新标准大学英语(第二版)综合教程2-unit3-unit-test(共8页)

上传人:202****8-1 文档编号:58447676 上传时间:2022-02-28 格式:DOC 页数:8 大小:487KB
返回 下载 相关 举报
新标准大学英语(第二版)综合教程2-unit3-unit-test(共8页)_第1页
第1页 / 共8页
新标准大学英语(第二版)综合教程2-unit3-unit-test(共8页)_第2页
第2页 / 共8页
新标准大学英语(第二版)综合教程2-unit3-unit-test(共8页)_第3页
第3页 / 共8页
点击查看更多>>
资源描述
精选优质文档-倾情为你奉上Part I: Vocabulary and Structure Section A: Complete each sentence using the correct word or expression from the box. custody destiny anonymous commonplace deception staunchest vicinity blessing wits exclaimed1. The investigators searched her house after they received a(n) tip over the phone. 2. There were a hundred or so hotels in the of the railway station. 3. He was accused of obtaining money by . 4. Tony was caught shoplifting and has been in police since last night. 5. We figured that in twenty years each of us ought to have our worked out and our fortunes made, whatever they were going to be. 6. She in horror when she saw a snake in the grass. 7. He always was the truest, old chap in the world. I will never forget him. 8. Misfortune might be a in disguises. 9. Unfortunately, pickpockets are incredibly in many large cities. 10. Controlled drinking can dramatically help people keep their as they age. Section B: Choose the best way to complete the sentences.11. The police presence at airports seemed to double _ after the bomb threat. A. overage B. overdue C. overnight D. overall 12. In order to _ information from people, investigators sometimes use questionable methods. A. extort B. extract C. exchange D. exert 13. It is a federal crime to _ a lawyer in a courtroom. A. impersonate B. personify C. personalize D. identify 14. After the September 11 _ attacks in the United States, the government took extreme measures to make sure it wouldnt happen again. A. radical B. revolutionary C. terrorist D. activist 15. The new measures they have taken, though _ effective, have been praised by the manager. A. completely B. moderately C. doubtfully D. considerably 16. I think pop-up ads on the Internet and spam in my e-mail inbox are terribly _ so much so that it might be an invasion of privacy. A. offensive B. effective C. defensive D. interactive 17. Online retailers such as Amazon and iTunes are so successful that they have become _ names. A. obvious B. household C. opportunistic D. offensive 18. The new facial recognition security system _ knows who you are and if you have access to the building. A. anonymously B. obviously C. simultaneously D. automatically 19. In the experiment we kept a(n) _ eye on the developments and recorded every detail. A. artful B. watchful C. doubtful D. eventual 20. After my store was broken into, the police officer drove me home as a _. A. prerequisite B. prevention C. pretension D. precaution Section C: Complete each sentence with a suitable word.21. We never do anything exciting any more we seem to be stuck a groove. 22. The other spectator, submerged his overcoat, listened with interest. 23. Excuse me. Do you have any information file about the Frank Spacey case? 24. You can usually count the police to help you out when youre in trouble. 25. As she went past there was a gust strong perfume. 26. I know the security guards need to ask for identification, but I was very unhappy with the way he went (about)it. 27. After you check your bank balance online, remember to log so no one else can steal your information. 28. I would have helped out last weekend only I had known you were moving. 29. We need to take precaution fire as a way to protect property or even our lives. 30. In such a heavy traffic jam, its impossible to reverse a taxi, (let alone) the bus. Part II: Banked Cloze Questions 31 to 40 are based on the following passage.Last summer, I went on vacation to Spain. On only the second day, my wallet was stolen. It was a very (31)time, and I was (32) frustrated and angered. At first, I was angry I had lost the cash in my wallet. Then, I realized that the thief now had my credit cards and ID card! With only a little practice, he or she could easily (33) my signature and make hundreds of (34) purchases.I immediately called the credit card companies to cancel my cards. The more I thought about it, the angrier I got. How could someone commit such (35)? The (36) deceitfulness in stealing other peoples wallets really made me wonder how someone could be completely without (37)standards or morals.Thankfully, I still had travelers checks which are (38)accepted in Spain at my hotel. However, I was no longer in a good (39) to enjoy my vacation. In my opinion, the authorities must attack this problem (40); its not enough to just focus on pickpockets or identify theft that happens locally. With the Internet, theres no such thing as local anymore. Part III: Reading Comprehension Questions 41 to 45 are based on the following passage.Many people often wonder about the terms blue-collar crime and white-collar crime. Whats the difference? Is one worse than the other? Are they committed by different kinds of people? What does crime have to do with the color of your shirt?First, it is helpful to understand that blue-collar workers are those people employed in jobs that require manual labor, and white-collar workers perform non-manual labor in an office setting. The terms can be dated back to the 19th century, when industrial workers and manual laborers were required to wear clothing suitable to the difficult work which was typically a blue work shirt or blue coveralls. In contrast, professional workers in offices generally wore white dress shirts.Today, the primary distinctions between white-collar and blue-collar crime are the social class to which the suspect belongs and the type of crime committed. Blue-collar crimes are committed by individuals from lower social classes (ie, less privileged backgrounds with fewer professional and societal opportunities), and white-collar crimes, conversely, are committed by individuals from higher, more affluent social classes.The exact nature of the crime is also a defining factor of blue-collar versus white-collar crime. Blue-collar crimes tend to be relatively obvious (eg, vandalism, robbery, and shoplifting) or violent (eg, assault, arson, and murder) crimes that are committed out of desperation. White-collar crimes, however, are quieter crimes (eg, bribery, embezzlement, and computer crime) committed by people who have the means and opportunity to exploit professional situations.It is impossible to say that one type of crime is worse than the other, for both have serious and lasting effects for the victims. Blue-collar crime gets more consistent exposure in the media, so we usually hear more about it on a regular basis. However, even though we might not hear many news stories about white-collar crime, it still occurs every day. The increase in computer crime and rising instances of identify theft are testament to that. 41. Which of the following would make the best title for this article? A. White-Collar Crime: A Victimless Crime. B. A History of Blue-Collar and White-Collar Workers. C. Blue-Collar Crime Versus White-Collar Crime: An Explanation. D. An Examination into Blue-Collar Crime. 42. With which of the following statements would the author likely agree? A. Identity theft is an example of blue-collar crime. B. All crime is equally bad for the victims. C. Many white-collar criminals have good jobs. D. Incidents of blue-collar crime are decreasing. 43. The writer suggests that _. A. blue-collar crime is heavily covered by the news media B. white-collar crime is heavily covered by the news media C. both types of crime are heavily covered by the news media D. crime is not heavily covered by the news media 44. Which paragraph provides a historical context for modern-day blue-collar and white-collar? A. Paragraph 2. B. Paragraph 3. C. Paragraph 4. D. Paragraph 5. 45. Which of the following would be an example of white-collar crime? A. Burglary. B. Rape. C. Kidnapping. D. Forgery. 专心-专注-专业
展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 办公文档 > 教学培训


copyright@ 2023-2025  zhuangpeitu.com 装配图网版权所有   联系电话:18123376007

备案号:ICP2024067431-1 川公网安备51140202000466号


本站为文档C2C交易模式,即用户上传的文档直接被用户下载,本站只是中间服务平台,本站所有文档下载所得的收益归上传人(含作者)所有。装配图网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。若文档所含内容侵犯了您的版权或隐私,请立即通知装配图网,我们立即给予删除!