Skimming and scanning are two sub-skills of reading. Identify which sub-skill is being applied for the two tasks given below: (i) Teacher asks students to answer factual questions using the information in each chapter. (ii) Teacher asks students to summarise the plot of a novel by reading the main headings in each chapter.

Skimming and scanning are two sub-skills of reading. Identify which sub-skill is being applied for the two tasks given below: (i) Teacher asks students to answer factual questions using the information in each chapter. (ii) Teacher asks students to summarise the plot of a novel by reading the main headings in each chapter. Correct Answer <span style="">(i) is scanning (ii) is skimming</span>

Reading sub-skill refers to the well-planned reading approach which helps the learners to comprehend and perceive the meaning of the text effectively. There are different kinds of reading sub-skill such as skimming, scanning, intensive reading, extensive reading, etc.

Key Points

Scanning:

  • It involves quickly glancing through the text to find out specific desired information. It is used when looking into a dictionary, invoices, catalogs, etc.
  • It involves going through a text in search of a specific piece of information; such as searching for a specific name, date, word, phrase, figures, or percentage.
  • For example, The teacher asks students to answer factual questions by finding and using the specific information in each chapter.

Skimming:

  • Skimming is one of the reading techniques which focuses on reading rapidly to get the overall idea or the gist of the text.
  • It involves one going through the text to get the central idea. All the insignificant words are avoided and the focus is on the meaning-bearing elements.
  • For example, The teacher asks students to summarise the plot to get the gist of the novel by reading the main headings in each chapter.

Hence, it is clear that (i) task is scanning and (ii) task is skimming.

Additional Information

  • Intensive is a reading strategy that focuses on gaining a deeper and better understanding of the text and enhancing reading comprehension and critical thinking skills.
  • Extensive is a reading strategy that focuses on reading for pleasure/joy and overall understanding of the text. It is not done for finding our minute details rather it involves reading longer texts for pleasure. 

Related Questions

In the question below, are given a statement followed by three courses of actions numbered I, II and III. On the basis of the information given, you have to assume everything in the statement to be true, and then decide which of the suggested course of action logically follow (s) for pursuing. Statement: The India Risk Survey 2017 report ranks 'Information & Cyber Insecurity' as the biggest risk facing Indian companies. Indian organizations, both public and private, had witnessed over 27,000 incidents of security threat, from January 2017 till June 2017 alone. Phishing, scanning/probing, website intrusions and defacements, virus/malicious code, ransomware, Denial of Service attacks, and data breaches are some ways in which hackers attack business websites, which can cause operational disruptions and potentially steal sensitive information. Small and medium businesses (SMBs), unfortunately, have been seeing rising incidences of cybercrime. In fact, 70 percent of cyberattacks occur at organizations with lesser than 100 employees  Courses of action: I. Mandate basic security practices and policies for all employees, such as 2-factor authentication, internet use guidelines and create and enforce rules on handling and protecting sensitive data. Conduct frequent training to sensitize employees about opening suspicious emails, encrypting their data, using strong passwords on their devices, installing security apps, and limiting activity over public Wi-Fi. Implement and enforce incident reporting to help ensure that even the smallest breach is report to management as well as the IT teams. II. Basics still matter and are some of the best defenses against viruses, malware, and other online threats. Assess the assets that are most at risk - data, servers, network - and ensure that the systems are updated with the latest security software, web browser, and operating system. Implement firewall security and run antivirus software after each update.  III. Ensure regular backup of all critical data - whether stored in-house or on the cloud. Run scheduled attack drills and stress tests to identify vulnerabilities and ensure that data restoration and business continuity are executed as planned.