题目
Directions: In this section, there is a passage with ten blanks. You are required to select one word for each blank from a list of choices given in a word bank following the passage. Read the passage through carefully before making your choices. Each choice in the bank is identified by a letter. Please write down the corresponding letter for each item in the blanks. You may not use any of the words in the bank more than once.A) especial E) electronic I) Internet M) softwareB) communication F) extremely J) private N) specialC) contain G) hardware K) serves O) defineD) describe H) interest L) shortenedComputer technology has become a major part of people's lives. This technology has its own underline(6) words. One example is the word hacker. A hacker is usually a person who writes underline(7) programs in a special computer language. But the word hacker is also used to underline(8) a person who tries to steal information from computer systems. Another well-known computer word is Google. It is the name of a popular search engine for the Internet. People use it to find information about almost any subject on the underline(9). The people who started the company named it Google because in mathematics, googol is a(an) underline(10) large number which is followed by one-hundred zeros.If you Google someone, you might find that person's name on a blog. A blog is the underline(11) name for a Web log. It may underline(12) stories, comments, pictures and links to other websites. Some people add information to their blogs every day. Blogs are not the same as spam (垃圾邮件). Spam is unwanted sales messages sent to your underline(13) mailbox. The name is based on a funny joke on a British television show: Some friends are at an eating place that only underline(14) a processed meat product from the United States called SPAM and every time the friends try to speak, another group of people start singing the word SPAM very loudly. This interferes with the friends' discussion—just as unwanted sales messages interfere with underline(15) over the Internet.
Directions: In this section, there is a passage with ten blanks. You are required to select one word for each blank from a list of choices given in a word bank following the passage. Read the passage through carefully before making your choices. Each choice in the bank is identified by a letter. Please write down the corresponding letter for each item in the blanks. You may not use any of the words in the bank more than once.
A) especial E) electronic I) Internet M) software
B) communication F) extremely J) private N) special
C) contain G) hardware K) serves O) define
D) describe H) interest L) shortened
Computer technology has become a major part of people's lives. This technology has its own $\underline{6}$ words. One example is the word hacker. A hacker is usually a person who writes $\underline{7}$ programs in a special computer language. But the word hacker is also used to $\underline{8}$ a person who tries to steal information from computer systems. Another well-known computer word is Google. It is the name of a popular search engine for the Internet. People use it to find information about almost any subject on the $\underline{9}$. The people who started the company named it Google because in mathematics, googol is a(an) $\underline{10}$ large number which is followed by one-hundred zeros.
If you Google someone, you might find that person's name on a blog. A blog is the $\underline{11}$ name for a Web log. It may $\underline{12}$ stories, comments, pictures and links to other websites. Some people add information to their blogs every day. Blogs are not the same as spam (垃圾邮件). Spam is unwanted sales messages sent to your $\underline{13}$ mailbox. The name is based on a funny joke on a British television show: Some friends are at an eating place that only $\underline{14}$ a processed meat product from the United States called SPAM and every time the friends try to speak, another group of people start singing the word SPAM very loudly. This interferes with the friends' discussion—just as unwanted sales messages interfere with $\underline{15}$ over the Internet.
题目解答
答案
26. 根据“computer technology has its own...words”,应填“special”表示“特殊词汇”。
27. “hacker”指编写“software programs”的人,故填“software”。
28. “hacker”也可“describe”试图窃取信息的人,填“describe”。
29. Google用于在“Internet”上搜索信息,填“Internet”。
30. “googol”是“extremely large number”,填“extremely”。
31. “blog”是“Web log”的“shortened”形式,填“shortened”。
32. 博客“contain”故事、评论等,填“contain”。
33. 垃圾邮件发送到“electronic mailbox”,填“electronic”。
34. 餐馆“serves”SPAM产品,填“serves”。
35. 垃圾邮件干扰“communication”,填“communication”。
答案:
26. N) special
27. M) software
28. D) describe
29. I) Internet
30. F) extremely
31. L) shortened
32. C) contain
33. E) electronic
34. K) serves
35. B) communication
解析
本题考查计算机相关英语词汇的语境应用能力,需根据上下文选择恰当的词义。解题核心在于:
- 识别专业术语(如hacker、Google、blog等);
- 理解上下文逻辑关系(如Google命名来源、SPAM的典故);
- 区分同形异义词(如software与hardware、communication与interest等)。
第6空
关键点:计算机技术有"自己的词汇",需填形容词修饰"words"。
分析:文中强调计算机领域特有的术语,"special"(特殊的)最贴切。
第7空
关键点:hacker编写"程序",需填名词限定语。
分析:程序属于软件范畴,故选"software"。
第8空
关键点:hacker也可指"窃取信息者",需填动词。
分析:此处需表达"描述、定义"之意,故选"describe"。
第9空
关键点:Google用于搜索信息的平台。
分析:Google是搜索引擎,专指"Internet"(互联网)。
第10空
关键点:googol是"1后面跟100个零"的数。
分析:"extremely"(极其)修饰"large"更符合数学定义。
第11空
关键点:blog是"Web log"的简称。
分析:"shortened"(缩短的)直接对应缩写关系。
第12空
关键点:博客包含内容类型。
分析:"contain"(包含)是固定搭配。
第13空
关键点:垃圾邮件发送到"邮箱"。
分析:邮箱属于电子设备,故选"electronic"。
第14空
关键点:餐厅提供SPAM产品。
分析:"serves"(提供)符合服务场景。
第15空
关键点:垃圾邮件干扰网络行为。
分析:干扰的是交流,故选"communication"。