恩波08年12月大学英语四级全真模拟(四)
[4] 阅读理解
Part Ⅳ Reading Comprehension(Reading in Depth) (25 minutes)
Section A
Directions:In this section, there is a passage with ten blanks. You are required to select one word for each blank from a list of choices given in a word bank following the passage. Read the passage through carefully before making your choices. Each choice in the bank is identified by a letter. Please mark the corresponding letter for each item on Answer Sheet 2 with a single line through the centre. You may not use any of the words in the bank more than once.
Questions 47 to 56 are based on the following passage.
Undoubtedly the globe is getting hotter and hotter. The unavoidable questions are: How much responsibility shall we take for warming, and are we 47 to stop the destruction by limiting our insatiable 48 for natural fuels?
It seems that global warming is too 49 to be worried about, or too unpredictable. The computer 50 cannot define what the weather is like next week. In cold winter day it might be considered that a little warming would be a fair thing. And doubtlessly: Alarming about 51 alteration may sound like an environmentalist frightening strategy, aiming to urge humans to walk and keep the world cleaner.
However, based on the data collected by scientists, bad news are brought to our living media.
From California to the snowy peaks of China, the air is heating up right now, and the globe is being fast warmed, the 52 has increased by 1 ℉ compared with the past century. In addition, some parts like remote places have been in a much hotter state. The results aren’t satisfactory, ice being 53 , rivers running dry, and coasts being 54 , threatening villages and cottages.
The 55 are gradually occurring without any obvious phenomenon. But they shouldn’t slip our mind, because they can pose as a great potential threat to the 56 world.
A) remote
B) technology
C) composing
D) whole
E) voluntary
F) climate
G) skill
H) desire
I) melting
J) vanishing
K) eroded
L) temperature
M) amazement
N) changes
O) clever
Section B
Directions: There are 2 passages in this section. Each passage is followed by some questions or unfinished statements. For each of them there are four choices marked A), B), C) and D). You should decide on the best choice and mark the corresponding letter on Answer Sheet 2 with a single line through the centre.
Passage One
Questions 57 to 61 are based on the following passage.
It is 4 o’clock in the early morning.Everything but the computing room on the campus of the university appears as quiet and misty as the mysterious hell. In the computing room, 30 students crumpled with blurred eyes, sit still at their desk, thumping the dirty and worn keys. Staring at the colorful screen, they tap continuously for hours. For the other parts in the world, it might be in the midst of the night, nevertheless here time represents nothing. It is an utterly enclosed field. These young computer "hackers" are tracing a sort of stimulus; a drive so exciting and absorbing it downplays nearly anything else in their lives and founds as the focus their being. They are compelled computer programmers. Some of these students have been glued to the console for no less than twenty hours even with no break for meals or rest. Some have been sleeping on sofas and lounge chairs in the computing room, trying to struggle for a few moments’rest but hate to get too far away from their addicted machines.
It is no necessary for most of these students to be at the computing room in the middle of the night. What they are working belong to no assignments. They remain there because they desire to be-they can not resist the attraction of the computers.
Furthermore they are in groups instead of alone. There are hackers at computing rooms all over the country. In the unimaginable way, they focus on nothing but computer. They escape from schooling and live beyond friendship; they might have difficulty being employed, choosing to travel from one computing room to another. They may even abandon personal health.
"There is one hacker in my memory. We actually had to lift him away from his chair to feed him and arrange him to rest and sleep. We truly worried about his health," says a computing science professor at California University.
Professors of computer science are nowadays shedding more light on this hacker phenomenon and are on the watch for latent hackers and more and more severe computer addictives. They are sober that hackers are not simply resulted from the close relationship with a machine. It is the result of social relationship with the attractive thinking machines, which are becoming nearly universal.
57. We can learn from the passage that those at the computing room in the middle of the night are .
A) students working on a program
B) students using computers to amuse themselves
C) hard-working computer science majors
D) students deeply fascinated by the computer
58. Which of the following is NOT true of those young computer "hackers"?
A) Most of them are top students majoring in computer programming.
B) For them, computer programming is the sole purpose for their life.
C) They can stay with the computer at the centre for nearly two days on end.
D) Their "love" for the computer is so deep that they want to be near their machines even when they sleep.
59. It can be reasonably inferred from the passage that .
A) the"hacker"phenomenon exists only at university computing rooms
B) university computing rooms are open to almost everyone
C) university computing rooms are expecting outstanding programmers out of the"hackers"
D) the"hacker"phenomenon is partly attributable to the deficiency of the computing rooms
60.The author’s attitude towards the "hacker" phenomenon can be described as .
A) affirmative B) contemptuous C) anxious D) disgusted
61. Which of the following may be the most appropriate title for the passage?
A) The Charm of Computer Science
B) A New Type of Electronic Toys
C) Compulsive Computer Programmers
D) Computer Addicts
Passage Two
Questions 62 to 66 are based on the following passage.
Very few commenters have a better point of that forbidding exchanging media called E-mail than John Moon, the CEO of E-mail management company Talk Labs. Moon examines a network that deals with 5.0 million letters everyday. The servers run and fixed by Talk Labs manage mail delivery and routing for many companies, including Security Company of England and Malshef Business.
As a matter of fact, all of Talk Labs’customers are madeup of companies whose daily E-mail outflow and inflow have substantially increased with the expansion of the Web. "E-mail usage has significantly risen recently," he says. Indeed, Talk Labs estimates that it has risen from 20 a day each employee as lately as three years ago to 30 or 40 at present.
The implications for Corporate America are equally huge. As E-mail researcher and consultant Jack Blour believes, companies can be in the expectation of the volume of E-mail rising through their servers to grow 70% to 90% in 2002. And as individual messages soar it is most likely that they contain memory-companies could finally pay 100% to 150% more simply this year on systems in the store and management of those messages. That’s the reason why tech consultancy Tadigul Group predicts demand for software manageing E-mail, such as Microsoft Outlook and Lotus Notes, to grow from $2.6 billion in sales today to $4.4 billion by 2005.
Controlling pure junk will cost too much money. About 20% of the E-mail Talk Labs manages is uninvited, according to Moon-who further states that about 1.25% of all the E-mail his company cancels includes useless files.
It is estimated that handling spam(垃圾邮件) costs $8.6 billion throughout the world, according to a 2001 Japanese study. And some companies has been worried that the jam of pornographic spam may urge employees to sue on grounds of disturbance due to brought discomfort.
62. The first sentence of this passage "Very few commenters have a better point of that forbidding exchanging media called E-mail than John Moon..."most probably means .
A) John Moon clearly know the E-mail is wasting resources
B) no one knows the fact that E-mail is gossip exchanging way but John Moon
C) John Moon does not know anything about the E-mail
D) the John Moon always concentrated on the ocean of the junk E-mail
63. Which of the following is NOT true about Talk Labs?
A) It is an E-mail management company.
B) All of Talk Labs’customers are corporations.
C) John Moon is the chief technology officer of Talk Labs.
D) The company puts the great emphasis on dealing with the junk E-mail.
64. The word "that" in the last sentence of the third paragraph most possibly means .
A) it is expected that Microsoft Outlook and Lotus Notes grow from $2.6 billion in sales today to $4.4 billion by 2005
B) the junk E-mail has been overloaded in the Internet
C) the increase of individual messages needs more staff
D) the company has paid 100% to 150% for individual message storage
65.The following statements about the E-mail have been mentioned EXCEPT .
A) Moon examines a network that processes 5.0 million letters each day
B) according to Jack Blour, companies can expect the volume of E-mail passing through their servers to grow not more than 50% in 2002
C) too much money has been spent in controlling the junk E-mail
D) some employees might take legal action in accordance with annoyance arising from exposure to some unpleasant resources.
66. What is the best title for the passage?
A) The E-mail Monster
B) Talk Labs Business Introduction
C) To Avoid E-mail Surge
D) E-mail Destroys Everything
Part Ⅳ Reading Comprehension(Reading in Depth) (25 minutes)
Section A
Directions:In this section, there is a passage with ten blanks. You are required to select one word for each blank from a list of choices given in a word bank following the passage. Read the passage through carefully before making your choices. Each choice in the bank is identified by a letter. Please mark the corresponding letter for each item on Answer Sheet 2 with a single line through the centre. You may not use any of the words in the bank more than once.
Questions 47 to 56 are based on the following passage.
Undoubtedly the globe is getting hotter and hotter. The unavoidable questions are: How much responsibility shall we take for warming, and are we 47 to stop the destruction by limiting our insatiable 48 for natural fuels?
It seems that global warming is too 49 to be worried about, or too unpredictable. The computer 50 cannot define what the weather is like next week. In cold winter day it might be considered that a little warming would be a fair thing. And doubtlessly: Alarming about 51 alteration may sound like an environmentalist frightening strategy, aiming to urge humans to walk and keep the world cleaner.
However, based on the data collected by scientists, bad news are brought to our living media.
From California to the snowy peaks of China, the air is heating up right now, and the globe is being fast warmed, the 52 has increased by 1 ℉ compared with the past century. In addition, some parts like remote places have been in a much hotter state. The results aren’t satisfactory, ice being 53 , rivers running dry, and coasts being 54 , threatening villages and cottages.
The 55 are gradually occurring without any obvious phenomenon. But they shouldn’t slip our mind, because they can pose as a great potential threat to the 56 world.
A) remote
B) technology
C) composing
D) whole
E) voluntary
F) climate
G) skill
H) desire
I) melting
J) vanishing
K) eroded
L) temperature
M) amazement
N) changes
O) clever
Section B
Directions: There are 2 passages in this section. Each passage is followed by some questions or unfinished statements. For each of them there are four choices marked A), B), C) and D). You should decide on the best choice and mark the corresponding letter on Answer Sheet 2 with a single line through the centre.
Passage One
Questions 57 to 61 are based on the following passage.
It is 4 o’clock in the early morning.Everything but the computing room on the campus of the university appears as quiet and misty as the mysterious hell. In the computing room, 30 students crumpled with blurred eyes, sit still at their desk, thumping the dirty and worn keys. Staring at the colorful screen, they tap continuously for hours. For the other parts in the world, it might be in the midst of the night, nevertheless here time represents nothing. It is an utterly enclosed field. These young computer "hackers" are tracing a sort of stimulus; a drive so exciting and absorbing it downplays nearly anything else in their lives and founds as the focus their being. They are compelled computer programmers. Some of these students have been glued to the console for no less than twenty hours even with no break for meals or rest. Some have been sleeping on sofas and lounge chairs in the computing room, trying to struggle for a few moments’rest but hate to get too far away from their addicted machines.
It is no necessary for most of these students to be at the computing room in the middle of the night. What they are working belong to no assignments. They remain there because they desire to be-they can not resist the attraction of the computers.
Furthermore they are in groups instead of alone. There are hackers at computing rooms all over the country. In the unimaginable way, they focus on nothing but computer. They escape from schooling and live beyond friendship; they might have difficulty being employed, choosing to travel from one computing room to another. They may even abandon personal health.
"There is one hacker in my memory. We actually had to lift him away from his chair to feed him and arrange him to rest and sleep. We truly worried about his health," says a computing science professor at California University.
Professors of computer science are nowadays shedding more light on this hacker phenomenon and are on the watch for latent hackers and more and more severe computer addictives. They are sober that hackers are not simply resulted from the close relationship with a machine. It is the result of social relationship with the attractive thinking machines, which are becoming nearly universal.
57. We can learn from the passage that those at the computing room in the middle of the night are .
A) students working on a program
B) students using computers to amuse themselves
C) hard-working computer science majors
D) students deeply fascinated by the computer
58. Which of the following is NOT true of those young computer "hackers"?
A) Most of them are top students majoring in computer programming.
B) For them, computer programming is the sole purpose for their life.
C) They can stay with the computer at the centre for nearly two days on end.
D) Their "love" for the computer is so deep that they want to be near their machines even when they sleep.
59. It can be reasonably inferred from the passage that .
A) the"hacker"phenomenon exists only at university computing rooms
B) university computing rooms are open to almost everyone
C) university computing rooms are expecting outstanding programmers out of the"hackers"
D) the"hacker"phenomenon is partly attributable to the deficiency of the computing rooms
60.The author’s attitude towards the "hacker" phenomenon can be described as .
A) affirmative B) contemptuous C) anxious D) disgusted
61. Which of the following may be the most appropriate title for the passage?
A) The Charm of Computer Science
B) A New Type of Electronic Toys
C) Compulsive Computer Programmers
D) Computer Addicts
Passage Two
Questions 62 to 66 are based on the following passage.
Very few commenters have a better point of that forbidding exchanging media called E-mail than John Moon, the CEO of E-mail management company Talk Labs. Moon examines a network that deals with 5.0 million letters everyday. The servers run and fixed by Talk Labs manage mail delivery and routing for many companies, including Security Company of England and Malshef Business.
As a matter of fact, all of Talk Labs’customers are madeup of companies whose daily E-mail outflow and inflow have substantially increased with the expansion of the Web. "E-mail usage has significantly risen recently," he says. Indeed, Talk Labs estimates that it has risen from 20 a day each employee as lately as three years ago to 30 or 40 at present.
The implications for Corporate America are equally huge. As E-mail researcher and consultant Jack Blour believes, companies can be in the expectation of the volume of E-mail rising through their servers to grow 70% to 90% in 2002. And as individual messages soar it is most likely that they contain memory-companies could finally pay 100% to 150% more simply this year on systems in the store and management of those messages. That’s the reason why tech consultancy Tadigul Group predicts demand for software manageing E-mail, such as Microsoft Outlook and Lotus Notes, to grow from $2.6 billion in sales today to $4.4 billion by 2005.
Controlling pure junk will cost too much money. About 20% of the E-mail Talk Labs manages is uninvited, according to Moon-who further states that about 1.25% of all the E-mail his company cancels includes useless files.
It is estimated that handling spam(垃圾邮件) costs $8.6 billion throughout the world, according to a 2001 Japanese study. And some companies has been worried that the jam of pornographic spam may urge employees to sue on grounds of disturbance due to brought discomfort.
62. The first sentence of this passage "Very few commenters have a better point of that forbidding exchanging media called E-mail than John Moon..."most probably means .
A) John Moon clearly know the E-mail is wasting resources
B) no one knows the fact that E-mail is gossip exchanging way but John Moon
C) John Moon does not know anything about the E-mail
D) the John Moon always concentrated on the ocean of the junk E-mail
63. Which of the following is NOT true about Talk Labs?
A) It is an E-mail management company.
B) All of Talk Labs’customers are corporations.
C) John Moon is the chief technology officer of Talk Labs.
D) The company puts the great emphasis on dealing with the junk E-mail.
64. The word "that" in the last sentence of the third paragraph most possibly means .
A) it is expected that Microsoft Outlook and Lotus Notes grow from $2.6 billion in sales today to $4.4 billion by 2005
B) the junk E-mail has been overloaded in the Internet
C) the increase of individual messages needs more staff
D) the company has paid 100% to 150% for individual message storage
65.The following statements about the E-mail have been mentioned EXCEPT .
A) Moon examines a network that processes 5.0 million letters each day
B) according to Jack Blour, companies can expect the volume of E-mail passing through their servers to grow not more than 50% in 2002
C) too much money has been spent in controlling the junk E-mail
D) some employees might take legal action in accordance with annoyance arising from exposure to some unpleasant resources.
66. What is the best title for the passage?
A) The E-mail Monster
B) Talk Labs Business Introduction
C) To Avoid E-mail Surge
D) E-mail Destroys Everything
相关推荐