1 . T. S. Eliot wrote of “Distracted from distraction by distraction /Filled with fancies and empty of meaning.” T. S. Eliot never had a smartphone.
Neither did I for a long time. No Facebook account; not even email. But according to my date of manufacture, I’m supposed to be a digital native. Perhaps it’s because by the age of 20 I was living in the Welsh countryside with no signal and no Wi-Fi.
When I finally fell into the digital world, I fell hard. Unlike my friends for whom social media and mobile technology had grown and flowered around them, for me it was a sudden immersion. I got Facebook, Twitter and Gmail accounts at the same time that I got an iPhone 4. I would check my phone; five minutes later I would check my phone again. I was addicted and it started to affect my relationships with friends and family
One night, without a word, I abandoned my iPhone and bought a Nokia 3310 and became the talk of the town. Soon I became aware that not only had I stolen secret time back from the hurried days, but somehow a secret space as well. I could stretch out, free to think again, to be wholly creative and to learn meaningfully.
But, wherever I went I got bloody lost. Wandering blindly around London, only to miss appointments, became a frequent pastime (消遣). What did we do before Google Maps? I was useless. The change was worth it, though. I’ll sound like an overstatement but I think it changed my life. My choices are broader and healthier because I’m not being screamed at all day.
I bought a new Samsung phone last week. I had been scared of the rate of progress, crying: “Stop the train! Stop the madness.” But I want to be part of building the future, and to do that, you’ve got to swim in contemporary waters. Rejecting the modern world doesn’t help anyone. It slows you down and I need to be efficient. Time will tell whether I’ve mastered the wisdom to reject constantly checking my phone.
1. What can be learned about the author when she lived in the Welsh countryside?A.She read a lot of T. S. Eliot. | B.She had no friends to talk with. |
C.She had no access to the Internet. | D.She was afraid of the digital world. |
A.She thought she needed a spare phone. | B.She found her iPhone stopped working. |
C.She wanted to attract people’s attention. | D.She hoped to break her smartphone addiction. |
A.She led a simple and healthy life. | B.She found her life was in a mess. |
C.She spent more time with her friends. | D.She became an example for other people. |
A.To seek wisdom. | B.To stop her madness. |
C.To keep pace with the times. | D.To get back to the real world. |
1. 看国内外新闻,获取其他信息:
2. 发email,打电话;
3. 读书,学外语;
4. 看比赛,欣赏电影、音乐,玩游戏;
5. 交友,聊天,购物。
注意:1. 词数100左右;
2. 可适当增加细节,以使行文连贯,不要逐条翻译;
3. 开头已为你写好,不计入总词数。
The Fantastic Internet
The Internet is playing a more and more important part in our daily life. ________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
1.问题现状;
2.沉迷玩手机的副作用;
3 具体解决办法。
注意:1写作可数应为100左右;
2.可适当发挥,使文章内容连贯。
______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
4 . If you use “123456”, “password’’ or “qwerty” as a password, you’re probably aware that you’re at the risk of being attacked by hackers (黑客). But you’re not alone.
The findings show password choices are often attached to cultural references.
Choosing long and complex passwords remains the main authentication mechanism (身份验证机制) for computers and network-based products and services. But we know people continue to choose weak passwords and often don’t manage them securely.
To overcome the security issues linked with password-based authentication systems, researchers and developers are now concentrating on creating authentication systems which don’t depend on passwords at all.
A.They need the support of computer experts. |
B.The findings show that passwords tell our emotions. |
C.People in some countries take inspiration from a football team. |
D.The report also reflected different preferences between genders. |
E.These are among the most popular passwords around the world. |
F.Besides, there are other ways to protect your personal information. |
G.As a result, they put themselves under potential online security threats. |
5 . When you are online, you can be anyone or anything. You can create your own image and a new personality. These digital identities are known as avatars (化身).
The first simple 2D avatars appeared in role-playing computer games in the 1980s. Yet, very few people knew that future avatars would have such a wide variety of forms and uses. By the late 1990s, they had been used in web chats.
When people started creating their own avatars, they discovered that they were going to have the power to create new identities that did not look or act like their real selves at all. They could dress their avatars in fancy clothes, or they could try being someone of the opposite sex. When Internet users realized that their avatars would be seen by many people, not just their friends, they started having more than one avatar. Avatars let you express yourself and they give you lots of room for creativity.
Of course, the avatar you choose says a lot about your personality. If your blog avatar is a picture of a cute cat, your message is “like relaxing and having fun”. Well-known cartoon characters or laughing monkeys say “I’m a really funny person”. Most people create avatars that have similar features to their personalities and that look more or less like them and act like them. However, people obviously make their avatars look better than they do in real life.
Nowadays, avatars are everywhere and very useful. In most web chats, people choose an avatar from a selection of ready-made images or create their own images. You can also use avatars that move around and talk when you type in your message.
Despite the advantages of avatars, the use of avatars has also caused a few concerns. Some users worry that they are spending so much time in virtual worlds that they are becoming afraid of meeting people in the real world. The use of several avatars can also be a risk, as people can use avatars to cheat others online.
1. What can be inferred in paragraph 3?A.People’s new identities were very powerful. |
B.Avatars limited the room for people’s creativity. |
C.People’s avatars could be seen only by their friends. |
D.More attention from the public made people have more avatars. |
A.By telling a story. | B.By analyzing data. |
C.By giving examples. | D.By making comparisons. |
A.Users may be tricked by others online. |
B.People are spending too much time in the real world. |
C.The use of avatars is not so risky as people have expected. |
D.People are not brave enough to meet others in the virtual worlds. |
A.A diary. | B.A guidebook. | C.A scientific fiction. | D.A magazine. |
6 . Web 1.0 is often referred to as a “read-only Internet”. All its content was created by webmasters. Users could not interact with the content or add content themselves.
In the age of Web 2.0, the Internet became interactive. Websites allowed users to communicate with each other. So Web 2.0 is also known as the Social Web. Web 2.0 led to a big jump in technology development. It changes the way we work, socialize, create and share information and ideas. In Web 2.0, while users can create content, they don’t own it and cannot control it. The platforms can easily block or remove the content without the permission of the creators.
So Web 3.0 is coming. Web 3.0 is a concept of a new generation of the Internet. In contrast to Web 2.0, where most of the data is stored in corporations, such as Google, Amazon, Facebook, Apple, etc., Web 3.0 data will be decentralized (分散). Web 3.0 will create platforms that nobody controls but everyone can confirm.
Let’s see what important changes we may expect. No third party is required. For instance, the use of cryptocurrencies (加密货币) ends the need for banks because all financial deals take place directly between the two parties using cryptocurrency. In addition, Web 3.0 will make it much more difficult for Internet attackers to access sensitive information. Besides, Web 3.0 makes businesses directly accountable to their consumers. Businesses may apply this openness to their consumers to develop relationships of trust and loyalty. Plus, the information is accurate since data saved on blockchains (区块链) cannot be changed.
The new Internet promises to build a “global village”, a world focused on interpersonal interaction throughout the world, which will contribute both to the development of technology and business, and the promotion of personal happiness.
1. What is the disadvantage of Web 2.0?A.Users are controlled by platforms. |
B.Users can’t interact with each other. |
C.It’s difficult for users to collect information. |
D.It’s impossible for users to rewrite information. |
A.It will become busier. | B.It will be inconvenient. |
C.It will be really tough. | D.It will be much safer. |
A.It will center on the study of the globe. |
B.It will help every country to build more villages. |
C.It will make efforts to develop the world agriculture. |
D.It will narrow the distance between humans on Earth. |
A.The Coming Web 3.0 | B.The Ages of Social Web |
C.The Famous Internet Giants | D.The Diverse Cultural Global Village |
7 . It’s difficult to determine whether social media is safe enough for children’s mental health, according to a new report from Dr. Vivek Murthy.
Although there are some benefits, social media use brings “a great risk of harm” to kids. “We’re in the middle of a youth mental health crisis, and I’m concerned that technology companies are contributing to it,” Dr. Murthy said.
“It is generally believed that parents and kids should be responsible for managing social media, despite the fact that these platforms are designed to increase the amount of time that our kids spend on them,” he said. “So that is not a fair fight. It’s time for us to support parents and kids.”
Up to 95% of kids aged 13 to 17 report using social media, with more than a third saying they use it “frequently”. And although 13 is commonly the minimum(最小的) age to use social media sites in the US, the report notes that nearly 40% of kids aged 8 to 12 use the platforms, as well.
One study of 6,595 US adolescents between ages 12 and 15 found that those who spent more than three hours a day on social media had twice the risk of symptoms(症状) of depression and anxiety as non-users, the report notes. It also cites(引用) studies that found reducing social media use led to improvements in mental health.
Murthy says he hopes the report will encourage measures before it is too late. “Independent researchers tell us that they have a hard time getting the information they need from technology companies about the health effects on kids,” he said. “Social media companies should be responsible for protecting children as other industries are. As to other products that kids use, we take the approach of safety first. We need to do it here, too.”
1. What causes children’s mental problems according to Murthy?A.Risk of addiction. | B.Parents’ management. |
C.Technology companies. | D.Children’s learning stress. |
A.By listing data. | B.By providing facts. | C.By giving examples. | D.By explaining causes. |
A.Public opinions. | B.Previous studies. | C.Field observation. | D.Family relationships. |
A.Health effects of social media on kids. | B.Safely for kids concerning all products. |
C.Immediate action to protect the children. | D.Difficulty in getting the needed information. |
要点如下:
1.网络对于学习的影响;
2.你的观点。
要求:
1.字数80字左右
2.可以适当增加细节,以使行文连贯;
_________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________
9 . Cyber-bullying (网络欺凌) may take place in the online world, but it is no less damaging than in the real world. The Internet has become a kindness desert, a place where few flowers bloom. Bullying is pretty common.
Being bullied is a frustrating and painful experience. Online bullying can really hurt others, and it can have serious consequences.
Don’t blame yourself.
Stay away from bullies. Bullies hope you interact with them so that they have an excuse to keep picking on you. When the bully starts orally attacking you, remove yourself from the situation if you can, simply by walking away.
Speak out. Nobody has the right to make you feel unsafe, uncomfortable or unhappy. Find someone you can talk to, your teacher or your parent and tell them what’s going on.
A.Keep track of bullies. |
B.Be sure you’re wonderful. |
C.Adults can offer help if they know about the problem. |
D.Being bullied can make you feel alone, scared, and hopeless. |
E.Your parents are willing to help you when recognizing your problem. |
F.If you are being bullied, it’s essential to know that it is never your fault. |
G.Studies have found that nearly one-third of all students are bullied each year. |
10 . Unwanted Publicity
Most people know how to use social networking sites wisely, but this isn’t always the case. In March 2011, Australian teenager Jessica Cooper posted an invitation to her 16th birthday party on Facebook.
A.By the time the fake account was shut down by Facebook a day later, more than 200,000 people had accepted the invitation. |
B.In conclusion, we should bear in mind that social networking sites are not always friendly. |
C.She was expecting her classmates from school to come and she invited them to bring a few other friends if they wanted to. |
D.At first, Jess didn’t care at all. |
E.For lots of people, this was a good joke, but for Jess it wasn’t funny. |
F.Jess quickly removed the invitation, but her problems were just beginning. |