Определение связности, согласованности и структуры текста на английском языке

Разделы: Иностранные языки, Конкурс по английскому языку «Cambridge English Teacher»

Ключевые слова: английский язык


ФОРМА УЧАСТНИКА КОНКУРСА CAMBRIDGE ENGLISH TEACHER

1

Activity title:

Gapped text

2

Skill(s):

Cohesion, coherence, text structure

3

Level(s):

B2 First for Schools

4

Exam part:

Reading and Use of English

5

Aim(s):

In this part, there is an emphasis on text structure, cohesion and coherence, and candidates' ability to follow the development of a
long text.
This task tests your ability to see how a text is structured, and how it makes sense through its references backwards and forwards.

6

Materials needed:

This task consists of one text, for example an extract from a magazine, from which six sentences have been removed and placed in jumbled order after the text, together with a seventh sentence which does not fit in any of the gaps.

7

Preparation:

Train your students to read through the text with gaps in it first so that they gain an overall idea of the structure of the text and the development of the writer's ideas, before starting to do the task.

When your students are selecting a sentence to fill a gap, make sure that they look carefully at the information before and after the gap. Candidates sometimes make the wrong choices by selecting options which seem to fit the text before the gap and neglecting to check that the text after the gap follows on logically.

Give your students plenty of practice in recognizing a wide range of linguistic devices which mark the logical and cohesive development of a text, for example words and phrases indicating time periods, cause and effect, exemplification, contrasting arguments, repetition, concordance of tenses, pronouns, etc. This will help them to make the correct choice between two possible sentences which seem rather similar at first sight.

It is important to discourage your students from relying on 'word spotting'. That is assuming that if the same word, name, date, etc. appears in the surrounding text and one of the options, that is automatically the right sentence to fill the gap. Train them to check all the other linguistic clues carefully before making their final decision.

8

Procedure:

Step 1. At first skim the text to get the main idea about its topic and contents. Don't mind the gaps.

Step 2. Then study carefully each gap and surrounded sentences.

Step 3. Study the removed sentences. Keep it in mind that there is one extra sentence, and it can possibly be out of the topic but don't cross it out at once, maybe it just seems like that.

Step 4. Having chosen the correct variant from your point of view, read the whole paragraph - does it make sense?

Step 5. Having done do not forget to mark your answers on the separate answer sheet.

9

Variation(s)

None

10

Reflections

In order to complete the task successfully, you will first need to have a general idea of what the passage is about, so a quick reading of the gapped text, without worrying about unknown words, is the first thing to do. While skimming through the text, try to note what information is given about the topic in each paragraph of the text, how the main ideas develop from paragraph to paragraph, and what you expect to come in the gaps. Then, you should look at each of the sentences in turn, and begin to match information in the sentences to information in different sections of the text, thinking about which sentence might come where.

However, you need now to read the text very carefully, because there are clues in the passage both before and after each gap. The development of ideas can be seen in different lexical and grammatical relations between sentences and paragraphs of the text and, therefore, you should pay careful attention to both lexical words and phrases, and grammatical structures that may indicate such relations in the text. Thus, for example, the repetition of certain nouns or adjectives, the use of synonym words and phrases, the use of one verb tense rather than another, the use of reference words, like personal pronouns (referring to either people or things), demonstratives (this, those), possessives (its, their), relative pronouns (who, that, which), temporal markers (when or while), adverbs of frequency (often, never), of place (here, there), logical connectors (besides, however), or other linking words indicating contrasts (but, while), or reasons (because, since) - all might help you to see how information in the text is organized, and decide which sentence fits where in the text.

Once you have chosen a sentence to fill a gap in the text, it is a good idea to cross out that sentence from the list of choices given so that you are not tempted to put it elsewhere.

You are going to read an article about the author's research on the topic Cybersecurity and the Bible. Six sentences have been removed from the article. Choose from the sentences A-G the one which fits its gap (1-6). There is one extra sentence which you don't need to use.

Mark your answers on the separate answer sheet.


I was thinking of a subject to write for this blog and, after going to church, thought about how the Bible might have had some prognostications to the computer age.

1.___________________________________________________________

For example, the "number of the beast" or 666 translates to "www" according to the Hebrew language, but were there any phrases in the Bible that might relate to our current cybersecurity efforts today?

Unfortunately, after some effort trying to put in search terms like "router" or "password" or "authenticate" or other such words, I found nothing in my version of the Bible (King James version), but some other words did hit on some interesting phrases.

2.____________________________________________________________

This one brought up some interesting references, especially in the Book of Isaiah, where in Chapter 19, verse 9 it says "moreover…they that weave networks shall be confounded." I just thought this was such an interesting phrase, since the more complex the computer network, the easier it is to defeat that network. In the same way that having a large area of land is tough to patrol for intruders, the network "land area" (or "LAN area" if you like puns) is tough to patrol for cyber intruders as your network becomes more expansive.

3._____________________________________________________________

Network was also used in the Book of Kings, where in 1 Kings, Chapter 7, verse 18, it says "…and he made the pillars, and two rows round about upon the one network…"

4.______________________________________________________________

It could also refer to firewalls or DMZs, which could stand as pillars to block intruders from entering the network. I know, I am stretching, but the fact that this phrase even exists in the Bible is interesting if nothing else.

The second word that I found was "host." Now, in the Bible, at least from my reading, host is just that: some person or some entity that is in charge of the tribe or family.

5.________________________________________________________________

This is probably the one phrase that pertains the most to cybersecurity. Why would anyone try to defeat a system that is already defeated? The challenge to defeating a system is to overcome the security; to aim the intrusion against something that is reported to be "unsinkable." What better way to make a name for yourself as an intruder than to defeat a secure host.

Okay, all this is hyperbole, I realize that. It is interesting to note that maybe the Bible was not predicting the internet or the computer age, but that something written as long ago as this reference can be adapted to something as new as the computer security arena. It was a fun exercise, but it is much more than that to me.

6.__________________________________________________________________

If the people are not considered in the equation, we are really not considering the entire formula. By personifying computers through use of the Bible, I hope to bring us all back to the basic as IT professionals. We MUST consider the users (and the intruders who are also users) in the big IT picture. The past is the future.

A. This could be interpreted as a type of computer network, where it is both hierarchical and peer-to-peer, some of which are used today.

B. Our Father, who art in heaven, hallowed be thy name; thy kingdom come; thy will be done on earth as it is in heaven.

C. It means that users are the ones that operate and maintain computers, computer networks, and computer security.

D. I have heard many people talk about how the Book of Revelations predicted the internet.

E. There was an interesting phrase in the Book of Judges, where in Chapter 8, verse 11, it states that someone "…smote the host; for the host was secure."

F. The first word was "network."

G. This one did raise my eyebrows slightly because of the applicability to today's cyber environment.


Student's name: ____________________________________________________

Write your answers here:

1

2

3

4

5

6

KEYS

1

2

3

4

5

6

D

F

G

A

E

C

B - extra one