职称英语考试

切换辅导
您的位置:正保会计网校 301 Moved Permanently

301 Moved Permanently


nginx
 > 正文

2010职称英语考前每日一练[理工类A级-第22期]

2010-01-18 16:28 来源:外语教育网 打印 | 收藏 |
字号

| |

  阅读理解题

  第一篇

Valuing childhood

  The value of childhood is easily blurred(变得模糊不清)in today world.Consider some recent developments:The child.murderers in the Jonesboro, Ark.schoolyard shooting case were convicted and sentenced.Two boys,7 and 8,were charged in the murder of an 11-year-old girl in Chicago.

  Children who commit horrible crimes appear to act of their own will.Yet, as 1egal proceedings in Jonesboro showed,the one.boy who was able to address the court couldn't begin to explain his acts.though he tried to apologize.There may have been a motive-youthful jealousy(妒忌)and resentment.But a deeper question remains:Why did these boys and others in similar trouble apparently 1ack any inner, moral restraint?

  That question echoes for the accused in Chicago,young as they are.They wanted the girl's bicycle,a selfish impulse common enough among kids.

  Redemption(拯救)is a practical necessity.How can value be restored to young lives distorted(扭曲)by acts of violence? The boys in Jonesboro and in Chicago will be confined in institutions for a relatively short time.Despite horror at what was done.children are not-cannot be-dealt with as adults.not if a people wants to consider itself civilized.That's why politicians' cries for adult treatment of youthful criminals ultimately miss the point.

  But the moral void(真空)that invites violence has many sources . Family instability(不稳定)contributes.So does economic stress.That void,however, can be filled.The work starts with parents,who have to ask themselves whether they're doing enough to give their children a firm sense of right and wrong.Are they really monitoring their activities and their developing processes of thought?

  Schools,too,have a role in building character.So do youth organizations.So do law enforcement agencies,which can do more to inform the young about laws,their meaning,and their observance(遵守).

  The goal, ultimately, is to allow all children a normal passage from childhood to.adulthood(成年),so that tragic gaps in moral judgement am less likely to occur. The relative few who fill such gaps with acts of violence hint at many others who don't go that far, but who lack the moral foundations childhood should provide-and which progressive human society relies on.

  1 The two boys in Chicago were

  A shot.

  B murdered.

  C accused.

  D sentenced.

  2 The boys in Jonesboro and Chicago apparently lacked a sense of

  A right and wrong.

  B discipline.

  C shame.

  D safety.

  3 According to politicians,when children commit crimes,they should be treated in the same way as

  A murderers.

  B criminals.

  C victims.

  D adults.

  4 Which of the following does the writer cite as a source of moral void?

  A Official corruption.

  B Social injustice.

  C Family instability.

  D Racial discrimination

  5 Which of the statements is NOT true according to this passage?

  A Parents should strengthen moral instruction.

  B Schools should help create a moral sense in children.

  C Law enforcement agencies should do more to help children understand laws.

  D Youth organizations play no role in building character

  第二篇

Hacking

  People tend to think of computers as isolated machines, working away all by themselves. Some do -- personal computer without an outside link, like someone's hideaway (隐蔽的) cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community m local, national and even global network joined by telephone connections.

  The computer network is a creation of the electric age, but it is based on old-fashioned trust. It cannot work without trust. A rogue loose (为所欲为的无赖 in a computer system called hacker (黑客) is worse than a thief entering your house. He could go through anyone's electronic mail or add to, change, distort or delete anything in the information stored in the computer's memory. He could even take control of the entire system by placing his own instructions in the software that runs it. He could shut the computer down whenever he wished, and no one could stop him. Then he could program the computer to erase any sign of his ever having been there.

  Hacking, our electronic-age term for computer break-in, is more and more in the news- brainy kids vandalizing university records, even pranking (胡闹) about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from payroll (工资表) files. A student sends out a "virus", a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network m thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Spoiling a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to toughen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication m the main reason for using computers in the first place.

  6 The writer mentions "a thief" in the second paragraph

  A to show that a hacker is more dangerous than a thief.

  B to tell people that thieves like to steal computers nowadays.

  C to demand that a protective computer system should be set up against thieves

  D to demonstrate that hackers and thieves are the same people.

  7 The word "vandalizing" in Line 17 means

  A "stealing".

  B "creating".

  C "destroying".

  D "updating".

  8 According to the passage, which of the following statements is NOT true?

  A Hacking is also known as computer break-in.

  B Experts on computer networks consider hacking nothing serious.

  C Hacking is a widespread concern.

  D Hacking is potentially disastrous.

  9 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker?

  A Deleting information in the computer's memory.

  B Shutting down the computer whenever he wishes.

  C Entering your house to steal.

  D Spoiling a system for air traffic.

  10 One of the reasons why business or government has not taken tough measures to stop hacking is that

  A it will cause fear among the public.

  B hacking has not caused much damage.

  C tough measures are illegal.

  D communication may be interrupted.

  第三篇

Space-Age Archeology

  It's a strange partnership, but a very effective one: Satellites and space-shuttle-carried radar are helping archeologists. How? By "seeing" through sand or through treetops to locate important archeological sites.

  The traditional tools of archeologists are shovels and picks. But high technology is making the archeologist's work and time far more productive.

  Take, for example, the second 1981 flight of the Space Shuttle Challenger. During that mission, a powerful, experimental radar was pointed at a lifeless stretch of desert in Egypt called the Selima Sand Sheet (part of the Sahara Desert). To everyone's surprise, the radar penetrated through the sand to the harder rock beneath. On the surface, there is a little indication that Africa's Sahara Desert was never anything but a desert. When the archeologists studied the radar images, they saw what seemed to be impossible: there was sand-buried landscape that was shaped by flowing water; traces of ancient riverbeds appeared to be over nine miles wide, far wider than most sections of the present-day Nile River. Today, the area is one of the hottest, driest desert in the world.

  Archeologists dug pits along the old river banks and found clues to the past: stream-rounded pebbles (鹅卵石), Stone-Age axes, broken ostrich (鸵鸟) eggshells, and the shells of land snails. The archeologists were quite pleased with these findings. For years, they'd been finding stone axes scattered through the desert, and couldn't understand why. Now we know that early humans were living on the banks of old rivers, and left their beautiful tools behind. Some are so sharp that you could shave with them.

  More recently, Landsat 4, a special Earth-mapping satellite, aided in the discovery of ancient Mayan ruins in Mexico. Landsat can, with the help of false-color imagery, "see through" much of the area. Armed with these maps, a five-person expedition took to the air in a helicopter.

  By the end of the second day, the team found a stretch of walled fields that expedition members said look like "old New England fences". They just go on, non-stop, for 40 miles. Later in the week, an ancient village was pinpointed, as was the "lost" city of Oxpemul, once found in the early 1930's but quickly reclaimed by the jungle. The findings made them able to map the extent of the Mayan civilization in about five days. Working

  on foot, it would have taken at least 100 years.

  11 With the help of the space-shuttle-carried radar, archeologists found

  A a new stretch of the Sahara desert.

  B traces of ancient riverbeds under the Sahara Desert.

  C some traditional archeological tools in the Sahara Desert.

  D a mountain beneath the Sahara Desert.

  12 Which of the following is true of the sand-buried landscape?

  A It was an old avenue.

  B It was an underground river.

  C It was shaped by flowing water.

  D It was shaped by the old Nile River.

  13 The stream-rounded pebbles and Stone-Age axes which were found along the ancient river banks show that

  A an early human civilization once existed along the old river banks.

  B ancient people didn't know how to make weapons.

  C most species of animals in Sahara have disappeared.

  D early humans were good at fighting with sharp weapons.

  14 "They" in the second line of the last paragraph refers to

  A old New England fences.

  B the stretch of walled fields.

  C the expedition members.

  D ancient villages.

  15 Which of the following best summarizes the main information of the passage?

  A High-tech helps locate many fascinating archeological sites.

  B Without high-tech, the archeologist's work would come to a stop

  C High-tech is has taken the place of shovels and picks.

  D High-tech makes the archeologist's work more fruitful.

  【参考答案

  1.C  2. A 3. D  4. C  5. D

  6. A  7. C  8. B  9. C  10. D

  11. B  12. C 13. A 14. B 15. D

责任编辑:杜楠
职称英语报考指南
更多 >
会 搜

学员:chuhero 感谢周涵老师,职称英语过了。我觉得应该在这里跟老师说声谢谢,老师的讲课很实用,针对性强,是很有学习价值的课程,如果你想通过职称英语考试,就听周老师的课程吧。

学员:王仁芝 我去年7月开始差不多从零学起,坚持到考试,考了72分,十分感谢老师及网校的辅导!

学员:lilizhangx 职称英语通过了!毕业10年了,没怎么接触英语,跟着周涵老师学习,一次通过!

学员:张洪杰 首先感谢周涵老师,好多年没有学习了,经过老师的讲解顺利过关,这已经出乎我的预料,真的很激动,终于没让老师们失望,通过了,很高兴。

学员:xsqxxlxzj 十多年没有学习过英语了,通过职业培训教育网3个多月的学习,83分通过职称英语综合C级考试,非常感谢周涵老师,谢谢您!

学员:best888zhou 毕业以后就没有翻过英语了,丢了有七年了,虽然以前基础还不错,但这次真的是没有信心,过年后开始复习,用了差不多一个月的时间,B级综合考了80分,很开心,谢谢周涵老师的细致讲解!

版权声明

1、凡本网注明“来源:正保会计网校”的所有作品,版权均属正保会计网校所有,未经本网授权不得转载、链接、转贴或以其他方式使用;已经本网授权的,应在授权范围内使用,且必须注明“来源:正保会计网校”。违反上述声明者,本网将追究其法律责任。

2、本网部分资料为网上搜集转载,均尽力标明作者和出处。对于本网刊载作品涉及版权等问题的,请作者与本网站联系,本网站核实确认后会尽快予以处理。
  本网转载之作品,并不意味着认同该作品的观点或真实性。如其他媒体、网站或个人转载使用,请与著作权人联系,并自负法律责任。

3、本网站欢迎积极投稿

4、联系方式:

编辑信箱:tougao@chinaacc.com

电话:010-82319999-2110

Copyright © 2000 - 2024 www.chinaacc.com All Rights Reserved. 北京正保会计科技有限公司 版权所有

京B2-20200959 京ICP备20012371号-7 出版物经营许可证 京公网安备 11010802044457号