8.3.2.1.19.4: Analyzing an Introduction
- Page ID
- 21497
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\( \newcommand{\id}{\mathrm{id}}\) \( \newcommand{\Span}{\mathrm{span}}\)
( \newcommand{\kernel}{\mathrm{null}\,}\) \( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\) \( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\) \( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\id}{\mathrm{id}}\)
\( \newcommand{\Span}{\mathrm{span}}\)
\( \newcommand{\kernel}{\mathrm{null}\,}\)
\( \newcommand{\range}{\mathrm{range}\,}\)
\( \newcommand{\RealPart}{\mathrm{Re}}\)
\( \newcommand{\ImaginaryPart}{\mathrm{Im}}\)
\( \newcommand{\Argument}{\mathrm{Arg}}\)
\( \newcommand{\norm}[1]{\| #1 \|}\)
\( \newcommand{\inner}[2]{\langle #1, #2 \rangle}\)
\( \newcommand{\Span}{\mathrm{span}}\) \( \newcommand{\AA}{\unicode[.8,0]{x212B}}\)
\( \newcommand{\vectorA}[1]{\vec{#1}} % arrow\)
\( \newcommand{\vectorAt}[1]{\vec{\text{#1}}} % arrow\)
\( \newcommand{\vectorB}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vectorC}[1]{\textbf{#1}} \)
\( \newcommand{\vectorD}[1]{\overrightarrow{#1}} \)
\( \newcommand{\vectorDt}[1]{\overrightarrow{\text{#1}}} \)
\( \newcommand{\vectE}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash{\mathbf {#1}}}} \)
\( \newcommand{\vecs}[1]{\overset { \scriptstyle \rightharpoonup} {\mathbf{#1}} } \)
\( \newcommand{\vecd}[1]{\overset{-\!-\!\rightharpoonup}{\vphantom{a}\smash {#1}}} \)
\(\newcommand{\avec}{\mathbf a}\) \(\newcommand{\bvec}{\mathbf b}\) \(\newcommand{\cvec}{\mathbf c}\) \(\newcommand{\dvec}{\mathbf d}\) \(\newcommand{\dtil}{\widetilde{\mathbf d}}\) \(\newcommand{\evec}{\mathbf e}\) \(\newcommand{\fvec}{\mathbf f}\) \(\newcommand{\nvec}{\mathbf n}\) \(\newcommand{\pvec}{\mathbf p}\) \(\newcommand{\qvec}{\mathbf q}\) \(\newcommand{\svec}{\mathbf s}\) \(\newcommand{\tvec}{\mathbf t}\) \(\newcommand{\uvec}{\mathbf u}\) \(\newcommand{\vvec}{\mathbf v}\) \(\newcommand{\wvec}{\mathbf w}\) \(\newcommand{\xvec}{\mathbf x}\) \(\newcommand{\yvec}{\mathbf y}\) \(\newcommand{\zvec}{\mathbf z}\) \(\newcommand{\rvec}{\mathbf r}\) \(\newcommand{\mvec}{\mathbf m}\) \(\newcommand{\zerovec}{\mathbf 0}\) \(\newcommand{\onevec}{\mathbf 1}\) \(\newcommand{\real}{\mathbb R}\) \(\newcommand{\twovec}[2]{\left[\begin{array}{r}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\ctwovec}[2]{\left[\begin{array}{c}#1 \\ #2 \end{array}\right]}\) \(\newcommand{\threevec}[3]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\cthreevec}[3]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \end{array}\right]}\) \(\newcommand{\fourvec}[4]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\cfourvec}[4]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \end{array}\right]}\) \(\newcommand{\fivevec}[5]{\left[\begin{array}{r}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\cfivevec}[5]{\left[\begin{array}{c}#1 \\ #2 \\ #3 \\ #4 \\ #5 \\ \end{array}\right]}\) \(\newcommand{\mattwo}[4]{\left[\begin{array}{rr}#1 \amp #2 \\ #3 \amp #4 \\ \end{array}\right]}\) \(\newcommand{\laspan}[1]{\text{Span}\{#1\}}\) \(\newcommand{\bcal}{\cal B}\) \(\newcommand{\ccal}{\cal C}\) \(\newcommand{\scal}{\cal S}\) \(\newcommand{\wcal}{\cal W}\) \(\newcommand{\ecal}{\cal E}\) \(\newcommand{\coords}[2]{\left\{#1\right\}_{#2}}\) \(\newcommand{\gray}[1]{\color{gray}{#1}}\) \(\newcommand{\lgray}[1]{\color{lightgray}{#1}}\) \(\newcommand{\rank}{\operatorname{rank}}\) \(\newcommand{\row}{\text{Row}}\) \(\newcommand{\col}{\text{Col}}\) \(\renewcommand{\row}{\text{Row}}\) \(\newcommand{\nul}{\text{Nul}}\) \(\newcommand{\var}{\text{Var}}\) \(\newcommand{\corr}{\text{corr}}\) \(\newcommand{\len}[1]{\left|#1\right|}\) \(\newcommand{\bbar}{\overline{\bvec}}\) \(\newcommand{\bhat}{\widehat{\bvec}}\) \(\newcommand{\bperp}{\bvec^\perp}\) \(\newcommand{\xhat}{\widehat{\xvec}}\) \(\newcommand{\vhat}{\widehat{\vvec}}\) \(\newcommand{\uhat}{\widehat{\uvec}}\) \(\newcommand{\what}{\widehat{\wvec}}\) \(\newcommand{\Sighat}{\widehat{\Sigma}}\) \(\newcommand{\lt}{<}\) \(\newcommand{\gt}{>}\) \(\newcommand{\amp}{&}\) \(\definecolor{fillinmathshade}{gray}{0.9}\)Learning Objectives
-
See what a full introduction section looks like.
-
Distinguish among the six parts of an introduction.
Thus far, this chapter has focused on how to create a clear introduction. We discussed why introductions are important and the six important functions of effective introductions. In this section we’re going to examine an actual introduction to a speech. Before we start analyzing the introduction, please read the introduction paragraph that follows.
Smart Dust Introduction
In 2002, the famed science fiction writer Michael Crichton released his
book Prey, which was about a swarm of nanomachines that were feeding off living tissue. The nanomachines were solar-powered, self-sufficient, and intelligent. Most disturbingly, the nanomachines could work together as a swarm as it overtook and killed its prey in its need for new resources. The technology for this level of sophistication in nanotechnology is surprisingly more science fact than science fiction. In 2000, three professors of Electrical Engineering and Computer Science at the University of California at Berkeley, Professors Kahn, Katz, and Pister, hypothesized in the Journal of Communications and Networks that wireless networks of tiny microelectromechanical sensors, or MEMS: sensors, robots, or devices could detect phenomena including light, temperature, or vibration. By
2004, Fortune Magazine listed “smart dust” as the first in their “Top 10 Tech Trends to Bet On.” Thus far researchers have hypothesized that smart dust could be used for everything from tracking patients in hospitals to early warnings of natural disasters and as a defense against bioterrorism. Today I’m going to explain what smart dust is and the various applications smart dust has in the near future. To help us understand the small of it all, we will first examine what smart dust is and how it works, we will then examine some military applications of smart dust, and we will end by discussing some
nonmilitary applications of smart dust.
Now that you’ve had a chance to read the introduction to the speech on smart dust, read it over a second time and look for the six parts of the speech introduction as discussed earlier in this chapter. Once you’re done analyzing this introduction, Table 9.2 "Smart Dust Introduction" shows you how the speech was broken down into the various parts of an introduction.
Table 9.2 Smart Dust Introduction
Part of Introduction |
Analysis |
In 2002, famed science fiction writer, Michael Crichton, released his |
Attention-Getter |
This attention-getter is using an anecdote derived from a best- selling novel. |
|
The technology for this level of sophistication in nanotechnology is surprisingly more science fact than science fiction. In 2000, three professors of Electrical Engineering and Computer Science at the University of California at Berkeley, professors Kahn, Katz, and Pister, hypothesized in the Journal of Communications and Networks that wireless networks of tiny microelectromechanical sensors, or MEMS: sensors, robots, or devices could detect phenomena including light, temperature, or vibration. |
Link to Topic |
This link to topic shows how the book Prey is actually very close to what scientists are attempting to accomplish. |
|
By 2004, Fortune Magazine listed “smart dust” as the first in their “Top 10 Tech Trends to Bet On.” Thus far researchers have hypothesized that smart dust could be used for everything from tracking patients in hospitals to early warnings of natural disasters and as a defense against bioterrorism. |
Reasons to Listen |
In this section, the speaker indicates that business professionals have already recognized smart dust as a good economic investment with various applications. |
|
“Professors Kahn, Katz, and Pister hypothesized in the Journal of Communications and Networks” “By 2004 Fortune Magazine listed” |
Espousal of Credibility |
Notice the inclusion of research from both theJournal of Communications and |
|
Today I’m going to explain what smart dust is and the various applications smart dust has in the near future. |
Thesis Statement |
This thesis statement clearly indicates that this is an informative speech because it does not attempt to build an argument or share a specific opinion. |
|
To help us understand the small of it all, we will first examine what smart dust is and how it works, we will then examine some military applications of smart dust, and we will end by discussing some nonmilitary applications of smart dust. |
Preview |
This preview clearly indicates three body points that will be discussed in the speech. |
Need More Speech Examples?
The following YouTube videos will show you a wide range of different speeches. While watching these videos, ask yourself the following questions: How have they utilized various attention-getting devices? Have they clearly used all aspects of an introduction? Do they have a strong thesis and preview? How could you have made the introduction stronger?
Animal Experimentation
http://www.youtube.com/watch?v=c4yYDt4di0o
Life after Having a Child
http://www.youtube.com/watch?v=e7-DhSLsk1U
Pros and Cons of Cholesterolhttp://www.youtube.com/watch?v=k7VIOs6aiAc
On Being a Hero
http://www.youtube.com/watch?v=KYtm8uEo5vU
LASIK Eye Surgery
http://www.youtube.com/watch?v=Z0YWy8CXoYk