人教版(2019)必修 第二册Unit 3 The Internet 相关话题练(阅读+完型+语法)(含解析)

文档属性

名称 人教版(2019)必修 第二册Unit 3 The Internet 相关话题练(阅读+完型+语法)(含解析)
格式 docx
文件大小 78.3KB
资源类型 教案
版本资源 人教版(2019)
科目 英语
更新时间 2023-08-07 15:58:18

图片预览

内容文字预览

Unit 3 The Internet
(
Part
2
相关话题练
(阅读+完型+语法)
)
Passage1 阅读理解
Researchers at the University of Alabama in Birmingham suggest that brainwave-sensing headsets (耳麦), also known as EEG headsets, need to do more to protect users after a study which shows hackers (黑客) could guess a user’s bank account passwords by monitoring his brainwaves.
Nitesh Saxena, Ph.D., professor in the UAB College of Computer and Information Sciences Department, and his team found that a person who stopped a video game and entered into a bank account while wearing an EEG headset was at a risk for having his passwords stolen by a bad software program. Saxena and his team used one EEG headset that could be bought by customers online to show how easily an ill software program could eavesdrop on a user’s brainwaves. While typing, a user’s inputs meet with their visual processing, as well as hand, eye and head muscle movements. All these movements are caught by EEG headsets.
The team asked 12 people to type passwords into a text box as if they were entering into an online account while wearing an EEG headset, in order for the software to train itself on the user’s typing and the present brainwave. The team found that, after a user entered passwords within the ill software program that could make educated guesses about the passwords, the user entered by reading the EEG data recorded. It increased the chance of guessing a six-letter password from one in 500,000 to one in 5.
“Given the growing popularity of EEG headsets and the different ways in which they could be used, they will become part of our daily lives,” Saxena said. “It is important to study the possible risks together with this new technology to raise users’ attention to the risks and develop solutions to the bad attacks.” One possible solution suggested by Saxena and his team is the insertion (插入) of noises anytime a user types a password while wearing an EEG headset.
1 .How do hackers guess passwords of a user’s bank account
A .They use a software program.
B .They use a new-type computer.
C .They guess the user’s brainwaves.
D .They talk with the user on the net.
2 .The underlined words “eavesdrop on” in Paragraph 2 refer to “________” .
A .make full use of B .watch carefully
C .record or write down D .gain or get secretly
3 .What was the result of the research of Saxena and his team in Paragraph 3
A .They made a very exact answer.
B .They got close to the passwords.
C .They got a part of the passwords.
D .They failed to get the passwords.
4 .Why do EEG headsets need to do more to develop solutions
A .More and more hackers come about.
B .More people use online bank accounts.
C .EEG headsets will become more popular.
D .EEG headsets still have problems in quality
Passage2 阅读理解
“Instagram (a social networking app) will cut out many users’ accounts on December 20. To protect your account, repost this warning #KeepMyAccountSafe.” Every few months, it happens again — dozens of annoying posts from my kids’ friends suddenly start to appear on my Instagram news feed.
According to a new study by Stanford University, most kids don’t know what news is false. Researchers asked more than 7,800 middle school and high school students to complete 56 tasks, like distinguishing an advertisement from a real news story on a website and determining which blog in a series was most reliable. They found that students judged the credibility of blogs based not on the source of the material, but on how much detail they contained, or whether a large photo was attached.
“Many people assume that because young people are fluent in social media, they can distinguish fake news, but our work shows the opposite to be true,” wrote the lead study author Sam Wineburg, a professor at Stanford’s Graduate School of Education.
Both Google and Facebook are now taking steps to prevent misleading news from making its way on their platforms, but they won’t be able to eliminate it completely. That is why it’s now more important than ever to teach our kids to think critically when it comes to believing various information sources.
“In the coming months, we look forward to sharing our assessments and working with educators to create materials that will guide young people in the sea of disinformation they encounter online,” said Wineburg.
5 .How does the author introduce the topic of the passage
A .By stating opinions. B .By citing sayings.
C .By quoting a post. D .By showing findings.
6 .According to researchers, what determines the credibility of online information
A .The size of relevant photos B .The popularity of the website.
C .The amount of detail. D .The source of the material.
7 .What does the underlined word “eliminate” mean in Paragraph 4
A .Update. B .Remove. C .Estimate. D .Digest.
8 .Which of the following can be the best title for the passage
A .Stronger Together: The Internet Changes Our Life
B .Reliable News Has No Place on Social Media
C .Be Careful: Kids Are Bad at Identifying Fake News
D .Educators Have a Long Way to Go to Guide the Young.
Passage3 七选五
Online Safety
Today I thought I’d blog about a question that has been asked many times—how do you stay safe online and avoid bad experiences on the Internet I am not an expert. ____9____
First of all, there’s the golden rule of the Internet: If you see or read something that makes you feel uncomfortable, leave the site immediately. ____ 10____
Second, protect your privacy. ____ 11____ Someone might use the information to steal your identity. Identity theft is a common and serious problem.
Third, be polite. Being online is no excuse for being rude, and you don’t want to become a target for a troll or cyberbully. A troll is a person who posts comments or questions in order to stir up trouble online. Trolls often use several false names so that they can stay on a site. ____ 12____ Like a troll, a cyberbully will also write something mean but it is usually directed at particular people. He or she may also post embarrassing photos and information about those people. However, the more polite you are, the less likely it is you will be attacked.
Have you had any bad experiences online, or do you have some good advice for staying safe ____ 13____
A .What is cyberbully
B .Post your comments below!
C .Don’t let out your online habits.
D .Don’t post comments or click on anything.
E .Don’t give out your address or phone number.
F .A cyberbully uses the Internet to be mean to others.
G .But many years as a blogger have taught me a thing or two.
Passage4 完形填空
Often in life there are times when we know what we should do, but due to inconvenience and laziness, we don’t. We know that we should install the software updates that our___ 14___keep reminding us about but we always___ 15___doing it for various excuses.
Yes, it is___ 16___not being able to use our phones for a few minutes, but this is important. So to___ 17___you why you should, I’m going to try the “carrot” and “stick”___ 18___.
First, let’s see the stick. ___ 19___you don’t keep your phone up-to-date, you’re putting your phone at risk from hackers (黑客). Why Because digital___20___is an arms race. Hackers will find holes and new ways to___21___our phones, so smartphone companies release new versions of the phones operating system (OS) software to___22___the problem. Then hackers look through the new version of the software for new____23____they can use for attack. And so on forever. This____24____that if you’ve not updated your phone to the latest version of the OS, your phone is____25____. So it is important to stay up-to-date to____26____your phone is wearing the
toughest digital armour (盔甲).
There’s a carrot for you too. The genuinely____27____part about software updates is that your phone will receive new____28____and functionality without you needing to buy a new handset! In fact, updates are____29____so transformative that it can be like ____30____an entirely new phone.
Ultimately, my____31____is this: keeping your phone up-to-date is a win-win. Not only will you keep it____32____, but you might also have a better phone afterwards. So ____33____your settings app now, and finally install those updates!
14 .A .computers B .cars C .phones D .televisions
15 .A .suggest B .practice C .admit D .postpone
16 .A .convincing B .annoying C .interesting D .confusing
17 .A .persuade B .deny C .warn D .question
18 .A .element B .effect C .approach D .argument
19 .A .Though B .Before C .Unless D .If
20 .A .access B .security C .revolution D .download
21 .A .show off B .look for C .break into D .put aside
22 .A .fix B .understand C .share D .describe
23 .A .illnesses B .weaknesses C .techniques D .excuses
24 .A .means B .recommends C .demands D .promises
25 .A .for free B .in place C .on sale D .in danger
26 .A .announce B .guarantee C .recognize D .pretend
27 .A .amusing B .strange C .exciting D .convenient
28 .A .features B .messages C .orders D .checks
29 .A .gradually B .previously C .economically D .occasionally
30 .A .receiving B .inventing C .selecting D .introducing
31 .A .concern B .guess C .solution D .point
32 .A .simple B .safe C .clean D .silent
33 .A .pay for B .compete with C .turn on D .refer to
Passage5 语法填空
Jack is a hacker, running a team of hackers. They spend days discovering ways to break into anything that can connect to the Internet ___ 1___ (access) information never meant to be seen. If they get to it before a criminal does, then they’ve done the job.
Jack is proud of what he does for ___2___ living. In Hollywood, hackers are often described as hooded (戴着兜帽的) figures in dark rooms ___3___ (involve) in illegal activity while tapping keyboards. ___4___ (actual), hackers are experts at programming and problem-solving with panies hire hackers to find their breaking point before criminals do.
Hacking is an activity, and what separates any activity from a crime ___5___ (be) permission. Drivers are free to drive, ___6___ they do not have permission to drive 150 miles per hour — that’s illegal. Bankers can transfer their clients money, but if they do so ___7___ permission, that’s illegal.
Hacking isn’t a criminal activity. Someone who involves in the illegal use of hacking should not ___8___ (call) a “bad hacker” but a “threat actor” . Hackers are people like Jack and his team at IBM — security ___9___ (profession).
Hackers play a critical role in keeping companies and people ___ 10___ (safety). Imagine what bad things could happen without them.
Part3 话题写作练(应用文+读后续写)
※应用文练
Passage1
随着网络的普及, 网络诈骗,网络欺凌等青少年网络安全问题成为大家关注的一个焦点, 李华所在的班级围绕“网络安全问题”召开主题班会,假定你是李华,以“Howto stay safe online”为标题,写一篇发言稿。主要包括以下内容:
1. 强调网络安全的重要性;
2. 提出建议(如保护好个人隐私、文明上网等); 注意:
1. 词数 80 词左右;
2. 可适当增加情节,以使行文连贯。
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________
Passage2
假如你是李华, 最近你们学校开展了英语博客作文比赛, 这种新颖的形式吸引了很多学 生来参加。你也很感兴趣,所以请你发表一篇关于 Social Media and Teen Health 的博客。 注意:词数 80 左右;可以适当增加细节,以使行文连贯。
※读后续写练
Passage3
阅读下面材料, 根据其内容和所给段落开头语续写两段, 使之构成一篇完整的短文。续
写词数应为 150 左右。
Losing a parent is one of the most painful parts of life. No matter how old we are when they leave us, it can be a heartbroken experience. Our memories are all that is left of them and happy
reminders of their love turn into our most valuable treasures. That's how Mara Soriano feels about the teddy bear that she tragically lost in her recent move to a new apartment.
Diagnosed with cancer, Mara Soriano's mother, Marilyn, gave her daughter the bear as a gift in 2017. After her mother's death last June, the gift became even more special. "That bear was basically the last reminder of my mom. It was her voice that accompanied me," she said in an interview.
The plush (长毛制的) toy didn't cost a lot, but it contained a recording of her mother's voice telling her that she loved her and was proud of her. The bear, called Mama Bear, was in the backpack that contained electronics like an iPad and a Nintendo Switch. When the bag was stolen last week during the move, the 28 -year-old was heartbroken-- not for the gadgets(小装置), but for
Mama Bear.
Mara posted a photo of her and her Mama Bear on Instagram, explaining the importance of the bear. Millions of users were touched by the story. More and more people were talking about the bear, but there was no good news for Mara. So again and again she posted online about the item and the story behind it, hoping it could catch more viewers' attention in a big way.
Actor Ryan Reynolds was moved by Mara's story and then posted an appeal(请求)for Mama Bear's safe return. "I think we all need this bear to come home," he wrote. Along with the
message, he also offered a $5, 000 reward for the people who found the bear.
注意:
1. 所续短文词数应为 150 词左右;
2. 至少使用 5 个短文中标有下划线的关键词;
3. 续写部分分为两段,每段开头已为你写好;
4. 续写完成后,请用下划线标出你所使用的关键词语。 Paragraph 1: Luckily, the Internet did its thing.
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
________________________
Paragraph 2: The email was from the woman who sent the bear back.
_______________________________________________________________________________
_______________________________________________________________________________
_______________________________________________________________________________
________________________
参考答案
Part2 相关话题阅读练1 .A 2 .D 3 .B 4 .C
【导语】这是一篇说明文。讲述了 EEG 耳机的安全性问题,研究人员发现用户在佩戴 EEG 耳机过程中, 有着被黑客通过监测脑电波来窃取密码的风险, 随着该耳机愈发普遍, 建议需
要付诸更多的努力来保护用户的安全信息。
1.细节理解题。根据第二段首句“Nitesh Saxena, Ph.D., professor in the UAB College of Computer and Information Sciences Department, and his team found that a person who stopped a video game and entered into a bank account while wearing an EEG headset was at a risk for having his passwords stolen by a bad software program. (阿联酋大学计算机与信息科学系教授 Nitesh Saxena 博士和他的团队发现,当一个人在戴着 EEG 耳机暂停一个视频游戏并进入了 一个银行账户时, 他的密码有被不良软件程序窃取的风险)”可知, 黑客是通过使用某个不良 软件来窃取用户密码,所以选项 A 符合题意。故选 A。
2.词句猜测题。根据第一段“Researchers at the University of Alabama in Birmingham suggest that brainwave-sensing headsets (耳麦), also known as EEG headsets, need to do more to protect users after a study which shows hackers (黑客) could guess a user’s bank account passwords by monitoring his brainwaves. (伯明翰阿拉巴马大学的研究人员建议,脑电波传感耳机, 也被称 为 EEG 耳机,需要做更多的工作来保护用户,因为一项研究显示黑客可通过监测用户的脑 电波来猜出用户的银行账户密码)”和第二段首句“Nitesh Saxena, Ph.D., professor in the UAB College of Computer and Information Sciences Department, and his team found that a person who stopped a video game and entered into a bank account while wearing an EEG headset was at a risk for having his passwords stolen by a bad software program. (阿联酋大学计算机与信息科学系教 授 Nitesh Saxena 博士和他的团队发现, 当一个人在戴着 EEG 耳机暂停一个视频游戏并进入 了一个银行账户时,他的密码有被不良软件程序窃取的风险)”可知,佩戴 EEG 耳机的用户 很容易被不良软件监测脑电波,进而窃取他们的账户密码,由此可推断出此处“eavesdrop on”表示窃听,偷听的含义,呼应关键词“stolen”,所以 D 选项符合题意。故选 D。
3.细节理解题。由第三段“The team found that, after a user entered passwords within the ill software program that could make educated guesses about the passwords, the user entered by reading the EEG data recorded. It increased the chance of guessing a six-letter password from one in 500,000 to one in 5. (研究团队发现一名用户在不良软件程序中输入密码后(该不良软件可 对密码进行有根据的猜测) ,用户通过读取记录的脑电图数据进入。它将猜出 6 位字母密码 的几率从 50 万分之一提高到五分之一)”可知,他们最终得到的密码是接近于正确密码的。 所以 B 选项“They got close to the passwords. (他们接近了正确密码)”符合题意。故选 B。
4.细节理解题。根据最后一段“Given the growing popularity of EEG headsets and the different ways in which they could be used, they will become part of our daily lives (鉴于 EEG 耳机的日 益普及和它们的不同使用方式,它们将成为我们日常生活的一部分)”可知,因为 EEG 耳机 在日常生活中越来越普遍,所以需要展开更多工作来研究解决方案。故选 C。5 .B 6 .D 7 .B 8 .C
【导语】这是一篇说明文。文章主要说明了斯坦福大学的一项新研究发现, 大多数孩子不知 道什么新闻是假的。文章介绍了这项研究开展的过程以及发现, 研究人员指出应当教我们的
孩子在相信各种信息来源时进行批判性思考。
5.推理判断题。根据第一段“‘Instagram (a social networking app) will cut out many users’ accounts on December 20. To protect your account, repost this warning #KeepMyAccountSafe. ’ Every few months, it happens again — dozens of annoying posts from my kids’ friends suddenly
start to appear on my Instagram news feed. (“社交网络应用 Instagram 将于 12 月 20 日关闭许 多用户的账户。为了保护您的账户,请转发此警告#KeepMyAccountSafe 。” 每隔几个月, 这种事情就会再次发生——来自孩子的朋友们的几十条烦人帖子会出现在我的 Instagram 动 态中)”可推知,在第一段中作者通过引用自己 Instagram 动态中出现的一些说法来引入文章 的主题。故选 B。
6.推理判断题。根据第二段中“According to a new study by Stanford University, most kids don’t know what news is false.(根据斯坦福大学的一项新研究, 大多数孩子不知道什么新闻是 假的)”和“They found that students judged the credibility of blogs based not on the source of the material, but on how much detail they contained, or whether a large photo was attached.(他们发 现, 学生们判断博客的可信度不是基于材料的来源, 而是基于它们包含多少细节, 或者是否 附有一张大照片)”可知, 研究人员认为, 大多数孩子不知道什么新闻是假的, 是因为他们判 断博客的可信度不是基于材料的来源, 由此推知, 决定网络信息可信度的是材料的来源。故 选 D。
7.词句猜测题。根据画线词所在句“Both Google and Facebook are now taking steps to control misleading news from making its way on their platforms, but they won’t be able to eliminate it completely. (谷歌和 Facebook 现在都在采取措施控制误导新闻在他们的平台上传播, 但他们 不可能完全 eliminate 它)”中 but 可知,上下文有转折,虽然谷歌和 Facebook 在采取措施控 制误导新闻的传播, 但不可能完全消除这些新闻。画线词 eliminate 意思为“消除”,与 remove 意思相近。故选 B。
8.主旨大意题。通读全文, 结合第二段中“According to a new study by Stanford University, most kids don’t know what news is fake.(根据斯坦福大学的一项新研究,大多数孩子不知道什么新 闻是假的)”可知,文章介绍了斯坦福大学的研究发现,大多数孩子不知道什么新闻是假的, 并分析了原因,给出了建议。由此推知, B 选项“小心:孩子们不擅长识别假新闻”是文章最 佳标题。故选 C。
9 .G 10 .D 11 .E 12 .F 13 .B
【导语】本文是一篇说明文,主要讲了三个安全上网,避免受到坏的影响的方法。
9.空前说“Today I thought I’d blog about a question that has been asked many times—how do you
stay safe online and avoid bad experiences on the Internet I am not an expert.(今天, 我想我要写 一个被问了很多次的问题——如何保证网络安全,避免在网络上的糟糕经历?我不是专 家。)”,空后提出了三种方法, 说明作者虽然不是专家, 但是还是知道一些方法, G 选项“But many years as a blogger have taught me a thing or two.(但是多年的博客生涯教会了我一些东 西。 )”说明了作者知道一些方法的途径, 引起下文的几种方法, 因此 G 选项承上启下, 符合 语境,故选 G。
10.空前说“If you see or read something that makes you feel uncomfortable, leave the site immediately.(如果你看到或读到让你感觉不舒服的东西,立即离开该网站。 )”,也就是立刻 离开, 不做任何评论, D 选项“Don’tpost comments or click on anything.(不要发表评论或点击 任何东西。)”所讲的方法和空前说的“立刻离开网站”表达意思差不多, 因此 D 选项承接上文, 符合语境,故选 D。
11.空前说“Second, protect your privacy.(第二, 保护你的隐私。 )”,空后说“Someone might use the information to steal your identity.(有人可能会利用这些信息窃取你的身份。 )” ,E 选项 “Don’t give out your address or phone number.(不要留下你的地址或电话号码。 )”中的“address or phone number(地址或电话号码)”和空后的“the information(信息)”相一致, 说明了保护隐私 的具体方法,因此 E 选项承上启下,符合语境,故选 E。
12.空后说“Like a troll, a cyberbully will also write something mean but it is usually directed at particular people.(像喷子一样,网络恶霸也会写一些刻薄的东西,但通常是针对特定的 人。 )” ,空格处应说网络恶霸除了这一点以外还会做的事情, F 选项“Acyberbully uses the Internet to be mean to others.(网络恶霸利用互联网对他人刻薄。)”说明的是网络恶霸会做的事 情,因此承上启下,符合语境,故选 F。
13.空前说“Have you had any bad experiences online, or do you have some good advice for staying safe (你在网上有过不好的经历吗 或者你有一些关于安全的好建议吗? )”,空格处应 该说如果有的话该怎么做, B 选项“Post yourcomments below!(在下面发表你的评论! )”说明 了如果你在网上有过不好的经历或有一些关于安全的好建议可以在下面发表评论, 因此承接 上文,符合语境,故选 B。
14 .C 15 .D 16 .B 17 .A 18 .C 19 .D 20 .B 21 .C 22 .A 23 .B 24 .A
25 .D 26 .B 27 .C 28 .A 29 .D 30 .A 31 .D 32 .B 33 .C 【导语】本文是一篇议论文。文章论述了安装手机更新的必要性和好处。
14.考查名词词义辨析。句意:我们知道我们应该安装手机不断提醒我们的软件更新,但我 们总是以各种借口推迟这么做。 A. computers 计算机; B. cars 汽车; C. phones 电话; D. televisions 电视。根据句中“We know that we should install the software updates”和下文 “Ultimately, my 18 is this: keeping your phone up-to-date is a win-win.”可知, 文中说的 是电话提醒我们要更新软件。故选 C 项。
15.考查动词词义辨析。句意:我们知道我们应该安装手机不断提醒我们的软件更新,但我 们总是以各种借口推迟这么做。 A. suggest 建议;B. practice 练习;C. admit 承认;D. postpone 推迟。根据句中转折连词“but”和“various excuses”可推知,虽然手机提醒我们更新软件,但 我们总是找借口推迟这么做。故选 D 项。
16 .考查形容词词义辨析。句意:是的,几分钟不能用手机是很烦人的,但这很重要。 A. convincing 令人信服的;B. annoying 令人恼火的;C. interesting 有趣的;D. confusing 令人费 解的。结合常识和句中“not being able to use our phones”可知, 不能用手机是让人感到恼火的 事情,这也解释了上文中为什么我们总是找借口推迟更新软件。故选 B 项。
17.考查动词词义辨析。句意:所以,为了说服你为什么要这么做,我将尝试“胡萝卜加大 棒”的方法。 A. persuade 说服;B. deny 否认;C. warn 警告;D. question 质疑。根据句中“why you should”可知,作者要说服我们为什么要更新软件。故选 A 项。
18.考查名词词义辨析。句意:所以,为了说服你为什么要这么做,我将尝试“胡萝卜加大 棒”的方法。 A. element 要素; B. effect 作用; C. approach 方法; D. argument 争论。根据句 中“trythe ‘carrot’ and ‘stick’”和下文内容可知, 这是作者说服我们的策略、方法。故选 C 项。
19.考查连词词义辨析。句意:如果你不随时更新你的手机, 你的手机就会面临黑客的威胁。
A. Though 虽然 ;B. Before 在……之前 ;C. Unless 除非 ;D. If 如果。根据句意, “不随 时更新你的手机”是“手机就会面临黑客的威胁”的条件, 用if 引导条件状语从句。故选 D 项。
20 .考查名词词义辨析。句意:因为数字安全是一场军备竞赛。 A. access 入口; B. security 安全;C. revolution 革命;D. download 下载。根据下文“Hackers will find holes and new ways to 8 our phones, so smartphone companies release new versions of the phones operating system (OS) software to 9 the problem. Then hackers look through the new version of the software for new 10 they can use for attack. And so on forever.”可知,黑客想要入侵我 们的手机, 而智能手机公司要保护手机, 所以这就是关于一场数字安全的军备竞赛。故选 B
项。
21.考查动词短语辨析。句意:黑客会找到漏洞和新方法入侵我们的手机,所以智能手机公 司会发布新版手机操作系统软件来解决这个问题。A. show off 炫耀;B. look for 寻找;C. break into 闯入; D. put aside 把……放在一边。结合常识和句中“Hackers will find holes and new ways”可知,黑客会入侵我们的手机。故选 C 项。
22.考查动词词义辨析。句意:黑客会找到漏洞和新方法入侵我们的手机,所以智能手机公 司会发布新版手机操作系统软件来解决这个问题。 A. fix 解决;B. understand 理解;C. share 分享; D. describe 描述。结合常识和句中“smartphone companies release new versions of the phones operating system (OS) software”和“problem”可知,智能手机公司会通过发布新版手机 操作系统软件来解决黑客入侵手机的问题。故选 A 项。
23.考查名词词义辨析。句意:然后,黑客们会仔细研究新版本的软件,寻找他们的弱点来
进行攻击。 A. illnesses 疾病; B. weaknesses 弱点; C. techniques 技术; D. excuses 借口。根 据句中“hackers look through the new version of the software”和“use for attack”可推知,黑客会 研究新版本的软件,寻找其弱点来进行攻击。故选 B 项。
24.考查动词词义辨析。句意:这意味着如果你没有将你的手机更新到最新版本的操作系统, 你的手机就处于危险之中。 A. means 意味着; B. recommends 推荐; C. demands 要求; D. promises 允诺。句中“This”指代上文中黑客和智能手机公司都在更新技术这一现象,这就意 味着如果我们不更新智能手机操作系统,手机就会受到攻击。故选 A 项。
25.考查介词短语辨析。句意:这意味着如果你没有将你的手机更新到最新版本的操作系统, 你的手机就处于危险之中。 A. for free 免费; B. in place 适当的; C. on sale 廉价出售; D. in danger 在危险中。根据上文可知, 黑客和智能手机公司都在更新技术, 所以如果我们不更新 智能手机公司发布的操作系统,手机就会受到攻击,处于危险中。故选 D 项。
26.考查动词词义辨析。句意:因此,保持最新版本以确保你的手机有最坚固的数字盔甲是 很重要的。 A. announce 宣布; B. guarantee 确保; C. recognize 认出; D. pretend 假装。根据 上文可知, 智能手机公司发布的操作系统可以帮助我们的手机对抗黑客的攻击, 所以保持最 新版本的操作系统可以确保手机有最坚固的数字盔甲。故选 B 项。
27.考查形容词词义辨析。句意:软件更新真正令人兴奋的部分是,你的手机将获得新的特 征和功能,而不需要购买一个新的手机! A. amusing 有趣的; B. strange 奇怪的; C. exciting 令人兴奋的; D. convenient 方便的。根据句中“your phone will receive new 15 and functionality without you needing to buy a new handset!”可知,更新软件后, 手机拥有新的功能, 不再需要购买一个新的手机,这是让人兴奋的事情。故选 C 项。
28.考查名词词义辨析。句意:软件更新真正令人兴奋的部分是,你的手机将获得新的特征 和功能,而不需要购买一个新的手机! A. features 特征; B. messages 信息; C. orders 顺序;
D. checks 支票。结合常识和句中“software updates”与“functionality”可知, 软件更新往往会给 手机带来新的特征和功能。故选 A 项。
29.考查副词词义辨析。句意:事实上,更新有时是如此具有变革性,就像收到了一部全新 的手机。 A. gradually 逐步地;B. previously 先前地;C. economically 经济地;D. occasionally 有时。根据常识和句中“it can be like 17 an entirely new phone”可知, 通过软件更新让 手机变成新手机也不是常有的事,只是有时发生。故选 D 项。
30.考查动词词义辨析。句意:事实上,更新有时是如此具有变革性,就像收到了一部全新 的手机。 A. receiving 收到;B. inventing 发明;C. selecting 选择;D. introducing 介绍。根据“so transformative that”可知,更新有时如此具有变革性,会让你觉得收到一部新手机。故选 A 项。
31.考查名词词义辨析。句意:最后, 我的观点是:让你的手机随时更新是双赢的。 A. concern 关心;B. guess 猜测;C. solution 解决办法;D. point 观点。根据“keeping your phone up-to-date
is a win-win.”可知,这是作者的观点。故选 D 项。
32.考查形容词词义辨析。句意:这样你不仅能保证手机的安全,而且还能拥有一台更好的 手机。 A. simple 简单的;B. safe 安全的;C. clean 干净的;D. silent 安静的。根据上文“So it is important to stay up-to-date to 13 your phone is wearing the toughest digital armour (盔甲).”可知,更新手机软件可以让你的手机拥有最坚固的数字盔甲,让它更安全。故选 B 项。
33.考查动词短语辨析。句意:所以现在打开你的设置应用程序, 最后安装那些更新! A. pay for 为……而付钱;B. compete with 与……竞争;C. turn on 打开;D. refer to 参考。根据句中 “your settings app now”和“install those updates”可知, 文章最后作者号召我们打开手机, 安装 更新。故选 C 项。
1 .to access 2 .a 3 .involved 4 .Actually 5 .is 6 .but##yet 7 .without 8 .be called 9 .professionals 10 .safe
【导语】这是一篇说明文。文章主要介绍了黑客及其工作内容。 1.考查非谓语动词。句意:他们花了好几天的时间寻找方法,侵入任何可以连接到互联网 的东西, 以获取从未被看到的信息。分析句子结构可知, 句中已有谓语动词, 空处为非谓语 动词作目的状语,所以用动词不定式。故填 to access 。 2.考查冠词。句意:杰克为自己的谋生之道感到自豪。固定搭配 for a living“为了谋生” 。 故填 a。
3.考查非谓语动词。句意:在好莱坞,黑客通常被描述为在暗室中从事非法活动的戴头巾 的人, 同时敲打着键盘。分析句子结构可知, 句中已有谓语动词, 空处为非谓语动词作后置 定语, 修饰 figures,该动词和修饰的名词之间存在被动关系, 所以用过去分词作定语。故填 involved。
4 .考查副词。句意:实际上,黑客是电脑编程和解决问题的专家。此处修饰后面整个句子, 用副词 actually。故填 Actually。
5.考查主谓一致。句意:黑客是一种活动,任何活动与犯罪的区别在于许可。根据全文的 时态可知,此处应为一般现在时,主语为 what 引导的主语从句, what 指代 permission,谓 语动词用单数。故填 is。
6.考查连词。句意:司机可以自由驾驶,但他们没有每小时驾驶 150 英里的许可——这是 违法的。根据句意可知, 司机可以自由驾驶, 但他们没有每小时驾驶 150 英里的许可, 所以 前后两句之间为转折关系,用转折连词 but 或者 yet。故填 but 或 yet。
7.考查介词。句意:银行家可以转移客户的资金,但如果他们未经许可就这样做,那是违 法的。根据前文“they do not have permission”及与前一句的并列关系可知,这里指的是银行 家可以转客户的钱, 但是如果他们在没有允许的情况下这么做, 那就是非法的, 所以用介词 without“没有”,和后面的名词构成介词短语,在句中作状语。故填without。
8.考查动词语态。句意:参与非法使用黑客的人不应被称为“坏黑客”,而应被称为“威胁行 为人”。主语 someone 与 call 之间是被动关系,应用被动语态,情态动词should 后加 be 动 词原形。故填 be called。
9.考查名词复数。句意:黑客就是像杰克和他的 IBM 团队一样的人——安全专家。此处表 示“安全专家”,所以用名词 professional,为可数名词, 前面没有限定词, 应用复数形式, 表 泛指。故填 professionals。
10.考查形容词。句意:黑客在确保公司和人员安全方面发挥着至关重要的作用。固定搭配 keep sb./sth. safe“保持某人/物安全”,形容词作宾语补足语。故填 safe。
Part3 话题写作练
◎应用文练
Passage1
Good afternoon, my dear classmates/fellow students!
With the wide spread of the Internet, we have easy access to almost everything we want to know. Meanwhile, there are also hidden/potential dangers that we can’t see through. Then what should we do to stay safe online
First of all, don’t click on any strange link so as to avoid property loss. Second, protect your privacy. Don’t give away your personal information like name or address, and never see strangers you meet online. Finally, always be polite in the virtual world. Try not to be a target for a cyberbully.
Only when we obey the rules above can we build a healthy and harmonious online world.
Thank you!
【导语】本篇书面表达属于发言稿, 要求考生以“How to stay safe online”为标题, 写一篇发言稿。主要包括以下内容:1. 强调网络安全的重要性;2. 提出建议 (如保护好个人隐私、文明上网等)。
【详解】 1. 词汇积累
保持: stay →keep
私人的: personal →private
遵守: obey → observe
首先: first of all→first and foremost
2. 句式拓展
简单句变复合句
原句: First of all, don’t click on any strange link so as to avoid property loss.
拓展句 :First of all, don’t click on any strange link, the purpose of which is to
avoid property loss.
【点睛】 [高分句型 1]Meanwhile, there are also hidden/potential dangers that we can’t see through.(运用了关系代词 that 引导的限制性定语从句)
[ 高分句 型 2]Only when we obey the rules above can we build a healthy and harmonious online world.(运用了 only 位于句首引起的部分倒装句)
Passage2
Social Media and Teen Health
Social media has become an effective way for us to build relationships, shape ourselves and understand the world. But it is intrinsically linked to our mental health. So we must understand the impact of social media on mental health, especially for teenagers.
Most teenagers use the Internet to socialize, which is considered more addictive than cigarettes. Excessive use of social media will increase the probability of anxiety, depression and poor sleep quality.
Therefore, we suggest that young people should properly use social media, play its advantages and avoid its harm.
【导语】本篇书面表达属于议论文。要求考生写一篇关于 Social Media and Teen Health 的博客,阐述社交媒体对青少年健康的影响。
【详解】 1.词汇积累
方式,方法: method →means →way
影响: effect→impact
认为: think→consider
差的: bad →poor
2.句式拓展
简单句变复合句
原 句 : So we must understand the impact of social media on mental health, especially for teenagers.
拓展句 :So we must understand the impact of social media on mental health, especially for teenagers, which we must be concerned about.
【点睛】【高分句型 1】Most teenagers use the Internet to socialize, which is considered more addictive than cigarettes. (运用了 which 引导的非限制性定语 从句)
【 高分句型 2 】Therefore, we suggest that young people should properly use social media, play its advantages and avoid its harm. (that 引导的宾语从句中运用 了虚拟语气)
¤读后续写练
Luckily, the Internet did its thing. It’s a bit of a modern-day wonder that would never have happened without social media. Mara’s story was quickly and continuously spread via the Internet. Several days later, with anxiety and worry, Mara finally got positive feedback. Mara said she got an email from someone. The sender told her the bear was on the way back. On Tuesday night, Mara’s bear came home.
The email wasfrom the woman who sent the bear back. She told Mara that she was deeply touched by Mara’s story. She didn’t want the reward, just hoping that Mara could live a happy life in the future. Mara is getting married next summer and the bear is going to have a special seat at the ceremony--the one her mother would sit in. For now, she’s keeping Mama Bear close and sending thanks to those who helped with the happy reunion.
【分析】本文以事件为线索,讲述了 Mara 在搬家途中弄丢了母亲留给自己的玩具熊,这只 熊对她来说意义非凡,因此她在网上求助找熊。
【详解】 1.段落续写:
①由第一段首句内容“幸运的是, 互联网发挥了作用。 ”可知, 第一段可描写 Mara 通过网络 找回了 Mama Bear。
②由第二段首句内容“这封邮件是将熊邮寄回来的女人发来的。 ”可知,第二段可描写女人 的信件内容及 Mama 收到玩具熊后的做法。 2.续写线索:收到玩具熊的线索——送熊女士表达祝愿——Mara 的婚礼计划——Mara 表示 感谢
3.词汇激活
行为类
① . 回到家: came home/returned home
② .收到邮件: got an email/received an email
③ .需要: want/need 情绪类
① .感动: be touched/be moved
② .感谢: thanks/appreciation
【点睛】 [高分句型 1] It’s a bit of a modern-day wonder that would never have happened without social media. (运用了 that 引导的定语从句)
[高分句型 2]She told Mara that she was deeply touched by Mara’s story. (运用了 that 引导的宾 语从句)