2012高考英语 阅读理解课堂练学案(15)_第1页
2012高考英语 阅读理解课堂练学案(15)_第2页
2012高考英语 阅读理解课堂练学案(15)_第3页
2012高考英语 阅读理解课堂练学案(15)_第4页
2012高考英语 阅读理解课堂练学案(15)_第5页
已阅读5页,还剩2页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、2012高考英语:阅读理解课堂练学案(15)Passage Sixteen (Crime in Computer)   New and bizarre crimes have come into being with the advent of computer technology. Organized crime to has been directly involved; the new technology offers it unlimited opportunities, such as data crimes, theft of services, prope

2、rty-related crimes, industrial sabotage, politically related sabotage, vandalism, crimes against the individual and financially related crimes   Theft of data, or data crime, has attracted the interest of organized criminal syndicates. This is usually the theft or copying of valuable compu

3、ter grogram. An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding criminal market. Buyers for stolen programs may range from a firms competitors to foreign nations.   A competitor sabotages a compan

4、ys computer system to destroy or cripple the firms operational ability, thus neutralizing its competitive capability either in the private or the government sector. This computer sabotage may also be tied to an attempt by affluent investors to acquire the victim firm. With the growing reliance by fi

5、rms on computers for their recordkeeping and daily operations, sabotage of their computers can result in internal havoc, after which the group interested in acquiring the firm can easily buy it at a substantially lower price. Criminal groups could also resort to sabotage if the company is a competit

6、or of a business owned or controlled by organized crime.   Politically motivated sabotage is on the increase; political extremist groups have sprouted on every continent. Sophisticated computer technology arms these groups with awesome powers and opens technologically advanced nations to t

7、heir attack. Several attempts have already been made to destroy computer facility at an air force base. A university computer facility involved in national defence work suffered more than $2 million in damages as a result of a bombing.   Computer vulnerability has been amply documented. On

8、e congressional study concluded that neither government nor private computer systems are adequately protected against sabotage. Organized criminal syndicates have shown their willingness to work with politically motivated groups. Investigators have uncovered evidence of cooperation between criminal

9、groups and foreign governments in narcotics. Criminal groups have taken attempts in assassinating political leaders. Computers are used in hospital life-support system, in laboratories, and in major surgery. Criminals could easily turn these computers into tools of devastation. By sabotaging the com

10、puter of a life-support system, criminals could kill an individual as easily as they had used a gun. By manipulating a computer, they could guide awesome tools of terror against large urban centers. Cities and nations could become hostages. Homicide could take a now form. The computer may become the

11、 hit man of the twentieth century.   The computer opens vast areas of crime to organized criminal groups, both national and international. It calls on them to pool their resources and increase their cooperative efforts, because many of these crimes are too complex for one group to handle,

12、especially those requiting a vast network of fences. Although criminals have adapted to computer technology, law enforcement has not. Many still think in terms of traditional criminology.1.      How many kinds of crimes are mentioned in the passage?A.  7.      

13、0;  .  8.            C.  9.        D.  102.      What is the purpose of a competitor to sabotage a companys computer?A. His purpose is to destroy or weaken the firms operational ability. His purpose is to weake

14、n firms competitive capability and get it.C. His purpose is to buy the rivals company at a relatively low price.D. His purpose is to steal important data.3.      Which of the following can be labeled as a politically motivated sabotage of a computer system?A. Sabotage of a university

15、computer. Sabotage of a hospital computer.C. Sabotage of computer at a secret training base.D. Sabotage of a factory computer.4.      What does the author mean by “Homicide could take a new form”?A. There is no need to use a gun in killing a person. Criminals can kill whoever they wan

16、t by a computer.C. The computer can replace any weapons.D. The function of a computer is just like a gun.Vocabulary1.   bizarre                  奇怪的2.   vandalism               破坏,故意破坏文化,艺术的

17、行为3.   cripple                  使瘫痪,削弱4.   fence                   贼市,脏品买卖处5.   neutralize               使成为无效6.   afflu

18、ent                 富裕的7.   recordkeeping            记录存贮8.   havoc                  浩劫,大破坏9.   resort to          

19、      求助于,借助于10.  motivate                作为的动机,激发11.  extremist                过激分子,极端主义分子12.  sprout               

20、60;  萌发迅速发展13.  awesome               令人惊惧的,引起敬畏的14.  vulnerability             易受攻击,脆弱15.  devastation              劫持,破坏16.  hospital life-support s

21、ystem 医院的生命维持系统17.  hit man                 职业凶手(杀手)18.  pool                   集中(资金)合办,入股19.  criminology             犯罪学,刑事学难句译注1. &

22、#160;    Organized crime to has been directly involved; the new technology offers it unlimited opportunities, such as data crimes, theft of services, property-related crimes, industrial sabotage, politically related sabotage, vandalism, crimes against the individual and financially related

23、 crimes结构简析 句子很长,都是简单句,中间有分号隔开,后面是举例。参考译文 有组织犯罪团伙也直接参与:计算机新技术较为犯罪提供了无限的机会,如数据信息犯罪,偷窃服务项目,跟财产有关的犯罪,工业破坏,跟政治有关的破坏,破坏文化艺术,对个人和财经方面的罪行等等。2.      An international market already exists for computerized data, and specialized fences are said to be playing a key role in this rapidly expanding

24、 criminal market.结构简析 并列句,and 作对比连接词用。参考译文 一个计算机信息的国际市场已经存在,而专门从事脏品交易的市场据说在迅速扩展的犯罪市场中起着关键的作用。3.      A competitor sabotages a companys computer system to destroy or cripple the firms operational ability, thus neutralizing its competitive capability either in the private or the governm

25、ent sector.结构简析 主谓宾补结构,后跟thus+从句表示结果。参考译文 竞争对手破坏一个公司的计算机系统为的是摧毁或削弱公司的操作运行能力,从而使其丧失在私人或政府部门中的竞争力。4.      The computer opens vast areas of crime to organized criminal groups, both national and international. It calls on them to pool their resources and increase their cooperative efforts

26、, because many of these crimes are too complex for one group to handle, especially those requiting a vast network of fences.结构简析 两句话。前一句为主谓宾,后一句为主从句,从句内采用tooto 句型,后跟分词独立结构进一步说明。参考译文 计算机为国内和国际有组织犯罪集团开辟了犯罪的广泛领域。它要求它们集中资源,提高通力协作力量,因为许多犯罪太复杂,一个集团难以驾驭,特别是那些需要巨大的脏品交易时常网络的罪行。写作方法与文章大意文章介绍“计算机犯罪”,采用分类写作手法,先

27、列出种种计算机犯罪项,下面逐一说明。文本只选四种犯罪信息数据偷窃或信息(数据)犯罪,产业破坏,政治破坏,对个人生命破坏。分四段叙述,每段为一种罪行,最后是对比罪犯势力越来越有组织,势力请大,而司法部门却没有准备好。答案祥解1.      B. 种,具体罪行。见难句译注。2.      B. 他的目的是削弱公司竞争力进而得到它。答案见难句译注及第二段第二句起:“计算机破坏也可以和富裕的投资者欲得到对手的公司的企图相连。随着公司对计算机记录存储的信赖性加强,破坏他们的计算机可以造成内部大破坏。之后,对取得这个公司感性趣的集团很容易在级低价

28、格上买进。”A. 削弱公司运转能力。C. 在相当低的价格上买进对手的公司。这两个选项都只是破坏目的的一个方面。D. 偷窃重要资料,文内没有讲。3.      C 破坏秘密训练基础。这可以标以政治目的的破坏计算机。A. 大学B. 医院D. 工厂。这三个地方都难以和政治直接相连,第三段讲的大学是“参与国防保卫工作的大学计算机措施”,和一般大学不一样。只有秘密训练的基地和真正相连的可能性最大,所以选C.4.      B. 犯罪可以通过计算机任意杀人。答案在第五段:“犯罪集团曾采取步骤暗杀政治领袖。医院的生命维护系统,实验室,大型外科手术中

29、都用计算机。罪犯们很容易把这些计算机转变成破坏的工具。通过破坏生命维护系统计算机,罪犯们就像用枪一样很容易杀死人。通过控制计算机,他们可以指导这可怖的工具攻击大城市中心。城市和国家都可以成为人质。谋杀具有新的形式,计算机可能成为世纪的事业杀手。”A. 杀人不需要用枪。这话太笼统,不用枪,用什么。用毒药,用刀?C. 计算机可以取代任何武器。D. 计算机的功能就像枪,错误的。Passage Seventeen (A Strong Stock Market)   The increase in the margin rate from 50% to 70% was not an

30、attempt to stem any rampant speculation on the part of the publicactually the market seemed technically quite strong, with public participation essentially dignifiedbut rather an attempt by the Federal Reserve Board to preserve the sound underpinnings that existed in the market. Naturally, such a mo

31、ve had a momentarily chilling effect upon prices but if the FRB had been preoccupied with undue speculation, the increase might have been to the 80% or even 90% level. Such an increases in the margin rate is a confirmation of a strong stock market and since 19,such increases have resulted in interim

32、 market highs over twelve months later. Obviously, there could be no guarantee that this would once again be the case, but if history is any guidelineand if business and corporate earnings were to continue on the same coursecontinued optimism over the outlook for the stock market would seem more pru

33、dent than pessimism.   The margin increase underscored the good rise that stocks had enjoyed for the previous yearand the fact that a 50% rate was maintained as long as it was pointed up the fact that the rise was mainly conservative in that it was concentrated in the blue chips for the mo

34、st part. In past Investment Letters we have voiced the thought that speciality stocks could outperform the general market from this point. We continue to believe that this could be the case. For example, steel stocks tend to sell at certain fixed price/earnings ratios. Below a certain ratio they are

35、 considered good valueabove a certain ratio, overpriced. If a company produces a unique product it is far more difficult for market analysis to place a numerical ratio upon the companys earnings. We have also contended in the past Letters that the stock market reflects mass psychology as well as the

36、 business outlook. When investorsboth the public and the institutionsare nervous and pessimistic they definitely hesitate to buy stocks: they seek low price/earnings multiples and high yields. These same investorswhen they are in an optimistic frame of mindbecome for less preoccupied with yields and

37、 more wiling to pay a premium(high p/e multiples) for accelerated growth. If the publics attitude towards the auto industry is any measure, then this period seems to have been one of optimism.1.      The title that best expresses the ideas of this passage is A. A Time to Sell Stock. &

38、#160;               . A Strong Stock MarketC. Raising the Margin Rate               C. Price/earnings Ratio in Steel2.      When investors are pessimistic what do they do?A. They look to the FRB

39、for help.          . They buy steelC. They buy automobile stocks.            D. They look for high yields.3.      Why does the writer believe that speciality stocks could outperform the general market?A. Because analysis

40、 have difficulty in deciding upon a fixed price/earnings ratio. Because the activity had been limited to blue chips.C. Because the rise was conservative.D. Because of the FRB action.4.      When investors are optimistic, what do they do?A. They look for accelerated growth.   

41、0;  . They buy speciality stocks.C. They look for high yields.            C. They are more prudent.Vocabulary1.   margin rate                 保证金率,边际比率2.   rampant         

42、60;          无约束力,猖獗的,蔓延的3.   stem                      遏制4.   stem from                  滋长,源自5.   underpin      &

43、#160;            加强基础,支持6.   underpinning                支持物,基础(建筑物下的)7.   preoccupy                  先占,使专心于,吸引住8.   undue    

44、60;                过分的,非法的,不适当的9.   interim                    间歇;暂时的,间歇的10.  guideline                  方针,指导路线11.  und

45、erscore                 在下面划线,强调12.  point up                   加强,强调13.  bluechip                   兰筹股票14.  blue-

46、chip                  兰筹的15.  outperform                在使用上胜过16.  overprice                  将标价过高17.  numerical ratio  

47、;           数率,数字比率18.  earnings                  收益,利润,收入19.  contend                   竞争,坚决主张,争论20.  premium      

48、60;           佣金,酬金难句译注1.      The increase in the margin rate from 50% to 70% was not an attempt to stem any rampant speculation on the part of the publicactually the market seemed technically quite strong, with public participation essentially dign

49、ifiedbut rather an attempt by the Federal Reserve Board to preserve the sound underpinnings that existed in the market.结构简析 是notbut句型,两个破折号中间是插入成分;中插入一个带with+N+participle 短语参考译文 保证金率从50%增长到70%,并不是想要遏制群众方面猖獗的投机,而是联邦储备委员会想要保持现存于股市强劲基础事实上股市由于群众非常庄严的参与在技术上看起来相当强劲。2.      Obviously, there could be no guarantee that this would once again be the case, but

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论