听力原文:The Larsen B shelf was no ordinary piece of ice because it covered more than 3,000 square kilometres and was 200 metres thick. Scientists say they have discovered the ice relatively intact for at least 10,000 years or since the last ice age. Now that it has broken up it is causing changes in currents and species in the area.But that is not all. Robert Gilbert is a geography professor with Queen's University in Ontario. He is the only Canadian in the international team looking at the ice shelf. "As the ice shelves are disintegrating, the glaciers that are feeding them from the land are surging forward, and they are no longer held back by the ice shelf." Gilbert says the glaciers are pushing ice in the form. of icebergs into the sea.As they melt, he says, there will be an effect on sea level that will be felt around the world.He says now scientists are watching to see if the most southern part of the Larsen ice shelf is going to break up. It is in the most protected and the coldest part of Antarctica.Gilbert is now on his way to Greenland to see what changes are happening with the ice there.
Which part of Larsen B ice shelf disintegrated in the 1900s?
A. The northern part.
B. The southern part.
C. The western part.
D. The eastern part.
查看答案
听力原文:Nov. 29th is observed by the United Nations as the International Day of Solidarity with the Palestinian People. The date was chosen because on that day in 1947, the General Assembly adopted what came to be known as the Partition Resolution. That resolution provided for the establishment in Palestine of a Jewish state and an Arab state.
UN Partition Resolution in 1947 divides Palestinian territory into two states.
A. 正确
B. 错误
According to the Internet Security Threat Report, how much percent do home users account for of all targeted attacks?
A. 86%
B. 7.68%
C. 87%
D. 78%
听力原文:Cyber attacks are on the increase against home computer users largely because they have lower levels of security protection. That's according to Symantec Corporation that sells computer anti-virus software. Symantec's latest Internet Security Threat Report finds home users account for 86% of all targeted attacks followed by businesses that sell financial services. In addition, attackers are using a variety of techniques to escape detection and prolong their presence on your system. Symantec says there's one reason scammers are going after home computers. "And that's partially because of the data that contain credit card information, social security numbers, and partially because of the machines that control the high speed links which in turn can be used for spamming, and fraud". Symantec says attackers are using a variety of means to steal information and they get more sophisticated every day. "So we've already seen the attackers go from e-mail only to Web browsers. And now we are starting to see them using other techniques, such as instant messaging and phone calls." The company urges computer users to develop Internet streetsmarts and be skeptical of anyone online who asks them to divulge confidential information.
What is this passage about?
A. The development of computer technonogy.
B. The development of Symantec Corporation.
Cyber attacks.
D. Computer techniques.
听力原文:Three major storms drenched North Korea in July, washing away crops and raising the possibility of famine in a reclusive country that already battles chronic food shortages. The Choson Sinbo said that as of July 17,549 people were killed, 295 went missing and 3,043 were injured in the storms. The International Federation of Red Cross and Red Crescent Societies said last Friday that flooding in the second week of July had killed 151 people and left 29 missing.
How many people were missing in the storm of July 17 that drenched North Korea?
A. 549.
B. 151.
C. 295.
D. 29.