As people slowly learn to cure diseases, control floods, prevent hunger, and stop wars, fewer people die every year. As a result, the population of the world is becoming larger. In 1925 there were about 2 billion people in the world; today there are over 6 billion.
When the number rises, extra mouths must be fed. New lands must be brought under development, or land already farmed must be made to produce more crops. In some areas the land is so over-developed that it will be difficult to make it provide more crops. In some areas the population is so large that the land is divided into too tiny units to make improvement possible with farming methods. If a large part of this farming population went into industrial work, the land might be farmed much more productively (多產(chǎn)地) with modern methods.
There is now a race for science, technology, and industry to keep the output of food rising faster than the number of people to be fed. New types of crops, which will grow well in bad weather, are being developed, so there are now farms beyond the Arctic Circle in Siberia and North America. Irrigation (灌溉) and dry-farming methods bring poor lands under the plough. Dams hold back the waters of great rivers, which can provide water for the fields in all seasons and provide electric power for new industries. Industrial chemistry provides fertilizer to suit different soils. Every year, some new methods are made to increase or to protect the food of the world.
1. The author says that the world population is increasing because _____.
A. there are many rich valleys and large fields
B. farmers are producing more crops than before
C. people are living longer due to better living conditions
D. new lands are being made into farmlands
2. The author says that in areas with large populations, land might be more productively farmed if _____.
A. the land was divided into smaller pieces
B. people moved into the countryside
C. industrial methods were used in farming
D. the units of land were much larger
3. We are told that there are now farms beyond the Arctic Circle. This has been made possible by _____.
A. growing new types of crops
B. irrigation and dry-farming means
C. providing fertilizers
D. destroying pests and diseases
4. Why is the land divided into tiny units in some areas?
A. There are too many people living there.
B. It saves more natural resources there.
C. It prevents crops from serious diseases there.
D. Farmers can grow various kinds of crops there.
5. Why do some people use dams to hold back waters from great rivers?
A. To develop a new kind of dry-farming methods.
B. To prevent crops from floods.
C. To provide water and electricity in all seasons.
D. To water poor lands in bad weather.
科目:高中英語 來源: 題型:054
One of the first such clocks was built for a king of France and placed in a tower of the royal palace, The clock did not 1 minutes or seconds.
Usually it did not even show the correct hour! Since there was no planes or trains to catch, people were not 2 knowing the exact time.
Gradually, clocks began to be popular, but they did not keep correct time. They were 3 a cart with a horse and driver. One of the wheels was the face of the clock. Watches 4 as soon as clocks were made small enough to be carried. These did not always tell the correct time, either. They were often put into beautiful watchcases, which were made 5 anything the owner wanted.
The pendulum (鐘擺) clock was invented in 1657. This was the beginning of the style of clocks we call “ grandfather clocks “, which were enclosed in tall wooden boxes. Pendulum clocks showed the hours more exactly than earlier clocks, since the wright on the pendulum could be moved 6 to make the clock go faster or lower. About forty years later, minute and second hands were put on some clocks. Grandfather clocks are very much in demand again today. They are usually very expensive, however, and require 7 than other styles of clocks.
As people began to travel more and do more things, they were more interested in knowing the correct time, By 1900, almost every house had a clock, and nearly every well-dressed gentleman 8 on a chain tucked in his vest pocket.
Today, of course, we have electric clocks that keep giving the right time until they are unplugged or the electricity goes off. Scientists have invented clocks that look like large machines all tell the correct time to a split second.
The most modern electric clocks for home use do not have faces or hands. These clocks are called digital clocks(數(shù)字顯示式電子鐘), and they tell the time with 9 which appear in a little window.
Many electric locks are combined with radios, which can sometimes be set to turn on automatically(自動). Thus, 10 an alarm ringing in your ear in the morning, you can hear soft music playing when it is time to get up. Some clocks will even start the coffee maker!
1. A. count B. ring out
C. show D. show off
[ ]
2. A. care for B. concerned about
C. suggested about D. anxious to
[ ]
3. A. drawn by B. of the same size as
C. pulled by D. in the shape of
[ ]
4. A. had been used B. came into use
C. became a reality D. didn’t appear
[ ]
5. A. to look like B. to look as
C. very valuable D. as small as possible
[ ]
6. A. up or down B. right or left
C. here and there D. this way or that
[ ]
7. A. many room B. much room
C. more space D. less money
[ ]
8. A. carried a clock B. wearing a watch
C. bought a watch D. bought a watch
[ ]
9. A. a series of letters
B. a set of numerals
C. minute hands
D. second hands
[ ]
10. A. take the place of
B. in spite of
C. without
D. instead of
[ ]
查看答案和解析>>
科目:高中英語 來源:讀想用 高二英語(上) 題型:050
|
查看答案和解析>>
科目:高中英語 來源:101網(wǎng)校同步練習(xí) 高三英語 外語教學(xué)與研究出版社 題型:054
|
查看答案和解析>>
科目:高中英語 來源:河北省唐山一中2011屆高三9月調(diào)研考試英語試題 題型:050
|
查看答案和解析>>
科目:高中英語 來源: 題型:閱讀理解
Typing your password or credit card number into a computer is a moment’s work. But if you think your personal details disappear as soon as you hit the Return key, think again: they can sit on the computer’s hard disk for years waiting for a hacker to rip them off. As people spend more time on the web and hackers become more sophisticated, the dangers of storing personal information on computers are growing by the day, security experts say. There are some safeguards, such as never allowing your computer to store your passwords. But even that is no guarantee of security. When you type in a password, it is stored in random access memory (RAM), where it is held temporarily until other data overwrites it or the computer is switched off. But every so often, the computer copies the contents of its RAM onto hard disk, where it is easy prey for a hacker, who can read it directly or design a worm to e-mail it back. The longer sensitive data stays in RAM, the more likely it is to be copied onto the disk, where it stays until it is overwritten—which might not happen for years. Tal Garfinkel and colleagues from Stanford University have created a software tool which simulates the workings of a complete computer system. Within the simulation, sensitive data can be tagged and then tracked as it passes through the system. Next, Garfinkel and his team simulated computers running common software that regularly handles passwords or confidential personal information, such as Internet Explorer, the Windows login script and Apache server software. In a paper to be presented, they conclude that the programs took virtually no measures to limit the length of time the information is retained. Some of the tested software even copied the sensitive information, apparently without restraint. This is the first time anyone has tried to measure the extent of this problem, says Rebecca Wright, a security expert at Stevens Institute of Technology. Garfinkel hopes the results will arouse software developers to take action. 1.Which of the following statements is true according to the passage? A.It is secure to use your password as long as you hit the Return key. B.Your personal details is likely to be in danger if you spend more time on the web. C.Your password will be safe if you have some safeguards. D.Never allowing your computer to store your passwords will be safe. 2.Which of the following is NOT the reason for the unsafety of a password? A.It will be stored in RAM. B.It will be copied onto hard disk. C.It might not be overwritten. D.It will disappear as soon as you hit the return key. 3.Tal Garfinkel and his team measured the extent of security of . A.simulating the working of a complete computer system B.tagging sensitive data C.passing through the system D.running common software 4.What can be inferred from the passage? A.The length of the time the information is stored is not limited. B.The programs can not retain the information. C.The security problem should be paid more attention to. D.Some sensitive information has been copied. |
查看答案和解析>>
湖北省互聯(lián)網(wǎng)違法和不良信息舉報平臺 | 網(wǎng)上有害信息舉報專區(qū) | 電信詐騙舉報專區(qū) | 涉歷史虛無主義有害信息舉報專區(qū) | 涉企侵權(quán)舉報專區(qū)
違法和不良信息舉報電話:027-86699610 舉報郵箱:58377363@163.com