¹ú¼Ê¿Î³ÌÖй«ÈÏIB×îÄÑ£¿ÓÐÒ»ÃÅÆäʵºÜ¡°ÈÝÒס±
¡¡¡¡×÷Ϊ¹ú¼Ê¿Î³ÌÖÐÈϿɶÈ×î¸ß£¬ÕæÕýÈ«ÇòͨÓõĿγ̣¬IBµÄ¿Î³ÌÄÚÈݺ¬½ðÁ¿¼«¸ß£¬Í¬Ê±Ò²Òâζ×ÅÄѶȺܴ󡣵«ÊÇÄãÖªµÀIB¿Î³ÌµÄ¿ÆÄ¿ÖÐÒ²ÓÐÒ»Ãźܡ°ÈÝÒס±µÄѧ¿Æ¡£ÏÂÃæΪ´ó¼Ò·ÖÏíһƪÎÄÕ£¬ÕâƪÎÄÕµÄ×÷Õß¾¹ý·ÖÎöºóÈÏΪ£¬¶ÔÓÚÉêÇë´óѧÊÇÀí¹¤·½ÏòµÄѧÉúÀ´Ëµ£¬ÊôÓÚIBDPµÚËÄ×éµÄ¼ÆËã»ú¿ÆѧÊÇÒ»ÃÅÏà¶ÔÈÝÒ׵Ŀγ̡£
¡¡¡¡Computer Science(¼ÆËã»ú¿Æѧ)¿Î³ÌÊôÓÚIB DPµÚËÄѧ¿Æ×é(Sciences)£¬Í¬ÊôÓÚµÚËÄѧ¿Æ×éµÄ»¹ÓÐÎïÀí¡¢»¯Ñ§¡¢ÉúÎï¡¢Éè¼Æ¼¼ÊõµÈ¿ÆÄ¿¡£
¡¡¡¡Ò»¡¢¼ÆËã»úѧɶ?
¡¡¡¡¼ÆËã»ú¿ÆѧҲ·ÖΪHL(High level)ºÍSL(Standard level)¡£HLÔÚÁ½ÄêÄÚÒ»¹²Ñ§240Сʱ£¬SLÔÚÁ½ÄêÄÚҪѧϰ150¸öСʱµÄ¿Î³Ì¡£ÏÂÃæÊǼÆËã»úHLµÄѧϰÄÚÈÝ¡£ÆäÖУ¬ÔÚHL extention²¿·Ö£¬Ñ§ÉúÐèÒªÔÚËĸö·½ÏòÉÏÑ¡ÔñÒ»¸ö£¬°üÀ¨£ºÊý¾Ý¿â¡¢½¨Ä£¡¢Web ScienceºÍÃæÏò¶ÔÏó±à³Ì¡£
¡¡¡¡¶þ¡¢¼ÆËã»ú¿¼É¶?
¡¡¡¡Ï±íÊÇHLµÄ¿¼ÊÔÄÚÈÝ¡£Ö÷ÒªÒÔÎÊ´ðÌâΪÖ÷£¬°üÀ¨Ò»Ð©¼ÆËã»úÔÀí¡¢Éè¼ÆµÄÔÀí¡¢ÔËÓüÆËã»ú֪ʶ½â¾öһЩʵ¼ÊÎÊÌâ¡¢Ëã·¨¡¢±à³ÌµÈ¡£
¡¡¡¡Èý¡¢ÄѶȶà´ó?
¡¡¡¡ÏÂÃæÊǼÆËã»ú¿ÆѧµÄÁ½µÀÑùÌ⣬¿´×Ŷ¼²»Ì«ÄÑ¡£Èç¹û°ÑѧϰÄÚÈݶ¼ÕÆÎÕÁË£¬Ó¦µ±¶¼ÄÜ×ö³öÀ´¡£
¡¡¡¡1. Draw the representation of the binary search tree if the following data were inserted in this order:
¡¡¡¡• FALCON, CANARY, PIGEON, TURKEY, OSPREY.
¡¡¡¡2. Discuss the methods used by criminals to hide or disguise certain files. For each method, identify the countermeasures that can be taken by a computer forensic scientist.
¡¡¡¡IB DPµÄµÚÁùѧ¿Æ×éÊÇÒÕÊõ¡£IB DPÔÊÐíѧÉú¿ÉÒÔ²»Ñ¡ÔñµÚÁùѧ¿Æ×éµÄ¿ÆÄ¿£¬µ«Í¬Ê±±ØÐëÔÚµÚÒ»ÖÁµÚÎåѧ¿Æ×éÖжàÑ¡Ò»ÃÅѧ¿Æ¡£ËùÒÔ£¬Èç¹ûÉêÇë´óѧ·½ÏòÊÇÀí¹¤·½ÏòµÄ£¬¿ÉÒÔÔÚµÚËÄѧ¿Æ×éÎïÀí¡¢»¯Ñ§»òÉúÎïµÄ»ù´¡ÉÏÔÙ¶àÑ¡Ò»ÃżÆËã»ú¿Æѧ¡£·´ÕýÎҸоõ£¬¼ÆËã»ú¿ÆѧHLÄø߷ֵĿÉÄÜÐԱȵÚһѧ¿Æ×éĸÓïºÍµÚ¶þѧ¿Æ×éµÚ¶þÍâÓﶼ¸ß¡£Ò²ÐíÊÇÄÑÕß²»»á¡¢»áÕß²»ÄÑ¡£
¡¡¡¡ÓеÄѧУµÄ¼ÆËã»úרҵ»¹»áÌØÒâÒªÇóIB¿¼ÉúÑ¡Ôñ¼ÆËã»ú¿Æѧ×÷Ϊ¿¼ÊÔÏîÄ¿¡£±ÈÈ磬NUSмÓƹúÁ¢´óѧ(National University of Singapore)£¬¸ÃУÔÚUS NewsµÄÈ«Çò´óѧÅÅÐаñ(Global Universities)ÖÐÅÅÃûµÚ43룬±ÈÎÒ¹úÈÎÒâÒ»Ëù´óѧµÄÅÅÃû¶¼¸ß¡£ÔÚÆ乤³ÌѧԺµÄ¹ÙÍøÉÏ£¬×Ô³ÆΪȫÇòÅÅÃûÇ°10µÄ¹¤³ÌѧԺ¡£ÉêÇë¸ÃѧУµÄComputer ScienceµÄIB¿¼Éú£¬ÒªÇó£º
¡¡¡¡¡°Pass in HL Computer Science/Mathematics/Physics; OR good pass in SL Mathematics¡±
¡¡¡¡¿´ÉÏÈ¥¶Ô·ÖÊýµÄÒªÇóºÃµÍ¡£ÎÒµÄPointÊÇ£¬ËüÒªÇó¿¼ÉúͬʱѡÐÞ¼ÆËã»ú¿Æѧ¡¢ÎïÀíºÍÊýѧµÄHL¡£