第1题:
The future of this company is _______ : many of its talented employees are flowing into more profitable netbased businesses.
A at odds B in trouble C in vain D at stake
第2题:
A、women-scientists
B、women-scientist
C、woman-scientists
D、woman-scientist
第3题:
After the rebuilding our school is becoming _______________.
A. more and more beautiful B. more beautiful and beautiful
C. beautiful and beautiful D. the more beautiful
第4题:
Kate learns chemistry ______ in our class.
A: more carefully
B: the most carefully
C: more careful
D: the most careful
第5题:
A、watching
B、is watch
C、are watching
D、to watch
第6题:
Because, according to Keynes, inadequate total demand increases unemployment, the indicated cure is either more investment by businesses or more spending and consequently larger budget deficits by government.
译文:因为,按照凯恩斯的理论,不充分的总体需求会增加失业,建议的解决方式是企业扩大投资或政府增加开支,继而增加预算赤字。
本题考核的知识点是:词性转换。
该句是包含原因状语从句的复合句,句子主干是the indicated cure is…,表语由并列连词either … or…连接。
词汇方面:indicated是过去分词用做形容词,动词indicate意为“表明,暗示,提及,建议”,根据上下文indicated译为“建议的”。more investment,more spending和larger budget deficits是形容词比较级加名词,根据汉语习惯转换成动词加名词的搭配,即“扩大投资”、“增加开支”和“增加预算赤字”。
第7题:
Our classroom is () beautiful than theirs.
A. more
B. very
C. much more
参考答案:C
第8题:
_____________ we plant, _________________our city will be.
A. The more trees, the beautiful B. The less trees, the more beautiful
C. The more trees, the more beautiful D. The less trees, the beautiful
第9题:
More and more young people___________our club these days.
A. join
B. don't join
C. are joining
D. aren't joining
第10题:
With hundreds of millions of electronic(161)taking place daily, businesses and organizations have a strong incentive to protect the(162)of the data exchanged in this manner, and to positively ensure the(163)of those involved in the transactions. This has led to an industry-wide quest for better, more secure methods for controlling IT operations, and for deploying strong security mechanisms deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security(164 )that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in(165 )and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT operations.
A.devices
B.transactions
C.communications
D.businesses