精英家教网 > 高中英语 > 题目详情

Passing Your Love On
Waiting for the airplane to take off, I was happy to get a seat by myself. Just then, an air hostess approached me and asked, “Would you mind 1your seat? A couple would like to sit together.” The only 2seat was next to a girl with her arms in casts(石膏绷带), a black-and-blue face, and a sad 3. “No way am I going to sit there,” I thought immediately. But a soft voice spoke, “She needs help.” Finally, I 4to move to that seat.
The girl was named Kathy. She had been in a car accident and 5was on her way for 6.
When the snack and juice arrived, it did not take me long to 7that Kathy would not be able to 8herself. I considered 9to feed her but hesitated, as it seemed too 10to offer a service to a 11. But then I realized that Kathy’s need was more 12than my discomfort. I offered to help her eat, and 13she was uncomfortable to accept, she 14as I expected. We became closer and closer in a short period of time. By the end of the five-hour trip, my heart had 15, and the time was really 16spent than if I had just sat by myself.
I was very glad I had reached 17my comfort zone to sit next to Kathy and feed her. Love 18flows beyond human borders and removes the fears that keep us 19. When we stretch to serve another, we grow to live 20a larger and more rewarding world.

  1. 1.
    1. A.
      leaving
    2. B.
      changing
    3. C.
      taking
    4. D.
      giving
  2. 2.
    1. A.
      comfortable
    2. B.
      suitable
    3. C.
      available
    4. D.
      favorable
  3. 3.
    1. A.
      heart
    2. B.
      expression
    3. C.
      action
    4. D.
      thought
  4. 4.
    1. A.
      decided
    2. B.
      wanted
    3. C.
      regretted
    4. D.
      promised
  5. 5.
    1. A.
      immediately
    2. B.
      lately
    3. C.
      recently
    4. D.
      now
  6. 6.
    1. A.
      treatment
    2. B.
      travel
    3. C.
      pleasure
    4. D.
      business
  7. 7.
    1. A.
      know
    2. B.
      say
    3. C.
      realize
    4. D.
      recognize
  8. 8.
    1. A.
      eat
    2. B.
      feed
    3. C.
      choose
    4. D.
      support
  9. 9.
    1. A.
      offering
    2. B.
      needing
    3. C.
      stopping
    4. D.
      trying
  10. 10.
    1. A.
      impolite
    2. B.
      far
    3. C.
      close
    4. D.
      fast
  11. 11.
    1. A.
      girl
    2. B.
      neighbor
    3. C.
      passenger
    4. D.
      stranger
  12. 12.
    1. A.
      unusual
    2. B.
      direct
    3. C.
      important
    4. D.
      shameful
  13. 13.
    1. A.
      when
    2. B.
      although
    3. C.
      since
    4. D.
      as
  14. 14.
    1. A.
      refused
    2. B.
      wondered
    3. C.
      cried
    4. D.
      did
  15. 15.
    1. A.
      warmed
    2. B.
      jumped
    3. C.
      broken
    4. D.
      cheered
  16. 16.
    1. A.
      good
    2. B.
      worse
    3. C.
      better
    4. D.
      bad
  17. 17.
    1. A.
      below
    2. B.
      through
    3. C.
      across
    4. D.
      beyond
  18. 18.
    1. A.
      seldom
    2. B.
      never
    3. C.
      hardly
    4. D.
      sometimes
  19. 19.
    1. A.
      separate
    2. B.
      independent
    3. C.
      silent
    4. D.
      upset
  20. 20.
    1. A.
      of
    2. B.
      in
    3. C.
      at
    4. D.
      for
BCBAD ACBAA DCBDA CDDAB
1.考查动词。根据下一句可知空姐想让作者“换”座位。本段最后部分提到还有一个空座,也是暗示。
2.考查形容词。本段开头部分提到作者很高兴自己找到了一个座位,再结合本句中的only一词可判断这是唯一剩下的座位。
3.考查名词。根据上一句的描写可知作者不愿意和这么一个女孩坐在一起,所以第一反应是想让自己坐在那个地方“没门儿”。
4.考查动词。作者最终改变了初衷,“决定”坐在那个座位上。前面提到作者最初不想那么做,因此B项不恰当。作者并没有自己事先承诺,所以最后一项不正确。
5.考查副词。句中的now指的是当时的时间,而女孩是在此之前出的车祸,所以用过去完成时。
6.考查名词。根据上一段中对她的描写可推断她此行的目的是“治疗”。
7.考查动词。作者很快就“意识”到她由于胳膊上打着绷带,不能自己吃东西。A项表示“知道”,语意不恰当;recognize表示“认出”,语句不通顺。
8.考查动词。她不能给自己“喂”东西,下一句中的feed her也提供了暗示。A项有一定的干扰性,但根据juice一词可知应该用drink,而不是eat,所以此项不太恰当。
9.考查动词。offer to do sth表示“主动提出做某事”,下文中的“I offered to help her eat...”也提供了线索。
10.考查形容词。作者认为这么做似乎“没有礼貌”。喂食物理应靠近,所以C项不合理;前面提到食物端上来之后,作者意识到她无法吃东西才决定帮她,并不是一见面就想提供帮助,因此D项不恰当。
11.考查名词。作者和她只是萍水相逢。文中没有交代作者的性别,因此难以确定是性别差异引起的尴尬;作者本身也是“乘客”,所以C项不正确。
12.考查形容词。她的需要比自己的不适更“重要”。A项表示“非同寻常的”,指的是与以往不同,语意不恰当。
13.考查连词。此处是让步状语从句,表示“虽然”。即尽管她感觉接受别人的照顾不舒服,但还是顺从了。
14.考查动词。此处did代指accepted,为了避免用词重复。
15.考查动词。作者为能帮助别人而内心感到无比“温暖”。下一段中的love一词也提供了暗示。cheer表示“欢呼”,语意不太恰当。
16.考查形容词。结合本句中的the five­hour trip可知强调的是“时间”。自己坐在座位上不需要花费“能量;精力”。
17.考查介词。my comfort zone指的是my seat,即作者原来的座位。上文提到作者离开了自己的座位,坐到了另外一个地方,所以用beyond,表示“在……另一边”。
18.考查副词。作者字里行间是对自己的做法表示肯定,前三项都表示否定意义,可排除。
19.考查形容词。that keep us separate是定语从句,修饰先行词fears。由于恐惧,我们无法进行沟通,被这堵无形的墙“分开”。此处与borders相呼应。
20.考查副词。当我们“跨越”恐惧的界限,伸出温暖的双手时,就可以生活在一个更广阔的世界中。happen to do sth表示“碰巧发生某事”,不符合语意;D项在文中没有信息支持。
练习册系列答案
相关习题

科目:高中英语 来源:2011-2012学年吉林省汪清六中高二下学期期中考试英语试卷(带解析) 题型:完型填空


Passing Your Love On
Waiting for the airplane to take off, I was happy to get a seat by myself. Just then, an air hostess approached me and asked, “Would you mind  36  your seat? A couple would like to sit together.” The only  37  seat was next to a girl with her arms in casts(石膏绷带), a black-and-blue face, and a sad  38 . “No way am I going to sit there,” I thought immediately. But a soft voice spoke, “She needs help.” Finally, I  39  to move to that seat.
The girl was named Kathy. She had been in a car accident and  40  was on her way for  41 .
When the snack and juice arrived, it did not take me long to  42  that Kathy would not be able to  43  herself. I considered  44  to feed her but hesitated, as it seemed too  45  to offer a service to a  46 . But then I realized that Kathy’s need was more  47  than my discomfort. I offered to help her eat, and  48  she was uncomfortable to accept, she  49  as I expected. We became closer and closer in a short period of time. By the end of the five-hour trip, my heart had  50 , and the time was really  51  spent than if I had just sat by myself.
I was very glad I had reached  52  my comfort zone to sit next to Kathy and feed her. Love  53  flows beyond human borders and removes the fears that keep us  54 . When we stretch to serve another, we grow to live  55  a larger and more rewarding world.

【小题1】
A.leaving B.changingC.takingD.giving
【小题2】
A.comfortableB.suitable C.available D.favorable
【小题3】
A.heartB.expression C.action D.thought
【小题4】
A.decided B.wanted C.regrettedD.promised
【小题5】
A.immediatelyB.lately C.recently D.now
【小题6】
A.treatment B.travel C.pleasure D.business
【小题7】
A.know B.say C.realize D.recognize
【小题8】
A.eat B.feed C.choose D.support
【小题9】
A.offering B.needing C.stopping D.trying
【小题10】
A.impolite B.far C.close D.fast
【小题11】
A.girl B.neighbor C.passenger D.stranger
【小题12】
A.unusual B.directC.importantD.shameful
【小题13】
A.when B.although C.since D.as
【小题14】
A.refused B.wondered C.cried D.did
【小题15】
A.warmed B.jumped C.broken D.cheered
【小题16】
A.good B.worse C.better D.bad
【小题17】
A.below B.through C.across D.beyond
【小题18】
A.seldom B.never C.hardly D.sometimes
【小题19】
A.separate B.independentC.silent D.upset
【小题20】
A.of B.in C.at D.for

查看答案和解析>>

科目:高中英语 来源:2011-2012学年江西高樟丰宜四校高二下学期期末联考英语试卷(带解析) 题型:阅读理解

They may be just passing your office, computer bag slung (悬挂) over one shoulder. Or they may be sitting in a car outside it, causally tapping away at a laptop. They look like innocent passers-by. In fact, they are stealing your corporate secrets.
Drive-by hacking is the trendy term given to the practice of breaking into wireless computer networks from outside the buildings that house them. A recent study in the UK, sponsored by RSA Data Security, found that two-thirds of organizations with wireless networks were risking their data in this way. Security experts patrolled (巡逻) several streets in the City of London seeking evidence of wireless networks in operation.
Of 124 that they identified, 83 were sending data without encrypting(加密)them. Such data could readily be picked up by a passer-by armed only with a portable computer, a wireless modem and a few pieces of software that can be freely downloaded from the Internet.
The data could include sensitive company documents containing valuable information. Or they could be e-mail identities and passwords that could be used by hackers to log into corporate networks as if they were legal users.
Most companies using wireless networking technology do not take even the simplest of measures to protect their data. Nearly all wireless network technology comes with some basic security features that need only to be activated (激活) in order to give a minimum level of security, for example, by encrypting the data being passed over the network.
Raymon Kruck, business development manager at Check Point Software, a security technology specialist, believes this could be partly a psychological problem. People see the solid walls of their building as safeguards and forget that wireless networks can extend up to 200 meters beyond physical walls.
Companies without any security at all on their wireless networks make it ridiculously easy for hackers to break in. Switching on the security that comes with the network technology should be automatic. Then there are other basic steps a company can take, says Mr. Kruck, such as changing the passwords on the network from the default (默认) setting.
Companies can also install firewalls, which form a barrier between the internal network and the public Internet. They should also check their computer records regularly to spot any abnormal activity, which might betray the presence of a hacker.
【小题1】According to the study sponsored by RSA Data Security, two thirds of the subjects _______.

A.had most of their company data stolen
B.depended on wireless computer networks
C.were exposed to drive-by hacking
D.were unaware of the risk of wireless hacking
【小题2】Which of the following is NOT considered in the study?
A.The number of computer hacking incidents.
B.The number of wireless computer networks identified.
C.The way in which data are sent and received.
D.The way in which data are hacked and stolen.
【小题3】Most wireless network technology has_________.
A.data encryption program
B.password security programs
C.illegal-user detection
D.firewall
【小题4】Raymond Kruck most probably agrees that wireless network security involves ________.
A.wireless signal administration
B.changes in user’s awareness
C.users’ psychological health
D.stronger physical walls
【小题5】The passage is most likely to be seen in a __________
A.book reviewB.science fictionC.textbookD.computer magazine

查看答案和解析>>

科目:高中英语 来源:2015届浙江省乐清市高一第二次月考英语试卷(解析版) 题型:单项填空

—Congratulations    passing your driving test!

—Thank you.

A.at                                   B.on

C.from                                 D.In

 

查看答案和解析>>

科目:高中英语 来源:2014届山东省济宁市高二12月质量检测英语试卷(解析版) 题型:阅读理解

They may be just passing your office, computer bag slung (悬挂) over one shoulder. Or they may be sitting in a car outside it, causally tapping away at a laptop. They look like innocent passers-by. In fact, they are stealing your corporate secrets.

Drive-by hacking is the trendy term given to the practice of breaking into wireless computer networks from outside the buildings that house them. A recent study in the UK, sponsored by RSA Data Security, found that two-thirds of organizations with wireless networks were risking their data in this way. Security experts patrolled (巡逻) several streets in the City of London seeking evidence of wireless networks in operation.

Of 124 that they identified, 83 were sending data without encrypting(加密)them. Such data could readily be picked up by a passer-by armed only with a portable computer, a wireless modem and a few pieces of software that can be freely downloaded from the Internet.

The data could include sensitive company documents containing valuable information. Or they could be e-mail identities and passwords that could be used by hackers to log into corporate networks as if they were legal users.

Most companies using wireless networking technology do not take even the simplest of measures to protect their data. Nearly all wireless network technology comes with some basic security features that need only to be activated (激活) in order to give a minimum level of security, for example, by encrypting the data being passed over the network.

Raymon Kruck, business development manager at Check Point Software, a security technology specialist, believes this could be partly a psychological problem. People see the solid walls of their building as safeguards and forget that wireless networks can extend up to 200 meters beyond physical walls.

Companies without any security at all on their wireless networks make it ridiculously easy for hackers to break in. Switching on the security that comes with the network technology should be automatic. Then there are other basic steps a company can take, says Mr. Kruck, such as changing the passwords on the network from the default (默认) setting.

Companies can also install firewalls, which form a barrier between the internal network and the public Internet. They should also check their computer records regularly to spot any abnormal activity, which might betray the presence of a hacker.

1.According to the study sponsored by RSA Data Security, two thirds of the subjects _______.

A.had most of their company data stolen

B.depended on wireless computer networks

C.were exposed to drive-by hacking

D.were unaware of the risk of wireless hacking

2.Whichof the following is NOT considered in the study?

A.The number of computer hacking incidents.

B.The number of wireless computer networks identified.

C.The way in which data are sent and received.

D.The way in which data are hacked and stolen.

3.Most wireless network technology has_________.

A.data encryption program                 B.password security programs

C.illegal-user detection                    D.firewall

4.Raymond Kruck most probably agrees that wireless network security involves ________.

A.wireless signal administration              B.changes in user’s awareness

C.users’ psychological health              D.stronger physical walls

5.The passage is most likely to be seen in a __________

A.book review       B.science fiction      C.textbook          D.computer magazine

 

查看答案和解析>>

科目:高中英语 来源:2013届江西高樟丰宜四校高二下学期期末联考英语试卷(解析版) 题型:阅读理解

They may be just passing your office, computer bag slung (悬挂) over one shoulder. Or they may be sitting in a car outside it, causally tapping away at a laptop. They look like innocent passers-by. In fact, they are stealing your corporate secrets.

Drive-by hacking is the trendy term given to the practice of breaking into wireless computer networks from outside the buildings that house them. A recent study in the UK, sponsored by RSA Data Security, found that two-thirds of organizations with wireless networks were risking their data in this way. Security experts patrolled (巡逻) several streets in the City of London seeking evidence of wireless networks in operation.

Of 124 that they identified, 83 were sending data without encrypting(加密)them. Such data could readily be picked up by a passer-by armed only with a portable computer, a wireless modem and a few pieces of software that can be freely downloaded from the Internet.

The data could include sensitive company documents containing valuable information. Or they could be e-mail identities and passwords that could be used by hackers to log into corporate networks as if they were legal users.

Most companies using wireless networking technology do not take even the simplest of measures to protect their data. Nearly all wireless network technology comes with some basic security features that need only to be activated (激活) in order to give a minimum level of security, for example, by encrypting the data being passed over the network.

Raymon Kruck, business development manager at Check Point Software, a security technology specialist, believes this could be partly a psychological problem. People see the solid walls of their building as safeguards and forget that wireless networks can extend up to 200 meters beyond physical walls.

Companies without any security at all on their wireless networks make it ridiculously easy for hackers to break in. Switching on the security that comes with the network technology should be automatic. Then there are other basic steps a company can take, says Mr. Kruck, such as changing the passwords on the network from the default (默认) setting.

Companies can also install firewalls, which form a barrier between the internal network and the public Internet. They should also check their computer records regularly to spot any abnormal activity, which might betray the presence of a hacker.

1.According to the study sponsored by RSA Data Security, two thirds of the subjects _______.

A. had most of their company data stolen   

B. depended on wireless computer networks

C. were exposed to drive-by hacking

D. were unaware of the risk of wireless hacking

2.Which of the following is NOT considered in the study?

A. The number of computer hacking incidents.

B. The number of wireless computer networks identified.

C. The way in which data are sent and received.

D. The way in which data are hacked and stolen.

3.Most wireless network technology has_________.

A. data encryption program    

B. password security programs

C. illegal-user detection    

D. firewall

4.Raymond Kruck most probably agrees that wireless network security involves ________.

A. wireless signal administration  

B. changes in user’s awareness

C. users’ psychological health     

D. stronger physical walls

5.The passage is most likely to be seen in a __________

  A. book review    B. science fiction   C. textbook   D. computer magazine

 

查看答案和解析>>

同步练习册答案