¹ú¼Ê¿Î³ÌÖй«ÈÏIB×îÄÑ£¿ÓÐÒ»ÃÅÆäʵºÜ¡°ÈÝÒס±
¡¡¡¡×÷Ϊ¹ú¼Ê¿Î³ÌÖÐÈϿɶÈ×î¸ß£¬ÕæÕýÈ«ÇòͨÓõĿγ̣¬IBµÄ¿Î³ÌÄÚÈݺ¬½ðÁ¿¼«¸ß£¬Í¬Ê±Ò²Òâζ×ÅÄѶȺܴ󡣵«ÊÇÄãÖªµÀIB¿Î³ÌµÄ¿ÆÄ¿ÖÐÒ²ÓÐÒ»Ãźܡ°ÈÝÒס±µÄѧ¿Æ¡£ÏÂÃæÎª´ó¼Ò·ÖÏíһƪÎÄÕ£¬ÕâÆªÎÄÕµÄ×÷Õß¾¹ý·ÖÎöºóÈÏΪ£¬¶ÔÓÚÉêÇë´óѧÊÇÀí¹¤·½ÏòµÄѧÉúÀ´Ëµ£¬ÊôÓÚIBDPµÚËÄ×éµÄ¼ÆËã»ú¿ÆÑ§ÊÇÒ»ÃÅÏà¶ÔÈÝÒ׵Ŀγ̡£
¡¡¡¡Computer Science(¼ÆËã»ú¿ÆÑ§)¿Î³ÌÊôÓÚIB DPµÚËÄѧ¿Æ×é(Sciences)£¬Í¬ÊôÓÚµÚËÄѧ¿Æ×éµÄ»¹ÓÐÎïÀí¡¢»¯Ñ§¡¢ÉúÎï¡¢Éè¼Æ¼¼ÊõµÈ¿ÆÄ¿¡£
¡¡¡¡Ò»¡¢¼ÆËã»úѧɶ?

¡¡¡¡¼ÆËã»ú¿ÆÑ§Ò²·ÖΪHL(High level)ºÍSL(Standard level)¡£HLÔÚÁ½ÄêÄÚÒ»¹²Ñ§240Сʱ£¬SLÔÚÁ½ÄêÄÚҪѧϰ150¸öСʱµÄ¿Î³Ì¡£ÏÂÃæÊǼÆËã»úHLµÄѧϰÄÚÈÝ¡£ÆäÖУ¬ÔÚHL extention²¿·Ö£¬Ñ§ÉúÐèÒªÔÚËĸö·½ÏòÉÏÑ¡ÔñÒ»¸ö£¬°üÀ¨£ºÊý¾Ý¿â¡¢½¨Ä£¡¢Web ScienceºÍÃæÏò¶ÔÏó±à³Ì¡£

¡¡¡¡¶þ¡¢¼ÆËã»ú¿¼É¶?
¡¡¡¡Ï±íÊÇHLµÄ¿¼ÊÔÄÚÈÝ¡£Ö÷ÒªÒÔÎÊ´ðÌâΪÖ÷£¬°üÀ¨Ò»Ð©¼ÆËã»úÔÀí¡¢Éè¼ÆµÄÔÀí¡¢ÔËÓüÆËã»ú֪ʶ½â¾öһЩʵ¼ÊÎÊÌâ¡¢Ëã·¨¡¢±à³ÌµÈ¡£

¡¡¡¡Èý¡¢ÄѶȶà´ó?
¡¡¡¡ÏÂÃæÊǼÆËã»ú¿ÆÑ§µÄÁ½µÀÑùÌ⣬¿´×Ŷ¼²»Ì«ÄÑ¡£Èç¹û°ÑѧϰÄÚÈݶ¼ÕÆÎÕÁË£¬Ó¦µ±¶¼ÄÜ×ö³öÀ´¡£
¡¡¡¡1. Draw the representation of the binary search tree if the following data were inserted in this order:
¡¡¡¡• FALCON, CANARY, PIGEON, TURKEY, OSPREY.
¡¡¡¡2. Discuss the methods used by criminals to hide or disguise certain files. For each method, identify the countermeasures that can be taken by a computer forensic scientist.
¡¡¡¡IB DPµÄµÚÁùѧ¿Æ×éÊÇÒÕÊõ¡£IB DPÔÊÐíѧÉú¿ÉÒÔ²»Ñ¡ÔñµÚÁùѧ¿Æ×éµÄ¿ÆÄ¿£¬µ«Í¬Ê±±ØÐëÔÚµÚÒ»ÖÁµÚÎåѧ¿Æ×éÖжàѡһÃÅѧ¿Æ¡£ËùÒÔ£¬Èç¹ûÉêÇë´óѧ·½ÏòÊÇÀí¹¤·½ÏòµÄ£¬¿ÉÒÔÔÚµÚËÄѧ¿Æ×éÎïÀí¡¢»¯Ñ§»òÉúÎïµÄ»ù´¡ÉÏÔÙ¶àѡһÃżÆËã»ú¿ÆÑ§¡£·´ÕýÎҸоõ£¬¼ÆËã»ú¿ÆÑ§HLÄø߷ֵĿÉÄÜÐԱȵÚһѧ¿Æ×éĸÓïºÍµÚ¶þѧ¿Æ×éµÚ¶þÍâÓï¶¼¸ß¡£Ò²ÐíÊÇÄÑÕß²»»á¡¢»áÕß²»ÄÑ¡£

¡¡¡¡ÓеÄѧУµÄ¼ÆËã»úרҵ»¹»áÌØÒâÒªÇóIB¿¼ÉúÑ¡Ôñ¼ÆËã»ú¿ÆÑ§×÷Ϊ¿¼ÊÔÏîÄ¿¡£±ÈÈ磬NUSÐÂ¼ÓÆÂ¹úÁ¢´óѧ(National University of Singapore)£¬¸ÃУÔÚUS NewsµÄÈ«Çò´óѧÅÅÐаñ(Global Universities)ÖÐÅÅÃûµÚ43룬±ÈÎÒ¹úÈÎÒâÒ»Ëù´óѧµÄÅÅÃû¶¼¸ß¡£ÔÚÆä¹¤³ÌѧԺµÄ¹ÙÍøÉÏ£¬×Ô³ÆÎªÈ«ÇòÅÅÃûǰ10µÄ¹¤³ÌѧԺ¡£ÉêÇë¸ÃѧУµÄComputer ScienceµÄIB¿¼Éú£¬ÒªÇó£º
¡¡¡¡¡°Pass in HL Computer Science/Mathematics/Physics; OR good pass in SL Mathematics¡±
¡¡¡¡¿´ÉÏÈ¥¶Ô·ÖÊýµÄÒªÇóºÃµÍ¡£ÎÒµÄPointÊÇ£¬ËüÒªÇó¿¼ÉúͬʱѡÐÞ¼ÆËã»ú¿ÆÑ§¡¢ÎïÀíºÍÊýѧµÄHL¡£






