题目内容

[A] Communication makes both party know more about each other which make an agreement.[B] The argument itself can not expand knowledge.[C] Reasonable debate plays a postive role in knowledge adrances[D] A basic common knowledge mabe contribution to the argument from which people learn something.[E] Generally, knowledge is gained by argument.[F] Learning can be interrupted by the argument.Do we learn more from people whose views we share in common than from those whose ideas contradictors The speaker claims so, for the reason that disagreement can cause stress and inhabit learning. I concede that undue discord can impede learning. Otherwise, in my view we learn far from discourse and debate with those whose ideas we oppose than from people whose ideas are in accord with our own.41.______Admittedly, under some circumstances disagreement with others can be counterproductive to learning. For supporting examples, one need look no further than a television set. On today’s typical television or radio talk show, disagreement usually manifests itself in meaningless rhetorical bouts and shouting matches, during which opponents vie to have their own message heard, but have little interest either in finding any common ground with or in acknowledging the merits of the opponent’s viewpoint. Understandably, neither the combatants nor the viewers learn anything meaningful. In fact, these battles only serve to reinforce the predispositions and biases of all concerned. The end result is that learning is impeded.42.______Disagreement can also inhibit learning when two opponents disagree on fundamental assumptions needed for meaningful discourse and debate. For example, a student of paleontology learns little about the evolution of an animal species under current study by debating with an individual whose religious belief system precludes the possibility of evolution to begin with. And, economics and finance students learn little about the dynamics of a laissez-faire system by debating with a socialist whose view is that a centralized power should control all economic activity.43.______Aside from the foregoing two provisions, however, I fundamentally disagree with the speaker’s claim. Assuming common ground between two rational and reasonable opponents willing to debate on intellectual merits, both opponents stand to gain much from that debate. Indeed it is primarily through such debate that human knowledge advances, whether at the personal, community, or global level.44.______At the personal level, by listening to their parents’ rationale for their seemingly oppressive rules and policies, teenagers can learn how certain behaviors naturally carry certain undesirable consequences. At the same time, by listening to their teenagers concerns about autonomy and about peer pressures parents can learn the valuable lesson that effective parenting and control are two different things. At the community level, through dispassionate dialogue an environmental activist can come to understand the legitimate economic concerns of those whose jobs depend on the continued profitable operation of a factory. Conversely, the latter might stand to learn much about the potential public-health price to be paid by ensuring job growth and a low unemployment rate. Finally, at the global level , two nations with opposing political or economic interests can reach mutually beneficial agreements by striving to understand the other’s legitimate concerns for its national security, its political sovereignty, the stability of its economy and currency, and so forth.45.______In sum, unless two opponents in a debate are each willing to play on the same field and by the same rules, I concede that disagreement can impede learning. Otherwise, reasoned discourse and debate between people with opposing viewpoints is the very foundation upon which human knowledge advances. Accordingly, on balance the speaker is fundamentally correct. 45

查看答案
更多问题

SoBig. F was the more visible of the two recent waves of infection because it propagated itself by e-mail, meaning that victims noticed what was going on. SoBig. F was so effective that it caused substantial disruption even to those protected by anti-virus software. That was because so many copies of the virus spread (some 500,000 computers were infected) that many machines were overwhelmed by messages from their own anti-virus software. On top of that, one common counter-measure backfired, increasing traffic still further. Anti-virus software often bounces a warning back to the sender of an infected e-mail, saying that the e-mail in question cannot be delivered because it contains a virus, soBig. F was able to spoof this system by "harvesting" e-mail addresses from the hard disks of infected computers. Some of these addresses were then sent infected e-mails that had been doctored to look as though they had come from other harvested addresses. The latter were thus sent warnings, even though their machines may not have been infected. Kevin Haley of Symantec, a firm that makes anti-virus software, thinks that one reason SoBig. F was so much more effective than other viruses that work this way is because it was better at searching hard-drives for addresses. Brian King, of CERT, an internet-security centre at Carnegie-Mellon University in Pittsburgh, notes that, unlike its precursors, SoBig. F was capable of "multi-threading", it could send multiple e-mails simultaneously, allowing it to dispatch thousands in minutes. Blaster worked by creating a "buffer overrun in the remote procedure call". In English, that means it attacked a piece of software used by Microsoft’s Windows operating system to allow one computer to control another. It did so by causing that software to use too much memory. Most worms work by exploiting weaknesses in an operating system, but whoever wrote Blaster had a particularly refined sense of humour, since the website under attack was the one from which users could obtain a program to fix the very weakness in Windows that the worm itself was exploiting. One way to deal with a wicked worm like Blaster is to design a fairy godmother worm that goes around repairing vulnerable machines automatically. In the case of Blaster some-one seems to have tried exactly that with a program called Welch. However. according to Mr, Haley, Welch has caused almost as many problems as Blaster itself, by overwhelming networks with "pings" --signals that checked for the presence of other computers. Though both of these programs fell short of the apparent objectives of their authors, they still caused damage. For instance, they forced the shutdown of a number of computer networks, including the one used by the New York Times newsroom, and the one organizing trains operated by CSX, a freight company on America’s east coast. Computer scientists expect that it is only a matter of time before a truly devastating virus is unleashed. SoBig. F damaged computer programs mainly by

A. sending them an overpowering number of messages.
B. harvesting the addresses stored in the computers.
C. infecting the computers with an invisible virus.
D. destroying the anti-virus software of the computers.

There (1) not one type of reading but several according to your reasons for reading. To read carefully, you have to (2) your reading speed and technique (3) your aim (4) reading. Skimming is a technique necessary for quick and efficient reading.When skimming, you (5) the reading (6) quickly in order to get the (7) of it, to know how it is organized, (8) an idea of the tone or the intention of the writer. Skimming is (9) an activity which (10) an overall view of the text and (11) a definite reading competence.Skimming doesn’t need reading all the material, but it doesn’t mean that it is an (12) skill for the lazy, because it need a high degree of alertness and concentration.When you read, you usually start with (13) understanding and move towards detailed understanding rather than working the other way round. But (14) is also used after you have already carefully studied and you need to (15) the major ideas and concepts.In order to be able to skim quickly and (16) through a text, you should know where to look for what you want. In preview skimming you read the introductory information, the headings and subheadings, and the summary, if one is provided. (17) this skimming, decide whether to read the material more thoroughly, and select the appropriate speed (18) you read.The same procedure (19) for preview skimming could also be used to get an overview. Another method would be to read only key words. This is done by omitting the unnecessary words, phrases, and sentences.In order to skim efficiently and fulfill your purpose, (20) practice is necessary. Read the following text. Choose the best word(s) for each numbered blank and mark A, B, C or D on ANSWER SHEET 1. (10 points)2()

A. adapt
B. adopt
C. change
D. adept

Like many other aspects of the computer age, Yahoo began as an idea, (1) into a hobby and lately has (2) into a full-time passion. The two developers of Yahoo, David Filo and Jerry Yang, Ph. D candidates (3) Electrical Engineering at Stanford University, started their guide in April 1994 as a way to keep (4) of their personal interest on the Internet. Before long they (5) that their homebrewed lists were becoming too long and (6) . Gradually they began to spend more and more time on Yahoo.During 1994, they (7) yahoo into a customized database designed to (8) the needs of the thousands of users (9) began to use the service through the closely (10) Internet community. They developed customized software to help them (11) locate, identify and edit material (12) on the Internet. The name Yahoo is (13) to stand for "Yet Another Hierarchical Officious Orale", but Filo and Yang insist they selected the (14) because they considered themselves yahoos. Yahoo itself first (15) on Yang’s workstation, "akebono", while the search engine was (16) on Filo’s computer, "Konishiki".In early 1995 Marc Andersen, co-founder of Netscape Communication in Mountain View, California, invited Filo and Yang to move their files (17) to larger computers (18) at Netscape. As a result Stanford’s computer network returned to (19) , and both parties benefited. Today, Yahoo (20) organized information on tens of thousands of computers linked to the web. 11()

A. fluently
B. efficiently
C. exactly
D. actually

Almost all our major problems involve human behavior, and they cannot be solved by physical and biological technology alone. What is needed is a technology of behavior, but we have been slow to develop the science from which such a technology might be drawn, (46) One difficulty is that almost all of what is called behavioral science continues to trace behavior to states of mind, feelings, traits of character, human nature, and so on. Physics and biology once followed similar practices and advanced only when they discarded them, (47) The behavioral sciences have been slow to change partly because the explanatory items often seem to be directly observed and partly because other lands of explanations have been hard to find. The environment is obviously important, but its role has remained obscure. It does not push or pull, it selects, and this function is difficult to discover and analyze. (48). The role of natural selection in evolution was formulated only a little more than a hundred years ago, and the selective role of the environment in shaping and maintaining the behavior of the individual is only beginning to be recognized and studied. As the interaction between organism and environment has come to be understood, however, effects once assigned to states of mind, feelings, and traits are beginning to be traced to accessible conditions, and a technology of behavior may therefore become available. It will not solve our problems, however, until it replaces traditional pre-scientific views, and these are strongly entrenched. Freedom and dignity illustrate the difficulty. (49) They are the possessions of the autonomous (self-governing) man of traditional theory, and they are essential to practices in which a person is held responsible for his conduct and given credit for his achievements. A scientific analysis shifts both the responsibility and the achievement to the environment. It also raises questions concerning "values". Who will use a technology and to what ends (50) Until these issues are resolved, a technology of behavior will continue to be rejected, and with impossibly the only way to solve our problems. One difficulty is that almost all of what is called behavioral science continues to trace behavior to states of mind, feelings, traits of character, human nature, and so on.

答案查题题库