【正文】
rsity. Among students who do major in education, those with higher test scores are less likely to bee teachers. And among individuals who enterteaching, those with the highest test scores are the most likely to leave the profession early. The study takes into consideration the effects of a nationwide 20% real increase in teachersalaries during the 1980s. It concludes that it had no appreciable effect on overall teacherquality, in large part because schools do a poor job of. recruiting andselecting the best , even if higher salaries lure more qualified candidates into the profession, the overall effect on quality may be offset by mediocre teachers who choose to postpone retirement. The study also takes aim at teacher training. Every state requires that teachers be licensed,a process that can involve up to two years of education classes, even for those who have auniversity degree or a graduate degree in the field they would like to teach. Inevitably, thissystem does little to lure in graduates of top universities or professionals who would like toenter teaching at midcareer. 26. Which statement is NOT TRUE according to the passage? [A] NEA is the largest society for teachers. [B] Educationmajored students are not as wise as people have assumed. [C] Young teachers are paid less because their students don39。t pay enough attention to Security. 25. It can be concluded from the passage that [A] not all hacking attempts are worthy of investigation. [B] information of the victims is inaccessible. [C] InfraGard chapters will be in effect by the end of September. [D] was once disrupted by hacking. Text 2 The annual Phi Delta Kappa/Gallup poll of attitudes towards public education releasedthis week found that a majorty of Americans feel t is important to put a qualified,petent teacher in every classroom. Bob Chase, president of the National EducationAssociation (NEA), the main teachers39。s board, said a recent report estimated 97 percent of all cybercrime goes undetected. Wiles, a puter security expert, has a firewall on his personal puter to prevent hackers from getting into his files. I get at least one report a day that somebody was trying to get into my puter, he said. The Net is a wonderful place, but it39。s export success in America. 01. [A] one [B] part [C] much [D] some 02. [A] country [B] city [C] land [D] society 03. [A] hardly [B] frequently [C] approximately [D] always 04. [A] scholarship [B] citizenship [C] admittance [D] integration 05. [A] toward [B] near [C] between [D] among 06. [A] more [B] better [C] larger [D] longer 07. [A] sold [B] maintained [C] memorized [D] sacrificed 08. [A] Japan [B] China [C] Korea [D] Thailand 09. [A] scorned [B] respected [C]surprised [D] ignored 10. [A] side [B] head [C] eyes [D] back 11. [A] like [B] refuse [C] straggle [D] want 12. [A] skin [B] clothes [C] faces [D] politeness 13. [A] also [B] so [C] yet [D] then 14. [A] hated [B] ignored [C] treated [D] wele 15. IAI homeless [B] careless [C] selfless [D] shameless 16. [A] fear [B] need [C] interest [D] hate 17. [A] growing [B] expanding [C] developing [D] enlarging 18. [A] people [B] residents [C] students [D] foreigners 19. ,[Al diligence [B] laziness [C] hardship [D] stubbornness 20. [A] for [B] to [C] with [D] at gection II Reading Comprehension (60%) Part A (40 %) Read the following texts. Answer the questions below each text by choosing A, B, C or D. Mark your answers on ANSWER SHEET 1 (客觀答題卡 ). Text 1 InfraGard is a grassroots effort to respond to the need for cooperation and collaboration n countering the threat of cybercrime and terrorism to private businesses and the government. By the end of September, there will be InfraGard chapters in all 50 states, Calloway said. With advice from the FBI, each local chapter will be run by a board of directors that includes members of private industry, the academic munity and public agencies. Banks,utilities, and other businesses and government agencies will use a secure Web site to share nformation about attempts to hack into their puter works. Members can join the system!t no charge. A key feature of the system is a twopronged method of reporting attacks. A sanitizeddescription of a hacking attempt or other incident one that doesn39。凡做在試題冊(cè)上或未做在指定位 置的答案無(wú)效。用其他筆填涂的答案或填涂在試題冊(cè)上的答案無(wú)效。 選擇題答案選出后,必須用 2B 鉛筆在答題卡上相應(yīng)的選中項(xiàng)上劃一橫線,如:[A][B][C][D].劃線要粗,要有一定濃度。 本考試時(shí)間為 3 小時(shí)。t reveal the name or ensitive information about the victim can be shared with the other members to spot