高考英语一轮复习 阅读理解提升训练111.doc_第1页
高考英语一轮复习 阅读理解提升训练111.doc_第2页
高考英语一轮复习 阅读理解提升训练111.doc_第3页
高考英语一轮复习 阅读理解提升训练111.doc_第4页
高考英语一轮复习 阅读理解提升训练111.doc_第5页
已阅读5页,还剩3页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

江苏(淮南市)2017高考英语一轮阅读理解提升训练2016高考训练题。阅读理解。阅读下列短文,从每题所给的四个选项(A、B、C和D)中,选出最佳选项。Many Christmas customs are based on the birth of Christ, such as giving presents because of the Wise Men, who brought presents to the baby Jesus(耶稣)Singing Christmas carols is based on the scene of the birth with figures of shepherds, the Wise Men and animals surrounding the baby Jesus.The origin of Santa Claus begins in the 4th century with St. Nicholas, Bishop of Myra, an area in the present-day Turkey. By all accounts St. Nicholas was a generous man, particularly devoted to children. After his death around 340 A. D. he was buried in Myra, but in 1087 Italian sailors were believed to steal his remains and removed them to Italy, greatly increasing St. Nicholas popularity throughout Europe.His kindness and reputation for generosity gave rise to claims that he could perform miracles and devotion to him increased. St. Nicholas became the patron(保护神)saint of Russia, where he was known by his red cap, flowing white beard, and bishops mitre. In Greece, he was the patron saint of sailors; in France, he was the patron of lawyers, and in Belgium, the patron of children and travelers. Thousands of churches across Europe were dedicated(供奉的)to him and sometime around the 12th century an official holiday was created in his honor. The Feast of St. Nicholas was celebrated on December 6 and the day was marked by gift-giving and charity.After the Reformation, European followers of St. Nicholas declined, but the legend was kept alive in Holland where the Dutch spelling of his name Sint Nikolass was eventually transformed to Sinterklaas. Dutch children would leave their wooden shoes by the fireplace, and Sinterklaas would reward good children by placing treats in their shoes. Dutch colonists brought this tradition with them to America in the 17th century and here the English name of Santa Claus appeared.1.Why, as is believed, is Santa Claus so popular in Europe?A. Because of his reputation for generosity.B. Because he died in Italy.C. Because of the deed of the Italian sailors.D. Because of his devotion to Italian children.2.What was the Feast of St. Nicholas held for?A. Celebrating Christs birthday. B. Giving thanks to churches.C. Marking a holiday D. Honoring St. Nicholas.3.What does “Sinterklaas” in the last paragraph refer to?A. European followers. B. Santa Claus. C. Jesus. D. The Dutch.4.Which of the following can best describe Santa Claus?A. Generous, devoted and honored. B. Dedicated, kind and alive.C. Well-known, traditional and lovely. D. Popular, famous and creative.参考答案14、CDBA 2016高考英语阅读理解-社会现象类 Have you ever run into a careless cell phone user on the street? Perhaps they were busy talking, testing or checking updates on WeChat without looking at what was going on around them. As the number of this new “species” of human has kept rising, they have been given a new name phubbers (低头族). Recently, a cartoon created by students from China Central Academy of Fine Arts put this group of people under the spotlight. In the short film, phubbers with various social identities bury themselves in their phones. A doctor plays with his cell phone while letting his patient die, a pretty woman takes selfie in front of a car accident siteand a father loses his child without knowing about it while using his mobile phone. A chain of similar events eventually leads to the destruction of the world. Although the ending sounds overstated, the damage phubbing can bring is real. Your health is the first to bear the effect and result of it. “Constantly bending your head to check your cell phone could damage your neck,” Guangming Daily quoted doctors as saying. “The neck is like a rope that breaks after long-term stretching.” Also, staring at cell phones for long periods of time will damage your eyesight gradually, according to the report. But thats not all. Being a phubber could also damage your social skills and drive you away from your friends and family. At reunions with family or friends, many people tend to stick to their cell phones while others are chatting happily with each other and this creates a strange atmosphere, Qilu Evening News reported. It can also cost you your life. There have been lots of reports on phubbers who fell to their death, suffered accidents, and were robbed of their cell phones in broad daylight.【小题1】For what purpose does the author give the example of a cartoon in Para. 2? ATo inform people of the bad effects of phubbing.BTo advertise the cartoon made by students.CTo indicate the world will finally be destroyed by phubbers.DTo warn doctors against using cell phones while treating patients.【小题2】Which of the following is NOT a risk a phubber may have? AHis social skills could be affected.BHis neck and eyesight will be gradually harmed.CHe will cause the destruction of the world.DHe might get separated from his friends and family.【小题3】Which of the following may be the authors attitude towards phubbing? ASupportive.BOpposed.COptimistic.DObjective.【小题4】What may the passage talk about next? AAdvice on how to use a cell phone.BPeople addicted to phubbing.CMeasures to reduce the risks of phubbing.DConsequences of phubbing. 阅读下列短文,从每题所给的A.B.C和D项中,选出最佳选项。They may be just passing your office, computer bag slung (悬挂) over one shoulder. Or they may be sitting in a car outside it, causally tapping away at a laptop. They look like innocent passers-by. In fact, they are stealing your corporate secrets.Drive-by hacking is the trendy term given to the practice of breaking into wireless computer networks from outside the buildings that house them. A recent study in the UK, sponsored by RSA Data Security, found that two-thirds of organizations with wireless networks were risking their data in this way. Security experts patrolled (巡逻) several streets in the City of London seeking evidence of wireless networks in operation.Of 124 that they identified, 83 were sending data without encrypting(加密) them. Such data could readily be picked up by a passer-by armed only with a portable computer, a wireless modem and a few pieces of software that can be freely down-loaded from the Internet.The data could include sensitive company documents containing valuable information. Or they could be e-mail identities and passwords that could be used by hackers to log into corporate networks as if they were legal users.Most companies using wireless networking technology do not take even the simplest of precautions to protect their data. Nearly all wireless network technology comes with some basic security features that need only to be activated in order to give a minimum level of security, for example, by encrypting the data being passed over the network.Raymon Kruck, business development manager at Check Point Software, a security technology specialist, believes this could be partly a psychological problem. People see the solid walls of their building as safeguards and forget that wireless networks can extend up to 200 meters beyond physical walls.Companies without any security at all on their wireless networks make it ridiculously easy for hackers to break in. Switching on the security that comes with the network technology should be automatic. Then there are other basic steps a company can take, says Mr. Kruck, such as changing the passwords on the network from the default (默认) setting.Companies can also install firewalls, which form a barrier between the internal network and the public Internet. They should also check their computer records regularly to spot any abnormal activity, which might betray the presence of a hacker.16. According to the study sponsored by RSA Data Security, two thirds of the subjects _.A.had their corporate data stolenB.depended on wireless computer networksC.were exposed to drive-by hackingD.were unaware of the risk of wireless hacking17.Which of the following is not considered in the study?A.The number of wireless hacking incidents.B.The number of wireless computer networks.C.The way in which data are sent and received.D.The way in which data are hacked and stolen.18.Most wireless network technology comprises _.A.data encryption programsB. password security programsC.illegal-user detectionD. virus-intrusion detection19.Raymond Kruck most probably agrees that wireless network security involves _.A. wireless signal administrationB.changes in users awarenessC.users psychological healthD.stronger physical walls20.Without firewalls, companies using wireless networks _.A.cannot operate normallyB.should turn to passwordsC.will be easily attacked by hackersD.can still spot the activities of hackers【参考答案】1620、CAABD阅读下列短文,从每题所给的A.B.C和D项中,选出最佳选项。My newly-rented small apartment was far away from the centre of London and it was becoming essential for me to find a job, so finally I spent a whole morning getting to town and putting my name down to be considered by London Transport for a job on the underground. They were looking for guards, not drivers. This suited me. I couldnt drive a car but thought that I could probably guard a train, and perhaps continue to write my poems between stations. The writers Keats and Chekhov had been doctors. T.S. Eliot had worked in a bank and Wallace Stevens for an insurance company. Id be a subway guard. I could see myself being cheerful, useful, a good man in a crisis. Obviously Id be overqualified but I was willing to forget about that in return for a steady income and travel privileges those being particularly welcome to someone living a long way from the city centre.The next day I sat down, with almost a hundred other candidates, for the intelligence test. I must have done all right because after about half an hours wait I was sent into another room for a psychological test. This time there were only about fifty candidates. The interviewer sat at a desk. Candidates were signaled forward to occupy the seat opposite him when the previous occupant had been dismissed, after a greater or shorter time. Obviously the long interviews were the more successful ones. Some of the interviews were as short as five minutes. Mine was the only one that lasted a minute and a half.I can remember the questions now: “Why did you leave your last job?” “Why did you leave your job before that?” “And the one before that?” I cant recall my answers, except that they were short at first and grew progressively shorter. His closing statement, I thought, revealed a lack of sensitivity which helped to explain why as a psychologist, he had risen no higher than the underground railway. “Youve failed the psychological test and we are unable to offer you a position.”Failing to get that job was my low point. Or so I thought, believing that the work was easy. Actually, such jobs being a postman is another one I still desire demand exactly the sort of elementary yet responsible awareness that the habitual dreamer is least qualified to give. But I was still far short of full self-understanding. I was also short of cash.1The writer applied for the job chiefly because _.Ahe wanted to work in the centre of London Bhe could no longer afford to live without oneChe was not interested in any other available job Dhe had received some suitable training2The writer thought he was overqualified for the job because _.Ahe often traveled undergroundBhe had written many poemsChe could deal with difficult situations Dhe had worked in a company3The length of his interview meant that _.Ahe was not going to be offered the job Bhe had not done well in the intelligence testChe did not like the interviewer at all Dhe had little work experience to talk about4What does the writer realize now that he did not realize then?AHow unpleasant ordinary jobs can be. BHow difficult it is to be a poet.CHow unsuitable he was for the job.DHow badly he did in the interview.5Whats the writers opinion of the psychologist?A. He was very aggressive(有进取心的). B. He was unhappy with his job.C. He was quite inefficient. D. He was rather unsympathetic.【参考答案】15、BCACD 2016高考英语阅读理解-社会现象类Do you love Beats headphones, True Religion jeans, and UGG shoes? These are some of the most popular brands (牌子) around. They are also expensive. But some experts say they are not much better than cheaper brands. For example, Jim Wilcox works for Consumer Reports. He tested all kinds of headphones. He says that $80 Koss Pro headphones provide basically the same quality and comfort as Beats. So why do people pay twice or even 10 times as much for the hottest brands? Experts say its because fashionable, expensive brands send a message. Brands say “I belong” or “I can afford it.” Some people think that expensive brand names are worth the price. They say that some designer clothes really are top quality and that they last longer than cheaper brands. Some teenagers choose to wear popular brands because these brands make them feel good about themselves. Alexandra Allam, 17, likes to buy brand-name products. “Id rather spend the extra money

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论