欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > DOC文档下载
    分享到微信 分享到微博 分享到QQ空间

    [考研类试卷]考研英语(阅读)模拟试卷178及答案与解析.doc

    • 资源ID:855142       资源大小:66KB        全文页数:18页
    • 资源格式: DOC        下载积分:2000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要2000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    [考研类试卷]考研英语(阅读)模拟试卷178及答案与解析.doc

    1、考研英语(阅读)模拟试卷 178 及答案与解析Part ADirections: Read the following four texts. Answer the questions below each text by choosing A, B, C or D. (40 points)0 Despite a cooling of the economy, high technology companies are still crying out for skilled workers. The Information Technology Association of America

    2、projects that more than 800,000 technology jobs will go unfilled next year. The lack of qualified workers poses a huge threat to the U. S. economy.The most commonly cited reason for this state of affairs is that the countrys agrarian-age education system, separated from the needs of the business wor

    3、ld, fails to prepare students in the primary and secondary grades for twenty-first-century work. Yet an inadequate and outmoded education system is only part of the problem. A less tangible but equally powerful cause is an antique classification system that divides the workforce into two camps: whit

    4、e-collar knowledge workers and blue-collar manual laborers.Blue-collar workers emerged in the United States during the Industrial Age as work migrated from farms to factories. White-collar office workers became a significant class in the twentieth century, outnumbering their blue-collar brethren by

    5、mid-century. But the white or blue paradigm has clearly outlived its utility. Corporations increasingly require a new layer of knowledge worker: a highly skilled multi-disciplinarian who combines the mind of the white-collar worker with the hands of the blue-collar employee. Armed with a solid groun

    6、ding in mathematics and science(physics, chemistry, and biology), these “gold-collar“ workersso named for their contributions to their companies and to the economy, as well as for their personal earning abilityapply that knowledge to technology. Of course, the gold-collar worker already exists in a

    7、wide range of jobs across a wide range of businesses: think of the maintenance technician who tests and repairs aircraft systems at American Airlines; the network administrator who manages systems and network operations at P the advanced-manufacturing technician at Intel.But until American business

    8、recognizes these people as a new class of worker, one whose collar is neither blue nor white, demands that schools do a better job of preparing employees for the twenty-first-century workforce will be futile. Certainly, polytechnic high schools, colleges, and universities have made heroic efforts to

    9、 teach workers new skills. But because many people see these initiatives as primarily training blue-collar workers, adequate funds are not invested in such programs, leaving them short of state-of-the-art tools and experienced teachers. And because gold-collar workers need to constantly update their

    10、 skills to stay current with emerging technology, learning must be a continuous process, one that is funded by companies as well as by taxpayers.1 According to the passage the lack of qualified workers(A)makes a cooling of the economy.(B) increases the costs of high technology companies.(C) emphasiz

    11、es the importance of unfilled jobs.(D)hinders the development of U. S. economy.2 From the second paragraph we learn that(A)the workforce classification is as wrong as the education system.(B) twenty-first-century workforce are separated from the needs of the business world.(C) white-collar workers a

    12、re only part of the problem of education system.(D)blue-collar manual laborers are needed in agrarian-aged America.3 The gold-collar workers differ from white-collar and blue-collar workers in that they(A)wear gold-collar working clothes when they are on duty.(B) do better in combining their contrib

    13、utions and earnings.(C) grasp the knowledge and apply it in their work as well.(D)apply the arts knowledge to technology.4 To increase the number of gold-collar workers,(A)the schools should assume the major responsibilities.(B) experienced teachers should have access to current tools.(C) the societ

    14、y should consider them as a new layer of working classes.(D)the taxpayer should pay more money for the continuous training.5 The best title for the text may be(A)800,000 Technology Jobs Unfilled.(B) Gold-collar Workers Needed.(C) U. S. Economy Threatened.(D)Schools Fail to Train Gold-workers.5 Accor

    15、ding to a Department of Homeland Security report obtained by Forbes, com, a group of unnamed private sector executives representing industries including banking, telecommunications and energy have been meeting with the DHS to find ways to more efficiently exchange data on cyber intrusions and digita

    16、l spying. The DHS wouldnt share any details of the classified meetings. But the goal of the conferences, according to one former government official, is to build a better system for sharing classified cyber-threat data with private companies.Given Presidential Directive 54s scope and budget, the gov

    17、ernment should have plenty to share. Over the next seven years, the programs initiative will spend as much as $30 billion to create a new monitoring system for all federal networks, a combined project of the DHS, the NSA and the Office of the Director of National Intelligence. The data-sharing plan

    18、would offer information gathered by that massive monitoring system to the private sector in exchange for their own knowledge of cyber intrusions and spyware. Presidential Directive 54, is partly a response to a series of cyber intrusions that plagued the Pentagon last summer.The nations critical inf

    19、rastructure systems, mostly owned by the private sector, may face a similar threat. But the notion of extending the governments network monitoring to the nations critical infrastructure has raised hackles. Privacy advocates, fearing government intrusion on private networks, have already compared the

    20、 project to the NSAs warrantless wiretapping program. In a congressional hearing last Thursday, Rep. Paul Broun, said the program seemed “a little like the fox guarding the henhouse. “The information sharing strategy revealed in the DHS report may be a compromise. For now, the government is avoiding

    21、 the controversy of monitoring commercial networks, and instead trading its cyber-threat information for data about intrusions that private companies have detected on their own computers, says Alan Paller, director of the SANS Institute, an organization that hosts a crisis center for hacked companie

    22、s. “To find the bad guys, well need huge analytic engines, with all the right data,“ he says. “The government cant force these companies to let it watch traffic in commercial networks, so this is one way to get the private sector involved. “That doesnt mean the data-sharing project is a guarantee th

    23、at government monitoring wont eventually be expanded to some parts of private industry, Paller says. He sees the project as the first step in convincing critical infrastructure companies to allow some government surveillance of their networks. Companies possessing classified government data, such as

    24、 defense contractors , are especially likely to be brought under the initiatives umbrella of surveillance, according to some former government officials.6 What is the purpose of the meeting between the DHS and the private company executives?(A)To provide the Internet service among such industries as

    25、 banking, telecommunications and energy.(B) To help the private companies in different industries change information.(C) To construct a system to share information on cyber-safety between the DHS and private companies.(D)To help the DHS manage the private companies in different industries.7 Which is

    26、 not true about the project proposed in Presidential Directive 54?(A)The project is going to cost about $ 30 billion to build a new monitoring system.(B) The project aims to share information between federal departments and private companies.(C) The project will provide shield for networks of federa

    27、l departments.(D)The project is proposed to prevent hackers from stealing data from Pentagon.8 The word “hackles“(Line 3, Paragraph 3)is closest in meaning to(A)feathers.(B) hair.(C) approval.(D)anger.9 According to Alan Paller, we can learn that(A)the private companies accepted the idea that their

    28、networks will be monitored for the sake of cyber-safety.(B) the government proposes that it will not exchange cyber-threat data with the private companies.(C) the data-sharing project will not allow the government to survey the private companies networks.(D)the data-sharing project can help the gove

    29、rnment persuade the private companies to accept some government surveillance. 10 The text is mainly talking about(A)the project raised by the DHS to share cyber-threat data with private companies.(B) the conferences on Internet services between the DHS and private companies.(C) the cyber-threat to t

    30、he DHS and private companies.(D)the DHS and private companies joining together to fight cyber-threat.10 Cardiologists have pioneered the worlds first non-surgical bypass operation to turn a vein into an artery using a new technique to divert blood flow in a man with severe heart disease. The keyhole

    31、 procedure, which avoids the extensive invasive surgery of a conventional bypass, will offer hope to tens of thousands of people at risk from heart attacks.Coronary heart disease, where the arteries are progressively silted up with fatty deposits, is responsible in a major industrial country like Br

    32、itain for more than 160,000 deaths each year. Although major heart surgery is becoming commonplace, with more than 28,000 bypass operations in the UK annually, it is traumatic for patients and involves a long recovery period.The new technique was carried out by an international team of doctors who p

    33、erformed the non-invasive surgery on a 53-year-old German patient. According to a special report in Circulation, journal of the American Heart Association, cardiologists developed a special catheter which was inserted into one of his leg arteries, threaded up through the aorta to the top of the dise

    34、ased artery, which was the only part still open and receiving blood. Then, guided by ultrasound, a physician pushed a needle from inside the catheter through the artery wall and into the adjacent vein. A thin, flexible wire was threaded through the needle and the needle and catheter were withdrawn,

    35、leaving the wire behind and a small angioplasty balloon, which was used to widen the channel. Finally, the vein was blocked off just above the new channel allowing blood from the artery to be re-routed down the vein.After the procedure, the vein effectively became an artery, carrying blood in the re

    36、verse direction from the previous way, and feeding the starved heart tissue with oxygen.Dr. Stephen Oesterle, who led the team, said, “This milestone marks the first coronary artery bypass performed with a catheter. The technology offers a realistic hope for truly minimally invasive bypass procedure

    37、s in the future. One of the most invasive things you can do in medicine is coronary artery bypass surgery. Our ultimate goal is to replace traditional coronary artery bypass with a procedure that does not require surgery. “ Dr. Oesterle is director of cardiology at Massachusetts General Hospital and

    38、 associate professor of medicine at Harvard Medical School in Boston. Melanie Raddon, cardiac nurse at the British Heart Foundation, said it was likely to be many years before the procedure was routinely used in hospitals.11 Compared to conventional bypass procedure, the new bypass treatment(A)makes

    39、 the patient feel less painful and recover sooner.(B) is an extensive invasive surgery employing high technology.(C) can bring an artery into vein without surgery.(D)can progressively silt up with fatty deposits.12 Which of the following is the first step of the bypass operation?(A)Thread up through

    40、 the aorta to the top of the diseased artery.(B) Push a needle through artery wall into the adjacent vein.(C) Put a special catheter into one of the leg arteries.(D)Block off the vein to allow blood to re-routed.13 It can be concluded that after the new bypass treatment,(A)the wire inside the vein w

    41、idens the channel.(B) blood flows in the opposite direction to the former one.(C) the starved heart tissue is fed through the previous blood route.(D)the patient was implanted with a new electronic heart.14 What is Dr. Oesterles attitude towards the new bypass?(A)Critical.(B) Positive.(C) Indifferen

    42、t.(D)Neutral.15 The purpose of writing this text is probably to(A)praise the high technological level of Harvard Medical School.(B) comfort those patients who have developed coronary heart disease.(C) introduce a new therapy to cure heart disease.(D)criticize the traditional bypass surgery.15 While

    43、traveling for various speaking engagements, I frequently stay overnight in the home of a family and am assigned to one of the childrens bedrooms. In it, I often find so many playthings that theres almost no roomfor my small toilet kit. And the closet is usually so tightly packed with clothes that I

    44、can barely squeeze in my jacket. Im not complaining, only making a point. I think that the tendency to give children an overabundance of toys and clothes is quite common in American families, and I think that in far too many families not only do children come to take their parents generosity for gra

    45、nted, but also the effects of this can actually be somewhat harmful to children.Of course, Im not only thinking of the material possessions children are given. Children can also be overindulged with too many privilegesfor example, when parents send a child to an expensive summer camp that the parent

    46、s cant really afford. Why?One fairly common reason is that parents overindulge their children out of a sense of guilt. Parents who both hold full-time jobs may feel guilty about the amount of time they spend away from their children and may attempt to compensate by showering them with material posse

    47、ssions.Overindulgence of a child also happens when parents are unable to stand up to their childrens unreasonable demands. Such parents vacillate between saying no and giving in but neither response seems satisfactory to them. If they refuse a request, they immediately feel a wave of remorse for hav

    48、ing been so strict or ungenerous. If they give in, they feel regret and resentment over having been a pushover. This kind of vacillation not only impairs the parents ability to set limits, it also sours the parent-child relationship to some degree, robbing parents and their children of some of the h

    49、appiness and mutual respect that should be present in healthy families.But overindulging children with material things does little to lessen parental guilt(since parents never feel that theyve given enough), nor does it make children feel more loved(for what children really crave is parents time and attention). Instead, the effects of overindulgence can be harmful. Children may, to some degree, become greedy, self-centered, ungrateful and insensitive to the needs and feelings of others, beginning with their parents. When children are given too much, it un


    注意事项

    本文([考研类试卷]考研英语(阅读)模拟试卷178及答案与解析.doc)为本站会员(unhappyhay135)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开