游客
题文

I was in my third year of teaching creative writing at a high school in New York, when one of my students, 15-year-old Mikey, gave me a note from his mother. It explained his absence from class the day before.
I had seen Mikey himself writing the note at his desk. Most parental-excuse notes I received were penned by my students. If I were to deal with them, I’d be busy 24 hours a day. The forged excuse notes made a large pile, with writing that ranged from imaginative to crazy. The writers of those notes didn’t realize that honest excuse notes were usually dull: “Peter was late because the alarm clock didn’t go off.”
Isn’t it remarkable, I thought, how the students complained and said it was hard putting 200 words together on any subject? But when they produced excuse notes, they were brilliant.
So one day I typed out a dozen excuse notes and gave them to my classes. I said, “They’re supposed to be written by parents, but actually they are not. True, Mikey?” The students looked at me nervously.
“Now, this will be the first class to study the art of the excuse note --- the first class, ever, to practice writing them. You’re so lucky to have a teacher like me who has taken your best writing and turned it into a subject worthy of study. ”
Everyone smiled as I went on, “You used your imaginations. So try more now. Today I’d like you to write ‘An Excuse Note from Adam to God’ or ‘An Excuse Note from Eve to God’.” Heads went down. Pens raced across paper. For the first time ever I saw students so careful in their writing that they had to be asked to go to lunch by their friends.
The next day everyone had excuse notes. Heated discussions followed. The headmaster entered the classroom and walked up and down, looking at papers, and then said, “I’d like you to see me in my office.”
When I stepped into his office, he came to shake my hand and said, “I just want to tell you that that lesson, that task, whatever the hell you were doing, was great. Those kids were writing on the college level. Thank you. ”
What did the author do with the students found dishonest?

A.He reported them to the headmaster. B.He lectured them hard on honesty.
C.He had them take notes before lunch. D.He helped improve their writing skills.

The author found that compared with the true excuse notes, the produced ones by the students were usually ________.

A.less impressive B.less convincing C.worse written D.more imaginative

The author had the students practice writing excuse notes so that the students could learn_________.

A.the importance of being honest B.how to be creative in writing
C.the pleasure of creative writing D.how to write excuse notes skillfully

The underlined word “forged” in the second paragraph means “________”.

A.false B.copied C.former D.honest

What did the headmaster think of the author’s way of teaching?

A.Misleading. B.Difficult C.Effective. D.Reasonable.
科目 英语   题型 阅读理解   难度 中等
登录免费查看答案和解析
相关试题

It is a typical case. A young professional has just moved to a new city. She is very active in her new job but wishes to meet people socially outside of work. How does she do this?
  Signing up for a night class is always a good starting point. Not only is it an ideal way to meet like-minded people,it can also be a great new learning experience. Pubs and clubs can be a good meeting place but can be a bit hard if you are on your own.
  Join a gym
  GL-14 health club in Manchester city centre is a gym which also has lots of member activities outside the gym from charity fashion shows to dinner dances giving members a chance to socialize away from the treadmill(繁忙的工作). Or if you want a gym with a difference,try a“Green Gym”for people who want to exercise but wish to be outdoors and doing something that will benefit the environment at the same time. The“work out”could involve such activities as practical conservation or gardening work. It’s a great way to get people’s heart and muscle working. And many agree that meeting other people and having a matter and a laugh is a big attraction of the scheme.
  Reading groups
  In the Reading Groups,Jenny Hartley suggested that there may be as many as 50,000 people in reading groups in the UK. They range from informal groups of friends or colleagues who meet in someone’s home or at the local pub,to discuss a book. If you want something a bit more structured,lots of libraries have reading groups and could have a broader group of members.
  Statistics
  The BBC recently conducted a survey called Going solo:single life in the 21st century. You can look at the overall results or search by area. It found that:
  *69% of people thought that the gym was a good place to meet new
  *Pubs or clubs were considered to be good meeting places by 58% of people in the UK
  *68% thought that work was a good place to meet people
  *72% thought that internet chat was not an ideal way to meet people
()56.“Green Gym”in Paragraph 3 refers to an activity in which you can________.
A.have night classes with like-minded people
B.do something good for the environment on your own
C.discuss a book with other members at a pub
D.benefit the environment while doing outdoor exercise
()57.Which of the following is a Green Gym activity?
A.Gardening work. B.Chatting on the Internet.
C.A charity fashion show. D.A dinner dance away from the treadmill.
()58.What’s the most popular place to meet new people outside of work?
A.Pubs or clubs.  B.The Internet. C.The working place. D.The gym.

There is an old saying:No one thinks he’s a bad driver. Here’s an updated 21st century version: No one thinks he sends annoying (令人烦恼的) e-mails.
But, plenty of us do.
A Princeton University research found that 22 per cent of Americans say e-mail has added to their work pressures and caused misunderstandings. Here’s a guide on e-mail etiquette (礼节) to help you avoid being annoying.
Experts say there are three types of e-mails with different rules-close friends, office and public e-mails.
The close friends e-mail
You can send your lover, your closest friends and your siblings (brothers and sisters) anything, from jokes to “you got to see this!”. But bear in mind that not everyone shares your sense of humour and you may expose them to viruses.
The office e-mail
Don’t add to people’s workload. Keep e-mails short and to the point.
◆Make the subject line factual and brief.
◆Write in clear, concise (简练的) sentences.
◆Provide your name and phone number at the end.
The public e-mail
Occasionally we have to send an e-mail to a group of people. If possible, write your public e-mails with a who, what, when, where structure. For example:
Who: All members of the soccer team
What: Team photo
When: Saturday, March 25, at noon
Where: Playing field 2.
Finally, before you hit “Send”, check the following:
◆Is the e-mail a “flame”? Never send an e-mail in anger, It could stay around forever and haunt (萦绕心头) your professional and personal life.
◆Check the “To” field. Is this really who you want to send the message to?
◆Spell-check the message. Does it have an error that can affect you badly?
68. The writer may want to tell the reader that _____.
A. mails online are often sent to wrong places
B. different e-mails should be written in different ways
C. sending office e-mails is sure to add to people’s workload
D. the public e-mail is usually sent to a large number of people
69. According to the writer, _____.
A. e-mails with some misspellings may hurt the receiver
B. before sending an e-mail, the sender should ask someone to check it
C. jokes sent to a close friend online sometimes may be harmful
D. about 80% of Americans like sending and receiving e-mails
70. If an e-mail is a “flame”, the sender of it must be very _____ at the moment.
A. angry B. excited C. worried D. disappointed

Everywhere you look, large quantities of information in the world are pouring. This data flood is already starting to transform business, government, science and everyday life. It has great potential for good — as long as consumers, companies and governments make the right choices about when to restrict the flow of data, and when to encourage it.
A few industries have led the way in their ability to gather and take advantage of the data. Credit-card companies monitor every purchase and can identify cheats with a high degree of accuracy. Stolen credit cards are more likely to be used to buy hard liquor than wine, for example, because it is easier to overlook. Insurance firms are also good at combining clues to spot doubtful claims: dishonest claims are more likely to be made on a Monday than a Tuesday, since policyholders (保险客户) who stage accidents tend to assemble friends as false witnesses over the weekend. By combining many such rules, it is possible to work out which cards are likeliest to have been stolen, and which claims are untrue. By analyzing “basket data”, supermarkets can make promotions to appeal to particular customers’ preferences. The oil industry uses supercomputers to help them before drilling wells.
But the data flood also poses risks. There are many examples of databases being stolen: disks full of social-security data go missing, laptops loaded with tax records are left in taxis, credit-card numbers are stolen by online purchase. The result can be privacy made public, identity stolen and cheats permitted large space. Rather than owning and controlling their own personal data, they very often find that they have lost control of it.
The best way to deal with the data flood is to make more data available in the right way, by requiring greater transparency in several areas. First, users should be given greater access to and control over the information held about them, including whom it is shared with. Google allows users to see what information it holds about them, and lets them delete their search histories or modify the targeting of advertising, for example. Second, organizations should be required to disclose details of security breaches (安全漏洞), as is already the case in some parts of the world, to encourage bosses to take information security more seriously. Third, organizations should be subject to an annual security check, with the resulting grade made public (though details of any problems exposed would not be). This would encourage companies to keep their security measures up to date.
64. What is the best title for this passage?
A. Information FloodB. Benefits of Data Flood
C. Harms of Data Flood D. How to Use Data in a Right Way
65. From the passage we can infer that _____.
A. lots of data are lost because of hardware problems
B. online purchases are becoming more and more popular
C. credit cards are not so secure to use and will go out of use very soon
D. insurance firms have to investigate before they confirm their policyholders’ claims
66. Which of the following is the writer’s opinion about how to deal with the data flood?
A. Personal information should be used for public benefits.
B. The users should be given the right to access public information.
C. Companies should update their measures to guarantee their data safety.
D. Organizations should keep their resulting grade of security checks unknown to the public.
67. From the passage we can conclude that _____.
A. the data flood makes peoples’ life less convenient and more expensive
B. companies and insurance firms are responsible for the data flood
C. the information flood is more useful to organizations than to individuals
D. the information flood has both positive and negative influence on modern life

Did you get a flu shot this year? For the first time, the Centers for Disease Control and Prevention in the US is recommending that all children ages 6 months through 18 years receive the flu vaccine.
Vaccines battle diseases caused by bacteria and viruses. A weakened form of the germ is introduced into the body. The body makes special substances called antibodies to fight the germs. If the actual germs were to attack, the antibodies would fight them.
Because there are many kinds of flu viruses, scientists must create a new vaccine formula (配方) each year. Researchers must make a prediction.
“The flu vaccine is not as effective as the polio (小儿麻痹症) vaccine or the measles(麻疹) vaccine,” says Dr. William Schaffner of Vanderbilt University School of Medicine.
“It’s not a great vaccine, but it is quite a good vaccine.”
But a flu vaccine doesn’t work for everyone. There are certain people who should be careful about taking it. Because the vaccine is produced from eggs, those who are allergic (过敏的) to eggs should not take it. If you have a fever, you should wait until you recover.
Some people are afraid that they might get the flu from the flu shot. Scientist say that it is not possible, because the viruses in the flu shot are inactivated (灭活的). But some minor side effects such as low-grade fever and body aches could occur. If they do, they begin soon after the shot and usually last only one to two days.
60. What is an antibody?
A. An antibody is a vaccine formula
B. An antibody is a germ that is introduced into the body
C. An antibody is a vaccine that fights diseases.
D. An antibody is a special substance to fight germs.
61. Which of the following statements is NOT true?
A. Not everyone is suitable for the flu vaccine.
B. The flu vaccine is not so effective as the measles vaccine
C. Flu viruses create new vaccine formulas each year.
D. People can’t take the flu vaccine at anytime.
62. It can be inferred from the text that _____.
A. scientists should change the vaccine formula each year
B. vaccines can battle diseases caused by bacteria and viruses
C. all children ages 6 months through 18 years can receive the flu vaccine
D. scientists are responsible for the side effects of the flu vaccine
63. Which of the following would be the best title for the text?
A. The flu vaccine B. Side effects of the flu vaccine
C. How to prevent the flu D. Not everyone can get the flu shot

Speeding off in a stolen car, the thief thinks he has got a great catch. But he is in for an unwelcome surprise. The car is fitted with a remote immobilizer (发动机防盗系统), and a radio signal from a control centre miles away will ensure that once the thief switches the engine off, he will not be able to start it again.
The idea goes like this. A control box fitted to the car contains a mini-cellphone, a micro-processor and memory, and a GPS satellite positioning receiver. If the car is stolen, a coded cellphone signal will tell the control centre to block the vehicle’s engine management system and prevent the engine being restarted.
In the UK, a set of technical fixes is already making life harder for car thieves. “The pattern of vehicle crime has changed,” says Martyn Randall, a security expert. He says it would only take him a few minutes to teach a person how to steal a car, using a bare minimum of tools, but only if the car is more than ten years old. Modern cars are far tougher to steal, as their engine management computer won’t allow them to start unless they receive a unique ID code beamed out by the ignition key (汽车等的点火开关).
In the UK, technologies like this have helped achieve a 31% drop in vehicle-related crime since 1997. But determined criminals are still managing to find other ways to steal cars, often by getting hold of the owner’s keys .And key theft is responsible for 40% of the thefts of vehicles fitted with a tracking system. If the car travels 100 metres without the driver confirming their ID, the system will send a signal to an operations centre that it has been stolen. The hundred metres minimum avoids false alarms due to inaccuracies in the GPS signal. Staff at the centre will then contact the owner to confirm that the car really is missing, and keep police informed of the vehicle’s movements via the car’s GPS unit.
56. What’s the function of the remote immobilizer fitted to a car?
A. To allow the car to lock automatically when stolen
B. To prevent the car thief from restarting it once it stops
C. To help the police make a surprise attack on the car thief
D. To prevent car theft by sending a radio signal to the car owner
57. By saying “The pattern of vehicle crime has changed” (Lines1-2,Para.3) Martyn Randall suggests that _____.
A. Self-prepared tools are no longer enough for car theft
B. the thief has to make use of computer technology
C. it takes a longer time for the car thief to do the stealing
D. the thief has lost interest in stealing cars over 10 years old
58. What is essential in making a modern car tougher to steal?
A. A GPS satellite positioning receiver
B. A unique ID card
C. A special cellphone
D. A code ignition key
59. Why does the tracking system set a 100-metre minimum before sending an alarm to the operations centre?
A. To give the driver time to contact the operation centre
B. To allow for possible errors in the GPS system
C. To keep police informed of the car’s movements
D. To leave time for the operations centre to give an alarm

Copyright ©2020-2025 优题课 youtike.com 版权所有

粤ICP备20024846号