高考英语一轮复习 阅读理解选习题(三)2.doc_第1页
高考英语一轮复习 阅读理解选习题(三)2.doc_第2页
高考英语一轮复习 阅读理解选习题(三)2.doc_第3页
高考英语一轮复习 阅读理解选习题(三)2.doc_第4页
高考英语一轮复习 阅读理解选习题(三)2.doc_第5页
已阅读5页,还剩4页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

福建大田县2017高考英语一轮阅读理解选习题(2016高考训练)阅读下列材料,从每题所给的选项中选出最佳选项。体裁:说明文话题:异国风情词数:660时间:7When you think of Victorian style homes, you probably imagine it as a Queen Anne home, complete with wonderful trim(饰物)painted in a contrasting color and stained glass windows.Victorian homes were built to leave a deep impression on others, and they are still impressive today.If you have a chance to visit one Victorian style home, you will find the following typical characteristics in the place you are visiting:Narrow and TallMost Victorian houses are narrow, which allows these impressive beauties to be built on a small amount of land.They are often close to other Victorian homes, usually near the center of town.What these houses lack in width they make up for in height; a typical Victorian house is three stories tall and on a fullsize basement.StairsBecause the Victorian is built to impress, intricate(错综复杂的)or grand entrances are usually constructed.These stairways usually lead to wraparound front porches decorated with turned wood or wrought iron railings.Towers and Turrets (塔楼)These unique rooms could be studies, bedrooms or libraries.They give Victorian homes a castle feel and recall the Gothic mansions that inspired early Victorian designs.Because these houses are often three or even four stories tall, these turrets can be quite impressive.Decorative TrimAlthough the trim is produced on a large scale, there are several different styles and designs.Everything from Italianate egganddart molding to carved Gothic Revival fascia can be found on a Victorian home.It is not at all unusual to find Queen Anne, Gothic and Italianate elements all on the same house, as the goal is to create something unique and unusual.According to Victorian design rules, the trim should have painted a distinctly different color than the siding for emphasis.In most cases in the 18th century in the UK, three to five different colors of paint were used: one of these colors was used for the house, and the rest of the colors were used for the trim.Bay WindowsLarge windows, which are sometimes filled with stained glass or topped with stained glass panels, are also special features in Victorian houses.These bays can either be walkout versions or have a builtin bench.Asymmetrical (不对称的) House DesignVictorian era architects loved the challenge of varied roof lines and asymmetrical designs.The houses are made to be individual and unique.Even if the basic design of a group of houses is the same, you can expect to find unique window styles and architectural details that give each house its own personality.ExtrasClassic Victorian homes have wraparound porches with beautiful trim and tiny balconies or crows nests on the upper floors.Some of these porches, balconies and crows nests are functional, but some are just for show.Nothing is wasted too much for a Victorian home.Finding Victorian HomesWhere can you find Victorian style homes? You can find at least one of two Victorian style homes in most urban areas, but some cities have more than others.The Old West End, a famous neighborhood in Toledo, Ohio, has the most Victorian style homes in the United States.San Francisco is also known for its beautiful, restored Victorian homes.Savannah, Georgia is a lovely city to visit and explore, as its many Victorian homes are located on charming squares with interesting gardens and sculptures, making it a fabulous place to visit.If you explore these cities, you will find Victorian bed and breakfasts that are perfect for an elegant stay.【语篇解读】本文是一篇说明文,主要向我们介绍了维多利亚风格的房子的一些特点。1The purpose of this passage is to introduce _Acharacteristics of Victorian style homesBsome attractions in Victorian style homesCspecial functions of Victorian style homesDdifferent decorations in Victorian style homes答案A考查写作意图。从第一段的“If you have a chance.you will find the following typical characteristics in the place you are visiting”可知,本文的写作目的主要是介绍维多利亚风格的房子的特点。所以答案选A项。2The following characteristics can be found in a Victorian style home EXCEPT _Athe houses are always tall and narrowBthe houses are typically built with five storiesCthe windows of different houses are quite uniqueDthe roofs always appear so different from each other答案B考查细节理解。从第二段的“a typical Victorian house is three stories tall”可知,维多利亚风格的房子一般是三层楼高,故B项表述错误。3“Queen Anne” mentioned in the passage refers to _Afurniture popular in the 18th centuryBan architecture style popular in the UKCbasic building materials for housesDa famous figure in Victorian style homes答案B考查推理判断。从第一段的“a Queen Anne home”和第五段的“It is not at all unusual to find Queen Anne,Gothic and Italianate elements all on the same house”可知,Queen Anne指的是一种非常受欢迎的建筑风格,所以答案选B项。4The fifth paragraph mainly talks about _Adifferent styles of Victorian homesBthe same elements in Victorian homesCthe paints used in Victorian homesDthe design of the trim in Victorian homes答案D考查段落大意。第五段主要介绍的是维多利亚风格的房子装饰物的特点,包括形状、颜色等。所以答案选D项。5Where can people see the most Victorian style homes nowadays?AIn San Francisco. BIn Boston.CIn Savannah. DIn Toledo.答案D考查细节理解。从最后一段中的“in Toledo,Ohio,has the most Victorian style homes in the United States”这一句话可知,答案选D项。6Which word can replace the underlined word “fabulous” in the last paragraph?ACredible. BMysterious.CWonderful. DImaginary.答案C考查词义猜测。从该句中出现的“lovely”和“interesting”可推断,该词意为“极好的,绝妙的”。所以答案选C项。阅读下列短文,从每题所给的四个选项(A、B、C和D)中,选出最佳选项。It was reported last week that developers could take photos from Apple mobile and Google Android devices without the phone owners knowing that the images were being taken. In Apples case, developers can also obtain the location information for each photo.Senator(参议员) Charles Schumer said in a telephone interview that his office had spoken with officials at both Apple and Google on Monday. “We asked them if they could find a way on their own to prevent Apple from having access to private info,” Mr. Schumer said. “They were friendly and open to the idea that this ought to be changed.”On Sunday, Mr. Schumersaidthat he planned to send a letter to the Federal Trade Commission(联邦贸易委员会) asking the agency to investigate Apple and Google after the privacy concerns came to light.Claudia Bourne Farrell, an F.T.C. spokeswoman, said the agency had received the letter but she could not comment further.“It sends shivers up the spine to think that ones personal photos, address book, and who knows what else can be obtained and even posted online without consent,” Mr. Schumer wrote in his letter to the F.T.C. “If the technology exists to open the door to this kind of privacy invasion, then surely technology exists to close it, and thats exactly what must happen.”Mr. Schumer said if Apple and Google could not come to an agreement to fix the problem, then he would be forced to take the issue further.He said other companies had been willing to work with his office to fix issues. “Im optimistic that we can get this changed without any regulation,” he said. “If its not changed, then well look the F.T.C., and if that doesnt work then well look at legislative approach.”The F.T.C. has warned companies to try to be morevigilant(警醒的)in their efforts to protect consumers when it comes to privacy.36.The senators spoke with officials at both Apple and Google .A. to discuss whether it is illegal to have access to private information.B. to stop them from developing the technology of taking photos.C. to urge them not to invade consumers privacy.D. to keep them from obtaining the location information for each photo【答案】C【解析】细节理解题。根据We asked them if they could find a way on their own to prevent Apple from having access to private info参议员鼓励他们不要侵犯顾客的个人隐私,故选C。37. Which of the following statements is true?A. Privacy invasion from Apple has existed for a long time.B. Privacy invasion from Google has existed for a long time.C. Apple and Google have decided to make a change.D. Mr. Schumer takes the privacy concerns caused by Apple and Google seriously.【答案】D【解析】细节理解题。根据Mr. Schumersaidthat he planned to send a letter to the Federal Trade Commission(联邦贸易委员会) asking the agency to investigate Apple and Google after the privacy concerns came to light.可知Mr. Schumer对苹果和谷歌引起的个人隐私问题很重视,故选D。38. Mr. Schumers letter to the F.T.C. mainly shows that the technology to open the door to privacy invasion . A. causes people to worry about the safety of their personal information . B. can be used if permitted.C. causes personal information to be posted online without permission.D. causes privacy invasion to happen frequently.【答案】A【解析】细节理解题。根据If the technology exists to open the door to this kind of privacy invasion, then surely technology exists to close it, and thats exactly what must happen.他认为引起人们对于个人安全问题的担心,故选A。39.If the privacy concerns cant be solved with the help of the F.T.C., .A.The companies will be fined.B. The companies will be closed.C. The senators will turn to legislation.D. The senators will force the companies not to invade privacy.【答案】C【解析】细节理解题。根据if that doesnt work then well look at legislative approach如果个人的隐私问题解决不了将采用立法的问题,故选C。40.Where can we read about the passage?A.In a science report. B. In a newspaper. C. In a magazine D. In a textbook.【答案】B【解析】细节理解题。根据短文的内容主要叙述的是对于公司的对于客户的个人隐私的泄露问题的的解决途径,所以这篇文章出现在报纸上,故选B。阅读下列短文,从每题所给的A.B.C和D项中,选出最佳选项。They may be just passing your office, computer bag slung (悬挂) over one shoulder. Or they may be sitting in a car outside it, causally tapping away at a laptop. They look like innocent passers-by. In fact, they are stealing your corporate secrets.Drive-by hacking is the trendy term given to the practice of breaking into wireless computer networks from outside the buildings that house them. A recent study in the UK, sponsored by RSA Data Security, found that two-thirds of organizations with wireless networks were risking their data in this way. Security experts patrolled (巡逻) several streets in the City of London seeking evidence of wireless networks in operation.Of 124 that they identified, 83 were sending data without encrypting(加密) them. Such data could readily be picked up by a passer-by armed only with a portable computer, a wireless modem and a few pieces of software that can be freely down-loaded from the Internet.The data could include sensitive company documents containing valuable information. Or they could be e-mail identities and passwords that could be used by hackers to log into corporate networks as if they were legal users.Most companies using wireless networking technology do not take even the simplest of precautions to protect their data. Nearly all wireless network technology comes with some basic security features that need only to be activated in order to give a minimum level of security, for example, by encrypting the data being passed over the network.Raymon Kruck, business development manager at Check Point Software, a security technology specialist, believes this could be partly a psychological problem. People see the solid walls of their building as safeguards and forget that wireless networks can extend up to 200 meters beyond physical walls.Companies without any security at all on their wireless networks make it ridiculously easy for hackers to break in. Switching on the security that comes with the network technology should be automatic. Then there are other basic steps a company can take, says Mr. Kruck, such as changing the passwords on the network from the default (默认) setting.Companies can also install firewalls, which form a barrier between the internal network and the public Internet. They should also check their computer records regularly to spot any abnormal activity, which might betray the presence of a hacker.16. According to the study sponsored by RSA Data Security, two thirds of the subjects _.A.had their corporate data stolenB.depended on wireless computer networksC.were exposed to drive-by hackingD.were unaware of the risk of wireless hacking17.Which of the following is not considered in the study?A.The number of wireless hacking incidents.B.The number of wireless computer networks.C.The way in which data are sent and received.D.The way in which data are hacked and stolen.18.Most wireless network technology comprises _.A.data encryption programsB. password security programsC.illegal-user detectionD. virus-intrusion detection19.Raymond Kruck most probably agrees that wireless network security involves _.A. wireless signal administrationB.changes in users awarenessC.users psychological healthD.stronger physical walls20.Without firewalls, companies using wireless networks _.A.cannot operate normallyB.should turn to passwordsC.will be easily attacked by hackersD.can still spot the activities of hackers【参考答案】1620、CAABD阅读下列短文,从每题所给的四个选项(A、B、C和D)中,选出最佳选项。As students and teachers returned to school on Monday after the publication of performance ratings(等级) for 18,000 teachers, many parents said they were giving the reports serious thought. Yet there was an equal measure of skepticism among parents that test scores have any relationship with teachers competence.Some said they already knew how good a teacher was by walking into the classroom or by monitoring their childrens progress. “Im the kind of person who likes to see for themselves,” a father in Queens said.Others worried about how their fellow parents, perhaps ones with sharper elbows, might respond. Will they demand a new teacher? Move their children to a new school?Elizabeth Sane, the mother of a fourth grader at the Ella Baker School, a kindergarten-through-eighth-grade school on the Upper East Side, said that her daughter was switched to a different teachers class over the summer, and that it was “like adding salt to the wound” when she saw the high ratings for her daughters previous teacher. Her daughters teacher this year did not receive a rating because he previously taught high schoolMs. Sane said that the rating was not the only factor that influenced how she assessed a teachers performance, but that the data used for teacher evaluations mattered.But other parents dropping their children off at the Ella Baker School said they did not trust teacher ratings based on test scores any more than they wanted their childrens learning measured only by the state exams.“Some people take it as the final word, but it doesnt change who they are as teachers. The ratings arent accurate, and the whole student testing thing needs to be thrown out,” said Lydia Delgado, whose child is in the second grade.41. Paragraph 1 tells us that A. All the teachers received a rating given by the students.B. All the teachers will receive a rating

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论