资源简介 Unit 3 The Internet序号 内容Part1 话题写作技法指导Part2 相关话题变式练(阅读+完型+语法)Part3 话题写作练(应用文、读后续写)(Part1话题写作技法指导)※话题综述本单元主题是人与社会,围绕有关互联网的话题展开。二十一世纪是信息时代,越来越多的人接人互联网、使用互联网,网民也逐渐向低龄化发展。互联网给我们的生活、工作和学习带来了巨大的变化,网上购物、点餐、打车、买火车票、买飞机票等迅速普及,已成为日常生活场景。在线金融、在线教育、在线政务、在线医疗等在线服务层出不穷,极大方便了人们的生产和生活。与此同时,网络信息安全、网络霸凌、网络诈骗等侵害网民人身和财产安全的问题也暴露出来。这提醒人们在尽享网络便利的同时,也要增强防护意识,保护个人隐私和上网安全。※话题写作写作任务结合本单元所学内容,写一篇关于如何保障个人网上信息安全的博文,内容包括:1. 提出问题;2. 就问题提出个人解决建议;3. 请读者留言评论。注意:词数: 80左右。________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________审题谋篇【审题结构】体裁 人称 时态 结构应用文 第一二人称 (主要为)一般现在时 3段式主题内容 关于如何保障个人网上信息安全的博文【谋篇布局】段落结构 首段 介绍背景并引入话题正文 介绍具体建议结尾 请读者留言评论遣词造句criticalinformation securityfocusdeservedevote toenhancemaintenancethe access toAs time goes onguaranteeMany companies devote to the information security technology, providing advanced network security solutions.With the cooperated efforts from all aspects, our internet safety should be guaranteed.妙笔成篇As time goes on, going surfing on the Internet becomes more and more popular. The critical importance of information security becomes the focus of people's concern, which does deserve the unprecedented emphasis of all the people. So, the related authorities, enterprises, institutions and organizations place the high priority on it.Many companies devote to the information security technology, providing advanced network security solutions. Firewall just is an effective measure of network security. For the information owners and monitors, they must drive their efforts to enhance the security protection and maintenance. For example, a strict control over the access to the secret data shouldn't be absent.What’s more, the security issues should be considered at the legislative level, so we are clamoring for a law designed to clamp down on various cyber crimes.With the cooperated efforts from all aspects, our internet safety should be guaranteed. Do you have any suggestions about internet safety Welcome to share your comments below.(Part2相关话题练(阅读+完型+语法))Passage1阅读理解Researchers at the University of Alabama in Birmingham suggest that brainwave-sensing headsets (耳麦), also known as EEG headsets, need to do more to protect users after a study which shows hackers (黑客) could guess a user’s bank account passwords by monitoring his brainwaves.Nitesh Saxena, Ph.D., professor in the UAB College of Computer and Information Sciences Department, and his team found that a person who stopped a video game and entered into a bank account while wearing an EEG headset was at a risk for having his passwords stolen by a bad software program. Saxena and his team used one EEG headset that could be bought by customers online to show how easily an ill software program could eavesdrop on a user’s brainwaves. While typing, a user’s inputs meet with their visual processing, as well as hand, eye and head muscle movements. All these movements are caught by EEG headsets.The team asked 12 people to type passwords into a text box as if they were entering into an online account while wearing an EEG headset, in order for the software to train itself on the user’s typing and the present brainwave. The team found that, after a user entered passwords within the ill software program that could make educated guesses about the passwords, the user entered by reading the EEG data recorded. It increased the chance of guessing a six-letter password from one in 500,000 to one in 5.“Given the growing popularity of EEG headsets and the different ways in which they could be used, they will become part of our daily lives,” Saxena said. “It is important to study the possible risks together with this new technology to raise users’ attention to the risks and develop solutions to the bad attacks.” One possible solution suggested by Saxena and his team is the insertion (插入) of noises anytime a user types a password while wearing an EEG headset.1.How do hackers guess passwords of a user’s bank account A.They use a software program.B.They use a new-type computer.C.They guess the user’s brainwaves.D.They talk with the user on the net.2.The underlined words “eavesdrop on” in Paragraph 2 refer to “________”.A.make full use of B.watch carefullyC.record or write down D.gain or get secretly3.What was the result of the research of Saxena and his team in Paragraph 3 A.They made a very exact answer.B.They got close to the passwords.C.They got a part of the passwords.D.They failed to get the passwords.4.Why do EEG headsets need to do more to develop solutions A.More and more hackers come about.B.More people use online bank accounts.C.EEG headsets will become more popular.D.EEG headsets still have problems in qualityPassage2阅读理解“Instagram (a social networking app) will cut out many users’ accounts on December 20. To protect your account, repost this warning #KeepMyAccountSafe.” Every few months, it happens again — dozens of annoying posts from my kids’ friends suddenly start to appear on my Instagram news feed.According to a new study by Stanford University, most kids don’t know what news is false. Researchers asked more than 7,800 middle school and high school students to complete 56 tasks, like distinguishing an advertisement from a real news story on a website and determining which blog in a series was most reliable. They found that students judged the credibility of blogs based not on the source of the material, but on how much detail they contained, or whether a large photo was attached.“Many people assume that because young people are fluent in social media, they can distinguish fake news, but our work shows the opposite to be true,” wrote the lead study author Sam Wineburg, a professor at Stanford’s Graduate School of Education.Both Google and Facebook are now taking steps to prevent misleading news from making its way on their platforms, but they won’t be able to eliminate it completely. That is why it’s now more important than ever to teach our kids to think critically when it comes to believing various information sources.“In the coming months, we look forward to sharing our assessments and working with educators to create materials that will guide young people in the sea of disinformation they encounter online,” said Wineburg.5.How does the author introduce the topic of the passage A.By stating opinions. B.By citing sayings.C.By quoting a post. D.By showing findings.6.According to researchers, what determines the credibility of online information A.The size of relevant photos B.The popularity of the website.C.The amount of detail. D.The source of the material.7.What does the underlined word “eliminate” mean in Paragraph 4 A.Update. B.Remove. C.Estimate. D.Digest.8.Which of the following can be the best title for the passage A.Stronger Together: The Internet Changes Our LifeB.Reliable News Has No Place on Social MediaC.Be Careful: Kids Are Bad at Identifying Fake NewsD.Educators Have a Long Way to Go to Guide the Young.Passage3七选五Online SafetyToday I thought I’d blog about a question that has been asked many times—how do you stay safe online and avoid bad experiences on the Internet I am not an expert. ____9____First of all, there’s the golden rule of the Internet: If you see or read something that makes you feel uncomfortable, leave the site immediately. ____10____Second, protect your privacy. ____11____ Someone might use the information to steal your identity. Identity theft is a common and serious problem.Third, be polite. Being online is no excuse for being rude, and you don’t want to become a target for a troll or cyberbully. A troll is a person who posts comments or questions in order to stir up trouble online. Trolls often use several false names so that they can stay on a site. ____12____ Like a troll, a cyberbully will also write something mean but it is usually directed at particular people. He or she may also post embarrassing photos and information about those people. However, the more polite you are, the less likely it is you will be attacked.Have you had any bad experiences online, or do you have some good advice for staying safe ____13____A.What is cyberbully B.Post your comments below!C.Don’t let out your online habits.D.Don’t post comments or click on anything.E.Don’t give out your address or phone number.F.A cyberbully uses the Internet to be mean to others.G.But many years as a blogger have taught me a thing or two.Passage4完形填空Often in life there are times when we know what we should do, but due to inconvenience and laziness, we don’t. We know that we should install the software updates that our___14___keep reminding us about but we always___15___doing it for various excuses.Yes, it is___16___not being able to use our phones for a few minutes, but this is important. So to___17___you why you should, I’m going to try the “carrot” and “stick”___18___.First, let’s see the stick. ___19___you don’t keep your phone up-to-date, you’re putting your phone at risk from hackers (黑客). Why Because digital___20___is an arms race. Hackers will find holes and new ways to___21___our phones, so smartphone companies release new versions of the phones operating system (OS) software to___22___the problem. Then hackers look through the new version of the software for new____23____they can use for attack. And so on forever. This____24____that if you’ve not updated your phone to the latest version of the OS, your phone is____25____. So it is important to stay up-to-date to____26____your phone is wearing the toughest digital armour (盔甲).There’s a carrot for you too. The genuinely____27____part about software updates is that your phone will receive new____28____and functionality without you needing to buy a new handset! In fact, updates are____29____so transformative that it can be like ____30____an entirely new phone.Ultimately, my____31____is this: keeping your phone up-to-date is a win-win. Not only will you keep it____32____, but you might also have a better phone afterwards. So ____33____your settings app now, and finally install those updates!14.A.computers B.cars C.phones D.televisions15.A.suggest B.practice C.admit D.postpone16.A.convincing B.annoying C.interesting D.confusing17.A.persuade B.deny C.warn D.question18.A.element B.effect C.approach D.argument19.A.Though B.Before C.Unless D.If20.A.access B.security C.revolution D.download21.A.show off B.look for C.break into D.put aside22.A.fix B.understand C.share D.describe23.A.illnesses B.weaknesses C.techniques D.excuses24.A.means B.recommends C.demands D.promises25.A.for free B.in place C.on sale D.in danger26.A.announce B.guarantee C.recognize D.pretend27.A.amusing B.strange C.exciting D.convenient28.A.features B.messages C.orders D.checks29.A.gradually B.previously C.economically D.occasionally30.A.receiving B.inventing C.selecting D.introducing31.A.concern B.guess C.solution D.point32.A.simple B.safe C.clean D.silent33.A.pay for B.compete with C.turn on D.refer toPassage5语法填空Jack is a hacker, running a team of hackers. They spend days discovering ways to break into anything that can connect to the Internet ___1___ (access) information never meant to be seen. If they get to it before a criminal does, then they’ve done the job.Jack is proud of what he does for ___2___ living. In Hollywood, hackers are often described as hooded (戴着兜帽的) figures in dark rooms ___3___ (involve) in illegal activity while tapping keyboards. ___4___ (actual), hackers are experts at programming and problem-solving with panies hire hackers to find their breaking point before criminals do.Hacking is an activity, and what separates any activity from a crime ___5___ (be) permission. Drivers are free to drive, ___6___ they do not have permission to drive 150 miles per hour — that’s illegal. Bankers can transfer their clients money, but if they do so ___7___ permission, that’s illegal.Hacking isn’t a criminal activity. Someone who involves in the illegal use of hacking should not ___8___ (call) a “bad hacker” but a “threat actor”. Hackers are people like Jack and his team at IBM — security ___9___ (profession).Hackers play a critical role in keeping companies and people ___10___ (safety). Imagine what bad things could happen without them.(Part3话题写作练(应用文+读后续写))※应用文练Passage1随着网络的普及,网络诈骗,网络欺凌等青少年网络安全问题成为大家关注的一个焦点,李华所在的班级围绕“网络安全问题”召开主题班会,假定你是李华,以“How to stay safe online”为标题,写一篇发言稿。主要包括以下内容:1. 强调网络安全的重要性;2. 提出建议(如保护好个人隐私、文明上网等);注意:1. 词数80词左右;2. 可适当增加情节,以使行文连贯。__________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________Passage2假如你是李华,最近你们学校开展了英语博客作文比赛,这种新颖的形式吸引了很多学生来参加。你也很感兴趣,所以请你发表一篇关于Social Media and Teen Health的博客。注意:词数80左右;可以适当增加细节,以使行文连贯。※读后续写练Passage3阅读下面材料,根据其内容和所给段落开头语续写两段,使之构成一篇完整的短文。续写词数应为150左右。Losing a parent is one of the most painful parts of life. No matter how old we are when they leave us, it can be a heartbroken experience. Our memories are all that is left of them and happy reminders of their love turn into our most valuable treasures. That's how Mara Soriano feels about the teddy bear that she tragically lost in her recent move to a new apartment.Diagnosed with cancer, Mara Soriano's mother, Marilyn, gave her daughter the bear as a gift in 2017. After her mother's death last June, the gift became even more special. "That bear was basically the last reminder of my mom. It was her voice that accompanied me," she said in an interview.The plush (长毛制的) toy didn't cost a lot, but it contained a recording of her mother's voice telling her that she loved her and was proud of her. The bear, called Mama Bear, was in the backpack that contained electronics like an iPad and a Nintendo Switch. When the bag was stolen last week during the move, the 28 -year-old was heartbroken-- not for the gadgets(小装置), but for Mama Bear.Mara posted a photo of her and her Mama Bear on Instagram, explaining the importance of the bear. Millions of users were touched by the story. More and more people were talking about the bear, but there was no good news for Mara. So again and again she posted online about the item and the story behind it, hoping it could catch more viewers' attention in a big way.Actor Ryan Reynolds was moved by Mara's story and then posted an appeal(请求)for Mama Bear's safe return. "I think we all need this bear to come home," he wrote. Along with the message, he also offered a reward for the people who found the bear.注意:1. 所续短文词数应为150词左右;2. 至少使用5个短文中标有下划线的关键词;3. 续写部分分为两段,每段开头已为你写好;4. 续写完成后,请用下划线标出你所使用的关键词语。Paragraph 1: Luckily, the Internet did its thing._____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________Paragraph 2: The email was from the woman who sent the bear back._____________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________参考答案Part2相关话题阅读练1.A 2.D 3.B 4.C【导语】这是一篇说明文。讲述了EEG耳机的安全性问题,研究人员发现用户在佩戴EEG耳机过程中,有着被黑客通过监测脑电波来窃取密码的风险,随着该耳机愈发普遍,建议需要付诸更多的努力来保护用户的安全信息。1.细节理解题。根据第二段首句“Nitesh Saxena, Ph.D., professor in the UAB College of Computer and Information Sciences Department, and his team found that a person who stopped a video game and entered into a bank account while wearing an EEG headset was at a risk for having his passwords stolen by a bad software program. (阿联酋大学计算机与信息科学系教授Nitesh Saxena博士和他的团队发现,当一个人在戴着EEG耳机暂停一个视频游戏并进入了一个银行账户时,他的密码有被不良软件程序窃取的风险)”可知,黑客是通过使用某个不良软件来窃取用户密码,所以选项A符合题意。故选A。2.词句猜测题。根据第一段“Researchers at the University of Alabama in Birmingham suggest that brainwave-sensing headsets (耳麦), also known as EEG headsets, need to do more to protect users after a study which shows hackers (黑客) could guess a user’s bank account passwords by monitoring his brainwaves. (伯明翰阿拉巴马大学的研究人员建议,脑电波传感耳机, 也被称为EEG耳机,需要做更多的工作来保护用户,因为一项研究显示黑客可通过监测用户的脑电波来猜出用户的银行账户密码)”和第二段首句“Nitesh Saxena, Ph.D., professor in the UAB College of Computer and Information Sciences Department, and his team found that a person who stopped a video game and entered into a bank account while wearing an EEG headset was at a risk for having his passwords stolen by a bad software program. (阿联酋大学计算机与信息科学系教授Nitesh Saxena博士和他的团队发现,当一个人在戴着EEG耳机暂停一个视频游戏并进入了一个银行账户时,他的密码有被不良软件程序窃取的风险)”可知,佩戴EEG耳机的用户很容易被不良软件监测脑电波,进而窃取他们的账户密码,由此可推断出此处“eavesdrop on”表示窃听,偷听的含义,呼应关键词“stolen”,所以D选项符合题意。故选D。3.细节理解题。由第三段“The team found that, after a user entered passwords within the ill software program that could make educated guesses about the passwords, the user entered by reading the EEG data recorded. It increased the chance of guessing a six-letter password from one in 500,000 to one in 5. (研究团队发现一名用户在不良软件程序中输入密码后(该不良软件可对密码进行有根据的猜测),用户通过读取记录的脑电图数据进入。它将猜出6位字母密码的几率从50万分之一提高到五分之一)”可知,他们最终得到的密码是接近于正确密码的。所以B选项“They got close to the passwords. (他们接近了正确密码)”符合题意。故选B。4.细节理解题。根据最后一段“Given the growing popularity of EEG headsets and the different ways in which they could be used, they will become part of our daily lives (鉴于EEG耳机的日益普及和它们的不同使用方式,它们将成为我们日常生活的一部分)”可知,因为EEG耳机在日常生活中越来越普遍,所以需要展开更多工作来研究解决方案。故选C。5.B 6.D 7.B 8.C【导语】这是一篇说明文。文章主要说明了斯坦福大学的一项新研究发现,大多数孩子不知道什么新闻是假的。文章介绍了这项研究开展的过程以及发现,研究人员指出应当教我们的孩子在相信各种信息来源时进行批判性思考。5.推理判断题。根据第一段“‘Instagram (a social networking app) will cut out many users’ accounts on December 20. To protect your account, repost this warning #KeepMyAccountSafe.’ Every few months, it happens again — dozens of annoying posts from my kids’ friends suddenly start to appear on my Instagram news feed. (“社交网络应用Instagram将于12月20日关闭许多用户的账户。为了保护您的账户,请转发此警告#KeepMyAccountSafe。” 每隔几个月,这种事情就会再次发生——来自孩子的朋友们的几十条烦人帖子会出现在我的Instagram动态中)”可推知,在第一段中作者通过引用自己Instagram动态中出现的一些说法来引入文章的主题。故选B。6.推理判断题。根据第二段中“According to a new study by Stanford University, most kids don’t know what news is false.(根据斯坦福大学的一项新研究,大多数孩子不知道什么新闻是假的)”和“They found that students judged the credibility of blogs based not on the source of the material, but on how much detail they contained, or whether a large photo was attached.(他们发现,学生们判断博客的可信度不是基于材料的来源,而是基于它们包含多少细节,或者是否附有一张大照片)”可知,研究人员认为,大多数孩子不知道什么新闻是假的,是因为他们判断博客的可信度不是基于材料的来源,由此推知,决定网络信息可信度的是材料的来源。故选D。7.词句猜测题。根据画线词所在句“Both Google and Facebook are now taking steps to control misleading news from making its way on their platforms, but they won’t be able to eliminate it completely. (谷歌和Facebook现在都在采取措施控制误导新闻在他们的平台上传播,但他们不可能完全eliminate它) ”中but可知,上下文有转折,虽然谷歌和Facebook在采取措施控制误导新闻的传播,但不可能完全消除这些新闻。画线词eliminate意思为“消除”,与remove意思相近。故选B。8.主旨大意题。通读全文,结合第二段中“According to a new study by Stanford University, most kids don’t know what news is fake.(根据斯坦福大学的一项新研究,大多数孩子不知道什么新闻是假的)”可知,文章介绍了斯坦福大学的研究发现,大多数孩子不知道什么新闻是假的,并分析了原因,给出了建议。由此推知,B选项“小心:孩子们不擅长识别假新闻”是文章最佳标题。故选C。9.G 10.D 11.E 12.F 13.B【导语】本文是一篇说明文,主要讲了三个安全上网,避免受到坏的影响的方法。9.空前说“Today I thought I’d blog about a question that has been asked many times—how do you stay safe online and avoid bad experiences on the Internet I am not an expert.(今天,我想我要写一个被问了很多次的问题——如何保证网络安全,避免在网络上的糟糕经历?我不是专家。)”,空后提出了三种方法,说明作者虽然不是专家,但是还是知道一些方法,G选项“But many years as a blogger have taught me a thing or two.(但是多年的博客生涯教会了我一些东西。)”说明了作者知道一些方法的途径,引起下文的几种方法,因此G选项承上启下,符合语境,故选G。10.空前说“If you see or read something that makes you feel uncomfortable, leave the site immediately.(如果你看到或读到让你感觉不舒服的东西,立即离开该网站。)”,也就是立刻离开,不做任何评论,D选项“Don’t post comments or click on anything.(不要发表评论或点击任何东西。)”所讲的方法和空前说的“立刻离开网站”表达意思差不多,因此D选项承接上文,符合语境,故选D。11.空前说“Second, protect your privacy.(第二,保护你的隐私。)”,空后说“Someone might use the information to steal your identity.(有人可能会利用这些信息窃取你的身份。)”,E选项“Don’t give out your address or phone number.(不要留下你的地址或电话号码。)”中的“address or phone number(地址或电话号码)”和空后的“the information(信息)”相一致,说明了保护隐私的具体方法,因此E选项承上启下,符合语境,故选E。12.空后说“Like a troll, a cyberbully will also write something mean but it is usually directed at particular people.(像喷子一样,网络恶霸也会写一些刻薄的东西,但通常是针对特定的人。)”,空格处应说网络恶霸除了这一点以外还会做的事情,F选项“A cyberbully uses the Internet to be mean to others.(网络恶霸利用互联网对他人刻薄。)”说明的是网络恶霸会做的事情,因此承上启下,符合语境,故选F。13.空前说“Have you had any bad experiences online, or do you have some good advice for staying safe (你在网上有过不好的经历吗 或者你有一些关于安全的好建议吗?)”,空格处应该说如果有的话该怎么做,B选项“Post your comments below!(在下面发表你的评论!)”说明了如果你在网上有过不好的经历或有一些关于安全的好建议可以在下面发表评论,因此承接上文,符合语境,故选B。14.C 15.D 16.B 17.A 18.C 19.D 20.B 21.C 22.A 23.B 24.A 25.D 26.B 27.C 28.A 29.D 30.A 31.D 32.B 33.C【导语】本文是一篇议论文。文章论述了安装手机更新的必要性和好处。14.考查名词词义辨析。句意:我们知道我们应该安装手机不断提醒我们的软件更新,但我们总是以各种借口推迟这么做。A. computers计算机;B. cars汽车;C. phones电话;D. televisions电视。根据句中“We know that we should install the software updates”和下文“Ultimately, my 18 is this: keeping your phone up-to-date is a win-win.”可知,文中说的是电话提醒我们要更新软件。故选C项。15.考查动词词义辨析。句意:我们知道我们应该安装手机不断提醒我们的软件更新,但我们总是以各种借口推迟这么做。A. suggest建议;B. practice练习;C. admit承认;D. postpone推迟。根据句中转折连词“but”和“various excuses”可推知,虽然手机提醒我们更新软件,但我们总是找借口推迟这么做。故选D项。16.考查形容词词义辨析。句意:是的,几分钟不能用手机是很烦人的,但这很重要。A. convincing令人信服的;B. annoying令人恼火的;C. interesting有趣的;D. confusing令人费解的。结合常识和句中“not being able to use our phones”可知,不能用手机是让人感到恼火的事情,这也解释了上文中为什么我们总是找借口推迟更新软件。故选B项。17.考查动词词义辨析。句意:所以,为了说服你为什么要这么做,我将尝试“胡萝卜加大棒”的方法。A. persuade说服;B. deny否认;C. warn警告;D. question质疑。根据句中“why you should”可知,作者要说服我们为什么要更新软件。故选A项。18.考查名词词义辨析。句意:所以,为了说服你为什么要这么做,我将尝试“胡萝卜加大棒”的方法。A. element要素;B. effect作用;C. approach方法;D. argument争论。根据句中“try the ‘carrot’ and ‘stick’”和下文内容可知,这是作者说服我们的策略、方法。故选C项。19.考查连词词义辨析。句意:如果你不随时更新你的手机,你的手机就会面临黑客的威胁。A. Though虽然 ;B. Before在……之前 ;C. Unless除非 ;D. If如果。根据句意,“不随时更新你的手机”是“手机就会面临黑客的威胁”的条件,用if引导条件状语从句。故选D项。20.考查名词词义辨析。句意:因为数字安全是一场军备竞赛。A. access入口;B. security安全;C. revolution革命;D. download下载。根据下文“Hackers will find holes and new ways to 8 our phones, so smartphone companies release new versions of the phones operating system (OS) software to 9 the problem. Then hackers look through the new version of the software for new 10 they can use for attack. And so on forever.”可知,黑客想要入侵我们的手机,而智能手机公司要保护手机,所以这就是关于一场数字安全的军备竞赛。故选B项。21.考查动词短语辨析。句意:黑客会找到漏洞和新方法入侵我们的手机,所以智能手机公司会发布新版手机操作系统软件来解决这个问题。A. show off炫耀;B. look for寻找;C. break into闯入;D. put aside把……放在一边。结合常识和句中“Hackers will find holes and new ways”可知,黑客会入侵我们的手机。故选C项。22.考查动词词义辨析。句意:黑客会找到漏洞和新方法入侵我们的手机,所以智能手机公司会发布新版手机操作系统软件来解决这个问题。A. fix解决;B. understand理解;C. share分享;D. describe描述。结合常识和句中“smartphone companies release new versions of the phones operating system (OS) software”和“problem”可知,智能手机公司会通过发布新版手机操作系统软件来解决黑客入侵手机的问题。故选A项。23.考查名词词义辨析。句意:然后,黑客们会仔细研究新版本的软件,寻找他们的弱点来进行攻击。A. illnesses疾病;B. weaknesses弱点;C. techniques技术;D. excuses借口。根据句中“hackers look through the new version of the software”和“use for attack”可推知,黑客会研究新版本的软件,寻找其弱点来进行攻击。故选B项。24.考查动词词义辨析。句意:这意味着如果你没有将你的手机更新到最新版本的操作系统,你的手机就处于危险之中。A. means意味着;B. recommends推荐;C. demands要求;D. promises允诺。句中“This”指代上文中黑客和智能手机公司都在更新技术这一现象,这就意味着如果我们不更新智能手机操作系统,手机就会受到攻击。故选A项。25.考查介词短语辨析。句意:这意味着如果你没有将你的手机更新到最新版本的操作系统,你的手机就处于危险之中。A. for free免费;B. in place适当的;C. on sale廉价出售;D. in danger在危险中。根据上文可知,黑客和智能手机公司都在更新技术,所以如果我们不更新智能手机公司发布的操作系统,手机就会受到攻击,处于危险中。故选D项。26.考查动词词义辨析。句意:因此,保持最新版本以确保你的手机有最坚固的数字盔甲是很重要的。A. announce宣布;B. guarantee确保;C. recognize认出;D. pretend假装。根据上文可知,智能手机公司发布的操作系统可以帮助我们的手机对抗黑客的攻击,所以保持最新版本的操作系统可以确保手机有最坚固的数字盔甲。故选B项。27.考查形容词词义辨析。句意:软件更新真正令人兴奋的部分是,你的手机将获得新的特征和功能,而不需要购买一个新的手机! A. amusing有趣的;B. strange奇怪的;C. exciting令人兴奋的;D. convenient方便的。根据句中“your phone will receive new 15 and functionality without you needing to buy a new handset!”可知,更新软件后,手机拥有新的功能,不再需要购买一个新的手机,这是让人兴奋的事情。故选C项。28.考查名词词义辨析。句意:软件更新真正令人兴奋的部分是,你的手机将获得新的特征和功能,而不需要购买一个新的手机! A. features特征;B. messages信息;C. orders顺序;D. checks支票。结合常识和句中“software updates”与“functionality”可知,软件更新往往会给手机带来新的特征和功能。故选A项。29.考查副词词义辨析。句意:事实上,更新有时是如此具有变革性,就像收到了一部全新的手机。A. gradually逐步地;B. previously先前地;C. economically经济地;D. occasionally有时。根据常识和句中“it can be like 17 an entirely new phone”可知,通过软件更新让手机变成新手机也不是常有的事,只是有时发生。故选D项。30.考查动词词义辨析。句意:事实上,更新有时是如此具有变革性,就像收到了一部全新的手机。A. receiving收到;B. inventing发明;C. selecting选择;D. introducing介绍。根据“so transformative that”可知,更新有时如此具有变革性,会让你觉得收到一部新手机。故选A项。31.考查名词词义辨析。句意:最后,我的观点是:让你的手机随时更新是双赢的。A. concern关心;B. guess猜测;C. solution解决办法;D. point观点。根据“keeping your phone up-to-date is a win-win.”可知,这是作者的观点。故选D项。32.考查形容词词义辨析。句意:这样你不仅能保证手机的安全,而且还能拥有一台更好的手机。A. simple简单的;B. safe安全的;C. clean干净的;D. silent安静的。根据上文“So it is important to stay up-to-date to 13 your phone is wearing the toughest digital armour (盔甲).”可知,更新手机软件可以让你的手机拥有最坚固的数字盔甲,让它更安全。故选B项。33.考查动词短语辨析。句意:所以现在打开你的设置应用程序,最后安装那些更新! A. pay for为……而付钱;B. compete with与……竞争;C. turn on打开;D. refer to参考。根据句中“your settings app now”和“install those updates”可知,文章最后作者号召我们打开手机,安装更新。故选C项。1.to access 2.a 3.involved 4.Actually 5.is 6.but##yet 7.without 8.be called 9.professionals 10.safe【导语】这是一篇说明文。文章主要介绍了黑客及其工作内容。1.考查非谓语动词。句意:他们花了好几天的时间寻找方法,侵入任何可以连接到互联网的东西,以获取从未被看到的信息。分析句子结构可知,句中已有谓语动词,空处为非谓语动词作目的状语,所以用动词不定式。故填to access。2.考查冠词。句意:杰克为自己的谋生之道感到自豪。固定搭配for a living“为了谋生”。故填a。3.考查非谓语动词。句意:在好莱坞,黑客通常被描述为在暗室中从事非法活动的戴头巾的人,同时敲打着键盘。分析句子结构可知,句中已有谓语动词,空处为非谓语动词作后置定语,修饰figures,该动词和修饰的名词之间存在被动关系,所以用过去分词作定语。故填involved。4.考查副词。句意:实际上,黑客是电脑编程和解决问题的专家。此处修饰后面整个句子,用副词actually。故填Actually。5.考查主谓一致。句意:黑客是一种活动,任何活动与犯罪的区别在于许可。根据全文的时态可知,此处应为一般现在时,主语为what引导的主语从句,what指代permission,谓语动词用单数。故填is。6.考查连词。句意:司机可以自由驾驶,但他们没有每小时驾驶150英里的许可——这是违法的。根据句意可知,司机可以自由驾驶,但他们没有每小时驾驶150英里的许可,所以前后两句之间为转折关系,用转折连词but或者yet。故填but或yet。7.考查介词。句意:银行家可以转移客户的资金,但如果他们未经许可就这样做,那是违法的。根据前文“they do not have permission”及与前一句的并列关系可知,这里指的是银行家可以转客户的钱,但是如果他们在没有允许的情况下这么做,那就是非法的,所以用介词without“没有”,和后面的名词构成介词短语,在句中作状语。故填without。8.考查动词语态。句意:参与非法使用黑客的人不应被称为“坏黑客”,而应被称为“威胁行为人”。主语someone与call之间是被动关系,应用被动语态,情态动词should后加be动词原形。故填be called。9.考查名词复数。句意:黑客就是像杰克和他的IBM团队一样的人——安全专家。此处表示“安全专家”,所以用名词professional,为可数名词,前面没有限定词,应用复数形式,表泛指。故填professionals。10.考查形容词。句意:黑客在确保公司和人员安全方面发挥着至关重要的作用。固定搭配keep sb./sth. safe“保持某人/物安全”,形容词作宾语补足语。故填safe。Part3话题写作练◎应用文练Passage1Good afternoon, my dear classmates/fellow students!With the wide spread of the Internet, we have easy access to almost everything we want to know. Meanwhile, there are also hidden/potential dangers that we can’t see through. Then what should we do to stay safe online First of all, don’t click on any strange link so as to avoid property loss. Second, protect your privacy. Don’t give away your personal information like name or address, and never see strangers you meet online. Finally, always be polite in the virtual world. Try not to be a target for a cyberbully.Only when we obey the rules above can we build a healthy and harmonious online world.Thank you!【导语】本篇书面表达属于发言稿,要求考生以“How to stay safe online”为标题,写一篇发言稿。主要包括以下内容:1. 强调网络安全的重要性;2. 提出建议(如保护好个人隐私、文明上网等)。【详解】1. 词汇积累保持:stay→keep私人的:personal→private遵守:obey→observe首先:first of all→first and foremost2. 句式拓展简单句变复合句原句:First of all, don’t click on any strange link so as to avoid property loss.拓展句:First of all, don’t click on any strange link, the purpose of which is to avoid property loss.【点睛】[高分句型1]Meanwhile, there are also hidden/potential dangers that we can’t see through.(运用了关系代词that引导的限制性定语从句)[高分句型2]Only when we obey the rules above can we build a healthy and harmonious online world.(运用了only位于句首引起的部分倒装句)Passage2Social Media and Teen HealthSocial media has become an effective way for us to build relationships, shape ourselves and understand the world. But it is intrinsically linked to our mental health. So we must understand the impact of social media on mental health, especially for teenagers.Most teenagers use the Internet to socialize, which is considered more addictive than cigarettes. Excessive use of social media will increase the probability of anxiety, depression and poor sleep quality.Therefore, we suggest that young people should properly use social media, play its advantages and avoid its harm.【导语】本篇书面表达属于议论文。要求考生写一篇关于Social Media and Teen Health的博客,阐述社交媒体对青少年健康的影响。【详解】1.词汇积累方式,方法:method→means→way影响:effect→impact认为:think→consider差的:bad→poor2.句式拓展简单句变复合句原句:So we must understand the impact of social media on mental health, especially for teenagers.拓展句:So we must understand the impact of social media on mental health, especially for teenagers, which we must be concerned about.【点睛】【高分句型1】Most teenagers use the Internet to socialize, which is considered more addictive than cigarettes. (运用了which引导的非限制性定语从句)【高分句型2】Therefore, we suggest that young people should properly use social media, play its advantages and avoid its harm.(that引导的宾语从句中运用了虚拟语气)¤读后续写练Luckily, the Internet did its thing. It’s a bit of a modern-day wonder that would never have happened without social media. Mara’s story was quickly and continuously spread via the Internet. Several days later, with anxiety and worry, Mara finally got positive feedback. Mara said she got an email from someone. The sender told her the bear was on the way back. On Tuesday night, Mara’s bear came home.The email was from the woman who sent the bear back. She told Mara that she was deeply touched by Mara’s story. She didn’t want the reward, just hoping that Mara could live a happy life in the future. Mara is getting married next summer and the bear is going to have a special seat at the ceremony--the one her mother would sit in. For now, she’s keeping Mama Bear close and sending thanks to those who helped with the happy reunion.【分析】本文以事件为线索,讲述了Mara在搬家途中弄丢了母亲留给自己的玩具熊,这只熊对她来说意义非凡,因此她在网上求助找熊。【详解】1.段落续写:①由第一段首句内容“幸运的是,互联网发挥了作用。”可知,第一段可描写Mara通过网络找回了Mama Bear。②由第二段首句内容“这封邮件是将熊邮寄回来的女人发来的。”可知,第二段可描写女人的信件内容及Mama收到玩具熊后的做法。2.续写线索:收到玩具熊的线索——送熊女士表达祝愿——Mara的婚礼计划——Mara表示感谢3.词汇激活行为类①.回到家:came home/returned home②.收到邮件:got an email/received an email③.需要:want/need情绪类①.感动:be touched/be moved②.感谢:thanks/appreciation【点睛】[高分句型1] It’s a bit of a modern-day wonder that would never have happened without social media. (运用了that引导的定语从句)[高分句型2]She told Mara that she was deeply touched by Mara’s story.(运用了that引导的宾语从句) 展开更多...... 收起↑ 资源预览