2024屆河南省孟津縣高考英語一輪復習閱讀理解訓練:4(含解析)

雕龍文庫 分享 時間: 收藏本文

2024屆河南省孟津縣高考英語一輪復習閱讀理解訓練:4(含解析)

  河南孟津縣2024高考英語一輪閱讀理解能力練習4

  (2024高考訓練)閱讀下列材料,從每題所給的選項中選出最佳選項。Golden sunlight danced in the treetops,and children's laughter filled the park.The smell of popcorn played on the breeze,and life seemed good.It was one of the happiest Saturday mornings I had spent with my little daughter,Gigi.

  That is,until two strangers threw her into their car and sped away.It seemed like a bad dream.I could barely whisper when the police questioned me.For hours we waited,but there was no word on the whereabouts of the car.Tears would start to come.Then nothing.I was numb with fear.

  “Go home,Ma'am,” the police officer said.“I'll have someone drive you.We'll also want to monitor your telephone.The kidnappers(綁匪) might call,and we'll want to keep track.Trust me,these guys can't get far.” But after what had just happened,it was hard for me to trust anything.

  My friend Gloria came over that afternoon.“I heard about Gigi on the radio,” she said.“Everyone is looking for the car.The interstates are all blocked.” She took my hand.

  “Look here Gloria said.“I want you to have this picture,and I want you to pray with me.”

  It was a picture of a little girl sound asleep in her bed.Standing by the bed was a tall,blond angel(天使).His hand was touching the girl's shoulder as he smiled down at her.

  “You know I don't believe in that kind of thing!” I got angry.“I'm too tired for any trick right now,Gloria! I want my daughter home!”I started to shake,and then I burst into tears again.

  Gloria placed the photo on our mantle(壁爐架) and knelt down beside me.“Just pray with me,” she said,holding my hand.

  I had no strength left,so we prayed and waited what seemed an age.Together,we waited by the phone until sunset.The phone never rang.

  Suddenly,the front door swung open.I looked up and screamed.

  There stood Gigi.“Gigi! Thank God!” I cried,throwing my arms around her.“Where did those men take you? How did you get home? Did the police find you?”

  “No Mommy!” said Gigi.“I was really scared because those men said they were taking me far away.We were going really fast on an old rock road I'd never seen before.But then a tall man walked out in front of the car,and they ran off the road and hit a tree.Then the tall man ran up and opened the car door and pulled me out.He was really nice,and said I would be okay now,and that those men couldn't hurt me.I must have gone to sleep,because then I woke up here in front of our house.He must have brought me home.”

  “But how did he know where to bring you?” My voice broke and sounded a whisper.

  “I don't know,Mommy,” Gigi said.“But he was really friendly,and I wasn't scared of him at all.”

  Just then Gigi noticed Gloria's picture on the mantle.“That's him!” she cried,pointing at the picture.“Mommy,the tall blond man dressed like an angel.That's the man who pulled me out of the car!”

  Gloria turned pale.“Are you sure that's the man?” Gloria asked.

  “Yeah,that's him.Except he didn't have wings,and he was wearing blue jeans and a T-shirt.But that's him exactly.I'd remember him anywhere!”

  Later that night,the police found the injured kidnappers in their damaged car fifty miles from our home.When questioned,the driver remembered making a sharp turn to avoid hitting a tall blond man.The backseat door that Gigi sat by had been completely torn off.

  Twenty years have gone by.We have never heard from anyone claiming to have rescued Gigi.There have been no logical explanations for Gigi's narrow escape and return from so far away.

  There have always been things that people can't explain.But,from that day forward,I believe that all experiences,positive and negative,are given to us for our strengthening and learning.

  Gigi now takes her little girl to the park on Saturdays.They enjoy the sunlight as it dances in the treetops,the smell of popcorn,and the laughter of children.She keeps Gloria's picture on her mantle,and she remembers her angelic friend.And,like my daughter,I have a faith that has carried me through many trials since that day many years ago.

  【語篇解讀】 本文是一篇記敘文,講述了一個小女孩被兩個陌生人綁架后,被一個“天使”救了出來的故事。

  .The writer describes a happy scene at the beginning of the passage to ________.

  A.introduce a topic

  B.attract readers' attention

  C.make a sharp contrast

  D.show the beauty of nature

  答案 C [目的意圖題。根據文章第一段之后的整體描述可知,文章前后形成了鮮明的對比,C項。]

  .What is the writer's attitude towards the pray together with Gloria?

  A.Doubtful.

  B.Curious.

  C.Grateful.

  D.Casual.

  答案 A [推理判斷題。根據文章第七段第一句“‘You know I don't believe in that kind of thing!’ I got angry.”可推知,作者對朋友提議的祈禱持懷疑、不相信的態度。故選A項。]

  .The main reason why the kidnappers could be arrested was that ________.

  A.the police followed and caught them

  B.Gloria's best friend helped the police to find them

  C.an angel spotted them and took them to the police station

  D.they had an accident when a tall man tried to stop their car

  答案 D [細節理解題。根據文章倒數第十段中的“But then a tall man walked out in front of the car,and they ran off the road and hit a tree.”和倒數第四段的前兩句可知,綁架者能被抓住是因為他們在逃跑的路上發生了車禍。故選D項。]

  .What is conveyed in this passage?

  A.The police are not reliable sometimes.

  B.Any bad man will be punished one day.

  C.We should believe in God and pray every day.

  D.We should always stay positive whatever happens.

  答案 D [細節理解題。根據文章倒數第二段最后一句“But,from that day forward,I believe that all experiences,positive and negative,are given to us for our strengthening and learning.”可知,自從女兒成功獲救后,作者相信無論發生什么事,保持樂觀就是應對的最好策D項。]

  5.We can learn from the passage that ________.

  A.the story was told from Gigi's point of view

  B.the man who rescued Gigi had known her before

  C.Gigi was sure that the angel in the picture rescued her

  D.the writer believed what Gigi said at the very beginning

  答案 C [推理判斷題。根據文章最后一段第三句“She keeps Gloria's picture on her mantle,and she remembers her angelic friend.”可推知,Gigi相信在那次童年的綁架中,是Gloria拿的那張照片中的天使救了她。故選C項。]

  6.What can be the best title for the passage?

  A.Picture of an angel

  B.Power of God

  C.Gigi's escape

  D.Mommy's anxiety

  答案 A [標題概括題。根據對文章的整體理解不難看出,本文主要講述的是在一起意外綁架事件中,受害人被“天使”解救出來的故事。由此可知,答案A最適合作為文章的標題。]

  A、B、C和D)中,選出最佳選項。

  (Crime in Computer) ? ?New and bizarre crimes have come into being with the advent of computer technology. Organized crime to has been directly involved; the new technology offers it unlimited opportunities, such as data crimes, theft of services, property-related crimes, industrial sabotage, politically related sabotage, vandalism, crimes against the individual and financially related crimes… ? ?Theft of data, or data crime, has attracted the interest of organized criminal syndicates. This is usually the theft or copying of valuable computer grogram. An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market. Buyers for stolen programs may range from a firm’s competitors to foreign nations. ? ?A competitor sabotages a company’s computer system to destroy or cripple the firm’s operational ability, thus neutralizing its competitive capability either in the private or the government sector. This computer sabotage may also be tied to an attempt by affluent investors to acquire the victim firm. With the growing reliance by firms on computers for their recordkeeping and daily operations, sabotage of their computers can result in internal havoc, after which the group interested in acquiring the firm can easily buy it at a substantially lower price. Criminal groups could also resort to sabotage if the company is a competitor of a business owned or controlled by organized crime. ? ?Politically motivated sabotage is on the increase; political extremist groups have sprouted on every continent. Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to their attack. Several attempts have already been made to destroy computer facility at an air force base. A university computer facility involved in national defence work suffered more than $2 million in damages as a result of a bombing. ? ?Computer vulnerability has been amply documented. One congressional study concluded that neither government nor private computer systems are adequately protected against sabotage. Organized criminal syndicates have shown their willingness to work with politically motivated groups. Investigators have uncovered evidence of cooperation between criminal groups and foreign governments in narcotics. Criminal groups have taken attempts in assassinating political leaders…. Computers are used in hospital life-support system, in laboratories, and in major surgery. Criminals could easily turn these computers into tools of devastation. By sabotaging the computer of a life-support system, criminals could kill an individual as easily as they had used a gun. By manipulating a computer, they could guide awesome tools of terror against large urban centers. Cities and nations could become hostages. Homicide could take a now form. The computer may become the hit man of the twentieth century. ? ?The computer opens vast areas of crime to organized criminal groups, both national and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. Although criminals have adapted to computer technology, law enforcement has not. Many still think in terms of traditional criminology. 1. ? ? ?How many kinds of crimes are mentioned in the passage? [A]. ?7. ? ?? ?? . ?8. ? ?? ?? ?? [C]. ?9. ? ?? ? [D]. ?10 2. ? ? ?What is the purpose of a competitor to sabotage a company’s computer? [A]. His purpose is to destroy or weaken the firm’s operational ability. . His purpose is to weaken firm’s competitive capability and get it. [C]. His purpose is to buy the rival’s company at a relatively low price. [D]. His purpose is to steal important data. 3. ? ? ?Which of the following can be labeled as a politically motivated sabotage of a computer system? [A]. Sabotage of a university computer. . Sabotage of a hospital computer. [C]. Sabotage of computer at a secret training base. [D]. Sabotage of a factory computer. 4. ? ? ?What does the author mean by “Homicide could take a new form”? [A]. There is no need to use a gun in killing a person. . Criminals can kill whoever they want by a computer. [C]. The computer can replace any weapons. [D]. The function of a computer is just like a gun. Vocabulary 1. ? bizarre ? ?? ?? ?? ?? ?? 奇怪的 2. ? vandalism ? ?? ?? ?? ?? 破壞,故意破壞文化,藝術的行為 3. ? cripple ? ?? ?? ?? ?? ?? 使癱瘓,削弱 4. ? fence ? ?? ?? ?? ?? ?? ?賊市,臟品買賣處 5. ? neutralize ? ?? ?? ?? ?? 使成為無效 6. ? affluent ? ?? ?? ?? ?? ? 富裕的 7. ? recordkeeping ? ?? ?? ?? 記錄存貯 8. ? havoc ? ?? ?? ?? ?? ?? 浩劫,大破壞 9. ? resort to ? ?? ?? ?? ?? ?求助于,借助于 10. ?motivate ? ?? ?? ?? ?? ?作為……的動機,激發 11. ?extremist ? ?? ?? ?? ?? ?過激分子,極端主義分子 12. ?sprout ? ?? ?? ?? ?? ?? 萌發迅速發展 13. ?awesome ? ?? ?? ?? ?? 令人驚懼的,引起敬畏的 14. ?vulnerability ? ?? ?? ?? ?易受攻擊,脆弱 15. ?devastation ? ?? ?? ?? ? 劫持,破壞 16. ?hospital life-support system 醫院的生命維持系統 17. ?hit man ? ?? ?? ?? ?? ? 職業兇手(殺手) 18. ?pool ? ?? ?? ?? ?? ?? ?集中(資金)合辦,入股 19. ?criminology ? ?? ?? ?? ?犯罪學,刑事學 難句譯注 1. ? ? ?Organized crime to has been directly involved; the new technology offers it unlimited opportunities, such as data crimes, theft of services, property-related crimes, industrial sabotage, politically related sabotage, vandalism, crimes against the individual and financially related crimes… [結構簡析] 句子很長,都是簡單句,中間有分號隔開,后面是舉例。 [參考譯文] 有組織犯罪團伙也直接參與:計算機新技術較為犯罪提供了無限的機會,如數據信息犯罪,偷竊服務項目,跟財產有關的犯罪,工業破壞,跟政治有關的破壞,破壞文化藝術,對個人和財經方面的罪行等等。 2. ? ? ?An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market. [結構簡析] 并列句,and 作對比連接詞用。 [參考譯文] 一個計算機信息的國際市場已經存在,而專門從事臟品交易的市場據說在迅速擴展的犯罪市場中起著關鍵的作用。 3. ? ? ?A competitor sabotages a company’s computer system to destroy or cripple the firm’s operational ability, thus neutralizing its competitive capability either in the private or the government sector. [結構簡析] 主謂賓補結構,后跟thus+從句表示結果。 [參考譯文] 競爭對手破壞一個公司的計算機系統為的是摧毀或削弱公司的操作運行能力,從而使其喪失在私人或政府部門中的競爭力。 4. ? ? ?The computer opens vast areas of crime to organized criminal groups, both national and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. [結構簡析] 兩句話。前一句為主謂賓,后一句為主從句,從句內采用too…to 句型,后跟分詞獨立結構進一步說明。 [參考譯文] 計算機為國內和國際有組織犯罪集團開辟了犯罪的廣泛領域。它要求它們集中資源,提高通力協作力量,因為許多犯罪太復雜,一個集團難以駕馭,特別是那些需要巨大的臟品交易時常網絡的罪行。 寫作方法與文章大意 文章介紹“計算機犯罪”,采用分類寫作手法,先列出種種計算機犯罪項,下面逐一說明。文本只選四種犯罪——信息數據偷竊或信息(數據)犯罪,產業破壞,政治破壞,對個人生命破壞。分四段敘述,每段為一種罪行,最后是對比罪犯勢力越來越有組織,勢力請大,而司法部門卻沒有準備好。 答案祥解 1. ? ? ?B. 8種,具體罪行。見難句譯注1。 2. ? ? ?B. 他的目的是削弱公司競爭力進而得到它。答案見難句譯注2及第二段第二句起:“計算機破壞也可以和富裕的投資者欲得到對手的公司的企圖相連。隨著公司對計算機記錄存儲的信賴性加強,破壞他們的計算機可以造成內部大破壞。之后,對取得這個公司感性趣的集團很容易在級低價格上買進。” A. 削弱公司運轉能力。 C. 在相當低的價格上買進對手的公司。這兩個選項都只是破壞目的的一個方面。D. 偷竊重要資料,文內沒有講。 3. ? ? ?C 破壞秘密訓練基礎。這可以標以政治目的的破壞計算機。 A. 大學 B. 醫院D. 工廠。 這三個地方都難以和政治直接相連,第三段講的大學是“參與國防保衛工作的大學計算機措施”,和一般大學不一樣。只有秘密訓練的基地和真正相連的可能性最大,所以選C. 4. ? ? ?B. 犯罪可以通過計算機任意殺人。答案在第五段:“犯罪集團曾采取步驟暗殺政治領袖。醫院的生命維護系統,實驗室,大型外科手術中都用計算機。罪犯們很容易把這些計算機轉變成破壞的工具。通過破壞生命維護系統計算機,罪犯們就像用槍一樣很容易殺死人。通過控制計算機,他們可以指導這可怖的工具攻擊大城市中心。城市和國家都可以成為人質。謀殺具有新的形式,計算機可能成為21世紀的事業殺手。” A. 殺人不需要用槍。這話太籠統,不用槍,用什么。用毒藥,用刀?C. 計算機可以取代任何武器。D. 計算機的功能就像槍,錯誤的。

  河南孟津縣2024高考英語一輪閱讀理解能力練習4

  (2024高考訓練)閱讀下列材料,從每題所給的選項中選出最佳選項。Golden sunlight danced in the treetops,and children's laughter filled the park.The smell of popcorn played on the breeze,and life seemed good.It was one of the happiest Saturday mornings I had spent with my little daughter,Gigi.

  That is,until two strangers threw her into their car and sped away.It seemed like a bad dream.I could barely whisper when the police questioned me.For hours we waited,but there was no word on the whereabouts of the car.Tears would start to come.Then nothing.I was numb with fear.

  “Go home,Ma'am,” the police officer said.“I'll have someone drive you.We'll also want to monitor your telephone.The kidnappers(綁匪) might call,and we'll want to keep track.Trust me,these guys can't get far.” But after what had just happened,it was hard for me to trust anything.

  My friend Gloria came over that afternoon.“I heard about Gigi on the radio,” she said.“Everyone is looking for the car.The interstates are all blocked.” She took my hand.

  “Look here Gloria said.“I want you to have this picture,and I want you to pray with me.”

  It was a picture of a little girl sound asleep in her bed.Standing by the bed was a tall,blond angel(天使).His hand was touching the girl's shoulder as he smiled down at her.

  “You know I don't believe in that kind of thing!” I got angry.“I'm too tired for any trick right now,Gloria! I want my daughter home!”I started to shake,and then I burst into tears again.

  Gloria placed the photo on our mantle(壁爐架) and knelt down beside me.“Just pray with me,” she said,holding my hand.

  I had no strength left,so we prayed and waited what seemed an age.Together,we waited by the phone until sunset.The phone never rang.

  Suddenly,the front door swung open.I looked up and screamed.

  There stood Gigi.“Gigi! Thank God!” I cried,throwing my arms around her.“Where did those men take you? How did you get home? Did the police find you?”

  “No Mommy!” said Gigi.“I was really scared because those men said they were taking me far away.We were going really fast on an old rock road I'd never seen before.But then a tall man walked out in front of the car,and they ran off the road and hit a tree.Then the tall man ran up and opened the car door and pulled me out.He was really nice,and said I would be okay now,and that those men couldn't hurt me.I must have gone to sleep,because then I woke up here in front of our house.He must have brought me home.”

  “But how did he know where to bring you?” My voice broke and sounded a whisper.

  “I don't know,Mommy,” Gigi said.“But he was really friendly,and I wasn't scared of him at all.”

  Just then Gigi noticed Gloria's picture on the mantle.“That's him!” she cried,pointing at the picture.“Mommy,the tall blond man dressed like an angel.That's the man who pulled me out of the car!”

  Gloria turned pale.“Are you sure that's the man?” Gloria asked.

  “Yeah,that's him.Except he didn't have wings,and he was wearing blue jeans and a T-shirt.But that's him exactly.I'd remember him anywhere!”

  Later that night,the police found the injured kidnappers in their damaged car fifty miles from our home.When questioned,the driver remembered making a sharp turn to avoid hitting a tall blond man.The backseat door that Gigi sat by had been completely torn off.

  Twenty years have gone by.We have never heard from anyone claiming to have rescued Gigi.There have been no logical explanations for Gigi's narrow escape and return from so far away.

  There have always been things that people can't explain.But,from that day forward,I believe that all experiences,positive and negative,are given to us for our strengthening and learning.

  Gigi now takes her little girl to the park on Saturdays.They enjoy the sunlight as it dances in the treetops,the smell of popcorn,and the laughter of children.She keeps Gloria's picture on her mantle,and she remembers her angelic friend.And,like my daughter,I have a faith that has carried me through many trials since that day many years ago.

  【語篇解讀】 本文是一篇記敘文,講述了一個小女孩被兩個陌生人綁架后,被一個“天使”救了出來的故事。

  .The writer describes a happy scene at the beginning of the passage to ________.

  A.introduce a topic

  B.attract readers' attention

  C.make a sharp contrast

  D.show the beauty of nature

  答案 C [目的意圖題。根據文章第一段之后的整體描述可知,文章前后形成了鮮明的對比,C項。]

  .What is the writer's attitude towards the pray together with Gloria?

  A.Doubtful.

  B.Curious.

  C.Grateful.

  D.Casual.

  答案 A [推理判斷題。根據文章第七段第一句“‘You know I don't believe in that kind of thing!’ I got angry.”可推知,作者對朋友提議的祈禱持懷疑、不相信的態度。故選A項。]

  .The main reason why the kidnappers could be arrested was that ________.

  A.the police followed and caught them

  B.Gloria's best friend helped the police to find them

  C.an angel spotted them and took them to the police station

  D.they had an accident when a tall man tried to stop their car

  答案 D [細節理解題。根據文章倒數第十段中的“But then a tall man walked out in front of the car,and they ran off the road and hit a tree.”和倒數第四段的前兩句可知,綁架者能被抓住是因為他們在逃跑的路上發生了車禍。故選D項。]

  .What is conveyed in this passage?

  A.The police are not reliable sometimes.

  B.Any bad man will be punished one day.

  C.We should believe in God and pray every day.

  D.We should always stay positive whatever happens.

  答案 D [細節理解題。根據文章倒數第二段最后一句“But,from that day forward,I believe that all experiences,positive and negative,are given to us for our strengthening and learning.”可知,自從女兒成功獲救后,作者相信無論發生什么事,保持樂觀就是應對的最好策D項。]

  5.We can learn from the passage that ________.

  A.the story was told from Gigi's point of view

  B.the man who rescued Gigi had known her before

  C.Gigi was sure that the angel in the picture rescued her

  D.the writer believed what Gigi said at the very beginning

  答案 C [推理判斷題。根據文章最后一段第三句“She keeps Gloria's picture on her mantle,and she remembers her angelic friend.”可推知,Gigi相信在那次童年的綁架中,是Gloria拿的那張照片中的天使救了她。故選C項。]

  6.What can be the best title for the passage?

  A.Picture of an angel

  B.Power of God

  C.Gigi's escape

  D.Mommy's anxiety

  答案 A [標題概括題。根據對文章的整體理解不難看出,本文主要講述的是在一起意外綁架事件中,受害人被“天使”解救出來的故事。由此可知,答案A最適合作為文章的標題。]

  A、B、C和D)中,選出最佳選項。

  (Crime in Computer) ? ?New and bizarre crimes have come into being with the advent of computer technology. Organized crime to has been directly involved; the new technology offers it unlimited opportunities, such as data crimes, theft of services, property-related crimes, industrial sabotage, politically related sabotage, vandalism, crimes against the individual and financially related crimes… ? ?Theft of data, or data crime, has attracted the interest of organized criminal syndicates. This is usually the theft or copying of valuable computer grogram. An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market. Buyers for stolen programs may range from a firm’s competitors to foreign nations. ? ?A competitor sabotages a company’s computer system to destroy or cripple the firm’s operational ability, thus neutralizing its competitive capability either in the private or the government sector. This computer sabotage may also be tied to an attempt by affluent investors to acquire the victim firm. With the growing reliance by firms on computers for their recordkeeping and daily operations, sabotage of their computers can result in internal havoc, after which the group interested in acquiring the firm can easily buy it at a substantially lower price. Criminal groups could also resort to sabotage if the company is a competitor of a business owned or controlled by organized crime. ? ?Politically motivated sabotage is on the increase; political extremist groups have sprouted on every continent. Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to their attack. Several attempts have already been made to destroy computer facility at an air force base. A university computer facility involved in national defence work suffered more than $2 million in damages as a result of a bombing. ? ?Computer vulnerability has been amply documented. One congressional study concluded that neither government nor private computer systems are adequately protected against sabotage. Organized criminal syndicates have shown their willingness to work with politically motivated groups. Investigators have uncovered evidence of cooperation between criminal groups and foreign governments in narcotics. Criminal groups have taken attempts in assassinating political leaders…. Computers are used in hospital life-support system, in laboratories, and in major surgery. Criminals could easily turn these computers into tools of devastation. By sabotaging the computer of a life-support system, criminals could kill an individual as easily as they had used a gun. By manipulating a computer, they could guide awesome tools of terror against large urban centers. Cities and nations could become hostages. Homicide could take a now form. The computer may become the hit man of the twentieth century. ? ?The computer opens vast areas of crime to organized criminal groups, both national and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. Although criminals have adapted to computer technology, law enforcement has not. Many still think in terms of traditional criminology. 1. ? ? ?How many kinds of crimes are mentioned in the passage? [A]. ?7. ? ?? ?? . ?8. ? ?? ?? ?? [C]. ?9. ? ?? ? [D]. ?10 2. ? ? ?What is the purpose of a competitor to sabotage a company’s computer? [A]. His purpose is to destroy or weaken the firm’s operational ability. . His purpose is to weaken firm’s competitive capability and get it. [C]. His purpose is to buy the rival’s company at a relatively low price. [D]. His purpose is to steal important data. 3. ? ? ?Which of the following can be labeled as a politically motivated sabotage of a computer system? [A]. Sabotage of a university computer. . Sabotage of a hospital computer. [C]. Sabotage of computer at a secret training base. [D]. Sabotage of a factory computer. 4. ? ? ?What does the author mean by “Homicide could take a new form”? [A]. There is no need to use a gun in killing a person. . Criminals can kill whoever they want by a computer. [C]. The computer can replace any weapons. [D]. The function of a computer is just like a gun. Vocabulary 1. ? bizarre ? ?? ?? ?? ?? ?? 奇怪的 2. ? vandalism ? ?? ?? ?? ?? 破壞,故意破壞文化,藝術的行為 3. ? cripple ? ?? ?? ?? ?? ?? 使癱瘓,削弱 4. ? fence ? ?? ?? ?? ?? ?? ?賊市,臟品買賣處 5. ? neutralize ? ?? ?? ?? ?? 使成為無效 6. ? affluent ? ?? ?? ?? ?? ? 富裕的 7. ? recordkeeping ? ?? ?? ?? 記錄存貯 8. ? havoc ? ?? ?? ?? ?? ?? 浩劫,大破壞 9. ? resort to ? ?? ?? ?? ?? ?求助于,借助于 10. ?motivate ? ?? ?? ?? ?? ?作為……的動機,激發 11. ?extremist ? ?? ?? ?? ?? ?過激分子,極端主義分子 12. ?sprout ? ?? ?? ?? ?? ?? 萌發迅速發展 13. ?awesome ? ?? ?? ?? ?? 令人驚懼的,引起敬畏的 14. ?vulnerability ? ?? ?? ?? ?易受攻擊,脆弱 15. ?devastation ? ?? ?? ?? ? 劫持,破壞 16. ?hospital life-support system 醫院的生命維持系統 17. ?hit man ? ?? ?? ?? ?? ? 職業兇手(殺手) 18. ?pool ? ?? ?? ?? ?? ?? ?集中(資金)合辦,入股 19. ?criminology ? ?? ?? ?? ?犯罪學,刑事學 難句譯注 1. ? ? ?Organized crime to has been directly involved; the new technology offers it unlimited opportunities, such as data crimes, theft of services, property-related crimes, industrial sabotage, politically related sabotage, vandalism, crimes against the individual and financially related crimes… [結構簡析] 句子很長,都是簡單句,中間有分號隔開,后面是舉例。 [參考譯文] 有組織犯罪團伙也直接參與:計算機新技術較為犯罪提供了無限的機會,如數據信息犯罪,偷竊服務項目,跟財產有關的犯罪,工業破壞,跟政治有關的破壞,破壞文化藝術,對個人和財經方面的罪行等等。 2. ? ? ?An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market. [結構簡析] 并列句,and 作對比連接詞用。 [參考譯文] 一個計算機信息的國際市場已經存在,而專門從事臟品交易的市場據說在迅速擴展的犯罪市場中起著關鍵的作用。 3. ? ? ?A competitor sabotages a company’s computer system to destroy or cripple the firm’s operational ability, thus neutralizing its competitive capability either in the private or the government sector. [結構簡析] 主謂賓補結構,后跟thus+從句表示結果。 [參考譯文] 競爭對手破壞一個公司的計算機系統為的是摧毀或削弱公司的操作運行能力,從而使其喪失在私人或政府部門中的競爭力。 4. ? ? ?The computer opens vast areas of crime to organized criminal groups, both national and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences. [結構簡析] 兩句話。前一句為主謂賓,后一句為主從句,從句內采用too…to 句型,后跟分詞獨立結構進一步說明。 [參考譯文] 計算機為國內和國際有組織犯罪集團開辟了犯罪的廣泛領域。它要求它們集中資源,提高通力協作力量,因為許多犯罪太復雜,一個集團難以駕馭,特別是那些需要巨大的臟品交易時常網絡的罪行。 寫作方法與文章大意 文章介紹“計算機犯罪”,采用分類寫作手法,先列出種種計算機犯罪項,下面逐一說明。文本只選四種犯罪——信息數據偷竊或信息(數據)犯罪,產業破壞,政治破壞,對個人生命破壞。分四段敘述,每段為一種罪行,最后是對比罪犯勢力越來越有組織,勢力請大,而司法部門卻沒有準備好。 答案祥解 1. ? ? ?B. 8種,具體罪行。見難句譯注1。 2. ? ? ?B. 他的目的是削弱公司競爭力進而得到它。答案見難句譯注2及第二段第二句起:“計算機破壞也可以和富裕的投資者欲得到對手的公司的企圖相連。隨著公司對計算機記錄存儲的信賴性加強,破壞他們的計算機可以造成內部大破壞。之后,對取得這個公司感性趣的集團很容易在級低價格上買進。” A. 削弱公司運轉能力。 C. 在相當低的價格上買進對手的公司。這兩個選項都只是破壞目的的一個方面。D. 偷竊重要資料,文內沒有講。 3. ? ? ?C 破壞秘密訓練基礎。這可以標以政治目的的破壞計算機。 A. 大學 B. 醫院D. 工廠。 這三個地方都難以和政治直接相連,第三段講的大學是“參與國防保衛工作的大學計算機措施”,和一般大學不一樣。只有秘密訓練的基地和真正相連的可能性最大,所以選C. 4. ? ? ?B. 犯罪可以通過計算機任意殺人。答案在第五段:“犯罪集團曾采取步驟暗殺政治領袖。醫院的生命維護系統,實驗室,大型外科手術中都用計算機。罪犯們很容易把這些計算機轉變成破壞的工具。通過破壞生命維護系統計算機,罪犯們就像用槍一樣很容易殺死人。通過控制計算機,他們可以指導這可怖的工具攻擊大城市中心。城市和國家都可以成為人質。謀殺具有新的形式,計算機可能成為21世紀的事業殺手。” A. 殺人不需要用槍。這話太籠統,不用槍,用什么。用毒藥,用刀?C. 計算機可以取代任何武器。D. 計算機的功能就像槍,錯誤的。

主站蜘蛛池模板: 人妻少妇中文字幕乱码| 女人是男人的未来1分29| 国产女主播一区| 久久综合噜噜激激的五月天| 波多野结衣资源在线| 欧美亚洲综合另类在线观看| 国产精品无码aⅴ嫩草| 亚洲国产欧美日韩一区二区三区| 337p西西人体大胆瓣开下部| 欧美成人午夜视频| 国产精品亚洲欧美大片在线看| 亚洲乱码一区二区三区在线观看 | 国产区图片区小说区亚洲区| 久久精品亚洲一区二区| 雪花飘在线电影观看韩国| 无遮挡很污很爽很黄的网站| 国产FREEXXXX性麻豆| 下面一进一出好爽视频| 窝窝影院午夜看片| 在线看三级aaa| 亚洲制服欧美自拍另类| 国产激情视频在线观看首页| 日本动漫黄观看免费网站| 国产AV无码专区亚洲AV| 一本一道中文字幕无码东京热| 狠狠综合久久久久尤物丿| 国产美女久久久| 九色视频最新网址| 色综合久久综合网| 小说专区图片专区| 亚洲欧美日韩在线观看播放| 亚洲综合五月天欧美| 日本全黄三级在线观看| 可知子与野鸟君日文| WWW免费视频在线观看播放| 欧美日韩国产精品自在自线| 国产欧美亚洲精品第一页久久肉 | 中文字幕精品久久久久人妻 | 日韩avdvd| 午夜免费福利视频| 99RE6这里有精品热视频|