问题 阅读理解与欣赏

阅读文段,回答问题。

多好的草地也有瘦马

  ①曾经有这样一幅漫画:碧草如茵的原野上,远处一匹匹膘肥体健的骏马正悠闲自得地吃着草。然而就在近处,一匹瘦骨嶙峋横卧在地面上的马打破了这美好的画面。我不觉一惊:多好的草地也会有瘦马。看来,要有所作为,光有优越的条件是不够的,更重要的还须自己努力。

  ②当然,我承认有优越的条件确实很好,但它还必须加上自己努力才会有意义。古今中外,贫困潦倒或有先天缺陷者,凭借努力而成名成家之人,比比皆是。

  ③古希腊的德摩梯尼,小时侯口吃,但他苦加练习,终于成为著名的演说家。法国作家大仲马出身微贱,但他毫不在乎,在贫困中坚持写作,终于成为文坛巨子。我国古代一个叫陈正之的人,天生反应迟钝,但他付出了常人无法想象的努力,终成博学之士。我国数学家陈景润在极其艰难的条件下,通宵达旦忘我地研究,终摘数学桂冠。够了,够了,不必再列举了——我无非是想通过这些例子说明,一个人若要有所成就,努力奋斗是必不可少的。

  ④也许有人会认为努力无关紧要,重要的是拥有天时地利,仔细解析一下,便会发现其中的漏洞

  ⑤其一,外界条件过于优越,人不一定就会成才,相反,也许倒会沉醉于纸醉金迷之中。譬如,十六、十七世纪的欧洲,贵族们奢侈成风,这难道不是不会正确利用优越条件的典型吗?

  ⑥其二,先天的条件优越,但后天不努力,同样会碌碌无为。宋代方仲永天资聪慧,但不知后天加以努力,最终落得个“泯然众人矣”。另外,爱迪生所说的“成功就是百分之一的天才加百分之九十九的努力”不也证实了这一点吗?

  ⑦如果你的条件优越,那么好好利用它吧!如果你的条件太一般,那么就用努力来弥补它吧!否则,无论于什么样的草地,你都将是匹瘦马

1、本文的中心论点是(   )

A、要有所作为,光有优越的条件是不够的,更重要的还须自己努力。

B、贫困潦倒或有先天缺陷者,凭借自己努力而成名成家之人,比比皆是。

C、努力无关紧要,重要的是拥有天时地利。

D、成功就是百分之一的天才加百分之九十九的努力。

2、第③段运用了什么论证方法,有什么作用?

答:_______________________________________

3、第④段中加粗的“其中的漏洞”是指什么?

答:_______________________________________

4、第⑦段中加粗的“草地”比喻_______,“瘦马”比喻_______。

5、请你仿照第三段的事例,再写一例,要求合乎作者观点,简洁流畅。

答:_______________________________________

答案

1、A

2、事例论证论证了“一个人若要有所成就,努力奋斗是必不可少的”观点。

3、⑴外部条件过于优越,人不一定就会成材,相反,也许倒会沉醉于纸醉金迷之中。⑵自身先天条件优越,但后天不努力,同样会碌碌无为。

4、外部条件,或成长的环境; 没有成材的人,或平庸的人。

5、要求:文从字顺,扣住作者观点即可。

单项选择题
填空题

Clattering keyboards may seem the white noise of the modern age, but they betray more information than unwary typists realize. Simply by analyzing audio recordings of keyboard clatter, computer scientists can now reconstruct an accurate transcript of what was typed--including passwords. (41) .
Such snooping is possible because each key produces a characteristic dick, shaped by its position on the keyboard, the vigor and hand position of the typist, and the type of keyboard used. But past attempts to decipher keyboard sounds were only modestly successful, requiring a training session in which the computer matched a known transcript to an audio recording of each key being struck. (42) . Furthermore, each new typist or keyboard required a fresh transcript and training session, limiting the method’s appeal to would-be hackers.
Now, in a blow to acoustic security, Doug Tygar and his colleagues at the University of California, Berkeley, have published details of an approach that reaches 96% accuracy, even without a labeled training transcript. (43) . The software tentatively assigns each click a letter based on its frequency, then tests the message created by this assignment using statistical models of the English language. For example, certain letters or words are more likely to occur together-if an unknown keystroke follows a "t", it is much more likely to be an "h" than an "x". Similarly, the words "for example" make likelier bedfellows than "fur example". In a final refinement, the researchers employed a method many students would do well to deploy on term papers., automated spellchecking.
By repeatedly revising unlikely or incorrect letter assignments, Dr. Tygar’s software extracts sense from sonic chaos. That said, the method does have one limitation: in order to apply the language model, at least five minutes of the recorded typing had to be in standard English (though in principle any systematic language or alphabet would work). But once those requirements are met, the program can decode anything from epic prose to randomized, ten-character passwords.
(44) . He says it is quite simple to find the instructions needed to build a parabolic or laser microphone on the web. You could just point one from outside through an office window to make a recording. And as he points out, would-be eavesdroppers might not even need their own recording equipment, as laptop computers increasingly come equipped with built-in microphones that could be hijacked.
(45) . His computers were less successful at parsing recordings made in noisy rooms. Ultimately, though, more sophisticated recording arrays could overcome even background noise, rendering any typed text vulnerable. Dr. Tygar therefore recommends that typed passwords be phased out, to be replaced with biometric checks or multiple types of authorization that combine a password with some form of silent verification (clicking on a pre-chosen picture in a selection of images, for example). Loose lips may still sink ships, but for the moment it seems that an indiscreet keystroke can do just as much damage.
[A] This sort of acoustic analysis might sound like the exclusive province of spies and spooks, but according to Dr. Tygar, such attacks are not as esoteric as you might expect.
[B] The sounds of typing can be decoded, which can be used to decode password, so if you are typing random, secure passwords.
[C] The new approach employs methods developed for speech-recognition software to group together all the similar-sounding keystrokes in a recording, generating an alphabet of clicks.
[D] To protect against these sonic incursions, Dr. Tygar suggests a simple remedy: turn up the radio.
[E] The major advance here is that it no longer requires hours of training the model in order to create a usable mapping of key sounds to letters.
[F] And in contrast to many types of computer espionage, the process is simple, requiring only a cheap microphone and a desktop computer.
[G] Thus schooled, the software could still identify only 80% of the characters in a different transcript of the same typist on the same machine.