日韩色综合-日韩色中色-日韩色在线-日韩色哟哟-国产ts在线视频-国产suv精品一区二区69

基礎(chǔ)

手機APP下載

您現(xiàn)在的位置: 首頁 > 英語四級 > 英語四級試題 > 英語四級模擬題 > 正文

2012年6月大學英語四級試題模擬試卷(11)

編輯:Daisy ?  可可英語APP下載 |  可可官方微信:ikekenet

Part IV Reading Comprehension (Reading in Depth) (25 minutes)

Section A

Directions: In this section, there is a short passage with 5 questions or incomplete statements. Read the passage carefully. Then answer the questions or complete statements in the fewest possible words. Please write your answers on Answer Sheet 2.

Many of the most damaging and life threatening types of weather-torrential rains, severe thunderstorms, and tornadoes-begin quickly, strike suddenly, and disappear rapidly, destroying small regions while leaving neighboring areas untouched. Such event as a tornado struck the northeastern section of Edmonton, Alberta, in July 1987. Total damages from the tornado exceeded $250 million, the highest ever for any Canadian storm.

Conventional computer models of the atmosphere have limited value in predicting short lived local storms like the Edmonton tornado, because the available weather data are generally not detailed enough to allow computers to study carefully the subtly atmospheric changes that come before these storms. In most nations, for example, weather-balloon observations are taken just once every twelve hours at locations typically separated by hundreds of miles. With such limited data, conventional forecasting

models do a much better job predicting general weather conditions over large regions than they do forecasting specific local events.

Until recently, the observation intensive approach needed for accurate, very short-range forecasts, or “Nowcasts”, was not feasible. The cost of equipping and operating many thousands of conventional weather stations was extremely high, and the difficulties involved in rapidly collecting and processing the raw weather data from such a network were hard to overcome. Fortunately, scientific and technological advances have overcome most of these problems. Radar systems, automated weather instruments, and satellites are all capable of making detailed, nearly continuous observation over large regions at a relatively low cost. Communications satellites can transmit data around the world cheaply and instantaneously, and modern computers can quickly compile and analyze this large volume of weather information. Meteorologists (氣象學者) and computer scientists now work together to design computer programs and video equipment capable of transforming raw weather data into words, symbols, and vivid graphic displays that forecasters can interpret easily and quickly. As meteorologists have begun using these new technologies in weather forecasting offices, Nowcasting is becoming a reality.

47. It can be inferred from the passage that the value of damages from torrential rains, severe thunderstorms and tornadoes is ________________________.

48. Why do conventional models of the atmosphere fail to predict such a short-lived tornado?

___________________________________________________________________________.

49. It can be inferred from the passage that conventional forecasting models are now mostly used for ________________________.

50. What does “Nowcasts” mean according to the passage?

___________________________________________________________________________.

51. According to the passage, what makes “Nowcasting” a reality?

___________________________________________________________________________.

Section B

Directions: There are 2 passages in this section. Each passage is followed by some questions or unfinished statements. For each of them there are four choices marked [A],[B],[C] and [D]。 You should decide on the best choice and mark the corresponding letter on Answer Sheet 2 with a single line through the center.

Passage One

Questions 52 to 56 are based on the following passage.

What makes Americans spend nearly half their food dollars on meals away from home? The answers lie in the way Americans live today. During the first few decades of the twentieth century, canned and other convenience foods freed the family cook from full-time duty at the kitchen range.

Then, in the 1940s, work in the wartime defense plants took more women out of the home that ever before, setting the pattern of the working wife and mother. Unless fami

ly members pitch in with food preparation, women are not fully liberated from that chore.

It’s easier to pick up a bucket of fried chicken on the way home from work or take the family out for pizzas or burgers than to start opening cans or heating up frozen dinners after a long, hard day. Also nowadays, the rising divorce rate means that there are more single working parents with children to feed. And many young adults and elderly people, as well as unmarried and divorced mature people, live alone rather than as a part of a family unit and don‘t want to bother cooking for one. Fast food is appealing because it is fast, it doesn’t require any dressing up, it offers a “fun” break in the daily routine, and the outlay of money seems small. It can be eaten in the car-sometimes picked up at a drive-in window without even getting out-or on the run. Even if it is brought home to eat, there will never be any dirty dishes to wash because of the handy disposable wrappings. Children, especially, love fast food because it‘s finger food, no struggling with knives and forks, no annoying instructions from adults about table manners.

52. Americans enjoy fast food mainly because ________.

[A] it can be eaten in the car

[B] it is much more tasty than home-made food

[C] one only uses his fingers while eating it

[D] it is time-saving and convenient

53. It can be inferred that children ________.

[A] want to have freedom at table

[B] wa sh dishes after each meal

[C] are not good at using forks and knives while eating

[D] take eating time as a fun break

54. Many Americans are eating out and not cooking at home nowadays because ________.

[A] they want to make a change after eating the same food for years at home

[B] the food made outside home tastes better than food cooked at home

[C] many of them live alone or don’t like taking trouble to cook

[D] American women refuse to cook at home due to women‘s liberation movement

55. According to the text, a drive-in window is a ________.

[A] car window from which you can see the driver

[B] window in the restaurant from which you get your meal in the car

[C] place where you check the mechanic condition of your car

[D] entrance where you return the used plates after eating

56. The expression “pitch in with” (Line 2, Para. 2) probably means________.

[A] complain

[B] enjoy

[C] help

[D] deny

Passage Two

Questions 57 to 61 are based on the following passage.

InfraGard is a grass-roots effort to respond to the need for cooperation and collaboration in countering the threat of cyber crime and terrorism to private businesses and the government. By the end of September, there will be InfraGard chapters in all 50 states, Calloway said. With advice from the FBI, each local chapter will be run by a board of directors that includes members of private industry, the academic community and public agencies. Bands, utilities, and other businesses and government agencies will use a secure Web site to share information about attempts to hack into their computer networks. Members can join the system free. A key feature of the system is a two-pronged method of reporting attacks.

A “sanitized” description of a hacking attempt or other incident-one that doesn’t reveal the name or information about the victim-can be shared with the other members to spot trends. Then a more detailed description also can be sent to the FBI‘s computer crimes unit to interfere if there are grounds for an investigation. Cyber crime has jumped in recent years across the nation, particularly in hotbeds of financial commerce and technology like Charlotte. “Ten years ago, all you needed to protect yourself was a safe, a fence and security officers,” said Chris Swecker, who is in charge of the FBI’s Charlotte office. “Now any business with a modem is subject to attack.” FBI agents investigate computer hacking that disrupted popular Web sites including Amazon. com, CNN and Yahoo!

several North Carolina victims have been identified this year. The investigation has also identified computer systems in North Carolina used by hackers to commit such attacks. Prosecutions of hackers have been hampered by the reluctance of companies to report security intrusions for fear of bad publicity and lost business. Meanwhile, too many corporations have made it too easy for criminals by sacrificing security for speed and accessibility. Jack Wiles, who will lead the local InfraGard chapter‘s board, said a recent report estimated 97 percent of all cyber crime goes undetected. Wiles, a computer security expert, has a firewall on his personal computer to prevent hackers from getting into his files. “I get at least one report a day that somebody was trying to get into my computer,” he said, “the Net is a wonderful place, but it’s also a dangerous one.”

57. From the first paragraph, we know ________.

[A] InfraGard is a protective measure against cyber crime

[B] InfraGard is a measure of cooperation and collaboration

[C] there will be 50 InfraGard chapters in all states

[D] private business and the government are now committing cyber crime

58. Each local chapter of InfraGard will be run by the following EXCEPT ________.

[A] academic communities

[B] public agencies

[C] FBI

[D] private industry

59. By saying “too many corporations.。.speed and accessibility” (Lines 3~4, Para. 3), the author means ________.

[A] too many corporations take no notice of the security problem of computers

[B] criminals are sacrificing security for speed and accessibility

[C] it‘s very easy to sacrifice security for speed and accessibility

[D] many companies suffer from computer hacking because they value speed and accessibility more than security

60. A ll the following are reasons for the rise in cyber crime EXCEPT ________.

[A] victims won’t report intrusions by hackers

[B] victims have no firewalls

[C] the use of modem is increasing

[D] companies don‘t pay enough attention to security

61. It can be concluded from the passage that ________.

[A] not all hacking attempts are worthy of investigation

[B] information of the victims is inaccessible

[C] InfraGard chapters will be in effect by the end of September

[D] Amazon.com was often disrupted by hacking

重點單詞   查看全部解釋    
incomplete [.inkəm'pli:t]

想一想再看

adj. 不完全的,不完整的

 
lasting ['læstiŋ]

想一想再看

adj. 永久的,永恒的
動詞last的現(xiàn)在分

聯(lián)想記憶
solitary ['sɔlitəri]

想一想再看

adj. 孤獨的,獨立的,單個的,唯一的,荒涼的

聯(lián)想記憶
respond [ris'pɔnd]

想一想再看

v. 回答,答復(fù),反應(yīng),反響,響應(yīng)
n.

聯(lián)想記憶
unfortunate [ʌn'fɔ:tʃənit]

想一想再看

adj. 不幸的,令人遺憾的,不成功的
n.

聯(lián)想記憶
threatening ['θretniŋ]

想一想再看

adj. 威脅(性)的,兇兆的 動詞threaten的現(xiàn)

 
trunk [trʌŋk]

想一想再看

n. 樹干,軀干,干線, 象鼻,(汽車后部)行李箱

 
obligation [.ɔbli'geiʃən]

想一想再看

n. 義務(wù),責任

聯(lián)想記憶
constant ['kɔnstənt]

想一想再看

adj. 經(jīng)常的,不變的
n. 常數(shù),恒量

聯(lián)想記憶
independent [indi'pendənt]

想一想再看

adj. 獨立的,自主的,有主見的
n. 獨立

聯(lián)想記憶
?
發(fā)布評論我來說2句

    最新文章

    可可英語官方微信(微信號:ikekenet)

    每天向大家推送短小精悍的英語學習資料.

    添加方式1.掃描上方可可官方微信二維碼。
    添加方式2.搜索微信號ikekenet添加即可。
    主站蜘蛛池模板: 浙江卫视奔跑吧官网| 新民歌| 画魂缠身 电影| 韩国最火女团的舞蹈| 寡妇激情| 打龙袍全集免费观看| 爱情岛视频论坛| 第一财经公司与行业回放| 团结力量歌词大全图片| 乱世伦情 电影| 有关动物的成语| 性监狱电影| 曹东| 护校队申请书| 徐少强全部电影| 郁芳最经典的三部电影| hello小姐 电视剧| 水浒传老版83全集免费下载| 密探| 十大名茶排名表| 全家福演员表| 变形金刚6免费观看高清完整版| 天气预报电影| 帅气动漫头像| 降魔的| 变形金刚6免费完整版在线观看| 双重火力电影| 不要好舒服| 成都影院大全| 国庆节安全公约| 春闺梦里人电影在线观看| 美人邦| 零下的风 完整版| 视频爱爱| 黑木美纱| srv| 安渡| 放学我当家| 任港秀| 求佛的歌词| 狐仙 电影|