网址:http://m.1010jiajiao.com/timu3_id_3069836[举报]
A lesson in caring
It was a cold evening. My daughter and I were walking up Broadway. I didn’t notice a guy sitting inside a cardboard box. But Nora 36 . She wasn’t even four, but she 37 at my coat and said, “That man’s cold. Daddy, can we take him home?”
I don’t remember my 38 . But I do remember a sudden 39 feeling inside me. I had always been delighted at how much my daughter noticed in her 40 , whether it was 41 flying or children playing. But now she was noticing 42 and beggary.
A few days later, I saw an article in the newspaper about volunteers who picked up a food package from a nearby school on a Sunday morning and 43 it to an elderly person. It was quick and easy. I signed us up. Nora was 44 about it. She could understand the importance of food, so she could easily see how 45 our job was. When Sunday came, she was ready, but I had to 46 myself to leave the house to fetch the food package. On my way to the school, I fought an urge (强烈愿望) to turn 47 . The Sunday paper and coffee were waiting for me at home. Why do this? 48 , we phoned the elderly person we’d been appointed. She 49 us right over.
The building was in a bad state. Facing us was a silver-haired woman in an old dress. She took the package and asked us to come in. Nora ran inside. I unwillingly followed. 50 inside, I saw that the department belonged to someone poor. Our hostess showed us some photos. Nora played and when it came time to say goodbye, we three hugged. I walked home 51 .
Professionals call such a(n) 52 “a volunteer opportunity”. They are opportunities and I’ve come to see. Where else but as volunteers do you have the opportunity to do something 53 that’s good for others as well as for yourself? Nora and I regularly serve meals to needy people and 54 clothes for the homeless. Yet, as I’ve 55 her grow over these past four years, I still wonder—which of us has benefited more?
A. did B. was C. has D. had
A. pulled B. replaced C. waved D. aimed
A. debate B. reply C. explanation D. expression
A. general B. funny C. heavy D. magical
A. web B. dream C. castle D. world
A. insects B. animals C. plants D. birds
A. coldness B. illness C. suffering D. appearance
A. sent B. returned C. devoted D. posted
A. concerned B. sorry C. worried D. excited
A. creative B. valuable C. shocking D. simple
A. warn B. stop C. allow D. push
A. back B. away C. up D. out
A. Therefore B. But C. Anyhow D. Also
A. requested B. promised C. invited D. helped
A. Although B. Once C. Because D. Though
A. in tears B. in surprise C. in reality D.in disappointment
A. stay B. visit C. reception D. challenge
A. fair B. famous C. difficult D. enjoyable
A. collect B. make C. order D. design
A. let B. made C. watched D. affected
查看习题详情和答案>>A lesson in caring
It was a cold evening. My daughter and I were walking up Broadway. I didn’t notice a guy sitting inside a cardboard box. But Nora 36 . She wasn’t even four, but she 37 at my coat and said, “That man’s cold. Daddy, can we take him home?”
I don’t remember my 38 . But I do remember a sudden 39 feeling inside me. I had always been delighted at how much my daughter noticed in her 40 , whether it was 41 flying or children playing. But now she was noticing 42 and beggary.
A few days later, I saw an article in the newspaper about volunteers who picked up a food package from a nearby school on a Sunday morning and 43 it to an elderly person. It was quick and easy. I signed us up. Nora was 44 about it. She could understand the importance of food, so she could easily see how 45 our job was. When Sunday came, she was ready, but I had to 46 myself to leave the house to fetch the food package. On my way to the school, I fought an urge (强烈愿望) to turn 47 . The Sunday paper and coffee were waiting for me at home. Why do this? 48 , we phoned the elderly person we’d been appointed. She 49 us right over.
The building was in a bad state. Facing us was a silver-haired woman in an old dress. She took the package and asked us to come in. Nora ran inside. I unwillingly followed. 50 inside, I saw that the department belonged to someone poor. Our hostess showed us some photos. Nora played and when it came time to say goodbye, we three hugged. I walked home 51 .
Professionals call such a(n) 52 “a volunteer opportunity”. They are opportunities and I’ve come to see. Where else but as volunteers do you have the opportunity to do something 53 that’s good for others as well as for yourself? Nora and I regularly serve meals to needy people and 54 clothes for the homeless. Yet, as I’ve 55 her grow over these past four years, I still wonder—which of us has benefited more?
1.A. did B. was C. has D. had
2.A. pulled B. replaced C. waved D. aimed
3.A. debate B. reply C. explanation D. expression
4.A. general B. funny C. heavy D. magical
5.A. web B. dream C. castle D. world
6.A. insects B. animals C. plants D. birds
7.A. coldness B. illness C. suffering D. appearance
8.A. sent B. returned C. devoted D. posted
9.A. concerned B. sorry C. worried D. excited
10.A. creative B. valuable C. shocking D. simple
11.A. warn B. stop C. allow D. push
12.A. back B. away C. up D. out
13.A. Therefore B. But C. Anyhow D. Also
14.A. requested B. promised C. invited D. helped
15.A. Although B. Once C. Because D. Though
16.A. in tears B. in surprise C. in reality D.in disappointment
17.A. stay B. visit C. reception D. challenge
18.A. fair B. famous C. difficult D. enjoyable
19.A. collect B. make C. order D. design
20.A. let B. made C. watched D. affected
查看习题详情和答案>>
Despite all the reports of Internet security attacks over the years, including the recent ones on Google’s e-mail service, many people have reacted to the break-ins with a shrug(耸肩).
Mr. Shulman and his company examined a list of 32 million passwords that an unknown hacker stole last month from RockYou, a company that makes software for users of social networking sites like Facebook and MySpace. The list was briefly posted on the Web, and hackers and security researchers downloaded it.
The list provided an unusually detailed window into computer users’ password habits. Typically, only government agencies like the F.B.I. or the National Security Agency have had access to such a large password list.
Some Web sites try to keep back the attackers by freezing an account for a certain period of time if too many incorrect passwords are typed. But experts say that the hackers simply learn to trick the system, by making guesses at an acceptable rate, for instance.
To improve security, some Web sites are forcing users to mix letters, numbers and even symbols in their passwords. Others, like Twitter, prevent people from picking common passwords.
Still, researchers say, social networking and entertainment Web sites often try to make life simpler for their users and are reluctant to put too many controls in place.
Even commercial sites like eBay must weigh the consequences of freezing accounts, since a hacker could, say, try to win an auction(拍卖) by freezing the accounts of other potential buyers.
But owing to the reality of our overcrowded brains, the experts suggest that everyone choose at least two different passwords — a complex one for Web sites where security is vital, such as banks and e-mail, and a simpler one for less risky places, such as social networking and entertainment sites.
Mr. Moss relies on passwords at least 12 characters long, figuring that those make him a more difficult target than the millions of people who choose five- and six-character passwords.
“It’s like the joke where the hikers run into a bear in the forest, and the hiker that survives is the one who outruns his companions,” Mr. Moss said. “You just want to run that bit faster.
59. The underlined sentence “Many people have reacted to the break-ins with a shrug” shows that many people ______.
don’t take seriously the hacker’s break-ins
are worried and frightened at the hacker’s break-ins
don’t know what to do with the hacker’s attacks
are eager to get helps from the experts
60. According to the passage, which of the following web sites needs a more complex password?
A social web site.
An entertainment web site.
A commercial web site.
A government web site.
61. The Internet users are advised to______ in order to keep back the hackers.
mix letters, numbers and symbols as well
choose passwords with at least 12 characters
choose passwords with 5 or 6 characters
choose at least two different passwords
62. Which would be the best title for the passage?
Password, Simple or Complex?
Popular Passwords, High Risk!
Clever Hackers, Stupid Netizens.
Hacker, the Enemy of Internet Security.
查看习题详情和答案>>
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Despite all the reports of Internet security attacks over the years, including the recent ones on Google’s e-mail service, many people have reacted to the break-ins with a shrug(耸肩).
Mr. Shulman and his company examined a list of 32 million passwords that an unknown hacker stole last month from RockYou, a company that makes software for users of social networking sites like Facebook and MySpace. The list was briefly posted on the Web, and hackers and security researchers downloaded it.
The list provided an unusually detailed window into computer users’ password habits. Typically, only government agencies like the F.B.I. or the National Security Agency have had access to such a large password list.
Some Web sites try to keep back the attackers by freezing an account for a certain period of time if too many incorrect passwords are typed. But experts say that the hackers simply learn to trick the system, by making guesses at an acceptable rate, for instance.
To improve security, some Web sites are forcing users to mix letters, numbers and even symbols in their passwords. Others, like Twitter, prevent people from picking common passwords.
Still, researchers say, social networking and entertainment Web sites often try to make life simpler for their users and are reluctant to put too many controls in place.
Even commercial sites like eBay must weigh the consequences of freezing accounts, since a hacker could, say, try to win an auction(拍卖) by freezing the accounts of other potential buyers.
But owing to the reality of our overcrowded brains, the experts suggest that everyone choose at least two different passwords — a complex one for Web sites where security is vital, such as banks and e-mail, and a simpler one for less risky places, such as social networking and entertainment sites.
Mr. Moss relies on passwords at least 12 characters long, figuring that those make him a more difficult target than the millions of people who choose five- and six-character passwords.
“It’s like the joke where the hikers run into a bear in the forest, and the hiker that survives is the one who outruns his companions,” Mr. Moss said. “You just want to run that bit faster.
59. The underlined sentence “Many people have reacted to the break-ins with a shrug” shows that many people ______.
don’t take seriously the hacker’s break-ins
are worried and frightened at the hacker’s break-ins
don’t know what to do with the hacker’s attacks
are eager to get helps from the experts
60. According to the passage, which of the following web sites needs a more complex password?
A social web site.
An entertainment web site.
A commercial web site.
A government web site.
61. The Internet users are advised to______ in order to keep back the hackers.
mix letters, numbers and symbols as well
choose passwords with at least 12 characters
choose passwords with 5 or 6 characters
choose at least two different passwords
62. Which would be the best title for the passage?
Password, Simple or Complex?
Popular Passwords, High Risk!
Clever Hackers, Stupid Netizens.
Hacker, the Enemy of Internet Security.