Part Two Reading Comprehension
Directions:
In this part there are 4 passages followed by questions or unfinished statements, each with four suggested answers. Choose the one you think is the best answer. Mark your choice on the Answer Sheet by drawing with a pencil a short bar across the corresponding letter in the brackets.
Questions 11-15 are based on the following passage:
Until recently the opportunities for criminal activities on the Internet have been low. However, the volume of business done on the Internet is growing rapidly, as people order books and other products and make money transactions. All this is creating temptations for hackers。
Hackers are often young people who are interested in computers. They use them to move quietly to the Internet, looking for ways to break into computers systems run by banks, telephone companies and even Government departments. They look for examples of credit cards and try to steal the numbers.
Hackers rarely admit to a successful break-in. The first indication of a hacking may be when a customer discovers a wrong moneytransaction on a credit card account. It is harder to check on som
ebody misusing an online connection unless there is a massive down load of information which would call the attention of the consumer.
11. The main idea of the first paragraph is that ______.
the opportunities for criminal activities on the Internet have been low
the opportunities for criminal activities on the Internet are low
there are more opportunities for criminal activities on the Internet
people should not make money transactions on the Internet
12. The word "temptations" in the first paragraph is closest in meaning to ______.
interestsattractionsbenefitsprofits
13. In the passage, it‘s said that hackers may attack the Internet system of all the following institutions except _____.
bankstelephone companiesuniversitiesgovernment departments
14. Which of the following is not the reason for a hacking being found?
The customer found something wrong with his account.
There was a huge amount of information being downloaded.
There was a wrong money transaction.
The hacker proudly admitted his successful break-in.
15. In the last sentence of the paragraph, "somebody" refers to a______.
customercard userhackerbank clerk
Questions 16-20 are based on the following passage:
For any Englishman, there can never be any discussion as to who is the world‘s greatest writer. Only one name can possibly suggest itself to him:
that of William Shakespeare。
Every Englishman has some knowledge of his work. All of us use words and phrases from Shakespeare‘s writings that have become a part of the English-speaking people.
Shakespeare, more perhaps than any other writer, made full use of the English language. Most of us use about five thousand words in our normal employment of English; Shakespeare in his works used about twenty-five thousand!
There is probably no better wayfor a foreignerto appreciate the richnessand variety of the English language than by studying the various ways in which Shakespeare uses it. Such a study is well worth the effort , even though some aspects of English usage, and the meaning of many words, have changed since Shakespeare‘s day.
16. From the first two sentences of the passage we can conclude that ________.
it can‘t be discussed about who is the world‘s greatest poet
it can‘t be discussed about who is the world‘s greatest dramatist
Shakespeare is regarded as a greatest writer
Englishmen like to discuss about who is the world‘s greatest writer
17. According to the passage many English words and phrases that we use today are from ______.
EnglishmenShakespeare‘s worksEnglish speaking peopleancient people
18. To learn the richness of the English language, people should ______.
read Shakespeare‘s playslearn from an English man
be glad to be a foreignerwrite and read more
19. The author does not suggest beginners reading Shakespeare‘s plays, probably because _____.
the works are for native speakers
only Englishmen can understand his plays
the works are
发布者:ws2012
来源:在职研究生网本页网址:http://zzy.china-b.com/gctwk/yy/20090629/1984406_1.html声明:我方为第三方信息服务平台提供者,本文来自于网络,登载出于传递更多信息之目的,并不意味着赞同其观点或证实其描述,文章内容仅供参考。如若我方内容涉嫌侵犯其合法权益,应该及时反馈,我方将会尽快移除被控侵权内容。