题目内容

15.The earthquake destroyed everything and left the whole area _______.(  )
A.in fearB.in silenceC.in ruinsD.in peace

分析 地震毁了一切,使得整个地区成为废墟.

解答 答案是C.本题主要考查介词短语辨析.in fear在恐惧中;in silence沉默;in ruins成为废墟;in peace宁静地;由上文的"destroyed everything毁了一切"推断这个地区成为"废墟",所以答案选择C.

点评 本题考查介词短语的语义辨析,考生在平时的学习中应注意积累相应的短语和词汇,并牢记其意思.在做题时,将短语的意思和题干相结合,从语法、句子结构尤其是句意上去判断,句意通顺,符合逻辑,即正确答案.

练习册系列答案
相关题目
7.When you're surfing the Internet on your laptop from your dorm or home,do you know your personal details are being gathered secretly?And would you be surprised to know the information may be sold cheaply to advertisers and marketers?
According to an investigation by The Wall Street Journal,all it takes is a tiny file in a computer-a single code consisting of a long series of numbers and letter-to record the computer user's age,gender,location,favorite movies and hobbies.
The newspaper reports that Lotame Solutions Inc.,a New York company,uses sophisticated software called a'"beacon"to capture what people are typing on a website.
Lotame packages the data into profiles (个人资料) about individuals,only without their names,and sells the profiles to companies seeking customers.Such data may be sold for a few dollars.
The Wall Street Journal survey discovered that spying on Internet users is one of the fastest-growing businesses on the Internet.
The"cookie",a tiny text file put on your PC by websites or marketing firms,which might be used to remember your preferences for one site or to track you across many sites,is already old news.There are new and more complex tools such as"beacons"which scan in real time what people are doing on a webpage.'These beacons instantly assess the Internet user's location,income,shopping interests and even medical conditions.
Millions of Internet users around the world also face great threats.Their private,sensitive,personal and business information is being gathered and sold without their knowledge.
Companies insist that the information they gather is anonymous (匿名的) and the data is used harmlessly.But the technology has grown so powerful that even some of the biggest websites in the US don't know that they were.installing (安装) intrusive (侵入的) files on visitors'computers.These include MSN.com and Yahoo.com.
Next time you visit a webpage and find an ad banner advertising something you've been planning to buy,don't be amazed that your computer can read your mind.
57.The purpose of the passage is toA.
    A.show how your private information is let out when surfing the Internet
    B.introduce a very tiny file in your computer-a single code
    C.tells you about the ways of protecting your privacy on the Internet
    D.introduce the sophisticated software called a"beacon"
58.Why do people want computer users'personal information via the Internet?B
    A.Because they haven't realized the function of the tiny file.
    B.Because they want to use the information to make some money.
    C.Because the cookies in computers encourage them to do so.
    D.Because they know it's harmless if they get anonymous information,
59.It can be inferred from the passage thatB.
    A.Internet users around the world will not face threats,for the data is used harmlessly
    B.when you surf the Internet,your personal details may be let out without knowledge
    C.your computer is so smart that sometimes it can really read your mind
    D.MSN.com uses software to capture what people are typing on a website
60.According to the passage,a"beacon"C.
    A.is a tiny text file put on your PC by websites
    B.is not more complex than the"cookie"
    C.can assess Internet users'location,income and other personal data
    D.is the software that can package the data into personal profiles.

违法和不良信息举报电话:027-86699610 举报邮箱:58377363@163.com

精英家教网