《實(shí)用商務(wù)英語》Unit8_第1頁
《實(shí)用商務(wù)英語》Unit8_第2頁
《實(shí)用商務(wù)英語》Unit8_第3頁
《實(shí)用商務(wù)英語》Unit8_第4頁
《實(shí)用商務(wù)英語》Unit8_第5頁
已閱讀5頁,還剩30頁未讀 繼續(xù)免費(fèi)閱讀

下載本文檔

版權(quán)說明:本文檔由用戶提供并上傳,收益歸屬內(nèi)容提供方,若內(nèi)容存在侵權(quán),請(qǐng)進(jìn)行舉報(bào)或認(rèn)領(lǐng)

文檔簡介

1、實(shí)用商務(wù)英語Practical Business EnglishUnit EightSection A Listening and Speaking Complaints and ClaimsSection B Reading E-businessSection C Business Writing E-mailsTargetsSection A Listening and Speaking. Remember the words, phrases and sentences related to complaints and claims. . Imitate and memorize th

2、e following dialogues. . Discuss the following questions with your partner. Part One Warming-up Exercises1. Do you have any experience of complaints or claims? If do, talk about it.2. Discuss in pairs or groups the common causes for complaints and claims in international trade. . Listen to Dialogue

3、or statement 1-5 and choose the appropriate answer to each of the questions. . Listen to Dialogue 6 and fill in the blanks with the exact words you have just heard from the recording. . Listen to Dialogue 7 twice and fill in the missing information. For these blanks, you can use the exact words you

4、have just heard or write down the main ideas in your own words. Part Two Dialogues. Oral practice.1. Listen to Dialogue 6 again, and then role-play the following situation: a businessman from Australia has ordered 500 cases of green tea from Suzhang Tea Company. Upon arrival, 50 cases were found wet

5、. Supposing you are the sales manager of this company, he lodges a claim against you.2. Listen to Dialogue 7 again, then make a similar dialogue in pairs. . Listen to Passage 1 carefully and fill in the blanks with the exact words you have just heard from the recording. . Listen to Passage 2 careful

6、ly and fill in the blanks with the exact words you have just heard from the recording. Part Three Passages. Oral practice. 1. Listen to Passage 1 again and talk about how to make complaints effectively and how to resolve customer complaints.2. Listen to Passage 2 again and add more tips for making c

7、omplaints. . Listen to the following song and fill in the blanks with the exact words you have just heard from the recording. I believe I can fly . Listen to the song again and sing along.Part Four Relax and EnjoySection B ReadingPre-reading Discussion: 1. What are the differences between e-commerce

8、 and e-business?2. Discuss with your partner about the advantages and disadvantages of selling or buying over the Internet. Text1 While the words Commerce and Business dont have much difference in English and in fact are largely interchangeable as nouns describing organized profit-seeking activity,

9、there is a difference between e-commerce and e-business. 2 The first wave of thinking about electronic business was a reaction to the success of Amazon and Dell in selling products over the Internet. 3 E-business goes far beyond e-commerce or buying and selling over the Internet, and deep into the p

10、rocesses and cultures of an enterprise. E-commerce Vs E-business4 Dell Computer gets a lot of attention as a pioneering e-business today and is the best example of this form of business. 5 Successful new-businesses can emerge from nowhere. 6 In the past, the rules of business were simplebeat the com

11、petition, squeeze your suppliers and keep your customers in the dark. 7 Early e-commerce companies have used their understanding of the technologys potential and the absence of any competition to steal a march and enter markets that would previously have been closed to them, but in future, simply ha

12、ving a good business idea and being technologically smart might not be enough. . New Words Phrases and Expressions Proper Nouns 1. In brief, you need business acumen coupled with a robust shopping cart software. 2. It is the powerful business environment that is created when you connect critical bus

13、iness systems directly to customers, employees, vendors, and business partners, using Intranets, Extranets, e-commerce technologies, collaborative applications, and the Web. . Notes電子商務(wù)模式 根據(jù)聯(lián)合國國際貿(mào)易委員會(huì)電子商務(wù)示范法,廣義的電子商務(wù)是指利用數(shù)據(jù)信息進(jìn)行的商業(yè)活動(dòng),而數(shù)據(jù)信息是指由電子的、光學(xué)的或其他類似方式所產(chǎn)生、傳輸并存儲(chǔ)的信息。狹義的電子商務(wù)是指基于互聯(lián)網(wǎng)這個(gè)平臺(tái)實(shí)現(xiàn)商業(yè)交易電子化的行為。電子商

14、務(wù)有B2B、B2C、C2C、B2M四類模式。 Business Background Tips. Answer the following questions according to the text.1. What are the “e-business” activities apart from selling products?2. What kind of environment is created by “e-business”?3. How does Dell enable the customers to track the progress of their orders

15、?4. How long does it usually take for a start-up to finally get a dominant position?5. What are the rules of business in the past?Exercises. Tell whether the following statements are true (T) or false (F) according to the text. . Match each word in Column A with the appropriate definition in Column

16、B. . Translate the following sentences into Chinese, paying attention to the italicized words and phrases. . Translate the following sentences into English, using the given words or phrases. Pre-reading Discussion: 1. Do you think that security is critical to e-business? Why?2. What measures can be

17、taken to keep e-business safe and secure? Case Study1 E-business is a powerful tool for business transformation that allows companies to enhance their supply-chain operation, reach new markets, and improve services for customers as well as for suppliers and employees. 2 Traditional network security

18、has focused solely on keeping intruders out using tools such as firewalls. 3 This piecemeal approach is time-consuming, error-prone, and expensive to build and maintain. Emerging technology provides a new role-based access control infrastructure for all of the enterprises e-business applications. E-

19、business Security Issues4 With this infrastructure, developers no longer need to code security features into each application. 5 In addition, a centralized security solution lends greater flexibility to supporting new technologies such as mobile Internet devices, which are expected to proliferate ov

20、er the next few years. Besides controlling access, organizations also need to monitor security events across the enterprise so that suspicious activities can be quickly pinpointed. 6 New monitoring technology lets organizations consolidate data from all their disparate security sensorsfirewalls, ant

21、i-virus software, host systems, and routersand provides a coordinated single image of potential intrusions for effective incident response. New Words Phrases and Expressions Proper Nouns Some Especially Useful Expressions in Business Reading 商務(wù)英語文章特別是英美經(jīng)貿(mào)報(bào)刊中,經(jīng)常會(huì)出現(xiàn)一些固定的具有鮮明特點(diǎn)的表達(dá)方式。例如,在描述國際經(jīng)濟(jì)貿(mào)易發(fā)展?fàn)顩r時(shí),經(jīng)

22、常會(huì)用到下面這些短語或者詞匯:1. 描述經(jīng)濟(jì)貿(mào)易發(fā)展上升趨勢:an increase / to increase; a rise / to rise; a gain / to gain; an upward movement / to go up; a jump / to jump; a peak / to (hit) reach a peak / to peak; a growth / to grow; a hike / to hike; a leap / to leap; a soaring / to soar; a surge in/ to surgeReading Strategies

23、2. 描述經(jīng)濟(jì)貿(mào)易發(fā)展下降趨勢:a dip / to dip; a decline / to decline; a drop / to drop; a decrease / to decrease; a collapse / to collapse; a cut / to cut; a downward movement / go down; a fall off / to fall off; a leveling off / to level off; a low point / to reach a low point; a slip in / to slip off; a slump i

24、n / to slump; a slide / to slide 3. 表示經(jīng)濟(jì)貿(mào)易發(fā)展趨勢平穩(wěn):hardly move; hover about在預(yù)測國際經(jīng)濟(jì)貿(mào)易發(fā)展趨勢的可能性時(shí),通常有三種情況:1. 肯定:is bound to; is certain to; is about to; will certainly; will surely; will definitely; will no doubt2. 可能性比較大:is likely to; should; would; will probably3. 只有一般可能性:may; will possibly; might; coul

25、d . Fill in the blanks without referring to the original text. Then check your answers against the text. . Tell whether the following statements are true (T) or false (F) according to the text.1.Its impossible to make use of the e-business applications if e-business security is not guaranteed.2. Org

26、anizations can simply use tools such as firewalls to keep intruders out in e-business.3. The new role-based access control infrastructure makes the online shopping safe and secure.4.By controlling access, organizations can quickly pinpoint suspicious activities.5. Firewalls, anti-virus software, hos

27、t systems, and routers, though totally different from each other, all belong to security sensors. Exercises. Fill in the blanks with the words given below. Change the form where necessary. . Translate the following sentences into Chinese, paying attention to the italicized words and phrases. . Trans

28、late the following sentences into English, using the given words and phrases. Section C Business WritingElectronic mail, which is often abbreviated to e-mail, email, or simply mail, is one of the greatest inventions of this age. It has been influencing the way people communicate to a great degree. A

29、t the click of a button, you can send an e-mail in seconds. Compared with the traditional ways of communication, it is not only quicker and easier to send and receive, but also cheaper. Therefore, it is widely used in business as well as in daily communication. E-mailsI. the Basic Form of E-mail (電子郵件基本格式) The writing of e-mails is similar to that of traditional letters, except that the former is sent through Internet. An e-mail is usually made up of two par

溫馨提示

  • 1. 本站所有資源如無特殊說明,都需要本地電腦安裝OFFICE2007和PDF閱讀器。圖紙軟件為CAD,CAXA,PROE,UG,SolidWorks等.壓縮文件請(qǐng)下載最新的WinRAR軟件解壓。
  • 2. 本站的文檔不包含任何第三方提供的附件圖紙等,如果需要附件,請(qǐng)聯(lián)系上傳者。文件的所有權(quán)益歸上傳用戶所有。
  • 3. 本站RAR壓縮包中若帶圖紙,網(wǎng)頁內(nèi)容里面會(huì)有圖紙預(yù)覽,若沒有圖紙預(yù)覽就沒有圖紙。
  • 4. 未經(jīng)權(quán)益所有人同意不得將文件中的內(nèi)容挪作商業(yè)或盈利用途。
  • 5. 人人文庫網(wǎng)僅提供信息存儲(chǔ)空間,僅對(duì)用戶上傳內(nèi)容的表現(xiàn)方式做保護(hù)處理,對(duì)用戶上傳分享的文檔內(nèi)容本身不做任何修改或編輯,并不能對(duì)任何下載內(nèi)容負(fù)責(zé)。
  • 6. 下載文件中如有侵權(quán)或不適當(dāng)內(nèi)容,請(qǐng)與我們聯(lián)系,我們立即糾正。
  • 7. 本站不保證下載資源的準(zhǔn)確性、安全性和完整性, 同時(shí)也不承擔(dān)用戶因使用這些下載資源對(duì)自己和他人造成任何形式的傷害或損失。

最新文檔

評(píng)論

0/150

提交評(píng)論