Armed only with iPhones, the inventive rock band Atomic Tom has gone viral(廣為流傳) by way of the New York subway. The band has scored an Internet hit with the video to the song “Take Me Out.”
Singer Luke White says the production was a top-secret operation.
“We didn't tell anyone about this. It was completely top-secret from our family, from our friends, from our label, our management, everybody. So the first time that people saw this video was last Friday when we put it on YouTube,” explained White.
Since uploading the video to YouTube, band members have spent several days refreshing the page to watch the number of hits rise.
The video has also made its way around Twitter as many people have shared it with their friends.
“I mean, it still hasn't quite hit. It's just kind of blowing our minds right now that we're getting this: many people are fond of it, and they're sharing it with their friends. We don't know what it's like really to have something that's viral, so all of this is very new to us.” said Eric Espiritu, the lead guitarist of the band.
White explains how the video came together:
“We did our research with the applications( 應(yīng)用程序) and found applications that worked out really well with the instruments and then we plugged them all into, plugged our phones into mini-battery powered amplifiers(擴(kuò)音器) that we put underneath our seats, and we did a lot of, you know, practices, in terms of figuring out what the balance of the sound and like who was overpowering, who was too loud or who was too soft.”
The idea for the video came from Espiritu's younger brother Benjamin. The younger Espiritu directed the video from his initial concept through the final edit and upload to the Internet.
“I've seen a lot of the music applications come out, and I've never actually had the chance to play with them," says Ben Espiritu. "When I started hearing about how they sound and everything, I thought it might be unique to take it one step further and then create an entire band just performing solely(單曲) on the iPhones, and I thought it would be a pretty cool idea.”
Ben says the success of the band’s music video is a credit to the talent and ability of the musicians, but it's also a sign of the times.
“It really comes down to seeing something different, seeing something unique, and I think that that's always, in any type of art form, what will speak to people, and I think it does reflect the times that we live in, taking a smart phone and then being able to turn it into an instrument, not only just an instrument, but making it sound really good.”
【小題1】 Who first saw the video of the song “Take Me Out”?
A.Their friends | B.The people on line |
C.Their family | D.Their management |
A.They are thrilled. |
B.They are quite used to it. |
C.They are kind of confused. |
D.They are so excited as to tell everyone they know. |
A.The band copied from it other musicians. |
B.It had already existed in the iPhones before they bought them. |
C.The band created it with the help of the applications in the iPhones. |
D.The band made full use of the traditional instruments to make the song. |
A.It has introduced us several talented musicians. |
B.It has made the musicians into millionaires. |
C.It teaches the young a big lesson. |
D.It reflects the talent and ability of the musicians and the times that we live in. |
【小題1】答案B。從第三段可以得知答案。
【小題1】 答案C。從第六段可以得知答案。We don't know what it's like really to have something that's viral, so all of this is very new to us
【小題1】答案C。從第八段中可以概括出答案。
【小題1】答案D。從最后第二段可以得出答案。Ben says the success of the band’s music video is a credit to the talent and ability of the musicians, but it's also a sign of the times.
解析
年級(jí) | 高中課程 | 年級(jí) | 初中課程 |
高一 | 高一免費(fèi)課程推薦! | 初一 | 初一免費(fèi)課程推薦! |
高二 | 高二免費(fèi)課程推薦! | 初二 | 初二免費(fèi)課程推薦! |
高三 | 高三免費(fèi)課程推薦! | 初三 | 初三免費(fèi)課程推薦! |
科目:高中英語(yǔ) 來(lái)源: 題型:閱讀理解
Armed only with iPhones, the inventive rock band Atomic Tom has gone viral(廣為流傳) by way of the New York subway. The band has scored an Internet hit with the video to the song “Take Me Out.”
Singer Luke White says the production was a top-secret operation.
“We didn't tell anyone about this. It was completely top-secret from our family, from our friends, from our label, our management, everybody. So the first time that people saw this video was last Friday when we put it on YouTube,” explained White.
Since uploading the video to YouTube, band members have spent several days refreshing the page to watch the number of hits rise.
The video has also made its way around Twitter as many people have shared it with their friends.
“I mean, it still hasn't quite hit. It's just kind of blowing our minds right now that we're getting this: many people are fond of it, and they're sharing it with their friends. We don't know what it's like really to have something that's viral, so all of this is very new to us.” said Eric Espiritu, the lead guitarist of the band.
White explains how the video came together:
“We did our research with the applications( 應(yīng)用程序) and found applications that worked out really well with the instruments and then we plugged them all into, plugged our phones into mini-battery powered amplifiers(擴(kuò)音器) that we put underneath our seats, and we did a lot of, you know, practices, in terms of figuring out what the balance of the sound and like who was overpowering, who was too loud or who was too soft.”
The idea for the video came from Espiritu's younger brother Benjamin. The younger Espiritu directed the video from his initial concept through the final edit and upload to the Internet.
“I've seen a lot of the music applications come out, and I've never actually had the chance to play with them," says Ben Espiritu. "When I started hearing about how they sound and everything, I thought it might be unique to take it one step further and then create an entire band just performing solely(單曲) on the iPhones, and I thought it would be a pretty cool idea.”
Ben says the success of the band’s music video is a credit to the talent and ability of the musicians, but it's also a sign of the times.
“It really comes down to seeing something different, seeing something unique, and I think that that's always, in any type of art form, what will speak to people, and I think it does reflect the times that we live in, taking a smart phone and then being able to turn it into an instrument, not only just an instrument, but making it sound really good.”
Who first saw the video of the song “Take Me Out”?
A. Their friends B. The people on line
C. Their family D. Their management
What is the band members’ attitude towards the sudden fame?
A. They are thrilled.
B. They are quite used to it.
C. They are kind of confused.
D. They are so excited as to tell everyone they know.
How did the video come into being?
A. The band copied from it other musicians.
B. It had already existed in the iPhones before they bought them.
C. The band created it with the help of the applications in the iPhones.
D. The band made full use of the traditional instruments to make the song.
What is the significance of the success of the band's music video?
A. It has introduced us several talented musicians.
B. It has made the musicians into millionaires.
C. It teaches the young a big lesson.
D. It reflects the talent and ability of the musicians and the times that we live in.
查看答案和解析>>
科目:高中英語(yǔ) 來(lái)源:2012-2013學(xué)年山東省濟(jì)寧市泗水一中高二12月質(zhì)量檢測(cè)英語(yǔ)試卷(帶解析) 題型:閱讀理解
They may be just passing your office, computer bag slung (懸掛) over one shoulder. Or they may be sitting in a car outside it, causally tapping away at a laptop. They look like innocent passers-by. In fact, they are stealing your corporate secrets.
Drive-by hacking is the trendy term given to the practice of breaking into wireless computer networks from outside the buildings that house them. A recent study in the UK, sponsored by RSA Data Security, found that two-thirds of organizations with wireless networks were risking their data in this way. Security experts patrolled (巡邏) several streets in the City of London seeking evidence of wireless networks in operation.
Of 124 that they identified, 83 were sending data without encrypting(加密)them. Such data could readily be picked up by a passer-by armed only with a portable computer, a wireless modem and a few pieces of software that can be freely downloaded from the Internet.
The data could include sensitive company documents containing valuable information. Or they could be e-mail identities and passwords that could be used by hackers to log into corporate networks as if they were legal users.
Most companies using wireless networking technology do not take even the simplest of measures to protect their data. Nearly all wireless network technology comes with some basic security features that need only to be activated (激活) in order to give a minimum level of security, for example, by encrypting the data being passed over the network.
Raymon Kruck, business development manager at Check Point Software, a security technology specialist, believes this could be partly a psychological problem. People see the solid walls of their building as safeguards and forget that wireless networks can extend up to 200 meters beyond physical walls.
Companies without any security at all on their wireless networks make it ridiculously easy for hackers to break in. Switching on the security that comes with the network technology should be automatic. Then there are other basic steps a company can take, says Mr. Kruck, such as changing the passwords on the network from the default (默認(rèn)) setting.
Companies can also install firewalls, which form a barrier between the internal network and the public Internet. They should also check their computer records regularly to spot any abnormal activity, which might betray the presence of a hacker.
【小題1】According to the study sponsored by RSA Data Security, two thirds of the subjects _______.
A.had most of their company data stolen |
B.depended on wireless computer networks |
C.were exposed to drive-by hacking |
D.were unaware of the risk of wireless hacking |
A.The number of computer hacking incidents. |
B.The number of wireless computer networks identified. |
C.The way in which data are sent and received. |
D.The way in which data are hacked and stolen. |
A.data encryption program | B.password security programs |
C.illegal-user detection | D.firewall |
A.wireless signal administration | B.changes in user’s awareness |
C.users’ psychological health | D.stronger physical walls |
A.book review | B.science fiction | C.textbook | D.computer magazine |
查看答案和解析>>
科目:高中英語(yǔ) 來(lái)源:2014屆山東省濟(jì)寧市高二12月質(zhì)量檢測(cè)英語(yǔ)試卷(解析版) 題型:閱讀理解
They may be just passing your office, computer bag slung (懸掛) over one shoulder. Or they may be sitting in a car outside it, causally tapping away at a laptop. They look like innocent passers-by. In fact, they are stealing your corporate secrets.
Drive-by hacking is the trendy term given to the practice of breaking into wireless computer networks from outside the buildings that house them. A recent study in the UK, sponsored by RSA Data Security, found that two-thirds of organizations with wireless networks were risking their data in this way. Security experts patrolled (巡邏) several streets in the City of London seeking evidence of wireless networks in operation.
Of 124 that they identified, 83 were sending data without encrypting(加密)them. Such data could readily be picked up by a passer-by armed only with a portable computer, a wireless modem and a few pieces of software that can be freely downloaded from the Internet.
The data could include sensitive company documents containing valuable information. Or they could be e-mail identities and passwords that could be used by hackers to log into corporate networks as if they were legal users.
Most companies using wireless networking technology do not take even the simplest of measures to protect their data. Nearly all wireless network technology comes with some basic security features that need only to be activated (激活) in order to give a minimum level of security, for example, by encrypting the data being passed over the network.
Raymon Kruck, business development manager at Check Point Software, a security technology specialist, believes this could be partly a psychological problem. People see the solid walls of their building as safeguards and forget that wireless networks can extend up to 200 meters beyond physical walls.
Companies without any security at all on their wireless networks make it ridiculously easy for hackers to break in. Switching on the security that comes with the network technology should be automatic. Then there are other basic steps a company can take, says Mr. Kruck, such as changing the passwords on the network from the default (默認(rèn)) setting.
Companies can also install firewalls, which form a barrier between the internal network and the public Internet. They should also check their computer records regularly to spot any abnormal activity, which might betray the presence of a hacker.
1.According to the study sponsored by RSA Data Security, two thirds of the subjects _______.
A.had most of their company data stolen
B.depended on wireless computer networks
C.were exposed to drive-by hacking
D.were unaware of the risk of wireless hacking
2.Whichof the following is NOT considered in the study?
A.The number of computer hacking incidents.
B.The number of wireless computer networks identified.
C.The way in which data are sent and received.
D.The way in which data are hacked and stolen.
3.Most wireless network technology has_________.
A.data encryption program B.password security programs
C.illegal-user detection D.firewall
4.Raymond Kruck most probably agrees that wireless network security involves ________.
A.wireless signal administration B.changes in user’s awareness
C.users’ psychological health D.stronger physical walls
5.The passage is most likely to be seen in a __________
A.book review B.science fiction C.textbook D.computer magazine
查看答案和解析>>
科目:高中英語(yǔ) 來(lái)源:20102011年吉林省高二下期末考試(英語(yǔ)) 題型:閱讀理解
A few years ago I was shopping with a friend and his 12-year-old daughter in downtown San Francisco.A street musician,whom my friend happened to know from his own musician day,was playing the saxophone on a street corner.His name was Clifford,and he had attracted a large crowd with his performance.After he finished,my friend introduced him to me and his daughter.Clifford asked her if she played any instrument.When she replied that she was taking trumpet (小號(hào)) lessons and played in her junior high school band,he said,“That’s fine,little lady.Learn your instrument well and you can play anything.”Somehow these simple yet wise words struck me as suitable not only for a trumpet player but also for a reader.If you learn to read well,you can read anything you want—not just newspapers and magazines,but more difficult material like philosophy,film criticism,military history—whatever interests you as your confidence grows.You would not be limited in any way.If you have the vocabulary –or at least a good dictionary near at hand—you can pick up a book,concentrate on it, and make sense of the writer’s words.
In the United States,reading instruction often ends at elementary school,so students sometimes have difficulty as they progress through school.They must take their assignments,armed only with their elementary,school reading skills.The result,too often,is frustration (挫折) and loss of confidence.And the assigned reading in your college courses will be even greater than they were in high school.Developing Reading Skills is designed to accomplish several tasks:to show you the skills that will enable you to read with greater comprehension,to help you deal with reading assignment with confidence,and to teach you to become an active reader.
1.The talk between the girl and Clifford serves as an introduction to .
A.the importance of reading |
B.the connection between playing instruments and reading |
C.the necessity of learning to play an instrument |
D.the variety of reading material |
2.It can be inferred from the story that .
A.Clifford was good at playing the saxophone |
B.the writer’s friend was once a street musician |
C.the 12-year-old girl played the trumpet very poorly |
D.Clifford was a good music teacher |
3.We can infer from the last paragraph that Developing Reading Skills .
A.is directed to elementary school students |
B.centers around vocabulary building skills |
C.a(chǎn)ims at helping students read better |
D.offers elementary reading skills |
4.With good reading skills,you can .
A.understand anything you read without difficulty |
B.work out the writer’s meaning if only you concentrate on the book |
C.understand what you read with the help of a good dictionary |
D.Concentrate on whatever you read |
查看答案和解析>>
百度致信 - 練習(xí)冊(cè)列表 - 試題列表
湖北省互聯(lián)網(wǎng)違法和不良信息舉報(bào)平臺(tái) | 網(wǎng)上有害信息舉報(bào)專(zhuān)區(qū) | 電信詐騙舉報(bào)專(zhuān)區(qū) | 涉歷史虛無(wú)主義有害信息舉報(bào)專(zhuān)區(qū) | 涉企侵權(quán)舉報(bào)專(zhuān)區(qū)
違法和不良信息舉報(bào)電話:027-86699610 舉報(bào)郵箱:58377363@163.com