首页
外语
计算机
考研
公务员
职业资格
财经
工程
司法
医学
专升本
自考
实用职业技能
登录
外语
What task has been distributed to each person? Tasks A Acknowledgement B Methodology C Bibliography D Literature review E Re
What task has been distributed to each person? Tasks A Acknowledgement B Methodology C Bibliography D Literature review E Re
admin
2022-03-08
72
问题
What task has been distributed to each person?
Tasks
A Acknowledgement
B Methodology
C Bibliography
D Literature review
E Results
F Discussion
Choose FIVE answers from the box and write the correct letter, A-F, next to Questions 26-30.
Bill
Irene: You can distribute your tasks to everyone, so all of them will get chance to take part in it.
Jen: It actually sounds quite good! Could you help me decide who to assign each task to?
Bill: Sure! Now, let’s see. Well, Irene finds writing difficult, but that might be a good opportunity for her to practice it by reviewing the bibliography?
Irene:
Bibliography, I think, may be a bit too long for me, so the methodology would be a better choice.
Jen:
Sure, that makes sense. Bill, you said that Kate is a hard-working girl. So I think she could be given the conclusion part, as it requires plenty of effort.
Bill: Ok, sure. And I know that Kyle hasn’t been feeling well recently, so she could be tasked with the abstract and the acknowledgement for there is very little work involved.
Irene:
Jen, would you like to do the literature review part? Basically, there is a lot of work to do but I believe you really enjoy writing, so I think you’ll do a good job.
Jen: Sure, sounds great.
Bill:
Right, so now bibliography and the discussion are left to assign. I think Linda will be struggling with the referencing, considering the amount of work. So perhaps, I will take care of that task and she could do bibliography.
Irene: That’s great, guys. Thanks for your help! I’ll tell the tutor when he arrives.
选项
答案
F
解析
转载请注明原文地址:https://kaotiyun.com/show/PV8O777K
本试题收录于:
雅思听力题库雅思(IELTS)分类
0
雅思听力
雅思(IELTS)
相关试题推荐
COMPUTERSECURITYItisbelievedthattheproblemofcomputersecurityhaschangedoveraperiodoftimeasbusinesses,thro
COMPUTERSECURITYItisbelievedthattheproblemofcomputersecurityhaschangedoveraperiodoftimeasbusinesses,thro
CompletethesummarybelowwithwordstakenfromReadingPassage2.UseNOMORETHANTWOWORDSforeachanswer.Writeyo
CompletethesummarybelowwithwordstakenfromReadingPassage2.UseNOMORETHANTWOWORDSforeachanswer.Writeyo
Lookatthefollowingstatements(Questions33-40)andthelistofpeopleintheboxbelow.Matcheachstatementwiththecor
Completeeachsentencewiththecorrectending,A-J,below.Writethecorrectletter,A-J,inboxes20-24onyouranswershe
Mattcheachstatementwiththecorrectperson,A-G.Writethecorrectletter,A-G,inboxes20-26onyouranswersheet.
EATS,SHOOTSANDLEAVES—abookreviewThetitleofEats,ShootsandLeavesreferstoafamouslymisp
Matcheachpersonwithanappropriatestatement,A-F.Writethecorrectletter,A-F,inboxes36-40onyouranswersheet.Li
TheFlavorIndustryA.Readthroughthenutritionalinformationonthefoodinyourfreezer,refrigeratororkitchenpantry,
随机试题
可以用柴胡疏肝散治疗的病证有
呼吸衰竭的明确诊断有赖于
甲公司持有乙公司(上市公司)1%有表决权股份,成本为3500万元,对乙公司不具有控制、共同控制或重大影响。甲公司在取得该股权时未将其分类为以公允价值计量且其变动计入当期损益的金融资产。该股权于2×14年12月31日的公允价值为3400万元,2×15年12月
某市实行人才强省战略,2010年从国内外引进各类优秀人才1000名,其中,管理类人才361人,非管理类不具有博士学位的人才250人,国外引进的非管理类人才206人,国内引进的具有博士学位的252人。根据以上陈述,可以得出()。
第一次明确提出“社会主义本质”这一概念并对其作出科学概括的是()。
在6点和7点之间,两针在什么时刻重合?()。
下列属于适应性行为量表的是()
下面对数据流图描述不正确的是()。
St.Patrick’sDayiscelebratedonMarch17,hisreligiousfeastdayandtheanniversaryofhisdeathinthefifthcentury.Lege
HowtoChooseaCollege?I.Student-facultyratio—Thelowertheratios,themore【T1】______youwillget—Healthy
最新回复
(
0
)