题目列表(包括答案和解析)
WASHINGTON - It is announced Friday that White House visitor records will be opened up on a regular basis for the first time in modern history, providing the public an unusually detailed look at who gets the opportunity to help shape American policy at the highest levels.
"Americans have a right to know whose voices are being heard in the policymaking process," the president said in a written statement issued by the White House while he vacationed with his family at Camp David.
By the end of the year, the White House will begin posting online every month the names of the people who visited in the last 90 to 120 days.Each person's full name will be listed, along with the date and time they entered and left and the name of the person they visited.About 70, 000 to 100,000 people visit the White House each month, and the records will include tourists as well as people conducting business.
The White House pointed out several exceptions to the policy: "purely personal guests" of the Obama family; those cases in which the disclosure (透露) of visitors' names "would threaten national safety interests" ; and those who come for "particularly sensitive meetings," like candidates for a Supreme Court nomination (提名).Officials said only a "small number" will fit in the latter category, and their names would eventually be disclosed after they are no longer secret, like after a nomination is publicly announced.Moreover, they said, the number of undisclosed visitors will be told, to make clear how few they are.
1.Why will the White House visitor records be open to the public?
A.To attract more visitors to the White House.
B.To allow people to know more about the life of the Obama family.
C.To let the public know who are influencing the policies.
D.To ask the public help correct the policies made by the government.
2.From the passage we can learn that ____.
A.all the visitors' names will be posted online soon after their visits
B.not all visitors are allowed to visit the White House
C.some visitors' names can be found online until they're not secret
3.According to the passage, whose name might be kept secret for some time?
A.A tourist. B.A businessman.
C.A foreign student. D.A foreign minister.
4.What's the main idea of the passage?
A.The White House will open the records of the visitors to the public
B.In America more and more people are becoming policy makers.
C.The Americans have a right to know who are making policies.
D.President Obama has announced a new policy while on holiday.
|
完形填空(共20小题,每小题1分,满分20分)
阅读下面短文,掌握其大意,然后从各题所给的A、B、C、D四个选项中,选出最佳选项。
I moved to a new neighborhood two months ago. In the house with a large 1 across the road lived a taxi driver, a single parent with two school-aged children. At the end of the day, he would 2 his taxi on the road. I 3 why he did not park it in the garage.
Then one day I learnt that he had another car in his garage. In the afternoon he would come home 4 work, leave his taxi and go out for his 5 affairs in his other car, not in his taxi. I felt it was 6 .
I was curious to see his personal car but did not make it until I 7 to be outside one evening two weeks 8 , when the garage door was 9 and he drove out in his “own” car: a Rolls-Royce(劳斯莱斯)! It shook me completely 10 I realized what that meant. You see, he was a taxi driver. But 11 inside, he saw himself as something else: a Rolls-Royce owner and a(n) 12 . He drove others in his taxi but himself and his children in his Rolls-Royce. The world looked at his taxi and 13 him a taxi driver. But for him, a taxi was just something he drove for a living. Rolls-Royce was something he drove for a (n)14.
We go to bed every night and 15 every morning as parents or children, not as bankers, CEOs or professors. We go for a 16 as close friends or go for a vacation as a 17 . We love life as it is. Yet often, we base our entire happiness and success on how high we 18 the social ladder—how much bigger and better a 19 we have. And we ignore our Rolls-Royce, by keeping it dusty in our garage. We should focus more on 20 we are than what we do!
1. A.window B.garage C.door D.yard
2. A.park B.stop C.check D.repair
3. A.knew B.understood C.asked D.wondered
4. A.for B.out of C.without D.from
5. A.business B.national C.personal D.public
6. A.wasteful B.useful C.wonderful D.plentiful
7. A.appeared B.intended C.expected D.happened
8. A.later B.more C.ago D.before
9. A.broken B.fine C.shut D.open
10. A.once B.before C.when D.until
11. A.far B.deep C.long D.little
12. A.driver B.engineer C.father D.son
13. A.called B.made C.elected D.turned
14. A.experience B.earning C.life D.position
15. A.stay up B.wake up C.stay home D.go home
16. A.competition B.performance C.debate D.party
17. A.family B.company C.team D.whole
18. A.build B.climb C.stand D.lay
19. A.garden B.garage C.car D.taxi
20. A.who B.what C.which D.where
People tend to think of computers as isolated machines, working away all by themselves. Some personal computers do without an outside link, like someone's secret cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community local, national and even global network joined by telephone connections.
The computer network is a creation of the electric age, but it is based on old-fashioned trust. It cannot work without trust. A rogue (流氓) loose in a computer system called hacker is worse than a thief entering your house. He could go through anyone's electronic mail or add to, change or delete anything in the information stored in the computer's memory. He could even take control of the entire system by inserting his own instructions in the software that runs it. He could shut the computer down whenever he wished, and no one could stop him. Then he could program the computer to erase any sign of his ever having been there.
Hacking, our electronic-age term for computer break-in is more and more in the news, intelligent kids vandalizing(破坏)university records, even pranking (恶作剧) about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from some files; A student sends out a "virus", a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Destroging a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to strengthen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication, the main reason for using computers in the first place.
1. People usually regard computers as _________.
A. part of a network
B. means of exchanging intelligence
C. personal machines disconnected from outside
D. a small cabin at the end of a street .
2. The writer mentions “ a thief ”in the second paragraph most probably to _________.
A. show that a hacker is more dangerous than a thief
B. tell people that thieves like to steal computers nowadays
C. demand that a computer network should be set up against thieves
D. look into the case where hackers and thieves are the same people
3. According to the passage , a hacker may do all the damages below EXCEPT _________.
A. attacking people’s e-mails . B. destroying computer systems .
C. creating many electronic-age terms .
D. entering into computer systems without being discovered
4. By saying “ Now exists the possibility of terrorism by computer ”(the underlined ) the writer means that________.
A. some employees may erase information from some files
B. students who send out a “ virus ”may do disastrous damages to thousands of computers
C. some people may spread fear in public by destroying computer systems
D. some terrorists are trying to contact each other using electronic mails
People tend to think of computers as isolated machines, working away all by themselves. Some personal computers do without an outside link, like someone's secret cabin in the woods. But just as most of homes are tied to a community by streets, bus routes and electric lines, computers that exchange intelligence are part of a community local, national and even global network joined by telephone connections.
The computer network is a creation of the electric age, but it is based on old-fashioned trust. It cannot work without trust. A rogue (流氓) loose in a computer system called hacker is worse than a thief entering your house. He could go through anyone's electronic mail or add to, change or get rid of anything in the information stored in the computer's memory. He could even take control of the entire system by inserting his own instructions in the software that runs it. He could shut the computer down whenever he wished, and no one could stop him. Then he could program the computer to erase any sign of his ever having been there.
Hacking, our electronic-age term for computer break-in is more and more in the news, intelligent kids vandalizing(破坏)university records, even pranking (恶作剧) about in supposedly safeguarded systems. To those who understand how computer networks are increasingly regulating life in the late 20th century, these are not laughing matters. A potential for disaster is building: A dissatisfied former insurance-company employee wipes out information from some files; A student sends out a "virus", a secret and destructive command, over a national network. The virus copies itself at lightning speed, jamming the entire network thousands of academic, commercial and government computer systems. Such disastrous cases have already occurred. Now exists the possibility of terrorism by computer. Destroying a system responsible for air-traffic control at a busy airport, or knocking out the telephones of a major city, is a relatively easy way to spread panic. Yet neither business nor government has done enough to strengthen its defenses against attack. For one thing, such defenses are expensive; for another, they may interrupt communication, the main reason for using computers in the first place.
1. People usually regard computers as __________.
A. part of a network B. means of exchanging intelligence
C. personal machines disconnected from outside
D. a small cabin at the end of a street .
2. The writer mentions “ a thief ”in the second paragraph most probably to .
A. show that a hacker is more dangerous than a thief
B. tell people that thieves like to steal computers nowadays
C. demand that a computer network should be set up against thieves
D. look into the case where hackers and thieves are the same people
3. According to the passage , a hacker may do all the damages below EXCEPT .
A. attacking people’s e-mails . B. destroying computer systems .
C. creating many electronic-age terms .
D. entering into computer systems without being discovered
4. By saying “ Now exists the possibility of terrorism by computer ”(the underlined ) the writer means that _______.
A. some employees may erase information from some files
B. students who send out a “ virus ”may do disastrous damages to thousands of computers
C. some people may spread fear in public by destroying computer systems
D. some terrorists are trying to contact each other using electronic mails
湖北省互联网违法和不良信息举报平台 | 网上有害信息举报专区 | 电信诈骗举报专区 | 涉历史虚无主义有害信息举报专区 | 涉企侵权举报专区
违法和不良信息举报电话:027-86699610 举报邮箱:58377363@163.com