2010年12月英语四级全真预测试卷及答案解析(5)
请考生注意时间,本份试卷考试时间是:0分钟,请把握好自己的考试时间,以便应对真正的考场。
请先登录才能考试! 考生登录
简答题(共5题。)。
2010年12月大学英语四级考试全真预测试卷五
Part I Writing (30 minutes)
Directions: For this part, you are allowed 30 minutes to write a composition on the topic: To Be a Small Fish in a Big Pond or a Big Fish in a Small Pond? You should write at least 120 words following the outline given below in Chinese:
1. 在大企业工作的特点
2. 在小企业工作的特点
3. 我的选择
To Be a Small Fish in a Big Pond or a Big Fish in a Small Pond? (本题0 分)
Part I Writing (30 minutes)
Directions: For this part, you are allowed 30 minutes to write a composition on the topic: To Be a Small Fish in a Big Pond or a Big Fish in a Small Pond? You should write at least 120 words following the outline given below in Chinese:
1. 在大企业工作的特点
2. 在小企业工作的特点
3. 我的选择
To Be a Small Fish in a Big Pond or a Big Fish in a Small Pond? (本题0 分)
请填写答案:
请先登录才能答题
请先登录才能答题
Part II Reading Comprehension (Skimming and Scanning) (15minutes)
Directions: In this part, you will have 15 minutes to go over the passage quickly and answer the questions on Answer Sheet 1. For questions 1-7, mark
Y (for YES) if the statement agrees with the information given in the passage;
N (for NO) if the statement contradicts the information given in the passage;
NG (for NOT GIVEN) if the information is not given in the passage.
For questions 8-10, complete the sentences with the information given in the passage.
To Save Trees, Fighting One Alien Insect with Others
Rusty rhea sighs wistfully as he talks about the beauty and peace of standing amid a grove (小树林) of deep green hemlocks in Appalachia, some of them up to 160 feet (50 meters) tall and more than 500 years old.
"This is a very special tree," said Rhea, an entomologist for the U.S. Forest Service's Forest Health Protection program in Asheville, North Carolina, "I was brought up here, and I don't want to see another species go by the wayside."
The evergreen trees, a hallmark of southern Appalachia's national parks, are under attack by an invasive inse4ct barely visible to the eye but potent enough to fell the giants of the eastern United States' old-growth forests.
Already the tiny bug from Japan, known as the hemlock woolly adelgid (HWA), has killed upward of 95 percent of the hemlocks in Virginia's Shenandoah National Park. Now they are making their way through the half-million-plus-acre (200,000-plus-hectare) Great Smoky Mountains National Park in North Carolina and Tennessee.
The hemlocks shade streams, keeping water temperatures just right for brook trout (鲑鱼) and other fish. They also house birds such as the black-throated green warbler, solitary vireo, and northern goshawk, all three of which mainly shelter in stands of hemlock trees.
Because of the insect's broad impact on the entire ecosystem of southern Appalachia, HWA stands to cause wider damage than the American chestnut blight (枯萎病)of the early 1900s. That fungus from Europe killed off the once dominant chestnut trees from the northeast United States to the southern Appalachian Mountains.
In addition, a species related to HWA, the balsam woolly adelgid, has already killed about 90 percent of the mature Fraser fir trees in the Smokies.
Acting Quickly
HWA arrived in the U.S. Pacific Northwest via nursery plants from Japan in 1924. By 1951 the tiny invader had been found in Virginia. Since then the insect has spread to more than 15 U.S. states.
The key to killing the HWA is to catch it early and act quickly. It's already well established in the Great Smoky Mountains, where Rhea and others are trying to stem the spread of the bugs.
HWA multiply quickly: All of the insects are females that reproduce asexually (无性地), laying several hundred eggs a year. When they get to the nymph, or crawler, stage, they are dormant from about June until October, after which they emerge and establish themselves on trees.
Winds and birds and other animals spread the crawlers through the forest.
HWA crawlers feed on the new growth of hemlocks by piercing the twigs that hold the branches, sucking the sap, and injecting toxic saliva. The needles turn from a deep green to a grayish green and eventually die, depriving the tree of nutrition from photosynthesis.
An infected tree usually dies within five years of initial attack. Infection is signaled by either a white, cottonlike material that appears along a tree's twigs or by the "baldness" of a tree's upper branches.
Plans of Attack
In the Pacific Northwest the hemlocks seem to be tolerant of the creatures' feeding, and in the cold northeast, winters seem to keep them at bay. But in the warm southeast, with weather approximating that of the insects' native Asian homes, they thrive.
Chemical sprays-such as insecticidal soaps and horticultural oils as well as trunk or soil injections-have helped to kill some of the HWA infestations.
But spraying must be repeated every six months, and injections are expensive and last only two years at most. These methods can't be used conveniently or safely in remote areas or near the streams where hemlocks grow thickly.
Long term, the best way to control the pests appears to be releasing other insects that feed exclusively on HWA. Scientists have studied HWA in Japan and China and identified three such species. One of them, the Sasajiscymnus tsugae (St) beetle, was released in areas of Great Smoky Mountains National Park in 2002.
Studying what controls a species in its native habitat-including climate, predators, and host resistance-provided clues about which insects to use against HWA, said Kristine Johnson. Based in Gatlinburg, Tennessee, Johnson is a supervisory forester for Great Smoky Mountains National Park.
"Biological control is the only long-term hope to save the trees in the backcountry (穷乡僻壤)," she said. "We have 800 square miles (2,100 square kilometers) of contiguous wilderness. We value the native forest, and it's entirely worth defending."
Risky Business
Releasing one species of non-native bug to kill another could be risky business, potentially creating another type of infestation. But scientists first quarantined and studied the HWA-killer insects.
They believe the St beetles are the best answer to the HWA problem and that they won't cause side damage. This tiny black female beetle, the size of a poppy seed, is already spreading in the Great Smoky Mountains.
But the beetle and other HWA-killer insects are seasonal, so it will take several different ones operating year-round to keep HWA in check, Rhea said. He doesn't believe HWA will be completely eradicated (根除) but will instead be kept in balance by the predator insects. "We're trying to insert a balance in a system that's out of balance," he said.
Each St beetle can lay 200 to 300 eggs, said Ernest Bernard, professor of entomology at the University of Tennessee in Knoxville.
Bernard's laboratory is one of several that are breeding the beetles.
"Each beetle eats hundreds of baby adelgids a year," he said. And about 120,000 of the beetles have been released in the past couple years in the Smokies, but it is still too early to measure their impact.
One good sign, Bernard said, is that some beetle larvae (幼虫) have been found in areas where they were not released, indicating that the HWA killers may be reproducing and spreading.
1. The passage gives a general description of an invasive insect, HWA.
2. Hemlock is a hallmark of southern Appalachia's national parks.
3. The invasive insect, known as the hemlock woolly adelgid (HWA), is from Japan.
4. The key to killing the HWA is to catch it early and act quickly.
5. An infected tree usually dies immediately.
6. The Hemlock in the U.S. will be saved from HWA soon.
7. The long term, best way to control the pests HWA is spraying.
8. Since 1951 the HWA has spread to more than________.
9. Releasing one species of non-native bug to kill another could create________.
10. It will take several different insects operating year-round to________. (本题0 分)
Directions: In this part, you will have 15 minutes to go over the passage quickly and answer the questions on Answer Sheet 1. For questions 1-7, mark
Y (for YES) if the statement agrees with the information given in the passage;
N (for NO) if the statement contradicts the information given in the passage;
NG (for NOT GIVEN) if the information is not given in the passage.
For questions 8-10, complete the sentences with the information given in the passage.
To Save Trees, Fighting One Alien Insect with Others
Rusty rhea sighs wistfully as he talks about the beauty and peace of standing amid a grove (小树林) of deep green hemlocks in Appalachia, some of them up to 160 feet (50 meters) tall and more than 500 years old.
"This is a very special tree," said Rhea, an entomologist for the U.S. Forest Service's Forest Health Protection program in Asheville, North Carolina, "I was brought up here, and I don't want to see another species go by the wayside."
The evergreen trees, a hallmark of southern Appalachia's national parks, are under attack by an invasive inse4ct barely visible to the eye but potent enough to fell the giants of the eastern United States' old-growth forests.
Already the tiny bug from Japan, known as the hemlock woolly adelgid (HWA), has killed upward of 95 percent of the hemlocks in Virginia's Shenandoah National Park. Now they are making their way through the half-million-plus-acre (200,000-plus-hectare) Great Smoky Mountains National Park in North Carolina and Tennessee.
The hemlocks shade streams, keeping water temperatures just right for brook trout (鲑鱼) and other fish. They also house birds such as the black-throated green warbler, solitary vireo, and northern goshawk, all three of which mainly shelter in stands of hemlock trees.
Because of the insect's broad impact on the entire ecosystem of southern Appalachia, HWA stands to cause wider damage than the American chestnut blight (枯萎病)of the early 1900s. That fungus from Europe killed off the once dominant chestnut trees from the northeast United States to the southern Appalachian Mountains.
In addition, a species related to HWA, the balsam woolly adelgid, has already killed about 90 percent of the mature Fraser fir trees in the Smokies.
Acting Quickly
HWA arrived in the U.S. Pacific Northwest via nursery plants from Japan in 1924. By 1951 the tiny invader had been found in Virginia. Since then the insect has spread to more than 15 U.S. states.
The key to killing the HWA is to catch it early and act quickly. It's already well established in the Great Smoky Mountains, where Rhea and others are trying to stem the spread of the bugs.
HWA multiply quickly: All of the insects are females that reproduce asexually (无性地), laying several hundred eggs a year. When they get to the nymph, or crawler, stage, they are dormant from about June until October, after which they emerge and establish themselves on trees.
Winds and birds and other animals spread the crawlers through the forest.
HWA crawlers feed on the new growth of hemlocks by piercing the twigs that hold the branches, sucking the sap, and injecting toxic saliva. The needles turn from a deep green to a grayish green and eventually die, depriving the tree of nutrition from photosynthesis.
An infected tree usually dies within five years of initial attack. Infection is signaled by either a white, cottonlike material that appears along a tree's twigs or by the "baldness" of a tree's upper branches.
Plans of Attack
In the Pacific Northwest the hemlocks seem to be tolerant of the creatures' feeding, and in the cold northeast, winters seem to keep them at bay. But in the warm southeast, with weather approximating that of the insects' native Asian homes, they thrive.
Chemical sprays-such as insecticidal soaps and horticultural oils as well as trunk or soil injections-have helped to kill some of the HWA infestations.
But spraying must be repeated every six months, and injections are expensive and last only two years at most. These methods can't be used conveniently or safely in remote areas or near the streams where hemlocks grow thickly.
Long term, the best way to control the pests appears to be releasing other insects that feed exclusively on HWA. Scientists have studied HWA in Japan and China and identified three such species. One of them, the Sasajiscymnus tsugae (St) beetle, was released in areas of Great Smoky Mountains National Park in 2002.
Studying what controls a species in its native habitat-including climate, predators, and host resistance-provided clues about which insects to use against HWA, said Kristine Johnson. Based in Gatlinburg, Tennessee, Johnson is a supervisory forester for Great Smoky Mountains National Park.
"Biological control is the only long-term hope to save the trees in the backcountry (穷乡僻壤)," she said. "We have 800 square miles (2,100 square kilometers) of contiguous wilderness. We value the native forest, and it's entirely worth defending."
Risky Business
Releasing one species of non-native bug to kill another could be risky business, potentially creating another type of infestation. But scientists first quarantined and studied the HWA-killer insects.
They believe the St beetles are the best answer to the HWA problem and that they won't cause side damage. This tiny black female beetle, the size of a poppy seed, is already spreading in the Great Smoky Mountains.
But the beetle and other HWA-killer insects are seasonal, so it will take several different ones operating year-round to keep HWA in check, Rhea said. He doesn't believe HWA will be completely eradicated (根除) but will instead be kept in balance by the predator insects. "We're trying to insert a balance in a system that's out of balance," he said.
Each St beetle can lay 200 to 300 eggs, said Ernest Bernard, professor of entomology at the University of Tennessee in Knoxville.
Bernard's laboratory is one of several that are breeding the beetles.
"Each beetle eats hundreds of baby adelgids a year," he said. And about 120,000 of the beetles have been released in the past couple years in the Smokies, but it is still too early to measure their impact.
One good sign, Bernard said, is that some beetle larvae (幼虫) have been found in areas where they were not released, indicating that the HWA killers may be reproducing and spreading.
1. The passage gives a general description of an invasive insect, HWA.
2. Hemlock is a hallmark of southern Appalachia's national parks.
3. The invasive insect, known as the hemlock woolly adelgid (HWA), is from Japan.
4. The key to killing the HWA is to catch it early and act quickly.
5. An infected tree usually dies immediately.
6. The Hemlock in the U.S. will be saved from HWA soon.
7. The long term, best way to control the pests HWA is spraying.
8. Since 1951 the HWA has spread to more than________.
9. Releasing one species of non-native bug to kill another could create________.
10. It will take several different insects operating year-round to________. (本题0 分)
请填写答案:
请先登录才能答题
请先登录才能答题
Section C
Directions: In this section, you will hear a passage three times. When the passage is read for the first time, you should listen carefully for its general idea. When the passage is read for the second time, you are required to fill in the blanks numbered from 36 to 43 with the exact words you have just heard. For blanks numbered from 44 to 46 you are required to fill in the missing information. For these blank, you can either use the exact words you have just heard or write down the main points in your own words. Finally, when the passage is read for the third time, you should check what you have written.
Scientists have developed a new cancer drug. So far, they have tested it only on (36) ________ animals. The drug is designed to (37) ________ and kill cancer cells but not healthy cells.
First, the drug enters the cancer and destroys the supply of blood. Then it releases (38) ________ to destroy the cancer cells.
Researchers at the Massachusetts Institute of Technology in Cambridge carried out the study. The (39) ________ appeared in Nature (40) ________. A school news release called the drug an "anti-cancer smart bomb."
Ram Sasisekharan is a professor at M.I.T. He says his team had to (41) ________ three problems. They had to find a way to destroy the blood vessels, then to (42) ________ the growth of new ones. But they also needed the blood vessels to supply chemicals to destroy the cancer.
So, the researchers designed a two-part "nanocell". The cell is (43) ________ in nanometers, or one thousand millionth of a meter. (44) ________________________.
The scientists say it was small enough to pass through the blood vessels of the cancer, but it was too big to enter normal blood vessels. The surface of the nanocells also helped them to avoid natural defenses.
(45) ________________________. That cut off the blood supply and trapped the nanocell inside the cancer. Then, the nanocell slowly released chemotherapy drugs to kill the cancer cells.
(46) ________________________. (本题0 分)
Directions: In this section, you will hear a passage three times. When the passage is read for the first time, you should listen carefully for its general idea. When the passage is read for the second time, you are required to fill in the blanks numbered from 36 to 43 with the exact words you have just heard. For blanks numbered from 44 to 46 you are required to fill in the missing information. For these blank, you can either use the exact words you have just heard or write down the main points in your own words. Finally, when the passage is read for the third time, you should check what you have written.
Scientists have developed a new cancer drug. So far, they have tested it only on (36) ________ animals. The drug is designed to (37) ________ and kill cancer cells but not healthy cells.
First, the drug enters the cancer and destroys the supply of blood. Then it releases (38) ________ to destroy the cancer cells.
Researchers at the Massachusetts Institute of Technology in Cambridge carried out the study. The (39) ________ appeared in Nature (40) ________. A school news release called the drug an "anti-cancer smart bomb."
Ram Sasisekharan is a professor at M.I.T. He says his team had to (41) ________ three problems. They had to find a way to destroy the blood vessels, then to (42) ________ the growth of new ones. But they also needed the blood vessels to supply chemicals to destroy the cancer.
So, the researchers designed a two-part "nanocell". The cell is (43) ________ in nanometers, or one thousand millionth of a meter. (44) ________________________.
The scientists say it was small enough to pass through the blood vessels of the cancer, but it was too big to enter normal blood vessels. The surface of the nanocells also helped them to avoid natural defenses.
(45) ________________________. That cut off the blood supply and trapped the nanocell inside the cancer. Then, the nanocell slowly released chemotherapy drugs to kill the cancer cells.
(46) ________________________. (本题0 分)
请填写答案:
请先登录才能答题
请先登录才能答题
Part IV Reading Comprehension (Reading in Depth) (25 minutes)
Section A
Directions: In this section, there is a short passage with 5 questions or incomplete statements. Read the passage carefully. Then answer the questions or complete statements in the fewest possible words. Please write your answers on Answer Sheet 2.
Many of the most damaging and life threatening types of weather-torrential rains, severe thunderstorms, and tornadoes-begin quickly, strike suddenly, and disappear rapidly, destroying small regions while leaving neighboring areas untouched. Such event as a tornado struck the northeastern section of Edmonton, Alberta, in July 1987. Total damages from the tornado exceeded $250 million, the highest ever for any Canadian storm.
Conventional computer models of the atmosphere have limited value in predicting short lived local storms like the Edmonton tornado, because the available weather data are generally not detailed enough to allow computers to study carefully the subtly atmospheric changes that come before these storms. In most nations, for example, weather-balloon observations are taken just once every twelve hours at locations typically separated by hundreds of miles. With such limited data, conventional forecasting models do a much better job predicting general weather conditions over large regions than they do forecasting specific local events.
Until recently, the observation intensive approach needed for accurate, very short-range forecasts, or "Nowcasts", was not feasible. The cost of equipping and operating many thousands of conventional weather stations was extremely high, and the difficulties involved in rapidly collecting and processing the raw weather data from such a network were hard to overcome. Fortunately, scientific and technological advances have overcome most of these problems. Radar systems, automated weather instruments, and satellites are all capable of making detailed, nearly continuous observation over large regions at a relatively low cost. Communications satellites can transmit data around the world cheaply and instantaneously, and modern computers can quickly compile and analyze this large volume of weather information. Meteorologists (气象学者) and computer scientists now work together to design computer programs and video equipment capable of transforming raw weather data into words, symbols, and vivid graphic displays that forecasters can interpret easily and quickly. As meteorologists have begun using these new technologies in weather forecasting offices, Nowcasting is becoming a reality.
47. It can be inferred from the passage that the value of damages from torrential rains, severe thunderstorms and tornadoes is ________________________.
48. Why do conventional models of the atmosphere fail to predict such a short-lived tornado?
___________________________________________________________________________.
49. It can be inferred from the passage that conventional forecasting models are now mostly used for ________________________.
50. What does "Nowcasts" mean according to the passage?
___________________________________________________________________________.
51. According to the passage, what makes "Nowcasting" a reality?
___________________________________________________________________________ (本题0 分)
Section A
Directions: In this section, there is a short passage with 5 questions or incomplete statements. Read the passage carefully. Then answer the questions or complete statements in the fewest possible words. Please write your answers on Answer Sheet 2.
Many of the most damaging and life threatening types of weather-torrential rains, severe thunderstorms, and tornadoes-begin quickly, strike suddenly, and disappear rapidly, destroying small regions while leaving neighboring areas untouched. Such event as a tornado struck the northeastern section of Edmonton, Alberta, in July 1987. Total damages from the tornado exceeded $250 million, the highest ever for any Canadian storm.
Conventional computer models of the atmosphere have limited value in predicting short lived local storms like the Edmonton tornado, because the available weather data are generally not detailed enough to allow computers to study carefully the subtly atmospheric changes that come before these storms. In most nations, for example, weather-balloon observations are taken just once every twelve hours at locations typically separated by hundreds of miles. With such limited data, conventional forecasting models do a much better job predicting general weather conditions over large regions than they do forecasting specific local events.
Until recently, the observation intensive approach needed for accurate, very short-range forecasts, or "Nowcasts", was not feasible. The cost of equipping and operating many thousands of conventional weather stations was extremely high, and the difficulties involved in rapidly collecting and processing the raw weather data from such a network were hard to overcome. Fortunately, scientific and technological advances have overcome most of these problems. Radar systems, automated weather instruments, and satellites are all capable of making detailed, nearly continuous observation over large regions at a relatively low cost. Communications satellites can transmit data around the world cheaply and instantaneously, and modern computers can quickly compile and analyze this large volume of weather information. Meteorologists (气象学者) and computer scientists now work together to design computer programs and video equipment capable of transforming raw weather data into words, symbols, and vivid graphic displays that forecasters can interpret easily and quickly. As meteorologists have begun using these new technologies in weather forecasting offices, Nowcasting is becoming a reality.
47. It can be inferred from the passage that the value of damages from torrential rains, severe thunderstorms and tornadoes is ________________________.
48. Why do conventional models of the atmosphere fail to predict such a short-lived tornado?
___________________________________________________________________________.
49. It can be inferred from the passage that conventional forecasting models are now mostly used for ________________________.
50. What does "Nowcasts" mean according to the passage?
___________________________________________________________________________.
51. According to the passage, what makes "Nowcasting" a reality?
___________________________________________________________________________ (本题0 分)
请填写答案:
请先登录才能答题
请先登录才能答题
Part VI Translation (5 minutes)
Directions: Complete the sentences on Answer Sheet 2 by translating into English the Chinese given in brackets.
82. When the train came, ________________________ (人们立即涌进站台).
83. To open a file and show the information, ________________________(你需要双击文件名).
84. After fifteen years' working for the company, ________________________(他被任命为主管).
85. She works in administration, ________________________(她一天中的绝大多数时间都花在文书工作和维护记录上).
86. Every executive is resp onsible for the success of the company
________________________(无论做什么工作). (本题0 分)
Directions: Complete the sentences on Answer Sheet 2 by translating into English the Chinese given in brackets.
82. When the train came, ________________________ (人们立即涌进站台).
83. To open a file and show the information, ________________________(你需要双击文件名).
84. After fifteen years' working for the company, ________________________(他被任命为主管).
85. She works in administration, ________________________(她一天中的绝大多数时间都花在文书工作和维护记录上).
86. Every executive is resp onsible for the success of the company
________________________(无论做什么工作). (本题0 分)
请填写答案:
请先登录才能答题
请先登录才能答题
单项选择题(下列每小题备选答案中,只有一个符合题意的正确答案。每小题0分,共25题。)
Part III Listening Comprehension (35 minutes)
Section A
Directions: In this section, you will hear 8 short conversations and 2 long conversations. At the end of each conversation, one or more questions will be asked about what was said. Both the conversation and the questions will be spoken only once. After each question there will be a pause. During the pause, you must read the four choices marked [A], [B], [C] and [D], and decide which is the best answer. Then mark the corresponding letter on Answer Sheet 2 with a single line through the centre.
11.
Section A
Directions: In this section, you will hear 8 short conversations and 2 long conversations. At the end of each conversation, one or more questions will be asked about what was said. Both the conversation and the questions will be spoken only once. After each question there will be a pause. During the pause, you must read the four choices marked [A], [B], [C] and [D], and decide which is the best answer. Then mark the corresponding letter on Answer Sheet 2 with a single line through the centre.
11.
A :1016
B :1060
C :508
D :580
B :1060
C :508
D :580
请选择答案:请先登录才能答题
12.
A :Father and daughter.
B :Uncle and niece.
C :Aunt and nephew.
D :Cousins.
B :Uncle and niece.
C :Aunt and nephew.
D :Cousins.
请选择答案:请先登录才能答题
13.
A :She wasn't invited.
B :She wasn't ready to come.
C :She altered her decision.
D :She forgot the invitation.
B :She wasn't ready to come.
C :She altered her decision.
D :She forgot the invitation.
请选择答案:请先登录才能答题
14.
A :The door needs repairing.
B :He had lost all his keys.
C :He couldn't open the door.
D :He wanted the woman to help him.
B :He had lost all his keys.
C :He couldn't open the door.
D :He wanted the woman to help him.
请选择答案:请先登录才能答题
15.
A :She's rather happy to hear so.
B :She's disappointed to hear so.
C :She's unhappy to hear so.
D :She's surprised to hear so.
B :She's disappointed to hear so.
C :She's unhappy to hear so.
D :She's surprised to hear so.
请选择答案:请先登录才能答题
16.
A :He thought it was a good car.
B :He thought it was too noisy.
C :He thought there was something wrong with the car.
D :He didn't like it.
B :He thought it was too noisy.
C :He thought there was something wrong with the car.
D :He didn't like it.
请选择答案:请先登录才能答题
17.
A :In a car.
B :In a train.
C :In a ship.
D :In a plane.
B :In a train.
C :In a ship.
D :In a plane.
请选择答案:请先登录才能答题
18.
A :She'll go to the concert.
B :She'll have a meeting.
C :She'll watch her neighbor's children.
D :She'll visit her neighbor
B :She'll have a meeting.
C :She'll watch her neighbor's children.
D :She'll visit her neighbor
请选择答案:请先登录才能答题
Questions 19 to 22 are based on the conversation you have just heard.
19.
19.
A :The early history of bookbinding.
B :How old books become valuable.
C :Economical ways to protect old books.
D :Why some books decay.
B :How old books become valuable.
C :Economical ways to protect old books.
D :Why some books decay.
请选择答案:请先登录才能答题
20.
A :They are often handled improperly by readers.
B :The paper is destroyed by chemicals.
C :The ink used in printing damages the paper.
D :The glue used in the binding loses its strength.
B :The paper is destroyed by chemicals.
C :The ink used in printing damages the paper.
D :The glue used in the binding loses its strength.
请选择答案:请先登录才能答题
21.
A :They are difficult to read.
B :They are slowly falling apart.
C :They were not made from wood pulp.
D :They should be stored in a cold place.
B :They are slowly falling apart.
C :They were not made from wood pulp.
D :They should be stored in a cold place.
请选择答案:请先登录才能答题
22.
A :Get some books for the man to look at.
B :Ask the man to look over her notes.
C :Continue her research in the library.
D :Find more information on how books are preserved.
B :Ask the man to look over her notes.
C :Continue her research in the library.
D :Find more information on how books are preserved.
请选择答案:请先登录才能答题
Questions 23 to 25 are based on the conversation you have just heard.
23.
23.
A :Which major the woman will be choosing.
B :An anthropology course the woman is taking.
C :How to find a job in publishing.
D :Which anthropology professors the man recommends.
B :An anthropology course the woman is taking.
C :How to find a job in publishing.
D :Which anthropology professors the man recommends.
请选择答案:请先登录才能答题
24.
A :It is not as difficult as she had thought it would be.
B :She would like her professor to explain it more clearly.
C :She took a class on it last semester.
D :Her professor will write a book on it soon.
B :She would like her professor to explain it more clearly.
C :She took a class on it last semester.
D :Her professor will write a book on it soon.
请选择答案:请先登录才能答题
25.
A :Her professor.
B :A classmate.
C :Her former boss.
D :A foreign diplomat.
B :A classmate.
C :Her former boss.
D :A foreign diplomat.
请选择答案:请先登录才能答题
Section B
Directions: In this section, you will hear 3 short passages. At the and of each passage, you will hear some questions Both the passage and the questions will be spoken only once. After you hear a question, you must choose the best answer from the four choices marked [A], [B], [C] and [D]. Then mark the corresponding letter on Answer Sheet 2 with a single line through the center.
Passage One
Questions 26 to 28 are based on the passage you have just heard.
26.
Directions: In this section, you will hear 3 short passages. At the and of each passage, you will hear some questions Both the passage and the questions will be spoken only once. After you hear a question, you must choose the best answer from the four choices marked [A], [B], [C] and [D]. Then mark the corresponding letter on Answer Sheet 2 with a single line through the center.
Passage One
Questions 26 to 28 are based on the passage you have just heard.
26.
A :Because nobody knew his address.
B :Because nobody knew his age.
C :Because Penury's private life was a secret.
D :Because Penury was still a bachelor at the age of forty-five.
B :Because nobody knew his age.
C :Because Penury's private life was a secret.
D :Because Penury was still a bachelor at the age of forty-five.
请选择答案:请先登录才能答题
27.
A :He did not spend money freely.
B :He was always well-dressed.
C :He had a luxurious car.
D :He worked hard for a living.
B :He was always well-dressed.
C :He had a luxurious car.
D :He worked hard for a living.
请选择答案:请先登录才能答题
28.
A :A photographer.
B :A burglar.
C :A reporter.
D :A professor.
B :A burglar.
C :A reporter.
D :A professor.
请选择答案:请先登录才能答题
Passage Two
Questions 29 to 32 are based on the passage you have just heard.
29.
Questions 29 to 32 are based on the passage you have just heard.
29.
A :In 1809.
B :In 1863.
C :In 1865.
D :In 1860.
B :In 1863.
C :In 1865.
D :In 1860.
请选择答案:请先登录才能答题
30.
A :Four years.
B :Five years.
C :Three years.
D :Six years.
B :Five years.
C :Three years.
D :Six years.
请选择答案:请先登录才能答题
31.
A :A soldier.
B :A thief.
C :A government officer.
D :An actor.
B :A thief.
C :A government officer.
D :An actor.
请选择答案:请先登录才能答题
32.
A :Because they didn't like Lincoln being their President.
B :Because they wanted to set up their own government.
C :Because they disagreed with Lincoln on the abolishment of slavery.
D :Because they wanted to stage a war against Lincoln's government.
B :Because they wanted to set up their own government.
C :Because they disagreed with Lincoln on the abolishment of slavery.
D :Because they wanted to stage a war against Lincoln's government.
请选择答案:请先登录才能答题
Passage Three
Questions 33 to 35 are based on the passage you have just heard.
33.
Questions 33 to 35 are based on the passage you have just heard.
33.
A :10 points.
B :2 points.
C :15 points.
D :5 points.
B :2 points.
C :15 points.
D :5 points.
请选择答案:请先登录才能答题
34.
A :They will take one of the six major tests.
B :They will have to write a composition.
C :They will be given a pop test.
D :They will be required to read a short story in class.
B :They will have to write a composition.
C :They will be given a pop test.
D :They will be required to read a short story in class.
请选择答案:请先登录才能答题
35.
A :An essay.
B :A magazine article.
C :A poem.
D :A short story.
B :A magazine article.
C :A poem.
D :A short story.
请选择答案:请先登录才能答题
综合题,请根据题目给出的内容,来回答下面给出的试题。
Section B
Directions: There are 2 passages in this section. Each passage is followed by some questions or unfinished statements. For each of them there are four choices marked [A],[B],[C] and [D]. You should decide on the best choice and mark the corresponding letter on Answer Sheet 2 with a single line through the center.
Passage One
Questions 52 to 56 are based on the following passage.
What makes Americans spend nearly half their food dollars on meals away from home? The answers lie in the way Americans live today. During the first few decades of the twentieth century, canned and other convenience foods freed the family cook from full-time duty at the kitchen range.
Then, in the 1940s, work in the wartime defense plants took more women out of the home that ever before, setting the pattern of the working wife and mother. Unless family members pitch in with food preparation, women are not fully liberated from that chore.
It's easier to pick up a bucket of fried chicken on the way home from work or take the family out for pizzas or burgers than to start opening cans or heating up frozen dinners after a long, hard day. Also nowadays, the rising divorce rate means that there are more single working parents with children to feed. And many young adults and elderly people, as well as unmarried and divorced mature people, live alone rather than as a part of a family unit and don't want to bother cooking for one. Fast food is appealing because it is fast, it doesn't require any dressing up, it offers a "fun" break in the daily routine, and the outlay of money seems small. It can be eaten in the car-sometimes picked up at a drive-in window without even getting out-or on the run. Even if it is brought home to eat, there will never be any dirty dishes to wash because of the handy disposable wrappings. Children, especially, love fast food because it's finger food, no struggling with knives and forks, no annoying instructions from adults about table manners.
Directions: There are 2 passages in this section. Each passage is followed by some questions or unfinished statements. For each of them there are four choices marked [A],[B],[C] and [D]. You should decide on the best choice and mark the corresponding letter on Answer Sheet 2 with a single line through the center.
Passage One
Questions 52 to 56 are based on the following passage.
What makes Americans spend nearly half their food dollars on meals away from home? The answers lie in the way Americans live today. During the first few decades of the twentieth century, canned and other convenience foods freed the family cook from full-time duty at the kitchen range.
Then, in the 1940s, work in the wartime defense plants took more women out of the home that ever before, setting the pattern of the working wife and mother. Unless family members pitch in with food preparation, women are not fully liberated from that chore.
It's easier to pick up a bucket of fried chicken on the way home from work or take the family out for pizzas or burgers than to start opening cans or heating up frozen dinners after a long, hard day. Also nowadays, the rising divorce rate means that there are more single working parents with children to feed. And many young adults and elderly people, as well as unmarried and divorced mature people, live alone rather than as a part of a family unit and don't want to bother cooking for one. Fast food is appealing because it is fast, it doesn't require any dressing up, it offers a "fun" break in the daily routine, and the outlay of money seems small. It can be eaten in the car-sometimes picked up at a drive-in window without even getting out-or on the run. Even if it is brought home to eat, there will never be any dirty dishes to wash because of the handy disposable wrappings. Children, especially, love fast food because it's finger food, no struggling with knives and forks, no annoying instructions from adults about table manners.
请根据上面给出的内容,来回答下面的单项选择题(下列每小题备选答案中,只有一个符合题意的正确答案。每小题0分,共5题。)
52. Americans enjoy fast food mainly because ________.
A :it can be eaten in the car
B :it is much more tasty than home-made food
C :one only uses his fingers while eating it
D :it is time-saving and convenient
B :it is much more tasty than home-made food
C :one only uses his fingers while eating it
D :it is time-saving and convenient
请选择答案:请先登录才能答题
53. It can be inferred that children ________.
A :want to have freedom at table
B :wash dishes after each meal
C :are not good at using forks and knives while eating
D :take eating time as a fun break
B :wash dishes after each meal
C :are not good at using forks and knives while eating
D :take eating time as a fun break
请选择答案:请先登录才能答题
54. Many Americans are eating out and not cooking at home nowadays because ________.
A :they want to make a change after eating the same food for years at home
B :the food made outside home tastes better than food cooked at home
C :many of them live alone or don't like taking trouble to cook
D :American women refuse to cook at home due to women's liberation movement
B :the food made outside home tastes better than food cooked at home
C :many of them live alone or don't like taking trouble to cook
D :American women refuse to cook at home due to women's liberation movement
请选择答案:请先登录才能答题
55. According to the text, a drive-in window is a ________.
A :car window from which you can see the driver
B :window in the restaurant from which you get your meal in the car
C :place where you check the mechanic condition of your car
D :entrance where you return the used plates after eating
B :window in the restaurant from which you get your meal in the car
C :place where you check the mechanic condition of your car
D :entrance where you return the used plates after eating
请选择答案:请先登录才能答题
56. The expression "pitch in with" (Line 2, Para. 2) probably means________.
A :complain
B :enjoy
C :help
D :deny
B :enjoy
C :help
D :deny
请选择答案:请先登录才能答题
Passage Two
Questions 57 to 61 are based on the following passage.
InfraGard is a grass-roots effort to respond to the need for cooperation and collaboration in countering the threat of cyber crime and terrorism to private businesses and the government. By the end of September, there will be InfraGard chapters in all 50 states, Calloway said. With advice from the FBI, each local chapter will be run by a board of directors that includes members of private industry, the academic community and public agencies. Bands, utilities, and other businesses and government agencies will use a secure Web site to share information about attempts to hack into their computer networks. Members can join the system free. A key feature of the system is a two-pronged method of reporting attacks.
A "sanitized" description of a hacking attempt or other incident-one that doesn't reveal the name or information about the victim-can be shared with the other members to spot trends. Then a more detailed description also can be sent to the FBI's computer crimes unit to interfere if there are grounds for an investigation. Cyber crime has jumped in recent years across the nation, particularly in hotbeds of financial commerce and technology like Charlotte. "Ten years ago, all you needed to protect yourself was a safe, a fence and security officers," said Chris Swecker, who is in charge of the FBI's Charlotte office. "Now any business with a modem is subject to attack." FBI agents investigate computer hacking that disrupted popular Web sites including Amazon. com, CNN and Yahoo!
several North Carolina victims have been identified this year. The investigation has also identified computer systems in North Carolina used by hackers to commit such attacks. Prosecutions of hackers have been hampered by the reluctance of companies to report security intrusions for fear of bad publicity and lost business. Meanwhile, too many corporations have made it too easy for criminals by sacrificing security for speed and accessibility. Jack Wiles, who will lead the local InfraGard chapter's board, said a recent report estimated 97 percent of all cyber crime goes undetected. Wiles, a computer security expert, has a firewall on his personal computer to prevent hackers from getting into his files. "I get at least one report a day that somebody was trying to get into my computer," he said, "the Net is a wonderful place, but it's also a dangerous one."
Questions 57 to 61 are based on the following passage.
InfraGard is a grass-roots effort to respond to the need for cooperation and collaboration in countering the threat of cyber crime and terrorism to private businesses and the government. By the end of September, there will be InfraGard chapters in all 50 states, Calloway said. With advice from the FBI, each local chapter will be run by a board of directors that includes members of private industry, the academic community and public agencies. Bands, utilities, and other businesses and government agencies will use a secure Web site to share information about attempts to hack into their computer networks. Members can join the system free. A key feature of the system is a two-pronged method of reporting attacks.
A "sanitized" description of a hacking attempt or other incident-one that doesn't reveal the name or information about the victim-can be shared with the other members to spot trends. Then a more detailed description also can be sent to the FBI's computer crimes unit to interfere if there are grounds for an investigation. Cyber crime has jumped in recent years across the nation, particularly in hotbeds of financial commerce and technology like Charlotte. "Ten years ago, all you needed to protect yourself was a safe, a fence and security officers," said Chris Swecker, who is in charge of the FBI's Charlotte office. "Now any business with a modem is subject to attack." FBI agents investigate computer hacking that disrupted popular Web sites including Amazon. com, CNN and Yahoo!
several North Carolina victims have been identified this year. The investigation has also identified computer systems in North Carolina used by hackers to commit such attacks. Prosecutions of hackers have been hampered by the reluctance of companies to report security intrusions for fear of bad publicity and lost business. Meanwhile, too many corporations have made it too easy for criminals by sacrificing security for speed and accessibility. Jack Wiles, who will lead the local InfraGard chapter's board, said a recent report estimated 97 percent of all cyber crime goes undetected. Wiles, a computer security expert, has a firewall on his personal computer to prevent hackers from getting into his files. "I get at least one report a day that somebody was trying to get into my computer," he said, "the Net is a wonderful place, but it's also a dangerous one."
请根据上面给出的内容,来回答下面的单项选择题(下列每小题备选答案中,只有一个符合题意的正确答案。每小题0分,共5题。)
57. From the first paragraph, we know ________.
A :InfraGard is a protective measure against cyber crime
B :InfraGard is a measure of cooperation and collaboration
C :there will be 50 InfraGard chapters in all states
D :private business and the government are now committing cyber crime
B :InfraGard is a measure of cooperation and collaboration
C :there will be 50 InfraGard chapters in all states
D :private business and the government are now committing cyber crime
请选择答案:请先登录才能答题
58. Each local chapter of InfraGard will be run by the following EXCEPT ________.
A :academic communities
B :public agencies
C :FBI
D :private industry
B :public agencies
C :FBI
D :private industry
请选择答案:请先登录才能答题
59. By saying "too many corporations...speed and accessibility" (Lines 3~4, Para. 3), the author means ________.
A :too many corporations take no notice of the security problem of computers
B :criminals are sacrificing security for speed and accessibility
C :it's very easy to sacrifice security for speed and accessibility
D :many companies suffer from computer hacking because they value speed and accessibility more than security
B :criminals are sacrificing security for speed and accessibility
C :it's very easy to sacrifice security for speed and accessibility
D :many companies suffer from computer hacking because they value speed and accessibility more than security
请选择答案:请先登录才能答题
60. All the following are reasons for the rise in cyber crime EXCEPT ________.
A :victims won't report intrusions by hackers
B :victims have no firewalls
C :the use of modem is increasing
D :companies don't pay enough attention to security
B :victims have no firewalls
C :the use of modem is increasing
D :companies don't pay enough attention to security
请选择答案:请先登录才能答题
61. It can be concluded from the passage that ________.
A :not all hacking attempts are worthy of investigation
B :information of the victims is inaccessible
C :InfraGard chapters will be in effect by the end of September
D :Amazon.com was often disrupted by hacking
B :information of the victims is inaccessible
C :InfraGard chapters will be in effect by the end of September
D :Amazon.com was often disrupted by hacking
请选择答案:请先登录才能答题
Part V Cloze (15 minutes)
Directions: There are 20 blanks in the following passage. For each blank there are four choices marked [A],[B],[C] and [D] on the right side of the paper. You should choose the ONE that best fits into the passage. Then mark the corresponding letter on Answer Sheet 2 with a single line through the center.
Every year more than half a million American kids have drainage (排泄) tubes surgically implanted in their ears to combat persistent infections. The procedure, know as tympanostomy, may not be as 62 as the tonsillectomy was in the 1940s, but it now 63 as the nation's leading childhood 64 and a new study suggests it's being vastly overused. In 65 more than 6,000 scheduled ear tube operations, a team of experts 66 by Harvard pediatrician Lawrence Kleinman found that fewer than half were clearly justified. "Each year", the researchers write in the current Journal of the American Medical Association (JAMA), "several hundred thousand children in the United States may be 67 tympanostomy tubes that offer them no demonstrated 68 ...and may place them at increased 69 ."
Tube placement isn't a 70 risky procedure, but it costs $1,000 to $1,500 and sometimes scars the eardrum, causing a partial loss of 71 . Studies show that the benefits are most likely to 72 the risks if a child's middle ear has produced sticky fluid 73 more than four months despite treatment 74 antibiotics. For less virulent infections, drug treatment is usually a(n) 75 , safer alternative (though drugs, too, can be overused). In the new JAMA study, Kleinman's team reviewed the medical charts of 6,429 kids, all under 16, 76 doctors had recommended the procedure. Even making "generous assumptions" about the likely 77 , the researchers found that a quarter of the proposed operations were 78 , since less invasive alternatives were available, 79 another third were as likely to harm the recipients as help them.
Parents needn't 80 about ear tubes that are already in place. Once 81 implanted, the tiny devices provide drainage for six months to a year, then come out by reducing health costs by hundreds of millions of dollars every year.
Directions: There are 20 blanks in the following passage. For each blank there are four choices marked [A],[B],[C] and [D] on the right side of the paper. You should choose the ONE that best fits into the passage. Then mark the corresponding letter on Answer Sheet 2 with a single line through the center.
Every year more than half a million American kids have drainage (排泄) tubes surgically implanted in their ears to combat persistent infections. The procedure, know as tympanostomy, may not be as 62 as the tonsillectomy was in the 1940s, but it now 63 as the nation's leading childhood 64 and a new study suggests it's being vastly overused. In 65 more than 6,000 scheduled ear tube operations, a team of experts 66 by Harvard pediatrician Lawrence Kleinman found that fewer than half were clearly justified. "Each year", the researchers write in the current Journal of the American Medical Association (JAMA), "several hundred thousand children in the United States may be 67 tympanostomy tubes that offer them no demonstrated 68 ...and may place them at increased 69 ."
Tube placement isn't a 70 risky procedure, but it costs $1,000 to $1,500 and sometimes scars the eardrum, causing a partial loss of 71 . Studies show that the benefits are most likely to 72 the risks if a child's middle ear has produced sticky fluid 73 more than four months despite treatment 74 antibiotics. For less virulent infections, drug treatment is usually a(n) 75 , safer alternative (though drugs, too, can be overused). In the new JAMA study, Kleinman's team reviewed the medical charts of 6,429 kids, all under 16, 76 doctors had recommended the procedure. Even making "generous assumptions" about the likely 77 , the researchers found that a quarter of the proposed operations were 78 , since less invasive alternatives were available, 79 another third were as likely to harm the recipients as help them.
Parents needn't 80 about ear tubes that are already in place. Once 81 implanted, the tiny devices provide drainage for six months to a year, then come out by reducing health costs by hundreds of millions of dollars every year.
请根据上面给出的内容,来回答下面的单项选择题(下列每小题备选答案中,只有一个符合题意的正确答案。每小题0分,共20题。)
62.
A :rare
B :common
C :general
D :abnormal
B :common
C :general
D :abnormal
请选择答案:请先登录才能答题
63.
A :considers
B :alternates
C :ranges
D :ranks
B :alternates
C :ranges
D :ranks
请选择答案:请先登录才能答题
64.
A :operation
B :disease
C :condition
D :injection
B :disease
C :condition
D :injection
请选择答案:请先登录才能答题
65.
A :finding
B :reviewing
C :amending
D :performing
B :reviewing
C :amending
D :performing
请选择答案:请先登录才能答题
66.
A :controlled
B :conducted
C :legitimated
D :led
B :conducted
C :legitimated
D :led
请选择答案:请先登录才能答题
67.
A :receiving
B :accepting
C :undertaking
D :initiating
B :accepting
C :undertaking
D :initiating
请选择答案:请先登录才能答题
68.
A :disadvantage
B :agreement
C :advantage
D :shortcoming
B :agreement
C :advantage
D :shortcoming
请选择答案:请先登录才能答题
69.
A :bottom
B :risk
C :edge
D :extent
B :risk
C :edge
D :extent
请选择答案:请先登录才能答题
70.
A :subtly
B :hopefully
C :merely
D :terribly
B :hopefully
C :merely
D :terribly
请选择答案:请先登录才能答题
71.
A :feeling
B :hearing
C :health
D :memory
B :hearing
C :health
D :memory
请选择答案:请先登录才能答题
72.
A :outfit
B :outflow
C :outweigh
D :outgrow
B :outflow
C :outweigh
D :outgrow
请选择答案:请先登录才能答题
73.
A :for
B :on
C :in
D :to
B :on
C :in
D :to
请选择答案:请先登录才能答题
74.
A :by
B :upon
C :with
D :along
B :upon
C :with
D :along
请选择答案:请先登录才能答题
75.
A :expensive
B :faster
C :further
D :cheaper
B :faster
C :further
D :cheaper
请选择答案:请先登录才能答题
76.
A :which
B :whose
C :that
D :who
B :whose
C :that
D :who
请选择答案:请先登录才能答题
77.
A :risks
B :dangers
C :chances
D :benefits
B :dangers
C :chances
D :benefits
请选择答案:请先登录才能答题
78.
A :inappropriate
B :favorable
C :preferable
D :inadequate
B :favorable
C :preferable
D :inadequate
请选择答案:请先登录才能答题
79.
A :where
B :when
C :whether
D :while
B :when
C :whether
D :while
请选择答案:请先登录才能答题
80.
A :outrage
B :panic
C :complain
D :protest
B :panic
C :complain
D :protest
请选择答案:请先登录才能答题
81.
A :lively
B :quickly
C :successfully
D :formally
B :quickly
C :successfully
D :formally
请选择答案:请先登录才能答题