersed locations wanted to have data communications for diverse applications. Communication was required among the machines of the same kind for collaboration, for the use of common software or data or for sharing of some costly resources. This led to the development of computer networks by successful integration and cross-fertilization of communications and geographically dispersed computing facilities. One significant development was the APPANET (Advanced Research Projects Agency Network). Starting with four-node experimental network in 1969, it has subsequently grown into a network several thousand computers spanning half of the globe, from Hawaii to Sweden. Most of the present-day concepts such as packet switching evolved from the ARPANET project. The low bandwidth (3KHz on a voice grade line) telephone network was the only generally available communication system available for this type of network.The bandwidth was clearly a problem, and in the late 1970s and early 80s another new communication technique known as Local Area Networks (LANs) evolved, which helped computers to communicate at high speed over a small geographical area. In the later years use of optical fiber and satellite communication allowed high-speed data communications over long distances.1.1.3 Network TechnologiesThere is no generally accepted taxonomy into which all computer networks fit, but two dimensions stand out as important: Transmission Technology and Scale. The classifications based on these two basic approaches are considered in this section.1.1.3.1 Classification Based on Transmission TechnologyComputer networks can be broadly categorized into two types based on transmission technologies:•Broadcast networks•Point-to-point networks1.2.3.1.1 Broadcast NetworksBroadcast network have a single communication channel that is shared by all the machines on the network as shown in Figs.1.1.2 and 1.1.3. All the machines on the network receive short messages, called packets in certain contexts, sent by any machine. An address field within the packet specifies the intended recipient. Upon receiving a packet, machine checks the address field. If packet is intended for itself, it processes the packet; if packet is not intended for itself it is simply ignored.Figure 1.1.2Example of a broadcast network based on shared busFigure 1.1.3Example of a broadcast network based on satellite communicationThis system generally also allows possibility of addressing the packet to all destinations (all nodes on the network). When such a packet is transmitted and received by all the machines on the network. This mode of operation is known as Broadcast Mode. Some Broadcast systems also supports transmission to a sub-set of machines, something known as Multicasting.1.2.3.1.2 Point-to-Point NetworksA network based on point-to-point communication is shown in Fig. 1.1.4. The end devices that wish to communicate are called stations. The switching devices are called nodes. Some Nodes connect to other nodes and some to attached stations. It uses FDM or TDM for node-to-node communication. There may exist multiple paths between a source-destination pair for better network reliability. The switching nodes are not concerned with the contents of data. Their purpose is to provide a switching facility that will move data from node to node until they reach the destination.Figure 1.1.4 Communication network based on point-to-point communicationAs a general rule (although there are many exceptions), smaller, geographically localized networks tend to use broadcasting, whereas larger networks normally use are point-to-point communication.1.1.3.2 Classification based on ScaleAlternative criteria for classifying networks are their scale. They are divided into Local Area (LAN), Metropolitan Area Network (MAN) and Wide Area Networks (WAN).1.1.3.2.1 Local Area Network (LAN)LAN is usually privately owned and links the devices in a single office, building or campus of up to few kilometers in size. These are used to share resources (may be hardware or software resources) and to exchange information. LANs are distinguished from other kinds of networks by three categories: their size, transmission technology and topology.LANs are restricted in size, which means that their worst-case transmission time is bounded and known in advance. Hence this is more reliable as compared to MAN and WAN. Knowing this bound makes it possible to use certain kinds of design that would not otherwise be possible. It also simplifies network management.Figure 1.1.5Local Area NetworkLAN typically used transmission technology consisting of single cable to which all machines are connected. Traditional LANs run at speeds of 10 to 100 Mbps (but now much higher speeds can be achieved). The most common LAN topologies are bus, ringand star. A typical LAN is shown in Fig. 1.1.5.1.1.3.2.2 Metropolitan Area Networks (MAN)MAN is designed to extend over the entire city. It may be a single network as a cable TV network or it may be means of connecting a number of LANs into a larger network so that resources may be shared as shown in Fig. 1.1.6. For example, a company can use a MAN to connect the LANs in all its offices in a city. MAN is wholly owned and operated by a private company or may be a service provided by a public company.Figure 1.1.6 Metropolitan Area Networks (MAN)The main reason for distinguishing MANs as a special category is that a standard has been adopted for them. It is DQDB (Distributed Queue Dual Bus) or IEEE 802.6.1.1.3.2.3 Wide Area Network (WAN)WAN provides long-distance transmission of data, voice, image and information over large geographical areas that may comprise a country, continent or even the whole world. In contrast to LANs, WANs may utilize public, leased or private communication devices, usually in combinations, and can therefore span an unlimited number of miles as shownin Fig. 1.1.7. A WAN that is wholly owned and used by a single company is often referred to as enterprise network.Figure 1.1.7 Wide Area Network1.1.3.2.4 The InternetInternet is a collection of networks or network of networks. Various networks such as LAN and WAN connected through suitable hardware and software to work in a seamless manner. Schematic diagram of the Internet is shown in Fig. 1.1.8. It allows various applications such as e-mail, file transfer, remote log-in, World Wide Web, Multimedia, etc run across the internet. The basic difference between WAN and Internet is that WAN is owned by a single organization while internet is not so. But with the time the line between WAN and Internet is shrinking, and these terms are sometimes used interchangeably.Figure 1.1.8Internet – network of networks1.1.4 ApplicationsIn a short period of time computer networks have become an indispensable part of business, industry, entertainment as well as a common-man's life. These applications have changed tremendously from time and the motivation for building these networks are all essentially economic and technological.Initially, computer network was developed for defense purpose, to have a secure communication network that can even withstand a nuclear attack. After a decade or so, companies, in various fields, started using computer networks for keeping track of inventories, monitor productivity, communication between their different branch offices located at different locations. For example, Railways started using computer networks by connecting their nationwide reservation counters to provide the facility of reservation and enquiry from any where across the country.And now after almost two decades, computer networks have entered a new dimension; they are now an integral part of the society and people. In 1990s, computer network started delivering services to private individuals at home. These services and motivation for using them are quite different. Some of the services are access to remote information, person-person communication, and interactive entertainment. So, some of the applications of computer networks that we can see around us today are as follows: Marketing and sales: Computer networks are used extensively in both marketing and sales organizations. Marketing professionals use them to collect, exchange, and analyze data related to customer needs and product development cycles. Sales applicationincludes teleshopping, which uses order-entry computers or telephones connected to order processing network, and online-reservation services for hotels, airlines and so on.Financial services: Today's financial services are totally depended on computer networks. Application includes credit history searches, foreign exchange and investment services, and electronic fund transfer, which allow user to transfer money without going into a bank (an automated teller machine is an example of electronic fund transfer, automatic pay-check is another).Manufacturing: Computer networks are used in many aspects of manufacturing including manufacturing process itself. Two of them that use network to provide essential services are computer-aided design (CAD) and computer-assisted manufacturing (CAM), both of which allow multiple users to work on a project simultaneously.Directory services: Directory services allow list of files to be stored in central location to speed worldwide search operations.Information services: A Network information service includes bulletin boards and data banks. A World Wide Web site offering technical specification for a new product is an information service.Electronic data interchange (EDI): EDI allows business information, including documents such as purchase orders and invoices, to be transferred without using paper. Electronic mail: probably it's the most widely used computer network application. Teleconferencing: Teleconferencing allows conference to occur without the participants being in the same place. Applications include simple text conferencing (where participants communicate through their normal keyboards and monitor) and video conferencing where participants can even see as well as talk to other fellow participants. Different types of equipments are used for video conferencing depending on what quality of the motion you want to capture (whether you want just to see the face of other fellow participants or do you want to see the exact facial expression).Voice over IP: Computer networks are also used to provide voice communication. This kind of voice communication is pretty cheap as compared to the normal telephonic conversation.Video on demand: Future services provided by the cable television networks may include video on request where a person can request for a particular movie or any clip at anytime he wish to see.Summary: The main area of applications can be broadly classified into following categories:Scientific and Technical Computing–Client Server Model, Distributed ProcessingParallel Processing, Communication MediaCommercial–Advertisement, Telemarketing, Teleconferencing–Worldwide Financial Services–Network for the People (this is the most widely used application nowadays)–Telemedicine, Distance Education, Access to Remote Information, Person-to-Person Communication, Interactive Entertainment1.1.5 Course OutlineOver the years the subject of computer networks has grown with advancement of technology and the emergence of new technologies and new applications. In this course, this massive subject has been divided into comprehensible parts and arranged in a structured and logical manner. It is organized in the following eight modules: •Introduction•Data Communication Fundamentals•Data Link Control•Switched Communication Networks•Broadcast Communication Networks•Internetworking•Routing and Congestion Control•Network SecurityModule 1: IntroductionIn this module some of the basic aspects of computer networks are presented in two lessons. In lesson 1.1 the historical background of computer networks is presented. Then different type of networks and their classification on the basis of transmission technology and scale are considered. In the next section important applications of computer networks, which spans over different areas in a common man life are discussed.Lesson 1.2 presents the important concepts of layering. The basic terminologies in the context of layered architecture are also covered in this section. Then this lesson provides an introduction of OSI layered architecture - Open System Interconnection Reference Model. Basic functionalities of different layers of OSI and concept of service access points and information exchange will also be dealt in this lesson.Module 2: Data Communication FundamentalsThis module is concerned with some of the important issues of the physical layer, which provides services to the layer above it, namely the data link layer. In the data link layer, the data consists of 0s and 1s, which are organized into frames to be sent through some transmission media. It is necessary to convert this data into another entity called signal.After introducing the fundamental model of communication, Lesson 2.1 introduces the basic elements of communication such as data, signal and channel characteristics. Different data types, concept of time domain and frequency domain representation of signal, various channel characteristics such as bandwidth, bit interval and bit rate of a digital signal are considered in this section.Lesson 2.2 introduces different transmission media, which are broadly divided into two categories, namely guided and unguided media. Typical characteristics and uses of each type of media starting from twisted-pair cables, coaxial cable, and optical fiber to line-of-sight and satellite communication have been covered in this lesson.Lesson 2.3 will introduce various sources of impairments, such as attenuation, distortion and noise, that a signal suffers as it passes through a communication media. This lesson also will introduce the concept of channel capacity, which specifies the amount of information that can be sent through a medium.Lesson 2.4 deals with the transmission of digital signals, which involves encoding of data. Encoding of digital data involves two types of coding namely line coding and block coding. Various line coding techniques such as unipolar, polar, and bipolar and block coding techniques are presented in this lesson. Encoding of analog data involves conversion to digital form by using techniques like pulse code modulation and delta modulation, which are also discussed in this lesson.Transmission of analog signals is discussed in Lesson 2.5. It is necessary to perform modulation to convert analog data to analog signal. Various aspects of the three possible modulation techniques, namely amplitude, phase and frequency have been discussed in this lesson. Similarly, to convert digital data to analog signal, possible approaches such as amplitude, phase and frequency shift keying have been covered in lesson 2.6.Lesson 2.7 deals with various multiplexing techniques such as Frequency division multiplexing (FDM), time division multiplexing (TDM), Statistical TDM, Wave Division multiplexing (WDM) and Orthogonal Frequency Division Multiplexing (OFDM).So, this module provides necessary background to the students for understanding the topics to be covered in the subsequent lessons dealing with different aspects of computer networks.Module 3: Data Link ControlIn this module we shall discuss various aspects of data link control has been considered. Lesson 3.1 deals with framing and synchronization along with how one can interface the machine to the media. Error detection and error correction techniques are presented in Lesson 3.2. Lesson 3.3 introduces various protocols used for flow control and error control. Finally, lesson 3.4 provides an overview of HDLC, the most popular data link control protocol.Module 4: Switched Communication NetworksIn this module switched communication networks has been considered. First, various switching techniques have been presented in Lesson 4.1. In this lesson various aspects of circuit switching and the operation of Public Switched Telephone Network (PSTN), which is based on circuit switching, have been discussed. Various aspects of message switching, packet switching and virtual circuit switching have been addressed in Lesson 4.2.Lesson 4.3 presents the Synchronous Optical Network (SONET) that defines a technology for carrying many signals of different capacities through a synchronous, flexible, optical hierarchy. It utilizes the enormous bandwidth of optical fiber to achieve date transfer at a very high rate.X.25 is a packet-switched network developed by ITU-T in 1976. It defines how a packet-mode terminal can be interfaced to a packet network for data communication. However, X.25 does not satisfy the present day requirements of higher data rate. To overcome these limitations, a new standard, known as frame relay was introduced. Lesson 4.4 introduces these two packet switching networks.In the last section of this module, ATM (Asynchronous transfer mode), which can be used both as a LAN or WAN standard has been introduced. Various network devices used in ATM, concept of cell transfer and cell format have been discussed.Module 5: Broadcast Communication NetworksIn Broadcast networks, one transmission media is shared by all the users and information is broadcast by an user into the medium. Some examples of broadcast communication networks are:1.Local area network (LAN)2.Packet radio network3.Cellular telephone network4.Satellite NetworkThese networks can be characterized by the following three parameters:•Transmission media•Topology•Medium Access control (MAC) TechniquesCharacteristics of different transmission media have been covered in Lesson 2.2. Topology and its interrelationship with the transmission media will be considered in Lesson 5.1. In Lesson 5.2 we shall discuss different MAC techniques and the abovementioned networks have been discussed in the remaining six lessons of this module.Module 6: InternetworkingTo make the computer networks more useful and suitable for many emerging applications, it is necessary to connect individual heterogeneous networks, both LAN and WAN, distributed across the world using suitable hardware and software in such a way that it gives the user the illusion of a single network. Basic motivations behind internetworking are as follows:•To provide a link between networks.•To provide a route for delivery of data between processes on different networks.•To provide an accounting service that keeps track of the use of various networks and routers and also to maintain status information.•To accommodate a number of differences among the networks:o Addressing schemeo Maximum packet sizeo Network-access mechanismo Timeouts, Error recoveryo Status reportingo Routing techniqueso User-access controlo Connection oriented/connectionless servicesThis module is concerned with internetworking, which allows communication across isolated network boundaries in a seamless manner. Lesson 6.1 introduces various internetworking devices such as repeater/hub, bridge, router and gateway, which are used to interconnect separate LANs and WANs. Lesson 6.2 introduces IP addressing and various protocols at the IP layer and lesson 6.3 deals with Transmission Control and Application layer protocols such as Electronic mail, File transfer, and Remote login. Module 7: Routing and Congestion ControlWhen a packet travels from a source to a destination, it is likely to pass through several routers and normally there exist multiple paths between any two source-destination pairs. The routing function of the network layer decides which path a packet to follow from a source node to a destination node. For a connectionless (datagram type) service, eachpacket is routed independently, whereas for a virtual-circuit type of service, a route is set up at the beginning and all packets follow the same path. The attributes, which are expected from a routing function, are: correctness, simplicity, robustness, stability, fairness and optimality and the routing algorithms can be classified based on different metrics. Lesson 7.1 introduces various issues related to routing. In the subsequent three lessons three popular routing algorithms, namely Routing Information Protocol (RIP), Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP) have been covered.A packet switched network may be considered as a network of queues. If the rate at which packets arrive and queue up exceeds the rate at which packets are disbursed, the queue size grows without bounds leading to long delay and buffer overflow. Ultimately, it may lead to deadlock, a catastrophic situation in which the throughput drops to zero as shown in. The objective of the congestion control is to maintain the number of packets within the network or a region of network below the level at which queuing delays blow up. Various congestion control protocols have been covered in Lesson 7.5.Module 8: Network SecurityWith the ability to contact anybody from anywhere and more and more people joining the internet with diverse applications, network security has become a very important issue. People are now very concerned about communication in a secured manner through internet, which is essentially an insecure public network. Cryptography has been considered to be the solution to this problem. Suitable encryption/decryption techniques can be used for transfer of data through internet between any two hosts in a secured manner. Lesson 8.1 of this module provides an overview of the vast subject of Cryptography. Then lesion 8.2 presents how cryptography can be applied in a number of ways to achieve secured communication through an insecure communication network. Moreover, many organizations have confidential or proprietary information, such as trade secrets, product development plans, marketing strategies, etc., which should be protected from unauthorized access and modification. Although cryptographic techniques can be used to protect data in transit, it does not protect data from digital pests and hackers. To accomplish this it is necessary to perform user authentication and access control to protect a private network from unauthorized traffic. This can be performed with the help of a firewall, which acts as an interface between a private network and an insecure public network. The functions Firewalls are elaborated in Lesson 8.3.References:Textbooks:1.Data Communications and Networking, Behrouz A. Forouzan, TMH2.Data and Computer Communications, William Stallings, PHIputer Networks, Andrew S. Tanenbaum, PHIReference books:4.Wireless Communications; Principles and Practice, Theodore E. Rappaport, 2ndEdition, Pearson Education5.Satellite Communications, Timothy Pratt, Charles Bostian and Jeremy Allnutt, 2ndEdition, Wiley6.Internetworking with TCP/IP; Principles, Protocols and Architecture, Douglas E.Commer, 3rd Edition, Prentice Hall of India7.Data Compression; The Complete Reference, David Solomon, 3rd Edition, Springerwork Security; Private Communication in a Public World, CharlieKaufman, RadiaPerlmon and Mike Speciner, 2nd Edition, Prentice Hall of IndiaReview QuestionsFill in the blanks1. A computer network interconnects a number of _____________ computers.puter network emerges due to the development between two fields, namely_____________ and _____________.3.Three main categories of networks are _____________, _____________ and_____________.4._____________ are privately owned while _____________ are usually owned bygovernmentN operates at a _____________ speed with _____________error rate thanWANs.6.Internet is _____________ of networks.7.Initially, computer network was developed for ________________.Short answersQ-1. Which Technologies of this age had led to the emergence of computer network? Ans:The technologies are Computer technology and Communication technology with the support of VLSI Technology.Q-2. What are the two broad classifications under which Networks can be divided? Ans: All computer networks fit in one of the two dimensions namely,a). Transmission Technology, this focuses on the basic underlying physical network, for e.g. whether the nodes share a communication media or each pair of node has a separate dedicated link.b). Scale, it focuses on the scale of network how large is your network.。

相关文档
最新文档