
- •Основы письменной коммуникации в профессиональной деятельности в иноязычной среде
- •Самара 2012
- •Введение
- •Часть 1. Особенности научного стиля: лексические и фразеологические средства, разновидности и жанры Особенности научного стиля
- •Лексические средства научного стиля
- •Фразеологические средства научного стиля
- •Разновидности и жанры научного стиля
- •Компрессия текста и основные виды компрессии текста
- •Аннотация: понятие, функции, структура, характеристики
- •Основные характеристики аннотации:
- •Фразы, рекомендуемые для написания аннотации к научной статье:
- •Резюме: понятие, характеристики, план написания
- •Существует несколько обязательных характеристик хорошего резюме:
- •Пошаговый план написания резюме:
- •Рецензия: понятие и структура
- •Рецензия должна включать в себя следующую информацию:
- •Фразы, рекомендуемые для написания рецензии на научную статью:
- •Образцы компрессии текстов Аннотация статьи «Особенности самоконтроля младших школьников как универсального учебного действия»
- •Резюме статьи «Особенности самоконтроля младших школьников как универсального учебного действия»
- •Рецензия на статью «Особенности самоконтроля младших школьников как универсального учебного действия»
- •Часть 2. Практические задания Texte 1. What is a computer?
- •Texte 2. Basic features of database programs
- •Texte 3. Programming
- •Texte 4. Completely electronic device
- •Texte 5. Word-processing facilities
- •Internet software
- •Irc, audio and video chatting
- •Texte 6. Cryptography
- •1. Basic Terminology
- •2. Basic Cryptographic Algorithms
- •Texte 7. Hardware and software
- •Texte 8. Apple macintosh computers
- •Texte 9. Artificial intelligence
- •Texte 10. What is physics?
- •Texte 11. What are fuel cells?
- •Texte 12. How do solar cells work?
- •Texte 13. Mathematics as a science
- •Texte 14. Fields of mathematics
- •Texte 15. Mathematical beauty
- •Article 1. Mr-Radix: a multi-relational data mining algorithm
- •Introduction
- •Article 2. A survey of black hole attacks in wireless mobile ad hoc networks
- •1. Introduction
- •2. Background
- •2.1. Proactive (table-driven) Routing Protocol
- •2.2. Reactive (on-demand) Routing Protocol
- •2.3. Hybrid Routing Protocol
- •3. Single Black Hole Attack
- •3.1. Neighborhood-based and Routing Recovery Scheme [26]
- •3.2. Redundant Route Method and Unique Sequence Number Scheme [27]
- •3.3. Time-based Threshold Detection Scheme [28]
- •3.4. Random Two-hop ack and Bayesian Detection Scheme [29]
- •3.5. Resource-Efficient aCcounTability (reAct) Scheme based on Random Audits [30]
- •3.6. Detection, Prevention and Reactive aodv (dpraodv) Scheme [31]
- •3.7. Next Hop Information Scheme [32]
- •3.8. Nital Mistry et al.'s Method [33]
- •3.9. Intrusion Detection System based on Anti-black hole mechanism [34]
- •4. Collaborative Black Hole Attack
- •4.1. Dri Table and Cross Checking Scheme [36, 37]
- •4.2. Distributed Cooperative Mechanism (dcm) [38]
- •4.3. Hash based Scheme [39]
- •4.4. Hashed-based mac and Hash-based prf Scheme [40]
- •4.5. Backbone Nodes (bbn) and Restricted ip (rip) Scheme [41]
- •4.6. Bait dsr (bdsr) based on Hybrid Routing Scheme [43]
- •5. Conclusions and Future Works
- •Article 3. Quantum social networks
- •Introduction
- •1.2. Summary lead
- •2. Positive comments
- •3. Criticism and objections
- •4. Data analysis
- •5. Results and their representation
- •6. Conclusion
- •7. Prospects and applications
- •Appendix 2. Sample annotations
- •Appendix 3. Sample text with annotation
- •Appendix 4. Some tips on summary writing
- •Appendix 5. Some tips on review writing
- •I. Характеристика и описание работы
- •II. Структура работы. Характеристика построения книги и ее разделов
- •III. Вводная часть. Историческая справка. Выходные данные
- •IV. Основные достоинства и недостатки работы
- •1. Достоинства
- •2. Недостатки. Замечания
- •V. Оценка работы, рекомендации. Заключение
- •Sample review
- •Appendix 6. Spelling and punctuation Особенности орфографии английского языка
- •Литература
- •Научные журналы в электронном формате:
- •Содержание
- •Часть 1. Особенности научного стиля: лексические и фразеологические средства, разновидности и жанры 6
- •Часть 2. Практические задания 20
- •Основы письменной коммуникации в профессиональной деятельности в иноязычной среде
- •(Направление подготовки: 050100.62 «Педагогическое образование»; профили подготовки: «Математика и информатика», «Физика и информатика»)
Internet software
Getting connected
The language used for data transfer on the Internet is known as ТСР/IР (transmission control protocol/Internet protocol). This is like the Internet operating system.
The first program you need is a PPP (point to point protocol) driver. This piece of software allows the ТСР/IР system to work with your modem; it dials up your Internet service provider (ISP), transmits your password and log-in name and allows Internet programs to operate.
E-mail is your personal connection to the Internet. It allows you to exchange messages with people all over the world. It can include text, pictures, and even audio and animation.
When you set up an account with an ISP, you are given a unique address and anyone can send you e-mail. The mail you receive is stored on the server of your ISP until you next connect and download it to your hard disk.
Web browsers
The Web is a hypertext-based system where you can find news, pictures, games, online shopping, virtual museums, electronic magazines – any topic you can imagine.
You navigate through the Web using a program called a ‘browser’, which allows you to search and print Web pages. You can also click on keywords or buttons that take you to other destinations on the net. This is possible because browsers understand hypertext markup language (HTML), a set of commands that indicate how a Web page is formatted and displayed.
Irc, audio and video chatting
IRC – Internet relay chat – is a system for realtime (usually typed) conversation. It’s easy to use. To start a chat session you run an IRC program, which connects you to an IRC server – a computer dedicated to IRC. Then you join a channel, which connects you to a single chat area. Next you type a message and the other participants can see it.
Internet telephone and video chatting are based on IRC protocols. Videoconferencing programs enable users to talk to and see each other, and collaborate. They are used in intranets – company networks that use Internet software but make their Web site accessible only to employees and authorized users.
FTP and Telnet
With FTP software you can copy programs, games, images and sounds from the hard disk of a remote computer to your hard disk. Today this utility is built into Web browsers.
A Telnet program is used to log directly into remote computer systems. This enables you to run programs kept on them and edit files directly.
Newsgroups
Newsgroups are the public discussion areas which make up a system called ‘Usenet’. The contents of the newsgroups are contributed by people who send articles (messages) or respond to articles. They are classified into categories: comp (computers), misc (miscellaneous), news (news), rec (recreation), soc (society), scl (science), talk and alt (alternative).
Read the text.
Pick up the key words.
Divide the text into logical parts.
Make up an outline of the text.
Find the main idea in each part of the text.
Express the main idea of each part in one sentence.
Find supporting details in each part of the text.
Compress the text excluding the supporting details.
Express the main idea of the text in one sentence.
Write an annotation/a summary of the text using words and word combinations from your active vocabulary and sample summaries.