阅读理解Passage 1
Poland, once a backward agricultural country, is quickly becoming an economic powerhouse in Central Europe
阅读理解Passage 4
A good modern newspaper is an extraordinary piece of reading
阅读理解Passage 2
Mind over matter is an English saying meaning that we can control our bodies with our minds
阅读理解In the United States, it is not customary to telephone someone very early in the morning
阅读理解Passage A
Hot boning is an energy saving technique for the processing industry
阅读理解I made a mental note that they were infertile
阅读理解Directions: There are 4 passages in this part. Each passage is followed by some questions or unfinished statements. For each of them there are four choices marked A., B., C. and D. You should decide on the best choice and write down your answer on the Answer Sheet.Passage 1A variety of simple techniques can prevent computer crime, but more sophisticated methods are also necessary to prevent computer crimes.One technique to protect confidentiality is encryption(加密). Information can be scrambled and unscrambled using mathematical equations and a secret code called a key. Two keys are usually employed, one to encode and the other to decode the information. The key that encodes the data, called the private key, is possessed by only the sender. The key that decodes the data, called the public key, may be possessed by several receivers. The keys are modified periodically, further hampering unauthorized access and making the encrypted information difficult to decode or forge.Another technique to prevent computer crime is to limit access of computer data files to approved users. Access- control software verifies computer users and limits their privileges to view and alter files. Records can be made of the files accessed, thereby making users accountable for their actions. Military organizations give access rights to classified, confidential, secret, or top secret information according to the corresponding security clearance level of the user. Passwords are confidential sequences of characters that give approved users access to computers. To be effective, passwords must be difficult to guess. Effective passwords contain a mixture of characters and symbols that are not real words.Tokens are tamper-resistant plastic cards with microprocessor chips that contain a stored password that automatically and frequently changes. When a computer is accessed using a token, the computer reads the token’s password, as well as another password entered by the user, and matches these two to an identical token password generated by the computer and the user’s password, which is stored on a confidential list. In the future, passwords and tokens may be reinforced by biometrics (生物测定学), identification methods that use unique personal characteristics, such as fingerprints, skin oils, voice variations, and keyboard-typing rhythms.Computer networks, multiple computers linked together, are particularly vulnerable to computer crimes. Information on networks can be protected by a firewall, a computer placed between the networked computers and the network. The firewall prevents unauthorized users from gaining access to the computers on a network, and it ensures that information received from an outside source does not contain computer viruses, self-replicating computer programs that interfere with a computer’s functions.
阅读理解Text 2
A report consistently brought back by visitors to the US is how friendly, courteous and helpful most Americans were to them
阅读理解Archaeology as a profession faces two major problems
阅读理解If you intend using humor in your talk to make people smile, you must know how to identify shared experiences and problems
阅读理解Passage 3
New technology links the world as never before
阅读理解Directions: There are 4 passages in this part. For each of them there are four choices marked A., B., C. and D. You should decide on the best choice.Passage 1A child who has once been pleased with a tale likes, as a rule, to have it retold in identically the same words, but this should not lead parents to treat printed fairy stories as sacred texts. It is always much better to tell a story than to read it out of a book and, if a parent can produce an improvement on the printed text, so much the better.A charge made against fairy tales is that they harm the child by frightening him or arousing his sadistic impulses. To prove the latter, one would have to show in a controlled experiment that children who have read fairy stories were more often guilty of cruelty than those who had not. On the whole, their symbolic verbal discharge seems to be rather a safety valve than an incitement to overt action. As to fears, there are, I think, well-authenticated cases of children being dangerously terrified by some fairy story. Often, however, this arises from the child having been told the story on only one occasion. Familiarity with the story by repetition turns the pain of fear into the pleasure of a fear faced and mastered.There are also people who object to fairy stories on the grounds that they are not objectively true, that giants, witches, two-headed dragons, magic carpets, etc. do not exist; and that, instead of indulging his fantasies in fairy tales, the child should be taught how to adapt to reality by studying history and mechanics. I find such people, I must confess, so unsympathetic and peculiar that I do not know how to argue with them. If their case were sound, the world should be full of madmen attempting to fly from New York to Philadelphia on a broomstick or covering a telephone with kisses in the belief that it was their enchanted girlfriend.No fairy story ever claimed to be a description of the external world and no sane child has ever believed that it was.
阅读理解Passage 1
Imagine a Hollywood movie with this plot: Lily Yang, a young widow, leaves Taiwan and immigrates to the United States, hoping her son Chih-Yuan will have a better life there
阅读理解Passage D
Petroleum products, such as gasoline, kerosene, home heating oil, residual fuel oil, and lubricating oils, come from one sourcecrude oil found below the earths surface, as well as under large bodies of water, from a few hundred feet below the surface to as deep as 25,000 feet into the earths interior
阅读理解Passage 2
Open up most fashion magazines and you will see incredibly thin models with impossible hair and wearing unreasonably expensive, impracticably styled clothes
阅读理解She sat at the window watching the evening invade the avenue
阅读理解Passage 2
People do not analyze every problem they meet
阅读理解Methodology should be based on what we know about language (what it is and how it operatesstill a matter of controversy); what we know about human beings (how they learn and how they learn language and whether these are different processes or merely different manifestations of the same process, another question still under investigation); and what we know about people in interaction (a prolific area of psychological study)
阅读理解Passage 3
A controversy erupted in the scientific community in early 1998 over the use of DNA (deoxyribonucleic acid) fingerprinting in criminal investigations
阅读理解Passage One
Harvard thrilled middle-class patents last week by capping its tuition for families with incomes of up to $180,000 at 10 percent of their earnings
