[考研类试卷]考研英语(阅读)模拟试卷178及答案与解析.doc

上传人:unhappyhay135 文档编号:855142 上传时间:2019-02-22 格式:DOC 页数:18 大小:66KB
下载 相关 举报
[考研类试卷]考研英语(阅读)模拟试卷178及答案与解析.doc_第1页
第1页 / 共18页
[考研类试卷]考研英语(阅读)模拟试卷178及答案与解析.doc_第2页
第2页 / 共18页
[考研类试卷]考研英语(阅读)模拟试卷178及答案与解析.doc_第3页
第3页 / 共18页
[考研类试卷]考研英语(阅读)模拟试卷178及答案与解析.doc_第4页
第4页 / 共18页
[考研类试卷]考研英语(阅读)模拟试卷178及答案与解析.doc_第5页
第5页 / 共18页
点击查看更多>>
资源描述

1、考研英语(阅读)模拟试卷 178 及答案与解析Part ADirections: Read the following four texts. Answer the questions below each text by choosing A, B, C or D. (40 points)0 Despite a cooling of the economy, high technology companies are still crying out for skilled workers. The Information Technology Association of America

2、projects that more than 800,000 technology jobs will go unfilled next year. The lack of qualified workers poses a huge threat to the U. S. economy.The most commonly cited reason for this state of affairs is that the countrys agrarian-age education system, separated from the needs of the business wor

3、ld, fails to prepare students in the primary and secondary grades for twenty-first-century work. Yet an inadequate and outmoded education system is only part of the problem. A less tangible but equally powerful cause is an antique classification system that divides the workforce into two camps: whit

4、e-collar knowledge workers and blue-collar manual laborers.Blue-collar workers emerged in the United States during the Industrial Age as work migrated from farms to factories. White-collar office workers became a significant class in the twentieth century, outnumbering their blue-collar brethren by

5、mid-century. But the white or blue paradigm has clearly outlived its utility. Corporations increasingly require a new layer of knowledge worker: a highly skilled multi-disciplinarian who combines the mind of the white-collar worker with the hands of the blue-collar employee. Armed with a solid groun

6、ding in mathematics and science(physics, chemistry, and biology), these “gold-collar“ workersso named for their contributions to their companies and to the economy, as well as for their personal earning abilityapply that knowledge to technology. Of course, the gold-collar worker already exists in a

7、wide range of jobs across a wide range of businesses: think of the maintenance technician who tests and repairs aircraft systems at American Airlines; the network administrator who manages systems and network operations at P the advanced-manufacturing technician at Intel.But until American business

8、recognizes these people as a new class of worker, one whose collar is neither blue nor white, demands that schools do a better job of preparing employees for the twenty-first-century workforce will be futile. Certainly, polytechnic high schools, colleges, and universities have made heroic efforts to

9、 teach workers new skills. But because many people see these initiatives as primarily training blue-collar workers, adequate funds are not invested in such programs, leaving them short of state-of-the-art tools and experienced teachers. And because gold-collar workers need to constantly update their

10、 skills to stay current with emerging technology, learning must be a continuous process, one that is funded by companies as well as by taxpayers.1 According to the passage the lack of qualified workers(A)makes a cooling of the economy.(B) increases the costs of high technology companies.(C) emphasiz

11、es the importance of unfilled jobs.(D)hinders the development of U. S. economy.2 From the second paragraph we learn that(A)the workforce classification is as wrong as the education system.(B) twenty-first-century workforce are separated from the needs of the business world.(C) white-collar workers a

12、re only part of the problem of education system.(D)blue-collar manual laborers are needed in agrarian-aged America.3 The gold-collar workers differ from white-collar and blue-collar workers in that they(A)wear gold-collar working clothes when they are on duty.(B) do better in combining their contrib

13、utions and earnings.(C) grasp the knowledge and apply it in their work as well.(D)apply the arts knowledge to technology.4 To increase the number of gold-collar workers,(A)the schools should assume the major responsibilities.(B) experienced teachers should have access to current tools.(C) the societ

14、y should consider them as a new layer of working classes.(D)the taxpayer should pay more money for the continuous training.5 The best title for the text may be(A)800,000 Technology Jobs Unfilled.(B) Gold-collar Workers Needed.(C) U. S. Economy Threatened.(D)Schools Fail to Train Gold-workers.5 Accor

15、ding to a Department of Homeland Security report obtained by Forbes, com, a group of unnamed private sector executives representing industries including banking, telecommunications and energy have been meeting with the DHS to find ways to more efficiently exchange data on cyber intrusions and digita

16、l spying. The DHS wouldnt share any details of the classified meetings. But the goal of the conferences, according to one former government official, is to build a better system for sharing classified cyber-threat data with private companies.Given Presidential Directive 54s scope and budget, the gov

17、ernment should have plenty to share. Over the next seven years, the programs initiative will spend as much as $30 billion to create a new monitoring system for all federal networks, a combined project of the DHS, the NSA and the Office of the Director of National Intelligence. The data-sharing plan

18、would offer information gathered by that massive monitoring system to the private sector in exchange for their own knowledge of cyber intrusions and spyware. Presidential Directive 54, is partly a response to a series of cyber intrusions that plagued the Pentagon last summer.The nations critical inf

19、rastructure systems, mostly owned by the private sector, may face a similar threat. But the notion of extending the governments network monitoring to the nations critical infrastructure has raised hackles. Privacy advocates, fearing government intrusion on private networks, have already compared the

20、 project to the NSAs warrantless wiretapping program. In a congressional hearing last Thursday, Rep. Paul Broun, said the program seemed “a little like the fox guarding the henhouse. “The information sharing strategy revealed in the DHS report may be a compromise. For now, the government is avoiding

21、 the controversy of monitoring commercial networks, and instead trading its cyber-threat information for data about intrusions that private companies have detected on their own computers, says Alan Paller, director of the SANS Institute, an organization that hosts a crisis center for hacked companie

22、s. “To find the bad guys, well need huge analytic engines, with all the right data,“ he says. “The government cant force these companies to let it watch traffic in commercial networks, so this is one way to get the private sector involved. “That doesnt mean the data-sharing project is a guarantee th

23、at government monitoring wont eventually be expanded to some parts of private industry, Paller says. He sees the project as the first step in convincing critical infrastructure companies to allow some government surveillance of their networks. Companies possessing classified government data, such as

24、 defense contractors , are especially likely to be brought under the initiatives umbrella of surveillance, according to some former government officials.6 What is the purpose of the meeting between the DHS and the private company executives?(A)To provide the Internet service among such industries as

25、 banking, telecommunications and energy.(B) To help the private companies in different industries change information.(C) To construct a system to share information on cyber-safety between the DHS and private companies.(D)To help the DHS manage the private companies in different industries.7 Which is

26、 not true about the project proposed in Presidential Directive 54?(A)The project is going to cost about $ 30 billion to build a new monitoring system.(B) The project aims to share information between federal departments and private companies.(C) The project will provide shield for networks of federa

27、l departments.(D)The project is proposed to prevent hackers from stealing data from Pentagon.8 The word “hackles“(Line 3, Paragraph 3)is closest in meaning to(A)feathers.(B) hair.(C) approval.(D)anger.9 According to Alan Paller, we can learn that(A)the private companies accepted the idea that their

28、networks will be monitored for the sake of cyber-safety.(B) the government proposes that it will not exchange cyber-threat data with the private companies.(C) the data-sharing project will not allow the government to survey the private companies networks.(D)the data-sharing project can help the gove

29、rnment persuade the private companies to accept some government surveillance. 10 The text is mainly talking about(A)the project raised by the DHS to share cyber-threat data with private companies.(B) the conferences on Internet services between the DHS and private companies.(C) the cyber-threat to t

30、he DHS and private companies.(D)the DHS and private companies joining together to fight cyber-threat.10 Cardiologists have pioneered the worlds first non-surgical bypass operation to turn a vein into an artery using a new technique to divert blood flow in a man with severe heart disease. The keyhole

31、 procedure, which avoids the extensive invasive surgery of a conventional bypass, will offer hope to tens of thousands of people at risk from heart attacks.Coronary heart disease, where the arteries are progressively silted up with fatty deposits, is responsible in a major industrial country like Br

32、itain for more than 160,000 deaths each year. Although major heart surgery is becoming commonplace, with more than 28,000 bypass operations in the UK annually, it is traumatic for patients and involves a long recovery period.The new technique was carried out by an international team of doctors who p

33、erformed the non-invasive surgery on a 53-year-old German patient. According to a special report in Circulation, journal of the American Heart Association, cardiologists developed a special catheter which was inserted into one of his leg arteries, threaded up through the aorta to the top of the dise

34、ased artery, which was the only part still open and receiving blood. Then, guided by ultrasound, a physician pushed a needle from inside the catheter through the artery wall and into the adjacent vein. A thin, flexible wire was threaded through the needle and the needle and catheter were withdrawn,

35、leaving the wire behind and a small angioplasty balloon, which was used to widen the channel. Finally, the vein was blocked off just above the new channel allowing blood from the artery to be re-routed down the vein.After the procedure, the vein effectively became an artery, carrying blood in the re

36、verse direction from the previous way, and feeding the starved heart tissue with oxygen.Dr. Stephen Oesterle, who led the team, said, “This milestone marks the first coronary artery bypass performed with a catheter. The technology offers a realistic hope for truly minimally invasive bypass procedure

37、s in the future. One of the most invasive things you can do in medicine is coronary artery bypass surgery. Our ultimate goal is to replace traditional coronary artery bypass with a procedure that does not require surgery. “ Dr. Oesterle is director of cardiology at Massachusetts General Hospital and

38、 associate professor of medicine at Harvard Medical School in Boston. Melanie Raddon, cardiac nurse at the British Heart Foundation, said it was likely to be many years before the procedure was routinely used in hospitals.11 Compared to conventional bypass procedure, the new bypass treatment(A)makes

39、 the patient feel less painful and recover sooner.(B) is an extensive invasive surgery employing high technology.(C) can bring an artery into vein without surgery.(D)can progressively silt up with fatty deposits.12 Which of the following is the first step of the bypass operation?(A)Thread up through

40、 the aorta to the top of the diseased artery.(B) Push a needle through artery wall into the adjacent vein.(C) Put a special catheter into one of the leg arteries.(D)Block off the vein to allow blood to re-routed.13 It can be concluded that after the new bypass treatment,(A)the wire inside the vein w

41、idens the channel.(B) blood flows in the opposite direction to the former one.(C) the starved heart tissue is fed through the previous blood route.(D)the patient was implanted with a new electronic heart.14 What is Dr. Oesterles attitude towards the new bypass?(A)Critical.(B) Positive.(C) Indifferen

42、t.(D)Neutral.15 The purpose of writing this text is probably to(A)praise the high technological level of Harvard Medical School.(B) comfort those patients who have developed coronary heart disease.(C) introduce a new therapy to cure heart disease.(D)criticize the traditional bypass surgery.15 While

43、traveling for various speaking engagements, I frequently stay overnight in the home of a family and am assigned to one of the childrens bedrooms. In it, I often find so many playthings that theres almost no roomfor my small toilet kit. And the closet is usually so tightly packed with clothes that I

44、can barely squeeze in my jacket. Im not complaining, only making a point. I think that the tendency to give children an overabundance of toys and clothes is quite common in American families, and I think that in far too many families not only do children come to take their parents generosity for gra

45、nted, but also the effects of this can actually be somewhat harmful to children.Of course, Im not only thinking of the material possessions children are given. Children can also be overindulged with too many privilegesfor example, when parents send a child to an expensive summer camp that the parent

46、s cant really afford. Why?One fairly common reason is that parents overindulge their children out of a sense of guilt. Parents who both hold full-time jobs may feel guilty about the amount of time they spend away from their children and may attempt to compensate by showering them with material posse

47、ssions.Overindulgence of a child also happens when parents are unable to stand up to their childrens unreasonable demands. Such parents vacillate between saying no and giving in but neither response seems satisfactory to them. If they refuse a request, they immediately feel a wave of remorse for hav

48、ing been so strict or ungenerous. If they give in, they feel regret and resentment over having been a pushover. This kind of vacillation not only impairs the parents ability to set limits, it also sours the parent-child relationship to some degree, robbing parents and their children of some of the h

49、appiness and mutual respect that should be present in healthy families.But overindulging children with material things does little to lessen parental guilt(since parents never feel that theyve given enough), nor does it make children feel more loved(for what children really crave is parents time and attention). Instead, the effects of overindulgence can be harmful. Children may, to some degree, become greedy, self-centered, ungrateful and insensitive to the needs and feelings of others, beginning with their parents. When children are given too much, it un

展开阅读全文
相关资源
猜你喜欢
  • ETSI TR 103 279-2014 End to End Network Architectures (E2NA) Location of Transcoders for voice and video communications (V1 1 1)《端到端网络架构 (E2NA) 语音和视频通讯用转码器的位置 (V1 1 1)》.pdf ETSI TR 103 279-2014 End to End Network Architectures (E2NA) Location of Transcoders for voice and video communications (V1 1 1)《端到端网络架构 (E2NA) 语音和视频通讯用转码器的位置 (V1 1 1)》.pdf
  • ETSI TR 103 282-2014 Network Technologies (NTECH) ENUM ENUM-like options for Number Portability and actual use cases (V1 1 1)《网络技术 (NTECH) 号码可移植性和实际使用案例的ENUM ENUM类似选项 (V1 1 1)》.pdf ETSI TR 103 282-2014 Network Technologies (NTECH) ENUM ENUM-like options for Number Portability and actual use cases (V1 1 1)《网络技术 (NTECH) 号码可移植性和实际使用案例的ENUM ENUM类似选项 (V1 1 1)》.pdf
  • ETSI TR 103 288-2016 Electromagnetic compatibility and Radio spectrum Matters (ERM) Report of the CENELEC ETSI Joint Working Group in response to the EC letter ENTRP F5 DP MM entr .pdf ETSI TR 103 288-2016 Electromagnetic compatibility and Radio spectrum Matters (ERM) Report of the CENELEC ETSI Joint Working Group in response to the EC letter ENTRP F5 DP MM entr .pdf
  • ETSI TR 103 288-2016 Electromagnetic compatibility and Radio spectrum Matters (ERM) Report of the CENELEC ETSI Joint Working Group in response to the EC letter ENTRP F5 DP MM entr is.pdf ETSI TR 103 288-2016 Electromagnetic compatibility and Radio spectrum Matters (ERM) Report of the CENELEC ETSI Joint Working Group in response to the EC letter ENTRP F5 DP MM entr is.pdf
  • ETSI TR 103 290-2015 Machine-to-Machine communications (M2M) Impact of Smart City Activity on IoT Environment (V1 1 1)《机器对机器通信 (M2M) 智慧城市活动对IoT环境的影响 (V1 1 1)》.pdf ETSI TR 103 290-2015 Machine-to-Machine communications (M2M) Impact of Smart City Activity on IoT Environment (V1 1 1)《机器对机器通信 (M2M) 智慧城市活动对IoT环境的影响 (V1 1 1)》.pdf
  • ETSI TR 103 293-2015 Broadband Radio Access Networks (BRAN) Broadband Wireless Access and Backhauling for Remote Rural Communities (V1 1 1)《宽带无线电接入网 (BRAN) 偏远农村社区的宽带无线接入和回程 (V1 1 1.pdf ETSI TR 103 293-2015 Broadband Radio Access Networks (BRAN) Broadband Wireless Access and Backhauling for Remote Rural Communities (V1 1 1)《宽带无线电接入网 (BRAN) 偏远农村社区的宽带无线接入和回程 (V1 1 1.pdf
  • ETSI TR 103 297-2017 Satellite Earth Stations and Systems (SES) SC-FDMA based radio waveform technology for Ku Ka band satellite service (V1 1 1).pdf ETSI TR 103 297-2017 Satellite Earth Stations and Systems (SES) SC-FDMA based radio waveform technology for Ku Ka band satellite service (V1 1 1).pdf
  • ETSI TR 103 303-2016 CYBER Protection measures for ICT in the context of Critical Infrastructure (V1 1 1)《网络 信息和通信技术在关键基础设施方面的保护措施(V1 1 1)》.pdf ETSI TR 103 303-2016 CYBER Protection measures for ICT in the context of Critical Infrastructure (V1 1 1)《网络 信息和通信技术在关键基础设施方面的保护措施(V1 1 1)》.pdf
  • ETSI TR 103 304-2016 CYBER Personally Identifiable Information (PII) Protection in mobile and cloud services (V1 1 1)《网络 移动和云服务中的个人识别信息(PII)保护(V1 1 1)》.pdf ETSI TR 103 304-2016 CYBER Personally Identifiable Information (PII) Protection in mobile and cloud services (V1 1 1)《网络 移动和云服务中的个人识别信息(PII)保护(V1 1 1)》.pdf
  • 相关搜索

    当前位置:首页 > 考试资料 > 大学考试

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1