重要提示: 请勿将账号共享给其他人使用,违者账号将被封禁!
查看《购买须知》>>>
找答案首页 > 全部分类 > 求职面试
搜题
网友您好, 请在下方输入框内输入要搜索的题目:
搜题
题目内容 (请给出正确答案)
[主观题]

Section G(每题2分,共10分) Directions: In this part...

Section G(每题2分,共10分) Directions: In this part, you will read five paragraphs. Choose the right topic for each paragraph. Paragraph 1 People often refer to taxes in terms of their being much too high. In reality, they are probably even higher than you think, because in addition to the federal income tax we are now studying, there are many other Federal, State, and local taxes, including sales taxes, inheritance taxes, state income taxes, personal property taxes, real estate taxes, and others. These are just some of the most obvious ones.

A、Taxes are much too high.

B、We pay more taxes than we may realize.

C、Inheritance taxes and real estate taxes are unfair.

D、Some taxes are hidden.

暂无答案
更多“Section G(每题2分,共10分) Directions: In this part...”相关的问题

第1题

根据下列选项,回答下列各题: Directions: In this part, you will have 15 minutes to go over the passage quickly and answer the questions on Answer Sheet 1. For questions 1-7, choose the best answer from the four choices marked A., B., C.and D.. For questions 8-10, complete the sentences with the information given in the passage. The "Lost" Great Wall of China A forgotten section of the Great Wall of China has been discovered deep in the Gobi Desert--and outside of China--researchers say. With the help of Google Earth, an international expedition documented the ancient wall for roughly 100 kilometers (62 miles) in a restricted border zone in southern Mongolia in August 2011. The defensive barrier formed part of the Great Wail system built by successive Chinese dynasties to repel Mongol invaders from the north, according to findings published in the March issue of the Chinese edition of National Geographic magazine. (The National Geographic Society is responsible for both the magazine and Nationai Geographic News.) Preserved to a height of 9 feet (2.75 meters) in places, the desert discovery belongs to a sequence of remnant( 遗留的 ) walls in Mongolia collectively known as the Wall of Genghis Khan, said expedition leader and Great Wall researcher William Lindesay. Named after the founder of the Mongol Empire, the Wall of Genghis Khan usually survives only as "a faint trace," Lindesay said in an email. But "we found a real wail, standing high and existing as a dominant landscape feature," he said. Whats more, it wasnt the work of Genghis Khan or his heirs but actually a long-lost segment of the Great Wall of China network, the teams findings suggest. First to Investigate New Great Wall? Close to China in the border region of omnogovi Province, the ancient structure hadnt been scientifically explored or studied before, said Lindesay, director of the International Friends of the Great Wall conservation group, based in Beijing, China. "Were the first to investigate the ruins," he said. "According to the army officers who minded us, we were the first outsiders to be allowed into the area," Lindesay added. "We assumed various local Mongolians had been to the area, but had not considered the structure of much interest." At times seeking out topographic clues seen in Google Earth--the wall is visible on satellite images—the team located two well preserved but contrasting stretches of wall. One section had been made mainly with wet mud and a woody desert shrub(灌木)called saxaul(梭梭树), the other from blocks of black volcanic rock. Along its vast length, Lindesay suspects, the wall originally stood at least 2 meters (6.5 feet) taller than it does today. "What we found was just the last remaining piece of a fossil--the skull or the large thighbone, with the rest missing," he said. "One can expect the wall was both much higher and continuous for vast distances." That dark basaltic rock(玄武岩)seems to have been an obvious choice for the second stretch,which crosses the rugged(崎岖的)remains of extinct volcanoes. The clean,straight edges to the blocks indicate that the stone was quarried(开采),which would have required a large,organized work.force and an efficient transport system,the team said. Rewriting History Ancient Mongolian texts suggest that the so-called Wall of Genghis Khan was built as an animal fence by Khans son Ogedei to keep wild gazelle (羚羊) on his land. But the recently explored Gobi Desert wall segment isnt in a region where large herds of gazelle occur. "There would be no reason to build an animal wall in the Gobi," said anthropologist (人类学家) and Mongolia historian Jack Weathefford, formerly of Macalester College, Minnesota. Chinese researchers, perhaps not surprisingly, have speculated that Chinas Han dynasty had erected these little-studied stretches in about 115 B.C. But radiocarbon (放射性碳) dating of partly exposed wood and rope remains extracted from the wall indicates that the saxaul-segment construction occurred about a thousand years later than thought, from A.D. 1040 to 1160. Those dates hint that the Western Xia dynasty built the walls--or at least rebuilt old Han walls on the sites. Holding Back the Mongol Tide This northwestern Chinese dynasty isnt known to have contributed to the Great Wall system, but in at least one aspect, a Western Xia origin makes sense. During the Western Xia period, Mongol tribes were rising in strength and making forays ( 侵略 ) south, Lindesay noted. "If one imagines the wall as a platform, with some kind of battlement--perhaps of wooden stakes, functioning as a shield to those manning its top---then it would have been an effective defense installation ( 防护驻地)," he said. But, mysteriously, the expedition team found no pottery, no trash, no coins, no weapons--nothing to prove the wall was ever actually manned. Nor did they find any of the watchtowers that mark surviving sections of the Great Wall within China. "The wall system was incomplete," Lindesay said. "It not only lacked the signaling capability to make smoke signals--it didnt appear to be capable of accommodating troops." Unfinished Business "I believe the wall here is only half built and that there was, for some reason, a rethink on locating the wall here," Lindesay said. It isnt difficult to imagine how the purported (传说中的) Great Wall segments harsh desert location might have led to the remote frontier defense being abandoned, he added. Weatherford, the Minnesota-based anthropologist, agrees with Lindesays conclusion that the newfound remains were Chinese constructions. Theres a good reason, Weatherford added, that the stretch nevertheless carries Genghis Khans name. Mongolians, he said, are sensitive to the idea of "Chinese structures built on their land", since it carries the possible claim that the land was once Chinese. "By calling it the Genghis Khan Wall, the name makes the place Mongolian and rejects foreign influence," Weatherford said. He also describes the expedition new findings as"very important, because to my knowledge this wall has not been studied." "I would risk saying that it is the largest human-made structure or artifact in all of Mongolia," he added. "It is amazing to me that it is not already much better analyzed." According to this passage, the purpose of building the Great Wall system is to __________.

A.avoid the trouble of sending an army to defend the area

B.repel Mongol invaders from the north

C.indicate where the b. order line between Mongol and China is

D.rival with the Wall of Genghis Khan

点击查看答案

第2题

Section E (每词2分,共20分) Directions: In this sec...

Section E (每词2分,共20分) Directions: In this section, you will hear a passage. Listen twice and complete the following form with the words you hear. Top Ten Tips for Supermarket Shoppers 10. Trolley or basket? Make up your (1) . 9. Watch out! There are (2) about. 8. If you can’t find it, just (3) ! 7. Take a shopping list and (4) to it! 6. Beware of sweets and magazines at the (5) . 5. (6) good? Don't’ believe it! 4. Free item is a way of getting rid of old (7) . 3. Look for (8) items higher up or lower down the shelves. 2. Loss (9) are designed to bring people into the shop. 1.Stay at home and shop (10) . (1)

点击查看答案

第3题

Part Ⅱ Reading Comprehension (Skimming and Scanning)

Directions: In this part, you will have 15 minutes to go over the passage quickly and answer the questions on Answer Sheet 1. For questions 1-7, choose the best answer from the four choices marked A), B), C) and D). For questions 8-10, complete the sentences with the information given in the passage.

The Future of Television: What's on Next?

Bosses in the television industry have been keeping a nervous eye on two Scandinavians with a reputation for causing trouble. In recent years Niklas Zennstrom, a Swede, find Janus Friis, a Dane, have frightened the music industry by inventing KaZaA, a "peer-to-peer" (P2P) file-sharing program that was widely used to download music without paying for it. Then they horrified the mighty telecoms industry by inventing Skype, another P2P program, which lets Internet users make free telephone calls between computers, and very cheap calls to ordinary phones. Their next move was to found yet another start-up -- this time ,one that threatened to devastate(毁坏) the television industry.

It may do the opposite, as it turns out. The new service, called Joost and now in advanced testing, is based on P2P software that runs on people's computers, just like Skype and KaZaA. And it does indeed promise to transform. the experience of watching television by combining what people like about old-fashioned TV with the exciting possibilities of the Internet. "But unlike KaZaA and Skype," says Fredrik de Wahl, a Swede whom Mr. Zennstrom and Friis have hired as Joost's boss," Joost does not disrupt the industry that it is entering. Instead, rather than undercutting television networks and producers, Joost might, as it were, give them new juice. "

That is because Mr. de Wahl and his Joost team, working mostly in the Netherlands, have bravely ignored the totems (图腾) of the Internet-video boom. Chief among these fashions is letting users upload anything they want to a video service -- which might include clips of themselves doing odd things (" user-generated content") or, more questionably, videos pirated from other sources. The celebrated example of this approach is You Tube, which is now part of Google, the leader in Internet search. Its big problem, however, is that it can be illegal (if copyright is violated) and terribly hard to turn into a business.

On February 2nd Viacom, an American media giant, became the latest company to demand that YouTube remove copyright-infringing (侵犯版权的) clips from its website. YouTube has struck deals with some media firms, including NBC and CBS, to allow their material to appear on its site, and had been trying to thrash out a similar agreement with Viacom. Many observers regard Viacom's move as a negotiating tactic. But whether YouTube can make money is unclear. Last month Chad Hurley, YouTube's chief executive, sketched out plans for generating advertising revenues and sharing them with content providers, but so far his firm has none to speak of.

The Innovation of Joost

Joost is also ignoring the two business models seen as the most respectable alternatives to advertising. One is to make users pay for each television show or film they download, but then to let them keep it. This is the tack chosen by Apple, an electronics firm that sells videos on iTunes, its popular online store; by Amazon, the largest online retailer; and by Wal-Mart, the largest traditional retailer, which launched a video-download service this week. The other approach is to let users subscribe to what is, in effect, an all-you-can-eat buffet of videos, and then to" stream" video to their computers without leaving a permanent copy. This is the approach taken by, for instance, Netflix, a Californian firm that mostly delivers DVDs to its subscribers by post, but now als

A.the telecoms industry

B.the music and telecoms industry

C.the telecoms and television industry

D.the music, telecoms and television industry

点击查看答案

第4题

Part Ⅱ Reading Comprehension (Skimming and Scanning)

Directions: In this part, you will have 15 minutes to go over the passage quickly and answer the questions on Answer Sheet 1.

For questions 1~7, mark

Y (for YES ) if the statement agrees with the information given in the passage;

N (for NO ) if the statement contradicts the information given in the passage;

NG (for NOT GIVEN) if the information is not given in the passage.

For questions 8~10, complete the sentences with the information given in the passage.

More than 2,300 universities in over 100 countries have introduced Chinese courses to their curricula, and young overseas nationals flock to China each year to learn Chinese. In 2004, the number of international students in China was 400,000, with an annual increase of 20 percent in the past five years, according to the Chinese Ministry of Education.

The Rise of China's Economy

Monsieur Label and his wife, both respected architects living in Paris' Sixth Quarter, have enrolled their daughter in a nearby school where Chinese classes start at kindergarten. Monsieur Label says of China. "I and my colleagues witnessed the country's amazing development when we attended a recent seminar in Shenzhen. I believe that China is the economic superpower of the future. My wife and I speak French, English and Spanish, but my daughter should also learn Chinese because it will be useful to her when she grows up."

Since Chinese courses were added to the curricula of 132 French junior and senior high schools their enrollment has doubled. That at the Oriental Language and Culture College, one of France's largest Chinese-teaching colleges, has skyrocketed in recent years, according to Xu Dan, dean of the Chinese Department. She confirms that Chinese and Japanese are now the two most studied Asian language

French junior student Beida is totally fluent in Chinese. "I'm learning Chinese because I want to be an international lawyer in China," he explains.

Young French entrepreneur Patric Penia established his Beiyan Consultancy Company in Paris, and it now works together with China Central Television in introducing French traditions and culture to Chinese audiences. Patric also cooperated with Beijing's University of Finance and Economics and Central University of Finance and Economics in launching a three-week crash course in Chinese in Beijing. In 2005, he initiated the "Chinese people and business management" training course in Paris, which consists of seminars to help French businessmen understand how Chinese business operates.

Germany has also caught on to the benefits of Chinese language learning, and has added Chinese to its high school graduation exams. Many international corporations also hold introductory Chinese courses for employee's assigned work in China. "English isn't enough," says Herr Gerck, president of Siemens China, "We need to equip our staff with the ability to deal with Chinese merchants in their own language."

In Britain, a Chinese teaching program that will form. part of the national curriculum has been formulated and approved by the Department of Education and Skills. In the U. S. , Chinese is part of the Advance Placement Program for American high school students. This means that students can take college-level Chinese in the same way as they learn French, Spanish and German and gain credits if they get good test results. More than 2,500 primary and high schools now offer AP courses in the Chinese language.

Cultural Echoes

Chinese characters, along with the Confucian philosophy, have always had profound influence on Han cultural circles in Asia, and after a brief hiatus, Chinese language teaching is in demand once more in the RO

A.Y

B.N

C.NG

点击查看答案

第5题

Part ⅠReading Comprehension (15 minutes)

Directions: In this part, you will have 15 minutes to go over the passage quickly and answer the questions on Answer Sheet 1.For questions 1-7, mark Y (for YES) if the statement agrees with the information given in the passage; N (for NO) if the statement contradicts the information given in the passage; NG (for NOT GIVEN) if the information is not given in the passage.For questions 8-10. complete the sentences with the information given in the passage.

Protect Your Privacy When Job-hunting Online

Identity theft and identity fraud are terms used to refer to all types of crime in which someone wrongfully obtains and uses another person’s personal data in some way that involves fraud or deception, typically for economic gain.The numbers associated with identity theft are beginning to add up fast these days. A recent General Accounting Office .report estimates that as many as 750.000 Americans are victims of identity theft every year. And thai number may be low, as many people choose not to report the crime even if they know they have been victimized. Identity theft is "an absolute epidemic," states Robert Ellis Smith, a respected author and advocate of privacy. "It’s certainly picked up in the last four or five years. It’s worldwide. It affects everybody, and there’s very little you can do to prevent it and, worst of all. you can’t detect it until it’s probably too late."OnfficTyour fingerprints, which are unique to you and cannot be given to someone else for their use, your personal data, especially your social security number, your bank account or credit card number, your telephone calling card number, and other valuable identifying data, can be used, if they fall into the wrong hands, to personally profit at your expense. In the United States and Canada, for example, many people have reported that unauthorized persons have taken funds out of their bank or financial accounts, or. in the worst cases, taken over their identities altogether, running up vast debts and committing crimes while using ihe victims’ names. In many cases, a victim’s losses may include not only out-of-pocket financial losses, but substantial additional financial costs associated with trying to restore his reputation in the community and correcting erroneous information for which the criminal is responsible. According to Ihe FBI, identity theft is the number one fraud committed on the Internet. So how do job seekers protect themselves while continuing to circulate their resumes online? The key to a successful online job search is learning to manage the risks. Here are some tips for staying safe while conducting a job search on the Internet.

1.Check for a privacy policy.

If you are considering posting your resume online, make sure the job search site you are considering has a privacy policy, like CareerBuilder.com The policy should spell out how your information will be used, stored and whether or not it will be shared. You may want to think twice about posting your resume on a site that automatically shares your information with others. You could be opening yourself up to unwanted calls from solicitors (4MB $ ). When reviewing the site’s privacy policy, you’ll be able to delete your resume just as easily as you posted it. You won’t necessarily want your resume to remain out there on the Internet once you land a job. Remember, the longer your resume remains posted on a job board, the more exposure, both positive and not-so-positive, it will receive.

2. Take advantage of site features.

Lawful job search sites offer levels of privacy protection. Before posting your resume, carefully consider your job search objectives and the level of risk you are willing to assume.CareerBuilder.com, for example, offers three levels of privacy from which job seekers can choose. The first is standard posting. This option gives job seekers who post their resumes the most visibility to the broadest employer audience possible. The second is anonymous (匿名的) posting. This allows job seekers the same visibility as those in the standard posting category without any of their contact information being displayed. Job seekers who wish to remain anonymous but want to share some other information may choose which pieces of contact information to display.The third is private posting. This option allows a job seeker to post a resume without having it searched by employers. Private posting allows job seekers to quickly and easily apply for jobs that appear on CareerBuilder.com without retyping their information.

3. Safeguard your identity.

Career experts say that one of the ways job seekers can stay safe while using the Internet to search out jobs is to conceal their identities. Replace your name on your resume with a generic (泛指的) identifier, such as "Intranet Developer Candidate," or "Experienced Marketing Representative." You should also consider eliminating the name and location of your current employer. Depending on your title, it may not be all that difficult to determine who you are once the name of your company is provided. Use a general description of the company such as "Major auto manufacturer." or "International packaged goods supplier."If your job title is unique, consider using the generic equivalent instead of the exacnitle assigned by your employer.

4. Establish an email address for your search.

Another way to protect your privacy while seeking employment online is to open up an email account specifically for your online job search. This will safeguard your existing email box in the event someone you don’t know gets hold of your email address and shares it with others.Using an email address specifically for your job search also eliminates the possibility that you will receive unwelcome emails in your primary mailbox. When naming your new email address, be sure that it doesn’t contain references to your name or other information that will give away your identity. The best solution is an email address that is relevant to the job you are seeking such as Salesmgr2004@provider.com.

5. Protect your references.

If your resume contains a section with the names and contact information of your references. take it out. There’s no sense in safeguarding your information while sharing private contact information of your references.

6. Keep confidential (机密的)information confidential.

Do not, under any circumstances, share your social security, driver’s license, and bank account numbers or other personal information, such as race or eye color. Honest employers do not need this information with an initial application. Don’t provide this even if they say they need it in order lo conduct a background check. This is one of the oldest tricks in the book - don’t fall for it.

第1题:1. Robert Ellis Smith believes identily theft is difficult to detect and one can hardly do anything to prevent it.

点击查看答案

第6题

Part Ⅱ Reading Comprehension (Skimming and Scanning)

Directions: In this part, you will have 15 minutes to go over the passage quickly and answer the questions on Answer Sheet 1. For questions 1-7, choose the best answer from the four choices marked [A] ,[B], [C] and [D]. For questions 8-10, complete the sentences with the information given in the passage.

Rivers

By original usage, a river is flowing water in a channel with defined banks. Modern usage includes rivers that are multichanneled, intermittent, or transient in flow and channels that are practically bankless. The concept of channeled surface flow, however, remains central to the definition.

Rivers are nourished by precipitation, by direct overland runoff, through springs and seepages (渗流), or from meltwater at the edges of snowfields and glaciers. The contribution of direct precipitation on the water surface is usually minute, except where much of a catchment area is occupied by lakes. River water losses result from seepage into shallow or deep aquifers (沙石含水层) and particularly from evaporation. The difference between the water input and loss sustains surface discharge or streamflow. The amount of water in river system at any time is but a tiny fraction of the Earth's total water; 97 percent of all water is contained in the oceans and about three-quarters of fresh water is stored as land ice; nearly all the remainder occurs as groundwater. Lakes hold less than 0.5 percent Of all fresh water, soil moisture accounts for about 0.05 percent, and water in river channels for roughly half as much, 0.025 percent, which represents only about one four-thousandth of the Earth's total fresh water.

Water is constantly cycled through the systems of land ice, soil, lakes, groundwater, and river channels, however. The discharge of rivers to the oceans delivers to these systems the equivalent of the water vapor that is blown overland and then consequently precipitated as rain or snow — i.e., some 7 percent of mean annual precipitation on the globe and 30 percent of precipitation on land areas.

The historical record includes marked shifts in the appreciation of rivers, numerous conflicts in use demand, and an intensification of use that has rapidly accelerated during the 20th century. External freight trade became concentrated in estuarine ports rather than in inland ports when oceangoing vessels increased in size.

Demand on open-channel water increases as population and per capita water use increase and as underground water supplies fall short. Irrigation use constitutes a comparatively large percentage of the total supply.

Present-day demands on rivers as power sources range from the floating of timber, through the use of water for cooling, to hydroelectric generation. Logging in forests relies primarily on notation during the season of melt-water high flow. Large power plants other industrial facilities are often located along .rivers, which supply the enormous quantities of water needed for cooling purposes. Manufacturers of petrochemicals, steel, and woolen cloth also make large demands. Hydroelectric power generation was introduced more than 100 years ago, but the majority of the existing installations have been built since 1950.

The ever-increasing exploitation of rivers has given rise to a variety of problems. Extensive commercial navigation of rivers has resulted in much artificial improvement of natural channels, including increasing the depth of the channels to permit passage of larger vessels. In some cases, this lowering of the fiver bottom has caused the water table of the surrounding area to drop, which has adversely affected agriculture. Also, canalization, with its extensive system of locks and navigation dams, ofte

A.are multichanneled in flow

B.have clear banks

C.include bankless channels

D.exist for only a short time in flow

点击查看答案

第7题

Part Ⅱ Reading Comprehension (Skimming and Scanning)

Directions: In this part, you will have 15 minutes to go over the passage quickly and answer the questions on Answer Sheet 1. For questions 1-7, choose the best answer from the four choices marked A, B, C and D. For questions 8-10, complete the sentences with the information given in the passage.

On Friendship

Few Americans stay put (固定不动的) for a lifetime. We move from town to city to suburb, from high school to college in different states, from a job in one region to a better job elsewhere, from the home where we raise our children to the home where we plan to live in retirement. With each move we are forever making new friends, who become part of our new life at that time.

For many of us the summer is a special time for forming new friendships. Today millions of Americans vacation abroad and they go not only to see new sights but also—in those places where they do not feel too strange—with the hope of meeting new people. No one really expects a vacation trip to produce a close friend. But surely the beginning of a friendship is possible? Surely in every country people value friendship?

They do. The difficulty when strangers from two countries meet is not a lack of appreciation of friendship, but different expectations about what constitutes friendship and how it comes into being. In those European countries that Americans are most likely to visit, friendship is quite sharply distinguished from other, more casual relations, and is differently related to family life. For a Frenchman, a German or an Englishman friendship is usually more particularized and carries a heavier burden of commitment.

But as we use the word, "friend" can be applied to a wide range of relationships to someone one has known for a few weeks in a new place, to a close business associate, to a childhood playmate, to a man or woman, to a trusted confidant (心腹朋友). There are real differences among these relations for Americans a friendship may be superficial, casual, situational or deep and enduring. But to a European, who sees only our surface behavior, the differences are not clear.

As they see it, people known and accepted temporarily, casually, flow in and out of Americans' homes with little ceremony and often with little personal commitment. They may be parents of the children's friends, house guests of neighbors, members of a committee, business associates from another town or even another country. Coming as a guest into an American home, the European visitor finds no visible landmarks. The atmosphere is relaxed. Most people, old and young, are called by first names.

French friendship

Who, then, is a friend? Even simple translation from one language to another is difficult, "You see," a Frenchman explains, "if I were to say to you in France, 'This is my good friend,' that person would not be as close to me as someone about whom I said only 'This is my friend. ' Anyone about whom I have to say more is really less.

In France, as in many European countries, friends generally are of the same sex, and friendship is seen as basically a relationship between men. Frenchwomen laugh at the idea that "women can't be friends," but they also admit sometimes that for women "It's a different thing." And many French people doubt the possibility of a friendship between a man and a woman. There is also the kind of relationship within a group—men and women who have worked together for a long time, who may be very close, sharing great loyalty and warmth of feeling. They may call one another—copains—a word that in English becomes "friends" but has more the feeling of "pals" or "buddies". In French eyes this is not friendship, although two members of such a group may well be friends.

&n

A.It makes Americans cherish friendship very much.

B.It makes Americans change friends from time to time.

C.It makes Americans emotionally independent of each other.

D.It makes Americans care more about family than friends.

点击查看答案

第8题

Part Ⅱ Reading Comprehension (Skimming and Scanning)

Directions: In this part, you will have 15 minutes to go over the passage quickly and answer the questions on Answer Sheet 1. For questions 1-7, choose the best answer from the four choices marked A), B), C) and D). For questions 8-10, complete the sentences with the information given in the passage.

Satellite Ⅳ

Today, you see compact satellite dishes perched on rooftops all over the United States. Drive through rural areas beyond the reach of the cable companies and you'll find dishes on just about every house. The major satellite television companies are bringing in more customers every day with the lure of movies, sporting events and news from around the world.

The Broadcast TV Problem

Conceptually, satellite television is, a lot like broadcast television. It's a wireless system for delivering television programming directly to a viewer's house. Both broadcast television and satellite stations transmit programming via a radio signal. Broadcast stations use a powerful antenna to transmit radio waves to the surrounding area. Viewers can pick up the signal with a much smaller antenna.

The main limitation of broadcast television is range. The radio signals used to broadcast television shoot out from the broadcast antenna in a straight line. In order to receive these signals, you have to be in the direct "line of sight" of the antenna. One problem is that the Earth is curved, so it eventually breaks the signal's line of site. The other problem with broadcast television is that the signal is often distorted even in the viewing area. To get a perfectly clear signal like you find on cable, you have to be pretty close to the broadcast antenna without too many obstacles in the way.

The Satellite TV Solution

Satellite television solves the problems of range and distortion by transmitting broadcast signals from satellites orbiting the Earth. Since satellites are high in the sky, there are a lot more customers in the line of site. Satellite television systems transmit and receive radio signals using specialized antennas called satellite dishes.

The television satellites are all in geosynchronous orbit, meaning that they stay in one place in the sky relative to the Earth. Each satellite is launched into space at about 7,000 mph (11,000kph), reaching approximately 22,200 miles (35,700km) above the Earth. At this speed and altitude, the satellite will revolve around the planet once every 24 hours—the same period of time it takes the Earth to make one full rotation. In other words, the satellite keeps pace with our moving planet exactly. This way, you only have to direct the dish at the satellite once, and from then on it picks up the signal without adjustment, at least when everything works right.

The Overall System

Early satellite TV viewers were explorers of sorts. They used their expensive dishes to discover unique programming that wasn't necessarily intended for mass audiences. The dish and receiving equipment gave viewers the tools to pick up foreign stations, live feeding between different broadcast stations, NASA activities and a lot of other stuff transmitted using satellites.

Some satellite owners still seek out this sort of programming on their own, but today, most satellite TV customers get their programming through a direct broadcast satellite (DBS) provider, such as Direct TV or the Dish Network. The provider selects programs and broadcasts them to subscribers as a set package. Basically, the provider's goal is to bring dozens or even hundreds of channels to your television in a form. that approximates the competition, cable TV. Unlike earlier programming, the provider's broadcast is completely digital, whic

A.a powerful antenna

B.a much smaller antenna

C.satellite dishes

D.cable

点击查看答案

第9题

Part Ⅱ Reading Comprehension (Skimming and Scanning)

Directions: In this part, you will have 15 minutes to go over the passage quickly and answer the questions on Answer Sheet 1. For questions 1-7, choose the best answer from the four choices marked A), B), C) and D). For questions 8-10, complete the sentences with the information given in the passage.

Who's Afraid of Google?

Rarely if ever has a company risen so fast in so many ways as Google, the world's most popular search engine. This is true by just about any measure: the growth in its market value and revenues; the number of people clicking in search of news, the nearest pizza parlor or a satellite image of their neighbor's garden; the volume of its advertisers; or the number of its lawyers and lobbyists.

Such an ascent is enough to evoke concerns -- both paranoid(偏执的) and justified. The list of constituencies that hate or fear Google grows by the week. Television networks, book publishers and newspaper owners feel that Google has grown by using their content without paying for it. Telecoms firms such as America's AT&T and Verizon are annoyed that Google prospers, in their eyes, by free-riding on the bandwidth that they provide; and it is about to bid against them in a forthcoming auction for radio spectrum. Many small firms hate Google because they relied on exploiting its search formulas to win prime positions in its rankings, but dropped to the Internet's equivalent of Hades after Google modified these algorithms(运算法则).

And now come the politicians. Libertarians dislike Google's deal with China's censors. Conservatives moan about its uncensored videos. But the big new fear is to do with the privacy of its users. Google's business model assumes that people will entrust it with ever more information about their lives, to be stored in the company's "cloud" of remote computers. Some users now keep their photos, blogs, videos, calendars, e-mail, news feeds, maps, contacts, social networks, documents, spreadsheets (电子数据表), presentations, and credit-card information -- in short, much of their lives -- on Google's computers.

But the privacy problem is much subtler than that. As Google compiles more information about individuals, it faces numerous trade-offs. At one extreme it could use a person's search history and advertising responses in combination with, say, his location and the itinerary in his calendar, to serve increasingly useful and welcome search results and ads. This would also allow Google to make money from its many new services. But it could scare users away. As a warning, Privacy International, a human-rights organization in London, has berated Google, charging that its attitude to privacy "at its most blatant is hostile, and at its most benign is ambivalent".

And Google could soon, if it wanted, compile files on specific individuals. This presents "perhaps the most difficult privacy issues in all of human history," says Edward Felten, a privacy expert at Princeton University. Speaking for many, John Battelle, the author of a book on Google and an early admirer, recently wrote on his blog that "I've found myself more and more wary" of Google "out of some primal, lizard-brain fear of giving too much control of my data to one source."

More JP Morgan than Bill Gates

Google is often compared to Microsoft; but its evolution is actually closer to that of the banking industry. Just as financial institutions grew to become repositories of people's money, and thus guardians of private information about their finances, Google is now turning into a supervisor of a far wider and more intimate range of information about individuals. Yes, this applies also to rivals such as Yahoo! and Microsoft. But Google, through the sheer speed with which it accumulates

A.entered a desperate future

B.transferred a different attitude on Google

C.dropped to the competition of Internet

D.obtained predominance in the rankings

点击查看答案
下载上学吧APP
客服
TOP
重置密码
账号:
旧密码:
新密码:
确认密码:
确认修改
购买搜题卡查看答案
购买前请仔细阅读《购买须知》
请选择支付方式
微信支付
支付宝支付
选择优惠券
优惠券
请选择
点击支付即表示你同意并接受《服务协议》《购买须知》
立即支付
搜题卡使用说明

1. 搜题次数扣减规则:

功能 扣减规则
基础费
(查看答案)
加收费
(AI功能)
文字搜题、查看答案 1/每题 0/每次
语音搜题、查看答案 1/每题 2/每次
单题拍照识别、查看答案 1/每题 2/每次
整页拍照识别、查看答案 1/每题 5/每次

备注:网站、APP、小程序均支持文字搜题、查看答案;语音搜题、单题拍照识别、整页拍照识别仅APP、小程序支持。

2. 使用语音搜索、拍照搜索等AI功能需安装APP(或打开微信小程序)。

3. 搜题卡过期将作废,不支持退款,请在有效期内使用完毕。

请使用微信扫码支付(元)
订单号:
遇到问题请联系在线客服
请不要关闭本页面,支付完成后请点击【支付完成】按钮
遇到问题请联系在线客服
恭喜您,购买搜题卡成功 系统为您生成的账号密码如下:
重要提示: 请勿将账号共享给其他人使用,违者账号将被封禁。
发送账号到微信 保存账号查看答案
怕账号密码记不住?建议关注微信公众号绑定微信,开通微信扫码登录功能
警告:系统检测到您的账号存在安全风险

为了保护您的账号安全,请在“上学吧”公众号进行验证,点击“官网服务”-“账号验证”后输入验证码“”完成验证,验证成功后方可继续查看答案!

- 微信扫码关注上学吧 -
警告:系统检测到您的账号存在安全风险
抱歉,您的账号因涉嫌违反上学吧购买须知被冻结。您可在“上学吧”微信公众号中的“官网服务”-“账号解封申请”申请解封,或联系客服
- 微信扫码关注上学吧 -
请用微信扫码测试
选择优惠券
确认选择
谢谢您的反馈

您认为本题答案有误,我们将认真、仔细核查,如果您知道正确答案,欢迎您来纠错

上学吧找答案