认真阅读短文,根据所读内容在下面表格中的空格里填入最恰当的单词。注意:每个空格1个单词。
Could your cellphone give you cancer? Whether it could or not, some people are worrying about the possibility that phones, powerlines and wi-fi (路由器) could be responsible for a range of illnesses, from rashes to brain tumours.
For example, Camilla Rees, 48, a former investment banker in the US, moved out of her apartment in San Francisco because of the radiation coming from next door. Rees told the Los Angeles Times that when her neighbors moved in and installed a wi-fi router she lost her ability to think clearly. “I would wake up dizzy in the morning. I’d fall to the floor. I had to leave to escape that nightmare,” she said. Since then, she’s been on a campaign against low-level electromagnetic fields, or EMFs (低频电磁场).
And she’s not alone. Millions of people say they suffer from headaches, depression, nausea and rashes when they’re too close to cellphones or other sources of EMFs.
Although the World Health Organization has officially declared that EMFs seem to pose little threat, governments are still concerned. In fact, last April, the European Parliament called for countries to take steps to reduce exposure to EMFs. The city of San Francisco and the state of Maine are currently considering requiring cancer-warning labels on cellphones.
If these fears are reasonable, then perhaps we should all be worried about the amount of time we spend talking on our phones or plugging into wi-fi hotpots.
Some say there is evidence to support the growing anxieties. David Carpenter, a professor of environmental health sciences at the University at Albany, in New York, thinks there’s a greater than 95% chance that power lines can cause childhood leukemia. Also there’s a greater than 90% chance that cellphones can cause brain tumours.
But others believe these concerns are unreasonable paranoia (猜疑). Dr Martha Linet, the head of radiation epidemiology at the US National Cancer Institute, has looked at the same research as Carpenter but has reached a different conclusion. “I don’t support warning labels for cellphones,” said Linet. “We don't have the evidence that there’s much danger.”
Studies so far suggest a weak connection between EMFs and illness — so weak that it might not exist at all. A multinational investigation of cellphones and brain cancer, in 13 countries outside the US, has been underway for several years. It’s funded in part by the European Union, in part by a cellphone industry group.
According to Robert Park, a professor of physics at the University of Maryland in the US, the magnetic waves aren’t nearly powerful enough to break apart DNA, which is how known threats, such as UV rays and X-rays, cause cancer.
Perhaps it’s just psychological. Some experts find that the electro-sensitivity syndrome seems to be similar to chemical sensitivity syndrome, which is a condition that’s considered to be psychological.
Whether EMFs are harmful or not, a break in the countryside, without the cellphone, would probably be good for all of us.
Title: Could cellphones give you cancer? |
|
Key points |
Supporting details |
Cellphones are (1.)__▲__ to use |
● Some people think it (2.) __▲__ for cellphones to cause cancer. ● Camilla Rees got ill after his neighbor installed a wi-fi router. ● Millions of people have the (3.) __▲__ problems as Camilla. ● Some evidence supports people’s anxieties. |
Cellphones are safe to use |
● Some believe that these concerns are just paranoia. ● So far, studies show that there isn’t much (4.) __▲__ between EMFs and illness. ● Robert Park thinks that the magnetic waves aren’t powerful enough to (5.) __▲__ DNA. ● It’s just for psychological (6.) __▲__ that people feel ill when they use cellphones. |
Attitudes and (7.) __▲__ |
● Some governments are (8.) __▲__ about the safety of cellphones or EMFs. ● The author thinks that we should (9.) __▲__ the chance of talking on the phone or spend more time in the (10.) __▲__ without cellphones. |
There is an old saying:No one thinks he’s a bad driver. Here’s an updated 21st century version: No one thinks he sends annoying (令人烦恼的) e-mails.
But, plenty of us do.
A Princeton University research found that 22 per cent of Americans say e-mail has added to their work pressures and caused misunderstandings. Here’s a guide on e-mail etiquette (礼节) to help you avoid being annoying.
Experts say there are three types of e-mails with different rules-close friends, office and public e-mails.
The close friends e-mail
You can send your lover, your closest friends and your siblings (brothers and sisters) anything, from jokes to “you got to see this!”. But bear in mind that not everyone shares your sense of humour and you may expose them to viruses.
The office e-mail
Don’t add to people’s workload. Keep e-mails short and to the point.
◆Make the subject line factual and brief.
◆Write in clear, concise (简练的) sentences.
◆Provide your name and phone number at the end.
The public e-mail
Occasionally we have to send an e-mail to a group of people. If possible, write your public e-mails with a who, what, when, where structure. For example:
Who: All members of the soccer team
What: Team photo
When: Saturday, March 25, at noon
Where: Playing field 2.
Finally, before you hit “Send”, check the following:
◆Is the e-mail a “flame”? Never send an e-mail in anger, It could stay around forever and haunt (萦绕心头) your professional and personal life.
◆Check the “To” field. Is this really who you want to send the message to?
◆Spell-check the message. Does it have an error that can affect you badly?
1.The writer may want to tell the reader that _____.
A. mails online are often sent to wrong places
B. different e-mails should be written in different ways
C. sending office e-mails is sure to add to people’s workload
D. the public e-mail is usually sent to a large number of people
2.According to the writer, _____.
A. e-mails with some misspellings may hurt the receiver
B. before sending an e-mail, the sender should ask someone to check it
C. jokes sent to a close friend online sometimes may be harmful
D. about 80% of Americans like sending and receiving e-mails
3.If an e-mail is a “flame”, the sender of it must be very _____ at the moment.
A. angry B. excited C. worried D. disappointed
Everywhere you look, large quantities of information in the world are pouring. This data flood is already starting to transform business, government, science and everyday life. It has great potential for good — as long as consumers, companies and governments make the right choices about when to restrict the flow of data, and when to encourage it.
A few industries have led the way in their ability to gather and take advantage of the data. Credit-card companies monitor every purchase and can identify cheats with a high degree of accuracy. Stolen credit cards are more likely to be used to buy hard liquor than wine, for example, because it is easier to overlook. Insurance firms are also good at combining clues to spot doubtful claims: dishonest claims are more likely to be made on a Monday than a Tuesday, since policyholders (保险客户) who stage accidents tend to assemble friends as false witnesses over the weekend. By combining many such rules, it is possible to work out which cards are likeliest to have been stolen, and which claims are untrue. By analyzing “basket data”, supermarkets can make promotions to appeal to particular customers’ preferences. The oil industry uses supercomputers to help them before drilling wells.
But the data flood also poses risks. There are many examples of databases being stolen: disks full of social-security data go missing, laptops loaded with tax records are left in taxis, credit-card numbers are stolen by online purchase. The result can be privacy made public, identity stolen and cheats permitted large space. Rather than owning and controlling their own personal data, they very often find that they have lost control of it.
The best way to deal with the data flood is to make more data available in the right way, by requiring greater transparency in several areas. First, users should be given greater access to and control over the information held about them, including whom it is shared with. Google allows users to see what information it holds about them, and lets them delete their search histories or modify the targeting of advertising, for example. Second, organizations should be required to disclose details of security breaches (安全漏洞), as is already the case in some parts of the world, to encourage bosses to take information security more seriously. Third, organizations should be subject to an annual security check, with the resulting grade made public (though details of any problems exposed would not be). This would encourage companies to keep their security measures up to date.
1.What is the best title for this passage?
A. Information Flood B. Benefits of Data Flood
C. Harms of Data Flood D. How to Use Data in a Right Way
2.From the passage we can infer that _____.
A. lots of data are lost because of hardware problems
B. online purchases are becoming more and more popular
C. credit cards are not so secure to use and will go out of use very soon
D. insurance firms have to investigate before they confirm their policyholders’ claims
3.Which of the following is the writer’s opinion about how to deal with the data flood?
A. Personal information should be used for public benefits.
B. The users should be given the right to access public information.
C. Companies should update their measures to guarantee their data safety.
D. Organizations should keep their resulting grade of security checks unknown to the public.
4.From the passage we can conclude that _____.
A. the data flood makes peoples’ life less convenient and more expensive
B. companies and insurance firms are responsible for the data flood
C. the information flood is more useful to organizations than to individuals
D. the information flood has both positive and negative influence on modern life
Did you get a flu shot this year? For the first time, the Centers for Disease Control and Prevention in the US is recommending that all children ages 6 months through 18 years receive the flu vaccine.
Vaccines battle diseases caused by bacteria and viruses. A weakened form of the germ is introduced into the body. The body makes special substances called antibodies to fight the germs. If the actual germs were to attack, the antibodies would fight them.
Because there are many kinds of flu viruses, scientists must create a new vaccine formula (配方) each year. Researchers must make a prediction.
“The flu vaccine is not as effective as the polio (小儿麻痹症) vaccine or the measles(麻疹) vaccine,” says Dr. William Schaffner of Vanderbilt University School of Medicine.
“It’s not a great vaccine, but it is quite a good vaccine.”
But a flu vaccine doesn’t work for everyone. There are certain people who should be careful about taking it. Because the vaccine is produced from eggs, those who are allergic (过敏的) to eggs should not take it. If you have a fever, you should wait until you recover.
Some people are afraid that they might get the flu from the flu shot. Scientist say that it is not possible, because the viruses in the flu shot are inactivated (灭活的). But some minor side effects such as low-grade fever and body aches could occur. If they do, they begin soon after the shot and usually last only one to two days.
1.What is an antibody?
A. An antibody is a vaccine formula
B. An antibody is a germ that is introduced into the body
C. An antibody is a vaccine that fights diseases.
D. An antibody is a special substance to fight germs.
2.Which of the following statements is NOT true?
A. Not everyone is suitable for the flu vaccine.
B. The flu vaccine is not so effective as the measles vaccine
C. Flu viruses create new vaccine formulas each year.
D. People can’t take the flu vaccine at anytime.
3.It can be inferred from the text that _____.
A. scientists should change the vaccine formula each year
B. vaccines can battle diseases caused by bacteria and viruses
C. all children ages 6 months through 18 years can receive the flu vaccine
D. scientists are responsible for the side effects of the flu vaccine
4.Which of the following would be the best title for the text?
A. The flu vaccine B. Side effects of the flu vaccine
C. How to prevent the flu D. Not everyone can get the flu shot
Speeding off in a stolen car, the thief thinks he has got a great catch. But he is in for an unwelcome surprise. The car is fitted with a remote immobilizer (发动机防盗系统), and a radio signal from a control centre miles away will ensure that once the thief switches the engine off, he will not be able to start it again.
The idea goes like this. A control box fitted to the car contains a mini-cellphone, a micro-processor and memory, and a GPS satellite positioning receiver. If the car is stolen, a coded cellphone signal will tell the control centre to block the vehicle’s engine management system and prevent the engine being restarted.
In the UK, a set of technical fixes is already making life harder for car thieves. “The pattern of vehicle crime has changed,” says Martyn Randall, a security expert. He says it would only take him a few minutes to teach a person how to steal a car, using a bare minimum of tools, but only if the car is more than ten years old. Modern cars are far tougher to steal, as their engine management computer won’t allow them to start unless they receive a unique ID code beamed out by the ignition key (汽车等的点火开关).
In the UK, technologies like this have helped achieve a 31% drop in vehicle-related crime since 1997. But determined criminals are still managing to find other ways to steal cars, often by getting hold of the owner’s keys .And key theft is responsible for 40% of the thefts of vehicles fitted with a tracking system. If the car travels 100 metres without the driver confirming their ID, the system will send a signal to an operations centre that it has been stolen. The hundred metres minimum avoids false alarms due to inaccuracies in the GPS signal. Staff at the centre will then contact the owner to confirm that the car really is missing, and keep police informed of the vehicle’s movements via the car’s GPS unit.
1.What’s the function of the remote immobilizer fitted to a car?
A. To allow the car to lock automatically when stolen
B. To prevent the car thief from restarting it once it stops
C. To help the police make a surprise attack on the car thief
D. To prevent car theft by sending a radio signal to the car owner
2.By saying “The pattern of vehicle crime has changed” (Lines1-2,Para.3) Martyn Randall suggests that _____.
A. Self-prepared tools are no longer enough for car theft
B. the thief has to make use of computer technology
C. it takes a longer time for the car thief to do the stealing
D. the thief has lost interest in stealing cars over 10 years old
3.What is essential in making a modern car tougher to steal?
A. A GPS satellite positioning receiver
B. A unique ID card
C. A special cellphone
D. A code ignition key
4.Why does the tracking system set a 100-metre minimum before sending an alarm to the operations centre?
A. To give the driver time to contact the operation centre
B. To allow for possible errors in the GPS system
C. To keep police informed of the car’s movements
D. To leave time for the operations centre to give an alarm
Dear son,
The day that you see me old and I am already not in good health, have patience and try to understand me.
If I get dirty when eating, if I can not dress, have patience and remember the hours I 1teaching it to you. If, when I speak to you, I 2the same things thousand and one times, do not 3me, listen to me. When you were small, I had to read to you thousand and one times the same story 4you got to sleep. When I do not want to have a 5, neither shame me nor scold me. Remember when I had to chase you with thousand excuses I 6, in order that you wanted to bathe. When you see my 7little about new technologies, give me the necessary time and do not look at me with your mocking (嘲弄) smile. I taught you 8to do so many things: to eat good, to dress well, to confront life…. When at some moment I lose the memory or the 9of our conversation, let me have the necessary time to remember, and if I cannot do it, do not become nervous, as the most important thing is not our conversation but surely to be with you and to have you 10to me.
If ever I do not want to eat, do not force me. I know well 11I need to and when not. When my 12legs do not allow me to walk, give me your 13, the same way I did when you gave your first 14. And when someday I say to you that I do not want to 15any more — that I want to rest forever, do not get angry. Someday you will understand.
Try to understand that my age is not lived but survived. Some day you will discover that, 16my mistakes, I always wanted the 17thing for you and that I tried to prepare the way for you. You must not feel sad, angry or impotent (无可奈何) for seeing me 18you. You must be next to me, try to understand me and to help me as I did it when you 19living. Help me to walk, help me to end my way with love and 20. I will pay you by a smile and by the immense love I have had always for you.
I love you, Son.
Your father
1.A. paid B. spent C. cost D. took
2.A. praise B. think C. repeat D. criticize
3.A. interrupt B. disturb C. look D. avoid
4.A. when B. after C. since D. until
5.A. rest B. word C. shower D. sleep
6.A. discovered B. invented C. noticed D. assumed
7.A. knowing B. fearing C. enjoying D. consulting
8.A. what B. when C. how D. why
9.A. news B. attitude C. material D. thread
10.A. talking B. listening C. responding D. appealing
11.A. where B. how C. that D. when
12.A. tired B. short C. long D. strong
13.A. leg B. ear C. hand D. mind
14.A. step B. pace C. laugh D. cry
15.A. talk B. live C. write D. sleep
16.A. though B. since C. while D. despite
17.A. last B. first C. best D. most
18.A. near B. behind C. below D. against
19.A. made B. started C. earned D. found
20.A. mercy B. care C. excuse D. patience