77范文网 - 专业文章范例文档资料分享平台

江苏省沭阳县银河学校2013-2014学年高一英语上学期寒假作业1(2)

来源:网络收集 时间:2019-02-14 下载这篇文档 手机版
说明:文章内容仅供预览,部分内容可能不全,需要完整文档或者需要复制内容,请下载word后使用。下载word有问题请添加微信号:或QQ: 处理(尽可能给您提供完整文档),感谢您的支持与谅解。点击这里给我发消息

clearly, who know how to get information quickly and use it well? What do you think? 55.” To be familiar with” means to ____.

A. be in the same family as B. know about C. dislike D. like 56. According to the passage, in which four places can you find computers? A. at home, in offices, in factories and in schools B. At home, in schools, in banks and in offices

C. At home, in hospitals, in schools and in offices D. At home, in shops , in offices and in schools

57. Does everyone think computers are good for children? A. Yes, they do B. No, not everyone thinks so C. They don’t know D. They are not sure

58. “To learn form experience” means to ___.

A. learn from doing something B. learn from a teacher C. press a button D. learn form each other

D

Do dogs understand us?

Be careful what you say around your dog. It might understand more than you think.

A border collie(牧羊狗)named Rico recognizes the names of about 200 objects, say researchers in Germany. The dog also appears to be able to learn new words as easily as a 3-year-old child. Its word-learning skills are as good as those of a parrot or chimpanzee(黑猩猩).

In one experiment, the researchers took all 200 items that Rico is supposed to know and divided them into 20 groups of 10 objects. Then the owner told the dog to go and fetch one of the items and bring it back. In four tests, Rico got 37 out of 40 commands right. As the dog couldn’t see anyone to get clues, the scientists believe Rico must understand the meanings of certain words.

In another experiment, the scientists took one toy that Rico had never seen before and put it in a room with seven toys whose names the dog already knew. The owner then told Rico to fetch the object, using a word the dog had never heard before.

The correct object was chosen in seven out of 10 tests, suggesting that the dog had worked out the answer by process of elimination(排除法). A month later, Rico remembered half of the new names, which is even more impressive.

Rico is thought to be smarter than the average dog. For one thing, Rico is a border collie, a breed(品种)known for its mental abilities. In addition, the 9-year-old dog has been trained to fetch toys by their names since the age of nine months.

It’s hard to know if all dogs understand at least some of the words we say. Even if they do, they can’t talk back. Still, it wouldn’t hurt to sweet-talk your dog every now and then. You might just get a big, wet kiss in return! 59. From paragraph 2 we know that ______. A. animals are as clever as human beings

B. dogs are smarter than parrots and chimpanzees C. chimpanzees have very good word-learning skills

D. dogs have similar learning abilities as 3-year-old children 60. Both experiments show that ______.

A. Rico is smart enough to get all commands right B. Rico can recognize different things including toys

C. Rico has developed the ability of learning mathematics

6

D. Rico won’t forget the names of objects once recognizing them

请认真阅读下列短文,并根据所读内容在文章后表格中的空格里填入最恰当的单词。

As the Internet and computer use become more common, the need for security is more important than ever. According to the latest statistical analysis, it is estimated there are over 1.1 billion Internet users worldwide. The Internet provides diverse and useful resources such as Email, instant messaging, academic research, product research, paying bills, shopping, online banking, and the list goes on and on. For many of its 1.1 billion users the Internet is not just a tool but a way of life. But most users fail to take the time to research the risks involved. One of the greatest in the online world is computer hacking.

Computer hacking is the unauthorized access to a computer or network of computers. Hackers, those people who illegally enter systems, may alter or delete information, steal private information, or spread viruses that can damage or destroy files. But how exactly can a hacker get into a system to do theses things?

Most hackers use information called protocols (协议) that are built into computer software. These protocols allow computers to interact with one another. Protocols are sort of like computer police officers. When a computer connects to another system, the protocols check to see if the access is valid. The protocols can also determine how much information can be shred between the two systems. Hackers can manipulate (操纵) the protocols to get unlimited access to a computer system. In fact, just the act of entering a computer network is considered hacking. This is commonly called passive hacking. Passive hackers get a rush from just being able to invade a challenging system like a bank or military network. Hackers that do damage to a system by releasing viruses or altering, deleting, or taking information are known as active hackers they are, by far, the more dangerous of the two.

The easiest way to protect a system is with a good password. Long and unusual passwords are harder for hackers to guess. For even greater security, some online services now use “password-plus” systems. In this case, users first put in a password and then put in a second code that changes after the user accesses the site. Users have special cards or devices that show them the new code to use the next time. So if a hacker steals the password, they won’t have the code. Or if the hacker somehow gets the code, they still don’t know the password.

Threat in the Online World Who threats the online world? What do they do? How can people protect their computers and network? 7

Hackers gain They may (4) ______ the Using powerful illegal (1) ______ to a data and files stored in a password is an efficient computer or network. By computer, or plant (5) way to strengthen the (8) manipulating the _____ in it. ______ of a system. Internet (2) ______, Passive hackers only The harder a password is they can enter a take (6) ______ in being able to guess, the (9) ______ a computer network (3) to enter a challenging system can be. So remember ______. system, while active ones not to use short or (10) (7) ______ into a network ______ passwords like your with ill intentions. date of birth or your telephone number.

第二节:书面表达(25分)

根据下面的漫画和说明,以Beauty Does Not Only Come From Appearance为题写一篇英语短文:

要求:1.描述以上漫画(cartoon);

2.漫画所表达的意义; 3.感想;

4.文理通顺,表达完整,100词左右。

5.参考词汇:垃圾箱:dustbin; 环境:environment 残疾人: disabled man 心灵美:beautiful soul

In the above cartoons,

8

9

百度搜索“77cn”或“免费范文网”即可找到本站免费阅读全部范文。收藏本站方便下次阅读,免费范文网,提供经典小说综合文库江苏省沭阳县银河学校2013-2014学年高一英语上学期寒假作业1(2)在线全文阅读。

江苏省沭阳县银河学校2013-2014学年高一英语上学期寒假作业1(2).doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印 下载失败或者文档不完整,请联系客服人员解决!
本文链接:https://www.77cn.com.cn/wenku/zonghe/460893.html(转载请注明文章来源)
Copyright © 2008-2022 免费范文网 版权所有
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ: 邮箱:tiandhx2@hotmail.com
苏ICP备16052595号-18
× 注册会员免费下载(下载后可以自由复制和排版)
注册会员下载
全站内容免费自由复制
注册会员下载
全站内容免费自由复制
注:下载文档有可能“只有目录或者内容不全”等情况,请下载之前注意辨别,如果您已付费且无法下载或内容有问题,请联系我们协助你处理。
微信: QQ: