阅读下面的文字,完成1~4题。 [片断一]牛二紧揪住杨志说道:“我偏要买你这口刀

题型:阅读理解与欣赏

问题:

阅读下面的文字,完成1~4题。
  [片断一]牛二紧揪住杨志说道:“我偏要买你这口刀。”杨志道:“你要买,将钱来。”牛二道:“我没钱。”杨志道:“你没钱,揪住洒家怎地?”牛二道:“我要你这口刀。”杨志道:“俺不与你。”牛二道:“你好男子,剁我一刀。”杨志大怒,把牛二推了一跤。……杨志赶入去,把牛二胸脯上又连搠了两刀,血流满地,死在地上。……杨志叫道:“洒家杀死这个泼皮,怎肯连累你们!泼皮既已死了,你们都来同洒家去官府里出首。”坊隅众人慌忙拢来,随同杨志,径投开封府出首。
  [片断二]郑屠右手拿刀,左手便来要揪鲁达,被这鲁提辖就势按住左手,赶将入去,望小腹上只一脚,腾地踢倒了在当街上。鲁达再入一步,踏住胸脯,提起那醋钵儿大小拳头,看着这郑屠道:“……你是个卖肉的操刀屠户,狗一般的人,也叫做镇关西!……”扑的只一拳,正打在鼻子上,打得鲜血迸流,鼻子歪在半边,却便似开了个油铺,成的、酸的、辣的,一发都滚出来……拔步便走,回头指着郑屠尸道:“你诈死!洒家和你慢慢理会。”一头骂,一头大踏步去了……鲁提辖回到下处,急急卷了些衣服盘缠,细软银两,但是旧衣粗重都弃了。提了一条齐眉短棒,奔出南门,一道烟走了。——节选自《水浒传》
1.这两个片断中,其主要人物杨志、鲁达的绰号分别是 ________、_________ 。
2.根据你的理解,完成下面的表格:
事件
鲁提辖拳打镇关西
起因
结果
径役开封府出首奔出南门,一道烟走了
细节分析(画线句)
3.杨志杀了牛二后,怕连累他人主动去官府自首;鲁智深三拳打死镇关西后,却以智逃脱。同样是杀了人,但杨志与鲁智深的处理方法却截然不同。对此,你怎么评价这两位英雄好汉的做法?请写出你的看法。
__________________________________________________
4.《水浒传》中众多英雄人物尽显英雄本色。你还知道《水浒传》中哪些人物“路见不平,拔刀相助”的故事?请用简洁的短语概括出来(至少3个,应与选段内容不同)。
__________________________________________________
考点:课文理解,名著阅读文学常识
题型:阅读理解与欣赏

Mrs. Smith can _____________ piano.[ ]

A. play the

B. played

C. plays the

题型:阅读理解与欣赏

为观察水痘疫苗的预防效果,某地开展了一次预防接种试验,结果为:接种组400人中有10人发病,对照组400人中60人发病,该疫苗的效果指数为()。

A.0.2

B.0.8

C.5

D.6

E.7

题型:阅读理解与欣赏

张师傅用铁皮制作圆柱形的通风管25节,每节长80厘米,底面圆的周长是31.4厘米,至少需要铁皮多少平方米?(得数保留整数)  

题型:阅读理解与欣赏

The currency Of Japan is( ).

A.Japanese yen

B.Japanese yuan

C.bath

D.balboa

题型:阅读理解与欣赏

With hundreds of millions of electronic transactions taking place daily, businesses and organizations have a p incentive to protect the (66) of the data exchanged in this manner, and to positively ensure the identities of those involved in the (67) . This has led to an industry-wide quest for better, more secure methods for controlling IT operations, and for deploying p security (68) deeply and broadly throughout networked infrastructures and client devices. One of the more successful concepts to engage the imaginations of the security community has been the development of standards-based security. (69) that can be incorporated in the hardware design of client computers. The principle of encapsulating core security capabilities in (70) and integrating security provisions at the deepest levels of the machine operation has significant benefits for both users and those responsible for securing IT operations.

A.silicon

B.reengineering

C.computer

D.software

更多题库