第二篇        Hacking
   People tend to think of computers as isolated machines,working away all by themselves.Some do-personal computer without an outside link,like Someone's hideaway(隐蔽的)cabin in the woods.But just as most homes are tied to a community by streets,bus routes and electric lines.computers that exchange intelligence are part of a community-local,national and even global network joined by telephone connections.
  The computer network is a creation of the electric age,but it is based on old-fashioned trust. It cannot work without trust.A rogue loose(为所欲为的无赖)in a computer system called hacker (黑客) is worse than a thief entering your house.He could go through anyone's electronic mail or add to,change,distort or delete anything in the information stored in the computer's memory.He could even take control of the entire system by placing his own instructions in the software that runs it.He could shut the computer down whenever he wished,and no one could stop him.Then he could program the computer to erase any sign of his ever having been there.
  Hacking,our electronic-age term for computer break-in,is more and more in the news-brainy kids vandalizing university records,even pranking(胡闹)about in supposedlyline14
   safeguarded systems.To those who understand how computer networks are increasingly regulating life in the late 20th century,these are not laughing matters.A potential for disaster is
  building:A dissatisfied former insurance-company employee wipes out information trom payroll (工资表) files.A student sends out a"virus",a secret and destructive command,over a national network.The virus copies itself at lightning speed,jamming the entire network-thousands of academic,commercial and govemment computer systems.Such disastrous cases have already occurred.Now exists the possibility of terrorism by computer.Spoiling a system responsible for air.traffic control at a busy airport,or knocking out the telephones of a major city,is a relatively easy way to spread panic.Yet neither business nor government has done enough to toughen its defenses against attack.For one thing,such defenses are expensive;for another,they may interrupt communication -the main reason for using computers in the first place.
  36 The writer mentions''a thief'in the second paragraph
  A to show that a hacker is more dangerous than a thief.
  B to tell people that thieves like to steal computers nowadays.
  C to demand that a protective computer system should be set up against thieves.
  D to demonstrate that hackers and thieves are the same people.
  37 The word"vandalizing"in Line 14 means
  A  "stealing".
  B  "creating".
  C  "destroying".
  D  "updating".
  38 According to the passage.which of the following statements is NOT true?
  A  Hacking is also known as computer break-in.
  B  Experts on computer networks consider hacking nothing serious.
  C Hacking is a widespread concern.
  D Hacking is potentially disastrous.
  39 Which of the following is NOT mentioned in the passage as an instance of attack by a hacker?
  A  Deleting information in the computer's memory.
  B  Shutting down the computer whenever he wishes.
  C  Entering your house to steal.
  D  Spoiling a system for air traffic.
  40 One of the reasons why business or government has not taken tough measures to stop hacking is that
  A  it will cause fear among tile public.
  B  hacking has not caused much damage.
  C  tough measures are illegal.
  D  communication may be interrupted.
  第三篇    Space-Age Archeology
   It's a strange partnership,but a very effective one:Satellites and space-shuttle-carried radar are helping archeologists .How?By "seeing"through sand or through treetops to locate important archeological sites.
  The traditional tools of archeologists are shovels and picks.But high technology is making the archeologist's work and time far more productive.
  Take,for example,the second 1981 flight of the Space Shuttle Challenger.During that mission,a powerful,experimental radar was pointed at a lifeless stretch of desert in Egypt called the Selima Sand Sheet(pan of the Sahara Desert).To everyone's surprise,the radar penetrated through the sand to the harder rock beneath.On the surface.there is a 1ittle indication that Africa's Sahara Desert was never anything but a desert.When the archeologists studied the radar images,they saw what seemed to be impossible:there was sand.buried landscape that was shaped by flowing water;traces of ancient riverbeds appeared to be over nine miles wide,far wider than most secti6ns of the present.day Nile River.Today,the area is one of the hottest.Driest desert in the world.
  Archeologists dug pits along the old river banks and found clues to the past:stream.Rounded pebbles(鹅卵石),Stone-Age axes,broken ostrich(鸵鸟)eggshells,and the shells of land snails.The archeologists were quite pleased with these findings.For years,they'd been finding stone axes scattered through the desert,and couldn't understand why.Now we know that early humans were living on the banks of old rivers,and left their beautiful tools behind.Some are so sharp that you could shave with them.
  More recently,Lmadsat 4,a special Earth-mapping satellite,aided in the discovery of ancient Mayan ruins in Mexico.Landsat can.with the help of false-color imagery,"see through"much of the area.Armed with these maps,a five-person expedition took to the air in a helicopter.
  By the end of the second day,the team found a stretch of walled fields that expedition inembers said look like"old New England fences".They just go on,non'stop,for 40 miles.Later
in the week,an ancient village was pinpointed,as was the"lost"city of Oxpemul,once found in the early 1930's but quickly reclaimed by the jungle.The findings made them able to map the extent of the Mayan civilization in about five days.Working on foot,it would have taken at least 100 years.
  4l With the help of the space-shuttle-carried radar,archeologists found
  A  a new stretch of the Sahara desert.
  B traces of ancient riverbeds under the Sahara Desert.
  C  some traditional archeological tools in the Sahara Desert.
  D  a mountain beneath the Sahara Desert.
  42 Which of the following is true of the sand-buried landscape?
  A  It was all old avenue.
  B  It was an underground river.
  C  It was shaped by flowing water.
  D  It was shaped by the old Nile River.
  43 The stream-rounded pebbles and Stone-Age axes which were found along the ancient river banks show that
  A an early human civilization once existed along the old river banks.
  B ancient people didn't know how to make weapons.
  C most species ofimimals in Sahara have disappeared.
  D early humans were good at fighting with sharp weapons.
  44 "They"in the second line of the last paragraph refers to
  A old New England fences.
  B.the stretch of walled fields.
  C the expedition members.
  D  ancient villages.
  45 Which of the follgwing best summarizes the main information of the passage?
  A High-tech helps locate many fascinating archeological sites.
  B  Without high-tech,the archeologist's work would come to a stop.
  C High-tech has taken the place of shovels and picks.
  D High-tech makes the archeologist's work more fruitful.

  第5部分:补全短文  (第46~50题,每趣2分,共10分)

  阅读下面的短文,文章中有5处空白,文章后面有6组文字,请根据文章的内容选择5组文字,将其分别放回文章原有位置,以恢复文章原貌。请将答案涂在答题卡相应的位置上。
  Stars in Their Eyes
  The Scientific American Book of the Cosmos edited by David Levy,Macmillan,£20,ISBN   0333782933
   Previous generations of scientists would have killed to know what we know.For the first time in history,we have a pretty good idea.of the material content of the Universe,our position within it and how the whole thing came into being.
  In these times of exploding knowledge there is a definite need to take stock and assemble what we know in a palatable(受欢迎的)form        (46)
  The essays in The Scientific American Book of the Cosmos have been selected by David Levy,co-discoverer of Comet Shoemaker-Levy 9,which in 1994 struck Jupiter with the violence of several full-scale nuclear wars        (47)This is certainly a great collection of essays, but it is not,as the book promises,a seamless(完美的,无缝隙的)synthesis of our current knowledge.
  Nobody can fault the range of articles Levy has included.There are essays on the planets,moons and assorted debris(碎片)in the Solar System,and on our Galaxy,the Milky Way.        (48)
  The contributors,too,are stars in their own fields.Not many books can boast chapters written by such giants as Erwin Schrodinger and Francis Crick.My personal favourites are a piercingly clear essay by Albert Einstein on general relativity and an article by Alan Guth and Paul Steinhardt on the inflationary(膨胀的)Universe.
  So much for the book's content.But Levy has not succeeded in providing an accurate synthesis of our current knowledge of the cosmos,which the book iacket promises.Gathering together previously published articles inevitably leaves subject gaps,missing explanations and so
  on.      (49)But there isn't one.In fact,surprisingly for a book so densely packed with information,there is no index.
   Collecting essays in this way is clearly a good publishing wheeze(巧妙的生意).But this approach shortchanges the public,who would be berer served by an account moulded into a seamless whole.      (50) However,for the next edition,please,please can we have an index?
  A Tegmark fears he may hold the record for the longest time taken to read one book.
   B  In a more positive vein,this is a wonderful collection of essays to dip in and out of if you akeady have a good overview(概述)of current cosmic understanding.
  C Levy is an active astronomer and an accomplished writer,so you'd expect him to provide a broad and accurate picture of our current understanding of the cosmos.
  D  Scientific American has attempted to cater to this need by bringing together essays that have appeared in the magazine.
  E To some extent,these could have been plugged with a glossary(词表)of terms.
   F  Also included are contributions on the world of subatomic particles,the origin of life on Earth and the possibility of its existence elsewhere.

  第6部分:完形填空  (第51~65题,每题1分,共15分)

  阅读下面的短文,文中有15处空白,每处空白给出4个选项,请根据短文的内容从4个选项中选择1个最佳答案,涂在答题卡相应的位置上。
  Computers
   Befor the widespread use of computers,managers could    (51)full use of large amounts of valuable information about a company's activities. The information either     (52)managers too late or was too expensive to be used.Today,managers are facing a wide     (53)of data processing and information instruments.Managers can draw on computer-based information systems to control      (54)in every area of their company.On any kinds of performance measures,the information provided by these systems helps managers compare standards    (55)actual results,find problems,and take proper action      (56)it is too late to make changes.
  The     (57)of computerized(电脑化)information systems has sharply changed management control in many companies.Even a neighborhood shopkeeper may now use computers to     (58) sales,billing,and other activities.
  Now.there are about 24 million microcomputers in      (59)in the United States-one for every 10 citizens.It is      (60)that by 1 996,6 1 percent of American managers will be using some sort of electronic work station.In order for managers to be sure that the computer-based information they are receiving is       (61),they need to understand how computers work.However,in most       (62)they do not need to learn how to program computers.Rather,managers should understand how computerized information systems work;how they are      (63);their limitations and costs;and the manner in which information systems may be used.          (64)an understanding is not dittlcult to achieve.
  One research found that business firms were more successful in teaching       (65)information about computers to business graduates than they were in teaching business subjects to computer science graduates.
  51 A take      B have     C  make    D get
  52 A found  B changed     C  reached  D influenced
  53 A district    B range      C  band    D aspect
  54 A actions     B activities   C  acts   D activation
  55 A with     B to     C  for    D by
  56 A until     B before     C while   D when
  57 A donation  B conversion  C auction  D introduction
  58 A work     B reduce     C  control  D change
  59 A use     B usage     C activity  D construction
  60 A estimated   B taught  C called  D recommended
  61 A innovative  B necessary C  accurate  D  strict
  62 A occasions    B times   C  cases    D examples
  63 A invented  B expanded  C modified   D developed
  64 A That     B This      C  Such    D So
  65 A complex    B basic     C  serious   D favorable