Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:
Презентация по ИНО.docx
Скачиваний:
17
Добавлен:
09.02.2015
Размер:
168.44 Кб
Скачать

Список литературы:

  1. ГОСТ 7.9-95. Реферат и аннотация. Общие требования. (ИСО 214-76)

  2. Вейзе А.А. Чтение, реферирование и аннотирование иностранного текста. М.: Изд-во Моск. ун-та, 1985

  3. Ильичева Н.В., Горелова А.В. Аннотирование и реферирование. Учеб. пособие / Сам. Гос. ун-т, 2003

  4. Simon Sweeny. Communicating in Business. Second Edition. Cambridge University Press, 2004

  5. Macmillan English Dictionary for Advanced Learners. Second Edition. Macmillan Publishers Limited, 2007

***

http://www.stsc.hill/af/mil/crosstalk/2003/06/caldwell.pdf,June2003

http://www.aimglobal.org/technologies/rfid/what is rfid.htm(2003)

Оглавление

ПРЕДИСЛОВИЕ 3

MODULE 1. SUMMARY AND ABSTRACT 4

UNIT 1. HOW TO MAKE UP A SUMMARY 4

1.1. Recommendations for making up a summary 4

1.2. Определение 4

1.3. Структура реферата 4

1.4. Объем текста 5

1.5. Суть реферирования. Требования к изложению текста реферата 5

2.2. Common summary patterns 7

UNIT 2. MAKING UP AN ABSTRACT 8

2.1. Определение 8

2.2. Структура аннотации 8

2.3. Common abstract patterns 9

2.4. Word combinations to be used in an abstract 9

UNIT 3. PRACTICAL TRAINING 10

UNIT 4. MAKING UP A DIALOGUE 13

4.1. A dialogue pattern 15

4.2. Common speech patterns for making up dialogues 15

UNIT 5. SUPPLEMENTARY TEXTS FOR MAKING UP AN ABSTRACT AND SUMMARY 16

Text 1.The Android Execution Environment 16

Text 2. Universal Serial Bus (USB) 18

Universal Serial Bus (USB) is an industry standard developed in the mid-1990s that defines the cables, connectors and communications protocols used in a bus for connection, communication and power supply between computers and electronic devices. 18

II.Attacks 23

Information hiding techniques still suffer from several limitations leaving them open to attack and robustness criteria vary between different techniques. Attacks can be broadly categorized although some attacks will fit into multiple categories. 23

Basic Attacks: 23

Robustness Attacks: 23

Implementation Attacks: 24

MODULE 2. PRESENTATIONS 29

UNIT 1. THE BEGINNING OF THE PRESENTATION 29

1.1.Presentation technique and preparation 29

1.2.The audience 29

1.3.Visual aids: general principles 30

1.4.Structure (I). The Introduction 31

1.5.Language Checklist 31

1.6.The example of an introduction 32

UNIT 2. THE MIDDLE OF THE PRESENTATION 32

2.1. Structure (II). The main body 32

2.2. Holding the audience’s attention 33

2.3.Language Checklist 33

2.4.A model part of the main body of a presentation 34

UNIT 3. THE END OF THE PRESENTATION 35

3.1. Structure (III). The end 35

3.2 Summarizing and concluding 35

3.3. Questions and discussions 35

3.4. Language Checklist. The end of the presentation 36

3.5. The example of ending of the presentation 37

СПИСОК ЛИТЕРАТУРЫ: 39

41