新标准大学英语(第二版)综合教程2-unit3-unit-test(共8页)_第1页
新标准大学英语(第二版)综合教程2-unit3-unit-test(共8页)_第2页
新标准大学英语(第二版)综合教程2-unit3-unit-test(共8页)_第3页
新标准大学英语(第二版)综合教程2-unit3-unit-test(共8页)_第4页
新标准大学英语(第二版)综合教程2-unit3-unit-test(共8页)_第5页
已阅读5页,还剩3页未读 继续免费阅读

下载本文档

版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领

文档简介

1、Part I: Vocabulary and Structure Section A: Complete each sentence using the correct word or expression from the box.· custody· destiny· anonymous· commonplace· deception· staunchest· vicinity· blessing· wits· exclaimed1. The investigators searched h

2、er house after they received a(n) tip over the phone. 2. There were a hundred or so hotels in the of the railway station. 3. He was accused of obtaining money by . 4. Tony was caught shoplifting and has been in police since last night. 5. We figured that in twenty years each of us ought to have our

3、worked out and our fortunes made, whatever they were going to be. 6. She in horror when she saw a snake in the grass. 7. He always was the truest, old chap in the world. I will never forget him. 8. Misfortune might be a in disguises. 9. Unfortunately, pickpockets are incredibly in many large cities.

4、 10. Controlled drinking can dramatically help people keep their as they age. Section B: Choose the best way to complete the sentences.11. The police presence at airports seemed to double _ after the bomb threat. A. overage B. overdue C. overnight D. overall 12. In order to _ information from people

5、, investigators sometimes use questionable methods. A. extort B. extract C. exchange D. exert 13. It is a federal crime to _ a lawyer in a courtroom. A. impersonate B. personify C. personalize D. identify 14. After the September 11 _ attacks in the United States, the government took extreme measures

6、 to make sure it wouldn't happen again. A. radical B. revolutionary C. terrorist D. activist 15. The new measures they have taken, though _ effective, have been praised by the manager. A. completely B. moderately C. doubtfully D. considerably 16. I think pop-up ads on the Internet and spam in my

7、 e-mail inbox are terribly _ so much so that it might be an invasion of privacy. A. offensive B. effective C. defensive D. interactive 17. Online retailers such as Amazon and iTunes are so successful that they have become _ names. A. obvious B. household C. opportunistic D. offensive 18. The new fac

8、ial recognition security system _ knows who you are and if you have access to the building. A. anonymously B. obviously C. simultaneously D. automatically 19. In the experiment we kept a(n) _ eye on the developments and recorded every detail. A. artful B. watchful C. doubtful D. eventual 20. After m

9、y store was broken into, the police officer drove me home as a _. A. prerequisite B. prevention C. pretension D. precaution Section C: Complete each sentence with a suitable word.21. We never do anything exciting any more we seem to be stuck a groove. 22. The other spectator, submerged his overcoat,

10、 listened with interest. 23. Excuse me. Do you have any information file about the Frank Spacey case? 24. You can usually count the police to help you out when you're in trouble. 25. As she went past there was a gust strong perfume. 26. I know the security guards need to ask for identification,

11、but I was very unhappy with the way he went (about)it. 27. After you check your bank balance online, remember to log so no one else can steal your information. 28. I would have helped out last weekend only I had known you were moving. 29. We need to take precaution fire as a way to protect property

12、or even our lives. 30. In such a heavy traffic jam, it's impossible to reverse a taxi, (let alone) the bus. Part II: Banked Cloze Questions 31 to 40 are based on the following passage.Last summer, I went on vacation to Spain. On only the second day, my wallet was stolen. It was a very (31)time,

13、and I was (32) frustrated and angered. At first, I was angry I had lost the cash in my wallet. Then, I realized that the thief now had my credit cards and ID card! With only a little practice, he or she could easily (33) my signature and make hundreds of (34) purchases.I immediately called the credi

14、t card companies to cancel my cards. The more I thought about it, the angrier I got. How could someone commit such (35)? The (36) deceitfulness in stealing other people's wallets really made me wonder how someone could be completely without (37)standards or morals.Thankfully, I still had travele

15、r's checks which are (38)accepted in Spain at my hotel. However, I was no longer in a good (39) to enjoy my vacation. In my opinion, the authorities must attack this problem (40); it's not enough to just focus on pickpockets or identify theft that happens locally. With the Internet, there

16、9;s no such thing as "local" anymore. Part III: Reading Comprehension Questions 41 to 45 are based on the following passage.Many people often wonder about the terms "blue-collar crime" and "white-collar crime". What's the difference? Is one worse than the other? Are

17、 they committed by different kinds of people? What does crime have to do with the color of your shirt?First, it is helpful to understand that blue-collar workers are those people employed in jobs that require manual labor, and white-collar workers perform non-manual labor in an office setting. The t

18、erms can be dated back to the 19th century, when industrial workers and manual laborers were required to wear clothing suitable to the difficult work which was typically a blue work shirt or blue coveralls. In contrast, professional workers in offices generally wore white dress shirts.Today, the pri

19、mary distinctions between white-collar and blue-collar crime are the social class to which the suspect belongs and the type of crime committed. Blue-collar crimes are committed by individuals from lower social classes (ie, less privileged backgrounds with fewer professional and societal opportunitie

20、s), and white-collar crimes, conversely, are committed by individuals from higher, more affluent social classes.The exact nature of the crime is also a defining factor of blue-collar versus white-collar crime. Blue-collar crimes tend to be relatively obvious (eg, vandalism, robbery, and shoplifting)

21、 or violent (eg, assault, arson, and murder) crimes that are committed out of desperation. White-collar crimes, however, are "quieter" crimes (eg, bribery, embezzlement, and computer crime) committed by people who have the means and opportunity to exploit professional situations.It is impo

22、ssible to say that one type of crime is worse than the other, for both have serious and lasting effects for the victims. Blue-collar crime gets more consistent exposure in the media, so we usually hear more about it on a regular basis. However, even though we might not hear many news stories about w

23、hite-collar crime, it still occurs every day. The increase in computer crime and rising instances of identify theft are testament to that. 41. Which of the following would make the best title for this article? A. White-Collar Crime: A Victimless Crime. B. A History of Blue-Collar and White-Collar Workers. C. Blue-Collar Crime Versus White-Collar Crime: An Explanation. D. An Examination into Blue-Collar Crime. 42. With which of the fol

温馨提示

  • 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
  • 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
  • 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
  • 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
  • 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
  • 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
  • 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

评论

0/150

提交评论