题目内容

A thief entered the bedroom of the 30th President of the United States, who met him and helped him escape punishment.
The event happened in the early morning hours in one of the first days when Calvin Coolidge came into power, late in August, 1923. He and his family were living in the same third-floor suite(套房) at the Willard Hotel in Washington that had occupied several years before. The former President’s wife was still living in the White House.
Coolidge awoke to see a stranger go through his clothes, remove a wallet and a watch chain.
Coolidge spoke, “ I wish you wouldn’t take that.”
The thief, gaining his voice, said, “ Why?”
“ I don’t mean the watch and chain, only the charm(表坠). Take it near the window and read what is impressed on its back,” the president said.
The thief read, “ Presented to Calvin Coolidge.”
“ Are you President Coolidge?” he asked.
The president answered, “ Yes, and the House of Representatives(众议院)gave me the watch charm. I’m fond of it. It would do you no good. You want money. Let’s talk this over.”
Holding up the wallet, the young man said in a low voice, “ I’ll take this and leave everything else.”
Coolidge, knowing there was 80 dollars in it, persuaded the young man to sit down and talk. He told the President he and his college roommate had overspent during their holiday and did not have enough money to pay their hotel bill.
Coolidge added up the roommate and two rail tickets back to the college. Then he counted out 32 dollars and said it was a loan(借款).
He then told the young man, “ There is a guard in the corridor.” The young man nodded and left through the same window as he had entered.


【小题1】D
【小题1】B
【小题1】C
【小题1】D
【小题1】A

解析

练习册系列答案
相关题目

“Get your hands off me, I have been stolen,” the laptop, a portable computer, shouted. That is a new solution to laptop computer theft: a program that lets owners give their property a voice when it has been taken.
The program allows users to display alerts on the missing computer’s screen and even to set a spoken message. Tracking software for stolen laptops has been on the market for some time, but this is thought to be the first that allows owners to give the thief a piece of their mind.
Owners must report their laptop missing by visiting a website, which sends a message to the model: a red and yellow “lost or stolen” sign appears on its screen when it is started. Under the latest version(版本)of the software, users can also send a spoken message.
The message can be set to reappear every 30 seconds, no matter how many times the thief closes it.” One customer sent a message saying,’ You are being tracked. I am right at your door’,” said Carrie Hafeman, chief executive of the company which produces the program, Retriever.
In the latest version, people can add a spoken message. For example, the laptop’s speakers will say: “Help, this laptop is reported lost or stolen. If you are not my owner, report me now.”
The Retriever software package, which costs $29.95 but has a free trial period, has the functions of many security software programs .Owners can remotely switch to an alternative password if they fear that the thief has also got hold of the access details.
If a thief accesses the internet with the stolen laptop, Retriever will collect information on the internet service provider in use, so that the police can be alerted to its location.
Thousands of laptops are stolen every year form homes and offices, but with the use of laptops increasing, the number stolen while their owners are out and about has been rising sharply.
Other security software allows users to erase data remotely or lock down the computer.
【小题1】The expression “to give the thief a piece of their mind “can be understood as “_______”

A.to give the thief an alert mind
B.to express the owners’ anger to the thief
C.to remind the thief of this conscience
D.to make the thief give up his mind
【小题2】Different from other security software, Retriever can_______.
A.record the stealing processB.help recognize the lost laptop
C.lock down the computer remotelyD.send a spoken message
【小题3】 One function of the program is that it allows the owner to _______ at a distance.
A.change some access details for switching on the laptop
B.turn on the laptop by using the original password
C.operate the laptop by means of and alternative password
D.erase the information kept in the stolen laptop
【小题4】Which of the following can best summarize the main idea of the passage?
A.With no Retriever, thousands of laptops are stolen every year.
B.A new soft ware provides a means to reduce laptop theft.
C.Retriever has helped to find thieves and lost computers.
D.A new program offers a communication platform with the thief.

Two years after the First World War (1914-1918), a small group of soldiers left the army and returned to their hometown in France. Most of them lived well, but one of them was poor. His name was Clinton. Once a year they had supper in Barton’s house. Barton was very rich.

One evening Barton showed his friends a large gold coin at the supper table. The coin was passed around and praised by everyone. At the same time they were talking and talking. They soon forgot about the coin. After supper, Barton asked for his coin, but nobody could tell where it was. It was lost. One man said that everyone must be searched. One by one they turned their pockets inside out. Only Clinton refused, however. “I didn’t steal the coin, and I will not be searched,” he said. After that, people turned their heads away from Clinton when they met him. He grew poorer. Soon his wife died.

A few years later, Barton had his house repaired. The lost coin was found under the floor. Barton felt sorry and went to Clinton to apologize. “But,” he asked, “you knew the coin was not in your pocket. Why did you refuse to be searched?” “Because I was a thief,” Clinton answered. “My pockets were full of food at that time. I had taken some food from the table to carry to my hungry wife and children.”

1.The story took place ________.

A. in 1920       B. after 1945    C. in 1950    D. 1916

2.The coin was passed and praised because ________.

A. Clinton was rich                            B. the supper was good

C. it was a large gold coin                            D. they were happy

3.Everyone was to be searched because _________.

A. they were thieves                             B. the gold coin was lost

C. Clinton stole the gold coin                      D. they stole the gold coin

4.Clinton refused to be searched because _________.

A. he was afraid to be found that there was some food in his pockets

B. he didn’t steal the coin 

C. he was poor enough

D. the gold coin was in his pocket

5.“After that, people turned their heads away from Clinton when they met him.” From the sentence we know that _____.

A.  people thought of him as a beggar 

B.  people took no notice of him

C.  people look down upon him   

D. Clinton refused to see his friends

 

 

“Get your hands off me, I have been stolen,” the laptop, a portable computer, shouted. That is a new solution to laptop computer theft: a program that lets owners give their property a voice when it has been taken.

The program allows users to display alerts on the missing computer’s screen and even to set a spoken message. Tracking software for stolen laptops has been on the market for some time, but this is thought to be the first that allows owners to give the thief a piece of their mind.

Owners must report their laptop missing by visiting a website, which sends a message to the model: a red and yellow “lost or stolen” sign appears on its screen when it is started. Under the latest version(版本)of the software, users can also send a spoken message.

The message can be set to reappear every 30 seconds, no matter how many times the thief closes it.” One customer sent a message saying,’ You are being tracked. I am right at your door’,” said Carrie Hafeman, chief executive of the company which produces the program, Retriever.

In the latest version, people can add a spoken message. For example, the laptop’s speakers will say: “Help, this laptop is reported lost or stolen. If you are not my owner, report me now.”

The Retriever software package, which costs $29.95 but has a free trial period, has the functions of many security software programs .Owners can remotely switch to an alternative password if they fear that the thief has also got hold of the access details.

If a thief accesses the internet with the stolen laptop, Retriever will collect information on the internet service provider in use, so that the police can be alerted to its location.

Thousands of laptops are stolen every year form homes and offices, but with the use of laptops increasing, the number stolen while their owners are out and about has been rising sharply.

Other security software allows users to erase data remotely or lock down the computer.

1.The expression “to give the thief a piece of their mind “can be understood as “_______”

A. to give the thief an alert mind

B. to express the owners’ anger to the thief

C. to remind the thief of this conscience

D. to make the thief give up his mind

2.Different from other security software, Retriever can         .

A. record the stealing process          B. help recognize the lost laptop

C. lock down the computer remotely     D. send a spoken message

3.One function of the program is that it allows the owner to           at a distance.

A. change some access details for switching on the laptop

B. turn on the laptop by using the original password

C. operate the laptop by means of and alternative password

D. erase the information kept in the stolen laptop

4.Which of the following can best summarize the main idea of the passage?

A. With no Retriever, thousands of laptops are stolen every year.

B. A new soft ware provides a means to reduce laptop theft.

C. Retriever has helped to find thieves and lost computers.

D. A new program offers a communication platform with the thief.

 

违法和不良信息举报电话:027-86699610 举报邮箱:58377363@163.com

精英家教网