新核心综合学术英语教程-4-Unit-3-参考答案.docx
《新核心综合学术英语教程-4-Unit-3-参考答案.docx》由会员分享,可在线阅读,更多相关《新核心综合学术英语教程-4-Unit-3-参考答案.docx(13页珍藏版)》请在淘文阁 - 分享文档赚钱的网站上搜索。
1、Focusing on ReadingTask 11. G2. E3.C4.F5.A6. D7.J8. B 9.L10.H 11. N 12. M 13. Q U.K 15.1 16.R 17.0 18.PTask 21) The reasons are as follows,Firstly, students sometimes view academic dishonesty as a normal incidence and something ordinary. There are many reasons that they use to justify their cheating
2、.Secondly, new techniques of cheating have been developed, including the use of high-tech tools, although the old ones are still dominant on campus, which makes it even more difficult for the faculty to identify.Thirdly, it is a common view to equate grades with the value of the student. Furthermore
3、, grades are used to predict ones future success. So some students tend to practice academic dishonesty with the aim of getting higher grades.Fourthly, little is known about the degree of academic dishonesty and no methods are devised to combat the problem. Besides, there are no strategies for detem
4、ng academic dishonesty for the faculty.Fifthly, honor codes are essential to reducing the level of cheating in colleges and should be established. However, their importance has been neglected.Last but not least, academic dishonesty is no longer a task of classroom management that can well be remedie
5、d by a single faulty with teaching responsibility. Administrators and professional organizations are expected to work together to maintain a healthy learning environment with a high level of trust between the faculty and the administration.2) Old techniques include bringing notes to class and having
6、 information written on water bottles, pens and gum wrappers. New techniques of cheating include using cell phones to get the information, communicate with others outside the exam room to obtain answers and searching answers on the web during an exam.Other forms include copying test responses from a
7、 classmate, taking exams for other people, failure to cite other peoples work, and purchasing research papers and presenting them as his/her work. Also actions such as breaking into the office or teachers files to access the test or answer key, sabotaging peers ongoing work or gaining illegal access
8、 to school computers to change official grades are all forms of academic dishonesty. (B)3) There are many reasons that students use to justify cheating: lack of time, poverty, uncaring instructors, laziness, peer pressure, poor rile models, fear of failure and technology that has allowed cheating to
9、 be done easily. (C)Besides, research shows that a common view equates grades with the value of the student. Secondly, grades are used to predict ones future success. This may cause the students to practice academic dishonesty.4) Studies show that honor codes were essential to reducing the level of
10、cheating in colleges. Honor codes would be more successful when they were combined with a climate that emphasized the importance of academic integrity and an honor system that allowed for strong student involvement in the enforcement of academic integrity initiatives. Therefore, the administration s
11、hould strive in the creation of the campus environment, seek the full support of all the college constituents, and ensure the implementation of the honor codes at the natural species boundaries. The Moral Confusion Argument alleges that the existence of entities that cannot be definitively classifie
12、d as either human or non-human will cause moral confusion that will undermine valuable social and cultural practices. The Borderline-Personhood Argument focuses on great apes and concludes that their borderline-personhood confers a high enough degree of moral status to make most, if not all, chimeri
13、c research on them impermissible. The Human Dignity Argument claims that it is an affront to human dignity to give an individual “trapped“ in the body of a non-human animal the capacities associated with human dignity. Finally, the Moral Status Framework maintains that research in which a non-human
14、animaPs moral status is enhanced to that of a normal adult human is impermissible unless reasonable assurances are in place that its new moral status will be respected, which is unlikely given the motivations for chimeric research and the oversight likely to be provided.These arguments provide diffe
15、rent rationales for restricting chimeric research and have different implications for the range of chimeric research that will be deemed unethical.Task 71) Which sentences provide the background of the paper?Academic dishonesty is a problem that has been plaguing colleges and universities for genera
16、tions. An investigation of any institution today will certainly reveal some forms of academic dishonesty.2) Which sentences form the literature review?Researchers of academic dishonesty vary in their reports of how many students cheat in college.3) What is the main limitation of the previous studies
17、 that the author mentioned?However, most research on academic dishonesty has relied primarily on self-reports of cheating behaviors.4) Whafs the objective of the paper?The purpose of the study is to investigate participants? attitudes toward cheating and the effects of academic motivation, self-effi
18、cacy, and academic integrity on cheating behaviors.5) What are the methods that the author will use?The present study includes an empirical portion in which participants are put in a situation in which cheating may be to their advantage.6) What is the authors hypothesis?The hypothesis is that partic
19、ipants would be most likely to cheat when they are offered a monetary reward for success.Task 8Introduction 11) an introduction of the topic and its background2) a review about the previous studies3) the limitation of the previous studies4) a gap for the signif icance of the study5) the hypothesis o
20、f the author6) the objective of the paper7) the methodologyIntroduction 21) an introduction of the topic and its background2) a review about the previous studies and the limitation of the previous studies3) the limitation of the previous studiesTask 91) A 2)B 3)E 4)C 5)D 6) FTask 10This paper detail
21、s the strategies used for curbing academic dishonesty in online courses.Task 11Biologists have long known of patterns of inheritance, and eventually of inheritance mechanisms, that go beyond genetic inheritance (Jablonka & Lamb 2005; Sapp 1987). Two fundamental types of arguments led to this conclus
22、ion: arguments based on observations regarding patterns of inheritance, and arguments concerned with the localization of hereditary factors inside cells. Arguments of the first kind were based on hereditary relations and inheritance patterns that fail to conform to the rules ofMendelian inheritance
23、(e.g., maternal inheritance). If Mendelian inheritance patterns are the result of the way the chromosomes in the eukaryotic cell nucleus behave, non-Mendelian heredity must depend on separate inheritance processes, mechanisms, or systems (Beale 1966; Sager 1966). Second, there were observations of h
24、ereditary phenomena that seemed to depend on factors residing in the cytoplasm of cells, rather than their nucleus, where the genetic material is localized. The interpretation of these observations was highly contested (Darlington 1944; Sapp 1987).Today, we know that some of these observations are r
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- 核心 综合 学术 英语 教程 Unit 参考答案
限制150内