摘要: Companies should choose a suitable brand name that both salesmen and consumers will positive images. A. appeal to B. be appealed to C. associate with D. be associated with

网址:http://m.1010jiajiao.com/timu3_id_3158290[举报]

If you've ever seen a James Bond movie,you'll know that the hero gets around in a smart Aston Martin car. Even if you know full well that you could never afford such an expensive vehicle, you don't forget the name, or the car.
  Why? You have been affected by product placement.
  Companies pay a film to place their products in the movie. Product placement took off in the West in the 1980s and is now catching on in China. Two Hunan Satellite TV dramas are recent examples:Ugly Wudi and Let's Go Watch the Meteor Shower (《一起去看流星雨》).
  Shampoo, mobile phones, cars and fitness centers–anything can be product-placed. Advertisers value the mass appeal of the movies, knowing that a successful film can showcase their goods to hundreds of thousands of viewers. But when product placement takes over, artistic considerations can take a back seat.
  Cai Zhiyong has been product-placing for years. The Beijing-based advertiser admits there is a conflict between art and business. He explains the way one ad works. In If You are the One (《非诚勿扰》), the actress Shu Qi plays a flight attendant. The movie contains product placement for airline companies.
  Cash-strapped filmmakers often have to give less consideration to the quality of their work because they need money from advertisers. In the original story for Meteor Shower, the heroine's mother owned an ice cream shop. But no ice cream company wanted to sponsor (赞助) the film. For this reason, the story was changed. In the film the man drinks 20 cups of milk tea instead of eating ice cream.
  So you may see the power of business over the movies, since the script (剧本) was perhaps written so that a product could be placed-whether it was ice cream or milk tea.
【小题1】James Bond movies are mentioned in the first paragraph to show_________.

A.how popular James Bond is B.how great the Aston Martin car is
C.how to make a movie more artistic D.how effectively product placement works
【小题2】Product placement can have a bad effect on the_________ of a movie.
A.atmosphere B.mass appeal C.box-office success D.artistic value
【小题3】What does the underlined word "cash-strapped" in Paragraph 6 probably mean?
A.Short of money. B.Wasting a lot of money.
C.having enough money. D.Trying to save money.
【小题4】We can learn from the example of Meteor Shower that__________.
A.business has a big say in the movie
B.the original story was not suitable for a movie
C.filmmakers are only concerned about making money
D.milk tea is more popular than ice cream

查看习题详情和答案>>

If you've ever seen a James Bond movie,you'll know that the hero gets around in a smart Aston Martin car. Even if you know full well that you could never afford such an expensive vehicle, you don't forget the name, or the car.

  Why? You have been affected by product placement.

  Companies pay a film to place their products in the movie. Product placement took off in the West in the 1980s and is now catching on in China. Two Hunan Satellite TV dramas are recent examples:Ugly Wudi and Let's Go Watch the Meteor Shower (《一起去看流星雨》).

  Shampoo, mobile phones, cars and fitness centers – anything can be product-placed. Advertisers value the mass appeal of the movies, knowing that a successful film can showcase their goods to hundreds of thousands of viewers. But when product placement takes over, artistic considerations can take a back seat.

  Cai Zhiyong has been product-placing for years. The Beijing-based advertiser admits there is a conflict between art and business. He explains the way one ad works. In If You are the One (《非诚勿扰》), the actress Shu Qi plays a flight attendant. The movie contains product placement for airline companies.

  Cash-strapped filmmakers often have to give less consideration to the quality of their work because they need money from advertisers. In the original story for Meteor Shower, the heroine's mother owned an ice cream shop. But no ice cream company wanted to sponsor (赞助) the film. For this reason, the story was changed. In the film the man drinks 20 cups of milk tea instead of eating ice cream.

  So you may see the power of business over the movies, since the script (剧本) was perhaps written so that a product could be placed-whether it was ice cream or milk tea.

1. James Bond movies are mentioned in the first paragraph to show_________.

  A. how popular James Bond is            B. how great the Aston Martin car is

  C. how to make a movie more artistic      D. how effectively product placement works

2.Product placement can have a bad effect on the_________ of a movie.

  A. atmosphere      B. mass appeal       C. box-office success      D. artistic value

3.What does the underlined word "cash-strapped" in Paragraph 6 probably mean?

  A. Short of money.                B. Wasting a lot of money.

  C. having enough money.           D. Trying to save money.

4.We can learn from the example of Meteor Shower that__________.

  A. business has a big say in the movie

  B. the original story was not suitable for a movie

  C. filmmakers are only concerned about making money

  D. milk tea is more popular than ice cream

 

查看习题详情和答案>>

阅读理解

  They may be just passing your office, computer bag slung(悬挂)over one shoulder.Or they may be sitting in a car outside it, causally tapping away at a laptop.They look like innocent passers-by.In fact, they are stealing your corporate secrets.

  Drive-by hacking is the trendy term given to the practice of breaking into wireless computer networks from outside the buildings that house them.A recent study in the UK, sponsored by RSA Data Security, found that two-thirds of organizations with wireless networks were risking their data in this way.Security experts patrolled(巡逻)several streets in the City of London seeking evidence of wireless networks in operation.

  Of 124 that they identified, 83 were sending data without encrypting(加密)them.Such data could readily be picked up by a passer-by armed only with a portable computer, a wireless modem and a few pieces of software that can be freely downloaded from the Internet.

  The data could include sensitive company documents containing valuable information.Or they could be e-mail identities and passwords that could be used by hackers to log into corporate networks as if they were legal users.

  Most companies using wireless networking technology do not take even the simplest of measures to protect their data.Nearly all wireless network technology comes with some basic security features that need only to be activated(激活)in order to give a minimum level of security, for example, by encrypting the data being passed over the network.

  Raymon Kruck, business development manager at Check Point Software, a security technology specialist, believes this could be partly a psychological problem.People see the solid walls of their building as safeguards and forget that wireless networks can extend up to 200 meters beyond physical walls.

  Companies without any security at all on their wireless networks make it ridiculously easy for hackers to break in.Switching on the security that comes with the network technology should be automatic.Then there are other basic steps a company can take, says Mr.Kruck, such as changing the passwords on the network from the default(默认)setting.

  Companies can also install firewalls, which form a barrier between the internal network and the public Internet.They should also check their computer records regularly to spot any abnormal activity, which might betray the presence of a hacker.

(1)

According to the study sponsored by RSA Data Security, two thirds of the subjects ________.

[  ]

A.

had most of their company data stolen

B.

depended on wireless computer networks

C.

were exposed to drive-by hacking

D.

were unaware of the risk of wireless hacking

(2)

Whichof the following is NOT considered in the study?

[  ]

A.

The number of computer hacking incidents.

B.

The number of wireless computer networks identified.

C.

The way in which data are sent and received.

D.

The way in which data are hacked and stolen.

(3)

Most wireless network technology has ________.

[  ]

A.

data encryption program

B.

password security programs

C.

illegal-user detection

D.

firewall

(4)

Raymond Kruck most probably agrees that wireless network security involves ________.

[  ]

A.

wireless signal administration

B.

changes in user's awareness

C.

users' psychological health

D.

stronger physical walls

(5)

The passage is most likely to be seen in a ________

[  ]

A.

book review

B.

science fiction

C.

textbook

D.

computer magazine

查看习题详情和答案>>

阅读理解

阅读下列短文,然后从各题所给的A、B、C、D四个选项中,选出最佳选项。

  Companies often give work to an outside business that can do the job for less money than their own employees could.This is called outsourcing.Outsourcing has become a political issue in the campaign for the American presidential election in November.

  Many companies in the United States have been moving jobs to countries where costs are much lower.Factory production jobs have moved away for years.But the jobs now also involve computer programming and other skills based on knowledge.

  Labor groups and workers are angry.They point to reports that say the United States has lost two-and-a-half million jobs since 2001.Most were jobs in manufacturing.Some states have lost more jobs than others.But no one seems to know for sure how many jobs left the country.

  There was a recession.Jobs were cut.Yet, so far, the economic recovery has produced fewer jobs than expected.So outsourcing has created an emotional debate.

  Lou Dobbs has a business news program on CNN television.He keeps a list of companies that have sent jobs to foreign countries.Almost every night, Mister Dobbs talks about what he calls the "exporting of America."

  Gregory Mankiw [man-CUE] is the chairman of the Council of Economic Advisers to President Bush.Recently Mister Mankiw said outsourcing is probably good for the economy in the long term.He said it makes sense to import goods or services produced at lower cost.He called it "just a new way of doing international trade."

  Most economists would probably agree.But Democrats and Republicans criticized Mister Mankiw.He later apologized for having appeared to praise the loss of United States jobs.

  Criticism of outsourcing has led some people to condemn free trade.They argue that if jobs are lost to foreign countries, then America should seek protective measures.

  The director general of the World Trade Organization does not see it that way.Supachai Panitchpakdi says one-third of all economic growth in the United States since 1990 resulted from international trade.

  Mister Supachai says training and education can create new opportunities for workers.He says exports have helped create five-million new jobs in America in the last ten years.He says those jobs pay ten-percent above the average.

(1)

Why does America move their jobs to some other countries?

[  ]

A.

American workers can't do the job.

B.

American employers want to save the cost.

C.

Workers in other countries are more experienced

D.

America wants to help other countries.

(2)

What is the subject talked about in the passage?

[  ]

A.

American Outsourcing.

B.

The Coming American Election.

C.

American International Trade.

D.

American Economic Growth.

(3)

According to the passage, we know that most economists think ________.

[  ]

A.

outsourcing should be stopped

B.

American election has nothing to do with outsourcing

C.

it will be good to move jobs outside in the long run

D.

it doesn't make any sense to do international trade

(4)

What does the underlined word “condemn”(in Paragraph 8)mean?

[  ]

A.

Praise.

B.

Support.

C.

Criticize.

D.

Doubt.

(5)

According to Mister Supachai, what can America do to create more job opportunities?

[  ]

A.

To stop outsourcing.

B.

To carry out training and education for the workers.

C.

To increase more money in the field of manufacturing.

D.

To stop international trade.

查看习题详情和答案>>

阅读理解

  They may be just passing your office, computer bag slung(悬挂)over one shoulder.Or they may be sitting in a car outside it, causally tapping away at a laptop.They look like innocent passers-by.In fact, they are stealing your corporate secrets.

  Drive-by hacking is the trendy term given to the practice of breaking into wireless computer networks from outside the buildings that house them.A recent study in the UK, sponsored by RSA Data Security, found that two-thirds of organizations with wireless networks were risking their data in this way.Security experts patrolled(巡逻)several streets in the City of London seeking evidence of wireless networks in operation.

  Of 124 that they identified, 83 were sending data without encrypting(加密)them.Such data could readily be picked up by a passer-by armed only with a portable computer, a wireless modem and a few pieces of software that can be freely down-loaded from the Internet.

  The data could include sensitive company documents containing valuable information.Or they could be e-mail identities and passwords that could be used by hackers to log into corporate networks as if they were legal users.

  Most companies using wireless networking technology do not take even the simplest of precautions to protect their data.Nearly all wireless network technology comes with some basic security features that need only to be activated in order to give a minimum level of security, for example, by encrypting the data being passed over the network.

  Raymon Kruck, business development manager at Check Point Software, a security technology specialist, believes this could be partly a psychological problem.People see the solid walls of their building as safeguards and forget that wireless networks can extend up to 200 meters beyond physical walls.

  Companies without any security at all on their wireless networks make it ridiculously easy for hackers to break in.Switching on the security that comes with the network technology should be automatic.Then there are other basic steps a company can take, says Mr.Kruck, such as changing the passwords on the network from the default(默认)setting.

  Companies can also install firewalls, which form a barrier between the internal network and the public Internet.They should also check their computer records regularly to spot any abnormal activity, which might betray the presence of a hacker.

(1)

According to the study sponsored by RSA Data Security, two thirds of the subjects ________.

[  ]

A.

had their corporate data stolen

B.

depended on wireless computer networks

C.

were exposed to drive-by hacking

D.

were unaware of the risk of wireless hacking

(2)

Which of the following is not considered in the study?

[  ]

A.

The number of wireless hacking incidents.

B.

The number of wireless computer networks.

C.

The way in which data are sent and received.

D.

The way in which data are hacked and stolen.

(3)

Most wireless network technology comprises ________.

[  ]

A.

data encryption programs

B.

password security programs

C.

illegal-user detection

D.

virus-intrusion detection

(4)

Raymond Kruck most probably agrees that wireless network security involves ________.

[  ]

A.

wireless signal administration

B.

changes in user’s awareness

C.

users’ psychological health

D.

stronger physical walls

(5)

Without firewalls, companies using wireless networks ________.

[  ]

A.

cannot operate normally

B.

should turn to passwords

C.

will be easily attacked by hackers

D.

can still spot the activities of hackers

查看习题详情和答案>>

违法和不良信息举报电话:027-86699610 举报邮箱:58377363@163.com

精英家教网